User Documentation - User manual
User Documentation - User manual
Manual
for
Lite Advanced Line Switches
IE-SW-AL05M-5TX (2682250000)
IE-SW-AL06M-4TX-2SC (2682260000)
IE-SW-AL06M-4TX-2SCS (2682270000)
The software described in this manual is furnished under a license agreement and may be used only in
accordance with the terms of that agreement.
Copyright Notice
Disclaimer
Information in this document is subject to change without notice and does not represent a
commitment on the part of Weidmüller.
Weidmüller provides this document as is, without warranty of any kind, either expressed or implied,
including, but not limited to, its particular purpose. Weidmüller reserves the right to make
improvements and/or changes to this manual, or to the products and/or the programs described in
this manual, at any time.
Information provided in this manual is intended to be accurate and reliable. However, Weidmüller
assumes no responsibility for its use, or for any infringements on the rights of third parties that may
result from its use.
This product might include unintentional technical or typographical errors. Changes are periodically
made to the information herein to correct such errors, and these changes are incorporated into new
editions of the publication.
Contact Information
Table of Contents
1. About this Manual ............................................................................................. 3
1
User Manual Managed Switches
2
User Manual Managed Switches
Getting Started
This chapter summarizes the main hardware and software features of the Lite Advanced Line
Switches. The information related with the Installation of each Switch (Front / Rear side
elements description and Connections) is described in the Hardware Installation Guide
delivered with every device and available in our online catalogue.
Web Management
The Lite Advanced Line Switches are configured and monitored through its web interface. This
web interface is fully described in this chapter.
2. Getting Started
The Lite Advanced Line Switches are cost-effective products specially designed to operate in harsh
industrial environments thanks to rugged design. The products come with an IP30 rugged case,
redundant power input, alarm relay and wide operating temperature range from -40 to 75ºC.
3
User Manual Managed Switches
o O-Ring (optimized protocol for ring topologies; recovery time < 10ms)
o O-Chain (allows multiple redundant network topologies; recovery time < 10ms)
o Fast Recovery
• IP-address management
o Static
o DHCP-Client
o DHCP-Server (port based, pool based)
o DHCP Option 82
o DHCP-Relay
• Time synchronization management
o NTP server
o SNTP client
• Monitoring functions
o SNMP v1/v2c/v3
o Link Layer Discovery Protocol (LLDP)
o Syslog
o Event based warning (via e.mail / via output relay / via SNMP trap)
• Network traffic filter
o Port based VLAN
• Security functions
o VLAN segmentation
o Enable / Disable ports
o TACACS+ User Authentication
o Loop protection
o Management access security via secure IP list
o Configuration of allowed access methods (web-interface, telnet, SSH)
3. Web Management
In this chapter, we explain how to access the Weidmüller Switch’s through the Web console as well
as all the configuration, monitoring, and administration functions available when using this interface.
NOTE: To use the Switch's management and monitoring functions from a PC host
connected to the same LAN as the switch, you must make sure that the PC host and the
Switch are on the same logical subnet.
NOTE: If the Weidmüller switch is configured for other VLAN settings, you must make
sure your PC host is on the management VLAN.
4
User Manual Managed Switches
NOTE: Before accessing the Switch’s web browser interface, first connect one of its
RJ45 Ethernet ports to your Ethernet LAN, or directly to your PC's Ethernet card (NIC).
You can establish a connection with either a straight-through or cross-over Ethernet
cable.
After making sure that the Weidmüller switch is connected to the same LAN and logical subnet as
your PC, open the switch’s web console as follows:
Open your web browser and type the Switch’s IP address in the Address or URL field. Press Enter
to establish the connection.
The web login page will open. Enter the default user name “admin” and password “Detmold”, and
then click OK to continue.
After logging in, the main general information of the switch is shown including, among others, System
Name, Firmware version, MAC address and Serial number. It is also displayed the front side of the
switch (showing the active ports) in the right navigation panel.
In this home page is also available the button Enable location alert. When pressing it, the front
LEDs starts to flash and an acoustic signal is heard (periodic change of the output relay). When
clicking Disable location alert, the LEDs will stop flashing and the output relay will remain in its
original position.
Use the menu tree in the left navigation panel to open the function pages to access each of Ethernet
Switch's functions.
5
User Manual Managed Switches
NOTE: The pages of the Web interface include a Help button that describes the
parameters and functions that can be programmed or monitored in each web page.
NOTE: After changing any parameter / function in a web page the button Apply
activates the change but does not save it. The changes have to be saved using the
Save Configuration option of the menu.
Warning messages will pop out to warn the user that the security certificate was issued by a
company they have not chosen to trust.
Select “Continue to this website” to enter the Weidmüller switch´s web browser interface and
access the web browser interface secured via HTTPS.
6
User Manual Managed Switches
System Name
Factory
Setting Description
Default
Max. 64
This option is useful for recording a name of the unit. Name of type
characters
System Description
Setting Description Factory
Default
System Location
Setting Description Factory
Default
System contact
Setting Description Factory
Default
Max. 64 This option is useful for providing information about who None
characters is responsible for maintaining this unit and how to
contact this person.
