6146A 1 FL SWITCH TX/TX for Twisted-Pair Backbone FL SWITCH FX/FX for Glass Fiber Backbone 01/2001 Data Sheet 6146A Product Description The FL SWITCH ... is an Ethernet switch, which is suitable for use in industrial environments. The switch supports both Ethernet with a transmission rate of 10 Mbps and Fast Ethernet with a transmission rate of 100 Mbps. Using the FL SWITCH ..., extensive Ethernet networks with a large number of devices can be installed in linear or ring topology. Features and fields of application – Increased network performance by filtering the data traffic - Local data traffic remains local - Amount of data in the network segments is reduced – Simple network expansion and network configuration – Coupling segments with different bit rates - Automatic detection of data transmission rates of 10 or 100 Mbps. – Increased availability through redundant ring structures and redundant coupling of network segments The FL SWITCH FX/FX has five Ethernet twisted-pair connections via RJ45 female connectors and two 100Base-FX multi-mode glass fiber connections via SC female connectors. Redundant Ethernet rings with fast reconfiguration times can be created using SC female connectors. The FL SWITCH TX/TX has seven Ethernet twisted-pair connections for 10BASE-T/ 100BASE-TX with RJ45 female connectors. Redundant Ethernet rings in 100Base-TX twisted-pair technology can be created using these switches. Both switch versions can be configured via Ethernet or locally via a V.24 interface. An integrated web server is available for configuration via the Ethernet network. Figure 1 Front view of the FL SWITCH FX/FX 6 2 7 F L S W I T C H F X / F X O r d . - N o . : 2 8 3 1 0 8 6 1 5 3 F A I L U S 2 + 2 4 V U S 1 + 2 4 V U S 1 S T A N D B Y 7 5 3 U S 2 R M 6 4 2 1 F A I L 4 S t a n d b y R M S T A N D B Y O N 2 1 0 0 . A 0 . 4 5 . 5 0 . A 1 . 7 7 V 2 4 6 1 4 6 A 0 0 1 6 1 4 6 0 0 0 0 10/100 BASE-T(X) Switch With Redundancy
108
Embed
Data Sheet FL SWITCH TX/TX - Steven EngineeringFL SWITCH TX/TX for Twisted-Pair Backbone FL SWITCH FX/FX for Glass Fiber Backbone Data Sheet 6146A 01/2001 Product Description The FL
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
FL SWITCH TX/TXfor Twisted-Pair Backbone
FL SWITCH FX/FXfor Glass Fiber Backbone
01/2001Data Sheet 6146A
10/100 BASE-T(X) Switch With Redundancy
Product Description
The FL SWITCH ... is an Ethernet switch, which is suitable for use in industrial environments. The switch supports both Ethernet with a transmission rate of 10 Mbps and Fast Ethernet with a transmission rate of 100 Mbps.
Using the FL SWITCH ..., extensive Ethernet networks with a large number of devices can be installed in linear or ring topology.
Features and fields of application
– Increased network performance by filtering the data traffic- Local data traffic remains local- Amount of data in the networksegments is reduced
– Simple network expansion and network configuration
– Coupling segments with different bit rates- Automatic detection of datatransmission rates of 10 or 100 Mbps.
– Increased availability through redundant ring structures and redundant coupling of network segments
The FL SWITCH FX/FX has five Ethernet twisted-pair connections via RJ45 female connectors and two 100Base-FX multi-mode glass fiber connections via SC female connectors. Redundant Ethernet rings with fast reconfiguration times can be created using SC female connectors.
The FL SWITCH TX/TX has seven Ethernet twisted-pair connections for 10BASE-T/ 100BASE-TX with RJ45 female connectors. Redundant Ethernet rings in 100Base-TX twisted-pair technology can be created using these switches. Both switch versions can be configured via Ethernet or locally via a V.24 interface. An integrated web server is available for configuration via the Ethernet network.
Figure 1 Front view of the FL SWITCH FX/FX
! " #
$ %
& ' ( ) *
6146A 1
FL SWITCH ...
Table of Contents
1 General Information .................................................................................................................6
Indicators, Interfaces, and Operating Elements2 Local Diagnostic and Status Indicators ...................................................................................7
3 Front View/Operating Elements/Slotsof the FL SWITCH TX/TX ........................................................................................................8
4 Front View/Operating Elements/Slotsof the FL SWITCH FX/FX ........................................................................................................9
5 Ethernet Interface for Twisted-Pair Cables (RJ45 Female Connector) ...................................10
5.1 General Functions .....................................................................................................10
5.2 Special Functions ......................................................................................................10
5.3 Pin Assignment of Crossover/1:1 Cables ..................................................................11
5.4 Connecting Cables Between Ethernet Components ..................................................12
8 Standby Port ............................................................................................................................19
8.1 General Functions .....................................................................................................19
Installation and Startup9 Installation ...............................................................................................................................20
9.1 Connecting the Supply Voltage ..................................................................................20
9.2 Connecting the Alarm Contact ...................................................................................21
9.3 Operating Elements ....................................................................................................22
21.4 Port .............................................................................................................................63
User Interface22 User Interface ..........................................................................................................................64
22.1 Operating the User Interface .....................................................................................64
22.2 Opening the User Interface ........................................................................................64
22.3 "System Parameter" Menu Item .................................................................................67
22.4 FW 3.0: "Switch Security" Menu Item ........................................................................68
22.5 FW 3.0: "Port Configuration" Menu Item ....................................................................69
22.6 "Configuration" Menu Item .........................................................................................70
22.7 "Update" Menu Item ...................................................................................................72
22.8 "Ping" Menu Item .......................................................................................................73
22.9 FW 2.0: "Password" Menu Item .................................................................................74
22.10 FW 3.0: "Password" Menu Item .................................................................................75
General30 Technical Data .......................................................................................................................104
31 Ordering Data ........................................................................................................................108
6146A 5
FL SWITCH ...
1 General Information
All information in this data sheet applies to both the FL SWITCH TX/TX and the FL SWITCH FX/FX. If the information only applies to one of the versions, this is indicated using (TX/TX) or (FX/FX).
Devices with firmware version 2.0 and version 3.0 are described in this data sheet. If the information only applies to one of the versions, this is indicated using (FW 2.0) or (FW 3.0).
WarningIf these instructions are not followed there is a danger of damage to equipment and/or serious personal injury. Only qualified personnel may start up and operate these devices. According to the safety instructions in this text, qualified personnel are persons who are authorized to start up, to ground and to mark devices, systems, and equipment according to the standards of safety technology. In addition, these persons must be familiar with all warning instructions and maintenance measures in this text.
WarningThe module is designed exclusively for SELV operation according to IEC 950/EN 60950/VDE 0805.
ShieldingThe shielding ground of the connected twisted-pair cables is electrically connected with the front plate. When connecting network segments, avoid ground loops, potential transfers, and voltage equalization currents using the braided shield.
ESDThe modules are fitted with electrostatically sensitive components. Exposure to electric fields or charge balancing on contact may damage or adversely affect the life of the modules. The following protective measures must be taken when using electrostatically sensitive modules:
Create an electrical equipotential bonding between yourself and your surroundings, e.g., using an ESD wristband, which is connected to the grounded DIN rail on which the module will be mounted.
HousingOnly authorized Phoenix Contact personnel are permitted to open the housing. The ventilation outlets must not be covered over, to allow the air to circulate freely. The minimum distance to the ventilation outlets of the casing must be 10 cm..
6 6146A
FL SWITCH ...
