Home

IKS-6500 Series User's Manual v1

image

Contents

1. Setting Description Factory Default Enabled DR is manually selected as the Not checked Disabled The Turbo Ring or Turbo Ring V2 protocol will automatically select the master Redundant Ports Setting Description Factory Default Ist Port This specifies which port on the IKS 6500 will Neve be used as the first redundant port 2nd Port This specifies which port on the IKS 6500 will None be used as the second redundant port 3 32 IKS 6500 Series User s Manual Featured Functions Enable Ring Coupling Setting Description Factory Default Enable This specifies that this IKS 6500 will be a ring coupler F Not checked Disable This specifies that this IKS 6500 is not a ring coupler Coupling Mode Setting Description Factory Default F This enables dual homing through the Dual Homing IKS 6500 None Ring Coupling This specifies that the IKS 6500 will be used E None backup for a ring coupling backup connection Ring Coupling This specifies that the IKS 6500 will be used y primary for a ring coupling primary connection Primary Backup Port Setting Description Factory Default Primary Port This specifies which port on the IKS 6500 will Nake be used as primary port Backup Port This specifies which port on the IKS 6500 will Nee be used as the backup port 3 33 IKS 6500 Series User s Manual The Turbo Chain Concept
2. 3 29 IKS 6500 Series User s Manual Featured Functions Redundant Ports Status 1st Port 2nd Port Ring Coupling Ports Status Coupling Port Coupling Control Port The Ports Status indicators show Forwarding for normal transmission Blocking if the port is part of a backup path that is currently blocked and Link down if there is no connection Settings Items Redundancy Protocol Setting Description Factory Default Turbo Ring This selects the Turbo Ring protocol Turbo Ring V2 This selects the Turbo Ring V2 protocol N one RSTP f IEEE802 1w 1D This selects the RSTP protocol Set as Master Setting Description Factory Default Enabled oe tre is manually selected as the Not checked Disabled The Turbo Ring or Turbo Ring V2 protocol will automatically select the master Redundant Ports Setting Description Factory Default This specifies which port on the IKS 6500 tst Fort will be used as the first redundant port None This specifies which port on the IKS 6500 nd Fort will be used as the second redundant port None Enable Ring Coupling Setting Description Factory Default This specifies that this IKS 6500 will be a Enable ring coupler Not checked l This specifies that this IKS 6500 is not a Disable ring coupler Coupling Port Setting Description Factory Default This specifies which port on the IKS 6500 Coupling Port will be used as the coupling p
3. Monitor Port 2 Total Packets Port 2 Y Total Packets Y Port 2 Total Packets Packet sec 12 g 6 3 0 426 568 Sec 142 284 j Multicast Broadcast Unicast Port Interface Lineswap Link Speed MDIX Traffic IP of connected device 2 10 100M Tx Enable On 100M Full MDI 0 NA Using the MAC Address Table This section explains the information provided by IKS 6500 s MAC address table All MAC Address List All v Page 1 1 1 00 16 d3 c8 f4 88 ucast l 1 2 The MAC Address table can be configured to display the following IKS 6500 MAC address groups ALL Select this item to show all IKS 6500 MAC addresses ALL Learned Select this item to show all IKS 6500 Learned MAC addresses ALL Static Lock Select this item to show all IKS 6500 Static Lock MAC addresses ALL Static Select this item to show all IKS 6500 Static Static Lock Static Multicast MAC addresses ALL Static Select this item to show all IKS 6500 Static Multicast MAC Multicast addresses Port x Select this item to show all MAC addresses of dedicated ports The table will display the following information MAC This field shows the MAC address Type This field shows the type of this MAC address Port This field shows the port that this MAC address belongs to 3 82 IKS 6500 Series User s Manual Featured Functions Using Event Log Event Log Table Page 67 57 Ml 991 419
4. 0x3682 1 word TR2 Ring 2 Ist Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Ring 2 Not Enable 0x3683 1 word TR2 Ring 2 2nd Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Ring 2 Not Enable 0x3700 1 word Turbo Chain Switch Role Mode 0x0000 Head Switch 0x0001 Member Switch 0x0002 Tail Switch OxFFFF Turbo Chain Not Enable 0x3701 1 word Turbo Chain Ist Port Status 0x0000 Link Down 0x0001 Blocking 0x0002 Blocked 0x0003 Forwarding OxFFFF Turbo Chain Not Enable IKS 6500 Series User s Manual Modbus TCP Map 0x3702 1 word Turbo Chain 2nd Port Status 0x0000 Link Down 0x0001 Blocking 0x0002 Blocked 0x0003 Forwarding OxFFFF Turbo Chain Not Enable Memory mapping from address 0x0000 Ox3FFF Technology Standards Flow control Protocols MIB Switch Properties Priority Queues Max Number of Available VLANs VLAN ID Range IGMP Groups C Specifications IEEE 802 3 for 10BaseT IEEE 802 3u for 100BaseT X and 100BaseFX IEEE 802 3ab for 1000BaseT X IEEE 802 3z for 1000BaseSX LX LHX ZX IEEE 802 3x for Flow Control IEEE 802 1D for Spanning Tree Protocol IEEE 802 1w for Rapid STP IEEE 802 1Q for VLAN Tagging IEEE 802 1
5. 3 34 Featured Functions IKS 6500 Series User s Manual Featured Functions Configuring Turbo Chain Head Switch Configuration Communication Redundancy Current Status Now Active Turbo Chain Settings Redundancy Protocol Turbo Chain x Role Head w PotRoe fPor Num Port Status Head Port Gt x Link down Member Port 62 Link down Member Switch Configuration Communication Redundancy Current Status Now Active Turbo Chain Settings Redundancy Protocol Turbo Chain x Role Member x Port Roe Port Num Port Status 1st Member Part c1 x Link down 2nd Member Port 62 x Link down 3 35 IKS 6500 Series User s Manual Featured Functions Tail Switch Configuration Communication Redundancy Current Status Now Active Turbo Chain Settings Redundancy Protocol Turbo Chain y Role Tail amp Port Role Port Num Port Status Tail Port G1 mv Link down Member Port G2 Link down Explanation of Current Status Items Now Active Shows which communication protocol is in use Turbo Ring Turbo Ring V2 RSTP Turbo Chain or None The Ports Status indicators show Forwarding for normal transmission Blocked if this port is connected to the Tail port as a backup path and the path is blocked and Link down if there is no connection Explanation of Settings Items Redundancy Protocol Setting Description Factory Default Turbo Rin
6. IKS 6500 Series User s Manual Featured Functions Trap Settings 1 Trap Server IP Name Setting Description Factory Default This specifies the IP address or name of IP or name the primary trap server used by your None network 1 Trap Community Setting Description Factory Default Max 30 ch racteis This specifies the community string to use Public for authentication 2nd Trap Server IP Name Setting Description Factory Default This specifies the IP address or name of IP or name the secondary trap server used by your None network 2nd Trap Community Setting Description Factory Default ER This specifies the community string to use Public for authentication Private MIB information Switch Object ID Setting Description Factory Default 8691 7 38 This indicates the IKS 6524 s enterprise Fixed value 8691 7 39 S the IKS 6526 s enterprise Fixed NOTE The Switch Object ID cannot be changed 3 22 IKS 6500 Series User s Manual Featured Functions Using Communication Redundancy NOTE Setting up Communication Redundancy on your network helps protect critical links against failure protects against network loops and keeps network downtime at a minimum The Communication Redundancy function allows the user to set up redundant loops in the network to provide a backup data transmission route in the event that a cable is inadvertently disconnected or
7. NOTE The user name for the Local User Database is case insensitive 3 69 IKS 6500 Series User s Manual Featured Functions Port Access Control Table Port Access Control Table Pot 1 1 vw Remove Select The port status will show authorized or unauthorized Using Auto Warning Since industrial Ethernet devices are often located at the endpoints of a system these devices will not always know what is happening elsewhere on the network This means that an industrial Ethernet switch that connects to these devices must provide system maintainers with real time alarm messages Even when control engineers are out of the control room for an extended period of time they can still be informed of the status of devices almost instantaneously when exceptions occur The IKS 6500 supports different approaches to warn engineers automatically such as email and relay output It also supports two digital inputs to integrate sensors into your system to automate alarms by email and relay output Configuring Email Warning The Auto Email Warning function uses e mail to alert the user when certain user configured events take place Three basic steps are required to set up the Auto Warning function 1 Configuring Email Event Types Select the desired Event types from the Console or Web Browser Event type page a description of each event type is given later in the Email Alarm Events setting subsection 2 Configuring Email Settings To conf
8. 0x3000 1 word Redundancy Protocol 0x0000 None 0x0001 RSTP 0x0002 Turbo Ring 0x0003 Turbo Ring V2 0x0004 Turbo Chain 0x3 100 1 word RSTP Root 0x0000 Not Root 0x0001 Root OxFFFF RSTP Not Enable 0x3200 0x3219 1 word RSTP Port 1 26 Status 0x0000 Port Disabled 0x0001 Not RSTP Port 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF RSTP Not Enable 0x3300 1 word TR Master Slave 0x0000 Slave 0x0001 Master OxFFFF Turbo Ring Not Enable 0x3301 1 word TR 1st Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding 0x3302 1 word TR 2nd Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding B 8 IKS 6500 Series User s Manual Modbus TCP Map 0x3303 1 word TR Coupling 0x0000 Off 0x0001 On OxFFFF Turbo Ring Not Enable 0x3304 1 word TR Coupling Port status 0x0000 Port Disabled 0x0001 Not Coupling Port 0x0002 Link Down 0x0003 Blocked 0x0005 Forwarding OxFFFF Turbo Ring Not Enable 0x3305 1 word TR Coupling Control Port status 0x0000 Port Disabled 0x0001 Not Coupling Port 0x0002 Link Down 0x0003 Blocked 0x0005 Forwarding 0x0006 Inactive 0x0007 Active OxFFFF Turbo Ring Not Enable 0x3500 1 word TR2 Coupling Mode 0x0000 None 0x0001 Dual Homing 0x0002 Coupling Backup 0x0003 Coupling Primary
9. OdOh42m37s Port 1 2 link off 992 420 OdOhOm1s Cold start 993 420 OdOhOm3s Port 3 6 link on 994 420 0d0h1m14s 192 168 127 1 admin Auth ok 995 420 0d0h1m54s Port 3 8 link off 996 421 Od0hOm1s Cold start 997 421 OdOh0m s Port 1 2 link on 998 421 OdOhOm12s 192 168 127 1 admin Auth ok 999 421 OdOh53m26s Configuration change activated 1000 421 OdOh53m33s 192 168 127 1 admin Auth ok Bootup This field shows how many times the IKS 6500 has been rebooted or cold started Date The date is updated based on how the current date is set in the Basic Setting page Time The time is updated based on how the current time is set in the Basic Setting page System The system startup time related to this event Startup Time Events Events that have occurred NOTE The following events will be record into IKS 6500 s Event Log Table Cold start Warm start Configuration change activated Power 1 2 transition Off gt On Power 1 2 transition On gt Off Authentication fail Topology changed Master setting is mismatched Port traffic overload dotlx Auth Fail Port link off on 3 83 IKS 6500 Series User s Manual Featured Functions Using Syslog This function provides the event logs for the syslog server The function supports 3 configurable syslog servers and syslog server UDP port numbers When an event occurs the event will be sent as a syslog UDP packet to the specified syslog servers Syslog Settings
10. Setting Description Factory Default Numerical value This sets the query interval of the Querier function 125 seconds input by user globally Valid settings are from 20 to 600 seconds IGMP Snooping Enhanced Mode Setting Description Factory Default Enable IGMP Multicast packets will be forwarded to Enable Auto Learned Multicast Querier Ports Member Ports Disable IGMP Multicast packets will be forwarded to Auto Learned Multicast Querier Ports Static Multicast Querier Ports Querier Connected Ports Member Ports You should enable both IGMP Snooping mode and IGMP Snooping Enhance mode when all switches on the network are Moxa switches IGMP Snooping Setting Description Factory Default Enable Disable This enables or disables the IGMP Snooping function Enabled if IGMP per VLAN Snooping Enabled Globally Querier Setting Description Factory Default Enable Disable This enables or disables the IKS 6500 s querier Enabled if IGMP function Snooping is Enabled Globally Static Multicast Querier Port Setting Description Factory Default Select Deselect This selects the ports that will connect to the multicast Disabled routers It is active only when IGMP Snooping is enabled NOTE If a router or layer 3 switch is connected to the network it will act as the Querier thus this Querier option will be disabled on all Moxa layer 2 switches If all switches on the netw
11. Syslog Server 1 Port Destination 514 1 65535 Syslog Server 2 Port Destination 514 1 65535 Syslog Server 3 Port Destination 514 1 65535 Syslog Server 1 Setting Description Factory Default IP Address Enter the IP address of Ist Syslog server used by your None network Port Destination Enter the UDP port of Ist Syslog server 514 1 to 65535 Syslog Server 2 Setting Description Factory Default IP Address Enter the IP address of 2nd Syslog server used by your None network Port Destination Enter the UDP port of 2nd Syslog server 514 1 to 65535 Syslog Server 3 Setting Description Factory Default IP Address Enter the IP address of 3rd Syslog server used by your None network Port Destination Enter the UDP port of 3rd Syslog server 514 1 to 65535 3 84 IKS 6500 Series User s Manual Featured Functions NOTE The following events will be recorded into the IKS 6500 s Event Log table and will then be sent to the specified Syslog Server Cold start Warm start Configuration change activated Power 1 2 transition Off gt On Power 1 2 transition On gt Off Authentication fail Topology changed Master setting is mismatched Port traffic overload dotlx Auth Fail Port link off on Using HTTPS SSL To secure your HTTP access the IKS 6500 supports HTTPS SSL to encrypt all HTTP traffic Perform the following steps to access the IKS 6500 s web browser
12. Access K f s 11 Access v 1 Activate 3 54 IKS 6500 Series User s Manual Featured Functions A VLAN Mode Setting Description Factory Default 2 1Q VLAN t VLAN mode to 802 1Q VLAN 802 1Q Se mode to 802 1Q 802 10 VLAN Port based VLAN Set VLAN mode to Port based VLAN Management VLAN ID Setting Description Factory Default VLAN ID from 1 This assigns the VLAN ID of this IKS 6500 1 to 4094 Port Type Setting Description Factory Default Access This port type is used to connect single devices without tags Trunk Select Trunk port type to connect another 802 1Q Access VLAN aware switch or another LAN that combines tagged and or untagged devices and or other switches hubs ATTENTION For communication redundancy in the VLAN environment set Redundant Port Coupling Port and Coupling Control Port as Trunk Port since these ports act as the backbone to transmit all packets of different VLANs to different IKS 6500 units Port PVID Setting Description Factory Default VID range from 1 This sets the default VLAN ID for untagged devices that 1 to 4094 connect to the port Fixed VLAN List Tagged Setting Description Factory Default VID range from 1 This field will be active only when selecting the Trunk None to 4094 port type Set the other VLAN ID for tagged devices that connect to the Trunk port Use commas to separate different VIDs
13. Description MDIMDIX 1 a OOTX RJ45 Auto Y Disable Y 2 2 Y 100TX RJ45 Auto Disable v 3 7 100TX RJ45 Auto Disable v 4 v 100TX RJ45 Auto Disable v 5 E 100TX RJ45 Auto Disable 6 EH 1007XRJ45 Auto wl Disable 7 E 100TX AJAS Auto v Disable 8 El 10ODGRMS Auto wl Disable 9 E 100TX RJ45 Auto Disable Y 10 100TX RJ45 Auto Disable 1 El 1007 RJ4 Auto v Disable 12 100T RJ45 Auto Disable z Enable Setting Description Factory Default Checked This allows data transmission through the port Enabled Unchecked This immediately shuts off port access ATTENTION If a connected device or sub network is wreaking havoc on the rest of the network the Disable option under Advanced Settings Port gives the administrator a quick way to shut off access through this port immediately Description Setting Description Factory Default Media type This displays the media type for each module s N A port Name Setting Description Factory Default Max 63 characters This specifies an alias for the port to help None administrators differentiate between different ports Example PLC 1 IKS 6500 Series User s Manual Featured Functions Speed Setting Description Factory Default Auto This allows the port to use the IEEE 802 3u protocol to negotiate with connected devices The port and connected dev
14. STP re evaluated the situation and opened the path through Bridge B How STP Works When enabled STP determines the most appropriate path for traffic through a network The method is described below STP Requirements Before STP can configure the network the system must satisfy the following requirements Communication must be established between all bridges This communication is carried out using Bridge Protocol Data Units BPDUs which are transmitted in packets with a known multicast address Each bridge must have a Bridge Identifier that specifies which bridge acts as the central reference point or Root Bridge for the STP system Bridges with a lower Bridge Identifier are more likely to be designated as the Root Bridge The Bridge Identifier is calculated using the MAC address of the bridge and a priority defined for the bridge The default priority of IKS 6500 is 32768 Each port has a cost that specifies the efficiency of each link The efficiency cost is usually determined by the bandwidth of the link with less efficient links assigned a higher cost The following table shows the default port costs for a switch Port Speed Path Cost 802 1D Path Cost 1998 Edition 802 1w 2001 10 Mbps 100 2 000 000 100 Mbps 19 200 000 1000 Mbps 4 20 000 3 39 IKS 6500 Series User s Manual Featured Functions STP Calculation The first step of the STP process is to perform calculations During this stage
15. System File Update By Remote TETP ee esse sesse ese se ese eke se ee ek ee Ge Ge ee Ge ee ee 3 13 System File Update By Local Import Export 00 0 esse se esse ee esse see se ee Ge ee ek ee ee ee 3 14 System File Update By Backup Media esse see se ee se ee Ge ee ek ee Ge Ge Ge ee ee 3 15 EER EE EE OE EE T 3 15 Factory PIE DIR ER id OE tees 3 16 Using Port True 3 16 The Port Trunking Concept eisien ee aee k E SEEE 3 16 Configuring Port Trunking seek eae a a aE AD ee GE Ee ee ETEei a 3 17 Configuring SNMP OE EE EE EE AE OE bo 3 19 SNMP Read Write Settings iste g See heim ansais mesial KO ge a De NOR AD ERGE 3 20 Trap Seti gs se GER ER EE EE iio is o A Aenea EE 3 22 Private MIB informati n sissies ske e ke ese aces GE ERA Rek ok Ge BEER Se Ab Re Gee EES eb ea Ee be Eg 3 22 Using Communication Redundancy ie sesse sesse se see SA Ge ee Gee Re GR ee GRA Ge Re Ge Re GR ee Re ke 3 23 Gigabit Ethernet Redundant Ring Capability lt 50 MS iese sesse se se se ek Ge ek ee 3 23 The Turbo Ring Concept ss ENE ta a t 3 24 Configuring Turbo Ring and Turbo Ring V2 ooncncnicionaccnonocncnnnonconccononannnonnonncnnos 3 29 The Turbo Chan Conceptual ad 3 34 The STP RS TP Concept enei siaaa ee nnee EEE E EEES EES 3 37 Configurmg STP RSTP sioe e a id id dida 3 43 Using Traffic Prioritization oido cs suse NEG Ge EERS ERTS RE KERSE R ARE SE RE We REG EE DER ERENS ERGE SEED ERG 3 45 The Traffic Prioritization Concept iese see s
16. This password will be required to access any of the consoles web serial Telnet If you do not wish to create a password leave the Password field blank and press Enter Model IKS 6524 Name Managed Redundant Switch 00000 Location Switch Location Firmware Version V1 0 Serial No 00000 Ip 192 168 127 253 MAC Address 00 00 00 00 00 02 AE GE EE TA ALR Rd ETE Account Password Ha Fol A ms Basic settings for network and system parameter 2 Port Trunking Allows multiple ports to be aggregated as a link 3 SNMP Settings The settings for SNMP 4 Comm Redundancy Establish Ethernet communication redundant path 5 Traffic Prioritization Prioritize Ethernet traffic to help determinism 6 Virtual LAN Set up a VLAN by IEEES02Z 10 VLAN or Port based VLAN Multicast Filtering Enable the multicast filtering capability 8 Bandwidth Management Restrict unpredictable network traffic 9 Port Access Control Port access control by IEEES02 1X or Static Port Lock a duto Warning Warning email and or relay output by events b Line Swap Fast recovery after moving devices to different ports c Set Device IP Assign IP addresses to connected devices d Diagqnosis Test network integrity and mirroring port e Monitor Monitor a port and network status f MAC Address Table The complete table of Ethernet MAC Address List gy System log The setting for System log and Event log h Exit Exit