7
User Manual Managed Switches
NOTE: The Switch's default user name / password are “admin” / ”Detmold”. If
these are changed, then you will be required to type the new user name and password
when logging into the serial console, Telnet console, or Web console.
User Name
Factory
Setting Description
Default
Max. 31
Enter the new user name. admin
characters
New Password
Setting Description Factory
Default
Confirm Password
Setting Description Factory
Default
3.3.3 IP Setting
The IPv4 settings allow the user to set manually the IP parameters or by means of a DHCP server.
8
User Manual Managed Switches
IP Address
Factory
Setting Description
Default
Subnet Mask
Factory
Setting Description
Default
Subnet mask for Identifies the type of network to which the Switch is
the Weidmüller connected (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0
Switch 255.255.255.0 for a Class C network).
Gateway
Setting Description Factory
Default
IP address for the The IP address of the router that connects the LAN to None
gateway an outside network.
1st DNS Server’s The IP address of the DNS Server used by your
None
IP address network.
2nd DNS Server’s The IP address of the secondary DNS Server used by None
9
User Manual Managed Switches
IP address your network. The Switch will use the 2nd DNS Server
if the 1st DNS Server fails to connect.
Auto Configuration
Factory
Setting Description
Default
Address
Factory
Setting Description
Default
10
User Manual Managed Switches
NOTE: The Weidmüller switch does not have a real time clock. The user must update
the Current Time and Current Date to set the initial time for the Weidmüller switch after
each reboot, especially when the network does not have an Internet connection for an
NTP server or there is no NTP server on the LAN.
System clock
Factory
Setting Description
Default
SNTP/NTP mode
Setting Description Factory
Default
11
User Manual Managed Switches
Client (SNTP) The Weidmüller Switch will synchronize its clock with
one of the Server IP Addresses fields.
UTC Timezone
Setting Description Factory
Default
User selectable Specifies the time zone, which is used to determine GMT
time zone the local time offset from GMT (Greenwich Mean (Greenwich
Time). Mean Time)
Server IP Addresses
Setting Description Factory
Default
Time Server IP (1 IP address of the SNTP servers. If the 1st SNTP None
to 5) Server fails to connect, the Weidmüller Switch will try
to locate the 2nd, 3rd, 4th and 5th Servers indicated.
User-specified Specifies the beginning and end date of the Daylight None
date Saving Time.
User-specified Specifies the number of hours that the time should be None
hour set forward during Daylight Saving Time.
12
User Manual Managed Switches
From the switch's web interface, users have the option of either enabling or disabling the LLDP, as
well as setting the LLDP transmit interval (as shown in the figure below). In addition, users are able to
view each switch's neighbor-list, which is reported by its network neighbors. Most importantly,
enabling the LLDP function allows a Network Management Software to automatically display the
network's topology as well as system setup details such as VLAN, and Trunking for the entire
network.
General Settings
Mode
Tx Interval
Numbers from 1 To set the transmit interval of LLDP messages. Unit is 30 (sec)
to 9999 sec. in seconds.
13
User Manual Managed Switches
Modbus TCP is disabled by default. To enable Modbus TCP, select Enable in Mode and then click
Apply.
In the Appendix B, Modbus Register Table, the user can find all the available registers of the switch.
This option is available only in the IE-SW-AL05M-5TX model. It allows the user to enable or
disable the settings of the 4 DIP switches located on the front of the switch housing.
If Mode is Enabled (and Apply is pressed), DIP switch SW1 defines the behavior of fault relay in
terms of power failure and DIP switches SW2, SW3 and SW4 define the settings for O-Ring
redundancy.
14
User Manual Managed Switches
If Mode is Disabled, the settings of the front DIP switches SW1/2/3/4 have no function. The behavior
of the fault relay and the settings of O-Ring redundancy mode have to be configured through the web
interface (Menu Warnings and Redundancy, respectively).
Configuring alarm relay by external DIP switch
• SW 1 ON: Relay contact is closed if the device is powered-off. Relay contact is open if the
device is powered by PWR1 and PWR2. Relay contact is closed if device is powered either
by PWR1 or PWR2 (supplied by only 1 power input).
• SW 2 OFF: Relay does not have any power-related function.
Configuring O-Ring redundancy by external DIP switches
By default Mode is Disabled so DIP switches SW1/2/3/4 located on the front of the switch
housing have no function.
15
User Manual Managed Switches
After setting the desired file names, click Restore to download the prepared file from the remote
TFTP server or to load the configuration file already saved in the computer, or click Backup to upload
the desired file to the remote TFTP server or to save it to the local host.
After setting the IP address and file names click Upgrade to upgrade the firmware of the switch from
the remote TFTP server.
16
User Manual Managed Switches
State
Setting Description Factory
Default
Speed/Duplex
Setting Description Factory
Default
100M-Full Auto
17
User Manual Managed Switches
Flow Control
Port alias
Setting Description Factory
Default
18
User Manual Managed Switches
If Loop Guard is Active in one port, a loop in that port will be blocked if the loop happens on the
switch itself.