2 Local Diagnostic and Status Indicators
Des. Color Status Meaning
US1 Green ON Supply voltage 1 for the electronics module in the tolerance zone
OFF Supply voltage 1 is less than 18 V DC
US2 Green ON Supply voltage 2 for the electronics module in the tolerance zone
OFF Supply voltage 2 is less than 18 V DC
FAIL Red ON Alarm contact open, i.e., an error has occurred
OFF Alarm contact closed, i.e., an error has not occurred
Standby Green ON Standby function activated
OFF Standby function deactivated
RM Green/yellow
ON(green)
Redundancy manager function activated, redundant port is not active
ON(yellow)
Redundancy manager function activated, redundant port is active
OFF Redundancy manager function deactivated
1 to 7 Green/yellow
These LEDs indicate the status of the corresponding port:
ON(green)
Valid connection
Flashing(1 Hz)green
Port switched to standby
Flashing(3 Hz)green
Port switched off, network connection still present (a device is connected)
Short flashes (yellow)
Receiving data
Chasing light
Initialization phase after cold restart
OFF No valid connection
6146A 7
FL SWITCH ...
3 Front View/Operating Elements/Slotsof the FL SWITCH TX/TX
5 Ethernet Interface for Twisted-Pair Cables (RJ45 Female
Connector)
5.1 General Functions
The switch has five (FX/FX) or seven (TX/TX) Ethernet interfaces on the front in RJ45 format with MDI-X pin assignment, to which only Ethernet twisted-pair cables according to standard IEEE 8802.3 100BASE-TX/10BASE-T with an impedance of 100 Ω can be connected. Symmetrical, full duplex data transmission is possible via the Receive Data (RD+/RD-) and Transmit Data (TD+/TD-) signals.
Each port can be set to autonegotiation mode (with automatic setting of the data transmission rate) or to operation with a data transmission rate of 10 Mbps or 100 Mbps.Terminal devices or independent network segments can be connected to the five ports. By default, autonegotiation is activated for port 1 to port 5.
5.2 Special Functions
Cable monitoring: The FL SWITCH ... uses link test pulses according to standard IEEE 802.3 at regular intervals to test the connected twisted-pair cable segments for short circuits/interrupts and to test the availability of connected devices. A connected device that is switched off, and interfaces that are not being used, are considered line interrupts.The switch does not send any data telegrams to TP/TX segments from which it does not receive a link test pulse.
Auto polarity exchange: The polarity is changed automatically if a pair of receiving cables (RD+ and RD-) are connected incorrectly.
Figure 4 Pin assignment of the Ethernet ports in RJ45 format
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
$ !
$ !
!
!
( .
( .
( .
( .
10 6146A
FL SWITCH ...
5.3 Pin Assignment of Crossover/1:1 Cables
Figure 5 Pin assignment of crossover/1:1 cables
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
( .
( .
( .
( .
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
( .
( .
( .
( .
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
( .
( .
( .
( .
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
( .
( .
( .
( .
6146A 11
FL SWITCH ...
5.4 Connecting Cables Between Ethernet Components
To connect Ethernet components (structure components or terminal devices) with one another, crossover cables (C/O) or 1:1 wired cables (1:1) are required. In general, 1:1 wired cables are required between structure components and terminal devices, whereas crossover cables are used for connections between two structure components and for connections between two terminal devices. To distinguish between the two cable types, green bending protection bushings should be used for crossover cables, and gray bending protection bushings for 1:1 wired cables. The cables required between the corresponding components from Phoenix Contact are specified in the following table.
The 100 Mbps ports 6 and 7 are made from multi-mode glass fiber (SC female connections) and enable the creation of a backbone. Both ports must be configured to 100 Mbps full duplex operation (default) for the creation of redundant structures. However, the SC ports also support half duplex operation. According to standard IEEE 802.3, the switch monitors the connected optical fiber cables for interrupts.
6.2 General Functions (FL SWITCH TX/TX)
The 10/100 Mbps ports 6 and 7 are in RJ45 format and enable the creation of a backbone. Both ports must be configured to 100 Mbps full duplex operation (default) for the creation of a redundant Ethernet ring. However, ports 6 and 7 also support half duplex operation, the auto polarity function, and autonegotiation.
6.3 Linear Structure
The switches enable the creation of backbones in linear structures. Cascading is enabled via backbone ports.
Figure 6 Linear structure
9 - & . : 9 - & . : 9 - & . : 9 - & . : 9 - & . :
'
6146A 13
FL SWITCH ...
6.4 Redundant Ring Structure
The open ends of the backbone in the linear structure illustrated in Figure 6 can be connected to form a redundant ring structure using the redundancy manager (RM) function.
Connect the two free ports of the terminal devices together and switch one of the switches to redundancy manager mode, i.e. "RM" DIP switch to the "ON" position.
If any subsection fails, the ring structure, which contains up to 50 switches, is changed back to a linear structure in less than 500 ms. An error is also reported by the alarm contact.
Figure 7 Redundant ring structure (example)
The following configuration is required for ports 6 and 7 in the redundant ring structure: 100 Mbps; full duplex "ON" and autonegotiation "OFF" (corresponds to the default upon delivery). One of the "RM" DIP switches must also be in the "ON" position.
9 - & . : 9 - & . : 9 - & . : 9 - & . : 9 - & . :
! ! "
'
$ + 2 ( ' ( . *5 ' ( ' 4 +
14 6146A
FL SWITCH ...
6.5 Redundant Coupling of Segments:
TP/TX network segments can be coupled redundantly using the built-in redundancy logic of the switch (see Figure 7). A second network segment can be connected via two separate paths, each with a switch pair. The switch in the redundant path is set to standby mode via the DIP switch. The switch for the redundant path and the switch for the main path indicate their relevant operating states via a control line (crossed twisted-pair cable).
The two switches, which are connected to the main path and the redundant path (secondary path) in the coupled network, do not have to be connected with one another via a control line.
Ensure that the switch for the redundant path is switched to "Standby" mode using the DIP switch.
Ensure that the switch for the redundant path that is in "Standby" mode is not also the redundancy manager in a redundant ring.
In the event of a failure in the main path, data transmission is continued via the redundant switch in less than 500 ms. Once the main path is OK again, transmission is automatically switched back to this path and the redundant path is disabled.
Ensure that port 1 is always used for the redundant coupling of network segments.
6146A 15
FL SWITCH ...
Figure 8 Redundant coupling of network segments (example)
1) Crossed twisted-pair cable2) Use port 1 for the redundant coupling of rings for the main and secondary paths
9 - & . : 9 - & . : 9 - & . : 9 - & . : 9 - & . :
"
( & 33 - ( + 6
% ' - ( / ' & : + . ( ' * / ' & : ( & 33 - ( +
% ' - ( / ' & : + . ( ' * / ' & :
" " #
% ' 1 & + % ' 1 & + 3 ' , + 3 ' , +
6
6 6
6 6
16 6146A
FL SWITCH ...
6.6 Pin Assignment of the Crossed Standby Cable
Figure 9 Pin assignment of the crossed standby cable
Please note that the maximum cable length of the standby cable is 100 m (328 ft.) (at 10 Ω/100 m [328 ft.]) or 70 m (229 ft.) (at 15 Ω/100 m [328 ft.]).
7 V.24 Communication Interface for External Management
7.1 General Functions
A local communication connection can be established with an external management station using the V.24 interface in RJ45 format. The connection is established on a PC via a VT 100 terminal or a HyperTerminal under Windows NT and enables access to the user interface (UI).
FW 2.0: After system startup, the V.24 interface operates at a data transmission rate of 19200 baud. The following baud rate is also supported: 9600 baud.The VT 100/HyperTerminal is parameterized as follows:Speed 19200 baud Handshake OFF
Data 8 bits Parity None
Stop bit 1 bit Protocol XON/XOFF
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
( .
( .
( .
( .
! $ % & ' (
! $ % & ' (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
( .
( .
( .
( .
6146A 17
FL SWITCH ...
FW 3.0: After system startup, the V.24 interface operates at a data transmission rate of 9600 baud.The VT 100/HyperTerminal is parameterized as follows:
Data cannot be transmitted via the network if the user interface is being
used by Telnet. The UI can be enabled again with the "Exit" command.
7.2 XON/XOFF Protocol
The XON/XOFF protocol operates with a software handshake. Data transmission is controlled by the XON and XOFF characters. If the module receives an XOFF, no more V.24 data will be sent until an XON is received. Transmission is not dependent on the CTS input.