17. 284 5 Unicast Multicast Broadcast Sec Utilized of switch bandwidth 0 Format Total Packets Packets in previous 5 sec interval update interval of 5 sec Po In Ero Ro Es 1 0 0 0 0 0 0 0 0 A 2 1418 0 0 0 1637 0 36 0 3 0 0 0 0 0 0 0 0 4 0 0 0 0 0 0 0 0 5 0 0 0 0 0 0 0 0 6 0 0 0 0 0 0 0 0 Monitor by Port Access the Monitor by Port function by selecting ALL 10 100M or 1G Ports or Port i in which i 1 2 G2 from the left pull down list The Port i options are identical to the Monitor by System function discussed above in that users can view graphs that show All Packets TX Packets RX Packets or Error Packets activity but in this case only for an individual port The All Ports option is essentially a graphical display of the individual port activity that can be viewed with the Console Monitor function discussed above The All Ports option shows three vertical bars for each port The height of the bar represents Packets s for the type of packet at the instant the bar is being viewed That is as time progresses the height of the bar moves up or down so that the user can view the change in the rate of packet transmission The blue colored bar shows Uni cast packets the red colored bar shows Multi cast packets and the orange colored bar shows Broad cast packets The graph is updated every few seconds allowing the user to analyze data transmission activity in real time 3 81 IKS 6500 Series User s Manual Featured Functions
18. Al UR LT ND AA V e OS Desired IP Address Setting Description Factory Default IP Address Set the desired IP of connected devices None The DHCP Relay Agent makes it possible for DHCP broadcast messages to be sent over routers The DHCP Relay Agent enables DHCP clients to obtain IP addresses from a DHCP server on a remote subnet or those that are not located on the local subnet DHCP Option 82 Option 82 is used by the relay agent to insert additional information into the client s DHCP request The Relay Agent Information option is inserted by the DHCP relay agent when forwarding client originated DHCP packets to a DHCP server Servers can recognize the Relay Agent Information option and use the information to implement IP addresses to Clients When Option 82 is enabled on the switch a subscriber device is identified by the switch port through which it connects to the network in addition to its MAC address Multiple hosts on the subscriber LAN can be connected to the same port on the access switch and are uniquely identified The Option 82 information contains 2 sub options Circuit ID and Remote ID which define the relationship between end device IP and the DHCP Option 82 server The Circuit ID is a 4 byte number generated by the Ethernet switch a combination of physical port number and VLAN ID The format of the Circuit ID is as described below FF VV VV PP Where the first byte EF is fixed
19. Featured Functions Enable Line Swap Fast Recovery Setting Description Factory Default Enable Disable Check mark the check box to enable the Enable Line Swap Fast Recovery function Using Set Device IP To reduce the effort required to set up IP addresses the IKS 6500 comes equipped with DHCP BootP server and RARP protocol to set up IP addresses of Ethernet enabled devices automatically When enabled the Set device IP function allows IKS 6500 to assign specific IP addresses automatically to connected devices that are equipped with DHCP Client or RARP protocol In effect IKS 6500 acts as a DHCP server by assigning a connected device with a specific IP address stored in its internal memory Each time the connected device is switched on or rebooted IKS 6500 sends the device the desired IP address Take the following steps to use the Set device IP function STEP 1 Set up the connected devices TCP IP Properties E1E4 Bindings Advanced Nemlos Set up those Ethernet enabled devices connected to DNS Configuration Gateway WINS Configuration IP Address IKS 6500 for which you would like IP addresses to y P An IP address can be automatically assigned to this computer be assigned automatically The devices must be If your network does not automatically assign IP addresses ask A your network administrator for an address and then type it in configured to obtain their IP address automatically the s
20. Forbidden VLAN List Setting Description Factory Default VID range from 1 This field will be active only when selecting the Trunk None to 4094 port type Set the VLAN IDs that will not be supported by this trunk port Use commas to separate different VIDs 3 55 IKS 6500 Series User s Manual Featured Functions To configure the IKS 6500 s port based VLAN use the VLAN settings page to configure the ports Port based VLAN Settings VLAN Mode Port based VLAN Y NB EE EN EN EE EE EN EIE EN EN NON ONA MEN NN NN N 1 M v v v Cd v v v v v v v v v v v v vi v v v Ld iv v A 2 l 3 o 4 O O l O 5 l 6 7 o oa A lA ja O m e E od a IF 8 9 l 10 11 12 13 14 l 15 l 16 I l l I l l 1 I I AA VLAN Mode Setting Description Factory Default 802 1Q VLAN Set VLAN mode to 802 1Q VLAN 802 10 VLAN Port based VLAN Set VLAN mode to Port based VLAN Port Setting Description Factory Default Enable Disable Set port to specific VLAN Group Enable all ports belong to VLANI VLAN Table VLAN Table VLAN Mode VLAN Mode Port based VLAN Current Port based VLAN List Index Joined Port 1 1 1 2 3 4 5 6 7 8 9 10 11 1
21. IKS 6500 provides two important tools for administrators to diagnose network systems Mirror Port Mirror Port Settings Monitored port Watch direction Bi directional x Mirror port 9 The Mirror port function can be used to monitor data being transmitted through a specific port This is done by setting up another port the mirror port to receive the same data being transmitted from or both to and from the port under observation This allows the network administrator to sniff the observed port and thus keep tabs on network activity Take the following steps to set up the Mirror Port function STEP 1 Configure IKS 6500 s Mirror Port function from either the Console utility or Web Browser interface You will need to configure three settings Monitored Port Select the port number of the port whose network activity will be monitored Mirror Port Select the port number of the port that will be used to monitor the activity of the monitored port Watch Direction Select one of the following two watch direction options e Input data stream Select this option to monitor only those data packets coming into the IKS 6500 s port e Output data stream Select this option to monitor only those data packets being sent out through IKS 6500 s port e Bi directional Select this option to monitor data packets both coming into and being sent out through IKS 6500 s port STEP 2 Be sure to activate your
22. Moxa s Turbo Chain is an advanced software technology that gives network administrators the flexibility of constructing any type of redundant network topology When using the chain concept you first connect the Ethernet switches in a chain and then simply link the two ends of the chain to an Ethernet network as illustrated in the following figure Turbo Chain can be used on industrial networks that have a complex topology If the industrial network uses a multi ring architecture Turbo Chain can be used to create flexible and scalable topologies with a fast media recovery time Setup Turbo Chain Head Port Head Member Po Member Port Tail Port Member Port Member Port Blocking Port 3 Select the Head switch Tail switch and Member switches Configure one port as the Head port and one port as the Member port in the Head switch configure one port as the Tail port and one port as the Member port in the Tail switch and configure two ports as Member ports in each of the Member switches Connect the Head switch Tail switch and Member switches as shown in the diagram The path connecting to the Head port is the main path and the path connecting to the Tail port is the back up path of the Turbo Chain Under normal conditions packets are transmitted through the Head Port to the LAN Network If any Turbo Chain path is disconnected the Tail Port will be activated to continue packet transmission
23. OxFFFF Turbo Ring V2 Not Enable 0x3501 1 word TR2 Coupling Port Primary status Using in Dual Homing Coupling Backup Coupling Primary 0x0000 Port Disabled 0x0001 Not Coupling Port 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Not Enable 0x3502 1 word TR2 Coupling Port Backup status Only using in Dual Homing 0x0000 Port Disabled 0x0001 Not Coupling Port 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Not Enable 0x3600 1 word TR2 Ring 1 status 0x0000 Healthy 0x0001 Break OxFFFF Turbo Ring V2 Not Enable 0x3601 1 word TR2 Ring 1 Master Slave 0x0000 Slave 0x0001 Master OxFFFF Turbo Ring V2 Ring 1 Not Enable B 9 IKS 6500 Series User s Manual Modbus TCP Map 0x3602 1 word TR2 Ring 1 1st Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Ring 1 Not Enable 0x3603 1 word TR2 Ring 1 2nd Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Ring Not Enable 0x3680 1 word TR2 Ring 2 status 0x0000 Healthy 0x0001 Break OxFFFF Turbo Ring V2 Ring 2 Not Enable 0x368 1 1 word TR2 Ring 2 Master Slave 0x0000 Slave 0x0001 Master OxFFFF Turbo Ring V2 Ring 2 Not Enable
24. STP was designed to help reduce link failures in a network and provide protection from loops Networks that have a complicated architecture are prone to broadcast storms caused by unintended loops in the network The IKS 6500 s STP feature is disabled by default To be completely effective you must enable RSTP STP on every IKS 6500 connected to your network Rapid Spanning Tree Protocol RSTP implements the Spanning Tree Algorithm and Protocol defined by IEEE Std 802 1w 2001 RSTP provides the following benefits e The topology of a bridged network will be determined much more quickly compared to STP e RSTP is backward compatible with STP making it relatively easy to deploy For example gt It defaults to sending 802 1D style BPDUs if packets with this format are received gt STP 802 1D and RSTP 802 1w can operate on different ports of the same IKS 6500 This feature is particularly helpful when IKS 6500 ports connect to older equipment such as legacy switches You get essentially the same functionality with RSTP and STP To see how the two systems different please refer to Differences between RSTP and STP later in this chapter The STP protocol is part of the IEEE Std 802 1D 1998 Edition bridge specification The explanation given below uses bridge instead of switch 3 37 IKS 6500 Series User s Manual Featured Functions What is STP STP 802 1D is a bridge based system that is used to implement parallel paths f
25. Tree topology We suggest that you disable the Spanning Tree Protocol for ports that are connected directly to a device PLC RTU etc as opposed to network equipment This will prevent unnecessary negotiation Port Priority Setting Description Factory Default Numerical value selected This specifies the port s priority as a node on 128 by user the Spanning Tree topology Lower values correspond to higher priority Port Cost Setting Description Factory Default Numerical value input by This specifies the port cost Higher costs 200000 user correspond to lower suitability as a node for the Spanning Tree topology Port Status Indicates the current Spanning Tree status of this port Forwarding indicates normal transmission and Blocking indicates blocked transmission 3 44 IKS 6500 Series User s Manual Featured Functions Configuration Limits of RSTP STP The Spanning Tree Algorithm places limits on three of the configuration items Eq 1 1 sec lt Hello Time lt 10 sec Eq 2 6sec lt Max Age lt 40 sec Eq 3 4sec lt Forwarding Delay lt 30 sec These three variables are further restricted by the following two inequalities Eq 4 2 Hello Time 1 sec lt Max Age lt 2 Forwarding Delay 1 sec The IKS 6500 s firmware will alert you immediately if any of these restrictions are violated For example suppose Hello Time 5 sec Max Age 2
26. VLAN pass it to port 6 and then remove tags received successfully by Device G and vice versa Packets from Devices B and C will travel through Trunk Port 3 with tagged VID 2 Switch B recognizes its VLAN passes it to port 4 and then removes tags received successfully by Device F and vice versa Packets from Device D will travel through Trunk Port 3 with tagged VID 3 Switch B will recognize its VLAN pass to port 5 and then remove tags received successfully by Device H Packets from Device H will travel through Trunk Port 3 with PVID 3 Switch A will recognize its VLAN and pass it to port 2 but will not remove tags received successfully by Device D Packets from Device E will travel through Trunk Port 3 with tagged VID 4 Switch B will recognize its VLAN pass it to port 7 and then remove tags received successfully by Device I Packets from Device I will travel through Trunk Port 3 with tagged VID 4 Switch A will recognize its VLAN and pass it to port 2 but will not remove tags received successfully by Device E Configuring Virtual LAN VLAN Settings To configure 802 1Q VLAN on the IKS 6500 use the VLAN Setting page to configure the ports 802 1Q VLAN Settings VLAN Mode 802 10 VLAN Management VLAN ID h Pot Type PID Fixed VLAN Tagged Forbidden VLAN 1 Access Y i 2 Access v 1 3 Access Y 11 i 4 Access 11 5 Access Y 1 6 Access 1 7 Access v 1 8 Access Y 1 9 Access h 10
27. and Moxa IKS 6526 MIB my for IKS 6526 models on the IKS 6500 utility CD ROM Public Traps Cold Start Link Up Link Down Authentication Failure dotldBridge New Root dotidBridge Topology Changed Private Traps Configuration Changed Power On Power Off Traffic Overloaded Turbo Ring Topology Changed Turbo Ring Coupling Port Changed Turbo Ring Master Mismatch A 3 B Modbus TCP Map IKS 6524 Modbus Information v1 0 Read Only Registers Support Function Code 4 1 Word 2Bytes Address Data Type Description System Information 0x0000 1 word Vendor ID 0x 1393 0x0001 1 word Unit ID Ethernet 1 0x0002 1 word Product Code 0x001E 0x0010 20 word Vendor Name Moxa Word 0 Hi byte M Word 0 Lo byte o Word 1 Hi byte x Word 1 Lo byte a Word 2 Hi byte 0 Word 2 Lo byte 0 0x0030 20 word Product Name IKS 6524 Word 0 Hi byte T Word 0 Lo byte RK Word Hi byte S Word 1 Lo byte Word 2 Hi byte 6 Word 2 Lo byte 5 Word 3 Hi byte 2 Word 3 Lo byte 4 Word 4 Hi byte 0 Word 4 Lo byte 0 0x0050 1 word Product Serial Number 0x0051 2 word Firmware Version Word 0 Hi byte major A Word 0 Lo byte minor B Word 1 Hi byte release C Word Lo byte build D 0x0053 2 word Firmware Release Date Ex Firmware was released on 2007 05 06 at 09 o clock Word 0 0x060
28. and is assigned to the appropriate priority queue based on the IEEE 802 1p service level value defined in that packet Service level markings values are defined in the IEEE 802 1Q 4 byte tag and consequently traffic will only contain 802 1p priority markings if the network is configured with VLANs and VLAN tagging The traffic flow through the switch is as follows e A packet received by the IKS 6500 may or may not have an 802 1p tag associated with it If it does not then it is given a default 802 1p tag which is usually 0 Alternatively the packet may be marked with a new 802 1p value which will result in all knowledge of the old 802 1p tag being lost e Because the 802 1p priority levels are fixed to the traffic queues the packet will be placed in the appropriate priority queue ready for transmission through the appropriate egress port When the packet reaches the head of its queue and is about to be transmitted the device determines whether or not the egress port is tagged for that VLAN If it is then the new 802 1p tag is used in the extended 802 1D header The IKS 6500 will check a packet received at the ingress port for IEEE 802 1D traffic classification and then prioritize it based upon the IEEE 802 1p value service levels in that tag It is this 802 1p value that determines which traffic queue the packet is mapped to Traffic Queues The IKS 6500 hardware has multiple traffic queues that allow packet prioritization to occur
29. clock will be the good design means to achieve the highest time accuracy Can Ethernet switches be designed to avoid the effects of these fluctuations A switch may be designed to support IEEE 1588 while avoiding the effects of queuing In this case two modifications to the usual design of an Ethernet switch are necessary e The Boundary Clock functionality defined by IEEE 1588 must be implemented in the switch and e The switch must be configured such that it does not pass IEEE 1588 message traffic using the normal communication mechanisms of the switch Such an Ethernet switch will synchronize clocks directly connected to one of its ports to the highest possible accuracy o mu VE mei I D m S TE Grandmaster Boundary Clock Clock Slave to the Ordinary Clock Determines the grandmaster clock Slave to its master time base for the and master to its system slave 3 11 IKS 6500 Series User s Manual Featured Functions PTP Setting Operation IEEE 1588 PTP Operation Enable PTP Configuration IEEE 1588 PTP Clock Mode Sync Interval Subdomain Name _DFLT Status Offset To Master nsec Grandmaster UUID Parent UUID Clock Stratum Clock Identifier PTP Port Settings Port Status il Enable PTP_DISABLED 2 Enable PTP_DISABLED 3 Enable PTP_DISABLED 4 Enable PTP_DISABLED 5 Enable PTP_DISABLED 6 Enable PTP_DISABLED y PTP Setting Operation IEEE 1588 PTP Setting Description Factory
30. each bridge on the network transmits BPDUs The following items will then be calculated e The bridge that will act as the Root Bridge The Root Bridge is the central reference point from which the network is configured e The Root Path Costs for each bridge This is the cost of the paths from each bridge to the Root Bridge e The identity of each bridge s Root Port The Root Port is the port on the bridge that connects to the Root Bridge via the most efficient path In other words this port connects to the Root Bridge via the path with the lowest Root Path Cost The Root Bridge itself does not have a Root Port e The identity of the Designated Bridge for each LAN segment The Designated Bridge is the bridge with the lowest Root Path Cost from that segment If several bridges have the same Root Path Cost the one with the lowest Bridge Identifier becomes the Designated Bridge Traffic transmitted in the direction of the Root Bridge will flow through the Designated Bridge The port on this bridge that connects to the segment is called the Designated Bridge Port STP Configuration After all the bridges on the network agree on the identity of the Root Bridge and all relevant parameters have been established each bridge is configured to forward traffic only between its Root Port and the Designated Bridge Ports for their respective network segments All other ports are blocked which means that they will not be allowed to receive or forward traffi
31. entire network must implement IEEE 802 1Q VLAN tagging It is only supported on a LAN and not across routed WAN links since the IEEE 802 1Q tags are removed when the packets pass through a router Differentiated Services DiffServ Traffic Marking DiffServ is a Layer 3 marking scheme that uses the DiffServ Code Point DSCP field in the IP header to store the packet priority information DSCP is an advanced intelligent method of traffic marking because you can choose how your network prioritizes different types of traffic DSCP uses 64 values that map to user defined service levels allowing you to establish more control over network traffic 3 46 IKS 6500 Series User s Manual Featured Functions Advantages of DiffServ over IEEE 802 1D are e Configure how you want your switch to treat selected applications and types of traffic by assigning various grades of network service to them e No extra tags are required in the packet e DSCP uses the IP header of a packet and therefore priority is preserved across the Internet e DSCP is backward compatible with IPV4 TOS which allows operation with existing devices that use a layer 3 TOS enabled prioritization scheme Traffic Prioritization The IKS 6500 classifies traffic based on layer 2 of the OSI 7 layer model and the switch prioritizes received traffic according to the priority information defined in the received packet Incoming traffic is classified based upon the IEEE 802 1D frame
32. is Port 2 on Bridge C 3 41 IKS 6500 Series User s Manual Featured Functions Using STP on a Network with Multiple VLANs IEEE Std 802 1D 1998 Edition does not take into account VLANs when calculating STP information the calculations only depend on the physical connections Consequently some network configurations will result in VLANs being subdivided into a number of isolated sections by the STP system You must ensure that every VLAN configuration on your network takes into account the expected STP topology and alternative topologies that may result from link failures The following figure shows an example of a network that contains VLANs 1 and 2 The VLANs are connected using the 802 1Q tagged link between Switch B and Switch C By default this link has a port cost of 100 and is automatically blocked because the other Switch to Switch connections have a port cost of 36 18 18 This means that both VLANs are now subdivided VLAN 1 on Switch units A and B cannot communicate with VLAN 1 on Switch C and VLAN 2 on Switch units A and C cannot communicate with VLAN 2 on Switch B 100BaseTX full duplex Link only carries VLAN1 path cost 18 100BaseTX full duplex Link only carries VLAN2 path cost 18 Block 802 10 tagged 10BaseTx half duplex Link camies VLAN1 2 path cost 100 To avoid subdividing VLANs all inter switch connections should be made members of all available 802 1Q VLANs This will ensure connecti
