Manual Gigabit Advanced Line M Switch Series 1e 10 2021
Manual Gigabit Advanced Line M Switch Series 1e 10 2021
Manual
for
Gigabit Advanced Line Switches
IE-SW-AL08M-8GT (2682350000)
IE-SW-AL12M-8GT-4GESFP (2682340000)
IE-SW-AL14M-12GT-12GESFP (2682360000)
IE-SW-AL24M-16GT-8GESFP (2682370000)
The software described in this manual is furnished under a license agreement and may be used only in
accordance with the terms of that agreement.
Copyright Notice
Disclaimer
Information in this document is subject to change without notice and does not represent a
commitment on the part of Weidmüller.
Weidmüller provides this document as is, without warranty of any kind, either expressed or implied,
including, but not limited to, its particular purpose. Weidmüller reserves the right to make
improvements and/or changes to this manual, or to the products and/or the programs described in
this manual, at any time.
Information provided in this manual is intended to be accurate and reliable. However, Weidmüller
assumes no responsibility for its use, or for any infringements on the rights of third parties that may
result from its use.
This product might include unintentional technical or typographical errors. Changes are periodically
made to the information herein to correct such errors, and these changes are incorporated into new
editions of the publication.
Contact Information
Table of Contents
1. About this Manual ............................................................................................. 6
1
User Manual Managed Switches
2
User Manual Managed Switches
3
User Manual Managed Switches
4
User Manual Managed Switches
5
User Manual Managed Switches
Getting Started
This chapter summarizes the main hardware and software features of the Gigabit Advanced
Line Switches. The information related with the Installation of each Switch (Front / Rear side
elements description and Connections) is described in the Hardware Installation Guide
delivered with every device and available in our online catalogue.
Web Management
There are three ways to access the Weidmüller switch’s configuration settings: serial console,
Telnet console, or web console. The Web console is the most user-friendly way for configuring
and monitoring and is fully described in this chapter.
The description of the Command Line Interface (CLI) Management using serial console or Telnet
console has its own specific manual (User Manual Command Line Interface for gigabit Advanced
Line Switches) that is also available in our online catalogue.
2. Getting Started
The Gigabit Advanced Line Switches are specially designed to operate in harsh industrial
environments thanks to rugged design. The products come with an IP30 rugged case, redundant
power input, alarm relay and wide operating temperature range from -40 to 75ºC.
6
User Manual Managed Switches
7
User Manual Managed Switches
3. Web Management
In this chapter, we explain how to access the Weidmüller Switch’s through the Web console as well
as all the configuration, monitoring, and administration functions available when using this interface.
NOTE: To use the Switch's management and monitoring functions from a PC host
connected to the same LAN as the switch, you must make sure that the PC host and the
Switch are on the same logical subnet.
NOTE: If the Weidmüller switch is configured for other VLAN settings, you must make
sure your PC host is on the management VLAN.
NOTE: Before accessing the Switch’s web browser interface, first connect one of its
RJ45 Ethernet ports to your Ethernet LAN, or directly to your PC's Ethernet card (NIC).
You can establish a connection with either a straight-through or cross-over Ethernet
cable.
After making sure that the Weidmüller switch is connected to the same LAN and logical subnet as
your PC, open the switch’s web console as follows:
Open your web browser and type the Switch’s IP address in the Address or URL field. Press Enter
to establish the connection.
The web login page will open. Enter the default user name “admin” and password “Detmold”, and
then click OK to continue.
8
User Manual Managed Switches
After logging in, the main general information of the switch is shown including, among others, System
Name, Software version, MAC address and Serial number. It is also displayed the front side of the
switch (showing the active ports) in the right navigation panel.
In this home page is also available the button Enable location alert. When pressing it, the front
LEDs starts to flash and an acoustic signal is heard (periodic change of the output relay). When
clicking Disable location alert, the LEDs will stop flashing and the output relay will remain in its
original position.
Use the menu tree in the left navigation panel to open the function pages to access each of Ethernet
Switch's functions.
NOTE: The pages of the Web interface include a Help button that describes the
parameters and functions that can be programmed or monitored in each web page.
NOTE: After changing any parameter / function in a web page the button Apply
activates the change but does not save it. The changes have to be saved using the
Save/Manage Configuration option of the menu.
NOTE: The pages of the Web interface include also a Reset button closed to the Apply
one. If the user modifies any parameter of a web page but still has not applied the
changes, the Reset button can be used to recover the previous default values of the
page. Once the button Apply is pressed, the default values of the page are the new ones.
9
User Manual Managed Switches
Warning messages will pop out to warn the user that the security certificate was issued by a
company they have not chosen to trust.
Select “Continue to this website” to enter the Weidmüller switch´s web browser interface and
access the web browser interface secured via HTTPS.
10
User Manual Managed Switches
System Name
Factory
Setting Description
Default
System Description
Setting Description Factory
Default
Max. 255 This option is useful for recording a more detailed Description of
characters description of the unit. type
System Location
Setting Description Factory
Default
Max. 255 This option is useful for differentiating between the None
characters locations of different units. Example: Production Line 1.
The allowed content is the ASCII characters from 32 to
126.
System contact
Setting Description Factory
Default
Max. 255 This option is useful for providing information about who None
characters is responsible for maintaining this unit and how to
contact this person. The allowed content is the ASCII
characters from 32 to 126.
3.3.2 IP Configuration
The IP settings allow the user to set manually the IP parameters or by means of a DHCP server (for
both IPv4 and IPv6).
11
User Manual Managed Switches
IPv4 Setting
DHCPv4
Factory
Setting Description
Default
Fallback Timeout
Factory
Setting Description
Default
Current Lease
Factory
Setting Description
Default
No setting For DHCPv4 interface with an active lease, this column None
(display) shows the current interface address, as provided by
12
User Manual Managed Switches
IP Address
Factory
Setting Description
Default
Subnet Mask
Factory
Setting Description
Default
Gateway
Setting Description Factory
Default
IP address for the The IP address of the router that connects the LAN to 192.168.1.254
gateway an outside network.
IPv6 Setting
DHCPv6
Factory
Setting Description
Default
Rapid Commit
Factory
Setting Description
Default
13
User Manual Managed Switches
Current Lease
Factory
Setting Description
Default
IP Address
Factory
Setting Description
Default
Mask Length
Factory
Setting Description
Default
Management VLAN
VLAN ID
Factory
Setting Description
Default
Number between
Identifier for the Management VLAN. 1
1 and 4095
3.3.3 IP Status
This page displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP
routes and the neighbor cache (ARP cache) status.
14
User Manual Managed Switches
IP Interfaces
Type The address type of the entry. This may be LINK, IPv4 or IPv6.
Address The current address of the interface (of the given type).
IP Routes
Neighbor Cache
Link Address The Link (MAC) address for which a binding to the IP address given
exists.
15
User Manual Managed Switches
SSH
Setting Description Factory
Default
Telnet
Setting Description Factory
Default
Only HTTP HTTPS mode operation disabled and web access HTTP/HTTPS
only HTTP.
16
User Manual Managed Switches
Certificate Maintain
Setting Description Factory
Default
The Certificate Status field displays the current status of certificate on the switch. The possible
status are:
• Switch secure HTTP certificate is presented.
• Switch secure HTTP certificate is not presented.
• Switch secure HTTP certificate is generating ...
17
User Manual Managed Switches
For each client type (console, telnet, ssh and http) the method to authenticate the user can be
programmed:
When a method involving a remote server is selected (“radius” or “tacacs”), an additional method can
be programmed as backup. Up to three different authentication methods can be programmed and
each one is tried from left to right until a user is either accepted or rejected.
The command authorization method section allows the administrator to limit the CLI commands
available to a user. For each client type (console, telnet and ssh) the following parameters can be
programmed:
Method
Cmd Lvl
18
User Manual Managed Switches
Cfg Cmd
The accounting section allows the administrator to configure command and exec (login) accounting.
For each client type (console, telnet and ssh) the following parameters can be programmed:
Method
no Accounting is disabled. no
Cmd Lvl
Exec
19
User Manual Managed Switches
Mode
If the Access Management Mode is Enabled, for each entry of the table, the following fields have to
be programmed:
VLAN ID
Start IP address
End IP address
HTTP/HTTPS
Check / Uncheck The host can access the switch from HTTP/HTTPS Unchecked
interface if the host IP address matches the IP
address range provided in the entry.
SNMP
Check / Uncheck The host can access the switch from SNMP interface Unchecked
if the host IP address matches the IP address range
provided in the entry.
TELNET/SSH
Check / Uncheck The host can access the switch from TELNET/SSH Unchecked
interface if the host IP address matches the IP
address range provided in the entry.
20
User Manual Managed Switches
Interface The interface type through which the remote host can access the switch.
3.3.5 Users
By default, the switch default’s user name is “admin” (password is “Detmold”) and has the highest
privilege level (15). But is possible to create additional users / delete existing users and configure
different privilege levels for each created user.
3.3.5.1 Configuration
This page provides an overview of the current users. Currently the only way to login as another user
on the web server is to close and reopen the browser.
When pressing the Add New User button, new fields are shown:
21
User Manual Managed Switches
User Name
Factory
Setting Description
Default
Max. 31 Enter the new user name. The valid user name is a
None
characters combination of letters, numbers and underscores.
Password
Setting Description Factory
Default
Max. 31 Enter the password of the new user. Any printable None
characters characters including space are acceptable.
Password (again)
Setting Description Factory
Default
Max. 31 Enter the new password of the new user again to None
characters confirm.
Privilege Level
Setting Description Factory
Default
22
User Manual Managed Switches
Group Name The name identifying the privilege group. In most cases, a privilege level
group consists of a single module (e.g. LACP, RSTP or QoS), but a few of
them contains more than one. The following description defines these
privilege level groups in details:
System: Contact, Name, Location, Timezone, Daylight Saving Time,
Log.
Security: Authentication, System Access Management, Port (contains
Dot1x port, MAC based and the MAC Address Limit), ACL, HTTPS, SSH,
IP source guard.
IP: Everything except 'ping'.
Port: Everything except 'VeriPHY'.
Diagnostics: 'ping' and 'VeriPHY'.
Maintenance: CLI- System Reboot, System Restore Default, System
Password, Configuration Save, Configuration Load and Firmware Load.
Web- Users, Privilege Levels and everything in Maintenance.
Debug: Only present in CLI.
23
User Manual Managed Switches
Privilege Levels Every group has an authorization privilege level for the following
subgroups:
Configuration Read-only
Configuration/Execute Read/write
Status/Statistics Read-only
Status/Statistics Read/write
User Privilege should be same or greater than the authorization Privilege
level to have the access to that group.
NOTE: The Weidmüller switch does not have a real time clock. The user must update
the Current Time and Current Date to set the initial time for the Weidmüller switch after
each reboot, especially when the network does not have an Internet connection for an
SNTP server or there is no SNTP server on the LAN.
System clock
Factory
Setting Description
Default
24
User Manual Managed Switches
SNTP mode
Setting Description Factory
Default
UTC Timezone
Setting Description Factory
Default
User selectable Specifies the time zone, which is used to determine GMT
time zone the local time offset from GMT (Greenwich Mean (Greenwich
Time). Mean Time)
Server IP Addresses
Setting Description Factory
Default
Time Server IP (1 IP address of the SNTP servers. If the 1st SNTP None
to 5) Server fails to connect, the Weidmüller Switch will try
to locate the 2nd, 3rd, 4th and 5th Servers indicated.
User-specified Specifies the beginning and end date of the Daylight None
date. Saving Time.
25
User Manual Managed Switches
User-specified Specifies the number of minutes that the time should None
minutes. be set forward during Daylight Saving Time.
From the switch's web interface, users have the option of either enabling or disabling the LLDP, as
well as setting the LLDP transmit interval (as shown in the figure below). In addition, users are able to
view each switch's neighbor-list, which is reported by its network neighbors. Most importantly,
enabling the LLDP function allows a Network Management Software to automatically display the
network's topology as well as system setup details such as VLAN, and Trunking for the entire
network.
26
User Manual Managed Switches
3.3.7.2 Configuration
This page allows the user to inspect and configure the current LLDP port settings.
LLDP Parameters
Tx Interval
5 to 32768 sec The switch periodically transmits LLDP frames to its 30 (sec)
neighbors to update the network discovery
information. The interval between each LLDP frame is
determined by the Tx Interval value.
Tx Hold
Tx Delay
27
User Manual Managed Switches
Tx Reinit
Rx only The switch will not send out LLDP information, Enabled
but LLDP information from neighbor units is analyzed.
Disabled The switch will not send out LLDP information, and
will drop LLDP information received from neighbors
Enabled The switch will send out LLDP information, and will
analyze LLDP information received from neighbors
Port Descr
Check / Uncheck Optional TLV: When checked, the "port description" is Checked
included in LLDP information transmitted.
Sys Name
Check / Uncheck Optional TLV: When checked, the "system name" is Checked
included in LLDP information transmitted.
Sys Descr
28
User Manual Managed Switches
Sys Capa
Check / Uncheck Optional TLV: When checked, the "system capability" Checked
is included in LLDP information transmitted.
Mgmt Addr
3.3.7.3 Neighbors
This page provides a status overview for all LLDP neighbors.
The displayed table contains information for each port on which an LLDP neighbor is detected:
Local Interface The interface/port on which the LLDP frame was received.
Management The neighbor unit's address that is used for higher layer entities to assist
Address discovery by the network management. This could for instance hold the
neighbor’s IP address.
29
User Manual Managed Switches
Clear global If checked, the global counters are cleared when the button Clear is
counters pressed.
Neighbor entries Shows the time when the last entry was last deleted or added. It also
were last changed shows the time elapsed since the last change was detected.
Total Neighbors Shows the number of new entries added since switch reboot.
Entries Added
Total Neighbors Shows the number of new entries deleted since switch reboot.
Entries Deleted
Total Neighbors Shows the number of LLDP frames dropped due to full entry table.
Entries Dropped
Total Neighbors Shows the number of entries deleted due to expired time-to-live.
Entries Aged Out
Rx Errors The number of received LLDP frames containing some kind of error.
Frames Discarded If a port receives an LLDP frame, and the switch's internal table has run
full, the LLDP frame is counted and discarded. This situation is known as
"Too Many Neighbors" in the LLDP standard. LLDP frames require a new
entry in the table when the Chassis ID or Remote Port ID is not already
contained within the table. Entries are removed from the table when a
30
User Manual Managed Switches
TLVs Discarded Each LLDP frame can contain multiple pieces of information, known as
TLVs (Type Length Value). If a TLV is malformed, it will be counted and
discarded.
TLVs The number of well-formed TLVs, but with an unknown type value.
Unrecognized
Org. Discarded If an LLDP frame is received with an organizationally TLV but the TLV is
not supported, the TLV is counted and discarded.
Age-Outs Each LLDP frame contains information about how long the LLDP
information is valid (age-out time). If no new LLDP frame is received
within the age-out time, the LLDP information is removed and the value
of the age-out counter is incremented.
Clear If checked, the counters for the specific interface are cleared when the
button Clear is pressed.
NOTE: Ethernet/IP is currently disabled due to necessary adaption of its protocol stack.
It will be available again with the next firmware version.
Introduction
MODBUS TCP is a protocol commonly used for the integration of a SCADA system. It is also a
vendor-neutral communication protocol used to monitor and control industrial automation equipment
such as PLCs, sensors, and meters. In order to be fully integrated into industrial systems,
Weidmüller’s switches support Modbus TCP/IP protocol for real-time monitoring in a SCADA system.
Modbus TCP is disabled by default. To enable Modbus TCP, select Enable in Mode and then click
Apply.
31
User Manual Managed Switches
3.3.8.2 Ethernet/IP
Introduction
EtherNet/IP is an Industrial Ethernet Protocol defined by the ODVA association. The protocol is open
to the public and vendors can implement EtherNet/IP into their industrial devices without incurring a
license fee. Many vendors have adopted this protocol as the standard communication protocol
between devices. For example, Rockwell Automation uses EtherNet/IP as the standard protocol for
their Logix controllers over Ethernet networks.