Figure 10 Pin assignment for the V.24 interface in RJ11 format
The housing for the RJ11 female connector is electrically connected with the front plate of the device. The signal lines are electrically isolated from the supply voltage and the front plate (isolation voltage 60 V, maximum). Secure the braided shield of the terminal line to the front plate of the module using the grounding screw.
Speed 9600 baud Handshake OFF
Data 8 bits Parity None
Stop bit 1 bit Protocol XON/XOFF
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
( .
< !
$
$
18 6146A
FL SWITCH ...
8 Standby Port
8.1 General Functions
The control line for the "Redundant coupling of network segments" mode of FL SWITCH ... rings is connected to the standby port in RJ45 format. The housing for the RJ45 female connector is electrically connected with the front plate of the device. The OUT+ and OUT- outputs are electrically isolated from the housing and the operating voltage using relay contacts.
Figure 11 Pin assignment of the standby interface (port 1)
Please note that redundant coupling between network segments is always carried out via port 1.
Please note that the maximum cable length of the standby cable is 100 m (328 ft.) (at 10 Ω/100 m [328 ft.]) or 70 m (229 ft.) (at 15 Ω/100 m [328 ft.]).
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
8 - (
( .
( .
( .
( .
! $ % &
6146A 19
FL SWITCH ...
9 Installation
The switch must only be installed or uninstalled when the supply voltage is disconnected.
The 24 V supply voltage and the alarm contact are connected via the 5-pos. terminal block with screw interlock on the front. Loosen the interlocking screw and remove the terminal block to connect the cables. The switch is connected to the ground potential via a separate grounding screw.
The switch is designed for SELV operation according to IEC 950/EN 60950/VDE 0805. Only SELV according to defined standards may be used to supply and connect the alarm contact.
9.1 Connecting the Supply Voltage
The 24 V supply voltage can be connected redundantly. Both voltage inputs are electrically isolated from one another and the housing. For redundant voltage supplies (number 2) only the higher of the two voltages powers the switch. The load is not distributed.
For non-redundant voltage supplies, the switch indicates the failure of the supply voltage via the alarm contact. This error message can be prevented, if power is supplied in parallel to both terminals, as illustrated in Figure 12, number 1.
Figure 12 Example connection of the voltage supply and alarm contact
) * + , - - -
) * + , - - -
!
!
!
20 6146A
FL SWITCH ...
9.2 Connecting the Alarm Contact
The alarm contact monitors the operation of the switch and thus enables remote diagnostics. The alarm contact is electrically isolated and is closed during correct operation. A malfunction is indicated if the contact is interrupted. The alarm contact can be connected as shown in Figure 12 or it can be supplied from an independent power supply.
Error States Indicated by the Alarm Contact
Error states independent of the operating mode:
– The failure of at least one of the two supply voltages.
– Permanent malfunctions in the switch (internal 3.3 V power outside the tolerance zone, supply voltage 1/2 ≤18 V).
– Indication of an error during the selftest.
– The faulty link status of at least one port. Indication of the link status for each port can be masked by the management station.
Connection monitoring is not activated by default.
Error states specific to normal mode:
– Short circuit in the control line.
– Partner device is in normal mode.
Error states specific to standby mode:
– Short circuit in the control line.
– Control line interrupt.
– Partner device is in standby mode.
Error states specific to redundancy manager mode:
– Ring monitoring is not possible (e.g., during software initialization).
6146A 21
FL SWITCH ...
9.3 Operating Elements
The standby function (standby switch) or the redundancy manager function (RM switch) can be activated or deactivated using the two-line DIP switch on the front panel. Both functions are deactivated when the switches are at "0" (default upon delivery).
Only activate one of the functions, either standby or redundancy manager. If both functions are activated at the same time, the device is automatically reset.
Figure 13 Two-line DIP switch
9.4 Standby Switch
The standby switch is set to "0" during normal operation (default upon delivery). For the redundant coupling of 10/100 Mbps network segments, the switch in the redundant path operates in standby mode (switch position "1").
Please note that redundant coupling between network segments is always carried out via port 1.
9.5 RM Switch
The RM switch, which is used to activate the redundancy manager function is set to "0" during normal operation (default upon delivery). The switch must be set to position "1" to activate the RM function.
The redundancy manager may only be activated for one device in a redundant Ethernet ring.
$ % & ' ( ) *
$ + 2 ( ' ( . * 5 ' ( ' 4 + $ + 2 ( ' ( . * 5 +
22 6146A
FL SWITCH ...
10 Startup
10.1 Basic Settings
IP addresses must be assigned during initial startup of the switch. The switch offers two options:
– Configuration with BootP
– Input using the V.24 interface
The IP address can be entered via a BootP server.
The "Factory Manager" Ethernet configuration software from Phoenix Contact can be used as a BootP server.
10.2 Assigning an IP Address Using the Factory Manager
The IP address is assigned using the universally unique MAC address set by the manufacturer. The Factory Manager provides two different options:
Manually Entering the MAC Address
– Open the Add Ethernet Device dialog box (see Figure 14) by clicking on , by selecting "Add Device" from the Device View context menu or by using the Ctrl+A key combination.
– Enter the desired data under "Description" and "TCP/IP Address".
– Activate the "BootP Parameter" by clicking on "Reply to BootP Requests".
– Enter the MAC address. The MAC address can be found on the front panel (top center).
– Save the configuration settings and restart the device.
6146A 23
FL SWITCH ...
The device now resends a BootP request and receives the specified IP parameters from the BootP server (see Figure 16, message highlighted in gray).
Figure 14 Add Ethernet Device dialog box in the Factory Manager
24 6146A
FL SWITCH ...
BootP
– Ensure that the network scanner and the BootP server have been started.
– Connect the device to the network and the supply voltage. Ensure that only the new device has been restarted.
– The BootP request for the new device triggered by the device restart/reset appears in the Factory Manager message window. Select the relevant message.
– Click on the BootP message for the device or on using the right mouse button.
– Enter the relevant data in the Add Ethernet Device dialog box (see Figure 15).
– Save the configuration settings and restart the device.
The device now resends a BootP request and receives the specified IP parameters from the BootP server (see Figure 16, message highlighted in gray).
Figure 15 Add Ethernet Device dialog box in the Factory Manager
6146A 25
FL SWITCH ...
Figure 16 Requesting and resetting the IP parameters
26 6146A
FL SWITCH ...
10.3 Assigning an IP Address Using the Bootstrap Protocol (BootP)
If the Factory Manager BootP server is not used, the following should be noted when using another BootP server:
A BootP server should provide the following information for a switch (lines marked by # are comment lines):
Lines under "global:" make the configuration of several devices for one subnetwork more efficient. The global configuration data (tc=.global:) is assigned to each device using the template (tc). Hardware and IP addresses are directly assigned in the device lines (switch_01, etc.).
– Enter a line for each device.
– Enter the hardware address (MAC address) of the device under "ha=".
– Enter the IP address of the device under "ip=".
6146A 27
FL SWITCH ...
10.4 Flowchart
During startup the FL SWITCH ... receives the relevant configuration data as shown in the following flowchart.
Figure 17 Flowchart for the BootP process
The switch saves the configuration data from the BootP process in its non-volatile flash memory.If three BootP requests are made after a restart without a response and configuration data is already available in the flash memory, the switch uses this data and aborts the BootP request.
The BootP function must not be deactivated when entering the IP parameters via BootP (see User Interface Settings page 67).
10.5 Setting the IP Addresses Using the V.24 Interface
The following figure shows the systematic sequence for setting IP addresses (see also "Assigning IP Addresses" on page 30).
Figure 18 Flowchart: Setting the IP address
An IP address must be set during initial switch installation. A VT100 terminal or a corresponding emulation (e.g. Windows HyperTerminal) is required.The IP address can be set before final installation because it is saved in the non-volatile memory of the switch.