33. s Manual Featured Functions Configuring GMRP GMRP is a MAC based multicast management protocol whereas IGMP is IP based GMRP provides a mechanism that allows bridges and end stations to register or un register Group membership information dynamically GMRP Settings oOo MOM a WON A RED ND 0 Enable C Enable C Enable C Enable Cl Enable Cl Enable Cl Enable Cl Enable Cl Enable Cl Enable Cl Enable C Enable v Activate GMRP enable Setting Description Factory Default Enable Disable This enables or disables the GMRP function for the port Disable listed in the Port column GMRP Table The IKS 6500 displays the current active GMRP groups that were detected GMRP Status Multicast Address FixedPors leamedPors 1 01 00 5E 00 00 01 1 6 Setting Description Fixed Ports This multicast address is defined by static multicast Learned Ports This multicast address is learned by GMRP 3 63 IKS 6500 Series User s Manual Featured Functions Using Bandwidth Management In general one host should not be allowed to occupy unlimited bandwidth particularly when the device malfunctions For example so called broadcast storms could be caused by an incorrectly configured topology or a malfunctioning device The IKS 6500 not only prevents broadcast storms but can also be configured to a different ingress rate for all packets giving adminis
34. to 01 the second and the third byte VV VV is formed by the port VLAN ID in hex and the last byte PP is formed by the port number in hex For example 01 00 OF 03 is the Circuit ID of port number 3 with port VLAN ID 15 3 75 IKS 6500 Series User s Manual Featured Functions The Remote ID is to identify the relay agent itself and it can be one of the following 1 The IP address of the relay agent 2 The MAC address of the relay agent 3 A combination of IP address and MAC address of the relay agent 4 A user defined string DHCP Relay Agent Server IP Address 1st Server 2nd Server 3rd Server 4th Serer DHCP Option 82 Enable Option 82 Type Value Display DHCP Function Table Port 1 01000101 Enable 2 01000102 Enable 3 01000103 Enable 4 01000104 Enable 5 01000105 Enable 6 01000106 Enable 7 01000107 Enable x Server IP Address 1 Server Setting Description Factory Default IP address for the This assigns the IP address of the 1st DHCP server that None lst DHCP server the switch tries to access d 2 Server Setting Description Factory Default IP address for the This assigns the IP address of the 2nd DHCP server that None 2nd DHCP server the switch tries to access d 3 Server Setting Description Factory Default IP address for the This assigns the IP address of the 3rd DHCP server that None 3rd DHCP server the switch t
35. which was published in November 2002 expands the performance capabilities of Ethernet networks to control systems that operate over a communication network In recent years an increasing number of electrical power systems have been using a more distributed architecture with network technologies that have less stringent timing specifications IEEE 1588 generates a master slave relationship between the clocks and enforces the specific timing requirements in such power systems All devices ultimately get their time from a clock known as the grandmaster clock In its basic form the protocol is intended to be administration free How does an Ethernet Switch Affect 1588 Synchronization The following content is taken from the NIST website at http eee1588 nist gov switch htm An Ethernet switch potentially introduces multi microsecond fluctuations in the latency between the 1588 grandmaster clock and a 1588 slave clock Uncorrected these fluctuations will cause synchronization errors The magnitude of these fluctuations depend on the design of the Ethernet switch and the details of the communication traffic Experiments with prototype implementations of IEEE 1588 indicate that with suitable care the effect of these fluctuations can be successfully managed For example use of appropriate statistics in the 1588 devices to recognized significant fluctuations and use suitable averaging techniques in the algorithms controlling the correction of the local 1588
36. will prompt you to select a terminal type Enter 1 to select ansi vt100 and press Enter MOXA EtherDevice Switch IK5 6524 Console terminal type 1 ansi vel00 2 ve52 1 The serial console will prompt you to log in Press Enter and select admin or user Use the down arrow key on your keyboard to select the Password field and enter a password if desired This password will be required to access any of the consoles web serial Telnet If you do not wish to create a password leave the Password field blank and press Enter Model IKS 6524 Name Managed Redundant Switch 00000 Location Switch Location Firmware Version V1 0 Serial No 00000 Ip 192 168 127 253 MAC Address o00 00 00 00 00 02 Er Account user fost Password HR 22 E nnn The Main Menu of the IKS 6500 s serial console should appear In PComm Terminal Emulator you can adjust the font by selecting Font in the Edit menu IKS 6524 series V1 0 Basic settings for network and system parameter 2 Port Trunking Allows multiple ports to be aggregated as a link 3 SNMP Settings The settings for SNMP 4 Comm Redundancy Establish Ethernet communication redundant path 5 Traffic Prioritization Prioritize Ethernet traffic to help determinism 6 Virtual LAN Set up a VLAN by IEEE802 1Q VLAN or Port based VLAN Multicast Filtering Enable the multicast filtering capability 8 Bandwidth Management Restrict
37. 0 4433 Word 1 2211 0x2100 0x212f 2 word Port 1 24 Rx Packets Ex port 1 Rx Packets 0x44332211 Word 0 4433 Word 1 2211 0x2200 0x222f 2 word port 1 24 Tx Error Packets Ex port 1 Tx Error Packets 0x44332211 Word 0 4433 Word 1 2211 0x2300 0x232f 2 word port 1 24 Rx Error Packets Ex port 1 Rx Error Packets 0x44332211 Word 0 4433 Word 1 2211 Redundancy Information 0x3000 1 word Redundancy Protocol 0x0000 None 0x0001 RSTP 0x0002 Turbo Ring 0x0003 Turbo Ring V2 0x0004 Turbo Chain 0x3 100 1 word RSTP Root 0x0000 Not Root 0x0001 Root OxFFFF RSTP Not Enable 0x3200 0x3217 1 word RSTP Port 1 24 Status 0x0000 Port Disabled 0x0001 Not RSTP Port 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF RSTP Not Enable 0x3300 1 word TR Master Slave 0x0000 Slave 0x0001 Master OxFFFF Turbo Ring Not Enable 0x3301 1 word TR 1st Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding 0x3302 1 word TR 2nd Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding B 3 IKS 6500 Series User s Manual Modbus TCP Map 0x3303 1 word TR Coupling 0x0000 Off 0x0001 On OxFFFF Turbo Ring Not Enable 0x3304 1 word TR Coupling Port status 0x0000 Port Dis
38. 0 for a Class B network or 255 255 255 0 for a Class C network Default Gateway Setting Description Factory Default IP address for gateway This specifies the IP address of the router that None connects the LAN to an outside network 3 7 IKS 6500 Series User s Manual Featured Functions DNS IP Address Setting Description Factory Default IP address for DNS server This specifies the IP address of the DNS server used by your network After specifying the DNS servers IP address you can use the IKS 6500 s URL e g www PT company com to open the web console instead of entering the IP address None IP address for 2nd DNS server This specifies the IP address of the secondary DNS server used by your network The IKS 6500 will use the secondary DNS server if the first DNS server fails to connect None Global Unicast Address Prefix Prefix Length 64 bits Setting Description Factory Default Global Unicast Address Prefix The prefix value must be formatted according to RFC 2373 IPv6 Addressing Architecture using 8 colon separated 16 bit hexadecimal values One double colon may be used in the address to indicate the appropriate number of zeros required to fill the undefined fields None Global Unicast Address Setting Description Factory Default None Displays the IPv6 Global Unicast address The network portion of the Globa
39. 0 ms 3 Turbo Chain is a new Moxa proprietary protocol with unlimited flexibly to allow you to construct any type of redundant network topology The recovery time is under 20 ms In this manual we use the terminology Turbo Ring ring and Turbo Ring V2 ring to differentiate between rings configured for one or the other of these protocols Gigabit Ethernet Redundant Ring Capability lt 50 ms Ethernet has become the default data communications medium for industrial automation applications In fact Ethernet is often used to integrate video voice and high rate industrial application data transfers into one network The IKS 6500 which comes equipped with a redundant gigabit Ethernet protocol called Gigabit Turbo Ring gives system maintainers a convenient means of setting up a versatile yet stable gigabit Ethernet network With Gigabit Turbo Ring if any segment of the network gets disconnected your automation system will be back to normal in less than 300 ms Turbo Ring or 50 ms Turbo Ring V2 3 23 IKS 6500 Series User s Manual Featured Functions NOTE Port trunking and Turbo Ring can be enabled simultaneously to form a backbone Doing so will increase the bandwidth of the backbone and also provide redundancy For example suppose that two physical ports 1 and 2 are trunked to form trunk group Trkl and then Trk1 is set as one Turbo Ring path if port 1 gets disconnected the remaining trunked port port 2 wil
40. 0 sec and Forwarding Delay 4 sec This does not violate Eqs 1 through 3 but it violates Eq 4 2 Hello Time 1 sec 12 sec and 2 Forwarding Delay 1 sec 6 sec You can remedy the situation in any number of ways One solution is simply to increase the Forwarding Delay value to at least 11 seconds HINT Take the following steps to avoid guessing Step 1 Assign a value to Hello Time and then calculate the left most part of Eq 4 to get the lower limit of Max Age Step 2 Assign a value to Forwarding Delay and then calculate the right most part of Eq 4 to get the upper limit for Max Age Step 3 Assign a value to Forwarding Delay that satisfies the conditions in Eq 3 and Eq 4 Using Traffic Prioritization The IKS 6500 s traffic prioritization capability provides Quality of Service QoS to your network by making data delivery more reliable You can prioritize traffic on your network to ensure that high priority data is transmitted with minimum delay Traffic can be controlled by a set of rules to obtain the required Quality of Service for your network The rules define different types of traffic and specify how each type should be treated as it passes through the switch The IKS 6500 can inspect both IEEE 802 1p 1Q layer 2 CoS tags and even layer 3 TOS information to provide consistent classification of the entire network The IKS 6500 s QoS capability improves the performance and determinism of indus
41. 1 Low 0x40 17 2 Normal 0x44 18 2 Normal 0x48 19 2 Normal 0x4C 20 2 Normal 0x50 21 2 Normal v 0x54 22 2 Normal 0x58 23 2 Normal x 0x5C 24 2 Normal 0x60 25 3 Normal 0x64 26 3 Normal 0x68 27 3 Normal 0x6C 28 Normal v 0x70 29 3 Normal 0x74 30 3 Normal 0x78 31 3 Normal 0x7C 32 3 Normal 0x80 33 4 Medium 0x84 34 4 Medium 0x88 35 4 Medium 0x8C 36 4 Medium 0x90 37 4 Medium 0x94 38 Medium 0x98 39 4 Medium 0x9C 40 4 Medium OxA0 41 5 Medium 0xA4 42 5 Medium 0xA8 43 5 Medium 0xAC 44 5 Medium ij 0xB0 45 5 Medium 0xB4 46 5 Medium 0xB8 47 5 Medium 0xBC 48 5 Medium A Setting Description Factory Default Low Normal This maps different TOS values to 4 different egress 1 to 16 Low Medium High queues 17 to 32 Normal 33 to 48 Medium 49 to 64 High Using Virtual LAN Setting up Virtual LANs VLANs on your IKS 6500 increases the efficiency of your network by dividing the LAN into logical segments as opposed to physical segments In general VLANs are easier to manage The Virtual LAN VLAN Concept What is a VLAN A VLAN is a group of devices that can be located anywhere on a network but which communicate as if they are on the same physical segment With VLANs you can segment your network without being restricted by phy
42. 127 xxx with a subnet mask of 255 255 255 0 NOTE To connect to the IKS 6500 s Telnet or web console your PC host and the IKS 6500 must be on the same logical subnet NOTE When connecting to the IKS 6500 s Telnet or web console first connect one of IKS 6500 s Ethernet ports to your Ethernet LAN or directly to your PC s Ethernet port You may use either a straight through or cross over Ethernet cable NOTE The IKS 6500 s default IP address is 192 168 127 253 After making sure that the IKS 6500 is connected to the same LAN and logical subnet as your PC open the IKS 6500 s Telnet console as follows 1 Click Start gt Run from the Windows Start menu Telnet to the IKS 6500 s IP address from the Windows Run window You may also issue the Telnet command from a DOS prompt Run 2 Type the name of a program folder document or Intemet resource and Windows will open it for you Open telnet 192 168 127 253 y Cancel Browse 2 5 IKS 6500 Series User s Manual Getting Started 2 In the terminal window the Telnet console will prompt you to select a terminal type Type 1 to choose ansi vt100 and then press Enter MOXA EtherDevice Switch IKS 6524 Console terminal type 1 ansi wtlO0 2 wt52 1 The Telnet console will prompt you to log in Press Enter and select admin or user Use the down arrow key on your keyboard to select the Password field and enter a password if desired
43. 2 13 14 15 16 17 18 19 20 21 22 23 24 In 802 1Q VLAN table you can review the VLAN groups that were created Joined Access Ports and Trunk Ports and in Port based VLAN table you can review the VLAN group and Joined port NOTE The physical network can have a maximum of 64 VLAN settings 3 56 IKS 6500 Series User s Manual Featured Functions Using Multicast Filtering Multicast filtering improves the performance of networks that carry multicast traffic This section explains multicasts multicast filtering and how multicast filtering can be implemented on your IKS 6500 The Concept of Multicast Filtering What is an IP Multicast A multicast is a packet sent by one host to multiple hosts Only those hosts that belong to a specific multicast group will receive the multicast If the network is set up correctly a multicast can only be sent to an end station or a subset of end stations on a LAN or VLAN that belong to the multicast group Multicast group members can be distributed across multiple subnets so that multicast transmissions can occur within a campus LAN or over a WAN In addition networks that support IP multicast send only one copy of the desired information across the network until the delivery path that reaches group members diverges To make more efficient use of network bandwidth it is only at these points that multicast packets are duplicated and forwarded A multicast packet has a multicast group addres
44. 30 You can set up to 4 email addresses to receive alarm None characters emails from IKS 6500 Send Test Email After finishing with the email settings you should first click Activate to activate those settings and then press the Send Test Email button to verify that the settings are correct NOTE Auto warning e mail messages will be sent through an authentication protected SMTP server that supports the CRAM MDS LOGIN and PAIN methods of SASL Simple Authentication and Security Layer authentication mechanism We strongly recommend not entering your Account Name and Account Password if auto warning e mail messages can be delivered without using an authentication mechanism Using Line Swap Fast Recovery The Line Swap Fast Recovery function which is enabled by default allows IKS 6500 to return to normal operation extremely quickly after devices are unplugged and then re plugged into different ports The recovery time is on the order of a few milliseconds compare this with standard commercial switches for which the recovery time could be on the order of several minutes To disable the Line Swap Fast Recovery function or to re enable the function after it has already been disabled access either the Console utility s Line Swap recovery page or the Web Browser interface s Line Swap fast recovery page as shown below Configuring Line Swap Fast Recovery Line Swap Fast Recovery Enable All Ports 3 73 IKS 6500 Series User s Manual
45. 603 1 word TR2 Ring 1 2nd Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Ring Not Enable 0x3680 1 word TR2 Ring 2 status 0x0000 Healthy 0x0001 Break OxFFFF Turbo Ring V2 Ring 2 Not Enable 0x368 1 1 word TR2 Ring 2 Master Slave 0x0000 Slave 0x0001 Master OxFFFF Turbo Ring V2 Ring 2 Not Enable 0x3682 1 word TR2 Ring 2 Ist Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Ring 2 Not Enable 0x3683 1 word TR2 Ring 2 2nd Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Ring 2 Not Enable 0x3700 1 word Turbo Chain Switch Role Mode 0x0000 Head Switch 0x0001 Member Switch 0x0002 Tail Switch OxFFFF Turbo Chain Not Enable 0x3701 1 word Turbo Chain Ist Port Status 0x0000 Link Down 0x0001 Blocking 0x0002 Blocked 0x0003 Forwarding OxFFFF Turbo Chain Not Enable B 5 IKS 6500 Series User s Manual Modbus TCP Map 0x3702 1 word Turbo Chain 2nd Port Status 0x0000 Link Down 0x0001 Blocking 0x0002 Blocked 0x0003 Forwarding OxFFFF Turbo Chain Not Enable Memory mapping from address 0x0000 Ox3FFF IKS 6526 Modbus Information v1 0
46. 9 Word 1 0x0705 IKS 6500 Series User s Manual Modbus TCP Map 0x0055 3 word Ethernet MAC Address Ex MAC 00 01 02 03 04 05 Word 0 Hi byte 0x00 Word 0 Lo byte 0x01 Word 1 Hi byte 0x02 Word 1 Lo byte 0x03 Word 2 Hi byte 0x04 Word 2 Lo byte 0x05 0x0058 1 word Power 1 0x0000 Off 0x0001 On 0x0059 1 word Power 2 0x0000 Off 0x0001 On Ox005A 1 word Fault LED Status 0x0000 No 0x0001 Yes Port Information 0x 1000 0x 1017 1 word Port 1 24 Status 0x0000 Link down 0x0001 Link up 0x0002 Disable OxFFFF No port 0x1100 0x1117 1 word Port 1 24 Speed 0x0000 10M Half 0x0001 10M Full 0x0002 100M Half 0x0003 100M Full 0x0004 1G Half 0x0005 1G Full OxFFFF No port 0x 1200 0x1217 1 word Port 1 24 Flow Ctrl 0x0000 Off 0x0001 On OxFFFF No port 0x 1300 0x1317 1 word Port 1 24 MDI MDIX 0x0000 MDI 0x0001 MDIX OxFFFF No port Ox 1400 0x1413 Port 1 20 word 0x1414 0x1427 Port 2 Port 1 24 Description Port Description 100TX RJ45 Word 0 Hi byte 1 Word 0 Lo byte 0 Word 1 Hi byte 0 Word 1 Lo byte T Word 4 Hi byte 4 Word 4 Lo byte 5 Word 5 Hi byte Word 5 Lo byte 0 Packets Information B 2 IKS 6500 Series User s Manual Modbus TCP Map 0x2000 0x202f 2 word Port 1 24 Tx Packets Ex port 1 Tx Packets 0x44332211 Word
47. Default Operation Disable or enable IEEE 1588 PTP operation Disable Configuration IEEE 1588 PTP Setting Description Factory Default Clock Mode Support software based IEEE 1588 PTP mode Disable Sync Interval Period for sending synchronization message in Disable seconds Sub domain Name Support _DFLT Default domain only _DFLT 3 12 IKS 6500 Series User s Manual Featured Functions Status Setting Description Factory Default Offset To Master Deviation between local time and the reference nsec clock in nanoseconds Grandmaster UUID When the clock has a port in PTP_SLAVE state this member s value is the value of the grand master Clock s Uuid field of the last Sync message received from the parent of the slave port Parent UUID When the clock has a port in PTP_SLAVE state this member s value is the value of the source Uuid field of the last Sync message received from the parent of the slave port Clock Stratum The stratum number describes one measure of the 4 quality of a clock Each clock is characterized by a stratum number used by the best master clock algorithm as one parameter of clock quality Clock Identifier Properties of the clock DFLT PTP Port Settings Setting Description Factory Default Port Enable Enable or disable PTP port operation None Port Status Display PTP port real status PTP_DISABLED System File Update By Remote TFTP The IKS 6500 supp
48. GMP device such as a router to find those ports that want to join a multicast group and then configures its filters accordingly IGMP Snooping Enhanced Mode Snooping Enhanced Mode allows your switch to forward multicast packets to the IKS 6500 s member port only If you disable Enhanced Mode data streams will run to the querier port as well as the member port Query Mode Query mode allows the IKS 6500 to work as the Querier if it has the lowest IP address on the subnetwork to which it belongs IGMP querying is enabled by default on the IKS 6500 to help prevent interoperability issues with some multicast routers that may not follow the lowest IP address election method Enable query mode to run multicast sessions on a network that does not contain IGMP routers or queriers IKS 6500 is compatible with any device that conforms to the IGMP v2 and IGMP v3 device protocol IGMP Multicast Filtering IGMP is used by IP supporting network devices to register hosts with multicast groups It can be used on all LANs and VLANs that contain a multicast capable IP router and on other network devices that support multicast filtering IGMP works as follows 1 The IP router or querier periodically sends query packets to all end stations on the LANs or VLANs that are connected to it For networks with more than one IP router the router with the lowest IP address is the querier A switch with IP address lower than the IP address of any other IG
