Home
ConneXium Ethernet Cabling System Managed Switch
Contents
1. 4 and 8 Port Versions mm inch 46 1 8 30 48 111 a 1 2 4 37 ooo0oo0o C 5 S a h wo D m 1 e UUU oA oO o 74 2 91 30 48 111 a e 1 2 4 37 oooo a C V Se a LO i 4 TI i 4 Tan le KC ok oj o 168 31007122 8 2006 General Information 16 and 24 Port Versions mm F 1 20 Res B elg a f CD Hd 1 I KD TTT le feed la EL i 3 0 1 31007122 8 2006 169 General Information General Technical Software Data ESM The following table shows the technical data of the ESM Switch Data Latenc
2. 5 dotldBasePortMtuExceededDiscards 2 dotldStp 1 dotldStpProtocolSpecification 2 dotldStpPriority 3 dotldStpTimeSinceTopologyChange 4 dot1l1dStpTopChanges 5 dotldStpDesignatedRoot 6 dotldStpRootCost 7 dotldStpRootPort 8 dotldStpMaxAge 9 dotldStpHelloTime 10 dot1dStpHoldTime 11 dotldStpForwardDelay 12 dotldStpBridgeMaxAge 13 dotldStpBridgeHelloTime 14 dot1dStpBridgeForwardDelay 15 dotldStpPortTable 1 dotlidStpPortEntry 1 dot1ldStpPort 2 dotldStpPortPriority 3 dot1dStpPortState 4 dotidStpPortEnable 5 dotldStpPortPathCost 6 dotldStpPortDesignatedRoot 7 dot1dStpPortDesignatedCost 8 dotldStpPortDesignatedBridg 9 dot1dStpPortDesignatedPort 10 dot1dStpPortForwardTransitions 11 dot1dStpPortPathCost32 16 dot1dStpVersion 17 dotldStpTxHoldCount 18 dot1dStpPathCostDefault 19 dotldStpExtPortTable 31007122 8 2006 145 General Information 3 dotl dotl 1 2 3 4 5 dotl 1 6 1 pBri 1 dotldStpExtPortEntry 1 dotldStpPortProtocolMigration 2 dotldStpPortAdminEdgePort 3 dotldStpPortOperEdgePort 4 dot1dStpPortAdminPointToPoint 5 dotldStpPortOperPointToPoint 6 dotldStpPortAdminPathCost dSr dTp dotldTpLearnedEntryDiscards dotldTp
3. Click Load Configuration 31007122 8 2006 45 Loading and Saving Settings Loading Settings from the Local Non Volatile Memory Using the Command Line Interface CLI Loading Settings from the Memory back up adapter EAM Loading Settings from a File Proceed as follows in the CLI Step Action 1 Connect the ESM to a serial cable 2 Open the CLI 3 Enter the command enable to change to the privileged EXEC mode 4 Enter the command copy nvram startup config system running config to load the configuration data from the local non volatile memory If an EAM is connected to the ESM the ESM always loads its configuration from the EAM For information on how to save a configuration file onto an EAM refer to p 50 The ESM enables you to load the configuration data from a file in the connected network provided that no EAM is connected to it 46 31007122 8 2006 Loading and Saving Settings Loading Settings from a File Using the Web Based Load the settings as follows Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Load Save The figure below shows the Load Save dialog box Load B Local O from URL from URL 8 save local Load configuration Save o Local O to URL URL tftp 192 16
4. Open the CLI Type the command enable to switch to the privileged EXEC mode AJOJN Type the command network protocol Ethernet Switch Configurator off to switch off the Ethernet Switch Configurator function Type the command network protocol Ethernet Switch Configurator read only to switch on the ESC function with the Read access right Type the command network protocol Ethernet Switch Configurator read write to switch on the ESC function with the Read and Write access right 70 31007122 8 2006 Protection from Unauthorized Access Port Access Control Description of Port Access Control The ESM protects every port from unauthorized access Depending on your choice the ESM checks either the MAC address or the IP address of the connected device The following functions are available for monitoring every individual port e Who has access to this port The ESM recognizes two classes of access control e all There is no access restriction e user Only an assigned user has access You define this user with his MAC or IP address e What should happen after an unauthorized access attempt The ESM can respond in three selectable ways to an unauthorized access attempt e none no response e trapOnly message by sending a trap e portDisabled message by sending a trap and disabling a port Note Since the ESM is a layer 2 device it translates the stored IP addresses i
5. The following table shows an application example Switch 149 218 112 1 149 218 112 2 149 218 112 3 PTP Function On On On Clock Mode PTP Mode PTP Mode PTP Mode Boundary Clock Boundary Clock Boundary Clock Preferred Master False False False SNTP Function On On On Anycast Destination Address 224 0 1 1 224 0 1 1 224 0 1 1 Server VLAN ID 1 1 1 Anycast Send Interval 30 30 30 Client External Server Address 149 218 112 0 0 0 0 0 0 0 0 0 Server Request Interval Any Any Any Accept SNTP Broadcasts No No No In the example above the left switch receives as the SNTP client the system time from the NTP server using SNTP The switch assigns to a time received from an NTP server the stratum clock number 2 see table on p 82 Thus the left switch becomes the reference clock for PTP synchronization PTP is active in all three switches ensuring that relative to each other the system times of the switches are synchronized precisely As the connectable end devices in the example exclusively support SNTP all three switches serve as SNTP servers 86 31007122 8 2006 Traffic Control At a Glance Overview This chapter describes traffic control What s in this This chapter contains the following topics Chapter Topic Page Directed Frame Forwarding 88 Multicast Application 91 The Broadcast Limiter 96 Prioritization 97 Flow Contr
6. 31007122 8 2006 157 General Information 11 saRelayInterfaceTabl 1 saRelayIfEntry 1 saRelayIfaceGroupID 2 saRelayIfaceID 3 saRelayIfaceOption82Enable 4 saRelayIfaceBCReguestFwd 20 saRelayBCPktInCnt 21 saRelayMCPktInCnt 22 saRelayPktServerRelayCnt 23 saRelayPktClientRelayCnt 24 saRelayErrCnt 25 saRelayLastDuplicateIP User Groups The user groups group contains parameters for configuring the user group Group functions 14 saConfiguration 3 saUserGroup 4 saPortSecurityTable 1 saPortSecurityEntry 1 saPortSecSlotID 2 saPortSecPortID 3 saPortSecPermission 4 saPortSecAllowedUserID 5 saPortSecAllowedGroupIDs 6 saPortSecConnectedUserID 7 saPortSecAction 8 saPortSecAutoReconfigure Redundancy The redundancy group contains parameters for configuring the redundancy Group functions 14 saConfiguration 5 saRingRedundancy 1 saRingRedTable 1 saRingRedEntry 1 saRingRedPrimGroupID 158 31007122 8 2006 General Information saRingRedPrimIfIndex saRingRedPrimIfOpState saRingRedRedGroupID saRingRedRedIfIndex saRingRedRedIfOpState saRingRedOperState saRingRedMode saRingRedConfigOperState 2 saRingCouplingTable 1 saRingCouplingEntry tt 10 saProducts 2 ESMx
7. therStatsUndersizePkts etherStatsOversizePkts etherStatsFragments 31007122 8 2006 141 General Information 2 21 history 1 historyC On therStatsJabbers therStatsCollisions tnerStatsPkts64Octets tnerStatsPkts65to127Octets tnerStatsPkts128to255Octets tnerStatsPkts256to511Octets tnerStatsPkts512to1023Octets therStatsPkts1024to1518Octets therStatsOwner therStatsStatus trolTable 1 historyControlEntry 2 etherHis 1 ethe hi hi hi hi hi hi hi et et et e toryTable storyControlIndex storyControlDataSource storyControlBucketsReguested storyControlBucketsGranted storyControlInterval storyControlOwner storyControlStatus rHistoryEntry herHistoryIndex herHistorySampleIndex herHistoryIntervalStart therHistoryDropEvents therHistoryOctets therHistoryPkts therHistoryBroadcastPkts therHistoryMulticastPkts therHistoryCRCAlignErrors therHistoryUndersizePkts therHistoryOversizePkts 142 31007122 8 2006 General Information alarm 3 1 a 9 1 event li 2 l eventi logTable 1 2 a a a a a a a a a Ee e e e e e HE 1 etherHistoryFragments etherHistoryJabbers etherHistoryCollisions etherHistoryUtilization larmTable larmEntry larmInde
8. 108 31007122 8 2006 Operation Diagnostics At a Glance Overview This chapter describes the diagnosis tools of your switch What s in this This chapter contains the following topics Chapter Topic Page Sending Traps 110 Contact Signal 114 Displaying the Port Status 117 Event Counter on Port Level 118 Displaying the SFP Status 120 Topology Discovery 121 Reports 124 Monitoring Port Traffic 125 31007122 8 2006 109 Operation Diagnostics Sending Traps SNMP Traps SNMP Trap Listing If unusual events occur during normal operation of the ESM they are reported immediately to the management station This is done by means of so called trap alarms that bypass the polling procedure Polling means to query the data stations in regular intervals Traps make it possible to react quickly to critical situations Examples for such events are e hardware reset e changing the basic device configuration e segmentation of a port Traps can be sent to various hosts to increase the transmission reliability for the messages A trap message consists of a packet that is not acknowledged The management agent sends traps to those hosts that are entered in the target table trap destination table The trap destination table can be configured with the management station via SNMP All possible traps that can occur are listed in the following table Trap Description
9. 4 ipRouteMetric2 5 ipRouteMetric3 6 ipRouteMetric4 7 ipRouteNextHop 8 ipRouteType 9 ipRouteProto 10 ipRouteAge 11 ipRouteMask 12 ipRouteMetric5 13 ipRoutelnfo 22 ipNetToMediaTable 1 ipNetToMediaEntry 1 ipNetToMedialfIndex 2 ipNetToMediaPhysAddress 3 ipNetToMediaNetAddress 4 ipNetToMediaType 23 ipRoutingDiscards 31007122 8 2006 137 General Information ICMP Group The internet control message protocol group is obligatory for all systems It contains 1 3 6 1 2 1 5 all the information on error handling and control for data exchange in the Internet 5 icmp 1 icmpInMsgs 2 icmpInMsgs 3 icmpInDestUnreachs 4 icmpInTimeExcds 5 icmpInParmProbs 6 icmpInSrcQuenchs 7 icmpInRedirects 8 icmpInEchos 9 icmpInEchoReps 10 icmpInTimestamps 11 icmpInTimestampReps 12 icmpInAddrMasks 13 icmpInAddrMaskReps 14 icmpOutMsgs 15 icmpOutErrors 16 icmpOutDestUnreachs 17 icmpOutTimeExcds 18 icmpOutParmProbs 19 icmpOutSrcQuenchs 20 icmpOutRedirects 21 icmpOutEchos 22 icmpOutEchoReps 23 icmpOutTimestamps 24 icmpOutTimestampReps 25 icmpOutAddrMasks 26 icmpOutAddrMaskReps 138 31007122 8 2006 General Inform
10. Ordinary Clock Slave Master Boundary Clock 31007122 8 2006 83 Synchronizing the System Time of the Network Setting Up Your Network and Enabling PTP Independent of the physical communication paths PTP provides logical communication paths you define when you set up PTP subdomains Subdomains are designed to create groups of clocks that are time independent of the rest of the domain Typically the clocks use the same communication paths that other clocks use The following figure illustrates how subdomains work Reference Grandmaster Clock Boundary You can set up your network and enable PTP as follows Step Action 1 Draw a network plan showing all devices involved in PTP 2 Connect all connections you need to distribute PTP information to devices equipped with an integrated time stamp unit RT modules Devices which are not equipped with a time stamp unit obtain the PTP information and set their clocks accordingly They are not involved in the protocol 3 Connect all devices to Ethernet cables 4 Open the Web based interface 5 Go to Time gt PTP 6 Select On to enable the PTP function on all devices whose time you want to synchronize using PTP 7 Click Set to retain your setting 8 If there is no reference clock available designate a switch as reference clock and set the system time as precisely as possible 84 31007122 8 2006
11. e the faulty link status of the control line e partner device in stand by mode The management setting determines which events causes a contact to the ESM Note With non redundant supply of the mains voltage the EMS reports a power failure You can prevent this message by applying the supply voltage over the two inputs or by switching off the monitoring function This mode enables you to carry out the remote switching of each signal individually You have the following applications options simulating an error during PLC error monitoring remote controlling a device using SNMP for instance switching on a camera 114 31007122 8 2006 Operation Diagnostics Setting Up Procedure Using the Web Based Interface Configuring the Signal Contact for Monitoring Set the signal contact as follows Step Action Connect the ESM to an Ethernet cable Open the Web based interface Go to Diagnostics gt Signal Contact AJo Pm Click Manual setting in the Mode Signal contact frame to set contact to manual oa Click Opened in the Manual Setting group box to open the contact Click Closed in the Manual Setting group box to close the contact Configure the signal contact as follows Correct Operation in the Web Based Interface Step Action 1 Go to Diagnostics gt Signal Contact The dialog below appears Mode Signal contaet
12. On the start screen of the System Monitor select 4 End reset and reboot to perform a cold start 31007122 8 2006 55 Loading Software Updates Loading Software Updates from the TFTP Server TFTP Server Note For a tftp see tftp update you need a tftp server on which the ESM software you wish to load is saved 56 31007122 8 2006 Loading Software Updates Loading Download ESM software updates from the tftp server as follows Procedure Using the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Software The screen below shows the Software dialog box Stored version RAM Running version Bachup version 2 00 2005 05 06 23 13 RAM 2 00 2005 05 06 23 13 BAK 2 00 2005 05 06 16 53 tftp Sotware Update URL tftp 192 168 1681 100 product product bin tftp Update http http Update Help iggy The URL identifies the path to the software stored on the tftp server It is written as follows tftp IP address of the tftp server path name file name e g tftp 149 218 112 4 esm esm bin 4 Click tftp Update to load the software from the tftp server onto the switch After the loading procedure has been completed successfully activate the new software as follows Go to Basics gt Restart and perform a cold st
13. Port Security A data packet has been received on one port from an unauthorized end device 31007122 8 2006 113 Operation Diagnostics Contact Signal Description of the Contact Signal Manually Setting the Signal Contact The signal contacts are for controlling external devices by manually setting the signal contacts monitoring proper functioning of the ESM which makes it possible to perform remote diagnostics By means of the potential free signal contact relay contact closed circuit a contact break is reported This can be due to faulty power supply the failure of the supply voltage 1 2 power supply voltage 1 or 2 lt 18 V a continuous malfunction in the ESM internal 3 3 VDC voltage values that exceed or fall below the set temperature threshold removing a module removing the back up configuration adapter the defective link status of at least one port With the ESM the displaying of the link status can be masked by the management for each port see p 62 The link status is not monitored in the default settings HIPER ring event the loss of redundancy guarantee in redundancy manager mode The Ring redundancy monitoring default setting is monitoring turned off redundant ring net coupling event the loss of redundancy guarantee Ring redundancy monitoring default setting is monitoring turned off In Stand by mode the ESM reports additionally the following conditions
14. THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE 31007122 8 2006 181 General Information 182 31007122 8 2006 Switch Function Examples At a Glance Overview What s in this Chapter This chapter provides two examples illustrating key ESM switch functions This chapter contains the following topics Topic Page Setting Up the DHCP Server for Option 82 184 TFTP Server for Software Updates 187 31007122 8 2006 183 Switch Function Examples Setting Up the DHCP Server for Option 82 Introduction A WARNING UNINTENDED OPERATION If IP addresses are assigned using DHCP option 82 changing the port to which a device is connected will cause its IP address to change e Do not change device port connections on the ESM e When performing maintenance on an ESM make sure to label each Ethernet cable with the ESM port number assigned so that you can reestablish the same configuration Failure to follow this instruction can result in death serious injury o
15. This means the same time is displayed worldwide and that differences are not taken into account e System Time uses IEEE 1588 SNTP time allowing for the local time difference of IEEE 1588 SNTP time System Time IEEE 1588 SNTP time Local offset e Time Source displays the origin of the following time The ESM automatically selects the source with the highest precision e If you click Set Time from PC the switch will load the PC s time as the system time and calculate IEEE 1588 SNTP time allowing for the local time difference IEEE 1588 SNTP time System time Local offset e Local offset allows you to display enter the time difference between local time and IEEE 1588 SNTP time e If you click Offset from PC the switch will calculate the time zone on your PC on the basis of which it will calculate the local time difference Note When setting the time zones with summer and winter times make an adjustment for the local offset The switch can also receive the IP address of the SNTP server as well as the local offset from a DHCP server Set the system time and enter the difference between SNTP and IEEE 1588 as follows Step Action 1 Connect the ESM to a serial cable 2 Open the CLI 3 Enter the command enable to change to the privileged EXEC mode 4 Enter the command configure to change to the configuration mode 5 Enter the command sntp time lt YYYY MM DD HH MM SS gt to set the switch
16. ae Event Log a Bj Ports g Statistics SFP modules 4 Topology Discovery Port Mirroring 77 7 Signal Contact ATEN Yz Alarms Traps B Report Gig DHCP Relay Agent e nae G About Index 31007122 8 2006 19 The User Interfaces 20 31007122 8 2006 Entering the IP Parameters At a Glance Overview What s in this Chapter This chapter provides information concerning the IP parameters This chapter contains the following topics Topic Page Basics of the IP Parameters 22 Configuring the ESM using the Command Line Interface 26 Configuring the ESM Using the Ethernet Switch Configurator ESC Software 28 Loading the System Configuration from the Memory Back Up Adapter EAM 30 System Configuration Using BOOTP 31 System Configuration Using DHCP 35 System Configuration Using DHCP Option 82 40 System Configuration Using the Web Based Interface 41 Faulty Device Replacement 42 31007122 8 2006 21 Entering the IP Parameters Basics of the IP Parameters Background Information concerning the IP Address The IP address is used for the configuration of the ESM The IP address background information is discussed here The IP addresses consist of four bytes These four bytes are written in decimal notation each separated by a dot Five classes of IP addresses were defined i
17. e select the operation mode transfer speed duplex operation in the Manual Configuration column e and deactivate the port in the Auto negotiation column Note The active auto negotiation has priority over the manual configuration 31007122 8 2006 61 Port Configuration Displaying Connection Error Messages General Information Activating Connection Error Messages If the ESM is set to default it will display a connection error via the signal contact and the LED display The ESM allows you to disable the displaying of connection error messages for instance to prevent a device that has been turned off from being interpreted as an interrupted line Activate the connection error messages as follows Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Port Configuration 4 In the Signal Contact mask column select the ports whose connections you want to mask the displaying of the connection error message 62 31007122 8 2006 Protection from Unauthorized Access 6 At a Glance Overview This chapter provides information on how to protect your network from unauthorized access What s in this This chapter contains the following topics 2 Chapter Topic Page The Password for SNMP Access 64 Setting the Telnet Web Based Access 68 Disabling the Ethernet Switch Configurat
18. Synchronizing the System Time of the Network Interaction between PTP and SNTP Suggested PTP and SNTP permit each other to coexist in one network However since both Configuration of protocols influence the system time of the device situations may occur in which they Devices compete with each other Note Configure the devices in such a way that each device receives the system time exclusively from one source If you want the switch to receive the system time using PTP enter the external server address 0 0 0 0 and do not accept any SNTP broadcasts when performing the SNTP client configuration If you want the switch to receive the system time using SNTP make sure that the best clock is connected to the SNTP server Thus both protocols receive the time from the same server Application This figure shows an application example of the coexistence of PTP and SNTP Example GPS PLC SNTP Client NTP SNTP N 149 218 112 0 M S SNTP Client SNTP Client SNTP Server SNTP Server SNTP Server PTP PTP PTP 149 218 112 1 149 218 112 2 149 218 112 3 31007122 8 2006 85 Synchronizing the System Time of the Network The requirements made to network time accuracy are rather high however the end devices exclusively support SNMP which is less precise than PTP SNTP achieves an accuracy of milliseconds whereas PTP has an accuracy of fractions of microseconds see fig above
19. e Local IP Address address network mask and if The default setting local IP address of the necessary gateway switch is 0 0 0 0 e Network Mask Enter the networks mask here if your network has been divided into subnetworks and if these are identified with a network mask The default setting of the network mask is 0 0 0 0 e IP Address of the Gateway This entry is only needed if the switch and the management station tftp server are located in different subnetworks Type the IP address of the gateway between the subnetwork of the switch and the path to the management station The default setting of the IP address is 0 0 0 0 6 Save the configuration entered by typing the command copy system running config nvram startup config and press ENTER 7 Confirm that you wish to save by pressing Y After entering the IP parameters using the CLI you can easily configure the ESM using the Web based interface see p 47 31007122 8 2006 27 Entering the IP Parameters Configuring the ESM Using the Ethernet Switch Configurator ESC Software General Select the IP address using the ESC software if Information e the ESM is already installed on your network or e if there is another Ethernet connection between your PC and the ESM available Note You can easily configure additional parameters using the Web based interface see p 47 Note The installation of the ESC involves installin
20. link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 9 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Library or any work based on the Library you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Library or works based on it 10 Each time you redistribute the Library or any work based on the Library the recipient automatically receives a license from the original licensor to copy distribute link with or modify the Library subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties with this License 11 If as a consequence of a court judgment or allegation of patent infringement or for any other reason not li