To allow complete integration with a Rockwell system, Weidmüller switches not only provide a
full-functioning of industrial network infrastructure, but also enable the SCADA system to monitor the
status of the switches as well as that of the PLCs, making the switches part of a Rockwell system.
Ethernet/IP is disabled by default. To enable Ethernet/IP, select Enable in Mode and then click
Apply. The user can get the EDS (Electronic Data Sheet) File pressing the button Download ESD
file.
Backup Configuration
The switch stores its configuration in a number of text files. The files are either virtual (RAM-based) or
stored in flash on the switch. The available files are:
32
User Manual Managed Switches
• Running Configuration: A virtual file that represents the currently active configuration on the
switch. This file is volatile.
• Startup Configuration: The startup configuration of the switch read at boot time. If this file
does not exist at boot time, the switch will start up in default configuration.
• Default Configuration: A read-only file with vendor-specific configuration. This file is read
when the system is restored to default values.
It is possible to save either the Running Configuration file or the Startup Configuration file of the
switch to the PC. The name of the file has to be entered in the field Backup file name and then the
button Export Configuration has to be pressed.
Restore Configuration
It is possible to upload a configuration file from the PC to all the files on the switch, except the Default
Configuration one which is read-only. Press the button Select File, select the file saved on the PC,
check in the web page the configuration file to be restored (Running Configuration and/or Startup
Configuration) and press Import Configuration.
Backup Option
Factory
Setting Description
Default
Restore Option
Factory
Setting Description
Default
33
User Manual Managed Switches
The page already shows the current firmware version stored on the switch. To import a new firmware
file into the Weidmüller switch, press the button Select File to select the firmware file that is saved on
your computer. The upgrade procedure will proceed automatically after pressing Upgrade.
Description
Setting Description Factory
Default
Link
Setting Description Factory
Default
Graphic display of Green indicates the link is up and red that it is down. Current
link status Status
(no setting)
34
User Manual Managed Switches
100 Mbps HDX Forces the RJ45 port in 100Mbps half-duplex mode.
100 Mbp FDX Forces the RJ45 port in 100Mbps full-duplex mode.
100 Mbps FDX Forces the SFP port in 100Mbps full-duplex mode.
(SFP)
Advertise Duplex
Check / Uncheck When duplex is set as auto i.e auto negotiation, the All checked
Fdx, Hdx port will only advertise the specified duplex modes
(Fdx or Hdx) to the link partner.
35
User Manual Managed Switches
Advertise Speed
Check / Uncheck When speed is set as auto i.e auto negotiation, the All checked
10M, 100M, 1G port will only advertise the specified speeds
(10M 100M 1G) to the link partner.
Flow Control
Enabled / Enables or Disables flow control for this port. This Disabled
Disabled setting is related to the setting for Configured Link
Speed.
When Auto Speed is selected on a port, this section
indicates the flow control capability that is advertised
to the link partner.
When a fixed-speed setting is selected, that is what is
used. The Current Rx column indicates whether pause
frames on the port are obeyed, and the Current Tx
column indicates whether pause frames on the port
are transmitted. The Rx and Tx settings are
determined by the result of the last Auto Negotiation.
1518 to 9600 Enter the maximum frame size allowed for the switch 9600 (bytes)
(bytes) port, including FCS.
Check / Uncheck Configures if frames with incorrect frame length in the Unchecked
EtherType/Length field shall be dropped. An Ethernet
frame contains a field EtherType which can be used to
indicate the frame payload size (in bytes) for values of
1535 and below. If the EtherType/Length field is above
1535, it indicates that the field is used as an EtherType
36
User Manual Managed Switches
• Gives you more flexibility in setting up your network connections, since the bandwidth of a
link can be increased.
• Provides redundancy—if one link is broken, the remaining trunked ports share the traffic
within this trunk group.
• Load sharing—MAC Client traffic may be distributed across multiple links.
To avoid broadcast storms or loops in your network while configuring a trunk, first disable or
disconnect all ports that you want to add to the trunk or remove from the trunk. After you finish
configuring the trunk, enable or re-connect the ports.
When using a port link aggregation it also has to be considered that:
• None of the ports in a link aggregation can be configured as mirror source or mirror target
port.
• All of the ports in a link aggregation have to be treated as a whole when added or deleted
from a VLAN.
• The Spanning Tree Protocol will treat all the ports in link aggregation as a whole.
37
User Manual Managed Switches
Check / Uncheck When enabled, the source MAC address is used to Checked
calculate the destination port for the frame.
Check / Uncheck When enabled, the destination MAC address is used Unchecked
to calculate the destination port for the frame.
IP Address
Setting Description Factory
Default
Check / Uncheck When enabled, the IP address is used to calculate the Checked
destination port for the frame.
38
User Manual Managed Switches
Group ID
Setting Description Factory
Default
Port Members
Setting Description Factory
Default
Check / Uncheck Controls whether LACP is enabled on the switch port. Unchecked
LACP will form an aggregation when two or more
ports are connected to the same partner.
39
User Manual Managed Switches
Key
Setting Description Factory
Default
Auto / Specific Ports with the same key value can join in the same Auto
aggregation group, while ports with different keys
cannot.
Auto: The key will be set according to the physical link
speed (10Mb = 1, 100Mb = 2, 1Gb = 3).
Specific. The user must enter the value of the key.
Role
Setting Description Factory
Default
Timeout
Setting Description Factory
Default
Priority
Setting Description Factory
Default
1 to 65535 Controls the priority of the port. If the LACP partner 32768
wants to form a larger group than is supported by this
device then this parameter will control which ports will
be active and which ports will be in a backup role.
Lower number means greater priority.
40
User Manual Managed Switches
The displayed table contains information about the different LACP groups created:
Partner Key The Key that the partner has assigned to this aggregation ID.
Local Ports Shows which ports belong to the aggregation group of the switch.
The displayed table contains information about the different LACP parameters of each port:
LACP ‘Yes’ means LACP is enabled and the port link is up. ‘No’ means LACP is
not enabled or the port link is down. ‘Backup’ means the port cannot join
in the aggregation group unless other ports are removed. Meanwhile its
LACP status is disabled.
Key The key assigned to the port. Only ports with the same key can
aggregate together.
41
User Manual Managed Switches
LACP Received Shows how many LACP frames have been received at each port.
LACP Transmitted Shows how many LACP frames have been sent from each port.
Discarded Shows how many unknown or illegal LACP frames have been discarded
at each port.
The displayed table contains information about the different static and LACP aggregation groups
created:
42
User Manual Managed Switches
3.4.3.1 Configuration
This page allows the user to enable the Loop Protection function in the different ports of the switch.
General Settings
Transmission Time
Setting Description Factory
Default
1 to 10 (sec) The interval between each loop protection PDU sent 5 (sec)
on each port.
Shutdown Time
Setting Description Factory
Default
0 to 604800 (sec) The period (in seconds) for which a port will be kept 180 (sec)
disabled when a loop is detected (shutting down the
port). A value of zero will keep a port disabled
permanently (until the device is restarted). The
maximum value is 604800 seconds (7 days).
43
User Manual Managed Switches
Port Configuration
Enable
Setting Description Factory
Default
Action
Setting Description Factory
Default
Shutdown Port / Configures the action performed when a loop is Shutdown Port
Shutdown Port detected on a port. It is possible to disable the port
and Log / Log (shutdown), to log an event only or to take both
Only actions (shutdown and log).
Tx Mode
Setting Description Factory
Default
Enable / Disable Controls whether the port is actively generating loop Enable
protection PDUs (Enable) or whether it is just
passively looking for looped PDUs (Disable).
3.4.3.2 Status
This page displays the loop protection port status of the switch.
The displayed table contains information about the loop protection status in each port:
44
User Manual Managed Switches
Global Mode
Factory
Setting Description
Default
Enabled /
Enable / Disable DHCP server per system. Disabled
Disabled
VLAN Mode
Factory
Setting Description
Default
45
User Manual Managed Switches
Name
Factory
Setting Description
Default
Type
Factory
Setting Description
Default
IP
Factory
Setting Description
Default
Subnet Mask
Factory
Setting Description
Default
Lease Time
Factory
Setting Description
Default
Time in days /
Display the lease time of the pool. 1 day
hours / minutes
46
User Manual Managed Switches
IP Range
Factory
Setting Description
Default
There are several tables on the page showing the following information:
Database Counters
47
User Manual Managed Switches
Binding Counters
Expired Binding Number of bindings that their lease time expired or they are cleared from
Automatic/Manual type bindings.
In the page can also be found several buttons with the following functions:
Refresh Click to refresh the page immediately. The Auto-refresh check refreshes
the page automatically.
Clear Selected Click to clear selected bindings. If the selected binding is Automatic or
Manual, then it is changed to Expired. If the selected binding is Expired,
then it is freed.
48
User Manual Managed Switches
Clear Automatic Click to clear all Automatic bindings and change them to Expired
bindings.
Clear Manual Click to clear all Manual bindings and change them to Expired bindings.
Clear Expired Click to clear all Expired bindings and free them.
DHCP Mode
Factory
Setting Description
Default
IP address
Factory
Setting Description
Default
49
User Manual Managed Switches
Relay Mode
Relay Server
Setting Description Factory Default
50
User Manual Managed Switches
Replace / Keep / Indicates the DHCP relay information option policy. Keep
Drop When DHCP relay information mode is enabled, if the
agent receives a DHCP message that already
contains relay agent information, it will enforce the
policy. The “Replace” policy is invalid when relay
information mode is disabled.
Replace: Replace the original relay information when
a DHCP message containing the information is
received.
Keep: Keep the original relay information when a
DHCP message containing the information is
received.
Drop: Drop the package when a DHCP message
containing the information is received.
In the page can be displayed two tables showing Server and Client statistics.
Server Statistics
Transmit to Server The number of packets relayed from the client to the server.
Transmit Error The number of packets that resulted in errors while being sent to clients.
51
User Manual Managed Switches
Receive Missing The number of packets received without agent information option.
Agent Option
Receive Missing The number of packets received with the Circuit ID option missing.
Circuit ID
Receive Missing The number of packets received with the Remote ID option missing.
Remote ID
Receive Bad The number of packets whose Circuit ID do not match the known circuit
Circuit ID ID.
Receive Bad The number of packets whose Remote ID do not match the known
Remote ID Remote ID.
Client Statistics
Transmit to Client The number of packets relayed from the server to the client.
Transmit Error The number of packets that resulted in errors while being sent to server.
Receive Agent The number of packets received containing agent information option.
Option
Replace Agent The number of packets replaced when received messages containing
Option relay agent information.
Keep Agent The number of packets whose relay agent information was retained.
Option
Drop Agent Option The number of packets dropped when received messages containing
relay agent information.
52
User Manual Managed Switches
Snooping Mode
53
User Manual Managed Switches
The "MAC address" and "VLAN" input fields allow the user to select the starting point in the Dynamic
DHCP snooping Table.
Source Port Switch port number for which the entries are displayed.
The displayed table shows the following information for each port of the switch:
54
User Manual Managed Switches
Rx and Tx Lease The number of lease query packets received and transmitted.
Query
Rx and Tx Lease The number of lease unassigned packets received and transmitted.
Unassigned
Rx and Tx Lease The number of lease unknown packets received and transmitted.
Unknown
Rx and Tx Lease The number of lease active packets received and transmitted.
Active
Rx Discarded from The number of discard packets that are coming from untrusted ports.
Untrusted
3.6 Redundancy
• O-Ring
• O-Chain
• RSTP (Rapid Spanning Tree), MSTP (Multiple Spanning Tree) and STP (Spanning Tree
Protocols) according to IEEE 802.1W/802.1S/802.1D-2004
• Fast Recovery
When configuring a redundant ring, all switches on the same ring must be configured to use the
same redundancy protocol. You cannot mix the O-Ring and STP/RSTP/MSTP protocols on the same
ring. The following table lists the key differences between the features of each protocol. Use this
information to evaluate the benefits of each, and then determine which features are most suitable for
your network.
55
User Manual Managed Switches
When configuring O-Ring the user has to configure only one of the switches explicitly as master. If
more than one switch in the ring is configured as the master, then the protocol will automatically
assign master status to one of the switches (the one with the lowest MAC address).
56
User Manual Managed Switches
Ring coupling
Main Path
Backup Path
Switch A Switch C
Ring Coupling is activated by enabling the function in Switches A / B (Ring 1) and C / D (Ring 2) and
by defining one port of that switches as “Coupling Port”.
NOTE: Only two switches of a ring can enable Ring Coupling. More or less is invalid.
O-Ring protocol
Dual homing is activated by enabling the function in two switches of the ring using O-Ring protocol
and by defining one port of that switches as “Homing Port”.
NOTE: Only two switches of a ring can enable Dual Homing. More or less is invalid.
57
User Manual Managed Switches
Redundant Ports
Setting Description Factory Default
1st Ring Port Select any port of the Switch to be one of the redundant Port 01
ports.
2nd Ring Port Select any port of the Switch to be one of the redundant Port 02
ports.
58
User Manual Managed Switches
Ring Coupling
Setting Description Factory Default
Enable Enables the Ring Coupling operation in the Switch.
Does not enable the Ring Coupling operation in the Disable
Disable
Switch.
Coupling Port
Setting Description Factory Default
Coupling Port Select any port of the Switch to be the coupling port. Port 03
Status Description Factory Default
Inactive Coupling Port disabled and this port is connected.
Link down No connection in this port.
Forwarding Normal transmission in this port. LinkDown
Discarding The port is connected to a backup path and the path is
blocked.
Homing Port
Setting Description Factory Default
Homing Port Select any port of the Switch to be the homing port. Port 04
Status Description Factory Default
Inactive Dual Homing disabled and this port is connected.
Link down No connection in this port.
Forwarding Normal transmission in this port. LinkDown
Discarding The port is connected to a backup path and the path is
blocked.
59
User Manual Managed Switches
• The configured edge ports of the two end switches of the daisy chain are connected to an
existing network
• One of the edge switches blocks its redundancy line (prevent frame looping) and opens only
when the main line on the other edge-switch is broken. The healing time inside the O-Chain is
below 10 ms
Set Up O-Chain
Switch N
Switch 1
Configuring O-Chain
60
User Manual Managed Switches
Chain Ports
Setting Description Factory Default
1st Chain Port Select any port of the Switch to be one of the ports of the Port 01
daisy Chain.
2nd Chain Port Select any port of the Switch to be one of the ports of the Port 02
daisy Chain.
Status Description Factory Default
Link down No connection in this port.
Forwarding Normal transmission in this port. LinkDown
Discarding The port is connected to a backup path and the path is
blocked.
Edge Port
Setting Description Factory Default
Check Configure a port of the daisy Chain as edge port.
Does not configure a port of the daisy Chain as edge Not checked
Uncheck
port.
• The topology of a bridged network will be determined much more quickly compared to STP.
• RSTP is backward compatible with STP, making it relatively easy to deploy.
For example:
• Defaults to sending 802.1D style BPDUs if packets with this format are received.
• STP (802.1D) and RSTP (802.1w) can operate on different ports of the same switch, which is
particularly helpful when switch ports connect to older equipment such as legacy switches.
You get essentially the same functionality with RSTP and STP. To see how the two systems differ,
see section ‘Differences between STP and RSTP’ later in this chapter.
NOTE: The STP protocol is part of the IEEE Std 802.1D, 2004 Edition bridge specification. The
following explanation uses “bridge” instead of “switch.”
STP (802.1D) is a bridge-based system that is used to implement parallel paths for network traffic.
STP uses a loop-detection process to:
• Locate and then disable less efficient paths (i.e., paths that have a lower bandwidth).
• Enable one of the less efficient paths if a more efficient path fails.
61
User Manual Managed Switches
The figure below shows a network made up of three LANs separated by three bridges. Each segment
uses at most two paths to communicate with the other segments. Since this configuration can give
rise to loops, the network will overload if STP is NOT enabled.
L
A
N
Bridge B
1
Bridge A
L
A
N
Bridge C
2
L
A
N
If STP is enabled, it will detect duplicate paths and prevent, or block, one of the paths from forwarding
3
traffic. In the following example, STP determined that traffic from LAN segment 2 to LAN segment 1
should flow through bridges C and A since this path has a greater bandwidth and is therefore more
efficient.