To set the address, connect the V.24 female connector (in RJ11 format) to a VT100 terminal or the HyperTerminal under Windows NT 4.0 with the following transmission parameters:Speed FW 2.0: 19200 baud/FW 3.0: 9600 baud Handshake OFF
The IP address is a 32-bit address, which consists of a network part and a user part. The network part consists of the network class and the network address.There are currently five defined network classes; classes A, B, and C are used in modern applications, while classes D and E are hardly ever used. It is therefore usually sufficient if a network device only "recognizes" classes A, B, and C.
Figure 19 Location of the bits within the IP address
The network class is represented by the first bits for the binary representation of the IP address. The key factor is the number of "ones" before the first "zero". The assignment of classes is shown in the following table. The free cells in the table are not relevant to the network class and are used for the network address.
The bits for the network class are followed by those for the network address and the user address. Depending on the network class, a different number of bits are available, both for the network address (network ID) and the user address (host ID).
IP addresses can be represented in decimal or hexadecimal form. In decimal form, bytes are separated by dots (dotted decimal notation) to show the logical grouping of the individual bytes.
Bit 1 Bit 2 Bit 3 Bit 4 Bit 5
Class A 0
Class B 1 0
Class C 1 1 0
Class D 1 1 1 0
Class E 1 1 1 1 0
Network ID Host ID
Class A 7 bits 24 bits
Class B 14 bits 16 bits
Class C 21 bits 8 bits
Class D 28-bit multicast identifier
Class E 27 bits (reserved)
" - & " - &
30 6146A
FL SWITCH ...
The decimal points do not divide the address into a network and user address. Only the value of the first bits (before the first "zero") specifies the network class and the number of remaining bits in the address.
Possible Address Combinations
Figure 20 Structure of IP addresses
. $ $
$ / $
$ 0 $
0 $
. $
' 1 + , +
, +
, +
' 1 +
' 1 +
+ ! 2 2 3 4 " 5
! 2 2 5 5 4
6
6
6
6
6
4 6 - 6 - 6 - 6 . - - -
4 0 - 6 - 6 - 6 7 - - -
4 7 - 6 - 6 - 6 # - - -
4 - 6 - 6 - 6 # 7 - - -
4 8 6 - 6 - 6 - 6 . - - -
6146A 31
FL SWITCH ...
11.1 IP Special Addresses for Special Applications
Certain IP addresses are reserved for special functions. The following addresses should not be used as standard IP addresses.
127.x.x.x Addresses
The class A network address "127" is reserved for a loop-back function on all computers, regardless of the network class. This loop-back function may only be used on networked computers for internal test purposes.
If a telegram is addressed to a computer with the value 127 in the first byte, the receiver immediately sends the telegram back to the sender.
The correct installation and configuration of the TCP/IP software, for example, can be checked in this way.
The first and second layers of the ISO/OSI model are not included in the test and should therefore be tested separately using the ping function.
Value 255 in the Byte
Value 255 is defined as a broadcast address. The telegram is therefore sent to all the computers that are in the same part of the network. Examples include 004.255.255.255, 198.2.7.255 or 255.255.255.255 (all the computers in all the networks). If the network is divided into subnetworks, the subnet masks must be observed during calculation, otherwise some devices may be omitted.
0.x.x.x Addresses
Value 0 is the ID of the specific network. If the IP address starts with a zero, the receiver is in the same network. For example, 0.2.1.1 refers to device 2.1.1 in this network.
The zero previously signified a broadcast address. If older devices are used, an unauthorized broadcast and the complete overload of the entire network (broadcast storm) may be triggered when using the IP address IP0.x.x.x.
12 Subnet Masks
Routers and gateways divide large networks into subnetworks. The IP addresses for individual devices are assigned to specific subnetworks by the subnet mask. The network part of an IP address is not modified by the subnet mask. An extended IP address is generated from the user address and subnet mask. Because the masked subnetwork is only recognized by the local computer, all the other devices view this extended IP address as a standard IP address.
32 6146A
FL SWITCH ...
12.1 Structure of the Subnet Mask
The subnet mask always contains the same number of bits as an IP address. The subnet mask has the same number of bits (in the same position) set to "one", which is reflected in the IP address for the network class.
Example: An IP address from class A contains a 1-byte network address and a 3-byte PC address. Therefore, the first byte of the subnet mask may only contain "ones".
The remaining bits (three bytes) then contain the address of the subnetwork and the PC. The extended IP address is created when the bits for the IP address and the bits for the subnet mask are ANDed. Because the subnetwork is only recognized by local devices, the corresponding IP address appears as a "normal" IP address to all the other devices.
12.2 Application
If the ANDing of the address bits gives the local network address and the local subnetwork address, the device is located in the local network. If the ANDing gives a different result, the data telegram is sent to the subnetwork router.
Example for a class B subnet mask:
Using this subnet mask, the TCP/IP protocol software differentiates between the devices that are connected to the local subnetwork and the devices that are located in other subnetworks.
Example: Device 1 wants to establish a connection with device 2 using the above subnet mask. Device 2 has IP address 59.EA.55.32.
IP address display for device 2:
E
! + . - 5 ' 3 ( & ' & - (
" - ( ' * ( & ' & - (
2 ) ( + & 5 ' 1 > ) - & 1 3 ' 1 1 "
E 7
+ ? ' + . - 5 ' 3 ( & ' & - (
" - ( ' * ( & ' & - (
6146A 33
FL SWITCH ...
The individual subnet masks and the IP address for device 2 are then ANDed bit-by-bit by the software to determine whether device 2 is located in the local subnetwork.
ANDing the subnet mask and IP address for device 2:
After ANDing, the software determines that the relevant subnetwork (01) does not correspond to the local subnetwork (11) and the data telegram is transferred to a subnetwork router.
13 tftp Server for Software Update
The operating system for the FL SWITCH ... is stored in a non-volatile flash memory. After connecting the supply voltage, the switch is booted from the flash. An active tftp (trivial file transfer protocol) server must be available on the connected network so that software updates can be carried out via tftp server.
The switch requires the following information for software updates:
– The IP address of the tftp server or the IP address for the gateway to the tftp server.
– The exact path for the new operating system on the tftp server.
The "Factory Manager" Ethernet configuration software from Phoenix Contact can be used as a tftp server.
The following steps must be carried out at the tftp server:
1 Create a directory for the new switch operating system.
2 Copy the new operating system to the corresponding directory on the server.
3 Set up the tftp process (described in detail in the following section).
13.1 Setting Up the tftp Process
General requirements:
1 The IP address of the tftp server or the gateway must be known to the switch.
2 The TCP/IP stack with tftp is installed on the tftp server.
2 ) ( + & 5 ' 1 >
8 ' + 1 1
$ + 1 2 3 & ' ; & + ! - ( 4
!
2 ) ( + & 9 >
34 6146A
FL SWITCH ...
Please note that the following sections are divided according to the operating systems and applications.
SunOS and HP
First, check whether the tftp demon (background task) is running,. i.e., the /etc/inetd.conf file contains the following lines and the process status is "IW":
If this process is not entered or is only entered as a comment line (with the # prefix), modify the /etc/inetd.conf file where necessary and reinitialize the INET demon. The "kill -1 PID" command must be executed, where PID is the process ID of "inetd". Reinitialization is triggered automatically by entering the following UNIX command line:
Additional information about the tftp demon can be accessed using the "man tftpd" UNIX command. Please note that the tftp demon is not always displayed using the "ps" command, even when it is running.
Special Features of HP Workstations
Enter the user "tftp" in the "/etc/passwd" file during installation on an HP workstation. Example:
Test the tftp process (see the following flowchart), for example with:
tftp:*:510:20:tftp server:/usr/tftpdir:/bin/false
tftp User identification
* Displayed in the password field
510 Example for the user number
20 Example for the group number
tftp server Freely defined, meaningful designation
/bin/false Mandatory entry (login shell)
cd /tftpboot/switch
tftp <tftp-Servername>
get switch/switch.bin
Response when the process is running: Received
rm switch.bin
36 6146A
FL SWITCH ...
