EM IGS 801M - v1.0
EM IGS 801M - v1.0
IGS-801M
8-Port 10/100/1000Mbps
Managed Industrial Switch
User’s Manual of IGS-801M
Trademarks
Copyright © PLANET Technology Corp. 2009.
Contents subject to which revision without prior notice.
PLANET is a registered trademark of PLANET Technology Corp. All other trademarks belong to their respective owners.
Disclaimer
PLANET Technology does not warrant that the hardware will work properly in all environments and applications, and
makes no warranty and representation, either implied or expressed, with respect to the quality, performance,
PLANET has made every effort to ensure that this User's Manual is accurate; PLANET disclaims liability for any
Information in this User's Manual is subject to change without notice and does not represent a commitment on the part of
PLANET. PLANET assumes no responsibility for any inaccuracies that may be contained in this User's Manual. PLANET
makes no commitment to update or keep current the information in this User's Manual, and reserves the right to make
improvements to this User's Manual and/or to the products described in this User's Manual, at any time without notice.
If you find information in this manual that is incorrect, misleading, or incomplete, we would appreciate your comments and
suggestions.
FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the
FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment
is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if
not installed and used in accordance with the Instruction manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the
CE Mark Warning
This is a Class A product. In a domestic environment, this product may cause radio interference, in which case the user
WEEE Warning
To avoid the potential effects on the environment and human health as a result of the presence of
hazardous substances in electrical and electronic equipment, end users of electrical and electronic
equipment should understand the meaning of the crossed-out wheeled bin symbol. Do not dispose of
WEEE as unsorted municipal waste and have to collect such WEEE separately.
Revision
8-Port 10/100/1000Mbps Managed Industrial Switch
2
User’s Manual of IGS-801M
TABLE OF CONTENTS
1. INTRODUCTION ............................................................................. 6
1.1 PACKAGE CONTENTS .............................................................................................................................. 6
1.2 PRODUCT DESCRIPTION ........................................................................................................................... 6
1.3 PRODUCT FEATURES ............................................................................................................................... 7
1.4 PRODUCT SPECIFICATION ........................................................................................................................ 8
2. INSTALLATION............................................................................. 11
2.1 HARDWARE DESCRIPTION ...................................................................................................................... 11
2.1.1 Physical Dimension ................................................................................................................... 11
2.1.2 Front / Rear Panel ..................................................................................................................... 12
2.1.3 Top View.................................................................................................................................... 12
2.1.4 Bottom View............................................................................................................................... 13
2.1.5 LED Indicators ........................................................................................................................... 13
2.2 INSTALL THE SWITCH ............................................................................................................................. 15
2.2.1 Installation Steps ....................................................................................................................... 15
2.2.2 DIN-Rail mounting ..................................................................................................................... 15
2.2.3 Wall Mount Plate Mounting........................................................................................................ 18
2.2.4 Wiring the Power Inputs ............................................................................................................ 18
2.2.5 Wiring the Fault Alarm Contact.................................................................................................. 19
3
User’s Manual of IGS-801M
4.2.12 Logout...................................................................................................................................... 36
4.3 PORT MANAGEMENT.............................................................................................................................. 38
4.3.1 Port Configuration...................................................................................................................... 38
4.3.2 Port Statistics............................................................................................................................. 39
4.3.3 Port Mirroring ............................................................................................................................. 41
4.3.4 Cable Diagnostics...................................................................................................................... 42
4.4 LINK AGGREGATION .............................................................................................................................. 44
4.4.1 Port Trunk .................................................................................................................................. 45
4.4.2 LACP ......................................................................................................................................... 46
4.4.3 LACP Status .............................................................................................................................. 47
4.5 VLANS ................................................................................................................................................. 50
4.5.1 VLAN Membership .................................................................................................................... 54
4.5.2 Per Port Configuration ............................................................................................................... 56
4.5.3 VLAN setting example: .............................................................................................................. 60
4.6 RAPID SPANNING TREE ......................................................................................................................... 68
4.6.1 Theory........................................................................................................................................ 68
4.6.2 RSTP System Configuration...................................................................................................... 74
4.6.3 RSTP Port Configuration ........................................................................................................... 75
4.6.4 RSTP Status .............................................................................................................................. 78
4.7 MULTICAST ........................................................................................................................................... 81
4.7.1 IGMP Snooping Configuration................................................................................................... 85
4.7.2 IGMP Snooping Status .............................................................................................................. 86
4.7.3 Multicast Group Table ............................................................................................................... 88
4.8 QUALITY OF SERVICE ............................................................................................................................ 89
4.8.1 Understand QOS ....................................................................................................................... 89
4.8.2 QoS Configuration ..................................................................................................................... 89
4.8.3 802.1p QoS Mode ..................................................................................................................... 90
4.8.4 DSCP QoS Mode ...................................................................................................................... 93
4.9 802.1X NETWORK ACCESS CONTROL .................................................................................................... 95
4.9.1 Understanding IEEE 802.1X Port-Based Authentication .......................................................... 96
4.9.2 RADIUS Server Configuration ................................................................................................... 99
4.9.3 802.1X Authentication Port Configuration ............................................................................... 101
4.10 MAC ADDRESSES ............................................................................................................................. 104
4.10.1 Dynamic Address Table ........................................................................................................ 104
4.10.2 Static MAC Address .............................................................................................................. 105
4
User’s Manual of IGS-801M
5
User’s Manual of IGS-801M
1. Introduction
1.1 Package Contents
Please refer to the package content list below to verify them against the checklist.
Compare the contents of the industrial switch with the standard checklist above. If any item is damaged or missing, please
environments.
Ethernet Switch has 8K MAC Address table and offers wire-speed packets transfer performance without risk of packet
loss. The Gigabit ports with 9K jumbo packet support can handle large amounts of data transmission in a secure topology
linking to a backbone or high-power servers. The high data throughput of the device makes it ideal for most Gigabit
environments.
interference and heavy electrical surges which are usually found on plant floors or in curb side traffic control cabinets. The
IGS-801M also provides a wide range of power supply options suitable for multiple industries and for worldwide operation.
The feature of operating temperature range from -10 to 60 Degree C allows the Managed Industrial Switch to be placed in
almost any difficult environment.
storm control, IGMP snooping enhanced security and bandwidth utilization to fit a variety of applications. Via aggregation
of supporting port, the IGS-801M allows the operation of high-speed trunk combining multiple ports. Maximum up to 4
ports of the IGS-801M can be assigned for 8 trunk groups and support fail-over as well. Additionally, its
6
User’s Manual of IGS-801M
Network Management Protocol (SNMP) and can be monitored via any standard-based management software. These
features provide a cost-effective way to manage the devices from the Internet whenever you are at work or at home.
Rapid Spanning Protocol (IEEE 802.1w RSTP) and redundant power supply system into customers’ industrial
automation network to enhance system reliability and uptime in the harsh factory environments. It also protects
customer’s industrial network connectivity with switching recovery capability that is used for implementing fault tolerant
¾ Physical Port
¾ Layer 2 Features
Supports Auto-negotiation and Half-Duplex / Full-Duplex modes for all 10Base-T/100Base-TX and 1000Base-T
ports.
• Port-Based VLAN
Link Aggregation
• Up to 4 trunk groups
7
User’s Manual of IGS-801M
¾ Quality of Service
• IP TOS / DSCP
¾ Multicast
¾ Security
¾ Management
Product IGS-801M
Hardware Specification
8
User’s Manual of IGS-801M
System:
Power 1, Power 2, Fault Alarm
LED Ports:
10/100 Link/Act
1000 Link/Act
Weight 473g
Layer 2 Function
Port disable/enable.
Port configuration Auto-negotiation 10/100/1000Mbps full and half duplex mode selection.
Flow Control disable / enable.
RFC-1213 MIB-II
IF-MIB
SNMP MIBs RFC-1493 Bridge MIB
RFC-2863 Interface MIB
Q-Bridge MIB
9
User’s Manual of IGS-801M
Standards Conformance
IEC60068-2-32(Free fall)
Stability testing IEC60068-2-27(Shock)
IEC60068-2-6(Vibration)
10
User’s Manual of IGS-801M
2. Installation
In this paragraph, it will describe the Industrial switch’s hardware spec, port, cabling information, and wiring installation.
11
User’s Manual of IGS-801M
12
User’s Manual of IGS-801M
RESET
IGS-801M. The following table provides the description of the LED status and their meanings for the Managed Industrial
Switch.
System
13
User’s Manual of IGS-801M
14
User’s Manual of IGS-801M
Switch. Please read the following topics and perform the procedures in the order being presented. To install your switch on
In this paragraph, we will describe how to install the 8 10/100TX w/ X-Ring Managed Industrial Switch and the installation
2. Check if the DIN-Rail is screwed on the Industrial switch or not. If the DIN-Rail is not screwed on the Industrial
switch, please refer to DIN-Rail Mounting section for DIN-Rail installation. If users want to wall mount the Industrial
switch, please refer to Wall Mount Plate Mounting section for wall mount plate installation.
4. Power on the Industrial switch. Please refer to the Wiring the Power Inputs section for knowing the information
about how to wire the power. The power LED on the Industrial switch will light up. Please refer to the LED
Indicators section for indication of LED lights.
5. Prepare the twisted-pair, straight through Category 5 cable for Ethernet connection.
6. Insert one side of RJ-45 cable (category 5) into the Industrial switch Ethernet port (RJ-45 port) and another side
of RJ-45 cable (category 5) to the network device’s Ethernet port (RJ-45 port), ex: Switch PC or Server. The UTP
port (RJ-45) LED on the Industrial switch will light up when the cable is connected with the network device. Please
refer to the LED Indicators section for LED light indication.
Make sure that the connected network devices support MDI/MDI-X. If it does not support,
7. When all connections are set and LED lights all show in normal, the installation is complete.
mount application with DIN-Rail application on Industrial Gigabit Ethernet, please refer to following figures to screw the
DIN-Rail on the Industrial Gigabit Ethernet Switch. To hang the Industrial Gigabit Ethernet Switch, follow the below steps:
15
User’s Manual of IGS-801M
16
User’s Manual of IGS-801M
Please refer to following procedures to remove the Industrial Gigabit Ethernet Switch from the track.
Step 4: Lightly press the button of DIN-Rail for remove it from the track.
17
User’s Manual of IGS-801M
Step 1: Remove the DIN-Rail from the Industrial Gigabit Ethernet Switch; loose the screws to remove the DIN-Rail.
Step 2: Place the wall mount plate on the rear panel of the Industrial Gigabit Ethernet Switch.
Step 3: Use the screws to screw the wall mount plate on the Industrial Gigabit Ethernet Switch.
Step 4: Use the hook holes at the corners of the wall mount plate to hang the Industrial Gigabit Ethernet Switch on the
wall.
1. Insert positive / negative DC power wires into the contacts 1 and 2 for POWER 1, or 5 and 6 for POWER 2.
2.
