Table of Contents
1. About this Manual ............................................................................................................................. 1-1
2. Getting Started.................................................................................................................................. 2-1
USB Console Configuration (115200, None, 8, 1, VT100) .........................................................................2-2
Configuration by Command Line Interface (CLI) .....................................................................................2-4
Configuration by Web Console ..............................................................................................................2-6
Disabling Telnet and Browser Access..................................................................................................... 2-7
3. Featured Functions ........................................................................................................................... 3-1
Home ................................................................................................................................................3-2
System Settings .................................................................................................................................3-2
System Information.....................................................................................................................3-2
Module Information .....................................................................................................................3-3
User Account ..............................................................................................................................3-4
Password Login Policy .................................................................................................................. 3-6
Network .....................................................................................................................................3-6
Date and Time ............................................................................................................................3-9
IEEE 1588 ................................................................................................................................ 3-10
Warning Notification .................................................................................................................. 3-17
MAC Address Table.................................................................................................................... 3-24
System Files ............................................................................................................................. 3-25
Restart..................................................................................................................................... 3-28
Factory Default ......................................................................................................................... 3-28
PoE (PoE Models Only) ...................................................................................................................... 3-29
PoE Settings ............................................................................................................................. 3-29
VLAN............................................................................................................................................... 3-39
The Virtual LAN (VLAN) Concept.................................................................................................. 3-39
Sample Applications of VLANs Using Moxa Switches....................................................................... 3-41
Configuring a Virtual LAN ........................................................................................................... 3-42
VLAN Name Setting ................................................................................................................... 3-44
QinQ Settings ........................................................................................................................... 3-44
VLAN Table............................................................................................................................... 3-44
Port ................................................................................................................................................ 3-45
Port Settings............................................................................................................................. 3-45
Port Status ............................................................................................................................... 3-46
Link Aggregation ....................................................................................................................... 3-47
Link-Swap Fast Recovery ........................................................................................................... 3-49
RSTP Grouping ................................................................................................................................. 3-49
Multicast.......................................................................................................................................... 3-50
The Concept of Multicast Filtering ................................................................................................ 3-50
IGMP Snooping ......................................................................................................................... 3-53
IGMP Snooping Setting .............................................................................................................. 3-54
IGMP Group Status .................................................................................................................... 3-55
Stream Table ............................................................................................................................ 3-55
Static Multicast Address ............................................................................................................. 3-56
GMRP....................................................................................................................................... 3-57
Multicast Filtering Behavior......................................................................................................... 3-57
QoS ................................................................................................................................................ 3-58
The Traffic Prioritization Concept ................................................................................................. 3-58
Configuring Traffic Prioritization .................................................................................................. 3-60
CoS Classification ...................................................................................................................... 3-60
Priority Mapping ........................................................................................................................ 3-61
DSCP Mapping .......................................................................................................................... 3-62
Rate Limiting ............................................................................................................................ 3-62
Security........................................................................................................................................... 3-64
Management Interface ............................................................................................................... 3-64
Trusted Access.......................................................................................................................... 3-66
SSL Certificate Management ....................................................................................................... 3-67
SSH Key Management................................................................................................................ 3-67
Authentication .......................................................................................................................... 3-67
Port Security............................................................................................................................. 3-74
Port Access Control Table ........................................................................................................... 3-77
Loop Protection ......................................................................................................................... 3-77
Access Control List .................................................................................................................... 3-77
DHCP .............................................................................................................................................. 3-84
IP-Port Binding.......................................................................................................................... 3-84
DHCP Relay Agent ..................................................................................................................... 3-84
SNMP .............................................................................................................................................. 3-87
SNMP Read/Write Settings.......................................................................................................... 3-88
Trap Settings ............................................................................................................................ 3-89