21. procedure for controlling access to management information 3 snmpModules 16 5 snmpVacmMIB vacmMIBObjects 1 vacmContextTable 1 vacmContextEntry 1 vacmContextName 2 vacmSecurityToGroupTable 1 vacmSecurityToGroupEntry 1 vacmSecurityModel 2 vacmSecurityName 3 vacmGroupName 31007122 8 2006 163 General Information 4 vacmSecurityToGroupStorageType 5 vacmSecurityToGroupStatus 4 vacmAccessTable 1 vacmAccessEntry 1 vacmAccessContextPrefix 2 vacmAccessSecurityModel 3 vacmAccessSecurityLevel 4 vacmAccessContextMatch 5 vacmAccessReadViewNam 6 vacmAccessWriteViewNam 7 vacmAccessNotifyViewName 8 vacmAccessStorageType 9 vacmAccessStatus 5 vacmMIBViews 1 vacmViewSpinLock 2 vacmViewTreeFamilyTable 1 vacmViewTreeFamilyEntry 1 vacmViewTreeFamilyViewName 2 vacmViewTreeFamilySubtree 3 vacmViewTreeFamilyMask 4 vacmViewTreeFamilyType 5 vacmViewTreeFamilyStorageType 6 vacmViewTreeFamilyStatus 164 31007122 8 2006 General Information RFCs List of RFCs The following table contains a list of RFCs RFC 768 UDP RFC 783 TFTP RFC 791 IP RFC 792 ICMP RFC 793 TCP RFC 826 ARP RFC 854 Telnet sas pom s eet
22. 00 00 00 0 0 0 0 none 2 3 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 2 4 enabled 00 00 00 00 00 00 00 0D 60 6F 1E E0 0 0 0 0 none Set Help iggy Choose IP Based Port Security Enter in the Allowed IP address column the IP address of the device with which data exchange is permitted at this port Without an entry data can be received from any device 6 In the Action column select one of the following reactions to an unauthorized access attempt no action none message by sending a trap trapOnly e the respective port in the Port Configuration table is disabled see p 59 and trap portDisabled is sent An entry in the Port Configuration table is part of the configuration and is saved with the configuration An alarm trap can only be sent if at least one recipient is entered under Configuring Traps Using the Web Based Interface p 112 and if both the appropriate status and Port Security are marked 72 31007122 8 2006 Protection from Unauthorized Access Defining MAC Based Port Access Control Using the Web Based Interface Define the MAC based port access control as follows Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web Based Interface 3 Go to Security Port Security The following dialog box appears Configuration MAC Based Port Security OlP Based Port
23. 1 4 1 3833 Octet String ASCII character string PSID power supply identifier power supply number Time Ticks Stopwatch elapsed time in seconds numerical value 100 numerical value integer in the range 0 232 Timeout time value in hundredths of a second time value integer in the range 0 232 Type Field 4 digit hexadecimal number in accordance with ISO IEC 8802 3 Counter Integer 0 232 whose value is incremented by 1 when certain events occur 31007122 8 2006 131 General Information MIB Tree Structure 1 system 2 interfaces 3 at 4ip 5 icmp 7 udp 11 snmp 16 rmon 17dot1dBridge 26 snmpDot3MauMGT O O Oo The following flowchart describes the tree structure of the ESM MIB 2 mgmt 6 snmp V2 1 mib 2 3 modules 10 framework 14 saConfiguration 13 notification 15 usm 16 vacm Note Not all devices support all object classes The value not supported is given in response to a non supported object class request Any attempt to alter a non supported object class produces the message bad value 32 31007122 8 2006 General Information MIB II System Group 1 3 6 1 2 1 1 The system group is a required group for all systems It contains system related objects If an agent has no value for a variable then the response returned includes a string of length 0 1 system sysDescr
24. 7 saAuthGroup saFSUpdFileName saFSConfFileName saFSLogFileName saFSUserName saFSTPPassword saFSAction saFSActionRes saFSBootConfi ult guration saFSRunningConfiguration 1 saBackupC e saTemperature m empUprLimi Es saTempLwrLimi saAuthHostTab saAuthCommTab saAuthCommTab figGroup onfigAdapterStatus t E leEntriesMax leEntriesMax le 1 saAuthCommEntry 1 saAut 2 saAut 3 saAut 4 saAut saAuthHostTab 1 saAuthHos 1 saAut 2 saAut 3 saAut 4 saAut 5 saAut 6 saAut 8 saTrapGroup hCommIndex hCommName hCommPerm hCommState le tEntry hHostIndex hHostName hHostCommIndex hHostIpAddress hHostIpMask hHostState 31007122 8 2006 155 General Information bey co 10 paso 1 ese of 1 sa 2 sa 3 sa 1 4 sa aa 1 3 sa saMul salG 2 sa 1 2 TrapCommTableEntriesMax TrapDestTableEntriesMax TrapCommTable saTrapCommEntry 1 saTrapCommIndex 2 saTrapCommCommIndex 3 saTrapCommColdStart 4 saTrapCommLinkDown 5 saTrapCommLinkUp 6 saTrapCommAuthentication 7 saTrapCommBridge 8 saTrapCommRMON 9 saTrapCommUsergroup 10 saTrapCommDualHoming 11 saTrapCommChassis 12 saTrapCommState TrapDestTable saTrapDestEntry 1 saTrapDestIndex 2 saTrapD
25. A trap is sent if authenticationFailure A station attempts to access an agent without permission coldStart A cold and warm start occurs during the boot process after successful management initialization saMemoryBackupAdapterTrap The Memory back up adapter is inserted or removed linkDown The link to a port breaks linkUp The link to a port is re established saTemperature This alarm message is sent if the temperature exceeds the limit set saPowerSupply The status of the voltage supply changes saSignallingRelay The status of the signal contact changes newRoot The sending agent becomes the new root of the spanning tree topologyChange The transmission mode of a port changes risingAlarm An RMON alarm input exceeds the upper threshold fallingAlarm an RMON alarm input falls below the lower threshold 110 31007122 8 2006 Operation Diagnostics SNMP Traps when Booting Trap Description A trap is sent if saPortSecurityTrap A MAC address is detected at the port which does not correspond to the current settings of saPortSecPermission and saPorSecAction set either to trapOnly 2 or portDisable 3 saModuleMapChange The hardware configuration has changed saBDPUGuardTrap A BPDU is received at a port although the BPDU guard function is activated saRingRedReconfig when the configuration of the redundant ring changes
26. ConneXium Ethernet Cabling System Managed Switch Installation Manual 31007122 8 2006 About the Book Product Related Warnings User Comments Schneider Electric assumes no responsibility for any errors that may appear in this document If you have any suggestions for improvements or amendments or have found errors in this publication please notify us No part of this document may be reproduced in any form or by any means electronic or mechanical including photocopying without express written permission of Schneider Electric All rights reserved Copyright 2006 When controllers are used for applications with technical safety requirements please follow the relevant instructions Failure to use Schneider Electric software or approved software with our hardware products may result in injury harm or improper operating results Failure to observe this product related warning can result in injury or equipment damage We welcome your comments about this document You can reach us by e mail at techpub schneider electric com 10 31007122 8 2006 The User Interfaces At a Glance Overview This chapter provides information concerning the user interfaces What s in this This chapter contains the following topics 2 Chapter Topic Page The System Monitor 12 The Command Line Interface CLI 14 The Web Based Interface 16 31007122 8 2006 11 The User Inte
27. Enter the command no transport input telnet to switch off the Telnet server You can enable and disable the Web access via the CLI as follows Step Action 1 Enter the command enable to switch to the privileged EXEC mode 2 Enter the command ip http server to switch on the Web server 3 Enter the command no ip http server to switch off the Web server 31007122 8 2006 69 Protection from Unauthorized Access Disabling the Ethernet Switch Configurator ESC Function Description of the ESC Software Disabling and Limiting the ESC Function Using the Web Based Interface Disabling Limiting and Enabling the Ethernet Switch Configurator Function Using the Command Line Interface The ESC software see p 28 allows you to assign an IP address to the ESM on the basis of its MAC address Note For security reasons either limit or switch off completely the ESC function of the ESM after assigning the IP parameters You can disable or limit the ESC function as follows Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Network 4 Switch off the ESC function in the Ethernet Switch Configurator Software group box or limit access to Read Only You can disable limit or enable the Ethernet Switch Configurator function as follows Step Action 1 Connect the ESM to a serial cable
28. browser window Click System Information to open the HTML file in a new browser window 124 31007122 8 2006 Operation Diagnostics Monitoring Port Traffic Port Mirorring In port mirroring data traffic related to one port the source port is copied to another the destination port Data traffic at the source port is not influenced by port mirroring A management tool connected to the destination port like an RMON probe can observe data traffic at the source port The destination port forwards data to be sent and blocks received data Port monitoring is shown in the figure below PLC Backbone RMON Probe 31007122 8 2006 125 Operation Diagnostics Monitoring Port Monitor port traffic as follows Traffic Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Diagnostics Port Mirroring The window below appears Module Port Source port Destination port J enabled Set Reload Delete Help o Select the source port whose data traffic you wish to monitor Select the destination port to which you have connected your management tool Click enabled to enable the function 126 31007122 8 2006 Appendices At a Glance What s in this Appendix The appendix contains the fo
29. control 72 port mirroring 125 figure 125 port traffic monitoring port traffic 125 31007122 8 2006 197 Index ports configuration 59 prioritization assignment of priorities 97 description 97 private MIB defined 151 R redundancy group 158 reload button 18 resetting the configuration to the default settings 49 RFCs 165 RMON group 141 S saving locally and on the EAM using the CLI 50 using the Web based interface 50 saving to a file using the CLI 51 using the Web based interface 51 server option 82 example 184 set button 18 settings loading and saving 43 signal contact configuration 115 display 116 setting manually 114 simple network management protocol group 140 SNMP traps definition 110 types 110 SNMP V2 management framework 160 module MIB 160 MPD group 160 notification group 162 target group 161 USM group 162 VACM group 163 SNTP configuration 80 description 79 preparation of configuration 79 screenshot 80 software updates tftp server for software updates 187 software updates using tftp update requirements 187 source address 24 static address entries 89 subidentifier 130 SunOS tftp process 188 system configuration using BOOTP 31 system group 133 system group objects 134 System Monitor data transfer parameters 12 opening 13 system network time protocols 76 T target table configuration 110 TCP 139 Telnet description of Tel
30. dotlqMaxVlanId 3 dotlqMaxSupportedVlans 31007122 8 2006 147 General Information 4 5 dotlqNumVlans dotlqGvrpStatus 2 dotlqTp 1 1 1 2 2 1 dotlgTpFdbTabl dotlqFdbTable dotlgFdb Entry dotlqFdbId dotlqFdbDynamicCount e dot1gTpFdbEntry 1 2 3 3 1 lt 2 3 dot1gTpGroup 1 dot1g1 dot1g1 dot1g1 dot1g1 dot1g1 pFdbAddress pFdbPort dot1g1 dotlqTpGroupTable En pGrou pGroup pGroup pFdbStatus try pAddress EgressPorts Learnt P04 1 1 2 3 5 js 1 sa 3 dotlqForwardAllTable dotlgForwardUnregisteredS dotlgForwardAllEntry dotlgForwardAllPorts dotlqForwardAllStaticPorts dotlqForwardAllForbiddenPorts dotlqForwardUnregisteredTabl dotlqForwardUnregisteredEntry dotlqForwardUnregisteredPorts taticPorts dotlgForwardUnregisteredForbiddenPorts 3 1 1 sh li 2 3 dotlgStatic dot1lgStaticUnicastTable dotlqStaticUnicastEntry dotlgqStaticUnicastAddress dot1gStaticUnicastReceivePort dot1gStaticUnicastAllowedToGoTo 148 31007122 8 2006 General Information 4 dot1gStaticUnicastStatus 2 dotlqStaticMulticastTable 1 dotlqStaticMulticastEntry 1 2 3 dotigqStaticMulticastAddress dotlqSt
31. in any way that the product will function as described and disclaims any responsibility for damages that may result from its use 186 31007122 8 2006 Switch Function Examples TFTP Server for Software Updates Switch Software The ESM software is in the flash memory by default The ESM boots the software from the flash memory Software updates can be realized via a tftp server This presupposes that a tftp server has been installed in the connected network and that it is active Note An alternative to the tftp update is the http update If you perform an http update you do not have to configure the tftp server The ESM requires the following information for updating software from the tftp server e its own IP address entered permanently e the IP address of the tftp server or gateway to the tftp server e the path in which the operating system of the tftp server is located File transfer between the ESM and the tftp server is handled by way of the Trivial File Transfer Protocol tftp Management station and tftp server may be made up of one or more computers Preparation of the tftp server for the ESM software involves e setting up the ESM directories and copying ESM software e setting up the tftp process Prerequisites for The general prerequisites for setting up the tftp process are the following Setting Up the e The ESM knows its local IP address and the IP address of tftp server
32. integrated into the multicast addressing scheme by means of a static filter address entry on the connector port The multicast tree is set up within 5 seconds in a network of up to 20 EMS modules after the multicast address has been entered for the first time at an EMS port This time period depends on the Join Time that is set default setting 200 ms 31007122 8 2006 93 Traffic Control Setting Multicast The remaining blocks of this map explain the setting of multicast applications Applications Global IGMP Set the multicast applications as follows GMRP Configuration Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Switching gt Multicasts The following figure shows the Multicasts dialog box Global Configuratio IGMP Querier 6 IGMP Snooping IGMP Querier active O GMRP Protocol Version O1 62 O disabled IGMP Static Module Port IGMP Forw Query enabled All Port 1 1 M O oO e 1 2 v 1 3 V 1 4 M O O 2 1 v 2 2 V 2 3 V oO Oo 2 4 V Set E 4 Click the check box to switch IGMP Snooping on off globally for the entire switch If the IGMP snooping is switched off e the switch does not evaluate query and report packets received and e it sends floo
33. is comparable to going from layer three to layer two of the ISO OSI base reference model Finally Romeo puts the entire data packet into the mailbox This is comparable to going from layer two to layer one i e to sending the data packet over the Ethernet Lorenzo receives the letter and removes the outer envelope From the inner envelope he recognizes that the letter is meant for Juliet He places the inner envelope in a new outer envelope and searches his address list the ARP table for Juliet s MAC address He writes her MAC address on the outer envelope as the destination address and his own MAC address as the source address He then places the entire data packet in the mail box Juliet receives the letter and removes the outer envelope exposing the inner envelope with Romeo s IP address Opening the letter and reading its contents corresponds to transferring the message to the higher protocol layers of the ISO OSI layer model Juliet would now like to send a reply to Romeo She places her reply in an envelope with Romeo s IP address as destination and her own IP address as source The question then arises where should she send the letter since she did not receive Romeo s MAC address It was lost when Lorenzo replaced the outer envelope In the MIB Juliet finds Lorenzo listed under the variable aNetGatewaylPAddr as a means of communicating with Romeo The envelope with the IP addresses is therefore placed in a further envelope with t
34. is described in the IEEE 1588 standard achieves accuracies in the order of fractions of microseconds Note Choose the protocol which best meets your requirements When using both protocols at the same time bear in mind that they interact 76 31007122 8 2006 Synchronizing the System Time of the Network Entering the System Time Entering the If there is no reference watch available you can enter the system time in the ESM System Time so that you can use it like a reference clock see p 80 Using PTP or SNTP Making Time Make settings independent of PTP or SNTP as follows Related Settings Using the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Time 4 Make your time related settings in the screen below IEEE 1588 SNTP time System time Set Time from PC Time Source local v Local offset min Set Offset from PC Sa Fe iy 31007122 8 2006 77 Synchronizing the System Time of the Network Possible Time Related Settings Setting the System Time and Entering Differences Between IEEE 1588 and SNTP Time Using the CLI You can make the following settings independent of PTP or SNTP e IEEE 1588 Time displays the time received via PTP SNTP Time displays the time with reference to Universal Time Coordinated UTC
35. m s em cas RFC 855 Telnet Option RFC 951 BOOTP RFC 1112 IGMPv1 RFC 1155 SMIv1 RFC 1157 SNMPv1 RFC 1212 Concise MIB Definitions RFC 1213 MIB2 RFC 1493 Dot1d RFC 1542 BOOTP Extensions RFC 1643 Ethernet Like MIB RFC 1757 RMON RFC 1769 SNTP RFC 1867 HTML 2 0 Forms W File Upload Extensions RFC 1905 Protocol Operations for SNMP v2 RFC 1906 Transport Mappings for SNMP v2 RFC 1907 MIB2 RFC 1908 Coexistence Between SNMP v1 and SNMP v2 RFC 1945 HTTP 1 0 RFC 2068 HTTP 1 1 RFC 2131 DHCP RFC 2132 DHCP Options RFC 2233 The Interface Group MIB Using SMI v2 RFC 1901 Community Based SNMP v2 RFC 2236 IGMPv2 31007122 8 2006 165 General Information RFC 2239 MAU MIB RFC 2246 The TLs Protocol Version 1 0 RFC 2271 SNMP Framework MIB RFC 2346 AES Ciphersuites for Transport Layer Security RFC 2570 Introduction to SNMP v3 RFC 2571 SNMP Framework RFC 2572 SNMP MPD RFC 2573 SNMP Applications RFC 2574 SNMP USM RFC 2575 SNMP VACM RFC 2576 Coexistence Between SNMP v1 v2 and v3 RFC 2578 SMI v2 RFC 2579 Textual Conventions for SMI v2 RFC 2580 Conformance Statements for SMI v2 RFC 2613 SMON RFC 2618 RAD
36. number of broadcasts that can be sent out of this port within a second If more than the maximum entered number of broadcasts are sent within a second the switch rejects all subsequent broadcasts destined for this port A global setting activates deactivates the broadcast limiter function at all ports Step Action Comment 1 Connect the ESM to an Ethernet cable Open the Web based interface 3 Go to Switching gt Broadcast In the check box you can switch on and Limiter to set the options per port off the broadcast limiter for all ports 4 Enter a number of broadcast for each e 0 no limitation on the broadcasts port out of this port gt 0 maximum number of broadcasts that can be sent out of this port 96 31007122 8 2006 Traffic Control Prioritization Descripton of This function prevents high priority data traffic from being disrupted by other traffic Prioritization during busy periods Low priority traffic is discarded when the memory or transmission channel is overloaded The EMS supports four priority queues traffic classes in compliance with IEEE 802 1D 1998 The assignment of received data packets to these classes depends on e the priority of the data packet contained in the VLAN tag priority over port priority e the priority for receiving the data packets that do not contain a tag see p 59 Assignment of The as
37. of a DHCP client with a name instead of the MAC address For the DHCP this name is known as the client identifier in accordance with rfc 2131 The ESM uses the name entered under sysName as the client identifier in the system group of the MIB II You can enter the system name directly via SNMP the Web based management or the user interface Configure the ESM as follows Step Action 1 Connect the ESM to a serial cable when using the CLI and to an Ethernet cable when using the Web based interface Activate DHCP to receive the configuration data in the CLI or refer to p 41 Change to the privileged EXEC mode by typing enable and press the ENTER key 4 Enable DHCP by typing configure protocol DHCP and press the ENTER key 5 Perform the configuration providing the DHCP server with the required switch data 6 Save the configuration performed by typing the command copy system running nvram startup config and press the ENTER key 7 Confirm that you wish to save the configuration by pressing Y 31007122 8 2006 35 Entering the IP Parameters Flow Chart for On startup an ESM receives its configuration data according to the BOOTP DHCP the DHCP procedure described in the following chart Process Start up Load boot configuration Local Default Load settings from flash memory ESM initialization ESM runs with settings from local flash Send DHCP BOOTP requ
38. programs whose distribution conditions are incompatible with these write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 31007122 8 2006 179 General Information Applying These Terms 16 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY INCLUDING BUT NOT L
39. purpose remains meaningful For example a function in a library to compute square roots has a purpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any application supplied function or table used by this function must be optional if the application does not supply it the square root function must still compute square roots These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Library and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Library the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a work based on the Library on a volume of a storage or distribution medium does not bring the other work under the scope of this Lice
40. snmpNotifyFilterProfileTable 1 snmpNotifyFilterProfileEntry 1 snmpNotifyFilterProfileName 2 snmpNotifyFilterProfileStorType 3 snmpNotifyFilterProfileRowStatus 3 snmpNotifyFilterTable 1 snmpNotifyFilterEntry 1 snmpNotifyFilterSubtree 2 snmpNotifyFilterMask 3 snmpNotifyFilterType 4 snmpNotifyFilterStorageType 5 snmpNotifyFilterRowStatus USM Group The USM group User Based Security Model defines the elements of procedure for providing SNMP message level security 3 snmpModules 15 snmpUsmMIB 1 usmMIBObjects 1 usmStats 1 usmStatsUnsupportedSecLevels 2 usmStatsNotInTimeWindows 3 usmStatsUnknownUserNames 162 31007122 8 2006 General Information VACM Group 4 usmStatsUnknownEngineIDs 5 usmStatsWrongDigests 6 usmStatsDecryptionErrors 2 usmUser 1 usmUserSpinLock 2 usmUserTable 1 usmUserEntry 1 usmUserEnginelD 2 usmUserName 3 usmUserSecurityName 4 usmUserCloneFrom 5 usmUserAuthProtocol 6 usmUserAuthKeyChang 7 usmUserOwnAuthKeyChange 8 usmUserPrivProtocol 9 usmUserPrivKeyChang 10 usmUserOwnPrivKeyChange 11 usmUserPublic 12 usmUserStorageType 13 usmUserStatus The VACM group View based Access Control Model defines the elements of
41. sysObjectID sysUpTime sysContact sysName sysLocation sysServices sysORLastChange sysORTable 1 sysOREntry 1 sysORIndex 2 sysORID 3 sysDescr 4 sysORUpTime 31007122 8 2006 133 General Information System Group Objects The following table describes the member objects of the system group Object OID Syntax Access Description sysDescr 1 3 6 1 2 1 1 1 0 ASCII String Size 0 255 Read Is a verbal description of the entry This value should contain the full name and version number of type of system hardware operating system software and network software The description must consist only of printable ASCII characters sysObjectID 1 3 6 1 2 1 1 2 0 Object identifier Read Is the authorization identification of the manufacturer of the network management system that is integrated in this device This value is placed in the SMI enterprises subtree 1 3 6 1 4 1 and describes which type of device is being managed For example if the manufacturer Schneider Electric is assigned the subtree 1 3 6 1 4 1 3833 then he can assign his switch the identifier 1 3 6 1 4 1 3833 1 1 sysUpTime 1 3 6 1 2 1 1 3 0 Time ticks Read Is the time in 1 100 seconds since the last reset of the network management unit sysContact 1 3 6 1 2 1 1 4 0 ASCII string size 0 255 Read and write Is the clear text identification of the co