18
User’s Manual of IGS-801M
2. Tighten the wire-clamp screws for preventing the wires from loosing.
1 2 3 4 5 6
Power 1 Power 2
- + - +
The wire gauge for the terminal block should be in the range between 12 ~ 24 AWG.
the Industrial Switch will detect the fault status of the power failure, or port link failure (available for managed model) and
then forms an open circuit. The following illustration shows an application example for wiring the fault alarm contacts.
The wire gauge for the terminal block should be in the range between 12 ~ 24 AWG.
19
User’s Manual of IGS-801M
3. SWITCH MANAGEMENT
This chapter describes how to manage the Gigabit Ethernet Switch. Topics include:
- Overview
- Management methods
3.1 Overview
This chapter gives an overview of switch management. The Gigabit Ethernet Switch provides a simply WEB browser
interface. Using this interface, you can perform various switch configuration and management activities, including:
System
Port Management
VLANs
Multicast
Traffic Control
MAC Address
The PLANET Gigabit Ethernet Switch provides a built-in browser interface. You can manage the Gigabit Ethernet Switch
remotely by having a remote host with web browser, such as Microsoft Internet Explorer, Netscape Navigator or Mozilla
Firefox.
The Gigabit Ethernet Switch must have an Internet Protocol (IP) address accessible for the remote host.
20
User’s Manual of IGS-801M
Before you start configure the Gigabit Ethernet Switch, please note the Gigabit Ethernet Switch is configured through an
Ethernet connection, make sure the manager PC must be set on same the IP subnet address. For example, the default
IP address of the Gigabit Ethernet Switch is 192.168.0.100, then the manager PC should be set at 192.168.0.x (where x is
a number between 2 and 254), and the default subnet mask is 255.255.255.0. Use Internet Explorer 5.0 or above Web
browser. Enter IP address http://192.168.0.100 (the factory-default IP address) to access the Web interface.
When the following login screen appears, please enter the default password "admin" and press Login to enter the main
screen of Gigabit Ethernet Switch. The login screen in Figure 3-1 appears.
1. For security reason, please change and memorize the new password after this first setup.
21
User’s Manual of IGS-801M
For easily list the IGS-801M in your Ethernet environment, the Planet Smart Discovery Utility from user’s manual
CD-ROM is an ideal solution. The following install instructions guiding you for run the Planet Smart Discovery Utility.
If there are two LAN cards or above in the same administrator PC, choose different LAN card by
use the “Select Adapter” tool.
3. Press “Refresh” button for list current connected devices in the discovery list, the screen is shown as follow.
22
User’s Manual of IGS-801M
1. This utility show all necessary information from the devices, such as MAC Address, Device Name, firmware version,
Device IP Subnet address, also can assign new password, IP Subnet address and description for the devices.
2. After setup completed, press “Update Device”, “Update Multi” or “Update All” button to take affect. The meaning
The same functions mentioned above also can be finding in “Option” tools bar.
3. To click the “Control Packet Force Broadcast” function, it can allow assign new setting value to the Web Smart
4. Press “Connect to Device” button then the Web login screen appears in Figure 3-1.
23
User’s Manual of IGS-801M
4. WEB CONFIGURATION
The Gigabit Ethernet Switch provide Web interface for Switch smart function configuration and make the Switch operate
more effectively - They can be configured through the Web Browser. A network administrator can manage and monitor the
Gigabit Ethernet Switch from the local LAN. This section indicates how to configure the Gigabit Ethernet Switch to enable
appears.
As listed at the left of the main screen, the configurable smart functions are shown as below:
System – Check the hardware, software version and System MAC address. Setting the IP address and
SNMP management for the Gigabit Ethernet Switch. System Reboot / Factory Reset / Firmware Update /
Port Management - Setup per port Speed/Duplex mode, Flow Control, jumbo frame, Port Mirroring and Port
Link Aggregation and Cable Diagnostic.
24
User’s Manual of IGS-801M
Spanning Tree – Configure Rapid spanning tree topography for any arrangement of bridges.
Multicast - Enables or disables IGMP Snooping on the device to filter the multicast stream.
Traffic Control
- Quality of Service – Mapping the packet level to classify the packets priority.
- 802.1X Management – Specify ports with network access control.
4.2 System
administrator to identify the firmware / hardware version and IP subnet address / DHCP server IP address. The screen in
Object Description
Active IP Address The current IP Address of the device. The IP Address could be manual assigned
25
User’s Manual of IGS-801M
Active Subnet Mask The current IP Subnet Mask setting on the device.
DHCP Server If the IP address is got and assigned via a DHCP server, the field shows the IP
Lease Time left If the IP address of the device be assigned via a DHCP Server, a DHCP lease
time would be apply to the device too. The lease time left shows the left time if
the device didn’t request the IP Address to the DHCP server, then the IP address
will be released.
4.2.2 IP Configuration
The IP Configuration includes the IP Address, Subnet Mask, Gateway, management VLAN, System name, and Inactivity
Timeout. Through the Web page or SNMP application, you can easily recognize the device by using the System Name.
The Inactivity Timeout is to set the idle time-out for security issue, when there is no action in running the Web page and
the time is up, you must re-login to Web interface before you browse the page. Fill up the IP Address, Subnet Mask and
Object Description
DHCP Enable Choose what the switch should do following power-up: transmit a DHCP request,
IP Address The IP address of the interface. The factory default value is 192.168.0.100
26
User’s Manual of IGS-801M
Subnet Mask The IP subnet mask for the interface. The factory default value is 255.255.255.0
Gateway The default gateway for the IP interface. The factory default value is 192.168.0.1.
Management VLAN Specifies the management VLAN ID of the switch. It may be configured to any
value in the range of 1 - 4093. The management VLAN is used for management
of the switch.
Inactivity Timeout Specifies a time period for the user login. The web interface will be auto logout if
press “Apply” button to take effect. Please login web interface with new password, the screen in Figure 4-2-3 appears.
Object Description
Password The system password. The allowed string length is 1 to 16, and the allowed
content is the ASCII characters from 32 to 126. It will not display as it is typed,
only asterisks (*) will show. Passwords are alpha numeric characters in length,
After change the default password, if you forget the password. Please press the “Reset” button
in the front panel of the Managed Switch over 10 seconds and then release, the current setting
includes VLAN, will be lost and the Managed Switch will restore to the default mode.
27
User’s Manual of IGS-801M
4.2.4 SNMP
(TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network
An SNMP-managed network consists of three key components: Network management stations (NMSs), SNMP agents,
Management information base (MIB) and network-management protocol:
。 Network management stations (NMSs):Sometimes called consoles, these devices execute management
applications that monitor and control network elements. Physically, NMSs are usually engineering
workstation-caliber computers with fast CPUs, megapixel color displays, substantial memory, and abundant disk
store. Collections of related managed objects are defined in specific MIB modules.
。 Network-management protocol:A management protocol is used to convey management information between
agents and NMSs. SNMP is the Internet community's de facto standard management protocol.
SNMP Operations
SNMP itself is a simple request/response protocol. NMSs can send multiple requests without receiving a response.
。 Get -- Allows the NMS to retrieve an object instance from the agent.
。 Set -- Allows the NMS to set values for object instances within an agent.
。 Trap -- Used by the agent to asynchronously inform the NMS of some event. The SNMPv2 trap message is
designed to replace the SNMPv1 trap message.
SNMP community
An SNMP community is the group that devices and management stations running SNMP belong to. It helps define where
information is sent. The community name is used to identify the group. A SNMP device or agent may belong to more than
one SNMP community. It will not respond to requests from management stations that do not belong to one of its
。 Write = private
。 Read = public
28
User’s Manual of IGS-801M
Object Description
SNMP Enable Enable or Disable the SNMP function of the device. While set to enable, the
manager could remotely get the interface status and received the traps
information.
SNMP Trap Destination SNMP Trap destination is a management station that receives the trap messages
SNMP Read Community Functions as a password and used to authenticate the access right of the device.
The Read Community is restricted to read-only, for all MIBs except the
SNMP write Community Functions as a password and used to authenticate the access right of the device.
The Write Community accesses the device both read and write - configure to the
SNMP Trap Community Identifies the community string of the trap manager.
29
User’s Manual of IGS-801M
3. Click the “Browse” button of the main page, the system would pop up the file selection menu to choose firmware.
4. Select on the firmware then click “Upload”, the Software Upload Progress would show the file upload status.
5. Once the software be loaded to the system successfully. The following screen appears. Click the “Yes” button to
activate the new software immediately. The system will load the new software after reboot.
1. Do not power off the switch until the update progress is complete.
2. Do not quit the Firmware Upgrade page without press the “Yes” button - after the image be
loaded. Or the system won’t apply the new firmware. User has to repeat the firmware upgrade
processes again.
30
User’s Manual of IGS-801M
Configuration Upload: Upload the existed configuration file to the Switch. The configuration file had been
saved at the local machine already.
Configuration Download: Download the current configuration file of the switch to the local machine.
Configuration Download
1. Press the “Download” button to save the current configuration in manager workstation. The following screens in
Figure 4-2-8 and 4-2-9 appear
31
User’s Manual of IGS-801M
Configuration Upload
1. Click the “Browse” button of the main page, the system would pop up the file selection menu to choose saved
configuration.
32
User’s Manual of IGS-801M
2. Select on the configuration file then click “Upload”, the bottom of the browser shows the upload status.
configuration will be reset; expect the IP address of the Gigabit Ethernet Switch. Once the Factory Reset item be pressed,
To reset the IP address to the default IP Address “192.168.0.100”. Press the hardware reset button
at the bottom panel about 5 seconds. After the device be rebooted. You can login the management
RESET
have to re-login the WEB interface about 20 seconds later, the screen in Figure 4-2-12 appears.
33
User’s Manual of IGS-801M
4.2.9 Ping
Use this screen to tell the switch to send a Ping request to a specified IP address. You can use this to check whether the
switch can communicate with a particular IP station. Once you click the Apply button, the switch will send n pings and the
Object Description
Target IP Address Enter the IP address of the station you want the switch to ping. The initial value is
blank. The IP Address you enter is not retained across a power cycle.
Time Out (in secs) Timeout in milliseconds to wait for each reply.
After field the parameter and press “Apply” to execute the Ping function. The Ping result shows at the next table. As the
Figure 4-2-14 screen appears.
34
User’s Manual of IGS-801M
Be sure the target IP Address is within the same network subnet of the switch, or you had setup the
and the check boxes of power 1/power 2 ticked, the FAULT LED indicator will then be possible to light up when any one of
Object Description
Tick the check box to enable the function of lighting up the FAULT LED on the
Power Failure:
panel when power fails.
35
User’s Manual of IGS-801M
Object Description
Enable mode will reduce chip power when the signal from the copper link partner
Power Saving
is not present.
4.2.12 Logout
Press this function; the web interface will go back to login screen. The screen in Figure 4-67 and Figure 4-2-17 appears.
