Table of Contents
1.Introduction...................................................................................................................................... 1-1
Overview...........................................................................................................................................1-2
Package Checklist...............................................................................................................................1-2
Features............................................................................................................................................1-2
Industrial Networking Capability....................................................................................................1-2
Designed for Industrial Applications...............................................................................................1-3
Useful Utility and Remote Configuration .........................................................................................1-3
Recommended Software and Accessories .......................................................................................1-3
2.Getting Started ................................................................................................................................. 2-1
RS-232 Console Configuration (115200, None, 8, 1, VT100) ....................................................................2-2
Configuration using a Telnet Console.....................................................................................................2-4
Configuration using a Web Browser.......................................................................................................2-6
Disabling Telnet and Browser Access.....................................................................................................2-7
3.Featured Functions ........................................................................................................................... 3-1
Configuring Basic Settings ...................................................................................................................3-2
System Identification...................................................................................................................3-2
Password ...................................................................................................................................3-3
Accessible IP...............................................................................................................................3-3
Port...........................................................................................................................................3-4
Network.....................................................................................................................................3-5
Time..........................................................................................................................................3-7
Turbo Ring DIP Switch ...............................................................................................................3-11
System File Update—By Remote TFTP..........................................................................................3-13
System File Update—By Local Import/Export ................................................................................3-13
System File Update—By Backup Media.........................................................................................3-14
Restart.....................................................................................................................................3-14
Factory Default .........................................................................................................................3-15
Using Port Trunking ..........................................................................................................................3-15
The Port Trunking Concept .........................................................................................................3-15
Configuring Port Trunking...........................................................................................................3-16
Configuring SNMP.............................................................................................................................3-17
Trap Settings............................................................................................................................3-19
SNMP Inform Mode....................................................................................................................3-19
Using PoE ........................................................................................................................................3-20
Using Communication Redundancy .....................................................................................................3-24
The Turbo Ring Concept.............................................................................................................3-24
Configuring “Turbo Ring” and “Turbo Ring V2” ..............................................................................3-28
The Turbo Chain Concept...................................................................................................................3-32
Configuring “Turbo Chain” ..........................................................................................................3-33
The STP/RSTP Concept ..............................................................................................................3-34
Configuring STP/RSTP................................................................................................................3-38
Using Traffic Prioritization..................................................................................................................3-40
The Traffic Prioritization Concept.................................................................................................3-41
Configuring Traffic Prioritization ..................................................................................................3-42
Using Virtual LAN..............................................................................................................................3-45
The Virtual LAN (VLAN) Concept..................................................................................................3-45
Sample Applications of VLANs using Moxa EDS-P506A-4PoE ...........................................................3-47
Configuring Virtual LAN..............................................................................................................3-48
Using Multicast Filtering.....................................................................................................................3-50
The Concept of Multicast Filtering................................................................................................3-50
Configuring IGMP Snooping ........................................................................................................3-52
Add Static Multicast MAC............................................................................................................3-54
Configuring GMRP .....................................................................................................................3-55
GMRP Table..............................................................................................................................3-55
Using Bandwidth Management............................................................................................................3-55
Traffic Rate Limiting Settings......................................................................................................3-56
Using Port Access Control ..................................................................................................................3-56
Configuring Static Port Lock........................................................................................................3-58
Configuring IEEE 802.1X ............................................................................................................3-58
Using Auto Warning ..........................................................................................................................3-61
Configuring Email Warning .........................................................................................................3-61
Event Type...............................................................................................................................3-61
Email Setup..............................................................................................................................3-63
Configuring Relay Warning .........................................................................................................3-64
Event Setup..............................................................................................................................3-64
Warning List .............................................................................................................................3-65
Using Line-Swap-Fast-Recovery..........................................................................................................3-65
Configuring Line-Swap Fast Recovery ..........................................................................................3-65