42. system time 6 Enter the command sntp client offset lt 1000 to 1000 gt to enter the time offset between local time and IEEE1588 SNTP Time 78 31007122 8 2006 Synchronizing the System Time of the Network Simple Network Time Protocol SNTP Description of SNTP Preparing the SNTP Configuration SNTP has a hierarchical structure The SNTP server provides Universal Time Coordinated UTC UTC is the time which is referenced to SNTP The same time is displayed worldwide Local time differences are not taken into account The ESM supports the SNTP server and the SNTP client functions The figure below shows a SNTP application example GPS PLC Client Switch 149 218 112 0 Client Client Server Client Server Client Server 149 218 112 1 149 218 112 2 149 218 112 3 Prepare the configuration as follows Step Action 1 To gain an overview of how the system time is passed on draw a network plan which shows all devices involved in SNTP Please bear in mind that the accuracy of the system time depends on signal running time Switch on the SNTP function on all devices whose time you want to set using SNTP If you do not have a reference clock at your disposal use a switch as the reference clock and set its system time as accurately as possible Note To ensure the most accurate system time distribution possible do not
43. the Memory Back Up Adapter EAM Uses of the EAM Loading the System Configuration from the EAM Loading the System Configuration from the Local Memory The EAM is a USB device used for e storing the configuration data of an ESM e storing the ESM software e providing back up if the ESM fails In case the switch fails the EAM enables a very simple configuration data transfer by means of a substitute switch of the same type When you start the switch it checks for an EAM If it detects an EAM with a valid password and valid software the ESM loads the configuration data from the EAM The password is valid if e the password on the ESM matches the password on the EAM or e the default password is saved on the ESM To save the configuration data in the EAM see p 50 Note If there is no valid password load the system configuration from the local memory 30 31007122 8 2006 Entering the IP Parameters System Configuration Using BOOTP Basic To configure the ESM using BOOTP you need a BOOTP server The BOOTP Information server matches the configuration data to the ESM on the basis of its MAC address Note For loading the configuration data the ESM default setting is DHCP mode so this method requires changing the ESM to the BOOTP mode Configuration Configure the ESM as follows Procedure Using t Act CLI or the Web Step ee Based Inte
44. the Web based interface 3 Goto Switching gt VLAN gt Static The following dialog box appears VLAN ID Name Status 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 Default activeU U U jU JU JU JU JU Set Reload Create entry Delete Help foo 4 Click Create and enter the appropriate VLAN ID in the dialog box shown below Subsequently a new line appears in the table VLAN Index Q Please enter VLAN ID 2 OK Cancel Java Applet Window 31007122 8 2006 105 Traffic Control Step Action 5 Enter the name of you choice for this VLAN 6 Define in the dialog box shown below the affiliation of the ports you reguire and save your settings by pressing Set You can choose from the following options nota member of the VLAN e M a member of the VLAN packet is transmitted with a tag e F not a member of the VLAN e U a member of the VLAN packet is sent without a tag For the following explanation refer also to the section Simple VLAN Example below Ports 1 to 3 are assigned to the end devices of the yellow VLAN and ports 4 to 5 to the end devices of the green VLAN As end devices normally do not sent data packets with a tag the setting U must be selected here Port 6 serves as uplink port to the next switch It is assigned the setting M The VLAN information can thus be passed on Simple VLAN This exam
45. two dynamic parts e The management administrator describes the static part of the filter table dot1StaticTable e During operation the switch is capable of learning which ports will receive tagged frames from which source addresses This information is stored in the dynamic part of the table dot1dTpFdbTable e Addresses learned from the neighboring agent and those learned by GMRP are written to another dynamic part Addresses already located in the static filter table are automatically transferred by a switch into the dynamic part An address entered statically cannot be overwritten through learning Note If the redundancy manager is active it is not possible to make permanent unicast entries Note In the filtering database you can create up to 100 filters for multicast addresses 90 31007122 8 2006 Traffic Control Multicast Application Description of Multicast Application The data distribution in the LAN distinguishes between three distribution classes with reference to the addressed recipient e unicast one recipient e multicast a group of recipients e broadcast every recipient that can be reached In the case of a multicast address switches pass all data packets with a multicast address to all ports in the multicast group This leads to an increased bandwidth requirement Protocols such as GMRP and processes such as IGMP Snooping enable the switches to exchange inf
46. v 1 7 B6 06 00 00 01 00 01 07 v 1 8 B6 06 00 00 01 00 01 08 V Set Heb iggy In line 1 of the Server IP Address group box enter the DHCP servers IP address In the Operation line of the DHCP Option 82 group box select On Choose MAC from the drop down list in the Type line oO a amp wo Click Set to save the configuration 31007122 8 2006 185 Switch Function Examples DHCP Option 82 Server Hardware Address DHCP option 82 servers require that you input a hardware address This address consists of the switch s remote ID and circuit ID The circuit ID identifies the port on the switch where the device to which you want to assign an IP address is connected The addresses of remote ID and circuit ID are shown on the DHCP Relay Agent web page which is shown in step 2 of the procedure above In the screen above the remote ID is A104C0A8A8C8 If the device is connected to port 7 of the switch then the circuit ID is B606000001000107 Note One tool you may use to set up DHCP server option 82 on your PC is haneWIN which can be downloaded from the www hanewin de website You may elect to use other appropriate software like those included with Windows 2000 servers or Linux operating systems The haneWiIN software can be tested for 30 calendar days from the date of the first installation before deciding whether you want to purchase a license Schneider Electric does not guarantee
47. 0 6 10 100 TX 1 100 FX MM 1 100 FX SM Managed 16 Port Version TCSESM163F23F0 16 10 100 TX Managed TCSESM163F2CU0 14 10 100 TX 2 100 FX MM Managed 24 Port Version TCSESM243F2CU0 22 10 100 TX 2 100 FX MM Managed Gigabit 10 Port Version TCSESM103F23G0 8 10 100 TX 2 10 100 1000 TX Managed TCSESM103F2LGO 8 10 100 TX 2 1000 SFP fiber Managed Note These products ship with open sockets SFP on the fiber ports so in order to use these ports you must order 1 or 2 media modules shown below Fiber Media Modules TCSEAAF1LFU00 SFP SX LC fiber module for Gigabit TCSEAAF1LFS00 SFP LX LC fiber module for Gigabit TCSEAAF1LFHOO SFP LH LC fiber module for Gigabit Accessories TCSEAM0100 Memory Backup Adapter 31007122 8 2006 171 General Information Copyright for Integrated Software GNU Lesser General Public License Preamble Version 2 1 February 1999 Copyright C 1991 1999 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed This is the first released version of the Lesser GPL It also counts as the successor of the GNU Library Public License version 2 hence the version number 2 1 The licenses for most software are designed to take away your freedom to share and
48. 10 To be able to communicate with earlier versions of SNMP select SNMPv1 2 enabled 11 Select SNMPv1 enabled or SNMPv2 enabled in the table to determine which IP addresses are allowed to access the ESM and which type of passwords are to be used The table allows you to create up to 8 entries For security reasons the read password and the read write password must not be identical Please note that passwords are case sensitive 12 To create a new line in the table Click Create entry 13 To delete an entry select the line in the table and click Delete The items in the table have the following meanings e Index current number for this table entry e Password password the computer must use to have access to the ESM This password is independent of the SNMPv3 password IP address IP address of the computer permitted to access the ESM IP mask IP mask to the IP address Access Mode determines if the computer has read only or write access Active enabling disabling this entry 31007122 8 2006 67 Protection from Unauthorized Access Setting the Telnet Web Based Access Description of Telnet Access Description of Web Based Access Disabling and Enabling Telnet or Web Based Access Using the Web Based Interface The Telnet server of the ESM allows you to configure the ESM using the Command Line Interface CLI You can switch off the Telnet server to prevent Telnet access to the ESM The default setting is tha
49. 184 TFTP Server for Software Updates aaa 187 cjg A chun ws a St ws Rc ne 191 Bc an ac a ug at Rr Dw Se i ec 195 Safety Information Aa Important Information NOTICE Read these instructions carefully and look at the equipment to become familiar with the device before trying to install operate or maintain it The following special messages may appear throughout this documentation or on the equipment to warn of potential hazards or to call attention to information that clarifies or simplifies a procedure The addition of this symbol to a Danger or Warning safety label indicates A that an electrical hazard exists which will result in personal injury if the instructions are not followed This is the safety alert symbol It is used to alert you to potential personal injury hazards Obey all safety messages that follow this symbol to avoid possible injury or death A DANGER DANGER indicates an imminently hazardous situation which if not avoided will result in death or serious injury A WARNING WARNING indicates a potentially hazardous situation which if not avoided can result in death serious injury or equipment damage A CAUTION CAUTION indicates a potentially hazardous situation which if not avoided can result in injury or equipment damage 31007122 8 2006 Safety Information PLEASE NOTE Electrical equipment should be installed operated serviced and ma
50. 31007122 01 Telemecanique ConneXium Ethernet Cabling System Managed Switch Configuration Manual 8 2006 Schneider Electric Building a New Electric World Table of Contents Chapter 1 Chapter 2 Chapter 3 Chapter 4 Safety Information aa 7 About the Book sidissssiskssis sads s ns k ts ads 9 The User Interfaces 002 c eee eee aa 11 The System Monitor 0 0 0 cece eee eae 12 The Command Line Interface CLI 0 0 0 0 cece eee 14 The Web Based Interface 1 2 cee teens 16 Entering the IP Parameters a 21 Basics of the IP Parameters aaa 22 Configuring the ESM using the Command Line Interface 26 Configuring the ESM Using the Ethernet Switch Configurator ESC Softwares tnra eyes ad are tees ie he nts teats ane utis aa jaki 28 Loading the System Configuration from the Memory Back Up Adapter EAM A i itis elect A cathy M es te dace i S 30 System Configuration Using BOOTP 1 aaa 31 System Configuration Using DHCP 11 anaran anae 35 System Configuration Using DHCP Option 82 0 0 0 c ee eee eee 40 System Configuration Using the Web Based Interface 41 Faulty Device Replacement 0 00 0 cee eee ett 42 Loading and Saving Settings eee eens 43 Loading Settings ni esarri t m s etwas ed hen et Gs Jr dusk a eel as 44 SAVING SCUINGS a iee Gee ea heen Aneta dans d anise js in 50 Loading S
51. 7100 saRingCplInterconnGroupID saRingCplInterconnlfIndex saRingCplInterconnIfOpState saRingCplControlGroupID saRingCplControllIfIndex saRingCplControlIfOpState saRingCplControlMode saRingCplPartnerIpAddr saRingCplPartnerInterconnGroupID saRingCpl saRingCpl saRingCp saRingCp saRingCp saRingCp PartnerInterconnIfIndex LPartnerInterconnIfOpState lOperState 1Mode LRowStatus ConfigOperState saRingCp 1CouplingLinks 31007122 8 2006 159 General Information SNMP V2 Module MIB Overview The SNMP V2 Module MIB is based on the SNMP MIB Simple Network Management Protocol Group Framework Group Frameworks 3 10 The framework group contains parameters for describing SNMP Management snmpModules snmpFrameworkMIB 2 snmpFramewor 1 kMIBObjects snmpEngine snmpEngineID snmpEngineBoots snmpEngineTime snmpEngineMaxMessageSiz MPD Group The MPD group Message Processing and Dispatching contains parameters for dispatching SNMP messages which are potentially in different SNMP versions It defines the procedures for dispatching potentially multiple versions of SNMP messages 3 snmpModules 11 snmpMPDMIB 2 snmpMPDMIBObjects 1 2 3 snmpUnknownSecurityModels snmpInvalidMsgs snmpUnknownPDUHandlers 160 31007122 8 2006 General Information Target Group
52. 8 1 100 product product cfg Delete current configuration current configuration an local Delete configuration AutoConfiguration Adapter tus notPresent Set O Help ex 4 Click from URL in the group box Load if you want the ESM to load the configuration data from a file and to retain the locally saved configuration Click from URL amp Save Locally in the group box Load if you want the ESM to load the configuration data from a file and to save this configuration locally In the URL edit box type the field path under which the ESM finds the configuration file Click Load Configuration 31007122 8 2006 47 Loading and Saving Settings Example of Loading a File from the TFTP Server Using the Web Based Interface Trouble Shooting Using the Web Based Interface Loading Settings from a File Using the CLI Load a file from the tftp server as follows Step Action 1 To enable yourself to download a file from the tftp server save the configuration file into the corresponding path of the tftp server with the file name e g switch switch_o1 cfg see p 51 2 Type the path to the tftp server in the edit box URL e g tftp 149 218 112 5 ESM config dat To load from an ETY or NOE module the URL is tftp IPaddress RAM0 switch rolename prm where the Paddress is the IP address of the module and switch rolename is the roll name assigned to the switch You can trouble shoot
53. 9 218 112 111 filename agent config dat Lines that start with a character are comment lines The lines preceding the individually listed devices refer to settings that apply to all the following devices The fixed address line assigns a permanent IP address to the device 31007122 8 2006 39 Entering the IP Parameters System Configuration Using DHCP Option 82 General If you want to configure the system using DHCP Option 82 you need a DHCP server Information with Option 82 The DHCP server matches the configuration data to the ESM based on its physical connection As with the classic DHCP on startup an agent receives its configuration data according to the BOOTP DHCP process flow chart see p 36 The system configuration is based on the classic DHCP protocol on the device being configured whereas Option 82 is based on the network topology This procedure allows you to always assign the same IP address to any device connected to a particular location port of a switch on the LAN For the installation and configuration of a DHCP Option 82 server refer to p 184 The figure shows an application example of DHCP Option 82 PLC Switch Option 82 MAC Address 00 80 63 10 9a d7 P 149 218 112 100 IP 149 218 112 100 DHCP Server p a 149 218 112 1 mE A 40 31007122 8 2006 Entering the IP Parameters S
54. AN ID Every VLAN in a network is identified with an ID which must be unique i e every ID may only be assigned once in the network Port VLAN Identifier PVID The management assigns a VLAN ID for every port Thus it is known as the port VLAN ID The switch adds a tag to every packet received without a tag This tag contains a valid VLAN ID When a data packet is received with a priority tag the switch adds the port VLAN ID Member Set The member set is a list of ports belonging to a VLAN Each VLAN has a member set Untagged Set The untagged set is a list of the ports of a VLAN which send data packets without a tag Every VLAN has an untagged set 102 31007122 8 2006 Traffic Control Configuring VLANs Configuration Procedure Using the Web Based Interface Configure VLANs as follows Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go the Switching gt VLAN gt Global The figure shows the VLAN Global dialog box Version Max VLAND ID Number of VLANs 1 version 4042 Max supported VLANs 256 Fe ig Under VLAN you will find all tables and attributes to configure and monitor the VLAN functions complying with IEEE 802 1Q standard Note When configuring VLAN ensure that the port to which your management station is connected can still send data of the management sta
55. AgingTime dotldTpFdbTable 1 dotldTpFdbEntry 1 dotlidTpFdbAddress 2 dotldTpFdbPort 3 dotldTpFdbStatus dotldTpPortTable 1 dotldTpPortEntry 1 dotldTpPort 2 dotldTpPortMaxInfo 3 dotldTpPortInFrames 4 dotldTpPortOutFrames 5 dotldTpPortInDiscards dStatic dotl1dStaticTable 1 dotldStaticEntry 1 dotldStaticAddress 2 dotldStaticReceivePort 3 dotldStaticAllowedToGoTo 4 dotldStaticStatus dgeMIB pBridgeMIBObjects 1 dotidExtBase 146 General Information 1 dotldDeviceCapabilities 2 dotlidTrafficClassesEnabled 3 dot1dGmrpStatus 4 dotldPortCapabilitiesTable 1 dotldPortCapabilitiesEntry 1 dotldPortCapabilities 2 dotldPriority 1 dotldPortPriorityTable 1 dotldPortPriorityEntry 1 dot1dPortDefaultUserPriority 2 dot1dPortNumTrafficClasses 3 dotlidTrafficClassTable 1 dotldPortPriorityEntry 1 dot1ldTrafficClassPriority 2 dotldTrafficClass 3 dot1dGarp 1 dotldPortGarpTable 1 dotlidPortGarpEntry 1 dotldPortGarpJoinTime 2 dotldPortGarpLeaveTime 3 dot1dPortGarpLeaveAllTime 4 dot1dGmrp 1 dot1dPortGmrpTable 1 dot1dPortGmrpEntry 1 dot1dPortGmrpStatus 2 dot1dPortGmrpFailedRegistrations 3 dot1dPortGmrpLastPduOrigin 7 gBridgeMIB 1 gBridgeMIBObjects 1 dotlqBase 1 dotlqVlanVersionNumber 2
56. Entering the Aging Time in the Web Based Interface Static Address Entries Enter the aging time as follows Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Switching gt Global 4 Enter the Aging Time s for all dynamic entries in the range from 10 to 630 seconds Unit 1 second default setting 30 One of the most important functions of a switch is the filter function It selects tagged frames according to certain defined patterns called filters These patterns are associated with switching rules This means that a tagged frame received at the port of a switch is compared to the patterns If no pattern matches the tagged frame the switch will either transmit or reject the packet according to the switching rules for the affected ports The following are valid filter criteria e destination address e broadcast address e multicast address e VLAN membership The Ethernet tagged frame format is shown in the following figure Ke o ir 8 o E Q L d gt n D D O N LL Ko 2 o Om L c D a O oE S lt 2 D m BS LE Oo oO o Of etc 8S L L ir 29 at B D G N c Oo og oO O O O c O ao ao O a QO a L0 minimum 64 maximum 1518 octets 31007122 8 2006 89 Traffic Control The individual filters are stored in the filter table The table is divided into three parts a static part and
57. IMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS If you develop a new library and you want it to be of the greatest possible use to the public we recommend making it free software that everyone can redistribute and change You can do so by permitting redistribution under these terms or alternatively under the terms of the ordinary General Public License To apply these terms attach the following notices to the library It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found lt one line to give the library s name and a brief idea of what it does gt Copyright C lt year gt lt name of author gt This library is free software you can redistribute it and or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation either version 2 1 of the License or at your option any later version This library is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU Lesser General P
58. IUS Authentication Client MIB RFC 2620 RADIUS Accounting MIB RFC 2674 Dottp O RFC 2818 HTTP over TLs RFC 2851 Internet Addresses MIB RFC 2865 RADIUS Client RFC 2866 RADIUS Accounting RFC 2868 RADIUS Attributes for Tunnel Protocol Support RFC 2869 RADIUS Extensions RFC 2869 RADIUS Support for EAP RFC 2933 IGMP MIB 166 31007122 8 2006 General Information IEEE Standards List of IEEE Standards The following table lists the IEEE standards applying to the ESM Standard Explanation IEEE 802 1 D Switching GARP GMRP Spanning Tree supported via 802 1S implementation IEEE 802 1 D 1998 Media Access Control MAC bridges includes IEEE 802 1p Priority Dynamic and Multicast Filtering GARP GMRP IEEE 802 1 Q 1998 Virtual Bridged Local Area Networks VLAN Tagging port based VLANs GVRP IEEE 802 1S Multiple Spanning Tree IEEE 802 1 v Protocol Based VLANs IEEE 802 1 w 2001 Rapid Reconfiguration supported via 802 1S implementation IEEE 802 1 X Port Authentication IEEE 802 3 2002 Ethernet IEEE 802 3 ac VLAN Tagging IEEE 802 3 ad Link Aggregation with static LAG and LACP Support IEEE 802 1 X Port Authentication IEEE 802 3 x Flow Control 31007122 8 2006 167 General Information Dimension Drawings
59. Monitoring correct operation OManual setting Monitoring correct operattea Contact Opened error Closed ok Powersupply 1 Powersupply 2 Temperature Module removal EAM removal Connection error HIPER Ring Ring Network CouplOdMVonitor Ignore Monitor Monitor O Monitor Monitor O Monitor O Monitor O Monitor O Ignore O Ignore Ignore O Ignore Ignore Ignore Ignore Manual settipag _ Contact Openedo Closed Trapconfiguratien generate Trap 7 Set Reload Feb ga 31007122 8 2006 115 Operation Diagnostics Step Action 2 In the Mode Signal contact group box select Monitoring correct operation to use the contact for function monitoring In the Monitoring correct operation group box select the events which you want to have monitored For temperature monitoring go to Basics gt System In the line Temperature C of the System Data group box set the temperature thresholds to be monitored Displaying the You can view the signal contact state in three ways Signal Contact Using the LED display e using the web based interface e executing a query in the command line interface Alarm This portion of the home page provides information on the alarm state of the ESM r Signal Contact 1 G asso Time o