49. Higher priority traffic can pass through the IKS 6500 without being delayed by lower priority traffic As each packet arrives in the IKS 6500 it passes through any ingress processing which includes classification marking re marking and is then sorted into the appropriate queue The switch then forwards packets from each queue The IKS 6500 supports two different queuing mechanisms e Weight Fair This method services all the traffic queues giving priority to the higher priority queues Under most circumstances this method gives high priority precedence over low priority but in the event that high priority traffic except the link capacity lower priority traffic is not blocked e Strict This method services high traffic queues first low priority queues are delayed until no more high priority data needs to be sent This method always gives precedence to high priority over low priority 3 47 IKS 6500 Series User s Manual Featured Functions Configuring Traffic Prioritization Quality of Service QoS provides a traffic prioritization capability to ensure that important data is delivered consistently and predictably The IKS 6500 can inspect IEEE 802 1p 1Q layer 2 CoS tags and even layer 3 TOS information to provide a consistent classification of the entire network The IKS 6500 QoS capability improves your industrial network s performance and determinism for mission critical applications QoS Classification QoS Classific
50. LAN If a device on VLAN Marketing needs to communicate with devices on VLAN Finance the traffic must pass through a routing device or Layer 3 switch VLANs help control traffic With traditional networks congestion can be caused by broadcast traffic that is directed to all network devices regardless of whether or not they need it VLANs increase the efficiency of your network because each VLAN can be set up to contain only those devices that need to communicate with each other VLANs and the Rackmount switch Your IKS 6500 provides support for VLANs using IEEE Std 802 1Q 1998 This standard allows traffic from multiple VLANs to be carried across one physical link The IEEE Std 802 1Q 1998 standard allows each port on your IKS 6500 to be placed as follows In a single VLAN defined on the IKS 6500 In several VLANs simultaneously using 802 1Q tagging The standard requires that you define the 802 1Q VLAN ID about each VLAN on your IKS 6500 before the switch can use it to forward traffic 3 51 IKS 6500 Series User s Manual Featured Functions Managing a VLAN A new or initialized IKS 6500 contains a single VLAN the Default VLAN This VLAN has the following definition e VLAN Name Management VLAN e 802 10 VLAN ID 1 if tagging is required All the ports are initially placed in this VLAN and it is the only VLAN that allows you to access the management software of the IKS 6500 over the network Communication Between VLANs I
51. MP queriers connected to the LAN or VLAN can become the IGMP querier 2 When an IP host receives a query packet it sends a report packet back that identifies the multicast group that the end station would like to join 3 When the report packet arrives at a port on a switch with IGMP Snooping enabled the switch knows that the port should forward traffic for the multicast group and then proceeds to forward the packet to the router 4 When the router receives the report packet it registers that the LAN or VLAN requires traffic for the multicast groups 5 When the router forwards traffic for the multicast group to the LAN or VLAN the switches only forward the traffic to ports that received a report packet 3 59 IKS 6500 Series User s Manual Featured Functions GMRP GARP Multicast Registration Protocol The IKS 6500 supports IEEE 802 1D 1998 GMRP GARP Multicast Registration Protocol which differs from IGMP Internet Group Management Protocol GMRP is a MAC based multicast management protocol whereas IGMP is IP based GMRP provides a mechanism that allows bridges and end stations to register or de register Group membership information dynamically GMRP functions similarly to GVRP except that GMRP registers multicast addresses on ports When a port receives a GMRP join message it will register the multicast address to its database if the multicast address is not registered and all the multicast packets with that multicast address
52. Moxa Industrial Rackmount Switch IKS 6500 Series User s Manual www moxa com product First Edition November 2009 MOXA 2009 Moxa Inc All rights reserved Reproduction without permission is prohibited Moxa Industrial Rackmount Switch IKS 6500 Series User s Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement Copyright Notice Copyright O 2009 Moxa Inc All rights reserved Reproduction without permission is prohibited Trademarks Moxa is a registered trademark of Moxa Inc All other trademarks or registered marks in this manual belong to their respective manufacturers Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa Moxa provides this document as is without warranty of any kind either expressed or implied including but not limited to its particular purpose Moxa reserves the right to make improvements and or changes to this manual or to the products and or the programs described in this manual at any time Information provided in this manual is intended to be accurate and reliable However Moxa assumes no responsibility for its use or for any infringements on the rights of third parties that may result from its use This product might include unintentional technical or typographical errors Changes are periodically made
53. Read Only Registers Support Function Code 4 1 Word 2Bytes Address Data Type Description System Information 0x0000 1 word Vendor ID 0x1393 0x0001 1 word Unit ID Ethernet 1 0x0002 1 word Product Code 0x001E 0x0010 20 word Vendor Name Moxa Word 0 Hi byte M Word 0 Lo byte o Word 1 Hi byte x Word 1 Lo byte a Word 2 Hi byte 0 Word 2 Lo byte 0 0x0030 20 word Product Name IKS 6526 Word 0 Hi byte T Word 0 Lo byte K Word 1 Hi byte S Word 1 Lo byte Word 2 Hi byte 6 Word 2 Lo byte 5 Word 3 Hi byte 2 Word 3 Lo byte 6 Word 4 Hi byte 0 Word 4 Lo byte 0 0x0050 1 word Product Serial Number 0x0051 2 word Firmware Version Word 0 Hi byte major A Word 0 Lo byte minor B Word 1 Hi byte release C Word 1 Lo byte build D 0x0053 2 word Firmware Release Date Ex Firmware was released on 2007 05 06 at 09 o clock Word 0 0x0609 Word 1 0x0705 B 6 IKS 6500 Series User s Manual Modbus TCP Map 0x0055 3 word Ethernet MAC Address Ex MAC 00 01 02 03 04 05 Word 0 Hi byte 0x00 Word 0 Lo byte 0x01 Word 1 Hi byte 0x02 Word 1 Lo byte 0x03 Word 2 Hi byte 0x04 Word 2 Lo byte 0x05 0x0058 1 word Power 1 0x0000 Off 0x0001 On 0x0059 1 word Power 2 0x0000 Off 0x0001 On Ox005A 1 word Fa
54. Telnet or web console first connect one of IKS 6500 s Ethernet ports to your Ethernet LAN or directly to your PC s Ethernet port You may use either a straight through or cross over Ethernet cable NOTE The IKS 6500 s default IP address is 192 168 127 253 2 7 IKS 6500 Series User s Manual Getting Started After making sure that the IKS 6500 is connected to the same LAN and logical subnet as your PC open the IKS 6500 s web console as follows 1 Point your web browser to the IKS 6500 s IP address by entering it in the Address or URL field 3 washingtonpost com News Front Microsoft Internet Explorer Iof x Fie Edit View Favorites Tools Help EE ee es a Search Back Forward Stop Refresh Home 2 The IKS 6500 s web console will open and you will be prompted to log in Select the login account admin or user and enter the Password This password will be required to access any of the consoles web serial Telnet If you do not wish to create a password leave the Password field blank and press Enter FA hap 11192 160 127 253 enthianth arp Microsoft Internet Explorer GRO WEE HAD ABRA TAD MAD a O O AAG De ke O 2 a a XD 8 pep ni92 108 177 HAD B me MOXA Industrial Rackmount Switch IKS 6524 E Account admin Y Password NOTE By default no password is assigned to the IKS 6500 s web serial and Telnet consoles 2 8 IKS 6500 Series User s Manual Getting Starte
55. Untagged Device dT 1 A Device E raad l VLAN 4 Tagged Device VID 4 Device C Device D VLAN 2 Untagged Device VLAN 3 Tagged Device VID 3 In this application Port 1 connects a single untagged device and assigns it to VLAN 5 it should be configured as Access Port with PVID 5 Port 2 connects a LAN with two untagged devices belonging to VLAN 2 One tagged device with VID 3 and one tagged device with VID 4 It should be configured as Trunk Port with PVID 2 for untagged device and Fixed VLAN Tagged with 3 and 4 for tagged device Since each port can only have one unique PVID all untagged devices on the same port can only belong to the same VLAN Port 3 connects with another switch It should be configured as Trunk Port GVRP protocol will be used through the Trunk Port Port 4 connects a single untagged device and assigns it to VLAN 2 it should be configured as Access Port with PVID 2 Port 5 connects a single untagged device and assigns it to VLAN 3 it should be configured as Access Port with PVID 3 Port 6 connect a single untagged device and assigns it to VLAN 5 it should be configured as Access Port with PVID 5 Port 7 connects a single untagged device and assigns it to VLAN 4 it should be configured as Access Port with PVID 4 3 53 IKS 6500 Series User s Manual Featured Functions After proper configuration Packets from Device A will travel through Trunk Port 3 with tagged VID 5 Switch B will recognize its
56. Use the up down arrow keys to select a category and then press Enter to select 2 6 IKS 6500 Series User s Manual Getting Started 5 Inthe terminal window select Preferences from the Terminal menu on the menu bar 6 The Terminal Preferences window should appear Make sure that VT100 Arrows is checked Terminal Preferences Terminal Options Emulation Local Echo C T 52 a Blinking Cursor VT 00 ANSI Cancel IV Bl cl Help M di Fonts wt tee Buffer Size a Background Color 7 Use the following keys on your keyboard to navigate the IKS 6500 s Telnet console Key Function Up down right left arrow keys Tab Move the onscreen cursor Enter Display and select options Space Toggle options Esc Previous menu NOTE The Telnet console looks and operates in precisely the same manner as the serial console Configuration by Web Browser The IKS 6500 s web console is a convenient way to modify the configuration and access the built in monitoring and network administration functions You can open the IKS 6500 s web console using a standard web browser such as Internet Explorer or Netscape NOTE To connect to the IKS 6500 s Telnet or web console your PC host and the IKS 6500 must be on the same logical subnet NOTE If the IKS 6500 is configured for other VLAN settings you must make sure your PC host is on the management VLAN NOTE When connecting to the IKS 6500 s
57. User s Manual Introduction Overview The IKS 6500 Series is certified for use in maritime applications DNV and others traffic control systems NEMA TS 2 railway applications EN50121 4 and etc It can be used for Gigabit or Fast Ethernet backbones and supports redundant ring topologies It also supports dual power inputs 110 220 VAC to increase the reliability of communication The IKS 6500 Series makes network planning easy and allows greater flexibility It has up to 2 Gigabit Ethernet ports and 24 Fast Ethernet ports Package Checklist The IKS 6500 is shipped with the following items If any of these items is missing or damaged please contact your customer service representative for assistance 1 Moxa IKS 6500 Hardware installation guide CD ROM with user s manual and SNMP MIB file Warranty statement RJ45 to DB9 console port cable Protective caps for unused ports e 2 rackmount ears Software Features e Turbo Ring Turbo Chain lt 20ms recovery time at full load and STP RSTP IEEE 802 1w D e IPv6 ready e IEEE 1588 PTP Precision Time Protocol for precise time synchronization of networks e DHCP Option 82 for IP address assignment for different policies e Supports Modbus TCP e Supports LLDP Link Layer Discovery Protocol e IGMP snooping GMRP to filter multicast traffic from industrial Ethernet protocols e JEEE 802 1Q VLAN Port based VLAN GVRP for easier network planning e QoS IEEE 802 1p 1Q and TOS Dif
58. abled 0x0001 Not Coupling Port 0x0002 Link Down 0x0003 Blocked 0x0005 Forwarding OxFFFF Turbo Ring Not Enable 0x3305 1 word TR Coupling Control Port status 0x0000 Port Disabled 0x0001 Not Coupling Port 0x0002 Link Down 0x0003 Blocked 0x0005 Forwarding 0x0006 Inactive 0x0007 Active OxFFFF Turbo Ring Not Enable 0x3500 1 word TR2 Coupling Mode 0x0000 None 0x0001 Dual Homing 0x0002 Coupling Backup 0x0003 Coupling Primary OxFFFF Turbo Ring V2 Not Enable 0x3501 1 word TR2 Coupling Port Primary status Using in Dual Homing Coupling Backup Coupling Primary 0x0000 Port Disabled 0x0001 Not Coupling Port 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Not Enable 0x3502 1 word TR2 Coupling Port Backup status Only using in Dual Homing 0x0000 Port Disabled 0x0001 Not Coupling Port 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Not Enable 0x3600 1 word TR2 Ring 1 status 0x0000 Healthy 0x0001 Break OxFFFF Turbo Ring V2 Not Enable 0x3601 1 word TR2 Ring 1 Master Slave 0x0000 Slave 0x0001 Master OxFFFF Turbo Ring V2 Ring 1 Not Enable B 4 IKS 6500 Series User s Manual Modbus TCP Map 0x3602 1 word TR2 Ring 1 1st Port status 0x0000 Port Disabled 0x0001 Not Redundant 0x0002 Link Down 0x0003 Blocked 0x0004 Learning 0x0005 Forwarding OxFFFF Turbo Ring V2 Ring 1 Not Enable 0x3
59. ame for each port N A This indicates the transmission speed for each port N A Speed 100M Full 100M Half 10M Full or 10M Half This indicates if the FDX flow control of this port is N A een enabled or disabled This is used to add selected ports into the trunk N A Up i group from available ports This is used to remove selected ports from the trunk N A Down group Trunk Table Trunk Group Member Port Tel 1 1 Success Static 1 2 Success 1 3 Success Trunk Table Setting Description Trunk group Displays the trunk type and trunk group Member port Displays the member ports that belong to the trunk group Status Success means port trunking is working properly Fail means port trunking is not working properly Standby means port trunking is working as a standby port When there are more than eight ports trunked as a trunking group the 9 port will be the standby port 3 18 IKS 6500 Series User s Manual Featured Functions Configuring SNMP The IKS 6500 supports SNMP V1 V2c and V3 SNMP V1 and SNMP V2c use a community string match for authentication which means that SNMP servers access all objects with read only or read write permissions using the community strings public and private by default SNMP V3 requires that you select an authentication level of MDS or SHA and is the most secure protocol You can also enable data encryption to enhance data secu
60. are able to be forwarded from this port When a port receives a GMRP leave message it will de register the multicast address from its database and all the multicast packets with this multicast address are not able to be forwarded from this port Static Multicast MAC Some devices may only support multicast packets but not support either IGMP Snooping or GMRP The IKS 6500 supports adding multicast groups manually to enable multicast filtering Enabling Multicast Filtering Use the serial console or Web interface to enable or disable IGMP Snooping and IGMP querying If IGMP Snooping is not enabled then IP multicast traffic is always forwarded flooding the network Configuring IGMP Snooping IGMP Snooping provides the ability to prune multicast traffic so that it travels only to those end destinations that require that traffic thereby reducing the amount of traffic on the Ethernet LAN IGMP Snooping Settings IGMP Snooping Setting Current VLAN List IGMP Snooping Enable O Query Interval s IGMP Snooping Enhanced Mode eo ET Es ae a 1 1 Enable Enable 11 12 13 14 15 16 17 18 19 20 21 22 23 24 IGMP Snooping Enable Setting Description Factory Default Enable Disable Click the checkbox to enable the IGMP Snooping Disabled function globally Enable IGMP Snooping if the network also uses 3rd party switches 3 60 IKS 6500 Series User s Manual Featured Functions Query Interval
61. ation Queuing Mechanism Weight Fair 8 4 2 1 x Pot Port Highest Priority spect ToS Inspect 1 Y Y 2 Y Y 3 Y Y 4 Y Y 5 Y Y 6 Y Y 7 Y Y 8 Y Y 9 Y Y 10 Y Y 11 Y Y 12 Y Y 13 Y Y The IKS 6500 supports inspection of layer 3 TOS and or layer 2 CoS tag information to determine how to classify traffic packets Queuing Mechanism Setting Description Factory Default Weight Fair IKS 6500 has 4 priority queues In the weight fair scheme an 8 4 2 1 weighting is applied to the four priorities This approach prevents the lower priority frames from being starved of opportunity for transmission with only a slight delay to the higher priority frames Strict In the Strict priority scheme all top priority frames egress a port until that priority s queue is empty and then the next lower priority queue s frames egress This approach can cause the lower priorities to be starved of opportunity for transmitting any frames but ensures all high priority frames to egress the switch as soon as possible Weight Fair 3 48 IKS 6500 Series User s Manual Featured Functions Inspect TOS Setting Description Factory Default Enable Disable This enables or d
62. back up connection that is activated in the event that the primary path connection fails Dual Homing for Turbo Ring V2 Primary Master Path Ring A EE ET EE Ring B 7 I Backup Path 3 28 IKS 6500 Series User s Manual Featured Functions Configuring Turbo Ring and Turbo Ring V2 On the Communication Redundancy page select Turbo Ring or Turbo Ring V2 as the Redundancy Protocol Note that each protocol s configuration page is different Configuring Turbo Ring Communication Redundancy Current Status Now Active None Master Slave Redundant Ports Status 1st Part 2nd Port Ring Coupling Ports Status Coupling Fort Coupling Control Port Settings Redundancy Protocol Turbo Ring O Set as Master Redundant Ports 1st Port 1 amp 2nd Port 2 CO Enable Ring Coupling Coupling Port 3 S Coupling Control Port 4 Current Status Items Now Active This shows which communication protocol is in use Turbo Ring Turbo Ring V2 RSTP or none Master Slave This indicates whether or not the IKS 6500 is the master of the Turbo Ring This field appears only for Turbo Ring or Turbo Ring V2 NOTE The user does not need to assign the master to use Turbo Ring or Turbo Ring V2 If no master is assigned the Turbo Ring protocol will automatically assign master status to one of the IKS series Ethernet switches in the ring The master is only used to determine which segment serves as the backup path
63. c STP Reconfiguration Once the network topology has stabilized each bridge listens for Hello BPDUs that are transmitted from the Root Bridge at regular intervals If a bridge does not receive a Hello BPDU after a certain interval the Max Age time the bridge assumes that the Root Bridge or a link between itself and the Root Bridge has gone down This will trigger the bridge to reconfigure the network to account for the change If you have configured an SNMP trap destination the first bridge to detect a topology change in your network sends out an SNMP trap Differences between RSTP and STP RSTP is similar to STP but includes additional information in the BPDUs that allow each bridge to confirm that it has taken action to prevent loops from forming when it decides to enable a link to a neighboring bridge Adjacent bridges connected via point to point links will be able to enable a link without waiting to ensure that all other bridges in the network have had time to react to the change The main benefit of RSTP is that the configuration decision is made locally rather than network wide allowing RSTP can carry out automatic configuration and restore a link faster than STP STP Example The LAN shown below has three segments with adjacent segments connected using two possible links The various STP factors such as Cost Root Port Designated Bridge Port and Blocked Port are shown in the figure 3 40 IKS 6500 Series User
64. c unicast MAC address into the address None table Port Fix the static address with a dedicated port 1 1 Configuring IEEE 802 1X 802 1X Settings Database Option Local v Re Auth Enable Radius Server Re Auth Period 3600 Server Port Shared Key Pot Bak 1 Enable 2 Enable 3 Enable 4 Enable 5 Enable B Enable 7 Enable 8 Enable v Database Option Setting Description Factory Default Local Select this option when setting the Local User Database Local Max 32 users as the authentication database Radius Select this option to set an external RADIUS server as Local the authentication database The authentication mechanism is EAP MDS Radius Local Select this option to make using an external RADIUS Local 3 67 IKS 6500 Series User s Manual Featured Functions Radius Server Setting Description Factory Default IP address or The IP address or domain name of the RADIUS server local host domain name Server Port Setting Description Factory Default Numerical The UDP port of the RADIUS server 1812 Shared Key Setting Description Factory Default alphanumeric A key to be shared between the external RADIUS server None Max 40 and IKS 6500 Both ends must be configured to use the characters same key Re Auth Setting Description Factory Default Enable Disable Select to require re authentication of the client after a Disable preset