3.5 Redundancy
19
User Manual Managed Switches
For failure detection the O-Ring protocol uses simultaneously two methods:
1. Physical link change detection (Ethernet link loss, e.g. caused by broken cable)
This detection method is always active and triggers link losses of Fast Ethernet connections
(Copper and Fiber) and Fiber Gigabit Ethernet connections. The typical link loss recognition for
these connection types is about 2 – 5 ms resulting in an overall self-healing time of the ring
structure of about 10 ms.
For copper-based Gigabit Ethernet connections the link loss detection is not used as trigger for
ring topology change due to the physical design, as a link loss recognition takes a time of several
hundred millisecond. Instead, for copper-based Gigabit Ethernet connections control packets are
sent cyclic to achieve the fast recovery time of 30ms (Method 2).
2. Cyclic sending of control packets by the Master over all ring members and loop back
detection via Master’s blocked port
The ring is based on parameters “Hello Time” and “Max Age Count” (explained in section below
Configuring O-Ring).
Using control packets as additional method for ring check (besides link loss detection) can be
very useful in cases of bad Ethernet signal quality. This can be caused by poor-quality cables
and connectors, or EMC based impact leading to a lot of malformed Ethernet packets resulting in
a significant decrease of the network payload. Such a situation can be detected via counting
corruptive control packets forcing a ring topology change through there is no link loss (but packet
losses)
If triggered, the overall recovery time is (“Hello Time” * “Max Age Account”) + (Topology change
process time of about 10 ms). For factory default settings with “Hello Time” = 10 ms and “Max
Age Account” = 2 the ring recovery time will be around 30 ms. For this setting, 100 control
packets will be sent per second which burdens the ring network with an acceptable bandwidth of
51200 bps.
For poor quality networks where packet loss easily can occur, smaller values of “Hello Time” and
“Max Age Count” would trigger topology changes very often, which will cause a lot of short time
network loops. It is recommended to increase these two parameters appropriately to adapt to the
conditions of the network environment.
20
User Manual Managed Switches
As both methods are running concurrently, a ring topology change will be initiated based on the error
condition which will be triggered first.
NOTE: Only for two switches of an O-Ring network one coupling port may be enabled.
For a Dual Homing connection on any two switches inside of the O-Ring network a Homing port
needs to be selected and enabled. Each configured Homing port must be connected to a RSTP
enabled port on any switch of the RSTP network. Configure RSTP port being of type Point-to-Point
(for switch interconnections). Do not configure as RSTP Edge Port (used for host connections). Dual
21
User Manual Managed Switches
Homing ports bypass BPDU packets sent from RSTP network switches resulting in normal state in a
forwarding and blocked (discarding) line. In case of a ring failure or if the forwarding line will be
interrupted, bypassing of BPDU packets will be stopped triggering a network topology change of the
RSTP network and both Dual Homing connections will become forwarding lines.
NOTE: Only for two switches of an O-Ring network the Homing port may be enabled. Ensure that the
connected network is RSTP enabled.
• Activate checkbox ‘Set as Ring Master’ if the switch shall be assigned as ring master
For O-Ring configuration one switch needs to be configured as Ring Master. However, if
two or more switches are set as Ring Master, the switch with the lowest MAC address will be
the actual Ring Master and the others will be Backup Masters.
If O-Ring redundancy on involved switches will be configured and applied but without setting
any switch as Ring Master, then a loop will arise causing heavy data traffic when closing the
ring cabling. This happens because there is no instance which controls and blocks the
backup line. In this case all ring switches show a broken ring status.
• Select the ‘Redundant ports’ which shall be used
3. If the switch is used to connect 2 O-Rings (Ring Coupling) then additionally do following:
22
User Manual Managed Switches
The Ring Status field indicates the operation of the ring. It shows N/A if Ring Redundancy is
Disabled, shows Healthy if the ring is operating normally, and shows Broken if the any of the two
links of the ring is not connected.
Redundant Ports
Setting Description Factory Default
1st Ring Port Select any port of the Switch to be one of the redundant Port 01
ports.
2nd Ring Port Select any port of the Switch to be one of the redundant Port 02
ports.
Status Description Factory Default
Inactive O-Ring redundancy disabled.
Link down No connection in this port.
Forwarding Normal transmission in this port. Inactive
Blocked The port is connected to a backup path and the path is
blocked.
Hello Time
Setting Description Factory Default
10 to 10,000ms Cyclic time of control packets sent by Master in the failure 10ms
detection method 2 of the switch.
Coupling Port
Setting Description Factory Default
Coupling Port Select any port of the Switch to be the coupling port. Port 03
Status Description Factory Default
Inactive Ring Coupling is disabled.
Link down No connection in this port.
Forwarding Normal transmission in this port. Inactive
Blocked The port is connected to a backup path and the path is
blocked.
23
User Manual Managed Switches
Homing Port
Setting Description Factory Default
Homing Port Select any port of the Switch to be the homing port. Port 04
Status Description Factory Default
Inactive Dual Homing is disabled.
Link down No connection in this port.
Forwarding Normal transmission in this port. Inactive
Blocked The port is connected to a backup path and the path is
blocked.
24
User Manual Managed Switches
For both above illustrated scenarios the overall network healing time can be calculated roughly to
around 40 ms based on a proprietary method to force a MAC address table update for all connected
Weidmüller switches.