13.2 Flowchart for tftp Server Check for SunOS and HP
Figure 21 Flowchart for tftp server check for SunOS and HP
The agent requires read access rights to the tftp directory, which contains the FL SWITCH ... software.
Example for a tftp server under Unix:Once the FL SWITCH ... software has been installed, the following directory structure should be provided on the tftp server with the specified access rights:
d = directory; r = read; w = write; x = execute
1st character refers to d (directory);2nd to 4th characters refer to the access rights of the user5th to 7th characters refer to the access rights of the user groups8th to 10th characters refer to the access rights of all others
14 HyperTerminal With Windows NT 4.0
1 Start the "HyperTerminal" program.
Figure 22 HyperTerminal start window under Windows NT 4.0
File Name (Example) Rights
switch_03.bin 444-r--r--r--
38 6146A
FL SWITCH ...
Enter a name for the new connection and select an icon.Click on "OK".
Figure 23 "Dial-Up Connection" under Windows NT 4.0
FW 2.0: Select the port and click on "OK".
Figure 24 FW 2.0: Settings window for the selected port under Windows NT 4.0
FW 3.0: Select the port and click on "OK".
6146A 39
FL SWITCH ...
Figure 25 FW 3.0: Settings window for the selected port under Windows NT 4.0
Enter the settings and click on "OK".
40 6146A
FL SWITCH ...
15 System Monitors
The operating system can be updated via V.24 or tftp using the system monitors.
For operating system updates, the use of system monitor 2 is preferred.
15.1 Operating System Update (System Monitor 1)
System monitor 1 updates the operating system for the switch via the V.24 communication interface. The corresponding screen contains the following options:
– 1 Update Operation System
– 2 Start Operation System
– 3 Change Baudrate
– 4 End
Screen in System Monitor 1
Figure 26 Screen when booting
Press the <1> key within one second to start the system monitor.
6146A 41
FL SWITCH ...
Figure 27 Screen for system monitor 1
"1 Update Operation System" Menu
The operating system is updated via this menu. The following window is displayed:
Figure 28 Screen for operating system update
!
"
# $ % "
& ' ( ! ) ) * + , ,
- " . - / &
"
42 6146A
FL SWITCH ...
Press <ESC> to exit the screen and return to the main menu of the system monitor.Press <RETURN> to start the update with XMODEM. The following window is displayed:
Figure 29 Screen at the start of the operating system update
Enter the path of the directory, which contains the new operating system. Enter the path using the terminal program, e.g., under "Transfer: Binary File". Transfer is started. After transfer has been completed, the operating system is restarted.
"2 Start Operation System" Menu
Enter the number "2", to start the operating system. System monitor 1 is closed and the operating system is started with 9600 baud.
"3 Change Baudrate" Menu
The baud rate can be changed using this menu item. The maximum possible transmission rate should be selected for an operating system update. Adapt the transmission rate for your terminal program to this baud rate. The following window is then displayed:
/ # ) ' ) ' # 0 ! $ % " 1 -
. $ % " 2 0
. $ % " 0
. $ % " 0
. $ % " 0
. $ % " 0
6146A 43
FL SWITCH ...
Figure 30 Screen when changing the baud rate
"4 End" Menu
This menu item closes system monitor 1. The following window is displayed:
Figure 31 Screen when closing system monitor 1
Perform a hardware reset.
( !
3 , !
3 !
4 !
2 5 , !
6
44 6146A
FL SWITCH ...
16 Software Update (System Monitor 2)
The switch operating system can be updated via V.24 and tftp using system monitor 2. The corresponding screen contains the following options:
– 1 Software Update V24
– 2 Software Update TFTP
– 3 Cancel automatic update
– 4 Change Baudrate
– 5 Set Factory Settings
– 6 Reset
– 7 End/Quit
The following screen is displayed when booting the switch with 9600 baud:
Screen in System Monitor 2
Figure 32 Screen when booting
Press the <2> key within 3 seconds. System monitor 2 is started.
6146A 45
FL SWITCH ...
Figure 33 Screen for system monitor 2
"Software Update V24" Menu
The operating system is updated in the flash memory of the switch via this menu. The update is via V.24.
For operating system updates, the use of tftp transmission is preferred. It is considerably faster than the fastest V.24 transmission rate.
) #
) # . 7 .
0 ' ! 0 !
!
2 7 0
, -
5 " 1 8 !
46 6146A
FL SWITCH ...
The following window is then displayed:
Figure 34 Screen when updating the operating system
Press <ESC> to exit the screen and return to the main menu of system monitor 2.Press <RETURN> to start the update with XMODEM. The following window is displayed:
Figure 35 Screen at the start of the operating system update
E
# $ % "
& ' ( ! ) ) * + , ,
- " . - / $ % "
"
/ # ) ' ) ' # 0 ! $ % " 1 -
. $ % " 2 0
. $ % " 0
. $ % " 0
. $ % " 0
. $ % " 0
6146A 47
FL SWITCH ...
Enter the path of the directory, which contains the new operating system. Enter the path using the terminal program, e.g., under "Transfer: Binary File". Transfer is started. After transfer has been completed, the operating system is restarted.
"Software Update TFTP" Menu
The operating system is updated in the flash memory of the switch via this menu item. The update is via tftp.
"Cancel Automatic Update" Menu
Use this menu item to cancel an automatic software update that has already begun.
"Change Baudrate" Menu
The baud rate can be changed using this menu item.
"Set Factory Setting" Menu
The settings for the device can be returned to the default upon delivery using this menu item. All SNMP MIB variables, excluding the IP parameters, are set to their default values.
"Reset" Menu
The device is reset using this menu item.
"End/Quit" Menu
Close system monitor 2 with this menu item. The management software is started.
48 6146A
FL SWITCH ...
17 Frame Switching
The FL SWITCH ... operates in store and forward mode. When receiving a data packet, the switch analyzes the source and destination
addresses. The switch stores up to 2000 addresses with an aging time of 30 seconds in its address table.
17.1 Store and Forward
All data telegrams that are received by the switch are saved and their validity is checked. Invalid or faulty data packets (>1522 bytes or CRC errors) and fragments (<64 bytes) are rejected. Valid data telegrams are forwarded by the switch.
17.2 Multi-Address Function
The switch learns all the source addresses for each port. Only packets with:
– Unknown addresses
– A source address for this port
– A multicast/broadcast address
are transferred to the address field via the corresponding port. The switch can learn up to 2000 addresses. This is important when more than one terminal device is connected to one or more ports. It means that several independent subnetworks can be connected to one switch.
17.3 Learning Addresses
The FL SWITCH ... learns the addresses for terminal devices, which are connected via a port, by evaluating the source addresses in the data telegram. When the FL SWITCH ... receives a data telegram, it only forwards this data telegram to the port that connects to the specified device.
The switch can learn up to 2000 addresses and stores them in a table. The switch monitors the age of the read addresses. The switch automatically deletes address entries from its address table that have exceeded a specific age (30 seconds, aging time).
Learned entries are deleted on a restart.
6146A 49
FL SWITCH ...
17.4 Prioritizing
The switch supports two priority queues (traffic classes according to IEEE 802.1D). Data telegrams that are received are assigned to these classes according to their priority, which is specified in the VLAN tag:
– Data packets with values between "0" and "3" in the priority field are low priority.
– Data packets with values between "4" and "7" in the priority field are high priority.
– All data packets with VLAN tags that contain a broadcast, multicast or an unknown address as the destination address are classed as low priority.
This function prevents delays in high-priority data transmission, due to large amounts of low-priority data traffic. Low-priority traffic is rejected when the memory or data channel is overloaded.
17.5 Tagging
For VLAN and prioritizing functions, standard IEEE 802.1 Q requires that the VLAN tag is included in a MAC data frame. The VLAN tag consists of four bytes and is entered between the source address field and the type field.The switch evaluates the three-bit priority field within the VLAN tag in data packets that contain the VLAN tag. The MAC frame is transferred by the switch without modifications.
