EH7512-4G-4SFP [ETC]

NETWORK SWITCH-MANAGED 16 PORT;
EH7512-4G-4SFP
型号: EH7512-4G-4SFP
厂家: ETC    ETC
描述:

NETWORK SWITCH-MANAGED 16 PORT

文件: 总184页 (文件大小:5739K)
中文:  中文翻译
下载:  下载PDF数据表文档文件
Industrial Managed Ethernet Switch  
User’s Manual  
Series covered by this manual:  
EHG7504, EHG7506, EHG7508, EHG7512, EHG7516,  
EHG7520, EHG9512, EHG9508, EMG8508, EMG8510  
EH7506*, EH7508*, EH7512*, EH7516*, EH7520*  
* The user interface on these products may be slightly different  
from the one shown on this user manual  
Version 1.2  
June 2016  
TEL: +886-3-5508137  
FAX: +886-3-5508131  
http://www.atop.com.tw  
Important Announcement  
The information contained in this document is the property of Atop Technologies, Inc. and is  
supplied for the sole purpose of operation and maintenance of Atop Technologies, Inc products.  
No part of this publication is to be used for any other purposes, and it is not to be reproduced,  
copied, disclosed, transmitted, stored in a retrieval system, or translated into any human or  
computer language, in any form, by any means, in whole or in part, without the prior explicit  
written consent of Atop Technologies, Inc.  
Published by  
Atop Technologies, Inc.  
2F, No. 146, Sec. 1, Tung-Hsing Rd.  
Jubei, Hsinchu 30261  
Taiwan, R.O.C.  
Tel: 886-3-5508137  
Fax: 886-3-5508131  
www.atop.com.tw  
Copyright © 2016 Atop Technologies, Inc. All rights reserved.  
All other product names referenced herein are registered trademarks of their respective  
companies.  
ii  
Table of Contents  
1
Introduction..............................................................................................2  
1.1 Introduction to Industrial Managed Switch ........................................................... 2  
1.2 Software Features .................................................................................................... 3  
2
Configuring with a Web Browser ...........................................................4  
2.1 Web-based Management Basics ............................................................................ 4  
2.1.1 Default Settings................................................................................................ 4  
2.1.2 Login Process and Main Window Interface ..................................................... 5  
2.2 Basic Information..................................................................................................... 6  
2.2.1 Sys Info ............................................................................................................ 6  
2.2.2 Dev Info Setting ............................................................................................... 7  
2.2.3 Console Setting................................................................................................ 8  
2.2.4 Protocols Status............................................................................................... 9  
2.2.5 Power Status.................................................................................................. 10  
2.2.6 Temperature Log ........................................................................................... 10  
2.3 Administration........................................................................................................ 12  
2.3.1 Password ....................................................................................................... 12  
2.3.2 IP Setting........................................................................................................ 15  
2.3.3 IPv6 Setting.................................................................................................... 16  
2.3.4 Ping................................................................................................................ 17  
2.3.5 Ping6.............................................................................................................. 18  
2.3.6 Mirror Port ...................................................................................................... 19  
2.3.7 System Time .................................................................................................. 20  
2.3.8 Modbus Setting.............................................................................................. 21  
2.3.9 PTP ................................................................................................................ 29  
2.3.9.1 PTP Setting.................................................................................................... 29  
2.3.9.2 H/W PTP Setting............................................................................................ 32  
2.3.10 SSH................................................................................................................ 32  
2.3.11 Telnet ............................................................................................................. 33  
2.3.12 DIP Switch...................................................................................................... 34  
2.4 Forwarding.............................................................................................................. 35  
2.4.1 QoS................................................................................................................ 35  
2.4.1.1 QoS Setting.................................................................................................... 36  
2.4.1.2 CoS Queue Mapping ..................................................................................... 38  
iii  
2.4.1.3 DSCP Mapping .............................................................................................. 39  
2.4.2 Rate Control................................................................................................... 40  
2.4.3 Strom Control................................................................................................. 42  
2.5 Port .......................................................................................................................... 44  
2.5.1 Port Setting .................................................................................................... 44  
2.5.2 Port Status ..................................................................................................... 46  
2.5.3 Mini-GBIC Port Status.................................................................................... 47  
2.5.4 Port Statistics ................................................................................................. 47  
2.6 Power over Ethernet .............................................................................................. 49  
2.6.1 PoE Setting .................................................................................................... 49  
2.6.2 PoE Status ..................................................................................................... 50  
2.6.3 PoE Alarm Setting.......................................................................................... 51  
2.7 Trunking .................................................................................................................. 53  
2.7.1 Trunking Setting............................................................................................. 53  
2.7.2 LACP Status................................................................................................... 55  
2.8 Unicast/Multicast MAC .......................................................................................... 57  
2.8.1 Add Static MAC.............................................................................................. 58  
2.8.2 Black-List MAC .............................................................................................. 59  
2.8.3 MAC Aging Time............................................................................................ 60  
2.8.4 MAC Table ..................................................................................................... 60  
2.9 GARP/GVRP/GMRP................................................................................................ 62  
2.9.1 Multicast Group Table.................................................................................... 63  
2.9.2 GARP Setting................................................................................................. 63  
2.9.1 GVRP Setting................................................................................................. 64  
2.9.2 GMRP Setting ................................................................................................ 65  
2.10 IP Multicast ............................................................................................................. 67  
2.10.1 IGMP.............................................................................................................. 68  
2.10.1.1  
2.10.1.2  
2.10.1.3  
IGMP Settings....................................................................................... 68  
IGMP IP Multicast Table ....................................................................... 69  
IGMP Statistics ..................................................................................... 70  
2.10.2 Static IP Multicast .......................................................................................... 72  
2.11 SNMP....................................................................................................................... 74  
2.11.1 SNMP Agent .................................................................................................. 75  
2.11.2 SNMP V1/V2c Community Setting................................................................. 76  
2.11.3 Trap Setting.................................................................................................... 76  
2.11.4 SNMPv3 Auth. Setting ................................................................................... 77  
2.12 Spanning Tree......................................................................................................... 79  
iv  
2.12.1 Spanning Tree Setting ................................................................................... 80  
2.12.2 Bridge Info...................................................................................................... 83  
2.12.3 Port Setting .................................................................................................... 84  
2.12.4 MSTP Instance .............................................................................................. 86  
2.13 VLAN........................................................................................................................ 88  
2.13.1 VLAN Setting.................................................................................................. 89  
2.13.2 802.1Q VLAN................................................................................................. 90  
2.13.2.1  
2.13.2.2  
2.13.2.3  
802.1Q VLAN Settings.......................................................................... 91  
802.1Q VLAN PVID Settings ................................................................ 92  
802.1Q VLAN Table.............................................................................. 93  
2.13.3 Port-Based VLAN........................................................................................... 94  
2.13.4 MAC-Based VLAN ......................................................................................... 95  
2.13.5 IP Subnet-Based VLAN ................................................................................. 96  
2.13.6 Protocol-Based VLAN.................................................................................... 96  
2.13.6.1  
2.13.6.2  
Protocol to Group Settings.................................................................... 96  
Group to VLAN Settings........................................................................ 97  
2.13.7 QinQ............................................................................................................... 97  
2.14 Security ................................................................................................................. 100  
2.14.1 Port Security................................................................................................. 101  
2.14.1.1  
2.14.1.2  
Port Security Settings ......................................................................... 101  
Port Security White-List MAC ............................................................. 101  
2.14.2 802.1X.......................................................................................................... 102  
2.14.2.1  
2.14.2.2  
2.14.2.3  
802.1X Settings................................................................................... 103  
802.1X Parameters Settings............................................................... 104  
802.1x Port Setting ............................................................................. 105  
2.14.3 ACL .............................................................................................................. 106  
2.15 ERPS/Ring..............................................................................................................110  
2.15.1 ESRP Setting............................................................................................... 111  
2.15.1.1  
2.15.1.2  
Example of ERPS Settings ................................................................. 113  
UERPS Settings (Optional)................................................................. 115  
2.15.2 iA-Ring Settings ........................................................................................... 117  
2.15.3 C-Ring (Compatible-Ring) Settings ............................................................. 118  
2.15.4 U-Ring.......................................................................................................... 119  
2.15.5 Compatible-Chain Settings .......................................................................... 123  
2.16 LLDP...................................................................................................................... 125  
2.16.1 LLDP Settings .............................................................................................. 126  
2.16.2 LLDP Neighbors........................................................................................... 126  
v
2.17 PROFINET ............................................................................................................. 128  
2.17.1 PROFINET Settings..................................................................................... 128  
2.17.2 PROFINETs I&M......................................................................................... 129  
2.17.3 PROFINET MRP.......................................................................................... 130  
2.18 EtherNet/IP............................................................................................................ 132  
2.18.1 EtherNet/IP Settings .................................................................................... 133  
2.19 Client IP Setting.................................................................................................... 134  
2.19.1 DHCP Relay Agent ...................................................................................... 134  
2.19.2 DHCP Mapping IP........................................................................................ 135  
2.20 System................................................................................................................... 137  
2.20.1 System Log .................................................................................................. 138  
2.20.1.1  
2.20.1.2  
System Log Settings........................................................................... 138  
System Log - Log................................................................................ 139  
2.20.2 Warning/Alarm ............................................................................................. 139  
2.20.2.1  
2.20.2.2  
2.20.2.3  
Warning/Alarm Settings ...................................................................... 140  
SMTP Settings.................................................................................... 142  
Log ...................................................................................................... 144  
2.20.3 Denial of Service.......................................................................................... 145  
2.20.4 Backup/Restore Config................................................................................ 147  
2.20.4.1  
2.20.4.2  
Backup/Restore Config. Via HTTP ..................................................... 148  
Backup/Restore Config. Via TFTP...................................................... 148  
2.20.5 Firmware Update ......................................................................................... 150  
2.20.6 Factory Default Setting ................................................................................ 150  
2.20.7 Reboot.......................................................................................................... 150  
3
Configuring with a Serial Console .....................................................151  
3.1 Serial Console Setup ........................................................................................... 151  
3.2 Command Line Interface Introduction............................................................... 153  
3.3 General Commands ............................................................................................. 154  
3.4 Command Example.............................................................................................. 155  
3.4.1 Administration Setup using Serial Console.................................................. 155  
3.4.2 Spanning Tree Setup using Serial Console................................................. 156  
4
Configuring with a Telnet Console.....................................................157  
4.1 Telnet ..................................................................................................................... 157  
4.2 Telnet Log-in......................................................................................................... 157  
4.3 Command Line Interface for Telnet.................................................................... 158  
vi  
4.4 Commands in the Privileged Mode .................................................................... 158  
4.5 Commands in the Configuration Mode.............................................................. 159  
5
Device Management Utility.................................................................161  
5.1 Network Setting.................................................................................................... 162  
5.2 Topology Diagram................................................................................................ 163  
5.3 Firmware Update .................................................................................................. 165  
Appendix A: Glossary..............................................................................167  
Appendix B: Modbus Memory Map.........................................................169  
vii  
Preface  
This manual contains some advanced network management knowledge, instructions, examples,  
guidelines, and general theories. The contents are designed to help users manage the switch and use  
its software, a background in general theory is a must, when reading it. Please refer to the Glossary for  
technical terms and abbreviations.  
Who Should Use This User Manual  
This manual is to be used by qualified network personnel or support technicians who are familiar with  
network operations, and might be useful for system programmers or network planners as well. This  
manual also provides helpful and handy information for first time users. For any related problems,  
please contact your local distributor. If they are unable to assist you, please redirect your inquiries to  
www.atop.com.tw.  
Warranty Period  
Atop technology provides a limited 5-year warranty for managed Ethernet switches.  
1
1 Introduction  
1.1 Introduction to Industrial Managed Switch  
Atop’s EHG (Ethernet Switching Hub Full Gigabit, or Fast Ethernet Switching Hub) series are product  
lines of powerful industrial managed switch which are referred to as Open Systems Interconnection  
(OSI) Layer 2* bridging devices. Unlike an “unmanaged” switch, which is normally found in homes or  
in Small Office/Home Office (SOHO) environments and runs in “auto-negotiation” mode, each port on  
a “managed switch” can be configured for its link bandwidth, priority, security, and duplex settings.  
The managed switches can be managed by Simple Network Management Protocol (SNMP) software,  
web browsers, Telnet, or serial console. Since every single port can be configured to specific settings,  
network administrators can better control the network and maximize network functionality.  
Atop’s managed switch is also an industrial switch and not a commercial switch. A commercial switch  
simply works in a comfortable office environment. However, an industrial switch is designed to perform  
in harsh industrial environments, i.e., extreme temperature, high humidity, dusty air, potential high  
impact, or the presence of potentially high static charges. Atop’s managed switch works fine even in  
these environments.  
Atop’s managed switch is designed to provide faster, secure, and more stable network. One advantage  
that makes it a powerful switch is that it supports network redundancy protocols/technologies such as  
Ethernet Ring Protection Switching (ERPS), iA-Ring, Rapid Spanning Tree Protocol (RSTP), Multiple  
Spanning Tree Protocol (MSTP), and Media Redundancy Protocol (MRP). These protocols provide  
better network reliability and decrease recovery time down to less than 20 ms.  
Atop’s managed switch supports a wide range of IEEE standard protocols. This switch is excellent for  
keeping systems running smoothly, reliable for preventing system damage or losses, and friendly to all  
levels of users. The goal of this innovative product is to bring users an enhanced network management  
experience.  
*Note:  
Throughout the manual, the symbol * indicates that more detailed information of the subject will be  
provided at the end of this book or as a footnote.  
2
1.2 Software Features  
Atop’s industrial managed switches come with a wide range of network protocols and software  
features. These protocols and software features allow the network administrator to implement security  
and reliability into their network. These features enable Atop’s switches to be used in safety applications,  
and factory and process automation. The followings are the list of protocols and software features.  
Three User Interfaces  
-
Web browser  
-
-
Telnet Console  
Serial Console  
Dynamic Host Configuration Protocol (DHCP) Server/Relay/Client with Option 66/67/68  
Network Time Protocol (NTP) Server/Client  
Simplified Network Time Protocol (SNTP)  
IEEE 1588 Precision Clock Synchronization Protocol (PTP) V2 and Transparent Clock  
Port Mirror  
Quality of Service (QoS) Traffic Regulation  
Link Aggregation Control Protocol (LACP)  
Medium Access Control (MAC) Filter  
Generic Attribute Registration Protocol (GARP)/ GARP Multicast Registration Protocol (GMRP)/  
GARP VLAN Registration Protocol (GVRP)  
Internet Group Management Protocol (IGMP)  
Simple Network Management Protocol (SNMP) v1/v2/v3 (with MD5 Authentication and DES  
encryption)  
SNMP Inform  
Spanning Tree Protocol (STP) / Rapid Spanning Tree Protocol (RSTP)/ Multiple Spanning Tree  
Protocol (MSTP)/ Media Redundancy Protocol (MRP)  
Virtual Local Area Network (VLAN)  
IEEE 802.1x / Extensible Authentication Protocol (EAP) / Remote Authentication Dial-In  
User Service (RADIUS) / Terminal Access Controller Access-Control System (TACACS+)  
Ring  
-
Ethernet Ring Protection Switching (ERPS)  
iA-Ring  
-
-
-
-
Compatible-Ring  
Compatible-Chain  
U-Ring  
Link Layer Discovery Protocol (LLDP)  
Profinet  
Alarm System (with E-mail Notification or Relay Output)  
Modbus/TCP  
Ethernet/IP  
3
2 Configuring with a Web Browser  
Chapter 2 explains how to access the industrial managed switch for the first time. There are three ways  
to configure this Ethernet Switch:  
1. Web browser  
2. Telnet console  
3. Serial console  
The web browser and the telnet console methods allow users to access the switch over the Internet or  
the Ethernet LAN, while the serial console method requires a serial cable connection between the  
console and the switch. There are only a few differences among these three methods. Users are  
recommended to use the web browser method to configure the system because of its user-friendly  
interface.  
2.1 Web-based Management Basics  
Users can access the managed switch easily using their web browsers (Internet Explorer 8 or 11,  
Firefox 44, Chrome 48 or later versions are recommended). We will proceed to use a web browser to  
introduce the managed switch’s functions.  
2.1.1  
Default Settings  
Below is a list of default factory settings. This information will be used during the login process. Make  
sure that the computer accessing the switch has an IP address in the same subnet and the subnet  
mask is the same.  
IP Address: 10.0.50.1  
Subnet Mask: 255.255.0.0  
Default Gateway: 10.0.0.254  
User Name: NULL (leave it blank)  
Password: NULL (leave it blank)  
4
2.1.2  
Login Process and Main Window Interface  
Before users can access the configuration, they have to log in. This can simply be done in two steps.  
1.  
2.  
Launch a web browser.  
Type in the switch IP address (e.g. http://10.0.50.1), as shown in Figure 2.1).  
Note:  
When the user name and password is left empty, the login prompt will not show.  
Figure 2.1 IP Address for Web-based Setting  
After the login process, the main interface will show up, as shown in  
Figure 2.2. The main menu (left side of the screen) provides the links at the top level links of the menu  
hierarchy and by clicking each item allows lower level links to be displayed. Note that in this case the  
Port 5 is highlighted in green, indicating that the port is being connected. Detailed explanations of each  
subsection will be addressed later as necessary.  
Figure 2.2 Default Web Interface  
5
2.2 Basic Information  
To help users become familiar with the device, the Basic section provides important details of the switch.  
This is also the main welcome screen once the user has logged in. The details make it easier to identify  
different switches connected to the network. The Basic section is categorized into six subsections as  
shown in the left panel of Figure 2.3.  
Figure 2.3 Basic Information Dropdown Menu  
2.2.1  
Sys Info  
This subsection provides basic system information of Atop’s industrial managed switch. The user can  
check the model name, device description, MAC address, firmware version, image build information,  
memory usage of the switch, and current board’s temperature. Note that Atop’s firmware generally  
consists of application version and kernel version. Figure 2.4 depicts an example of Basic System  
Information of EHG7508-4PoE-4SFP. Table 2.1 summarizes the description of each basic information.  
6
Figure 2.4 Details of Sys Info Webpage  
Table 2.1 Descriptions of the Basic information  
Label  
Description  
The device’s complete model name  
Model name  
Device Description  
MAC address  
The model type of the device  
The MAC address of the device  
Application Version  
Kernel Version  
Image Build Info.  
The current application version of the device.  
The current kernel version of the device.  
Information about the firmware image such as date of creation  
Memory  
The current RAM’s availability and the size of cached and shared memory.  
The current temperature of the board inside the chassis in degree Celsius  
(a.k.a. Centigrade)  
Board Temperature  
2.2.2  
Dev Info Setting  
Users can assign device’s details to Atop’s switch in this subsection. By entering unique and relevant  
system information such as device name, device description, location, and contact, this information can  
help identify one specific switch among all other devices in the network that supports SNMP. Please  
click on the “Update” button to update the information on the switch. Figure 2.5 shows Device  
Information Setting page of an EHG7508 managed switch model. Table 2.2 summarizes the device  
information setting descriptions and corresponding default factory settings.  
7
Figure 2.5 Details of Device Information Settings Webpage  
Table 2.2 Descriptions of the System Settings  
Label  
Device Name  
Description  
Specifies a particular role or application of different  
switches. The name entered here will also be shown in  
Switch View and Device View applications such as  
Atop’s Device Management Utility.  
Max. 63 Characters.  
Factory Default  
(Model name)  
Device  
Description  
Location  
Detailed description of the unit.  
Max. 63 Characters.  
Location of the switch.  
Managed Switch  
+ (Model name)  
Switch Location  
Max. 63 Characters.  
Contact  
Provides contact information for maintenance. Enter www.atop.com.tw  
the name of whom to contact in case a problem occurs.  
Max. 63 Characters.  
2.2.3  
Console Setting  
In this chapter, we use a web browser for configuring the switch. For the serial console method, please  
go to Chapter 3 Configuring with Serial Console for more detail on how to connect console to the switch.  
The Console Setting here only shows the setting parameters of a serial console’s connection, which  
can be used by a console software such as Tera Term. Figure 2.6 below shows an example of the serial  
console’s connection parameters.  
Figure 2.6 Setting Parameters for the Console Method  
8
2.2.4  
Protocols Status  
Protocols Status subsection reports status of all protocols in the switch. While users can view status of  
all protocols at once in this webpage, the detailed explanation of each protocol and method will be  
provided in the following sections. Figure 2.7 shows the web interface for the Protocol Status page.  
Figure 2.7 Protocol Status Webpage  
9
2.2.5  
Power Status  
Atop’s managed switch features dual VDC power supply inputs. For Non-PoE models, 9-57VDC can  
be supplied to Power Input 1 (V1+ and V1- pins) and/or Power Input 2 (V2+ and V2- pins). For PoE  
models, 45-57VDC should be supplied under 802.3af mode and 51-57VDC should be supplied under  
802.3at mode. For instance, the EHG7508-4PoE-4SFP has the following three power ratings: 9-57VDC  
with a maximum current of 2.8 Amperes (No PoE mode), 45-57VDC with a maximum current of 1.7  
Amperes (802.3af mode), and 51-57VDC with a maximum current of 2.3 Amperes (802.3at mode).  
Figure 2.8 shows the status of each power input. A “Fault” status means that the power on that supply  
input is either not connected or the power is not supplied properly.  
Figure 2.8 Power Status Webpage  
2.2.6  
Temperature Log  
This subsection provides user and system temperature logs. There are summary statistics and  
distribution of temperature information for each log. The highest temperature, the lowest temperature  
and the average temperature are reported in degree Celsius. Additionally, there is a recorded time  
which shows the time since the temperature log were recorded. Under the summary statistics, there is  
a table showing the ranges of temperature, percentages of time in each range, and amount of time in  
each range. The user can reset the user statistics by clicking on the Reset button at the bottom of User  
Temperature Log. However, the system temperature log cannot be reset by the users. Note that the  
information is not automatically update. Information provided in this webpage will help the users to  
monitor the status of the industrial managed switch in harsh environment. The users have to click reload  
on the web browser to update for the latest statistics. Figure 2.9 shows the User Temperature Log box  
and Figure 2.10 shows the System Temperature Log box.  
Note that there is a sensor component in the industrial managed switch which can detect the inside  
temperature. The software inside the switch can read the sensor’s data and transform it into  
temperature in a unit of degree Celsius. Because the device is airtight, the inside temperature will be  
higher than the outside temperature around 20 degrees. For the industry level switches, the lowest  
operating temperature (outside) will be around -20 to -40 degrees Celsius and the highest operating  
temperature (outside) will be around 70 to 85 degrees Celsius.  
10  
Figure 2.9 User Temperature Log  
Figure 2.10 System Temperature Log  
11  
2.3 Administration  
In this section, users will be able to configure Password, IP Settings, IPv6 Setting, Ping, Ping6,  
Mirror Port, System Time, Modbus Setting, PTP, SSH, Telnet, and DIP Switch. Figure 2.11 shows  
the Administration section with the list of its subsections on the left of the screen.  
Figure 2.11 Administration Dropdown Menu  
2.3.1  
Password  
Although no password is set for the device when it is manufactured, users can set a password to assure  
overall system security. The user name and password can be updated in this page as shown in Figure  
2.12. Setting for a local authentication is introduced in this subsection, while setting for a remote  
authentication is described in later sections. The user name and password set here are applied to all  
types of access to Atop’s switch: web management user interface (UI), secure shell (SSH), and  
command line interface (CLI). Please click on the “Update” button to update the user name and  
12  
password information on the switch. Table 2.3 summarizes the description of each field.  
Figure 2.12 Password Setting Webpage  
Table 2.3 Descriptions of Password Setting  
Label  
User name  
Description  
Factory Default  
User’s Name.  
NULL  
Max. 15 characters.  
Password  
Password to log-in  
Max. 15 characters.  
Re-type the password. This has to be exactly  
the same as the password entered in the  
above field.  
NULL  
NULL  
Confirmed Password  
Max.15 characters.  
In addition to the local authentication, the switch can be configured to request for authentication through  
a centralized RADIUS or TACACS+ server when the local authentication fails. Figure 2.13 shows the  
setting parameters for authentication server while Table 2.4 summarizes the authentication server  
settings. For the RADIUS and TACACS+ comparison, please refer to Table 2.5 so that you can choose  
the solution that best suits your needs.  
Figure 2.13 Authentication Server Setting  
13  
Table 2.4 Authentication Server Settings  
Label  
Description  
Factory Default  
Authentication Server  
Enable / disable authentication through a  
remote authentication server  
Disabled  
Server Type  
Choose Authentication Server type: RADIUS  
or TACACS+. See notes below for a detailed  
explanation.  
RADIUS  
Server IP/Name  
Server Port  
IP address of the authentication server  
Communication port of the authentication  
server  
NULL  
1812  
Shared Key  
The key used to authenticate with the server.  
Max 15 characters.  
12345678  
NULL  
Confirmed Shared Key Re-type the shared key.  
Max 15 characters.  
Authentication Type  
Authentication mechanism. For RADIUS:  
RADIUS is MD5  
MD5. For TACACS+: ASCII, PAP, CHAP,  
MSCHAP.  
TACACS+ is ASCII  
Server Timeout (1~255 The time out period of waiting for a response  
5
sec)  
from the authentication server. This will  
affect the time that the next login prompt  
shows up in case that the server is not  
available.  
*NOTE:  
RADIUS (Remote Authentication Dial in User Service):  
RADIUS is an access server that uses authentication, authorization, and accounting (AAA)  
protocol for authentication and authorization. It is a distributed security system that secures remote  
access to networks and network services against unauthorized access. The RADIUS specification is  
described in RFC 2865, which obsoletes RFC 2138.  
TACACS+ (Terminal Access Controller Access-Control System Plus):  
TACACS+ is a security application that provides centralized validation of users attempting to  
gain access to a router or network access server. The TACACS+ specification is described in Cisco's  
TACACS+ RFC draft.  
Table 2.5 Comparison of Authentication Server Settings between RADIUS and TACACS+  
RADIUS  
UDP  
Separates AAA  
TACACS+  
TCP  
Combines authentication and  
authorization  
Yes, support AppleTalk Remote  
Access (ARA) and NetBIOS  
protocol  
Transport Protocol  
Authentication  
and Authorization  
Multiprotocol  
Support  
No  
Confidentiality  
Only password is encrypted  
Entire packet is encrypted  
14  
2.3.2  
IP Setting  
In this subsection, users may modify network settings for Internet Protocol version 4 (IPv4) of the switch,  
e.g., static IP address, subnet mask, gateway, primary domain name server (DNS), and secondary  
DNS. As shown in Figure 2.14, users can choose to enable Dynamic Host Configuration Protocol  
(DHCP) by checking the box to obtain an IP address automatically. That is the IP address and related  