36
User’s Manual of IGS-801M
37
User’s Manual of IGS-801M
duplex mode; else this function will show “Down” when the port is disconnected. Press the “Refresh” button to renew the
screen. The screen in Figure 4-3-1 appears.
Object Description
All Ports Jumbo Frames The maximum Ethernet frame size the interface supports or is configured,
Setting including Ethernet header, CRC, and payload. Draw the menu bar to select the
mode.
38
User’s Manual of IGS-801M
Drop frames after Enable or Disable the device to drop frames once the excessive collisions be
Mode Allow configuring the port speed and operation mode. Draw the menu bar to
Flow Control Allow Enable or Disable flow control for selected port.
When set each port to run at 100M Full, 100M Half, 10M Full, and 10M Half-speed modes. The
Auto-MDIX function will disable.
appears.
39
User’s Manual of IGS-801M
Object Description
Receive Packets Number of packets received on the port. Include the Unicast packets.
Receive Octets Number of octets of data (including those in bad packets) received on the port. This
Broad- and Multicast Number of packets received on the port. Include the broadcast and multicast
packets.
Error Packets The numbers of error packets received from the port.
Transmit Packets Number of packets transmitted on the port. Include the Unicast packets.
Transmit Octets Number of octets of data (including those in bad packets) transmitted on the port.
Broad- and Multicast Number of packets transmitted on the port. Include the broadcast and multicast
packets.
Error Packets The numbers of error packets transmit from the port.
40
User’s Manual of IGS-801M
of a network Switch to another port where the packet can be studied. It enables the manager to keep close track of switch
performance and alter it if necessary. The Port Mirroring screen in Figure 4-3-3 appears.
Object Description
Destination Port Use this option to select the port for monitored traffic. This is the port that your
Source Port Duplicate the data transmitted from the source port and forward it to the
Destination port.
Configuring the port mirroring by assigning a source port from which to copy all packets and a destination port where
41
User’s Manual of IGS-801M
identify the cable length and operating conditions, and to isolate a variety of common faults that can occur on the Cat5
If the link is established on the twisted-pair interface in 1000Base-T mode, the Cable Diagnostics can run
If the link is established in 100Base-TX or 10Base-T, the Cable Diagnostics cause the link to drop while the
After the diagnostics are finished, the link is reestablished. And the following functions are available.
• Cable Length
Anomalous coupling between cable pairs can be caused by shorted wires, improper termination, or high crosstalk
resulting from an incorrect wire map. These conditions can all prevent the PLANET switch from establishing a link. The
Object Description
• Port Specifies the port numbers for which to run the cable diagnostics.
42
User’s Manual of IGS-801M
Object Description
• Pair The twist pair of the UTP cable. The pair groups as follow:
A (Pin 1,2)
B (Pin 3,6)
C (Pin 4,5)
D (Pin 7,8)
• Length[m] When properly terminated, Cable Diagnostics reports the approximate cable length in
• Open - The cable is connected on only one side or there is no cable connected to
the port
• Short - A short has occurred in the cable. With 10/100BASE link, the status of Pair
C and Pair D will be “Short”.
Be sure to running the Cable diagnostics with standard Cat 5e or Cat 6 UTP cable. With some of the
UTP cables that not match the standard of Cat 5e, it might cause the 10/100Base link down after the
cable diagnostics.
43
User’s Manual of IGS-801M
(LAGs). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link
redundancy.
Each LAG is composed of ports of the same speed, set to full-duplex operations. Ports in a LAG, can be of different media
types (UTP/Fiber, or different fiber types), provided they operate at the same speed.
Static LAGs (Port Trunk) – Force aggregared selected ports to be a trounk group.
Link Aggregation Control Protocol (LACP) LAGs - LACP LAG negotiate Aggregated Port links with other
LACP ports located on a different device. If the other device ports are also LACP ports, the devices establish a
Aggregated Links can be assigned manually (Port Trunk) or automatically by enabling Link Aggregation Control Protocol
Aggregated Links are treated by the system as a single logical port. Specifically, the Aggregated Link has similar port
44
User’s Manual of IGS-801M
Object Description
Normal While a port is checked as “Normal”, the port is not joining to any Static Trunk
Group.
Group Specify the Joined Trunk Group. There’re maximum 4 trunk groups per system
45
User’s Manual of IGS-801M
4.4.2 LACP
Link Aggregation Control Protocol (LACP) - LACP LAG negotiate Aggregated Port links with other LACP ports located
on a different device. If the other device ports are also LACP ports, the devices establish a LAG between them.
The LACP Port Configuration page contains fields for assigning LACP properties to individual ports. The screen in Figure
4-4-2 appears.
Object Description
Once the LACP protocol be enabled, the system will start transmit the LACP
control packets and exchange with another LACP aware switch. If the linked
switch didn’t support LACP, then the aggregated link will not be established.
Key Value The Key Value will be filed in the LACP control packets. Ports with same key
value will be set to the same LACP Group. If two ports are set with different key
value, they will become two different LCAP groups. The key value will also be the
46
User’s Manual of IGS-801M
• The ports that can be assigned to the same link aggregation have certain other restrictions (see
below).
• The ports at both ends of a connection must be configured as link aggregation ports.
• None of the ports in a link aggregation can be configured as a mirror source port or a mirror
target port.
• All of the ports in a link aggregation have to be treated as a whole when moved from/to, added
or deleted from a VLAN.
• The Spanning Tree Protocol will treat all the ports in a link aggregation as a whole.
• Disconnect all link aggregation port cables or disable the link aggregation ports before removing
a port link aggregation to avoid creating a data loop.
2. The “LACP Aggregation Overview” and “LACP Port Status” screen is displayed as in Figure 4-4-3.
47
User’s Manual of IGS-801M
The LACP Aggregation Overview Table lists the active LACP ports and mapped Group. It also indicates the Partner Port
number of the other LACP aware switches. The screen in Figure 4-4-4 appears.
Object Description
Normal While a port is checked as “Normal”, the port is not joining to any LACP Trunk Group.
Group # The Linked LACP aggregation group. The Group ID is the fist port ID of the LACP group
member.
Port Blocked by RSTP. Number is Partner port number if other switch has LACP
0 Blocked
enabled.
Port link up and forwarding by RSTP. Number is Partner port number if other
0 Forwarding
switch has LACP enabled.
The LACP Port Status Table lists the active LACP ports and the Partner Port number with the operational Port Key value.
48
User’s Manual of IGS-801M
Object Description
Protocol Active Indicate the LCAP protocol is enable or not on the port.
No- LACP is not enabled, or LACP is enabled but not active on the port.
Partner Port Number The port number/ID of the linked partner switch- if other switch has LACP enabled.
The Port 7 of the switch is connecting to the Port 15 of the partner switch directly – both
of the two switches are with LACP enabled.
Operational Port Key The current operational key value of the partner port. Within the same LACP group, the
port key value should be the same with the other LACP active ports.
49
User’s Manual of IGS-801M
4.5 VLANs
VLAN Overview
A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain. It allows you to isolate network
traffic so only members of the VLAN receive traffic from the same VLAN members. Basically, creating a VLAN from a
switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch. However, all the
network devices are still plug into the same switch physically.
The Gigabit Ethernet Switch supports IEEE 802.1Q (tagged-based) and Port-Base VLAN setting in web management
Port-based VLAN
Port-based VLAN limit traffic that flows into and out of switch ports. Thus, all devices connected to a port are members of
the VLAN(s) the port belongs to, whether there is a single computer directly connected to a switch, or an entire
department.
On port-based VLAN.NIC do not need to be able to identify 802.1Q tags in packet headers. NIC send and receive normal
Ethernet packets. If the packet's destination lies on the same segment, communications take place using normal Ethernet
protocols. Even though this is always the case, when the destination for a packet lies on another switch port, VLAN
considerations come into play to decide if the packet is dropped by the Switch or delivered.
VLAN allow a network to be segmented in order to reduce the size of broadcast domains. All packets entering a VLAN will
only be forwarded to the stations (over IEEE 802.1Q enabled switches) that are members of that VLAN, and this includes
VLAN can also provide a level of security to your network. IEEE 802.1Q VLAN will only deliver packets between stations
that are members of the VLAN. Any port can be configured as either tagging or untagging:
The untagging feature of IEEE 802.1Q VLAN allows VLAN to work with legacy switches that don't recognize
The tagging feature allows VLAN to span multiple 802.1Q-compliant switches through a single physical
connection and allows Spanning Tree to be enabled on all ports and work normally.
Tagging - The act of putting 802.1Q VLAN information into the header of a packet.
Untagging - The act of stripping 802.1Q VLAN information out of the packet header.
50
User’s Manual of IGS-801M
Their presence is indicated by a value of 0x8100 in the Ether Type field. When a packet's Ether Type field is equal to
0x8100, the packet carries the IEEE 802.1Q/802.1p tag. The tag is contained in the following two octets and consists of 3
bits of user priority, 1 bit of Canonical Format Identifier (CFI - used for encapsulating Token Ring packets so they can be
carried across Ethernet backbones), and 12 bits of VLAN ID (VID). The 3 bits of user priority are used by 802.1p. The VID
is the VLAN identifier and is used by the 802.1Q standard. Because the VID is 12 bits long, 4094 unique VLAN can be
identified.
The tag is inserted into the packet header making the entire packet longer by 4 octets. All of the information originally
802.1Q Tag
User Priority CFI VLAN ID (VID)
2 bytes 2 bytes
The Ether Type and VLAN ID are inserted after the MAC source address, but before the original Ether Type/Length or
Logical Link Control. Because the packet is now a bit longer than it was originally, the Cyclic Redundancy Check (CRC)
must be recalculated.
Dest. Addr. Src. Addr. E. type Tag Length/E. type Data New CRC
51
User’s Manual of IGS-801M
■ Port VLAN ID
Packets that are tagged (are carrying the 802.1Q VID information) can be transmitted from one 802.1Q compliant network
device to another with the VLAN information intact. This allows 802.1Q VLAN to span network devices (and indeed, the
Every physical port on a switch has a PVID. 802.1Q ports are also assigned a PVID, for use within the switch. If no VLAN
are defined on the switch, all ports are then assigned to a default VLAN with a PVID equal to 1. Untagged packets are
assigned the PVID of the port on which they were received. Forwarding decisions are based upon this PVID, in so far as
VLAN are concerned. Tagged packets are forwarded according to the VID contained within the tag. Tagged packets are
also assigned a PVID, but the PVID is not used to make packet forwarding decisions, the VID is.
Tag-aware switches must keep a table to relate PVID within the switch to VID on the network. The switch will compare the
VID of a packet to be transmitted to the VID of the port that is to transmit the packet. If the two VID are different the switch
will drop the packet. Because of the existence of the PVID for untagged packets and the VID for tagged packets,
tag-aware and tag-unaware network devices can coexist on the same network.
A switch port can have only one PVID, but can have as many VID as the switch has memory in its VLAN table to store
them.