18 Hardware Functions
18.1 Diagnostics
On a restart, the switch executes a hardware selftest. In the event of an error during the selftest, the alarm contact is opened. During operation, an integrated watchdog monitors the cyclic execution of the software program. If the watchdog is not cyclically triggered by the software, the alarm contact is opened.
18.2 Autonegotiation
Autonegotiation is a function whereby the switch automatically recognizes the operating parameters for the connected network and sets the corresponding parameters (10 Mbps / 100 Mbps data transmission rate and half/full duplex transmission mode) for its RJ45 ports. Automatic port setting eliminates the need for manual intervention by the user. The autonegotiation function can be activated/deactivated via the web interface.
50 6146A
FL SWITCH ...
18.3 Auto Polarity Exchange
The polarity is changed automatically by the switch if a pair of twisted-pair receiving cables (RD+ and RD-) are connected incorrectly.
18.4 Cable Monitoring
Twisted-pair: The switch uses link test pulses according to standard IEEE 802.3 at regular intervals to monitor the connected TP/TX cable segments for short circuits and interrupts.
Ports that are not being used are considered line interrupts. In addition, a TP/TX path to a deactivated terminal device is also considered a line interrupt, as the connected device cannot send a link test pulse because it is switched off.
Optical fiber (FX/FX): According to standard IEEE 802.3, the switch monitors the connected optical fiber cables for interrupts.
6146A 51
FL SWITCH ...
18.5 Reset
The switch is reset by the following events:
– Management intervention
– Both input voltages are below the supply voltage tolerance limit
– The watchdog was not triggered
– The RM and standby DIP switches are both set to position "1" (ON).
– After a reset, a selftest and initialization are carried out on a restart.
52 6146A
FL SWITCH ...
19 Web-Based Management
The switch supports both SNMP management and web-based management and therefore offers:
– Comprehensive diagnostics and configuration options for startup
– Comprehensive network and device information
With the user-friendly web-based (hypertext) interface, it is possible to manage the switch from anywhere on the network using a standard browser. The web browser is a universal access tool and can be used to directly communicate with the switch via the HTTP protocol. It also provides graphically supported configuration of the switch.
Netscape Navigator/Communicator version 4.x or later and Microsoft Internet Explorer version 4.x or later can be used as standard browsers. If the Phoenix Contact Factory Manager is used as an Ethernet configuration tool, the required browser is already integrated.
20 Opening the Web-Based Interface
The web-based interface uses the "JavaTM Runtime Environment version 1.2" plug-in. If this is not installed on your computer, the installation routine is automatically called up via the Internet when the web-based interface is started for the first time. Installation may, unfortunately, take some time.
For Windows NT users: Interrupt the installation that was automatically started. Install the plug-in from the CD-ROM, which is supplied with each switch. It is installed by launching the "jre1_ ...xxx... .exe" program in the "Java" directory on the CD-ROM.
Carry out the following steps to open the web-based interface:
– Start the web browser.
– Ensure that JavaScript and Java are enabled on your browser.
– To establish communication with the switch, enter the IP address for the switch in the address window of the browser, as follows:http://xxx.xxx.xxx.xxxExample:http:// 192.168.197.3
6146A 53
FL SWITCH ...
The (FW 2.0) login window is displayed.
Figure 36 The FW 2.0 login window
The (FW 3.0) login window is displayed.
Figure 37 The FW 3.0 login window
Select the desired language. The password "public" is entered in the password field in the login window. This password provides read-only access.
If you require read and write access to the switch, highlight the contents of the password field and overwrite it with "private".
Click on <OK>.
& ( 9 : 3 $ , ; -
$ + 3 + ' 1 +
8 ' 1 1 9 H H H H H H
' ( 4 2 ' 4 + 7 ( 4 3 - 1 :
1
& ( 9
$ + 3 + ' 1 +
8 ' 1 1 9 H H H H H H
' ( 4 2 ' 4 + 7 ( 4 3 - 1 :
1
54 6146A
FL SWITCH ...
The website for the switch is then displayed.
Figure 38 FL SWITCH ... website
6146A 55
FL SWITCH ...
21 Operating the Web Interface
After entering the correct password, the switch website is displayed. The website is divided vertically in two parts:
– Information section (left)
– Configuration section (right)
The configuration section contains two tabs:
– "System" and "Port".
21.1 Information Section
Figure 39 Information section of the web-based interface
56 6146A
FL SWITCH ...
21.2 Areas of the Information Section
The information section is divided into the alarm, recording, system, device representation, and updating areas.
Alarm
The alarm window provides information about the alarm status of the switch.
Figure 40 The alarm window
Recording
This window of the website displays the history of the switch. Because the history is generated by an applet of the web browser, the history can only be displayed during the runtime of the applet.
Figure 41 The history display
Icon FunctionFlashing light Indicates an alarm.
Loudspeaker Switches an audible alarm message on/off (soundcard required).
Clock Displays the start time for the previous alarm.
Question mark Displays the location of the previous alarm.
Icon FunctionBomb Records the alarm signal of the agent.
Radio mast Records the availability of the agent.
6146A 57
FL SWITCH ...
System
Figure 42 System parameters
Icon FunctionContact for this device.
Name of the device.
Location of the device.
The time the device was started.
Status of power supply unit 1.
Status of power supply unit 2.
Standby function for the device:
"normal" - standard switch function
"standby active" - The main path for this network segment has failed and thisswitch has transferred communication between the segmentsto the redundant path.
"standby passive" -The main path between the network segments is OK,this switch is passive.
58 6146A
FL SWITCH ...
Device Representation
This areas shows a picture of the device and the precise designation of the device.
Figure 43 Representation of the device with designation
Update
This window of the website indicates how many seconds remain until the applet updates the data for the switch. The applet automatically updates the data every 100 seconds.All data is immediately updated by clicking on "Update".
The following configuration settings can be made in the System tab:
– Configure network
– Change system information
– Set Boot mode
– FW 3.0: Connection mirroring
– Load/save configuration
– Execute software update
– Change password
6146A 61
FL SWITCH ...
Set Boot Mode
If "Load Configuration when Booting" is selected from the start, the saved configuration is loaded for each restart.
If "No" is selected, the "Load Configuration when Booting" line is grayed out and the check box is removed. The default settings are loaded on the next startup.
Load/Save Configuration
This window provides the user with the option of saving a defined configuration.
This configuration can be reloaded
– automatically on a restart
– after a restart with the default configuration
The path for storing the configuration data is displayed in the "URL" line and refers to the local flash memory.
FW 3.0: Connection Mirroring
Up to two ports can be selected in this menu whose receive data is transferred to all the remaining ports. Communication between two or more devices can be monitored at any port for the switch. The devices are connected either directly or indirectly via a hub to these two ports. By using an analysis function it is now possible to filter and carry out a detailed analysis of the data packets that belong to a communication relationship.
Execute Software Update
The complete path specification for the update file is required before an update can be executed.
Enter the path specification in the "URL" field and click on "Update".
Example of a path specification: tftp://192.168.76.214/Switch/flswitch.bin
FW 2.0: Change Password
Enter the new password in the "New Password" line. Enter the password again in the next line for confirmation.
FW 3.0: Change Password
Enter the previous password in the "Old Password" line. Enter the new password in the "New Password" line. Enter the password again in the next line for confirmation.
62 6146A
FL SWITCH ...
21.4 Port
Select either single port representation or representation of all ports in the Port tab. Various icons have been used to provide important information at a glance.
Icon Meaning
The port is enabled and the communication connection is OK.
The port has been disabled by either management or the redundant control system, but is still connected to the network.
A port can only be enabled if it is released by the management or the redundant control system.
The port is enabled, but the physical connection has been broken.
The port is off and the physical connection has been broken.
The switch is not available, an incorrect password has probably been entered.
The alarm message, triggered by a connection error, is switched off.
The alarm message, triggered by connection error, is switched on.
Port is in full duplex operation.
Port is in half duplex operation.
6146A 63
FL SWITCH ...