information can be automatically obtained from a DHCP server thus reducing the work for an  
administrator. By disabling this function, the users have an option to set up the static IP address and  
related fields manually. Please click on the “Update” button to update the IP configuration on the switch.  
A system reboot is required after each update, so the new network settings can take effect. The user  
will need to manually update the new IP address in the URL field of the web browser if the IP address  
of the managed switch is change. The description of each field and its default value are summarized in  
Table 2.6.  
Figure 2.14 Webpage of IP Setting  
Table 2.6 Descriptions of IP Settings  
Label  
Description  
Factory Default  
DHCP  
By checking this box, an IP address and  
related fields will be automatically assigned.  
Otherwise, users can set up the static IP  
address and related fields manually.  
Display current IP address. Users can also  
set a new static IP address for the device.  
Display current Subnet Mask or set a new  
subnet mask.  
Uncheck  
Static IP Address  
Subnet Mask  
10.0.50.1  
255.255.0.0  
Gateway  
Primary DNS  
Show current Gateway or set a new one.  
Set the primary DNS IP address to be used  
by your network.  
10.0.0.254  
NULL  
Secondary DNS  
Set the secondary DNS IP address. The  
Ethernet switch will locate the secondary  
DNS server if it fails to connect to the Primary  
DNS Server.  
NULL  
15  
2.3.3  
IPv6 Setting[P1]  
This subsection enables Atop’s switch to operate in Internet Protocol version 6 (IPv6) network. The  
users have options to enable Autoconfig, DHCPv6, or Manual setting as shown in Figure 2.15. Note  
that in IPv6 network, there are three types of auto configuration: stateless, stateful, and a combination  
of both. The “Autoconfig” option here is the stateless configuration, while the “DHCPv6” option is the  
stateful configuration. If the users check both the Autoconfig and the DHCPv6 options, the switch will  
use the combination of stateless and stateful configuration. When selecting the “Manual” option, the  
users will have to enter the Global Unicast Address, Prefix Length, and Gateway. The Manual DNS  
option also requires the users to fill in the Primary DNS and Secondary DNS addresses. The lower  
portion of the page summarizes the current IPv6 address information of the switch which are the Global  
Unicast Address, Link-Local Address, Gateway, Primary DNS, and Secondary DNS. Table 2.7 explains  
each field in the IPv6 setting webpage.  
Figure 2.15 Webpage of IPv6 Setting  
Table 2.7 Description of IPv6 Setting  
Label  
Description  
Factory Default  
Autoconfig  
By checking this box, all IPv6 setting will be  
automatically configured for the users. This  
option is based on the stateless  
autoconfiguration in which the switch uses  
Uncheck  
information  
in  
router  
advertisement  
messages to configure an IPv6 address. The  
16  
address will be a concatenation of first 64 bits  
from the router advertisement source  
address with the Extended Unique Identifier  
(EUI-64).  
DHCPv6  
Manual  
By checking this box, an IPv6 address and  
related fields will be automatically assigned  
from a DHCPv6 server in the network. This is  
a stateful auto configuration in which the  
switch will generate a DHCP solicit message  
to the ALL-DHCP-Agents multicast address  
to find DHCPv6 server. Otherwise, users can  
set up the IPv6 address manually.  
By checking this box, users must provide  
Global Unicast Address, Prefix Length, and  
Gateway address in the following fields. Note  
that when this option is checked, the next  
three fields will become active for setting.  
Set an IPv6 address that is routable across  
the Internet and its three high-level bits are  
001. The IPv6 address is in the format  
2XXX::/3.  
Uncheck  
Uncheck  
Global Unicast  
Address  
NULL  
NULL  
Prefix Length  
Set a prefix length for the IPv6 address in  
previous field.  
Gateway  
Manual DNS  
Set the IPv6 address of an IPv6 Gateway  
By checking this box, user must manually  
provide Primary and Secondary DNS  
addresses for IPv6. Note that when this  
option is checked, the next two fields will  
become active for setting.  
NULL  
Uncheck  
Primary DNS  
Set the primary DNS IPv6 address to be used  
by your network.  
Set the secondary DNS IPv6 address. The  
Ethernet switch will locate the secondary  
DNS server if it fails to connect to the Primary  
DNS Server.  
NULL  
NULL  
Secondary DNS  
2.3.4  
Ping  
Atop’s managed switch provides a network tool called Ping for testing network connectivity in this  
subsection. Ping is a network diagnostic utility for testing reachability between a destination device and  
the managed switch. Note that this utility is only for IPv4 address. The Ping utility for IPv6 will be  
provided in the next subsection. Figure 2.16 shows the user interface for using the Ping command.  
Figure 2.16 Ping Webpage  
Users can enter an IP address or a domain name into the field to verify network connectivity as shown  
in Figure 2.17. After entering the IP address/name, please click “Ping” button to run the ping function.  
17  
Example of successful ping result is shown in Figure 2.18 while a failure ping result is depicted in Figure  
2.19.  
Figure 2.17 Example of Ping Command  
Figure 2.18 Example of successful ping command result  
Figure 2.19 Example of unsuccessful ping command result  
*Note:  
If users enter a domain name instead of an IP address, they should assign a DNS first. This can be  
done through Administration > IP Setting as shown in Section 2.3.2.  
2.3.5  
Ping6[P2]  
Ping6 is a corresponding network diagnostic utility for testing reachability between a destination device  
and the managed switch in IPv6 network. Figure 2.20 shows the user interface for using the Ping  
command.  
Figure 2.20 Ping6 Webpage  
18  
Users can enter an IPv6 address into the field to verify network connectivity. After entering the IPv6  
address, please click “Ping6” button to start the ping function. Examples of successful ping6 results are  
shown in Figure 2.21.  
Figure 2.21 Example of Successful Ping6 Result  
2.3.6  
Mirror Port  
In order to help the network administrator keeps track of network activities, the managed switch  
supports port mirroring, which allows incoming and/or outgoing traffic to be monitored by a single port  
that is defined as a mirror port. Note that the mirrored network traffic can be analyzed by a network  
analyzer or a sniffer for network performance or security monitoring purposes. Figure 2.22 shows the  
Mirror Port webpage. The descriptions of port mirroring options are summarized in Table 2.8.  
Figure 2.22 Mirror Port Webpage  
*Note:  
Overflow will occur if the total throughput of the monitoring ports exceeds what the mirror port can  
support.  
Table 2.8 Description of Port Mirroring Options  
Label  
Description  
Factory Default  
Monitored direction  
Select the monitoring direction.  
Disabled  
- Disable: To disable port monitoring.  
- Input data stream: To monitor input data  
stream of monitored ports only  
- Output data stream: To monitor output  
data stream of monitored ports only  
- Input/Output data stream: To monitor  
both input and output data stream of  
monitored ports  
Monitored Port  
Select the ports that will be monitored  
Unchecked all  
19  
Select the mirror port that will be used to  
monitor the activity of the monitored ports  
Port1  
Mirror-to-port  
2.3.7  
System Time  
Atop’s industrial managed switch has internal calendar (date) and clock (or system time) which can be  
set manually or automatically. Figure 2.23 shows the System Time and SNTP webpage. The users  
have options to configure Current Date and Current Time manually. There is a drop-down list of Time  
Zone which can be selected for the local time zone. If the switch is deployed in a region where daylight  
saving time is practiced (see note below for explanation), please check the Enable option for Daylight  
Saving Time. Then, the users will have to enter the Start Date, End Date, and Offset in hour(s).  
Figure 2.23 Webpage for Setting System Time and SNTP  
For automatically date and time setting, the users can enable Simple Network Time Protocol (SNTP)  
by checking the Enable SNTP option (see note below for explanation). Then, the users must enter the  
NTP Server 1 and NTP Server 2 which will be used as the reference servers to synchronize date and  
time to. The users can specify the Time Server Query Period for synchronization which is in the order  
of seconds. The value for this period will depend on how much clock accuracy the users want the switch  
to be. Finally, the managed switch can become a network time protocol server for the local devices by  
checking the box behind the Enable NTP Server option. Description of each option is provided in Table  
2.9.  
Table 2.9 Descriptions of the System Time and the SNTP  
Label  
Current Date  
Current Time  
Time Zone  
Daylight  
Description  
Factory Default  
None  
None  
(GMT+08:00) Taipei  
Unchecked  
Allows local date configuration in yyyy/mm/dd format  
Allows local time configuration in local 24-hour format  
The user’s current local time  
Enable or disable Daylight Saving Time function  
20  
Saving Time  
Start Date  
End Date  
Define the start date of daylight saving  
Define the end date of daylight saving  
NULL  
NULL  
0
Decide  
how  
many  
hours  
to  
be  
shifted  
Offset  
forward/backward when daylight saving time begins  
and ends. See note below.  
Enable SNTP  
NTP Server 1  
Enables SNTP function. See note below.  
Unchecked  
time.nist.gov  
time-A.timefreq  
.bldrdoc.gov  
Sets the first IP or Domain address of NTP Server.  
Sets the second IP or Domain address of NTP Server.  
Switch will locate the 2nd NTP Server if the 1st NTP  
Server fails to connect.  
NTP Server 2  
This parameter determines how frequently the time is  
updated from the NTP server. If the end devices  
259,200 seconds.  
Time  
Server require less accuracy, longer query time is more  
Query Period  
suitable since it will cause less load to the switch. The  
setting value can be in between 60 – 259200 (72  
hours) seconds.  
This option will enable network time protocol (NTP)  
Unchecked  
Enable  
Server  
NTP daemon inside the managed switch which allows other  
devices in the network to synchronize their clock with  
this managed switch using NTP.  
Note:  
- Daylight Saving Time: In certain regions (e.g. US), local time is adjusted during the summer season  
in order to provide an extra hour of daylight in the afternoon, and one hour is usually shifted forward or  
backward.  
- SNTP: Simple Network Time Protocol is used to synchronize the computer systems’ clocks with a  
standard NTP server. Examples of two NTP servers are time.nist.gov and time-A.timefreq  
.bldrdoc.gov.  
2.3.8  
Modbus Setting  
Atop’s managed switch can be connected to a Modbus network using Modbus TCP/IP protocol which  
is an industrial network protocol for controlling automation equipment. The managed switch’s status  
and settings can be read and written through Modbus TCP/IP protocol which operates similar to a  
Management Information Base (MIB) browser. The managed switch will be a Modbus slave which can  
be remotely configured by a Modbus master. The Modbus slave address must be set to match the  
setting inside the Modbus master. In order to access the managed switch, a Modbus Address must  
be assigned as described in this subsection. A Modbus memory mapping table, which lists all the  
register’s addresses inside the managed switch and their descriptions, is provide in Appendix B:  
Modbus Memory Map. Figure 2.24 shows the Modbus Setting webpage.  
Figure 2.24 Webpage for Setting the Modbus Address  
21  
Figure 2.24 shows the webpage that users can set up the Modbus ID address. Users can use Modbus  
TCP/IP compatible applications such as Modbus Poll to configure the switch. Note that Modbus Poll  
can be download from http://www.modbustools.com/download.html. The Modbus Poll 64-bit version  
7.0.0, Build 1027 was used in this document. Atop does not provide this software to the users. Tutorial  
of Modbus read and write examples are illustrated below.  
Note: The switch only supports Modbus function code 03, 04 (for Read) and 06 (for Write).  
Read Registers (This example show how to read the switch’s IP address.)  
Figure 2.25 Mapping Table of Modbus Address for Switch’s IP Address  
1. Make sure that a supervising computer (Modbus Master) is connected to your target switch  
(Modbus Slave) over Ethernet network.  
2. Launch Modbus Poll in the supervising computer. Note a registration key may be required for  
a long term use of Modbus Poll after 30-day evaluation period. Additionally, there is a 10-minute  
trial limitation for the connection to the managed switch.  
3. Click Connect button on the top toolbar to enter Connection Setup dialog by selecting  
Connect… menu as shown in Figure 2.26.  
22  
Figure 2.26 Entering Connection Setup Menu of the Modbus Poll  
4. Select Modbus TCP/IP as the Connection mode and enter the switch’s IP address inside the  
Remote Modbus Server’s IP Address or Node Name field at the bottom as shown in Figure  
2.27. The Port number should be set to 502. Then click OK button.  
Figure 2.27 Modbus Poll Connection Setup  
5. On the window Mbpoll1, select multiple cells from row 0 to row 2 by clicking on cells in second  
column of row 0 and row 2 while holding the shift key as shown in Figure 2.28.  
Figure 2.28 Mulitple Cell Section in Modbus Poll  
23  
6. Set Display mode of the selected cells in previous step to HEX (hexadecimal) by selecting  
Display pull-down menu and choosing the Hex as shown in Figure 2.29.  
Figure 2.29 Set Display Mode to Hex in Modbus Poll  
7. Click on the Setup pull-down menu and choose Read/Write Definition… as shown in Figure  
2.30.  
Figure 2.30 Modbus Poll Setup Read/Write Definition  
24  
8. Enter the Slave ID in the Modbus Poll function as shown in Figure 2.31, which should match  
the Modbus Address = 1 entered in Figure 2.24 in Section 2.3.8 (Modbus Setting).  
Figure 2.31 Slave ID in the Modbus Poll Function is set to 1  
9. Select Function 03 or 04 because the managed switch supports function code 03 and 04 as  
shown in Figure 2.32.  
Figure 2.32 Set Code 03 in the Modbus Poll Function  
25  
10. Set starting Address to 81 and Quantity to 2 as shown in Figure 2.33.  
Figure 2.33 Setup Starting Address and Quantity in Modbus Poll  
11. Click OK button to read the IP address of the switch.  
Figure 2.34 Modbus Memory Address 81 and 82 are the location of EHG7508's IP Address  
12. Modbus Poll will get the values 0x0A, 0x00, 0x32, 0x01, which means that the switch’s IP is  
10.0.50.1 as shown in Figure 2.34.  
26  
Write Registers (This example shows how to clear the switch’s Port Count (Statistics).)  
Figure 2.35 Mapping Table of Modbus Address for Clearing Port Statistics  
1. Check the switch’s Port TX/RX counts in Port Statistics page (described in Section 2.5.4) as  
shown in Figure 2.36.  
Figure 2.36 Port Count in Port Statistics Webpage  
2. Click function 06 on the toolbar as shown in Figure 2.37.  
Figure 2.37 Click on Function 06 in the Modbus Poll  
27  
3. Set Address to 256 and Value (HEX) to 1 as shown in Figure 2.38, then click “Send” button.  
Figure 2.38 Use Modbus Poll to Clear Switch's Port Count  
4. Check Port Statistics (described in Section 2.5.4) in the managed switch’s Web UI as shown  
in Figure 2.39. The packet count is now cleared.  
Figure 2.39 Cleared Port Statistics  
28  
2.3.9  
PTP  
The Precision Time Protocol (PTP) is a high-precision time protocol. It can be used with measurement  
and control systems in local area network that require precise time synchronization. This menu is  
divided into two submenus: PTP Setting and H/W PTP as shown in Figure 2.40.  
Figure 2.40 PTP's Submenu  
2.3.9.1 PTP Setting  
The PTP can be set in this PTP Setting webpage Figure 2.41 shows the PTP Configuration webpage  
in which the user can configure PTP and check its status. The lower part of Figure 2.41 allows the users  
to enable or disable the PTP function per port and check their current status.  
To enable PTP on the managed switch, please check the Enabled box behind the State option as  
shown in Figure 2.41. Note that the PTP will not be enabled per port if this State option is not checked.  
Please see description of PTP configuration in Table 2.10 and description of PTP port information in  
Table 2.11. Note that after setting the desired PTP options, please click Update button to allow the new  
configuration to take effect.  
29  
Figure 2.41 PTP Setting Webpage, example taken from EH75XX series  
30  
Table 2.10 Description of PTP Setting  
Label  
Description  
Factory Default  
Enabled/Disable the PTP function. This is the main option  
that needs to be enabled so that the port’s PTP function  
will work according to other parameters defined in this  
table (Table 2.10).  
Unchecked  
State  
Set the PTP operation version. Note that v1 (IEEE 1588-  
2002) and v2 (IEEE 1588-2008) are supported.  
Select clock type of the PTP (Precision Time Protocol).  
The switch has four modes: End-End Boundary Clock,  
End-End Transparent Clock (TC), Peer-Peer Boundary  
Clock, and Peer-Peer Transparent Clock (TC).  
Select Ethernet (layer 2) multicast transport or layer 3  
(UDP/IPv4) multicast transports for PTP (Precision Time  
Protocol) messages.  
1
Version  
Clock Mode  
End-to-End  
IPV4  
1
Transport  
Set the interval of the sync packet transmitted time. Small  
Sync Interval interval causes too frequent sync, which will cause more  
load to the device and network.  
Set the Clock Stratum value. The lower values take  
precedence to be selected as the master clock in the best  
master clock algorithm (BMCA).  
3
Clock  
Stratum  
Clock Class represents clock’s accuracy level. It is an  
attribute of an ordinary or boundary clock. It denotes time  
248  
Clock Class  
traceability or frequency distributed by the grandmaster  
clock. Please refer to IEEE 1588-2008, Table 5 for  
definitions, allowed values, and interpretation.  
Set the clock priority 1 (PTP version 2). The lower values  
take precedence to be selected as the master clock in the  
best master clock algorithm, 0 = highest priority, 255 =  
lowest priority.  
Set the clock priority 2 (PTP version 2). The lower values  
take precedence to be selected as the master clock in the  
best master clock algorithm (BMCA), 0 = highest priority,  
255 = lowest priority.  
128  
128  
priority 1  
priority 2  
UTC Offset  
Offset to  
Master  
Coordinated Universal Time (UTC) offset value  
0
None  
The offset time to the master clock  
Grandmaster  
UUID  
Parent UUID  
Clock  
Identifier  
None  
The Grandmaster UUID for PTP version 1  
The parent master UUID for PTP version 1  
The clock identifier for PTP version 1  
None  
None  
Note: The Best Master Clock Algorithm (BMCA) is a key to the resiliency of the Precision Time Protocol  
(PTP). In a time synchronized network, there usually is a Grandmaster clock who synchronizes its clock  
with the UTC accurate clock from Global Positioning System (GPS). If a Grandmaster clock loses its  
GPS synchronization or gets disconnected due to a network fault or for other unknown reasons, the  
BMCA will allows another clock to automatically take over the duties of the Grandmaster clock and  
continue as a new Grandmaster.  
Table 2.11 Description of PTP Port Setting  
Label  
Description  
Factory Default  
Port  
Port number  
-
This is the port’s mode information which indicates  
whether the port’s PTP function is enabled or disabled.  
This is PTP’s per port operation status. If the per port  
Enabled  
Enabled  
Status  
Disabled  
31  
function is enabled, but the status is still disabled, please  
enable the PTP master option (State option in Table  
2.10).  
Mode  
Enabled/Disabled PTP per port function  
Disabled  
2.3.9.2 H/W PTP Setting  
This subsection allows the user to enable the hardware Transparent Clock (TC). The TC can correct  
variable switch latency. This can be done by measuring the time that a PTP event message has spent  
in the switch called residence time. The residence time is reported to the receiver by the PTP event  
message itself. For this purpose, a new message field has been added called Correction Field which is  
a type of time interval that can be used to accumulate residence time along the path (possibly after  
multiple switches) of the message. To enable the hardware transparent clock, check the box behind  
H/W TC Enabled and then click on the Update button as shown in Figure 2.42.  
Figure 2.42 H/W PTP Setting  
2.3.10 SSH  
The managed switch can be managed using command line interface (CLI) as described in Chapter 4.  
The users have option to remotely connect to the managed switch using either secure shell (SSH) or  
Telnet through any of its port. In this subsection, SSH will be introduced and then Telnet will be  
discussed in the next subsection. SSH was designed to replace Telnet and other insecure remote shell  
protocols that sends data or command in plaintext. SSH uses encryption to secure its data or command  
over an unsecure network.  
To enable the SSH, please check the Enabled box behind the SSH option in Figure 2.43. At the  
beginning, the Server will send a public key to a Client, and the Client will check if the received public  
key is correct. If it is not correct, the Server will refuse the connection. Please click “Generate” button  
to change and regenerate the Server Key then obtain another public key from Server as shown in Figure  
2.43.  
32  
Figure 2.43 SSH Setting Webpage  
Note:  
1. The managed switch supports both SSH version 1 (SSH1) and SSH version 2 (SSH2).  
2. The server key is re-generated when the managed switch is reset to its factory default setting  
or a received key is non-existent.  
SSH version 1 and SSH version 2 share the following features:  
1. Client programs that use SSH can perform remote logins, remote command execution, and  
secure file copying across a network.  
2. Several selectable encryption algorithms and authentication mechanisms are supported by  
the SSH.  
3. An SSH agent can cache keys for easy access in later session.  
A number of new features are added to SSH version 2 for a stronger and more comprehensive product.  
These features include:  
1. Encryption ciphers, such as Triple Data Encryption Standard (3DES) and Advanced  
Encryption Standard (AES).  
2. The use of sound cryptographic Message Authentication Code (MAC) algorithms for integrity  
checking. Examples of secure hash (functions) algorithms which are MAC algorithms in SSH  
version 2 are the Message Digest algorithm 5 (MD5) and Secure Hash Algorithm 1 (SHA-1).  
3. Support for public key certificates.  
2.3.11 Telnet  
This subsection allows the users to set the Telnet option for the managed switch. The command line  
interface (CLI) configuration using Telnet (as described in Chapter 4) or SSH (previous section) are the  
same except that the SSH encrypts the communication data. For the Telnet administration, the  
managed switch only provides the enable or disable function selectable in this webpage. The default  
setting for Telnet is enabled. Clicking on the Update button when you change the option to update it on  
33  
the managed switch. Figure 2.44 shows the Telnet setting webpage. Note that the users are  
recommended to use SSH instead of Telnet for higher security protection of your managed switch.  
Figure 2.44 Telnet Setting Webpage  
2.3.12 DIP Switch  
This subsection reports the status of the DIP switch on the top of managed switch’s housing. Figure  
2.45 shows the DIP switch webpage. The bottom portion allows the users to enable or disable the  
physical control of the DIP Switch by checking on the DIP Switch Control option. This is another easy  
and convenient way to configure ERPS or iA-ring or Compatible-Ring using the DIP Switches instead  
of modifying configuration on a web browser. After checking or unchecking the option, please click  
Update button to allow the setting to take effect on the managed switch.  
Figure 2.45 DIP Switch Status Webpage  
34  
2.4 Forwarding  
There are many network technologies for forwarding packets over network. In this industrial managed  
switch, three main technologies are implemented: QoS, rate control, and storm control. Figure 2.46  
depicts the submenus under the Forwarding section.  
Figure 2.46 Forwarding Dropdown Menu  
2.4.1  
QoS  
Quality of Service (QoS) is the ability to provide different priority to different applications, users, or data  
flows. QoS guarantees a certain level of performance to a data flow by using the following metrics:  
transmitted bit rate, bit error rate, delay, jitter, and probability of packet dropping. QoS guarantees are  
important if the network capacity is insufficient, especially for application that requires certain bit rate  
and is delay sensitive. For any network that is best effort, QoS cannot be guaranteed, except that  
resource is more than sufficient to serve users.  
Controlling network traffic needs a set of rules to help classify different types of traffic and define how  
each of them should be treated as they’re being transmitted. This managed switch can inspect both  
802.1p Class of Service (CoS) tags and DiffServ tags called Differentiated Services Code Point (DSCP)  
to provide consistent classification.  
In the QoS section, three QoS mechanisms are included: queuing methods or packet scheduling  
disciplines in Setting section, CoS Queuing Mapping section, and DSCP Mapping section, as shown  
in Figure 2.47. Table 2.12 summarizes the descriptions of QoS Setting.  
35  
Figure 2.47 QoS Dropdown Menu  
Table 2.12 Descriptions of QoS Setting  
Label  
Description  
Factory Default  
Queuing Methods (packet scheduling disciplines)  
includes Strict Priority, Weighted Round-Robin, and  
Deficit Round Robin  
Setting  
Strict Priority  
See notes in the following subsection for detailed  
descriptions and comparison.  
CoS Queuing Mapping and DSCP Mapping  
For 802.1p CoS only, switch only checks Layer 2 (L2)  
802.1p CoS priority bits. For DiffServ, switch checks  
DiffServ Code Point (DSCP). See notes below for a  
detailed description.  
Header  
Mapping  
Both 802.1p CoS  
and DiffServ  
2.4.1.1 QoS Setting  
Three types of queuing methods are configurable in this managed switch: Strict Priority, Weighted  
Round-Robin, and Deficit Round-Robin.  
In Strict Priority, the QoS scheduler allows the highest priority queue to preempt other queues as long  
as there are still packets waiting to be transmitted in the highest priority queue. This mode guarantees  
that traffic in the highest queue is always transmitted first. Only if the high priority queues are empty,  
the lower priority queues can be transmitted. Queue 0 (Q0) to Queue 7 (Q7) are ranked from the lowest  
priority queue to the highest priority queue. Therefore, packets in Q7 will be all transmitted first before  
packets in Q6, and packets in Q6 will all be sent first before packets in Q5, and so on in this order.  
36  
Weighted Round Robin (WRR) is the simplest approximation of generalized processor sharing (GPS).  
In WRR, each packet flow or connection has its own packet queue in a network interface controller. It  
ensures that all service classes have access to at least some configured amount of network bandwidth  
to avoid bandwidth starvation. But WRR has a limitation, as it is unfair with variable length packets. It  
only provides the correct percentage of bandwidth to each service class only if all of the packets in all  
the queues are the same size or when the mean packet size is known in advance. Usually, a weight of  
each queue is set proportion to requested bit rate. Each queue is served proportionally to its weight for  
a service cycle.  
Deficit WRR (DWRR) addressed the limitation of WRR on unfairness over variable size. Each queue  
is configured with a weight, a deficit counter (total number of bytes that the queue is permitted to transmit  
each time visited by the scheduler), and a quantum of service (bytes). DWRR scans all non-empty  
queues in sequence. When a non-empty queue is selected, its deficit counter is incremented by its  
quantum value. Then, the value of the deficit counter is the maximal amount of bytes that can be sent  
at this turn. If the deficit counter is greater than the packets size at the head of the queue, this packet  
can be sent and the value of the counter is decremented by the packet size. Then the size of the next  
packets is compared to the counter value. Once the queue is empty or the value of the counter is  
insufficient, the scheduler will skip to the next queue. If the queue is empty, the value of the deficit  
counter is reset to 0. If the packet size is too small, the scheduler has to visit queues too many times  
before serving a queue. But if the packet size is too large, some short term unfairness may arise. It is  
fair only over a time scale longer than a round time. At the shorter time scale, some flows may get more  
service. Small packet size or high transmission speed reduce the round time.  
Figure 2.48 depicts the QoS Setting webpage. By default, the QoS in the managed switch works under  
the Strict Priority mode. For Weighted Round Robin, packet weights of Q0 to Q7 are set in term of  
packet as followings.  
-
-
-
-
-
-
-
-
COS Q0 = 2 packets  
COS Q1 = 1 packet  
COS Q2 = 4 packets  
COS Q3 = 8 packets  
COS Q4 =16 packets  
COS Q5 = 32 packets  
COS Q6 = 64 packet  
COS Q7 = 127 packets  
Weight of Deficit Round Robin is double the number of packets of WRR, but it is in term of Kbytes  
instead as shown in the last column of Figure 2.48.  
37  
Figure 2.48 QoS Setting Webpage  
At the bottom of the QoS Setting webpage in Figure 2.48, the users can select the packet classification  
scheme that will be used by the managed switch. There are two classification types to choose from the  
drop-down list: 802.1p CoS only or Both 802.1p CoS and DiffServ. The default classification type is  
802.1p CoS only. Note that after changing the schedule discipline, setting the desired weights if any  
for the WRR or DWRR, or selecting the classification type, please click on the Update button to enable  
them on the switch.  
2.4.1.2 CoS Queue Mapping  
802.1p CoS is the QoS technique developed by the IEEE P802.1p working group, known as Class of  
Service (CoS) mechanism at Media Access Control (MAC) level. It is a 3-bit field called the priority code  
point (PCP) within an Ethernet frame header (Layer 2) when using VLAN tagged frames as defined by  
IEEE 802.1Q. It specifies a priority value between 0 and 7 that can be used by QoS to differentiate  
traffic. When this option is enabled, the switch inspects the 802.1p CoS tag in the MAC frame to  
determine the priority of each frame.  
The switch can classify traffic based on a valid 802.1p (CoS – Class of Service) priority tag. These  
options allow users to map Priority Code Point (PCP) within an Ethernet frame header to different CoS  
priority queues as shown in Figure 2.49. The user can choose the desired CoS Priority Queue from the  
drop-down list from Q1 to Q7 for each PCP value. Descriptions of priority queue in CoS Queue Mapping  
page are summarized in Table 2.13.  
38  
Figure 2.49 Mapping Table of CoS Webpage  
Table 2.13 Priority queue descriptions  
Label Description  
PCP  
Factory Default  
Priority Code Point within the Ethernet PCP 0 -> Q0  
frame header. PCP 0 is the lowest priority PCP 1 -> Q0  
and 7 is the highest priority.  
PCP 2 -> Q1  
PCP 3 -> Q1  
PCP 4 -> Q2  
PCP 5 -> Q2  
PCP 6 -> Q3  
PCP 7 -> Q3  
CoS Priority The priority queue that a specific Ethernet  
Queue  
frame needs to be assigned into.  
2.4.1.3 DSCP Mapping  
DiffServ/ToS stands for Differentiated Services/Type of Services. It’s a networking architecture that  
specifies a simple but scalable mechanism for classifying network traffic and providing QoS guarantees  
on networks. DiffServ uses a 6-bit Differentiated Service Code Point (DSCP) in the 8-bit differentiated  
services field (DS field) in the IP header for packet classification purposes. The DS field and ECN field  
replace the outdated IPv4 TOS field in IPv4 to make per-hop behavior decisions about packet  
classification and traffic conditioning functions, such as metering, marking, shaping, and policing.  
The RFCs (Request for Comments) do not dictate the way to implement Per-Hop Behaviors (PHBs).  
Atop implements queuing techniques that can base their PHB on the IP precedence or DSCP value in  
the IP header of a packet. Based on DSCP or IP precedence, traffic can be put into a particular service  
class. Packets within a service class are treated the same way.  
DiffServ allows compatibility with legacy routers, which only supports IP Precedence, since it uses the  
DiffServ Code Point (DSCP), which is the combination of IP precedence and Type of Service fields.  
39  
TOS (Type of Service) of the switch can be configured with the default queue weights as shown in  
Figure 2.50. Note that the TOS consists of DSCP (Differentiated Service Code Point (6 bits)) and ECN  
(Explicit Congestion Notification (2 bits)). The users can assign TOS values (DSCP) to predefined  
queue types (Priority) manually using DSCP Mapping web page in Figure 2.50. The priority number  
can be between 0 to 7 where the number 7 is the highest priority and 0 is the lowest priority. After  
assigning any new priority to a DSCP, please click the Update button at the bottom of the page to allow  
the new mapping to take effect.  
Figure 2.50 Mapping Table of DSCP and ECN Webpage  
2.4.2  
Rate Control  
The users have options to set the Rate Control for each port on the managed switch as shown in Figure  
2.51. The rate control mechanism will set a limit or maximum data rate which the port can transmit.  
Moreover, the rate control can be imposed on both directions: the incoming traffic (Ingress) and the  
outgoing traffic (Egress). However, there are some restrictions on the values that can be set on these  
two rate control parameters. Here is the summary of the rules for Rate Control settings:  
The outgoing (Egress) and incoming (Ingress) values have to be set between 0 and 102,400  
(for 100 Mbps) or 1,024,000 (for 1000 Mbps).  
The value 0 is set to turn off the rate control mechanism.  
The values have to be integer and multiple of 64 when the transmission rate is less than 1,792  
40  
Kbps. For example: 64 Kbps, 128 Kbps, 512 Kbps, and 1,792 Kbps.  
The values have to be integer and multiple of 1,024 when the transmission rate is between  
1,792 Kbps and 102,400 Kbps (for 100Mbps) or 106,496 Kbps (for 1000M). Ex: 2,048Kbps,  
3,072 Kbps… 102,400Kbps.  
The values have to be integer and multiple of 8,192 when the transmission rate is greater than  
106,496 Kbps.  
Figure 2.51 Rate Control Webpage  
Table 2.14 provides descriptions of rate control setting. Note that after configuring the rate control in  
each port, please click on the Update button to enable it on the switch.  
Table 2.14 Descriptions of Rate Control Setting  
Label  
Description  
Factory Default  
Port  
Port number on the managed switch.  
Sets limits on its transmission rates for the  
incoming (Ingress) traffic. Note that the unit is in  
kilo-bits per second (Kbps).  
Sets limits on its transmission rates for the  
outgoing (Egress) traffic. Note that the unit is in  
kilo-bits per second (Kbps).  
-
Ingress  
0 (Disabled)  
0 (Disabled)  
Rate  
Control  
(Kbps)  
Egress  
41  
2.4.3  
Strom Control  
This subsection provides the storm control or storm filter features of the managed switch. Storm control  
prevents traffic on a LAN from being disrupted by ingress traffic of broadcast, multicast, and destination  
lookup failure (DLF) on a port. Figure 2.52 depicts the Strom Control webpage. The users can impose  
the same limiting parameters on all ports at the same time by clicking on the box in front of the all line  
and set the storm control data rate under each limiting columns (DLF, Multicast, Broadcast). The storm  
control limiting can also be independently control on each port. Note that the limiting value of 0 means  
that the storm control is disable and the value must be in multiples of 64kbps. Additional ingress storm  
traffic will be dropped after the limit has reached.  
Figure 2.52 Strom Control Webpage  
Table 2.15 summarizes the descriptions of storm control.Error! Reference source not found. Table  
2.16 summarizes the descriptions of limiting parameters for storm control.  
Table 2.15 Descriptions of Strom Control  
Label  
Description  
Factory Default  
Uncheck and  
Disable  
Enable or Disable the storm control or filter on all ports at  
the same time. The limiting data rate for each type of  
storm packets (DLF, Multicast, and Broadcast) can be  
controlled by changing the number under each column.  
Note that the value must be in multiples of 64kbps.  
Set the limiting data rate of storm packets that can be  
controlled for each Port, which are DLF, Multicast, and  
