Table of Contents
1. About this Manual ............................................................................................................................. 1-1
2. Getting Started.................................................................................................................................. 2-1
USB Console Configuration (115200, None, 8, 1, VT100) ......................................................................... 2-2
Configuration by Command Line Interface (CLI) ..................................................................................... 2-5
Configuration by Web Browser ............................................................................................................. 2-7
Disabling Telnet and Browser Access ..................................................................................................... 2-8
3. Quick Settings ................................................................................................................................... 3-1
Quick Settings .................................................................................................................................... 3-2
System Time .............................................................................................................................. 3-2
IEC 61850 QoS ........................................................................................................................... 3-3
Redundancy ................................................................................................................................ 3-4
VLAN ......................................................................................................................................... 3-4
Mirror ........................................................................................................................................ 3-6
IP .............................................................................................................................................. 3-7
Summary .......................................................................................................................................... 3-8
Finish ................................................................................................................................................ 3-8
4. Advanced Settings............................................................................................................................. 4-1
Configuring Advanced Settings ............................................................................................................. 4-2
System Identification ................................................................................................................... 4-2
Password.................................................................................................................................... 4-3
Accessible IP List ......................................................................................................................... 4-4
Port Settings ............................................................................................................................... 4-5
Network Parameters .................................................................................................................... 4-6
GARP Timer Parameters ............................................................................................................... 4-8
System Time Settings .................................................................................................................. 4-9
IEEE 1588 PTP .......................................................................................................................... 4-10
System File Update .................................................................................................................... 4-15
Restart ..................................................................................................................................... 4-17
Reset to Factory Default ............................................................................................................. 4-17
Loop Protection ................................................................................................................................ 4-17
Using Port Trunking .......................................................................................................................... 4-18
The Port Trunking Concept ......................................................................................................... 4-18
Port Trunking Settings ............................................................................................................... 4-18
Configuring SNMP ............................................................................................................................. 4-20
SNMP Read/Write Settings .......................................................................................................... 4-21
Trap Settings ............................................................................................................................ 4-22
Private MIB Information ............................................................................................................. 4-23
Using Traffic Prioritization .................................................................................................................. 4-23
The Traffic Prioritization Concept ................................................................................................. 4-23
Configuring Traffic Prioritization .................................................................................................. 4-25
QoS ......................................................................................................................................... 4-25
Using Virtual LAN .............................................................................................................................. 4-28
The Virtual LAN (VLAN) Concept .................................................................................................. 4-28
Sample Applications of VLANs Using Moxa Switches ....................................................................... 4-30
Configuring Virtual LAN .............................................................................................................. 4-31
QinQ Setting ............................................................................................................................. 4-33
VLAN Table ............................................................................................................................... 4-34
Using Multicast Filtering ..................................................................................................................... 4-35
The Concept of Multicast Filtering ................................................................................................ 4-35
Configuring IGMP Snooping ........................................................................................................ 4-38
Current Active IGMP Streams ...................................................................................................... 4-40
Static Multicast MAC Addresses ................................................................................................... 4-41
Configuring GMRP...................................................................................................................... 4-42
GMRP Table .............................................................................................................................. 4-42
Multicast Filtering Behavior ......................................................................................................... 4-43
Using Bandwidth Management ............................................................................................................ 4-43
Configuring Bandwidth Management ............................................................................................ 4-43
Security ........................................................................................................................................... 4-45
User Login Authentication – User Login Settings ............................................................................ 4-45
User Login Authentication – Auth Server Setting ........................................................................... 4-46
Authentication Certificate ................................................................................................................... 4-46
Using Port Access Control .................................................................................................................. 4-47
Static Port Lock ......................................................................................................................... 4-47
IEEE 802.1X ............................................................................................................................. 4-47
Configuring Static Port Lock ........................................................................................................ 4-47
Configuring IEEE 802.1X ............................................................................................................ 4-48
Using Auto Warning .......................................................................................................................... 4-50