Recovery time for O-Chain connected to an RSTP network
For a connection to an RSTP network the overall time for topology update after the chain is broken
can be estimated as the calculated healing time of the used RSTP redundancy settings plus around
30 milliseconds for chain topology update.
Generally, RSTP network ports connected to O-Chain Edge ports shall be configured as
Point-to-Point (P2P) RSTP port. This type is used to connect to other switches. Do not configure
those ports as RSTP Edge port because it is designed for host connection and do not allow passing
any BPDU control packet.
Interaction of O-Chain and RSTP network in terms of overall network topology update:
• If the chain is healthy the O-Chain Edge port of the switch with lowest MAC address always
becomes the blocking (discarding) state and the other Edge port will be the forwarding one.
• BPDU control packets which will be sent cyclic from RSTP network to the O-Chain Edge ports
will be blocked by both Edge ports as long as the chain is healthy. As result the RSTP network
does not recognize any loop and sets for both RSTP ports the forwarding state
• When learning new MAC addresses for unknown traffic sent via both RSTP ports, only the one
connected to forwarding O-Chain Edge port will learn the path to devices connected to the
O-Chain. The other RSTP port, though also having forwarding status, never will participate in any
traffic due to the blocked O-Chain Edge port. This ensures a unique traffic flow via the forwarding
O-Chain Edge port.
• In case of a broken chain (means any interruption in the chain behind the O-Chain Edge switches)
both O-Chain Edge ports go to state forwarding and send additionally a TCN BPDU packet
(Topology Change Notification) to their connected RSTP ports. This will trigger a fast network
topology change of the RSTP network resulting in fast renewed accessibility of devices at both
parts of the broken chain. In this case, both RSTP ports stay in state forwarding. Only for an
25
User Manual Managed Switches
interrupted connection between O-Chain Edge port and RSTP port the state on both sides will
change to link down.
Recovery time for O-Chain connected to any non-redundant Daisy Chain network or to a
proprietary 3rd party network
For connections to unmanaged switches, to a non-redundant daisy chain network or to a redundant
proprietary 3rd party network the overall network topology recreation time depends worst case on the
remaining MAC address aging time of the 3rd party switches (when the chain becomes broken). For
those devices there is no mechanism to inform them about a broken chain and to flush their MAC
address tables immediately. Only the O-Chain switches flush their MAC address tables after around
30 ms providing all devices connected to O-Chain switches, immediately an update path for Ethernet
communication to any target device. However already established communication relations,
originally initiated from 3rd party network devices to O-Chain connected devices, do not longer work
until the MAC address tables of the 3rd party switches will be renewed after the remaining aging-time
has been expired.
26
User Manual Managed Switches
Chain Ports
Setting Description Factory Default
1st Chain Port Select any port of the Switch to be one of the ports of the Port 01
daisy Chain.
2nd Chain Port Select any port of the Switch to be one of the ports of the Port 02
daisy Chain.
Status Description Factory Default
Inactive O-Chain redundancy disabled.
Link down No connection in this port.
Forwarding Normal transmission in this port. Inactive
Blocked The port is connected to a backup path and the path is
blocked.
Edge Port
Setting Description Factory Default
Configure a port of the daisy Chain as edge port.
Only on the two O-Chain Edge port switches one port
may be selected having the Edge port role. All other ports
of the member switches of the chain have to be
Check
configured simply as chain ports. The Edge port of the
Not checked
O-Chain Edge switch with lowest MAC address will
become the blocking port as long as the chain status is
healthy.
Does not configure a port of the daisy Chain as edge
Uncheck
port.
• The topology of a bridged network will be determined much more quickly compared to STP.
• RSTP is backward compatible with STP, making it relatively easy to deploy.
For example:
• Defaults to sending 802.1D style BPDUs if packets with this format are received.
• STP (802.1D) and RSTP (802.1w) can operate on different ports of the same switch, which is
particularly helpful when switch ports connect to older equipment such as legacy switches.
You get essentially the same functionality with RSTP and STP. To see how the two systems differ,
see section ‘Differences between STP and RSTP’ later in this chapter.
27
User Manual Managed Switches
NOTE: The STP protocol is part of the IEEE Std 802.1D, 2004 Edition bridge specification. The
following explanation uses “bridge” instead of “switch.”
STP (802.1D) is a bridge-based system that is used to implement parallel paths for network traffic.
STP uses a loop-detection process to:
• Locate and then disable less efficient paths (i.e., paths that have a lower bandwidth).
• Enable one of the less efficient paths if a more efficient path fails.
The figure below shows a network made up of three LANs separated by three bridges. Each segment
uses at most two paths to communicate with the other segments. Since this configuration can give
rise to loops, the network will overload if STP is NOT enabled.
L
A
N
Bridge B
1
Bridge A
L
A
N
Bridge C
2
L
A
N
If STP is enabled, it will detect duplicate paths and prevent, or block, one of the paths from forwarding
3
traffic. In the following example, STP determined that traffic from LAN segment 2 to LAN segment 1
should flow through bridges C and A since this path has a greater bandwidth and is therefore more
efficient.