60. O O O cd ao O 0 Fo O O a ww 42 1500 octets minimum 64 maximum 1522 octets The tag format is shown in the following figure Tag protocol identifier 2 x 8 bit Priority 3 bit Canonical format identifier 1 bit AN identifier 12 bit 4 octets Set the Prioritization as follows Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Port Configuration Specify in the Port Priority column the priority low normal high admin with which the switch sends data packets which it receives without a VLAN tag at this port 98 31007122 8 2006 Traffic Control Flow Control Description of Flow control is a mechanism which acts as an overload protection During periods Flow Control of heavy traffic it holds off additional traffic In the example below the functioning of flow control is displayed graphically Workstations 1 2 and 3 want to simultaneously transmit a large amount of data to workstation 4 The combined bandwidth of Workstations 1 2 and 3 is larger than the bandwidth of workstation 4 to the switch This leads to an overflow of the send queue of port 4 The left hand funnel symbolizes this status If the flow control function at ports 1 2 and 3 of the switch is turned on the switch reacts before the funnel overflows Ports 1 2 and 3 send a message to the connected devices that no data may be received at presen
61. Security Port Allowed Current Allowed Modul Port odut OT Status MAC Address MAC Address IP Address ction 1 1 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 1 2 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 1 3 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 1 4 enabled 00 00 00 00 00 00 00 E0 18 95 D8 61 0 0 0 0 none 2 1 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 2 2 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 2 3 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 2 4 enabled 00 00 00 00 00 00 00 0D 60 6F 1E E0 0 0 0 0 none Set Help igs 4 Choose MAC Based Port Security port Without an entry data can be received from any device In the Allowed MAC Address column enter the MAC address of the device with which data exchange is permitted at this column 6 Press the left mouse button to copy an entry from the Current MAC Address column into the Allowed MAC Address The Current MAC Address column shows the MAC address of the device from which data was received last no action none message by sending a trap trapOnly TA In the Action column select one of the following reactions to an unauthorized access attempt the respective port in the Port Configuration table is disabled see p 59 and trap portDisabled is sent An entry in the Port Configuration table is part of the configuration and is
62. The Target group contains parameters for specifying targets of SNMP management operations 3 snmpModules 12 snmpTargetMIB 2 snmpTargetObjects 1 snmpTargetSpinLock m 1 snmp 2 snmp 3 snmp 4 snmp a 5 snmp n 6 snmp Fe 7 snmp 8 snmp 9 snmp 1 snmpTargetParams t 6 snmp 2 snmpTargetAddrTable 1 snmpTargetAddrEntry TargetAddrName TargetAddrTDomain TargetAddrTAddress TargetAddrTimeout TargetAddrRetryCount TargetAddrTagList TargetAddrParams TargetAddrStorageType TargetAddrRowStatus 3 snmpTargetParamsTable Entry 1 snmpTargetParamsName 2 snmpTargetParamsMPModel 3 snmpTargetParamsSecurityModel 4 snmpTargetParamsSecurityName 5 snmpTargetParamsSecurityLevel TargetParamsStorageType 7 snmpTargetParamsRowStatus 4 snmpUnavailableContexts 5 snmpUnknownContexts 31007122 8 2006 161 General Information Notification The Notification group contains parameters for specifying targets for notification Group filtering 3 snmpModules 13 snmpNotificationMIB 1 snmpNotifyObjects 1 snmpNotifyTable 1 snmpNotifyEntry 1 snmpNotifyName 2 snmpNotifyTag 3 snmpNotifyType 4 snmpNotifyStorageType 5 snmpNotifyRowStatus 2
63. TopologyIpAddress saESMDisableLearningGroup ESMVlanGroup ESMVlanMode tt ti tt PSGroup ESMPSAlarm ESMDisableLearningStatus SigRelayGroup ESMSigRelayMode ESMSigRelayManualState SMVlanStatus ESMSelftestGroup SMSelftestResult SMSelftestMode 31007122 8 2006 153 General Information Management The management group contains parameters for configuring the management Group agent 14 saConfiguration 2 saAgent Sas 1 20 30 1 saAction 3 saNetwor I 85 2 saActionResult k saNetLocall saNetLocalP saNetGatewa saNetMask saNetAction saNetVlanID saNetEther aNetEth saNetSNTPG 1 saNetSN 2 saNetSN 3 saNetSN 4 saNetSN 5 saNetSN 6 saNetSN 7 saNetSN 8 saNetSN 9 saNetSN 10 saNetS 11 saNetS saNetSNMPG 1 saNetSN 2 saNetSN 3 saNetSN 4 saNetSN 4 saFSTable PAddr hysAddr yIPAddr netSwitchConfigurationGroup ernetSwitchConfigurationStatus roup TPStatus m PServer m PTime TPLocalOffset PServer2 PSyncInterval PAcceptBroadcasts TPAnycastAddr m PAnycastVlan NTPAnycastInterval NTPOperStatus roup PvlStatus Pv2Status Pv3Status PAccessStatus 154 31007122 8 2006 General Information 9 e 4 2 8 sa 110 200 saBackupCon 5 saTempTable
64. address to which the SNTP server on the switch sends the SNTP data packets target address 224 0 1 1 the SNTP packets are sent to multicast 7 Go to the Configuration SNTP Server group box and specify under VLAN ID the VLAN to which the ESM may periodically send SNTP packets 80 31007122 8 2006 Synchronizing the System Time of the Network Step Action 8 Gotothe Configuration SNTP Server group box and specify under Anycast send interval the interval at which the ESM sends SNTP packets valid entries 1 second to 3600 seconds default 120 seconds 9 Go to the Configuration SNTP Client group box and enter under External server address the IP address of the SNTP server from which the switch periodically obtains the system time 10 Gotothe Configuration SNTP Client group box and enter under Redundant server address enter the IP address of the SNTP server from which the ESM periodically obtains the system time if the ESM does not receiveananswerfromthe External Server AddresswithinO 5secondsaftermakingtheguery Note If you receive the system time from an external redundant server address do not accept any SNTP broadcasts Otherwise you do not know whether the ESM displays the time from the server entered or the time from an SNTP broadcast package 11 Gotothe Configuration SNTP Client group box and specify under Server reguest interval the interval at which the EMS reguests SNTP packages val
65. art 6 After booting the switch click reload in your browser to re enable your access to the ESM 31007122 8 2006 57 Loading Software Updates Loading Software Updates via HTTP Loading Proceed as follows to update the software on your switch Procedure Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Software The following dialog box appears Stored version RAM Running version Bachup version 2 00 2005 05 06 23 13 RAM 2 00 2005 05 06 23 13 BAK 2 00 2005 05 06 16 53 ctftp Sotware Update URL _ tftp 192 168 1681 100 product product bin tftp Update http http Update Hep 4 Click http Update to open the http Update browser window 5 Click Browse to select the software on you PC for the update 6 Click Update to transfer the software to the switch One of the following messages is displayed when the update has been completed e Update completed successfully e Update failed Reason incorrect file e Update failed Reason file damaged e Update failed Reason flash error Close this browser window File Close to return to the Software dialog box After the software procedure has been completed successfully go to Basics Restart and perform a cold start by clicking Restart Swtich 9 Click Reload in your browser to re enable ESM access af
66. as follows Step Action Comment 1 View the status of the loading If you get an error message while saving procedure in the selected option URL the configuration one reason may be amp Save Locally of the group box that the loading procedure has not been Load completed DHCP BOOTP does not finish the loading procedure until a valid configuration has been loaded 2 If DHCP BOOTP cannot find any valid configuration stop the active loading procedure by loading the local configuration via the Load group box Load settings from a file as follows Step Action 1 Connect the ESM to a serial cable Open the CLI Enter the enable command to change to the privileged EXEC mode AJOIN Enter the command copy tftp 149 218 112 159 switch config dat nv ram startup config if you want the switch to load the configuration data from a tftp server in the connected network 48 31007122 8 2006 Loading and Saving Settings Resetting the Configuration to the Default Settings Resetting the Configuration to the Default Settings Using the Web Based Interface Resetting the Configuration to the Default Settings Using the System Monitor The switch enables you to e reset the current configuration to the default settings The locally saved configuration is retained e reset the ESM to the default settings After a restart the IP address is also set to the de
67. aticMulticastReceivePort dotlqStaticMulticastStaticEgressPorts 4 dotlqStaticMulticastForbiddenEgressPorts Fa 4 dotlgVlan dot1lgStaticMulticastStatus 1 dotlgVlanNumDeletes 3 dotlqVlanStaticTable 1 dotlqVlanStaticEntry 1 dotlgVlanStaticName 2 dotlqVlanStaticEgressPorts 3 dotiqVlanForbiddenEgressPorts 4 dotlqVlanStaticUntaggedPorts 5 dotlgVlanStaticRowStatus 5 dotlqPortVlanTable 1 dot1lgPortVlanEntry 5 1 dot1lgPvid 2 dotlqPortAcceptableFrameTypes 3 dotlqPortIngressFiltering 4 dotlqPortGvrpStatus dot1gPortGvrpFailedRegistrations 6 dot1lgPortGvrpLastPduOrigin 31007122 8 2006 149 General Information MAU The MAU management group is responsible for setting the autonegotiation Management parameters Group 26 snmpDot 3MauMgt 1 3 6 1 2 1 26 2 dot3IfMauBasicGroup 1 ifMauTable 1 ifMauEntry 1 ifMaulfIndex 2 ifMaulndex 3 ifMauType 4 ifMauStatus 5 ifMauMediaAvailable 6 ifMauMediaAvailableStateExits 7 ifMauJabberState 8 ifMauJabberingStateEnters 9 ifMauFalseCarriers 10 ifMauTypeList 11 ifMauDefaultType 12 ifMauAutoNegSupported 5 dot3IfMauAutoNegGroup 1 ifMauAutoNegTable 1 ifMauAutoNegEntry 1 ifMauAutoNegAdminStatus 2 ifMauA
68. ation Transfer Control The transfer control protocol group is required for all systems that have implemented Protocol Group TCP Instances of objects that describe information about a particular TCP 1 3 6 1 2 1 6 connection exist only as long as the connection exists 6 tcp 1 tcpRtoAlgorithm 2 tcpRtoMin 3 tcpRtoMax 4 tcpMaxConn 5 tcpActiveOpens 6 tcpPassiveOpens 7 tcpAttemptFails 8 tcpEstabResets 9 tcpCurrEstab 10 tcpInSegs 11 tcpOutSegs 12 tcpRetransSegs 13 tepConnTable 1 tepConnEntry 1 tcpConnState 2 tcpConnLocalAddress 3 tepConnLocalPort 4 tcpConnRemAddress 5 tcpConnRemPort 14 tcpInErrs 15 tcpOutRsts 31007122 8 2006 139 General Information User Datagram Protocol Group UDP 1 3 6 1 2 1 7 7 Gas 1 2 3 lt ld 5 The user datagram protocol group is reguired for all systems that have implemented udpInDatagrams udpNoPorts udpInErrors udpOutDatagrams udpTable 1 udpEntry 1 2 udpLocalAddress udpLocalPort Simple Network Management Protocol Group 1 3 6 1 2 1 11 11 snmp The simple network management protocol group is required for all systems In SNMP installations that have been optimized to support either just one agent or one management station some of the listed object
69. ce code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a derivative work of the Library and therefore falls outside the scope of this License However linking a work that uses the Library with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executable is therefore covered by this License Section 6 states terms for distribution of such executables When a work that uses the library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data structure layouts and accessors and small macros and small inline functions ten lines or less in length then the use of the object file is unrestricted regardless of whether it is legally a derivative work Executables containing this object code plus portions of the Lib
70. change it By contrast the GNU General Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This license the Lesser General Public License applies to some specially designated software packages typically libraries of the Free Software Foundation and other authors who decide to use it You can use it too but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case based on the explanations below When we speak of free software we are referring to freedom of use not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it For example if you distribute copies of the library whether gratis or for a fee you must give the recipients all the rights that we gave you You must make sure that they
71. ckets to the ESM Multicast MAC address 01 80 63 2F FF 0B ESM Switch with the LLDP function are thus also able to exchange LLDP information with each other via devices which themselves are not LLDP capable The Management Information Base MIB of an LLDP capable ESM Switch holds out the LLDP information in the Ildp MIB and in the private salldp MIB 31007122 8 2006 121 Operation Diagnostics Displaying Display topology discovery as follows Topology Discovering the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Diagnostics gt Topology Discovery The table shows you the selected information to neighbor devices Configuration _ Operation GOn OOff Module Port Neighbour MAC Address Neighbour IP Address Neighbour Port Description Neighbour System Name 2 00 80 63 33 24 00 149 218 112 171 Slot 3 Module 2 Interface 2 TCSESMO Set Reload 4v Slow LLDP entries exclusivley Help ao 4 Click Show LLDP entries exclusively to reduce the number of topology table entries In this case the topology table hides entries of devices without active topology discovery function 122 31007122 8 2006 Operation Diagnostics Explanation If several devices are connected to a port for example via a switch the table shows concerning t
72. connected to the LAN Multicast group members reply with a report message This report message contains all parameters required by the IGMP The router records the IP multicast group address from the report message in its routing table Then the router transfers frames with this IP multicast group address in the target address field only in accordance with the routing table 92 31007122 8 2006 Traffic Control Description of GMRP Devices that no longer want to be members of a multicast group can cancel their membership with a Leave message from IGMP version 2 and they do not transmit any more report messages In IGMP versions 1 and 2 the router removes the routing table entry if it does not receive any report messages within a specified period of time aging time If there are a number of routers with an active IGMP function in the network then they work out among themselves which router carries out the query function when using IGMP version 2 If there is no router in the network a suitably equipped switch can carry out the query function A switch that connects a multicast receiver with a router can evaluate the IGMP information with the aid of the IGMP Snooping procedure IGMP Snooping translates IP multicast group addresses into MAC multicast addresses so that the IGMP functions can also be used by layer 2 switches The switch records the MAC addresses of the multicast receivers which are obtained by the IGMP snooping
73. d be taken into account when traps are being sent 6 In the Selection group box check the trap categories from which you want to send traps 112 31007122 8 2006 Operation Diagnostics Selecting Events Triggering an Alarm You can have an alarm triggered in case of the following events by selecting them in the Selection group box of the Alarms Traps dialog box Event Description Authentication The switch has rejected an unauthorized access attempt see Access for IP Addresses and Port Security dialog Cold Start The switch has been turned on Link Up The link to the device at one port of the switch has been established Link Down The link to the device at one port of the switch has been interrupted Spanning Tree The topology of the Rapid Spanning Tree has changed Chassis Chassis encompasses the following events e Power Supply The status of a supply voltage has changed see System dialog box e Signal Contact The status of the signal contact has changed To follow the event go to Signal Contact and select generate Trap e Media Module A media module has been added or removed e Memory back up adapter The Memory back up adapter has been inserted or removed e Temperature The value has been exceeded fallen below the temperature threshold Redundancy The status of the HIPER ring or the redundant coupling of HIPER rings network segments has changed
74. ds received data packets with a multicast address as the target address to all ports 5 Click the check box to switch GMRP on off globally for the entire switch If GMRP is switched off e the switch does not generate any GMRP packets e the switch does not evaluate any GMRP packets received and discards them e it sends streams received data packets with a multicast address as the target address for all ports The switch is transparent for received GMRP packets regardless of the GMRP setting 94 31007122 8 2006 Traffic Control Individual IGMP GMRP Configuration IGMP Querier IGM Enabled per Port IGM Forward All per Port Static Query Port Learned Query Port GMRP per Port The blocks below explain the individual IGMP GMRP configuration With IGMP Querier Active you can switch the query function on off The protocol check boxes allow you to select IGMP version 1 or version 2 This table column enables you to switch on off the IGMP for each port when the global IGMP is switched on When you switch off the IGMP ata port no registrations can be made for this port This column of the table allows you to switch on off the IGMP Snooping function when the global IGMP Snooping is switched on With the forward all setting the switch forwards all the data packets with a multicast address in the target address field to this port Note If you use IGMP version 1 in a subnetwork then yo
75. e EAM see p 50 Monitor Options software Swapping the In addition the System Monitor features further options in connection with your ESM e swapping the software images available e performing a cold start Software Images Swap the software images as follows Step Action Comment 1 On the start screen of the A new screen appears System Monitor select 1 Boot Operating System 2 Onthe new screen select 1 1 Swap Os images to swap the two software The memory of the ESM offers space for two images of the software Via this images available In item you can load a new version of the software without erasing the existing connection with the version swapping of the images see 2 Copy image to backup also 1 7 Via this item you can save a copy of the active software 3 Test stored images in Flash mem Via this item you can test whether the stored images in the flash memory contain valid codes 4 Test stored images in USB mem Via this item you can test whether the stored images of the software on the EAM contain valid codes 5 Apply and store selection Via this item you can apply and store the selection of the software 6 Reformat Flash file system Via this item you can reformat the flash file system 7 Cancel selection Via this item you can cancel the selection and leave this dialog without changes Performing a Perform a cold start as follows Cold Start Step Action 1
76. e main configuration file 6 Show Bootcode Information 4 Select the desired menu by typing its number 5 To leave a sub menu and to return to the main menu of the System Monitor press ESC 31007122 8 2006 13 The User Interfaces The Command Line Interface CLI Features of the CLI Interfaces to Access the CLI Abbreviating Keywords The CLI allows you to e use all device functions via a local or remote connection e provides you with a familiar environment for configuring IT devices e feed several devices with identical configuration data due to its script ability For a detailed description of the CLI refer to the reference guide Command Line Interface The CLI can be accessed using e the V 24 port out of band or e Telnet in band In the CLI you can abbreviate keywords as follows Step Action Comment 1 Type the first letters of the keyword 2 Press the TAB key The command line interface adds the remaining letters for you 14 31007122 8 2006 The User Interfaces Opening the CLI Open the CLI as follows Step Action Comment 1 Connect the device via the V 24 A window in which you are asked to interface to enter your user name appears on the a terminal screen A maximum of five users are orto a COM port of a PC with permitted to access the CLI terminal emulation according to VT 100 usi
77. e p 193 to the ESM An alternative method to assign the IP address is to use the Ethernet Switch Configurator software provided with the ESM see p 28 10 Save the settings you have made to ensure they are still available after restart see p 50 31007122 8 2006 41 Entering the IP Parameters Faulty Device Replacement Solutions for There are two plug and play solutions available for replacing a faulty ESM Faulty Device e First you can configure the new switch using an Memory back up adapter EAM Replacement see p 46 e Second you can configure the new switch using DHCP Option 82 see p 40 In both cases the same configuration data which the faulty ESM had are transferred to the new ESM during booting 42 31007122 8 2006 Loading and Saving Settings At a Glance Overview What s in this Chapter This chapter provides information concerning the loading and saving procedures for the settings you have made This chapter contains the following topics Topic Page Loading Settings 44 Saving Settings 50 31007122 8 2006 43 Loading and Saving Settings Loading Settings Sources for Loading Settings Loading from the Local Non Volatile Memory During operation the ESM enables you to load settings from the following sources e the local non volatile memory e the Memory back up adapter If a Memory back up adapter EAM is co
78. emperature C Uptime TCSESM_2FF96F Schneider TCSESM Schneider Electric HW 1 30 present Failed Ll 33 0 day s 3 10 17 Device view Set _Help iggy The table explains the Set and Reload buttons Set Reload Click the Set button to save the changes you have made to the dialogs Click the Reload button to update the system screen 18 31007122 8 2006 The User Interfaces The Tree View The figure below shows the tree view of the Web based interface All path references in the manual refer to this tree view For example Go to Basics gt System ja a a Pa S a Security oe Redundancy vrhdvanced System Network l Software B Port Configuration es H Load Save 4 Restart PIN Password SNMP access xff SNMPv1 v2 Access Telnet Web Access Port Security S Time SNTP G PTP 9 Switching z Global Vas Filter for MAC addresses iz ers Broadcast Limiter re ee Multicasts a Q VLAN 6 Global FF Current Static F Port HIPER Ring l Ring Network Coupling 5 Rapid Spanning Tree fe Global By Port Bie Diagnostic
79. estName 3 saTrapDestCommIndex 4 saTrapDestIpAddress 5 saTrapDestIpMask 6 saTrapDestState saLastAccessGroup LastIpAddr LastPort LastCommuni ticast PGroup IGMPSnoop saIGMPSnoop ty Status salGMPSnoopUnknownMode 156 31007122 8 2006 General Information 11 saRelayGroup 3 saIGMPSnoopAgingTime 10 saIGMPSnoopQueryTable 1 saIGMPSnoopQueryEntry 1 saIGMPSnoopQueryVlanIndex 2 saIGMPSnoopQueryPorts 11 saIGMPSnoopFilterTable 1 saIGMPSnoopFilterEntry 1 saIGMPSnoopFilterVlanIndex 2 saIGMPSnoopFilterAddress 3 saIGMPSnoopFilterLearntPorts 12 saIGMPSnoopForwardAllTable 1 saIGMPSnoopForwardAllEntry 1 saIGMPSnoopForwardAl1VlaniIndex 2 saIGMPSnoopForwardAllStaticPorts 13 saIGMPSnoopQueryStaticTable 1 saIGMPSnoopQueryStaticEntry 1 saIGMPSnoopQueryStaticVlanIndex 2 saIGMPSnoopQueryStaticPorts 100 saIGMPQuerierGroup 1 saIGMPQuerierStatus 2 saIlGMPQuerierMode 3 saIGMPQuerierTransmitInterval 4 saIGMPQuerierMaxResponseTim 5 saIGMPQuerierProtocolVersion 1 saRelayOption82Status 2 saRelayOptionRemoteIDType 3 saRelayOptionRemoteID 10 saRelayServerGroup 1 saRelayDHCPServerIpAddr 2 saRelayDHCPServer2IpAddr 3 saRelayDHCPServer3IpAddr 4 saRelayDHCPServer4IpAddr