65. cant The IKS 6500 acts as an authenticator in the 802 1X environment A supplicant and an authenticator exchange EAPOL Extensible Authentication Protocol over LAN frames with each other We can either use an external RADIUS server as the authentication server or implement the authentication server in IKS 6500 by using a Local User Database as the authentication look up table When we use an external RADIUS server as the authentication server the authenticator and the authentication server exchange EAP frames between each other Authentication can be initiated either by the supplicant or the authenticator When the supplicant initiates the authentication process it sends an EAPOL Start frame to the authenticator When the authenticator initiates the authentication process or when it receives an EAPOL Start frame it sends an EAP Request Identity frame to ask for the username of the supplicant 3 66 IKS 6500 Series User s Manual Featured Functions Configuring Static Port Lock The IKS 6500 supports adding unicast groups manually if required Add Static Unicast MAC Address MAC Address Port server as the authentication database the first priority The authentication mechanism is EAP MD5 The first priority is to set the Local User Database as the authentication database Setting Description Factory Default MAC Address Add the stati
66. cation Refer to the Basic Settings section to see how to modify Switch Name and Switch Location Email Setup Email Warning Events Settings Mail Server IP Name Account Name Account Password Change Account Password Old Password New Password Retype Password 1st email address 2nd email address 3rd email address 4th email address Send Test E mail Mail Server IP Name Setting Description Factory Default IP address The IP Address of your email server None Account Name Setting Description Factory Default Max 45 Charters Your email account None 3 72 IKS 6500 Series User s Manual Featured Functions Password Setting Setting Description Factory Default Disable Enable to To reset the password from the Web Browser interface Disable change password click the Change password check box type the Old password type the New password retype the New password and then click Activate Max 45 characters Old password Type the current password when changing the password None New password Type new password when enabled to change password None Max 45 characters Retype password If you type a new password in the Password field you None will be required to retype the password in the Retype new password field before updating the new password Email Address Setting Description Factory Default Max
67. d 3 After logging in you may need to wait a few moments for the web console to appear Use the folders in the left navigation panel to navigate between different pages of configuration N htrp11192 1604 asp Miczosef Intecaot Explorer EX ANARA IAD NAW Ar gt 3 O O SAG Oe ke O 3a JAS a 192 168 177 25300 ap EEUE Ha MOXA Industrial Rackmount Switch IKS 6524 E2 S Iahi Welcome to the Web Console Y Camer 2 Bae settings See below for a bref descnpoon of each funcion groups and then click on the tem m the let pane to access the tem DO Pon Traag qs z Bate Seres Basic settings for network management parameters and system configurations a SME oo Pon Trunking Allow mulple ports to be aggregated as a br Comensracatica Pedrmdancy ET Sage The settings fee SNMP a PER Commurscabon Redundancy Establsh Ethernet communication redundant path Trafic Prontizaticn Prioritize Ethemet traffic to increase Getermenam Y Marras Fitenng Virtual LAN Set up 3 VLAN by IEEE 802 10 VLAN or Pon based VLAN Gy Bedek Management a st DGD Pot cia Mum ast Fitenng Enable the muticast Stenng Capabdty SE Maw Bandenth Management Restnct unpredictable network traffic Pon Access Control Pon based access control by EEE 802 1X or Static Port Lock O Lario Put Bonny P Auto Wamng Automatically send wameg omal and or Ingper relay output by evert a nar Lane Swap Fast Recovery Fast recovery ster mowing devices 10 dierent poes a Sat Device P Assign IP addresses t
68. damaged This is a particularly important feature for industrial applications since it could take several minutes to locate the disconnected or severed cable For example if the IKS 6500 is used as a key communications component of a production line several minutes of downtime could cause a big loss in production and revenue IKS 6500 supports three different protocols to support this communication redundancy function Rapid Spanning Tree Spanning Tree Protocol IEEE 802 1W 1D Turbo Ring Turbo Ring V2 and Turbo Chain When configuring a redundant ring all switches on the same ring must be configured to use the same redundancy protocol You cannot mix the Turbo Ring Turbo Ring V2 and STP RSTP protocols on the same ring The following table lists the key differences between each feature Use this information to evaluate the benefits of each and then determine which features are most suitable for your network Me ei Turbo Ring Turbo Chain STP RSTP Topology Ring Ring Chain Ring Mesh Ring Mesh Recovery Time lt 20 ms lt 300 ms lt 20 ms Up to 30 sec Up to 5 sec Most of Moxa s managed switches now support three proprietary Turbo Ring protocols 1 Turbo Ring refers to the original version of Moxa s proprietary redundant ring protocol which has a recovery time of under 300 ms 2 Turbo Ring V2 refers to the new generation Turbo Ring which has a recovery time of under 2
69. e By Local Import Export Update System Files from Local PC Configuration File Log File Upgrade Firmware nn Upload Configure Data kr Configuration File Click Export to save the IKS 6500 s configuration file to the local host Log File Click Export to save the IKS 6500 s log file to the local host NOTE Some operating systems will open the configuration file and log file directly in the web page In such cases right click the Export button to save the file 3 14 IKS 6500 Series User s Manual Featured Functions Upgrade Firmware To import a new firmware file onto the IKS 6500 click Browse to select the firmware file that is saved on your computer The upgrade procedure will proceed automatically after clicking Import Upload Configure Data To import a configuration file onto the IKS 6500 click Browse to select the configuration file already saved on your computer The upgrade procedure will proceed automatically after clicking Import System File Update By Backup Media You can use Moxa s Automatic Backup Configurator to save and load the IKS 6500 s configurations through the switch s RS 232 console port ABC Auto Backup Configurator Configuration Auto load ABC s system configurations when system boots up Save the current configurations to ABC Load the ABC s configurations to Switch Restart This function provides users with a quick way to restart the system Restart This function will restart
70. e bandwidth of a link can be doubled tripled or quadrupled e Redundancy if one link is broken the remaining trunked ports share the traffic within this trunk group e Load sharing MAC client traffic may be distributed across multiple links To avoid broadcast storms or loops in your network while configuring a trunk first disable or disconnect all ports that you want to add to the trunk or remove from the trunk After you finish configuring the trunk enable or re connect the ports If all ports on both switch units are configured as 100BaseTX and they are operating in full duplex mode the potential bandwidth of the connection will be up to 1 6 Gbps This means that users can double triple or quadruple the bandwidth of the connection by port trunking between two PT series switches 3 16 IKS 6500 Series User s Manual Featured Functions Each IKS 6500 can set a maximum of 3 port trunking groups up to 8 trunk ports per trunk group When you activate port trunking certain settings on each port will be reset to factory default values or disabled Communication redundancy will be reset 802 1Q VLAN will be reset Multicast Filtering will be reset Port Lock will be reset and disabled Set Device IP will be reset Mirror will be reset After port trunking has been activated you may configure these items again for each trunking ports Configuring Port Trunking The Port Trunking Settings page is where ports are as
71. e se se ek Ge Re GR ee GRA Ge Ge Re Ge ee eke 3 45 Configuring Traffic Prioritization sesse see se see se Ge Re GR ee GRA Re Ge GR Ge Ge ek ee 3 48 Using Virtual GAN ccoo sa dr a a deed VER Ee ts 3 50 The Virtual LAN VLAN Concept ziei erinnere nira sra ae rE s 3 50 Sample Applications of VLANs using IKS 6500 ee see se se ee Ge ee Ge ee ee 3 53 Configuring Virtual LAN ooo 3 54 Using Multicast Elton ds ti a id 3 57 The Concept of Multicast Filtering ooonoonccnonnnnncnncnonnnononnnnnonnonccnnonnonncnn cnc Ge ek ee 3 57 Configuring IGMP Snooping occcoccnoncccononononnnnnonncnnonncnononononnnnnnon arc conc Ge none Gee ek ee 3 60 Appendix A Appendix B Appendix C Add Static Multicast MA C se nt Ge ee ne a Ge EE Pe ee eg oe Ps ee ER ss 3 62 Configuring GMRP iii EE 3 63 GMRP Tablet ia 3 63 Using Bandwidth Management sesse see see Ge ee ek ee GR Ge ee Gee Re GR conc GR Ge RA Ge cane Ge Re Ge ee 3 64 Configuring Bandwidth Management iese see se see se Ge ee Gee Re GR ee GRA Ge Re Ge Re GR ee Re ee 3 64 Broadcast Storm ProteCHON ees sees see se see ek Ge ee RA Ge Re GR ee GR Ge RA Ge Re Gee Re ke 3 64 Traffic Rate Limiting Settna Sini serena SE ndo Gee Ee Ee Se SG Se Ee Ged ee Gee 3 65 Using Port Access Control idioma nas 3 66 Configuring Static Port LOCK e erer eee ear Gee de eo Re GR ee GRA Be corona none Ge ee ee 3 67 Configuring IEEE PAD RE EE EE i Te 3 67 Using Auto Wa II 3 70 Configuring Email Warning cee see s
72. e see se ee Ge Ge Re GR ee GR ee Ge Re Gee Re ke 3 70 lo Eb ER EE EE OE N RE AE OK 3 71 Email Setup SEE EE EE GE GR GR Ge Ge EG ee ge eg 3 72 Using Line Swap Fast RecoOVeIY cocccococococcononononononoononacnnon conan Ge ee GR a a Ge Re Ge ee RR Ge Re Gee 3 73 Configuring Line Swap Fast Recovery eise sesse ee Ge ee GR ee GR Ge RA Ge Re Re Re ke 3 73 Using Set Device Ps ae N Re Er OE a Re Re atte 3 74 Configuring Set Device IP occiso aia ainia de 3 75 USI SDA OTIOSIS td RR HE EE RAN 3 78 Mirror Portas 3 78 PUN 8s AAA a 3 79 Using MOD AA ee 3 81 Monitor by S WO is es Ee EE ek bee Se a See Ke Dee ee ES ee eg See Ed 3 81 Monitor by VO AE N EO OE DE 3 81 Using the MAG Address Table ss ses rt indecisa ines 3 82 Using Event OB sa pa 3 83 USING SySlOG ii sepas 3 84 Using HTTP SISSI ta 3 85 MIE GroupB tai A 1 Modbus T CP Map ei es Ee Ne ES EE ON GE OER Ee OE eee B 1 IKS 6524 Modbus Information V1 0 oo esse sesse se se ek Ge Re GR ee GR ke Re GRA Ge Ge ee Gee Re eke ee B 1 IKS 6526 Modbus Information v1 0 ees esse sesse se se ee Ge Re GR ee GR Re Re GRA Ge Ge Re rn ee ek ee ee B 6 Specificato NSi i anaie alla C 1 1 Introduction Welcome to the IKS 6500 Series a managed redundant Gigabit Ethernet switch designed especially for connecting Ethernet enabled devices for industrial field applications The following topics are covered in this chapter O Overview OU Package Checklist O Software Features IKS 6500 Series
73. environment the user must set Redundant Port Coupling Port and Coupling Control Port to join all VLANS since these ports act as the backbone to transmit all packets of different VLANS to the different IKS series Ethernet switches Ring Coupling for Turbo Ring Switch B Main Path Switch D Coupling Control Port TEE EE EE C EE EE Backup Path Pa Coupling Port as Switch A Coupler wite To configure the ring coupling for a Turbo Ring select two IKS series Ethernet switches e g Switch A and B in the above figure in the ring and another two IKS series Ethernet switches in the adjacent ring e g Switch C and D 3 26 IKS 6500 Series User s Manual Featured Functions A NOTE ATTENTION Select two ports on each switch to be used as coupling ports and link them together Next assign one switch e g Switch A to be the coupler and connect the coupler s coupling control port with Switch B for this example The coupler switch i e Switch A will monitor switch B through the coupling control port to determine whether or not the coupling port s backup path should be recovered Ring Coupling for Turbo Ring V2 Switch B Switch D _Coupling Port Primary Port Primary Main Path Backup Path Coupling P Port Backup Switch A IE Note that the ring coupling settings for a Turbo Ring V2 are different from a Turbo Ring For Turbo Ring V2 ring coupling is enabled by configu
74. f devices connected to a VLAN need to communicate to devices on a different VLAN a router or Layer 3 switching device with connections to both VLANs needs to be installed Communication between VLANs can only take place if they are all connected to a routing or Layer 3 switching device VLANs Tagged and Untagged Membership The IKS 6500 supports 802 1Q VLAN tagging a system that allows traffic for multiple VLANs to be carried on a single physical backbone trunk link When setting up VLANs you need to understand when to use untagged and tagged membership of VLANs Simply put if a port is on a single VLAN it can be an untagged member but if the port needs to be a member of multiple VLANs tagged membership must be defined A typical host e g clients will be untagged members of one VLAN defined as Access Port in IKS 6500 while inter switch connections will be tagged members of all VLANs defined as Trunk Port in IKS 6500 The IEEE Std 802 1Q 1998 defines how VLANs operate within an open packet switched network An 802 1Q compliant packet carries additional information that allows a switch to determine which VLAN the port belongs to If a frame is carrying the additional information it is known as a tagged frame To carry multiple VLANs across a single physical backbone trunk link each packet must be tagged with a VLAN identifier so that the switches can identify which packets belong in which VLAN To communicate between VLANs a rou
75. fServ to increase determinism e 802 3ad LACP for bandwidth optimization e JEEE 802 1X and https SSL to enhance network security e SNMP V1 V2c V3 for differential network management e RMON for efficient proactive network monitoring e Supports ABC 01 for system configuration backup e Access restriction by MAC address e Port mirroring for online debugging e Automatic warnings by email relay output e Automatic recovery of connected device s IP addresses e Line swap fast recovery e Configuration through web browser Telnet serial console Windows utility and ABC 01 1 2 2 Getting Started This chapter explains how the initial installation process for the IKS 6500 Series There are three ways to access IKS 6500 s configuration settings the serial console Telnet console and web console If you do not know the IKS 6500 s IP address you can open the serial console by connecting the IKS 6500 to a PC s COM port with a short serial cable You can open the Telnet or web console over an Ethernet LAN or over the Internet The following topics are covered U Serial Console Configuration 115200 None 8 1 VT100 Q Configuration by Telnet Console AU Configuration by Web Browser A Disabling Telnet and Browser Access IKS 6500 Series User s Manual Getting Started Serial Console Configuration 115200 None 8 1 VT100 NOTE e You cannot connect to the serial and Telnet console at the same time e You can con
76. for Turbo Ring In this case the redundant segment i e the segment that will be blocked during normal operation is determined by the number of IKS series Ethernet switches in the ring and by the location of the master switch Turbo Ring with even number of switches Master If the number of Ethernet switches in the Turbo Ring is 2N an even number the backup segment is one of the two segments connected to the N 1 st switch i e the unit directly opposite the master Ee GE HE EE Turbo Ring with odd number switches Master If the number of Ethernet switches in the ES Turbo Ring is 2N 1 an odd number the ooo i backup segment is the N 1 st segment counting counterclockwise For the example shown here N 1 so that N 1 2 Segment N 1 3 25 IKS 6500 Series User s Manual Featured Functions Determining the Redundant Path for Turbo Ring V2 Master For Turbo Ring V2 the backup segment is the segment connected to the 2nd redundant port on the master Please refer to Configuring Turbo Ring V2 later in this chapter Ring Coupling Configuration For some systems it may not be convenient to connect all devices in the system in a single redundant ring since some devices could be located in a remote area For these systems Ring Coupling can be used to group devices into smaller redundant rings that communicate with each other ATTENTION In a VLAN
77. g Select this item to change to the Turbo Ring configuration page F Select this item to change to the Turbo Aubo MENO Ring V2 configuration page os None Turbo Chain Select this item to change to the Turbo Chain configuration page RSTP IEEE Select this item to change to the RSTP 802 1W 1D configuration page None Ring redundancy is not active Role Setting Description Factory Default Head Select this IKS 6500 as Head Switch Member Select this IKS 6500 as Member Switch Member Tail Select this IKS 6500 as Tail Switch 3 36 IKS 6500 Series User s Manual Featured Functions Head Role Setting Description Factory Default Select any port of the IKS 6500 to be the IKS 6524 port 1 Beat For head port IKS 6526 port G1 Select any port of the IKS 6500 to be the IKS 6524 port 2 Meer member port IKS 6526 port G2 Member Role Setting Description Factory Default st Select any port of the IKS 6500 to be the IKS 6524 port 1 poten 1 member port IKS 6526 port Gl nd Select any port of the IKS 6500 to be the IKS 6524 port 2 20 Member port 2 member port IKS 6526 port G2 Tail Role Setting Description Factory Default Tail Port Select any port of the IKS 6500 to be the IKS 6524 port 1 tail port IKS 6526 port G1 Select any port of the IKS 6500 to be the IKS 6524 port 2 MnP Or member port IKS 6526 port G2 The STP RSTP Concept NOTE Spanning Tree Protocol
78. he other is IEEE 802 1X Static Port Lock The IKS 6500 can also be configured to protect static MAC addresses for a specific port With the Port Lock function these locked ports will not learn any additional addresses but only allow traffic from preset static MAC addresses helping to block hackers and careless usage IEEE 802 1X The IEEE 802 1X standard defines a protocol for client server based access control and authentication The protocol restricts unauthorized clients from connecting to a LAN through ports that are open to the Internet and which otherwise would be readily accessible The purpose of the authentication server is to check each client that requests access to the port The client is only allowed access to the port if the client s permission is authenticated The IEEE 802 1X Concept Three components are used to create an authentication mechanism based on 802 1X standards Client Supplicant Authentication Server and Authenticator Supplicant The end station that requests access to the LAN and switch services and responds to the requests from the switch Authentication server The server that performs the actual authentication of the supplicant Authenticator Edge switch or wireless access point that acts as a proxy between the supplicant and the authentication server requesting identity information from the supplicant verifying the information with the authentication server and relaying a response to the suppli
79. ices will determine the best speed for that connection 100M Full Choose one of these fixed speed options if the Auto 100M Half connected Ethernet device has trouble TOM ES auto negotiating for line speed 10M Half FDX Flow Ctrl This setting enables or disables flow control for the port when the port s Speed is set to Auto The final result will be determined by the Auto process between the IKS 6500 and connected devices Setting Description Factory Default Enable This enables flow control for this port when the port s Speed is set to Auto Disable Disable This disables flow control for this port when the port s Speed is set to Auto MDIMDIX Setting Description Factory Default Auto This allows the port to auto detect the port type of the connected Ethernet device and change the port type accordingly MDI Choose MDI or MDIX if the connected Ethernet device has trouble auto negotiating for port type Auto MDIX Network The Network configuration allows users to configure both IPv4 and IPv6 parameters for management access over the network The IKS 6500 series supports both IPv4 and IPv6 and can be managed through either of these address types IPv4 The IPv4 settings include the switch s IP address and subnet mask as well as the IP address of the default gateway In addition input cells are provided for the IP addresses of a 1st and 2nd DNS server IPv6 IPv6 setting includes