L
A
N
1 Bridge B
Bridge A
L
A
N
Bridge C
2
L
A
N
3
What happens if a link failure is detected? As shown in next figure, the STP process reconfigures the
network so that traffic from LAN segment 2 flows through bridge B.
28
User Manual Managed Switches
L
A
N
1 Bridge B
Bridge A
L
A
N
Bridge C
2
L
A
N
STP will determine which path between each bridged segment is most efficient, and then assign a
3
specific reference point on the network. When the most efficient path has been identified, the other
paths are blocked. In the previous 3 figures, STP first determined that the path through bridge C was
the most efficient, and as a result, blocked the path through bridge B. After the failure of bridge C,
STP re-evaluated the situation and opened the path through Bridge B.
When enabled, STP determines the most appropriate path for traffic through a network. The way it
does this is outlined in the sections below.
STP Requirements
Before STP can configure the network, the system must satisfy the following requirements:
• All bridges must be able to communicate with each other. The communication is carried out
using Bridge Protocol Data Units (BPDUs), which are transmitted in packets with a known
multicast address.
• Each bridge must have a Bridge Identifier that specifies which bridge acts as the central
reference point, or Root Bridge, for the STP system—bridges with a lower Bridge Identifier are
more likely to be designated as the Root Bridge. The Bridge Identifier is calculated using the
MAC address of the bridge and a priority defined for the bridge. For example, the default priority
setting of Weidmüller switches is 32768.
• Each port has a cost that specifies the efficiency of each link. The efficiency cost is usually
determined by the bandwidth of the link, with less efficient links assigned a higher cost. The
following table shows the default port costs for a switch:
29
User Manual Managed Switches
STP Calculation
The first step of the STP process is to perform calculations. During this stage, each bridge on the
network transmits BPDUs. The following items will be calculated:
• Which bridge should be the Root Bridge. The Root Bridge is the central reference point from
which the network is configured.
• The Root Path Costs for each bridge. This is the cost of the paths from each bridge to the Root
Bridge.
• The identity of each bridge’s Root Port. The Root Port is the port on the bridge that connects to
the Root Bridge via the most efficient path. In other words, the port connected to the Root Bridge
via the path with the lowest Root Path Cost. The Root Bridge, however, does not have a Root
Port.
• The identity of the Designated Bridge for each LAN segment. The Designated Bridge is the
bridge with the lowest Root Path Cost from that segment. If several bridges have the same Root
Path Cost, the one with the lowest Bridge Identifier becomes the Designated Bridge. Traffic
transmitted in the direction of the Root Bridge will flow through the Designated Bridge. The port
on this bridge that connects to the segment is called the Designated Bridge Port.
STP Configuration
After all of the bridges on the network agree on the identity of the Root Bridge, and all other relevant
parameters have been established, each bridge is configured to forward traffic only between its Root
Port and the Designated Bridge Ports for the respective network segments. All other ports are
blocked, which means that they will not be allowed to receive or forward traffic.
STP Reconfiguration
Once the network topology has stabilized, each bridge listens for Hello BPDUs transmitted from the
Root Bridge at regular intervals. If a bridge does not receive a Hello BPDU after a certain interval (the
Max Age time), the bridge assumes that the Root Bridge, or a link between itself and the Root Bridge,
has ceased to function. This will trigger the bridge to reconfigure the network to account for the
change. If you have configured an SNMP trap destination, when the topology of your network
changes, the first bridge to detect the change will send out an SNMP trap.
RSTP is similar to STP, but includes additional information in the BPDUs that allow each bridge to
confirm that it has taken action to prevent loops from forming when it decides to enable a link to a
neighboring bridge. Adjacent bridges connected via point-to-point links will be able to enable a link
without waiting to ensure that all other bridges in the network have had time to react to the change.
The main benefit of RSTP is that the configuration decision is made locally rather than network-wide,
allowing RSTP to carry out automatic configuration and restore a link faster than STP.
STP Example
The LAN shown in the following figure has three segments, with adjacent segments connected using
two possible links. The various STP factors, such as Cost, Root Port, Designated Bridge Port, and
Blocked Port are shown in the figure.
30
User Manual Managed Switches
• Bridge A has been selected as the Root Bridge, since it was determined to have the lowest
Bridge Identifier on the network.
• Since Bridge A is the Root Bridge, it is also the Designated Bridge for LAN segment 1. Port 1 on
Bridge A is selected as the Designated Bridge Port for LAN Segment 1.
• Ports 1 of Bridges B, C, X, and Y are all Root Ports since they are nearest to the Root Bridge, and
therefore have the most efficient path.
• Bridges B and X offer the same Root Path Cost for LAN segment 2. However, Bridge B was
selected as the Designated Bridge for that segment since it has a lower Bridge Identifier. Port 2
on Bridge B is selected as the Designated Bridge Port for LAN Segment 2.
• Bridge C is the Designated Bridge for LAN segment 3, because it has the lowest Root Path Cost
for LAN Segment 3:
• The route through bridges C and B costs 200 (C to B=100, B to A=100)
• The route through bridges Y and B costs 300 (Y to B=200, B to A=100)
• The Designated Bridge Port for LAN Segment 3 is port 2 on bridge C.