L
A
N
1 Bridge B
Bridge A
L
A
N
Bridge C
2
L
A
N
3
What happens if a link failure is detected? As shown in next figure, the STP process reconfigures the
network so that traffic from LAN segment 2 flows through bridge B.
62
User Manual Managed Switches
L
A
N
1 Bridge B
Bridge A
L
A
N
Bridge C
2
L
A
N
STP will determine which path between each bridged segment is most efficient, and then assign a
3
specific reference point on the network. When the most efficient path has been identified, the other
paths are blocked. In the previous 3 figures, STP first determined that the path through bridge C was
the most efficient, and as a result, blocked the path through bridge B. After the failure of bridge C,
STP re-evaluated the situation and opened the path through Bridge B.
When enabled, STP determines the most appropriate path for traffic through a network. The way it
does this is outlined in the sections below.
STP Requirements
Before STP can configure the network, the system must satisfy the following requirements:
• All bridges must be able to communicate with each other. The communication is carried out
using Bridge Protocol Data Units (BPDUs), which are transmitted in packets with a known
multicast address.
• Each bridge must have a Bridge Identifier that specifies which bridge acts as the central
reference point, or Root Bridge, for the STP system—bridges with a lower Bridge Identifier are
more likely to be designated as the Root Bridge. The Bridge Identifier is calculated using the
MAC address of the bridge and a priority defined for the bridge. For example, the default priority
setting of Weidmüller switches is 32768.
• Each port has a cost that specifies the efficiency of each link. The efficiency cost is usually
determined by the bandwidth of the link, with less efficient links assigned a higher cost. The
following table shows the default port costs for a switch:
63
User Manual Managed Switches
STP Calculation
The first step of the STP process is to perform calculations. During this stage, each bridge on the
network transmits BPDUs. The following items will be calculated:
• Which bridge should be the Root Bridge. The Root Bridge is the central reference point from
which the network is configured.
• The Root Path Costs for each bridge. This is the cost of the paths from each bridge to the Root
Bridge.
• The identity of each bridge’s Root Port. The Root Port is the port on the bridge that connects to
the Root Bridge via the most efficient path. In other words, the port connected to the Root Bridge
via the path with the lowest Root Path Cost. The Root Bridge, however, does not have a Root
Port.
• The identity of the Designated Bridge for each LAN segment. The Designated Bridge is the
bridge with the lowest Root Path Cost from that segment. If several bridges have the same Root
Path Cost, the one with the lowest Bridge Identifier becomes the Designated Bridge. Traffic
transmitted in the direction of the Root Bridge will flow through the Designated Bridge. The port
on this bridge that connects to the segment is called the Designated Bridge Port.
STP Configuration
After all of the bridges on the network agree on the identity of the Root Bridge, and all other relevant
parameters have been established, each bridge is configured to forward traffic only between its Root
Port and the Designated Bridge Ports for the respective network segments. All other ports are
blocked, which means that they will not be allowed to receive or forward traffic.
STP Reconfiguration
Once the network topology has stabilized, each bridge listens for Hello BPDUs transmitted from the
Root Bridge at regular intervals. If a bridge does not receive a Hello BPDU after a certain interval (the
Max Age time), the bridge assumes that the Root Bridge, or a link between itself and the Root Bridge,
has ceased to function. This will trigger the bridge to reconfigure the network to account for the
change. If you have configured an SNMP trap destination, when the topology of your network
changes, the first bridge to detect the change will send out an SNMP trap.
STP Example
The LAN shown in the following figure has three segments, with adjacent segments connected using
two possible links. The various STP factors, such as Cost, Root Port, Designated Bridge Port, and
Blocked Port are shown in the figure.
64
User Manual Managed Switches
• Bridge A has been selected as the Root Bridge, since it was determined to have the lowest
Bridge Identifier on the network.
• Since Bridge A is the Root Bridge, it is also the Designated Bridge for LAN segment 1. Port 1 on
Bridge A is selected as the Designated Bridge Port for LAN Segment 1.
• Ports 1 of Bridges B, C, X, and Y are all Root Ports since they are nearest to the Root Bridge, and
therefore have the most efficient path.
• Bridges B and X offer the same Root Path Cost for LAN segment 2. However, Bridge B was
selected as the Designated Bridge for that segment since it has a lower Bridge Identifier. Port 2
on Bridge B is selected as the Designated Bridge Port for LAN Segment 2.
• Bridge C is the Designated Bridge for LAN segment 3, because it has the lowest Root Path Cost
for LAN Segment 3:
• The route through bridges C and B costs 200 (C to B=100, B to A=100)
• The route through bridges Y and B costs 300 (Y to B=200, B to A=100)
• The Designated Bridge Port for LAN Segment 3 is port 2 on bridge C.
RSTP is similar to STP, but includes additional information in the BPDUs that allow each bridge to
confirm that it has taken action to prevent loops from forming when it decides to enable a link to a
neighboring bridge. Adjacent bridges connected via point-to-point links will be able to enable a link
without waiting to ensure that all other bridges in the network have had time to react to the change.
The main benefit of RSTP is that the configuration decision is made locally rather than network-wide,
allowing RSTP to carry out automatic configuration and restore a link faster than STP.
65
User Manual Managed Switches
Multiple Spanning Tree Protocol (MSTP) is a standard protocol based on IEEE 802.1S. It defines an
extension to RSTP to further develop the usefulness of virtual LANs (VLANs). The calculations of
STP/RSTP only depend on the physical connections, whilst MSTP configures separate Spanning
Tree instances for different VLAN groups.
The main concepts that are specific of MSTP when comparing with STP/RSTP are:
• Multiple Spanning Tree Instances (MSTIs). An MST instance (MSTI) is a particular set of
VLANs that are all using the same spanning tree.
• Regions. An MST region is a set of interconnected switches that all have the same values for all
following MST configuration elements:
o MST configuration name
o Revision level
o Mapping of which VLANs are mapped to which MST instances
Each of the MST instances created are identified by an MSTI number that identifies them only
inside the MST region. Therefore, an MSTI will never span across MST regions.
• Common and Internal Spanning Tree (CIST). The CIST is the default spanning tree of MSTP,
i.e. all VLANs that are not members of particular MSTIs are members of the CIST. Also, the
spanning tree that runs between MST regions is the CIST.
The following figure shows an example of an STP/RSTP network that contains VLANs 1 and 2. The
VLANs are connected using the 802.1Q-tagged link between switch B and Switch C. By default, this
link has a port cost of 100 and is automatically blocked by STP/RSTP because the other
switch-to-switch connections have a port cost of 36 (18+18). This means that both VLANs are now
subdivided—VLAN 1 on switches A and B cannot communicate with VLAN 1 on switch C, and VLAN
2 on switches A and C cannot communicate with VLAN 2 on switch B.
The above situation can be rectified by using MSTP. With MSTP, VLAN 1 and VLAN 2 can be
mapped to different MSTIs. Hence, each instance can have a topology independent of other
spanning tree instances.
66
User Manual Managed Switches
Basic Settings
Protocol version
Setting Description Factory Default
The version of the STP protocol. Valid values are STP,
STP / RSTP / MSTP MSTP
RSTP and MSTP.
Bridge Priority
Setting Description Factory Default
Controls the bridge priority. Lower numeric values have
higher priority. The bridge priority plus the MSTI instance
Scroll list with number, concatenated with the 6-byte MAC address of
32768
acceptable values the switch forms a Bridge Identifier.
For MSTP operation, this is the priority of the CIST.
Otherwise, this is the priority of the STP/RSTP bridge.
Hello time (sec)
67
User Manual Managed Switches
Advanced Settings
68
User Manual Managed Switches
NOTE: This page only has to be programmed if the redundancy protocol programmed is MSTP. It is
not applicable to STP/RSTP.
The page allows the user to inspect and change the current MST Configuration Name, the Revision
level and the mapping of VLANs in MSTIs.
Configuration Identification
Configuration Name
Setting Description Factory Default
The name identifying the VLAN to MSTI mapping.
Max. of 32 Bridges must share the name and revision (see below),
MAC address
characters as well as the VLAN-to-MSTI mapping configurations in
order to share spanning trees for MSTIs (intra-region).
69
User Manual Managed Switches
Configuration Revision
Setting Description Factory Default
Numerical value
input by user (0 to The revision of the MSTI configuration named above. 0
65535)
MSTI Mapping
VLANs Mapped
Setting Description Factory Default
The list of VLANs mapped to the different MSTIs. The
VLAN number by the VLANs must be separated with commas and/or space. A
None
user (1 to 4094) VLAN can only be mapped to one MSTI. An unused MSTI
will be left empty (ex. without any mapped VLANs).
NOTE: This page only has to be programmed if the redundancy protocol programmed is MSTP. It is
not applicable to STP/RSTP.
The page allows the user to inspect and change the current MSTI bridge instance priority
configurations.
It is possible to program the priority for each MSTI as well as for the CIST.
Priority
Setting Description Factory Default
Controls the bridge priority. Lower numeric values have
Scroll list with higher priority. The bridge priority plus the MSTI instance
32768
acceptable values number, concatenated with the 6-byte MAC address of
the switch forms a Bridge Identifier.
70
User Manual Managed Switches
For each port of the switch, the user can program the following parameters:
STP Enabled
Setting Description Factory Default
Checked / Controls whether STP/RSTP is enabled on this switch
Unchecked
Unchecked port.
Path Cost
Setting Description Factory Default
Configures the path cost incurred by the port.
Auto will set the path cost according to the physical link
speed by using the 802.1D-recommended values.
Specific allows the user to enter a user-defined value (1
Auto / Specific to 200000000). Auto
The path cost is used when establishing an active
topology for the network. Lower path cost ports are
chosen as forwarding ports in favor of higher path cost
ports.
Priority
Setting Description Factory Default
Scroll list with
Configures the priority for ports having identical path cost. 128
acceptable values
Admin Edge
Setting Description Factory Default
Configures the operEdge flag to start as set or cleared
(the initial operEdge state when a port is initialized). The
operEdge is a flag indicating whether the port is
Edge / Non-Edge Non-Edge
connected directly to edge devices or not (no bridges
attached). Transiting to the forwarding state is faster for
edge ports (operEdge set to true) than other ports.
71
User Manual Managed Switches
Auto Edge
Setting Description Factory Default
Check to enable the bridge to detect edges at the bridge
Checked /
port automatically. This allows operEdge to be derived Checked
Unchecked
from whether BPDUs are received on the port or not.
Restricted Role
Setting Description Factory Default
When checked, the port will not be selected as root port
for the CIST or any MSTI, even if it has the best spanning
tree priority vector. Such a port will be selected as an
alternate port after the root port has been selected. If set,
Checked / it can cause lack of spanning tree connectivity. It can be
Unchecked
Unchecked set by a network administrator to prevent bridges external
to a core region of the network influence the spanning
tree active topology, because those bridges are not under
the full control of the administrator. This feature is also
known as Root Guard.
Restricted TCN
Setting Description Factory Default
When checked, the port will not propagate received
topology change notifications and topology changes to
other ports. If set, it can cause temporary loss of
connectivity after changes in spanning tree’s active
topology as a result of persistently incorrect learned
Checked /
station location information. It is set by a network Unchecked
Unchecked
administrator to prevent bridges external to a core region
of the network, causing address flushing in that region,
possibly because those bridges are not under the full
control of the administrator or the physical link state of the
attached LANs transits frequently.
BPDU Guard
Setting Description Factory Default
If checked, causes the port to disable itself upon
Checked /
receiving valid BPDUs. Contrary to the similar bridge Unchecked
Unchecked
setting, the port Edge status does not effect this setting.
Point-to-Point
Setting Description Factory Default
Auto Automatic detection if the link port is point to point or not
(connected to a point-to-point LAN or to a shared media).
Forced True The port link is point to point and then is a candidate for Auto
rapid transition to the forwarding state.
Forced False The port link is not point to point.
NOTE: This page only has to be programmed if the redundancy protocol programmed is MSTP. It is
not applicable to STP/RSTP.
72
User Manual Managed Switches
This page allows the user to inspect and change the current MSTI port configuration. An MSTI port is
a virtual port, which is instantiated separately for each active CIST (physical) port for each MSTI
instance configured on and applicable to the port. The MSTI instance must be selected before
displaying actual MSTI port configuration options.
By selecting the specific MSTI and pressing the Get button, we can see the page shown below:
Path Cost
Setting Description Factory Default
Configures the path cost incurred by the port.
Auto will set the path cost according to the physical link
speed by using the 802.1D-recommended values.
Specific allows the user to enter a user-defined value (1
Auto / Specific to 200000000). Auto
The path cost is used when establishing an active
topology for the network. Lower path cost ports are
chosen as forwarding ports in favor of higher path cost
ports.
Priority
Setting Description Factory Default
Scroll list with
Configures the priority for ports having identical path cost. 128
acceptable values
73
User Manual Managed Switches
MSTI The bridge instance. This is also a link to the STP Detailed Bridge Status.
Root Port The switch port currently assigned the root port role.
Root Cost Root path cost. For the root bridge this is zero. For all other bridges, it is
the sum of the port path costs on the least cost path to the root bridge.
Topology Flag The current state of the topology change flag for this bridge instance.
By clicking on the bridge instance of the column MST0I the user can check the detailed bridge status.
In the figure below can be seen the screen shown when CIST is pressed.
Port ID The port identifier used by the STP protocol, consisting of the priority and
the logical port index of the bridge port.
Role The role of a port is assigned based on whether it is part of the active
topology connecting the bridge to the root bridge (i.e., root port),
connecting a LAN through the bridge to the root bridge (i.e., designated
port); or is an alternate or backup port that may provide connectivity if
other bridges, bridge ports, or LANs fail or are removed.
State Displays the current state of this port in the Spanning Tree.
Path Cost The path cost of the port contributed to the paths towards the spanning
tree root which include this port. It can be a value assigned by the Auto
setting or any explicitly configured value.
Edge The current STP port (operational) Edge Flag. An Edge Port is a switch
74
User Manual Managed Switches
Uptime The time since the bridge port was last initialized.
In the table shown on the page is displayed the following information for each port:
CIST Role The current STP port role of the CIST port. The port role can be one of
the following values:
AlternatePort
BackupPort
RootPort
DesignatedPort
Disabled
Non-STP
CIST State The current STP port state of the CIST port. The port state can be one of
the following values:
Disabled
Learning
Forwarding
Uptime The time since the bridge port was last initialized.
75
User Manual Managed Switches
Discarded Illegal The number of illegal Spanning Tree BPDUs received (and discarded) on
the port.
Mode
Setting Description Factory Default
76
User Manual Managed Switches
Recovery Priority
Setting Description Factory Default
Select the priority (number from 1 to total number of
Not included, 1 to ports) of each port. The connected port with the highest
Not included
total number of ports priority (lowest number) will be the active one and the
others will be blocked.
When the Fast Recovery is Enabled, the page shows an additional text indicating the active port of
the switch. Besides the priority programmed, the switch will also consider the ports status to establish
the active port for the Fast Recovery. If a port is not connected (link down), it will never be the active
port regardless the priority programmed.
What is a VLAN?
A VLAN is a group of devices that can be located anywhere on a network, but which communicate as
if they are on the same physical segment. With VLANs, you can segment your network without being
restricted by physical connections—a limitation of traditional network design. With VLANs you can
segment your network according into:
• Departmental groups—You could have one VLAN for the marketing department, another for
the finance department, and another for the product development department.
• Hierarchical groups—You could have one VLAN for directors, another for managers, and
another for general staff.
• Usage groups—You could have one VLAN for email users and another for multimedia users.
Switch A
1 2 3 4 5 6 7 8
77
User Manual Managed Switches
Benefits of VLANs
The main benefit of VLANs is that they provide a network segmentation system that is far more
flexible than traditional networks. Using VLANs also provides you with three other benefits:
• VLANs ease the relocation of devices on networks: With traditional networks, network
administrators spend most of their time dealing with moves and changes. If users move to a
different subnetwork, the addresses of each host must be updated manually. With a VLAN setup,
if a host on VLAN Marketing, for example, is moved to a port in another part of the network, and
retains its original subnet membership, you only need to specify that the new port is on VLAN
Marketing. You do not need to carry out any re-cabling.