80. igure IKS 6500 s email setup from the serial Telnet or web console enter your Mail Server IP Name IP address or name Account Name Account Password Retype New Password and the email address to which warning messages will be sent 3 Activate your settings and if necessary test the email After configuring and activating your IKS 6500 s Event Types and Email Setup you can use the Test Email function to see if your e mail addresses and mail server address have been properly configured 3 70 IKS 6500 Series User s Manual Featured Functions Event Type Email Warning Events Settings System Events Switch Cold Start C Switch Warm Start Power Transition On gt Off C Power Transition Of gt On C Config Change Cl Auth Failure C Comm Redundancy Topology Changed Port Events Pot ET IN raffic Overload Traffic Threshold Traffic Duration s 1 o 2 0 1 3 0 4 D 5 D 6 a rh 0 8 0 Activate Event Types can be divided into two basic groups System Events and Port Events System Events are related to the overall function of the switch whereas Port Events are related to the activity of a specific port System Events Warning e mail is sent when Switch Cold Start Power is cut off and then reconnected Switch Warm Start IKS 6500 is rebooted such as when netwo
81. interface via HTTPS SSL 1 Open Internet Explorer and type https IKS 6500 s IP address in the address field Press Enter to establish the connection ZJ https 192 168 127 253 home asp Microsoft Internet Explorer File Edit View Favorites Tools Help Back gt G A A QSeach yFavortes Media 4 G 4 SI a Address e https 192 168 127 253 home asp 2 Warning messages will pop out to warn the user that the security certificate was issued by a company they have not chosen to trust Security Alert x Information you exchange with this site cannot be viewed or changed by others However there is a problem with the site s security certificate A The security certificate was issued by a company you have not chosen to trust View the certificate to determine whether you want to trust the certifying authority iv The security certificate date is valid The security certificate has a valid name matching the name of the page you are trying to view Do you want to proceed i View Certificate 3 Select Yes to enter the IKS 6500 s web browser interface and access the web browser interface secured via HTTPS SSL 3 85 IKS 6500 Series User s Manual Featured Functions NOTE Moxa provides a Root CA certificate After installing this certificate into your PC or notebook you can access the web browser interface directly and will not see any warning messages again You may download the cer
82. iption A textual description of the neighbor device s interface Neighbor System Hostname of the neighbor device 3 80 IKS 6500 Series User s Manual Featured Functions Using Monitor You can monitor statistics in real time from IKS 6500 s web console and serial console Monitor by Switch Access the Monitor by selecting System from the left selection bar Monitor by System allows the user to view a graph that shows the combined data transmission activity of all of IKS 6500 s ports Click one of the four options Total Packets TX Packets RX Packets or Error Packets to view transmission activity of specific types of packets Recall that TX Packets are packets sent out from IKS 6500 RX Packets are packets received from connected devices and Error Packets are packets that did not pass TCP IP s error checking algorithm The Total Packets option displays a graph that combines TX RX and TX Error RX Error Packets activity The graph displays data transmission activity by showing Packets s i e packets per second or pps versus sec seconds In fact three curves are displayed on the same graph Uni cast packets in red color Multi cast packets in green color and Broad cast packets in blue color The graph is updated every few seconds allowing the user to analyze data transmission activity in real time Monitor System Total Packets System vw Total Packets Packetisec System Total Packets 10 68
83. isables the IKS 6500 to inspect the Enable Type of Service TOS bits in IPV4 frame to determine the priority of each frame Inspect COS Setting Description Factory Default Enable Disable This enables or disables the IKS 6500 to inspect the Enable 802 1p COS tag in the MAC frame to determine the priority of each frame Port Highest Priority Setting Description Factory Default Enable Disable Set the Port Priority of the ingress frames to High Disable queues NOTE The priority of an ingress frame is determined in order by 1 Port Highest Priority 2 Inspect TOS 3 Inspect CoS CoS Mapping Mapping Table of CoS Value and Priority Queues 0 Low Ni 1 Low x 2 Normal 3 Normal 4 Medium 5 Medium 6 High Y 7 High x Setting Description Factory Low Normal This maps different CoS values to 4 different egress 0 Low Medium High queues 1 Low 2 Normal 3 Normal 4 Medium 5 Medium 6 High 7 High 3 49 IKS 6500 Series User s Manual Featured Functions TOS DiffServ Mapping Mapping Table of ToS DSCP Value and Priority Queues CS FEE 7 EEN SC ES E 0x00 1 O Low Ox04 2 O Low 0x08 3 O Low Ox0C 4 O Low 0x10 5 O Low 0x14 6 O Low 0x18 7 O Low 0x1C 8 O Low w 0x20 9 1 Low 0x24 10 1 Low 0x28 11 1 Low Ox2C 12 1 Low 0x30 13 1 Low 0x34 14 4 Low 0x38 15 1 Low Ox3C 16
84. k visualization 3 79 IKS 6500 Series User s Manual Featured Functions LLDP Web Interface LLDP Settings General Settings LLOP Message Transmit Interval 30 5 3276Bsecs LLDP Table Neighbor ID Neighbor Port Neighbor Port Description Neighbor System From the switch s web interface users have the option of either enabling or disabling the LLDP as well as setting the LLDP transmit interval as shown in the figure below In addition users are able to view each switch s neighbor list which is reported by its network neighbors Most importantly enabling the LLDP function allows Moxa s MXview to automatically display the network s topology as well as system setup details such asVLAN and Trunking for the entire network LLDP Settings Enable LLDP Setting Description Factory Default Enable or Disable Enable or disable LLDP function Enable Value Setting Description Factory Default Numbers from To set the transmit interval of LLDP messages Unit is 30 seconds 5 32768 secs in seconds LLDT Table EER Neighbor Port Ee Neighbor ID Neighbor Port Neighbor System Port The port number that connects to the neighbor device Neighbor ID A unigue entity which identifies a neighbor device this is typically the MAC address Neighbor Port The port number of the neighbor device Neighbor Port Descr
85. l Unicast address can be configured by specifying the Global Unicast Prefix and using a EUI 64 interface ID in the low order 64 bits The host portion of the Global Unicast address is automatically generated using the modified EUI 64 form of the interface identifier Switch s MAC address None Link Local Address Setting Description Factory Default None The network portion of the Link Local address is FESO and the host portion of Link Local address is automatically generated using the modified EUI 64 from of the interface identifier Switch s MAC address FE80 EUI 64 form of the MAC address Neighbor Cache Setting Description Factory Default None The information in the neighbor cache that includes the neighboring node s IPv6 address the corresponding Link Layer address and the current state of the entry None 3 8 IKS 6500 Series User s Manual Featured Functions Time NOTE Daylight System Time Settings Current Time S B ex 04 00 04 Current Date H H ex 2002 11 13 Javliaht Saving Time Mont Neal a Start Date Ml E M sl End Date Mi y v Offset 0 v hour s System Up Time 0d15h10m16s Time Zone GMT Greenwich Mean Time Dublin Edinburgh Lisbon London 1st Time Server IP Name time nist gov 2nd Time Server IP Name Time Server Query Period 1600 sec The IKS 6500 has a time calibration function based on i
86. l share the traffic If port 1 and port 2 are both disconnected Turbo Ring will create the back up path within 300 ms The Turbo Ring Concept Moxa developed the proprietary Turbo Ring protocol to optimize communication redundancy and achieve a faster recovery time on the network The Turbo Ring and Turbo Ring V2 protocols designate one switch as the master of the network and then automatically block packets from traveling through any of the network s redundant loops In the event that one branch of the ring gets disconnected from the rest of the network the protocol automatically readjusts the ring so that the part of the network that was disconnected can reestablish contact with the rest of the network Initial setup for Turbo Ring or Turbo Ring V2 For each switch in the ring select any two ports as the redundant ports Connect redundant ports on neighboring switches to form the redundant ring The user does not need to manually assign the master with Turbo Ring or Turbo Ring V2 If no switch is assigned as the master the protocol automatically selects one of the switches to be the master The master is only used to identify which segment in the redundant ring acts as the backup path In the following subsections we explain how the redundant path is selected for rings configured for Turbo Ring and Turbo Ring V2 3 24 IKS 6500 Series User s Manual Featured Functions Determining the Redundant Path
87. nect to the web console and another console serial or Telnet at the same time However it is strongly recommended that you do NOT do so Following this advice will allow you to maintain better control over the IKS 6500 s configuration NOTE We recommend using PComm Terminal Emulator when opening the serial console This software can be downloaded free of charge from the Moxa website Before running PComm Terminal Emulator use an RJ45 to DB9 F or RJ45 to DB25 F cable to connect the IKS 6500 s console port to your PC s COM port generally COM1 or COM2 depending on how your system is set up After installing PComm Terminal Emulator open the IKS 6500 s serial console as follows 1 From the Windows desktop click Start gt Programs gt PComm Lite 1 3 gt Terminal Emulator a PComm Terminal Emulator JiWindows 2000 Server 2 Select Open under the Port Manager menu to open a new connection ES PComm Terminal Emulator Profile Port Manager Help a HERE 2 2 IKS 6500 Series User s Manual Getting Started 3 The Property window should open On the Communication Parameter tab for Ports select the COM port that is being used for the console connection Set the other fields as follows 115200 for Baud Rate 8 for Data Bits None for Parity and 1 for Stop Bits FT 100 Ja ocal Echo 2 3 IKS 6500 Series User s Manual Getting Started de In the terminal window the IKS 6500
88. nformation from an NTP server or user specified time and date Functions such as automatic warning emails can therefore include time and date stamp The IKS 6500 does not have a real time clock The user must update the Current Time and Current Date to set the initial time for IKS 6500 after each reboot especially when there is no NTP server on the LAN or Internet connection Current Time Setting Description Factory Default User specified time This allows configuration of the local time in None local 24 hour format Current Date Setting Description Factory Default User specified date This allows configuration of the local date in None yyyy mm dd format Saving Time The Daylight Saving Time settings are used to automatically offset the IKS 6500 s time forward according to national standards Start Date Setting Description Factory Default User specified date This specifies the date that Daylight Savings None Time begins 3 9 IKS 6500 Series User s Manual Featured Functions End Date Setting Description Factory Default User specified date This specifies the date that Daylight Savings None Time ends Offset Setting Description Factory Default User specified hour This specifies the number of hours that the time None should be offset forward during Daylight Savings Time System Up Time This indicates how long the IKS 6500
89. nt Present IP30 protection 440 x 44 x 342 5 mm 17 32 x 1 73 x 13 48 in 19 inch rack mounting 40 to 75 C 40 to 167 F Cold start of min 100 VAC at 40 C 40 to 85 C 40 to 185 F 5 to 95 non condensing UL60950 1 CSA C22 2 No 60950 1 EN60950 1 Pending NEMA TS2 DNV Pending GL Pending ABS Pending LR Pending NK Pending IKS 6500 Series User s Manual Specifications Rail Traffic ENSO121 4 EMI FCC Part 15 CISPR EN55022 Class A Hazardous Location UL cUL Class I Division 2 Groups A B C D Pending Warranty 5 years
90. nt has read access only The user account can only view the configuration but will not be able to make modifications Password Setting Account Name admin y Old Password Type Old Password New Password Retype Password A ATTENTION By default no password is assigned to the IKS 6500 s web Telnet and serial consoles If a password is assigned you will be required to enter the password when you open the serial console Telnet console or Web console Account Setting Description Factory Default Admin This account can modify the IKS 6500 s configuration admin User This account can only view the IKS 6500 s configurations Password Setting Description Factory Default Old password Enter the current password None max 16 characters New password Enter the desired new password Leave it blank if None Max 16 characters you want to remove the password Retype password Enter the desired new password again Leave it None Max 16 characters blank if you want to remove the password 3 3 IKS 6500 Series User s Manual Featured Functions Accessible IP The IKS 6500 uses an IP address based filtering method to control access Accessible IP List l Enable the accessible IP list Disable will allow all IP s connection EEN mel am s E c D O s foo foo ae je gt ee AS AA OE or 10 EE p 7 You may add or remove IP addresses to limit acces
91. o connected dewces a ao Dagse Use Ping command to test network wtegrty and merormg port for online data montonng MAC Adin Tibie ba ale Morter Mordor pot and network status MAC Address Table The complete bet of Ethernet MAC Addresses Evert Log Table The completo bet of alaem events Syg Send event not cation messages to sy sleg server Wwesser BSERVER ma wrd E dam pb MOS 1308 PET e Disabling Telnet and Browser Access If you are connecting the IKS 6500 to a public network but do not intend to manage it over the network we suggest disabling both the Telnet and web consoles This is done through the serial console by navigating to System Identification under Basic Settings Disable or enable the Telnet Console and Web Configuration as shown below MOXA EtherDevice Switch IKS 6524 Basic Settings Ea Password Accessible IP Port Network Time Backup Media Restart Factory default Upgrade Activate Main menu System Identification ol revious menu Enter Switch Name Managed Redundant Switch 00000 Switch Location Switch Location Switch Description Maintainer Contact Info Serial NO 00000 Firmware Version v1 0 MAC Address 00 00 00 00 00 02 Telnet Console Enable Web Configuration http or https 2 9 3 Featured Functions This chapter explains how to access IKS 6500 s various configuration monitoring and administration functions These functions can be accessed by serial Telnet o
92. of the web console and will be included in alarm emails You can set the System Identification items to make it easier to identify different switches that are connected to your network System Identification Switch Name Managed Redundant Switch 00000 Switch Location Switch Location Switch Description Maintainer Contact Info Web Configuration http or https Switch Name Setting Description Factory Default Max 30 This option is useful for differentiating between Managed Redundant Switch characters the roles or applications of different units Serial no of this switch Example Factory Switch 1 Switch Location Setting Description Factory Default Max 80 This option is useful for differentiating between Switch Location characters the locations of different units Example production line 1 Switch Description Setting Description Factory Default Max 30 This option is useful for recording a more None characters detailed description of the unit Maintainer Contact Info Setting Description Factory Default Max 30 This option is useful for providing information None characters about who is responsible for maintaining this unit and how to contact this person IKS 6500 Series User s Manual Featured Functions Password The IKS 6500 provides two levels of configuration access The admin account has read write access of all configuration parameters and the user accou
93. one RSTP IEEE 802 1w 1D This selects the RSTP protocol None Bridge Priority Setting Description Factory Default Numerical value selected This specifies the IKS 6500 s bridge priority A 32768 by user lower number means a higher priority which means a greater chance of being established as the root of the Spanning Tree topology 3 43 IKS 6500 Series User s Manual Featured Functions NOTE Forwarding Delay Setting Description Factory Default Numerical value input by This specifies the amount of time this device 15 sec user will wait before checking to see if it should change to a different state Hello Time sec Setting Description Factory Default Numerical value input by This specifies the time interval between hello 2 user messages broadcast by the root of the Spanning Tree topology The hello message is used to check if the topology is healthy Max Age sec Setting Description Factory Default Numerical value input by This specifies the amount of time to wait fora 20 user hello message from the root before the IKS 6500 will reconfigure itself as a root When two or more devices on the network are recognized as a root the devices will renegotiate to set up a new Spanning Tree topology Enable STP per Port Setting Description Factory Default Enable Disable This includes the selected port as a node on the Disabled Spanning
94. or network traffic STP uses a loop detection process to e Locate and then disable less efficient paths i e paths that have a lower bandwidth e Enable one of the less efficient paths if the most efficient path fails The figure below shows a network made up of three LANs separated by three bridges Each segment uses at most two paths to communicate with the other segments Since this configuration can give rise to loops the network will overload if STP is not enabled LAN 1 If STP is enabled it will detect duplicate paths and prevent or block one of them from forwarding traffic In the following example STP determined that traffic from LAN segment 2 to LAN segment 1 should flow through Bridges C and A because this path has a greater bandwidth and is therefore more efficient LAN 1 3 38 IKS 6500 Series User s Manual Featured Functions What happens if a link failure is detected As shown in next figure the STP process reconfigures the network so that traffic from LAN segment 2 flows through Bridge B LAN 1 STP will determine which path between each bridged segment is most efficient and then assign a specific reference point on the network When the most efficient path has been identified the other paths are blocked In the above 3 figures STP first determined that the path through Bridge C was the most efficient and as a result blocked the path through Bridge B After the failure of Bridge C
95. ork are Moxa layer 2 switches then only one layer 2 switch will act as Querier 3 61 IKS 6500 Series User s Manual Featured Functions IGMP Table The IKS 6500 displays the current active IGMP groups that were detected Current Active IGMP Groups Active IGMP Groups 1 23 Yes 239 255 265 250 01 00 5E 7F FF FA 2 The information includes VID Auto learned Multicast Router Port Static Multicast Router Port Querier Connected Port and the IP and MAC addresses of active IGMP groups Add Static Multicast MAC If required the IKS 6500 also supports adding multicast groups manually Static Multicast MAC Address Current Static Multicast MAC Address List CEM dex IMAC Address Add New Static Multicast MAC Address to the List MAC Address E L Join Port fi 2 03 4 5 6 7 8 9 110 11 012 13 14 15 16 17 18 19 20 21 22 123 24 Add New Static Multicast Address to the List Setting Description Factory Default MAC Address Input the multicast MAC address of this host None MAC Address Setting Description Factory Default Integer Input the number of the VLAN that the host with this None MAC address belongs to Join Port Setting Description Factory Default Select Deselect Checkmark the appropriate check boxes to select the None join ports for this multicast group 3 62 IKS 6500 Series User
96. ort None Coupling Control Port Setting Description Factory Default Coupling Control Port This specifies which port on the IKS 6500 None will be used as the coupling control port 3 30 IKS 6500 Series User s Manual Featured Functions Configuring Turbo Ring V2 Communication Redundancy Current Status Now Active Hone Ring 1 Ring 2 Status Status Master Slave Master Slave 1st Ring Port Status 1st Ring Port Status 2nd Ring Port Status 2nd Ring Port Status Coupling Mode Coupling Port status Primary Port Backup Port Settings Redundancy Protocol Turbo Ring V2 Mi Enable Ring 1 Enable Ring 2 Set as Master Setas Master Redundant Ports 1st Port 1 amp Redundant Ports 1st Port 2nd Port 2 Y 2nd Port O Enable Ring Coupling Coupling Mode Primary Port Backup Port NOTE When using a dual ring architecture users must complete configuration for both Ring 1 and Ring 2 The status of both rings will appear under Current Status Current Status Items Now Active This shows which communication protocol is in use Turbo Ring Turbo Ring V2 RSTP or none Ring 1 2 Status This shows Healthy if the ring is operating normally and shows Break if the ring s backup link is active Ring 1 2 Master Slave This indicates whether or not the IKS 6500 is the master of the Turbo Ring This field appears only when selected to operate in Turbo Ring or Turbo Ring V2 mode NOTE The user doe