Because some devices on a network may be tag-unaware, a decision must be made at each port on a tag-aware device
before packets are transmitted – should the packet to be transmitted have a tag or not? If the transmitting port is
connected to a tag-unaware device, the packet should be untagged. If the transmitting port is connected to a tag-aware
device, the packet should be tagged.
■ Default VLANs
The Switch initially configures one VLAN, VID = 1, called "default." The factory default setting assigns all ports on the
Switch to the "default". As new VLAN are configured in Port-based mode, their respective member ports are removed
from the "default."
1 No matter what basis is used to uniquely identify end nodes and assign these nodes
VLAN membership, packets cannot cross VLAN without a network device performing a
routing function between the VLAN.
2 The Switch supports Port-based VLAN and IEEE 802.1Q VLAN. The port untagging
function can be used to remove the 802.1 tag from packet headers to maintain
compatibility with devices that are tag-unaware.
default all ports are assigned to VLAN 1 as untagged ports. Add a port as a tagged port if you want it to carry traffic for one
or more VLANs, and any intermediate network devices or the host at the other end of the connection supports VLANs.
Then assign ports on the other VLAN-aware network devices along the path that will carry this traffic to the same VLAN(s),
52
User’s Manual of IGS-801M
either manually or dynamically using GVRP. However, if you want a port on this switch to participate in one or more VLANs,
but none of the intermediate network devices nor the host at the other end of the connection supports VLANs, then you
devices, but the VLAN tags should be stripped off before passing it on to any end-node host that
■ VLAN Classification
When the switch receives a frame, it classifies the frame in one of two ways. If the frame is untagged, the switch assigns
the frame to an associated VLAN (based on the default VLAN ID of the receiving port). But if the frame is tagged, the
switch uses the tagged VLAN ID to identify the port broadcast domain of the frame.
■ Port Overlapping
Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups, such
as file servers or printers. Note that if you implement VLANs which do not overlap, but still need to communicate, you can
■ Untagged VLANs
Untagged (or static) VLANs are typically used to reduce broadcast traffic and to increase security. A group of network
users assigned to a VLAN form a broadcast domain that is separate from other VLANs configured on the switch. Packets
are forwarded only between ports that are designated for the same VLAN. Untagged VLANs can be used to manually
53
User’s Manual of IGS-801M
for the switch can be monitored and modified here. Up to 64 VLANs are supported. This page allows for adding and
deleting VLANs as well as adding and deleting port members of each VLAN. The VLAN Membership Configuration screen
Object Description
VLAN ID Specify the VLAN Identifier for the new VLAN. (You can only enter data in this
Add To add a new VLAN Group with the specify VLAN ID. Once the Add button is
pressed. The page will be redirect to have the VLAN member assign page.
Modify To modify an existence VLAN Group- adds new member ports or remove ports
54
User’s Manual of IGS-801M
The Gigabit Ethernet Switch supports up to 64 active VLAN groups and the range for the VLAN ID is 1-4094.
1. To add a VLAN group, filed in the VLAN ID (from 1-4094) and please press “Add” button, the new VLAN Setup
screen will pop out.
2. Checked the Member box to select the members for the VLAN group.
55
User’s Manual of IGS-801M
steps.
1. To modify the members of an existence VLAN Group, check the VLAN Group ID and press “Modify” button. The ID
VLAN Setup screen will pop out.
2. To add/remove a port from specific VLAN group, just check/cancel the Member check Box and press “Apply” to
take affect.
3. To delete an existence VLAN Group, check the VLAN Group ID and press “Delete” button.
Figure 4-5-4 VLAN Group – member modify and delete VLAN Group screen
Once the VLAN Group be deleted, the Ports with the PVID set to this VLAN Group have to
re-configure the PVID. Or the PVID will be set to “None”
ID (PVID) is configured on the VLAN Port Configuration page. All untagged packets arriving to the device are tagged by
the ports PVID.
56
User’s Manual of IGS-801M
• Tagged: Ports with tagging enabled will put the VID number, priority and other VLAN information into the
header of all packets that flow into those ports. If a packet has previously been tagged, the port
will not alter the packet, thus keeping the VLAN information intact. The VLAN information in the
tag can then be used by other 802.1Q compliant devices on the network to make
packet-forwarding decisions.
• Untagged: Ports with untagging enabled will strip the 802.1Q tag from all packets that flow into those
ports. If the packet doesn't have an 802.1Q VLAN tag, the port will not alter the packet. Thus,
all packets received by and forwarded by an untagging port will have no 802.1Q VLAN
information. (Remember that the PVID is only used internally within the Switch). Untagging is
device.
Frame Income
Income Frame is tagged Income Frame is untagged
Frame Leave
57
User’s Manual of IGS-801M
Object Description
VLAN Type There’re two VLAN mode support – 802.1Q VLAN and Port-Bas VLAN
• 802.1Q – Packets income will be tagged with VID as the PVID setting.
All ports on the switch belong to default VLAN (VID 1).
Port Select the physical interface for which you want to display or configure
data.
Link Type Allow 802.1Q Untagged or Tagged VLAN for selected port.
When adding a VLAN to selected port, it tells the switch whether to keep or
58
User’s Manual of IGS-801M
Ingress Filtering Enable Enabled - the frame is discarded if this port is not a member of the VLAN
with which this frame is associated. In a tagged frame, the VLAN is
identified by the VLAN ID in the tag. In an untagged frame, the VLAN is the
Port VLAN ID specified for the port that received this frame.
Disabled - all frames are forwarded in accordance with the 802.1Q VLAN
bridge specification. The factory default is disabled.
Acceptable Frame Types Specifies the types of frames that may be received on this port. The
• All- untagged frames or priority tagged frames received on this port are
accepted and assigned the value of the Port VLAN ID for this port.
PVID Allow assign PVID for selected port. The range for the PVID is 1-4094
The PVID will be inserted into all untagged frames entering the ingress
port. The PVID must as same as the VLAN ID that the port belong to VLAN
59
User’s Manual of IGS-801M
Group 3 are separated VLAN. Each VLAN isolate network traffic so only members of the VLAN receive traffic from the
same VLAN members. The screen in Figure 4-5-6 appears and Table 4-1 describes the port configuration of switch.
1. While [PC-1] transmit an untagged packet enters Port-1, the switch will tag it with a VLAN Tag=2. [PC-2] and
60
User’s Manual of IGS-801M
3. While the packet leaves Port-2, it will be stripped away it tag becoming an untagged packet.
4. While the packet leaves Port-3, it will keep as a tagged packet with VLAN Tag=2.
5. While [PC-3] transmit a tagged packet with VLAN Tag=2 enters Port-3, [PC-1] and [PC-2] will received the
6. While the packet leaves Port-1 and Port-2, it will be stripped away it tag becoming an untagged packet.
1. While [PC-4] transmit an untagged packet enters Port-4, the switch will tag it with a VLAN Tag=3. [PC-5] and
2. While the packet leaves Port-5, it will be stripped away it tag becoming an untagged packet.
3. While the packet leaves Port-6, it will keep as a tagged packet with VLAN Tag=3.
At this example, VLAN Group 1 just set as default VLAN, but only focus on VLAN 2 and VLAN 3
traffic flow
Setup steps
61
User’s Manual of IGS-801M
Remember to remove the Port 1 – Port 6 from VLAN 1 membership, since the Port 1 – Port 6 had been assigned to
62
User’s Manual of IGS-801M
It’s import to remove the VLAN members from VLAN 1 configuration. Or the ports would become
overlap setting. ( About the overlapped VLAN configuration, see next VLAN configure sample)
Port-7~Port-8: PVID=1
not able to access each other of different VLANs. But they all need to access with the same server. The screen in Figure
4-5-11 appear. This section will show you how to configure the port for the server – that could be accessed by both VLAN
2 and VLAN 3.
63
User’s Manual of IGS-801M
2. Assign Port-7 to both VLAN 2 and VLAN 3 at the VLAN Member configuration page. The screen in Figure 4-5-12
appears.
64
User’s Manual of IGS-801M
3. Define a VLAN 1 as a “Public Area” that overlapping with both VLAN 2 members and VLAN 3 members.
4. Setup Port-7 with “PVID=1” at VLAN per Port Configuration page. The screen in Figure 4-5-14 appears.
65
User’s Manual of IGS-801M
That is, although the VLAN 2 members: Port-1 to Port-3 and VLAN 3 members: Port-4 to Port-6 also belong to VLAN 1.
But with different PVID settings, packets form VLAN 2 or VLAN 3 is not able to access to the other VLAN.
The most cases are used for “Uplink” to other switches. VLANs are separated at different switches, but they need to
access with other switches within the same VLAN group. The screen in Figure-4-5-15 appears.
About the VLAN ports connect to the hosts, please refer to 4.5.3.1 and 4.5.3.2 examples. The following steps will focus on
1. Specify Port-8 to be the 802.1Q VLAN Trunk port, and the Trunking port must be a Tagged port while egress. The
Port-8 configuration as the following screen in Figure 4-5-16.
66
User’s Manual of IGS-801M
2. Assign the VLAN Trunk Port to be the member of each VLAN – which wants to be aggregated. At this sample, add
3. Repeat Step 1 and 2, setup the VLAN Trunk port at the partner switch.
4. To add more VLANs to join the VLAN trunk, repeat Step 2 to assign the Trunk port to the VLANs.
67
User’s Manual of IGS-801M
4.6.1 Theory
The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between
switches, bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that
only one route exists between any two stations on the network, and provide backup links which automatically take over
when a primary link goes down. The spanning tree algorithms supported by this Managed Industrial Switch include these
versions:
Spanning Tree Protocol (STP) provides tree topography for any arrangement of bridges. STP also provides one path
between end stations on a network, eliminating loops.
Rapid Spanning Tree Protocol (RSTP) - While Classic Spanning Tree guarantees preventing L2 forwarding loops in a
general network topology, convergence can take up to 30-60 seconds. The convergence time is considered too long for
many applications. When network topology allows, faster convergence may be possible. The Rapid Spanning Tree
Protocol (RSTP) detects and uses of network topologies that provide faster convergence of the spanning tree, without
creating forwarding loops.
The IEEE 802.1D Spanning Tree Protocol and IEEE 802.1W Rapid Spanning Tree Protocol allow for the blocking of
links between switches that form loops within the network. When multiple links between switches are detected, a primary
link is established. Duplicated links are blocked from use and become standby links. The protocol allows for the duplicate
links to be used in the event of a failure of the primary link. Once the Spanning Tree Protocol is configured and enabled,
primary links are established and duplicated links are blocked automatically. The reactivation of the blocked links (at the
time of a primary link failure) is also accomplished automatically without operator intervention.
This automatic network reconfiguration provides maximum uptime to network users. However, the concepts of the
Spanning Tree Algorithm and protocol are a complicated and complex subject and must be fully researched and
understood. It is possible to cause serious degradation of the performance of the network if the Spanning Tree is
incorrectly configured. Please read the following before making any changes from the default values.
Creates a single spanning tree from any combination of switching or bridging elements.