• VLANs provide extra security: Devices within each VLAN can only communicate with other
devices on the same VLAN. If a device on VLAN Marketing needs to communicate with devices
on VLAN Finance, the traffic must pass through a routing device or Layer 3 switch.
• VLANs help control traffic: With traditional networks, congestion can be caused by broadcast
traffic that is directed to all network devices, regardless of whether or not they need it. VLANs
increase the efficiency of your network because each VLAN can be set up to contain only those
devices that need to communicate with each other.
VLANs
Your Weidmüller switch provides support for VLANs using IEEE Std 802.1Q-1998. This standard
allows traffic from multiple VLANs to be carried across one physical link. The IEEE Std 802.1Q-1998
standard allows each port on your Weidmüller switch to be placed in:
Managing a VLAN
A new or initialized Weidmüller contains a single VLAN—the Default VLAN. This VLAN has the
following definition:
The Weidmüller switch supports 802.1Q VLAN tagging, a system that allows traffic for multiple
VLANs to be carried on a single physical (backbone, trunk) link. When setting up VLANs you need to
understand when to use untagged and tagged membership of VLANs. Simply put, if a port is on a
single VLAN it can be an untagged member, but if the port needs to be a member of multiple VLANs,
tagged membership must be defined.
A typical host (e.g., clients) will be untagged members of one VLAN, defined as "Access Port" in the
Weidmüller switch, while inter-switch connections will be tagged members of all VLANs, defined as
"Trunk Port" in the Weidmüller switch.
78
User Manual Managed Switches
The IEEE Std 802.1Q-1998 defines how VLANs operate within an open packet-switched network. An
802.1Q compliant packet carries additional information that allows a switch to determine which VLAN
the port belongs. If a frame is carrying the additional information, it is known as a tagged frame.
To carry multiple VLANs across a single physical (backbone, trunk) link, each packet must be tagged
with a VLAN identifier so that the switches can identify which packets belong to which VLAN. To
communicate between VLANs, a router must be used.
Numerical value This field shows the allowed Access VLANs, it only 1
between 1 and affects ports configured as Access ports. Ports in
4095 other modes are members of the VLANs specified in
the Allowed VLANs field (Port VLAN Configuration
section).
By default, only VLAN 1 is enabled. More VLANs
may be created by using a list syntax where the
individual elements are separated by commas.
Ranges are specified with a dash separating the
lower and upper bound.
The following example will create VLANs 1, 10, 11,
12, 13, 200, and 300: 1,10-13,200,300. Spaces are
allowed in between the delimiters.
79
User Manual Managed Switches
Mode
Factory
Setting Description
Default
80
User Manual Managed Switches
ATTENTION
For communication redundancy in the VLAN environment, set Redundant Port,
Coupling Port, and Homing Port as "Trunk Port," since these ports act as the
"backbone" to transmit all packets of different VLANs to different Weidmüller
switches.
Port VLAN
Setting Description Factory
Default
Port type
Ports in hybrid mode allow for changing the port type, that is, whether a frame's VLAN tag is used to
classify the frame on ingress to a particular VLAN, and if so, which TPID it reacts on. Likewise, on
egress, the Port Type determines the TPID of the tag, if a tag is required.
Factory
Setting Description
Default
81
User Manual Managed Switches
Ingress Filtering
Hybrid ports allow for changing ingress filtering. Access and Trunk ports always have ingress filtering
enabled.
Ingress Acceptance
Hybrid ports allow for changing the type of frames that are accepted on ingress.
Factory
Setting Description
Default
Only frames tagged with the corresponding Port Type tag Tagged and
Tagged Only
are accepted on ingress. Untagged
Egress Tagging
Ports in Trunk and Hybrid mode may control the tagging of frames on egress.
Factory
Setting Description
Default
Untag Port VLAN Frames classified to the Port VLAN are transmitted Untag All
untagged. Other frames are transmitted with the relevant
82
User Manual Managed Switches
tag.
Allowed VLANs
Setting Description Factory
Default
VID ranges from 1 Ports in Trunk and Hybrid mode may control which
to 4095 VLANs they are allowed to become members of. Access
ports can only be member of one VLAN, the Access
VLAN. 1
By default, a Trunk or Hybrid port will become member of
all VLANs, and is therefore set to 1-4095.
The field may be left empty, which means that the port will
not become member of any VLAN.
Forbidden VLANs
Setting Description Factory
Default
User Type
Setting Description Factory Default
83
User Manual Managed Switches
The table displayed on the page shows the port members of each programmed VLAN ID.
Port Members A row of check boxes for each port is displayed for each VLAN ID.
If a port is included in a VLAN, the image will be displayed.
If a port is in the forbidden port list, the image will be displayed.
If a port is in the forbidden port list and at the same time attempted to be
included in the VLAN (ex: dynamically by GVRP), the image will be
displayed indicating that there is a conflict in the port. The port will not be
a member of the VLAN in this case.
User Type Various internal software modules may use VLAN services to configure
VLAN port configuration on the fly.
It is possible to show VLAN memberships as configured by an
administrator (Admin) or as configured by one of these internal software
modules.
The "Combined" entry will show a combination of the administrator and
internal software modules configuration, and basically reflects what is
actually configured in hardware.
If a given software modules hasn't overridden any of the port settings, the
text "No data exists for the selected user" is shown in the table.
Port The logical port for the settings contained in the same row.
Port Type Shows the port type (Unaware, C-Port, S-Port or S-Custom-Port).
Frame Type Shows the acceptable frame types for the port (All, Tagged, Untagged).
84
User Manual Managed Switches
Tx Tag Shows the egress Tag requirements (Tag All, Tag PVID, Untag All, …)
for the port.
Untagged VLAN ID If Tx Tag is overridden in the port and is set to UVID (Untagged VLAN ID),
then this field will show the VLAN ID the user wants to untag on egress.
Press the button Add New Private VLAN to add a new private VLAN ID. An empty row is added to
the table and the private VLAN can be configured as needed. The allowed range for a private VLAN
ID is the same as the switch port number range. Any values outside this range are not accepted and
a warning message appears.
The Delete button can be used to undo the addition of new private VLANs.
PVLAN ID
Setting Description Factory Default
Port Membership
Setting Description Factory Default
85
User Manual Managed Switches
Port Number
Setting Description Factory Default
GVRP
Setting Description Factory Default
Join-time
Setting Description Factory Default
86
User Manual Managed Switches
Leave-time
Setting Description Factory Default
LeaveAll-time
Setting Description Factory Default
Max VLANs
Setting Description Factory Default
Disabled / GVRP Turns the GVRP feature off or on for the Disabled
Enabled port in question.
87
User Manual Managed Switches
3.8 SNMP
Weidmüller managed Switches support SNMP V1, V2c, and V3. SNMP V1 and SNMP V2c use a
community string match for authentication, which means that SNMP servers access all objects with
read-only or read/write permissions using the community strings public and private by default. SNMP
V3 requires that you select an authentication level of MD5 or SHA and is the most secure protocol.
You can also enable data encryption to enhance data security.
Supported SNMP security modes and levels are shown in the following table. Select the security
mode and level that will be used to communicate between the SNMP agent and manager.
Protocol
UI Setting Authentication Encryption Method
version
V1, V2c Read Uses a community string
Community string No
SNMP V1, Community match for authentication.
V2c V1, V2c Write/Read Uses a community string
Community string No
Community match for authentication.
Uses an account with admin or
No-Auth No No
user to access objects
Provides authentication based
on HMAC-MD5, or
Authentication based HMAC-SHA algorithms.
MD5 or SHA No
on MD5 or SHA 8-character passwords are the
minimum requirement for
authentication.
SNMP V3 Provides authentication based
on HMAC-MD5 or HMAC-SHA
algorithms, and data
Data encryption key (DES or
Authentication based
MD5 or SHA encryption AES128). 8-character
on MD5 or SHA
key passwords and a data
encryption key are the
minimum requirements for
authentication and encryption.
These parameters are configured on the SNMP page. A more detailed explanation of each
parameter is given in the following sections.
88
User Manual Managed Switches
Mode
Factory
Setting Description
Default
Version
Factory
Setting Description
Default
Factory
Setting Description
Default
Factory
Setting Description
Default
Engine ID
Factory
Setting Description
Default
Enterprise
Information only Indicates the SNMPv3 engine ID. number and
MAC address
89
User Manual Managed Switches
Mode
Factory
Setting Description
Default
Pressing the button Add New Entry the SNMP Trap configuration page appears.
Max. 255
Indicates the trap Configuration’s name. None
characters
90
User Manual Managed Switches
Trap Mode
Factory
Setting Description
Default
Trap Version
Factory
Setting Description
Default
Trap Community
Factory
Setting Description
Default
Numerical value
between 0 and Configures the SNMP trap inform timeout. 3
2147 (sec)
Numerical value
between 0 and Configures the retry times for SNMP trap inform 5
255
91
User Manual Managed Switches
System
Factory
Setting Description
Default
Interface
Factory
Setting Description
Default
Authentication
Factory
Setting Description
Default
92
User Manual Managed Switches
Switch
Factory
Setting Description
Default
Source IP
Factory
Setting Description
Default
Source Mask
Factory
Setting Description
Default
Subnet Mask Indicates the SNMP access source address mask. None
NOTE: This page only has to be configured if SNMPv3 is programmed in the switch.
This page allows the user to configure SNMPv3 user table. The entry index keys are Engine ID and
User Name.
93
User Manual Managed Switches
A default user is already created but is possible to create additional ones with different security levels.
Press the button Add New Entry to create a new User.
Engine ID
Factory
Setting Description
Default
User Name
Factory
Setting Description
Default
Max 32 A string identifying the user name that this entry should
None
characters belong to.
Security Level
Factory
Setting Description
Default
Authentication Protocol
Factory
Setting Description
Default
94
User Manual Managed Switches
Authentication Password
Factory
Setting Description
Default
String between
8 and 32
characters
A string identifying the authentication pass phrase. None
(MD5) or
between 8 and
40 (SHA)
Privacy Protocol
Factory
Setting Description
Default
Privacy Password
Factory
Setting Description
Default
String between
8 and 32 A string identifying the encryption pass phrase. None
characters
There are several Groups already created but is possible to create additional ones. Press the button
Add New Entry to create a new Group.
Security Model
Factory
Setting Description
Default
95
User Manual Managed Switches
Security Name
Factory
Setting Description
Default
Group Name
Factory
Setting Description
Default
Max. 32
A string identifying the name of the Group. None
characters
NOTE: This page only has to be configured if SNMPv3 is programmed in the switch.
This page allows the user to configure SNMPv3 views table. The entry index keys are View Name
and OID Subtree.
A default view is already created but is possible to create additional ones. Press the button Add New
Entry to create a new View.
View Name
Factory
Setting Description
Default
96
User Manual Managed Switches
View Type
Factory
Setting Description
Default
OID Subtree
Factory
Setting Description
Default
NOTE: This page only has to be configured if SNMPv3 is programmed in the switch.
This page allows the user to configure SNMPv3 accesses table. The entry index keys are Group
Name, Security Model and Security Level.
Two default views are already created but is possible to create additional ones based on the
SNMPv3 users / groups / views created. Press the button Add New Entry to create a new Access.
Group Name
Factory
Setting Description
Default
Security Model
This Security Model must be selected in accordance with the one defined for the User of the selected
Group Name.
Factory
Setting Description
Default
97
User Manual Managed Switches
Security Level
This Security Level must be selected in accordance with the one defined for the User of the selected
Group Name.
Factory
Setting Description
Default
3.9 RMON
Remote Monitoring (RMON) is an extension of SNMP and is a method of monitoring network traffic.
So, while SNMP tracks network devices, RMON tracks traffic. In tandem, SNMP and RMON help
network administrators to monitor network performance and troubleshoot issues.
RMON is deployed as an SNMP MIB. The RMON MIB is composed of data associated with Ethernet
traffic activity to help identify and address performance issues.
98
User Manual Managed Switches
Press the button Add New Entry to create a new entry to get RMON statistics in any port of the
switch.
ID
Setting Description Factory
Default
Data Source
Setting Description Factory
Default
Press the button Add New Entry to create a new entry to get history RMON statistics in any port of
the switch.
ID
Setting Description Factory
Default
99
User Manual Managed Switches
Data Source
Setting Description Factory
Default
Interval
Setting Description Factory
Default
Time between 1 Indicates the interval in seconds for sampling the 1800
and 3600 sec history statistics data.
Buckets
Setting Description Factory
Default
Press the button Add New Entry to create a new entry to define RMON alarms.
ID
Setting Description Factory
Default
Interval
Setting Description Factory
Default
Variable
Setting Description Factory
Default
100
User Manual Managed Switches
Sample Type
Setting Description Factory
Default
Delta / Absolute The method of sampling the selected variable and Delta
calculating the value to be compared against the
thresholds.
Absolute: Get the sample directly.
Delta: Calculate the difference between samples.
Value
Setting Description Factory
Default
Information only The value of the statistic during the last sampling None
period.
Startup Alarm
Setting Description Factory
Default
101
User Manual Managed Switches
Rising Threshold
Setting Description Factory
Default
Rising Index
Setting Description Factory
Default
Falling Threshold
Setting Description Factory
Default
Falling Index
Setting Description Factory
Default
Press the button Add New Entry to create a new entry to define RMON events.
ID
Setting Description Factory
Default
102
User Manual Managed Switches
Desc
Setting Description Factory
Default
Type
Setting Description Factory
Default
Logandtrap SNMP log is created and SNMP trap is sent when the
event is triggered.
Community
Setting Description Factory
Default
Information only Indicates the value of sysUpTime at the time this None
event entry last generated an event.
103
User Manual Managed Switches
The total number of events in which packets were dropped by the probe
Drop
due to lack of resources.
The total number of good packets received that were directed to the
Broad-Cast
broadcast address.
CRC Errors The total number of packets received that had a length (excluding
framing bits, but including FCS octets) of between 64 and 1518 octets,
inclusive, but had either a bad Frame Check Sequence (FCS) with an
integral number of octets (FCS Error) or a bad FCS with a non-integral
number of octets (Alignment Error).
Under-Size The total number of packets received that were less than 64 octets.
Over-Size The total number of packets received that were longer than 1518 octets.
The number of frames which size is less than 64 octets received with
Frag.
invalid CRC.
The number of frames which size is larger than 64 octets received with
Jabb
invalid CRC.
The total number of packets (including bad packets) received that were
64 Bytes
64 octets in length.
The total number of packets (including bad packets) received that are
65~127
between 65 to 127 octets in length.
The total number of packets (including bad packets) received that are
128~255
between 128 to 255 octets in length.
The total number of packets (including bad packets) received that are
256~511
between 256 to 511 octets in length.
The total number of packets (including bad packets) received that are
512~1023
between 512 to 1023 octets in length.
The total number of packets (including bad packets) received that were
1024~1588
between 1024 to 1588 octets in length.
104
User Manual Managed Switches
Sample Index Indicates the index of the data entry associated with the control entry.
The value of sysUpTime at the start of the interval over which this sample
Sample Start
was measured.
The total number of events in which packets were dropped by the probe
Drop
due to lack of resources.
The total number of good packets received that were directed to the
Broad-cast
broadcast address.
Under-size The total number of packets received that were less than 64 octets.
Over-size The total number of packets received that were longer than 1518 octets.
The number of frames whose size is less than 64 octets received with
Frag.
invalid CRC.
The number of frames whose size is larger than 64 octets received with
Jabb.
invalid CRC.
Coll. The best estimate of the total number of collisions on this segment.
The best estimate of the mean physical layer network utilization on this
Utilization
interface during this sampling interval, in hundredths of a percent.
105
User Manual Managed Switches
Indicates the interval in seconds for sampling and comparing the rising
Interval
and falling threshold.
The method of sampling the selected variable and calculating the value
Sample Type
to be compared against the thresholds.
Value The value of the statistic during the last sampling period.
Startup Alarm The alarm that may be sent when this entry is first set to valid.