80. ests DHCP or BOOTP Reply from Save IP parameter DHCP BOOTP and config file server URL locally Initialize IP stack with IP parameters 2 ESM is manageable 36 31007122 8 2006 Entering the IP Parameters The following shows part 2 of the BOOTP DHCP process Start tftp process Load remote with config configuration from file URL of DHCP URL of DHCP Start tftp process with config file URL of local configuration Load remote configuration Load transferred config file No Save transferred config file local and set boot configuration to local Load transferred config file Loading of configuration data is complete 31007122 8 2006 37 Entering the IP Parameters The ESM sends its system name to the DHCP server The DHCP server can then assign an IP address as an alternative to the MAC address by using the system name In addition to the IP address the DHCP server sends e the tftp server name if present and e the name of the configuration file if present The ESM accepts this data as configuration parameters see p 47 If an IP address has been assigned by a DHCP server it will be permanently saved in the local memory The ESM requests these DHCP options Option Meaning 1 subnet mask 2 time offset 3 router 4 time server 12 host name 66 tftp server name 67 bootfile name The special feature of DHCP i
81. f the last alarm 2 Power suppy2 Cause of the last alarm Flashing lamp that indicates an alarm 116 31007122 8 2006 Operation Diagnostics Displaying the Port Status Procedure Using You can dispaly the port status as follows the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web Based interface 3 Go to Basics gt System The figure below shows the device view 4 Point the mouse arrow at the symbols for the individual ports at the bottom of the screen As a result a box will appear which indicates the port status and other port related information 31007122 8 2006 117 Operation Diagnostics Event Counter on Port Level The Port Statistics Table The port statistics table allows experienced network administrators to identify possible problems occurring in the network This table shows you the contents of various events counters After a restart all the event counters begin at zero The counters add up the events which have been transmitted and received The following table explains the content of various event counters Counter Possible Problems Received Fragments The controller of the connected device is faulty Electromagnetic interference is injected into transfer medium CRC Errors The controller of the connected device is faulty Electromagnetic interference is injected into
82. fault setting Reset the configuration to the default settings as follows Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Load Save 4 In the group box Delete click either current configuration or current configuration and local 5 Click Delete configuration Reset the configuration to the default settings as follows Step Action Comment 1 Connect the ESM V 24 socket to a terminal or VT 100 emulator PC using a terminal cable 2 Open the System Monitor Select 5 Erase main configuration This menu allows you to reset the switch file to its default settings The ESM saves configurations which differ from the default settings in the ESM cfg file of the flash memory 4 Press the ENTER key to delete the ESM cfg file 31007122 8 2006 49 Loading and Saving Settings Saving Settings Options for The ESM enables you to save the settings you have made Saving Settings e locally e locally and on the EAM or e toa file Saving Locally Save the current configuration data as follows and on the EAM Ste Action Using the Web 7 Based Interface 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Load Save 4 Click Local in the Save group box 5 Click Save Configuration As a result the ESM saves the current c
83. from the IP addresses in the static address table Thus the switch blocks multicast packets at those ports to which no multicast receivers are connected The GARP Multicast Registration Protocol GMRP describes how multicast information is distributed to other switches on layer 2 level Thus switches can learn multicast addresses When a multicast address is entered in the static address table the ESM sends this information to all ports This tells the connected switches to pass this multicast address on to this switch The GARP Multicast Registration Protocol GMRP describes the distribution of data packets with a multicast address as the target address Devices that want to receive data packets with a multicast address as the target address carry out the registration of the multicast address with the aid of the GMRP For a switch registration involves entering the multicast address in the filter table When a multicast address is entered in the filter table the switch sends this information ina GMRP packet to all the ports Therefore the connected switches know that they have to send this multicast address to this switch The GMRP enables packets with a multicast address in the target address field to be sent to the ports entered The other ports are not affected by these packets Data packets with unregistered multicast addresses are sent to all ports by the switch Default setting GMRP enabled Devices that do not support GMRP can be
84. g form start the Web based interface If your nttp xxx XXX XXX XXX computer is not connected to the Internet or you do not have access to the Java plug in install the version on the enclosed CD ROM For NT users and computers not connected to the Internet Cancel the installation and install the plug in from the enclosed CD ROM Start the program file j2re1_4 0 win i exe in the Java directory on the CD ROM 16 31007122 8 2006 The User Interfaces Login Screen The figure below shows the login window yess e Schneider Electric Release 1 00 Login Password x IEIET english Logging In Log in as follows Step Action Comment 1 Select the desired language Choose english or german 2 In the login pull down menu select user read access either user or admin access to access admin read and write access the switch 3 For read permission enter the Change the password from these default password public settings to protect the switch against For read write permission enter the unauthorized access password private default setting 4 Click OK The system screen appears 31007122 8 2006 17 The User Interfaces System Screen The Set and Reload Buttons The figure shows the system screen of the ESM switch Alarm 18 11 05 11 37 System Data Name Location Contact Basic module Power supply 1 2 T
85. g the version 3 0 of the WinPcap software package If an earlier version of WinPcap is already installed on the PC you must uninstall it first A newer version remains intact when you install the Ethernet Switch configurator However this cannot be guaranteed for all future versions of WinPcap If the installation of the ESC has overwritten a newer version of WinPcap you must uninstall WinPcap 3 0 and then reinstall the new version Installing the Install the WinPcap software on your PC as follows ESC Software Step Action 1 To install the ESC software on your PC start the installation program on the CD supplied with the switch and follow the instructions given by the program 2 Start the ESC program Subsequently the screen displayed below appears This figure shows the start screen of the ESC Ethernet Switch Configurator BG Fie Edit oo x a Exit Signal Properties WWW Rescan Status MAC Address Access IP Address Net Mask Default Gateway Product Name 1 00 80 63 14 DB D9 149 218 112 103 255 255 255 0 0 0 0 0 TCSES _2FF96F Click here to switch on off flashing the signal light of the selected device Aa 28 31007122 8 2006 Entering the IP Parameters General Information concerning the ESC Software Configuring your ESM Using the ESC When the ESC software is started it automatically searches the network for devices supporting the ESC pr
86. gateway TFTP Process e The TCP IP stack and tftp are installed on the tftp server 31007122 8 2006 187 Switch Function Examples Setting up the TFTP Process Tftp Installation on HP Workstations The following table shows the steps for setting up the tftp process with subsequent tables providing a breakdown according to operating system and application Step Action Comment 1 Check if the tftp daemon background Check whether the file etc inetd conf process is running contains the following line e in SunOS tftp dgram udp wait root usr etc in tftpd in tftpd s tftpboot inHP tftp dgram udp wait root usr etc in tftpd tftpd 2 Check whether the status of this process The status should be IW is IW 3 If the process is not in the file or if the related line is commented out modify etc inetd conf accordingly 4 Enter the UNIX command man tftp The command ps does not always show the tftp daemon although it is actually running The following table describes the special steps to be taken when installing tftp on HP workstations Step Action Comment 1 Enter the user tftp in the For example file etc passwd tftp 510 20 tftp server usr tftpdir bin false Where tftp user ID in the password field 510 sample user ID 20 sample group ID tftp server reely selectable designation bin false mandatory entry login shell 2 Test the tftp p
87. he Lesser General Public License In other cases permission to use a particular library in non free programs enables a greater number of people to use a large body of free software For example permission to use the GNU C Library in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser General Public License is Less protective of the users freedom it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library 31007122 8 2006 173 General Information Terms and Conditions The precise terms and conditions for copying distribution and modification follow Pay close attention to the difference between a work based on the library and a work that uses the library The former contains code derived from the library whereas the latter must be combined with the library in order to run Terms and conditions for copying distribution and modification are listed in this topical discussion 0 This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License also called this License Each licensee is addressed as you A library means a collection of sof
88. he MAC destination address of Lorenzo The letter then travels back to Romeo via Lorenzo in the same manner that the first letter traveled from Romeo to Juliet 31007122 8 2006 25 Entering the IP Parameters Configuring the ESM using the Command Line Interface General Information concerning the Configuration via CLI Entering the IP Parameters Using the CLI Choose this method if e you preconfigure your switch outside its operating environment or e if you have no network access to the switch Note If there is no terminal or PC with terminal emulation available in the vicinity of the installation location you can also enter the IP parameters in your working environment prior to performing the ultimate installation Enter the IP parameters using the CLI as follows Step Action Comment 1 Establish a connection to the switch following the instructions made in the step action table on p 15 Change to the privileged EXEC mode by entering enable and press ENTER Enter the password and press ENTER Press ENTER without typing the password since the default setting is no password Disable DHCP by typing network protocol none and press the ENTER key 26 31007122 8 2006 Entering the IP Parameters Configuring the Switch Using the Web Based Interface Step Action Comment 5 Enter the following IP parameters IP
89. he one line for each connected device Topology if Discovery Dialog Box e devices with active topology discovery function and e devices without active topology discovery function are connected to a port the Topology Discovery table hides the devices without active topology discovery e only devices without active topology discovery are connected to a port the table will contain one line for this port symbolically for all devices MAC addresses of devices that the Topology Discovery table hides for the sake of clarity are located in the Address table see p 89 31007122 8 2006 123 Operation Diagnostics Reports Explanation of the Various Report Types Viewing and Sending the Reports Using the Web Based Interface For diagnosis purposes the ESM allows you to use the following reports e Log File The Log File is an HTML file in which the ESM records all important switch internal events e System Information The system information in an HTML file containing all system relevant data These reports provide technicians with the information required for servicing the ESM Proceed as follows to view and open the reports Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Diagnostics gt Reports A window is opened which shows the following links e Log File e System Information Click Log File to open the HTML file in a new
90. id entries 1 second to 3600 seconds default 30 seconds 12 Click Accept SNTP Broadcasts if you want the switch to obtain the system time from SNTP broadcast multicast packages which it receives Configuration The following table shows a configuration example Example Switch 149 218 112 1 149 218 112 2 Operation On On Anycast Destination Address 224 0 1 1 224 01 1 Server VLAN ID 1 1 Anycast Send Interval 120 120 Client External Server Address 149 218 112 0 149 218 112 1 Server Reguest Interval 30 30 Accept SNTP Broadcasts No No 31007122 8 2006 81 Synchronizing the System Time of the Network Precision Time Protocol PTP Function Description of PTP The requirement for running time critical applications over a LAN is a precision time management system The IEEE 1588 standard with the Precision Time Protocol describes a procedure that is based on the reference clock principle This means that the clocks in a LAN are synchronized according to the most precise clock reference or grandmaster clock in that LAN This procedure permits synchronization of the clocks with an accuracy on the scale of hundredths of nanoseconds The synchronization messages have virtually no effect on the network load PTP uses multicast communication Factors influencing precision are e Accuracy of the Reference Clock IEEE 1588 classifies clocks according to their accurac
91. ifInUnknownProtos 16 ifOutOctets 17 ifOutUcastPkts 18 ifOutNUcastPkts 19 ifOutDiscards 20 ifOutErrors 21 ifOutOLen 22 ifSpecific 31007122 8 2006 135 General Information Address Translation Group 1 3 6 1 2 1 3 Internet Protocol Group 1 3 6 1 2 1 4 The address translation group is required for all systems It contains information about the assignment of addresses 3 at 1 atTable 1 atEntry 1 atIfIndex 2 atPhysAddress 3 atNetAddress The internet protocol group is required for all systems It contains information affecting IP switching 4 ip 1 ipForwarding 2 ipDefaultTTL 3 ipInReceives 4 ipInHdrErrors 5 ipInAddrErrors 6 ipForwDatagrams 7 ipInUnknownProtos 8 ipInDiscards 9 ipInDelivers 10 ipOutRequests 11 ipOutDiscards 12 ipOutNoRoutes 13 ipReasmTimeout 14 ipReasmRegds 15 ipReasmOKs 16 ipReasmFails 17 ipFragOKs 18 ipFragFails 19 ipFragCreates 20 ipAddrTable 1 ipAddrEntry 1 ipAdEntAddr 136 31007122 8 2006 General Information 2 ipAdEntIfIndex 3 ipAdEntNetMask 4 ipAdEntBcastAddr 5 ipAdEntReasmMaxSize 21 ipRouteTable l 1 ipRouteEntry 1 ipRouteDest 2 ipRouteIfIndex 3 ipRouteMetricl
92. ights of all others 190 31007122 8 2006 Glossary E EAM The EAM Memory back up adapter is a USB device which stores the configuration data of the ESM switch If the switch fails the configuration data can be easily transferred to another switch F FDB The forwarding database stores addresses which may be MAC addresses or network addresses against the relevant forwarding data i e port numbers G GARP GARP General Attribute Registration Protocol is a standard for registering a client station into a multicast domain GARP is an industry standard protocol defined by IEEE 802 1P GMRP GMRP GARP Multicast Registration Protocol is a General Attribute Registration Protocol GARP application that provides a constrained multicast flooding facility GMRP is an industry standard protocol defined by IEEE 802 1P 31007122 8 2006 191 Glossary ICMP IGMP ICMP Internet Control Message Protocol is TCP IP protocol used to send error and control messages For example a router uses ICMP to notify the sender that its destination node is not available IGMP Internet Group Management Protocol governs the management of multicast groups in a TCP IP network LLDP The LLDP Link Layer Discovery Protocol provides a method for switches routers and access points to advertise their identification configuration and capabilities to neighboring devices that store the data in a MIB management info
93. intained only by qualified personnel No responsibility is assumed by Schneider Electric for any consequences arising out of the use of this material 2006 Schneider Electric All Rights Reserved 31007122 8 2006 About the Book y At a Glance Document Scope Validity Note Related Documents The Schneider Electric ConneXium Industrial Ethernet Offer is comprised of a complete family of products and tools reguired to build the infrastructure of an Industrial Ethernet network The offer includes e switches hubs and transceivers e gateways e cables connectors and accessories This manual contains a device description safety instructions technical data and all the other information you need to install the ConneXium ESM Ethernet switches before you start configuring them This manual contains all the information you need to choose and configure the appropriate redundancy procedures for a ConneXium ESM Ethernet switch The data and illustrations found in this book are not binding We reserve the right to modify our products in line with our policy of continuous product development The information in this document is subject to change without notice and should not be construed as a commitment by Schneider Electric Title of Documentation ConneXium Ethernet Cabling System Managed Switch Redundancy Manual ConneXium Ethernet Cabling System Managed Switch Command Line Interface
94. is used for instantiation Example The generic object class saPSState OID 1 3 6 1 4 1 3833 1 1 14 1 2 1 3 is the description of the abstract information power supply state It is however not possible to read any information from this as the system does not know which power supply is meant Specification of the subidentifier 2 images this abstract information on the reality instantiates it which means that it refers to power supply 2 A value is assigned to this instance and can then be read The instance get 1 3 6 1 4 1 248 14 1 2 1 3 2 for example returns the response 1 which means that the power supply is ready for operation 130 31007122 8 2006 General Information MIB The following table defines the abbreviations used in the MIB Abbreviations Abbreviation Meaning Comm Group access rights Con Configuration Descr Description Fan Fan ID Identifier Lwr Lower e g threshold PS Power supply Pwr Supply voltage sys System UI User Interface Upr Upper e g threshold ven Vendor Schneider Electric The following table defines the syntax terms used in the MIB Definition an integer in the range 0 232 Syntax Definitions Term Integer IP address XXX XXX XXX XXX xxx integer in the range 0 255 MAC address 12 digit hexadecimal number in accordance with ISO IEC 8802 3 Object Identifier X X X X e g 1 3 6 1
95. is the roll name assigned to the switch Note The configuration file contains all configuration data including the password Thus note the access rights on the tftp server This table outlines the procedure to save the current configuration data to a file using the command line interface Step Action 1 Connect the ESM to a serial cable 2 Open the CLI 3 Enter the command enable to change to the privileged EXEC mode 4 Enter the command copy nvram startup config tftp 149 218 112 159 switch config dat if you want the switch to load the current configuration data from a tftp server in the connected network 31007122 8 2006 51 Loading and Saving Settings 52 31007122 8 2006 Loading Software Updates At a Glance Overview This chapter explains how to update your ESM software What s in this This chapter contains the following topics 2 Chapter Topic Page Loading Software from the EAM Memory Back up Adapter 54 Loading Software Updates from the TFTP Server 56 Loading Software Updates via HTTP 58 31007122 8 2006 53 Loading Software Updates Loading Software from the EAM Memory Back up Adapter Checking the Software Release Installed Using the Web Based Interface Loading Procedure Using the CLI Check the software release installed on your ESM as follows Step Action 1 Ope
96. llowing chapters Chapter Chapter Name Page A General Information 129 B Switch Function Examples 183 31007122 8 2006 127 Appendices 128 31007122 8 2006 General Information At a Glance Overview What s in this Chapter This chapter provides general information concerning the ESM This chapter contains the following topics Topic Page The Management Information Base MIB 130 MIB II 133 Private MIB 151 SNMP V2 Module MIB 160 RFCs 165 IEEE Standards 167 Dimension Drawings 168 General Technical Software Data 170 Switches and Accessories 171 Copyright for Integrated Software 172 31007122 8 2006 129 General Information The Management Information Base MIB MIB Description The Management Information Base MIB is designed in the form of an abstract tree structure The branching points are the object classes The leaves of the MIB are called generic object classes Wherever necessary for unambiguous identification the generic object classes are instantiated i e the abstract structure is imaged on the reality by specifying the port address or the source address Values integers time ticks counters or octet strings are assigned to these instances These values can be read and in some cases modified The object description or object ID OID identifies the object class The subidentifier SID
97. ment information scheme and object definitions for saving connection information of neighboring devices that have LLDP activated The connection information contains as its most significant element the precise and unique ID of a connection endpoint MSAP MAC Service Access Point This is composed of the MAC address of the device and a port ID that is unique to this device The contents of the connection and management information are chassis ID its MAC address port ID its port MAC address description of the port system name system description currently activated system capabilities Interface ID of the management address VLAN ID of the port status of autonegotiation on the port medium half full duplex setting and transmission speed setting of the port information about the redundancy protocol STP RSTP HIPER ring ring coupling dual homing activated at this port VLAN information concerning the port VLAN ID and VLAN name This information can be called up from a network management station With this information the network management station is able to display the topology of the network LLDP uses an IEEE MAC address for exchanging information This address is normally not routed by switches This is why switches without LLDP support drop the LLDP packets Consequently a non LLDP capable device between two LLDP capable devices prevents the exchange of LLDP information To avoid this ESM Switch send additional LLDP pa
98. mited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Library at all For example if a patent license would not permit royalty free redistribution of the Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any othe