31
User Manual Managed Switches
Bridge Setting
RSTP mode
Setting Description Factory Default
Priority
Setting Description Factory Default
Increase this device’s bridge priority by selecting a lower
Numerical value number. A device with a higher bridge priority has a
32768
selected by user greater chance of being established as the root of the
Spanning Tree topology.
Max. Age (sec)
32
User Manual Managed Switches
Port Setting
NOTE: We suggest not enabling the Spanning Tree Protocol once the port is connected to a device
(PLC, RTU, etc.) as opposed to network equipment. The reason is that it will cause unnecessary
negotiation.
Path Cost
33
User Manual Managed Switches
3.5.6.5 RSTP-Repeater
RSTP-repeater is a simple function to pass a BPDU packet directly from one RSTP device to another
as if they were directly connected.
Mode
Setting Description Factory Default
Enabled Enable the RSTP-repeater operation.
Disabled
Disabled Disable the RSTP-repeater operation.
Uplink Ports
Setting Description Factory Default
1st Uplink Port Select any port of the Switch according to the topology of Port 01
the network.
2nd Uplink Port Select any port of the Switch according to the topology of Port 02
the network.
Mode
Setting Description Factory Default
34
User Manual Managed Switches
Recovery Priority
Setting Description Factory Default
Select the priority (number from 1 to total number of
Not included, 1 to ports) of each port. The connected port with the highest
Not included
total number of ports priority (lowest number) will be the active one and the
others will be blocked.
When the Fast Recovery is Enabled, the page shows an additional text indicating the active port of
the switch. Besides the priority programmed, the switch will also consider the ports status to establish
the active port for the Fast Recovery. If a port is not connected (link down), it will never be the active
port regardless the priority programmed.
What is a VLAN?
A VLAN is a group of devices that can be located anywhere on a network, but which communicate as
if they are on the same physical segment. With VLANs, you can segment your network without being
restricted by physical connections—a limitation of traditional network design. With VLANs you can
segment your network according into:
• Departmental groups—You could have one VLAN for the marketing department, another for
the finance department, and another for the product development department.
• Hierarchical groups—You could have one VLAN for directors, another for managers, and
another for general staff.
• Usage groups—You could have one VLAN for email users and another for multimedia users.
Switch A
1 2 3 4 5 6 7 8
Benefits of VLANs
The main benefit of VLANs is that they provide a network segmentation system that is far more
flexible than traditional networks. Using VLANs also provides you with three other benefits:
• VLANs ease the relocation of devices on networks: With traditional networks, network
administrators spend most of their time dealing with moves and changes. If users move to a
35
User Manual Managed Switches
different subnetwork, the addresses of each host must be updated manually. With a VLAN setup,
if a host on VLAN Marketing, for example, is moved to a port in another part of the network, and
retains its original subnet membership, you only need to specify that the new port is on VLAN
Marketing. You do not need to carry out any re-cabling.
• VLANs provide extra security: Devices within each VLAN can only communicate with other
devices on the same VLAN. If a device on VLAN Marketing needs to communicate with devices
on VLAN Finance, the traffic must pass through a routing device or Layer 3 switch.
• VLANs help control traffic: With traditional networks, congestion can be caused by broadcast
traffic that is directed to all network devices, regardless of whether or not they need it. VLANs
increase the efficiency of your network because each VLAN can be set up to contain only those
devices that need to communicate with each other.
VLANs
Lite Advanced Line switches support port-based VLANs, what means that the user can define a
single VLAN for each available port on the switch.
Port
Setting Description Factory Default
36
User Manual Managed Switches
by assigning a connected device with a specific IP address stored in its internal memory. Each time
the connected device is switched on or rebooted, the Weidmüller switch sends the device the desired
IP address.
The DHCP Relay Agent makes it possible for DHCP broadcast messages to be sent over routers.
The DHCP Relay Agent enables DHCP clients to obtain IP addresses from a DHCP server on a
remote subnet, or those that are not located on the local subnet.
DHCP Mode
Factory
Setting Description
Default
37
User Manual Managed Switches
IP range of the Assigns the start and end IP addresses of the pool that
192.168.1.120 /
DHCP address will be used to set the IP address of more than one
192.168.1.200
pool DHCP clients.
Subnet Mask
Factory
Setting Description
Default
IP address of the
Subnet mask dynamically assigned to DHCP clients. 255.255.255.0
subnet mask
Gateway
Setting Description Factory
Default
DNS
Factory
Setting Description
Default
Lease time
Lease time of the Amount of time a network client will be allowed to use 168 hours
pool (hours) a dynamic IP address in the network.
38
User Manual Managed Switches
1st Server
IP address / VID Assigns the IP address and VID of the 1st DHCP 0.0.0.0 / 1
for the 1st server that the switch tries to access.
