ICRealtime PWR-POE-8-V3 User manual

PWR-POE-8-V3
8-port Unmanaged Desktop Switch
Quick Start Guide
V1.0.0

I
Foreword
General
This manual explains the hardware, installation, and wiring steps ofthe PWR-POE-8-V3 8-
port unmanaged desktop switch (hereinafter referred toas"the device").
Safety Instructions
Below are terminology and icons that may appear in the manual and its definition.
Signal Words Meaning
Indicates a high potential hazard which, if not avoided, will result in
death or serious injury.
Indicates a medium or low potential hazard which, if not avoided,
could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in
property damage, data loss, lower performance, or unpredictable
result.
Provides methods to help you solve a problem or save you time.
Provides additional information as the emphasis and supplement to
the text.
Revision History
Version Revision Content Release Time
V1.0.0 First release. Dec 13,2021
About the Manual
●The manual is for reference only. Ifthere is inconsistency between the manual andthe actual
product, the actual product shall prevail.
●We arenot liable for any loss caused by the operations that donot comply with the manual.
●The manual would beupdated according tothe latest laws andregulations ofrelated regions. For
detailed information, see the paper manual, CD-ROM, QR code or our official website. Ifthere is
inconsistency between paper manual and the electronic version, the electronic version shall
prevail.
●All the designs and software are subject to change without prior written notice. The product
updates might cause some differences between the actual product and the manual. Please
contact the customer service for thelatest program and supplementary documentation.
●There still might be deviation intechnical data, functions and operations description, orerrors in
print. Ifthere isany doubt or dispute, please refer to our final explanation.
●Upgrade the reader software ortry other mainstream reader software if the manual (in PDF
format) cannot be opened.
●All trademarks, registered trademarks and the company names inthe manual are the properties
of their respective owners.

II
●If there is any uncertainty or controversy, please refer to our final explanation.

III
Important Safeguards and Warnings
The manual will guide you on how to use the product properly. To avoid danger and property
damage, read the manual carefully before using the product, and we highly recommend you to
store for future reference.
Operating Requirements
●Do not expose the device directly to the sunlight, and keep it away from heat.
●Do not install the device in the damp environment, and avoid dust and soot.
●Make sure the device is in horizontal installation, and install the device on solid and flat surface to
avoid falling down.
●Avoid liquid spattering on the device. Do not place object full of liquid on the device to avoid
liquid flowing into the device.
●Install the device in the well-ventilated environment. Do not block the air vent of the device.
●Use the device at rated input and output voltage.
●Do not disassemble the device without professional instruction.
●Transport, use, and store the device in allowed ranges of humidity and temperature.
●When removing the cable, power off the device first to avoid personal injury.
●Voltage stabilizer and lightning protection device are optional according to power supply and
surrounding environment.
Power Supply Requirements
●Use the battery properly to avoid fire, explosion, and other dangers.
●Replace the battery with battery ofthe same type.
●Use locally recommended power cord inthe limit of rated specifications.
●Use the standard power adapter. Wewill assume no responsibility for any problems caused by
nonstandard power adapter.
●The power supply shall meet the SELV requirement. Use the power supply that conforms to
Limited Power Source, according toIEC 62368-1.Refer tothe device label.
●Be sure to ground thedevice (cross section ofcopper wire: > 2.5 mm²; resistance to ground: ≤4
Ω).
●The coupler isthe disconnecting apparatus. Place at a proper angle for easy operation.

IV
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings............................................................................................................................................ III
1 Overview................................................................................................................................................................................................... 1
1.1 Introduction ................................................................................................................................................................................. 1
1.2 Features and Applications.....................................................................................................................................................1
2 Port and Indicator ................................................................................................................................................................................ 2
2.1 Front Panel.................................................................................................................................................................................... 2
2.2 Rear Panel......................................................................................................................................................................................3
3 Installation...............................................................................................................................................................................................4
3.1 Preparation...................................................................................................................................................................................4
3.2 Desktop Mount ........................................................................................................................................................................... 4
3.3 Wall Mount.................................................................................................................................................................................... 4
4 Wiring ......................................................................................................................................................................................................... 5
4.1 Connecting GND......................................................................................................................................................................... 5
4.2 Connecting Power Cord..........................................................................................................................................................5
4.3 Connecting Ethernet Port......................................................................................................................................................5
4.4 Connecting PoE Ethernet Port ............................................................................................................................................ 6
Appendix 1 Cybersecurity Recommendations.......................................................................................................................... 7