106
User Manual Managed Switches
Traffic prioritization allows you to prioritize data so that time-sensitive and system-critical data can be
transferred smoothly and with minimal delay over a network. The benefits of using traffic prioritization
are:
Traffic prioritization uses the eight traffic queues that are present in your Weidmüller managed
Switch to ensure that high priority traffic is forwarded on a different queue from lower priority traffic.
This is what provides Quality of Service (QoS) to your network.
Weidmüller managed Switch traffic prioritization depends on two industry-standard methods:
107
User Manual Managed Switches
The IEEE Std 802.1D, 1998 Edition marking scheme, which is an enhancement to IEEE Std 802.1D,
enables Quality of Service on the LAN. Traffic service levels are defined in the IEEE 802.1Q 4-byte
tag, which is used to carry VLAN identification as well as IEEE 802.1p priority information. The 4-byte
tag immediately follows the destination MAC address and Source MAC address.
The IEEE Std 802.1D, 1998 Edition priority marking scheme assigns an IEEE 802.1p priority level
between 0 and 7 to each frame. The priority marking scheme determines the level of service that this
type of traffic should receive. Refer to the table below for an example of how different traffic types can
be mapped to the eight IEEE 802.1p priority levels.
1 Background
2 Standard (spare)
5 Video (interactive media); less than 100 milliseconds of latency and jitter
Even though the IEEE 802.1D standard is the most widely used prioritization scheme in the LAN
environment, it still has some restrictions:
• It requires an additional 4-byte tag in the frame, which is normally optional for Ethernet
networks. Without this tag, the scheme cannot work.
• The tag is part of the IEEE 802.1Q header, so to implement QoS at layer 2, the entire
network must implement IEEE 802.1Q VLAN tagging.
• It is only supported on a LAN and not across routed WAN links, since the IEEE 802.1Q tags
are removed when the packets pass through a router.
DiffServ is a Layer 3 marking scheme that uses the DiffServ Code Point (DSCP) field in the IP header
to store the packet priority information. DSCP is an advanced intelligent method of traffic marking
that allows you to choose how your network prioritizes different types of traffic. DSCP uses 64 values
that map to user-defined service levels, allowing you to establish more control over network traffic.
The advantages of DiffServ over IEEE 802.1D are:
• You can configure how you want your switch to treat selected applications and types of traffic by
assigning various grades of network service to them.
• No extra tags are required in the packet.
• DSCP uses the IP header of a packet to preserve priority across the Internet
• DSCP is backward compatible with IPV4 ToS, which allows operation with existing devices that
use a layer 3 ToS enabled prioritization scheme.
108
User Manual Managed Switches
Traffic Prioritization
Weidmüller managed Switches classify traffic based on layer 2 of the OSI 7 layer model, and the
switch prioritizes received traffic according to the priority information defined in the received packet.
Incoming traffic is classified based upon the IEEE 802.1D frame and is assigned to the appropriate
priority queue based on the IEEE 802.1p service level value defined in that packet. Service level
markings (values) are defined in the IEEE 802.1Q 4-byte tag, and consequently traffic will only
contain 802.1p priority markings if the network is configured with VLANs and VLAN tagging. The
traffic flow through the switch is as follows:
• A packet received by the switch may or may not have an 802.1p tag associated with it. If it does
not, then it is given a default 802.1p tag (which is usually 0). Alternatively, the packet may be
marked with a new 802.1p value, which will result in all knowledge of the old 802.1p tag being
lost.
• As the 802.1p priority levels are fixed to the traffic queues, the packet will be placed in the
appropriate priority queue, ready for transmission through the appropriate egress port. When the
packet reaches the head of its queue and is about to be transmitted, the device determines
whether or not the egress port is tagged for that VLAN. If it is, then the new 802.1p tag is used in
the extended 802.1D header.
• The Weidmüller Switch will check a packet received at the ingress port for IEEE 802.1D traffic
classification, and then prioritize it based upon the IEEE 802.1p value (service levels) in that tag.
It is this 802.1p value that determines to which traffic queue the packet is mapped to.
Traffic Queues
The hardware of Weidmüller switches has multiple traffic queues that allow packet prioritization to
occur. Higher priority traffic can pass through the Weidmüller switch without being delayed by lower
priority traffic. As each packet arrives in the Weidmüller switch, it passes through any ingress
processing (which includes classification, marking/re-marking), and is then sorted into the
appropriate queue. The switch then forwards packets from each queue.
The Weidmüller switches support two different queuing mechanisms:
• Weight Fair: This method services all the traffic queues, giving priority to the higher priority
queues. Under most circumstances, the Weight Fair method gives high priority precedence over
low priority, but in the event that high priority traffic does not reach the link capacity, lower priority
traffic is not blocked.
• Strict: This method services high traffic queues first; low priority queues are delayed until no
more high priority data needs to be sent. The Strict method always gives precedence to high
priority over low priority.
109
User Manual Managed Switches
Check / Enable or disable the storm control status for the Unchecked
Uncheck given frame type.
Rate
Setting Description Factory
Default
Numeric value Controls the rate for the global storm policer. This 1
value is restricted to 1-1024000 when "Unit" is fps,
and 1-1024 when "Unit" is kfps. The rate is internally
rounded up to the nearest value supported by the
global storm policer.
Unit
Setting Description Factory
Default
fps / kfps Controls the unit of measure for the storm control fps
rate. Fps stands for frames per second and kfps
means kilo-frames per second.
110
User Manual Managed Switches
DPL
Setting Description Factory
Default
PCP
Setting Description Factory
Default
DEI
Setting Description Factory
Default
Tag Class
Setting Description Factory
Default
111
User Manual Managed Switches
DSCP Based
Setting Description Factory
Default
Address Mode
Setting Description Factory
Default
The user can set the tag remarking mode of each port:
Tag Class
Setting Description Factory
Default
Classified / Shows the tag remarking mode for this port: Disabled
Default / Classified: Use classified PCP/DEI values.
Mapped Default: Use default PCP/DEI values.
Mapped: Use mapped versions of CoS and DPL.
112
User Manual Managed Switches
Ingress Translate
Setting Description Factory
Default
Ingress Classify
Setting Description Factory
Default
Egress Rewrite
Setting Description Factory
Default
Disable / Enable Port egress rewriting can be one of the following Disable
/ Remap DP options:
Unaware / Disable: No egress rewrite.
Remap DP Enable: Rewrite enable without remapping.
Aware Remap DP Unaware: DSCP from the analyzer is
remapped and the frame is remarked with a
remapped DSCP value. The remapped DSCP value
is always taken from the 'DSCP Translation->Egress
Remap DP0' table.
Remap DP Aware: DSCP from the analyzer is
remapped and the frame is remarked with a
remapped DSCP value. Depending on the DP level
of the frame, the remapped DSCP value is either
113
User Manual Managed Switches
Enable
Setting Description Factory
Default
Rate
Setting Description Factory
Default
Numerical value Configures the rate of each policer. This value is 500
restricted to 100 to 3276700 when the Unit is kbps or
fps, and is restricted to 1 to 3276 when the Unit is
Mbps or kfps.
Unit
Setting Description Factory
Default
kbps / Mbps / Configures the unit of measure for each policer rate. kbps
fps / kfps
Flow Control
Setting Description Factory
Default
Check / If enabled and the port is in Flow Control mode, then Unchecked
Uncheck pause frames are sent instead of being discarded.
114
User Manual Managed Switches
Enable
Setting Description Factory
Default
Check / Check to enable the queue policer on the switch port. Unchecked
Uncheck
Rate
Setting Description Factory
Default
Numerical value Configures the rate for the queue policer. This value 500
is restricted to 100-3276700 when "Unit" is kbps,
and 1-3276 when "Unit" is Mbps. The rate is
internally rounded up to the nearest value supported
by the queue policer.
This field is only shown if the queue policer is
enabled.
Unit
Setting Description Factory
Default
kbps / Mbps Controls the unit of measure for the queue policer kbps
rate as kbps or Mbps.
This field is only shown if the queue policer is
enabled.
115
User Manual Managed Switches
When clicking on any port number, a new page is loaded to configure the Scheduler and Shapers for
that specific port of the switch.
Scheduler Mode
Setting Description Factory
Default
Strict Priority / Configures the scheduler mode on this switch port. Strict Priority
6 Queues
Weighted
116
User Manual Managed Switches
Numerical value Controls the rate for the queue shaper. This value is 500
restricted to 100-3281943 when "Unit" is kbps, and
1-3281 when "Unit" is Mbps. The rate is internally
rounded up to the nearest value supported by the
queue shaper. It can only be programmed if queue
shaper is enabled.
kbps / Mbps Controls the unit of measure for the queue shaper kbps
rate. It can only be programmed if queue shaper is
enabled.
Numerical value Controls the weight for this queue. This parameter is 17
between 1 and only shown if "Scheduler Mode" is set to "6 Queues
100 Weighted".
Information only Shows the weight in percent for this queue. This 16%
parameter is only shown if "Scheduler Mode" is set to
"6 Queues Weighted".
Check / Controls whether the port shaper is enabled for this switch Unchecked
Uncheck port.
Numerical value Controls the rate for the port shaper. This value is 500
restricted to 100-3281943 when "Unit" is kbps, and
117
User Manual Managed Switches
kbps / Mbps Controls the unit of measure for the port shaper rate kbps
as kbps or Mbps.
Shows "-" if port shaper disabled or actual queue shaper rate - e.g. "800
Q0 – Q7
Mbps"
Port Shows "-" for disabled or actual port shaper rate - e.g. "800 Mbps".
When clicking on any port number, a new page is loaded to configure the Scheduler and Shapers for
that specific port of the switch. The page is the same one loaded from the Port Scheduler option and
all its settings are already explained in the previous section of this manual.
118
User Manual Managed Switches
QoS Class
Setting Description Factory
Default
DPL
Setting Description Factory
Default
119
User Manual Managed Switches
Ingress Translate
Setting Description Factory
Default
Ingress Classification
Setting Description Factory
Default
120
User Manual Managed Switches
For the actual QoS (0 to 7) the user can set the classified DSCP value.
DSCP DP0 and DP1
Setting Description Factory
Default
Clicking the plus sign, a new web page is loaded and can be used to any QCE.
121
User Manual Managed Switches
Port Members
Setting Description Factory Default
Any / 1 to 4095 Valid value of VLAN ID. Can be any value Any
in the range 1-4095 or ‘Any’.
122
User Manual Managed Switches
123
User Manual Managed Switches
Action Parameters
Indicate the classification action taken on ingress frame if the parameters configured in the QCE
match with the frame’s content.
Action Parameters - CoS
Setting Description Factory Default
124
User Manual Managed Switches
125
User Manual Managed Switches
Indicates the type of frame to look for incoming frames. Possible frame
types are:
Any: The QCE will match all frame type.
Ethernet: Only Ethernet frames (with Ether Type 0x600-0xFFFF) are
Frame Type allowed.
LLC: Only (LLC) frames are allowed.
SNAP: Only (SNAP) frames are allowed.
IPv4: The QCE will match only IPV4 frames.
IPv6: The QCE will match only IPV6 frames.
126
User Manual Managed Switches
3.11 Multicast
Multicast filtering improves the performance of networks that carry multicast traffic. This section
explains multicasts, multicast filtering, and how multicast filtering can be implemented on your
Weidmüller switch.
What is an IP Multicast?
A multicast is a packet sent by one host to multiple hosts. Only those hosts that belong to a specific
multicast group will receive the multicast. If the network is set up correctly, a multicast can only be
sent to an end-station or a subset of end-stations on a LAN or VLAN that belong to the multicast
group. Multicast group members can be distributed across multiple subnets, so that multicast
transmissions can occur within a campus LAN or over a WAN. In addition, networks that support IP
multicast send only one copy of the desired information across the network until the delivery path that
reaches group members diverges. To make more efficient use of network bandwidth, it is only at
these points that multicast packets are duplicated and forwarded. A multicast packet has a multicast
group address in the destination address field of the packet's IP header.
Benefits of Multicast
Multicast Filtering
Multicast filtering ensures that only end-stations that have joined certain groups receive multicast
traffic. With multicast filtering, network devices only forward multicast traffic to the ports that are
connected to registered end-stations. The following two figures illustrate how a network behaves
without multicast filtering, and with multicast filtering.
Network without multicast filtering
All hosts receive the multicast traffic, even if they don’t need it.
127
User Manual Managed Switches
The Weidmüller switch supports both automatic multicast filtering with IGMP (Internet Group
Management Protocol) Snooping and manual multicast filtering by adding static multicast IP
addresses.
It additionally supports MVR (Multicast VLAN Registration) to enable Multicast traffic across different
VLANs.
128
User Manual Managed Switches
Snooping Mode
Snooping Mode allows your switch to forward multicast packets only to the appropriate ports. The
switch "snoops" on exchanges between hosts and an IGMP device, such as a router, to find those
ports that want to join a multicast group, and then configure its filters accordingly.
Querier Mode
Querier mode allows the Weidmüller switch to work as the Querier if it has the lowest IP address on
the subnetwork to which it belongs. Enable query mode to run multicast sessions on a network that
does not contain IGMP routers (or queriers).
IGMP Multicast Filtering
IGMP is used by IP-supporting network devices to register hosts with multicast groups. It can be
used on all LANs and VLANs that contain a multicast capable IP router, and on other network
devices that support multicast filtering.
• The IP router (or querier) periodically sends query packets to all end-stations on the LANs or
VLANs that are connected to it. For networks with more than one IP router, the router with the
lowest IP address is the querier. A switch with IP address lower than the IP address of any other
IGMP querier connected to the LAN or VLAN can become the IGMP querier.
• When an IP host receives a query packet, it sends a report packet back that identifies the
multicast group that the end-station would like to join.
• When the report packet arrives at a port on a switch with IGMP Snooping enabled, the switch
knows that the port should forward traffic for the multicast group, and then proceeds to forward the
packet to the router.
• When the router receives the report packet, it registers that the LAN or VLAN requires traffic for
the multicast groups.
• When the router forwards traffic for the multicast group to the LAN or VLAN, the switches only
forward the traffic to ports that received a report packet.
129
User Manual Managed Switches
Global Configuration
Snooping Enabled
Setting Description Factory
Default
Check/Uncheck Enable IGMP Leave Proxy. This feature can be used Unchecked
to avoid forwarding unnecessary leave messages to
the router side.
Proxy Enabled
Setting Description Factory
Default
Check/Uncheck Enable IGMP Proxy. This feature can be used to avoid Unchecked
forwarding unnecessary join and leave messages to
the router side.
Router Port
Setting Description Factory
Default
Check/Uncheck Specify which ports act as router ports. A router port is Unchecked
a port on the Ethernet switch that leads towards the
Layer 3 multicast device or IGMP querier.
If an aggregation member port is selected as a router
port, the whole aggregation will act as a router port.
130
User Manual Managed Switches
Fast Leave
Setting Description Factory
Default
Throttling
Setting Description Factory
Default
Unlimited / 1 to 10 The user can limit the number of multicast groups to Unlimited
which a port/switch port can belong.
Press the button Add New IGMP VLAN to create a new entry enabling per-VLAN IGMP snooping.
VLAN ID
Setting Description Factory
Default
Snooping Enabled
Setting Description Factory
Default
Querier Election
Setting Description Factory
Default
131
User Manual Managed Switches
Querier Address
Setting Description Factory
Default
Compatibility
Setting Description Factory
Default
PRI
Setting Description Factory
Default
RV
Setting Description Factory
Default
QI
Setting Description Factory
Default
1 to 31774 (sec) Query Interval. It is the interval (in sec) between 125
General Queries sent by the Querier.
QRI
Setting Description Factory
Default
1 to 31774 (tenths Query Response Interval. The Maximum Response 100 (10 sec)
of sec) Delay used to calculate the Maximum Response Code
inserted into the periodic General Queries.
132
User Manual Managed Switches
LLQI
Setting Description Factory
Default
1 to 31774 (tenths Last Member Query Interval. It is the time value 10 (1 sec)
of sec) represented by the Last Member Query Interval,
multiplied by the Last Member Query Count.
URI
Setting Description Factory
Default
Querier
The number of transmitted queriers.