Creates multiple spanning trees – from any combination of ports contained within a single switch, in user
specified groups.
Automatically reconfigures the spanning tree to compensate for the failure, addition, or removal of any
68
User’s Manual of IGS-801M
The path cost to the root associated with each switch port
STP communicates between switches on the network using Bridge Protocol Data Units (BPDUs). Each BPDU contains
The unique identifier of the switch that the transmitting switch currently believes is the root switch
The switch sends BPDUs to communicate and construct the spanning-tree topology. All switches connected to the LAN on
which the packet is transmitted will receive the BPDU. BPDUs are not directly forwarded by the switch, but the receiving
switch uses the information in the frame to calculate a BPDU, and, if the topology changes, initiates a BPDU transmission.
The communication between switches via BPDUs results in the following:
The shortest distance to the root switch is calculated for each switch
A designated switch is selected. This is the switch closest to the root switch through which packets will be
A port for each switch is selected. This is the port providing the best path from the switch to the root switch.
Ports included in the STP are selected.
MAC address in the network will become the root switch. By increasing the priority (lowering the priority number) of the
best switch, STP can be forced to select the best switch as the root switch.
When STP is enabled using the default parameters, the path between source and destination stations in a switched
network might not be ideal. For instance, connecting higher-speed links to a port that has a higher number than the
current root port can cause a root-port change.
port that transitioned directly from a Blocking state to a Forwarding state could create temporary data loops. Ports must
wait for new network topology information to propagate throughout the network before starting to forward packets. They
must also wait for the packet lifetime to expire for BPDU packets that were forwarded based on the old topology. The
forward delay timer is used to allow the network topology to stabilize after a topology change. In addition, STP specifies a
series of states a port must transition through to further ensure that a stable network topology is created after a topology
change.
Each port on a switch using STP exists is in one of the following five states:
69
User’s Manual of IGS-801M
Listening – the port is waiting to receive BPDU packets that may tell the port to go back to the blocking state
Learning – the port is adding addresses to its forwarding database, but not yet forwarding packets
Disabled – the port only responds to network management messages and must return to the blocking state
first
Switch
Blocking
Listening Disable
Learning
Forwarding
You can modify each port state by using management software. When you enable STP, every port on every switch in the
network goes through the blocking state and then transitions through the states of listening and learning at power up. If
properly configured, each port stabilizes to the forwarding or blocking state. No packets (except BPDUs) are forwarded
from, or received by, STP enabled ports until the forwarding state is enabled for that port.
2. STP Parameters
consisting of links between one or more switches. The port level constructs a spanning tree consisting of groups of one or
more ports. The STP operates in much the same way for both levels.
70
User’s Manual of IGS-801M
On the switch level, STP calculates the Bridge Identifier for each switch and then sets the Root
On the port level, STP sets the Root Port and the Designated Ports.
The following are the user-configurable STP parameters for the switch level:
Bridge Identifier A combination of the User-set priority and the 32768 + MAC
root bridge
Maximum Age Timer Measures the age of a received BPDU for a 20 seconds
Forward Delay Timer The amount time spent by a port in the learning 15 seconds
state.
The Hello Time cannot be longer than the Max. Age. Otherwise, a configuration error will
occur.
71
User’s Manual of IGS-801M
The following are the user-configurable STP parameters for the port or port group level:
Port Cost A value used by STP to evaluate paths – 200,000-100Mbps Fast Ethernet ports
STP calculates path costs and selects the 20,000-1000Mbps Gigabit Ethernet
path 0 - Auto
Port cost 0
3. Illustration of STP
A simple illustration of three switches connected in a loop is depicted in the below diagram. In this example, you can
anticipate some major network problems if the STP assistance is not applied.
If switch A broadcasts a packet to switch B, switch B will broadcast it to switch C, and switch C will broadcast it to back to
switch A and so on. The broadcast packet will be passed indefinitely in a loop, potentially causing a network failure. In this
example, STP breaks the loop by blocking the connection between switch B and C. The decision to block a particular
connection is based on the STP calculation of the most current Bridge and Port settings.
Now, if switch A broadcasts a packet to switch C, then switch C will drop the packet at port 2 and the broadcast will end
there. Setting-up STP using values other than the defaults, can be complex. Therefore, you are advised to keep the
default factory settings and STP will automatically assign root bridges/ports and block loop connections. Influencing STP
to choose a particular switch as the root bridge using the Priority setting, or influencing STP to choose a particular port to
block using the Port Priority and Port Cost settings is, however, relatively straight forward.
72
User’s Manual of IGS-801M
LAN 1
Portcast = 19
A Port 3
Bridge ID = 15
Port 1 Port 2
Portcast = 4 Portcast = 4
Portcast = 4 Portcast = 4
B Port 1 C Port 1
Bridge ID = 30 Bridge ID = 20
Portcast = 19 Portcast = 19
LAN 2 LAN 3
Figure 4-6-2 Before Applying the STA Rules
A Port 3
Root Bridge
Port 1 Port 2
B Port 1 C Port 1
Designated Bridge
Blocked
Port 2 Port 3 Port 2 Port 3
LAN 2 LAN 3
Figure 4-6-3 After Applying the STA Rules
The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port
cost between switches B and C. The two (optional) Gigabit ports (default port cost = 4) on switch A are connected to one
(optional) Gigabit port on both switch B and C. The redundant link between switch B and C is deliberately chosen as a 100
Mbps Fast Ethernet link (default port cost = 19). Gigabit ports could be used, but the port cost should be increased from
the default to ensure that the link between switch B and switch C is the blocked link.
73
User’s Manual of IGS-801M
The Managed Industrial Switch supports the following Spanning Tree protocols:
‧ Compatiable -- Spanning Tree Protocol (STP):Provides a single path between end stations, avoiding and
eliminating loops.
‧ Normal -- Rapid Spanning Tree Protocol (RSTP) : Detects and uses of network topologies that provide
faster spanning tree convergence, without creating forwarding loops.
The Managed Industrial Switch implement the Rapid Spanning Protocol as the default spanning tree
protocol. While select “Compatibles” mode, the system use the RSTP (802.1w) to compatible and
co work with another STP (802.1d)’s BPDU control packets.
This page is to enable/disable the Spanning Tree protocol and is allow configuring the spanning tree parameters.. The
Managed Industrial Switch supports IEEE 802.1d Spanning Tree (STP), IEEE 802.1w Rapid Spanning Tree (RSTP). The
Object Description
• System Priority Specifies the bridge priority value. When switches or bridges are running STP,
each is assigned a priority. After exchanging BPDUs, the switch with the lowest
priority value becomes the Root Bridge. The bridge priority value is provided in
• Hello Time Specifies the device Hello Time. The Hello Time indicates the amount of time in
74
User’s Manual of IGS-801M
• Max Age Specifies the device Maximum Age Time. The Maximum Age Time indicates the
messages.
• Forward Delay Specifies the device forward delay time. The Forward Delay Time indicates the
• Force version Specifies the Force Protocol Version parameter for the switch. The options are
Normal – Rapid STP (802.1w): Detects and uses of network topologies that
provide faster spanning tree convergence, without creating forwarding loops.
• Max Age -. The value lies between 6 and 40, with the value being less than or equal to "(2 *
Bridge Forward Delay) - 1" and greater than or equal to "2 * ( Bridge Hello Time +1)". The
default value is 20.
• Hello Time - The value being less than or equal to "(Bridge Max Age / 2) - 1". The default hello
time value is 2.
• Forward Delay- Bridge Forward Delay must be greater or equal to "(Bridge Max Age / 2) + 1".
The time range is from 4 seconds to 30 seconds. The default value is 15.
4-6-5 appears.
75
User’s Manual of IGS-801M
Object Description
Edge port cannot create loops, but it loses edge port status if a topology change
creates a potential for a loop. An edge port normally should not receive BPDU
Path Cost The port contribution to the root path cost. The path cost is adjusted to a higher or
lower value, and is used to forward traffic when a path being rerouted.
Default Path Cost -- The default path cost of the port is automatically set by the
port speed and the default path cost method. The default values for path costs
are:
- Ethernet – 2000000.
76
User’s Manual of IGS-801M
Port Priority Controls the port priority. This can be used to control priority of ports having
Default: 128
Range: 0-240, in steps of 16
By default, the system automatically detects the speed and duplex mode used on each port, and configures the path cost
according to the values shown below. Path cost “0” is used to indicate auto-configuration mode. When the short path cost
method is selected and the default path cost recommended by the IEEE 8021w standard exceeds 65,535, the default is
set to 65,535.
Trunk 90 1,000,000
Trunk 15 50,000
Trunk 3 5,000
Trunk 500,000
Trunk 50,000
Trunk 5,000
77
User’s Manual of IGS-801M
2. The “RSTP VLAN Bridge Overview” and “RSTP Port Status” screen is displayed as in Figure 4-6-4..
78
User’s Manual of IGS-801M
Object Description
Max Age Path Cost to the Designated Root for the spanning tree.
Forward Delay Derived value of the Root Port Bridge Forward Delay parameter.
Topology Specifies the Tolology change status of the current operation. If no topology
appears.
Object Description
79
User’s Manual of IGS-801M
VLAN Id Port or Link Aggregation interfaces associated with VLANs associated with the
Path Cost Cost of the port participating in the RSTP topology. Ports with a lower cost are
Edge Port Indicates whether the port is enabled as an edge port. It takes the value "Yes" or
"No".
P2p Port The Point-to-Point operating state. This is the actual device port link type.
Port State The current port STP state. If enabled, the port state determines what forwarding
• Blocking -- The port is currently blocked and cannot be used to forward traffic
or learn MAC addresses. Blocking is displayed when Classic STP
is enabled.
• Listening -- The port is currently in the listening mode. The port cannot forward
traffic nor can it learn MAC addresses.
• Learning -- The port is currently in the learning mode. The port cannot forward
traffic however it can learn new MAC addresses.
• Forwarding -- The port is currently in the forwarding mode. The port can
forward traffic and learn new MAC addresses.
80
User’s Manual of IGS-801M
4.7 Multicast
The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups
memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the
CPU for feature processing. The overall purpose of IGMP Snooping is to limit the forwarding of multicast frames to only
become members of a multicast group. The Internet Group Management Protocol (IGMP) is used to communicate this
information. IGMP is also used to periodically check the multicast group for members that are no longer active. In the case
where there is more than one multicast router on a sub network, one router is elected as the ‘queried’. This router then
keeps track of the membership of the multicast groups that have active members. The information received from IGMP is
then used to determine if multicast packets should be forwarded to a given sub network or not. The router can check,
using IGMP, to see if there is at least one member of a multicast group on a given subnet work. If there are no members
81
User’s Manual of IGS-801M
82
User’s Manual of IGS-801M
IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data.
Octets
0 8 16 31
Type Meaning
IGMP packets enable multicast routers to keep track of the membership of multicast groups, on their respective sub
networks. The following outlines what is communicated between a multicast router and a multicast group member using
IGMP.