DHCP server
39
User Manual Managed Switches
2nd Server
Setting Description Factory Default
IP address / VID Assigns the IP address and VID of the 2nd DHCP 0.0.0.0 / 1
for the 2nd DHCP server that the switch tries to access.
server
3rd Server
Setting Description Factory Default
IP address / VID Assigns the IP address and VID of the 3rd DHCP 0.0.0.0 / 1
for the 3rd DHCP server that the switch tries to access.
server
4th Server
Setting Description Factory Default
IP address / VID Assigns the IP address and VID of the 4th DHCP 0.0.0.0 / 1
for the 4th DHCP server that the switch tries to access.
server
Type
Setting Description Factory
Default
Value
Setting Description Factory
Default
Max. 12 Displays the value that was set. Complete this field if Switch IP
characters type is set to Other. address
Display
Setting Description Factory Default
40
User Manual Managed Switches
Option 82
Setting Description Factory
Default
Enable or Disable Enable or disable the DHCP Option 82 function for this Disable
port.
NOTE: Port and IP binding will only be active if DHCP Server mode is enabled in the switch.
3.8 SNMP
Weidmüller managed Switches support SNMP V1, V2c, and V3. SNMP V1 and SNMP V2c use a
community string match for authentication, which means that SNMP servers access all objects with
read-only or read/write permissions using the community strings public and private by default. SNMP
V3 requires that you select an authentication level of MD5 or SHA, and is the most secure protocol.
You can also enable data encryption to enhance data security.
Supported SNMP security modes and levels are shown in the following table. Select the security
mode and level that will be used to communicate between the SNMP agent and manager.
41
User Manual Managed Switches
Protocol
UI Setting Authentication Encryption Method
version
V1, V2c Read Uses a community string
Community string No
SNMP V1, Community match for authentication.
V2c V1, V2c Write/Read Uses a community string
Community string No
Community match for authentication.
Uses an account with admin or
No-Auth No No
user to access objects
Provides authentication based
on HMAC-MD5, or
Authentication based HMAC-SHA algorithms.
MD5 or SHA No
on MD5 or SHA 8-character passwords are the
minimum requirement for
authentication.
SNMP V3 Provides authentication based
on HMAC-MD5 or HMAC-SHA
algorithms, and data
Data encryption key (DES or
Authentication based
MD5 or SHA encryption AES128). 8-character
on MD5 or SHA
key passwords and a data
encryption key are the
minimum requirements for
authentication and encryption.
These parameters are configured on the SNMP page. A more detailed explanation of each
parameter is given below the figure.
42
User Manual Managed Switches
Factory
Setting Description
Default
Factory
Setting Description
Default
Read Only
Read Only / Read (Public)
Specifies the privilege of each community string.
and Write Read and
Write (Private)
Up to four different sets of Community string / Privilege are supported in the switch.
SNMP V3 allows the user to create several groups of users and accesses with different levels of
security. Object IDs are associated with various levels of permissions and a single view can be
assigned to multiple objects. As a summary, in SNMP V3:
43
User Manual Managed Switches
Context Name
Factory
Setting Description
Default
Max. 32
A string identifying a user name. None
characters
Max. 32
A string identifying the name of the Group. None
characters
44
User Manual Managed Switches
Factory
Setting Description
Default
Max. 32 The name of the MIB View defining the MIB objects
None
characters for which this request may get the current values.
45
User Manual Managed Switches
Max. 32 The name of the MIB View defining the MIB objects
None
characters for which this request may set new values.
Max. 32 The name of the MIB View defining the MIB objects
None
characters which may be included in notification requests.
The buttons Add / Remove have to be used to create / delete Access Tables.
Factory
Setting Description
Default
Factory
Setting Description
Default
The buttons Add / Remove have to be used to create / delete MIB Views.
NOTE: At the end of this programming page is shown the Private MIB Information of the switch as
well as the Engine ID (if SNMP V3 is used).
46
User Manual Managed Switches
Server IP
Setting Description Factory
Default
Trap Version
Setting Description Factory
Default
After indicating the IP address of the trap server, the community name for authentication and the
SNMP trap version, we press the Add button.
All the configured trap servers are shown in the table Trap Server Profile of the web page.
47
User Manual Managed Switches
3.9 Security
Weidmüller Lite switches provide the possibility to enable/disable any possible access to the
management of the device and also provide the login option through Terminal Access Controller
Access-Control System Plus (TACACS+). The TACACS+ mechanism is a centralized “AAA”
(Authentication, Authorization and Accounting) system for connecting to network services.
48
User Manual Managed Switches
Secure IP List
Setting Description Factory
Default
NOTE: After programming IP addresses in the Secure IP List and before applying, be sure that the IP
address of the management PC is in the list. Otherwise the connection will be lost.
3.9.2 TACACS+
The detailed configuration settings of TACACS+ are displayed in the table below. As it can be seen in
the page below, up to five different TACACS+ servers can be configured in the switch.
49
User Manual Managed Switches
Server Configuration
Client Configuration
3.10 Warnings
Since industrial Ethernet devices are often located at the endpoints of a system, these devices will
not always know what is happening elsewhere on the network. This means that an industrial Ethernet
switch that connects to these devices must provide system maintainers with real-time alarm
messages. Even when control engineers are out of the control room for an extended period of time,
they can still be informed of the status of devices almost instantaneously when exceptions occur. The
Weidmüller switch supports different approaches to warn engineers automatically, such as email and
relay output. It also allows to store the log data of events both locally and in a SYSLOG server.
50
User Manual Managed Switches
Alarm event types can be divided into two basic groups: Power Failure and Port Link
Down/Broken.