Transmitted
V1 Reports
The number of received V1 reports.
Received
V2 Reports
The number of received V2 reports.
Received
V3 Reports
The number of received V3 reports.
Received
V2 Leaves
The number of received V2 leave packets.
Received
133
User Manual Managed Switches
134
User Manual Managed Switches
Indicates the filtering mode maintained per basis (VLAN ID, port number,
Mode
Group Address). It can be either Include or Exclude.
Hardware Indicates whether data plane destined to the specific group address from
Filter/Switch the source IPv4 address could be handled by chip or not.
For each port of the switch, the user can select the Filtering profile:
Filtering profile
Setting Description Factory
Default
Select IPMC Select the IPMC Profile as the filtering condition for None
profile entry from the specific port. Summary about the designated
a list profile will be shown by clicking the view button.
Note: No available IPMC Profiles by default. It is
necessary to create them with the option IPMC Profile
Configurations.
135
User Manual Managed Switches
Using the Add New IPMC Profile button the user can create the different Profile entries.
Profile Name
Setting Description Factory
Default
Max 16 The name used for indexing the profile table. Each None
characters entry must have a unique name (at least one alphabet
character).
Profile Description
Setting Description Factory
Default
Rule
Setting Description Factory
Default
Rule setting When the profile is created, click the edit button to None
enter the rule setting page of the designated profile.
Summary about the designated profile will be shown
by clicking the view button. You can manage or
inspect the rules of the designated profile by using the
following buttons:
136
User Manual Managed Switches
Using the Add New Address (Range) Entry button the user can create the different Profile entries.
Entry Name
Setting Description Factory
Default
Max 16 The name used for indexing the address entry table. None
characters Each entry must have a unique name (at least one
alphabet character).
3.12 Security
Security can be categorized in two levels: the user name/password level, and the port access level.
For both levels Weidmüller switches provide a wide range of options that allow the user to meet the
security requirements of different applications.
For user name/password level security, Weidmüller switches provide the possibility to enable/disable
any possible access to the management of the device and also provide the login option through
Terminal Access Controller Access-Control System Plus (TACACS+) or Remote Access Dial-In User
Service (RADIUS). The TACACS+ and RADIUS mechanisms are centralized “AAA” (Authentication,
Authorization and Accounting) systems for connecting to network services.
Regarding the port access level, the switches provide three kinds of Port-Based Access Control:
In this case the Weidmüller switch can be configured to protect both static MAC and IP addresses for
a specific port. With the different available functions (Device binding, IP source guard, Port security),
these locked ports will only allow traffic from preset static MAC/IP addresses, helping to block
hackers and careless usage.
137
User Manual Managed Switches
The user can create specific access lists for any port of the switch. In these access lists is possible to
permit or deny any kind of ingress Ethernet and/or IP traffic.
The IEEE 802.1X standard defines a protocol for client/server-based access control and
authentication. The protocol restricts unauthorized clients from connecting to a LAN through ports
that are open to the Internet, and which otherwise would be readily accessible. The purpose of the
authentication server is to check each client that requests access to the port. The client is only
allowed access to the port if the client's permission is authenticated.
Three components are used to create an authentication mechanism based on 802.1X standards:
Client/Supplicant, Authentication Server, and Authenticator.
Client/Supplicant: The end station that requests access to the LAN and switch services and
responds to the requests from the switch.
Authentication server: The server that performs the actual authentication of the supplicant.
Authenticator: Edge switch or wireless access point that acts as a proxy between the supplicant
and the authentication server, requesting identity information from the supplicant, verifying the
information with the authentication server, and relaying a response to the supplicant.
The Weidmüller switch acts as an authenticator in the 802.1X environment. A supplicant and an
authenticator exchange EAPOL (Extensible Authentication Protocol over LAN) frames with each
other.
Authentication can be initiated either by the supplicant or the authenticator. When the supplicant
initiates the authentication process, it sends an EAPOL-Start frame to the authenticator. When the
authenticator initiates the authentication process or when it receives an EAPOL Start frame, it sends
an EAP Request/Identity frame to ask for the username of the supplicant. The following actions are
described below:
138
User Manual Managed Switches
Function State
Setting Description Factory
Default
Mode
Setting Description Factory
Default
--- / Scan / The Mode configuration is only possible when Device ---
Binding / Binding function is enabled. The possible states for
139
User Manual Managed Switches
Enable/Disable When enabled, the switch will ping the device Disabled
continuously.
The Status column indicates the alive check status:
Got Reply: Receiving ping reply from device.
Lost Reply: Not receiving ping reply from device.
Enable/Disable When enabled, the switch will detect the stream Disabled
change (getting low) from device.
The Status column indicates the alive check status:
Normal: The stream is normal.
Low: The stream is getting low.
Enable/Disable When enabled, the switch will monitor the device Disabled
against DDOS (Distributed Denial of Service) attack.
The Status column indicates the alive check status:
Analyzing: Analyze the packet throughput for
initialization.
Running: Function ready.
Attacked: DDOS attack happened.
Device IP Address
Setting Description Factory
Default
MAC address If the Mode configuration is ‘Scan’, this field indicates None
140
User Manual Managed Switches
Alias IP Address
Setting Description Factory
Default
Mode
Setting Description Factory
Default
Enable / Disable Enable or Disable (---) the Alive Check option on the --- (Disabled)
port.
141
User Manual Managed Switches
Action
Setting Description Factory
Default
Link Change / Indicates the action when Alive check fails (Lost --- (Disabled)
Only Log it / Shut Reply). The possible actions to be configured are:
Down the Port Link Change: Link down the port and link up once.
Only Log it: Just log the event.
Shut Down the Port: Disable the port.
Status
Setting Description Factory
Default
Mode
Setting Description Factory
Default
Enable / Disable Enable or Disable (---) the DDOS Prevention option on --- (Disabled)
the port.
Note: If the Binding function is not enabled on a port, it
will not be possible to enable the DDOS Prevention
option. Binding function is enabled in the Device
Binding page.
142
User Manual Managed Switches
Sensibility
Setting Description Factory
Default
Low / Normal / Indicates the level of DDOS detection. Possible levels Normal
Medium / High are:
Low: Low sensibility.
Normal: Normal sensibility.
Medium: Medium sensibility.
High: High sensibility.
Packet Type
Setting Description Factory
Default
Socket Number
Setting Description Factory
Default
Socket number If the packed type is TCP or UDP, the socket number 80
has to be specified. It is possible to specify a range
(from Low to High) If the socket number is one, fill the
same number in fields Low and High.
Filter
Setting Description Factory
Default
Destination / If the packet type is TCP or UDP, the socket direction Destination
Source has to be specified (Destination or Source).
Action
Setting Description Factory
Default
Blocking 1 minute Indicates the action when DDOS attack happens. The --- (Disabled)
/ Blocking 10 possible actions to be configured are:
minutes / ---: No action or Disabled
Blocking / Shut Blocking 1 minute: Block the port for 1 minute and log
Down the Port / the event..
Only Log it Blocking 10 minutes: Block the port for 10 minutes and
log the event.
Blocking: Block the port and log the event.
Shut Down the Port: Disable the port and log the
event.
Only Log it: Just log the event.
143
User Manual Managed Switches
Status
Setting Description Factory
Default
Type
Setting Description Factory
Default
Select from a list Indicates device types. Possible types are: --- (no None
specification), IP Camera, IP Phone, Access Point,
PC, PLC, and Network Video Recorder.
Location Address
Setting Description Factory
Default
Description
Setting Description Factory
Default
144
User Manual Managed Switches
Mode
Setting Description Factory
Default
Enable / Disable Enable or Disable (---) the Stream Check option on the --- (Disabled)
port.
Note: If the Binding function is not enabled on a port, it
will not be possible to enable the Stream Check
option. Binding function is enabled in the Device
Binding page.
Action
Setting Description Factory
Default
--- / Log it Indicates the action when stream getting low. The --- (Disabled)
possible actions to be configured are:
---: No action
Log it: Log the event.
Status
Setting Description Factory
Default
145
User Manual Managed Switches
Mode
Setting Description Factory
Default
The button Translate dynamic to static translates all dynamic entries to static entries (see following
sections Static and Dynamic IP Source Guard Tables).
Mode
Setting Description Factory
Default
146
User Manual Managed Switches
Press the button Add New Entry to create an entry for the Static IP Source Guard Table.
Port
Setting Description Factory
Default
VLAN ID
Setting Description Factory
Default
IP Address
Setting Description Factory
Default
MAC Address
Setting Description Factory
Default
MAC address Allowed source MAC address for the entry. None
Port Switch port number for which the entries are displayed.
147
User Manual Managed Switches
In the following sections are described the options of the Web Management associated with the
ACLs.
Policy ID
Setting Description Factory
Default
Action
Setting Description Factory
Default
Rate Limiter ID
Setting Description Factory
Default
Disabled / 1 to 16 Select which rate limiter to apply on this port (1 to 16). Disabled
The value of the 1 to 16 Rate limiters ID is defined in
148
User Manual Managed Switches
Port Redirect
Setting Description Factory
Default
Disabled / Port Select which port frames are redirected on. It can't be Disabled
number set when action is permitted.
Mirror
Setting Description Factory
Default
Logging
Setting Description Factory
Default
Shutdown
Setting Description Factory
Default
Enabled/Disabled Specifies the port shut down operation of this port. Disabled
Enabled: If a frame is received on the port, the port will
be disabled.
Disabled: Port shut down is disabled.
State
Setting Description Factory
Default
Counter
Setting Description Factory
Default
Information only Counts the number of frames that match this ACE. None
149
User Manual Managed Switches
Rate
Setting Description Factory
Default
Unit
Setting Description Factory
Default
pps / kbps Packets per second (pps) or Kilobits per second pps
(kbps).
150
User Manual Managed Switches
Indicates the ingress port of the ACE. It can be “All” (the ACE will match
Ingress Port
all ingress ports) or “Port” (the ACE will match a specific ingress port).
Policy / Bitmask Indicates the policy number and bitmask of the ACE.
Indicates the rate limiter number of the ACE. The allowed range is 1 to
Rate Limiter
16. When Disabled is displayed, the rate limiter operation is disabled.
Indicates the port redirect operation of the ACE. Frames matching the
ACE are redirected to the port number. The allowed values are Disabled
Port Redirect
or a specific port number. When Disabled is displayed, the port redirect
operation is disabled.
Indicates the mirror operation of the ACE. Frames matching the ACE are
mirrored to the destination mirror port. The allowed values are Enabled
Mirror
(frames received on the port are mirrored) or Disabled (frames received
on the port are not mirrored).
Counter The counter indicates the number of times the ACE was hit by a frame.
The created ACEs of the table can be edited, removed and moved up/down on the list using the
corresponding buttons:
When pressing the button , a new entry at the bottom of the ACE listings is added and its
configuration page is loaded. On the figure below is shown the configuration page for the ACEs.
151
User Manual Managed Switches
Ingress Port
Setting Description Factory
Default
Any / Port n Select the ingress port for which this ACE applies: Any
All: The ACE applies to any port.
Port n: The ACE applies to this port number,
where n is the number of the switch port.
Policy Filter
Setting Description Factory
Default
Any / Specific Specify the policy number filter for this ACE. Any
Any: No policy filter is specified.
Specific: Two field for entering a policy value and
bitmask appear.
Frame Type
Setting Description Factory
Default
Any / Ethernet / Select the frame type for this this ACE: Any
ARP / IPv4 / IPv6 Any: Any frame can match this ACE.
Ethernet type: Only Ethernet type frames can match
this ACE. The IEEE 802.3 describes the value of
Length/Type Field specifications to be greater than or
equal to 1536 decimal (equal to 0600 hexadecimal)
and the value should not be equal to 0x800(IPv4),
0x806(ARP) or 0x86DD(IPv6).
ARP: Only ARP frames can match this ACE. Noe that
the ARP frames won't match the ACE with ethernet
type.
IPv4: Only IPv4 frames can match this ACE. Note that
the IPv4 frames won't match the ACE with ethernet
type.
IPv6: Only IPv6 frames can match this ACE. Notice
the IPv6 frames won't match the ACE with Ethernet
type.
Depending on the Type of Frame selected, new fields
are shown in the page. At the end of this section are
described all these additional fields.
152
User Manual Managed Switches
802.1Q Tagged
Setting Description Factory
Default
Any / Enabled / Specify whether frames can hit the action of this ACE Any
Disabled according to the 802.1Q tagging.
Any: Any value is allowed.
Enabled: Tagged frame only.
Disabled: Untagged frame only.
VLAN ID Filter
Setting Description Factory
Default
Any / Specific Specify the VLAN ID filter for this ACE. Any
Any: No VLAN ID filter is specified.
Specific: A field for entering the VLAN ID appears.
Tag Priority
Setting Description Factory
Default
Any / Specific Specify the tag priority filter for this ACE. Any
priority Any: No tag priority is specified.
Specific: Allowed number range is 0 to 7 or range 0-1,
2-3, 4-5, 6-7, 0-3 and 4-7.
Action
Setting Description Factory
Default
Permit / Deny / Specify the action to take with a frame that hits this Permit
Filter ACE.
Permit: The frame that hits this ACE has granted
permission for the ACE operation.
Deny: The frame that hits this ACE is dropped.
Filter: Frames matching the ACE are filtered (the
filtered ports can be selected).
Rate Limiter ID
Setting Description Factory
Default
153
User Manual Managed Switches
Mirror
Setting Description Factory
Default
Logging
Setting Description Factory
Default
Shutdown
Setting Description Factory
Default
Enabled/Disabled Specify the port shut down operation of the ACE. Disabled
Enabled: If a frame matches the ACE, the ingress port
will be disabled.
Disabled: Port shut down is disabled for the ACE.
Counter
Setting Description Factory
Default
Information only Counts the number of times the ACE was hit by a None
frame.
If the type of frame selected is Ethernet type, additional parameters can be programmed:
SMAC Filter
Setting Description Factory
Default
Any / Specific Specify the source MAC address filter for this ACE. Any
Any: No SMAC address filter is specified.
Specific: A field for entering the SMAC address
appears.
154
User Manual Managed Switches
DMAC Filter
Setting Description Factory
Default
Any / MC / BC / Specify the destination MAC address filter for this Any
UC / Specific ACE.
Any: No DMAC address filter is specified.
MC: Frame must be multicast.
BC: Frame must be broadcast.
UC: Frame must be unicast.
Specific: A field for entering the DMAC address
appears.
EtherType Filter
Setting Description Factory
Default
Any / Specific Specify the Ethernet type filter for this ACE. Any
Any: No Ethernet type filter is specified.
Specific: A field for entering the EtherType value
appears. The allowed range is 0x600 to 0xFFFF but
excluding 0x800(IPv4), 0x806(ARP) and
0x86DD(IPv6).
ARP parameters
If the type of frame selected is ARP, several additional parameters can be programmed:
ARP/RARP
Setting Description Factory
Default
Any / ARP / Specify the available ARP/RARP opcode (OP) flag for Any
RARP / Other this ACE:
Any: No ARP/RARP opcode flag is specified.
ARP: Frame must have ARP/RARP opcode set to
ARP.
RARP: Frame must have ARP/RARP opcode set to
RARP.
Other: Frame has unknown ARP/RARP Opcode flag.
Request/Reply
Setting Description Factory
Default
Any / Request / Specify the available Request/Reply opcode (OP) flag Any
Reply for this ACE.
Any: No Request/Reply OP flag is specified.
Request: Frame must have ARP Request or RARP
Request OP flag set.
Reply: Frame must have ARP Reply or RARP Reply
OP flag.
155
User Manual Managed Switches
Sender IP Filter
Setting Description Factory
Default
Any / Host / Specify the sender IP filter for this ACE. Any
Network Any: No sender IP filter is specified.
Host: Sender IP filter is set to Host. Specify the sender
IP address in the SIP Address field that appears.
Network: Sender IP filter is set to Network. Specify the
sender IP address and sender IP mask in the SIP
Address and SIP Mask fields that appear.
Target IP Filter
Setting Description Factory
Default
Any / Host / Specify the target IP filter for this specific ACE. Any
Network Any: No target IP filter is specified.