A host sends an IGMP “report” to join a group
A host will never send a report when it wants to leave a group (for version 1).
A host will send a “leave” report when it wants to leave a group (for version 2).
Multicast routers send IGMP queries (to the all-hosts group address: 224.0.0.1) periodically to see whether any group
members exist on their sub networks. If there is no response from a particular group, the router assumes that there are no
The Time-to-Live (TTL) field of query messages is set to 1 so that the queries will not be forwarded to other sub networks.
IGMP version 2 introduces some enhancements such as a method to elect a multicast queried for each LAN, an explicit
leave message, and query messages that are specific to a given group.
83
User’s Manual of IGS-801M
The states a computer will go through to join or to leave a multicast group are shown below:
Non-Member
Leave Group
Leave Group
(Stop Timer) Join Group
(Send Report,
Start Timer)
Query Received
(Start Timer)
Delaying Member Idle Member
Report Received
(Stop Timer)
Timer Expried
(Send report)
IGMP Querier –
A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is
more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier” and
assumes the role of querying the LAN for group members. It then propagates the service requests on to any
upstream multicast switch/router to ensure that it will continue to receive the multicast service.
Multicast routers use this information, along with a multicast routing protocol such as
84
User’s Manual of IGS-801M
forwarding lists for multicast traffic. The screen in Figure 4-7-5 appears.
Object Description
Router Ports The Router Ports check box fields for attaching ports to a device that is attached to
Unregistered IPMC The function is to set “Enable” or “Disable” to allow the unregistered IP Multicast
Flooding Enable Group streams to flood to all ports of this switch. The unregistered IP Multicast
means that the received Multicast Group address not listed in the Multicast Group
Enabled is the default value. The switch forwards all the multicast steams to all the
host or linked switch.
VLAN ID Identifies a VLAN and contains information about the Multicast group configuration.
Add a new VLAN group and the Table will add the VLAN entry automatically.
IGMP Snooping Enables or disables IGMP snooping on the VLAN. Ports be assign to the VLAN will
85
User’s Manual of IGS-801M
IGMP Querying Enables or disables IGMP Query mode on the VLAN. The Query mode is used to
Enabled periodically check the multicast group for members that are no longer active. In the
case where there is more than one multicast router on a sub network, one router is
elected as the ‘queried’. This router then keeps track of the membership of the
multicast groups that have active members. The information received from IGMP is
network or not. The router can check, using IGMP, to see if there is at least one
Add a new VLAN group, the VLAN ID will be added to the table automatically with both “IGMP
86
User’s Manual of IGS-801M
Object Description
VLAN ID Identifies a VLAN and contains information about the Multicast group
configuration.
Active – The IGMP Query function had been enabled on the device and played
as a main Querier within a subnet domain. Within a network domain,
there will be only one IGMP Querier. While two or more Querier exist,
The Querier will transmit a IGMP Query packet about every 125 secs.
Idle – The IGMP Querier function had be enabled but might be at the initiation
status, or there’re already other Querier exist.
Queries transmitted Statistics of IGMP Query packets transmitted from the VLAN. Only the “IGMP
Queries received Statistics of IGMP Query packets received at the VLAN –from another switches or
routers.
(Packets with content type = 0x12 ; The Membership Report (version 1))
87
User’s Manual of IGS-801M
also reflects the manner in which the port joined the Multicast group. Ports can be added either to existing groups or to
new Multicast service groups. The Bridge Multicast Group page permits new Multicast service groups to be created. The
Bridge Multicast Group page also assigns ports to a specific Multicast service address group.
Object Description
Multicast Group The total count of the current Multicast Group entries of the switch.
entries Count
VID Identifies a VLAN and contains information about the Multicast group address.
88
User’s Manual of IGS-801M
QoS reduces bandwidth limitations, delay, loss, and jitter. It also provides increased reliability for delivery of your data and
allows you to prioritize certain applications across your network. You can define exactly how you want the switch to treat
• Assigning priorities to traffic (for example, to set higher priorities to time-critical or business-critical applications).
• Provide predictable throughput for multimedia applications such as video conferencing or voice over IP by
minimizing delay and jitter.
• Improve performance for specific types of traffic and preserve performance as the amount of traffic grows.
89
User’s Manual of IGS-801M
Object Description
Queue Mode This indicates that traffic scheduling for the selected queue is based strictly or
DSCP Mode - The output queue assignment is determined by the DSCP field.
latency problems. When 802.1p Tag Priority is applied, the Web Smart Switch recognizes 802.1Q VLAN tag packets and
2 bytes 2 bytes
90
User’s Manual of IGS-801M
The IEEE 802.1p Priority specification uses 4 priority levels to classify data packets. The screen in Figure 4-8-3 and
91
User’s Manual of IGS-801M
Object Description
Prioritize Traffic The draw menu allows customization of 802.1p to Traffic classifiers. Total 5 selections
• Custom – Manual mapping the 802.1p priority to the 4-level queues. Setup at the
next table.
802.1p Value Specifies the CoS priority tag values, where zero is the lowest and 7 is the highest.
Priority The traffic forwarding queue to which the CoS priority is mapped. Four traffic priority
• Low = Queue 0
• Normal = Queue 1
• Medium = Queue 2
• High = Queue 3
92
User’s Manual of IGS-801M
DiffServ Code Point (DSCP) - is the traffic prioritization bits within an IP header that are encoded by certain
applications and/or devices to indicate the level of service required by the packet across a network.
The DSCP Configuration page provides fields for defining output queue to specific DSCP fields.
Select the QoS mode to DSCP, the DSCP to queue mapping configuration page appears, as the Figure 4-8-5 shows.
Object Description
Prioritize Traffic The draw menu allows customization of DSCP to Traffic classifiers. Total 5
• Custom – Manual mapping the DSCP to the 4-level queues. Setup at the
next table.
93
User’s Manual of IGS-801M
The values of the IP DSCP header field within the incoming packet.
DSCP Value ( 0..63)
Priority The traffic forwarding queue to which the DSCP is mapped. Four traffic priority
The queue to which packets with the specific DSCP value is assigned. The
• Low = Queue 0
• Normal = Queue 1
• Medium = Queue 2
• High = Queue 3
94
User’s Manual of IGS-801M
In the 802.1X-world, the user is called the supplicant, the switch is the authenticator, and the RADIUS server is the
authentication server. The switch acts as the man-in-the-middle, forwarding requests and responses between the
supplicant and the authentication server. Frames sent between the supplicant and the switch are special 802.1X frames,
known as EAPOL (EAP Over LANs) frames. EAPOL frames encapsulate EAP PDUs (RFC3748). Frames sent between
the switch and the RADIUS server are RADIUS packets. RADIUS packets also encapsulate EAP PDUs together with
other attributes like the switch's IP address, name, and the supplicant's port number on the switch. EAP is very flexible, in
that it allows for different authentication methods, like MD5-Challenge, PEAP, and TLS. The important thing is that the
authenticator (the switch) doesn't need to know which authentication method the supplicant and the authentication server
are using, or how many information exchange frames are needed for a particular method. The switch simply encapsulates
the EAP part of the frame into the relevant type (EAPOL or RADIUS) and forwards it.
When authentication is complete, the RADIUS server sends a special packet containing a success or failure indication.
Besides forwarding this decision to the supplicant, the switch uses it to open up or block traffic on the switch port
95
User’s Manual of IGS-801M
unauthorized clients from connecting to a LAN through publicly accessible ports. The authentication server authenticates
each client connected to a switch port before making available any services offered by the switch or the LAN.
Until the client is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN
(EAPOL) traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass
through the port.
• Device Roles
Device Roles
With 802.1X port-based authentication, the devices in the network have specific roles as shown below.
Figure 4-9-1
z Client—the device (workstation) that requests access to the LAN and switch services and responds to requests
from the switch. The workstation must be running 802.1X-compliant client software such as that offered in the
Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.)
z Authentication server—performs the actual authentication of the client. The authentication server validates the
identity of the client and notifies the switch whether or not the client is authorized to access the LAN and switch
services. Because the switch acts as the proxy, the authentication service is transparent to the client. In this
release, the Remote Authentication Dial-In User Service (RADIUS) security system with Extensible
Authentication Protocol (EAP) extensions is the only supported authentication server; it is available in Cisco
Secure Access Control Server version 3.0. RADIUS operates in a client/server model in which secure
authentication information is exchanged between the RADIUS server and one or more RADIUS clients.
96
User’s Manual of IGS-801M
z Switch (802.1X device)—controls the physical access to the network based on the authentication status of the
client. The switch acts as an intermediary (proxy) between the client and the authentication server, requesting
identity information from the client, verifying that information with the authentication server, and relaying a
response to the client. The switch includes the RADIUS client, which is responsible for encapsulating and
decapsulating the Extensible Authentication Protocol (EAP) frames and interacting with the authentication server.
When the switch receives EAPOL frames and relays them to the authentication server, the Ethernet header is
stripped and the remaining EAP frame is re-encapsulated in the RADIUS format. The EAP frames are not
modified or examined during encapsulation, and the authentication server must support EAP within the native
frame format. When the switch receives frames from the authentication server, the server's frame header is
removed, leaving the EAP frame, which is then encapsulated for Ethernet and sent to the client.
The switch or the client can initiate authentication. If you enable authentication on a port by using the dot1x port-control
auto interface configuration command, the switch must initiate authentication when it determines that the port link state
transitions from down to up. It then sends an EAP-request/identity frame to the client to request its identity (typically, the
switch sends an initial identity/request frame followed by one or more requests for authentication information). Upon
However, if during bootup, the client does not receive an EAP-request/identity frame from the switch, the client can initiate
authentication by sending an EAPOL-start frame, which prompts the switch to request the client's identity
If 802.1X is not enabled or supported on the network access device, any EAPOL frames from the
client are dropped. If the client does not receive an EAP-request/identity frame after three attempts
to start authentication, the client transmits frames as if the port is in the authorized state. A port in
the authorized state effectively means that the client has been successfully authenticated.
When the client supplies its identity, the switch begins its role as the intermediary, passing EAP frames between the client
and the authentication server until authentication succeeds or fails. If the authentication succeeds, the switch port
becomes authorized.
The specific exchange of EAP frames depends on the authentication method being used. “Figure 4-9-2” shows a
message exchange initiated by the client using the One-Time-Password (OTP) authentication method with a RADIUS
server.
97
User’s Manual of IGS-801M
unauthorized state. While in this state, the port disallows all ingress and egress traffic except for 802.1X protocol packets.
When a client is successfully authenticated, the port transitions to the authorized state, allowing all traffic for the client to
flow normally.