99. n RFC 790 1992 The most frequently used address classes are A B and C The following table describes IP address classification Class Net Address Host Address Address Range A 1 byte 3 bytes 1 0 0 0 to 126 255 255 255 B 2 bytes 2 bytes 128 0 0 0 to 191 255 255 255 C 3 bytes 1 bytes 192 0 0 0 to 223 255 255 255 D 224 0 0 0 to 239 255 255 255 E 240 0 0 0 to 255 255 255 255 The network address assigned by ARIN American Registry for Internet Numbers represents the fixed part of the IP address The following figure shows the bit notation of the IP address 0 31 Network address Host address The network address represents the fixed part of the IP address The worldwide leading regulatory board for assigning Internet addresses is the IANA Internet Assigned Numbers Authority If you need an IP address block contact your Internet service provider Internet service providers should contact their local higher level organization e APNIC Asia Pacific Network Information Centre Asia Pacific region e DARIN American Registry for Internet Numbers Americas and Sub Sahara Africa e LACNIC Regional Latin American and Caribbean IP Address Registry Latin America and some Caribbean Islands e RIPE NCC R seaux IP Europ ens Europe and Surrounding Regions 22 31007122 8 2006 Entering the IP Parameters The bit representation of the IP address is shown in the following fig
100. n contrast to BOOTP is that the server can only provide the configuration parameters for a certain period of time lease When the time period expires lease duration the DHCP client must attempt to renew the lease or negotiate a new one A BOOTP similar response can be set on the server i e the same IP address is always assigned to a particular client using the MAC address but this requires the explicit configuration of a DHCP server in the network If this configuration was not performed a random IP address whichever one happens to be available is assigned Default setting is DHCP enabled As long as DHCP is activated the ESM attempts to obtain an IP address If it cannot find a DHCP server after restarting it will not have an IP address To activate or deactivate DHCP refer to p 41 Below you can view an example of a DHCP configuration file 38 31007122 8 2006 Entering the IP Parameters etc dhcpd conf for DHCP Daemon subnet 149 218 112 0 netmask 255 255 240 0 option subnet mask 255 255 240 0 option routers 149 218 112 96 Host berta requests IP configuration with her MAC address host berta hardware ethernet 00 80 63 08 65 42 fixed address 149 218 112 82 Host hugo requests IP configuration with his client identifier host hugo option dhcp client identifier hugo option dhcp client identifier 00 68 75 67 6f fixed address 149 218 112 83 server name 14
101. n designated libraries and is quite different from the ordinary General Public License We use this license for certain libraries in order to permit linking those libraries into non free programs When a program is linked with a library whether statically or using a shared library the combination of the two is legally speaking a combined work a derivative of the original library The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom The Lesser General Public License permits more lax criteria for linking other code with the library We call this license the Lesser General Public License because it does Less to protect the user s freedom than the ordinary General Public License It also provides other free software developers Less of an advantage over competing non free programs These disadvantages are the reason we use the ordinary General Public License for many libraries However the Lesser license provides advantages in certain special circumstances For example on rare occasions there may be a special need to encourage the widest possible use of a certain library so that it becomes a de facto standard To achieve this non free programs must be allowed to use the library A more frequent case is that a free library does the same job as widely used non free libraries In this case there is little to gain by limiting the free library to free software only so we use t
102. n the Web based interface 2 Connect the ESM with an Ethernet cable 3 Go to Basics gt Software to view the release number of the software installed on your ESM Load the software from the EAM as follows Step Action Comment 1 Connect the EAM to which you have copied the ESM software to the USB port of the ESM 2 Connect the ESM to a terminal or a VT 100 emulator using a terminal cable 3 Start the terminal program on the PC and establish a connection with the ESM 4 Reboot the ESM While the ESM is booting the following message appears on the terminal Press lt l gt to enter System Monitor Le 5 Type 1 within 1 s to start System System Monitor 1 displays the following Monitor 1 1 Select Boot Operating System 2 Update Operating System 3 Start Selected Operating System 4 End reset and reboot 5 Erase main configuration file 6 Show Bootcode Information 6 Select 2 and press the ENTER On concluding the update the System key to copy the software from the Monitor prompts you to press any key to EAM into the local memory of the continue ESM 7 Select 3 to start the new software on the ESM 54 31007122 8 2006 Loading Software Updates Loading the Software from the EAM Using a Computer Further System Like a standard USB memory stick you can also connect the EAM to an USB port of your PC and copy the ESM software to the main directory of th
103. ndex A address translation group 136 alarm illustration 116 alarms traps dialog box 72 figure 72 screenshot 112 bit notation illustration 22 BOOTP figure of system configuration using BOOTP 33 system configuration using BOOTP 31 broadcast limiter 96 description 96 setting 96 C CLI access via Telnet 14 access via V 24 14 features of the CLI 14 opening the CLI 15 cold start performing a cold start 55 configuration DHCP server option 82 40 ports 59 resetting the configuration to the default settings 49 configuration data 30 configuration procedure using the Web based interface 41 configuring the ESM using the Command Line Interface 26 contact signal description 114 copyright applying terms of 180 GNU Lesser General Public License 172 Legion of the Bouncy Castle 181 no warranty 179 terms and conditions 174 D default settings resetting the configuration to the default settings 49 destination address 24 device group 151 DHCP defined 35 options reguested during ESM configuration 38 DHCP relay agent 185 31007122 8 2006 195 Index DHCP server option 82 configuration 40 dialog box alarms traps 72 password 65 VLAN Global 107 directed frame forwarding learning addresses 88 multi address capability 88 store and forward 88 displaying the SFP status 120 dotidBridge 144 E enhancing access security 60 entering the IP parameter
104. net access 68 setting the Telnet access 68 Telnet access disabling and enabling Telnet access using the Web based or the Command Line Interface 68 tftp process HP 188 installing on HP workstations 188 setting up 187 SunOS 188 tftp server directory structure 190 flowchart for setup 189 198 31007122 8 2006 Index loading settings from the TFTP server 48 loading software updates 56 tftp server for software updates 187 tftp server setup figure 189 transfer control protocol group 139 trap destination table configuration 110 trap message definition 110 U user datagram protocol group 140 user groups group 158 V VLAN simpleVLAN example 106 VLAN Global dialog box 107 VLAN tag description 98 format 98 illustration 98 W Web access disabling and enabling Web access using the Web based or the Command Line Interface 68 Web based Interface description of Web based access 68 Web based interface 27 28 login 16 reguirements 16 setting the Web based access 68 31007122 8 2006 199 Index 200 31007122 8 2006
105. ng aserial cable and press any key see p 13 or start the CLI using Telnet 2 Type a user name The default setting for the user name is admin You can change the user name later in the CLI Note that these entries are case sensitive Press the ENTER key Type the password The default setting for the password is private You can change the password later in the CLI Note that these entries are case sensitive 5 Press the ENTER key 31007122 8 2006 15 The User Interfaces The Web Based Interface Requirements To open the Web based interface you will need a Web browser a program that can read hypertext for example Netscape Navigator Communicator version 6 0 or higher or Microsoft Internet Explorer version 5 5 or higher Enabling the The following table shows the steps to enable the Web based interface Web Based Step Action Comment Interface 1 Connect the ESM switch to an Ethernet cable Start your Web browser 3 Make sure that Java Script is active on your browser 4 Establish the connection by entering The Web based interface uses the plug the IP address of the switch with which in Java runtime environment version you want to administer the Web based 41 4 If this is not installed on your network management in the address computer an installation via the Internet field of the Web browser Enter the starts automatically the first time you address in the followin
106. nnected to the ESM the ESM always loads its configuration from the EAM e a file on the connected network default setting e default settings Note When loading a configuration do not access the switch until it has loaded the configuration file and has made the new configuration settings Depending on the complexity of the configuration settings this procedure can last between 10 200 seconds Note During restart the switch automatically loads its configuration data from the local non volatile memory provided that you have not activated BOOTP DHCP and that no EAM see EAM is connected to the switch 44 31007122 8 2006 Loading and Saving Settings Loading Settings from the Local Non Volatile Memory Using the Web Based Interface Proceed as follows in the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Load Save The figure below shows the Load Save dialog box Load o Local O from URL from URL 8 save local Load configuration Save o Local O to URL Save configuration URL tftp 192 168 1 100 product product cfg Delete o current configuration current configuration an local Delete configuration AutoConfiguration Adapter ats notPresent Set Help iggy Click Local in the group box Load
107. nse 3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to this License If a newer version than version 2 of the ordinary GNU General Public License has appeared then you can specify that version instead if you wish Do not make any other change in these notices Once this change is made in a given copy it is irreversible for that copy so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy This option is useful when you wish to copy part of the code of the Library into a program that is not a library 31007122 8 2006 175 General Information 4 You may copy and distribute the Library or a portion or derivative of it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the sour
108. ntact person for this managed node along with the information about how that person is to be contacted sysName 1 3 6 1 2 1 1 5 0 ASCII string size 0 255 Read and write Is a name for this node for identifying it for administration By convention this is the fully qualified name in the domain sysLocation 1 3 6 1 2 1 1 6 0 ASCII string size 0 255 Read and write the physical location of this node e g staircase 3rd floor sysServices 1 3 6 1 2 1 1 7 0 Integer 0 127 Read This value indicates the services offered by the node It is an integral value calculated by summing 2llayer 1 for each ISO layer for which the node provides service For example A node primarily provides routing functions OSI layer 3 sysServices 271 4 A node is a host and offers application and network services OSI layers 4 and 7 sysServices 241 20 1 72 134 31007122 8 2006 General Information Interface Group The interface group contains information about the device interfaces 1 3 6 1 2 1 2 23 dzi r ab s 1 ifNumber 2 ifTable 1 ifEntry 1 ifIndex 2 ifDescr 3 ifType 4 ifMtu 5 ifSpeed 6 ifPhysAddress 7 ifAdminStatus 8 ifOperStatus 9 ifLastChange 10 ifInOctets 11 ifInUcastPkts 12 ifInNUcastPkts 13 ifInDiscards 14 if InErrors 15
109. nto MAC addresses In so doing a MAC address should be assigned to exactly one IP address Please bear in mind that when you use a router several IP addresses can be assigned to one MAC address namely that of the router This means that all packets of the router will pass the port unchecked if the permitted IP address is that of the router If a connected device sends packets with other MAC addresses and a permitted IP address the ESM will disable the port 31007122 8 2006 71 Protection from Unauthorized Access Defining IP Based Port Access Control Using the Web Based Interface Define IP based port access control as follows Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Security Port Security The following dialog box appears Configuration 6 MAC Based Port Security OlP Based Port Security Port Allowed Current Allowed A Module Port i Status MAC Address MAC Address IP Address 0 1 1 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 1 2 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 1 3 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 1 4 enabled 00 00 00 00 00 00 00 E0 18 95 D8 61 0 0 0 0 none 2 1 enabled 00 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 none 2 2 enabled 00 00 00 00 00 00 00 00 00
110. oftware Updates eee ee eee eee 53 Loading Software from the EAM Memory Back up Adapter 54 Loading Software Updates from the TFTP Server a 56 Loading Software Updates via HTTP 0c cece eee eee eee 58 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Port Configuration su ss2s00iecee chet deste neiaees 59 Switching the Ports on and Off a an eee eee 60 Selecting the Operation Mode 1 0 0 0 cece tees 61 Displaying Connection Error Messages aa 62 Protection from Unauthorized Access 63 The Password for SNMP Access aaa 64 Setting the Telnet Web Based Access aaa 68 Disabling the Ethernet Switch Configurator ESC Function 70 Port Access Comro wariri Cr bees ta ne ea ae a 71 Synchronizing the System Time of the Network 75 Protocols for Synchronizing the System Time of the Network 76 Entering the System Time 0 6 0 cette eae 77 Simple Network Time Protocol SNTP 11 cece eee eee eee ee 79 Precision Time Protocol PTP 2 06 cece cece eee 82 Interaction between PTP and SNTP aaa 85 Traffic Control ss s sssssassrsas asais ad s c rases 87 Directed Frame Forwarding aaa 88 Multicast Application 11 eee 91 The Broadc st limiter s sies ciens d utt kids k Gass bear bade done tr eden 96 PriQritiZation nonen So tests Kia Pe a ee ee ee DE Pee a ae ey 97 Flow Con
111. ol 99 Description of VLANs 101 Configuring VLANs 103 Setting up VLANs 105 31007122 8 2006 87 Traffic Control Directed Frame Forwarding Directed Frame Forwarding Functions Store and Forward Multi Address Capability Learning Addresses Directed frame forwarding is a method used by the switch to avoid unnecessary increases in the network load The switch features the following directed frame forwarding functions e store and forward e multi address capability e static address entries All data received by a ESM are stored and their validity is checked Invalid and defective tagged frames gt 1522 bytes or CRC errors as well as fragments lt 64 Bytes are discarded Valid tagged frames are forward by the ESM An ESM learns all the source addresses for a port Only packets with e unknown addresses e these addresses or e amulti broadcast address in the target address field are sent to this port An ESM can learn up to 4000 addresses This becomes necessary if more than one end device is connected to one or more ports It is thus possible to connect several independent subnetworks to an ESM An ESM monitors the age of the learned addresses Address entries which exceed a certain age 30 seconds aging time are deleted by the ESM from its address table Note A reboot deletes the learned address entries 88 31007122 8 2006 Traffic Control
112. onfiguration data to the local non volatile memory and provided that an EAM is connected also to the EAM Saving Locally Save the current configuration data as follows and on the EAM M Ste Action Using the CLI P 1 Connect the ESM to a serial cable 2 Open the CLI 3 Enter the command enable to change to the Privileged EXEC mode 4 Enter the command copy system running config nvram startup config to save the current configuration data to both the local non volatile memory and to the EAM if an EAM is connected 50 31007122 8 2006 Loading and Saving Settings Saving to a File Using the Web Based Interface Configuration Data Saving to a File Using the CLI Save the configuration data to a file as follows Step Action Comment 1 Connect the ESM to an Ethernet cable Open the Web based interface Go to Basics gt Load Save Click to URL in the Save group box 5 Type in the URL edit field the path under which you want the ESM to save the configuration file 6 Click Save Configuration The URL marks the path to the tftp server on which the switch saves the configuration file The URL is written as follows tftp IP address of the tftp server path name file name e g tftp 149 218 112 5 switch contig dat To save from an ETY or NOE module the URL is tftp IPaddress RAM0 switch rolename prm where the Paddress is the IP address of the module and switch rolename
113. or ESC Function 70 Port Access Control 71 31007122 8 2006 63 Protection from Unauthorized Access The Password for SNMP Access Description of the Password for SNMP Protecting your Switch from Unwanted Access A network management station communicates with the switch via the Simple Network Management Protocol SNMP Every SNMP packet contains the IP address of the sending computer and the password under which the sender of the packet would like to access the switch MIB The switch receives the SNMP packet and compares the IP address of the sending computer and the password with the entries in the MIB of the switch If the password has the appropriate access right and if the IP address of the sending computer has been entered then the switch will allow access The default setting is that the switch can be accessed using the public read only and the private read and write passwords and their respective login names user or path from every computer Protect your switch from unauthorized access as follows Step Action 1 Define a new password which you can access from your computer with all rights 2 Treat this password with discretion as everyone who knows the password can access the switch MIB with the IP address of your computer 3 Limit the access rights of the known passwords or delete their entries 64 31007122 8 2006 Protection from Unauthorized Acces
114. ord for write access restart the Web based interface to access the ESM Note For security reasons the passwords are not displayed Note down each change You cannot access the ESM without a valid password Note For security reasons SNMP version 3 encrypts the password Enabling SNMPv1 or SNMPv2 unencrypts the password Note As many applications do not accept passwords shorter than 8 characters you should use 8characters for the password 8 To unencrypt the password go to Security gt SNMPv1 v2 Access and select SNMPv1 enabled or SNMPv2 enabled As many applications do not accept passwords shorter than 8 characters you should use 8 characters for the password in SNMP version 3 9 Go to Security gt SNMPv1 v2 The following dialog box appears SNMPv1 enabled V SNMPv2 enabled Y Index Password IP Address IP mask Access Mode Active 0 public 0 0 0 0 0 0 0 0 read only v 1 private 0 0 0 0 0 0 0 0 read write M Set Reload Create entry Delete Help o The SNMPv1 v2 dialog box allows you to select the access using SNMPv1 or SNMPv2 The default setting for SNMPv1 v2 is both protocols are enabled which allows you to communicate with earlier versions of SNMP Please note that passwords are case sensitive 66 31007122 8 2006 Protection from Unauthorized Access Step Action
115. ormation by means of the targeted distribution of multicast data packets The distribution of the multicast data packets exclusively to those ports to which the recipients of these multicast data packets are connected reduces the bandwidth required You can recognize IGMP multicast addresses by the area in which an address is located e MAC multicast address 01 00 5E 00 00 00 01 00 5E FF FF FF e IP multicast address class D 224 0 0 0 239 255 255 255 31007122 8 2006 91 Traffic Control Example of a Multicast Application Description of IGMP Snooping The cameras for machine surveillance normally transmit their images to monitors located in the machine room and in the monitoring room In an EMS IP transmission a camera sends its image data with a multicast address over the network To prevent the many images from slowing down the entire network the EMS uses the GMRP to distribute multicast address information As a result those images with a multicast address are only distributed to those ports that are connected to the associated monitors for surveillance The figure shows a multicast application example 1st floor 2nd floor Control room The Internet Group Management Protocol IGMP describes the distribution of multicast information between routers and end devices on layer 3 Routers with an active IGMP function periodically send queries to find out which IP multicast group members are
116. ort counters 31007122 8 2006 119 Operation Diagnostics Displaying the SFP Status Properties of SFP Modules module type support provided in the media module temperature in degrees Celsius transmission power in mW reception power in mW By having the SFP status displayed you can view the current connection to the SFP modules and their properties The properties include Opening the SFP Open the SFP dialog box as follows Module Dialog Box in the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Diagnostics gt Ports gt SFP modules The figure shows the SFP module dialog box Module Temperature Tx Power Rx Power Module Port a Supported INGES in mW in mW 1 3 M SFP SXLC v 42 1 7929 3 5840 o Help iggy 120 31007122 8 2006 Operation Diagnostics Topology Discovery Description of Topology Discovery IEEE 802 1AB describes the Link Layer Discovery Protocol LLDP LLDP allows users to automatically detect the topology of their LANs A device with active LLDP sends its own connection and management information to neighboring devices of the shared LAN if they have LLDP activated receives connection and management information from neighboring devices of the shared LAN if they have LLDP activated and sets up a manage
117. otocol The ESC program uses the first PC network card found If your computer has more than one network card you can select them on the toolbar of the ESC program The ESC program displays a line for each device which responds to the ESC protocol Configure the ESM as follows Step Action 1 Select the device line of the ESM 2 Click the symbol with the two green dots in the toolbar to set the LEDs for the selected device flashing To switch off the flashing click the symbol again Double click the device line of your switch to open the window displayed below In this dialog you can enter your device name as well as the IP parameters Properties for MAC Address 00 80 63 2 Name TCSES _2FF96F IP Configuration IP Address 149 218 112 102 Subnet Mask 255 255 255 0 Default Gateway 0 0 0 0 OK Cancel Enter your device name as well as your IP parameters For security reasons switch off the ESC function for the device in the Web based interface after you have assigned the IP parameters to the device see p 70 Save the settings you have made so they will still be available after restart see p 50 Note After the IP address has been entered and saved the ESM loads the local configuration settings see p 44 31007122 8 2006 29 Entering the IP Parameters Loading the System Configuration from