Host: Target IP filter is set to Host. Specify the target
IP address in the Target IP Address field that appears.
Network: Target IP filter is set to Network. Specify the
target IP address and target IP mask in the Target IP
Address and Target IP Mask fields that appear.
Any / 0 / 1 Specify whether frames can hit the action according to Any
their sender hardware address field (SHA) settings.
Any: Any value is allowed.
0: ARP frames where SHA is not equal to the SMAC
address.
1: ARP frames where SHA is equal to the SMAC
address.
Any / 0 / 1 Specify whether frames can hit the action according to their Any
target hardware address field (THA) settings.
Any: Any value is allowed.
0: RARP frames where THA is not equal to the target MAC
address.
1: RARP frames where THA is equal to the target MAC
address.
156
User Manual Managed Switches
IP/Ethernet Length
Setting Description Factory
Default
Any / 0 / 1 Specify whether frames can hit the action according to Any
their ARP/RARP hardware address length (HLN) and
protocol address length (PLN) settings.
Any: Any value is allowed.
0: ARP/RARP frames where the HLN is not equal to
Ethernet (0x06) or the (PLN) is not equal to IPv4
(0x04).
1: ARP/RARP frames where the HLN is equal to
Ethernet (0x06) and the (PLN) is equal to IPv4 (0x04).
IP
Setting Description Factory
Default
Any / 0 / 1 Specify whether frames can hit the action according to Any
their ARP/RARP hardware address space (HRD)
settings.
Any: Any value is allowed.
0: ARP/RARP frames where the HLD is not equal to
Ethernet (1).
1: ARP/RARP frames where the HLD is equal to
Ethernet (1)
Ethernet
Setting Description Factory
Default
Any / 0 / 1 Specify whether frames can hit the action according to Any
their ARP/RARP protocol address space (PRO)
settings.
Any: Any value is allowed.
0: ARP/RARP frames where the PRO is not equal to
IP (0x800).
1: ARP/RARP frames where the PRO is equal to IP
(0x800).
IPv4 parameters
If the type of frame selected is IPv4, several additional parameters can be programmed:
IP Protocol Filter
Setting Description Factory
Default
Any / ICMP / UDP Specify the IPv4 protocol filter for this specific ACE. Any
/ TCP Any: No IPv4 protocol is specified.
ICMP: IPv4 ICMP protocol frames.
UDP: IPv4 UDP protocol frames.
TCP: IPv4 TCP protocol frames.
New fields are shown for the specific IPv4 protocols.
At the end of this section the new fields are described.
157
User Manual Managed Switches
IP TTL
Setting Description Factory
Default
Any / Non-zero / Specify the Time-to-Live settings for this ACE. Any
Zero Any: Any value is allowed.
Zero: IPv4 frames with a Time-to-Live field greater
than zero must not be able to match this entry.
Non-zero: IPv4 frames with a Time-to-Live field
greater than zero must be able to match this entry.
IP Fragment
Setting Description Factory
Default
Any / Yes / No Specify the fragment offset settings for this ACE. This Any
involves the settings for the More Fragments (MF) bit
and the Fragment Offset (FRAG OFFSET) field for an
IPv4 frame.
Any: Any value is allowed.
No: IPv4 frames where the MF bit is set or the FRAG
OFFSET field is greater than zero must not be able to
match this entry.
Yes: IPv4 frames where the MF bit is set or the FRAG
OFFSET field is greater than zero must be able to
match this entry.
IP Option
Setting Description Factory
Default
Any / Yes / No Specify the option flag setting for this ACE. Any
Any: Any value is allowed.
No: IPv4 frames where the options flag is set must not
be able to match this entry.
Yes: IPv4 frames where the options flag is set must be
able to match this entry.
SIP Filter
Setting Description Factory
Default
Any / Host / Specify the source IP filter for this ACE. Any
Network Any: No source IP filter is specified.
Host: Source IP filter is set to Host. Specify the source
IP address in the SIP Address field that appears.
Network: Source IP filter is set to Network. Specify the
source IP address and source IP mask in the SIP
Address and SIP Mask fields that appear.
158
User Manual Managed Switches
DIP Filter
Setting Description Factory
Default
Any / Host / Specify the destination IP filter for this ACE. Any
Network Any: No destination IP filter is specified.
Host: Destination IP filter is set to Host. Specify the
destination IP address in the DIP Address field that
appears.
Network: Destination IP filter is set to Network. Specify
the destination IP address and destination IP mask in
the DIP Address and DIP Mask fields that appear.
IPv6 parameters
If the type of frame selected is IPv6, several additional parameters can be programmed:
Next Header Filter
Setting Description Factory
Default
Any Other / ICMP Specify the IPv6 next header filter for this specific Any
/ UDP / TCP ACE.
Any: No IPv6 next header filter is specified.
Other: A field for entering a specific IPv6 next header
filter appears (from 0 to 255).
ICMP: IPv6 ICMP protocol frames.
UDP: IPv6 UDP protocol frames.
TCP: IPv6 TCP protocol frames.
New fields are shown for the specific IPv6 protocols.
At the end of this section the new fields are described.
SIP Filter
Setting Description Factory
Default
Any / Specific Specify the source IPv6 filter for this ACE. Any
Any: No source IPv6 filter is specified.
Specific: Specify the source IPv6 address and source
IPv6 mask in the fields that appear.
Hop Limit
Setting Description Factory
Default
Any / 0 / 1 Specify the hop limit settings for this ACE. Any
Any: Any value is allowed.
0: IPv6 frames with a hop limit field greater than zero
must not be able to match this entry.
1: IPv6 frames with a hop limit field greater than zero
must be able to match this entry.
159
User Manual Managed Switches
ICMP parameters
If the type of frame selected is IPv4/ICMP or IPv6/ICMP, several additional parameters can be
programmed:
ICMP Type Filter
Setting Description Factory
Default
Any / Specific Specify the ICMP filter for this ACE. Any
Any: No ICMP filter is specified.
Specific: A field for entering an ICMP value (0 to 255)
appears.
Any / Specific Specify the ICMP code filter for this ACE. Any
Any: No ICMP code filter is specified.
Specific: A field for entering an ICMP code value (0 to
255) appears.
TCP/UDP parameters
If the type of frame selected is IPv4/TCP, IPv4/UDP, IPv6/TCP or IPv6/UDP, several additional
parameters can be programmed:
TCP/UDP Source Port Filter
Setting Description Factory
Default
Any / Specific / Specify the TCP/UDP source port filter for this ACE. Any
Range Any: No TCP/UDP source port filter is specified.
Specific: A field for entering a TCP/UDP source port
value (0 to 65535) appears.
Range: Two fields for entering a TCP/UDP source port
range appear (0 to 65535).
Any / Specific / Specify the TCP/UDP destination port filter for this Any
Range ACE.
Any: No TCP/UDP destination port filter is specified.
Specific: A field for entering a TCP/UDP destination
port value (0 to 65535) appears.
Range: Two fields for entering a TCP/UDP destination
port range appear (0 to 65535).
160
User Manual Managed Switches
TCP FIN
Setting Description Factory
Default
Any / 0 / 1 Specify the TCP "No more data from sender" (FIN) Any
value for this ACE.
Any: Any value is allowed ("don't-care").
0: TCP frames where the FIN field is set must not be
able to match this entry.
1: TCP frames where the FIN field is set must be able
to match this entry.
TCP SYN
Setting Description Factory
Default
TCP RST
Setting Description Factory
Default
Any / 0 / 1 Specify the TCP "Reset the connection" (RST) value Any
for this ACE.
Any: Any value is allowed ("don't-care").
0: TCP frames where the RST field is set must not be
able to match this entry.
1: TCP frames where the RST field is set must be able
to match this entry.
TCP PSH
Setting Description Factory
Default
Any / 0 / 1 Specify the TCP "Push function (PSH) value for this Any
ACE.
Any: Any value is allowed ("don't-care").
0: TCP frames where the PSH field is set must not be
able to match this entry.
1: TCP frames where the PSH field is set must be able
to match this entry.
161
User Manual Managed Switches
TCP ACK
Setting Description Factory
Default
TCP URG
Setting Description Factory
Default
162
User Manual Managed Switches
Rate Limiter Indicates the rate limiter number of the ACE. The allowed range is 1 o 16.
When Disabled is displayed, the rate limiter operation is disabled.
Mirror Indicates if the Mirror operation is included in the ACE (Enabled). When
Disabled is displayed, the mirror operation is disabled.
Counter The counter indicates the number of times the ACE was hit by a frame.
Conflict Displays ‘Yes’ if there is a HW conflict related with the created ACE.
Otherwise displays ‘No’.
NOTE: The Authentication, Authorization and Accounting preferred options for the switch (including
RADIUS and TACACS+) are selected in the web page Authentication methods of the Basic
Settings menu.
Global Configuration
Timeout
Setting Description Factory
Default
163
User Manual Managed Switches
Retransmit
Setting Description Factory
Default
Deadtime
Setting Description Factory
Default
1 to 1440 Deadtime is the period during which the switch will not 0
(minutes) send new requests to a server that has failed to
respond to a previous request. This will stop the switch
from continually trying to contact a server that it has
already determined as dead.
Setting the Deadtime to a value greater than 0 (zero)
will enable this feature, but only if more than one
server has been configured.
Key
Setting Description Factory
Default
Max 63 The secret key shared between the RADIUS server None
characters and the switch.
NAS-IP-Address
Setting Description Factory
Default
NAS-IPv6-Address
Setting Description Factory
Default
NAS-Identifier
Setting Description Factory
Default
164
User Manual Managed Switches
Server Configuration
Press the button Add New Server to add and configure a RADIUS server. Up to 5 servers are
supported. The parameters that have to be configured for each server are:
Hostname
Setting Description Factory
Default
Auth Port
Setting Description Factory
Default
Port The UDP port to use on the RADIUS server for 1812
authentication. Set to 0 to disable authentication.
Acct Port
Setting Description Factory
Default
Port The UDP port to use on the RADIUS server for 1813
accounting. Set to 0 to disable accounting.
Timeout
Setting Description Factory
Default
1 to 1000 (sec) This optional setting overrides the global timeout None
value. Leaving it blank will use the global timeout
value.
Retransmit
Setting Description Factory
Default
Key
Setting Description Factory
Default
Max 63 This optional setting overrides the global key. Leaving None
characters it blank will use the global key.
165
User Manual Managed Switches
Global Configuration
Timeout
Setting Description Factory
Default
Deadtime
Setting Description Factory
Default
1 to 1440 Deadtime is the period during which the switch will not 0
(minutes) send new requests to a server that has failed to
respond to a previous request. This will stop the switch
from continually trying to contact a server that it has
already determined as dead.
Setting the Deadtime to a value greater than 0 (zero)
will enable this feature, but only if more than one
server has been configured.
Key
Setting Description Factory
Default
Max 63 The secret key shared between the TACACS+ server None
characters and the switch.
166
User Manual Managed Switches
Server Configuration
Press the button Add New Server to add and configure a TACACS+ server. Up to 5 servers are
supported. The parameters that have to be configured for each server are:
Hostname
Setting Description Factory
Default
Port
Setting Description Factory
Default
Timeout
Setting Description Factory
Default
1 to 1000 (sec) This optional setting overrides the global timeout None
value. Leaving it blank will use the global timeout
value.
Key
Setting Description Factory
Default
Max 63 This optional setting overrides the global key. Leaving None
characters it blank will use the global key.
Authentication The current status of the server. This field takes one of the following
Status values:
Disabled: The server is disabled.
167
User Manual Managed Switches
Accounting Status The current status of the server. This field takes one of the following
values:
Disabled: The server is disabled.
Not Ready: The server is enabled, but IP communication is not yet up
and running.
Ready: The server is enabled, IP communication is up and running, and
the RADIUS module is ready to accept access attempts.
Dead (X seconds left): Access attempts were made to this server but it
did not reply within the configured timeout. The server has temporarily
been disabled but will get re-enabled when the dead-time expires. The
number of seconds left before this occurs is displayed in parentheses.
This state is only reachable when more than one server is enabled.
The statistics shown map closely to those specified in RFC4668 - RADIUS Authentication Client MIB.
Use the server select box to switch between the backend servers to show details for.
168
User Manual Managed Switches
The Help button provides a description of all the different counters shown on the page.
System Configuration
Mode
Setting Description Factory
Default
Reauthentication Enabled
Setting Description Factory
Default
169
User Manual Managed Switches
Reauthentication Period
Setting Description Factory
Default
EAPOL Timeout
Setting Description Factory
Default
Aging Period
Setting Description Factory
Default
Hold Time
Setting Description Factory
Default
170
User Manual Managed Switches
Guest VLAN ID
Setting Description Factory
Default
171
User Manual Managed Switches
Check / Uncheck The switch remembers if an EAPOL frame has been Unchecked
received on the port for the life-time of the port. Once
the switch considers whether to enter the Guest
VLAN, it will first check if this option is enabled or
disabled. If disabled (unchecked; default), the switch
will only enter the Guest VLAN if an EAPOL frame has
not been received on the port for the life-time of the
port. If enabled (checked), the switch will consider
entering the Guest VLAN even if an EAPOL frame has
been received on the port for the life-time of the port.
The value can only be changed if the Guest VLAN
option is globally enabled.
Port Configuration
Admin State
Setting Description Factory
Default
Force Authorized If NAS is globally enabled, this selection controls the Force
/ Force port's authentication mode. The following modes are Authorized
Unauthorized / available:
Port-based • Force Authorized: In this mode, the switch will send
802.1X / Single one EAPOL Success frame when the port link comes
802.1X / Multi up and any client on the port will be network access
802.1X / allowed without authentication.
172
User Manual Managed Switches
173
User Manual Managed Switches
174
User Manual Managed Switches
Check / Uncheck When Guest VLAN is both globally enabled and Unchecked
enabled (checked) for a given port, the switch
considers moving the port into the Guest VLAN
according to the following rules:
When a Guest VLAN enabled port's link comes up, the
switch starts transmitting EAPOL Request Identity
frames. If the number of transmissions of such frames
exceeds Max. Reauth. Count and no EAPOL frames
have been received in the meanwhile, the switch
considers entering the Guest VLAN. The interval
between transmission of EAPOL Request Identity
frames is configured with EAPOL Timeout. If Allow
Guest VLAN if EAPOL Seen is enabled, the port will
now be placed in the Guest VLAN. If disabled, the
switch will first check its history to see if an EAPOL
frame has previously been received on the port and, if
not, the port will be placed in the Guest VLAN.
Otherwise it will not move to the Guest VLAN but
continue transmitting EAPOL Request Identity frames
at the rate given by EAPOL Timeout.
Once in the Guest VLAN, the port is considered
authenticated, and all attached clients on the port are
allowed access on this VLAN.
This option is only available for EAPOL-based modes
(Port-based 802.1, Single 802.1 and Multi 802.1X).
Port state
Setting Description Factory
Default
Information only The current state of the port. It can undertake one of Globally
the following values: Disabled
• Globally Disabled: NAS is globally disabled.
• Link Down: NAS is globally enabled, but there is no
link on the port.
• Authorized: The port is in Force Authorized or a
single-supplicant mode and the supplicant is
authorized.
• Unauthorized: The port is in Force Unauthorized or a
single-supplicant mode and the supplicant is not
successfully authorized by the RADIUS server.
• X Auth/Y Unauth: The port is in a multi-supplicant
mode. Currently X clients are authorized and Y are
unauthorized.
The buttons Reauthenticate and Reinitialize are available for each row. The buttons are only
enabled when authentication is globally enabled and the port's Admin State is in an EAPOL-based or
MAC-based mode.
175
User Manual Managed Switches
The Reauthenticate button schedules a reauthentication whenever the quiet-period of the port runs
out (EAPOL-based authentication). For MAC-based authentication, reauthentication will be
attempted immediately. The button only has effect for successfully authenticated clients on the port
and will not cause the clients to get temporarily unauthorized.
The Reinitialize button forces a reinitialization of the clients on the port and thereby a
reauthentication immediately. The clients will transfer to the unauthorized state while the
reauthentication is in progress.