All  
Disable  
Port1 - Port8 Broadcast. Note that the value must be in multiples of  
64kbps. See notes below for the detailed description and  
comparison.  
42  
Table 2.16 Descriptions of Limiting Parameters  
Label  
Description  
DLF limiting (0~9876480) Kb  
Multicast limiting (0~9876480) Kb  
Broadcast limiting (0~9876480) Kb  
Factory Default  
0 (Disable)  
DLF limiting (Destination Lookup Failure)  
Multicast limiting  
0 (Disable)  
0 (Disable)  
Broadcast limiting  
Type of Storm Packets:  
-
DLF: Destination Lookup Failure. The switch will always look for a destination MAC address in its  
MAC Table first. In case that a MAC address cannot be found in the Table, which means DLF  
occurs, the switch will forward the packets to all ports that are in the same LAN.  
-
Multicast: This type of transmission sends messages from one host to multiple hosts. Only those  
hosts that belong to a specific multicast group will receive it. Network devices that support multicast  
send only one copy of the information across the network until the delivery path that reaches group  
members diverges. At these diverging points, multicast packets will be copied and forwarded. This  
method helps reducing high traffic volumes due to large number of destinations, using network  
bandwidth efficiently.  
-
Broadcast: Messages are sent to all devices in the network.  
43  
2.5 Port  
Atop’s industrial managed switch provides full control on all of its network interfaces. In this section, the  
users can enable or disable each port and set preferred physical layer mode such as copper or fiber.  
Moreover, the users will be able to configure negotiation mechanism, data rate (speed), duplexing, and  
flow control for each port. All port’s status and statistics can be viewed in this section. Figure 2.53  
illustrates the Port webpage. The Port section is subdivided into four subsections which are:  
Port Setting  
Port Status  
Mini-GBIC Port Status  
Port Statistics  
Figure 2.53 Port Dropdown Menu  
2.5.1  
Port Setting  
Port Setting webpage is shown in Figure 2.54. The users can control the state of each port by checking  
on the corresponding Enable box. The possible physical layer connections of each port are listed on  
the Mode column. In some of Atop’s managed switches (EH75xx Series), the users can then select one  
of the physical media to be a preferred mode of operation. For instance, a gigabit Ethernet port (PortG1)  
can support either copper or fiber physical layer connections. The users can click on the radio button  
behind the Fiber option to set the fiber optical mode as its preferred physical medium connection. Note  
that when both modes are selected, this means that the port is a combo port. However, the example in  
44  
Figure 2.54 is based on EHG7508-4PoE-4SFP which does not have a combo port and cannot select  
preferred mode of operation.  
Figure 2.54 Port Setting Webpage  
Next on the fourth column of Figure 2.54, the users can select from the dropdown list the port’s  
Negotiation mechanism which can be either Auto or Force. When selecting the Force negotiation, the  
port’s speed and duplexing will be locked to the settings configured by the users. On the other hand,  
the Auto negotiation will allow the switch to determine the actual speed and duplexing for that port.  
Note that the Gigabit Small Form-factor Pluggable (SFP) Port of the EH Series switch is downward  
compatible with 125/155Mbps Transceivers; however, the speed needs to be set to 100 manually. The  
Gigabit SFP Port of the EHG/EMG Series is not downward compatible.  
On the fifth column, the transmission Speed of each port can be chosen from the dropdown list which  
could be 10, 100, or 1000 Mbps. The default speed is set to the highest possible rate in Mbps. Next the  
port’s duplexing (Duplex) can be either Full duplex or Half duplex. The Half duplex option allows one-  
way communication at a time, while the Full duplex option allows simultaneous two-way  
communication.  
Each port can set the Flow Control mechanism to either On or Off on the eighth column. This flow  
control will be useful to avoid packet loss when there is a network congestion. However, the Flow  
Control setting is Off by default. After configuring the port setting, please click on the Update button to  
enable any of your new configuration on the switch. Descriptions of port setting options are summarized  
in Table 2.17.  
45  
Table 2.17 Descriptions of Port Settings  
Label Description  
Port  
Factory Default  
Port number on the managed switch.  
Check the box to allow data to be transmitted and  
received through this port  
-
All ports are enabled  
Enable  
Copper and/or Fiber modes. When both Copper  
and Fiber are listed, it means that this is a Combo  
port  
Depend  
Mode  
Choose from either Force or Auto. See description Auto-negotiation is enabled  
Negotiation  
Speed  
in the paragraph above.  
to all ports.  
Highest Speed  
Full-Duplex  
Select either 10, 100, or 1000Mbps  
Select either Half or Full Duplex. See description  
in the paragraph above.  
Duplex  
Either on or off. The Flow Control mechanism can  
be enabled (On) to avoid packet loss when  
congestion occurs.  
Off  
Flow  
Control  
2.5.2  
Port Status  
The overview of port status on the managed switch can be viewed in this webpage. The users can  
compare the actual status and the configured options described in previous subsection for each port.  
The rate control (ingress and egress) can be configured based on the instructions on Section 2.4.2.  
Figure 2.55 shows the Port Status webpage. Note that the last column also reports the security status  
whether it is turned on or off on each port, which can be either static security or 802.1x (See how to set  
security option for each port in Section 2.14). To check the latest status of all port, click the Refresh  
button either on the top or the bottom of the webpage.  
Figure 2.55 Port Status Webpage  
The header in each column and its possible values of the ports’s status are listed here:  
Mode (Copper (C) or Fiber (F))  
Enable (Yes or No)  
Link (Up or Down)  
46  
Negotiation (Auto or Force)  
Speed (unit: Mbps)  
Duplex (Full or Half)  
Flow Control (On or Off)  
Rate Control (On or Off)  
Security (On or Off): Either static security or 802.1x port security is turned on or off.  
2.5.3  
Mini-GBIC Port Status  
The Small Form-factor Pluggable (SFP) port is sometimes referred to as a Mini-GBIC (Giga Bitrate  
Interface Converter). In this subsection, all Mini-GBIC ports status can be shown if supported by the  
managed switch. Figure 2.56 depicts the Module (or Mini-GBIC Port) Status webpage. Note that the  
status here only provides the Ethernet compliance codes and vendor name. The link status (up or down)  
can be viewed in the previous subsection.  
Figure 2.56 Mini-GBIC Port Status Webpage  
2.5.4  
Port Statistics  
The Port Statistics are summarized in this webpage as shown in Figure 2.57. The users can use this  
subsection to help them diagnose the problem such as link quality of each port. The key statistics are  
the total number of normal (OK) frames, the number of discarded (Error) frames, and the speed of the  
transmission (Rate in Bps) for both transmitted (Tx) and received (Rx) traffic in each port. To clear or  
reset all the statistics to zero on this page, click on the Clear button. To obtain the latest statistics on  
this page, click on the Refresh button.  
47  
Figure 2.57 Port Statistics Webpage  
The header in each column and its possible values of the ports’s statistics are listed here:  
Enable (Yes or No): The port is enabled (Yes) or disabled (No).  
Link (Up or Down): Actual link status of the port.  
Tx OK (frames): Total number of packets transmitted.  
Tx Error (frames): The number of outbound packets which were chosen to be discarded even  
though no errors have been detected to prevent them from being transmitted.  
Tx Rate (Bps): Speed of transmission in Bytes per second.  
Rx OK (frames): Total number of packets (not including faulty packets) received.  
Rx Error (frames): Total number of faulty packets (including Oversize, Undersize, Frame Check  
Sequence (FCS), Alignment, Jabber and Fragment Errors in packets) received.  
Rx Rate (Bps): Receiving speed in Bytes per second.  
48  
2.6 Power over Ethernet  
Power over Ethernet (PoE) is an optional function for the managed switches which enables the switch  
to provide power supply to end devices called Powered Device (PD) connected on the other side of the  
Ethernet ports. This means that the electrical power is delivered along with data over the Ethernet  
cables. This will be useful for the end devices that are located in the area that has no power supply and  
the users can save additional wiring for the end devices. To find out whether this function is supported  
or not by your managed switch, please look for the keyword “PoE” in Atop’s model name. If the switch  
has “PoE” in its model name, it means that the switch is a Power Sourcing Equipment (PSE) that can  
provide power output to a Powered Device (PD). Figure 2.58 shows the Power over Ethernet dropdown  
menu.  
Figure 2.58 Power over Ethernet Dropdown Menu example on EHG7508-4SFP-4PoE  
2.6.1  
PoE Setting  
The PoE function for each port in the supported managed switch model can be set in this webpage as  
shown in Figure 2.59. The users can check the Enable box for corresponding port. Please also click on  
the Update button to allow the setting on PoE taking effect on the switch.  
49  
Figure 2.59 PoE Setting Webpage example on EHG7508-8PoE  
Note that the number of ports depends of the EHG model of the user’s managed switch.  
Table 2.18 Descriptions of PoE Setting  
Label  
Port1  
Port2  
Port3  
Port4  
Port5  
Port6  
Port7  
Port8  
Description  
Factory Default  
Enable  
Enable or Disable PoE function of the Port 1  
Enable or Disable PoE function of the Port 2  
Enable or Disable PoE function of the Port 3  
Enable or Disable PoE function of the Port 4  
Enable or Disable PoE function of the Port 5  
Enable or Disable PoE function of the Port 6  
Enable or Disable PoE function of the Port 7  
Enable or Disable PoE function of the Port 8  
Enable  
Enable  
Enable  
Enable  
Enable  
Enable  
Enable  
2.6.2  
PoE Status  
This webpage summarizes the status of each PoE port. For example, in Figure 2.60, Port8 was enabled  
and is supplying power to a Class 2 Powered Device (PD) indicated under the Classification column.  
The PD device is rated at 49V and 33mA. The total power consumption for this PD is 1.617W. To check  
the status of the PoE port, please click on the Refresh button. Table 2.19 provides descriptions of each  
column in the table of PoE Status.  
50  
Figure 2.60 PoE Status Webpage, example on EHG7508-8PoE  
Table 2.19 Descriptions of PoE Status  
Label  
Description  
Factory Default  
Port  
Port number  
-
Enable Status  
Power Status  
Enable or Disable PoE function  
Enable  
-
On when there is a power device on the other end or Off  
when there is no PD on the other end.  
Display the classification of power device on the other  
end  
Classification  
-
Voltage (V)  
Current (mA)  
Power (W)  
Display the voltage supplied to this port in Volts  
Display the current supplied to this port in milli-Amperes  
Display the power supplied to this port in Watts  
-
-
-
2.6.3  
PoE Alarm Setting[P3]  
Alarm events can be set up to warn on unintended interruption in the PoE function or change(s) in status  
of the PoE power device (PD) or exceeding of total power level set in this webpage. Figure 2.61 shows  
the PoE Alarm Setting webpage in which the user can set the total power value in Watts that the  
managed switch can detect and trigger an alarm. Then, the uses will have options to enable all alarm  
events or individual alarm event. There are three categories of PoE Alarm Event listed here: PoE PD  
Power On, PoE PD Power Off, and Detect Total Power. The users also have choices for notification  
of the alarm(s) by Relay, Email, or Alarm LED. The user can check the corresponding box for each type  
of notification. Please refer to Table 2.20 for the descriptions of PoE Alarm Setting. Note that the alarm  
events can also be found in the Event Log (when “Enabled” is checked - see explanation in Section  
2.20.1.2) or notified by Email (when “Email” is checked - see explanation in Section 2.20.2.2).  
When “Relay”, “Alarm” and “Email” are checked, eventlog will show Warning/ Alarm log.  
51  
Figure 2.61 PoE Alarm Setting  
Table 2.20 Descriptions of PoE Alarm Setting  
Label  
Description  
Factory Default  
Set the total power value in Watts which  
will trigger alarm event. Note that the value  
‘0’ means that the alarm event will not  
trigger.  
0
Detect Total Power Value  
Enable  
Check the box(s) to enable alarm event  
Check the box in front of this option to  
enable all alarm events  
Unchecked  
-
Select All  
Check the box in front of this option to  
PoE PD Power On enable alarm event when PoE PD is power  
-
-
-
on.  
PoE  
Alarm  
Event  
Check the box in front of this option to  
PoE PD Power Off enable alarm event when PoE PD is power  
off.  
Check the box in front of this option to  
enable alarm event when managed switch  
Detect Total  
can detect total power exceeding the value  
Power  
set in the Detect Totalw Power Value  
above.  
Check the box in this column so that alarm  
will turn on an external relay circuit.  
Check the box in this column so that alarm  
will send out an email notification.  
Check the box in this column so that alarm  
will turn on an external LED circuit.  
Unchecked  
Unchecked  
Unchecked  
Relay  
Email  
Alarm LED  
52  
2.7 Trunking  
The managed switch supports Link Trunking, which allows one or more links to be combined together  
as a group of links to form a single logical link with larger capacity. The advantage of this function is  
that it gives the users more flexibility while setting up network connections. The bandwidth of a logical  
link can be doubled or tripled. In addition, if one of links in the group is disconnected, the remaining  
trunked ports can share the traffic within the trunk group. This function creates redundancy for the links,  
which also implies a higher reliability for network communication. Figure 2.62 shows the Trunking  
dropdown menu.  
Figure 2.62 Trunking Dropdown Menu  
2.7.1  
Trunking Setting  
In this subsection, the user can create new trunking assignment(s) and remove existing trunking  
assignment(s). Figure 2.63 illustrates the Trunking Setting webpage. The top part of the page called  
Trunking lists existing trunk(s) which can be removed by pressing the Remove button in the last  
column. Each line of the trunking provides information about the group of links (Trunk) based on Group  
ID labeled with Trkx where x is the integer number between 1 to 8. The managed switch can support  
up to 8 trunk groups. Note that for the difference media types (for example Fast Ethernet, Gigabit  
53  
Ethernet and Fiber), port trunking needs to be combined separately. Therefore, there are two sections  
for creating trunking: Fast Ethernet Trunking Setting and Giga Ethernet Trunking Setting as shown  
in the lower sections of the webpage.  
Figure 2.63 Trunking Setting Webpage, example with EH7520  
The users have an option to enable Link Aggregation Control Protocol (LACP) which is an IEEE  
standard (IEEE 802.3ad, IEEE 802.1AX-2008) by checking on the box under the LACP column for each  
group. LACP allows the managed switch to negotiate an automatic bundling of links by sending LACP  
packets to the LACP partner or another device that is directly connected to the managed switch and  
also implements LACP. The LACP packets will be sent within a multicast group MAC address. If LACP  
finds a device on the other end of the link that also has LACP enabled, it will also independently send  
packets along the same links enabling the two units to detect multiple links between themselves and  
then combine them into a single logical link. During the detection period LACP packets are transmitted  
every second. Subsequently, keep alive mechanism for link membership will be sent periodically. Each  
port in the group can also operate in either LACP active or LACP passive modes. The LACP active  
mode means that the port will enable LACP unconditionally, while LACP passive mode means that the  
54  
port will enable LACP only when an LACP partner is detected. Note that in active mode LACP port will  
always send LACP packets along the configured links. In passive mode however, LACP port acts as  
"speak when spoken to", and therefore can be used as a way of controlling accidental loops (as long  
as the other device is in active mode). To enable trunking over multiple ports, the users can follow the  
steps below:  
Step 1: Select Trkx (x = 1 to 8) from Group ID dropdown list.  
Step 2: Choose whether to enable LACP (IEEE standard, Link Aggregation Control Protocol).  
Step 3: Select the Hash Type from the dropdown list.  
Step 4: Select specific ports to be in this trunk group from the text box.  
Step 5: Select specific ports in this trunk group to be LACP active.  
Step 6: Click Apply button to set the configuration on the managed switch.  
Descriptions of trunking settings are summarized in Table 2.21.  
Table 2.21 Descriptions of Trunking Settings  
Label  
Description  
Up to 8 trunk groups can be created: Trk1~Trk8. Note that it is not  
possible to mix Fast Ethernet ports and Gigabit Ethernet ports into  
the same trunk group.  
Enable/Disable LACP (Link Aggregation Control Protocol). Brief  
explanation of LACP is discussed in previous paragraph.  
The hash result determines which port to use for a specific frame.  
The available hash options are: Src MAC, Dst MAC, Src/dst MAC,  
Src IP, Dst IP, and Src/dst IP.  
Specify the member ports for this trunking group. Please hold  
Control key to select more than one port at a time.  
Specify which ports within the group should be in LACP Active  
mode. The ports that are not selected will be in LACP Passive  
mode.  
Group ID  
LACP  
Hash Type  
Ports  
LACP Active  
Apply  
Click Apply button to confirm the changes.  
Remove  
Click this button to remove any existing trunking group.  
2.7.2  
LACP Status  
Figure 2.64 lists the current switch’s trunking information. At the top of the page, the status of LACP on  
the managed switch is reported whether it is enabled or disabled. Next, the users can also specify the  
system priority here. LACP uses the system priority with the switch’s MAC address to form the system  
ID and also during negotiation with its LACP partner. The LACP system ID is the combination of the  
LACP system priority value (defined in this webpage) and the MAC address of the managed switch.  
The system priority determines which managed switch makes the decisions on ports that will be bundled  
into a logical link. The lowest value determines who has higher priority and is in charge. The table of  
LACP status provides information per port which are port number, status of LACP, group ID, and LACP  
partner. Table 2.22 explains the descriptions of LACP status. To change system priority, enter the  
desired number in the number box behind the system priority field and then click Update button. To  
obtain the latest status of the LACP, click on the Refresh button.  
55  
Figure 2.64 LACP Webpage  
Table 2.22 Descriptions of LACP Status  
Label  
System Priority  
Group ID  
Description  
Factory Default  
Indicate the system priority value of the managed switch  
in the range of 1 ~ 65535. System priority is used during  
the negotiation with other systems. System priority and  
switch’s MAC address is used to form a system ID.  
Note that a higher number means a lower priority.  
Show which trunk group that this port belongs to.  
Disabled: LACP is disabled.  
32768  
-
-
Passive: LACP will only passively respond to LACP  
requests.  
LACP  
Active: LACP will be actively searching for LACP  
Partner.  
Indicates whether a LACP Partner can be located on  
the other side.  
-
LACP Partner  
56  
2.8 Unicast/Multicast MAC  
The managed switch is a network device which operate at the OSI layer 2 or medium access control  
(MAC) layer. It forwards frames of OSI layer 2 based on the MAC addresses. Generally, the layer 2  
switch will learn about the destination MAC addresses of the end devices which are connected to the  
switch over time based on the exchanged traffic. For instance, in the beginning if the switch does not  
know which port a destination MAC address is, it will forward or broadcast a frame to all of its ports and  
wait for a response from end device connected to one of the port. This way the switch will learn of the  
MAC address and corresponding port number. Later on, the switch will forward the frame to the  
destination port only thus saving the traffic on other ports.  
The managed switch typically maintains the learned MAC addresses in its memory which is usually  
called a MAC Address table. In this section, the managed switch allows the users to control the MAC  
Address table by adding static MAC addresses into the table or filtering certain MAC addresses so that  
they will not be forwarded by the managed switch. Atop’s manage switch also provides the users with  
the ability to set the MAC address age-out manually. Note that the age-out period is a duration of time  
that a learned MAC address will be maintained in the MAC address table before it was removed to save  
the memory.  
The MAC addresses that can be managed by the switch can be both Unicast and Multicast MAC  
addresses. This section will briefly explain the concept of Unicast and Multicast forwarding as well as  
their benefits. Please see Figure 2.65 for illustrations of the Unicast versus the Multicast concept.  
Unicast  
Multicast  
Figure 2.65 Unicast vs. Multicast  
Unicast: This type of transmission sends messages to a single network destination identified by a  
unique MAC address. This method is simple with one source and one destination.  
Multicast: This type of transmission is more complicated. It sends messages from one source to  
multiple destinations. Only those destinations or hosts that belong to a specific multicast group will  
receive the multicast packets. In addition, networks that support multicast send only one copy of  
the information across the network until the delivery path that reaches group members diverges. At  
57  
these diverging points, multicast packets will be copied and forwarded. This method can manage  
high volume traffic with different destinations while using network bandwidth efficiently. Multicast  
filtering improves the performance of networks that carry multicast traffic.  
Figure 2.66 shows the Unicast/Multicast dropdown menu which allows the users to manage and view  
the status of MAC address table.  
Figure 2.66 Unicast/Multicast Dropdown Menu  
2.8.1  
Add Static MAC  
The managed switch allows the users to manually add static MAC addresses into its memory. The static  
MAC addresses will enable the managed switch to forward the traffic based on the MAC addresses in  
its memory to the destination port with specific virtual local area network (VLAN) identification (VID).  
Following the simple steps here to add a static MAC address.  
Step 1: Enter a MAC Address which can be either Unicast or Multicast MAC Address.  
Step 2: Specify VLAN ID (VID).  
Step 3: Select the ports to apply this static MAC address. Use Ctrl-key to add more than one port.  
Step 4: Click on Add button.  
Figure 2.67 depicts the Add Unicast/Multicast MAC webpage. There is an example of a table of static  
MAC address in the upper part of the webpage where the last column of the table has Remove buttons  
for each entry. The users can remove any existing static MAC address by clicking on the Remove  
button. The lower part of the webpage is where the user can enter a new static MAC address along  
with its VLAN ID (VID) as outline by the procedure above. Table 2.23 summarizes the fields in this Add  
Static MAC webpage.  
58  
Figure 2.67 Add Static MAC Webpage  
Table 2.23 Description of fields in Add Static MAC Webpage  
Label  
MAC address  
VID  
Description  
Enter a MAC address manually.  
Specify VLAN ID that this static MAC belongs to. (1 4096)  
Multicast or Unicast MAC address.  
Type  
Port(s)  
Add  
Define which ports to apply this static MAC address.  
Confirm and add the MAC address by clicking on this button  
Click on this button to remove existing static MAC address in the  
table.  
Remove  
2.8.2  
Black-List MAC  
As discussed earlier, the managed switch also allows users to set MAC filtering manually. Figure 2.68  
show the Black-List MAC webpage. The upper part of the page is the table of existing filtered MAC  
address where the users can remove the filter by clicking on the Remove button on each entry. The  
lower part of the page is where a new source MAC address that the users would like to filter can be  
entered into the MAC filtering table (black-list). Table 2.24 summarizes the fields in the MAC Filter  
webpage.  
Figure 2.68 Black-List MAC Setting Webpage  
59  
Table 2.24 Descriptions of MAC Filtering Webpage  
Label  
Description  
MAC Address  
Remove  
Add  
Enter MAC address to be black-listed or filtered manually.  
Remove the corresponding entry in MAC filtering table.  
Add a MAC addresses to the MAC filtering table  
2.8.3  
MAC Aging Time  
This function allows users to set MAC address age-out or aging time manually as shown in Figure 2.69.  
The users can specify the Age-out Time between 0 and 600 seconds in the following field. Note that  
the default value of age-out time is 300 seconds. In the managed switch, a MAC address table is stored  
in the memory to map a MAC address and a port number to forward frames. The aging time is the  
duration of time to keep MAC addresses in the MAC address table. For a longer aging time, the learned  
MAC address will stay in the memory longer. As a result, the switch will be able to forward the frames  
to a specific port quickly instead of forwarding to all the ports to prevent frame flooding. A shorter aging  
time will allow the switch to free up the old MAC addresses in the table to learn new MAC addresses.  
This will be useful when there are large number of MAC addresses (or end devices) in the network and  
when the traffic between any two end devices are short-lived.  
Figure 2.69 MAC Aging Time Webpage  
2.8.4  
MAC Table  
Information of current Unicast and Multicast MAC addresses in the memory (MAC Table) of the  
managed switch is displayed in this webpage as shown in Figure 2.70. The list of Unicast MAC  
addresses is shown first and follows by the list of Multicast MAC addresses. If there are more entries  
to be displayed, the users can click on the Next Page button to see other entries. The users also have  
an option to clear dynamic entries in the MAC address table by clicking on the Clear Dynamic Entries  
button at the bottom of the webpage. The descriptions of the MAC Address table are summarized in  
Table 2.25.  
60  
Figure 2.70 MAC Table Webpage  
Note: the static multicast address can be set from “Add Static MAC” (Section 2.8.1) in “Unicast/Multicast  
MAC” (Section 2.8) or from “Static IP Multicast” (Section 2.10.2) in “IP multicast” (Section 2.10).  
Table 2.25 Descriptions of MAC Address Table  
Label  
Unicast/Multicast MAC  
VLAN  
Description  
Displays MAC address.  
Displays VLAN ID.  
Displays whether the MAC address is dynamic or static. Note that  
dynamic is the address that is learned automatically, while static is  
the address that is entered by the users.  
Type  
Ports  
Displays which port that this MAC address belongs to.  
Clears all Dynamic MAC addresses by clicking this button.  
Clicking on this button to continue to the next page when there are  
more MACs available.  
Clear Dynamic Entries  
Next Page  
61  
2.9 GARP/GVRP/GMRP  
This page includes three options, GARP, GVRP, and GMRP settings. Main concept of all three  
protocols are to eliminate unnecessary network traffic by preventing transmission/retransmission to  
unregistered users. These functions are enabled by default. They can only be disabled if no MAC  
addresses are added in the multicast group table.  
GARP: Generic Attribute Registration Protocol, previously called Address Registration Protocol, is a  
LAN protocol that defines procedures by which end stations and switches can register and de-register  
attributes, such as network identifiers or addresses with each other. Every end station and switch thus  
has a record, or list, of all the other end stations and switches that can be reached at a given time.  
Specific rules are used to modify set of participants in the network topology, or so called reachability  
tree.  
GVRP: GARP VLAN Registration Protocol. GVRP is similar to GARP, but work with VLAN instead of  
other network identifiers. It provides a method to exchange VLAN configuration information with other  
devices, and conforms to IEEE 802.1Q.  
GMRP: GARP Multicast Registration Protocol provides a mechanism that allows bridges (or switches  
in this case) and end stations to dynamically register group membership information with the MACs of  
bridges (switches) attached to the same LAN segment and for that information to be disseminated  
across all bridges (switches) in the Bridged (switched) LAN that supports extend filtering services.  
GMRP provides a constrained multicast flooding facility similar to IGMP snooping. The difference is that  
IGMP is IP-based while GMRP is MAC-based.  
Figure 2.71 GARP/GVRP/GMRP Dropdown Menu  
62  
2.9.1  
Multicast Group Table  
In this subsection, the list of MAC addresses which were dynamically registered by GMRP into the  
Multicast Group Table can be viewed. The multicast group table in Figure 2.72 displays the following  
information for each MAC Address: VLAN ID (VID), Static Port(s), and GMRP Dynamic Port(s). The  
user can clear the table by clicking on the Clear GMRP Dynamic Entries button or obtain the latest  
update on the table by clicking on the Refresh button.  
Figure 2.72 Multicast Group Table  
2.9.2  
GARP Setting  
Figure 2.73 shows GARP Setting webpage where different Timers (Join, Leave, and LeaveAll) can be  
set. All devices that are exchanging attributes must set these timers to the same values. Note that the  
GARP Timer values are in multiple of 10 milliseconds. Table 2.26 summarized the descriptions and  
values of all Timers for GARP setting. Please click the Update button after setting your new values.  
Figure 2.73 GARP Setting Webpage  
Table 2.26 Descriptions of GARP Timer Settings  
Label  
Description  
Factory Default  
Join Timer  
Leave Timer  
Indicates the GARP Join timer, in 0 ~ 65535 seconds.  
Indicates the GARP Leave timer, in 0 ~ 65535 seconds. 600 milliseconds  
200 milliseconds  
10000  
milliseconds or 10  
seconds  
Leave All  
Timer  
Indicates the GARP Leave All timer, in 0 ~ 65535  
seconds.  
63  
2.9.1  
GVRP Setting  
In this section, GVRP can be enabled on the switch and then it can be enabled for all ports or specific  
port(s) and trunking group(s). The multicast IP address with designated VLAN ID can be accessed from  
each ports. Figure 2.74 and Figure 2.75 below illustrate GVRP Setting and Statistics. When GVRP is  
enabled, the switch which is an end node of a network needs to add static VLANs locally. Others  
switches can dynamically learn the rest of the VLANs configured elsewhere in the network via GVRP.  
Figure 2.74 GVRP Setting Box with Port Enabling  
64  
Figure 2.75 GVRP Statistics  
To enable GVRP in Figure 2.74, check the Enabled’s box and then select the desired port(s) by flagging  
the corresponding checkbox(es). Please click Update button to save the change to the switch. Figure  
2.75 provides summarized statistics on the packet count of GVRP based on the following packet types:  
Rx Join Empty, Tx Join Empty, Rx Join In, Tx Join In, Rx Empty, Tx Empty, Rx Leave In, Tx Leave In,  
Rx Leave Empty, Tx Leave Empty, Rx Leave All, and Tx Leave All. To clear the statistics on this table,  
please click on the Clear button at the bottom of the table. Table 2.27 describes the GVRP setting’s  
options.  
Table 2.27 GVRP Setting Descriptions  
Label  
GVRP  
Description  
Enables or disables GVRP protocol.  
Enables GVRP, the switch must be in 802.1q VLAN mode.  
Enables or disables GVRP on each port. If users have already  
defined trunking group (e.g. Trk1), it can also be selected to  
be enabled. If you check the All Ports box, all ports will be  
enabled.  
Factory Default  
Disabled  
All ports are  
disabled  
Port  
Clear  
Statistics  
Clears the record  
Clears all GVRP statistics counts  
2.9.2  
GMRP Setting  
The users can use this subsection to enable GMRP and enable GMRP for all ports or specified port(s)  
and trunking group(s) as shown in Figure 2.77. To enable GMRP in Figure 2.76, check the Enabled’s  
box and then select the desired port(s) by flagging the corresponding checkbox(es). Please click  
Update button to save the change to the switch.  
65  
Figure 2.76 GMRP Setting Box  
The GMRP Statistics can also be viewed on the bottom of this page as shown in Figure 2.77. The  
GMRP Statistics provides summarized statistics on the packet count of GMRP based on the following  
packet types: Rx Join Empty, Tx Join Empty, Rx Join In, Tx Join In, Rx Empty, Tx Empty, Rx Leave In,  
Tx Leave In, Rx Leave Empty, Tx Leave Empty, Rx Leave All, and Tx Leave All. To clear the statistics  
on this table, please click on the Clear button at the bottom of the table. Table 2.28 briefly describes  
GMRP setting and statistics.  
Figure 2.77 GMRP Statistics  
66  
Table 2.28 Descriptions of GMRP Settings and Statistics  
Field  
Field Description  
Factory Default  
GMRP  
Port  
You can enable or disable GMRP by enabling the  
checkbox. To enables GMRP, the switch must be  
in 802.1q VLAN mode.  
You can enable or disable GMRP on specified ports  
by clicking the corresponding checkbox. If you have  
already defined trunking group (e.g. Trk1), you can  
also enable it. If you check the All Ports box, all  
ports will be enabled.  
Disabled.  
All Ports are  
disabled.  
Clear Statistics  
You can clear all GMRP Statistics  
Clears the records  
2.10 IP Multicast  
The managed switch supports Internet Group Management Protocol (IGMP) which is a communication  
protocol used on IP version 4 networks to establish multicast group memberships among switches in  
the network. IGMP is an integral part of IPv4 multicast. It operates above the network layer of OSI model.  
One of the most important features related to this protocol is IGMP snooping, which is supported by the  
managed switch and greatly strengthens network functionality. The IGMP snooping is a process of  
“listening” to IGMP network traffic. By listening to conversations between different devices, it maintains  
a map of links and IP multicast streams. This means that multicast traffic may be filtered from the links  
of the managed switch which do not need them. Therefore, IGMP snooping enables the managed  
switch to only forward multicast traffic to the links that have requested it. This section contains two  
submenus as shown in Figure 2.80Figure 2.78 which are:  
IGMP  
Static IP Multicast  
Figure 2.78 IP Multicast Dropdown Menu  
67  
2.10.1 IGMP  
The IGMP (Internet Group Management Protocol) submenu is further divided into three options which  
are: Setting, IP Multicast Table, and Statistics. Figure 2.79 shows the three options under the IGMP  
submenu.  
Figure 2.79 IGMP's Options  
2.10.1.1 IGMP Settings  
This webpage allows the users to set IGMP features on the managed switch as shown in Figure 2.80.  
There are three features that can be enabled: IGMP Snooping, IGMP Proxy, and IGMP Fast-leave.  
After checking the desired feature’s boxes, please click on the Update button to allow the options to  
take effect. The lower part of the page lists Router and Multicast Groups Information which are  
router’s IP and port information. Table 2.29 summarizes the descriptions of IGMP’s Settings.  
Figure 2.80 IGMP Setting Webpage  
68  
Table 2.29 Descriptions of IGMP’s Settings  
Label  
Description  
Factory  
Default  
Disabled  
Disabled  
Disabled  
-
IGMP Snooping  
IGMP Proxy  
IGMP Fast-leave  
Router's IP  
Check the box to enable IGMP snooping.  
Check the box to enable IGMP proxy. See note below.  
Check the box to enable IGMP Fast-leave. See note below.  
Display the multicast router’s IP address.  
Router's Port  
Display the port that is connected to multicast router.  
-
*NOTE:  
IGMP Proxy works as an intermediate server, as shown in Figure 2.81. When it receives a membership  
query message from the router, it sends a membership report message to the router port. When it  
receives a membership report message from a computer in a new multicast group, it sends a  
membership report message back to the router port. When it receives a leave group message from a  
computer which is the only one in the group, it sends a leave group message to the router port and  
removes the computer from multicast group. Proxy is like a middle man that handles information about  
multicast group in between routers and computers.  
Figure 2.81 Example of IGMP Proxy  
IGMP Fast-leave: When a leave group message is received, the ports in the group will be immediately  
removed from the IP multicast entry.  
2.10.1.2 IGMP IP Multicast Table  
This webpage provides information about IGMP membership table and IP multicast table. Figure 2.82  
depicts the IGMP’s IP Multicast Table webpage. The upper table is an IGMP membership table and the  
lower table is IP multicast table which contain both static configured IP multicast addresses and  
dynamically joined IP multicast addresses. The static configured port is manually added by the users,  
while the dynamically joined port is added by the managed switch’s IGMP snooping feature. To get the  
latest update information on each table please click on the Refresh button.  
69  
Figure 2.82 IGMP's IP Multicast Table Webpage  
Figure 2.83 shows examples of IGMP membership table and IP multicast table. Note that the display  
format in Figure 2.83 is from an early version of managed switch firmware which may have a slightly  
different display format from Figure 2.82. These tables are based on the information in the memory of  
the managed switch. The IGMP membership table contains IP Multicast Address, VLAN ID (VID),  
Joined Port (port number) and Life Time. Note that the Life Time is in the unit of second. The IP multicast  
table has only IP Multicast Address, VLAN ID (VID), and Joined Port. Note that the joined port can be  
labelled with (S) or (D) which refer to as Static Configured or Dynamically Joined, respectively.  
Figure 2.83 Example of IGMP's IP Multicast Table  
2.10.1.3 IGMP Statistics  
This webpage provides information about IGMP statistics as shown in Figure 2.84. The users can view  
the number of IGMP packets in different categories: Rx Total, Rx Valid, Rx Invalid, Rx General Queries,  
70  
Tx General Queries, Rx Group-Specific Queries, Tx Group-Specific Queries, Rx Leaves, Tx Leaves,  
Rx Reports, Tx Reports, and Rx Others. The users can reset the numbers in all categories by clicking  
on the Clear button.  
Figure 2.84 IGMP Statistics Webpage  
Example of IGMP statistics are shown in Figure 2.85. Note that the display format in Figure 2.85 is from  
an early version of managed switch firmware which may have a slightly different display format from  
Figure 2.84. It shows the statistical values of IGMP packets which the managed switch received and  
transmitted over time. Table 2.30 summarizes the descriptions of the IGMP statistics.  
Figure 2.85 Example of IGMP's Statistics  
71  
Table 2.30 Descriptions of IGMP Statistics  
Statistics Label  
Description  
Factory  
Default  
-
Rx Total  
Rx Valid  
Rx Invalid  
Total number of IGMP packets received by the managed  
switch  
Number of valid IGMP packets received by the managed  
-
-
-
-
-
-
-
-
-
-
-
switch  
Number of invalid IGMP packets received by the managed  
switch  
Rx General Queries Number of IGMP’s Membership General Query packets  
received by the managed switch  
Number of IGMP’s Membership General Query packets  
transmitted by the managed switch  
Number of IGMP’s Membership Group Specific Query  
packets received by the managed switch  
Number of IGMP’s Membership Group Specific Query  
packets transmitted by the managed switch  
Number of IGMP’s Leave Group packets received by the  
managed switch  
Number of IGMP’s Leave Group packets transmitted by the  
managed switch  
Number of IGMP’s Membership Report packets received by  
the managed switch  
Number of IGMP’s Membership Report packets transmitted  
by the managed switch  
Number of IGMP’s other packets received by the managed  
switch  
Tx General Queries  
Rx Group Specific  
Queries  
Tx Group Specific  
Queries  
Rx Leaves  
Tx Leaves  
Rx Reports  
Tx Reports  
Rx Others  
2.10.2 Static IP Multicast  
This subsection allows the users to manually add new or remove existing static IP multicast and the  
joined port(s). Figure 2.86 shows the Static IP Multicast webpage where the upper part of the page is a  
table of existing IP Multicast Address entries and the lower part of the page contains the fields for adding  
new IP Multicast Address entry to the table. The users are required to supply the IP Multicast Address,  
VLAN ID (VID), and the lists of the port numbers which will join the static IP multicasting group (joined  
port).  
72  
Figure 2.86 Static IP Multicast Setting Webpage  
An example of an entry of IP multicast group is shown in Figure 2.87 where there is an existing IP  
Multicast Address of 224.2.3.4 which belongs to VLAN 1 and has port number 2, 3, and 6 in the group.  
The following procedures outline how to add a new IP multicast group. For example, an IP multicast  
group address is 224.1.1.1 and the joining ports are Port1, Port2 and Port5 with VLAN = 1.  
First, the users should enter the IP = 224.1.1.1 in the IP Multicast Address column.  
Then, the users should enter the VLAN ID = 1 in the VLAN ID (VID) column.  
Then, while holding the “Ctrl” key on the keyboard, click on all corresponding port numbers  
under the Join Port column (Port1, Port2, and Port5 in this example) to select which port(s) will  
join in the IP multicast group.  
Finally, click on the  
2.87.  
button. The IP address is then added as it shows on Figure  
To remove an existing static IP multicast address from the table, click the  
button of that entry.  
These procedures are similar to the procedures for adding or removing the Unicast/Multicast MAC  
address explained in Section 2.8.1. The only difference is that the IP multicast address has the form of  
224.XX.XX.XX. Note that IPv4 multicast address (Class D) is in between 224.0.0.0 and  
239.255.255.255.  
73  
Figure 2.87 Example of Static IP Multicast Setting  
2.11 SNMP  
Simple Network Management Protocol (SNMP) is a protocol for managing devices on IP networks. It  
exposes management data in the form of variables on the managed systems which describe the system  
configuration. These variables can then be queried or defined by the users. The SNMP is used by  
network management system or third-party software to monitor devices such as managed switches in  
a network to retrieve network status information and to configure network parameters. The Atop’s  
managed switch support SNMP and can be configured in this section. The SNMP setting has four  
categories and its dropdown menu is shown in Figure 2.88, which are:  
SNMP Agent  
SNMP V1/V2c Community Setting  
Trap Setting  
SNMP V3 Authentication (Auth.) Setting  
74  
Figure 2.88 SNMP Dropdown Menu  
2.11.1 SNMP Agent  
To enable SNMP agent on the managed switch, please check the Enabled box and click Update button  
as shown in Figure 2.89. The SNMP version 1 (V1), version 2c (V2c) and version 3 are supported by  
Atops managed switches as summarized in Table 2.31. Basically, SNMP V1 and SNMP V2c have  
simple community string based authentication protocol for their security mechanism, while SNMP V3 is  
improved with cryptographic security.  
Figure 2.89 SNMP Enabling Box  
Table 2.31 Description of SNMP Setting  
Label  
SNMP  
Description  
Check the box to enable SNMP V1/V2c/V3.  
Factory Default  
Disabled  
75  
2.11.2 SNMP V1/V2c Community Setting  
The managed switch supports SNMP V1, V2c, and V3. SNMP V1 and SNMP V2c use a community  
string matching for authentication. This authentication will allow network management software to  
access the information or data objects defined by Management Information Bases (MIBs) on the  
managed switch. Note that this simple authentication is considered a weak security mechanism. It is  
recommended to use SNMP V3, if possible. There are two levels of authentications or permission type  
in EHG75XX series, which are read-all-only or read-write-all. For example, in our default setting as  
shown in Figure 2.90, an SNMP agent, which is a network management software module residing on  
the managed switch, can access all objects with read-all-only permissions using the string public.  
Another setting example is that the string private has permission of read-write-all.  
This community string option allows the users to set a community string for authentication or remove  
existing community string from the list by clicking on the Remove button at the end of each community  
string item. The users can specify the string names on the String field and the type of permissions  
from the dropdown list as shown in Figure 2.90. Table 2.32 briefly provides descriptions of SNMP’s  
community string setting.  
Figure 2.90 SNMP Community Strings  
Table 2.32 Descriptions of Community String Settings  
Label  
(Community)  
Strings  
Description  
Define name of strings for authentication.  
Max. 15 Characters.  
Choose a type from the dropdown list: read-all-  
only and read-write-all. See notes below for a  
briefed explanation.  
Factory Default  
Public (read-all-only)  
Private (read-write-all)  
-
Permission Type  
*NOTE:  
Read-all-only: permission to read OID 1 Sub Tree.  
Read-write-all: permission to read/write OID 1 Sub Tree.  
2.11.3 Trap Setting  
The managed switch provides a trap function that allows switch to send notification to agents with SNMP  
traps or inform. The notifications are based on the status changes of the switch such as link up, link  
down, warm start, and could start. For inform mode, after sending SNMP inform requests, switch will  
76  
resends inform request if it does not receive response within 10 seconds. The switch will try re-send  
three times. This option allows users to configure SNMP Trap Setting by setting the destination IP  
Address of the Trap server, Port Number of the Trap server, and Community String for authentication.  
Figure 2.91 shows these Tap Setting’s options. The first line enables the users to select the Trap Mode  
which can be either Trap or Inform. Please click on the Update button after selecting the desired Trap  
Mode. After entering all required fields for Trap Setting in the last line, please click on the Add button.  
Table 2.33 summarizes the descriptions of trap receiver settings.  
Figure 2.91 Example of Trap Receiver Setting  
Table 2.33 Descriptions of Trap Receiver Settings  
Label  
Trap Mode  
Trap server IP  
address  
Description  
Choose between Trap and Inform  
Factory Default  
Trap  
NULL  
Enter the IP address of your Trap Server.  
Port  
Community  
String  
Enter the trap Server service port.  
Enter the community string for authentication.  
Max. 15 characters.  
162  
NULL  
2.11.4 SNMPv3 Auth. Setting  
As mentioned earlier, SNMP V3 is a more secure SNMP protocol. In this part, the users will be able to  
set a password and an encryption key to enhance the data security. When choosing this option, the  
users can configure SNMP V3’s authentication and encryption. MD5 (Message-Digest algorithm 5) is  
used for authentication password and DES (Data Encryption Standard) is used for data encryption  
algorithm. Figure 2.92 shows the SNMP V3 Authentication Setting’ options. The users can view existing  
SNMP V3 users’ setting on the upper table where it provides information about user name,  
authentication type, and data encryption. The users have an option to remove existing SNMP V3 user  
by clicking on the Remove button in the last column of each entry. To add a new SNMP V3 user, the  
users have to select the user Name from the dropdown list which can be either Admin or User. Then,  
the authentication password with a maximum length of 31 characters has to be entered in the Auth.  
Password field and re-entered again in the Confirmed Password field. Note that if no password is  
77  
provided, there will be no authentication for SNMP V3. Finally, the encryption key with a maximum  
length of 31 characters can be entered in the Encryption Key and re-entered again in Confirmed Key  
field. After filling all the required fields, please click on Add button to update the information on the  
managed switch. Table 2.34 lists the descriptions of SNMP V3 settings.  
Figure 2.92 SNMPv3 Users' Options  
Table 2.34 Descriptions of SNMP V3 Settings  
Label  
Description  
Factory Default  
Choose from one of the following options:  
Admin: Administration level.  
User: Normal user level.  
Set an authentication password for the user name  
specified above. If the field is left blank, there will  
be no authentication. Note that the authentication  
password is based on MD5.  
Admin  
Name  
Auth.  
(Authentication)  
Password  
NULL  
Max. 31 characters.  
Confirmed  
Password  
NULL  
NULL  
Re-type the Authentication Password to confirm.  
Set encryption key for more secure protection of  
SNMP communication. Note that the encryption  
algorithm is based on DES (.  
Max. 31 characters.  
Re-type the Encryption Key  
Encryption Key  
Confirmed Key  
NULL  
78  
2.12 Spanning Tree  
IEEE 802.1D Standard spanning tree functionality is supported by Atop’s managed switches. The  
Spanning Tree Protocol (STP) provides a function to prevent switching loops and broadcast radiation  
at the OSI layer 2. A switching loop occurs in a network when there are multiple connections or  
redundant paths between two network switches or at least two ports are connected on both sides of the  
two network switches. The switching loop can create a broadcast radiation, which is the accumulation  
of broadcast and multicast traffics in a computer network. As broadcast and multicast messages are  
forwarded by bridges/switches to every port, the bridges/switches will repeatedly rebroadcast the  
broadcast messages, and this accumulation of traffic can flood the network. STP creates a spanning  
tree topology and disables those links of the network that are not part of the spanning tree, which leaves  
only a single active path between two nodes. This function can avoid flooding and increase network  
efficiency. Therefore, Atop’s managed switches deploy spanning tree as a tool when the users set up  
connection or port redundancy or fault-tolerance in their network.  
RSTP (Rapid Spanning Tree Protocol), IEEE 802.1W, is also supported in Atop’s managed switches.  
It is an evolution of the STP, but it is still backwards compatible with standard STP. RSTP has the  
advantage over the STP. When there is a topology change such as link failure in the network, the RSTP  
will converge significantly faster to a new spanning tree topology. RSTP improves convergence on  
point-to-point links by reducing the Max-Age time to 3 times Hello interval, removing the STP listening  
state, and exchanging a handshake between two switches to quickly transition the port to forwarding  
state.  
MSTP (Multiple Spanning Tree Protocol) is also a standard defined by the IEEE 802.1s that allows  
multiple VLANs to be mapped to a single spanning tree instance called MST Instance, which will provide  
multiple pathways across the network. It is compatible with STP and RSTP. To support lager network,  
MSTP groups bridges/switches into regions that appear as a single bridge to other devices. Within each  
region, there can be multiple MST instances. MSTP shares common parameters as RSTP such as port  
path costs. MSTP also help prevent swithing loop and has rapid convergence when there is a topology  
change. It is possible to have different forwarding paths for different MST instances. This enables load  
balancing of network traffic across redundant links.  
This section describes how to setup the spanning tree protocol (STP), rapid spanning tree protocol  
(RSTP), and Multiple Spanning Tree Protocol (MSTP). Figure 2.93 depicts the dropdown menu for  
Spanning Tree.  
79  
Figure 2.93 Spanning Tree Dropdown Menu  
2.12.1 Spanning Tree Setting  
The users can select the spanning tree mode which are based on different spanning tree protocols in  
this webpage. Figure 2.94 shows the mode setting for spanning tree. There are three spanning tree  
modes to choose from the dropdown menu, which are spanning tree protocol (STP), rapid spanning  
tree protocol (RSTP), and multiple spanning tree protocol (MSTP). After choosing the desired mode,  
please click Update button to allow the change to take effect.  
Figure 2.94 Spanning Tree Mode Setting  
Under the mode setting, there is a box for Main Setting of spanning tree’s parameters as showed in  
Figure 2.95. The users can enable or disable spanning tree protocol in the Main Setting by checking  
the box behind the Enabled option. The users can fine tune the Priority, Maximum Age, Hello Time,  
and Forward Delay. After configuring the spanning tree’s main parameters, please click Update button  
to allow the change to take effect. The description of each parameter is listed in Table 2.35.  
80  
Figure 2.95 Spanning Tree Main Setting for STP and RSTP  
When the users change the spanning tree mode setting to MSTP and click the Update button in the  
Mode Setting box Figure 2.94, the Main Setting box in Figure 2.95 will be changed to Figure 2.96.  
The user can notice that the Priority field is disappeared while there are three more fields show up  
which are Max Hops, Revision Level, and Region Name. Additionally, there will be a note add to the  
Per-port Setting box that currently MSTP mode does not support trunk port now.  
Figure 2.96 Spanning Tree Main Setting for MSTP  
81  
Table 2.35 Descriptions of Spanning Tree Parameters  
Label  
Enabled  
Priority  
Description  
Default Factory  
Disable  
Check the box to enable spanning tree functionality.  
Enter a number to set the device priority. The value is in  
between 0 and 61440. The lower number gives higher  
priority.  
32768  
Maximum Age  
Hello Time  
Maximum expected arrival time for a hello message. It  
should be longer than Hello Time.  
Hello time interval is given in seconds. The value is in  
between 1 to 10.  
20  
2
Forward Delay  
Specify the time spent in the listening and learning  
states in seconds. The value is in between 4 to 30.  
The value is between 1 to 255.  
15  
120  
Max Hops  
(Only for  
MSTP)  
Revision Level  
(Only for  
MSTP)  
Region Name  
(Only for  
MSTP)  
The value is between 0 to 65535.  
Text string indicate the region name  
0
Region1  
The bottom part of the Spanning Tree Setting is the Per-port setting as shown in Figure 2.97. The users  
can enable spanning tree functionality individually on each port or on all port by checking on the box  
under the Port Enable column. The default setting is checking on all port. After making any change on  
the per-port setting, please click on the Update button to update the change on the managed switch.  
Figure 2.97 Spanning Tree Per-port Setting for STP and RSTP  
82  
2.12.2 Bridge Info  
Bridge Info (information) provides the statistical value of spanning tree protocol as shown in Figure 2.98.  
The information is subdivided into two parts: Root Information and Topology Information. To check the  
latest information, please click on the Refresh button. Table 2.36 and Table 2.37 summarize the  
descriptions of each entry in the root information table and topology information table, respectively.  
Figure 2.98 Bridge Information Webpage  
Table 2.36 Bridge Root Information  
Label  
I am the Root  
Description  
Factory Default  
Indicator that this switch is  
elected as the root switch of the  
spanning tree topology  
-
Root MAC Address  
Root Priority  
MAC address of the root of the  
spanning tree  
-
Root’s priority value: The switch  
with highest priority has the  
lowest priority value and it will  
be elected as the root of the  
spanning tree.  
0
Root Path Cost  
Root’s path cost is calculated  
from the data rate of the  
switch’s port.  
0
0
Root Maximum Age  
Root’s maximum age is the  
maximum amount of time that  
the switch will maintain protocol  
information received on a link.  
Root’s hello time which is the  
time interval for RSTP to send  
out a hello message to the  
neighboring nodes to detect  
any change in the topology.  
Root’s forward delay is the  
duration that the switch will be  
Root Hello Time  
0
0
Root Forward Delay  
83  
in learning and listening states  
before a link begins forwarding.  
Table 2.37 Bridge Topology Information  
Label  
Description  
Factory Default  
Root Port  
A forwarding port that is the  
-
best  
bridge/switch  
port  
from  
to  
non-root  
root  
bridge/switch. Note that for a  
root switch there is no root port.  
The total number of spanning  
topology change over time.  
The duration of time since last  
spanning topology change.  
Num. of Topology Change  
Last TC time ago  
0
-
2.12.3 Port Setting  
Spanning Tree Port Setting shows the configured value of spanning tree protocol for each port, as  
shown in Figure 2.99. The configured information for each port is state, role, path cost, path priority, link  
type, edge, cost, and designated information. To check the latest update on the statistics, please click  
on the Refresh button. Table 2.38 summarizes the descriptions of spanning three port setting. If  
Spanning Tree is enabled, the table below becomes editable. Use the Update button to save the  
settings.  
Figure 2.99 Spanning Tree Port Setting Webpage  
Table 2.38 Descriptions of Spanning Tree Port Setting  
Label  
Port  
State  
Description  
The name of the switch port  
State of the port:  
Factory Default  
-
N/A  
Disc’: Discarding – No user data is sent  
over the port.  
Lrn’: Learning – The port is not  
forwarding frames yet, but it is populating  
its MAC Address Table.  
Fwd’: Forwarding – The port is fully  
operational.  
Role  
Non-STP or STP  
Non-STP  
RSTP bridge port roles:  
Root’ – A forwarding port that is the best  
84  
port from non-root bridge to root bridge.  
Designated’ – A forwarding port for every  
LAN segment.  
Alternate’ – An alternate path to the root  
bridge. This path is different from using  
the root port.  
Backup’ – A backup/redundant path to a  
segment whose another bridge port  
already connects.  
Disabled’ – Note strictly part of STP, a  
network administrator can manually  
disable a port.  
Setting the path cost for each switch port  
Setting path cost (default: 0, meaning that  
using the system default value (depending  
on link speed))  
The actual value path cost (For STP and  
RSTP, please see Note 1 below and  
Table 2.39.)  
Config  
Actual  
0
0
Path Cost  
Pri  
Setting the port priority, used in the Port  
ID field of BPDU packet, value = 16 × N,  
(N:0~15)  
128  
See Note 2 below.  
The connection between two or more  
switches (for RSTP)  
Config  
P2P?  
Setting of the Link Type  
Auto  
No  
P2P: A port that operates in full-duplex  
mode is assumed to be point-to-pint link.  
Non-P2P: A half-duplex port (through a  
hub)  
Auto: Detect link type automatically  
Yes: This port is a Point-to-Point (P2P).  
No: This port is not Point-to-Point (Non-  
P2P).  
Link Type  
Edge port is a port which no other  
STP/RSTP switch connect to (for RSTP).  
An edge port can be set to forwarding  
state directly.  
Config  
Edge?  
Edge functional is set:  
Yes or No  
No  
No  
Edge  
Yes: This port is an edge port.  
No: This port is not an edge port.  
This shows some information of the best  
BPDU packet through this port.  
Root path cost  
Cost  
0
P. Pri.  
(Port Priority)  
Port  
Port priority (high 4 bits of the Port ID),  
Value = 16 × N, (N: 0~15)  
Interface number (lower 12 bits of the Port  
ID)  
128  
-
32768  
-
Designated  
Bri. Pri.  
Bridge priority, (value = 4096 × N, (N:  
(Bridge Priority) 0~15)  
Bridge MAC The MAC address of the switch which  
sent this BPDU  
Note:  
1. In general, the path cost is dependent on the link speed. Table 2.39 lists the default values of path  
cost for STP and RSTP.  
85  
Table 2.39 Default Path Cost for STP and RSTP  
Data Rate  
4 Mbits/s  
10 Mbits/s  
16 Mbits/s  
100 Mbits/s  
1 Gbits/s  
STP Cost (802.1D-1998)  
RSTP Cost (802.1W-2004)  
5,000,000  
2,000,000  
1,250,000  
200,000  
250  
100  
62  
19  
4
20,000  
2 Gbits/s  
3
10,000  
10 Gbits/s  
2
2,000  
2. The sequence of events to determine the best received BPDU (which is the best path to the root).  
Lowest root bridge ID determines the root bridge.  
Lowest cost to the root bridge favors the upstream switch with the least cost to root.  
Lowest sender bridge ID serves as a tie breaker if multiple upstream switches have equal cost  
to root.  
Lowest sender port ID serves as a tie breaker if a switch has multiple (non-Ether channel) links  
to a single upstream switch.  
Bridge ID = priority (4 bits) + locally assigned system ID extension (12 bits) + ID [MAC Address] 48  
bits  
The default bridge priority is 32768.  
Port ID = priority (4 bits) + ID (Interface number) (12 bits)  
The default port priority is 128.  
2.12.4 MSTP Instance  
MSTP enables the grouping and mapping of VLANs to different spanning tree instances. Therefore, an  
MST Instance (MSTI) is a particular set of VLANs that are all using the same spanning tree. Note that  
MSTI is identified by MSTI number and locally significant within MST region. Figure 2.100 illustrates the  
MSTP Instance webpage. In this section, the uses can add or remove MSTP instance. The upper part  
of the webpage is a table of existing MSTP instance in the managed switch. The users can add a new  
MSTP instance by choosing an Instance ID from the dropdown list, enter the VLAN Identification in the  
VID field, and set the desired priority in the Priority field. After filling all information, please click the  
Add/Modify button to update the MSTP instance. The procedure for setting up an MSTP instance is as  
follows:  
Enable MSTP protocol in Section 2.12.1  
Modify spanning tree main setting as described in Section 2.12.1  
Select ports that you want to enable MSTP function in Section 2.12.1.  
Add a Multiple Spanning Tree Instance (MSTI) in MSTP Instance webpage (this section).  
o
o
o
o
Choose an Instance Identification  
Add VLAN Identifications (VIDs) that will be member(s) of MSTP instance.  
Set Priority value of the switch.  
Click Add/Modify button.  
86  
Table 2.40 summarizes the descriptions of MSTP Information.  
Figure 2.100 MSTP Instance Webpage  
Table 2.40 Description of MSTP Information  
Label  
Instance ID  
Description  
Choose from dropdown list of  
Factory Default  
CIST  
CIST (Common and Internal Spanning Tree)  
or choose value from 1 to 63  
VID  
Priority  
Enter a value for VLAN ID between 1 to 4094  
Enter a value for priority value for the managed  
switch between 0 – 61440. The lower value  
means the higher priority. If the priority value is  
0, the switch will be the Root Bridge in this  
MSTI.  
-
32768  
Root Priority  
Display root priority value  
32768  
Root MAC  
Internal Root Path Cost  
Root Port  
Display MAC address of the Root Bridge  
Display internal root path cost  
Display root port  
-
0
-
Topology Change  
Display Yes or No  
No  
87  
2.13 VLAN  
A Virtual Local Area Network (VLAN) is a group of devices that can be located anywhere on a network,  
but all devices in the group are logically connected together. In other words, VLAN allows end stations  
to be grouped together even if they are not located on the same network switch. With a traditional  
network, users usually spend a lot of time on devices relocations, but a VLAN reconfiguration can be  
performed entirely through software. Also, VLAN provides extra security because devices within a VLAN  
group can only communicate with other devices in the same group. For the same reason, VLAN can  
help to control network traffic. Traditional network broadcasts data to all devices, no matter whether  
they need it or not. By allowing a member to receive data only from other members in the same VLAN  
group, VLAN avoids broadcasting and increases traffic efficiency (see Figure 2.101).  
Figure 2.101 Example of VLAN Configuration  
Atop’s managed switch EHG75XX series provide six approaches to create VLAN as follows:  
Tagging-based (802.1Q) VLAN  
Port-based VLAN  
MAC-based VLAN  
IP Subnet-Based VLAN  
Protocol-Based VLAN  
QinQ or Double Tagging-based VLAN  
88  
Figure 2.102 shows the drop-down menu under the VLAN section.  
Figure 2.102 VLAN Dropdown Menu  
2.13.1 VLAN Setting  
The first menu under the VLAN section is the VLAN Setting. Here the management VLAN Identification  
number (ID) is configured based on the IEEE 802.1Q standard. The default value is VID = 1. Note that  
the ID can be the number from 1 to 4096. If the users change the management VLAN ID to other number,  
please click the Update button to set it on the managed switch. Figure 2.103 depicts the VLAN Setting  
webpage. Table 2.41 describes the VLAN Setting option.  
Figure 2.103 VLAN Setting Webpage  
89  
Table 2.41 Description of VLAN Setting  
Label  
Description  
Factory Default  
Management VLAN ID  
Configure the management VLAN ID that can be  
accessed this switch.  
1
Range from 1 to 4095.  
2.13.2 802.1Q VLAN  
Tagging-based (802.1Q) VLAN is the networking standard that supports virtual LAN (VLANs) on an  
Ethernet network. The standard defines a system of VLAN tagging for Ethernet frames and the  
accompanying procedures for bridges and switches in handling such frames. The standard also  
contains provisions for a quality of service prioritization scheme commonly known as IEEE 802.1Q.  
VLAN tagging frames are frames with 802.1Q (VLAN) tags that specify a valid VLAN identifier (VID).  
Whereas, untagged frames are frames without tags or frames that carry 802.1p (prioritization) tags and  
only having prioritization information and a VID of 0. When a switch receives a tagged frame, it extracts  
the VID and forwards the frame to other ports in the same VLAN.  
For a 802.1Q VLAN packet, it adds a tag (32-bit field) to the original packet. The tag is between the  
source MAC address and the EtherType/length fields of the original frame. For the tag, the first 16 bits  
is the Tag protocol identifier (TPID) field which set to a value of 0x8100 in order to identify the frame as  
an IEEE 802.1Q-tagged frame. This field is located at the same position as the EtherType/length field  
in untagged frames, and is thus used to distinguish the frame from untagged frames. The next 3 bits is  
the Tag control information (TCI) field which refers to the IEEE 802.1p class of service and maps to the  
frame priority level. The next one bit is the Drop Eligible Indicator (DEI) field which may be used  
separately or in conjunction with PCP to indicate frames eligible to be dropped in the presence of  
congestion. The last 12 bits is the VLAN identifier (VID) field specifying the VLAN to which the frame  
belongs.  
Under the 802.1Q VLAN menu, there are three submenus which are Setting, PVID Setting, and VLAN  
Table as shown in Figure 2.104.  
90  
Figure 2.104 802.1Q VLAN Dropdown Menu  
2.13.2.1 802.1Q VLAN Settings  
Figure 2.105 shows the 802.1Q VLAN Setting webpage which allow the users to add new tagged-based  
VLAN to the managed switch. Please follow the following procedure to setting up the 802.1Q VLAN on  
the switch.  
1. Go to 802.1Q VLAN, then select Setting submenu.  
2. Fill in appropriate Name, VID, Member Ports, and Tagged Ports as show in Figure 2.105. The  
description of each fields is summarized in Table 2.42. Then, click Add/Modify button. Note to  
select multiple Member Ports or multiple Tagged Ports, press and hold the Ctrl key while  
selecting multiple ports.  
3. Go to 802.1Q VLANs PVID Setting described in the next subsection.  
4. Choose the same ports, and enter PVID (which is the same as VID), see Figure 2.106.  
To remove any of the VLAN from the 802.1Q VLAN setting, click the Remove button at the end of that  
particular VLAN record as shown in Figure 2.105.  
91  
Figure 2.105 802.1Q VLAN’s Setting Webpage  
Table 2.42 Setting Descriptions of 802.1Q VLAN Settings  
Label  
Name  
VID  
Description  
The VLAN ID name that can be assigned by the user.  
Configure the VLAN ID that will be added in static VLAN table  
in the switch.  
Factory Default  
DEFAULT  
Dependent  
The VLAN ID is in the range 2~4094.  
Member Ports Configure the port to this specific VID.  
All Ports  
Tagged Ports Configure the port that outgoing packet is tagged or untagged.  
Selected: The outgoing packet is tagged from this port.  
Dependent  
Unselected: The outgoing packet is untagged from this port.  
*NOTE: Default settings only have VLAN ID on 1. To set VLAN ID to other value beside 1, users will  
have to assign ports to be in that VLAN group.  
2.13.2.2 802.1Q VLAN PVID Settings  
Each port is assigned a native VLAN number called the Port VLAN ID (PVID). When an untagged frame  
goes through a port, the frame is assigned to the port’s PVID. That is the frame will be tagged with the  
configured VLAN ID defined in this subsection. Figure 2.106 shows the PVID Setting for 802.1Q VLAN  
where the upper table lists the current PVID assigned to each port. The users can configure the PVID  
by select either on or multiple ports (by clicking and holding the Ctrl key) and enter the desired PVID  
value between 2 to 4094. Please click Update button to allow the configuration to take effect on the  
switch. Table 2.43 summarizes the PVID Setting’s descriptions.  
92  
Figure 2.106 802.1Q VLAN PVID Setting Webpage  
Table 2.43 Setting Descriptions of 802.1Q VLAN PVID  
Label  
Port  
Description  
Select specific port(s) to set the PVID value  
Factory Default  
-
PVID Configure the default 802.1Q VID tag assigned to specific Port.  
1
The VLAN ID is in the range 1~4094.  
2.13.2.3 802.1Q VLAN Table  
This webpage shown in Figure 2.107 displays the 802.1Q VLAN table which lists all the VLANs that are  
automatically and manually added/modified to the managed switch. Figure 2.108 illustrates examples  
of the static and dynamic VLAN information of each VID. Table 2.44 summarizes the descriptions of  
VLAN Table.  
Figure 2.107 802.1Q VLAN Table Webpage  
93  
Figure 2.108 Example of 802.1Q VLAN Table  
Table 2.44 Descriptions of 802.1Q VLAN Table  
Label  
Description  
Factory  
Default  
VID  
Indicate the VLAN ID number  
Indicate the member ports to this VID.  
This entry is created by user.  
Dependent  
All ports  
Static Member Ports  
Static Tagged Ports  
Indicate the ports that outgoing packet is tagged or Dependent  
untagged.  
Displayed: The outgoing packet is tagged from this  
port.  
Non-displayed: The outgoing packet is untagged from  
this port.  
This entry is created by user.  
Dynamic Member Ports Indicate the member ports to this VID.  
This entry is created by GVRP (discussed in Section  
2.9.1).  
Dependent  
Dynamic Tagged Ports Indicate the member ports that outgoing packet is Dependent  
tagged or untagged.  
Displayed: The outgoing packet is tagged from this  
port.  
Non-displayed: The outgoing packet is untagged from  
this port.  
This entry is created by GVRP (discussed in Section  
2.9.1).  
2.13.3 Port-Based VLAN  
Port-Based VLAN (or Static VLAN equivalent) assignments are created by assigning ports to a VLAN.  
If a device is connected to a certain port, the device will be assigned a VLAN to that specific port. If a  
user changes the connected port, a new port-VLAN assignment must be reconfigured for this new  
connection. To setup port-based VLAN, please follow the following steps:  
1. Click on Port-Based VLAN setting page as shown in Figure 2.109.  
2. Select specific ports to be included in certain group by checking the corresponding box under the  
Member ports on particular row of port-based VLANs’ Group ID. Note that if the users check the  
box under the Group ID column, all of the Member Ports will belong to that VLAN’s Group ID.  
3. Click on the Update button to allow the setting to take effect on the managed switch.  
94  
Figure 2.109 Port-based VLAN Setting Webpage  
2.13.4 MAC-Based VLAN  
The managed switch also supports the ability to assign a VLAN ID (VID) to an untagged packet based  
on the source MAC address. This can be set in this sub-menu as shown in Figure 2.110. There are  
maximum 512 entries in the MAC-based VLAN table (Source MAC address + VLAN ID) in the lower  
part of this webpage. If the users enter a duplicated MAC address into the MAC-based VLAN table, the  
old VLAN ID will be overwritten by the new VLAN ID. The VLAN ID range is between 1 to 4096. If the  
source MAC address of a packet is matched with any entry inside the MAC-based VLAN table here,  
the mapped VLAN ID will be added to the packet.  
Figure 2.110 MAC-Based VLAN Setting Webpage  
95  
2.13.5 IP Subnet-Based VLAN  
This sub-menu allows the user to assign a VLAN ID to an untagged packet based on the source IP  
address and the prefix length which is called IP subnet-based VLAN. Figure 2.111 shows the webpage  
where the users can enter the IP address, prefix length and VLAN ID (VID) for creating a VLAN based  
on its IP subnet. The list of existing IP subnet-based VLAN is shown in the lower part of the webpage.  
This feature support maximum of 64 sets (IP address + Prefix length + VLAN ID). The VLAN ID (VID)  
range is between 1 to 4096. This VLAN setup feature supports both IPv4 and IPv6. If a duplicated pair  
of IP address and prefix length is entered into the table, there will be an error message. The prefix  
length of IPv4 is 0 to 32 while the prefix length of IPv6 is 0 to 64.  
Figure 2.111 IP Subnet-Based VLAN Setting Webpage  
2.13.6 Protocol-Based VLAN  
For the protocol-based VLAN, the switch supports 3 Ethernet packet frame types: Ethernet II, 802. 3  
LLC, and 802.3 SNAP. It uses the EtherType field (Protocol ID in these frames to assign a VLAN ID for  
each untagged packets. There are two submenus for Protocol-Based VLAN: Protocol to Group  
Setting and Group to VLAN Setting.  
2.13.6.1Protocol to Group Settings  
The users can add or modify the Group ID in this menu option, as shown in Figure 2.112 . Here, the  
maximum of 16 rules are supported. “Protocol Group Setting” is used to define the protocol rule and  
assign an unique ID (Group ID). The value of Group ID is between 1 to 2147483646. The Frame Type  
can be Ethernet, SNAP, or LLC. The “Value” field in the webpage is the EtherType (Protocol ID).  
Figure 2.112 Protocol to Group Setting Webpage  
96  
2.13.6.2Group to VLAN Settings  
The users can add or modify Group ID and for each port or multiple ports in this menu option, as shown  
in Figure 2.113. “Group to VLAN Setting” is used to map the Group ID to a VLAN ID (VID). This will  
map the FrameType and EtherType to a VLAN ID.  
Figure 2.113 Group to VLAN Setting Webpage  
2.13.7 QinQ  
Originally the 802.1Q standard VLAN only allowed one VLAN tag appended in a packet. But the  
QinQ feature in this subsection allows two VLAN tags to be appended in a packet. The main purpose  
of the QinQ is for service providers to place additional VLAN tag as an external network identification  
and to keep the original customer's VLAN tag if existed.  
To understand the operation of QinQ VLAN setting, we will use an example of a network where there  
are two buildings called Building 1 and Building 2 that has two departments called Department A  
and Department B of the same company on both buildings. Department A want use the VLAN2  
(TPID = 0x8100) for inside communication and Department B also want to use the VLAN2 (TPID =  
0x8100) for inside communication but they do not want to communicate with each other.  
The network administrators can enable the QinQ VLAN feature or double tagging VLAN function in  
the company managed switches. If Building 1 has the following switches: A1 (for Department A), B1  
(for Department B), H1 (for Backbone network) and Building 2 has the following switches: A2 (for  
Department A, B2 (for Department B), and H2 (for Backbone network) then all of the switches can  
be configured as shown in Figure 2.114.  
97  
Figure 2.114 Example of QinQ Deployment  
The operation of the network in Figure 2.114 based on QinQ VLAN setting rule can be described as  
follows.  
1. Switch A1 and Switch B1 send some packets with VLAN tag (TPID=0x8100, VLAN ID=2) to H1.  
2. The Switch H1 treats these received packets with VLAN tag (TPID=0x8100) as untagged  
packets because the receiving ports' QinQ TPID = 0x9100. These packets will be inserted the  
second VLAN tags (TPID=0x9100, VLAN ID = PVID).  
3. The Switch H1 will switch these packets to Port3 (VLAN ID=3 or 4 depending on the incoming  
port number from A1 or B1).  
4. The Switch H2 receives these packets and switches them by the VLAN rule. The packets with  
VLAN ID 3 will be sent to Port 1 and the packets with VLAN ID 4 will be sent to Port 2.  
5. Before Switch H2 sends these packets out from Port 1 or Port 2, the VLAN tags (TPID=0x9100,  
VLAN ID=3 or 4) will be removed from these packets.  
Figure 2.115 shows the QinQ Setting webpage where the QinQ function can be enabled for each port  
on the managed switch. When checking the corresponding enabled box behind each port, the TPID  
field will become active. The default TPID is set to 0x8100 which means that the QinQ feature is disable.  
To enable the QinQ for a port, the users need to set the TPID value. In general, it should be set to  
0x9100 which must be different from the original tag’s 0x8100 as described in Section 2.13.2. The TPID  
value should be between 0x0000 to 0xFFFF. When setting a trunk port with QinQ, it is not allow each  
physical port with different QinQ setting. This means that the QinQ enabled fields and TPID fields of all  
physical ports in a trunk port must be the same.  
The QinQ setting rule is summarized as follows:  
For ingress ports and egress ports, they use the TPID field to decide whether a packet is being with  
a VLAN tag or not.  
98  
o
o
A packet is untagged (without VLAN tag) if its TPID field is not the same as the TPID that we  
set for the port in the QinQ configuration.  
A packet is tagged (with VLAN tag) if its TPID field is the same as the TPID that we set for the  
port in the QinQ configuration.  
Either tagged packet or untagged packet are processed by the general VLAN rule to tag a packet,  
untag a packet, or keep the same packet, and do the switching.  
When a packet is tagged with a VLAN tag. The tag's TPID is from the input port's QinQ setting and  
the tag's VLAN ID is from the input port's PVID setting.  
Figure 2.115 QinQ Setting Webpage  
After finish setting the QinQ feature for any of the port, please click the Update button to allow the  
setting take effect on the managed switch.  
99  
2.14 Security  
Three security features are provided in EHG75XX series:  
Port Security (Static)  
802.1X  
Access Control List (ACL)  
Figure 2.116 shows the dropdown menu for security section on the managed switch.  
Figure 2.116 Security Dropdown Menu  
100  
2.14.1 Port Security  
Port Security or static port security subsection allows the users to control security on each port of the  
managed switch and create a table of MAC addresses allowed to access the switch. The Port Security  
menu is subdivided into two sub-menus which are Setting and White-List MAC.  
2.14.1.1Port Security Settings  
Figure 2.117 displays the Port Security Setting webpage where the users can enable or disable static  
security on one or multiple ports. To enable or disable multiple ports at the same time please hold the  
Ctrl key and select multiple ports under the Port list and choose Enable or Disable and then click  
Update button. The lower part of the Port Security Setting webpage shows the current status of security  
setting for each port on the managed switch.  
Figure 2.117 Port Security Setting Webpage  
2.14.1.2Port Security White-List MAC  
The White-List MAC webpage is depicted in Figure 2.118. The users can create a list of MAC address  
that will be allowed to access the managed switch. The users will need to specify the VLAN ID (VID)  
and port number for each particular MAC address added to this list. After entering all required fields,  
please click on the Add button to add the new MAC address into the white list. Please remember that  
the same MAC address cannot be assigned to two different ports. This will cause an error message.  
Note that if there are existing MAC address on the list and the users would like to remove them, please  
101  
click on the Remove button at the end of each record. Image below summarizes the descriptions of the  
fields in White-List MAC webpage.  
Figure 2.118 White-List MAC Webpage  
Table 2.45 Description of Fields in White-List MAC Webpage  
Label  
MAC Address  
Ports  
Description  
Type the suitable MAC address  
Choose the desired ports  
Remove  
Add  
Option to remove the corresponding MAC address  
Click to add a MAC address  
VLAN  
Specify the corresponding VLAN address to MAC address.  
2.14.2 802.1X  
802.1X is an IEEE standard for port-based Network-Access Control. It provides an authentication  
mechanism to devices that want to attach to a LAN or WLAN. This protocol restricts unauthorized clients  
from connecting to a LAN through ports that are opened to the Internet. The authentication basically  
involves three parties (see Figure 2.119): a supplicant, an authenticator, and an authentication server.  
Supplicant: A client device that requests access to the LAN.  
Authentication Server: This server performs the actual authentication. We utilize RADIUS  
(Remote Authentication Dial-In User Service) as the authentication server.  
Authenticator: The Authenticator is a network device (I.e. the EHG75XX Industrial Managed  
Switch) that acts as a proxy between the supplicant and the authentication server. It passes  
around information, verifies information with the server, and relays responses to the  
supplicant.  
The authenticator acts like a security guard to a protected network. The supplicant is not allowed  
accessing to the protected side of the network through the authenticator until the supplicant’s identity  
has been validated and authorized. With 802.1X authentication, a supplicant and an authenticator  
exchange EAP (Extensible Authentication Protocol, an authentication framework widely used by IEEE).  
102  
Then the authenticator forwards this information to the authentication server for verification. If the  
authentication server confirms the request, the supplicant (client device) will be allowed to access  
resources located on the protected side of the network.  
RADIUS: The RADIUS is a networking protocol that provides authentication, authorization and  
accounting (AAA) management for devices to connect and use a network service. Figure 2.119 shows  
a diagram of RADIUS authentication sequence.  
Figure 2.119 RADIUS Authentication Sequence  
The 802.1X option under the Security section is subdivided into three sub-menus which are: Setting,  
Parameters Setting, and Port Setting.  
2.14.2.1 802.1X Settings  
The 802.1X security mechanism can be enabled in this webpage as shown in Figure 2.120. When the  
users check the Enabled box, the rest of the option fields will become active. The users then have to  
enter all the required fields to configure the 802.1X Setting which are the IP address of RADIUS server,  
the RADIUS server’s port number, RADIUS server’s accounting port number, NAS identifier, and shared  
key. Summary of 802.1X Setting options are given in Table 2.46. After changing all the required fields,  
please click on the Update button.  
103  
Figure 2.120 802.1X Setting Webpage  
Table 2.46 Descriptions of 802.1X Setting  
Label  
Description  
Choose whether to Enable 802.1X for all ports or  
not  
Factory Default  
Disabled  
802.1x  
Radius Server IP  
Server Port  
Set RADIUS server IP address  
Set RADIUS server port number.  
The range is 0 ~ 65535.  
0.0.0.0  
1812  
Set the accounting port number of the RADIUS  
server.  
The range is 0 ~ 65535.  
Specify the identifier string for 802.1X Network  
Access Server (NAS).  
Max. Of 30 characters.  
A shared key between the managed switch and the  
RADIUS Server. Both ends must be configured to  
use the same key.  
1813  
Managed Switch  
NULL  
Accounting Port  
NAS Identifier  
Shared Key  
Max. Of 30 characters.  
Confirm Shared  
Key  
Re-type the shared key string.  
Dependent  
2.14.2.2 802.1X Parameters Settings  
There are a number of 802.1X parameters that the users might want to fine tune. This can be done on  
this webpage as shown in Figure 2.121. These parameters are related to the authentication periods or  
timeout durations and maximum number of authentication requests. Table 2.47 summarizes the  
descriptions of these parameters and their default setting. Please clicking on the Update button after  
the users changed any of the parameters.  
104  
Figure 2.121 802.1X's Parameters Setting Webpage  
Table 2.47 Descriptions of 802.1X Parameters  
Label  
Description  
Factory Default  
Waiting time between requests when the  
authorization has failed.  
60  
Quiet Period  
Range from 10 to 65535 seconds.  
Waiting time for the supplicant’s EAP response  
packet before retransmitting another EAP request  
packet. Range from 10 to 65535 seconds.  
Waiting time for the supplicant to response to the  
15  
30  
30  
2
Tx Period  
Supplicant Timeout authentication server’s EAP packet.  
Range from 10 to 300 seconds.  
Waiting time for the authentication server to  
response to the supplicant’s EAP packet.  
Range from 10 to 300 seconds.  
Maximum number of the retransmissions that the  
authentication server sends EAP request to the  
supplicant before the authentication session times  
out. Range from 2 to 10 seconds.  
Time between periodic re-authentication of the  
supplicant. Range from 30 to 65535 seconds.  
Server Timeout  
Maximum Requests  
Reauth Period  
3600  
2.14.2.3 802.1x Port Setting  
The user can individually configure 802.1x security mechanism on each port of the EHG75XX managed  
switch as shown in Figure 2.114. Each port can be set for any of the four authorization modes which  
are Force Authorization, Force Unauthorization, IEEE 802.1X Standard Authorization, and no  
authorization (N/A) as described in Table 2.48. The lower part of the the webpage is a table display the  
current status of authorization mode and state of each port on the managed switch. To enable the  
802.1X security on any of the port(s), click one of the port or press Ctrl key and click multiple ports on  
the list and choose the Authorization Mode from the pulldown list and click the Update button. To check  
the latest status of the 802.1X port setting, please click on the Refresh button.  
105  
Figure 2.122 802.1x Port Setting Webpage  
Table 2.48 Descriptions of 802.1X Port Setting  
Label  
Description  
Factory Default  
Option  
Port  
Set specific ports to be configured.  
Choices:  
N/A  
Force Unauthorized: Specify forced unauthorized  
Force Authorized: Specify forced authorized  
Standard Authorization: Specify authorization  
based on IEEE 802.1X  
Mode  
N/A: Specify disable authorization  
2.14.3 ACL  
Access Control List (ACL) is the mechanism for network access control. The users configure the  
switch’s filtering rules for accepting or rejecting some packets. Two types of filters are deployed in the  
EHG75XX series:  
1) by MAC layer, and  
2) by IP layer.  
The numbers of matching rules can be at most 128. However, the main important rules that are mostly  
exercise are follows. Rules for filtering by MAC layer includes MAC address, VLAN ID or Ether type.  
Whereas, rules for filtering by IP layer includes IP protocol, IP address, TCP/UDP port or Type of  
Service (TOS). When filtering is enabled, the matching rules are used to check whether the receiving  
106  
packet is matched. If it is match, the packet will be rejected; otherwise it will be accepted. Note here  
that the matching rules later will be referred to as the entries of ACL.  
The ACL webpage is depicted in Figure 2.123. To differentiate between each ACL entry, Index number  
from 1 to 128 is used. The ACL entry that has higher priority will be checked first before the lower priority.  
The Name field is for setting name of this rule. Type of filtering whether MAC layer (“Mac Base”) and  
IP layer (“IP Base”) can be set in the Filter field. Note that when change from Mac Base to IP Base the  
required parameters for ACL setting will be changed accordingly.  
Figure 2.123 Security Access Control List Information Webpage (MAC Based Filtering)  
The main ACL entries for filtering by MAC layer (also called L2 filtering) as shown in Figure 2.123  
include MAC address, VLAN ID, VLAN Priority Tag and Ether Type. Table 2.49 describes definition of  
each in details. Here note that if any field is empty, that ACL entry will be ignored.  
Table 2.49 Descriptions of Main ACL Entries for L2 Filtering in ACL Webpage  
ACL Entry  
Source or  
Destination  
MAC  
Definition  
Range  
MAC address are the fields of the  
Ethernet frame header. The Mask  
item is a bit mask for comparing  
range.  
For every non-zero bit in the Mask, its  
relative bit in the IP address will be  
compared. If the Mask is 0.0.0.0, then this  
condition is always accepted. If the Mask is  
empty, it is considered equal to the Mask of  
255.255.255.255 and all of bits in the IP  
Address are compared.  
Addresses  
VLAN ID  
The VLAN ID field of 802.1Q VLAN The item value is between 1~4094.  
tag in the Ethernet frame header. If  
the trunk ports are created, they will  
also be shown on the port list. If  
you want to select a trunk port,  
please make sure that there are no  
ACL entry using the physical ports  
which are belonging this trunk port.  
VLAN  
Priority Tag  
The Priority field of 802.1Q VLAN  
tag in the Ethernet frame header.  
The item value is between 0~7.  
107  
Ether Type  
The Ethernet type field in the  
Ethernet frame header. The  
followings are examples. The value  
0x8000 is an IPv4 packet. The  
value 0x86DD is an IPv6 packet.  
The value 0x8100 is an 802.1Q  
packet.  
The item value is between 0~0xFFFF.  
The main ACL entries for filtering by IP layer (also called L3 filtering) as shown in Figure 2.124 include  
IP Protocol, Source IP Address, Destination IP address, TCP/UDP Source Port, TCP/UDP Destination  
Port and TOS. Table 2.50 describes definition of each in details. Once again, note that if any field is  
empty, that ACL entry will be ignored  
Figure 2.124 Security Access Control List Information Webpage (IP Based Filtering)  
Table 2.50 Description of Main ACL Entries for L3 Filtering in ACL Webpage  
ACL Entry  
IP Protocol  
Definition  
Range  
The Protocol field of the IPv4 packet The item value is between 0~65535.  
header. The followings are  
examples. The value 1 is for an  
ICMP packet. The value 6 is for the  
TCP packet. The value 17 is for the  
UDP packet.  
Source or  
The VLAN ID field of 802.1Q VLAN  
For every non-zero bits in the Mask, its  
relative bit in the IP address will be  
Destination IP tag in the Ethernet frame header.  
Addresses  
The Mask item is a bit mask for  
comparing range.  
compared. If the Mask is 0.0.0.0.0.0, then  
this condition is always accepted. If the  
Mask is empty, it is considered equal to  
the Mask of FF:FF:FF:FF:FF:FF and all  
of bits in the IP Address are compared.  
The item value is between 0~65535.  
TCP/UDP  
Source Port /  
TCP/UDP  
Destination  
Port  
The fields of TCP/UDP frame  
header. It is used to filter the  
application services. For example,  
the TCP Destination Port 21 is for  
the FTP service, the TCP  
Destination Port 23 is for the Telnet  
service and the TCP Destination  
108  
Port 80 is for the HTTP service.  
To select which ports will follow the  
filter rule and what action to take,  
check the checkbox corresponding  
to that port and select choice of  
“Deny” or “Permit” in the action field.  
If this ACL entry is match, rejecting  
packet if 'Deny' is selected, and  
accepting packet if ‘Permit’ is  
selected.  
TOS (Type of  
Service)  
A Differentiated Service Code Point  
(DSCP) field in an IPv4 header. It is  
used for providing Quality of Service  
(QoS).  
The item value is between 0~63.  
Table 2.51 Summary of Label, Description, and Factory Default for Both ACL Filtering Method  
LABEL  
DESCRIPTION  
FACTORY  
DEFAULT  
NONE  
Index  
Name  
Filter  
Priority (1-128)  
Max length 32  
NONE  
Mac Base/IP Base  
A:B:C:D:E:F. is the MAC address. Mask is for bit mask  
Mac Base  
NONE  
Source MAC  
Address and Mask  
checking. 0.0.0.0.0.0 is for accepting all. Empty is as  
FF:FF:FF:FF:FF:FF.  
Destination MAC  
A:B:C:D:E:F. is the MAC address. Mask is for bit mask  
NONE  
Address and Mask  
checking. 0.0.0.0.0.0 is for accepting all. Empty is as  
FF:FF:FF:FF:FF:FF.  
VLAN ID  
VLAN Priority Tag  
Ether Type  
IP Protocol  
Source IP Address  
1-4094  
0 ~ 7  
0-FFFF  
0-65535  
NONE  
NONE  
NONE  
NONE  
NONE  
A.B.C.D is the IP address. Mask is for bit mask checking.  
0.0.0.0 is for accepting all. Empty is as 255.255.255.255.  
A.B.C.D is the IP address. Mask is for bit mask checking.  
0.0.0.0 is for accepting all. Empty is as 255.255.255.255.  
0-65535  
Destination IP  
Address  
TCP/UDP Source  
Port  
TCP/UDP  
Destination Port  
TOS  
NONE  
NONE  
NONE  
0-65535  
0-63  
NONE  
NONE  
NONE  
Port  
Action  
1,2,3,4,5,6,7,8, trk1, trk2  
Deny/Permit  
The users can Add, Modify, or Remove each ACL entry based on the Index number as shown in  
Figure 2.123 and Figure 2.124. The lower part of the ACL Information webpage is the list of all ACL  
entries. The user can browse through the list by using the Previous Page and Next Page buttons. To  
remove all of the ACL entries from the list, click on the Clear All button.  
109  
2.15 ERPS/Ring  
Ethernet Ring Protection Switching (ERPS) is a protocol for Ethernet layer network rings. The protocol  
specifies the protection mechanism for sub-50ms delay time. The ring topology provides multipoint  
connectivity economically by reducing the number of links. ERPS provides highly reliable and stable  
protection in the ring topology, and it never forms loops, which can affect network operation and service  
availability. Figure 2.125 depicts an example of ring topology forming by four Atop’s managed switch  
EH75XX series.  
Figure 2.125 An Example of Ring Topology  
Figure 2.125 shows that each Ethernet Ring Node is connected to its adjacent Ethernet Ring Nodes  
participating in the same Ethernet Ring using two independent links (I.e. two ways). In the Ethernet ring,  
loops can be avoided by guaranteeing that traffic may flow on all but one of the ring links at any time.  
This particular link is called Ring Protection Link (RPL). A control message called Ring Automatic  
Protection Switch (R-APS) coordinates the activities of switching on/off the RPL. Under normal  
conditions, this link is blocked by the Owner Node. Thus, loops can be avoided by this mechanism. In  
case an Ethernet ring failure occurs, one designated Ethernet Ring Node called the RPL Owner Node  
will be responsible for unblocking its end of the RPL to allow RPL to be used as a backup link. The RPL  
is the backup link when one link failure occurs.  
Atop’s EHG/EH75XX series industrial managed switches provide a number of Ethernet ring protocol.  
The ERPS/Ring section is subdivided into five menus as shown in Figure 2.126, which are: ERPS  
Setting, iA-Ring Setting, C-Ring Setting, U-Ring Setting, and Compatible-Chain Setting.  
110  
Figure 2.126 ERPS/Ring Drowdown Menu  
2.15.1 ESRP Setting  
ERPS Setting webpage is shown in Figure 2.127. Note that the users should disable the DIP Switch  
Control in Section 2.3.12 first in order to set up ERPS parameters. To set up ERPS on the current  
managed switch, please follow the following steps:  
1. Enable the ERPS by checking on the ERPS’s Enabled checkbox.  
2. If the users would like to keep the log, please also check the Log’s Enabled checkbox.  
3. Optionally, if the users want the switch to periodically check the status of the neighboring  
switches on the ring topology using heartbeat packets then the user can check the UERPS’s  
Enabled checkbox. Note that when this feature is enabled, the recovery time of the ring  
topology may be longer.  
4. Optionally, the users can fine tune the heartbeat interval by changing the default value 50  
milli-seconds to the desired value.  
5. Click on the Update button.  
6. Skip down to Add a new RAPS VLAN section at the bottom of the webpage. Enter the desired  
RAPS VLAN ID in the field and click the Add button. The VLAN ID can be the value between  
1 to 4094. Table 2.52 summarizes the fields in ERPS Setting webpage.  
111  
Figure 2.127 ERPS Setting Webpage  
Table 2.52 Descriptions of ERPS Setting  
Label  
Description  
Choose whether to enable ERPS or not  
Choose to enable log  
Factory Default  
Disabled  
ERPS  
Log  
Enabled  
Choose whether to enable UERPS.  
When UERPS is enabled, ring ports periodically sent  
a “heartbeat” packet to peer ring ports in order to  
determine whether the link path (etc. wireless bridge)  
is failure or alive.  
Disabled  
UERPS  
If peer ring port cannot receive “heartbeat”  
packets over 3 packets, the ring port will enter  
protection state.  
Note: This function affects the recovery time to  
more than 20 ms.  
Set the Heartbeat Interval.  
50 ms  
NULL  
Heartbeat Interval  
RAPS VLAN  
Range from 50 to 10000 milliseconds.  
Create the ring by specifying the R-APS VLAN ID of  
the ring.  
VLAN ID ranges from 1 to 4094.  
7. Click the Configure button on the right hand side of the webpage that corresponding to the  
RAPS VLAN that was entered in previous step. A new webpage will be displayed for the users  
to config additional parameters for ERPS RAPS VLAN Setting as shown in Figure 2.128.  
8. Configure the RAPS VLAN’s Status, West Port, East Port, RPL Owner, RPL Port, WTR  
Timer, Holdoff Timer, Guard Timer, MEL, and Propagate TC. Detail description of these  
parameters are summarized in Table 2.53. Then, click Update button to finish the setting up  
of new RAPS VLAN.  
112  
Figure 2.128 ERPS RAPS VLAN Setting Webpage  
Table 2.53 Description of ERPS RAPS VLAN Setting  
Label  
ERPS VLAN  
Status  
West Port  
East Port  
RPL Owner  
Description  
Factory Default  
None  
Indicate current RAPS VLAN ID to be configured  
Choose to enable ERPS with this particular VLAN  
Choose the West Port of the RPL  
Choose the East Port of the RPL  
Choose to enable Owner Function  
Select the Owner Port which is either West Port or  
East Port or None.  
Disabled  
Port1  
Port2  
Disabled  
None  
RPL Port  
Set the wait-to-restore (WTR) time of the ring in  
minutes. Lower value has lower protection time.  
Range of the WTR Timer is from 0 to 12 minutes.  
Set the holdoff time of the ring.  
Range of the Holdoff Timer is from 0 to 10000  
milliseconds.  
Set the guard time of the ring.  
Range of the Guard Timer is from 0 to 2000  
milliseconds.  
5
WTR Timer  
0
500  
Holdoff Timer  
Guard Timer  
Set the maintenance entity group level (MEL) of the  
ring.  
1
MEL  
Range of MEL is from 0 to 7.  
Indicate the topology change propagation of the ring  
ability.  
Enabled  
Propagate TC  
2.15.1.1 Example of ERPS Settings  
To allow the users to understand the setting up of ERPS on the EHG75XX industrial managed switches,  
this subsection provides an example of ERPS setup with four Atop’s managed switches as shown in  
Figure 2.129. Assuming that the ring network has EHG75XX A, EHG75XX B, EHG75XX C, and  
EHG75XX D. There is an RPL between EHG75XX A and EHG75XX B. Note that the figure is based on  
113  
the EH7520 model but it is applicable to any of EHG75XX models.  
Figure 2.129 Example of Ring Topology for ERPS Setup  
For each switch, please follow the procedure outline in previous section. First, enabling the ERPS and  
then add the RAPS VLAN = 8. On each managed switch, the users can configure ARPS VLAN  
Setting according to Table 2.54 and Table 2.55.  
Table 2.54 Setting Configuration for Switch A and B  
EHG75XX  
RAPS VLAN  
ERPS RAPS  
West Port  
East Port  
A
EHG75XX  
RAPS VLAN  
ERPS RAPS  
West Port  
East Port  
B
8
8
Enabled  
1
Enabled  
1
2
2
RPL Owner  
RPL Port  
Enabled  
West  
RPL Owner  
RPL Port  
Disabled  
none  
Table 2.55 Setting Configuration for Switch C and D  
EHG75XX  
RAPS VLAN  
ERPS RAPS  
West Port  
East Port  
C
EHG75XX  
RAPS VLAN  
ERPS RAPS  
West Port  
East Port  
D
8
8
Enabled  
Enabled  
1
1
2
2
RPL Owner  
RPL Port  
Disabled  
none  
RPL Owner  
RPL Port  
Disabled  
none  
114  
2.15.1.2 UERPS Settings (Optional)  
The following procedure outlines the UERPS Setting under the ERPS Setting. The users can follow  
them as an exercise.  
1. Prepare two managed switches (Switch A and Switch B). We will use Port 7 and Port 8 on both  
switches for redundancy.  
2. Connect Switch A and Switch B to the network or PC so that you can access them. For simplicity,  
the users can use Port 1 for Web configuration on both switches.  
3. Open Device Management Utility or Switch View (described in Chapter 5) and change the IP  
address of Switch B or both switches such that the IP addresses will not be conflicting.  
4. Open Switch A and B’s WebUI and setup ERPS settings like the following. Enable ERPS, Log, and  
UERPS accordingly as shown in Figure 2.130. Then, press Update button for the changes to take  
effect.  
Figure 2.130 Example of Switch A’s ERPS settings  
5. On Switch A, Click Configure button on RAPS VLAN and input settings as shown in Figure  
2.131.  
Figure 2.131 Example of Switch A’s RAPS VLAN Settings  
6. Open Switch B’s WebUI and input settings for ERPS as shown in Figure 2.132.  
115  
Figure 2.132 Example of Switch B’s RAPS VLAN Setting  
7. Connect Switch A’s Port 7 to Switch B’s Port 8, and connect Switch A’s Port 8 to Switch B’s Port 7  
(like cross-over) for the redundancy port.  
8. If everything is set up properly, you will find Switch A having the following ERPS state as shown in  
Figure 2.133. Also, it will automatically block Port 8 to prevent a network loop.  
Figure 2.133 Switch A’s ERPS state  
9. From here on, the users can add another bridge between the two managed switches.  
116  
2.15.2 iA-Ring Settings  
The Atop’s managed switch is designed to be compatible with iA-Ring protocol for providing better  
network reliability and faster recovery time for redundant ring topologies. It is in the same category as  
R Rings, but with its own protocol. It has been a successful development that reduces recovery time to  
less than 20 ms. iA-Ring can be used for any single ring, which is shown in the diagram below (Figure  
2.134).  
Figure 2.134 iA-Ring Example Topology  
Figure 2.135 shows iA-Ring Setting webpage. The iA-Ring redundancy protocol can be enabled on  
this page. Note that the users should disable DIP Switch Control as described in Section 2.3.12 and  
disable ERPS as described in Section 2.15.1 first in order to enable/configure iA-Ring parameters on  
the web browser. Please follow the simple steps below based on Figure 2.135 to setup the iA-Ring.  
1. Enable the iA-Ring by selecting Enabled from the dropdown list.  
2. Choose whether the current managed switch is going to be the Ring Master by enabling the  
Ring Master option.  
3. Select the 1st Ring Port from the dropdown list.  
4. Select the 2nd Ring Port from the dropdown list.  
5. Click on the Update button to save the change and allow the configuration to take effect.  
6. Check the latest status of the iA-Ring configuration by clicking on the Refresh button.  
117  
Note that the lower part of the iA-Ring Setting webpage shows the Status of the iA-Ring which provides  
its State, 1st Ring Port Status and 2nd Ring Port Status. The description of the iA-Ring setting is  
summarized in Table 2.56.  
Figure 2.135 iA-Ring Setting Webpage  
Table 2.56 Descriptions of iA-Ring Setting  
Label  
iA-Ring  
Description  
Enable iA-Ring or disable iA-Ring.  
Enabled: Master Mode.  
Disabled: Slave Mode.  
Select the primary port for the iA-Ring.  
Select the backup port for the iA-Ring.  
Factory Default  
Disabled  
Disabled  
Ring Master  
1st Ring Port  
2nd Ring Port  
Port1  
Port2  
2.15.3 C-Ring (Compatible-Ring) Settings  
Compatible-Ring (C-Ring) is similar to iA-Ring. The only difference is that it can be used for MOXA  
rings as well. For more information about this redundant ring protocol, please contact Atop Technologies.  
Figure 2.136 shows how to set the Compatible-Ring (C-Ring) redundancy protocol. Note that the users  
should disable DIP Switch Control as described in Section 2.3.12 and ERPS as described in Section  
2.15.1 first in order to enable/configure Compatible-Ring parameters on the web browser. Please follow  
the simple steps below based on Figure 2.136 to setup the C-Ring.  
1. Enable the C-Ring by selecting Enabled from the dropdown list.  
2. Select the 1st Ring Port from the dropdown list.  
3. Select the 2nd Ring Port from the dropdown list.  
4. Click on the Update button to save the change and allow the configuration to take effect.  
Note that the lower part of the C-Ring Setting webpage shows the Status of the C-Ring which provides  
118  
its State, 1st Ring Port Status and 2nd Ring Port Status. The description of the C-Ring setting is  
summarized in Table 2.57.  
Figure 2.136 Compatible-Ring (C-Ring) Setting Webpage  
Table 2.57 Descriptions of Compatible-Ring Setting  
Label  
C-Ring  
Description  
Enables Compatible-Ring or disable Compatible-  
Ring.  
Factory Default  
Disabled  
(Compatible-  
Ring)  
1st Ring Port  
2nd Ring Port  
Selects the primary port for the Ring.  
Selects the backup port for the Ring.  
Port7  
Port8  
2.15.4 U-Ring  
This section enables the setup of U-Ring (Unicast Ring) on the managed switch. The U-Ring could  
provide redundancy connection between two EHG75XX industrial managed switches which are not  
directly connected by physical wires but by two additional network devices on each switch. There are  
two examples of U-Ring application presented here to provide as guidelines when to choose this U-  
Ring feature.  
First example is depicted in Figure 2.137 where there are two EH75XX managed switches. On each  
switch it is connected to two wireless Access Points (AP) via two different Ethernet LAN ports. Both  
wireless Access Points are connected to another two wireless Access Points as two separate wireless  
bridge connection. Based on Figure 2.137, EH75XX A has AP 1 on port 8 and AP 3 on port 7 while  
EH75XX B has AP 2 on port 7 and AP 4 on port 8. The AP 1 and the AP 2 are connected as wireless  
Bridge Connection 1 and the AP 4 and the AP 3 are connected as wireless Bridge Connection 2.  
119  
Figure 2.137 Example 1 of Two Wireless Bridge U-ring  
Second example is illustrated in Figure 2.138 where there are also two EH75XX managed switches.  
On each switch it is connected to two wired Access Points (AP) via two different Ethernet LAN ports.  
Both wired Access Points are connected to another two wired Access Points as two separate wired  
bridge connection. Based on Figure 2.138, EH75XX A has AP 1 on port 8 and AP 3 on port 7 while  
EH75XX B has AP 2 on port 7 and AP 4 on port 8. The AP 1 and the AP 2 are connected as wired  
Bridge Connection 1 and the AP 4 and the AP 3 are connected as wired Bridge Connection 2. There  
are two physical lines between both pair of APs. The U-ring protocol could be used in this environment.  
The different of this example from the previous example is that the APx could be:  
Unmanaged-switch  
Transceiver  
XDSL bridge  
Note that care should be taken that if a dumb switch is used as an AP (Access Point). The one on the  
other side must be a dumb switch as well. Again, care should also be taken when connecting the cables  
to the ports.  
120  
Figure 2.138 Example 2 of Two Wired Bridge U-ring  
To setup the U-Ring, the users need to configure a number of parameters on U-Ring Setting webpage  
as shown in Figure 2.139. Please follow the simple steps below to setup the U-Ring.  
1. Enable the U-Ring by selecting Enabled from the dropdown list.  
2. Choose whether the current managed switch is going to be the Ring Master by enabling the  
Ring Master option.  
3. Select the 1st Ring Port from the dropdown list.  
4. Select the 2nd Ring Port from the dropdown list.  
5. Optionally, set the Heartbeat Expire period which could be between 100 to 10000 milliseconds.  
Note that the default period is 100 ms.  
6. Click on the Update button to save the change and allow the configuration to take effect.  
7. Check the latest status of the U-Ring configuration by clicking on the Refresh button.  
Note that the lower part of the U-Ring Setting webpage shows the Status of the U-Ring which provides  
its State, 1st Ring Port Status and 2nd Ring Port Status. The description of the U-Ring setting is  
summarized in Table 2.58.  
121  
Figure 2.139 U-Ring Setting Webpage  
Table 2.58 Descriptions of U-Ring Setting  
Label  
U-Ring  
Ring Master  
Description  
Enabled or disabled the Unicast ring.  
Enabled or disabled this switch as the Ring Master of  
the Unicast Ring. For Ring Slave configuration, leave  
this option as disabled.  
Factory Default  
Disabled  
Disabled  
1st Ring Port  
2nd Ring Port  
Select which port on the managed switch will be the  
Port1  
Port2  
1st Ring Port.  
Select which port on the managed switch will be the  
2nd Ring Port.  
Heartbeat Expire  
Update  
Time interval between checking-packets.  
Click this button to allow the configuration to take  
effect.  
1000  
-
Refresh  
State  
Obtain the latest status of the U-Ring Setting by  
clicking on this button.  
-
Shows whether the device’s state is normal or  
protected.  
Disable  
1st  
Status  
Ring  
Port Displays the status of the 1st Ring Port.  
-
-
2nd Ring Port Displays the status of the 2nd Ring Port.  
Status  
122  
2.15.5 Compatible-Chain Settings  
The Compatible-Chain Setting is provided on Atop’s managed switches for compatible networking  
with Moxa switch’s Turbo Chain. The MOXA’s Turbo Chain is a technique that uses the chain network  
topology and links the two ends (two network devices such as industrial managed switches) of the chain  
to a common LAN. This can also be viewed as a form of Ring Topology. This Turbo Chain can provide  
redundancy on any type of network topology or on complex network topology such as multi-ring  
architecture. The Turbo Chain can create flexible and scalable topologies with a fast media-recovery  
time.  
The fist switch on the Compatible-Chain will have a Role State as Head switch. The other switches  
along the Compatible-Chain will have a Role State as Member switches. The last switch on the  
Compatible-Chain will have a Role State as Tail switch. For Head switch, the first port which is  
connected to the common LAN is called Head Port, while the second port which is connected to the  
next switch in the Compatible-Chain is called Member Port. For Member switches, both ports of the  
Member switches are called 1st Member Port and 2nd Member Port. For Tail switch, the first port which  
is connected to another Member switch is call Member Port, while the second port which is connected  
to the common LAN is called Tail Port. In Turbo Chain configuration, the Head Port is the main path  
while the Tail Port is the backup path of the redundant topology. During no link-failure operation on the  
chain’s path, all traffic will be forwarded to the Head Port to the common LAN. When there is a failure  
on the path of the chain, the Tail Port will be used for forwarding the traffic to the common LAN.  
To configure Compatible-Chain, select the Compatible-Chain menu under the ERPS/Ring Section.  
Figure 2.140 shows the Compatible-Chain Setting webpage.  
Figure 2.140 Compatible-Chain Setting Webpage  
Please follow the simple steps below to setup the Compatible-Chain.  
1. Enable the Compatible-Chain by selecting Enabled from the dropdown list.  
2. Choose the Role State whether the current managed switch is going to be the Head, Member  
or Tail of the chain from the dropdown list of Role State.  
123  
3. If the current switch is the Head switch then select the Head Port from the dropdown list and  
select the Member Port from another dropdown list.  
4. If the current switch is the Member switch then select the 1st Member Port from the dropdown  
list and select the 2nd Member Port from another dropdown list.  
5. If the current switch is the Tail switch then select the Tail Port from the dropdown list and  
select the Member Port from another dropdown list.  
6. Click on the Update button to save the change and allow the configuration to take effect.  
Note that the upper part of the Compatible-Chain Setting webpage shows the Status of the current  
switch in the chain which provides its Role, 1st Ring Port Status and 2nd Ring Port Status. The  
description of the Compatible-Chain setting is summarized in Table 2.58.  
Table 2.59 Descriptions of Compatible-Chain Setting  
Label  
Description  
Display the role of the current switch in the Compatible-  
Chain: Head, Tail, or Member.  
Factory Default  
Member  
Role  
1st  
Ring  
Port Display the status of the 1st Ring Port.  
Forwarding  
Forwarding  
Status  
2nd Ring Port Display the status of the 2nd Ring Port.  
Status  
Compatible-Chain Enabled or Disabled the Compatible-Chain Ring  
Disable  
Member  
Choose the role of the current switch in the compatible  
Role State  
chain: Head, Tail, or Member.  
Select a particular port from the dropdown list to be the  
Head Port of the compatible-chain.  
Select a particular port from the dropdown list to be the  
Tail Port of the compatible-chain.  
Select a particular port from the dropdown list to be the  
Member Port of the compatible-chain.  
Select a particular port from the dropdown list to be the  
Member Port of the compatible-chain.  
Port1  
Port1  
Port2  
Port1  
Port2  
Head Port  
Tail Port  
Member Port  
1st Member Port  
Select a particular port from the dropdown list to be the  
Member Port of the compatible-chain.  
2nd Member Port  
124  
2.16 LLDP  
Link Layer Discovery Protocol (LLDP) is an IEEE802.1ab standard OSI layer-2 protocol. LLDP allows  
Ethernet network devices to advertise details about themselves, such as device configuration,  
capabilities and identification. The advertise packets are periodically sent to directly connected devices  
on the network that are also using LLDP or so called its neighbors. LLDP is a “one hop” unidirectional  
protocol in an advertising mode. LLDP information can only be sent to and received by devices, no  
solicit information or state changes between nodes. The device has a choice to turn on and off sending  
and receiving function independently. Advertised information is not forward on to other devices on the  
network. LLDP is designed to be managed with SNMP. Applications that use this protocol include  
topology discovery, inventory management, emergency services, VLAN assignment, and inline power  
supply.  
Link Layer Discovery Protocol (LLDP) section consists of LLDP Setting and LLDP Neighbors as  
shown in Figure 2.141.  
Figure 2.141 LLDP Dropdown Menu  
125  
2.16.1 LLDP Settings  
In Figure 2.142, the LLDP Setting webpage allows users to have options for enabling or disabling the  
LLDP, as well as setting LLDP transmission parameters. This LLDP function should be enabled if users  
want to use Atop’s Device Management Utility (formerly called Device View) to monitor the switches’  
topology of all LLDP devices in the network. For more information about using Device Management  
Utility, please refer to Chapter 5 in this document. Table 2.60 describes the LLDP Setting parameters  
which are transmit interval and transmit time-to-live of the LLDP advertisement packets.  
Figure 2.142 LLDP Setting Webpage  
Table 2.60 Descriptions of LLDP Setting  
Label  
Description  
Factory Default  
Enabled  
30  
LLDP  
Choose to either enable or disable LLDP.  
Set the transmit interval of LLDP messages.  
Range from 5 to 65535 seconds.  
Tx Interval  
TxTTL  
Tx Time-To-Live.  
120  
Amount of time to keep neighbors’ information. The  
recommend TTL value is 4 times of Tx Interval. The  
information is only removed when the timer is  
expired.Range from 5 to 65535 seconds.  
2.16.2 LLDP Neighbors  
This menu allows the user to view the LLDP’s neighbor information of the managed switch as shown in  
Figure 2.143. The Neighbor Information table contains Chassis ID, Port ID, Port Description, Device  
Name, Device Description and Management Address on each Port of the managed switch. The users  
can click on the Refresh button to get the latest Neighbor Information table or click on the Clear button  
to clear all the information on the display Neighbor Information table.  
An example of neighbor information table is depicted in Figure 2.144. Note that this example is based  
on a display format of an early version of EH75XX managed switch in which System Name is changed  
to Device Name and System Description is changed to Device Description in the latest version of  
EHG75XX’s firmware. Table 2.61 summarizes the descriptions of each column of the LLDP’s Neighbor  
Information.  
126  
Figure 2.143 LLDP Neighbors Webpage  
Figure 2.144 Example of LLDP Neighbors Webpage  
Table 2.61 Descriptions of LLDP Neighbors Webpage  
Label  
Description  
Port  
Chassis ID  
Port ID  
Indicates particular port number of the switch.  
Indicates the identity of the neighbor of this particular port.  
Indicates the port number of this neighbor.  
Port Description  
Device Name  
Device Description  
Management  
Address  
Shows a textual description of the neighbor port.  
Indicates the device name/ hostname of the neighbor.  
Shows a more detailed description of the neighbor’s device.  
Indicates neighbor’s management IP address.  
127  
2.17 PROFINET  
PROFINET (Process Field Net) is an open and advanced standard for the industrial automation based  
on the industrial Ethernet. PROFINET enables the users to exchange the process data with user’s  
machines. In this case, instead of using fieldbus system, the users use the Ethernet as a communication  
mechanism. Figure 2.145 shows the dropdown menu of the PROFINET on an EHG75XX/EH75XX  
industrial managed switch. There are three subsections under the PROFINET which are Setting, I&M,  
and MRP.  
Figure 2.145 PROFINET Dropdown Menu  
2.17.1 PROFINET Settings  
The PROFINET can be enabled on the EHG75XX/EH75XX industrial managed switch on this webpage.  
To enable the PROFINET, the users can check the Enabled box behind the PROFINET field. The  
webpage also displays the Device Name and DIP Switch State as shown in Figure 2.146. The  
PROFINET’s Packet Priority can also be enabled on this webpage and priority Queue number can  
also be chosen from the dropdown list. Note that the higher the queue number, the higher the  
precedence for the packet scheduling.  
128  
Figure 2.146 PROFINET Setting Webpage, example on EH7512  
2.17.2 PROFINET’s I&M  
Identification and Maintenance (I&M) is an integral part of each PROFINET Device implementation. It  
provides standardized information about a device and its parts. I&M’s Information is accessible through  
PROFINET Record Objects and is always bound to a sub module belonging to the item to be described.  
There are two I&M objects: I&M0 and I&M1. The I&M0 objects provide Vendor ID and Software (SW)  
Revision as shown in Figure 2.147. The I&M1 objects provide a non-volatile storage for PROFINET  
related information called Function Tag and Location Tag in which the users can enter the information  
and save them on the switch as shown in Figure 2.147. The information is stored by the device in non-  
volatile memory. After entering the desired information on the I&M1, please click the Update button to  
save them on the managed switch.  
Figure 2.147 PROFINET I&M  
129  
2.17.3 PROFINET MRP  
The Media Redundancy Protocol (MRP) is a data network protocol for Ethernet switch standardized by  
the International Electro technical Commission as IEC 62439-2. MRP is mostly used in and suitable for  
Industrial Ethernet applications. It allows rings of Ethernet switches to overcome any single failure with  
recovery time much faster than those achievable by Spanning Tree Protocol. It supports very fast failure  
recovery time. For example, a worst-case recovery time for 14 switches is about 10ms and for 50  
switches is about 30ms.  
The MRP includes following properties.  
It operates at the MAC layer of the Ethernet switches.  
It is a ring topology.  
Any single failure can be recovered.  
For switches in the network, there can be two roles:  
o
o
Ring manager (MRM)  
Ring client (MRC)  
For ring ports, there are three possible statuses: disabled, blocked, and forwarding.  
o
o
o
Disabled ring ports drop all the received frames.  
Blocked ring ports drop all the received frames except the MRP control frames.  
Forwarding ring ports forward all the received frames.  
In normal case, one of the MRM ring ports is blocked to avoid looping and both ring ports of all  
MRCs are forwarding.  
When a path of the ring fail, the other port on the MRM will become active and forwarding.  
The Media Redundancy Protocol (MRP) menu under the PROFINET section enables an  
implementation of a redundant PROFINET communication through ring topology without the need for  
switches. Figure 2.148 shows the MRP Setting webpage. Please follow the outlined steps here to setup  
the PROFINET’s MRP:  
1. Enter a desired VLAN ID in the field at the bottom of the MRP Setting webpage and click Add  
button as shown in Figure 2.148.  
Figure 2.148 MRP Setting Webpage  
2. After the MRP Ring is created with the desired VLAN, there will be an entry of the MRP VLAN  
on the table at the top of the page as shown in Figure 2.149. There will also be two new buttons  
130  
at the end of the entry: Configure and Remove. The users can click on the Configure button  
the continue setting up the MRP Ring on the managed switch.  
Figure 2.149 Example of PROFINET's MRP VLAN Entry  
Table 2.62 Description of MRP Setting Webpage  
Label  
Description  
Factory Default  
Depend  
VLAN  
MRP Ring VLAN ID  
Role State  
Role status setting (Manager or Client)  
Port number and port status (Link Down, Blocked,  
Forwarding).  
Client  
Port1  
1st Ring Port  
Port number and port status (Link Down, Blocked,  
Forwarding).  
Port2  
2nd Ring Port  
Configure State  
Enabled or Disabled state of MRP Ring function  
Disabled  
3. After clicking the Configure button on the desired entry, a new webpage called MRP Ring  
Setting will show up as shown in Figure 2.150.  
Figure 2.150 MRP Ring Setting Webpage  
4. Then, the users can set MRP Ring parameters for the current switch, which are the Status, 1st  
Ring Port, 2nd Ring Port, and Rote State as described earlier. Table 2.63 summarizes the  
description of MRP Ring Setting parameters.  
5. Click on the Update button to allow the configuration to take effect. Note that if there is other  
ERPS Ring Topology already setting up on the managed switch there may be an error message  
popping up as shown in Figure 2.151. Therefore, the users should disable the ERPS/Ring  
131  
(Section 2.15.1) and DIP Switch Control (Section 2.3.12) first before setting up this MRP Ring.  
Figure 2.151 MRP Ring Setting Error Message  
Table 2.63 Descriptions of MRP Ring Setting  
Label  
Description  
Factory Default  
Display the current MRP Ring VLAN ID to be  
configured.  
Depend  
Ring VLAN  
Status  
Disabled or Enabled the ring function.  
Select the 1st Ring Port from the dropdown list.  
Select the 2nd Ring port from the dropdown list.  
Select the role status to be either Ring Client or Ring  
Manager.  
Disabled  
Port1  
Port2  
1st Ring Port  
2nd Ring Port  
Client  
Role Status  
2.18 EtherNet/IP  
EtherNet/IP is an industrial Ethernet network that combines standard Ethernet technologies with the  
media-independent Common Industrial Protocol (CIP). EtherNet/IP uses both of the most widely  
deployed collections of Ethernet standards (the Internet Protocol suite and IEEE 802 standard) to define  
the features and functions for its transport, network, data link, and physical layers. CIP uses its object-  
oriented design to provide EtherNet/IP with the services and device profiles needed for real-time control  
applications and to promote consistent implementation of automation functions across a diverse  
ecosystem of products.  
EtherNet/IP classifies Ethernet nodes as predefined device types with specific behaviors. EtherNet/IP  
has the following properties:  
Transfer of basic I/O data via User Datagram Protocol (UDP)-based implicit messaging  
Uploading and downloading of parameters, setpoints, programs and recipes via TCP (i.e.,  
explicit messaging.  
Polled, cyclic, and change-of-state monitoring via UDP  
One-to-one (unicast), one-to-many (multicast), and one-to-all (broadcast) communication via  
IP  
EtherNet/IP makes use of well-known TCP port number 44818 for explicit messaging and UDP  
port number 2222 for implicit messaging  
EtherNet/IP is an application layer protocol that is transferred inside a TCP/IP Packet. EtherNet/IP  
defines the way data is organized in a TCP or UDP packet. All devices on an EtherNet/IP network  
present data to the network as a series of data values called attributes grouped with other similar data  
values into sets of attributes called Objects. Figure 2.152 shows the EtherNet/IP section on the  
132  
managed switch.  
Figure 2.152 EtherNet/IP Dropdown Menu  
2.18.1 EtherNet/IP Settings  
To setup the EtherNet/IP feature on the EHG75XX industrial managed switch simply check the Enabled  
box behind the EtherNet/IP and click the Update button as shown in Figure 2.153.  
Figure 2.153 EtherNet/IP Setting Webpage  
133  
2.19 Client IP Setting  
The EHG75XX industrial managed switch has two different approaches for setting up the IP addresses  
for the devices connected to its ports. The following are the submenus under the Client IP Setting  
section:  
1. DHCP Relay Agent,  
2. DHCP Mapping IP.  
Figure 2.154 shows the dropdown menus under the Client IP Setting section.  
Figure 2.154 Client IP Setting Dropdown Menu  
2.19.1 DHCP Relay Agent  
A DHCP relay agent is a small program that relays DHCP/BOOTP messages between clients and  
servers on different subnets. DHCP/BOOTP relay agents are parts of the DHCP and BOOTP standards  
and function according to the Request for Comments (RFCs).  
134  
A relay agent relays DHCP/BOOTP messages that are broadcast on one of its connected physical  
interfaces, such as a network adapter, to other remote subnets to which it is connected by other physical  
interfaces. Figure 2.155 shows the DHCP Relay Agent setting webpage. The users can enter up to  
four DHCP/BOOTP server IP addresses in the fields: Server IP 1, Server IP 2, Server IP 3, and Server  
IP 4. Then the users can enable the DHCP Relay by checking the Enabled box behind the DHCP Relay  
option.  
The users can also have a choice to enable DHCP’s Option 82 which is the DHCP Relay Agent  
Information Option. When this Option 82 is enabled, the switch will insert information about the client’s  
network location into the packet header of DHCP request coming from the client on an untrusted  
interface. Then, the switch will send the modified request to the DHCP server. The DHCP server will  
inspect the option 82 information in the packet header and use it to generate the IP address or other  
parameters for the client. When the DHCP server returns the response to the switch, the switch will  
remove the option 82 information from the response packet and forward it to the client. The Option 82  
Type field in Figure 2.155 can be chosen from IP, MAC, Client-ID, or Other in the dropdown list. When  
Other type is selected, the Option 82 Value field will become active for entering the desired value by  
the users. After finishing the DHCP Relay Agent setup, please click on the Update button to allow the  
change to take effect.  
Figure 2.155 DHCP Relay Agent Webpage  
2.19.2 DHCP Mapping IP  
The user can reserve or map IP addresses to the device connected on the selected ports in this  
submenu. Figure 2.156 shows the DHCP Mapping IP webpage where the desired IP address can be  
enter into the field for each Port. After finishing the DHCP IP mapping to the port(s), please click on the  
Update button to allow the change to take effect.  
135  
Figure 2.156 DHCP Mapping IP Webpage  
136  
2.20 System  
This last section on the WebUI interface of the EHG75XX managed switch provides miscellaneous tools  
for network administrator to check the internal status of the switch via system log, warning, and alarm  
notification. It also allows the administration to perform device maintenance operations such as backing  
up and restoring device’s configuration, updating the firmware, reversing the device to factory default  
setting, or reboot the system/device. Figure 2.157 shows all the dropdown menus under the System  
section.  
Figure 2.157 System Dropdown Menu  
It is important for network administrators to know what’s happening in their networks, and know where  
the events are happening. However, it is difficult to promptly locate network devices that are at the  
endpoints of systems. Thus Ethernet switches connected to these devices play an important role of  
providing first-moment alarm messages to network administrators, so that network administrators can  
137  
be informed instantaneously when accidents happen. Email alerts and relays outputs under the System  
section is used to provide fast and reliable warning alerts for administrators.  
2.20.1 System Log  
The submenus under the System Log are: Setting and Log.  
2.20.1.1 System Log Settings  
Figure 2.158 shows System Log related settings configuration. The actual recorded log event will be  
shown in Event Log on the next subsection. Here the users can enable how the log will be saved and/or  
delivered to other system. The log can be save to flash memory inside the managed switch and/or it  
can be sent to a remote log server. The users need to select the log level and provide the IP address  
of a remote log server and the service log service port. Please click on the Update button after finishing  
the setup. Table 2.64 describes the details of parameters setting for the system log.  
Figure 2.158 System Log Setting Webpage  
Table 2.64 Descriptions of System Log Settings  
Label  
Description  
Factory  
Default  
Uncheck  
Enable Log Event to  
Flash  
Checked: Saving log event into flash memory.  
The flash memory can keep the log event files  
even if the switch is rebooted.  
Unchecked: Saving log event into RAM  
memory. The RAM memory cannot keep the log  
event files after each reboot.  
Log Level  
Set the log level to determine what events to be 3: (LOG_ERR)  
displayed on the next webpage (Log). The level  
selection is inclusive. For example, if  
3 :(Log_ERR) is selected, all 0, 1, 2 and 3 log  
levels will be implied.  
Range from Log 0 to Log 7.  
Enable  
Server  
System  
Log Checked: Enable Syslog Server.  
Uncheck: Disable Syslog Server.  
If enabled, all recorded log events will be sent to  
the remote System Log server.  
Uncheck  
System Log Server IP  
System Log Server  
Service Port  
Set the IP address of Syslog server  
Set the service port number of System Log  
server.  
0.0.0.0  
514  
Range from Port 1 to Port 65535.  
138  
2.20.1.2 System Log - Log  
Figure 2.159 shows an example of all of the event’s logs. Note that they are sorted by date and time.  
Table 2.65 provides explanation of each column and the button’s functions on the System Log webpage.  
Figure 2.159 Event Log Webpage  
Table 2.65 Descriptions of Event Log  
Label  
Description  
Index  
Date  
Time  
Indicate the index of a particular log event  
Indicate the system date of the occurred event  
Indicate the time stamp that this event occurred  
Indicate how long the system (managed switch) has  
been up since this event occurred.  
Indicate the level of this event.  
Up Time  
Level  
Event  
Details description of this event.  
Previous Page  
Next Page  
Show All  
Clear All  
Download  
Display events on the previous page.  
Display events on the next page  
Click to display all events.  
Click to clear all events  
Download or save the event log to the local computer  
2.20.2 Warning/Alarm  
The warning/alarm section as shown in Figure 2.160 consists of three subsections: Setting, SMTP  
Setting, and Log.  
Figure 2.160 Warning/Alarm Dropdown Menu  
139  
2.20.2.1 Warning/Alarm Settings  
There are three different types of Warning or Alarm: Link Status Alarms, Power Status Alarms, and  
System Log Alarms as shown in Figure 2.161. The Link Status Alarms are related to the activities of  
particular port(s). Power Status Alarms keep track of power status of the switch based on the available  
input connectors. System Log Alarms are related to the overall functionalities of the switch. This  
webpage allows the users to configure how each type of the alarm events will be sent or notify the users.  
For link status and power status alarms, there are three possible notification methods via Relay, E-mail,  
and Alarm LED. For System Log alarms, there are only two possible notification methods via Relay and  
E-mail. After finish configuring the alarms, please click the Update button. Note that there is an Assert  
Relay button which can be used to test an external Relay connected to the managed switch.  
Figure 2.161 Webpage of Warning Event Selection  
140  
In Link Status Alarms, users have three conditions whether to send notifications via Relay, E-mail, or  
Alarm LED in case if Link is UP, Link is Down, or Link is UP/DOWN. Table 2.66 summarizes the link  
status alarm event selection. Note the users can enable the alarm events for all ports simultaneously  
by checking the box in front of the All entries.  
Table 2.66 Descriptions of Link Status Alarm Event Selection  
Label  
Description  
Factory  
Default  
-
Port  
Indicates each port number.  
Disabled: Disables alarm function, i.e. no alarm  
message will be sent.  
Disabled  
Link Up: Alarm message will be sent when this  
port/link is up and connection begins.  
Port state event  
Link Down: Alarm message will be sent when this  
port/link is down and disconnected.  
Link Up /Down: Alarm message will be sent whenever  
theres a change, i.e. connection begins or connection  
disrupted.  
In power status alarms, the users have two conditions to send notification (via Relay, E-mail and Alarm  
LED) which are Power On, or Power Off. Table 2.67 summarizes the Power Status Alarm event  
selection.  
Table 2.67 Descriptions of Power Status Alarm Event Selection  
Label  
Description  
Factory  
Default  
Power  
Indicate specific power supply  
Disable: Disables alarm function.  
Disabled  
Disabled  
Power status event Power On: Sends an alarm when power is turned on.  
Power Off: Sends an alarm when power is turned off.  
In System Log Alarms, the users have can only send notification via Relay and E-mail. Table 2.68  
describes the System Log Level which can be selected for the System Log Alarm event notification.  
Table 2.68 Descriptions of System Log Alarm Event Selection  
Label  
Description  
Factory Default  
Disable: Disable power status detection.  
Disabled  
0: (LOG_EMERG): Enable log level 0~7 detection.  
1: (LOG_ALERT): Enable log level 1~7 detection.  
2: (LOG_CRIT): Enable log level 2~7 detection.  
3: (LOG_ERR): Enable log level 3~7 detection.  
4: (LOG_WARNING): Enable log level 4~7 detection.  
5: (LOG_NOTICE): Enable log level 5~7 detection.  
6: (LOG_INFO): Enable log level 6~7 detection.  
7: (LOG_DEBUG): Enable log level 7 detection.  
System log event  
See note below for specific log level description.  
*NOTE:  
- Log levels are inclusive. In other words, when log level is set to 0, an alarm is triggered whenever 0,  
141  
1, 2… 6, and/or 7 happens. When log level is set to 5, an alarm is triggered whenever 5, 6, and/or 7  
happens.  
0: Emergency: system is unstable  
1: Alert: action must be taken immediately  
2: Critical: critical conditions  
3: Error: error conditions  
4: Warning: warning condition  
5: Notice: normal but significant condition  
6: Informational: informational messages  
7: Debug: debug-level messages  
2.20.2.2SMTP Settings  
Simple Mail Transfer Protocol (SMTP) is an internet standard for email transmission across IP networks.  
In case any warning events occur as configured in Section 2.20.2.1, the system can send an alarm  
message to users by e-mail. Here, the users will be allowed to modify E-mail-related settings for sending  
the system alarms (Link Status, Power Status, and System Log), as shown in Error! Reference source  
not found..  
Figure 2.162 SMTP Setting Webpage  
An example of SMTP Setting is shown in Figure 2.163. After entering all the necessary fields, please  
click on the Update button to allow the setting to take effect. Note that the users can try to send a Test  
E-mail according the the SMTP setting on this webpage by clicking on the Send Test E-mail button.  
The description of each SMTP Setting parameter is summarized in Table 2.69.  
142  
Figure 2.163 Example of SMTP Setting  
Table 2.69 Descriptions of SMTP Setting  
Label  
Description  
Factory  
Default  
NULL  
SMTP Server  
Configure the IP address of an out-going e-mail  
server  
Authentication  
Enable or disable authentication login by  
checking on the box.  
Disable  
(Unchecked)  
If enabled, SMTP server will require  
authentication to login. Thus, the users will also  
need to setup User Name and Password to  
connect to the SMTP server  
TLS/SSL  
Enable or disable Transport Layer Security (TLS)  
or Secure Sockets Layer (SSL) which is an  
encryption mechanism for communication with  
the SMTP Server  
Disable  
(Unchecked)  
Username  
Password  
Set the user name (or account name) to login.  
Max. 31 characters.  
Set the account password for login.  
Max. 15 characters.  
NULL  
NULL  
E-mail Address of Sender  
Mail Subject  
Configure the sender e-mail address  
Type the subject of this warning message.  
Max. 31 characters.  
NULL  
NULL  
E-mail Address of 1st Set the first receiver’s E-mail address.  
NULL  
NULL  
NULL  
NULL  
-
Recipient  
E-mail Address of 2nd Set the second receiver’s E-mail address.  
Recipient  
E-mail Address of 3rd Set the third receiver’s E-mail address.  
Recipient  
E-mail Address of 4th Set the fourth receiver’s E-mail address.  
Recipient  
Update  
Update these modifications on the managed  
switch  
Send Test E-mail  
A test email can be sent to recipient(s) above to  
check accuracy.  
-
143  
2.20.2.3 Log  
Managed switches warns its users in case any event occurs. A table called Warning/Alarm Log in this  
section displays the warning events as shown in Figure 2.164 Warning/Alarm Log Webpage. At the top  
of the table, the users can click on the Reset Relay button to turn off the Relay or click on the Clear  
Log to remove all entries in the Warning/Alarm Log table. To obtain the latest event on the able, the  
users have to click on the Refresh button.  
Figure 2.164 Warning/Alarm Log Webpage  
An example of Warning/Alarm Log table is shown in Figure 2.165. Note that the display format and  
buttons is slightly different from the current EGH75XX format above. A short list of alarm messages is  
shown on the top portion of the web browser interface.  
Figure 2.165 Example of Warning Events  
Table 2.70 Descriptions of Warning / Alarm Log  
Label  
Description  
Factory  
Default  
Reset Relay  
Sets Hardware Relay Alarm to off.  
Relay is off  
Clear Log  
Refresh  
Clears all warning events that are displayed.  
Obtain the latest Warning / Alarm events  
Display the index of the Warning/Alarm events as  
an entry number over a total number of events  
The date that the alarm/event occurred.  
The time that the alarm/event occurred.  
The duration of time since the start up time of the  
switch until the alarm/event occurred.  
-
-
-
Index  
Date  
Time  
-
-
-
Startup Time  
Events  
Description of the alarm events  
-
144  
2.20.3 Denial of Service  
Denial of Service (DoS) is a malicious attempt to make a machine or network resource unavailable to  
its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host  
connected to the Internet. EHG75XX industrial managed switch is designed so that uses can filter out  
various types of attack as shown in Denial of Service setting webpage (Figure 2.166). The followings  
are some vulnerable attacks that can be prevented by the EHG75XX switch function.  
Figure 2.166 Denial of Service Setting Webpage  
First is the Local Area Network (LAND) DoS attack. LAND is a layer 4 DoS attack in which the attacker  
sets the source and destination information of a TCP segment to be the same. Specifically, TCP SYN  
packet is created such that the source IP and port are set to be the same as the destination address  
and port, which in turn is set to point to an open port on a Victim’s machine. A vulnerable machine would  
receive such a message and reply to the destination address effectively sending the packet for  
reprocessing in an infinite loop. A vulnerable machine will crash and freeze due to the packet being  
repeatedly processed by the TCP stack. To enable/disable the protection against the Local Area  
Network (LAND) DoS attack, click Enabled box on LAND packet (SID=DID) function.  
Second vulnerability attack is TCP fragmentation attacks also known as tear drop attack, which is  
targeting TCP/IP reassembly mechanism, preventing them from putting together fragmented data  
packets. As a result, the data packets overlap and quickly overwhelm the victim’s servers, causing them  
to fail. To enable/disable the protection against the TCP fragment DoS attack, click Enabled box on  
TCP Fragment function. However, to set the mitigation method, some certain inputs are needed to set  
rules of filtering. For example, whether the first fragment is allowed or not and the minimum TCP header  
size that is allowed. In some datalink protocols such as Ethernet, only the first fragment contains the  
full upper layer header, meaning that other fragments look like beheaded datagrams. No additional  
overhead imposed over network because all fragments contains their own IP header. Only the first  
fragment contains the ICMP header and all remaining fragments are generated without the ICMP  
header.  
145  
The third vulnerability is called TCP flag DoS attack. The attack sends out TCP packets with flag  
indicating that they are ACK packets. This attack is similar to SYN flood except SYN flood also open a  
connection with the server. Although the devices are mostly tuned for more common attack as SYN  
flood. TCP flag DOS attack will force the server to keep dropping the packets, causing resource  
exhaustion. To enable/disable the protection against the TCP Flag DoS attack or called ACK flood, click  
Enabled box on TCP Flag function.  
The fourth vulnerability is called L4 port DoS attack. There are various types of L4 port DoS attack. In  
UDP attack, a large number of UDP packets are sent to victim until it is overloaded. UDP-Lag attacks  
in bursts as to not hit the target offline completely. SUDP attack is the same as UDP but spoofs the  
request to make it harder to mitigate. SYN/SSYN/ESSYM attacks are abuse the hand shake of the TCP  
protocol until the victim is overloaded. DNS/NTP/CHARGEN/SNMP attacks are an amplified UDP attack  
that abuses vulnerable server by sending a spoofed request with the targets IP as the sender. The  
servers then send the target the information overloading the system. To enable/disable the protection  
against all these L4 Port DoS attacks, click Enabled box on L4 Port function.  
Last vulnerability is so called ICMP fragmentation attack. The attack involves the transmission of  
fraudulent ICMP packets that are larger than the network’s MTU. In this switch, administrators can filter  
these packets out by enabling ICMP function and set Maximum ICMP size range from 512 to 1023  
bytes. As these ICMP packets are fake, and are unable to be reassembled, the target server’s resources  
are quickly consumed, resulting in server unavailability. To enable/disable the protection against the  
ICMP DoS attack, click Enabled box on ICMP function. Table 2.71 provides descriptions of the Denial  
of Service Setting.  
Table 2.71 Descriptions of Denial of Service Setting  
Label  
Description  
Factory  
Default  
Disabled  
LAND packets  
Enabled: Enabled prevention over the attack  
using TCP SYN packet that has the same source  
and destination’s IP and port.  
TCP Fragment  
TCP Flag  
Enabled: Enabled prevention over the TCP  
fragmentation attack which is targeting TCP/IP  
reassembly mechanism  
Enabled: Enabled prevention over the TCP flag  
DOS attack which force the server to keep  
dropping the packets, causing resource  
exhaustion.  
Disabled  
Disabled  
L4 Port  
Enabled: Enabled prevention over various types  
of L4 port DoS attacks that are intended to  
overload the server.  
Enabled: Allow filtering ICMP that has packet  
size higher than the maximum ICMP size defined  
in the next field  
Disabled  
Disabled  
512  
ICMP  
Max ICMP Size  
512 to 1023 bytes  
146  
2.20.4 Backup/Restore Config.  
In Backup/Restore Config function, the current configuration of the EHG75XX/EH75XX industrial  
managed switch can be downloaded to a local computer and saved it as a backup. Additionally, the  
users can restore a previously backup configuration from a local computer to the EHG75XX/EH75XX  
industrial managed switch. It will replace the current configuration. These backup and restore function  
can be done through two different protocols: HTTP or TFTP. Figure 2.167 depicts the Backup/Restore  
Configuration dropdown menu.  
Figure 2.167 Backup/Restore Config. Dropdown Menu  
147  
2.20.4.1 Backup/Restore Config. Via HTTP  
Figure 2.168 shows the webpage for Backup/Restore the configuration via HTTP. It is divided into two  
parts: Backup the Configuration and Restore the Configuration. When clicking on the Download  
button on the upper part of the page (Backup the Configuration), the users will be prompt to Opening  
the file name IP-10.0.50.1.bin by an application or to Save File to a destination. Choosing to Save File  
will back up the switch’s current configuration to your local drive on the local computer.  
To restore a configuration file to the switch, please move down to the Restore the Configuration part,  
then click the Browse… button to choose a configuration file from the local drive. Before clicking the  
Upload button, the users can check any of the options below the upload file which are to Keep the  
current username & password setting and to Key the current network setting. This will help  
prevent the users from the necessity to logging-in using a previously stored username, password or  
network configuration after settings are restored.  
Figure 2.168 Backup/Restore Configuration via HTTP  
2.20.4.2 Backup/Restore Config. Via TFTP  
Trivial File Transfer Protocol (TFTP) is designed to be small and easy to implement. The users are  
allowed to upload configuration settings to a TFTP server as a backup copy, and download these  
settings from a TFTP server when necessary to restore or replace the configuration of the  
EHG75XX/EH75XX industrial managed switch. Figure 2.169 shows the TFTP webpage which is divided  
into three parts: Download the Configuration from TFTP, Upload the Configuration to TFTP, and  
DHCP Option 66/67 Setting. Table 2.72 summarizes the descriptions of TFTP Setting.  
To download a configuration file from a TFTP server, the user need to specify the IP address  
of the TFTP server and the Remote File Name. Then, click the Download button.  
To upload a configuration file from a TFTP server, the users need to specify the IP address of  
148  
the TFTP server and the Desired File Name. Then, click the Upload button.  
The last part of the TFTP page is the DHCP Option 66/67 Setting. This feature enables the  
managed switch to learn of the TFTP Server Name, which is a data in DHCP IPv4 packet Option  
66 (RFC2132), and Filename, which is a data in DHCP IPv4 packet Option 67 (RFC2132).  
Checking the Enabled box and then click on the Update button to set this feature.  
Figure 2.169 Backup/Restore Configuration via TFTP  
Table 2.72 Descriptions of TFTP Settings  
Label  
Description  
Factory  
Default  
NULL  
TFTP Server IP Address Sets the IP address of the remote TFTP server  
domain name.  
Remote File Name  
Download  
Type in name of the file to be downloaded.  
Click to start download remote configuration into  
the Switch.  
NULL  
-
Desired File Name  
Upload  
Type in name of the file to be uploaded.  
Click to start upload Switch configuration to the  
remote TFTP server.  
NULL  
-
Option 66/67  
Update  
Enable this option to allow the managed switch  
to learn of TFTP Server Name and the filename  
to be used from a DHCP packet  
Disable  
-
Update the setting of DHCP Option 66/67 setting  
149  
2.20.5 Firmware Update  
The users can update the device firmware via web interface as shown in Figure 2.170. To update the  
firmware, the users can download a new firmware from Atop’s website and save it in a local computer.  
Then, the users can click Browse… button and choose the firmware file that is already downloaded.  
The switch’s firmware typically has a “.dld” extension such as EHG750X-K150A150.dld. After that, the  
users can click Update button and wait for the update process to be done. Alternatively, the firmware  
update can also be performed using the Device Management Utility discussed in Chapter 5.  
Note: please make sure that the switch is plug-in all the time during the firmware upgrade.  
Figure 2.170 Firmware Update Webpage  
2.20.6 Factory Default Setting  
When the managed switch is not working properly, the users can reset it back to the original factory  
default settings by clicking on the Reset button as shown in Figure 2.171.  
Figure 2.171 Factory Default Setting Webpage  
2.20.7 Reboot  
An easy reboot function is provided in this webpage requiring only one single click on the Reboot button  
as shown in Figure 2.172.  
Figure 2.172 Reboot Webpage  
150  
3 Configuring with a Serial Console  
A managed switch can also be configured by using a serial console. Note that a special serial console  
cable is required to connect to the console port on top of the EHG75XX’s chassis. Please contact Atop  
Technologies to obtain the cable, is needed. This method is similar to the web browser one. The options  
are the same, so users can take the same procedures as those examples in Chapter 2.  
3.1 Serial Console Setup  
After users install Tera Term, perform the following steps to access the serial console utility.  
1. Start Tera Term. In New Connection window, select serial and appropriate port.  
Figure 3.1 Setting of New Connection in Tera Term Program  
2. Click Setup -> Choose Serial Port.  
Figure 3.2 Setup Menu  
151  
3. The Serial Port Setup window pops up. Select an appropriate port for Port, 115200 for Baud  
Rate, 8 bit for Data, none for Parity, and 1 bit for Stop, as shown in Fig.3.3.  
Figure 3.3 Setting for the Serial Port  
4. After finishing settings and clicking OK, a Command Line Interface (CLI) will be brought up.  
152  
3.2 Command Line Interface Introduction  
The Command Line Interface supports two types of privileges, which are operator and manager  
privileges. Users with operator privileges may only view the information, while those with manager  
privileges are allowed to view information and configure settings. Operator and manager privileges are  
initially entered without the need for passwords, but a user may be assigned with a password for both  
the operator and manager privileges. If passwords are assigned, then when the user attempts to enter  
CLI on the next time, they will need to enter the correct username and password.  
If a user enters the password for the operator, then the prompt changes to indicate operator privilege.  
User is now in the “user” mode:  
Switch>  
If a user enters the password for the manager, then the prompt changes to indicate manager privilege.  
User is now in the “privileged” mode:  
Switch#  
If a user is in the user mode and wants to switch to the privileged mode, he/she may simply type in the  
command “enable” and then enter the correct username and password after the prompt:  
Switch> enable  
Username: (enter username here)  
Password: (enter password here)  
Switch#  
To enter the “configuration” mode, you need to be in the privileged mode, and then type in the command  
configure”:  
Switch# configure  
Switch(config)#  
An illustration of the modes, related privileges and screen prompt is shown in Figure 3.4.  
Configuration Mode  
Manager Privilege  
Switch(config)#  
User Mode  
Privileged Mode  
Manager Privilege  
Switch#  
enable  
exit  
enable  
exit  
Operator Privilege  
Switch>  
Figure 3.4 Modes, privileges and promts  
Users may enter “?” at any command mode and the CLI will return possible commands at that point,  
along with some description of the keywords:  
Switch(config)# ip ?  
Address  
default-gateway Set default gateway IP address  
dns Set DNS IP address  
Users may use the <Tab> key to do keyword auto completion:  
Set IP address and subnet mask  
153  
Switch(config)# syst <Tab>  
Switch(config)# system  
3.3 General Commands  
The table below shows some useful commands that may be used anytime when using serial console.  
Table 3.1 Command Descriptions  
Commands  
Descriptions  
Turn on privileged mode  
Enable  
Disable  
Turn off privileged mode  
Configure  
Enter configuration mode  
?
List all available option.  
Exit  
Go back to the previous menu.  
Help  
Logout  
history <0~256>  
Show any available helpful information  
Log out of CLI  
Set the number of command to remember as history  
Ex: history 5: memorize 5 previous commands.  
Disable command history  
No history  
Show history  
List last history commands  
Hostname <string>  
no hostname  
[no] password <manager |  
operator | all>  
Set switch name  
Reset the switch name to factory default setting.  
Set or remove username and password for manager or  
operator. The manager’s username and password are also  
used by the web user interface (web browser method of  
configuration).  
154  
3.4 Command Example  
The serial console is another method to add/delete/change configuration, same as the web browser  
method. These two methods have similar functionalities. The picture below shows all the options on  
CLI. Two examples of making configurations: Administration and Spanning Tree using serial console  
method, which are shown in the following sub-sections, are the same as what are explained in Chapter  
2. The only difference is that the web browser method is used in Chapter 2.  
Figure 3.5 Example of Commands  
3.4.1  
Administration Setup using Serial Console  
This section shows how users can find the administrative information and make changes using  
commands. Detailed explanations of each technical term can be found in Chapter 2 of this manual.  
155  
Table 3.2 Descriptions of Administrative Commands for Setting Up  
Command  
Description  
sntp <IP-add> <before-utc | after-utc>  
<0 ~ 24 hours>  
Starts SNTP service  
[no] dhcp  
Enable or disable DHCP  
show dhcp  
Shows DHCP status  
ip address<ip-addr> <ip-mask>  
Ip default-gateway <ip-addr>  
show ip  
Set IP address and subnet mask  
Set the gateway IP address  
Show IP address, subnet mask, and the default  
gateway  
Boot  
Use this command to reboot the switch  
Display the running configurations of the switch.  
Backup the switch configurations.  
Reset to default factory settings at the next boot  
time.  
Show running-config  
copy running-config startup-config  
erase startup-config  
Show arp  
Ping ip-addr <1~999>  
Show the IP ARP translation table  
Send ICMP Echo-Request to the network host.  
<1 ~ 999> specifies the number of repetitions.  
Switch to shell mode. Shell mode may do shell  
command.  
Exec  
3.4.2  
Spanning Tree Setup using Serial Console  
This section shows how users can see spanning tree information and make changes using commands.  
Detailed explanations of each technical term can be found in Chapter 2 of this manual.  
Table 3.3 Descriptions of Commands for Setting up Spanning Tree  
Command  
[no] spanning-tree  
Description  
Enable/disable spanning-tree  
Spanning-tree forward-dalay<11~30>  
Set the amount of forward delay in seconds.  
Ex: spanning-tree forward-delay 20: Set forward  
delay time to 20 seconds.  
Spanning-tree hello-time<1~10>  
Set hello time in seconds  
Spanning-tree maximum-age<6~40>  
Set the maximum age of the spanning tree in  
seconds  
Spanning-tree priority<0~61440>  
Spanning-tree port path-cost <0 ~  
2E8><port #>  
Spanning-tree port priority <0 ~  
240><port #>  
Set priority of the spanning tree bridge  
Set path cost for a specific port  
Set priority to a specific port  
Show spanning-tree  
Show spanning-tree information  
Show spanning-tree port <port #>  
[no] spanning-tree debug  
Spanning-tree protocol-version  
<stp/retp>  
Show port information  
Enable or disable debugging of the spanning tree  
Choose protocol version.  
A detailed description of stp/rstp can be found in  
section Spanning Tree of chapter 2  
[no] spanning-tree port mcheck <port#> Force the port to transmit RST BPDU.  
[no] spanning-tree port edge-port <port  
Set the port to be edge connection.  
#>  
[no] spanning-tree port non-stp <port#> Enable or disable spanning tree protocol on this  
port.  
[no] spanning-tree port point-to-point-  
mac <auto | true | false> <port #>  
Set the port to be point to point connection.  
Auto: Specify point to point link auto detection.  
True: Set the point to point link to true.  
False: Set the link to false.  
156  
4 Configuring with a Telnet Console  
An alternative configuration method is the Telnet method and it is described in this chapter.  
4.1 Telnet  
Telnet is a remote terminal software to login to any remote telnet servers. It is typically installed in most  
of the operating systems. In order to use it, users open a command line terminal (e.g., cmd.exe for  
Windows Operating System).  
4.2 Telnet Log-in  
After the command line terminal is opened, type in “telnet 10.0.50.1” as shown in Figure 4.1. Note that  
telnet command needs to follow by IP address or domain name. In this example, the default IP address  
is 10.0.50.1. If users change the switch IP address, the IP address to log-in should be changed to match  
the new switch IP address.  
Figure 4.1 Telnet Command  
157  
4.3 Command Line Interface for Telnet  
After input the telnet command line, the switch’s interface is displayed as shown in Figure 4.2.  
Figure 4.2 Log-in Screen using Telnet  
Users will see the welcome screen to the switch interface. It is important to note that there is no  
password protection to the default telnet log-in method. From Chapter 3, configuring through telnet is  
similar to configuring through the serial console. Users are automatically logged into the privileged mode.  
The configuration commands are also similar to the serial console methods. (Please refer to Chapter 3  
for more information on configuration.)  
4.4 Commands in the Privileged Mode  
When users do not know the commands to use for the command line configuration, users type in “?”  
and the commands are displayed on screen as shown in Figure 4.3.  
Figure 4.3 Commands in the Privileged Mode  
158  
4.5 Commands in the Configuration Mode  
When users type in “?” in configuration mode, a long list of commands is displayed on screen as shown  
in Figure 4.4.  
Figure 4.4 Commands in the Configuration Mode  
Table 4.1 shows all commands that can be used to configure the switch in the configuration mode.  
Table 4.1 Commands in the Configuration Mode  
Commands  
alert  
Descriptions  
Alert information  
boot  
Reboot the switch  
cos-mapping  
clear  
copy  
CoS mapping information  
Clear values in the destination protocol  
Copy configuration  
cring  
disable  
dscp-mapping  
dhcp  
Compatible-Ring configuration  
Turn off the privileged mode command  
DSCP mapping information  
DHCP information  
dot1x  
802.1x information  
dipswitch  
daylight-saving-time  
exit  
DIP Switch information  
Daylight Saving Time  
Exit the current mode and move to the previous mode  
159  
erase  
Erase the configuration  
erps  
ERPS information  
filter  
garp  
Filter the information of the source MAC address  
GARP information  
gvrp  
GVRP information  
help  
history  
ip  
Description of the interactive help system  
Set the number of history commands  
IP information  
igmp  
IGMP information  
ia-ring  
logout  
lldp  
iA-Ring configuration  
Log out of the system  
LLDP information  
lacp  
LACP information  
mac-age-time  
mirror-port  
mac-address-table  
no  
password  
port  
Enable age-out time for the MAC address  
The monitoring information of a Port  
Information of the MAC address table  
Negate a command or set to its defaults  
Password information  
Port information  
ping  
ptp  
Send ICMP ECHO_REQUEST to network hosts  
PTP information  
qos  
QoS information  
radius-server  
show  
stormfilter  
security  
system  
sntp  
Radius server information  
Show information of the current running system  
Storm filter on all kinds of traffic (Broadcast,Multicast,Unitcast)  
Security configuration of a static port  
System information  
Enable SNTP  
systemtime  
syslog  
smtp  
Configuration of the system time  
Syslog information  
SMTP configuration  
snmp  
SNMP information  
spanning-tree  
timeout  
trunk  
Spanning Tree Protocol  
Set the current CLI timeout  
Trunking information  
uring  
U-Ring configuration  
vlan  
VLAN information  
Note: Please see Chapter 3 for the details of switch configuration.  
160  
5 Device Management Utility  
Atop also provides a software utility called Device Management Utility to assist the users in configuring  
the product. The Device Management Utility was formerly called Device View or Serial Manager. The  
latest Device Management Utility is version 5.20. This chapter will describe how to use the Device  
Management Utility with the EHG75XX industrial managed switch. After installing the utility software on  
your PC. Please click on the Device Management Utility’s icon to start the program. Figure 5.1 illustrates  
the GUI of the Device Management Utility.  
Figure 5.1 Device Management Utility  
If the managed switch is on the same subnet as the PC that runs the Device Management Utility, the  
users should be able to find the switch on the list of the device as shown in Figure 5.1. If for some  
reason, it cannot be found, the user can click the first icon called Rescan on the icon bar to search for  
the device connected to the same subnet as the Device Management Utility. Depicts the Search icon.  
Figure 5.2 Rescan (Search) Icon  
To perform any task on the desired device, please click to select the entry of that particular device on  
the list inside the window of Device Management Utility. Typically, when the users double-click the entry,  
the Device Management Utility will connect to the switch and perform a login process.  
It is strongly recommended the users to setup the administration password for the managed switch for  
network security purpose. If no administration password is set, the Device Management Utility will be  
able to login to and change any configuration on the device.  
If the Local Login Setting was configured in Section 2.3.1, a login dialog will pop-up as shown in when  
the Device Management Utility try to select the Config by Browser menu under the Configuration  
pulldown menu or click on the fourth icon on the icon bar. The users then can enter the User Name  
and Password to verify the identity. Note that the User Name is typically set to “admin” for convenient.  
161  
Figure 5.3 Authentiction to Login to EHG75XX switch  
5.1 Network Setting  
While the device is selected, the user can configure the network parameters by clicking on the Network  
icon, the second icon on the icon bar as depicted in Figure 5.4. Alternatively, the users can click on the  
pulldown menu Configuration and select Network… menu.  
Figure 5.4 Network Configure Icon  
The Network Setting dialog window will pop-up as shown in Figure 5.5. The users can enable the  
DHCP options by checking the box in front of DHCP (Obtain an IP automatically) option. This will  
allow the device to get its new IP address and other network parameters from a DHCP server from the  
network. Alternatively, the users can manually set the IP address, Subnet mask, Gateway, and Host  
name.  
Figure 5.5 Network Setting Dialog  
After clicking on the OK button, another dialog window will pop-up to ask for authorization in modification  
of this managed switch. The users are required to enter the correct Password. Note that the User  
162  
Name is default as admin which cannot be changed. Then, click the Authorize button to allow the  
change of the network parameter.  
Figure 5.6 Administration Verification before Changing the Network Setting  
A warning dialog will pop-up as shown in Figure 5.7 to inform the users that the device will restart after  
the network configuration was changed. Note that if the configurations were not changed, it may be  
because of the wrong user name, password, or IP configuration. The users should check these  
password setting or network setting of the product.  
Figure 5.7 Warning Dialog before the Device Restart  
If the IP address was change, the users may need to search for the device again using the Rescan  
icon or the first icon on the icon bar.  
5.2 Topology Diagram  
Device management Utility comes with a visualization tool called Topology Diagram to automatically  
draw a network diagram. The users can select the Topology Diagram menu under the Configuration  
pulldown menu to start the visualization tool as shown in Figure 5.8. The current version of the Topology  
Diagram is 1.4.0. Note that the tools can display the device discovered by the Device Management  
163  
Utility and draw a connection between devices in the network that can be reached by the Device  
Management Utility. Note that to be able to use the Topology Diagram, the switch’s LLDP feature in  
Section 2.16.1 must be enabled.  
Figure 5.8 Topology Diagram  
Additional information can also be display on the diagram which are the Port number and the MAC  
address of the device that is currently connecting to the EHG75XX switch. Please select Show  
Information menu under the File pulldown menu. Figure 5.9 shows the result of additional information.  
164  
Figure 5.9 Show Information on Topology Diagram  
Note that the Topology Diagram can be used to check the Ring Topology. The user can select the  
RingCheck menu from the Advance pulldown menu.  
5.3 Firmware Update  
The Device Management Utility can be used to update firmware of the switch. To perform this task, the  
users can click on the fifth icon on the icon bar as shown in Figure 5.10. Alternatively, the Firmware  
Download… menu under the Firmware pulldown menu can also perform this task.  
Figure 5.10 Upgrade from Disk (Firmware Update) Icon  
165  
Figure 5.11 shows the dialog for Download Firmware from Disk. The window displays the current  
version of the firmware on the switch and provides the option to download either Kernel firmware or AP  
firmware to the switch. The users can choose a new and valid firmware (.dld extension) from the local  
PC and then clicking on the Upgrade button to perform the update.  
Figure 5.11 Dialog Window for Download Firmware from Disk  
166  
Appendix A: Glossary  
Term  
802.1  
Description  
A working group of IEEE standards dealing with Local Area Network.  
Provide mechanism for implementing Quality of Service (QoS) at the Media  
Access Control Level (MAC).  
IEEE standard for port-based Network-Access Control. It provides an  
authentication mechanism to devices wishing to attach to a LAN or WLAN  
Broadcast packets to all stations of a local network.  
Device that use services provided by other participants in the network.  
Data Encryption Standard is a block cipher that uses shared secret encryption.  
It’s based on a symmetric-key algorithm that uses a 56-bit key.  
Dynamic Host Configuration Protocol allows a computer to be configured  
automatically, eliminating the need for intervention by a network administrator.  
It also prevents two computers from being configured with the same IP  
address automatically. There are two versions of DHCP; one for IPv4 and one  
for IPv6.  
802.1p  
802.1x  
Broadcast  
Client  
DES  
DHCP  
Domain Name System is a hierarchical naming system built for any computers  
or resources connected to the Internet. It maps domain names into the  
numerical identifiers. For example, the domain name www.google.com is  
translated into the address 74.125.153.104.  
DNS  
Extensible Authentication Protocol is an authentication framework widely used  
by IEEE.  
EAP  
In star-formed physical transport medium, all stations can send data  
simultaneously. Collisions are detected and corrected through network  
protocols.  
Ethernet  
Provide access to other network components on the OSI layer model. Packets  
which are not going to a local partner are sent to the gateway. The gateway  
takes care of communication with the remote network.  
Gateway  
IEEE  
IGMP  
IP  
Institute of Electrical and Electronics Engineers  
Internet Group Management Protocol is used on IPv4 networks for  
establishing multicast group memberships.  
Internet Protocol  
Internet Protocol version 4 is the fourth revision of the Internet Protocol.  
Together with IPv6, it is the core of internet network. It uses 32-bit addresses,  
which means there are only 2^32 possible unique addresses. Because of this  
limitation, an IPv4 addresses became scarce resource. This has stimulated  
the development of IPv6, which is still in its early stage of development.  
Local Area Network is the network that connects devices in a limited  
geographical area such as company or computer lab.  
IPv4  
LAN  
Media Access Control is a sub-layer of the Data Link Layer specified in the  
OSI model. It provides addressing and channel access control mechanisms to  
allow network nodes to communicate within a LAN.  
MAC  
A unique identifier assigned to network interfaces for communications on a  
MAC Address network segment. It is formed according to the rules of numbering name space  
managed by IEEE.  
Message-Digest algorithm 5 is a widely used cryptographic which has a  
function with a 128-bit hash value.  
MD5  
This type of transmission sends messages from one host to multiple hosts.  
Only those hosts that belong to a specific multicast group will receive the  
multicast. Also, networks that support multicast send only one copy of the  
Multicast  
information across the network until the delivery path that reaches group  
members diverges. At these diverges points, multicast packets will be copied  
and forwarded. This method can manage high volume of traffic with different  
destinations while using network bandwidth efficiently.  
167  
Open System Interconnection mode is a way of sub-dividing a communication  
system into smaller parts called layers. A layer is a collection of conceptually  
similar functions that provide services to the layer above it and receives  
services from the layer below it.  
OSI Model  
QoS  
Quality of Service  
Remote Authentication Dial In User Service is an authentication and  
monitoring protocol on the application level for authentication, integrity  
protection and accounting for network access.  
RADIUS  
Server  
SMTP  
Devices that provide services over the network.  
Simple Mail Transfer Protocol (SMTP) is an internet standard for email  
transmission across IP network.  
Simple Network Management Protocol is a protocol for managing devices on  
IP networks. It exposes management data in the form of variables on the  
managed systems, which describe the system configuration.  
SNMP  
168  
Appendix B: Modbus Memory Map  
1. Read Registers (Support Function Code 3, 4).  
2. Write Register (Support Function Code 6).  
3. 1 Word = 2 Bytes.  
Read/Writ  
Address  
Data Type  
Description  
e
System Information  
System Description = "Managed Switch EH7510"  
Word 0 Hi byte = 'M'  
Word 0 Lo byte = 'a'  
Word 1 Hi byte = 'n'  
Word 1 Lo byte = 'a'  
Word 2 Hi byte = 'g'  
Word 2 Lo byte = 'e'  
Word 3 Hi byte = 'd'  
Word 3 Lo byte = ' '  
Word 4 Hi byte = 'S'  
Word 4 Lo byte = 'w'  
Word 5 Hi byte = 'i'  
0x0000 (0)  
32 words  
R
Word 5 Lo byte = 't'  
Word 6 Hi byte = 'c'  
Word 6 Lo byte = 'h'  
Word 7 Hi byte = ' '  
Word 7 Lo byte = 'E'  
Word 8 Hi byte = 'H'  
Word 8 Lo byte = '7'  
Word 9 Hi byte = '5'  
Word 9 Lo byte = '1'  
Word 10 Hi byte = '0'  
Word 10 Lo byte = '\0'  
Firmware Version =  
Ex: Version = 1.02  
Word 0 Hi byte = 0x01  
Word 0 Lo byte = 0x02  
0x0020 (32)  
0x0021 (33)  
1 word  
R
R
Ethernet MAC Address  
Ex: MAC = 00-01-02-03-04-05  
Word 0 Hi byte = 0x00  
Word 0 Lo byte = 0x01  
Word 1 Hi byte = 0x02  
Word 1 Lo byte = 0x03  
Word 2 Hi byte = 0x04  
Word 2 Lo byte = 0x05  
3 words  
Kernel Version  
Ex: Version = 1.03  
Word 0 Hi byte = 0x01  
Word 0 Lo byte = 0x03  
0x0024 (36)  
1 word  
R
Console Information  
169  
Baud Rate  
0x0000: 4800  
0x0001: 9600  
0x0002: 14400  
0x0003: 19200  
0x0004: 28800  
0x0005: 38400  
0x0006: 57600  
0x0007: 144000  
0x0008: 115200  
0x0030 (48)  
1 word  
R
Data Bits  
0x0007: 7  
0x0008: 8  
0x0031 (49)  
0x0032 (50)  
1 word  
1 word  
R
R
Parity  
0x0000: None  
0x0001: Odd  
0x0002: Even  
Stop Bit  
0x0033 (51)  
0x0034 (52)  
1 word  
1 word  
R
R
0x0001: 1  
0x0002: 2  
Flow Control  
0x0000: None  
Power Information  
Power Status  
Power 1 OK, Hi byte = 0x01  
0x0040 (64)  
1 word  
R
Power 1 Fail, Hi byte = 0x00  
Power 2 OK, Low byte = 0x01  
Power 2 Fail, Low byte = 0x00  
IP Information  
DHCP Status  
0x0050 (80)  
0x0051 (81)  
1 word  
R
R
0x0000: Disabled  
0x0001: Enabled  
IP Address of switch  
Ex: IP = 192.168.1.1  
Word 0 Hi byte = 0xC0  
Word 0 Lo byte = 0xA8  
Word 1 Hi byte = 0x01  
Word 1 Lo byte = 0x01  
2 words  
Subnet Mask of switch  
Ex: IP = 255.255.255.0  
Word 0 Hi byte = 0xFF  
Word 0 Lo byte = 0xFF  
Word 1 Hi byte = 0xFF  
Word 1 Lo byte = 0x00  
0x0053 (83)  
0x0055 (85)  
2 words  
2 words  
R
R
Gateway Address of switch  
Ex: IP = 192.168.1.254  
Word 0 Hi byte = 0xC0  
Word 0 Lo byte = 0xA8  
Word 1 Hi byte = 0x01  
Word 1 Lo byte = 0xFE  
170  
DNS1 of switch  
Ex: IP = 168.95.1.1  
Word 0 Hi byte = 0xA8  
Word 0 Lo byte = 0x5F  
Word 1 Hi byte = 0x01  
Word 1 Lo byte = 0x01  
0x0057 (87)  
0x0059 (89)  
2 words  
2 words  
R
R
DNS2 of switch  
Ex: IP = 168.95.1.1  
Word 0 Hi byte = 0xA8  
Word 0 Lo byte = 0x5F  
Word 1 Hi byte = 0x01  
Word 1 Lo byte = 0x01  
System Status Clear  
Clear Port Statistics  
0x0001: Do clear action  
0x0100 (256)  
0x0101 (257)  
0x0102 (258)  
1 word  
1 word  
1 word  
W
Clear Relay Alarm  
0x0001: Do clear action  
W
Clear All Warning Events  
0x0001: Do clear action  
W
Warning Events Information  
0x0200 (512)  
0x0300 (768)  
64 words  
R
R
R
R
R
1st Warning Event Information  
2st Warning Event Information  
3st Warning Event Information  
4st Warning Event Information  
5st Warning Event Information  
64 words  
0x0400 (1024) 64 words  
0x0500 (1280) 64 words  
0x0600 (1536) 64 words  
Port Status  
Port Status  
0x0000: Disabled  
0x0001: Enabled  
Word 0 Hi byte = Port 1 Status  
Word 0 Lo byte = Port 2 Status  
Word 1 Hi byte = Port 3 Status  
Word 1 Lo byte = Port 4 Status  
Word 2 Hi byte = Port 5 Status  
Word 2 Lo byte = Port 6 Status  
Word 3 Hi byte = Port 7 Status  
Word 3 Lo byte = Port 8 Status  
Word 4 Hi byte = Port 9 Status  
Word 4 Lo byte = Port 10 Status  
0x1000 (4096) 5 words  
R
Port Negotiation  
Status, force = 0x00  
Status, auto = 0x01  
Word 0 Hi byte = Port 1 Status  
Word 0 Lo byte = Port 2 Status  
Word 1 Hi byte = Port 3 Status  
Word 1 Lo byte = Port 4 Status  
Word 2 Hi byte = Port 5 Status  
Word 2 Lo byte = Port 6 Status  
Word 3 Hi byte = Port 7 Status  
Word 3 Lo byte = Port 8 Status  
Word 4 Hi byte = Port 9 Status  
Word 4 Lo byte = Port 10 Status  
0x1020 (4128) 5 words  
R
171  
Port Speed  
Status, 10M = 0x01  
Status, 100M = 0x02  
Status, 1000M = 0x03  
Word 0 Hi byte = Port 1 Status  
Word 0 Lo byte = Port 2 Status  
Word 1 Hi byte = Port 3 Status  
Word 1 Lo byte = Port 4 Status  
Word 2 Hi byte = Port 5 Status  
Word 2 Lo byte = Port 6 Status  
Word 3 Hi byte = Port 7 Status  
Word 3 Lo byte = Port 8 Status  
Word 4 Hi byte = Port 9 Status  
Word 4 Lo byte = Port 10 Status  
0x1040 (4160) 5 words  
R
Port Duplex  
Status, half-duplex = 0x00  
Status, full-duplex = 0x01  
Word 0 Hi byte = Port 1 Status  
Word 0 Lo byte = Port 2 Status  
Word 1 Hi byte = Port 3 Status  
Word 1 Lo byte = Port 4 Status  
Word 2 Hi byte = Port 5 Status  
Word 2 Lo byte = Port 6 Status  
Word 3 Hi byte = Port 7 Status  
Word 3 Lo byte = Port 8 Status  
Word 4 Hi byte = Port 9 Status  
Word 4 Lo byte = Port 10 Status  
0x1060 (4192) 5 words  
R
Port Flow Control  
Status, disabled = 0x00  
Status, enabled = 0x01  
Word 0 Hi byte = Port 1 Status  
Word 0 Lo byte = Port 2 Status  
Word 1 Hi byte = Port 3 Status  
Word 1 Lo byte = Port 4 Status  
Word 2 Hi byte = Port 5 Status  
Word 2 Lo byte = Port 6 Status  
Word 3 Hi byte = Port 7 Status  
Word 3 Lo byte = Port 8 Status  
Word 4 Hi byte = Port 9 Status  
Word 4 Lo byte = Port 10 Status  
0x1080 (4224) 5 words  
R
Port Link Status  
Status, down = 0x00  
Status, up = 0x01  
Word 0 Hi byte = Port 1 Status  
Word 0 Lo byte = Port 2 Status  
Word 1 Hi byte = Port 3 Status  
Word 1 Lo byte = Port 4 Status  
Word 2 Hi byte = Port 5 Status  
Word 2 Lo byte = Port 6 Status  
Word 3 Hi byte = Port 7 Status  
Word 3 Lo byte = Port 8 Status  
Word 4 Hi byte = Port 9 Status  
Word 4 Lo byte = Port 10 Status  
0x10A0 (4256) 5 words  
R
Port TX rate  
Ex. Port 1 runs at TX Rate(1024 Kbps = 0x400).  
Word 0 of Port 1 = 0x0000  
Word 1 of Port 1 = 0x0400  
Word 0,1 = Port 1 TX Rate  
Word 2,3 = Port 2 TX Rate  
Word 4,5 = Port 3 TX Rate  
0x1200 (4608) 20 words  
R
172  
Word 6,7 = Port 4 TX Rate  
Word 8,9 = Port 5 TX Rate  
Word 10,11 = Port 6 TX Rate  
Word 12,13 = Port 7 TX Rate  
Word 14,15 = Port 8 TX Rate  
Word 16,17 = Port 9 TX Rate  
Word 18,19 = Port 10 TX Rate  
Port RX rate  
Ex. Port 1 runs at RX Rate(1024 Kbps = 0x400).  
Word 0 of Port 1 = 0x0000  
Word 1 of Port 1 = 0x0400  
Word 0,1 = Port 1 RX Rate  
Word 2,3 = Port 2 RX Rate  
Word 4,5 = Port 3 RX Rate  
Word 6,7 = Port 4 RX Rate  
Word 8,9 = Port 5 RX Rate  
Word 10,11 = Port 6 RX Rate  
Word 12,13 = Port 7 RX Rate  
Word 14,15 = Port 8 RX Rate  
Word 16,17 = Port 9 RX Rate  
Word 18,19 = Port 10 RX Rate  
0x1280 (4736) 20 words  
R
Count of Good Packets of TX  
Ex. Port 1 gets 0x2EEEE1FFFF good packets of TX.  
Word 0 of Port 1 = 0x0000  
Word 1 of Port 1 = 0x002E  
Word 2 of Port 1 = 0xEEE1  
Word 3 of Port 1 = 0xFFFF  
Word 0,1,2,3 = Port 1 good packets  
Word 4,5,6,7 = Port 2 good packets  
Word 8,9,10,11 = Port 3 good packets  
Word 12,13,14,15 = Port 4 good packets  
Word 16,17,18,19 = Port 5 good packets  
Word 20,21,22,23 = Port 6 good packets  
Word 24,25,26,27 = Port 7 good packets  
Word 28,29,30,31 = Port 8 good packets  
Word 32,33,34,35 = Port 9 good packets  
Word 36,37,38,39 = Port 10 good packets  
0x1300 (4864) 40 words  
R
Count of Bad Packets of TX  
Ex. Port 1 gets 0x2EEEE1FFFF bad packets of TX.  
Word 0 of Port 1 = 0x0000  
Word 1 of Port 1 = 0x002E  
Word 2 of Port 1 = 0xEEE1  
Word 3 of Port 1 = 0xFFFF  
Word 0,1,2,3 = Port 1 good packets  
Word 4,5,6,7 = Port 2 good packets  
Word 8,9,10,11 = Port 3 good packets  
Word 12,13,14,15 = Port 4 good packets  
Word 16,17,18,19 = Port 5 good packets  
Word 20,21,22,23 = Port 6 good packets  
Word 24,25,26,27 = Port 7 good packets  
Word 28,29,30,31 = Port 8 good packets  
Word 32,33,34,35 = Port 9 good packets  
Word 36,37,38,39 = Port 10 good packets  
0x1400 (5120) 40 words  
R
173  
Count of Good Packets of RX  
Ex. Port 1 gets 0x2EEEE1FFFF good packets of RX.  
Word 0 of Port 1 = 0x0000  
Word 1 of Port 1 = 0x002E  
Word 2 of Port 1 = 0xEEE1  
Word 3 of Port 1 = 0xFFFF  
Word 0,1,2,3 = Port 1 good packets  
Word 4,5,6,7 = Port 2 good packets  
Word 8,9,10,11 = Port 3 good packets  
Word 12,13,14,15 = Port 4 good packets  
Word 16,17,18,19 = Port 5 good packets  
Word 20,21,22,23 = Port 6 good packets  
Word 24,25,26,27 = Port 7 good packets  
Word 28,29,30,31 = Port 8 good packets  
Word 32,33,34,35 = Port 9 good packets  
Word 36,37,38,39 = Port 10 good packets  
0x1500 (5376) 40 words  
R
Count of Bad Packets of RX  
Ex. Port 1 gets 0x2EEEE1FFFF bad packets of RX.  
Word 0 of Port 1 = 0x0000  
Word 1 of Port 1 = 0x002E  
Word 2 of Port 1 = 0xEEE1  
Word 3 of Port 1 = 0xFFFF  
Word 0,1,2,3 = Port 1 good packets  
Word 4,5,6,7 = Port 2 good packets  
Word 8,9,10,11 = Port 3 good packets  
Word 12,13,14,15 = Port 4 good packets  
Word 16,17,18,19 = Port 5 good packets  
Word 20,21,22,23 = Port 6 good packets  
Word 24,25,26,27 = Port 7 good packets  
Word 28,29,30,31 = Port 8 good packets  
Word 32,33,34,35 = Port 9 good packets  
Word 36,37,38,39 = Port 10 good packets  
0x1600 (5632) 40 words  
R
Redundancy Information  
Redundancy Protocol  
0x0000: None  
0x0001: STP  
0x2000 (8192) 1 word  
R
0x0002: RSTP  
0x0004: ERPS  
0x0008: iA-Ring  
0x0010: Compatible-Ring  
STP Root  
0x0000: Not Root  
0x0001: Root  
0x2100 (8448) 1 word  
R
0xFFFF: RSTP not enable  
174  
STP Port Status  
0x00: Disabled  
0x01: Listening  
0x02: Learning  
0x03: Forwarding  
0x04: Blocking  
0x05: Discarding  
0xFF: RSTP Not Enable  
Word 0 Hi byte = Port 1 Status  
Word 0 Lo byte = Port 2 Status  
Word 1 Hi byte = Port 3 Status  
Word 1 Lo byte = Port 4 Status  
Word 2 Hi byte = Port 5 Status  
Word 2 Lo byte = Port 6 Status  
Word 3 Hi byte = Port 7 Status  
Word 3 Lo byte = Port 8 Status  
Word 4 Hi byte = Port 9 Status  
Word 4 Lo byte = Port 10 Status  
0x2101 (8449) 5 words  
R
ERPS R-APS VLAN ID of the ring  
Ex: 3st VLAN ID = 1, Word 2 = 0x0001  
1~4094: ID Value range  
0x0000: VLAN ID Not Setup  
Word 0 = 1st VLAN ID  
0x2200 (8704) 5 words  
R
Word 1 = 2st VLAN ID  
Word 2 = 3st VLAN ID  
Word 3 = 4st VLAN ID  
Word 4 = 5st VLAN ID  
ERPS West Port  
Ex: 3st West Port = Port 2, Word 2 = 0x0002  
0x0001: Port 1  
0x0002: Port 2  
0x000A: Port 10  
0x000C: Trk1  
0x000D: Trk2  
0x000E: Trk3  
0x2230 (8752) 5 words  
R
0x000F: Virtual Channel  
0x00FF: VLAN ID exist but no West Port be  
Selected  
0xFFFF: ERPS Not Enable  
Word 0 = 1st VLAN ID West Port  
Word 1 = 2st VLAN ID West Port  
Word 2 = 3st VLAN ID West Port  
Word 3 = 4st VLAN ID West Port  
Word 4 = 5st VLAN ID West Port  
175  
ERPS East Port  
Ex: 3st West Port = Port 3, Word 2 = 0x0003  
0x0001: Port 1  
0x0002: Port 2  
0x000A: Port 10  
0x000C: Trk1  
0x000D: Trk2  
0x2240 (8768) 5 words  
R
0x000E: Trk3  
0x000F: Virtual Channel  
0x00FF: VLAN ID exist but no East Port be Selected  
0xFFFF: ERPS Not Enable  
Word 0 = 1st VLAN ID East Port  
Word 1 = 2st VLAN ID East Port  
Word 2 = 3st VLAN ID East Port  
Word 3 = 4st VLAN ID East Port  
Word 4 = 5st VLAN ID East Port  
ERPS West Port Status  
Ex: 3st West Port Status = Forwarding, Word 2 =  
0x0001  
0x0001: Forwarding  
0x0002: Blocking  
0x0003: Signal Fail Blocking  
0x000F: Virtual Channel  
0x2250 (8784) 5 words  
R
0x00FF: VLAN ID exist but no West Port be  
Selected  
0xFFFF: ERPS Not Enable  
Word 0 = 1st VLAN ID West Port Status  
Word 1 = 2st VLAN ID West Port Status  
Word 2 = 3st VLAN ID West Port Status  
Word 3 = 4st VLAN ID West Port Status  
Word 4 = 5st VLAN ID West Port Status  
ERPS East Port Status  
Ex: 3st East Port Status = Blocking, Word 2 =  
0x0002  
0x0001: Forwarding  
0x0002: Blocking  
0x0003: Signal Fail Blocking  
0x000F: Virtual Channel  
0x00FF: VLAN ID exist but no Eest Port be Selected  
0xFFFF: ERPS Not Enable  
0x2260 (8800) 5 words  
R
Word 0 = 1st VLAN ID East Port Status  
Word 1 = 2st VLAN ID East Port Status  
Word 2 = 3st VLAN ID East Port Status  
Word 3 = 4st VLAN ID East Port Status  
Word 4 = 5st VLAN ID East Port Status  
ERPS Node State  
Ex: 3st Node State = Protection, Word 2 = 0x0002  
0x0001: None  
0x0002: Idle  
0x0003: Protection  
0x2270 (8816) 5 words  
R
0xFFFF: ERPS Not Enable  
Word 0 = 1st VLAN ID Node State  
Word 1 = 2st VLAN ID Node State  
Word 2 = 3st VLAN ID Node State  
Word 3 = 4st VLAN ID Node State  
Word 4 = 5st VLAN ID Node State  
176  
ERPS RPL Owner  
0x0000: Disabled  
0x0001: Enabled  
0x2280 (8832) 5 word  
0x2300 (8960) 1 word  
R
R
iA-Ring Master Status  
0x0000: Disabled  
0x0001: Enabled  
0xFFFF: iA-Ring not enable  
1st Ring Port  
Ex: 1st Ring Port = Port 2, Word 0 = 0x0002  
0x0001: Port 1  
0x0002: Port 2  
0x000A: Port 10  
0xFFFF: iA-Ring not enable  
0x2301 (8961) 1 word  
R
R
2st Ring Port  
Ex: 2st Ring Port = Port 3, Word 0 = 0x0003  
0x0001: Port 1  
0x0002: Port 2  
0x2302 (8962) 1 word  
0x000A: Port 10  
0xFFFF: iA-Ring not enable  
177  

相关型号:

EH7512B

SINGLE PHASE BRIDGE MODULES
MICROSEMI

EH7512BS

Bridge Rectifier Diode, 1 Phase, 75A, 1200V V(RRM), Silicon, MODULE-4
MICROSEMI

EH76010

VHF-KU BAND, 2.5pF, 20V, SILICON, HYPERABRUPT VARIABLE CAPACITANCE DIODE, DIE
TEMEX

EH76015

Variable Capacitance Diode, Very High Frequency to KU Band, 3.6pF C(T), 20V, Silicon, Hyperabrupt, DIE
TEMEX

EH76022

Variable Capacitance Diode, Very High Frequency to KU Band, 5.2pF C(T), 20V, Silicon, Hyperabrupt, DIE
TEMEX

EH76047

暂无描述
TEMEX

EH76068

Variable Capacitance Diode, Very High Frequency to KU Band, 16pF C(T), 20V, Silicon, Hyperabrupt, DIE
TEMEX

EH76100

VHF-KU BAND, 23pF, 20V, SILICON, HYPERABRUPT VARIABLE CAPACITANCE DIODE, DIE
TEMEX

EH76150

VHF-KU BAND, 34pF, 20V, SILICON, HYPERABRUPT VARIABLE CAPACITANCE DIODE, DIE
TEMEX

EH7B1

12 Amp Encapsulated Assemblies
MICROSEMI

EH7Z1

12 Amp Encapsulated Assemblies
MICROSEMI

EH80

3 PHASE BRIDGE MODULES
MICROSEMI