You can configure which events are related to the relay output.
NOTE: The events that are configured to activate the relay output also activate the
amber light in the FAULT LED of the front-plate of the switch.
PWR 1 No power input in the first power supply module of the switch.
PWR 2 No power input in the second power supply module of the switch.
Port number The port is disconnected (e.g., the cable is pulled out, or the
opposing device shuts down).
51
User Manual Managed Switches
Event Types can be divided into two basic groups: System Events and Port Events. System Events
are related to the overall function of the switch, whereas Port Events are related to the activity of a
specific port.
NOTE: For each event the user can decide if a log is registered (SYSLOG) and/or if a
warning Email is sent (SMTP). It is necessary to Enable Syslog and/or SMTP in the
switch to have the possibility to select events in the Event selection page.
O-Ring Topology Change If the Master of the O-Ring has changed or the backup path is
activated.
O-Chain Topology Change If the configuration of the O-Chain has changed or the backup
path is activated.
Configuration Changed Any configuration item has been changed and saved.
and Saved
Disable Never.
Link Down The port is disconnected (e.g., the cable is pulled out, or the
opposing device shuts down).
52
User Manual Managed Switches
Mode
Mail Subject
Authentication
Max. of 45 You can set up to six email addresses to receive alarm None
characters emails from the Weidmüller switch.
53
User Manual Managed Switches
Mode
Server IP Address
3.11 Monitoring/Diagnosis
You can check the log register of the Weidmüller switch as well as troubleshoot network problems
with the Ping function.
Date The date is updated based on how the current date is set in the Basic Setting
menu (Time Setting page).
Time The time is updated based on how the current time is set in the Basic Setting
menu (Time Setting page).
54
User Manual Managed Switches
NOTE: The local Event Log Table is not stored in flash memory so is deleted when the
switch is rebooted. As explained, the user can save it as a .txt file using the Export
button.
3.11.2 Ping
The Ping function uses the ping command to give users a simple but powerful tool for
troubleshooting network problems. The function's most unique feature is that even though the ping
command is entered from the user's PC keyboard, the actual ping command originates from the
Weidmüller switch itself. In this way, the user can essentially sit on top of the Weidmüller switch and
send ping commands out through its ports.
To use the Ping function, type in the desired IP address, and then click Send Ping.
In the page is always indicated if the current configuration is saved to flash memory or not.
55
User Manual Managed Switches
The user has the possibility to restore to factory defaults but keeping the current IP address and
username / password settings.
In the page are shown the active (running) and alternate firmware images and the user can decide
which one should be taken for the reboot.
3.15 Logout
This option can be used to leave the Web Management of the switch.
56
User Manual Managed Switches
• Firmware Upgrades
• Private MIB files
• Documentation (User Manual and Hardware Installation Guide)
57
User Manual Managed Switches
58
User Manual Managed Switches
Packets Information
Port Tx Packets 0x2000~ 8192 Word 2 Eg. 0x44332211: Packet
amount = 44332211
Word 0 = 4433
Word 1 = 2211
Port Rx Packets 0x2100~ 8448 Word 2 Eg. 0x44332211: Packet
amount = 44332211
Word 0 = 4433
Word 1 = 2211
Port Tx Error 0x2200~ 8704 Word 2 Eg. 0x44332211: Packet
Packets amount = 44332211
Word 0 = 4433
Word 1 = 2211
Port Rx Error 0x2300~ 8960 Word 2 Eg. 0x44332211: Packet
Packets amount = 44332211
Word 0 = 4433
Word 1 = 2211
Redundancy Information
Redundancy 0x3000 12288 Word 1 0x0000: None
Protocol 0x0001: RSTP
0x0002: O-Ring
0x0003: O-Chain
RSTP Root 0x3100 12544 Word 1 0x0000: Not Root Bridge
0x0001: Root Bridge
RSTP Port 1 to 6 0x3200 12800 Word 1 0x0000: Port Disabled
Status 0x0001: Not RSTP Port
0x0002: Link Down
0x0003: Blocked
0x0004: Learning
0x0005: Forwarding
0xFFFF: RSTP Not Enable
O-Ring Master / 0x3300 13056 Word 1 0x0000: Slave
Slave 0x0001: Master
O-Ring 1st 0x3301 13057 Word 1 0x0002: Link Down
Port Status 0x0003: Blocked
0x0005: Forwarding
0xFFFF: Not Enabled
O-Ring 2nd 0x3302 13058 Word 1 0x0002: Link Down
Port Status 0x0003: Blocked
0x0005: Forwarding
0xFFFF: Not Enabled
Coupling Ring 0x3303 13059 Word 1 0x0000: Off
Enabled 0x0001: On
Coupling Port 0x3304 13060 Word 1 0x0002: Link Down
Status 0x0003: Blocked
0x0005: Forwarding
0xFFFF: Not Enabled
O-Chain Edge 0x3700 14080 Word 1 0x0000: Not Edge Switch
Switch 0x0001: Edge Switch
O-Chain 1st 0x3701 14081 Word 1 0x0002: Link Down
Port Status 0x0003: Blocked
0x0005: Forwarding
59
User Manual Managed Switches
60