UM BasicConfig L2P Rel90 en
UM BasicConfig L2P Rel90 en
UM BasicConfig L2P Rel90 en
Basic Configuration
Industrial ETHERNET (Gigabit-)Switch
RS20/RS30/RS40, MS20/MS30, OCTOPUS, PowerMICE,
RSR20/RSR30, MACH 100, MACH 1000, MACH 4000
Manuals and software are protected by copyright. All rights reserved. The copying, reproduction,
translation, conversion into any electronic medium or machine scannable form is not permitted,
either in whole or in part. An exception is the preparation of a backup copy of the software for
your own use. For devices with embedded software, the end-user license agreement on the
enclosed CD/DVD applies.
The performance features described here are binding only if they have been expressly agreed
when the contract was made. This document was produced by Hirschmann Automation and
Control GmbH according to the best of the company's knowledge. Hirschmann reserves the right
to change the contents of this document without prior notice. Hirschmann can give no guarantee
in respect of the correctness or accuracy of the information in this document.
Hirschmann can accept no responsibility for damages, resulting from the use of the network
components or the associated operating software. In addition, we refer to the conditions of use
specified in the license contract.
You can get the latest version of this manual on the Internet at the Hirschmann product site
(www.hirschmann.com).
Contents
Safety Information 9
Key 13
Introduction 15
UM BasicConfig L2P
Release 9.0 02/2015 3
Contents
3 Loading/saving settings 61
3.1 Loading settings 62
3.1.1 Loading from the local non-volatile memory 63
3.1.2 Loading from a file 64
3.1.3 Resetting the configuration to the default settings 66
3.1.4 Loading from the AutoConfiguration Adapter 67
3.1.5 Using the offline configurator 68
3.2 Saving settings 71
3.2.1 Saving locally (and on the ACA) 71
3.2.2 Saving in a binary file or a script file on a URL 73
3.2.3 Saving to a binary file on the PC 74
3.2.4 Saving as a script on the PC 74
3.2.5 Saving as an offline configuration file on the PC 75
3.3 Configuration Signature 76
UM BasicConfig L2P
4 Release 9.0 02/2015
Contents
UM BasicConfig L2P
Release 9.0 02/2015 5
Contents
UM BasicConfig L2P
6 Release 9.0 02/2015
Contents
UM BasicConfig L2P
Release 9.0 02/2015 7
Contents
C Index 281
UM BasicConfig L2P
8 Release 9.0 02/2015
Safety Information
Safety Information
WARNING
UNCONTROLLED MACHINE ACTIONS
To avoid uncontrolled machine actions caused by data loss, configure all
the data transmission devices individually.
Before you start any machine which is controlled via data transmission, be
sure to complete the configuration of all data transmission devices.
UM BasicConfig L2P
Release 9.0 02/2015 9
Safety Information
UM BasicConfig L2P
10 Release 9.0 02/2015
About this Manual
The “Basic Configuration” user manual contains the information you need to
start operating the device. It takes you step by step from the first startup
operation through to the basic settings for operation in your environment.
The “Industry Protocols” user manual describes how the device is connected
by means of a communication protocol commonly used in the industry, such
as EtherNet/IP and PROFINET IO.
UM BasicConfig L2P
Release 9.0 02/2015 11
About this Manual
Maintenance
Hirschmann are continually working on improving and developing their
software. Check regularly whether there is an updated version of the
software that provides you with additional benefits. You find information
and software downloads on the Hirschmann product pages on the
Internet (www.hirschmann.com).
UM BasicConfig L2P
12 Release 9.0 02/2015
Key
Key
List
Work step
Subheading
Link Cross-reference with link
Note: A note emphasizes an important fact or draws your attention to a dependency.
Courier ASCII representation in the graphical user interface
Execution in the Graphical User Interface
Execution in the Command Line Interface
Symbols used:
Router
Switch
UM BasicConfig L2P
Release 9.0 02/2015 13
Key
Bridge
Hub
A random computer
Configuration Computer
Server
PLC -
Programmable logic
controller
I/O -
Robot
UM BasicConfig L2P
14 Release 9.0 02/2015
Introduction
Introduction
The device has been developed for use in a harsh industrial environment.
Accordingly, the installation process has been kept simple. Thanks to the
selected default settings, you only have to enter a few settings before starting
to operate the device.
Note: The changes you make in the dialogs are copied into the volatile
memory of the device when you click on "Set".
To save the changes to the device into permanent memory, select the saving
location in the Basic Settings:Load/Save dialog box and click on "Save".
UM BasicConfig L2P
Release 9.0 02/2015 15
Introduction
UM BasicConfig L2P
16 Release 9.0 02/2015
Access to the user interfaces
The device has 3 user interfaces, which you can access via different
interfaces:
System monitor via the V.24 interface (out-of-band)
Command Line Interface (CLI) via the V.24 connection (out-of-band) as
well as Telnet or SSH (in-band)
Graphical User Interface via Ethernet (in-band).
UM BasicConfig L2P
Release 9.0 02/2015 17
Access to the user interfaces 1.1 System Monitor
UM BasicConfig L2P
18 Release 9.0 02/2015
Access to the user interfaces 1.1 System Monitor
Start the terminal program on the PC and set up a connection with the
device.
< Device Name (Boot) Release: 1.00 Build: 2005-09-17 15:36 >
UM BasicConfig L2P
Release 9.0 02/2015 19
Access to the user interfaces 1.1 System Monitor
Press the <1> key within one second to start system monitor 1.
System Monitor
sysMon1>
UM BasicConfig L2P
20 Release 9.0 02/2015
Access to the user interfaces 1.2 Command Line Interface
The Command Line Interface enables you to use the functions of the device
via a local or remote connection.
The Command Line Interface provides IT specialists with a familiar
environment for configuring IT devices.
The script compatibility of the Command Line Interface enables you, among
other things, to feed multiple devices with the same configuration data, to
create and use partial configurations, or to compare 2 configurations using 2
script files.
You will find a detailed description of the Command Line Interface in the
“Command Line Interface” reference manual.
Note: To facilitate making entries, the CLI gives you the option of
abbreviating keywords. Type in the beginning of a keyword. When you press
the tab key, the CLI finishes the keyword.
UM BasicConfig L2P
Release 9.0 02/2015 21
Access to the user interfaces 1.2 Command Line Interface
User:
Enter a user name. The default setting for the user name is admin .
Press the Enter key.
Enter the password. The default setting for the password is private .
Press the Enter key.
You can change the user name and the password later in the
Command Line Interface.
Please note that these entries are case-sensitive.
UM BasicConfig L2P
22 Release 9.0 02/2015
Access to the user interfaces 1.2 Command Line Interface
NOTE: Enter '?' for Command Help. Command help displays all options
that are valid for the 'normal' and 'no' command forms. For
the syntax of a particular command form, please consult the
documentation.
UM BasicConfig L2P
Release 9.0 02/2015 23
Access to the user interfaces 1.3 Graphical User Interface
The graphical user Interface (GUI) allows you to conveniently define and
monitor the settings of the device from a computer on the network.
You reach the graphical user interface (GUI) with the following programs:
HiView
Web browser
System requirements
Use HiView to open the graphical user interface. This application offers
you the possibility to use the graphical user interface without other
applications such as a Web browser or an installed Java Runtime
Environment (JRE).
Alternatively you have the option to open the graphical user interface in a
Web browser, e.g. in Mozilla Firefox version 3.5 or higher or Microsoft
Internet Explorer version 6 or higher. You need to install the Java Runtime
Environment (JRE) in the most recently released version. You can find
installation packages for your operating system at http://java.com.
UM BasicConfig L2P
24 Release 9.0 02/2015
Access to the user interfaces 1.3 Graphical User Interface
UM BasicConfig L2P
Release 9.0 02/2015 25
Access to the user interfaces 1.3 Graphical User Interface
UM BasicConfig L2P
26 Release 9.0 02/2015
Entering the IP Parameters
When you install the device for the first time enter the IP parameters.
The device provides the following options for entering the IP parameters
during the first installation:
Entry using the Command Line Interface (CLI).
You choose this “out of band” method if
you preconfigure your device outside its operating environment, or
you need to restore network access (“in-band”) to the device
Entry using the HiDiscovery protocol.
You choose this “in-band” method on a previously installed network
device or if you have another Ethernet connection between your PC and
the device
Configuration using the AutoConfiguration Adapter (ACA).
You choose this method if you are replacing a device with a device of the
same type and have already saved the configuration on anACA.
Using BOOTP.
You choose this “in-band” method to configure the installed device using
BOOTP. You need a BOOTP server for this method. The BOOTP server
assigns the configuration data to the device using its MAC address. The
DHCP mode is the default mode for the configuration data reference, set
the parameter to the BOOTP mode for this method.
Configuration via DHCP.
You choose this “in-band” method to configure the installed device using
DHCP. You need a DHCP server for this method. The DHCP server
assigns the configuration data to the device using its MAC address or its
system name.
UM BasicConfig L2P
Release 9.0 02/2015 27
Entering the IP Parameters
UM BasicConfig L2P
28 Release 9.0 02/2015
Entering the IP Parameters 2.1 IP Parameter Basics
Since 1992, five classes of IP address have been defined in the RFC 1340.
The network address is the fixed part of the IP address. The worldwide
leading regulatory board for assigning network addresses is the IANA
(Internet Assigned Numbers Authority). If you require an IP address block,
contact your Internet service provider. Internet service providers should
contact their local higher-level organization:
APNIC (Asia Pacific Network Information Center) - Asia/Pacific Region
ARIN (American Registry for Internet Numbers) - Americas and Sub-
Sahara Africa
LACNIC (Regional Latin-American and Caribbean IP Address Registry) –
Latin America and some Caribbean Islands
RIPE NCC (Réseaux IP Européens) - Europe and Surrounding Regions
UM BasicConfig L2P
Release 9.0 02/2015 29
Entering the IP Parameters 2.1 IP Parameter Basics
All IP addresses belong to class A when their first bit is a zero, i.e. the first
decimal number is less than 128.
The IP address belongs to class B if the first bit is a one and the second bit
is a zero, i.e. the first decimal number is between 128 and 191.
The IP address belongs to class C if the first two bits are a one, i.e. the first
decimal number is higher than 191.
Assigning the host address (host ID) is the responsibility of the network
operator. He alone is responsible for the uniqueness of the IP addresses he
assigns.
2.1.2 Netmask
Routers and gateways subdivide large networks into subnetworks. The
netmask assigns the IP addresses of the individual devices to a particular
subnetwork.
The division into subnetworks with the aid of the netmask is performed in
much the same way as the division of the network addresses (net id) into
classes A to C.
UM BasicConfig L2P
30 Release 9.0 02/2015
Entering the IP Parameters 2.1 IP Parameter Basics
The bits of the host address (host id) that represent the mask are set to one.
The remaining bits of the host address in the netmask are set to zero (see
the following examples).
Example of a netmask:
Decimal notation
255.255.192.0
Binary notation
11111111.11111111.11000000.00000000
Subnetwork mask bits
Class B
UM BasicConfig L2P
Release 9.0 02/2015 31
Entering the IP Parameters 2.1 IP Parameter Basics
Decimal notation
129.218.65.17
128 < 129 191 › Class B
Binary notation
10000001.11011010.01000001.00010001
Subnetwork 1
Network address
Decimal notation
129.218.129.17
128 < 129 191 › Class B
Binary notation
10000001.11011010.10000001.00010001
Subnetwork 2
Network address
UM BasicConfig L2P
32 Release 9.0 02/2015
Entering the IP Parameters 2.1 IP Parameter Basics
Romeo
Juliet
Lorenzo
LAN 1
LAN 2
Romeo then places this envelope in a second one with Lorenzo's MAC
address as the destination and his own MAC address as the source. This
process is comparable to going from layer 3 to layer 2 of the ISO/OSI base
reference model.
Finally, Romeo puts the entire data packet into the mailbox. This is
comparable to going from layer 2 to layer 1, i.e. to sending the data packet
over the Ethernet.
UM BasicConfig L2P
Release 9.0 02/2015 33
Entering the IP Parameters 2.1 IP Parameter Basics
Lorenzo receives the letter and removes the outer envelope. From the
inner envelope he recognizes that the letter is meant for Juliet. He places
the inner envelope in a new outer envelope and searches his address list
(the ARP table) for Juliet's MAC address. He writes her MAC address on
the outer envelope as the destination address and his own MAC address
as the source address. He then places the entire data packet in the mail
box.
Juliet receives the letter and removes the outer envelope. She finds the
inner envelope with Romeo's IP address. Opening the inner envelope and
reading its contents corresponds to transferring the message to the higher
protocol layers of the SO/OSI layer model.
Juliet would now like to send a reply to Romeo. She places her reply in an
envelope with Romeo's IP address as destination and her own IP address
as source. But where is she to send the answer? For she did not receive
Romeo's MAC address. It was lost when Lorenzo replaced the outer
envelope.
The letter now travels back to Romeo via Lorenzo, the same way the first
letter traveled from Romeo to Juliet.
UM BasicConfig L2P
34 Release 9.0 02/2015
Entering the IP Parameters 2.1 IP Parameter Basics
Since 1993, RFC 1519 has been using Classless Inter-Domain Routing
(CIDR) to provide a solution. CIDR overcomes these class boundaries and
supports classless address ranges.
With CIDR, you enter the number of bits that designate the IP address range.
You represent the IP address range in binary form and count the mask bits
that designate the netmask. The netmask indicates the number of bits that
are identical to the network part for the IP addresses in a given address
range. Example:
IP address, decimal Network mask, IP address, binary
decimal
149.218.112.1 255.255.255.128 10010101 11011010 01110000 00000001
149.218.112.127 10010101 11011010 01110000 01111111
25 mask bits
CIDR notation: 149.218.112.0/25
Mask bits
UM BasicConfig L2P
Release 9.0 02/2015 35
Entering the IP Parameters 2.2 Entering IP parameters via CLI
If you do not configure the system via BOOTP/DHCP, DHCP Option 82, the
HiDiscovery protocol or the AutoConfiguration Adapter ACA, then you
perform the configuration via the V.24 interface using the CLI.
Entering IP addresses
UM BasicConfig L2P
36 Release 9.0 02/2015
Entering the IP Parameters 2.2 Entering IP parameters via CLI
NOTE: Enter '?' for Command Help. Command help displays all options
that are valid for the 'normal' and 'no' command forms. For
the syntax of a particular command form, please consult the
documentation.
Deactivate DHCP.
UM BasicConfig L2P
Release 9.0 02/2015 37
Entering the IP Parameters 2.2 Entering IP parameters via CLI
After entering the IP parameters, you easily configure the device via the
graphical user interface (see the “GUI” reference manual).
UM BasicConfig L2P
38 Release 9.0 02/2015
Entering the IP Parameters 2.3 Entering the IP Parameters via
HiDiscovery
HiDiscovery displays a line for every device that reacts to the HiDiscovery
protocol.
Note: When the IP address is entered, the device copies the local
configuration settings (see on page 61 “Loading/saving settings”).
UM BasicConfig L2P
Release 9.0 02/2015 39
Entering the IP Parameters 2.3 Entering the IP Parameters via
HiDiscovery
Note: For security reasons, switch off the HiDiscovery function for the device
in the graphical user interface, after you have assigned the IP parameters to
the device (see on page 56 “Graphical User Interface IP Configuration”).
Note: Save the settings so that you will still have the entries after a restart
(see on page 61 “Loading/saving settings”).
UM BasicConfig L2P
40 Release 9.0 02/2015
Entering the IP Parameters 2.4 Loading the system configuration
from the ACA
When you start the device, it checks to see whether an ACA is present. If an
ACA is present with a valid password and valid software, the device loads the
configuration data from the ACA.
To save the configuration data in the ACA, See 71 “Saving locally (and on the
ACA)”.
UM BasicConfig L2P
Release 9.0 02/2015 41
Entering the IP Parameters 2.4 Loading the system configuration
from the ACA
2 0
3 0 3a 0
1 1
4 4a
UM BasicConfig L2P
42 Release 9.0 02/2015
Entering the IP Parameters 2.5 System configuration via BOOTP
Note: In its delivery state, the device gets its configuration data from the
DHCP server.
Provide the BOOTP server with the following data for a device:
# /etc/bootptab for BOOTP-daemon bootpd
#
# gw -- gateway
# ha -- hardware address
# ht -- hardware type
# ip -- IP address
# sm -- subnet mask
# tc -- template
.global:\
:gw=0.0.0.0:\
:sm=255.255.240.0:
UM BasicConfig L2P
Release 9.0 02/2015 43
Entering the IP Parameters 2.5 System configuration via BOOTP
switch_01:ht=ethernet:ha=008063086501:ip=10.1.112.83:tc=.global:
switch_02:ht=ethernet:ha=008063086502:ip=10.1.112.84:tc=.global:
.
.
The lines under “.global:” make the configuration of several devices easier.
With the template (tc) you allocate the global configuration data (tc=.global:)
to each device .
The direct allocation of hardware address and IP address is performed in the
device lines (switch-0...).
UM BasicConfig L2P
44 Release 9.0 02/2015
Entering the IP Parameters 2.5 System configuration via BOOTP
Start-up
Load default
configuration
Device in initalization
Send
DHCP Yes DHCP/
or BOOTP
BOOTP? 1
Requests
No
initialize IP stack
with IP parameters
Device is manageable
UM BasicConfig L2P
Release 9.0 02/2015 45
Entering the IP Parameters 2.5 System configuration via BOOTP
No
tftp
successful?
No*
Yes
Load transferred
config file
Save transferred
config file local
and set
boot configuration
to local
Loading of
configurations data
is complete
UM BasicConfig L2P
46 Release 9.0 02/2015
Entering the IP Parameters 2.5 System configuration via BOOTP
UM BasicConfig L2P
Release 9.0 02/2015 47
Entering the IP Parameters 2.6 System Configuration via DHCP
The device sends its system name to the DHCP server. The DHCP server
can then use the system name to allocate an IP address as an alternative to
the MAC address.
Option Meaning
1 Subnet Mask
2 Time Offset
3 Router
4 Time server
UM BasicConfig L2P
48 Release 9.0 02/2015
Entering the IP Parameters 2.6 System Configuration via DHCP
Option Meaning
12 Host Name
42 NTP server
61 Client Identifier
66 TFTP Server Name
67 Bootfile Name
The advantage of using DHCP instead of BOOTP is that the DHCP server
can restrict the validity of the configuration parameters (“Lease”) to a specific
time period (known as dynamic address allocation). Before this period
(“Lease Duration”) elapses, the DHCP client can attempt to renew this lease.
Alternatively, the client can negotiate a new lease. The DHCP server then
allocates a random free address.
To help avoid this, DHCP servers provide the explicit configuration option of
assigning a specific client the same IP address based on a unique hardware
ID (known as static address allocation).
Note: When using Industrial HiVision network management, the user checks
to see that DHCP allocates the original IP address to each device every time.
UM BasicConfig L2P
Release 9.0 02/2015 49
Entering the IP Parameters 2.6 System Configuration via DHCP
}
#
# Host berta requests IP configuration
# with her MAC address
#
host berta {
hardware ethernet 00:80:63:08:65:42;
fixed-address 10.1.112.82;
}
#
# Host hugo requests IP configuration
# with his client identifier.
#
host hugo {
#
option dhcp-client-identifier "hugo";
option dhcp-client-identifier 00:68:75:67:6f;
fixed-address 10.1.112.83;
server-name "10.1.112.11";
filename "/agent/config.dat";
}
UM BasicConfig L2P
50 Release 9.0 02/2015
Entering the IP Parameters 2.7 DHCP-Server Pools per VLAN
UM BasicConfig L2P
Release 9.0 02/2015 51
Entering the IP Parameters 2.7 DHCP-Server Pools per VLAN
VLAN A
2
Pool 1
VLAN 2 tagged
DHCP server
Pool 3
1 2 3 4 5 6 7 8 9
Pool 2
VLAN 100 tagged Untagged
VLAN B C
100
Pool 4
DHCP client DHCP client
Figure 12: Example application of the DHCP-server: IP address pools per VLAN
The example application shows how you can set up DHCP-server pools for
each VLAN or interface.
Configure the VLANs (see Section “VLANs” on page 189).
Define the desired IP-address ranges and switch on the DHCP-server for
the desired VLANs.
Open the Advanced:DHCP Server:Pool dialog.
Click the Create button to create the desired pool entries.
UM BasicConfig L2P
52 Release 9.0 02/2015
Entering the IP Parameters 2.7 DHCP-Server Pools per VLAN
Create
a new pool
Set other
Pool-IDs
Figure 13: DHCP server: Create a pool per VLAN, or for one interface/all interfaces
DHCP-requests from Client A are answered from Pool 1. If the pool is used
up, any subsequent requests are answered only if you have created another
pool.
DHCP-requests from Client B are ignored initially, since VLAN 100 does not
have access to the DHCP server yet.
To allow DHCP access, add Pool 4:
Pool 4: Dynamic. Assign Pool 4 to VLAN 100.
The first request is now answered from Pool 3. The next requests are
answered from Pool 4.
UM BasicConfig L2P
Release 9.0 02/2015 53
Entering the IP Parameters 2.7 DHCP-Server Pools per VLAN
Note: If Client A (or B) sends an untagged DHCP request, the DHCP server
answers only if you have set the PVID (Port VLAN Identifier) for Interface 3
(or 6) to 2 (or 100). If you have assigned the PVID of an interface to the
Management-VLAN, the requests reach the DHCP server, but the client does
not receive an answer from the VLAN pool.
Note: Depending on the interface settings, the answer from the DHCP server
may be tagged or untagged even if the DHCP request is tagged.
Using the CLI, you configure the pools for each VLAN as follows (for detailed
information, see section “VLANs” on page 189):
Switch to "VLAN Database" mode.
Create a VLAN, if this does not already exist.
Switch to "Interface" mode.
Define the ports associated with the VLAN.
Switch to "Configure" mode.
Create a new pool, if this does not already exist.
dhcp-server pool add <pool_id> dynamic <startIP>
<endIP>
At first, the device assigns "All Interfaces“ and "Management-VLAN" to
the pool.
Assign the pool to a certain VLAN ID
dhcp-server pool modify <pool_id> mode vlan <vlan_id>
Switch on the pool.
dhcp-server pool enable <pool_id>
To reset the VLAN of a pool (i.e. assign "All Interfaces“ and
"Management-VLAN"):
dhcp-server pool modify <pool_id> mode vlan none
UM BasicConfig L2P
54 Release 9.0 02/2015
Entering the IP Parameters 2.8 System Configuration via DHCP
Option 82
As with the classic DHCP, on startup an agent receives its configuration data
according to the “BOOTP/DHCP process” flow chart (see figure 10).
While the system configuration is based on the classic DHCP protocol on the
device being configured (see on page 48 “System Configuration via DHCP”),
Option 82 is based on the network topology. This procedure gives you the
option of assigning the same IP address to any device which is connected to
a particular location (port of a device) on the LAN.
The installation of a DHCP server is described in the chapter “Setting up a
DHCP Server with Option 82” on page 256.
Backbone Switch
MAC Address =
IP = 00:80:63:10:9a:d7
10.0.1.100
DHCP Server
IP =
10.0.1.1
IP =
10.0.1.100
UM BasicConfig L2P
Release 9.0 02/2015 55
Entering the IP Parameters 2.9 Graphical User Interface IP Confi-
guration
Use the Basic Settings:Network dialog to define the source from which
the device receives its IP parameters after startup, assign the IP parameters
and VLAN ID, and configure the HiDiscovery access.
UM BasicConfig L2P
56 Release 9.0 02/2015
Entering the IP Parameters 2.9 Graphical User Interface IP Confi-
guration
Under “Mode”, you enter where the device gets its IP parameters:
In the BOOTP mode, the configuration is via a BOOTP or DHCP
server on the basis of the MAC address of the device.
See “Setting up a DHCP/BOOTP Server” on page 250.
In the DHCP mode, the configuration is via a DHCP server on the
basis of the MAC address or the name of the device.
See “Setting up a DHCP Server with Option 82” on page 256.
In the “local” mode the net parameters in the device memory are used.
You enter the name applicable to the DHCP protocol in the “Name” line in
the Basic Settings:System dialog of the graphical user interface.
UM BasicConfig L2P
Release 9.0 02/2015 57
Entering the IP Parameters 2.9 Graphical User Interface IP Confi-
guration
Note: Save the settings so that you will still have the entries after a restart
(see on page 61 “Loading/saving settings”).
UM BasicConfig L2P
58 Release 9.0 02/2015
Entering the IP Parameters 2.10 Faulty Device Replacement
In both cases, when the new device is started, it is given the same
configuration data that the replaced device had.
Note: If you are replacing a device with DIP switches, check the DIP switch
settings to ensure they are the same.
Note: If you want to access the device via SSH, you also need an SSH key.
To transfer the SSH key of the old device to the new one, you have the
following options:
- If you have already created the key and saved it outside the device (e.g. on
your administration workstation), load the saved key onto the new device
(see on page 267 “Loading a key onto the device”).
- Otherwise create a new SSH key and load it onto the new device (see on
page 265 “Preparing access via SSH”). Note that the new device now
identifies itself by means of another key.
UM BasicConfig L2P
Release 9.0 02/2015 59
Entering the IP Parameters 2.10 Faulty Device Replacement
UM BasicConfig L2P
60 Release 9.0 02/2015
Loading/saving settings
3 Loading/saving settings
The device saves settings such as the IP parameters and the port
configuration in the temporary memory. These settings are lost when you
switch off or reboot the device.
The device allows you to do the following:
Load settings from a non-volatile memory into the temporary memory
Save settings from the temporary memory in a non-volatile memory
If you change the current configuration (for example, by switching a port off),
the graphical user interface changes the “load/save” symbol in the navigation
tree from a disk symbol to a yellow triangle. After saving the configuration,
the graphical user interface displays the “load/save” symbol as a disk again.
UM BasicConfig L2P
Release 9.0 02/2015 61
Loading/saving settings 3.1 Loading settings
When it is restarted, the device loads its configuration data from the local
non-volatile memory. The prerequisites for this are:
You have not connected an AutoConfiguration Adapter (ACA) and
the IP configuration is “local”.
During a restart, the device also allows you to load settings from the following
sources:
a binary file of the AutoConfiguration Adapter. If an ACA is connected to
the device, the device automatically loads its configuration from the ACA
during the boot procedure.
from a script file of the AutoConfiguration Adapter. If an ACA is connected
to the device, the device automatically loads its configuration from the
script file of the ACA during the boot procedure (see on page 67 “Loading
a script from the ACA”).
UM BasicConfig L2P
62 Release 9.0 02/2015
Loading/saving settings 3.1 Loading settings
During operation, the device allows you to load settings from the following
sources:
the local non-volatile memory
a file in the connected network (setting on delivery)
a binary file or an editable and readable script on the PC and
the firmware (restoration of the configuration on delivery).
Note: When loading a configuration, hold off any accesses to the device until
it has loaded the configuration file and applied the new configuration settings.
Depending on the device type and the extent of the configuration settings,
this process can take between 10 and 200 seconds.
Select the
Basics: Load/Save dialog.
In the “Load” frame, click “from Device”.
Click “Restore”.
UM BasicConfig L2P
Release 9.0 02/2015 63
Loading/saving settings 3.1 Loading settings
Select the
Basics: Load/Save dialog.
In the “Load” frame, click
“from URL” if you want the device to load the configuration data from a file and
retain the locally saved configuration.
“from URL & save to Switch” if you want the device to load the configuration data
from a file and save this configuration locally.
“via PC” if you want the device to load the configuration data from a file on the PC
and retain the locally saved configuration.
In the “URL” frame, enter the path under which the device will find
the configuration file, if you want to load from the URL.
Click “Restore”.
The URL identifies the path to the tftp server from which the device
loads the configuration file. The URL is in the format
tftp://IP address of the tftp server/path name/file name
(e.g. tftp://10.1.112.5/switch/config.dat).
UM BasicConfig L2P
64 Release 9.0 02/2015
Loading/saving settings 3.1 Loading settings
In the “URL” line, enter the path of the tftp server, e.g.
tftp://10.1.112.214/switch/switch_01.cfg.
UM BasicConfig L2P
Release 9.0 02/2015 65
Loading/saving settings 3.1 Loading settings
Select the
Basics: Load/Save dialog.
Make your selection in the "Delete" frame.
Click "Delete configuration". The device will delete its configuration
immediately.
UM BasicConfig L2P
66 Release 9.0 02/2015
Loading/saving settings 3.1 Loading settings
Note: During the boot procedure, the configuration on the ACA has
priority over the configuration in the local non-volatile memory.
The chapter “Saving locally (and on the ACA)” on page 71 describes how
you can save a configuration file on an ACA.
Note: During the boot procedure, a binary configuration on the ACA has
priority over a script on the ACA.
UM BasicConfig L2P
Release 9.0 02/2015 67
Loading/saving settings 3.1 Loading settings
The chapter “Saving locally (and on the ACA)” describes how you can
save a script file on an ACA.
UM BasicConfig L2P
68 Release 9.0 02/2015
Loading/saving settings 3.1 Loading settings
Data format
The offline configurator reads and writes configuration data in an XML-
based format. The file name extension of these files is “.ocf” (Offline
Configurator Format).
You can use the graphical user interface of the devices to load these files
and thus configure your devices very quickly.
The XML format also allows you to use other tools to create, edit and
manage the offline configuration files and thus optimize your
administration processes.
UM BasicConfig L2P
Release 9.0 02/2015 69
Loading/saving settings 3.1 Loading settings
For more details on using the offline configurator, see the chapter
“Loading a configuration from the offline configurator” in the “GUI”
Reference Manual.
UM BasicConfig L2P
70 Release 9.0 02/2015
Loading/saving settings 3.2 Saving settings
Select the
Basics: Load/Save dialog.
In the "Load" options, click on "From device".
Click on "Save".
The device saves the current configuration data in the local non-
volatile memory and also, if a ACA is connected, in the ACA.
UM BasicConfig L2P
Release 9.0 02/2015 71
Loading/saving settings 3.2 Saving settings
Note: After you have successfully saved the configuration on the device, the
device sends a trap hmConfigurationSavedTrap together with the
information about the AutoConfiguration Adapter (ACA), if one is connected.
When you change the configuration for the first time after saving it, the device
sends a trap hmConfigurationChangedTrap.
Note: The device allows you to trigger the following events when the
configuration stored on the ACA does not match the configuration on the
device:
send a trap (see on page 207 “Configuring Traps”),
update the device status (see on page 210 “Configuring the Device
Status”),
update the status of the signal contacts (see on page 213 “Controlling the
Signal Contact”).
UM BasicConfig L2P
72 Release 9.0 02/2015
Loading/saving settings 3.2 Saving settings
Note: The configuration file includes all configuration data, including the
password. Therefore pay attention to the access rights on the tftp server.
Select the
Basics: Load/Save dialog.
In the “Save” frame, choose “to URL (binary)”
to create a binary file, or “to URL (script)”
to create an editable and readable script file.
In the “URL” frame, enter the path under which you want the device
to save the configuration file.
The URL identifies the path to the tftp server on which the device saves
the configuration file. The URL is in the format
tftp://IP address of the tftp server/path name/file name
(e.g. tftp://10.1.112.5/switch/config.dat).
Click "Save".
UM BasicConfig L2P
Release 9.0 02/2015 73
Loading/saving settings 3.2 Saving settings
Note: If you save the configuration in a binary file, the device saves all
configuration settings in a binary file.
In contrast to this, the device only saves those configuration settings that
deviate from the default setting when saving to a script file.
When loading script files, these are only intended for overwriting the default
setting of the configuration.
Select the
Basics: Load/Save dialog.
In the "Save" frame, click "on the PC (binary)".
In the save dialog, enter the name of the file in which you want the
device to save the configuration file.
Click "Save".
UM BasicConfig L2P
74 Release 9.0 02/2015
Loading/saving settings 3.2 Saving settings
Select the
Basics: Load/Save dialog.
In the “Save” frame, click “to PC (script)”.
In the save dialog, enter the name of the file in which you want the
device to save the configuration file.
Click "Save".
Select the
Basics: Load/Save dialog.
In the “Save” frame, click “to PC (ocf)”.
In the save dialog, enter the name of the file in which you want the
device to save the configuration file.
Click "Save".
UM BasicConfig L2P
Release 9.0 02/2015 75
Loading/saving settings 3.3 Configuration Signature
UM BasicConfig L2P
76 Release 9.0 02/2015
Loading Software Updates
Alarm...................................... None
UM BasicConfig L2P
Release 9.0 02/2015 77
Loading Software Updates
Note: The existing configuration of the device is still there after the new
software is installed.
UM BasicConfig L2P
78 Release 9.0 02/2015
Loading Software Updates 4.1 Loading the Software manually
from the ACA
You can connect the AutoConfiguration Adapter (ACA) to a USB port of your
PC like a conventional USB stick and copy the device software into the main
directory of the ACA.
Open the system monitor (see on page 18 “Starting the System Monitor”).
Select 2 and press the Enter key to copy the software from the ACA into
the local memory of the device.
At the end of the update, the system monitor asks you to press any key to
continue.
The system monitor offers you additional options in connection with the
software on your device:
selecting the software to be loaded
starting the software
performing a cold start
UM BasicConfig L2P
Release 9.0 02/2015 79
Loading Software Updates 4.1 Loading the Software manually
from the ACA
1 Swap OS images
2 Copy image to backup
3 Test stored images in Flash mem.
4 Test stored images in USB mem.
5 Apply and store selection
6 Cancel selection
UM BasicConfig L2P
80 Release 9.0 02/2015
Loading Software Updates 4.1 Loading the Software manually
from the ACA
Swap OS images
The memory of the device provides space for two images of the software.
This allows you, for example, to load a new version of the software without
deleting the existing version.
Select 1 to load the other software in the next booting process.
Cancel selection
Select 6 to leave this dialog without making any changes.
UM BasicConfig L2P
Release 9.0 02/2015 81
Loading Software Updates 4.1 Loading the Software manually
from the ACA
UM BasicConfig L2P
82 Release 9.0 02/2015
Loading Software Updates 4.2 Automatic software update by
ACA
For a software update via the ACA, first copy the new device software into
the main directory of the AutoConfiguration Adapter. If the version of the
software on the ACA is newer or older than the version on the device, the
device performs a software update.
Note: Software versions with release 06.0.00 and higher in the non-
volatile memory of the device support the software update via the ACA. If
the device software is older, you have the option of loading the software
manually from the ACA. See “Loading the Software manually from the
ACA” on page 79.
Give the file the name that matches the device type and the software
variant, e.g. rsL2P.bin for device type RS2 with the software variant L2P.
Please note the case-sensitivity here.
If you have copied the software from a product CD or from a Web server
of the manufacturer, the software already has the correct file name.
Also create an empty file with the name “autoupdate.txt” in the main
directory of the ACA. Please note the case-sensitivity here.
Connect the AutoConfiguration Adapter to the device and restart the
device.
The device automatically performs the following steps:
– During the booting process, it checks whether an ACA is connected.
– It checks whether the ACA has a file with the name “autoupdate.txt” in
the main directory.
– It checks whether the ACA has a software file with a name that
matches the device type in the main directory.
– If compares the software version stored on the ACA with the one
stored on the device.
– If these conditions are fulfilled, the device loads the software from the
ACA to its non-volatile memory as the main software.
– The device keeps a backup of the existing software in the non-volatile
memory.
– The device then performs a cold start, during which it loads the new
software from the non-volatile memory.
UM BasicConfig L2P
Release 9.0 02/2015 83
Loading Software Updates 4.2 Automatic software update by
ACA
One of the following messages in the log file indicates the result of the update
process:
S_watson_AUTOMATIC_SWUPDATE_SUCCESSFUL: Update
completed successfully.
S_watson_AUTOMATIC_SWUPDATE_FAILED_WRONG_FILE: Update
failed. Reason: incorrect file.
S_watson_AUTOMATIC_SWUPDATE_FAILED_SAVING_FILE: Update
failed. Reason: error when saving.
In your browser, click on “Reload” so that you can use the graphical user
interface to access the device again after it is booted.
UM BasicConfig L2P
84 Release 9.0 02/2015
Loading Software Updates 4.3 Loading the software from the
TFTP server
For a software update via TFTP, you need a TFTP server on which the
software to be loaded is stored (see on page 260 “TFTP Server for Software
Updates”).
The URL identifies the path to the software stored on the tftp server. The URL
is in the format
tftp://IP address of the tftp server/path name/file name
(e.g. tftp://192.168.1.1/device/device.bin).
Click on “tftp Update” to load the software from the tftp server to the
device.
UM BasicConfig L2P
Release 9.0 02/2015 85
Loading Software Updates 4.3 Loading the software from the
TFTP server
After booting the device, click “Reload” in your browser to access the
device again.
UM BasicConfig L2P
86 Release 9.0 02/2015
Loading Software Updates 4.4 Loading the Software via File
Selection
For a software update via a file selection window, the device software must
be on a data carrier that you can access from your PC.
UM BasicConfig L2P
Release 9.0 02/2015 87
Loading Software Updates 4.5 Bootcode Update via TFTP
UM BasicConfig L2P
88 Release 9.0 02/2015
Loading Software Updates 4.5 Bootcode Update via TFTP
UM BasicConfig L2P
Release 9.0 02/2015 89
Loading Software Updates 4.6 Software update OCTOPUS
Table 4: Designations for the software images of the OCTOPUS family devices
UM BasicConfig L2P
90 Release 9.0 02/2015
Loading Software Updates 4.6 Software update OCTOPUS
Step 1:
Update the device software to version 07.0.03.
Restart the device.
Step 2:
Update the boot software. Use the CLI only; type the command:
copy tftp://<server IP>/<path>/octL2P_boot.img
system:bootcode
Restart the device.
Step 3:
Update the device software to version 07.1.00. Consider the
designations of the software images.
UM BasicConfig L2P
Release 9.0 02/2015 91
Loading Software Updates 4.6 Software update OCTOPUS
UM BasicConfig L2P
92 Release 9.0 02/2015
Configuring the Ports
Select the
Basics:Port Configuration dialog.
In the "Port on" column, select the ports that are connected to
another device.
Note: The active automatic configuration has priority over the manual
configuration.
Select the
Basics:Port Configuration dialog.
If the device connected to this port requires a fixed setting
– select the operating mode (transmission rate, duplex mode) in the "Manual
configuration" column and
– deactivate the port in the "Automatic configuration" column.
UM BasicConfig L2P
Release 9.0 02/2015 93
Configuring the Ports
Select the
Basics:Port Configuration dialog.
In the "Propagate connection error" column, select the ports for
which you want to have link monitoring.
UM BasicConfig L2P
94 Release 9.0 02/2015
Configuring the Ports
UM BasicConfig L2P
Release 9.0 02/2015 95
Configuring the Ports
Global settings
– For devices with PoE select the
Basic Settings:Power over Ethernet dialog.
– For devices with PoE select the
Basic Settings:Power over Ethernet Plus:Global dialog.
Frame "Operation":
With “Function On/Off” you turn the PoE on or off.
Frame "Configuration":
With “Send Trap” you can get the device to send a trap in the
following cases:
– If a value exceeds/falls below the performance threshold.
– If the PoE supply voltage is switched on/off on at least one port.
Enter the power threshold in “Threshold”. When the device exceeds
or is below this value, the device will send a trap, provided that you
enable the “Send Trap” function. For the power threshold you enter
the power yielded as a percentage of the nominal power.
“Budget [W]” displays the power that the device nominally provides
to the PoE ports.
“Reserved [W]” displays the maximum power that the device
provides to the connected PoE devices on the basis of their
classification.
“Delivered [W]” shows how large the current power requirement is
on the PoE ports.
The difference between the "nominal" and "reserved" power indicates
how much power is still available to the free PoE+ ports.
UM BasicConfig L2P
96 Release 9.0 02/2015
Configuring the Ports
Port settings
– For devices with PoE select the
Basic Settings:Power over Ethernet dialog.
– For devices with PoE+ select the
Basic Settings:Power over Ethernet Plus:Port dialog.
The table only shows ports that support PoE.
In the “POE on” column, you can enable/disable PoE at this port.
The “Status” column indicates the PoE status of the port.
In the “Priority” column (MACH 4000), set the PoE priority of the port
to “low”, “high” or “critical”.
The "Class" column indicates the class of the connected device:
Class: Maximum delivered power
0: 15.4 W = As-delivered state
1: 4.0 W
2: 7.0 W
3: 15.4 W
4: reserved, treated as Class 0
UM BasicConfig L2P
Release 9.0 02/2015 97
Configuring the Ports
Figure 20: Power over Ethernet Plus, Global dialog (MACH 102 and
MACH 104)
UM BasicConfig L2P
98 Release 9.0 02/2015
Configuring the Ports
Figure 21: Power over Ethernet Plus, Port dialog (MACH 102 and MACH 104)
UM BasicConfig L2P
Release 9.0 02/2015 99
Configuring the Ports
UM BasicConfig L2P
100 Release 9.0 02/2015
Assistance in the Protection from
Unauthorized Access
UM BasicConfig L2P
Release 9.0 02/2015 101
Assistance in the Protection from 6.1 Protecting the device
Unauthorized Access
Note: Retain at least one option to access the device. Connecting to the
device via V.24 serial access is possible, since it cannot be deactivated.
UM BasicConfig L2P
102 Release 9.0 02/2015
Assistance in the Protection from 6.2 Password for SNMP access
Unauthorized Access
The device receives the SNMP packet and compares the IP address of the
sending computer and the password with the entries in the device MIB.
If the password has the appropriate access right, and if the IP address of the
sending computer has been entered, then the device will allow access.
In the delivery state, the device is accessible via the password "public" (read
only) and "private" (read and write) to every computer.
First define a new password with which you can access from your
computer with all rights.
Limit the access rights of the known passwords or delete their entries.
UM BasicConfig L2P
Release 9.0 02/2015 103
Assistance in the Protection from 6.2 Password for SNMP access
Unauthorized Access
The graphical user interface and the command line interface (CLI) use
the same passwords as SNMPv3 for the users “admin” and “user”.
UM BasicConfig L2P
104 Release 9.0 02/2015
Assistance in the Protection from 6.2 Password for SNMP access
Unauthorized Access
Note: For security reasons, the device does not display the passwords.
Make a note of every change. You cannot access the device without a
valid password.
Note: For security reasons, SNMPv3 encrypts the password. With the
“SNMPv1” or “SNMPv2” setting in the dialog Security:SNMPv1/v2
access, the device transfers the password unencrypted, so that this
can also be read.
UM BasicConfig L2P
Release 9.0 02/2015 105
Assistance in the Protection from 6.2 Password for SNMP access
Unauthorized Access
If you select SNMPv1 or SNMPv2, you can specify in the table via which
IP addresses the device may be accessed, and what kinds of
passwords are to be used.
Up to 8 entries can be made in the table.
For security reasons, the read password and the read/write password
must not be identical.
Please note that passwords are case-sensitive.
UM BasicConfig L2P
106 Release 9.0 02/2015
Assistance in the Protection from 6.2 Password for SNMP access
Unauthorized Access
UM BasicConfig L2P
Release 9.0 02/2015 107
Assistance in the Protection from 6.3 Telnet/internet/SSH access
Unauthorized Access
UM BasicConfig L2P
108 Release 9.0 02/2015
Assistance in the Protection from 6.3 Telnet/internet/SSH access
Unauthorized Access
After you switch the http Web server off, it is no longer possible to log in via
a http Web browser. The http session in the open browser window remains
active.
Note: To be able to access the device via SSH, you require a key that has to
be installed on the device. See “Preparing access via SSH” on page 265.
The device supports SSH version 1 and version 2. You have the option to
define the protocol to be used.
Open the Security:Telnet/Web/SHH Access dialog.
Select the protocol to be used in the "Configuration" frame, "SSH
Version" field.
UM BasicConfig L2P
Release 9.0 02/2015 109
Assistance in the Protection from 6.3 Telnet/internet/SSH access
Unauthorized Access
UM BasicConfig L2P
110 Release 9.0 02/2015
Assistance in the Protection from 6.3 Telnet/internet/SSH access
Unauthorized Access
Certificate
An X.509/PEM Standard certificate (Public Key Infrastructure) is required
for the encryption. In the as-delivered state, a self-generated certificate is
already present on the device.
You can create an X509/PEM certificate using the following CLI
command: # ip https certgen
You can upload a new certificate using the following CLI command:
copy tftp://<server_ip>/<path_to_pem>
nvram:httpscert
You can switch the HTTPS server off and on again using the following
CLI command sequence:
# no ip https server
# ip https server
Note: If you upload a new certificate, reboot the device or the HTTPS
server in order to activate the certificate.
UM BasicConfig L2P
Release 9.0 02/2015 111
Assistance in the Protection from 6.3 Telnet/internet/SSH access
Unauthorized Access
HTTPS connection
Note: The standard port for HTTPS connection is 443. If you change the
number of the HTTPS port, reboot the device or the HTTPS server in
order to make the change effective.
You can change the HTTPS port number using the following CLI-
command (where <port_no> is the number of the HTTPS port):
#ip https port <port_no>
Note: If you want to use HTTPS, switch on both HTTPS and HTTP. This
is required in order to load the applet. In the as-delivered state, HTTPS is
switched off.
UM BasicConfig L2P
112 Release 9.0 02/2015
Assistance in the Protection from 6.3 Telnet/internet/SSH access
Unauthorized Access
Note: The device allows you to open HTTPS- and HTTP connections at
the same time. The maximum number of HTTP(S) connections that can
be open at the same time is 16.
UM BasicConfig L2P
Release 9.0 02/2015 113
Assistance in the Protection from 6.4 Restricted Management Access
Unauthorized Access
The device allows you to differentiate the management access to the device
based on IP address ranges, and to differentiate these in turn based on
management services (http, snmp, telnet, ssh). You thus have the option to
set finely differentiated management access rights.
If you only want the device, which is located, for example, in a production
plant, to be managed from the network of the IT department via the Web
interface, but also want the administrator to be able to access it remotely via
SSH, you can achieve this with the “Restricted management access”
function.
You can configure this function using the graphical user interface or the CLI.
The graphical user interface provides you with an easy configuration option.
Make sure you do not unintentionally block your access to the device. The
CLI access to the device via V.24 provided at all times is excluded from the
function and cannot be restricted.
UM BasicConfig L2P
114 Release 9.0 02/2015
Assistance in the Protection from 6.4 Restricted Management Access
Unauthorized Access
Leave the existing entry unchanged and use the “Create” button to
create a new entry for the IT network.
Enter the IP address 192.168.1.0.
Enter the netmask 255.255.255.0.
Leave the HTTP and SNMP management services activated and
deactivate the Telnet and SSH services by removing the
checkmarks from the respective boxes.
Use the “Create” button to create a new entry for the mobile phone
network.
Enter the IP address 109.237.176.0.
Enter the netmask 255.255.255.0.
Deactivate the HTTP, SNMP and Telnet services and leave SSH
activated.
Make sure you have CLI access to the device via V.24.
Deactivate the preset entry, because this allows everything and
would cause your subsequent entries to have no effect.
Activate the function.
Click on “Write” to temporarily save the data.
If your current management station is also located in the IT network,
you continue to have access to the graphical user interface.
Otherwise the device ignores operations via the graphical user
interface, and it also rejects a restart of the graphical user interface.
Check whether you can access the device from the IT network via
http and snmp: Open the graphical user interface of the device in a
browser, login on the start screen, and check whether you can read
data (as user “user”) or read and write data (as user “admin”).
Check whether the device rejects connections via telnet and ssh.
Check whether you can access the device from the mobile phone
network via ssh: Open an SSH client, make a connection to the
device, login, and check whether you can read data, or read and
write data.
Check whether the device rejects connections via http, snmp and
telnet.
When you have successfully completed both tests, save the settings
in the non-volatile memory. Otherwise check your configuration. If
the device rejects access with the graphical user interface, use the
CLI of the device to initially deactivate the function via V.24.
UM BasicConfig L2P
Release 9.0 02/2015 115
Assistance in the Protection from 6.4 Restricted Management Access
Unauthorized Access
UM BasicConfig L2P
116 Release 9.0 02/2015
Assistance in the Protection from 6.5 HiDiscovery Access
Unauthorized Access
Note: For security reasons, restrict the HiDiscovery function for the device or
disable it after you have assigned the IP parameters to the device.
UM BasicConfig L2P
Release 9.0 02/2015 117
Assistance in the Protection from 6.6 Port access control
Unauthorized Access
UM BasicConfig L2P
118 Release 9.0 02/2015
Assistance in the Protection from 6.6 Port access control
Unauthorized Access
UM BasicConfig L2P
Release 9.0 02/2015 119
Assistance in the Protection from 6.6 Port access control
Unauthorized Access
UM BasicConfig L2P
120 Release 9.0 02/2015
Assistance in the Protection from 6.7 Port Authentication IEEE 802.1X
Unauthorized Access
UM BasicConfig L2P
Release 9.0 02/2015 121
Assistance in the Protection from 6.7 Port Authentication IEEE 802.1X
Unauthorized Access
UM BasicConfig L2P
122 Release 9.0 02/2015
Assistance in the Protection from 6.7 Port Authentication IEEE 802.1X
Unauthorized Access
This dialog allows you to enter the data for 1, 2 or 3 RADIUS servers.
Click "Create entry" to open the dialog window for entering the IP
address of a RADIUS server.
Confirm the IP address entered using "OK".
You thus create a new row in the table for this RADIUS server.
In the "Shared secret" column you enter the character string which
you get as a key from the administrator of your RADIUS server.
With "Primary server" you name this server as the first server which
the device should contact for port authentication queries. If this
server is not available, the device contacts the next server in the
table.
"Selected server" shows which server the device actually sends its
queries to.
With "Delete entry" you delete the selected row in the table.
Selecting Ports
Select the Security:802.1x Port Authentication:Port
Configuration dialog.
In the "Port control" column you select "auto" for the ports for which
you want to activate the port-related network access control.
UM BasicConfig L2P
Release 9.0 02/2015 123
Assistance in the Protection from 6.8 Login Banner
Unauthorized Access
The device gives you the option of displaying a greeting text to users before
they login to the device. The users see this greeting text in the login dialog of
the graphical user interface (GUI) and of the Command Line Interface (CLI).
Users logging in with SSH see the greeting text - depending on the client
used - before or during the login.
Perform the following work steps:
UM BasicConfig L2P
124 Release 9.0 02/2015
Assistance in the Protection from 6.9 CLI Banner
Unauthorized Access
In the default setting, the CLI start screen shows information about the
device, such as the software version and the device settings. The "CLI
Banner" function allows you to replace this information with an individual text.
Perform the following work steps:
UM BasicConfig L2P
Release 9.0 02/2015 125
Assistance in the Protection from 6.9 CLI Banner
Unauthorized Access
UM BasicConfig L2P
126 Release 9.0 02/2015
Synchronizing the System Time in the
Network
The actual meaning of the term “real time” depends on the time requirements
of the application.
The device provides two options with different levels of accuracy for
synchronizing the time in your network.
The Simple Network Time Protocol (SNTP) is a simple solution for low
accuracy requirements. Under ideal conditions, SNTP achieves an accuracy
in the millisecond range. The accuracy depends on the signal delay.
IEEE 1588 with the Precision Time Protocol (PTP) achieves accuracies on
the order of fractions of microseconds. This method is suitable even for
demanding applications up to and including process control.
Select the method (SNMP or PTP) that best suits your requirements. You can
also use both methods simultaneously if you consider that they interact.
UM BasicConfig L2P
Release 9.0 02/2015 127
Synchronizing the System Time in the 7.1 Setting the time
Network
If no reference clock is available, you have the option of entering the system
time in a device and then using it like a reference clock (see on page 132
“Configuring SNTP”), (see on page 143 “Application Example”).
The device is equipped with a buffered hardware clock. This keeps the
current time
if the power supply fails or
if you disconnect the device from the power supply.
Thus the current time is available to you again, e.g. for log entries, when the
device is started.
The hardware clock bridges a power supply downtime of 1 hour. The
prerequisite is that the power supply of the device has been connected
continually for at least 5 minutes beforehand.
Note: When setting the time in zones with summer and winter times, make
an adjustment for the local offset. The device can also get the SNTP server
IP address and the local offset from a DHCP server.
With this dialog you can enter time-related settings independently of the
time synchronization protocol selected.
UM BasicConfig L2P
128 Release 9.0 02/2015
Synchronizing the System Time in the 7.1 Setting the time
Network
Note: If the time source is PTP, consider that the PTP time uses the
TAI time scale. TAI time is 34 s ahead of UTC time (as of
01.01.2011).
If the UTC offset is configured correctly on the PTP reference clock,
the device corrects this difference automatically when displaying
“System time (UTC)”.
The "System Time" uses "System Time (UTC)", allowing for the local
time difference from "System Time (UTC)".
"System Time" = "System Time (UTC)" + "Local Offset".
Time Source displays the source of the following time data. The
device automatically selects the source with the greatest accuracy.
Possible sources are: local, ptp and sntp. The source is initially
local.
If PTP is activated and the device receives a valid PTP frame, it sets
its time source to ptp. If SNTP is activated and if the device receives
a valid SNTP packet, the device sets its time source to sntp. The
device gives the PTP time source priority over SNTP.
With "Set Time from PC", the device takes the PC time as the
system time and calculates the "System Time (UTC)" using the local
time difference.
"System Time (UTC)" = "System Time" - "Local Offset"
The "Local Offset" is for displaying/entering the time difference
between the local time and the "System Time (UTC)".
With "Set Offset from PC", the device determines the time zone on
your PC and uses it to calculate the local time difference.
UM BasicConfig L2P
Release 9.0 02/2015 129
Synchronizing the System Time in the 7.2 SNTP
Network
7.2 SNTP
GPS
PLC Client
NTP-
Server
192.168.1.0
Client
Client Server Client Server Client Server
UM BasicConfig L2P
130 Release 9.0 02/2015
Synchronizing the System Time in the 7.2 SNTP
Network
GPS PLC
Client
Client
192.168.1.1
Switch Switch Switch
Enable the SNTP function on the devices whose time you want to set
using SNTP.
The SNTP server of the device responds to Unicast requests as soon as
it is enabled.
Note: For accurate system time distribution with cascaded SNTP servers
and clients, use only network components (routers, switches, hubs) in the
signal path between the SNTP server and the SNTP client which forward
SNTP packets with a minimized delay.
UM BasicConfig L2P
Release 9.0 02/2015 131
Synchronizing the System Time in the 7.2 SNTP
Network
In “Server request interval” you specify the interval at which the device requests
SNTP packets (valid entries: 1 s to 3600 s, on delivery: 30 s).
With “Accept SNTP Broadcasts” the device takes the system time from SNTP
Broadcast/Multicast packets that it receives.
With “Deactivate client after synchronization”, the device only synchronizes its
system time with the SNTP server one time after the client status is activated,
then it switches the client off.
Note: If you have enabled PTP at the same time, the SNTP client
first collects 60 time stamps before it deactivates itself. The device
thus determines the drift compensation for its PTP clock. With the
preset server request interval, this takes about half an hour.
UM BasicConfig L2P
132 Release 9.0 02/2015
Synchronizing the System Time in the 7.2 SNTP
Network
UM BasicConfig L2P
Release 9.0 02/2015 133
Synchronizing the System Time in the 7.2 SNTP
Network
UM BasicConfig L2P
134 Release 9.0 02/2015
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
UM BasicConfig L2P
Release 9.0 02/2015 135
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
UM BasicConfig L2P
136 Release 9.0 02/2015
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
Reference Local
(Master clock) (Slave clock)
PTP PTP
UDP UDP
Delay + Jitter Delay + Jitter
IP IP
MAC MAC
Delay + Jitter
Phy Phy
LAN
To get around the delay and jitter in the protocol stack, IEEE 1588
recommends inserting a special hardware time stamp unit between the MAC
and Phy layers.
Devices/modules with the “-RT” suffix in their names are equipped with this
time stamp unit and support PTP version 1. Media modules MM23 and
MM33 support PTP version 1 and PTP version 2.
The delay and jitter in the LAN increase in the media and transmission
devices along the transmission path.
UM BasicConfig L2P
Release 9.0 02/2015 137
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
With the introduction of PTP version 2, two procedures are available for the
delay measurement:
End-to-End (E2E)
E2E corresponds to the procedure used by PTP version 1. Every slave
clock measures only the delay to its master clock.
Peer-to-Peer (P2P)
With P2P, like in E2E, every slave clock measures the delay to its master
clock. In addition, in P2P every master clock measures the delay to the
slave clock. For example, if a redundant ring is interrupted, the slave clock
can become the master clock and the master clock can become the slave
clock. This switch in the synchronization direction takes place without any
loss of precision, as with P2P the delay in the other direction is already
known.
The cable delays are relatively constant. Changes occur very slowly.
IEEE 1588 takes this fact into account by regularly making measurements
and calculations.
IEEE 1588 eliminates the inaccuracy caused by delays and jitter by defining
boundary clocks. Boundary clocks are clocks integrated into devices. These
clocks are synchronized on the one side of the signal path, and on the other
side of the signal path they are used to synchronize the subsequent clocks
(ordinary clocks).
PTP version 2 also defines what are known as transparent clocks. A
transparent clock cannot itself be a reference clock, nor can it synchronize
itself with a reference clock. However, it corrects the PTP messages it
transmits by its own delay time and thus removes the jitter caused by the
transmission. When cascading multiple clocks in particular, you can use
transparent clocks to achieve greater time precision for the connected
terminal devices than with boundary clocks
UM BasicConfig L2P
138 Release 9.0 02/2015
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
GPS
PLC
Reference
(Grandmaster Clock)
Ordinary Clock
Slave Master
Boundary Clock
UM BasicConfig L2P
Release 9.0 02/2015 139
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
Switch
PTP Subdomain 1
Boundary
Clock
PTP Subdomain 2
UM BasicConfig L2P
140 Release 9.0 02/2015
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
Note: Connect all the connections you need to distribute the PTP information
to connections with an integrated time stamp unit (RT modules).
Devices without a time stamp unit take the information from the PTP and use
it to set their clocks. They are not involved in the protocol.
Enable the PTP function on devices whose time you want to synchronize
using PTP.
Select the PTP version and the PTP mode. Select the same PTP version
for all the devices that you want to synchronize.
UM BasicConfig L2P
Release 9.0 02/2015 141
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
UM BasicConfig L2P
142 Release 9.0 02/2015
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
GPS
Reference
(Grandmaster Clock)
A
10.0.1.116
A
10.0.1.112
10.0.1.2
Boundary
Clock Ordinary Clock
B B
10.0.1.105 10.0.1.106
UM BasicConfig L2P
Release 9.0 02/2015 143
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
SNTP
Operation on off off off
Client Status on off off off
External server 10.0.1.2 0.0.0.0 0.0.0.0 0.0.0.0
address
Server request 30 any any any
interval
Accept SNTP No any any any
Broadcasts
Server status on off off off
Anycast destination 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0
address
VLAN ID 1 1 1 1
The following configuration steps apply to the device with the IP address
10.0.1.112. Configure the other devices in the same way with the values from
the table above.
UM BasicConfig L2P
144 Release 9.0 02/2015
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
UM BasicConfig L2P
Release 9.0 02/2015 145
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
In this example, you have chosen the device with the IP address
10.0.1.112 as the PTP reference clock. You thus define this device as the
“Preferred Master”.
Select the
Basics: Load/Save dialog.
UM BasicConfig L2P
146 Release 9.0 02/2015
Synchronizing the System Time in the 7.3 Precision Time Protocol
Network
In the “Save” frame, select “To Device” for the location and click
“Save” to permanently save the configuration in the active
configuration.
UM BasicConfig L2P
Release 9.0 02/2015 147
Synchronizing the System Time in the 7.4 Interaction of PTP and SNTP
Network
According to the PTP and SNTP standards, both protocols can exist in
parallel in the same network. However, since both protocols affect the
system time of the device, situations may occur in which the two protocols
compete with each other.
Note: Configure the devices so that each device only receives the time from
one source.
If the device gets its time via PTP, you enter the “External server address”
0.0.0.0 in the SNTP client configuration and do not accept SNTP Broadcasts.
If the device gets its time via SNTP, make sure that the “best” clock is
connected to the SNTP server. Then both protocols will get the time from the
same server. The example (see figure 33) shows such an application.
GPS
PLC SNTP-Client
NTP-
Server
SNTP
SNTP
PTP PTP SNTP
149.218.112.0
SNTP-Client
SNTP Client SNTP Server SNTP Server
SNTP Server PTP PTP
PTP
149.218.112.1 149.218.112.2 149.218.112.3
Application Example
The requirements with regard to the accuracy of the time in the network
are quite high, but the terminal devices only support SNTP (see
figure 33).
UM BasicConfig L2P
148 Release 9.0 02/2015
Synchronizing the System Time in the 7.4 Interaction of PTP and SNTP
Network
SNTP
Operation on on on
Client Status on off off
External server address 149.218.112.0 0.0.0.0 0.0.0.0
Server request interval any any any
Accept SNTP Broadcasts No No No
Server status on on on
Anycast destination address 224.0.1.1 224.0.1.1 224.0.1.1
VLAN ID 1 1 1
Anycast send interval 30 30 30
In the example, the left device, as an SNTP client, gets the time from the
NTP server via SNTP. The device assigns PTP clock stratum 2 (PTPv1)
or clock class 6 (PTPv2) to the time received from an NTP server. Thus
the left device becomes the reference clock for the PTP synchronization.
PTP is active for all 3 devices, thus enabling precise time synchronization
between them. As the connectable terminal devices in the example only
support SNTP, all 3 devices act as SNTP servers.
UM BasicConfig L2P
Release 9.0 02/2015 149
Synchronizing the System Time in the 7.4 Interaction of PTP and SNTP
Network
UM BasicConfig L2P
150 Release 9.0 02/2015
Network Load Control
To optimize the data transmission, the device provides you with the following
functions for controlling the network load:
Settings for direct packet distribution (MAC address filter)
Multicast settings
Rate limiter
Prioritization - QoS
Flow control
Virtual LANs (VLANs)
UM BasicConfig L2P
Release 9.0 02/2015 151
Network Load Control 8.1 Direct Packet Distribution
With direct packet distribution, you help protect the device from unnecessary
network loads. The device provides you with the following functions for direct
packet distribution:
Store-and-forward
Multi-address capability
Aging of learned addresses
Static address entries
Disabling the direct packet distribution
in the destination address field are sent to this port. The device enters
learned source addresses in its filter table (see on page 154 “Entering Static
Addresses”).
UM BasicConfig L2P
152 Release 9.0 02/2015
Network Load Control 8.1 Direct Packet Distribution
The device can learn up to 8,000 addresses. This is necessary if more than
one terminal device is connected to one or more ports. It is thus possible to
connect several independent subnets to the device.
Enter the aging time for all dynamic entries in the range from 10 to
630 seconds (unit: 1 second; default setting: 30).
In connection with the router redundancy, select a time ≥ 30
seconds.
UM BasicConfig L2P
Release 9.0 02/2015 153
Network Load Control 8.1 Direct Packet Distribution
The individual filters are stored in the filter table (Forwarding Database,
FDB). It consists of 3 parts: a static part and two dynamic parts.
The management administrator describes the static part of the filter table
(dot1qStaticTable).
During operation, the device is capable of learning which of its ports
receive data packets from which source address (see on page 152 “Multi-
Address Capability”). This information is written to a dynamic part
(dot1qTpFdbTable).
Addresses learned dynamically from neighboring agents and those
learned via GMRP are written to the other dynamic part.
Note: The filter table allows you to create up to 100 filter entries for Multicast
addresses.
UM BasicConfig L2P
154 Release 9.0 02/2015
Network Load Control 8.1 Direct Packet Distribution
Select the
Switching:Filters for MAC Addresses dialog.
Each row of the filter table represents one filter. Filters specify the way
in which data packets are sent. They are set automatically by the Switch
(learned status) or created manually. Data packets whose destination
address is entered in the table are sent from the receiving port to the
ports marked in the table. Data packets whose destination address is
not in the table are sent from the receiving port to all other ports. In the
"Create filter" dialog you can set up new filters. The following status
settings are possible:
To delete entries with the "learned" status from the filter table, select the
Basics:Restart dialog and click "Reset MAC address table".
UM BasicConfig L2P
Release 9.0 02/2015 155
Network Load Control 8.1 Direct Packet Distribution
UM BasicConfig L2P
156 Release 9.0 02/2015
Network Load Control 8.2 Multicast Application
In the case of a Multicast address, the device forwards all data packets with
a Multicast address to all ports. This leads to an increased bandwidth
requirement.
Protocols such as GMRP and procedures such as IGMP Snooping enable
the device to exchange information via the direct transmission of Multicast
data packets. The bandwidth requirement can be reduced by distributing the
Multicast data packets only to those ports to which recipients of these
Multicast packets are connected.
You can recognize IGMP Multicast addresses by the range in which the
address lies:
MAC Multicast Address
01:00:5E:00:00:00 - 01:00:5E:FF:FF:FF
(in mask form 01:00:5E:00:00:00/24)
Class D IP Multicast address
224.0.0.0 - 239.255.255.255
(in mask form 224.0.0.0/4)
UM BasicConfig L2P
Release 9.0 02/2015 157
Network Load Control 8.2 Multicast Application
1st floor
h H h H h H
MICE
2nd floor
h H h H h H
MICE
Control room
UM BasicConfig L2P
158 Release 9.0 02/2015
Network Load Control 8.2 Multicast Application
A Switch that connects a Multicast receiver with a router can evaluate the
IGMP information using the IGMP Snooping procedure.
IGMP Snooping translates IP Multicast group addresses into MAC Multicast
addresses, so that the IGMP functions can also be used by Layer 2 Switches.
The Switch records the MAC addresses of the Multicast receivers, with are
obtained via IGMP Snooping from the IP addresses, in the static address
table. The Switch thus transmits these Multicast packets exclusively at the
ports at which Multicast receivers are connected. The other ports are not
affected by these packets.
A special feature of the device is that you can specify whether it should drop
data packets with unregistered Multicast addresses, transmit them to all
ports, or only to those ports at which the device received query packets. You
also have the option of additionally sending known Multicast packets to query
ports.
UM BasicConfig L2P
Release 9.0 02/2015 159
Network Load Control 8.2 Multicast Application
Operation
The “Operation” frame allows you to enable/disable IGMP Snooping
globally for the entire device.
If IGMP Snooping is disabled, then
the device does not evaluate Query and Report packets received,
and
it sends (floods) received data packets with a Multicast address as
the destination address to every port.
UM BasicConfig L2P
160 Release 9.0 02/2015
Network Load Control 8.2 Multicast Application
IGMP Settings
“Current querier IP address” shows you the IP address of the device
that has the query function.
In “Max. Response Time” you specify the period within which the
Multicast group members respond to a query (valid values: 1-3,598 s,
default setting: 10 s).
Note the connection between the parameters Max. Response Time,
Send Interval and Group Membership Interval (see on page 161
“Parameter Values”).
The Multicast group members select a random value within the
maximum response time for their response, to prevent all the Multicast
group members responding to the query at the same time.
Select a large value if you want to reduce the load on your network and
can accept the resulting longer switching times.
Select a small value if you require short switching times and can accept
the resulting network load.
In “Group Membership Interval” you specify the period for which a
dynamic Multicast group remains entered in the device if it does not
receive any report messages (valid values: 3-3,600 s, default setting:
260 s).
Note the connection between the parameters Max. Response Time,
Send Interval and Group Membership Interval (see on page 161
“Parameter Values”).
Parameter Values
The parameters
– Max. Response Time,
– Transmit Interval and
– Group Membership Interval
have a relationship to one another:
Max. Response Time < Transmit Interval < Group Membership
Interval.
If you enter values that contradict this relationship, the device then
replaces these values with a default value or with the last valid values.
UM BasicConfig L2P
Release 9.0 02/2015 161
Network Load Control 8.2 Multicast Application
Table 12: Value range for Max. Response Time, Transmit Interval and Group
Membership Interval
Multicasts
With these frames you can enter global settings for the Multicast
functions.
Prerequisite: The IGMP Snooping function is activated globally.
Unknown Multicasts
In this frame you can determine how the device in IGMP mode sends
packets with known and unknown MAC/IP Multicast addresses that
were not learned through IGMP Snooping..
“Unknown Muilticasts” allows you to specify how the device transmits
unknown Multicast packets:
“Send to Query Ports”.
The device sends the packets with an unknown MAC/IP Multicast
address to all query ports.
“Send to All Ports”.
The device sends the packets with an unknown MAC/IP Multicast
address to all ports.
“Discard”.
The device discards all packets with an unknown MAC/IP Multicast
address.
UM BasicConfig L2P
162 Release 9.0 02/2015
Network Load Control 8.2 Multicast Application
Known Multicasts
In this frame you can determine how the device in IGMP mode sends
packets with known MAC/IP Multicast addresses that were learned
through IGMP Snooping.
“Send to query and registered ports”.
The device sends the packets with a known MAC/IP Multicast
address to all query ports and to registered ports.
This standard setting sends all Multicasts to all query ports and to
registered ports. The advantage of this is that it works in most
applications without any additional configuration.
Application: “Flood and Prune” routing in PIM-DM.
“Send to registered ports”.
The device sends the packets with a known MAC/IP Multicast
address to registered ports.
The advantage of this setting, which deviates from the standard, is
that it uses the available bandwidth optimally through direct
distribution. It requires additional port settings.
Application: Routing protocol PIM-SM.
UM BasicConfig L2P
Release 9.0 02/2015 163
Network Load Control 8.2 Multicast Application
Note: If you use IGMP version 1 in a subnetwork, then you must also
use IGMP version 1 in the entire network.
Note: If the device is incorporated into a HIPER-Ring, you can use the
following settings to quickly reconfigure the network for data packets
with registered Multicast destination addresses after the ring is
switched:
Switch on the IGMP Snooping on the ring ports and globally, and
activate “IGMP Forward All” per port on the ring ports.
UM BasicConfig L2P
164 Release 9.0 02/2015
Network Load Control 8.2 Multicast Application
UM BasicConfig L2P
Release 9.0 02/2015 165
Network Load Control 8.2 Multicast Application
UM BasicConfig L2P
166 Release 9.0 02/2015
Network Load Control 8.2 Multicast Application
Operation
The “Operation” frame allows you to enable GMRP globally for the
entire device.
Multicasts
The "Multicasts" frame allows you to configure GMRP to discard
multicasts addresses or send them to the ports.
UM BasicConfig L2P
Release 9.0 02/2015 167
Network Load Control 8.2 Multicast Application
Note: If the device is incorporated into a HIPER-Ring, you can use the
following settings to quickly reconfigure the network for data packets
with registered Multicast destination addresses after the ring is
switched:
Activate GMRP on the ring ports and globally, and
activate “Forward all groups” on the ring ports.
UM BasicConfig L2P
168 Release 9.0 02/2015
Network Load Control 8.3 Rate Limiter
Entering a limit rate for each port determines the amount of traffic the device
is permitted to transmit and receive.
If the traffic at this port exceeds the maximum rate entered, then the device
suppresses the overload at this port.
Note: The limiter functions only work on Layer 2 and are used to limit the
effect of storms by frame types that the Switch floods (typically broadcasts).
In doing so, the limiter function disregards the protocol information of higher
layers, such as IP or TCP. This can affect on TCP traffic, for example.
To minimize these effects, use the following options:
limiting the limiter function to particular frame types (e.g. to broadcasts,
multicasts and unicasts with unlearned destination addresses) and
receiving unicasts with destination addresses established by the
limitation,
using the output limiter function instead of the input limiter function
because the former works slightly better together with the TCP flow
control due to switch-internal buffering.
increasing the aging time for learned unicast addresses.
UM BasicConfig L2P
Release 9.0 02/2015 169
Network Load Control 8.3 Rate Limiter
UM BasicConfig L2P
170 Release 9.0 02/2015
Network Load Control 8.3 Rate Limiter
Ingress Limiter Rate (kbit/s) for the ingress packet type selected:
= 0, no ingress limit at this port.
> 0, maximum ingress traffic rate in kbit/s that can be received on this port.
UM BasicConfig L2P
Release 9.0 02/2015 171
Network Load Control 8.3 Rate Limiter
UM BasicConfig L2P
172 Release 9.0 02/2015
Network Load Control 8.4 QoS/Priority
8.4 QoS/Priority
The device supports 4 priority queues (IEEE 802.1D traffic classes) (8 with
MACH 4000, MACH 104, MACH 1040 and PowerMICE). Received data
packets are assigned to these classes by
the priority of the data packet contained in the VLAN tag when the
receiving port was configured to “trust dot1p”.
the QoS information (ToS/DiffServ) contained in the IP header when the
receiving port was configured to “trust ip-dscp”.
the port priority when the port was configured to “untrusted”.
the port priority when receiving non-IP packets when the port was
configured to “trust ip-dscp”.
the port priority when receiving data packets without a VLAN tag (see on
page 93 “Configuring the Ports”) and when the port was configured to
“trust dot1p”.
Default setting: “trust dot1p”.
UM BasicConfig L2P
Release 9.0 02/2015 173
Network Load Control 8.4 QoS/Priority
Data packets with VLAN tags containing priority information but no VLAN
information (VLAN ID = 0), are known as Priority Tagged Frames.
Priority Traffic class for Traffic Class for IEEE 802.1D traffic type
entered RS20/RS30/RS4 PowerMICE,
0, MACH
MACH 1000, 104/MACH 1040
MS20/MS30, and MACH 4000
OCTOPUS default setting)
(default)
0 1 2 Best effort (default)
1 0 0 Background
2 0 1 Standard
3 1 3 Excellent effort (business critical)
4 2 4 Controlled load
(streaming multimedia)
5 2 5 Video, less than 100 milliseconds of
latency and jitter
Table 13: Assignment of the priority entered in the tag to the traffic classes
UM BasicConfig L2P
174 Release 9.0 02/2015
Network Load Control 8.4 QoS/Priority
Priority Traffic class for Traffic Class for IEEE 802.1D traffic type
entered RS20/RS30/RS4 PowerMICE,
0, MACH
MACH 1000, 104/MACH 1040
MS20/MS30, and MACH 4000
OCTOPUS default setting)
(default)
6 3 6 Voice, less than 10 milliseconds of
latency and jitter
7 3 7 Network control reserved traffic
Table 13: Assignment of the priority entered in the tag to the traffic classes
Note: Network protocols and redundancy mechanisms use the highest traffic
classes 3 (RS20/30/40, MS20/30, RSR20/RSR30, MACH 1000, OCTOPUS)
or 7 (PowerMICE, MACH 104/MACH 1040, MACH 4000). Therefore, select
other traffic classes for application data.
ld
F ie ield
r F ld
ite ess ie
i m r F ld
l d Del dd e ss F ie
e A r k
Fi e n dd d pe ec ield
l e am tio A l / Ty ld el
d ld h
C F
b Fr na e ie th ie Fi e
m t t i r c F F Fi me nce
ea ar s u g ng ta at
a d a e
Pr St De So Ta Le Da D Pa Fr equ
S
7 1 6 6 4 2 42-1500 Octets 4
t
UM BasicConfig L2P
Release 9.0 02/2015 175
Network Load Control 8.4 QoS/Priority
r
ifie
r nt
ifie Ide
nt Bi
t
at
Ide , 3 rm e r
ol ir ty l Fo t ifi
oc en
r ot P rio nica Id
P it
a g B
r
se an it
o
L AN it
T x8 U C B V B
2 1 12
4 Octets
UM BasicConfig L2P
176 Release 9.0 02/2015
Network Load Control 8.4 QoS/Priority
TYPE of Service
The Type of Service (ToS) field in the IP header (see table 14) has been
part of the IP protocol from the start, and it is used to differentiate various
services in IP networks. Even back then, there were ideas about
differentiated treatment of IP packets, due to the limited bandwidth
available and the unreliable connection paths. Because of the continuous
increase in the available bandwidth, there was no need to use the ToS
field. Only with the real-time requirements of today's networks has the
ToS field become significant again. Selecting the ToS byte of the IP
header enables you to differentiate between different services. However,
this field is not widely used in practice.
Bits 0 1 2 3 4 5 6 7
Precedence Type of Service MBZ
Bits (0-2): IP Precedence Defined Bits (3-6): Type of Service Defined Bit (7)
111 - Network Control 0000 - [all normal] 0 - Must be zero
110 - Internetwork Control 1000 - [minimize delay]
101 - CRITIC / ECP 0100 - [maximize throughput]
100 - Flash Override 0010 - [maximize reliability]
011 - Flash 0001 - [minimize monetary cost]
010 - Immediate
001 - Priority
000 - Routine
UM BasicConfig L2P
Release 9.0 02/2015 177
Network Load Control 8.4 QoS/Priority
Differentiated Services
The Differentiated Services field in the IP header (see figure 41) newly
defined in RFC 2474 - often known as the DiffServ code point or DSCP -
replaces the ToS field and is used to mark the individual packets with a
DSCP. Here the packets are divided into different quality classes. The first
3 bits of the DSCP are used to divide the packets into classes. The next
3 bits are used to further divide the classes on the basis of different
criteria. In contrast to the ToS byte, DiffServ uses 6 bits for the division
into classes. This results in up to 64 different service classes.
Bits 0 1 2 3 4 5 6 7
Differentiated Services Codepoint Explicit
(DSCP) RFC 2474 Congestion
Class Selector Notification
Codepoints (ECN)
The PHB class selector assigns the 7 possible IP precedence values from
the old ToS field to specific DSCP values, thus ensuring the downwards
compatibility.
UM BasicConfig L2P
178 Release 9.0 02/2015
Network Load Control 8.4 QoS/Priority
DSCP value DSCP name Traffic Class for Traffic Class for
MACH 4000, RS20/RS30/RS40,
MACH 104, RSR20/RSR30,
MACH 1040, MS20/MS30,
PowerMICE OCTOPUS,
(default setting) MACH 1000
(default setting)
0 Best Effort /CS0 2 1
1-7 2 1
8 CS1 0 0
9,11,13,15 0 0
10,12,14 AF11,AF12,AF13 0 0
16 CS2 1 0
17,19,21,23 1 0
18,20,22 AF21,AF22,AF23 1 0
24 CS3 3 1
25,27,29,31 3 1
26,28,30 AF31,AF32,AF33 3 1
32 CS4 4 2
33,35,37,39 4 2
34,36,38 AF41,AF42,AF43 4 2
40 CS5 5 2
41,42,43,44,45,47 5 2
46 EF 5 2
48 CS6 6 3
49-55 6 3
56 CS7 7 3
57-63 7 3
Table 16: Mapping the DSCP values onto the traffic classes
UM BasicConfig L2P
Release 9.0 02/2015 179
Network Load Control 8.4 QoS/Priority
On Layer 2 the device modifies the VLAN priority in the VLAN tag.
For this function to be useful, the configuration of the corresponding ports
must permit the sending of packets with a VLAN tag.
UM BasicConfig L2P
180 Release 9.0 02/2015
Network Load Control 8.4 QoS/Priority
UM BasicConfig L2P
Release 9.0 02/2015 181
Network Load Control 8.4 QoS/Priority
Select the
QOS/Priority:802.1D/p-Mapping dialog.
In the "Traffic Class" column, enter the desired values.
UM BasicConfig L2P
182 Release 9.0 02/2015
Network Load Control 8.4 QoS/Priority
Select the
QOS/Priority:IP DSCP Mapping dialog.
In the "Traffic Class" column, enter the desired values.
UM BasicConfig L2P
Release 9.0 02/2015 183
Network Load Control 8.4 QoS/Priority
UM BasicConfig L2P
184 Release 9.0 02/2015
Network Load Control 8.4 QoS/Priority
UM BasicConfig L2P
Release 9.0 02/2015 185
Network Load Control 8.5 Flow Control
The example (see figure 42) shows a graphic illustration of how the flow
control works. Workstations 1, 2 and 3 want to simultaneously transmit a
large amount of data to Workstation 4. The combined bandwidth of
Workstations 1, 2 and 3 to the device is larger than the bandwidth of
Workstation 4 to the device. This leads to an overflow of the send queue of
port 4. The funnel on the left symbolizes this status.
If the flow control function at ports 1, 2 and 3 of the device is turned on, the
device reacts before the funnel overflows. Ports 1, 2 and 3 send a message
to the connected devices that no data can be received at present.
UM BasicConfig L2P
186 Release 9.0 02/2015
Network Load Control 8.5 Flow Control
Port 1 Port 4
Switch
Port 2 Port 3
UM BasicConfig L2P
Release 9.0 02/2015 187
Network Load Control 8.5 Flow Control
Select the
Basics:Port Configuration dialog.
In the "Flow Control on" column, you checkmark this port to specify
that flow control is active here. You also activate the global "Flow
Control" switch in the
Switching:Global dialog.
Note: When you are using a redundancy function, you deactivate the flow
control on the participating device ports. If the flow control and the
redundancy function are active at the same time, there is a risk that the
redundancy function will not operate as intended.
UM BasicConfig L2P
188 Release 9.0 02/2015
Network Load Control 8.6 VLANs
8.6 VLANs
More complex VLANs span out over multiple network segments and are also
based on logical (instead of only physical) connections between network
participants. Thus VLANs are an element of flexible network design, as you
can reconfigure logical connections centrally more easily than cable
connections.
Flexibility
You have the option of forming user groups flexibly based on the function
of the participants and not on their physical location or medium.
Clarity
VLANs give networks a clear structure and make maintenance easier.
UM BasicConfig L2P
Release 9.0 02/2015 189
Network Load Control 8.6 VLANs
Example 1
A VLAN D
2
1 2 3 4 5
B C VLAN
3
For this example, the status of the TAG field of the data packets has no
relevance, so you set it to "U“.
UM BasicConfig L2P
190 Release 9.0 02/2015
Network Load Control 8.6 VLANs
VLANID Port
1 2 3 4 5
1 U
2 U U
3 U U
Configure VLAN
UM BasicConfig L2P
Release 9.0 02/2015 191
Network Load Control 8.6 VLANs
UM BasicConfig L2P
192 Release 9.0 02/2015
Network Load Control 8.6 VLANs
UM BasicConfig L2P
Release 9.0 02/2015 193
Network Load Control 8.6 VLANs
Figure 46: Assigning and saving "Port VLAN ID", "Acceptable Frame Types"
and "Ingress Filtering"
Assign the Port VLAN ID of the related VLANs (2 or 3) to the
individual ports - see table.
Because terminal devices usually send data packets as untagged,
you select the admitAll setting for the "Acceptable Frame Types".
The settings for GVRP and Ingress Filter do not affect how this
example functions.
Click "Set" to save the changes temporarily.
Select the
Basics: Load/Save dialog.
In the “Save” frame, select “To Device” for the location and click
“Save” to permanently save the configuration in the active
configuration.
UM BasicConfig L2P
194 Release 9.0 02/2015
Network Load Control 8.6 VLANs
UM BasicConfig L2P
Release 9.0 02/2015 195
Network Load Control 8.6 VLANs
Example 2
A D VLAN E G
2
Management
Station (optional)
1 2 3 4 5 1 2 3 4 5
VLAN 1
B C VLAN F H
3
Note: In this case, VLAN 1 has no significance for the terminal device
communication, but it is required for the administration of the transmission
devices via what is known as the Management VLAN.
As in the previous example, uniquely assign the ports with their connected
terminal devices to a VLAN. With the direct connection between the 2
transmission devices (uplink), the ports transport packets for both VLANs.
To differentiate these uplinks you use “VLAN tagging”, which handles the
frames accordingly. Thus, you maintain the assignment to the respective
VLANs.
Add Uplink Port 5 to the ingress and egress tables from example 1.
Create new ingress and egress tables for the right switch, as described in
the first example.
UM BasicConfig L2P
196 Release 9.0 02/2015
Network Load Control 8.6 VLANs
The egress table specifies at which ports the Switch may send the frames
from this VLAN. Your entry also defines whether the Switch marks (tags)
the Ethernet frames sent from this port.
T = with tag field (T = tagged, marked)
U = without tag field (U = untagged, not marked)
VLAN ID Port
1 2 3 4 5
1 U
2 U U T
3 U U T
VLAN ID Port
1 2 3 4 5
1 U
UM BasicConfig L2P
Release 9.0 02/2015 197
Network Load Control 8.6 VLANs
VLAN ID Port
2 T U U
3 T U U
Here, VLAN tagging (IEEE 801.1Q) is used within the VLAN with the ID 1
(Uplink). You can see this from the letter T in the egress table of the ports.
The configuration of the example is the same for the device on the right.
Proceed in the same way, using the ingress and egress tables created
above to adapt the previously configured left device to the new
environment.
Configure VLAN
UM BasicConfig L2P
198 Release 9.0 02/2015
Network Load Control 8.6 VLANs
UM BasicConfig L2P
Release 9.0 02/2015 199
Network Load Control 8.6 VLANs
UM BasicConfig L2P
200 Release 9.0 02/2015
Network Load Control 8.6 VLANs
Figure 50: Assigning and saving "Port VLAN ID", "Acceptable Frame Types"
and "Ingress Filtering"
Assign the ID of the related VLANs (1 to 3) to the individual ports.
Because terminal devices usually send data packets as untagged,
you select the admitAll setting for the terminal device ports.
Configure the uplink port with admit only VLAN tags.
To evaluate the VLAN tag on this port, activate "Ingress Filtering" on
the uplink port.
Click "Set" to save the changes temporarily.
Select the
Basics: Load/Save dialog.
In the “Save” frame, select “To Device” for the location and click
“Save” to permanently save the configuration in the active
configuration.
UM BasicConfig L2P
Release 9.0 02/2015 201
Network Load Control 8.6 VLANs
For further information on VLANs, see the reference manual and the
integrated help function in the program.
UM BasicConfig L2P
202 Release 9.0 02/2015
Operation Diagnosis
9 Operation Diagnosis
UM BasicConfig L2P
Release 9.0 02/2015 203
Operation Diagnosis 9.1 Sending Traps
The device reports unusual events which occur during normal operation
immediately to the management station. This is done by messages called
traps that bypass the polling procedure ("Polling" means querying the data
stations at regular intervals). Traps allow you to react quickly to unusual
events.
Examples of such events are:
Hardware reset
Changes to the configuration
Segmentation of a port
UM BasicConfig L2P
204 Release 9.0 02/2015
Operation Diagnosis 9.1 Sending Traps
UM BasicConfig L2P
Release 9.0 02/2015 205
Operation Diagnosis 9.1 Sending Traps
UM BasicConfig L2P
206 Release 9.0 02/2015
Operation Diagnosis 9.1 Sending Traps
UM BasicConfig L2P
Release 9.0 02/2015 207
Operation Diagnosis 9.1 Sending Traps
Name Meaning
Authentication The device has rejected an unauthorized access attempt (see the Access
for IP Addresses and Port Security dialog).
Link Up/Down At one port of the device, the link to another device has been
established/interrupted.
Spanning Tree The topology of the Rapid Spanning Tree has changed.
Chassis Summarizes the following events:
– The status of a supply voltage has changed (see the System dialog).
– The status of the signal contact has changed.
To take this event into account, you activate “Create trap when status
changes” in the Diagnostics:Signal Contact 1/2 dialog.
- The AutoConfiguration Adapter (ACA), has been added or removed.
- The configuration on the AutoConfiguration Adapter(ACA) does not
match that in the device.
– The temperature thresholds have been exceeded/not reached.
– A media module has been added or removed (only for modular devices).
– The receiver power status of a port with an SFP module has changed
(see dialog Diagnostics:Ports:SFP Modules).
The redundancy status of the ring redundancy (redundant line
active/inactive) or (for devices that support redundant ring/network
coupling) the redundant ring/network coupling (redundancy exists) has
changed.
Port security On one port a data packet has been received from an unauthorized
terminal device (see the Port Security dialog).
UM BasicConfig L2P
208 Release 9.0 02/2015
Operation Diagnosis 9.2 Monitoring the Device Status
The device status provides an overview of the overall condition of the device.
Many process visualization systems record the device status for a device in
order to present its condition in graphic form.
The device displays its current status as "Error" or "OK" in the "Device
Status" frame. The device determines this status from the individual
monitoring results.
The device enables you to
signal the device status out-of-band via a signal contact
(see on page 214 “Monitoring the Device Status via the Signal Contact”)
signal the device status by sending a trap when the device status changes
detect the device status in the graphical user interface on the system side.
query the device status in the Command Line Interface.
UM BasicConfig L2P
Release 9.0 02/2015 209
Operation Diagnosis 9.2 Monitoring the Device Status
Note: With a non-redundant voltage supply, the device reports the absence
of a supply voltage. If you do not want this message to be displayed, feed the
supply voltage over both inputs or switch off the monitoring (see on page 214
“Monitoring the Device Status via the Signal Contact”).
UM BasicConfig L2P
210 Release 9.0 02/2015
Operation Diagnosis 9.2 Monitoring the Device Status
Note: The above CLI commands activate the monitoring and the trapping
respectively for all the supported components. If you want to activate or
deactivate monitoring only for individual components, you will find the
corresponding syntax in the CLI manual or in the help of the CLI console
(enter a question mark “?“ at the CLI prompt).
1 2 3
UM BasicConfig L2P
Release 9.0 02/2015 211
Operation Diagnosis 9.3 Out-of-band Signaling
The signal contact is used to control external devices and monitor the
operation of the device. Function monitoring enables you to perform remote
diagnostics.
The device reports the operating status via a break in the potential-free signal
contact (relay contact, closed circuit):
Incorrect supply voltage
- at least one of the 2 supply voltages is not operating,
- the internal supply voltage is not operating.
The temperature threshold has been exceeded or has not been reached.
The removal of a module (for modular devices).
The removal of the ACA.
The configuration on the external memory does not match that in the
device.
The interruption of the connection at at least one port. In the Basic
Settings:Port Configuration menu, you define which ports the
device signals if the connection is down (see on page 94 “Displaying
detected loss of connection”). On delivery, there is no link monitoring.
Events for ring redundancy:
Loss of the redundancy (in ring manager mode). On delivery, ring
redundancy monitoring is inactive.
The device is a normal ring participant and detects an error in the local
configuration.
Event in the ring/network coupling:
Loss of the redundancy. On delivery, there is no ring redundancy
monitoring.
The following conditions are also reported by the device in standby mode:
– Defective link status of the control line
– Partner device is in standby mode
Failure of a fan (MACH 4000).
Select the corresponding entries to decide which events the device status
includes.
UM BasicConfig L2P
212 Release 9.0 02/2015
Operation Diagnosis 9.3 Out-of-band Signaling
Note: With a non-redundant voltage supply, the device reports the absence
of a supply voltage. If you do not want this message to be displayed, feed the
supply voltage over both inputs or switch off the monitoring (see on page 214
“Monitoring the Device Status via the Signal Contact”).
Application options:
Simulation of an error detected during SPS error monitoring
Remote control of a device via SNMP, such as switching on a camera
In the "Mode Signal contact" frame, you select the "Manual setting"
mode to switch the contact manually.
UM BasicConfig L2P
Release 9.0 02/2015 213
Operation Diagnosis 9.3 Out-of-band Signaling
UM BasicConfig L2P
214 Release 9.0 02/2015
Operation Diagnosis 9.3 Out-of-band Signaling
UM BasicConfig L2P
Release 9.0 02/2015 215
Operation Diagnosis 9.3 Out-of-band Signaling
Proceed as follows to signal changes to the fan status via a signal contact
and with an alarm message:
UM BasicConfig L2P
216 Release 9.0 02/2015
Operation Diagnosis 9.3 Out-of-band Signaling
Figure 54: Monitoring the fan with the signal contact and trap
UM BasicConfig L2P
Release 9.0 02/2015 217
Operation Diagnosis 9.4 Port Status Indication
UM BasicConfig L2P
218 Release 9.0 02/2015
Operation Diagnosis 9.4 Port Status Indication
UM BasicConfig L2P
Release 9.0 02/2015 219
Operation Diagnosis 9.5 Event Counter at Port Level
UM BasicConfig L2P
220 Release 9.0 02/2015
Operation Diagnosis 9.5 Event Counter at Port Level
UM BasicConfig L2P
Release 9.0 02/2015 221
Operation Diagnosis 9.5 Event Counter at Port Level
The device allows you to detect this situation and report it to the network
management station. In the process, the device evaluates the error counters
of the port in the context of the port settings.
UM BasicConfig L2P
222 Release 9.0 02/2015
Operation Diagnosis 9.5 Event Counter at Port Level
Note: While the check is running, the data traffic at this port is suspended.
UM BasicConfig L2P
Release 9.0 02/2015 223
Operation Diagnosis 9.5 Event Counter at Port Level
The check takes a few seconds. After the check, the "Result" row contains
the result of the cable diagnosis. If the result of the check shows a cable
problem, then the "Distance" row contains the cable problem location’s
distance from the port.
Result Meaning
normal The cable is okay.
open The cable is interrupted.
short circuit There is a short-circuit in the cable.
unknown No cable check was performed yet, or it is
currently running
UM BasicConfig L2P
224 Release 9.0 02/2015
Operation Diagnosis 9.5 Event Counter at Port Level
UM BasicConfig L2P
Release 9.0 02/2015 225
Operation Diagnosis 9.5 Event Counter at Port Level
The device allows you to define which duplex mode is allowed for which
speed for a specific port. The monitoring of the combination of speed and
duplex mode prevents any undesired connections.
UM BasicConfig L2P
226 Release 9.0 02/2015
Operation Diagnosis 9.5 Event Counter at Port Level
You define for each port which duplex mode is allowed for which
speed.
– "hdx" = half duplex
– "fdx" = full duplex
– "10" = 10 Mbit/s
– "100" = 100 Mbit/s
etc.
UM BasicConfig L2P
Release 9.0 02/2015 227
Operation Diagnosis 9.5 Event Counter at Port Level
Note: The "Reset" button allows you to enable the port before the "Reset
Timer [s]" counts down.
So that the device enables the ports again that were disabled because of a
detected error state, complete the following steps:
Open the Diagnositics:Ports:Auto Disable dialog.
To enable ports again that the device has disabled due to link flaps,
in the "Configuration" frame mark the "Link Flap" checkbox.
You define the parameters that cause the ports to be disabled due
to link flaps in the Diagnostics:Ports:Port Monitor dialog, on the
"Link Flap" tab.
UM BasicConfig L2P
228 Release 9.0 02/2015
Operation Diagnosis 9.5 Event Counter at Port Level
To enable ports again that the device has disabled due to CRC or
fragment errors, on the "Configuration" frame mark the "CRC Error"
checkbox.
You define the parameters that cause the ports to be disabled due
to CRC or fragment errors in the Diagnostics:Ports:Port Monitor
dialog, on the "CRC/Fragments" tab.
To enable ports again that the device has disabled due to an
overload, in the "Configuration" frame mark the "Overload
Detection" checkbox.
You define the parameters that cause the ports to be disabled due
to an overload in the Diagnostics:Ports:Port Monitor dialog, on
the "Overload Detection" tab.
To enable ports again that the device disabled due to an incorrect
speed and duplex combination, in the "Configuration" frame mark
the "Speed Duplex" checkbox.
You define the parameters that cause the ports to be disabled due
to an incorrect speed and duplex combination in the
Diagnostics:Ports:Port Monitor dialog, on the "Speed Duplex"
tab.
To enable ports again that the device disabled due to an
unauthorized access to the port, in the "Configuration" frame you
mark the "Port Security" checkbox.
You define the parameters that cause the ports to be disabled due
to unauthorized access in the Security:Port Security dialog.
You define the time until each port is automatically enabled again in
the "Reset Timer [s]" column in the table.
UM BasicConfig L2P
Release 9.0 02/2015 229
Operation Diagnosis 9.6 Displaying the SFP Status
The SFP status display allows you to look at the current SFP module
connections and their properties. The properties include:
module type
support provided in media module
temperature in º C
transmission power in mW
receive power in mW
UM BasicConfig L2P
230 Release 9.0 02/2015
Operation Diagnosis 9.7 Topology Discovery
UM BasicConfig L2P
Release 9.0 02/2015 231
Operation Diagnosis 9.7 Topology Discovery
A network management station can query this information from devices that
have LLDP active. This information allows the network management station
to form a description of the network topology.
For information exchanges, the LLDP uses an IEEE MAC address, which
devices do not normally communicate. Devices without LLDP therefore do
not allow support for LLDP packets. If a device without LLDP capability is
located between two devices with LLDP capability, then LLDP information
exchanges are prevented between these two devices. To work around this,
Hirschmann devices send and receive additional LLDP packets with the
Hirschmann Multicast-MAC address 01:80:63:2F:FF:0B. Hirschmann-
Devices with the LLDP function are therefore able to exchange LLDP
information with each other even across devices that do not have LLDP
capability.
The Management Information Base (MIB) for a Hirschmann device with
LLDP capability holds the LLDP information in the lldp MIB and in the private
hmLLDP.
UM BasicConfig L2P
232 Release 9.0 02/2015
Operation Diagnosis 9.7 Topology Discovery
If several devices are connected to one port, for example via a hub, the
table will contain one line for each connected device.
If
devices with active topology discovery function and
devices without active topology discovery function are connected to
a port
then
the topology table hides the devices without active topology
discovery.
If
only devices without active topology discovery are connected to a
port
then
the table will contain one line for this port to represent all devices.
This line contains the number of connected devices.
MAC addresses of devices that the topology table hides for the sake
of clarity, are located in the address table (FDB), (see on page 154
“Entering Static Addresses”).
UM BasicConfig L2P
Release 9.0 02/2015 233
Operation Diagnosis 9.8 Detecting IP Address Conflicts
Mode Meaning
enable Enables active and passive detection.
disable Disables the function
activeDetectionOnly Enables active detection only. After connecting to a network or after an
IP address has been configured, the device immediately checks whether
its IP address already exists within the network.
If the IP address already exists, the device will return to the previous
configuration, if possible, and make another attempt after 15 seconds.
The device therefore avoids to participate in the network traffic with a
duplicate IP address.
passiveOnly Enables passive detection only. The device listens passively on the
network to determine whether its IP address already exists. If it detects a
duplicate IP address, it will initially defend its address by employing the
ACD mechanism and sending out gratuitous ARPs. If the remote device
does not disconnect from the network, the management interface of the
local device will then disconnect from the network. Every 15 seconds, it
will poll the network to determine if there is still an address conflict. If there
isn't, it will connect back to the network.
UM BasicConfig L2P
234 Release 9.0 02/2015
Operation Diagnosis 9.8 Detecting IP Address Conflicts
Select the
Diagnostics:IP Address Conflict Detection dialog.
In the table, the device logs IP address conflicts with its IP address.
The device logs the following data for each conflict:
the time („Timestamp“ column)
the conflicting IP address („IP Address“ column)
the MAC address of the device with which the IP address conflicted („MAC
Address“ column).
For each IP address, the device logs a line with the last conflict that
occurred.
During a restart, the device deletes the table.
UM BasicConfig L2P
Release 9.0 02/2015 235
Operation Diagnosis 9.9 Detecting Loops
UM BasicConfig L2P
236 Release 9.0 02/2015
Operation Diagnosis 9.10 Reports
9.10 Reports
The following reports and buttons are available for the diagnostics:
Log file.
The log file is an HTML file in which the device writes all the important
device-internal events.
System information.
The system information is an HTML file containing the system-relevant
data.
Download Support Information.
This button allows you to download system information as files in a ZIP
archive.
In service situations, these reports provide the technician with the necessary
information.
To display the HTML file with system-relevant data, select the dialog
Diagnosis:Report:System Information.
To view the log file with important device-internal events, select the
dialog Diagnosis:Report:Event Log.
UM BasicConfig L2P
Release 9.0 02/2015 237
Operation Diagnosis 9.10 Reports
UM BasicConfig L2P
238 Release 9.0 02/2015
Operation Diagnosis 9.11 Monitoring Data Traffic on the
Ports (Port Mirroring)
The port mirroring function enables you to review the data traffic from a group
of ports on the device for diagnostic purposes (N:1). The device forwards
(mirrors) the data for these ports to another port. This process is port
mirroring.
The ports from which the device copies the traffic are source ports. The port
on which you review the data is the destination port. You use physical ports
as source or destination ports.
In port mirroring, the device copies valid data packets of the source port to
the destination port. The device does not affect the data traffic on the source
ports during port mirroring.
A management tool connected at the destination port, e.g. an RMON probe,
can thus monitor the data traffic of the source ports in the sending and
receiving directions.
When selecting "RX" as the monitoring direction on a source port, only
frames received on the source port will be copied/mirrored to the destination
port ( monitoring ingress).
When selecting "TX" as the monitoring direction on a source port, only
frames transmitted on the source port will be copied/mirrored to the
destination port (monitoring egress).
With port mirroring active, the device copies the traffic received and/or
forwarded on a source port to the destination port.
The PowerMICE and MACH4000 devices use the destination port for the port
mirroring task exclusively. The source port forwards and receives traffic as
normal.
UM BasicConfig L2P
Release 9.0 02/2015 239
Operation Diagnosis 9.11 Monitoring Data Traffic on the
Ports (Port Mirroring)
Switch PLC
Backbone
RMON-Probe
This dialog allows you to configure and activate the port mirroring
function of the device.
UM BasicConfig L2P
240 Release 9.0 02/2015
Operation Diagnosis 9.11 Monitoring Data Traffic on the
Ports (Port Mirroring)
Select the source ports whose data traffic you want to review from the
physical ports list by checkmarking the relevant boxes.
The device displays the "Source Port" currently used as the
"Destination Port" as grayed out in the table. Default setting: no
source ports.
Select the destination port to which you have connected your
management tool from the drop-down menu in the "Destination Port"
frame.
Selecting a destination port is mandatory for a valid port mirroring
configuration. The drop-down menu displays available ports
exclusively, for example, the list excludes the ports currently in use
as source ports. Default setting: port - (no destination port).
To select the monitoring traffic direction, checkmark the relevant
"RX" and "TX" boxes for ingress and egress monitoring directions.
To switch on the function, select On in the "Operation" frame. Default
setting: Off.
The “Reset configuration” button in the dialog allows you to reset all the
port mirroring settings of the device to the state on delivery.
UM BasicConfig L2P
Release 9.0 02/2015 241
Operation Diagnosis 9.11 Monitoring Data Traffic on the
Ports (Port Mirroring)
UM BasicConfig L2P
242 Release 9.0 02/2015
Operation Diagnosis 9.12 Syslog
9.12 Syslog
Note: You will find the actual events that the device has logged in the “Event
Log” (see on page 246 “Trap log”) and in the log file (see on page 237
“Reports”), a HTML page with the title “Event Log”.
UM BasicConfig L2P
Release 9.0 02/2015 243
Operation Diagnosis 9.12 Syslog
Note: For more details on setting the SNMP logging, see the “Syslog”
chapter in the “GUI” (Graphical User Interface / Web-based Interface)
reference manual.
UM BasicConfig L2P
244 Release 9.0 02/2015
Operation Diagnosis 9.12 Syslog
UM BasicConfig L2P
Release 9.0 02/2015 245
Operation Diagnosis 9.13 Trap log
The device allows you to call up a log of the system events. The table of the
“Trap Log” dialog lists the logged events with a time stamp.
Click “Reload” to update the content of the trap log.
Click “Clear” to delete the content of the trap log.
Note: You have the option to also send the logged events to one or more
syslog servers (see on page 243 “Syslog”).
UM BasicConfig L2P
246 Release 9.0 02/2015
Operation Diagnosis 9.14 MAC Notification
UM BasicConfig L2P
Release 9.0 02/2015 247
Operation Diagnosis 9.14 MAC Notification
UM BasicConfig L2P
248 Release 9.0 02/2015
Setting up the Configuration
Environment
UM BasicConfig L2P
Release 9.0 02/2015 249
Setting up the Configuration A.1 Setting up a DHCP/BOOTP
Environment Server
On the product CD supplied with the device you will find the software for a
DHCP server from the software development company IT-Consulting Dr.
Herbert Hanewinkel. You can test the software for 30 calendar days from the
date of the first installation, and then decide whether you want to purchase a
license.
To install the DHCP servers on your PC
put the product CD in the CD drive of your PC and
under Additional Software select “haneWIN DHCP-Server”.
To carry out the installation, follow the installation assistant.
Start the DHCP Server program.
UM BasicConfig L2P
250 Release 9.0 02/2015
Setting up the Configuration A.1 Setting up a DHCP/BOOTP
Environment Server
Open the window for the program settings in the menu bar:
Options:Preferences and select the DHCP tab page.
Enter the settings shown in the illustration and click OK.
UM BasicConfig L2P
Release 9.0 02/2015 251
Setting up the Configuration A.1 Setting up a DHCP/BOOTP
Environment Server
UM BasicConfig L2P
252 Release 9.0 02/2015
Setting up the Configuration A.1 Setting up a DHCP/BOOTP
Environment Server
UM BasicConfig L2P
Release 9.0 02/2015 253
Setting up the Configuration A.1 Setting up a DHCP/BOOTP
Environment Server
Click New.
UM BasicConfig L2P
254 Release 9.0 02/2015
Setting up the Configuration A.1 Setting up a DHCP/BOOTP
Environment Server
Add an entry for each device that will get its parameters from the DHCP
server.
UM BasicConfig L2P
Release 9.0 02/2015 255
Setting up the Configuration A.2 Setting up a DHCP Server with
Environment Option 82
On the product CD supplied with the device you will find the software for a
DHCP server from the software development company IT-Consulting Dr.
Herbert Hanewinkel. You can test the software for 30 calendar days from the
date of the first installation, and then decide whether you want to purchase a
license.
To install the DHCP servers on your PC
put the product CD in the CD drive of your PC and
under Additional Software select “haneWIN DHCP-Server”.
To carry out the installation, follow the installation assistant.
Start the DHCP Server program.
UM BasicConfig L2P
256 Release 9.0 02/2015
Setting up the Configuration A.2 Setting up a DHCP Server with
Environment Option 82
UM BasicConfig L2P
Release 9.0 02/2015 257
Setting up the Configuration A.2 Setting up a DHCP Server with
Environment Option 82
ciclhhvvvvssmmpprirlxxxxxxxxxxxx
UM BasicConfig L2P
258 Release 9.0 02/2015
Setting up the Configuration A.2 Setting up a DHCP Server with
Environment Option 82
MAC =
IP = 00:80:63:10:9a:d7
149.218.112.100
DHCP Server
IP =
149.218.112.1
IP =
149.218.112.100
UM BasicConfig L2P
Release 9.0 02/2015 259
Setting up the Configuration A.3 TFTP Server for Software
Environment Updates
On delivery, the device software is held in the local flash memory. The device
boots the software from the flash memory.
Software updates can be performed via a TFTP server. This presupposes
that a TFTP server has been installed in the connected network and that it is
active.
Note: An alternative to the TFTP update is the HTTP update. The HTTP
update saves you having to configure the TFTP server.
The file transfer between the device and the TFTP server is performed via
the Trivial File Transfer Protocol (tftp).
The management station and the TFTP server may be made up of one or
more computers.
The preparation of the TFTP server for the device software involves the
following steps:
Setting up the device directory and copying the device software
Setting up the TFTP process
UM BasicConfig L2P
260 Release 9.0 02/2015
Setting up the Configuration A.3 TFTP Server for Software
Environment Updates
SunOS and HP
First check whether the tftp daemon (background process) is running,
i.e. whether the file /etc/inetd.conf contains the following line (see
figure 77) and whether the status of this process is "IW":
SunOS
HP
If the process is not entered or only entered as a comment line (#), modify
/etc/inetd.conf accordingly and then re-initialize the INET daemon. This is
performed with the command "kill -1 PID", where PID is the process
number of inetd.
This re-initialization can be executed automatically by entering the
following UNIX commands:
SunOS
HP
/etc/inetd -c
UM BasicConfig L2P
Release 9.0 02/2015 261
Setting up the Configuration A.3 TFTP Server for Software
Environment Updates
You can obtain additional information about the tftpd daemon tftpd with
the UNIX command "man tftpd".
Note: The command "ps" does not show the tftp daemon every time,
although it is actually running.
For example:
tftp:*:510:20:tftp server:/usr/tftpdir:/bin/false
tftpuser ID,
* is in the password field,
510 sample user number,
20 sample group number.,
tftp server any meaningful name ,
/bin/false mandatory entry (login shell)
UM BasicConfig L2P
262 Release 9.0 02/2015
Setting up the Configuration A.3 TFTP Server for Software
Environment Updates
No Is tftp*
commented
out?
Yes
Re-initialize inetd.conf
by entering
kill-1 PID
No Problems with
the tftp server?
Yes
e.g
cd /tftpboot/device
tftp <tftp-Servername>
Test the tftp process get device/device.bin
rm device.bin
Checking of the
tftp process
completed
Figure 77: Flow chart for setting up TFTP server with SunOS and HP
UM BasicConfig L2P
Release 9.0 02/2015 263
Setting up the Configuration A.3 TFTP Server for Software
Environment Updates
UM BasicConfig L2P
264 Release 9.0 02/2015
Setting up the Configuration A.4 Preparing access via SSH
Environment
To be able to access the device via SSH, perform the following steps:
Generate a key (SSH host key).
Install the key on the device.
Enable access via SSH on the device.
Install a program for executing the SSH protocol (SSH client) on your
computer.
UM BasicConfig L2P
Release 9.0 02/2015 265
Setting up the Configuration A.4 Preparing access via SSH
Environment
UM BasicConfig L2P
266 Release 9.0 02/2015
Setting up the Configuration A.4 Preparing access via SSH
Environment
Load the keys from the tftp server onto the device.
enable Switch to the privileged EXEC mode.
no ip ssh Deactivates the SSH server.
copy tftp://ip/filepath/key Loads the key to the non-volatile memory of the
nvram:sshkey-rsa2 device.
nvram:sshkey-rsa2 is the storage
copy tftp://ip/filepath/key location of the RSA key for SSH version 2.
nvram:sshkey-dsa nvram:sshkey-dsa is the storage location
of the DSA key for SSH version 2.
copy tftp://ip/filepath/key nvram:sshkey-rsa1 is the storage
nvram:sshkey-rsa1 location of the RSA key for SSH version 1.
ip ssh Activates the SSH server.
Depending on the device and the time at which SSH was configured, it
can take up to a minute to set up the connection.
UM BasicConfig L2P
Release 9.0 02/2015 267
Setting up the Configuration A.4 Preparing access via SSH
Environment
Check the fingerprint of the key to ensure that you have actually
connected to the desired device. You will find the fingerprint of your key
in the "Key fingerprint" field of the PuTTY key generator.
If the fingerprint matches your key, click on "Yes".
PuTTY also displays another security alarm message at the defined warning
threshold.
UM BasicConfig L2P
268 Release 9.0 02/2015
Setting up the Configuration A.4 Preparing access via SSH
Environment
UM BasicConfig L2P
Release 9.0 02/2015 269
Setting up the Configuration A.5 HTTPS Certificate
Environment
Load the certificate from the tftp server onto the device.
enable Change to the privileged EXEC mode.
no ip https Deactivates the HTTPS function before
transferring the certificate to the device.
copy tftp://ip/filepath/cert Loads the certificate to the non-volatile memory
nvram:httpscert of the device.
nvram:httpscert is the storage location of
the X.509 certificate.
ip https Activates the HTTPS function after transferring
the certificate to the device.
UM BasicConfig L2P
270 Release 9.0 02/2015
Setting up the Configuration A.6 Service Shell
Environment
When you need assistance with your device, then the service personnel use
the Service Shell function to monitor internal conditions, for example switch
or CPU registers.
The CLI Reference Manual contains a description of deactivating the Service
Shell.
Note: When you deactivate the Service Shell, then you are still able to
configure the device, but you limit the service personnel to system
diagnostics. In order to reactivate the Service Shell function, the device
requires disassembly by the manufacturer.
UM BasicConfig L2P
Release 9.0 02/2015 271
Setting up the Configuration A.6 Service Shell
Environment
UM BasicConfig L2P
272 Release 9.0 02/2015
General Information
B General Information
UM BasicConfig L2P
Release 9.0 02/2015 273
General Information B.1 Management Information Base
(MIB)
Example:
The generic object class
hmPSState (OID = 1.3.6.1.4.1.248.14.1.2.1.3)
is the description of the abstract information "power supply status". However,
it is not possible to read any information from this, as the system does not
know which power supply is meant.
Specifying the subidentifier (2) maps this abstract information onto reality
(instantiates it), thus indicating the operating status of power supply 2. A
value is assigned to this instance and can then be read. The instance "get
1.3.6.1.4.1.248.14.1.2.1.3.2" returns the response "1", which
means that the power supply is ready for operation.
UM BasicConfig L2P
274 Release 9.0 02/2015
General Information B.1 Management Information Base
(MIB)
UM BasicConfig L2P
Release 9.0 02/2015 275
General Information B.1 Management Information Base
(MIB)
1 iso
3 org
6 dod
1 internet
3 at 15 hmPlatform4 12 Target
4 ip 13 Notification
5 icmp 15 usm
6 tcp 16 vacm
7 udp
11 snmp
16 rmon
17 dot1dBridge
26 snmpDot3MauMGT
UM BasicConfig L2P
276 Release 9.0 02/2015
General Information B.2 Abbreviations used
UM BasicConfig L2P
Release 9.0 02/2015 277
General Information B.3 Technical Data
You will find the technical data in the document “GUI Reference Manual”.
UM BasicConfig L2P
278 Release 9.0 02/2015
General Information B.4 Readers’ Comments
UM BasicConfig L2P
Release 9.0 02/2015 279
General Information B.4 Readers’ Comments
General comments:
Sender:
Company / Department:
Street:
E-mail:
Date / Signature:
Dear User,
Please fill out and return this page
as a fax to the number +49 (0)7127/14-1600 or
per mail to
Hirschmann Automation and Control GmbH
Department 01RD-NT
Stuttgarter Str. 45-51
72654 Neckartenzlingen
UM BasicConfig L2P
280 Release 9.0 02/2015
Index
C Index
A D
ACA 62, 79, 81, 208 Data transfer parameters 18
ACA31 41 Destination address 152, 154, 155, 165
ACD 234 Device Status 209
Access 208 DHCP 27, 48, 55
Access rights 73, 103 DHCP Client 48
Access security 93 DHCP Option 82 55
Address Conflict Detection 234 DHCP server 128, 250, 256
Address table 153 Differentiated management access 114
AF 178 Differentiated Services 178
Aging Time 153, 159, 159 DiffServ 173
Alarm 207 DiffServ codepoint 178
Alarm messages 204 DSCP 178, 180, 183, 184
APNIC 29 Dynamic 154
ARIN 29
ARP 34 E
ASF Finder 62 E2E 138
Assured Forwarding 178 EF 178
Authentication 208 End-to-End 138
AutoConfiguration Adapter 41, 208 Event Log 246
Automatic Configuration 93 Expedited Forwarding 178
B F
Bandwidth 157, 186 FAQ 285
BOOTP 27 Fan 215
Booting 19 Faulty device replacement 59
Boundary clock 138 FDB 154
Broadcast 152, 154, 157 Filter 154
Broadcast Limiter 171 Filter table 154, 165
First installation 27
C Flash memory 66, 81
CD-ROM 250, 256 Flow control 186
CIDR 34 Forwarding database 154
CLI Banner 125
Classless Inter-Domain Routing 34 G
Class Selector 178 Gateway 30, 38
Clock 135 Generic object classes 274
Clock synchronization 137 GMRP 157, 165
Closed circuit 212 GMRP per port 168
Cold start 82 Grandmaster 135
Command Line Interface 21
Configuration 66 H
Configuration changes 204 HaneWin 250, 256
Configuration data 43, 55, 64, 71 Hardware address 44
Configuration file 48, 67, 68 Hardware clock (buffered) 128
Connection error 94 Hardware reset 204
HIPER-Ring (source for alarms) 208
UM BasicConfig L2P
Release 9.0 02/2015 281
Index
UM BasicConfig L2P
282 Release 9.0 02/2015
Index
Restart 82 Topology 55
RIPE NCC 29 ToS 173, 177, 178
Ring manager 154 TP cable diagnosis 223
Ring/Network coupling (source for alarms) Traffic Classes 173, 181, 183
208 Training Courses 285
RMON probe 239 Transmission reliability 204
Router 30 Transparent Clock 138
Trap 204, 207
S Trap target table 204
Segmentation 204 Trivial File Transfer Protocol 260
Service 237 Trust dot1p 180
Service provider 29 Trust ip-dscp 180
Service shell reactivation 271 Type Field 174
SFP Module (source for alarms) 208 Type of Service 177
SFP module 230
SFP status display 230 U
Signal contact 94, 212 Unicast 157
Signal contact (source for alarm) 208 Untrusted 180
Signal runtime 131 Update 18
SNMP 24, 103, 204 USB stick 79
SNTP 127, 132 User name 22
SNTP client 132 UTC 129
SNTP server 148
Software 264 V
Software release 77 Video 181
Source address 152 VLAN 174, 180, 189
SSH 21 VLAN 0 57
Starting the graphical user interface 24 VLAN ID (network parameter) 56
State on delivery 66, 66, 103 VLAN priority 182
Static 154 VLAN tag 174, 189
Strict Priority 181 VoIP 181
Subdomains 139 V.24 21
Subidentifier 274
Subnet 38, 153 W
Summer time 128 Web-based Interface 24
Supply voltage 208 Winter time 128
Symbol 13
System Monitor 18 X
System Name 48 XML (Offline Configurator Format) 69
System requirements (GUI) 24
System time 131, 132
T
TAI 129
Target table 204
TCP/IP stack 261
Technical Questions 285
Telnet 21
TFTP 260
TFTP Update 85
Time difference 129
Time Management 135
Time Stamp Unit 137, 141
Time zone 128
UM BasicConfig L2P
Release 9.0 02/2015 283
Index
UM BasicConfig L2P
284 Release 9.0 02/2015
Further Support
D Further Support
Technical Questions
For technical questions, please contact any Hirschmann dealer in your
area or Hirschmann directly.
You will find the addresses of our partners on the Internet at
http://www.hirschmann.com
Contact our support at
https://hirschmann-support.belden.eu.com
UM BasicConfig L2P
Release 9.0 02/2015 285
Further Support
UM BasicConfig L2P
286 Release 9.0 02/2015
Further Support
UM BasicConfig L2P
Release 9.0 02/2015 287