Yeman Moxa Moxa Managed Switches UM v8 Moxa
Yeman Moxa Moxa Managed Switches UM v8 Moxa
Users Manual
Eighth Edition, July 2015
www.moxa.com/product
Copyright Notice
2015 Moxa Inc., All rights reserved.
Trademarks
The MOXA logo is a registered trademark of Moxa Inc.
All other trademarks or registered marks in this manual belong to their respective manufacturers.
Disclaimer
Information in this document is subject to change without notice and does not represent a commitment on the part of
Moxa.
Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited
to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the
products and/or the programs described in this manual, at any time.
Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for
its use, or for any infringements on the rights of third parties that may result from its use.
This product might include unintentional technical or typographical errors. Changes are periodically made to the
information herein to correct such errors, and these changes are incorporated into new editions of the publication.
Toll-free: 1-888-669-2872
Toll-free: 800-820-5036
Tel:
+1-714-528-6777
Tel:
+86-21-5258-9955
Fax:
+1-714-528-6778
Fax:
+86-21-5258-5505
Moxa Europe
Moxa Asia-Pacific
Tel:
+49-89-3 70 03 99-0
Tel:
+886-2-8919-1230
Fax:
+49-89-3 70 03 99-99
Fax:
+886-2-8919-1231
Moxa India
Tel:
+91-80-4172-9088
Fax:
+91-80-4132-1045
Table of Contents
1.
2.
3.
A.
1
1.
Thank you for purchasing a Moxa managed Ethernet switch. Read this users manual to learn how to connect
your Moxa switch to Ethernet-enabled devices used for industrial applications.
The following two chapters are covered in this user manual:
Chapter 2: Getting Started
This chapter explains the initial installation process for Moxa switches. There are three ways to access a
Moxa switchs configuration settings: serial console, Telnet console, and web console.
Chapter 3: Featured Functions
This chapter explains how to access a Moxa switchs various configuration, monitoring, and administration
functions. These functions can be accessed by serial, Telnet, or web console. The web console is the most
user-friendly way to configure a Moxa switch. In this chapter, we use the web console interface to introduce
the functions.
2
2.
Getting Started
In this chapter we explain how to install a Moxa switch for the first time. There are three ways to access the
Moxa switchs configuration settings: serial console, Telnet console, or web console. If you do not know the
Moxa switchs IP address, you can open the serial console by connecting the Moxa switch to a PCs COM port
with a short serial cable. You can open the Telnet or web console over an Ethernet LAN or over the Internet.
The following topics are covered in this chapter:
Serial Console Configuration (115200, None, 8, 1, VT100)
Configuration by Telnet Console
Configuration by Web Browser
Disabling Telnet and Browser Access
Getting Started
You cannot connect to the serial and Telnet console at the same time.
You can connect to the web console and another console (serial or Telnet) at the same time. However, we
strongly recommend that you do NOT do so. Following this advice will allow you to maintain better control
over the Moxa switchs configuration.
NOTE
We recommend using PComm Terminal Emulator when opening the serial console. This software can be
downloaded free of charge from the Moxa website.
Before running PComm Terminal Emulator, use an RJ45 to DB9-F (or RJ45 to DB25-F) cable to connect the
Moxa switchs console port to your PCs COM port (generally COM1 or COM2, depending on how your system is
set up).
After installing PComm Terminal Emulator, open the Moxa switchs serial console as follows:
1. From the Windows desktop, click Start > Moxa > PComm Lite Ver1.6 > Terminal Emulator.
2. Select Open under the Port Manager menu to open a new connection.
3. The Property window should open. On the Communication Parameter tab for Ports, select the COM
port that is being used for the console connection. Set the other fields as follows: 115200 for Baud Rate,
8 for Data Bits, None for Parity, and 1 for Stop Bits.
2-2
Getting Started
4. On the Terminal tab, select VT100 for Terminal Type, and then click OK to continue.
In the terminal window, the Moxa switch will prompt you to select a terminal type. Enter 1 to select
ansi/vt100 and then press Enter.
5. The serial console will prompt you to log in. Press Enter and select admin or user. Use the down arrow key
on your keyboard to select the Password field and enter a password if desired. This password will be
required to access any of the consoles (web, serial, Telnet). If you do not wish to create a password, leave
the Password field blank and press Enter.
6. The Main Menu of the Moxa switchs serial console should appear. (In PComm Terminal Emulator, you can
adjust the font by selecting Font from the Edit menu.)
2-3
Getting Started
7. Use the following keys on your keyboard to navigate the Moxa switchs serial console:
Key
Function
Tab
Enter
Space
Toggle options
Esc
Previous menu
NOTE
To connect to the Moxa switchs Telnet or web console, your PC host and the Moxa switch must be on the same
logical subnet.
NOTE
When connecting to the Moxa switchs Telnet or web console, first connect one of the Moxa switchs Ethernet
ports to your Ethernet LAN, or directly to your PCs Ethernet port. You may use either a straight-through or
cross-over Ethernet cable.
NOTE
2. In the terminal window, the Telnet console will prompt you to select a terminal type. Type 1 to choose
ansi/vt100, and then press Enter.
2-4
Getting Started
3. The Telnet console will prompt you to log in. Press Enter and then select admin or user. Use the down
arrow key on your keyboard to select the Password field and enter a password if desired. This password
will be required to access any of the consoles (web, serial, Telnet). If you do not wish to create a password,
leave the Password field blank and press Enter.
4. The Main Menu of the Moxa switchs Telnet console should appear.
5. In the terminal window, select Preferences from the Terminal menu on the menu bar.
6. The Terminal Preferences window should appear. Make sure that VT100 Arrows is checked.
7. Use the following keys on your keyboard to navigate inside the Moxa switchs Telnet console:
Key
Function
Tab
NOTE
Enter
Space
Toggle options
Esc
Previous menu
The Telnet console looks and operates in precisely the same manner as the serial console.
2-5
Getting Started
To connect to the Moxa switchs Telnet or web console, your PC host and the Moxa switch must be on the same
logical subnet.
NOTE
If the Moxa switch is configured for other VLAN settings, you must make sure your PC host is on the
management VLAN.
NOTE
When connecting to the Moxa switchs Telnet or web console, first connect one of the Moxa switchs Ethernet
ports to your Ethernet LAN, or directly to your PCs Ethernet port. You may use either a straight-through or
cross-over Ethernet cable.
NOTE
2. The Moxa switchs web console will open, and you will be prompted to log in. Select the login account
(admin or user) and enter the Password. This password will be required to access any of the consoles (web,
serial, Telnet). If you do not wish to create a password, leave the Password field blank and press Enter.
NOTE
By default, no password is assigned to the Moxa switchs web, serial, and Telnet consoles.
2-6
Getting Started
3. After logging in, you may need to wait a few moments for the web console to appear. Use the folders in the
left navigation panel to navigate between different pages of configuration options.
2-7
3
3.
Featured Functions
In this chapter, we explain how to access the Moxa switchs various configuration, monitoring, and
administration functions. These functions can be accessed by serial, Telnet, or web console. The serial console
can be used if you do not know the Moxa switchs IP address and requires that you connect the Moxa switch to
a PC COM port. The Telnet and web consoles can be opened over an Ethernet LAN or the Internet.
The web console is the most user-friendly interface for configuring a Moxa switch. In this chapter, we use the
web console interface to introduce the functions. There are only a few differences between the web console,
serial console, and Telnet console.
The following topics are covered in this chapter:
Configuring Basic Settings
Loop Protection
Using Port Trunking
Configuring SNMP
Using PoE (PoE Models Only)
Using Traffic Prioritization
Using Virtual LAN
Using Multicast Filtering
Using Bandwidth Management
Security
Authentication Certificate
Using Port Access Control
Using Auto Warning
Using Line-Swap-Fast-Recovery
Using Set Device IP
Using Diagnosis
Using Monitor
Using the MAC Address Table
Using Access Control List
Using Event Log
Using Syslog
Using HTTPS/SSL
Featured Functions
System Identification
System Identification items are displayed at the top of the web console and will be included in alarm emails.
You can configure the System Identification items to make it easier to identify different switches that are
connected to your network.
Switch Name
Setting
Description
Factory Default
Max. 30 characters
Managed
Redundant Switch
[Serial no. of this
switch]
Switch Location
Setting
Description
Max. 80 characters
This option is useful for differentiating between the locations of Switch Location
Factory Default
Description
Factory Default
Max. 30 characters
Description
Factory Default
Max. 30 characters
None
Featured Functions
Description
Factory Default
60 to 86400 (seconds)
0 (disabled)
management console.
Age Time (S)
Setting
Description
15 to 3825 (seconds)
The length of time that a MAC address entry can remain in the 300
Factory Default
Description
Read-only
The CPU usage volume in the past 5 seconds, 30 seconds, and None
Factory Default
5 minutes
Free Memory
Setting
Description
Factory Default
Read-only
None
Setting
Description
Factory Default
Enable
Enables the Moxa switch to support the Jumbo Frame function Disabled
Disable
Jumbo Frame
Description
Factory Default
1522 to 9000
NOTE: Jumbo Frame is supported by the IKS-G6000 series and the ICS-G7000 Series.
Password
The Moxa switch provides two levels of configuration access. The admin account has read/write access of all
configuration parameters, and the user account has read access only. A user account can view the
configuration, but will not be able to make modifications.
ATTENTION
By default, a password is not assigned to the Moxa switchs web, Telnet, and serial consoles. If a password is
assigned, you will be required to enter the password when you open the serial console, Telnet console, or Web
console.
3-3
Featured Functions
Account
Setting
Description
Factory Default
Admin
admin
User
Password
Setting
Description
Factory Default
Old password
None
(max. 16 characters)
New password
Enter the desired new password. Leave it blank if you want to None
(Max. 16 characters)
Retype password (Max. Enter the desired new password again. Leave it blank if you
16 characters)
None
Accessible IP List
The Moxa switch uses an IP address-based filtering method to control access.
You may add or remove IP addresses to limit access to the Moxa switch. When the accessible IP list is enabled,
only addresses on the list will be allowed access to the Moxa switch. Each IP address and netmask entry can be
tailored for different situations:
Input Format
Any host
Disable
192.168.1.120
192.168.1.120 / 255.255.255.255
192.168.1.1 to 192.168.1.254
192.168.1.0 / 255.255.255.0
192.168.0.1 to 192.168.255.254
192.168.0.0 / 255.255.0.0
192.168.1.1 to 192.168.1.126
192.168.1.0 / 255.255.255.128
192.168.1.129 to 192.168.1.254
192.168.1.128 / 255.255.255.128
3-4
Featured Functions
Port Settings
Ethernet Port Settings
Port settings are included to give the user control over port access, port transmission speed, flow control, and
port type (MDI or MDIX).
Enable
Setting
Description
Factory Default
Checked
Enabled
Unchecked
ATTENTION
If a connected device or sub-network is wreaking havoc on the rest of the network, the Disable option under
Advanced Settings/Port gives the administrator a quick way to shut off access through this port
immediately.
Description
Setting
Description
Factory Default
Media type
N/A
Setting
Description
Factory Default
Max. 63 characters
None
Name
Description
Factory Default
1G-Full
100M-Full
100M-Half
10M-Full
Auto
Choose one of these fixed speed options if the connected
Ethernet device has trouble auto-negotiating for line speed.
10M-Half
3-5
Featured Functions
Description
Factory Default
Enables flow control for this port when the ports Speed
is set to Auto.
Disables flow control for this port when the ports Speed
Disabled
is set to Auto.
MDI/MDIX
Setting
Auto
Description
Factory Default
MDI
MDIX
Auto
Network Parameters
Network configuration allows users to configure both IPv4 and IPv6 parameters for management access over
the network. The Moxa switch supports both IPv4 and IPv6, and can be managed through either of these
address types.
A brief explanation of each configuration item is given below.
IP4
The IPv4 settings include the switchs IP address and subnet mask, as well as the IP address of the default
gateway. In addition, input cells are provided for the IP addresses of a 1st and 2nd DNS server.
Auto IP Configuration
Setting
Description
Factory Default
Disable
Disable
By DHCP
By BootP
Switch IP Address
Setting
Description
Factory Default
IP address for the Moxa Assigns the Moxa switchs IP address on a TCP/IP network.
switch
3-6
192.168.127.253
Featured Functions
Description
Factory Default
Moxa switch
Default Gateway
Setting
Description
Factory Default
IP address for gateway Specifies the IP address of the router that connects the LAN to None
an outside network.
DNS IP Address
Setting
Description
Factory Default
None
server
IP address for 2nd DNS Specifies the IP address of the secondary DNS server used by
server
None
your network. The Moxa switch will use the secondary DNS
server if the first DNS server fails to connect.
Description
Factory Default
1 to 30
Description
Factory Default
0 to 65535
IP6
The IPv6 settings include two distinct address typesLink-Local Unicast addresses and Global Unicast
addresses. A Link-Local address makes the switch accessible over IPv6 for all devices attached to the same
local subnet. To connect to a larger network with multiple segments, the switch must be configured with a
Global Unicast address.
Global Unicast Address Prefix (Prefix Length: 64 bits) Default Gateway
Setting
Description
The prefix value must be formatted according to the RFC 2373 None
Factory Default
Prefix
Description
None
Displays the IPv6 Global Unicast address. The network portion None
Factory Default
3-7
Featured Functions
Link-Local Address
Setting
Description
Factory Default
None
None
Neighbor Cache
Setting
Description
Factory Default
None
None
Join Time
Setting
Description
Factory Default
None
200
Leave Time
Setting
Description
Factory Default
None
600
Setting
Description
Factory Default
None
10000
Leaveall Time
NOTE
Leave Time should be at least two times more than Join Time, and Leaveall Time should be larger than
Leave Time.
3-8
Featured Functions
The Moxa switch has a time calibration function based on information from an NTP server or user specified time
and date. Functions such as automatic warning emails can therefore include time and date stamp.
NOTE
The Moxa switch does not have a real time clock. The user must update the Current Time and Current Date
to set the initial time for the Moxa switch after each reboot, especially when there is no NTP server on the LAN
or Internet connection.
Current Time
Setting
Description
Factory Default
User-specified time
None
Setting
Description
Factory Default
User-specified date
None
Current Date
Description
Factory Default
User-specified date
None
End Date
Setting
Description
Factory Default
User-specified date
None
Setting
Description
Factory Default
User-specified hour
None
Offset
Description
Factory Default
Time zone
GMT (Greenwich
Mean Time)
3-9
NOTE
Featured Functions
Changing the time zone will automatically correct the current time. Be sure to set the time zone before setting
the time.
Time Server IP/Name
Setting
Description
Factory Default
IP address or name of
None
time server
time.stdtime.gov.tw, or time.nist.gov).
IP address or name of
The Moxa switch will try to locate the secondary NTP server if
Time Protocol
Setting
NTP
Description
Factory Default
Description
Factory Default
Enable/Disable
Disabled
3-10
Featured Functions
1. The Boundary Clock and Transparent Clock functionalities defined by IEEE 1588 must be implemented
in the switch.
2. The switch must be configured such that it does not pass IEEE 1588 message traffic using the normal
communication mechanisms of the switch.
Such an Ethernet switch will synchronize clocks directly connected to one of its ports to the highest possible
accuracy.
NOTE
If the CM-600-4TX-PTP module is not installed, then the EDS-600 only supports software-based IEEE 1588.
3-11
Featured Functions
Configuring PTP
Description
Factory Default
Enable PTP
Disabled
Description
Factory Default
v1 BC
v1 BC
v2 E2E 2-step TC
v2 E2E 1-step TC
v2 P2P 2-step TC
v2 P2P BC
Featured Functions
Description
0, 1, 2, 3, or 4
Factory Default
1588 V1.
Supported in IEEE 1588 V2.
logAnnounceInterval (sets the announce message interval)
Setting
Description
Factory Default
0, 1, 2, 3, or 4
1 (2 s)
announceReceiptTimeout
Setting
Description
Factory Default
logMinDelayReqInterval
Setting
Description
Factory Default
0, 1, 2, 3, 4, or 5
0 (1 sec.)
logMinPdelayReqInterval
Setting
Description
Factory Default
1, 0, 1, 2, 3, or 4
0 (1 sec)
Description
Factory Default
_DFLT (0)
_ALT(2), or _ALT(3)
Description
IPv4 or 802.3/Ethernet
Factory Default
IPv4
Preferred Master
Setting
Description
Factory Default
True or False
False
priority1
Setting
Description
Factory Default
0 to 255
128
priority.
priority2
Setting
Description
Factory Default
0 to 255
128
priority.
clockClass
Setting
Description
0 to 255
Factory Default
3-13
Featured Functions
clockAccuracy
Setting
Description
0x21
Factory Default
Description
Factory Default
PTP or ARB
PTP
ARB Time
Setting
Description
Factory Default
0 to 255
Setting
Description
Factory Default
True or False
The last minute of the current UTC day contains 59 seconds. If False
Leap59
Description
True or False
The last minute of the current UTC day contains 61 seconds. If False
Factory Default
Description
True or False
The initialization value will be TRUE if the value of the current False
Factory Default
Description
Factory Default
0 to 255
Setting
Description
Factory Default
N/A
N/A
Status
3-14
Featured Functions
Setting
Description
Factory Default
Unchecked:
The Turbo Ring protocol will be
activated automatically when the
4th DIP switch is moved to the ON
Disable the Turbo Ring DIP switch
position.
unchecked
Checked:
The Turbo Ring protocol will not be
activated automatically, regardless
of the position of the 4th DIP switch.
If the DIP switch is enabled, Turbo
Set DIP switch as Turbo Ring
NOTE
If the 4th DIP switch (Turbo Ring) is configured to ON, you will not be able to disable the Turbo Ring DIP switch
from the web interface, console, or Telnet.
NOTE
If you would like to enable VLAN and/or port trunking on any of the last four ports, do not use the fourth DIP
switch to activate Turbo Ring. In this case, you should use the Web, Telnet, or Serial console to activate Turbo
Ring.
3-15
Featured Functions
Description
Factory Default
IP address of TFTP
None
server
Description
Factory Default
Max. 40 characters
None
Description
Max. 40 characters
Specifies the path and file name of the Moxa switchs firmware None
Factory Default
file.
Log Files Path and Name
Setting
Description
Factory Default
Max. 40 characters
Specifies the path and file name of the Moxa switchs log file.
None
After setting the desired paths and file names, click Download to download the prepared file from the remote
TFTP server, or click Upload to upload the desired file to the remote TFTP server.
3-16
Featured Functions
Configuration File
Click Export to save the Moxa switchs configuration file to the local host.
Log File
Click Export to save the Moxa switchs log file to the local host.
NOTE
Some operating systems will open the configuration file and log file directly in the web page. In such cases,
right click the Export button to save the file.
Upgrade Firmware
To import a new firmware file into the Moxa switch, click Browse to select the firmware file that is saved on
your computer. The upgrade procedure will proceed automatically after clicking Import.
Upload Configure Data
To import a configuration file into the Moxa switch, click Browse to select the configuration file already saved
on your computer. The upgrade procedure will proceed automatically after clicking Import.
3-17
Featured Functions
Restart
This function provides users with a quick way to restart the system.
This function provides users with a quick way of restoring the Moxa switchs configuration to factory defaults.
The function is available in the serial, Telnet, and web consoles.
NOTE
After restoring the factory default configuration, you will need to use the default network settings to
re-establish the web or Telnet console connection with the Moxa switch.
Loop Protection
The switch is designed with a loop checking mechanism: Send a control BPDU from the Ethernet port and check
if this control BPDU will be sent back to the switch again. If the looping occurs, the switch will automatically
block the Ethernet port to prevent looping.
Check the Enable box and click Activate to enable the Loop protection.
3-18
Featured Functions
Greater flexibility in setting up your network connections, since the bandwidth of a link can be doubled,
tripled, or quadrupled.
Redundancyif one link is broken, the remaining trunked ports share the traffic within this trunk group.
To avoid broadcast storms or loops in your network while configuring a trunk, first disable or disconnect all
ports that you want to add to the trunk or remove from the trunk. After you finish configuring the trunk, enable
or re-connect the ports.
If all ports on both switch units are configured as 100BaseTX and they are operating in full duplex mode, the
potential bandwidth of the connection will be up to 1.6 Gbps. This means that users can double, triple, or
quadruple the bandwidth of the connection by port trunking between two Moxa switches.
Each Moxa switch can set a maximum of 4 port trunking groups. When you activate port trunking, certain
settings on each port will be reset to factory default values or disabled:
After port trunking has been activated, you can configure these items again for each trunking port.
3-19
Featured Functions
Step 1:
Step 2:
Step 3:
Select the desired ports under Available Ports and click Up to add to the Trunk Group.
Step 4:
Select the desired ports under Member Ports and click Down to remove from the group.
Description
Factory Default
Trk1
(depends on switching
chip capability; some
Moxa switches only
support 3 trunk
groups)
The EDS 400A series does not support Port Trunking. The number of Trunk Groups for other models are listed
in the following table:
No. of Trunk Groups
Model
EDS-518A
Trunk Type
Setting
Description
Factory Default
Static
Static
LACP
Static
Protocol).
Available Ports/Member Ports
Setting
Description
Member/Available
Lists the ports in the current trunk group and the ports that are N/A
Factory Default
ports
available to be added.
Check box
Port
N/A
Port description
N/A
Name
N/A
Speed
N/A
Unchecked
N/A
disabled.
Up
Add selected ports into the trunk group from available ports.
N/A
Down
N/A
Trunk Table
Setting
Description
Trunk group
Member port
Status
3-20
Featured Functions
Configuring SNMP
The Moxa switch supports SNMP V1, V2c, and V3. SNMP V1 and SNMP V2c use a community string match for
authentication, which means that SNMP servers access all objects with read-only or read/write permissions
using the community strings public and private by default. SNMP V3 requires that you select an authentication
level of MD5 or SHA, and is the most secure protocol. You can also enable data encryption to enhance data
security.
Supported SNMP security modes and levels are shown in the following table. Select the security mode and level
that will be used to communicate between the SNMP agent and manager.
Protocol
UI Setting
Authentication
Encryption
Method
No
Version
SNMP V1,
V2c
Community
V1, V2c
authentication.
Community string
No
Write/Read
Community
SNMP V3
No-Auth
No
No
MD5 or SHA
Authentication
No
based on MD5 or
SHA
MD5 or SHA
Authentication
Data
based on MD5 or
encryption
SHA
key
These parameters are configured on the SNMP page. A more detailed explanation of each parameter is given
below the figure.
3-21
Featured Functions
Description
Factory Default
Specifies the SNMP protocol version used to manage the switch. V1, V2c
V1, V2c, or
V3 only
V1, V2c Read Community
Setting
Description
Max. 30 characters
Factory Default
for read-only access. The SNMP agent will access all objects
with read-only permissions using this community string.
V1, V2c Write/Read Community
Setting
Description
Max. 30 characters
Factory Default
for read/write access. The SNMP server will access all objects
with read/write permissions using this community string.
For SNMP V3, two levels of privilege are available accessing the Moxa switch. Admin privilege provides access
and authorization to read and write the MIB file. User privilege allows reading of the MIB file only.
Admin Auth. Type (for SNMP V1, V2c, V3, and V3 only)
Setting
Description
Factory Default
No-Auth
No
authentication.
MD5-
Auth
SHA-
Auth
No
authentication.
No
authentication.
Admin Data Encryption Key (for SNMP V1, V2c, V3, and V3 only)
Setting
Description
Factory Default
Enable
Disable
No
Description
Factory Default
No-Auth
No
without authentication.
MD5-Auth
No
No
Description
Factory Default
Enable
Disable
No data encryption
No
3-22
Featured Functions
Trap Settings
SNMP traps allow an SNMP agent to notify the NMS of a significant event. The switch supports two SNMP modes,
Trap mode and Inform mode.
Description
Factory Default
IP or name
None
Description
Factory Default
Max. 30 characters
Public
Description
Factory Default
IP or name
None
Description
Factory Default
Max. 30 characters
Public
3-23
Featured Functions
Description
Factory Default
Depends on switch
model type
Surveillance cameras
Emergency IP phones
In fact, its not uncommon for video, voice, and high-rate industrial application data transfers to be integrated
into one network. Moxas PoE switches are equipped with many advanced PoE management functions,
providing vital security systems with a convenient and reliable Ethernet network. Moreover, Moxas advanced
PoE switches support the high power PoE+ standard, 24 VDC direct power input, and 20 ms fast recovery
redundancy, Turbo Ring and Turbo Chain.
Please note that two types of PoE function settings are available, depending on the specific model of switch.
Type
Models Supported
Type 1
Type 2
EDS-P510A-8PoE, IKS-6728-8PoE-4GTXSFP
Type 1
PoE Setting
The settings are included to give the user control over the systems PoE power budget, PoE port access, PoE
port power limit and PD failure check.
An explanation of each configuration item follows:
3-24
Featured Functions
Description
Factory Default
Auto
Auto
The user can set the power limit value that indicates the power
supplied by the system.
Port Setting
Enable
Setting
Description
Factory Default
Checked
Enable
Unchecked
Enable
Setting
Description
Factory Default
Auto
Power Limit
The user can set the power limit value that indicates the
Auto
Description
Factory Default
Checked
Auto
Unchecked
Auto
Setting
Description
Factory Default
Max. 15 Characters
None
Setting
Description
Factory Default
Max. 5 Characters
None
IP
Period
PoE Timetabling
Powered devices usually do not need to be running 24 hours a day,
7days a week. The PoE Ethernet switch provides a PoE timetabling
mechanism to let users set a flexible working schedule for each PoE
port to economize the systems power burden.
Port
Setting
Description
Factory Default
Port
Port 1
3-25
Featured Functions
Enable
Setting
Description
Factory Default
Checked
Disable
Unchecked
Weekly Timetabling
Day
Setting
Description
Factory Default
Checked
Disable
Unchecked
Start/End Time
Setting
Description
Factory Default
Time for working period Allows users to enter the start and end time for the PDs
0-24
working period
PoE Status
Item
Description
Enable/Disable
Consumption (W)
Voltage (V)
Current (mA)
3-26
Featured Functions
Power-Fail
PD-Failure
When the switch cannot receive a PD response after the defined period.
Port Events
Power-Fail
PD-Failure
When the switch cannot receive a PD response after the defined period.
3-27
Featured Functions
Type 2
PoE Setting
The setting are included to give the user control over the systems PoE power output, PoE power threshold, PoE port
configuration, and PD failure check.
An explanation of each configuration item follows:
Description
Factory Default
Enable
Enable
Disable
Description
Factory Default
30 to 240
240
Setting
Description
Factory Default
Enable
Disable
Disable
Description
Allocated power
3-28
Featured Functions
Description
Measured power
Power
Setting
Description
Factory Default
Checked
Enable
Unchecked
Output Mode
Setting
Description
Factory Default
Force
Power Allocation
Setting
Description
Factory Default
0 to 36
In the Force output mode, the power allocation can be set from 36
0 to 36 W.
Legacy PD Detection
The PoE Ethernet Switch provides the Legacy PD Detection function. When the capacitance of PD is higher
than 2.7F, checking the Legacy PD Detection enables system to output power to PD. If you check the
Legacy PD Detection, it will take longer detection time from 10 to 15 seconds before PoE power output.
Setting
Description
Factory Default
Checked
Disable
Unchecked
3-29
Featured Functions
Enable
Setting
Description
Factory Default
Checked
Enable
Unchecked
Description
Factory Default
Max. 15 Characters
None
Setting
Description
Factory Default
1 to 10
No Response Timeout
Check Period
Setting
Description
Factory Default
5 to 300
10
Setting
Description
Factory Default
No Action
No Action
Reboot PD
Power Off PD
No Response Action
PoE Timetabling
Powered devices usually do not need to be running 24 hours a day, 7 days
a week. The PoE Ethernet Switch provides a PoE timetabling mechanism
to let users set a flexible working schedule for each PoE port to economize
the systems power burden.
3-30
Featured Functions
Port
Setting
Description
Factory Default
Port
Port 1
Setting
Description
Factory Default
Checked
Disable
Unchecked
Enable
Weekly Timetabling
Day
Setting
Description
Factory Default
Checked
Disable
Unchecked
Start/End Time
Setting
Description
Factory Default
Time for working period Allows users to enter the start and end time for the PDs
0 ~ 24
working period
Warning Type
SNMP Trap
Setting
Description
Factory Default
Enable
Disable
Disable
3-31
Featured Functions
Relay Output
Setting
Description
Factory Default
Enable
Disable
Disable
Email
Setting
Description
Factory Default
Enable
Disable
Disable
Event Type
Port Events
Description
Power outputs to PD
period
total PoE power output
External FET has failed
When the MOSFET of the port is out of order, please contact Moxa
for technical service
NOTE
lockout
The Relay Output does not support three Event Types: External FET has failed, PSE chip is over
temperature, and VEE (PoE input voltage) under voltage lockout.
3-32
Featured Functions
PoE Diagnose
PoE Diagnose helps users to figure out the PD conditions, and the system provides users configuration
suggestions to select the best setting for the PDs.
Following steps help users to diagnose the PD conditions:
Step 1: Check the port numbers which will be diagnosed
Step 2: Click Activate
Step 3: The system shows the selected PD conditions
Diagnose Configuration
Port Number
Setting
Description
Factory Default
Checked
Unchecked
Unchecked
Device Type
Item
Description
Not Present
NIC
IEEE 802.3 af
IEEE 802.3 at
A legacy PD connected to the port, whose detected voltage is too high or low, or whose
detected capacitance is too high.
Unknown
Classification
Item
Description
N/A
0 to 4
Class from 0 to 4
Unknown
Voltage (V)
Item
Description
N/A
Voltage
Featured Functions
Description
46VDC
Monitoring Configuration
Refresh Rate
Setting
Description
Factory Default
5 to 300
The period of time which the system refreshes the PoE Port
Status
PSE Status
VEE Voltage
Setting
Description
Factory Default
Read-only
None
3-34
Featured Functions
Description
Not Present
Powered
NIC
Disabled
Fault
Legacy Powered
Potential Legacy PD
In 802.3 af/at or High Power mode, system detects a potential legacy PD. No PoE
power outputs.
Port Description
Item
Description
Status
Power Output
Class
Current (mA)
Voltage (V)
Consumption (Watts)
Monitoring Configuration
Refresh Rate
Setting
Description
5 to 300
The period of time which the system refreshes the PoE System 5
Factory Default
Status
3-35
Featured Functions
Improve network performance by controlling a wide variety of traffic and managing congestion.
Assign priorities to different categories of traffic. For example, set higher priorities for time-critical or
business-critical applications.
Provide predictable throughput for multimedia applications, such as video conferencing or voice over IP,
and minimize traffic delay and jitter.
Improve network performance as the amount of traffic grows. Doing so will reduce costs since it will not be
necessary to keep adding bandwidth to the network.
Traffic prioritization uses the four traffic queues that are present in your Moxa switch to ensure that high
priority traffic is forwarded on a different queue from lower priority traffic. Traffic prioritization provides Quality
of Service (QoS) to your network.
Moxa switch traffic prioritization depends on two industry-standard methods:
3-36
Featured Functions
Background
Standard (spare)
Video (interactive media); less than 100 milliseconds of latency and jitter
Even though the IEEE 802.1D standard is the most widely used prioritization scheme in the LAN environment,
it still has some restrictions:
It requires an additional 4-byte tag in the frame, which is normally optional for Ethernet networks. Without
this tag, the scheme cannot work.
The tag is part of the IEEE 802.1Q header, so to implement QoS at layer 2, the entire network must
implement IEEE 802.1Q VLAN tagging.
It is only supported on a LAN and not across routed WAN links, since the IEEE 802.1Q tags are removed
when the packets pass through a router.
You can configure how you want your switch to treat selected applications and types of traffic by assigning
various grades of network service to them.
DSCP uses the IP header of a packet to preserve priority across the Internet.
DSCP is backwards compatible with IPV4 TOS, which allows operation with existing devices that use a layer
3 TOS enabled prioritization scheme.
Traffic Prioritization
Moxa switches classify traffic based on layer 2 of the OSI 7 layer model, and the switch prioritizes received
traffic according to the priority information defined in the received packet. Incoming traffic is classified based
upon the IEEE 802.1D frame and is assigned to the appropriate priority queue based on the IEEE 802.1p service
level value defined in that packet. Service level markings (values) are defined in the IEEE 802.1Q 4-byte tag,
and consequently traffic will only contain 802.1p priority markings if the network is configured with VLANs and
VLAN tagging. The traffic flow through the switch is as follows:
A packet received by the Moxa switch may or may not have an 802.1p tag associated with it. If it does not,
then it is given a default 802.1p tag (which is usually 0). Alternatively, the packet may be marked with a
new 802.1p value, which will result in all knowledge of the old 802.1p tag being lost.
Because the 802.1p priority levels are fixed to the traffic queues, the packet will be placed in the
appropriate priority queue, ready for transmission through the appropriate egress port. When the packet
reaches the head of its queue and is about to be transmitted, the device determines whether or not the
egress port is tagged for that VLAN. If it is, then the new 802.1p tag is used in the extended 802.1D header.
The Moxa switch will check a packet received at the ingress port for IEEE 802.1D traffic classification, and
then prioritize it based on the IEEE 802.1p value (service levels) in that tag. It is this 802.1p value that
determines which traffic queue the packet is mapped to.
3-37
Featured Functions
Traffic Queues
The hardware of Moxa switches has multiple traffic queues that allow packet prioritization to occur. Higher
priority traffic can pass through the Moxa switch without being delayed by lower priority traffic. As each packet
arrives in the Moxa switch, it passes through any ingress processing (which includes classification,
marking/re-marking), and is then sorted into the appropriate queue. The switch then forwards packets from
each queue. Moxa switches support two different queuing mechanisms:
Weight Fair: This method services all the traffic queues, giving priority to the higher priority queues.
Under most circumstances, the Weight Fair method gives high priority precedence over low priority, but in
the event that high priority traffic does not reach the link capacity, lower priority traffic is not blocked.
Strict: This method services high traffic queues first; low priority queues are delayed until no more high
priority data needs to be sent. The Strict method always gives precedence to high priority over low priority.
QoS Classification
There are two QoS classification settings depending on the specific model of the switch.
Type
Type 1
Models Supported
EDS-400A series, EDS-505A/508A/510A/G509, EDS-P506A-4PoE/P510/P510A-8PoE,
EDS-600 series, IKS-G6524/G6824, ICS-G7000 series
Type 2
Type1
The Moxa switch supports inspection of layer 3 TOS and/or layer 2 CoS tag information to determine how to
classify traffic packets.
3-38
Featured Functions
Queuing Mechanism
Setting
Description
Factory Default
Weight Fair
Weight Fair
Inspect TOS
Setting
Description
Factory Default
Enable/Disable
Enabled
Description
Factory Default
Enable/Disable
Enables or disables the Moxa switch for inspecting 802.1p COS Enabled
tags in the MAC frame to determine the priority of each frame.
Description
Port priority
The port priority has 4 priority queues. Low, normal, medium, 3(Normal)
Factory Default
NOTE
NOTE
The designer can enable these classifications individually or in combination. For instance, if a hot higher
priority port is required for a network design, Inspect TOS and Inspect CoS can be disabled. This setting
leaves only port default priority active, which results in all ingress frames being assigned the same priority on
that port.
3-39
Featured Functions
Type 2
Queuing Mechanism
Setting
Description
Factory Default
Weight Fair
Weight Fair
Description
Factory Default
Enable/Disable
Disabled
Setting
Description
Factory Default
Enable/Disable
Enabled
Inspect TOS
Description
Enable/Disable
Enables or disables the Moxa switch for inspecting 802.1p COS Enabled
Factory Default
NOTE
3-40
Featured Functions
CoS Mapping
Description
Factory Default
Low/Normal/
0: Low
Medium/High
1: Low
2: Normal
3: Normal
4: Medium
5: Medium
6: High
7: High
TOS/DiffServ Mapping
Description
Factory Default
Low/Normal/
1 to 16: Low
Medium/High
17 to 32: Normal
33 to 48: Medium
49 to 64: High
3-41
Featured Functions
Departmental groupsYou could have one VLAN for the marketing department, another for the finance
department, and another for the product development department.
Hierarchical groupsYou could have one VLAN for directors, another for managers, and another for
general staff.
Usage groupsYou could have one VLAN for email users and another for multimedia users.
Switch A
1
Department 1
VLAN 1
Department 2
VLAN 2
Department 3
VLAN 3
Benefits of VLANs
The main benefit of VLANs is that they provide a network segmentation system that is far more flexible than
traditional networks. Using VLANs also provides you with three other benefits:
VLANs ease the relocation of devices on networks: With traditional networks, network administrators
spend much of their time dealing with moves and changes. If users move to a different subnetwork, the
addresses of each host must be updated manually. With a VLAN setup, if a host orignally on VLAN Marketing,
for example, is moved to a port on another part of the network, and retains its original subnet membership,
you only need to specify that the new port is on VLAN Marketing. You do not need to do any re-cabling.
VLANs provide extra security: Devices within each VLAN can only communicate with other devices on
the same VLAN. If a device on VLAN Marketing needs to communicate with devices on VLAN Finance, the
traffic must pass through a routing device or Layer 3 switch.
VLANs help control traffic: With traditional networks, congestion can be caused by broadcast traffic that
is directed to all network devices, regardless of whether or not they need it. VLANs increase the efficiency
of your network because each VLAN can be set up to contain only those devices that need to communicate
with each other.
3-42
Featured Functions
The standard requires that you define the 802.1Q VLAN ID for each VLAN on your Moxa switch before the switch
can use it to forward traffic:
Managing a VLAN
A new or initialized Moxa switch contains a single VLANthe Default VLAN. This VLAN has the following
definition:
All the ports are initially placed on this VLAN, and it is the only VLAN that allows you to access the management
software of the Moxa switch over the network.
Access Port: The port connects to a single device that is not tagged. The user must define the default port
PVID that assigns which VLAN the device belongs to. Once the ingress packet of this Access Port egresses
to another Trunk Port (the port needs all packets to carry tag information), the Moxa switch will insert this
PVID into this packet so the next 802.1Q VLAN switch can recognize it.
Trunk Port: The port connects to a LAN that consists of untagged devices, tagged devices and/or switches
and hubs. In general, the traffic of the Trunk Port must have a Tag. Users can also assign a PVID to a Trunk
Port. The untagged packet on the Trunk Port will be assigned the port default PVID as its VID.
Hybrid Port: The port is similar to a Trunk port, except users can explicitly assign tags to be removed from
egress packets.
The following section illustrates how to use these ports to set up different applications.
3-43
Featured Functions
In this application,
Port 1 connects a single untagged device and assigns it to VLAN 5; it should be configured as Access Port
with PVID 5.
Port 2 connects a LAN with two untagged devices belonging to VLAN 2. One tagged device with VID 3 and
one tagged device with VID 4. It should be configured as Trunk Port with PVID 2 for untagged device and
Fixed VLAN (Tagged) with 3 and 4 for tagged device. Since each port can only have one unique PVID, all
untagged devices on the same port must belong to the same VLAN.
Port 3 connects with another switch. It should be configured as Trunk Port GVRP protocol will be used
through the Trunk Port.
Port 4 connects a single untagged device and assigns it to VLAN 2; it should be configured as Access Port
with PVID 2.
Port 5 connects a single untagged device and assigns it to VLAN 3; it should be configured as Access Port
with PVID 3.
Port 6 connect a single untagged device and assigns it to VLAN 5; it should be configured as Access Port
with PVID 5.
Port 7 connects a single untagged device and assigns it to VLAN 4; it should be configured as Access Port
with PVID 4.
Packets from Device A will travel through Trunk Port 3 with tagged VID 5. Switch B will recognize its VLAN,
pass it to port 6, and then remove tags received successfully by Device G, and vice versa.
Packets from Devices B and C will travel through Trunk Port 3 with tagged VID 2. Switch B recognizes its
VLAN, passes it to port 4, and then removes tags received successfully by Device F, and vice versa.
Packets from Device D will travel through Trunk Port 3 with tagged VID 3. Switch B will recognize its VLAN,
pass to port 5, and then remove tags received successfully by Device H. Packets from Device H will travel
through Trunk Port 3 with PVID 3. Switch A will recognize its VLAN and pass it to port 2, but will not
remove tags received successfully by Device D.
Packets from Device E will travel through Trunk Port 3 with tagged VID 4. Switch B will recognize its VLAN,
pass it to port 7, and then remove tags received successfully by Device I. Packets from Device I will travel
through Trunk Port 3 with tagged VID 4. Switch A will recognize its VLAN and pass it to port 2, but will not
remove tags received successfully by Device E.
3-44
Featured Functions
NOTE
Setting
Description
Factory Default
802.1Q VLAN
802.1Q VLAN
Port-based VLAN
Unaware VLAN
Management VLAN ID
Setting
Description
Factory Default
Port Type
Setting
Description
Factory Default
Access
Access
Trunk
Hybrid
ATTENTION
For communication redundancy in the VLAN environment, set Redundant Port Coupling Port and
Coupling Control Port as Trunk Port since these ports act as the backbone to transmit all packets of
different VLANs to different Moxa switch units.
Port PVID
Setting
Description
Factory Default
4094
the port.
3-45
Featured Functions
Description
This field will be active only when selecting the Trunk or Hybrid None
Factory Default
4094
port type. Set the other VLAN ID for tagged devices that
connect to the port. Use commas to separate different VIDs.
Description
Factory Default
None
4094
port type. Set the other VLAN ID for tagged devices that
connect to the port and tags that need to be removed in egress
packets. Use commas to separate different VIDs.
Description
Factory Default
This field will be active only when selecting the Trunk or Hybrid None
4094
port type. Set the other VLAN IDs that will not be supported by
this port. Use commas to separate different VIDs.
NOTE
IKS-6726A/6728A
NOTE
EDS-728/828
IKS-G6524A/G6824A
3-46
Featured Functions
NOTE
When users enable Unaware VLAN function, all of ports are set as unaware VLAN ports.
QinQ Setting
NOTE
Moxa layer 3 switches provide the IEEE 802.1ad QinQ function. This function allows users to tag double VLAN
headers into one single Ethernet frame
QinQ Enable
Setting
Description
Factory Default
Enable/Disable
Disable
Setting
Description
Factory Default
8100 to FFFF
8100
TPID
3-47
Featured Functions
VLAN Table
Use the 802.1Q VLAN table to review the VLAN groups that were created, Joined Access Ports, Trunk
Ports, and Hybrid Ports, and use the Port-based VLAN table to review the VLAN group and Joined Ports.
NOTE
Most Moxa managed switches have a maximum of 64 VLAN settings. However, the IKS-G6524/G6824 and
ICS-G7000 series support up to 256 VLAN settings.
Benefits of Multicast
The benefits of using IP multicast are:
It uses the most efficient, sensible method to deliver the same information to many receivers with only one
transmission.
It reduces the load on the source (for example, a server) since it will not need to produce several copies of
It makes efficient use of network bandwidth and scales well as the number of multicast group members
Works with other IP protocols and services, such as Quality of Service (QoS).
3-48
Featured Functions
Multicast transmission makes more sense and is more efficient than unicast transmission for some applications.
For example, multicasts are often used for video-conferencing, since high volumes of traffic must be sent to
several end-stations at the same time, but where broadcasting the traffic to all end-stations would cause a
substantial reduction in network performance. Furthermore, several industrial automation protocols, such as
Allen-Bradley, EtherNet/IP, Siemens Profibus, and Foundation Fieldbus HSE (High Speed Ethernet), use
multicast. These industrial Ethernet protocols use publisher/subscriber communications models by
multicasting packets that could flood a network with heavy traffic. IGMP Snooping is used to prune multicast
traffic so that it travels only to those end destinations that require the traffic, reducing the amount of traffic on
the Ethernet LAN.
Multicast Filtering
Multicast filtering ensures that only end-stations that have joined certain groups receive multicast traffic. With
multicast filtering, network devices only forward multicast traffic to the ports that are connected to registered
end-stations. The following two figures illustrate how a network behaves without multicast filtering, and with
multicast filtering.
Network without multicast filtering
All hosts receive the multicast
traffic, even if they dont need it.
3-49
Featured Functions
Snooping Mode
Snooping Mode allows your switch to forward multicast packets only to the appropriate ports. The switch
snoops on exchanges between hosts and an IGMP device, such as a router, to find those ports that want to join
a multicast group, and then configures its filters accordingly.
IGMP Snooping Enhanced Mode
Snooping Enhanced Mode allows your switch to forward multicast packets to the Moxa switchs member port
only. If you disable Enhanced Mode, data streams will run to the querier port as well as the member port.
Query Mode
Query mode allows the Moxa switch to work as the Querier if it has the lowest IP address on the subnetwork to
which it belongs.
NOTE
NOTE
Moxa Layer 3 switches are compatible with any device that conforms to the IGMP v2 and IGMP v3 device
protocols. Layer 2 switches only support IGMP v1/v2.
The IP router (or querier) periodically sends query packets to all end-stations on the LANs or VLANs that are
connected to it. For networks with more than one IP router, the router with the lowest IP address is the
querier. A switch with IP address lower than the IP address of any other IGMP queriers connected to the LAN
or VLAN can become the IGMP querier.
When an IP host receives a query packet, it sends a report packet back that identifies the multicast group
that the end-station would like to join.
When the report packet arrives at a port on a switch with IGMP Snooping enabled, the switch knows that the
port should forward traffic for the multicast group, and then proceeds to forward the packet to the router.
When the router receives the report packet, it registers that the LAN or VLAN requires traffic for the
multicast groups.
When the router forwards traffic for the multicast group to the LAN or VLAN, the switches only forward the
traffic to ports that received a report packet.
IGMP version 3 supports source filtering, which allows the system to define how to treat packets from
specified source addresses. The system can either white-list or black-list specified sources.
IGMP version comparison
IGMP Version
Main Features
Reference
V1
a. Periodic query
RFC-1112
V2
RFC-2236
a. Group-specific query
b. Leave group messages
c. Resends specific queries to verify leave message was the last one in
the group
d. Querier election
V3
RFC-3376
Featured Functions
3-51
Featured Functions
Description
Factory Default
Disabled
Description
Factory Default
125 seconds
by the user
Description
Enable/Disable
Factory Default
Description
Factory Default
Enable
Disable
Disable
Member Ports
Member Ports
NOTE: IGMP Snooping Enhanced Mode in networks composed entirely of Moxa switches
IGMP Snooping
Setting
Description
Factory Default
Enable/Disable
Enabled if IGMP
particular VLAN.
Snooping is enabled
globally
3-52
Featured Functions
Querier
Setting
Description
Factory Default
Enable/Disable
Enabled if IGMP
Snooping is enabled
globally
V1/V2 and V3 checkbox V1/V2: Enables switch to send IGMP snooping version 1 and 2 V1/V2
queries
V3: Enables switch to send IGMP snooping version 3 queries
Static Multicast Querier Port
Setting
Description
Factory Default
Select/Deselect
Disabled
These ports will receive all multicast packets from the source.
This option is only active when IGMP Snooping is enabled.
NOTE
If a router or layer 3 switch is connected to the network, it will act as the Querier, and consequently this
Querier option will be disabled on all Moxa layer 2 switches.
If all switches on the network are Moxa layer 2 switches, then only one layer 2 switch will act as Querier.
IGMP Table
The Moxa switch displays the current active IGMP groups that were detected. View IGMP group setting per
VLAN ID on this page.
Layer 2 switch page
Auto-learned Multicast Router Port: This indicates that a multicast router connects to/sends packets from
these port(s)
Static Multicast Router Port: Displays the static multicast querier port(s)
Querier Connected Port: Displays the port which is connected to the querier.
Act as a Querier: Displays whether or not this VLAN is a querier (winner of a election).
3-53
Featured Functions
3-54
Featured Functions
NOTE: 01:00:5E:XX:XX:XX on this page is the IP multicast MAC address. Please activate IGMP Snooping for
automatic classification.
Add New Static Multicast Address to the List
Setting
Description
Factory Default
MAC Address
None
Setting
Description
Factory Default
Integer
Input the number of the VLAN that the host with this MAC
None
MAC Address
Description
Factory Default
Select/Deselect
Checkmark the appropriate check boxes to select the join ports None
for this multicast group.
3-55
Featured Functions
Configuring GMRP
GMRP is a MAC-based multicast management protocol, whereas IGMP is IP-based. GMRP provides a
mechanism that allows bridges and end stations to register or un-register Group membership information
dynamically.
GMRP enable
Setting
Description
Factory Default
Enable/Disable
Enables or disables the GMRP function for the port listed in the Disable
Port column
GMRP Table
The Moxa switch displays the current active GMRP groups that were detected
Setting
Description
Fixed Ports
Learned Ports
3-56
Featured Functions
Setting
Description
Factory Default
Multicast Filtering
Forward Unknown
Behavior
Models Supported
EDS-400A series, EDS-505A/508A/510A/G509, EDS-P506A-4PoE/P510/P510A-8PoE,
EDS-600 series, IKS-G6524/G6824, ICS-G7000 series
Type 2
3-57
Featured Functions
Type 1
Traffic Rate Limiting Settings
Control Mode
Description
Factory Default
Normal
Set the max. ingress rate limit for different packet types
Normal
Port Disable
Description
Factory Default
Limit All
Limit Broadcast 8M
Limit Broadcast
4M, 8M
Description
Factory Default
When the ingress multicast and broadcast packets exceed the 30 second
(1~65535 seconds)
ingress rate limit, the port will be disabled for this period of
time. During this time, all packets from this port will be
discarded.
Ingress (fps)
Select the ingress rate (fps) limit for all packets from the
following options: Not Limited, 4464, 7441, 14881, 22322,
37203, 52084, 74405
3-58
Not Limited
Featured Functions
Setting
Description
Factory Default
Egress rate
Not Limited
packets from the following options: Not Limited, 3%, 5%, 10%,
15%, 25%, 35%, 50%, 65%, 85%
Type 2
Broadcast Storm Protection
Setting
Description
Factory Default
Enable/Disable
Enable
3-59
Disable
Featured Functions
Description
Ingress rate
Select the ingress/egress rate limit (% of max. throughput) for Not Limited
Factory Default
Egress rate
all packets from the following options: Not Limited, 3%, 5%,
10%, 15%, 25%, 35%, 50%, 65%, 85%
Description
Factory Default
Period (1~65535
When the ingress packets exceed the ingress rate limit, the
30 seconds
seconds)
Select the ingress rate (fps) limit for all packets from the
second)
Not Limited
Setting
Description
Factory Default
Unicast
3-60
Featured Functions
Security
NOTE: Security functions not supported in EDS-400A series.
Security can be categorized in two levels: the user name/password level, and the port access level. For user
name/password level security, Moxa switches provide two different user login options: Terminal Access
Controller Access-Control System Plus (TACACS+) and Remote Authentication Dial In User Service (RADIUS).
The TACACS+ and RADIUS mechanism is a centralized AAA (Authentication, Authorization and Accounting)
system for connecting to network services. The fundamental purpose of both TACACS+ and RADIUS is to
provide an efficient and secure mechanism for user account management.
Setting
Description
Factory Default
Server Type
TACACS+
Server IP/Name
Server Port
TACACS+ : 49
RADIUS : 1812
None
Authentication Type
Server Timeout
TACACS+ : 30
RADIUS : 5
3-61
Featured Functions
Authentication Certificate
The switch offers two methods to encrypt the communication: SSL Certificate and SSH Key. You can only use
one of the encryption types at the same time. SSL (Secure Socket Layer) is mainly for web communication
security. It secures the data between two application points. SSH (Secure Shell) is a security protocol based on
the Application Layer and Transport Layer. It encrypts the data for security.
NOTE
The switch only supports one type of the Authentication Certificate at a time.
IEEE 802.1X
The IEEE 802.1X standard defines a protocol for client/server-based access control and authentication. The
protocol restricts unauthorized clients from connecting to a LAN through ports that are open to the Internet,
and which otherwise would be readily accessible. The purpose of the authentication server is to check each
client that requests access to the port. The client is only allowed access to the port if the clients permission is
authenticated.
Three components are used to create an authentication mechanism based on 802.1X standards:
Client/Supplicant, Authentication Server, and Authenticator.
Client/Supplicant: The end station that requests access to the LAN and switch services and responds to the
requests from the switch.
Authentication Server: The server that performs the actual authentication of the supplicant.
Authenticator: Edge switch or wireless access point that acts as a proxy between the supplicant and the
authentication server, requesting identity information from the supplicant, verifying the information with the
authentication server, and relaying a response to the supplicant.
The Moxa switch acts as an authenticator in the 802.1X environment. A supplicant and an authenticator
exchange EAPOL (Extensible Authentication Protocol over LAN) frames with each other. We can either use an
external RADIUS server as the authentication server, or implement the authentication server in the Moxa
switch by using a Local User Database as the authentication look-up table. When we use an external RADIUS
3-62
Featured Functions
server as the authentication server, the authenticator and the authentication server exchange EAP frames
between each other.
Authentication can be initiated either by the supplicant or the authenticator. When the supplicant initiates the
authentication process, it sends an EAPOL-Start frame to the authenticator. When the authenticator initiates
the authentication process or when it receives an EAPOL Start frame, it sends an EAP Request/Identity
frame to ask for the username of the supplicant.
Description
Factory Default
MAC Address
Adds the static unicast MAC address into the address table.
None
Port
1 or 1-1
Database Option
Setting
Description
Local
Select this option when setting the Local User Database as the Local
Factory Default
(Max. of 32 users)
authentication database.
Radius
Local
3-63
Featured Functions
Radius Server
Setting
Description
Factory Default
IP address or domain
local host
name
Server Port
Setting
Description
Factory Default
Numerical
1812
Shared Key
Setting
Description
Factory Default
alphanumeric (Max. of
None
40 characters)
Re-Auth
Setting
Description
Factory Default
Enable/Disable
Disable
Description
Factory Default
Numerical
3600
802.1X
Setting
Description
Factory Default
Enable/Disable
Disable
IEEE 802.1X for one or more ports. All end stations must enter
usernames and passwords before access to these ports is
allowed.
802.1X Re-Authentication
The Moxa switch can force connected devices to be re-authorized manually.
802.1X Re-Authentication
Setting
Description
Factory Default
Enable/Disable
Disable
3-64
Featured Functions
Description
Factory Default
User Name
None
None
None
(Max. of 30 characters)
Password
(Max. of 16 characters)
Description
(Max. of 30 characters)
NOTE
Description
Factory Default
Enable/Disable
Disable
Setting
Description
Factory Default
Server IP/Name
localhost
Server Port
1812
None
Server Setting
3-65
Featured Functions
3-66
Featured Functions
Event Types can be divided into two basic groups: System Events and Port Events. System Events are
related to the overall function of the switch, whereas Port Events are related to the activity of a specific port.
System Events
DI1/DI2 (OnOff)
DI1/DI2 (OffOn)
Authentication Failure
Changed
Port Events
Link-ON
Link-OFF
The port is disconnected (e.g., the cable is pulled out, or the opposing
device shuts down).
Traffic-Overload
The ports traffic surpasses the Traffic-Threshold for that port (provided
this item is Enabled).
Traffic-Threshold (%)
Traffic-Duration (sec.)
NOTE
The Traffic-Overload, Traffic-Threshold (%), and Traffic-Duration (sec.) Port Event items are related. If you
Enable the Traffic-Overload event, then be sure to enter a nonzero Traffic-Threshold percentage, as well as a
Traffic-Duration between 1 and 300 seconds.
NOTE
The sender of warning e-mail messages will have the following form:
Managed-Redundant-Switch-00000@Switch_Location
where Managed-Redundant-Switch-00000 is the default Switch Name, 00000 is the Moxa switchs serial
number, and Switch_Location is the default Server Location. Refer to the Basic Settings section to see how to
modify Switch Name and Switch Location.
3-67
Featured Functions
Description
Factory Default
IP address
None
Setting
Description
Factory Default
SMTP port
25
Setting
Description
Factory Default
Max. 45 of charters
None
Setting
Description
Factory Default
Disable/Enable to
Disable
change password
SMTP Port
Account Name
Password Setting
the New password, retype the New password, and then click
Activate (Max. of 45 characters).
Old password
None
New password
None
45 characters.
Retype password
None
Description
Factory Default
Max. of 30 characters
None
3-68
NOTE
Featured Functions
Auto warning e-mail messages will be sent through an authentication protected SMTP server that supports
the CRAM-MD5, LOGIN, and PAIN methods of SASL (Simple Authentication and Security Layer)
authentication mechanism.
We strongly recommend not entering your Account Name and Account Password if auto warning e-mail
messages can be delivered without using an authentication mechanism.
Event Types can be divided into two basic groups: System Events and Port Events. System Events are
related to the overall function of the switch, whereas Port Events are related to the activity of a specific port.
The Moxa switch supports two relay outputs. You can configure which relay output is related to which events,
which helps administrators identify the importance of the different events.
System Events
The Turbo Ring is broken. Only the MASTER switch of Turbo Ring will output
warning relay.
3-69
Featured Functions
Port Events
Link-ON
Link-OFF
The port is disconnected (e.g., the cable is pulled out, or the opposing device
shuts down).
Traffic-Overload
The ports traffic surpasses the Traffic-Threshold for that port (provided this
item is Enabled).
Traffic-Threshold (%)
Traffic-Duration (sec.)
The Traffic-Overload, Traffic-Threshold (%), and Traffic-Duration (sec) Port Event items are related. If you
Enable the Traffic-Overload event, then be sure to enter a nonzero Traffic-Threshold percentage, as well as a
Traffic-Duration between 1 and 300 seconds.
Warning List
Use this table to see if any relay alarms have been issued.
Using Line-Swap-Fast-Recovery
The Line-Swap Fast Recovery function, which is enabled by default, allows the Moxa switch to return to normal
operation extremely quickly after devices are unplugged and then re-plugged into different ports. The recovery
time is on the order of a few milliseconds (compare this with standard commercial switches for which the
recovery time could be on the order of several minutes). To disable the Line-Swap Fast Recovery function, or
to re-enable the function after it has already been disabled, access either the Console utilitys Line-Swap
recovery page, or the Web Browser interfaces Line-Swap fast recovery page, as shown below.
Enable Line-Swap-Fast-Recovery
Setting
Description
Factory Default
Enable/Disable
Enable
Line-Swap-Fast-Recovery function
3-70
Featured Functions
When using the Web Browser interface, activate by clicking on the Activate button.
When using the Console utility, activate by first highlighting the Activate menu option, and then press
Enter. You should receive the Set device IP settings are now active! (Press any key to continue)
message.
3-71
Featured Functions
Desired IP Address
Setting
Description
Factory Default
IP Address
None
3-72
Featured Functions
The Remote ID identifies the relay agent itself and can be one of the following:
1. The IP address of the relay agent.
2. The MAC address of the relay agent.
3. A combination of IP address and MAC address of the relay agent.
4. A user-defined string.
Server IP Address
1st Server
Setting
Description
Assigns the IP address of the 1st DHCP server that the switch None
Factory Default
DHCP server
tries to access.
2nd Server
Setting
Description
Factory Default
Assigns the IP address of the 2nd DHCP server that the switch None
DHCP server
tries to access.
3rd Server
Setting
Description
Assigns the IP address of the 3rd DHCP server that the switch None
Factory Default
DHCP server
tries to access.
4th Server
Setting
Description
Assigns the IP address of the 4th DHCP server that the switch None
Factory Default
DHCP server
tries to access.
3-73
Featured Functions
DHCP Option 82
Enable Option 82
Setting
Description
Factory Default
Enable or Disable
Disable
Setting
Description
Factory Default
IP
IP
MAC
IP
Client-ID
Type
IP
Setting
Description
Factory Default
Max. 12 characters
Displays the value that was set. Complete this field if type is set Switch IP address
Value
to Other.
Display
Setting
Description
read-only
The actual hexadecimal value configured in the DHCP server for COA87FFD
Factory Default
Description
Factory Default
Enable or Disable
Disable
Using Diagnosis
The Moxa switch provides three important tools for administrators to diagnose network systems.
Mirror Port
The Mirror Port function can be used to monitor data being transmitted through a specific port. This is done
by setting up another port (the mirror port) to receive the same data being transmitted from, or both to and
from, the port under observation. Using a mirror port allows the network administrator to sniff the observed
port to keep tabs on network activity.
Please note that two types of mirror port settings are available, depending on the specific model of switch. In
Type 1, the switches support multi-to-one and one-to-one mirror function. In Type 2, the switches support only
one-to-one mirror function.
Type
Models Supported
Type 1
Type 2
3-74
Featured Functions
Type 1
Description
Monitored Port
Select the number of the ports whose network activity will be monitored.
Watch Direction
Mirror Port
Select the number of the port that will be used to monitor the activity of the monitored
port.
NOTE: In Type 1 settings, users can select multiple monitored ports for port mirror function.
Type 2
Description
Monitored Port
Select the number of one port whose network activity will be monitored.
Watch Direction
Mirror Port
Select the number of the port that will be used to monitor the activity of the monitored
port.
NOTE: In Type 2 settings, users can select only one monitored port for port mirror function.
3-75
Featured Functions
Ping
The Ping function uses the ping command to give users a simple but powerful tool for troubleshooting network
problems. The functions most unique feature is that even though the ping command is entered from the users
PC keyboard, the actual ping command originates from the Moxa switch itself. In this way, the user can
essentially sit on top of the Moxa switch and send ping commands out through its ports.
To use the Ping function, type in the desired IP address, and then press Enter from the Console utility, or click
Ping when using the Web Browser interface.
LLDP Function
Overview
LLDP is an OSI Layer 2 protocol defined by IEEE 802.11AB. LLDP
standardizes the self-identification advertisement method, and allows each
networking device, such as a Moxa managed switch, to periodically send its
system and configuration information to its neighbors. Because of this, all
LLDP devices are kept informed of each others status and configuration,
and with SNMP, this information can be transferred to Moxas MXview for
auto-topology and network visualization.
From the switchs web interface, you can enable or disable LLDP, and set
the LLDP transmit interval. In addition, you can view each switchs
neighbor-list, which is reported by its network neighbors. Most importantly,
enabling the LLDP function allows Moxas MXview to automatically display
the networks topology and system setup details, such as VLAN and
Trunking, for the entire network.
General Settings
LLDP
Setting
Description
Factory Default
Enable or Disable
Enable
3-76
Featured Functions
Description
Factory Default
5 to 32768 sec.
30 (seconds)
LLDP Table
The LLDP Table displays the following information:
Port
Neighbor ID
A unique entity (typically the MAC address) that identifies a neighbor device.
Neighbor Port
Using Monitor
You can monitor statistics in real time from the Moxa switchs web console and serial console.
Monitor by Switch
Access the Monitor by selecting System from the left selection bar. Monitor by System allows the user to view
a graph that shows the combined data transmission activity of all of the Moxa switchs 18 ports. Click one of the
four optionsTotal Packets, TX Packets, RX Packets, or Error Packetsto view transmission activity of
specific types of packets. Recall that TX Packets are packets sent out from the Moxa switch, RX Packets are
packets received from connected devices, and Error Packets are packets that did not pass TCP/IPs error
checking algorithm. The Total Packets option displays a graph that combines TX, RX, and TX Error, RX Error
Packets activity. The graph displays data transmission activity by showing Packets/s (i.e., packets per second,
or pps) versus sec. (seconds). In fact, three curves are displayed on the same graph: Uni-cast packets (in red
color), Multi-cast packets (in green color), and Broad-cast packets (in blue color). The graph is updated
every few seconds, allowing the user to analyze data transmission activity in real-time.
3-77
Featured Functions
Monitor by Port
Access the Monitor by Port function by selecting ALL 10/100M or 1G Ports or Port i, in which i = 1, 2, , G2,
from the left pull-down list. The Port i options are identical to the Monitor by System function discussed above,
in that users can view graphs that show All Packets, TX Packets, RX Packets, or Error Packets activity, but in
this case, only for an individual port. The All Ports option is essentially a graphical display of the individual port
activity that can be viewed with the Console Monitor function discussed above. The All Ports option shows three
vertical bars for each port. The height of the bar represents Packets/s for the type of packet, at the instant the
bar is being viewed. That is, as time progresses, the height of the bar moves up or down so that the user can
view the change in the rate of packet transmission. The blue colored bar shows Uni-cast packets, the red
colored bar shows Multi-cast packets, and the orange colored bar shows Broad-cast packets. The graph is
updated every few seconds, allowing the user to analyze data transmission activity in real-time.
Monitor by SFP
Optical fiber is commonly used for long distance data transmission. However, when link issues occur, it is very
costly to trouble shoot the fiber cable and fiber transceiver at remote sites. To solve this problem, Moxa
industrial Ethernet switches provide digital diagnostic and monitoring functions on Moxa SFP optical fiber links
and allow users to measure optical parameters and its performance from center site. This function can greatly
facilitate the trouble shooting process for optical fiber links and reduce costs for onsite debug.
NOTE
Parameter
Description
Port No.
Model Name
Temperature (C)
Voltage (V)
Tx power (dBm)
The amount of light being transmitted into the fiber optic cable
Rx power (dBm)
The amount of light being received from the fiber optic cable
3-78
Tolerance
Temperature (C)
3C
Voltage (V)
0.1V
Tx power (dBm)
3dB
Rx power (dBm)
3dB
Featured Functions
The MAC Address table can be configured to display the following Moxa switch MAC address groups, which are
selected from the drop-down list:
ALL
Select this item to show all of the Moxa switchs MAC addresses.
ALL Learned
Select this item to show all of the Moxa switchs Learned MAC addresses.
Select this item to show all of the Moxa switchs Static Lock MAC addresses.
ALL Static
Select this item to show all of the Moxa switchs Static, Static Lock, and Static
Multicast MAC addresses.
Select this item to show all of the Moxa switchs Static Multicast MAC addresses.
Port x
Select this item to show all of the MAC addresses dedicated ports.
Type
Port
This field shows the port that this MAC address belongs to.
3-79
Featured Functions
Benefits of ACL
ACL has per interface, per packet direction, and per protocol filtering capability. These features can provide
basic protection by filtering specific packets. The main benefits of ACL are as follows:
Manage authority of hosts: ACL can restrict specific devices through MAC address filtering. The user can
deny all packets or only permit packets that come from specific devices.
Subnet authority management: Configure filtering rules for specific subnet IP addresses. ACL can
restrict packets from or to specific subnets.
Network security: The demand for networking security is growing. ACL can provide basic protection which
Control traffic flow by filtering specific protocols: ACL can filter specific IP protocols such as TCP or
IP based
MAC Based
Filter type defines whether the access list will examine packets based on IP or MAC address. This type affects
what detailed rules can be edited. Then, assign the ports you would like to apply the list to. You can also define
Ingress and Egress per port.
After adding a new access control list, you can also create new rules for the access control list. Each ACL group
accepts 10 rules. Rules can filter packets by source and destination IP/MAC address, IP protocol, TCP/UDP Port,
Ethernet Type, and VLAN ID.
After all rules are set, ACL starts to filter the packets by the rule with the highest Priority Index (smaller number,
higher priority). Once a rule denies or accepts its access, the packet will be dropped or passed.
3-80
Featured Functions
Priority Index: ACL checking sequence is based on this index. Smaller index numbers have higher priority
for packet filtering. If a packet is filtered by an access list with higher priority, those access lists with lower
priority will not being executed.
Note that Priority Index is not a one-to-one index for each list name. It changes when swapping the priority
of different access control lists.
The maximum Priority Index number is 16
Name: You can name the access control list in this field. This is the access lists unique name.
Filter: Select filtering by either IP or MAC address. Detailed settings can be configured in the Access
Control Rule Settings page.
Ingress Port Map/Egress Port Map: You can choose which ports to apply the rules to. The Ingress and
Egress condition uses OR logic. This means a packet only needs to match one ingress or egress port rule to
be examined.
If a selected priority index is already in the access control list, then you can modify these parameters listed
above. After configuration, click Activate to confirm the settings. Then you will see a new list appear in the
Access Control List table.
3-81
Featured Functions
Changing an established access control lists priority is easy. Moxa provides a simple interface to let you easily
adjust priority. Follow the three steps below to adjust the priority:
Step 1: Select the list
Step 2: Click the Up/Down button to adjust the sequence. The Priority Index will change with the lists
position.
Step 3: Click the Activate button to confirm the settings.
First, select the access control list you would like to edit based on the Priority Index. The Ingress/Egress Port
map will display the port settings.
NOTE
The port map here is also editable. Any change here will change the access control list settings.
Access control rule displays setting options based on the filtering type used:
IP-Based
After configuring, click Add button to add the rule to the list. Then, click Activate to activate the settings.
Source IP Address/Source IP Address Mask: Defines the IP address rule. By using the mask, you can
assign specific subnet ranges to filter. It allows checking the source or destination of the packet. Choose
Any if you do not need to use this criteria.
IP Protocol: Select the type of protocols to be filtered. Moxa provides ICMP, IGMP, IP over IP, TCP, and
UDP as options in this field.
TCP/UDP Source Port, TCP/UDP Destination Port: If TCP or UDP are selected as the filtering protocol,
these fields will allow you to enter port numbers for filtering.
Once ready, click the Add button to add the rule to the list. Then, click Activate to activate the settings.
3-82
Featured Functions
MAC-Based
Source MAC Address/Source MAC Address Mask: Defines the MAC address rule. By using the mask,
you can assign specific MAC address ranges to filter. It allows checking the source or destination of the
packet. Choose Any if you do not need to use this criteria.
Ethernet Type: Select the type of Ethernet protocol to filter. Options here are IPv4, ARP, RARP,
IEEE802.1Q, IPv6, IEE802.3, PROFIENT, LLDP and IEEE1588
Once ready, click the Add button to add the rule to the list. Then, click Activate to activate the settings.
3-83
NOTE
Featured Functions
For EDS-828 and PT-7828 series, there are two limitations on ACL settings. Based on the ingress port type of
ACL rules, there are two types for the limitation of numbers.
Limitation Type 1:
When rules contain Ingress Fast Ethernet (FE) ports, the Number should NOT be greater than 160.
Limitation Type 2:
When rules contain Ingress Gigabit Ethernet (GE) ports or no Ingress ports, the Number should NOT be
greater than 40.
Example 1 for Limitation 1
Rule A contains 3 ingress FE ports and 4 egress FE ports, and it results in the number of 3 x 4 = 12.
Rule B contains 5 ingress FE ports and 6 egress GE ports, and it results in the number of 5 x 6 = 30.
Rule C contains 7 ingress FE ports and no egress port, and it results in the number of 7.
Make sure the amount of those numbers 12+30+7 is not greater than 160.
Example 2 for Limitation 2
Rule D contains 1 ingress GE port and 2 egress FE ports, and it results in the number of 1 x 2 = 2.
Rule E contains 3 ingress GE ports and 4 egress GE ports, and it results in the number of 3 x 4 = 12.
Rule F contains 5 ingress GE ports and no egress ports, and it results in the number of 5.
Rule G contains no ingress ports and 6 FE egress ports, and it results in the number of 6.
Rule H contains no ingress ports and 7 GE egress ports, and it results in the number of 7.
Make sure the amount of those numbers 2+12+5+6+7 is not greater than 40.
Example 3 for Limitation 1 and 2
Rule Z contains 3 ingress FE ports, 2 ingress GE ports, and 5 egress GE ports.
It results in the number of 3 x 5 = 15 in Limitation 1, and 2 x 5 = 10 in Limitation 2.
Make sure the amount in limitation 1, 15, is not greater than 160.
Make sure the amount in limitation 2, 10, is not greater than 40.
NOTE
EDS-828 and PT-7828 series switches only provide 6 Types of ACL rules.
NOTE
For EDS-828 and PT-7828 series, Broadcast and Multicast traffic filters are NOT supported on egress ports of
ACL settings. On the other hand, Broadcasts and Multicasts Addresses are not allowed to be set in
Source/Destination Addresses.
3-84
Featured Functions
This field shows how many times the Moxa switch has been rebooted or cold started.
Date
The date is updated based on how the current date is set in the Basic Setting page.
Time
The time is updated based on how the current time is set in the Basic Setting page.
System
Startup Time
Events
NOTE
The following events will be recorded into the Moxa switchs Event Log Table:
Cold start
Warm start
Power 1/2 transition (Off ( On), Power 1/2 transition (On ( Off))
Authentication fail
Topology changed
3-85
Featured Functions
Using Syslog
The Syslog function provides the event logs for the syslog server. The function supports 3 configurable syslog
servers and syslog server UDP port numbers. When an event occurs, the event will be sent as a syslog UDP
packet to the specified syslog servers.
Description
Factory Default
IP Address
None
network.
Port Destination
514
(1 to 65535)
NOTE
The following events will be recorded into the Moxa switchs Event Log table, and will then be sent to the
specified Syslog Server:
Cold start
Warm start
Power 1/2 transition (Off (On), Power 1/2 transition (On (Off))
Authentication fail
Topology changed
Using HTTPS/SSL
To secure your HTTP access, the Moxa switch supports HTTPS/SSL to encrypt all HTTP traffic. Perform the
following steps to access the Moxa switchs web browser interface via HTTPS/SSL.
1. Open Internet Explorer and type https://{Moxa switchs IP address} in the address field. Press Enter
to establish the connection.
3-86
Featured Functions
2. Warning messages will pop up to warn the user that the security certificate was issued by a company they
have not chosen to trust.
3. Select Yes to enter the Moxa switchs web browser interface and access the web browser interface secured
via HTTPS/SSL.
NOTE
Moxa provides a Root CA certificate. After installing this certificate on your PC or notebook, you can access the
web browser interface directly and you will no longer see any warning messages. You may download the
certificate from the Moxa switchs CD-ROM.
3-87
4
4.
EDS Configurator is a comprehensive Windows-based GUI that is used to configure and maintain multiple Moxa
switches. A suite of useful utilities is available to help you locate Moxa switches attached to the same LAN as the
PC host (regardless of whether or not you know the IP addresses of the switches), connect to a Moxa switch
whose IP address is known, modify the network configurations of one or multiple Moxa switches, and update
the firmware of one or more Moxa switch. EDS Configurator is designed to provide you with instantaneous
control of all of your Moxa switches, regardless of location. You may download the EDS Configurator software
from Moxas website free of charge.
The following topics are covered in this chapter:
Starting EDS Configurator
Broadcast Search
Search by IP Address
Upgrade Firmware
Modify IP Address
Export Configuration
If the file was placed on the Windows desktop, it should appear as shown below. Simply double click the icon
to run the program.
NOTE
The Moxa EtherDevice Server Configurator window will open, as shown below.
You may download the EDS Configurator software free of charge from Moxas website at www.moxa.com.
Broadcast Search
Use the Broadcast Search utility to search the LAN for all Moxa switches that are connected to the LAN. Note
that since the search is done by MAC address. Broadcast Search will not be able to locate Moxa EtherDevice
switches connected outside the PC hosts LAN.
1. Start by clicking the Broadcast Search icon
, or select Broadcast Search under the List Server menu.
The Broadcast Search window will open and display a list of all switches located on the network. Look in the
Progress column to see the progress of the search.
4-2
2. Once the search is complete, the Configurator window will display a list of all switches that were located.
Search by IP Address
Use the Search by IP Address utility to search for Moxa switches one at a time. Note that the search is
conducted by IP address, so you should be able to locate any Moxa switch that is properly connected to your
LAN, WAN, or the Internet.
1. Start by clicking the Specify by IP address icon
, or by selecting Specify IP address under the List
Server menu. The Search Server with IP Address window will open. Enter the IP address of the switch
you wish to search for, and then click OK.
2. Once the search is complete, the Configurator window will add the switch to the list of switches.
Upgrade Firmware
Keep your Moxa switch up to date with the latest firmware from Moxa. Perform the following steps to upgrade
the firmware:
1. Download the updated firmware (*.rom) file from Moxas website (www.moxa.com).
2. Click the switch (from the Moxa EtherDevice Server Configurator window) whose firmware you wish to
upgrade to highlight it.
4-3
Modify IP Address
You may use the Modify IP Address function to reconfigure the Moxa switchs network settings.
1. Start by clicking the Modify IP address icon
Configuration menu.
2. The Setup Configuration window will open. Checkmark the box to the left of those items that you wish to
modify, and then Disable or Enable DHCP, and enter the IP Address, Subnet mask, Gateway, and DNS IP.
Click OK to accept the changes to the configuration.
4-4
Export Configuration
The Export Configuration utility is used to save the entire configuration of a particular Moxa switch to a text
file. Take the following steps to export a configuration:
1. Highlight the switch (from the Server list in the Configurator windows left pane), and then click the Export
toolbar icon
or select Export Configuration from the Configuration menu. Use the Open window to
navigate to the folder in which you would like to store the configuration, and then type the name of the file
in the File name input box. Click Open to continue.
3. You may use a standard text editor, such as Notepad under Windows, to view and modify the newly created
configuration file.
4-5
Import Configuration
The Import Configuration function is used to import an entire configuration from a text file to the Moxa
switch. The utility can be used to transfer the configuration from one Moxa switch to another, by first using the
Export Configuration function (described in the previous section) to save a switch configuration to a file, and
then using the Import Configuration function. Perform the following steps to import a configuration:
1. Highlight the server (from the Moxa EtherDevice Switch list in the Configurator windows left pane), and
then click the Import toolbar icon
, or select Import Configuration from the Configuration menu.
2. Use the Open window to navigate to the text file that contains the desired configuration. Once the file is
selected, click Open to initiate the import procedure.
3. The Setup Configuration window will be displayed, with a special note attached at the bottom.
Parameters that have been changed will be indicated with a checkmark. You may make more changes if
necessary, and then click OK to accept the changes.
4. Click Yes in response to the following warning message to accept the new settings.
4-6
Unlock Server
The Unlock Server function is used to open a password protected switch so that the user can modify its
configuration, import/export a configuration, and perform other procedures. There are six possible responses
under the Status column. The Status of a Moxa switch indicates how Moxa EtherDevice Switch Configurator
located the switch, and what type of password protection it has.
The six options are as follows (note that the term Fixed is borrowed from the standard fixed IP address
networking terminology):
Locked
The switch is password protected, Broadcast Search was used to locate it, and the password has not yet
been entered from within the current Configurator session.
Unlocked
The switch is password protected, Broadcast Search was used to locate it, and the password was entered
from within the current Configurator session. Henceforth during this Configurator session, activating
various utilities for this switch will not require re-entering the server password.
Blank
The Moxa switch is not password protected, and Broadcast Search was used to locate it.
Follow the steps given below to unlock a locked Moxa switch (i.e., Moxa switch with Status Locked or Locked
Fixed). Highlight the server (from the Moxa EtherDevice Switch list in the Configurator windows left pane),
and then click the Unlock toolbar icon
1. Enter the switchs User Name and Password when prompted, and then click OK.
2. When the Unlock status window indicates the Progress as OK, click the Close button in the upper right
corner of the window.
4-7
A
A.
MIB Groups
The Moxa switch comes with built-in SNMP (Simple Network Management Protocol) agent software that
supports cold/warm start trap, line up/down trap, and RFC 1213 MIB-II.
The standard MIB groups that the Moxa switch supports are as follows:
MIB Groups
dot1dTpHCPortTable
dot1dTpPortOverflowTable
pBridgeMIB
dot1dExtBase
dot1dPriority
dot1dGarp
qBridgeMIB
dot1qBase
dot1qTp
dot1qFdbTable
dot1qTpPortTable
dot1qTpGroupTable
dot1qForwardUnregisteredTable
dot1qStatic
dot1qStaticUnicastTable
dot1qStaticMulticastTable
dot1qVlan
dot1qVlanCurrentTable
dot1qVlanStaticTable
dot1qPortVlanTable
The Moxa switch also provides a private MIB file, located in the file Moxa-[switchs model name]-MIB.my
on the Moxa switch utility CD-ROM.
Public Traps
Cold Start
Link Up
Link Down
Authentication Failure
Private Traps
Configuration Changed
Power On
Power Off
Traffic Overloaded
A-2