Port The switch port number. Click to navigate to detailed NAS statistics for
this port.
Admin State The port's current administrative state. Possible values already explained
in previous section (Admin State).
Port State The current state of the port. Possible values already explained in
previous section (Port State).
Last Source The source MAC address carried in the most recently received EAPOL
frame for EAPOL-based authentication, and the most recently received
frame from a new client for MAC-based authentication.
Last ID The user name (supplicant identity) carried in the most recently received
Response Identity EAPOL frame for EAPOL-based authentication, and
the source MAC address from the most recently received frame from a
new client for MAC-based authentication.
QoS Class QoS Class assigned to the port by the RADIUS server if enabled.
Port VLAN ID The VLAN ID that NAS has put the port in. The field is blank if the Port
VLAN ID is not overridden by NAS.
If the VLAN ID is assigned by the RADIUS server, "(RADIUS-assigned)"
is appended to the VLAN ID.
176
User Manual Managed Switches
The page shows the Port State information including the parameters Admin State, Port State, QoS
Class and Port VLAN ID already described in the previous section of this manual.
Additionally, the page also shows the Port Counters. The Help button provides a detailed description
of all these counters shown on the page.
System Configuration
Mode
Setting Description Factory
Default
177
User Manual Managed Switches
Aging Enabled
Setting Description Factory
Default
Aging Period
Setting Description Factory
Default
10 to 10000000 If Aging is enabled (checked) the user can specify the 3600
(sec) aging period of the MAC addresses in seconds.
Port Configuration
Mode
Setting Description Factory
Default
Limit
Setting Description Factory
Default
Action
Setting Description Factory
Default
None / Trap / If the limit number is reached, the switch will take one None
Shutdown / Trap of the following actions:
& Shutdown None: Do not allow more than Limit MAC addresses
on the port, but take no further action.
Trap: If the limit number is exceeded on the port,
an SNMP trap will be sent. If Aging is disabled, only
one SNMP trap will be sent, but with Aging enabled,
new SNMP traps will be sent every time the limit gets
exceeded.
Shutdown: If the limit number is exceeded on the port,
the port will be shut down. This implies that all secured
MAC addresses will be removed from the port and no
new address will be learned. Even if the link is
physically disconnected and reconnected on the port
(by disconnecting the cable), the port will remain shut
down.
Trap & Shutdown: If the limit number is exceeded on
the port, both the “Trap” and the “Shutdown” actions
described above will be taken.
178
User Manual Managed Switches
State
Setting Description Factory
Default
Information only This column shows the current state of the port as Disabled
seen from the Limit Control's point of view. The state
takes one of the following four values:
Disabled: Limit Control is either globally disabled or
disabled on the port.
Ready: The limit is not yet reached. This can be shown
for all actions.
Limit Reached: Indicates that the limit is reached on
this port. This state can only be shown if Action is set
to None or Trap.
Shutdown: Indicates that the port is shut down by the
Limit Control module. This state can only be shown if
Action is set to Shutdown or Trap & Shutdown.
The Reopen button can be used to reopen a specific port that has been shut down due to exceeding
the defined limit.
179
User Manual Managed Switches
User Module Name The full name of a user module that may request Port Security services.
Abbr A one-letter abbreviation of the user module. This is used in the Users
column in the Port Status table.
Port Status
Port The port number for which the status applies. Click the port number to
see additional information about the status of this particular port.
Users Each of the user modules has a column that shows whether that module
has enabled Port Security or not. A '- -' means that the corresponding
user module is not enabled, whereas a letter indicates that the user
module abbreviated by that letter (see Abbr) has enabled port security.
State Shows the current state of the port which includes the following values:
Disabled: No user modules are currently using the Port Security service.
Ready: The Port Security service is in use by at least one user module
and is awaiting frames from unknown MAC addresses to arrive.
Limit Reached: The Port Security service is enabled by at least the Limit
Control user module and that module has indicated that the limit is
reached and no more MAC addresses should be taken in.
Shutdown: The Port Security service is enabled by at least the Limit
Control user module and that module has indicated that the limit is
exceeded. No MAC addresses can be learned on the port until it is
administratively re-opened.
MAC Count The two columns indicate the number of currently learned MAC
addresses (forwarding as well as blocked) and the maximum number of
MAC addresses that can be learned on the port, respectively. If no user
modules are enabled on the port, the Current column will show a dash (-).
If the Limit Control user module is not enabled on the port, the Limit
column will show a dash (-).
MAC Address The MAC address that is seen on this port. If no MAC addresses are
learned, a single row stating No MAC addresses attached is displayed.
180
User Manual Managed Switches
Time of Addition Shows the date and time when this MAC address was first seen on the
port.
Age/Hold If at least one user module has decided to block this MAC address, it will
stay in the blocked state until the hold time (measured in seconds)
expires. If all user modules have decided to allow this MAC address to
forward, and aging is enabled, the Port Security module will periodically
check that this MAC address still forwards traffic.
If the age period (measured in seconds) expires and no frames have
been seen, the MAC address will be removed from the MAC table.
Otherwise a new age period will begin.
If aging is disabled or a user module has decided to hold the MAC
address indefinitely, a dash (-) will be shown.
181
User Manual Managed Switches
Alarm event types can be divided into two basic groups: Power Failure and Port Link
Down/Broken.
You can configure which events are related to the relay output.
NOTE: The events that are configured to activate the relay output also activate the
amber light in the FAULT LED of the front-plate of the switch.
PWR 1 No power input in the first power supply module of the switch.
PWR 2 No power input in the second power supply module of the switch.
Port number The port is disconnected (e.g., the cable is pulled out, or the
opposing device shuts down).
182
User Manual Managed Switches
Event Types can be divided into two basic groups: System Events and Port Events. System Events
are related to the overall function of the switch, whereas Port Events are related to the activity of a
specific port.
NOTE: For each event the user can decide if a log is registered (SYSLOG) and/or if a
warning Email is sent (SMTP). Please, consider that the SYSLOG and SMTP sever must
also be Enabled from the corresponding page.
O-Ring Topology Change If the Master of the O-Ring has changed or the backup path is
activated.
O-Chain Topology Change If the configuration of the O-Chain has changed or the backup
path is activated.
Configuration Changed Any configuration item has been changed and saved.
and Saved
Disable Never.
Link Down The port is disconnected (e.g., the cable is pulled out, or the
opposing device shuts down).
E-mail Alert
183
User Manual Managed Switches
Disabled
Mail Subject
Authentication
Max. of 45 You can set up to six email addresses to receive alarm None
characters emails from the Weidmüller switch.
Server Mode
184
User Manual Managed Switches
Server Address
Syslog Level
Informational / Select the severity level for the syslog messages to be Informational
Error / Warning / logged:
Message Informational: Send the specific messages which
severity code is less or equal than Informational (6).
Error: Send the specific messages which severity
code is less or equal than Error (3).
Warning: Send the specific messages which severity
code is less or equal than Warning (4).
Message: Send the specific messages which severity
code is less or equal than Message (5).
185
User Manual Managed Switches
Aging Configuration
Check / Uncheck By default, dynamic entries are removed from the Unchecked
MAC table after 300 seconds. This removal is called
aging. It is possible to de-activate the automatic aging
of dynamic entries by checking Disable Automatic
Aging.
Aging time
Setting Description Factory
Default
Port Members
Setting Description Factory
Default
Auto / Disable / Each port can be configured to dynamically learn the Auto
Secure MAC address based upon the following settings:
Auto: Learning is done automatically as soon as a
frame with unknown Source MAC address is received.
Disable: No learning is done.
Secure: Only static MAC entries are learned, all other
frames are dropped.
NOTE: If the setting of the port for the MAC Table Learning is Secure, make sure the link
used for managing the switch is added to the static MAC table before saving. Otherwise
the management link will be lost and can only be restored by using another non-secure
port, by connecting to the switch via the serial interface or by restoring the default values.
NOTE: If the learning mode for a given port is grayed out, it means the user cannot
change the configurations because of the current programming of the switch. An
example of such programming is MAC-Based authentication under 802.1X.
Press the button Add New Static Entry to add a new entry to the static MAC address table. An
empty row is added to the table and the static MAC entry can be configured as needed. The static
MAC table can contain up to 64 entries.
The Delete button can be used to undo the addition of new static MAC entries.
186
User Manual Managed Switches
VLAN ID
Setting Description Factory
Default
MAC Address
Setting Description Factory
Default
Port Members
Setting Description Factory
Default
Check / Uncheck Indicate (check) which ports are member of the entry. Unchecked
187
User Manual Managed Switches
The Clear button allows the user to reset all the port counters.
188
User Manual Managed Switches
Rx and Tx Packets The number of received and transmitted (good and bad) packets.
The number of received and transmitted (good and bad) bytes, including
Rx and Tx Octets
FCS but excluding framing bits.
Rx and Tx Unicast The number of received and transmitted (good and bad) unicast packets.
Rx and Tx The number of received and transmitted (good and bad) multicast
Multicast packets.
Rx and Tx The number of received and transmitted (good and bad) broadcast
Broadcast packets.
The number of received and transmitted (good and bad) packets split into categories based on their
respective frame sizes.
The number of received and transmitted packets per input and output queue.
Rx Drops The number of frames dropped due to lack of receive buffers or egress
congestion.
The number of short frames (frames smaller than 64 bytes) received with
Rx Undersize
valid CRC.
The number of long frames (frames longer than the configured maximum
Rx Oversize
frame length for this port) received with valid CRC.
The number of frames received with a length of more than 64 bytes and
Rx Fragments
with an invalid FCS/CRC.
The number of frames received with a length of more than MaxSize bytes
Rx Jabber
but with an invalid FCS/CRC.
Tx Late/Exc. Coll. The number of frames dropped due to excessive or late collisions.
The Clear button allows the user to reset all the port counters.
189
User Manual Managed Switches
Mode
Type
Mirror The source port(s) and destination port are located on Mirror
this switch.
190
User Manual Managed Switches
VLAN ID
Reflector port
Port of the switch The reflector port is a method to redirect the traffic to Port 1
Remote Mirroring VLAN. Any device connected to a
port set as a reflector port loses connectivity until the
Remote Mirroring is disabled. The reflector port needs
to be selected only on Source switch type and only
supports pure copper ports.
Port Configuration
Source
Intermediate
Mode
Check / Uncheck Select destination port. The destination port is a port Unchecked
191
User Manual Managed Switches
In the Syslog are defined four different levels for the Event Log Table:
Level The level of the system log entry (Error, Warning, Notice or Informational).
192
User Manual Managed Switches
Press the Start button to run the diagnostics. When completed, the page refreshes automatically and
the cable diagnostics results are shown in the cable status table.
NOTE: The VeriPHY diagnostics tool is only accurate for cables 7 - 140 meters long.
10 and 100 Mbps ports will be disconnected while running VeriPHY diagnostics.
Therefore, running VeriPHY on a 10 or 100 Mbps management port will cause the switch
to stop responding until diagnostic is completed.
Length The length (in meters) of the cable pair. The resolution is 3 meters.
193
User Manual Managed Switches
The payload size of the ICMP packet (8 to 1400 bytes) as well as its number can be programmed by
the user. The sequence number and roundtrip time will be displayed upon reception of a reply. The
page refreshes automatically until responses to all packets are received, or until a timeout occurs.
IEEE Std 1588-2008 specifies the second generation of the Precision Time Protocol (PTP), which is
also known as “PTPv2” or “1588v2”. This is capable of very accurate time synchronization by using
special Ethernet hardware that records the exact time a PTP synchronization message is received at
the Ethernet card. It achieves clock accuracy in the sub-microsecond range, in contrast with
NTP/SNTP protocol that achieves an accuracy around 1ms.
IEEE Std 1588-2008 defines a number of terms for PTP time synchronization systems:
• Grandmaster clock: The clock that is the ultimate source of time for synchronization using
PTP and usually has a GPS receiver built-in
• Master clock: A clock that is the source of time that other clocks on the network synchronize
to
• Slave clock: The end user of PTP (ex: PLC)
• Transparent clock: An Ethernet switch that measures the time taken for a PTP
synchronization message to transit the device and provides this information to clocks
receiving the PTP event message
• Boundary clock: A clock that has multiple PTP ports and may serve as a source of time, i.e.
be a slave clock to an upstream source and a master clock to downstream devices
Ethernet switches in a PTP network will generally be transparent clocks but it may also be possible
for them to act as boundary clocks. Weidmüller switches can be programmed for both operation
modes. Transparent clock operation may be configured as peer to peer or end to end. Peer to peer
provides better accuracy but then is required that all the network devices are PTP complaint.
194
User Manual Managed Switches
When pressing the Add New PTP Clock Configuration button, the following fields have to be
programmed:
Clock Instance
Inactive / Indicates the Type of the Clock Instance. There are Inactive
Ord-Bound / five Device Types.
P2pTransp / Ord-Bound: Clock's Device Type is
E2eTransp / Ordinary-Boundary Clock.
Mastronly / P2p Transp: Clock's Device Type is Peer to Peer
Slaveonly Transparent Clock.
E2e Transp: Clock's Device Type is End to End
Transparent Clock.
Mastronly: Clock's Device Type is Master Only.
Slaveonly:-Clock's Device Type is Slave Only.
NOTE: The usual operation mode for an Ethernet
Switch in a PTP network will be Transparent Clock or
Boundary Clock.
Profile
Clicking on the clock instance number, a new page is loaded to configure all the necessary
parameters.
195
User Manual Managed Switches
The clock instance, device type and selected profile is shown. If the clock has been configured to use
a profile (eg: 1588), clicking the Apply button will reset configured values to profile defaults.
Select (check) the ports configured for this Clock Instance and click on Ports Configuration to edit
all the data settings. The port data set is defined in the IEEE 1588 Standard and the Help button of
the web page describes all the parameters that can be adjusted for each PTP port.
Shows the actual PTP time with nanosecond resolution and the actual clock adjustment method
(depending on the available hardware on the network). The button Synchronize from System
Clock is taking the switch clock reference as the PTP reference (if no Grandmaster clock available).
Shows information about the PTP network. Specifically, the number of PTP clocks traversed from the
grandmaster to the local slave clock, the difference between the master clock and the local slave
clock in nanosecond and the mean propagation time for the link between the master and the local
slave.
Shows dynamic information about the Grandmaster clock defined in the IEEE 1588 Standard. The
Help button of the web page provides a description of all the displayed parameters.
196
User Manual Managed Switches
The clock default data set is defined in the IEEE 1588 Standard. It holds three groups of data: the
static members defined at clock creation time, the Dynamic members defined by the system, and the
configurable members which can be set here. The Help button of the web page provides a
description of all the parameters that can be displayed and configured.
Show specific information about the clock time properties. The user can modify the parameters if
required. The Help button of the web page provides a description of all the parameters that can be
displayed and configured.
When operating in IPv4 Unicast mode, the slave is configured up to 5 master IP addresses. The
slave then requests Announce messages from all the configured masters. The slave uses the BMC
algorithm to select one as master clock, the slave then request Sync messages from the selected
master. The parameters that can be configured for each master are:
Duration
IP Address
Grant
Information only The granted repetition period for the sync message. None
CommState
Information only The state of the communication with the master, None
possible values are:
IDLE : The entry is not in use.
INIT : Announce is sent to the master (waiting for a
response).
CONN : The master has responded.
SELL : The assigned master is selected as current
master.
SYNC : The master is sending Sync messages.
197
User Manual Managed Switches
Device Type The type of clock for that particular instance. The five possible types are
Transparent Clock (End to End or Peer to Peer), Boundary Clock, Master
only or Slave only.
In this web page is also possible to activate the factory default configuration or startup configuration
(last saved configuration) to the switch. Select the corresponding configuration file and click the
Activate Configuration button.
Additionally, it is also possible to delete the startup configuration file by selecting the file and clicking
the button Delete Configuration File. If the startup configuration file is delete, then the factory
default settings will be used at next reboot.
198
User Manual Managed Switches
The user has the possibility to restore to factory defaults but keeping the current IP address and
username / password settings.
199
User Manual Managed Switches
• Firmware Upgrades
• Private MIB files
• Documentation (User Manual and Hardware Installation Guide)
200