Chapter 1 | Introduction ............................................................................................... | |
| Overview .............................................................................................................................. | |
| Package Checklist................................................................................................................. | |
| Features ................................................................................................................................ | |
| Industrial Networking Capability.............................................................................. | |
| Designed for Industrial Applications......................................................................... | |
| Useful Utility and Remote Configuration ................................................................. | |
| Recommended Software and Accessories................................................................. |
Getting Started .......................................................................................... | ||
| ||
| Configuration using a Telnet Console .................................................................................. | |
| Configuration using a Web Browser..................................................................................... | |
| Disabling Telnet and Browser Access .................................................................................. |
Featured Functions ................................................................................... | ||
| Configuring Basic Settings................................................................................................... | |
| System Identification................................................................................................. | |
| Password ................................................................................................................... | |
| Accessible IP............................................................................................................. | |
| Port ............................................................................................................................ | |
| Network..................................................................................................................... | |
| Time .......................................................................................................................... | |
| System File | |
| System File | |
| Factory Default........................................................................................................ | |
| Using Port Trunking ............................................................................................................ | |
| The Port Trunking Concept..................................................................................... | |
| Configuring Port Trunking...................................................................................... | |
| Configuring SNMP............................................................................................................. | |
| SNMP Read/Write Settings..................................................................................... | |
| Trap Settings ........................................................................................................... | |
| Private MIB information ......................................................................................... | |
| Using Communication Redundancy................................................................................... | |
| Gigabit Ethernet Redundant Ring Capability (< 300 ms) ....................................... | |
| The Turbo Ring Concept......................................................................................... | |
| Configuring Turbo Ring.......................................................................................... | |
| The STP/RSTP Concept.......................................................................................... | |
| Configuring STP/RSTP........................................................................................... | |
| Using Traffic Prioritization................................................................................................. | |
| The Traffic Prioritization Concept .......................................................................... | |
| Configuring Traffic Prioritization ........................................................................... | |
| Using Virtual LAN ............................................................................................................. | |
| The Virtual LAN (VLAN) Concept ........................................................................ | |
| Sample Applications of VLANs using MOXA | |
| Configuring Virtual LAN........................................................................................ | |
| Using Multicast Filtering.................................................................................................... |