If a client that does not support 802.1X is connected to an unauthorized 802.1X port, the switch requests the client's
identity. In this situation, the client does not respond to the request, the port remains in the unauthorized state, and the
In contrast, when an 802.1X-enabled client connects to a port that is not running the 802.1X protocol, the client initiates
the authentication process by sending the EAPOL-start frame. When no response is received, the client sends the request
for a fixed number of times. Because no response is received, the client begins sending frames as if the port is in the
authorized state
If the client is successfully authenticated (receives an Accept frame from the authentication server), the port state changes
to authorized, and all frames from the authenticated client are allowed through the port. If the authentication fails, the port
remains in the unauthorized state, but authentication can be retried. If the authentication server cannot be reached, the
switch can retransmit the request. If no response is received from the server after the specified number of attempts,
When a client logs off, it sends an EAPOL-logoff message, causing the switch port to transition to the unauthorized state.
If the link state of a port transitions from up to down, or if an EAPOL-logoff frame is received, the port returns to the
unauthorized state.
98
User’s Manual of IGS-801M
submit credentials for authentication. A central server, the RADIUS server, determines whether the user is allowed access
to the network.
This page is to configure the RADIUS server connection features. The screen in Figure 4-9-3 appears.
Object Description
This selector lists the two options for administrative mode: enable and disable.
• RADIUS UDP Port The UDP port used by this server. The valid range is 0 - 65535.
• RADIUS Secret Indicates if the shared secret for this server has been configured.
Setup the RADIUS server and assign the client IP address to the Web-Smart switch. In this case, field in the default IP
Address of the Web-Smart switch with 192.168.0.100. And also make sure the shared secret key is as same as the one
you had set at the switch RADIUS server – 123456 at this case.
99
User’s Manual of IGS-801M
100
User’s Manual of IGS-801M
and the switch (i.e., authenticator), as well as the client identity lookup process that runs between the switch and
authentication server. These parameters are described in this section. The 802.1X Port Configuration screen in Figure
4-9-5 appears.
The Network Access Control port configuration table includes the following fields:
Object Description
Port Selects the port to be configured. When the selection is changed, a screen
refresh will occur causing all fields to be updated for the newly selected port.
101
User’s Manual of IGS-801M
Admin State This selector lists the options for control mode. The control mode is only set if the
• Auto: The authenticator PAE sets the controlled port mode to reflect the
outcome of the authentication exchanges between the supplicant,
Port State This field indicates the configured control mode for the port.
Re-authenticate This button begins the re-authentication sequence on the selected port. This
button is only selectable if the control mode is 'auto'. If the button is not
selectable, it will be grayed out. Once this button is pressed, the action is
immediate. It is not required to press the Submit button for the action to occur.
Force Reinitialize This button begins the re-initialization sequence on the selected port. This button
is only selectable if the control mode is 'auto'. If the button is not selectable, it will
be grayed out. Once this button is pressed, the action is immediate. It is not
Statistics This button redirect to the “802.1X Statistics” page on the selected port.
Re-authenticate All This button begins the re-authentication sequence on the all ports.
Force Reinitialize All This button begins the re-initialization sequence on all ports.
At the bottom of this page, click “Parameter” button will redirect to the “802.1X parameter” configure page. The screen
in Figure 4-9-7 appears.
102
User’s Manual of IGS-801M
Object Description
Reauthentication This select field allows the user to enable or disable reauthentication of the
Enabled supplicant for the specified port. If “Enabled” be checked, reauthentication will
occur. Otherwise, reauthentication will not be allowed. Changing the selection will
not change the configuration until the Apply button is pressed.
Reauthentication This input field allows the user to enter the reauthentication period for the
Period selected port. The reauthentication period is the value, in seconds, of the timer
[1-3600 seconds] used by the authenticator state machine on this port to determine when
be a value in the range of 1 and 65535. Changing the value will not change the
EAP Timeout [1-255 This input field allows the user to enter the EAP timeout for the selected port. The
seconds] EAP timeout is the value, in seconds, of the timer used by the authenticator state
machine on this port to timeout the supplicant. The EAP timeout must be a value
103
User’s Manual of IGS-801M
in the MAC Address database. These entries are used by the transparent bridging function to determine how to forward a
The MAC Address database contains static entries, which are never aged out, and dynamically learned entries, which
are removed if they are not updated within a given time. You specify that time by entering a value for the Address
Ageing Timeout. You may enter any number of seconds between 0 and 65535.
IEEE 802.1D recommends a default of 300 seconds, which is the factory default.
104
User’s Manual of IGS-801M
Object Description
Ports Specifies the port numbers for which the table is queried.
Type The MAC Address type for which the table is queried. There’re two possible type-
• Dynamic - Addresses are associated with ports by learning the ports from
the frame source address.
MAC-Address Specifies the MAC address for which the table is queried.
page. In addition, several MAC Addresses can be defined for a single port. The screen in Figure 4-10-2 appears.
105
User’s Manual of IGS-801M
Object Description
Ports Specifies the port numbers for which the table is queried.
MAC-Address Input the MAC address entry be manualed bind to the specify port.
Object Description
Ports Specifies the port numbers for which the table is queried.
Type Static - Static addresses are manually configured. Packets received with the
destinated MAC address mathch the port static MAC setting will be forward to the
specify port.
MAC-Address The MAC address listed in the current static address list.
106
User’s Manual of IGS-801M
5. SWITCH OPERATION
5.1 Address Table
The Switch is implemented with an address table. This address table composed of many entries. Each entry is used to
store the address information of some node in network, including MAC address, port no, etc. This in-formation comes from
5.2 Learning
When one packet comes in from any port, the Switch will record the source address, port no. And the other related
information in address table. This information will be used to decide either forwarding or filtering for future packets.
source address learning. The Ethernet Switching will lookup the address-table for the destination address. If not found,
this packet will be forwarded to all the other ports except the port, which this packet comes in. And these ports will transmit
this packet to the network it connected. If found, and the destination address is located at different port from this packet
comes in, the Ethernet Switching will forward this packet to the port where this destination address is located according to
the information from address table. But, if the destination address is located at the same port with this packet comes in,
then this packet will be filtered. Thereby increasing the network throughput and availability
5.4 Store-and-Forward
Store-and-Forward is one type of packet-forwarding techniques. A Store-and-Forward Ethernet Switching stores the
incoming frame in an internal buffer, do the complete error checking before transmission. Therefore, no error packets
occurrence, it is the best choice when a network needs efficiency and stability.
The Ethernet Switch scans the destination address from the packet-header, searches the routing table pro-vided for the
incoming port and forwards the packet, only if required. The fast forwarding makes the switch attractive for connecting
servers directly to the network, thereby increasing throughput and availability. How-ever, the switch is most commonly
used to segment existence hubs, which nearly always improves overall performance. An Ethernet Switching can be easily
configured in any Ethernet network environment to signifi-cantly boost bandwidth using conventional cabling and
adapters.
Due to the learning function of the Ethernet switching, the source address and corresponding port number of each
incoming and outgoing packet are stored in a routing table. This information is subsequently used to filter packets whose
destination address is on the same segment as the source address. This confines network traffic to its respective domain
The Switch performs "Store and forward" therefore, no error packets occur. More reliably, it reduces the re-transmission
107
User’s Manual of IGS-801M
5.5 Auto-Negotiation
The STP ports on the Switch have built-in "Auto-negotiation". This technology automatically sets the best possible
bandwidth when a connection is established with another network device (usually at Power On or Reset). This is done by
detect the modes and speeds at the second of both device is connected and capable of, both 10Base-T and 100Base-TX
devices can connect with the port in either Half- or Full-Duplex mode.
108
User’s Manual of IGS-801M
1 BI_DA+ BI_DB+
2 BI_DA- BI_DB-
3 BI_DB+ BI_DA+
4 BI_DC+ BI_DD+
5 BI_DC- BI_DD-
6 BI_DB- BI_DA-
7 BI_DD+ BI_DC+
8 BI_DD- BI_DC-
Implicit implementation of the crossover function within a twisted-pair cable, or at a wiring panel, while not expressly
necessary. Each port of the Switch supports auto-MDI/MDI-X detection. That means you can directly connect the Switch
to any Ethernet devices without making a crossover cable. The following table and diagram show the standard RJ-45
109
User’s Manual of IGS-801M
There are 8 wires on a standard UTP/STP cable and each wire is color-coded. The following shows the pin allocation and
Please make sure your connected cables are with same pin assignment and color as above picture before deploying the
110
User’s Manual of IGS-801M
Verify that is using the right power cord/adapter (DC 24-48V), please don’t use the power adapter with DC
output higher than 48V, or it may damage this device.
Select the proper UTP/STP cable to construct the user network. Use unshielded twisted-pair (UTP) or shield
twisted-pair (STP) cable for RJ-45 connections that depend on the connector type the switch equipped: 100Ω
Category 3, 4 or 5 cable for 10Mbps connections, 100Ω Category 5 cable for 100Mbps connections, or 100
Ω Category 5e/above cable for 1000Mbps connections. Also be sure that the length of any twisted-pair
connection does not exceed 100 meters (328 feet).
Diagnosing LED Indicators: To assist in identifying problems, the switch can be easily monitored through
panel indicators, which describe common problems the user may encounter and where the user can find
possible solutions.
If the power indicator does not light on when the power cord is plugged in, you may have a problem with
power cord. Then check for loose power connections, power losses or surges at power outlet. If you still
cannot resolve the problem, contact the local dealer for assistance.
If the LED indicators are normal and the connected cables are correct but the packets still cannot be
transmitted. Please check the user system’s Ethernet devices’ configuration or status
111
User’s Manual of IGS-801M
APPENDEX C : GLOSSARY
A
Aggregation
Using multiple ports in parallel to increase the link speed beyond the limits of a port and to increase the
ARP
ARP is an acronym for Address Resolution Protocol. It is a protocol that used to convert an IP address into a
physical address, such as an Ethernet address. ARP allows a host to communicate with other hosts when only
the Internet address of its neighbors is known. Before using IP, the host sends a broadcast ARP request
Auto-Negotiation
Auto-negotiation is the process where two different devices establish the mode of operation and the speed
D
DHCP
DHCP is an acronym for Dynamic Host Configuration Protocol. It is a protocol used for assigning dynamic IP
addresses to devices on a network.
DHCP used by networked computers (clients) to obtain IP addresses and other parameters such as the default
gateway, subnet mask, and IP addresses of DNS servers from a DHCP server.
The DHCP server ensures that all IP addresses are unique, for example, no IP address is assigned to a second
client while the first client's assignment is valid (its lease has not expired). Therefore, IP address pool
Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather
than requiring an administrator to manage the task. This means that a new computer can be added to a network
DNS
DNS is an acronym for Domain Name System. It stores and associates many types of information with domain
112
User’s Manual of IGS-801M
names. Most importantly, DNS translates human-friendly domain names and computer hostnames into
computer-friendly IP addresses. For example, the domain name www.example.com might translate to
192.168.0.1.
DSCP
DSCP is an acronym for Differentiated Services Code Point. It is a field in the header of IP packets for packet
classification purposes.
E
Ethernet Type
Ethernet Type, or EtherType, is a field in the Ethernet MAC header, defined by the Ethernet networking standard.
