Table of Contents
1. Introduction...................................................................................................................................... 1-1
Overview...........................................................................................................................................1-2
Package Checklist...............................................................................................................................1-2
Features............................................................................................................................................1-2
Industrial Networking Capability....................................................................................................1-2
Designed for Industrial Applications...............................................................................................1-3
Useful Utility and Remote Configuration .........................................................................................1-3
Recommended Software and Accessories .......................................................................................1-3
2. Getting Started ................................................................................................................................. 2-1
RS-232 Console Configuration (115200, None, 8, 1, VT100) ....................................................................2-2
Configuration using a Telnet Console.....................................................................................................2-5
Configuration using a Web Browser.......................................................................................................2-6
Disabling Telnet and Browser Access.....................................................................................................2-7
3. Featured Functions ........................................................................................................................... 3-1
Configuring Basic Settings ...................................................................................................................3-2
System Identification...................................................................................................................3-2
Password ...................................................................................................................................3-3
Accessible IP...............................................................................................................................3-3
Port...........................................................................................................................................3-4
Network.....................................................................................................................................3-5
Time..........................................................................................................................................3-7
Turbo Ring DIP Switch ...............................................................................................................3-11
System File Update—By Remote TFTP..........................................................................................3-13
System File Update—By Local Import/Export ................................................................................3-13
System File Update—By Backup Media.........................................................................................3-14
Restart.....................................................................................................................................3-14
Factory Default .........................................................................................................................3-14
Using Port Trunking ..........................................................................................................................3-15
The Port Trunking Concept .........................................................................................................3-15
Configuring Port Trunking...........................................................................................................3-16
Configuring SNMP.............................................................................................................................3-17
Trap Settings............................................................................................................................3-19
SNMP Inform Mode....................................................................................................................3-19
Using PoE ........................................................................................................................................3-20
Using Communication Redundancy .....................................................................................................3-23
Gigabit Ethernet Redundant Ring Capability (< 50 ms) ..................................................................3-24
The Turbo Ring Concept.............................................................................................................3-24
Configuring “Turbo Ring” and “Turbo Ring V2” ..............................................................................3-28
The Turbo Chain Concept...................................................................................................................3-32
Configuring “Turbo Chain” ..........................................................................................................3-33
The STP/RSTP Concept ..............................................................................................................3-34
Configuring STP/RSTP................................................................................................................3-39
Using Traffic Prioritization..................................................................................................................3-41
The Traffic Prioritization Concept.................................................................................................3-41
Configuring Traffic Prioritization ..................................................................................................3-43
Using Virtual LAN..............................................................................................................................3-45
The Virtual LAN (VLAN) Concept..................................................................................................3-45
Sample Applications of VLANs using Moxa EDS-P510 .....................................................................3-47
Configuring Virtual LAN..............................................................................................................3-48
Using Multicast Filtering.....................................................................................................................3-51
The Concept of Multicast Filtering................................................................................................3-51
Configuring IGMP Snooping ........................................................................................................3-53
Add Static Multicast MAC............................................................................................................3-55
Configuring GMRP .....................................................................................................................3-56
GMRP Table..............................................................................................................................3-56
Using Bandwidth Management............................................................................................................3-56
Traffic Rate Limiting Settings......................................................................................................3-57
Using Port Access Control ..................................................................................................................3-57
Configuring Static Port Lock........................................................................................................3-59
Configuring IEEE 802.1X ............................................................................................................3-59
Using Auto Warning ..........................................................................................................................3-62
Configuring Email Warning .........................................................................................................3-62
Event Type...............................................................................................................................3-62
Email Setup..............................................................................................................................3-63
Configuring Relay Warning .........................................................................................................3-64
Event Setup..............................................................................................................................3-65
Warning List .............................................................................................................................3-66
Using Line-Swap-Fast-Recovery..........................................................................................................3-66