Table of Contents
1. About this Manual ............................................................................................................................. 1-1
2. Getting Started ................................................................................................................................. 2-1
USB Console Configuration (115200, None, 8, 1, VT100).........................................................................2-2
Configuration by Command Line Interface (CLI) .....................................................................................2-5
Configuration by Web Console..............................................................................................................2-6
Disabling Telnet and Browser Access.....................................................................................................2-8
3. Featured Functions ........................................................................................................................... 3-1
Home................................................................................................................................................3-2
System Settings .................................................................................................................................3-2
System Information.....................................................................................................................3-2
User Account ..............................................................................................................................3-4
Password Login Policy ..................................................................................................................3-6
Network.....................................................................................................................................3-6
Date and Time ............................................................................................................................3-9
IEEE 1588 PTP ..........................................................................................................................3-12
Warning Notification ..................................................................................................................3-16
MAC Address Table....................................................................................................................3-22
System Files.............................................................................................................................3-23
Turbo Ring DIP Switch ...............................................................................................................3-26
Restart.....................................................................................................................................3-27
Factory Default .........................................................................................................................3-27
PoE (PoE Models Only) ......................................................................................................................3-28
PoE Settings .............................................................................................................................3-28
VLAN...............................................................................................................................................3-38
The Virtual LAN (VLAN) Concept..................................................................................................3-38
Sample Applications of VLANs Using Moxa Switches.......................................................................3-40
Configuring a Virtual LAN ...........................................................................................................3-41
VLAN Name Setting ...................................................................................................................3-43
QinQ Settings ...........................................................................................................................3-44
VLAN Table...............................................................................................................................3-44
Port ................................................................................................................................................3-45
Port Settings.............................................................................................................................3-45
Port Status...............................................................................................................................3-46
Link Aggregation.......................................................................................................................3-46
Link-Swap Fast Recovery ...........................................................................................................3-48
Multicast..........................................................................................................................................3-49
The Concept of Multicast Filtering................................................................................................3-49
IGMP Snooping .........................................................................................................................3-52
IGMP Snooping Setting ..............................................................................................................3-52
IGMP Group Status....................................................................................................................3-53
Stream Table............................................................................................................................3-54
Static Multicast Address .............................................................................................................3-54
GMRP ......................................................................................................................................3-55
Multicast Filtering Behavior.........................................................................................................3-55
QoS ................................................................................................................................................3-56
The Traffic Prioritization Concept.................................................................................................3-56
Configuring Traffic Prioritization ..................................................................................................3-58
CoS Classification......................................................................................................................3-58
Priority Mapping (Type 1)...........................................................................................................3-59
Priority Mapping (Type 2)...........................................................................................................3-60
DSCP Mapping ..........................................................................................................................3-60
Rate Limiting ............................................................................................................................3-61
Security...........................................................................................................................................3-68
Management Interface...............................................................................................................3-68
Trusted Access..........................................................................................................................3-70
SSL Certificate Management.......................................................................................................3-71
SSH Key Management ...............................................................................................................3-71
Authentication ..........................................................................................................................3-71
Port Security.............................................................................................................................3-78
Port Access Control Table...........................................................................................................3-81
Broadcast Storm Protection ........................................................................................................3-81
Loop Protection.........................................................................................................................3-82
Access Control List ....................................................................................................................3-82
DHCP ..............................................................................................................................................3-88
IP-Port Binding .........................................................................................................................3-88
DHCP Relay Agent.....................................................................................................................3-88