22 User Interface
The user interface offers the user menu-led operation of various management agent functions:
The following menu items can be selected:
– System Parameter
– FW 3.0: Switch Security
– FW 3.0: Port Configuration
– Configuration
– Update
– Ping
– Password
22.1 Operating the User Interface
1. The cursor can be moved using the arrow keys or the tab key.
2. Press the space bar to switch between specified variables in a selection field.
3. Changes to the settings only take effect when the cursor is in the "Apply" field and Enter is pressed.
4. The bottom line contains help about the selected item.
5. To exit the user interface, select "Logout" in the main menu and press Enter.
22.2 Opening the User Interface
When the management agent has been connected to the VT100 terminal (see also "HyperTerminal With Windows NT 4.0" on page 38), press any key to display the window for entering the password. Enter the password (default upon delivery "private"), and please note that it is case-sensitive. The preset password can be modified in the user interface or by using the web interface.
64 6146A
FL SWITCH ...
Figure 47 FW 2.0: Login screen for the user interface
Figure 48 FW 3.0: Login screen for the user interface
9 0 3 , 4 , 2
& 0 7 9 # 0
: 0 ; & 0 < ( = >
? ' ' @
7 9 A B . = - '
# + C D
9 0 3 , 4 , 2
& 0 7 9 # 0
: 0 ; & 0 < ( = >
? ' ' @
7 9 A B . = - '
# + C D
6146A 65
FL SWITCH ...
The main menu is displayed after the password is entered (default upon delivery "private").
Figure 49 FW 2.0: Main menu
Figure 50 FW 3.0: Main menu
! 3 , 4 , 2
& 0 7 9 # 0
) !
#
9 < .
! 3 , 4 , 2
& 0 7 9 # 0
# 0 0 !
) !
) !
#
9 < .
66 6146A
FL SWITCH ...
22.3 "System Parameter" Menu Item
This menu carries out the following functions:
– Display of the MAC address
– Execution of a restart
– Activation/deactivation of BootP
It is also used to enter:
– IP address
– Subnet mask
– Gateway IP address.
Figure 51 "System Parameter" menu
IP Address
Enter the IP address of the management agent. Upon delivery, the address is 0.0.0.0.
Subnet Mask
If you working in a network with subnetworks, you can enter the subnet mask for the subnetwork to which your management agent is connected. Upon delivery, the IP address is 0.0.0.0.
3 , 4 , 2
& 0 7 9 # 0
B ?
! ( 6
% ) ! ' < #
? ?
.
-
@ ' )
? B / " / ? 9 E
+ C 3 , 4 , 2 D
+ C 2 2 2 2 D
+ C D
+ + ? + 2 + 4 + 2 + 2
+ " ( '
+
6146A 67
FL SWITCH ...
Gateway IP Address
Enter the IP address of the gateway, which the management agent will use to address other subnetworks. If no gateway is available, this entry can be omitted. Upon delivery, the IP address is 0.0.0.0.
MAC Address
This field indicates the MAC address (universally unique) of the device.
Restart
Select the reset line to execute a reset. By pressing the space bar, the reset setting changes from "no reset" to "reset". After confirmation using "APPLY", the switch executes a restart.
22.4 FW 3.0: "Switch Security" Menu Item
Figure 52 "Switch Security" menu
The "Switch Security" menu is used to enable or disable the Loading of the web interface. Enabling web interface loading does not affect the use of passwords.
# 0 0 ! 3 , 4 , 2
& 0 7 9 # 0
? B / " / ? 9 E
A ( + " ( '
/ +
. ! ' ( ' ' " ( ' % ( '
' ) A ( B ) 0
68 6146A
FL SWITCH ...
22.5 FW 3.0: "Port Configuration" Menu Item
Figure 53 "Port Configuration" menu
The ports can be configured individually in this menu. Enter the port number and press "RETURN".
State: "Enable" switches the port on, "Disable" switches the port off.
Set Speed: "autonegotiate" activates the automatic selection of the transmission type and speed.
This submenu provides the option of saving a configuration defined by the user. This configuration can be loaded
– automatically on a restart
– after a restart with the default configuration
In this menu, you can determine which configuration setting is active after a restart:
– "Disable" loads the default configuration
– "Enable" loads the configuration defined by the user
Changes made in the window are applied using "APPLY".
@ 1 9 ) ! 3 , 4 , 2
& 0 7 9 # 0
- 9 ) 0 ) ! ) ' + : + ) + 1 1 3 , 4 1 0 ) ;
C ) + 1 1 3 , 4 , 1 ) ( 1 # 0 1 0 ) D
? B / " / ? 9 E
@ 1 9 0 ) ! +
9 ' 0 ' 0 ) ! ) +
0 ) '
( '
. @ ! 0 ! B 0 ) ! ? 9 E # 0 ) @
. ' ' 0 ' @ B 0 ) ! ? 9 E # 0 ) '
. @ B 0 ) ! ( @ - 9 ? 9 E # @
. ' B 0 ) ! ) ( @ - 9 ? 9 E # '
" ( ' 0 ) ! ' @ 0 ) ! )
70 6146A
FL SWITCH ...
Storing the Configuration Data
The path for storing the configuration data can be specified using the "Save/Load Configuration" line.
* tftp cannot create new files. Therefore create a corresponding empty file on your tftp server before saving the configuration to this URL. Enter the path of this file in the "URL" line.
Example: To save data on an tftp server:
– Open a new file in an editor.
– Save the empty file in the corresponding path of the tftp server with the desired file name, e.g., switch/switch_01.cfg.
– Enter the path of the tftp server in the "URL" line, e.g., tftp://192.168.156.77/switch/switch_01.cfg.
– Accept the changes using "APPLY".
The configuration file you have created contains the password in addition to all the configuration data. Therefore note the access rights to your tftp server.
config-load: The data is loaded from the flash memory.
config-save: The data is written to the flash memory.
load-remote The data is loaded from the specified URL.
save-remote The data is written to the specified URL. *
6146A 71
FL SWITCH ...
22.7 "Update" Menu Item
Figure 55 "Update" menu
The correct path specification to the update file is required before an update can be executed.
Enter the correct path in the "URL of update file" field and press Enter.
In the "Reset" line, select whether the switch should execute a restart immediately after loading the update or at a later point in time.
The update is loaded using "APPLY". The update becomes active after a restart.
The "Ping" menu is used to check the availability of another power supply unit.
Enter the IP address of the desired device in the "IP Address of host" field and press Enter.
The reply from the desired device is called using "APPLY".
Depending on the availability of the device, the answer is:
Host aliveHost not alive
3 , 4 , 2
& 0 7 9 # 0
B ? ) + C 3 , 4 3 3 D
? B / " / ? 9 E
@ ' B ? ? 9 E
6146A 73
FL SWITCH ...
22.9 FW 2.0: "Password" Menu Item
To protect your switch from unauthorized access, change the password in this submenu:
– Enter your new password in the "New Password" field and press Enter.
– Enter your password again in the "Re-type Password" field and press Enter.
– To accept the new password, select "APPLY" and press Enter.
– So that the new password is available again after a restart, save this configuration with "APPLY".
# 3 , 4 , 2
& 0 7 9 # 0
C D
C D
? B / " / ? 9 E
/ # # +
- # +
74 6146A
FL SWITCH ...
22.10 FW 3.0: "Password" Menu Item
To protect your switch from unauthorized access, change the password in this submenu:
– Enter you current password in the "Old Password" field.
– Enter your new password in the "New Password" field and press Enter.
– Enter your password again in the "Re-type Password" field and press Enter.
– To accept the new password, select "APPLY" and press Enter.
– So that the new password is available again after a restart, save this configuration with "APPLY".
'
# 3 , 4 , 2
& 0 7 9 # 0
C D
C D
C D
? B / " / ? 9 E
' # +
/ # # +
- # +
6146A 75
FL SWITCH ...
23 SNMP Traps (SNMP Event Messages)
If unusual events occur during normal operation of the switch, they are reported to the management station immediately. This is achieved using traps (event messages). The event-oriented traps are alarm messages, which bypass polling (cyclic scanning of data stations). These traps ensure quick responses to critical states.