97. orts saving your configuration or log file to a remote TFTP server or local host Other IKS 6500 switches can also load the configuration at a later time The IKS 6500 also supports loading firmware or configuration files from the TFTP server or a local host Update System Files by TFTP TFTP Server IP Name Configuration Files Path and Name Firmware Files Path and Name Log Files Path and Name 3 13 IKS 6500 Series User s Manual Featured Functions TFTP Server IP Name Setting Description Factory Default IP address of TFTP This specifies the IP address or name of the remote None server TFTP server This must be specified before downloading or uploading files Configuration Files Path and Name Setting Description Factory Default Max 40 characters This specifies the path and file name of the None IKS 6500 s configuration file on the TFTP server Firmware Files Path and Name Setting Description Factory Default Max 40 characters This specifies the path and file name of the None IKS 6500 s firmware file Log Files Path and Name Setting Description Factory Default Max 40 characters This specifies the path and file name of the None IKS 6500 s log file After setting the desired paths and file names Click Download to download the prepared file from the remote TFTP server or click Upload to upload the desired file to the remote TFTP server System File Updat
98. p for Class of Service IEEE 802 1X for Authentication IEEE 802 3ad for Port Trunk with LACP IEEE 802 3x flow control back pressure flow control IGMP V1 V2 device GMRP GVRP SNMP V1 V2c V3 DHCP Server Client DHCP Option 66 67 82 BootP TFTP SNTP SMTP RARP RMON HTTP HTTPS Telnet SSH Syslog LLDP Modbus TCP IPv6 IEEE 1588 PTP MIB IT Ethernet like MIB P BRIDGE MIB Q BRIDGE MIB Bridge MIB RSTP MIB RMON MIB Group 1 2 3 9 4 64 VID 1 to 4094 256 IKS 6500 Series User s Manual Specifications Interface RJ45 Ports Fiber Ports Console System LED Indicators Mode LED Indicators Power Input Voltage Power Consumption Overload Current Protection Reverse Polarity Protection Mechanical Casing Dimensions WxHxD Installation Environmental Operating Temp Storage Temp Ambient Relative Humidity Regulatory Approvals Safety Road Traffic Maritime 10 100BaseT X and 10 100 1000BaseT X auto negotiation speed 100BaseSFP slot or 1000BaseSPFP slot RS 232 RJ45 STAT PWR1 PWR2 FAULT MSTR HEAD CPLR TAIL LNK ACT FDX HDX RING PORT COUPLER PORT SPEED 110 220 VAC 85 to 264 V IKS 6524 F HV T 333 222mA 110 230VAC IKS 6524 F HV HV T 402 324mA 110 230VAC IKS 6524 8SFP F HV T 501 295mA 110 230VAC IKS 6524 8SFP F HV HV T 555 390mA 110 230VAC IKS 6526 2GTXSFP F HV T 398 254mA 110 230VAC IKS 6526 2GTXSFP F HV HV T 465 350mA 110 230VAC Prese
99. pace below The devices configuration utility should include a setup page that allows you to choose an option similar to Obtain an IP address automatically For example Windows TCP IP Properties window is shown at the right Although your device s configuration utility may look quite a bit different this figure should give you some idea of what to look for You also need to decide which of IKS 6500 s ports your Ethernet enabled devices will be connected to You will need to set up each of these ports separately as described in the following step STEP 2 Configure IKS 6500 s Set device IP function either from the Console utility or from the Web Browser interface In either case you simply need to enter the Desired IP for each port that needs to be configured STEP 3 Be sure to activate your settings before exiting e When using the Web Browser interface activate by clicking on the Activate button e When using the Console utility activate by first highlighting the Activate menu option and then press Enter You should receive the Set device IP settings are now active Press any key to continue message 3 74 IKS 6500 Series User s Manual Featured Functions Configuring Set Device IP Automatic Set Device IP by DHCP BootP RARP Port Device s current IP Active function Desired IP address NA NA es NA m NA se NA NA ss NA Z NA vs NA m NA m NA F 3 Activate OO AI
100. r web console The serial console can be used if you do not know IKS 6500 s IP address and requires that you connect the IKS 6500 to a PC COM port The Telnet and web consoles can be opened over an Ethernet LAN or the Internet The web console is the most user friendly way to configure IKS 6500 In this chapter we use the web console interface to introduce the functions There are only a few differences between the web console serial console and Telnet console The following topics are covered in this chapter Configuring Basic Settings Using Port Trunking Configuring SNMP Using Communication Redundancy The Turbo Chain Concept sing Traffic Prioritization sing Virtual LAN sing Multicast Filtering The Concept of Multicast Filtering DOLODODODDO Add Static Multicast MAC Configuring GMRP GMRP Table Using Bandwidth Management Configuring Bandwidth Management Using Port Access Control Using Auto Warning Using Line Swap Fast Recovery Using Set Device IP sing Diagnosis sing Monitor sing the MAC Address Table sing Event Log sing Syslog sing HTTPS SSL U U U gt gt Configuring IGMP Snooping gt gt gt PDPEDODODODODOLDO Ce Ce EF IKS 6500 Series User s Manual Featured Functions Configuring Basic Settings Basic Settings includes the most common settings required by administrators to maintain and control the IKS 6500 System Identification System Identification items are displayed at the top
101. remained up since the last cold start The up time is indicated in seconds Time Zone Setting Description Factory Default Time zone This specifies the time zone which is used to GMT Greenwich determine the local time offset from GMT Mean Time Greenwich Mean Time NOTE Changing the time zone will automatically correct the current time Make sure to set the time zone before setting the time Time Server IP Name Setting Description Factory Default IP address or name of time This is the IP or domain address e g server 192 168 1 1 time stdtime gov tw or time nist gov None OE ot The IKS 6500 will try to locate the secondary A NTP server if the first NTP server fails to secondary time server connect Time Server Query Period Setting Description Factory Default Query period This parameter determines how frequently the 600 seconds time is updated from the NTP server 3 10 IKS 6500 Series User s Manual Featured Functions IEEE 1588 PTP The following information is taken from the NIST website at http ieee1588 nist gov intro htm Time measurement can be accomplished using the IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems IEEE 1588 2008 to synchronize real time clocks incorporated within each component of the electrical power system for power automation applications IEEE 1588
102. ries User s Manual Featured Functions Multicast Filtering Multicast filtering ensures that only end stations that have joined certain groups receive multicast traffic With multicast filtering network devices only forward multicast traffic to the ports that are connected to registered end stations The following two figures illustrate how a network behaves without multicast filtering and with multicast filtering Network without multicast filtering Group 1 Multicast Stream Group 2 Multicast Stream IGMP Group2 IGMP Group1 IGMP Group2 IGMP Group1 All hosts receive the multicast traffic even if they don t need it Network with multicast filterin Group 1 Multicast Stream Group 2 Multicast Stream IGMP Group2 IGMP Group1 IGMP Group2 IGMP Group1 Hosts only receive dedicated traffic from other hosts belonging to the same group 3 58 IKS 6500 Series User s Manual Featured Functions Multicast Filtering and Moxa s Industrial Rackmount switches NOTE The IKS 6500 has three ways to achieve multicast filtering IGMP Internet Group Management Protocol Snooping GMRP GARP Multicast Registration Protocol and adding a static multicast MAC manually to filter multicast traffic automatically IGMP Internet Group Management Protocol Snooping Mode Snooping Mode allows your switch to forward multicast packets only to the appropriate ports The switch snoops on exchanges between hosts and an I
103. ries to access 3 76 IKS 6500 Series User s Manual Featured Functions 4 Server Setting Description Factory Default IP address for the This assigns the IP address of the 4th DHCP server that None 4th DHCP server the switch tries to access DHCP Option 82 Enable Option82 Setting Description Factory Default Enable or Disable Enable or disable DHCP Option 82 function Disable Type Setting Description Factory Default IP Use switch IP address as the remote ID sub option IP MAC Use switch MAC address as the remote ID sub option IP Client ID Use the combination of switch MAC address and IP IP address as the remote ID sub option Other Use the user defined value as the remote ID sub option IP Value Setting Description Factory Default Displays the value which you ve set Max 12 If you set the type as Other you will have to fill it switch IP address characters Display Setting Description Factory Default The actual hexdecimal value set at the DHCP server for COA87FFD the Remote ID This value is automatically generated according to the Value field Users can not modify it DHCP Function Table Enable Setting Description Factory Default Enable or Disable Enable or disable DHCP Option 82 function for this Disable port 3 77 IKS 6500 Series User s Manual Featured Functions Using Diagnosis The
104. ring the Coupling Port Primary on Switch B and the Coupling Port Backup on Switch A only You do not need to set up a coupling control port so Turbo Ring V2 does not require a coupling control line The Coupling Port Backup on Switch A is used for the backup path and connects directly to a network port on Switch C The Coupling Port Primary on Switch B monitors the status of the main path and connects directly to an extra network port on Switch D With ring coupling established Switch A can activate the backup path as soon as 1t detects a problem with the main path Ring coupling only needs to be enabled on one of the switches serving as the ring coupler The coupler must assign separate ports for the two Turbo Ring ports and the coupling port You do not need to use the same IKS series Ethernet switch for both ring coupling and ring master 3 27 IKS 6500 Series User s Manual Featured Functions Dual Ring Configuration applies only to Turbo Ring V2 The dual ring option in which two adjacent rings share one switch provides another ring coupling configuration This type of configuration is ideal for applications that have inherent cabling difficulties Master Master Dual Homing Configuration for Turbo Ring V2 Dual homing is only supported with Turbo Ring V2 and is used to connect two networks through a single Ethernet switch The primary path is the operating connection and the backup path is a
105. rity Supported SNMP security modes and levels are shown in the following table Select the security mode and level that will be used to communicate between the SNMP agent and manager Protocol UI Setting Authentication Encryption Method Version TUNE Community This uses a community string Read No Hott SNMP V1 Community string match for authentication V2c V1 V2c P E case Write Read ommunity No This uses a community string string match for authentication Community No Auth No No This uses an account with admin or user to access objects This provides authentication based Authentication on HMAC MDS or HMAC SHA MDS or SHA based on MD5 No algorithms 8 character passwords or SHA are the minimum requirement for SNMP V3 authentication This provides authentication based on HMAC MD5 or HMAC SHA Authentication Data algorithms and data encryption MDS or SHA based on MDS encryption key 8 character passwords and a or SHA key data encryption key are the minimum requirements for authentication and encryption These parameters are configured on the SNMP page A more detailed explanation of each parameter is given below the figure 3 19 IKS 6500 Series User s Manual Featured Functions SNMP SNMP Read Write Settings SNMP Versions V1 V2c N V1 M2c Read Community public V1 M2c Write Read Community private Admin Auth Type Admin Data Encryption Key User Auth T
106. rk parameters are changed IP address subnet mask etc Authentication Failure Comm Redundancy Topology If any Spanning Tree Protocol switches have changed Changed their position applies only to the root of the tree If the Master of the Turbo Ring has changed or the backup path is activated Port Events Warning e mail is sent when Link ON The port is connected to another device Link OFF The port is disconnected e g the cable is pulled out or the opposing device shuts down The port s traffic surpasses the Traffic Threshold for did that port provided this item is Enabled Traffic Threshold Enter a nonzero number if the port s Traffic Overload item is Enabled A Traffic Overload warning is sent every Traffic Duration seconds if the average Traffic Threshold is surpassed during that time period Traffic Duration sec 3 71 IKS 6500 Series User s Manual Featured Functions NOTE The Traffic Overload Traffic Threshold and Traffic Duration sec Port Event items are related If you Enable the Traffic Overload event then be sure to enter a nonzero Traffic Threshold percentage as well as a Traffic Duration between 1 and 300 seconds NOTE Warning e mail messages will have sender given in the form Managed Redundant Switch 00000 Switch_Location where Managed Redundant Switch 00000 is the default Switch Name 00000 is IKS 6500 s serial number and Switch_Location is the default Server Lo
107. s Manual Featured Functions LAN Segment 1 Port 1 Root Port Bridge B Port 2 Designated Bridge Port Port 1 Root Port Cost 100 Bridge X Port 2 Blocked Port Port 1 Designated Bridge Port Bridge A Port 2 Root Bridge LAN Segment 2 Port 1 Port 1 Root Port Root Port Bridge C Bridge Y Port 2 Port 2 Designated Blocked Port Bridge Port LAN Segment 3 e Bridge A has been selected as the Root Bridge since it was determined to have the lowest Bridge Identifier on the network e Since Bridge A is the Root Bridge it is also the Designated Bridge for LAN segment 1 Port 1 on Bridge A is selected as the Designated Bridge Port for LAN Segment 1 e Ports 1 of Bridges B C X and Y are all Root Ports sine they are nearest to the Root Bridge and therefore have the most efficient path e Bridges B and X offer the same Root Path Cost for LAN segment 2 However Bridge B was selected as the Designated Bridge for that segment since it has a lower Bridge Identifier Port 2 on Bridge B is selected as the Designated Bridge Port for LAN Segment 2 e Bridge C is the Designated Bridge for LAN segment 3 because it has the lowest Root Path Cost for LAN Segment 3 e The route through Bridges C and B costs 200 C to B 100 B to A 100 e The route through Bridges Y and B costs 300 Y to B 200 B to A 100 e The Designated Bridge Port for LAN Segment 3
108. s allows the admin account to access No Auth i od No objects without authentication Authentication will be based on the MD5 HMAC MD5 algorithms 8 character fie No Auth passwords are the minimum requirement for authentication Authentication will be based on the SHA HMAC SHA algorithms 8 character 5 No Auth passwords are the minimum requirement for authentication Admin Data Encryption Key for SNMP V1 V2c V3 and V3 only Setting Description Factory Default This enables data encryption using the Enable specified data encryption key between 8 No and 30 characters This specifies that data will not be Disable No encrypted User Auth Type for SNMP V1 V2c V3 and V3 only Setting Description Factory Default This allows the admin account and user No Auth account to access objects without No authentication Authentication will be based on the MD5 Auth HMAC MD5 algorithms 8 character No passwords are the minimum requirement for authentication Authentication will be based on the SHA Auth HMAC SHA algorithms 8 character No passwords are the minimum requirement for authentication User Data Encryption Key for SNMP V1 V2c V3 and V3 only Setting Description Factory Default This enables data encryption using the Enable specified data encryption key between 8 No and 30 characters Disable No data encryption No 3 21
109. s in the destination address field of the packet s IP header Benefits of Multicast The benefits of using IP multicast are that it e Uses the most efficient sensible method to deliver the same information to many receivers with only one transmission e Reduces the load on the source for example a server since it will not need to produce several copies of the same data e Makes efficient use of network bandwidth and scales well as the number of multicast group members increases e Works with other IP protocols and services such as Quality of Service QoS Multicast transmission makes more sense and is more efficient than unicast transmission for some applications For example multicasts are often used for video conferencing since high volumes of traffic must be sent to several end stations at the same time but where broadcasting the traffic to all end stations would cause a substantial reduction in network performance Furthermore several industrial automation protocols such as Allen Bradley EtherNet IP Siemens Profibus and Foundation Fieldbus HSE High Speed Ethernet use multicast These industrial Ethernet protocols use publisher subscriber communications models by multicasting packets that could flood a network with heavy traffic IGMP Snooping is used to prune multicast traffic so that it travels only to those end destinations that require the traffic reducing the amount of traffic on the Ethernet LAN 3 57 IKS 6500 Se
110. s not need to assign the master to use Turbo Ring or Turbo Ring V2 If no master is assigned the Turbo Ring protocol will automatically assign master status to one of the IKS series Ethernet switches in the ring The master is only used to determine which segment serves as the backup path 3 31 IKS 6500 Series User s Manual Featured Functions Ring 1 2 Ist Ring Port Status Ring 1 2 2nd Ring Port Status The Ports Status indicators show Forwarding for normal transmission Blocking if this port is connected to a backup path and the path is blocked and Link down if there is no connection Coupling Mode This indicates either None Dual Homing or Ring Coupling Coupling Coupling Port status This indicates either Primary or Backup Settings Items Redundancy Protocol Setting Description Factory Default Turbo Ring This selects the Turbo Ring protocol Turbo Ring V2 This selects the Turbo Ring V2 protocol None RSTP IEFE 802 1w 1D This selects the RSTP protocol None This disables ring redundancy Enable Ring 1 Setting Description Factory Default Enabled This enables Ring 1 Not checked Disabled This disables Ring 1 Enable Ring 2 Setting Description Factory Default Enabled This enables Ring 2 Not checked Disabled This disables Ring 2 Both Ring 1 and Ring 2 must be enabled when using the dual ring architecture Set as Master
111. s to the IKS 6500 When the accessible IP list 1s enabled only addresses on the list will be allowed access to the IKS 6500 Each IP address and netmask entry can be tailored for different situations e Grant access to one host with a specific IP address For example enter IP address 192 168 1 1 with netmask 255 255 255 255 to allow access to 192 168 1 1 only e Grant access to any host on a specific subnetwork For example enter IP address 192 168 1 0 with netmask 255 255 255 0 to allow access to all IPs on the subnet defined by this IP address subnet mask combination e Grant acces to all hosts Make sure the accessible IP list is not enabled Remove the checkmark from Enable the accessible IP list The following table shows additional configuration examples Hosts That Need Access Input Format Any host Disable 192 168 1 120 192 168 1 120 255 255 255 255 192 168 1 1 to 192 168 1 254 192 168 1 0 255 255 255 0 192 168 0 1 to 192 168 255 254 192 168 0 0 255 255 0 0 192 168 1 1 to 192 168 1 126 192 168 1 0 255 255 255 128 192 168 1 129 to 192 168 1 254 192 168 1 128 255 255 255 128 3 4 IKS 6500 Series User s Manual Featured Functions Port Port settings are included to give the user control over port access port transmission speed flow control and port type MDI or MDIX Port Settings
112. settings before exiting e When using the Web Browser interface activate by clicking on the Activate button e When using the Console utility activate by first highlighting the Activate menu option and then press Enter You should receive the Mirror port settings are now active Press any key to continue message 3 78 IKS 6500 Series User s Manual Featured Functions Ping Use Ping Command to test Network Integrity IP address Name The Ping function uses the ping command to give users a simple but powerful tool for troubleshooting network problems The function s most unique feature is that even though the ping command is entered from the user s PC keyboard the actual ping command originates from IKS 6500 itself In this way the user can essentially sit on top of IKS 6500 and send ping commands out through its ports To use the Ping function type in the desired IP address and then press Enter from the Console utility or click Ping when using the Web Browser interface LLDP Function Overview Defined by IEEE 802 11AB LLDP is an OSI Layer 2 Protocol that standardizes the methodology of self identity advertisement It allows each networking device e g a Moxa managed switch to periodically inform its neighbors about its self information and configurations As a result all of the devices would have knowledge about each other and through SNMP this knowledge can be transferred to Moxa s MXview for auto topology and networ
