Table of Contents
1. Introduction ...................................................................................................................................... 1-1
Overview ........................................................................................................................................... 1-2
Package Checklist ............................................................................................................................... 1-2
Features ............................................................................................................................................ 1-2
Industrial Networking Capability .................................................................................................... 1-2
Designed for Industrial Applications ............................................................................................... 1-3
Useful Utility and Remote Configuration ......................................................................................... 1-3
Recommended Software and Accessories ....................................................................................... 1-3
2. Getting Started.................................................................................................................................. 2-1
RS-232 Console Configuration (115200, None, 8, 1, VT100) .................................................................... 2-2
Configuration by Telnet Console ........................................................................................................... 2-4
Configuration by Web Browser ............................................................................................................. 2-5
Disabling Telnet and Browser Access ..................................................................................................... 2-7
3. Featured Functions ........................................................................................................................... 3-1
Overview ........................................................................................................................................... 3-2
Configuring Basic Settings ................................................................................................................... 3-2
System Identification ................................................................................................................... 3-2
Password .................................................................................................................................... 3-3
Accessible IP ............................................................................................................................... 3-4
Port ........................................................................................................................................... 3-5
Network ..................................................................................................................................... 3-6
Time .......................................................................................................................................... 3-8
IEEE 1588 PTP ............................................................................................................................ 3-9
How Does an Ethernet Switch Affect 1588 Synchronization? ............................................................. 3-9
System File Update—By Remote TFTP .......................................................................................... 3-11
System File Update—By Local Import/Export ................................................................................ 3-12
System File Update—By Backup Media ......................................................................................... 3-12
Restart ..................................................................................................................................... 3-13
Factory Default ......................................................................................................................... 3-13
Using Port Trunking .......................................................................................................................... 3-13
The Port Trunking Concept .......................................................................................................... 3-14
Configuring Port Trunking ........................................................................................................... 3-15
Configuring SNMP ............................................................................................................................. 3-16
SNMP Read/Write Settings .......................................................................................................... 3-17
Tra p S ettings ............................................................................................................................ 3-18
SNMP Trap Mode ....................................................................................................................... 3-19
SNMP Inform Mode .................................................................................................................... 3-19
Private MIB information .............................................................................................................. 3-19
Using Communication Redundancy ...................................................................................................... 3-20
Gigabit Ethernet Redundant Ring Capability (< 50 ms)................................................................... 3-20
The Turbo Ring Concept ............................................................................................................. 3-21
Configuring “Turbo Ring” and “Turbo Ring V2” ............................................................................... 3-24
The Turbo Chain Concept ............................................................................................................ 3-28
Configuring “Turbo Chain” .......................................................................................................... 3-28
The STP/RSTP Concept .............................................................................................................. 3-30
Configuring STP/RSTP ................................................................................................................ 3-35
Using Traffic Prioritization .................................................................................................................. 3-37
The Traffic Prioritization Concept ................................................................................................. 3-37
Configuring Traffic Prioritization ................................................................................................... 3-39
Using Virtual LAN .............................................................................................................................. 3-41
The Virtual LAN (VLAN) Concept .................................................................................................. 3-41
Sample Applications of VLANs using the EDS-728 .......................................................................... 3-43
Configuring 802.1Q VLAN ........................................................................................................... 3-45
Using Multicast Filtering ..................................................................................................................... 3-46
The Concept of Multicast Filtering ................................................................................................ 3-46
Configuring IGMP Snooping ........................................................................................................ 3-49
Add Static Multicast MAC ............................................................................................................ 3-51
Configuring GMRP...................................................................................................................... 3-51
Multicast Filtering Behavior ......................................................................................................... 3-52
Using Bandwidth Management ............................................................................................................ 3-53
Configuring Bandwidth Management ............................................................................................ 3-53
Using Port Access Control .................................................................................................................. 3-54
Configuring IEEE 802.1X ............................................................................................................ 3-56
Configuring Static Port Lock ........................................................................................................ 3-58
Using IP Filter .................................................................................................................................. 3-59
Using Auto Warning .......................................................................................................................... 3-59
Configuring Email Warning.......................................................................................................... 3-59
Email Alarm Events Settings ....................................................................................................... 3-60