Example of critical states are:
– Hardware reset
– Basic device/configuration changes
– Port segmentation
Traps can be sent to different hosts to increase the transmission reliability. A trap message consists of a data telegram, which is not acknowledged.
The management agent sends traps to every host, which is entered in the trap destination table. The trap destination table can be configured via SNMP using the management agent.
List of SNMP traps
The coldStart alarm message is sent on every boot process.
The "Factory Manager" Ethernet configuration software from Phoenix Contact can be used as a SNMP receiver. The trap configuration can be set up in the Factory Manager (Set Destination Table) in the "Diagnostics" tab (under "Properties").
SNMP Trap Meaning
authenticationFailure Sent if a station attempts to access an agent without authorization
coldStart Send during both a cold and warm start, during booting, and after successful management initialization
linkDown Sent if the connection to a port is interrupted
linkUp Sent if the connection to a port is established again
pxcPowerSupply Sent if the status of the power supply changes
pxcSignallingRelay Sent if the status of the alarm contact changes
pxcStandby Sent if the operating status of the switch changes
risingAlarm Sent if an alarm input exceeds its upper threshold
fallingAlarm Sent if an alarm input falls below its lower threshold
76 6146A
FL SWITCH ...
24 Management Information Base MIB
The Management Information Base MIB is created as an abstract tree structure.
The branching points are the object classes. The MIB "leaves" are known as generic object classes.
Instantiation of the generic object classes, which means mapping the abstract structure to reality, is carried out, for example, by entering the port or the source address, if this is required for clear identification.
These instances are assigned values (integer, TimeTicks, counter or octet string), which can be read and also changed. The object description or the object ID (OID) indicates the object class. They are instantiated using the subidentifier (SID).
Example:
The generic object class
pxcPSState (OID = 1.3.6.1.4.1.4346.14.1.2.1.3)
is the description of the abstract information "power supply unit status". However, a value cannot be read from it and it is not yet clear which power supply unit is referred to.
By entering the subidentifier (2), this abstract information is mapped to reality, instantiated, and indicates the operating state of power supply unit 2. This instance is assigned a value, which can be read. The instance "get 1.3.6.1.4.1.4346.14.1.2.1.3.2" delivers the answer "1", which means that the power supply unit is ready-to-operate.
Here are some of the abbreviations used in the MIB:
Comm Group access right
Con Configuration
Descr Description
Fan Fan
ID Identifier
Lwr Lower (e.g., limit value)
PS Power supply (voltage)
Pwr Power supply (current)
sys System
UI User interface
Upr Upper (e.g., limit value)
ven Vendor
6146A 77
FL SWITCH ...
24.1 Definition of Syntax Terms Used:
Integer Whole number from 0-232
IP address xxx.xxx.xxx.xxx (xxx = whole number from 0-255)
MAC address 12-digit hexadecimal number according to ISO/IEC 8802-3
PSID Power supply identification (number of the power supply unit)
TimeTicks Stop time, elapsed time = (value/100) in secondsvalue = whole number from 0-232
Type field 4-digit hexadecimal number according to ISO/IEC 8802-3
Timeout Time in hundredths of a second, time = whole number from 0-232
Counter Whole number (0-232), whose value increases by one if certain eventsoccur.
78 6146A
FL SWITCH ...
24.2 Tree Structure of the MIB
Figure 57 Tree structure of the MIB
Not all devices support all object classes. If an unsupported object class is requested, "not supported" is generated. If an attempt is made to change an unsupported object class, the message "badValue" is generated.
1 * 1 & + 5
- ( & + ; ' . + 1
' &
- /
- . 5 /
& . /
2 /
1 ( 5 /
1 ( 5 / ! & % ' 2 % <
5 4 5 &
5 - )
- ( & + ( + &
- 1
4
/ - , ' & +
+ ( & + / - 1 + 1
/ : + ( - ? ( & ' . &
/ ? . ( ; - 4 2 ' & - (
E
6146A 79
FL SWITCH ...
25 MIB II
25.1 System Group (1.3.6.1.2.1.1)
The system group has mandatory characters for all systems. It contains system-related objects. If an agent does not have a value for a variable, the response is a string with length 0.
(1) system
– (1) sysDescr
– (2) sysObjectID
– (3) sysUpTime
– (4) sysContact
– (5) sysName
– (6) sysLocation
– (7) sysServices
sysDescr
sysObjectID
OID 1.3.6.1.2.1.1.1.0
Syntax Octet string (size: 0-255)
Access Read
Description A textual description of the entry. The value should contain the full name and version number of- Type of system hardware - Operation system software- Network software
The description may only consist of ASCII characters that can be printed.
OID 1.3.6.1.2.1.1.2.0
Syntax Object identifier
Access Read
Description The authorization identification for the manufacturer of the network management subsystem, which is integrated in this device. This value is located in the SMI enterprises subtree (1.3.6.1.4.1) and describes which type of device is being managed. For example: if the manufacturer "Phoenix Contact GmbH" is assigned subtree 1.3.6.1.4.1.4346, it can then assign its jumper the identifier 1.3.6.1.4.1.4346.2.1.
80 6146A
FL SWITCH ...
sysUpTime
sysContact
sysName
sysLocation
OID 1.3.6.1.2.1.1.3.0
Syntax TimeTicks
Access Read
Description The time in hundredths of seconds since the last network management unit reset.
OID 1.3.6.1.2.1.1.4.0
Syntax Octet string (size: 0-255)
Access Read and write
Description The textual identification of the contact person for these managed nodes and information on how this person can be contacted.
OID 1.3.6.1.2.1.1.5.0
Syntax Octet string (size: 0-255)
Access Read and write
Description A name for this node assigned by the administrator. According to the agreement, this is the fully qualifying name in the domain.
OID 1.3.6.1.2.1.1.6.0
Syntax Octet string (size: 0-255)
Access Read and write
Description The physical location of this node (e.g. "Hall 1, 3rd floor").
6146A 81
FL SWITCH ...
sysServices
OID 1.3.6.1.2.1.1.7.0
Syntax Integer (0-127)
Access Read
Description This value indicates the number of services that this device offers. It is the sum of several calculations. For every layer of the OSI reference model, there is a calculation in the form of (2 L-1), where L indicates the layer.For example:A node, which primarily executes routing functions has the value (2 3-1) = 4.A node, which is a host and provides application services has the value (2 4-1) + (2 7-1) = 72.
82 6146A
FL SWITCH ...
25.2 Interface Group (1.3.6.1.2.1.2)
The interface group contains information about device interfaces.
25.3 Address Translation Group (1.3.6.1.2.1.3)
The address translation group has mandatory characters for all systems. It contains information about the address assignment.
The internet control message protocol group has mandatory characters for all systems. It contains information about error treatment and control in Internet data traffic.
25.6 Transfer Control Protocol Group (1.3.6.1.2.1.6)
The transfer control protocol group has mandatory characters for all systems that implement TCP. Instances for objects, which provide information about a specific TCP connection, apply for as long as the connection is established.
25.8 Simple Network Management Protocol Group (1.3.6.1.2.1.11)
The simple network management protocol group has mandatory characters for all systems. In SNMP devices, which are optimized to support either a single agent or a single management station, some of the listed objects will be written with the value "0".
This part of the MIB continuously provides the network management with up-to-date and historical network component data. The configuration of alarms and events controls the evaluation of network component counters. Depending on the configuration, the result of the evaluation is reported to the management station by the agents using traps. The following groups are supported:
- statistics
- history
- alarm
- event
26.1 FW 3.0: Statistics (1.3.6.1.2.1.16.1)
This MIB group contains information about e.g., the number of unicast, multicast or broadcast telegrams, telegram rate and distribution or the number of faulty telegrams classified according to error types.
The statistics group contains information about network load and quality.
The alarm group requests statistical values and compares them with the specified limit values. If a value is above or below the limit value, an alarm and a trap are generated.