118. ple reflects a standard implementation of the EMS in a simple VLAN Example configuration VLAN yellow VLAN brown VLAN green ID 2 D 1 ID 3 149 218 112 208 106 31007122 8 2006 Traffic Control Specifying Rules After setting up VLANs specify the rules for data received as follows for Data i Ste Action Received p 1 Go to Switching gt VLAN gt Port 2 Specify the rules for data received in the port table e VLAN ID specifies to which VLAN a received untagged data packet is assigned to e Acceptable Frame Types determines whether data packets can also be received untagged e Ingress Filter specifies whether the received tags are evaluated 3 To save the settings you have made press Set Viewing and Delete the VLAN settings as follows Deleting the VLAN Settings Step Action 1 Go to Switching gt VLAN gt Current to view the settings The table displays all VLANs configured 2 Go to Switching gt VLAN gt Global In the dialog box shown below press the Delete button to restore all the VLAN settings of the device to default settings Version version v Max VLAND ID 4062 Max supported VLANs 256 Number of VLANs 1 5 Go to Switching gt VLAN gt Static Press the Delete button in this dialog to delete a selected row in the table 31007122 8 2006 107 Traffic Control
119. process the BOOTP Process Load boot configuration Local Default Load settings from flash memory ESM initialization ESM runs with settings from local flash Send DHCP DHCP or BOOTP BOOTE requests Reply from Save IP parameter DHCP BOOTP and config file server URL locally Initialize IP stack with IP parameters ESM is manageable 31007122 8 2006 33 Entering the IP Parameters The following figure shows part 2 of the BOOTP DHCP process Start tftp process Load remote with config Y configuration from file URL of DHCP eS URL of DHCP Start tftp process Load remote ith config file URL of configuration local configuration Load transferred config file No Save transferred config file local and set boot configuration to local Load transferred config file Loading of configuration data is complete Note The agent of the ESM does not support IEEE 802 3 frame type 34 31007122 8 2006 Entering the IP Parameters System Configuration Using DHCP General Information Configuration Procedure Using the CLI or the Web Based Interface To configure the system via DHCP Dynamic Host Configuration Protocol you need a DHCP server The DHCP server matches the configuration data to the ESM on the basis of its MAC address or its system name The DHCP responds similar to the BOOTP and offers in addition the configuration
120. r equipment damage Option 82 DHCP option 82 allows you to assign the same IP address to any device connected Application to a particular switch port The server shown in the example below must support Example option 82 ESM option 82 PLC MAC address 00 80 63 0f 7c 2e CI m m ee m m m m m m m m m m m m m m DHCP server IP 84 16 127 5 IP 84 16 127 30 HIHHHHHHHE HIHHH HHHH HAHH HHHH IP 84 16 127 30 184 31007122 8 2006 Switch Function Examples Configuring a Switch for DHCP Option 82 Step Action 1 Log in to the Web based interface see p 16 TCSESM Schneider Electric Release 1 00 Login Password Language 2 Goto Advanced gt DHCP Relay Agent Server IP Addre DHCP Option 82 Operation COn C Off 1 0 0 0 0 Type MAC e 2 0 0 0 0 Manual Value Type other 0 0 0 0 DHCP server RemotelD entry A1 04 CO A8 A8 C8 4 0 0 0 0 Type display 192 168 168 200 DHCP Relay disabled Module Port Circuit ID Option 82 on Schneider Agent 1 1 B6 06 00 00 01 00 01 01 V 1 2 B6 06 00 00 01 00 01 02 V 1 3 B6 06 00 00 01 00 01 03 v 1 4 B6 06 00 00 01 00 01 04 E O 1 5 B6 06 00 00 01 00 01 05 V 1 6 B6 06 00 00 01 00 01 06
121. r system and a licensee cannot impose that choice 178 31007122 8 2006 General Information No Warranty This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 12 lf the distribution and or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Library does not specify a license version number you may choose any version ever published by the Free Software Foundation 14 lf you wish to incorporate parts of the Library into other free
122. rary will still fall under Section 6 Otherwise if the work is a derivative of the Library you may distribute the object code for the work under the terms of Section 6 Any executables containing that work also fall under Section 6 whether or not they are linked directly with the Library itself 6 As an exception to the Sections above you may also combine or link a work that uses the Library with the Library to produce a work containing portions of the Library and distribute that work under terms of your choice provided that the terms permit modification of the work for the customer s own use and reverse engineering for debugging such modifications You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License You must supply a copy of this License If the work during execution displays copyright notices you must include the copyright notice for the Library among them as well as a reference directing the user to the copy of this License Also you must do one of these things 176 31007122 8 2006 General Information a Accompany the work with the complete corresponding machine readable source code for the Library including whatever changes were used in the work which must be distributed under Sections 1 and 2 above and if the work is an executable linked with the Library with the complete machine readable work that uses the Libra
123. receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Library or any portion of it thus forming a work based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified work must itself be a software library 174 31007122 8 2006 General Information b You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change c You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License d If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility other than as an argument passed when the facility is invoked then you must make a good faith effort to ensure that in the event an application does not supply such function or table the facility still operates and performs whatever part of its
124. rface 1 Activate BOOTP to receive the configuration data in the CLI or refer to p 41 2 Change to the privileged EXEC mode by typing enable and press the ENTER key 3 Enable BOOTP by typing network protocol BOOTP and press the ENTER key 4 Perform the configuration providing the BOOTP server with the switch data listed in the block ESM Data for BOOTP Server below 5 Save the configuration performed by typing the command copy system running nvram startup config and press the ENTER key 6 Confirm that you wish to save the configuration by pressing Y 31007122 8 2006 31 Entering the IP Parameters ESM Data for BOOTP Server Provide the BOOTP server with the following ESM data etc bootptab for BOOTP daemon bootpd gw gateways ha hardware address ht hardware type ip IP address sm subnet mask tc template global gw 0 0 0 0 sm 255 255 240 0 rs2 01 ht ether net ha 008063086501 ip 149 218 17 83 tc global rs2_02 ht ether net ha 008063086502 ip 149 218 17 84 tc global Note Lines that start with a character are comment lines The lines under global make the configuration of several devices easier The template tc allows you to allocate the global configuration data tc global The direct allocation of the hardware or IP address occurs in the device lines rs2 0 32 31007122 8 2006 Entering the IP Parameters Flow Chart for This figure illustrates the BOOTP
125. rfaces The System Monitor Features of the System Monitor Data Transfer Parameters The System Monitor enables you to select the boot operating system update the operating system start the selected operating system end the System Monitor erase the saved configuration and show the boot code information The following table shows the data transfer parameters Parameter Value or Status Speed 9600 baud Data 8 bit Parity none Stopbit 1 bit Handshake off 12 31007122 8 2006 The User Interfaces Opening the System Monitor Open and the System Monitor as follows Step Action Comment 1 Connect the V 24 RJ11 socket The V 24 interface of the switch supports the to baud rates 9600 and 19200 default setting e either a terminal 9600 ora COM port of a PC with For the physical connection refer to the terminal emulation Installation User Manual according to VT 100 using a terminal cable 2 Start the terminal program on While the ESM is being booted the following the PC and establish a message appears on the terminal connection with the switch Press lt 1 gt to enter System Monitor 1 3 Type 1 within one second to Subseguently System Monitor 1 displays the start System Monitor 1 following information 1 Select Boot Operating System 2 Update Operating System 3 Start Selected Operating System 4 End reset and reboot 5 Eras
126. rmation base NTP NTP Network Time Protocol is used to update the real time clock in a computer There are numerous primary and secondary servers in the Internet that are synchronized to the international time standard Coordinated Universal Time UTC via radio satellite or modem RFC RM RFC Request For Comment is document that describes the specifications for a recommended technology RFCs are used by the Internet Engineering Task Force IETF and other standards bodies RM Redundancy Manager is a switch function which allows you to close both ends of a backbone in a line type configuration to create a redundant HIPER ring 192 31007122 8 2006 Glossary RSTP RSTP Rapid Spanning Tree protocol provides a loop free topology for any LAN Local Area Network or bridged network S SFP The SFP interface Small Form Factor Pluggable interface is an industry standard daughter card used in networking Their main advantage is that new speeds can be interfaced to an expensive network device by changing only the SFP module T TFTP The TFTP Trivial Transfer File Protocol is a version of the TCP IP FTP protocol that has no directory or password capability V VLAN VLANs Virtual Local Area Networks are logical subgroups within a local area network that is created via software rather than manually moving cables in the wiring closet 31007122 8 2006 193 Glossary 194 31007122 8 2006 I
127. rocess For example rm ESM bin cd tftpboot ESM tftp lt tftp Servername gt get ESM ESM bin 188 31007122 8 2006 Switch Function Examples Flowchart for The following flowchart summarizes the procedure for setting up the tftp server with Setup SunOS and HP Checking the tftp process Edit the file etc inetd conf Is tftp commented out Delete the comment character from this line Re initialize inetd conf by entering kill 1 PID Problems with the tftp server e g cd tftpboot ESM tftp lt tftp Servername gt Test the tftp process get ESM ESM bin Response if the process is running Received rm ESM bin Checking of the tftp process completed tftp dgram udp wait root usr etc in tftpd in tftpd tftpboot 31007122 8 2006 189 Switch Function Examples Software Access Rights Directory Structure of the Software The agent needs read permission to the tftp directory with the ESM software The following table shows the directory structure of the tftp server with stated access rights once the ESM software has been installed Filename Access TCSESM xxxxx bin 444 r r r d directory r read w write x execute 1st position designates d directory 2nd to 4th positions designate access rights of user 5th to 7th positions designate access rights of user groups 8th to 10th positions designate access r
128. ry 410 11 12 13 fox 14 24 saSys 26 saSys 27 saSys 30 saSys 2 saPSTable l 1 saPSEn 1 sa 2 sa 3 sa salfaceGroupID salfaceID salfaceStpEnable salfaceLinkType salfaceAction salfaceNextHopMacAddress salfaceFlowControl salfacePriorityThreshold salfaceName salfaceTrunkID saIfacePrioTOSEnable salIfBcastLimit salfaceUtilization salfaceUtilizationControlInterval 20 saSysChassisName 21 saSysStpEnable 22 saSysFlowControl 23 saSysBOOTPEnable DHCPI Gl nable 25 saSysTelnetEnable HTTPEnable PlugAndPlay 29 saBcastLimiterMode temT ime try PSSysID PSID PSState 5 saCurrentAddressTabl 1 saCurrentAddressEntry 1 saCurrentAddress 152 31007122 8 2006 General Information saCurrentAddressReceivePort saCurrentAddressStaticEgressPorts saCurrentAddressEgressPorts saCurrentAddressStatus saESMext saESMOperMode saESMConfigError saESMSigRelayState saSigLinkTable 1 sas sa 1 2 s ig SigLinkEntry saSigLinkID saSigLinkAlarm rapReason saSigReasonIndex saESM1 Sa ESMTopology1 saESMTopol 1 saESM 1 2 saESMI TopologyGroup ESMPartnerIpAddress Table logyEntry TopologyLinkID
129. ry as object code and or source code so that the user can modify the Library and then re link to produce a modified executable containing the modified Library It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions b Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that 1 uses at run time a copy of the library already present on the user s computer system rather than copying library functions into the executable and 2 will operate properly with a modified version of the library if the user installs one as long as the modified version is interface compatible with the version that the work was made with c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above for a charge no more than the cost of performing this distribution d If distribution of the work is made by offering access to copy from a designated place offer equivalent access to copy the above specified materials from the same place e Verify that the user has already received a copy of these materials or that you have already sent this user a copy For an executable the required form of the work that uses the Library must include any data and utility programs needed for reproducing the executable from i
130. s Entering the Password for Proceed as follows to enter the password for SNMP access SNMP Access Using the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Security gt Password SNMP The dialog enables you to change the read and read write passwords for access to the ESM via the Web based interface CLI SNMP Please note that passwords are case sensitive For security reasons the read password and the read write password must not be identical The Web based interface and the user interface communicate using SNMP version 3 The following figure is displayed on the screen Select password CLI WEB SNMPv3 l Modify read only password user O Modify read write password admin New password Please retype Set o Select Modify read only password user to enter the read only password Enter the new read only password in the line New password and repeat the entry in the line Please retype 6 Select Modify read write password admin to enter the read write password 31007122 8 2006 65 Protection from Unauthorized Access Step Action 7 Enter the new read write password in the line New password and repeat the entry in the line Please retype Note If you do not know a password with read write access you will not have access to the ESM Note After changing the passw
131. s loading the system configuration from the Memory back up adapter 30 using the CLI 26 entering the IP parameters using the CLI 26 entering the system time 77 ESM login 17 ESM home page alarm 116 Ethernet Switch Configurator function disabling limiting and enabling using the Web based or the Command Line Interface 70 Ethernet Switch Configurator software installing 28 Ethernet tagged frame illustration 89 event counter on port level 118 F figure alarms traps screen 72 DHCP BOOTP configuration 36 password screen 65 flow control full duplex link 99 half duplex link 100 introduction 99 frame switching tagging 98 from the default settings 44 G general technical software data 170 generic object class 130 GMRP 91 93 H HP tftp process 188 http loading software updates 58 ICMP group 138 IEEE standards 167 IGMP 91 IGMP snooping 92 illustration Ethernet tagged frame 89 VLAN Global 107 VLAN tag 98 interface group 135 internet protocol group 136 IP address classification 22 description 22 IP address with subnetwork allocation figure 24 IP parameters 26 basics 22 entering the IP parameters using the Ethernet Switch Configurator software 28 ISO OSI 25 196 31007122 8 2006 Index L loading settings 44 from a file 47 from a file in the connected network 44 from the local non volatile memory 44 from the local non volatile memory u
132. s B 31007122 8 2006 23 Entering the IP Parameters The following figure shows an example of IP addresses with subnetwork allocation in accordance with the network mask from the above example Decimal notation 129 218 65 17 128 lt 129 lt 191 gt Class B binary notation 10000001 11011010 01000001 00010001 ISS Subnetwork 1 Network address Decimal notation 129 218 129 17 L 428 lt 129 lt 191 gt Class B binary notation 10000001 11011010 10000001 00010001 Ll Subnetwork 2 Network address Example of Network Mask Usage In a large network it is possible that gateways and routers separate the management card from its management station How does addressing work in such a case The figure below shows a management agent that is separated from its management station by a router Romeo Lorenzo Sending Data The management station Romeo wants to send data to the management agent Juliet Romeo knows Juliet s IP address and also knows that the router Lorenzo knows the way to Juliet 24 31007122 8 2006 Entering the IP Parameters Example Romeo therefore puts his message in an envelope and writes Juliet s IP address on the outside as the destination address For the source address he writes his own IP address on the envelope Romeo then places this envelope in a second one with Lorenzo s MAC address as the destination and his own MAC address as the source This process
133. s will contain the value O snmpInPkts snmpOutPkts snmpInBadVersions snmpInBadCommunityNames snmpInBadCommunityUses snmpInASNParseErrs not used snmpInTooBigs snmpInNoSuchNames snmpInBadValues snmpInReadOnlys snmpiInGenErrs snmpInTotalRegVars snmpInTotalSetVars snmpInGetRequests snmpiInGetNexts snmpInSetRequests snmpInGetResponses 140 31007122 8 2006 General Information 19 snmpInTraps 20 snmpOutTooBigs 21 snmpOutNoSuchNames 22 snmpOutBadValues 23 not used 24 snmpOutGenErrs 25 snmpOutGetRequests 26 snmpOutGetNexts 27 snmpOutSetRequests 28 snmpOutGetResponses 29 snmpOutTraps 30 snmpEnableAuthenTraps 31 snmpSilentDrops 32 snmpProxyDrops RMON Group This part of the MIB provides a continuous flow of current and historical network 1 3 6 1 2 1 16 component data to the network management The configuration of alarms and events controls the evaluation of network component counters The agents inform the management station of the evaluation result by means of traps depending on the configuration 16 rmon 1 statistics 1 etherStatsTable 1 etherStatsEntry etherStatsIndex etherStatsDataSource etherStatsDropEvents etherStatsOctets etherStatsPkts etherStatsBroadcastPkts etherStatsMulticastPkts oO t etherStatsCRCAlignErrors
134. saRingRedCplReconfig The configuration of the redundant ring network coupling changes saSNTPTrap Errors occur in connection with the SNTP protocol e g server not available saRelayDuplicateTrap A duplicate IP address is detected in connection with the DHCP Option IldpRemTablesChangeTrap This alarm message is sent if an entry in the topology table changes Note The trap coldStart is sent during every boot procedure 31007122 8 2006 111 Operation Diagnostics Configuring Configure the traps as follows Traps Using the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Diagnostics gt Alarms Traps Access this dialog with the read write password The Alarms Traps dialog allows you to specify both the events triggering an alarm trap and the persons these alarms should be sent to This figure shows the Alarms Traps dialog box Selection Address Enabled Authentication J 149 218 112 159 V Link Up Down Spanning Tree V Chassis J Redundancy V Port security a Set Reload Create entry Delete oo 4 In the IP Address column enter the IP address of a network management station which the traps should be sent to 5 In the Enabled column mark the entries which shoul
135. saved with the configuration An alarm trap can only be sent if at least one recipient is entered under Configuring Traps Using the Web Based Interface p 112 and if both the appropriate status and Port Security are marked 31007122 8 2006 73 Protection from Unauthorized Access 74 31007122 8 2006 Synchronizing the System Time of the Network 7 At a Glance Overview This chapter contains information concerning the synchronization of the system time of the network What s in this This chapter contains the following topics 2 Chapter Topic Page Protocols for Synchronizing the System Time of the Network 76 Entering the System Time 77 Simple Network Time Protocol SNTP 79 Precision Time Protocol PTP 82 Interaction between PTP and SNTP 85 31007122 8 2006 Synchronizing the System Time of the Network Protocols for Synchronizing the System Time of the Network SNTP and PTP When you synchronize the system time of the network the ESM allows you to use either the Simple Network Time Protocol SNTP or the Precision Time Protocol PTP The accuracies of both protocols differ If you only require accuracies in the order of milliseconds the Simple Network Time Protocol SNTP offers a low cost solution Areas of application of this protocol are e log entries e time stamping of production data e production control The Precision Time Protocol PTP which
136. signment of the priority number to the four priority classes is as follows Priorities Entered Priority Priority Class 0 1 normal 1 0 low 2 0 low 3 1 normal 4 2 high 5 2 high 6 3 admin 7 3 admin Strict Priority With strict priority the switch send all data packets with a higher priority level before it sends a data packet with the next lower priority level Thus the switch does not send a data packet with the next lower priority level until there are no other data packets waiting in the queue 31007122 8 2006 97 Traffic Control Tagging Setting Prioritization Using the Web Based Interface The VLAN tag is integrated into the MAC data frame for the VLAN and prioritization functions in accordance with the IEEE 802 1 Q standard The VLAN tag consists of 4 Bytes It is inserted between the source address field and the type field With VLAN tagged frames the switch evaluates e the priority information at all times e the VLAN information if VLANs have been set up Frames with VLAN tags that contain priority information but no VLAN information VLAN ID 0 are called priority tagged frames An Ethernet tagged frame with one such tag is shown in the following figure ko o 3 ir 0 PE bt o g o E o i D S5 Go 7 O D o oO 0 iL oo 2 2 x0 iz o Sir L 0 e 3 Q O o E Oo 2 kolas ae 2 o Zg sa tk a Ss 2 O o Vc EL 7S i i oo er p S t g L t os 8 gt Oc BF cy O O G
137. sing the Command Line Interface 46 from the local non volatile memory using the Web based interface 45 from the Memory back up adapter 44 46 loading settings from the tftp server 48 loading software from Memory back up adapter 54 loading the settings from a file 46 loading the system configuration from the local memory 30 from the Memory back up adapter 30 local memory loading the system configuration from the local memory 30 login screen 17 M MAC address 25 management agent figure 24 management group 154 Management Information Base MIB 130 MAU management group 150 Memory back up adapter application 30 loading settings 46 loading software 54 loading the system configuration from the EAM 30 purpose of the Memory back up adapter 30 MIB abbreviations 131 description 130 syntax 131 tree structure 132 MIB tree structure figure 132 MIB module SNMP V2 160 multicast GMRP per port 95 IGMP forward all 95 static query port 95 multicast application description 91 example of an application 92 multicasting 93 N network mask assigning devices to subnetworks 23 figure 23 O object class 130 object description 130 object ID 130 operation diagnosis diagnosis dialog 124 reports 124 operation mode selecting 61 option 82 example 184 P password 30 dialog box 65 port access control defining MAC based port access control 73 description 71 IP based port access