1
1 Overview
1.1 Introduction
The PWR-POE-8-V3 is a high-performance layer-2 commercial switch utilizing a large buffer
memory to ensure smooth video stream transmission. This switch is equipped with a full-metal and
fanless design, features excellent heat dissipation capability, and can work in the environment
from –14°F to +131 °F 9–10°C to +55 °C.). The DIP switches provide a variety of operating modes for
different scenarios. The device also supports power consumption management, which can adapt
to the fluctuation of power consumption of the terminal device to ensure stable operation.
This switch is applicable in different scenarios, including home, office, server farm, and small malls.
1.2 Features and Application
●8 ×100/1000 Mbps Ethernet port
●All ports support IEEE802.3af and IEEE802.3at. The red port also supports Hi-PoEand IEEE802.3bt.
●The switch will prioritize PoE budget. PoE port 1 will have the highest priority and port 8 having the least priority.
● The orange port also supports Hi-PoE (PoE budget is max 96 watts, if Hi-PoE is used some of the ports may lose
PoE functionality)
●820 feet (250 m)long-distance PoE transmission can beenabled by DIP switch. This will reduce bandwidth to 10
mbps per port.
●PD (power Delivery) Alive -function that will attempt to reboot a device that becomes unresponsive automatically
●Power consumption management
●Fanless
●Desktop mount and wall mountable

2
2 Port and Indicator
2.1 Front Panel
The figure below isforreference only, and may differ from the actual product.
Figure 2-1 Front panel
The following are all theports and indicators onthe front panel ofthe 8-portunmanaged
desktop switch. The actual device may not have all of these features.Refer tothe table below for
the contents ofthe actual device panel.
Table 2-1 Front panel description
No. Description
1 10/100 Mbps or 10/100/1000 Mbps self-adaptive Ethernet ports
2 10/100 Mbps or 10/100/1000 Mbps self-adaptive uplink port
3
Power indicator
●On: Power on
●Off: Power off
4
Single-port connection status indicator (Link)
●On: Connected to device
●Off: Not connected to device
5
Single-port data transmission status indicator (Act)
●Flashes: Data transmission is in progress
●Off: No data transmission
6
PoE port status Indicator
●On: Powered by PoE
●Off: Not powered by PoE
7
Single-port connection or data transmission status indicator
(Link/Act)
●On: Connected to device
●Off: Not connected to device
●Flashes: Data transmission is in progress

3
No. Description
8
DIP switch
●PD Alive: When a connected device becomes unresponsive,
the switch will power down and restart the device.
●Extend Mode: Extends the maximum transmission distance
to 250 m,but reduces average transmission speed to10
Mbps.
(Not included in the figure)
Another DIP switch
Select Default or Extend Mode by toggling the DIP switch.
Extend Mode: Extends the maximum transmission distance to
820ft, but reduces average transmission speed to 10Mbps.
Speed
(Not included in the figure)
Uplink port speed indicator
●On: 100 Mbps/1000 Mbps
●Off: 10 Mbps
2.2 Rear Panel
The following figure isfor reference only andmay differ from the actual product.
Figure 2-2 Rear panel
Table 2-2 Description of rear panel
No. Name Description
1 GND Ground terminal. Available for certain
models.
2 Lock hole Used to lock the device. Available for
certain models.
3 Power port Supports 48 V–57 V DC.

4
3 Installation
3.1 Preparation
●Select anappropriate installation method asneeded.
●Install the device onsolid and flat surface.
●Leave about 4 inches for heat dissipation space around theswitch to ensure good
ventilation.
3.2 Desktop Mount
The device supports desktop mount. You can directly place it on solid and flat desktop.
3.3 Wall Mount
Step 1 Drill twoM4screws into the wall, leaving 1/6 inch (4mm)of space between the wall and thehead
of the screw.
●Screws donot come with the package. Purchase them asneeded.
●Make sure that the distance between the screws is the distance
between the wall-mount holes (1.1 inch/ 28.4 mm).
Step 2 Align the wall-mount holes on the back cover ofthedevice with the screws and hang the
device on the screws.
Figure 3-1 Wall mount

5
4 Wiring
4.1 Connecting GND (Ground)
A Devices GND connection is important for device lightning protection and anti-interference. The
steps for connecting the GND are as follows:
Step 1 Remove the ground screw on the device. Pass the ground screw through the round hole of
the OT terminal oftheground cable. Turn the ground screw clockwise with a Phillips screwdriver to
fasten the OT terminal ofthe ground cable.
Step 2 Wind the other endofthe ground cable into a circle with needle-nose pliers.
Step 3 Connect the other end ofthe ground cable tothe ground bar, turn the hex nutclockwise
with a wrench to fasten the other end of the ground cable to the ground terminal.
Figure 4-1 Connect GND
4.2 Connecting Power Cord
Before connecting the power cord, make sure that the device isproperly grounded.
Step 1 Connect one endofthe power cord into the power jack ofthe device .
Step 2 Connect the other end ofthe power cord to the external power socket.
4.3 Connecting Ethernet Port
Ethernet port uses standard RJ-45. Using the self-adaptation function, it can beautomatically
configured tofull duplex/half-duplex operation mode. Itsupports MDI/MDI-X self-recognition of
the cable, therefore, youcan use cross-over cable or straight-through cable to connect terminal
device to network device.

6
Figure 4-2 Ethernet port pin number
Figure 4-3 Pin description
The cable connection of RJ-45 connector conforms to the standard 568B (1-orange white, 2-orange,
3-green white, 4-blue, 5-blue white, 6-green, 7-brown white, 8-brown).
4.4 Connecting PoE Ethernet Port
You can directly connect the device PoE Ethernet port to the switch PoE Ethernet port using a network
cable toachieve synchronized network connection and power supply. With Extend Mode disabled, the
maximum distance between the switch and connected devicesisabout 320ft (100m) .
Note that any non- POE devices plugged into this switch will require their own external power.

7
Appendix 1 Cybersecurity Recommendations
Cybersecurity is something that pertains to every device that isconnected tothe internet (IoT).IP
video surveillance are not immune to cyber risks, but taking basic steps toward protecting and
strengthening networks and networked devices will make them less susceptible to attacks. Below
are some tips and recommendations onhow to create a more secured security system.
Mandatory actions tobe taken for basic device network security:
1. Use Complex Passwords
Please refer tothe following suggestions to set passwords:
●The length should not be less than 8characters;
●Include atleast two types ofcharacters; character types include upper and lower case letters,
numbers andsymbols;
●Do not contain the account name orthe account name inreverse order;
●Do not use continuous characters, such as 123, abc, etc.;
●Do not use overlapped characters, such as 111, aaa, etc.;
2. Update the Firmware and Client Software regularly
●According to the standard procedure inTech-industry, we recommend to keep your devices
(such as NVR, DVR, IPcamera, etc.) firmware up-to-date to ensure the system is equipped with
the latest security patches and fixes. When the device is connected toapublic network, it is
recommended to enable the "auto-check for updates" function toobtain timely information
of firmware updates released bythe manufacturer.
●We suggest that youdownload anduse the latest version ofclient software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection
We suggest that you conduct physical protection to devices, especially storage devices. For
example, place the device in a special computer room and cabinet and implement secure access
with controlled permissions to prevent unauthorized personnel from carrying out physical
contacts such as damaging hardware, unauthorized connection of removable device (such as
USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that youchange passwords regularly to reduce the risk ofbeing guessed orcracked.
3. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for password
reset intime, including the end user’s mailbox and password protection questions. If the
information changes, please modify it in time. When setting password protection questions, itis
suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and werecommend you to keep it on to
guarantee the account security. Ifanattacker attempts tolog in with the wrong password several
times, the corresponding account andthe source IPaddress will belocked.
5. Change Default HTTP and Other Service Ports
We suggest you tochange default HTTP and other service ports into any set of numbers between
1024~65535, reducing the risk ofoutsiders being able toguess which ports you are using.

8
6. Enable HTTPS
We suggest youtoenable HTTPS, sothat youvisit Webservice through a secure communication
channel.
7. MAC Address Binding
We recommend youtobind the IPandMAC address ofthe gateway to the device, thus reducing
the risk ofARPspoofing.
8. Assign Accounts and Privileges Reasonably
According tobusiness and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended toturn offsome services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, itishighly recommended that you use safe modes, including but not limited to the
following services:
●SNMP: Choose SNMP v3, and set upstrong encryption passwords and authentication
passwords.
●SMTP: Choose TLS to access mailbox server.
●FTP: Choose SFTP, and set upstrong passwords.
●AP hotspot: Choose WPA2-PSKencryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio andvideo data contents are very important orsensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss intransmission efficiency.
11. Secure Auditing
●Check online users: wesuggest that you check online users regularly tosee ifthe device is
logged inwithout authorization.
●Check device log: Viewing thelogs will inform of any IP addresses that were used to log in to
your devices and their key operations.
12. Network Log
Due to thelimited storage capacity ofthe device, the stored log is limited. Ifyou need to save the
log for a long periods,itisrecommended that you enable the network log function to ensure that
the critical logs are synchronized tothe network log server for tracing.
13. Create a Secure Network Environment
In order to better ensure the safety ofdevice and reduce potential cyber risks, we recommend:
●Disable theport mapping function ofthe router to avoid direct access to theintranet devices
from external network.
●The network should be partitioned and isolated according tothe actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, soasto achieve the
network isolation effect.
●Establish the 802.1x access authentication system toreduce the risk ofunauthorized access to
private networks.
●Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
Table of contents
Other ICRealtime Switch manuals
Popular Switch manuals by other brands

Embertec
Embertec SmartSwitch Series Frequently asked questions

Network Technologies
Network Technologies VOPEX-USBV-2 Installation and operation manual

Black Box
Black Box Code Operated Switch-16 quick start guide

Ceiec Electric
Ceiec Electric PMC-1220E user manual

Signal
Signal SMS-9/8 user manual

Cisco
Cisco 2960 8TC - Catalyst Switch Getting started guide