113. sical connections a limitation of traditional network design As an example with VLANs you can segment your network according to e Departmental groups You could have one VLAN for the marketing department another for the finance department and another for the product development department e Hierarchical groups You could have one VLAN for directors another for managers and another for general staff e Usage groups You could have one VLAN for email users and another for multimedia users 3 50 IKS 6500 Series User s Manual Featured Functions Switch A 1 2 3 gt 3 6 8 Sackbone connects muriple swiicnes Benefits of VLANs The main benefit of VLANs is that they provide a network segmentation system that is far more flexible than traditional networks Using VLANs also provides you with three other benefits VLANS ease the relocation of devices on networks With traditional networks network administrators spend much of their time dealing with moves and changes If users move to a different subnetwork the addresses of each host must be updated manually With a VLAN setup if a host on VLAN Marketing for example is moved to a port in another part of the network and retains its original subnet membership you only need to specify that the new port is on VLAN Marketing You do not need to carry out any re cabling VLANs provide extra security Devices within each VLAN can only communicate with other devices on the same V
114. signed to a trunk group Port Trunking Settings Trunk Group Trk1 sy Trunk Type Static Member Ports Up Available Ports mh Yes 100TX RJ45 Auto Disable O 2 Yes 100TX RJ45 Auto Disable j O 3 Yes 100TX RJ45 Auto Disable O 4 Yes 100TX RJ45 Auto Disable E Step 1 Select the desired Trunk Group Trk1 Trk2 Trk3 Step 2 Select the Trunk Type Static or LACP Step 3 Select the desired ports under Available Ports and click Up to add to the Trunk Group Step 4 Select the desired ports under Member Ports and click Down to remove from the group Trunk Group Maximum of 3 trunk groups Setting Description Factory Default Trk1 Trk2 Trk3 This specifies the current trunk group Trk1 3 17 IKS 6500 Series User s Manual Featured Functions Trunk Type Setting Description Factory Default Static This selects Moxa s proprietary trunking protocol Static LACP This selects LACP IEEE 802 3ad Link Static Aggregation Control Protocol Available Ports Member Ports Setting Description Factory Default Member available ports This lists the ports in the current trunk group and the N A ports that are available to be added Check box This selects the port to be added or removed from Unchecked the group Port This is how each port is identified N A Port description This displays the media type for each port N A Name This displays the specified n
115. ter must be used The IKS 6500 supports two types of VLAN port settings e Access Port The port connects to a single device that is not tagged The user must define the default port PVID that assigns which VLAN the device belongs to Once the ingress packet of this Access Port egresses to another Trunk Port the port needs all packets to carry tag information IKS 6500 will insert this PVID into this packet to help the next 802 1Q VLAN switch recognize it e Trunk Port The port connects to a LAN that consists of untagged devices tagged devices and or switches and hubs In general the traffic of the Trunk Port must have a Tag Users can also assign PVID to a Trunk Port The untagged packet on the Trunk Port will be assigned the port default PVID as its VID 3 52 IKS 6500 Series User s Manual Featured Functions The following section illustrates how to use these ports to set up different applications Sample Applications of VLANs using IKS 6500 Device TE Port 7 Access VLAN 4 Untagged Device Device A Port PVID 4 VLAN 5 Untagged Device Switch A Switch B Port 3 Trunk Port Port 5 Access o PVID 1 Port PVID3 Device H UIT Es NN mal o UITER ort 1 Access 7 Port 6 Access Port 2 Trunk Port PVID 2 Port PVID 5 Fixed VLAN Tagged 3 4 AN PVID 5 VLAN 3 Untagged Device Port 4 Access Port PVID 2 Wy Device G HUB VLAN 5 Untagged Device VLAN 2 Untagged Device Device B ALTA Device F VLAN 2
116. the system 3 15 IKS 6500 Series User s Manual Featured Functions Factory Default NOTE Reset to Factory Default This function will reset all settings to their factory default values Be aware that previous settings will be lost This function provides users with a quick way of restoring the IKS 6500 s configuration to factory defaults This function is available in the serial Telnet and web consoles After restoring the factory default configuration you will need to use the default network settings to re establish the web or Telnet console connection with the IKS 6500 Using Port Trunking Link aggregation involves grouping links to into a link aggregation group A MAC client can treat link aggregation groups as if they were a single link The IKS 6500 s port trunking feature allows devices to communicate by aggregating up to 3 trunk groups with a maximum of 8 ports for each group If one of the 8 ports fails the other seven ports will automatically provide backup and share the traffic Port trunking can be used to combine up to 8 ports between two IKS 6500 switches If all ports on both switch units are configured as 100BaseTX and they are operating in full duplex the potential bandwidth of the connection will be 1600 Mbps The Port Trunking Concept Moxa has developed a proprietary port trunking protocol that provides the following benefits e More flexibility in setting up your network connections since th
117. tificate from the IKS 6500 s CD ROM 3 86 A MIB Groups The IKS 6500 comes with built in SNMP Simple Network Management Protocol agent software that supports cold warm start trap line up down trap and RFC 1213 MIB IL The standard MIB groups that the IKS 6500 supports are as follows MIB II 1 System Group sysORTable MIB 11 2 Interfaces Group ifTable MIB 11 4 IP Group ipAddrTable ipNetToMediaTable IpGroup IpBasicStatsGroup IpStatsGroup MIB II 5 ICMP Group IcmpGroup IcmpInputStatus IcmpOutputStats MIB II 6 TCP Group tcpConnTable TcpGroup TcpStats MIB 11 7 UDP Group udpTable UdpStats IKS 6500 Series User s Manual MIB Groups MIB 11 10 Transmission Group dot3 dot3StatsTable MIB 11 11 SNMP Group SnmpBasicGroup SnmplnputStats SnmpOutputStats MIB 11 17 dotidBridge Group dotldBase dotldBasePortTable dotidStp dot1dStpPortTable dotldTp dotldTpFdbTable dotldTpPortTable dot1dTpHCPortTable dot1dTpPortOverflowTable pBridgeMIB dot1dExtBase dot1dPriority dotldGarp qBridgeMIB dotlqBase dotlqTp dotlqFdbTable dotlqTpPortTable dotlqTpGroupTable dot1qForwardUnregisteredTable dotlqStatic dot1qStaticUnicastTable dot1 qStaticMulticastTable dotlqVlan dotiqVlanCurrentTable dotlqVlanStaticTable dotlqPortVlanTable A 2 IKS 6500 Series User s Manual MIB Groups The IKS 6500 Series also provides a private MIB file located in the file Moxa IKS 6524 MIB my for IKS 6524 models
118. time period of no activity has elapsed Re Auth Period Setting Description Factory Default Numerical Specify how frequently the end stations need to reenter 3600 60 to 65535 sec usernames and passwords in order to stay connected 802 1X Setting Description Factory Default Enable Disable Click the checkbox under the 802 1X column to enable Disable IEEE 802 1X for one or more ports All end stations must enter usernames and passwords before access to these ports is allowed 802 1X Re Authentication The IKS 6500 can force connected devices to be re authorized manually 802 1X Re Authentication Pot EY 4 C Re Authenticate 5 ORe Authenticate 6 Re Authenticate 802 1X Re Authentication Setting Description Factory Default Enable Disable This enables or disables 802 1 X Re Authentication Disable 3 68 IKS 6500 Series User s Manual Featured Functions Local User Database Setup When setting the Local User Database as the authentication database set the database first Local User Database Setup Current Local Database W Select All Index User Name Add New User User Name Password Description Local User Database Setup Setting Description Factory Default User Name User Name for Local User Database None Max 30 characters Password Password for Local User Database None Max 16 characters Description Description for Local User Database None Max 30 characters
119. tion marking scheme which is an enhancement to IEEE Std 802 1D enables Quality of Service on the LAN Traffic service levels are defined in the IEEE 802 10 4 byte tag which is used to carry VLAN identification as well as IEEE 802 1p priority information The 4 byte tag immediately follows the destination MAC address and Source MAC address The IEEE Std 802 1D 1998 Edition priority marking scheme assigns an IEEE 802 1p priority level between 0 and 7 to each frame This determines the level of service that this type of traffic should receive Refer to the table below for an example of how different traffic types can be mapped to the eight IEEE 802 1p priority levels IEEE 802 1p Priority Level IEEE 802 1D Traffic Type 0 Best Effort default 1 Background 2 Standard spare 3 Excellent Effort business critical 4 Controlled Load streaming multimedia 5 Video interactive media less than 100 milliseconds of latency and jitter 6 Voice interactive voice less than 10 milliseconds of latency and jitter 7 Network Control Reserved traffic Even though the IEEE 802 1D standard is the most widely used prioritization scheme in the LAN environment it still has some restrictions e It requires an additional 4 byte tag in the frame which is normally optional in Ethernet networks Without this tag the scheme cannot work e The tag is part of the IEEE 802 1Q header so to implement QoS at layer 2 the
120. to the information herein to correct such errors and these changes are incorporated into new editions of the publication Technical Support Contact Information WWw moxa com support Moxa Americas Toll free 1 888 669 2872 Tel 1 714 528 6777 Fax 1 714 528 6778 Moxa Europe Tel 49 89 3 70 03 99 0 Fax 49 89 3 70 03 99 99 Moxa China Shanghai office Toll free 800 820 5036 Tel 86 21 5258 9955 Fax 86 10 6872 3958 Moxa Asia Pacific Tel 886 2 8919 1230 Fax 886 2 8919 1231 Chapter 1 Chapter 2 Chapter 3 Table of Contents INTOduUCION ss is ista 1 1 OVA Wisin iii is OR aid 1 2 Package Checklist RE GE EE RE NEGE ER EE EE 1 2 Software oe RR ooo 1 2 G tting Started cnica ve N ED ETA N Ge lili IE 2 1 Serial Console Configuration 115200 None 8 1 VT100 ee ee se RR RR RA GR 2 2 Configuration by Telnet Console ie sesse see sek ea oeaan Ge Re GR o aea SE Ge Ge nano Ge Re eke ee 2 5 Configuration by Web BTOWSET iese ese se se ek Ge ee GR ee GRA Ge Ge Re GR Re GRA Ge RA Ge RA Ge Re Ge ee 2 7 Disabling Telnet and Browser ACCESS 0 scessecsseescsseseceseeecesecaeesecneescesecnersecsaeeeesaecateneeneeats 2 9 Featured FUNCIONS iii it 3 1 Configuring Basie Sete iii 3 2 System Identifica ss EED KERE ESE eu sion 3 2 PassWord EER TEER EE AI HE OE EE EE Ascites 3 3 TIER EE EE EE EE EE OE EE 3 4 Pot iran 3 5 NetWork NN 3 6 Bin AR EE AE KOEK HEES RE AE a Ra 3 9 Daylight Saving dB ER EE HE EG 3 9
121. trators full control of their limited bandwidth to prevent undesirable effects caused by unpredictable faults Configuring Bandwidth Management Broadcast Storm Protection Broadcast Storm Protection Broadcast Storm Protection O Include Multicast Packet Include Unknown Multicast and Unknown Unicast Packet Setting Description Factory Default Enable Disable This enables or disables Broadcast Storm Protection for Enable unknown broadcast packet globally This enables or disables Broadcast Storm Protection for Disable unknown multicast packets globally 3 64 IKS 6500 Series User s Manual Featured Functions Traffic Rate Limiting Settings Traffic Rate Limiting Settings Port 1 Not Limited 2 Not Limited E 4 Not Limited fl 5 Not Limited Not Limited Y 7 Not Limited Y o Not Limited w E Not Limited 10 Not Limited 11 Not Limited fil 12 Not Limited Bl 13 Not Limited i Not Limited Y 15 Not Limited i Not Limited vi 17 Not Limited i Not ited 19 Not Limited Ingress Setting Description Factory Default Ingress rate Select the ingress rate for all packets from the following N A options not limited 3 5 10 15 25 35 50 65 85 3 65 IKS 6500 Series User s Manual Featured Functions Using Port Access Control The IKS 6500 provides two kinds of Port Base Access Control One is Static Port Lock and t
122. trial networks for mission critical applications The Traffic Prioritization Concept What is Traffic Prioritization Traffic prioritization allows you to prioritize data so that time sensitive and system critical data can be transferred smoothly and with minimal delay over a network The benefits of using traffic prioritization are e Improve network performance by controlling a wide variety of traffic and managing congestion e Assign priorities to different categories of traffic For example set higher priorities for time critical or business critical applications e Provide predictable throughput for multimedia applications such as video conferencing or voice over IP and minimize traffic delay and jitter e Improve network performance as the amount of traffic grows This will save cost by reducing the need to keep adding bandwidth to the network 3 45 IKS 6500 Series User s Manual Featured Functions How Traffic Prioritization Works Traffic prioritization uses the four traffic queues that are present in your IKS 6500 to ensure that high priority traffic is forwarded on a different queue from lower priority traffic This is what provides Quality of Service QoS to your network The IKS 6500 traffic prioritization depends on two industry standard methods e TIEFE 802 1D a layer 2 marking scheme e Differentiated Services DiffServ a layer 3 marking scheme IEEE 802 1D Traffic Marking The IEEE Std 802 1D 1998 Edi
123. two distinct address types Link Local Unicast address and Global Unicast address A Link Local address makes the switch accessible over IPv6 for all devices attached to the same local subnet To connect to a larger network with multiple segments the switch must be configured with a Global Unicast address 3 6 IKS 6500 Series User s Manual Featured Functions See a brief explanation of each configuration item below Network Parameters General Settings IPv4 Auto IP Configuration Disable v Switch IP Address 192 168 127 253 Switch Subnet Mask 255 255 255 0 Default Gateway 1st DNS Server IP Address 2nd DNS Server IP Address IPv6 Global Unicast Address Prefix Global Unicast Address Link Local Address Auto IP Configuration Setting Description Factory Default Disable Select this to set the IKS 6500 s IP address manually By DHCP The IKS 6500 s IP address will be assigned Disable automatically by the network s DHOP server By BootP The IKS 6500 s IP address will be assigned automatically by the network s BootP server Switch IP Address Setting Description Factory Default IP address for the This assigns the IKS 6500 s IP address on a 192 168 127 253 IKS 6500 TCP IP network Switch Subnet Mask Setting Description Factory Default Subnet mask for the This identifies the type of network to which the 255 255 255 0 IKS 6500 IKS 6500 is connected e g 255 255 0
124. ult LED Status 0x0000 No 0x0001 Yes Port Information 0x1000 0x1019 1 word Port 1 26 Status 0x0000 Link down 0x0001 Link up 0x0002 Disable OxFFFF No port 0x1100 0x1119 1 word Port 1 26 Speed 0x0000 10M Half 0x0001 10M Full 0x0002 100M Half 0x0003 100M Full 0x0004 1G Half 0x0005 1G Full OxFFFF No port 0x1200 0x1219 1 word Port 1 26 Flow Ctrl 0x0000 Off 0x0001 On OxFFFF No port 0x 1300 0x1319 1 word Port 1 26 MDI MDIX 0x0000 MDI 0x0001 MDIX OxFFFF No port Ox 1400 0x1413 Port 1 20 word 0x1414 0x1427 Port 2 Port 1 26 Description Port Description 100TX RJ45 Word 0 Hi byte 1 Word 0 Lo byte 0 Word 1 Hi byte 0 Word 1 Lo byte T Word 4 Hi byte 4 Word 4 Lo byte 5 Word 5 Hi byte Word 5 Lo byte 0 Packets Information B 7 IKS 6500 Series User s Manual Modbus TCP Map 0x2000 0x2033 2 word Port 1 26 Tx Packets Ex port 1 Tx Packets 0x44332211 Word 0 4433 Word 1 2211 0x2100 0x2133 2 word Port 1 26 Rx Packets Ex port 1 Rx Packets 0x44332211 Word 0 4433 Word 1 2211 0x2200 0x2233 2 word port 1 26 Tx Error Packets Ex port 1 Tx Error Packets 0x44332211 Word 0 4433 Word 1 2211 0x2300 0x2333 2 word port 1 26 Rx Error Packets Ex port 1 Rx Error Packets 0x44332211 Word 0 4433 Word 1 2211 Redundancy Information
125. unpredictable network traffic 9 Port Access Control Port access control by IEEE80Z 1X or Static Port Lock a Auto Warning Warning email and or relay output by events b Line Swap Fast recovery after moving devices to different ports c Set Device IP Assign IP addresses to connected devices d Diagnosis Test network integrity and mirroring port e Monitor Monitor a port and network status f MAC Address Table The complete table of Ethernet MAC Address List g System log The setting for System log and Event log h Exit Exit Use the up down arrow keys to select a category and then press Enter to select IKS 6500 Series User s Manual Getting Started 8 Use the following keys on your keyboard to navigate the IKS 6500 s serial console Key Function Up down right left arrow keys Tab Move the onscreen cursor Enter Display and select options Space Toggle options Esc Configuration by Telnet Console Previous menu You may open the IKS 6500 s Telnet or web console over a network This requires that the PC host and IKS 6500 are on the same logical subnet You may need to adjust your PC host s IP address and subnet mask By default the IKS 6500 s IP address is 192 168 127 253 and IKS 6500 s subnet mask is 255 255 255 0 for a Class B network This means that your PC s IP address must be set to 192 168 xxx xxx for a subnet mask of 255 255 0 0 or to 192 168
126. vity at all times For example the connections between Switches A and B and between Switches A and C should be 802 10 tagged and carrying VLANs 1 and 2 to ensure connectivity See the Configuring Virtual LANs section for more information about VLAN Tagging 3 42 IKS 6500 Series User s Manual Featured Functions Configuring STP RSTP The following figures indicate which Spanning Tree Protocol parameters can be configured A more detailed explanation of each parameter is given below the figure Communication Redundancy Current Status Root Not root Settings Redundancy Protocol RSTP EEE 802 1W 1D Bridge Priority 32768 v Hello Time 2 Forwarding Delay 115 Max Age 20 Port Enable RSTP Part Priority abi A tA hh QQ ND A ajaja At the top of this page the user can check the Current Status of this function For RSTP you will see Now Active This field shows which communication protocol is being used Turbo Ring RSTP or neither Root Not Root This field appears only for RSTP mode It indicates whether or not this IKS 6500 is the Root of the Spanning Tree the root is determined automatically At the bottom of this page the user can configure the Settings for the selected protocol For RSTP you can configure Protocol of Redundancy Setting Description Factory Default Turbo Ring This selects the Turbo Ring protocol None Turbo Ring V2 This selects the Turbo Ring V2 protocol N
127. ype User Data Encryption Key Trap Settings 1st Trap Server IP Name 1st Trap Community public 2nd Trap Server IP Name i 2nd Trap Community public Trap Mode Trap Y Retries 1 99 Timeout 1 300s Private MIB information Switch Object ID enterprise 8691 7 38 SNMP Read Write Settings SNMP Versions Setting Description Factory Default V1 V2c V3 or eds V1 V2c or V3 This specifies the SNMP protocol version V1 V2c used to manage the switch only V1 V2c Read Community Setting Description Factory Default This specifies the community string to authenticate the SNMP agent for read only Max 30 characters access The SNMP agent will access all Public objects with read only permissions using this community string V1 V2c Write Read Community Setting Description Factory Default This specifies the community string to authenticate the SNMP agent for read write Max 30 characters access The SNMP server will access all Private objects with read write permissions using this community string 3 20 IKS 6500 Series User s Manual Featured Functions For SNMP V3 there are two levels of privilege for different accounts to access the IKS 6500 Admin privilege provides access and authorization to read and write the MIB file User privilege allows reading of the MIB file only Admin Auth Type for SNMP VI V2c V3 and V3 only Setting Description Factory Default Thi

Download Pdf Manuals

image

Related Search

Related Contents

EW-FA23 - Panasonic  LCD-X841UHD  テレビ&ナビューティリティーキッ ト TN-304H 取扱説明書ノー集  User manual  Téléchargement  Operating Instructions  Massive Wall light 17203/31/10  manual de instruções do testador de cabos modelo ct-200  Whirlpool TAWMZOOB User's Manual  

Copyright © All rights reserved.
Failed to retrieve file