138. t The following figure shows a flow control example et ag Ha Port 1 7 Port 2 Switch Port 4 Port 3 _ _ _ _ ll ll C EU Workstation 1 Workstation 2 Workstation 3 Workstation 4 Full Duplex Link In the above example there is a full duplex link between workstation 2 and the switch Before the send gueue of Port 4 overflows the switch sends a reguest to workstation 2 to include a small break in the sending transmission 31007122 8 2006 99 Traffic Control Half Duplex Link Setting Flow Control in the Web Based Interface In the above example there is a half duplex link between workstation 2 and the switch Before the send queue of port 4 overflows the switch sends data so that workstation 2 detects a collision and thus interrupts the transmission You can set flow control as follows in the web based interface Step Action 1 Connect the ESM to an Ethernet cable Open the Web based interface Go to Basics Port Configuration AJON Enable flow control for a particular port by checking Flow Control for the appropriate port number Go to Switching gt Global This dialog enables you to e switch off flow control at all ports or e switch on flow control at all ports which have been selected for flow control in the configura
139. t However as a special exception the materials to be distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered by this License and distribute such a combined library provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted and provided that you do these two things a Accompany the combined library with a copy of the same work based on the Library uncombined with any other library facilities This must be distributed under the terms of the sections above 31007122 8 2006 177 General Information b Give prominent notice with the combined library of the fact that part of it is a work based on the Library and explaining where to find the accompanying uncombined form of the same work 8 You may not copy modify sublicense
140. t the server is switched on After the Telnet server has been switched off the ESM can no longer be accessed using a Telnet connection Note The Telnet server may be reactivated using the CLI or the Web based interface via Security lt Telnet Web Access The Web server of the ESM allows you to configure the ESM using the Web based interface You can switch off the Web server to prevent Web access to the ESM The default setting is that the server is switched on After the Web server has been switched off the ESM can no longer be accessed using a Web browser Note The Web server may be reactivated using the CLI You can disable and enable Telnet or Web access as follows Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web Based interface 3 Go to Security gt Telnet Web Access 4 Switch off on the server to which you wish to disable enable access 68 31007122 8 2006 Protection from Unauthorized Access Enabling and Disabling Telnet Access Using the Command Line Interface CLI Enabling and Disabling Web Based Access Using the CLI You can enable and disable Telnet access as follows Step Action Connect the ESM to a serial cable Open the CLI Enter the command enable to change to the privileged EXEC mode Enter the command transport input telnet to switch on the Telnet server GO AJ O N
141. ter booting 58 31007122 8 2006 Port Configuration At a Glance Overview This chapter provides information concerning the port configuration procedure What s in this This chapter contains the following topics 2 Chapter Topic Page Switching the Ports On and Off 60 Selecting the Operation Mode 61 Displaying Connection Error Messages 62 31007122 8 2006 59 Port Configuration Switching the Ports On and Off Enhancing Access Security In the the default setting is all ports are switched on To enhance access security switch off the ports which you do not wish to connect Procedure Using Switch the ports on and off as follows the Web Based Step Action Interface 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Port Configuration 4 Select in the column Port On the ports which a device will be connected to 60 31007122 8 2006 Port Configuration Selecting the Operation Mode Default Settings The default setting for all ports is Auto negotiation mode Procedure Using Change to Auto negotiation mode as follows the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable Open the Web based interface Go to Basics gt Port Configuration 2 3 4 If the device connected to this port requires a fixed setting
142. the transfer medium There is a faulty component in the network Collisions The controller of the device is faulty The network expansion is too big or the line is too long A packet has collided with an interference signal 118 31007122 8 2006 Operation Diagnostics Opening the Open the statistics table as follows Statistics Table Dialog in the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Diagnostics gt Ports Statistics The figure shows the Statistics table Module Port Transmitted Recelved Recelved Recelved Detected Detected Packets Packets a Packets Octets Fragments CRC errors Collisions 64 bytes 65 to 127 bytes ackels 1 1 0 0 0 0 0 0 0 0 4 4 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 3 3 0 0 0 0 0 0 0 0 3 3 0 0 0 0 0 0 0 0 3 3 0 0 0 0 0 0 0 0 3 3 0 0 0 0 0 0 0 0 4 4 0 0 0 0 0 0 0 0 4 4 0 0 0 0 0 0 0 0 4 4 0 0 0 0 0 0 0 0 4 4 0 0 0 0 0 0 0 0 5 5 676091 274384 274384 0 0 0 377820 214446 5 5 266919 2030742 1208661399 0 0 0 664755 385734 5 5 0 0 0 0 0 0 0 0 5 5 0 0 0 0 0 0 0 0 O CD Hel iggy Resetting Port Reset port counters as follows Counters Using Ste Action the Web Based p Interface 1 Go to Basics gt Restart 2 Click Reset p
143. tion after saving the VLAN configuration If you assign the port to the VLAN with ID 1 you can always ensure that the management station data can be sent To set up VLANs you first specify the desired VLANs in the desired static VLAN table Static After setting up VLANs you specify the rules for received data in the port table Port Use the Delete button to restore all the default VLAN settings of the device default settings Save the VLAN configuration to ensure it is effective after restart and then restart the switch 31007122 8 2006 103 Traffic Control Note The 256 VLANs available can use any VLAN ID in the range of 1 to 4042 Note In the HIPER ring with VLANs you should select only operate devices with the software that supports this function Note In the HIPER ring configuration select for the ring ports e VLAN ID 1 and Ingress Filtering are disabled in the port table and e VLAN affiliation U in the static table Note In the Ring Network coupling configuration select for the coupling and partner coupling ports e VLAN ID 1 and Ingress Filtering disabled in the port table and e VLAN affiliation U in the static table 104 31007122 8 2006 Traffic Control Setting up VLANs Setting up Set up VLANs as follows Procedure Using the Web Based Interface Step Action 1 Connect the ESM to an Ethernet cable 2 Open
144. tion table 100 31007122 8 2006 Traffic Control Description of VLANs VLANs A virtual LAN VLAN consists of a group of network subscribers in one or more network segments which can communicate with each other as if they belonged to the same LAN VLANs are based on logical instead of physical links and are flexible elements in the network design The biggest advantage of VLANs is the fact that they permit the formation of user groups based on their subscriber function and not on their physical location or medium Since broadcast multicast data packets are transmitted exclusively within a virtual LAN the remaining data is not affected The VLAN function is defined in the IEEEE 802 1Q standard The maximum number of VLANs is limited by the structure of the VLAN tag to 4094 see figure in p 98 The following figure shows a VLAN application example VLAN Yellow ESM VLAN Green eo I VLAN Yellow VLAN Green VLAN Green oe 31007122 8 2006 101 VLAN Yellow Traffic Control VLAN Keywords Keywords used in association with VLANs are Ingress Rule Ingress rules stipulate how incoming data are to be handled by the switch Egress Rule Egress rules stipulate how outgoing data are to be handled by the switch VLAN Identifier The assignment to a VLAN is executed using VL
145. too receive or can get the source code If you link other code with the library you must provide complete object files to the recipients so that they can re link them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library 172 31007122 8 2006 General Information To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder Therefore we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license Most GNU software including some libraries is covered by the ordinary GNU General Public License This license the GNU Lesser General Public License applies to certai
146. troles Sater hates Buh aie E ana Sateen este Maa tae Sas 99 Description of VLANs eee eee eee 101 Configuring VLANS aaa 103 setting up VEANSH ete ted area la tan eat abi ka ia ae bas 105 Operation Diagnostics a 109 Sending Traps fs s kts a he eno ote a ritu tate fie emcee os 110 Contact Signal si canis S sti due ba eae Aste ee ao ako a tS 114 Displaying the Port Status 0 2 ects 117 Event Counter on Port Level aaa 118 Displaying the SFP Status 0 0 0 0 cece ae 120 Topology Discovery aaa 121 Reports avanti Ga Se Slaktera pa ee is SB A dejas el gg 124 Monitoring Port Traffic 0 2 aaa 125 Appendices Appendix A Appendix B Glossary Index A oy sn atc Ge Costi asas ga de jaa aed esas 127 General Information cece e ee eee eee 129 The Management Information Base MIB 200 0c eee eee eee ee 130 MIB Las d betel dente us identity Sato nisi S 133 Privat MIB sia anien step Pau t s n a ais meta 151 SNMP V2 Module MIB 0 00 cece 160 REGSia eesti fate Stan T cy ee ne C ee te ss 165 IEEE Standards 3 eon ksi heed alan a Breitners Poke had 167 Dimension Drawings aaa 168 General Technical Software Data a 170 Switches and Accessories 0000 cette eee 171 Copyright for Integrated Software 1 0 aaa 172 Switch Function Examples eee eee ee eee 183 Setting Up the DHCP Server for Option 82 00 0 c eee eee
147. tware functions and or data prepared so as to be conveniently linked with application programs which use some of those functions and data to form executables The library below refers to any such software library or work that has been distributed under these terms A work based on the Library means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it For a library complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running a program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library ina tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does 1 You may copy and distribute verbatim copies of the Library s complete source code as you
148. u must also use IGMP version 1 in the entire network Note If a number of routers are connected to a subnetwork you must use IGMP version so that all the routers receive all the IGMP reports A switch sends IGMP report messages to the ports at which it receives IGMP queries This column allows you to also send IGMP report messages to other selected ports A switch sends IGMP report messages to the port at which it receives IGMP queries This column displays the ports on which the switch has received IGMP queries This table column enables you to switch on off the GMRP for each port when the global GMRP is switched on When you switch off the GMRP at a port no registrations can be made for this port and GMRP packets cannot be sent out of this port Note If the switch is connected to a HIPER ring you can ensure in case of a ring interruption quick reconfiguration of the network for data packets with registered multicast target addresses by e switching on the IGMP both at the ring port and globally and e switching on the IGMP Forw All per port on the port rings 31007122 8 2006 95 Traffic Control The Broadcast Limiter Description of the Broadcast Limiter Setting the Broadcast Limiter in the Web Based Interface To guarantee reliable data exchange during high broadcast traffic the switch can limit broadcast traffic By entering a number for each port you can set the
149. ublic License for more details You should have received a copy of the GNU Lesser General Public License along with this library if not write to the Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Also add information on how to contact you by electronic and paper mail You should also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the library if necessary Here is a sample alter the names Yoyodyne Inc hereby disclaims all copyright interest in the library Frob a library for tweaking knobs written by James Random Hacker lt signature of Ty Coon gt 1 April 1990 Ty Coon President of Vice That s all there is to it 180 31007122 8 2006 General Information The Legion Of The Bouncy Castle Copyright c 2000 The Legion Of The Bouncy Castle http www bouncycastle org Permission is hereby granted free of charge to any person obtaining a copy of this software and associated documentation files the Software to deal in the Software without restriction including without limitation the rights to use copy modify merge publish distribute sublicense and or sell copies of the Software and to permit persons to whom the Software is furnished to do so subject to the following conditions The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software
150. ure Class A 0 NetID 7 bits Host ID 24 bits B 1 0 Net ID 14 bits Host ID 16 bits C 1 1 0 Net ID 21 bits Host ID 8 bits D o Multicast Group ID 28 bits E 1 1 1 1 reserved for future use 28 bits All IP addresses belong to class A when their first bit is a zero i e the first decimal number is 126 or less The IP address belongs to class B if the first bit is 1 and the second bit is 0 i e the first decimal number is between 128 and 191 The IP address belongs to class C if the first two bits are a 1 i e the first decimal number is higher than 191 Assigning the host address host ID is the responsibility of the network operator who is solely responsible for the uniqueness of the assigned IP addresses Network Mask Routers and gateways subdivide large networks into subnetworks The network mask assigns the individual devices to particular subnetworks The subdivision of the network into subnetworks is performed in much the same was as IP addresses are divided into classes A to C net ID The bits of the host address host ID that are to be shown by the mask are set to one The other host address bits are set to zero in the network mask see the following example The following figure shows an example of a network mask Decimal notation 255 255 192 0 Binary notation 11111111 11111111 11000000 00000000 Subnetwork mask bits Clas
151. use network components routers switches which do not support SNTP in the signal path between the SNTP server and the SNTP client 31007122 8 2006 79 Synchronizing the System Time of the Network Configuring Configure the SNTP as follows SNTP Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Goto Time gt SNTP The figure below shows the SNTP dialog Configuration SNTP Client and Servem Configuration SNTP Server Anycast destination address 0 0 0 0 e Operation On Off i lt VLAN ID 0 Anycast send interval s 0 SNTP Status Configuration SNTP Client External server address 0 0 0 0 Redundant server address 0 0 0 0 Status message Server request interval s 0 Accept SNTP Broadcasts v Set ao 4 In the Configuration SNTP Client and Server group box switch the SNTP function on or off When it is switched off the SNTP server does not send any SNTP packages and does not reply to any SNTP requests The SNTP client does not send any SNTP requests and does not interpret any broadcast multicast packages 5 Go to the SNTP Status group box to view server conditions under Status message such as Server cannot be reached 6 Go to the Configuration SNTP Server group box and enter under Anycast destination address the IP
152. utoNegRemoteSignaling 4 ifMauAutoNegConfig 5 ifMauAutoNegCapability 6 ifMauAutoNegCapAdvertised 7 ifMauAutoNegCapReceived 8 ifMauAutoNegRestart 150 31007122 8 2006 General Information Private MIB Overview The private MIB is for configuring the device specific properties of the ESM The groups below are implemented in the ESM from the private MIB saConfiguration OID 1 3 6 1 4 1 3833 1 1 14 saChassis OID 1 3 6 1 4 1 3833 1 1 14 1 saAgent OID 1 3 6 1 4 1 3833 1 1 14 2 saUserGroup OID 1 3 6 1 4 1 3833 1 1 1 4 3 saRingRedundancy OID 1 3 6 1 4 1 3833 1 1 14 5 saProducts OID 1 3 6 1 4 1 3833 1 1 14 10 Device Group The device group contains information on the status of the ESM hardware 14 saConfiguration 1 saChassis 1 saSystemTable 1 saSysProduct 2 saSysVersion 4 saSysGroupMap 6 saSysMaxFan 7 saSysGroupModu 8 saSysModulePor 1 saSysGroup 9 saSysGroupTable 3 saSysGroupCapacity 5 saSysMaxPowerSupply leCapacity tCapacity Entry 1 saSysGroupID 2 saSysGroupType 3 saSysGroupDescription 4 saSysGroupHwVersion 5 saSysGroupSwVersion 6 saSysGroupModuleMap 7 saSysGroupAction 8 saSysGroupActionResult 11 saInterfaceTable 31007122 8 2006 151 General Information 1 salfEnt
153. wing for the inaccuracy of the local clock relative to the reference clock 82 31007122 8 2006 Synchronizing the System Time of the Network The figure illustrates delay and jitter problems when synchronizing clocks Reference ae Local Master clock Slace clock PTP PTP UDP i i UDP Delay Jitter Delay Jitter P IP To get around the delay and jitter in the protocol stack IEEE 1588 recommends inserting a special hardware time stamp unit between the MAC and the PHY layer Devices or modules with the name supplement RT are equipped with a time stamp unit The delay and jitter in the LAN increases in the media and transmission devices along the transmission path The cable delays are relatively constant Changes occur very slowly This fact is taken into account by IEEE 1588 So measurements and calculations are performed on a regular basis IEEE ignores the inaccuracy caused by device delays and device jitter by defining boundary clocks Boundary clocks are clocks that are integrated into the devices These clocks are synchronized on one side of the signal path and on the other side of the signal path they are used to synchronize the subsequent clocks ordinary clocks The following figure illustrates how a boundary clock works GPS PLC Reference ED Grandmaster Clock i Ordinary Clock Switch
154. x larmiInterval larmVariable larmSampleType larmValue larmStartupAlarm larmRisingThreshold larmFallingThreshold larmRisingEvent Index alarmFallingEvent Index alarmOwner alarmStatus Table eventEntry ventIndex ventDescription ventT ype Community ven ventLastTimeSent ventOwner ventStatus logEntry 1 ogEventIndex ogIndex 31007122 8 2006 143 General Information 3 logTime 4 logDescription 19 probeConfig 15 smonCapabilities 22 switchRMON 1 smonMIBObjects 1 dataSourceCaps 1 dataSourceCapsTable 1 dataSourceCapsEntry 1 dataSourceCapsObject 2 dataSourceRmonCaps 3 dataSourceCopyCaps 4 dataSourceCapsIfIndex 3 portCopyConfig 1 portCopyTable 1 portCopyEntry 1 portCopySource 2 portCopyDest 3 portCopyDestDropEvents 4 portCopyDirection 5 portCopyStatus dotidBridge This part of the MIB contains bridge specific objects 1 3 6 1 2 1 17 17 dotldBridge 1 dot1dBase 1 dot1dBaseBridgeAddress 2 dotldBaseNumPorts 3 dot1dBaseType 4 dotlidBasePortTable 1 dotldBasePortEntry 1 dotldBasePort 2 dotldBasePortIfIndex 3 dotldBasePortCircuit 4 dot1dBasePortDelayExceededDiscards 144 31007122 8 2006 General Information
155. y 1000 MBit s max 3 5 us 100 MBit s max 4 5 us 100 MBit s max 19 us MAC address table up to 8000 entries Static Address Filter up to 100 entries in RM redundancy manager mode 0 unicast entries VLAN The following table shows the VLAN related technical data of the ESM VLAN Data VLAN ID 1 to 4062 Number of VLANs max 256 simultaneously per switch Number of VLANs max 256 simultaneously per port Number of VLANs with GMRP VLAN 1 max 256 simultaneously per switch Number of VLANs with GMRP VLAN 1 max 256 simultaneously per port 170 31007122 8 2006 General Information Switches and Accessories Scope of Delivery Order Numbers The delivery comprises CD ROM selected switch version terminal block for supply voltage and signal contact description and manuals Part Number Description 4 Port Version TCSESM043F23F0 4 10 100 TX Managed TCSESM043F 1CU0 3 10 100 TX 1 100 FX MM Managed TCSESM043F2CU0 2 10 100 TX 2 100 FX MM Managed TCSESM043F1CS0 3 10 100 TX 1 100 FX SM Managed TCSESM043F2CS0 2 10 100 TX 2 100 FX SM Managed 8 Port Version TCSESM083F23F0 8 10 100 TX Managed TCSESM083F1CU0 7 10 100 TX 1 100 FX MM Managed TCSESM083F2CU0 6 10 100 TX 2 100 FX MM Managed TCSESM083F1CS0 7 10 100 TX 1 100 FX SM Managed TCSESM083F2CS0 6 10 100 TX 2 100 FX SM Managed TCSESM083F2CX
156. y An algorithm that measures the accuracy of the available clocks in the network determines the most accurate time for the grandmaster clock The following table explains what some stratum numbers stand for Stratum Number Specification 0 To assign for temporary special purposes a better value to one clock than to all other clocks within the network 1 Designates the clock with the highest precision as the reference clock A stratum 1 clock can be both a boundary and an ordinary clock Stratum 1 clocks include GPS clocks and calibrated atomic clocks A stratum 1 clock cannot be synchronized using PTP from another clock in the PTP system 2 Designates the clock as the second choice reference clock and cannot be synchronized using PTP from another clock in the PTP system 3 Designates the clock that can synchronize other devices using an external cable as the reference clock 4 Designates the clock as the reference clock 5 254 Reserved 255 Default Setting Such a clock should never be the best master clock e Cable Delays Device Delays The communication protocol defined by IEEE 1588 allows you to measure cable delays Formulas for calculating the current time eliminate delays e Accuracy of Local Clocks The communication protocol defined by IEEE 1588 takes into account the inaccuracy of local clocks relative to the reference clock Calculation formulas permit the synchronization of local time allo
157. ystem Configuration Using the Web Based Interface Configuration Procedure Using the Web Based Interface Perform the configuration as follows Step Action 1 Connect the ESM to an Ethernet cable 2 Open the Web based interface 3 Go to Basics gt Network The figure below shows the Network dialog box Mode BOOTP DHCP MAC address 00 80 63 51 F5 00 DHCP C BOOTP system name PM m t fast KO7 c DHCP Local Local Agent IP address 149 218 17 14 Netmask 255 255 240 0 Gateway address 149 218 20 96 VLAN ID 1 Ethernet Switch Configurator Software Operation On Off Access read write Sel o 4 Under Mode select where the ESM receives its IP parameters from Inthe BOOTP mode the configuration parameters are assigned via a BOOTP or DHCP server on the basis of the MAC address of the ESM Inthe DHCP mode the configuration parameters are assigned via a DHCP server on the basis of the MAC address or the name of the ESM Inthe Local Mode the net parameters in the ESM memory are used Enter the parameters according to the mode selected In the System Name line enter the system name applicable to the DHCP protocol In the Local frame assign an Agent IP address a Netmask and a Gateway Address to the ESM In the VLAN ID group box you can assign a VLAN se
Download Pdf Manuals
Related Search
Related Contents
Xerox Phaser 3610 User's Manual Copyright © All rights reserved.
Failed to retrieve file