Table of Contents
Chapter 1 Introduction ...............................................................................................1-1
Inside the Future of Industrial Ethernet Technology ............................................................ 1-2
The trend in industrial communications and automation applications ...................... 1-2
Industrial vs. Commercial ......................................................................................... 1-2
Informative vs. Passive ............................................................................................. 1-2
MOXA EtherDevice™ Switch ............................................................................................. 1-2
Package Checklist................................................................................................................. 1-2
Features ................................................................................................................................ 1-3
Advanced Industrial Networking Capability............................................................. 1-3
Designed for Industrial Applications......................................................................... 1-3
Useful Utility and Remote Configuration ................................................................. 1-3
Chapter 2 Getting Started ..........................................................................................2-1
Using the RS-232 Serial Console (115200, None, 8, 1, VT100) .......................................... 2-2
Using the Telnet Console...................................................................................................... 2-4
Using Web Configuration..................................................................................................... 2-6
Chapter 3 Featured Functions ...................................................................................3-1
Configuring Basic Settings................................................................................................... 3-2
System Identification................................................................................................. 3-2
Password ................................................................................................................... 3-3
Accessible IP............................................................................................................. 3-4
Port............................................................................................................................3-5
Network..................................................................................................................... 3-7
Time .......................................................................................................................... 3-8
System File Update—By Remote TFTP ................................................................. 3-10
System File Update—By Local Import/Export....................................................... 3-11
Factory Default........................................................................................................ 3-12
Using Port Trunking ........................................................................................................... 3-12
The Concept of Port Trunking................................................................................. 3-12
Configuring Port Trunking ................................................................................................. 3-13
Port Trunking Settings ............................................................................................ 3-13
Port setting information........................................................................................... 3-14
Using SNMP....................................................................................................................... 3-14
Configuring SNMP ................................................................................................. 3-15
SNMP Read/Write Settings..................................................................................... 3-15
Private MIB information......................................................................................... 3-17
Using Communication Redundancy................................................................................... 3-17
The Concept of Turbo Ring..................................................................................... 3-17
Configuring Turbo Ring.......................................................................................... 3-21
The Concept of STP/RSTP...................................................................................... 3-22
Configuring STP/RSTP........................................................................................... 3-27
Using Traffic Prioritization................................................................................................. 3-30
The Concept of Traffic Prioritization...................................................................... 3-30
Configuring Traffic Prioritization ........................................................................... 3-32
Using Virtual LAN ............................................................................................................. 3-35
The Concept of Virtual LAN (VLAN).................................................................... 3-35