
Table of Contents
Chapter 1 Introduction ...............................................................................................1-1
Inside the Future of Industrial Ethernet Technology ............................................................ 1-2
The trend in industrial communications and automation applications ...................... 1-2
Industrial vs. Commercial ......................................................................................... 1-2
Informative vs. Passive ............................................................................................. 1-2
Moxa EtherDevice™ Switch................................................................................................ 1-2
Package Checklist................................................................................................................. 1-2
Optional Accessories ............................................................................................................1-3
Features ................................................................................................................................ 1-3
Advanced Industrial Networking Capability............................................................. 1-3
Designed for Industrial Applications......................................................................... 1-3
Useful Utility and Remote Configuration ................................................................. 1-3
Chapter 2 Getting Started ..........................................................................................2-1
Configuration by RS-232 Serial Console (115200, None, 8, 1, VT100) .............................. 2-2
Configuration by Telnet Console.......................................................................................... 2-5
Configuration by Web Browser ............................................................................................ 2-7
Disabling Telnet and Browser Access .................................................................................. 2-8
Chapter 3 Featured Functions...................................................................................3-1
Configuring Basic Settings................................................................................................... 3-2
System Identification................................................................................................. 3-2
Password ................................................................................................................... 3-3
Accessible IP............................................................................................................. 3-4
Port ............................................................................................................................3-4
Network..................................................................................................................... 3-6
Time .......................................................................................................................... 3-7
System File Update—By Remote TFTP ................................................................... 3-8
System File Update—By Local Import/Export....................................................... 3-10
Factory Default........................................................................................................ 3-10
Using Port Trunking ............................................................................................................3-11
The Port Trunking Concept..................................................................................... 3-11
Configuring Port Trunking ................................................................................................. 3-12
Configuring SNMP............................................................................................................. 3-12
SNMP Read/Write Settings..................................................................................... 3-14
Trap Settings ........................................................................................................... 3-15
Private MIB information ......................................................................................... 3-15
Using Communication Redundancy ................................................................................... 3-15
The Turbo Ring Concept......................................................................................... 3-16
Configuring Turbo Ring.......................................................................................... 3-19
The STP/RSTP Concept.......................................................................................... 3-20
Configuring STP/RSTP........................................................................................... 3-25
Using Traffic Prioritization................................................................................................. 3-28
The Traffic Prioritization Concept .......................................................................... 3-28
Configuring Traffic Prioritization ........................................................................... 3-30
Using Virtual LAN ............................................................................................................. 3-33
The Concept of Virtual LAN (VLAN).................................................................... 3-33