It is used to indicate which protocol is being transported in an Ethernet frame.
F
Fast Leave
IGMP snooping Fast Leave processing allows the switch to remove an interface from the forwarding-table entry
without first sending out group specific queries to the interface. The VLAN interface is pruned from the multicast
tree for the multicast group specified in the original leave message. Fast-leave processing ensures optimal
bandwidth management for all hosts on a switched network, even when multiple multicast groups are in use
simultaneously.
H
HTTP
HTTP is an acronym for Hypertext Transfer Protocol. It is a protocol that used to transfer or convey information
on the World Wide Web (WWW).
HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should
take in response to various commands. For example, when you enter a URL in your browser, this actually sends
an HTTP command to the Web server directing it to fetch and transmit the requested Web page. The other main
standard that controls how the World Wide Web works is HTML, which covers how Web pages are formatted and
displayed.
Any Web server machine contains, in addition to the Web page files it can serve, an HTTP daemon, a program
that is designed to wait for HTTP requests and handle them when they arrive. The Web browser is an HTTP
client, sending requests to server machines. An HTTP client initiates a request by establishing a Transmission
Control Protocol (TCP) connection to a particular port on a remote host (port 80 by default). An HTTP server
listening on that port waits for the client to send a request message.
113
User’s Manual of IGS-801M
ICMP
ICMP is an acronym for Internet Control Message Protocol. It is a protocol that generated the error response,
diagnostic or routing purposes. ICMP messages generally contain information about routing difficulties or simple
exchanges such as time-stamp or echo transactions. For example, the PING command uses ICMP to test an
Internet connection.
IEEE 802.1X
IEEE 802.1X is an IEEE standard for port-based Network Access Control. It provides authentication to devices
attached to a LAN port, establishing a point-to-point connection or preventing access from that port if
authentication fails. With 802.1X, access to all switch ports can be centrally controlled from a server, which
means that authorized users can use the same credentials for authentication from any point within the network.
IGMP
IGMP is an acronym for Internet Group Management Protocol. It is a communications protocol used to manage
the membership of Internet Protocol multicast groups. IGMP is used by IP hosts and adjacent multicast routers to
establish multicast group memberships. It is an integral part of the IP multicast specification, like ICMP for unicast
connections. IGMP can be used for online video and gaming, and allows more efficient use of resources when
IGMP Querier
A router sends IGMP Query messages onto a particular link. This router is called the Querier.
IP
IP is an acronym for Internet Protocol. It is a protocol used for communicating data across a internet network.
IP is a "best effort" system, which means that no packet of information sent over it is assured to reach its
destination in the same condition it was sent. Each device connected to a Local Area Network (LAN) or Wide
Area Network (WAN) is given an Internet Protocol address, and this IP address is used to identify the device
The current version of the Internet protocol is IPv4, which has 32-bits Internet Protocol addresses allowing for in
excess of four billion unique addresses. This number is reduced drastically by the practice of webmasters taking
addresses in large blocks, the bulk of which remain unused. There is a rather substantial movement to adopt a
new version of the Internet Protocol, IPv6, which would have 128-bits Internet Protocol addresses. This number
can be represented roughly by a three with thirty-nine zeroes after it. However, IPv4 is still the protocol of choice
IPMC
114
User’s Manual of IGS-801M
L
LACP
LACP is an IEEE 802.3ad standard protocol. The Link Aggregation Control Protocol, allows bundling several
physical ports together to form a single logical port.
M
MAC Table
Switching of frames is based upon the DMAC address contained in the frame. The switch builds up a table that
maps MAC addresses to switch ports for knowing which ports the frames should go to ( based upon the DMAC
address in the frame ). This table contains both static and dynamic entries. The static entries are configured by
the network administrator if the administrator wants to do a fixed mapping between the DMAC address and
switch ports.
The frames also contain a MAC address ( SMAC address ), which shows the MAC address of the equipment
sending the frame. The SMAC address is used by the switch to automatically update the MAC table with these
dynamic MAC addresses. Dynamic entries are removed from the MAC table if no frame with the corresponding
Mirroring
For debugging network problems or monitoring network traffic, the switch system can be configured to mirror
frames from multiple ports to a mirror port. (In this context, mirroring a frame is the same as copying the frame.)
Both incoming (source) and outgoing (destination) frames can be mirrored to the mirror port.
N
NetBIOS
NetBIOS is an acronym for Network Basic Input/Output System. It is a program that allows applications on
separate computers to communicate within a Local Area Network (LAN), and it is not supported on a Wide Area
Network (WAN).
The NetBIOS giving each computer in the network both a NetBIOS name and an IP address corresponding to a
different host name, provides the session and transport services described in the Open Systems Interconnection
(OSI) model.
NFS
NFS is an acronym for Network File System. It allows hosts to mount partitions on a remote system and use
them as though they are local file systems.
115
User’s Manual of IGS-801M
NFS allows the system administrator to store resources in a central location on the network, providing authorized
users continuous access to them, which means NFS supports sharing of files, printers, and other resources as
P
PING
ping is a program that sends a series of packets over a network or the Internet to a specific computer in order to
generate a response from that computer. The other computer responds with an acknowledgment that it received
the packets. Ping was created to verify whether a specific computer on a network or the Internet exists and is
connected.
ping uses Internet Control Message Protocol (ICMP) packets. The PING Request is the packet from the origin
computer, and the PING Reply is the packet response from the target.
Private VLAN
In a private VLAN, communication between ports in that private VLAN is not permitted. A VLAN can be
Q
QoS
QoS is an acronym for Quality of Service. It is a method to guarantee a bandwidth relationship between
individual applications or protocols.
A communications network transports a multitude of applications and data, including high-quality video and
delay-sensitive data such as real-time voice. Networks must provide secure, predictable, measurable, and
sometimes guaranteed services.
Achieving the required QoS becomes the secret to a successful end-to-end business solution. Therefore, QoS is
R
RARP
RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP
address for a given hardware address, such as an Ethernet address. RARP is the complement of ARP.
116
User’s Manual of IGS-801M
Router Port
A router port is a port on the Ethernet switch that leads switch towards the Layer 3 multicast device.
RSTP
In 1998, the IEEE with document 802.1w introduced an evolution of STP: the Rapid Spanning Tree Protocol,
which provides for faster spanning tree convergence after a topology change. Standard IEEE 802.1D-2004 now
incorporates RSTP and obsoletes STP, while at the same time being backwards-compatible with STP.
S
SNMP
SNMP is an acronym for Simple Network Management Protocol. It is part of the Transmission Control
Protocol/Internet Protocol (TCP/IP) protocol for network management. SNMP allow diverse network objects to
participate in a network management architecture. It enables network management systems to learn network
problems by receiving traps or change notices from network devices implementing SNMP.
STP
Spanning Tree Protocol is an OSI layer-2 protocol which ensures a loop free topology for any bridged LAN. The
original STP protocol is now obsoleted by RSTP.
T
Tag Priority
Tag Priority is a 3-bit field storing the priority level for the 802.1Q frame.
TCP
TCP is an acronym for Transmission Control Protocol. It is a communications protocol that uses the Internet
Protocol (IP) to exchange the messages between computers.
The TCP protocol guarantees reliable and in-order delivery of data from sender to receiver and distinguishes
data for multiple connections by concurrent applications (for example, Web server and e-mail server) running on
the same host.
The applications on networked hosts can use TCP to create connections to one another. It is known as a
connection-oriented protocol, which means that a connection is established and maintained until such time as
the message or messages to be exchanged by the application programs at each end have been exchanged.
TCP is responsible for ensuring that a message is divided into the packets that IP manages and for reassembling
the packets back into the complete message at the other end.
Common network applications that use TCP include the World Wide Web (WWW), e-mail, and File Transfer
Protocol (FTP).
117
User’s Manual of IGS-801M
TELNET
TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission
Control Protocol (TCP) and provides a virtual connection between TELNET server and TELNET client.
TELNET enables the client to control the server and communicate with other servers on the network. To start a
Telnet session, the client user must log in to a server by entering a valid username and password. Then, the
client user can enter commands through the Telnet program just as if they were entering commands directly on
ToS
ToS is an acronym for Type of Service. It is implemented as the IPv4 ToS priority control. It is fully decoded to
determine the priority from the 6-bit ToS field in the IP header. The most significant 6 bits of the ToS field are fully
decoded into 64 possibilities, and the singular code that results is compared against the corresponding bit in the
U
UDP
UDP is an acronym for User Datagram Protocol. It is a communications protocol that uses the Internet Protocol
(IP) to exchange the messages between computers.
UDP is an alternative to the Transmission Control Protocol (TCP) that uses the Internet Protocol (IP). Unlike TCP,
UDP does not provide the service of dividing a message into packet datagrams, and UDP doesn't provide
reassembling and sequencing of the packets. This means that the application program that uses UDP must be
able to make sure that the entire message has arrived and is in the right order. Network applications that want to
save processing time because they have very small data units to exchange may prefer UDP to TCP.
UDP provides two services not provided by the IP layer. It provides port numbers to help distinguish different
user requests and, optionally, a checksum capability to verify that the data arrived intact.
Common network applications that use UDP include the Domain Name System (DNS), streaming media
applications such as IPTV, Voice over IP (VoIP), and Trivial File Transfer Protocol (TFTP).
User Priority
User Priority is a 3-bit field storing the priority level for the 802.1Q frame.
118
User’s Manual of IGS-801M
V
VLAN
Virtual LAN. A method to restrict communication between switch ports. VLANs can be used for the following
applications:
VLAN unaware switching: This is the default configuration. All ports are VLAN unaware with Port VLAN ID 1
and members of VLAN 1. This means that MAC addresses are learned in VLAN 1, and the switch does not
VLAN aware switching: This is based on the IEEE 802.1Q standard. All ports are VLAN aware. Ports
connected to VLAN aware switches are members of multiple VLANs and transmit tagged frames. Other ports are
members of one VLAN, set up with this Port VLAN ID, and transmit untagged frames.
Provider switching: This is also known as Q-in-Q switching. Ports connected to subscribers are VLAN unaware,
members of one VLAN, and set up with this unique Port VLAN ID. Ports connected to the service provider are
VLAN aware, members of multiple VLANs, and set up to tag all frames. Untagged frames received on a
subscriber port are forwarded to the provider port with a single VLAN tag. Tagged frames received on a
subscriber port are forwarded to the provider port with a double VLAN tag.
VLAN ID
VLAN ID is a 12-bit field specifying the VLAN to which the frame belongs.
119
EC Declaration of Conformity
* Produced by:
Manufacturer‘s Name : Planet Technology Corp.
Manufacturer‘s Address : 11F, No. 96, Min Chuan Road, Hsin Tien,
Taipei, Taiwan, R.O.C.
is herewith confirmed to comply with the requirements set out in the Council Directive on the
Approximation of the Laws of the Member States relating to Electromagnetic Compatibility
Directive on (2004/108/EC).
For the evaluation regarding the EMC, the following standards were applied: