Table of Contents
1. About This Manual ................................................................................................................................ 5
2. Getting Started ..................................................................................................................................... 6
USB Console Configuration (115200, None, 8, 1, VT100) ............................................................................ 6
Configuration by Command Line Interface (CLI) ........................................................................................ 9
Configuration by Web Console ............................................................................................................... 11
Disabling Telnet and Browser Access ...................................................................................................... 12
3. Featured Functions ............................................................................................................................. 13
Home ................................................................................................................................................. 13
System Settings .................................................................................................................................. 14
System Information ...................................................................................................................... 14
User Account ............................................................................................................................... 15
Password Login Policy ................................................................................................................... 17
Network ...................................................................................................................................... 18
Date and Time ............................................................................................................................. 20
IEEE 1588 PTP ............................................................................................................................. 23
Warning Notification ..................................................................................................................... 26
MAC Address Table ....................................................................................................................... 33
System Files ................................................................................................................................ 34
Turbo Ring DIP Switch .................................................................................................................. 38
Restart ........................................................................................................................................ 39
Factory Default ............................................................................................................................ 39
PoE (PoE Models Only) ......................................................................................................................... 39
PoE Settings ................................................................................................................................ 40
VLAN .................................................................................................................................................. 50
The Virtual LAN (VLAN) Concept ..................................................................................................... 50
Sample Applications of VLANs Using Moxa Switches .......................................................................... 52
Configuring a Virtual LAN .............................................................................................................. 53
VLAN Name Setting ...................................................................................................................... 55
QinQ Settings .............................................................................................................................. 56
VLAN Table .................................................................................................................................. 56
Port ................................................................................................................................................... 57
Port Settings ................................................................................................................................ 57
Port Status .................................................................................................................................. 58
Link Aggregation .......................................................................................................................... 58
Link-Swap Fast Recovery .............................................................................................................. 60
Multicast ............................................................................................................................................. 61
The Concept of Multicast Filtering ................................................................................................... 61
IGMP Snooping ............................................................................................................................ 64
IGMP Snooping Setting ................................................................................................................. 64
IGMP Group Status ....................................................................................................................... 65
Stream Table ............................................................................................................................... 66
Static Multicast Address ................................................................................................................ 67
GMRP .......................................................................................................................................... 67
Multicast Filtering Behavior ............................................................................................................ 68
QoS ................................................................................................................................................... 69
The Traffic Prioritization Concept .................................................................................................... 69
Configuring Traffic Prioritization ..................................................................................................... 71
CoS Classification ......................................................................................................................... 71
Priority Mapping (Type 1) .............................................................................................................. 72
Priority Mapping (Type 2) .............................................................................................................. 73
DSCP Mapping ............................................................................................................................. 73
Rate Limiting ............................................................................................................................... 74
Security .............................................................................................................................................. 80
Management Interface .................................................................................................................. 80
Trusted Access ............................................................................................................................. 82
SSL Certificate Management .......................................................................................................... 83
SSH Key Management ................................................................................................................... 83
Authentication ............................................................................................................................. 84