0
登录后你可以
  • 下载海量资料
  • 学习在线课程
  • 观看技术视频
  • 写文章/发帖/加入社区
会员中心
创作中心
发布
  • 发文章

  • 发资料

  • 发帖

  • 提问

  • 发视频

创作活动
2702906

2702906

  • 厂商:

    PHOENIX(菲尼克斯)

  • 封装:

  • 描述:

    网络 交换机 - 托管型 16 个端口 IP20

  • 数据手册
  • 价格&库存
2702906 数据手册
Configuration of the FL SWITCH 2000 and FL NAT 2000 product family User manual User manual Configuration of the FL SWITCH 2000 and FL NAT 2000 product family UM EN SW FL SWITCH 2000, Revision 01 2020-07-07 108998_en_01 This user manual is valid for: Designation Order No. Designation Order No. FL SWITCH 2005 FL SWITCH 2008 FL SWITCH 2008F FL SWITCH 2016 FL SWITCH 2105 FL SWITCH 2108 FL SWITCH 2116 FL SWITCH 2205 FL SWITCH 2208 FL SWITCH 2208C FL SWITCH 2208 PN FL SWITCH 2207-FX FL SWITCH 2207-FX SM FL SWITCH 2206-2FX FL SWITCH 2206C-2FX FL SWITCH 2206-2FX SM FL SWITCH 2206-2FX ST FL SWITCH 2206-2FX SM ST FL SWITCH 2206-2SFX FL SWITCH 2206-2SFX PN FL SWITCH 2204-2TC-2SFX FL SWITCH 2216 FL SWITCH 2216 PN FL SWITCH 2214-2FX FL SWITCH 2214-2FX SM FL SWITCH 2214-2SFX FL SWITCH 2214-2SFX PN FL SWITCH 2212-2TC-2SFX FL SWITCH 2308 FL SWITCH 2308 PN 2702323 2702324 1106707 2702903 2702665 2702666 2702908 2702326 2702327 1095627 1044024 2702328 2702329 2702330 1095628 2702331 2702332 2702333 2702969 1044028 2702334 2702904 1044029 2702905 2702906 1006188 1044030 2702907 2702652 1009220 FL SWITCH 2306-2SFP FL SWITCH 2306-2SFP PN FL SWITCH 2304-2GC-2SFP FL SWITCH 2316 FL SWITCH 2316 PN FL SWITCH 2314-2SFP FL SWITCH 2314-2SFP PN FL SWITCH 2312-2GC-2SFP FL SWITCH 2408 FL SWITCH 2408 PN FL SWITCH 2406-2SFX FL SWITCH 2406-2SFX PN FL SWITCH 2404-2TC-2SFX FL SWITCH 2416 FL SWITCH 2416 PN FL SWITCH 2414-2SFX FL SWITCH 2414-2SFX PN FL SWITCH 2412-2TC-2SFX FL SWITCH 2508 FL SWITCH 2508 PN FL SWITCH 2506-2SFP FL SWITCH 2506-2SFP PN FL SWITCH 2504-2GC-2SFP FL SWITCH 2516 FL SWITCH 2516 PN FL SWITCH 2514-2SFP FL SWITCH 2514-2SFP PN FL SWITCH 2512-2GC-2SFP FL NAT 2008 FL NAT 2208 FL NAT 2304-2GC-2SFP 2702970 1009222 2702653 2702909 1031673 1006191 1031683 2702910 1043412 1089133 1043414 1089126 1088853 1043416 1089150 1043423 1089139 1088875 1043484 1089134 1043491 1089135 1088872 1043496 1089205 1043499 1089154 1088856 2702881 2702882 2702981 PHOENIX CONTACT GmbH & Co. KG • Flachsmarktstraße 8 • 32825 Blomberg • Germany phoenixcontact.com Table of contents Table of contents 1 2 3 4 For your safety ...........................................................................................................................5 1.1 Identification of warning notes ............................................................................... 5 1.2 Qualification of users ............................................................................................. 5 1.3 Product changes ................................................................................................... 5 Startup and function ...................................................................................................................7 2.1 Delivery state/factory settings................................................................................ 7 2.1.1 Initial IP configuration in the delivery state ............................................. 7 2.1.2 Configuration in the delivery state .......................................................... 8 2.2 Using Smart mode................................................................................................. 9 2.2.1 Entering Smart mode ............................................................................. 9 2.2.2 Selecting the desired setting .................................................................. 9 2.2.3 Possible operating modes in Smart mode .............................................. 9 2.2.4 Exiting Smart mode .............................................................................. 10 2.2.5 Operation in Universal mode ................................................................ 10 2.2.6 Operation in PROFINET mode ............................................................. 10 2.2.7 Operation in EtherNet/IP mode ............................................................ 10 2.2.8 Operation with default IP address ........................................................ 11 2.2.9 Reset IP configuration .......................................................................... 11 2.2.10 Operation in Unmanaged mode ........................................................... 11 2.3 Assigning IP parameters via BootP...................................................................... 12 2.3.1 Assigning the IP address using FL NETWORK MANAGER BASIC ....................................................... 12 2.3.2 Assigning the IP address using IPAssign.exe ...................................... 14 Frame switching .......................................................................................................................17 3.1 Store and forward ................................................................................................ 17 3.2 Multi-address function ......................................................................................... 17 3.2.1 Learning addresses ............................................................................. 17 3.2.2 Prioritization ......................................................................................... 18 Configuration and diagnostics in web-based management ......................................................19 108998_en_01 4.1 Requirements for the use of WBM....................................................................... 19 4.2 Functions/information in WBM............................................................................. 20 4.2.1 Description of the header ..................................................................... 21 4.2.2 WBM information area ......................................................................... 22 4.2.3 WBM configuration area ...................................................................... 27 4.2.4 WBM diagnostics area ......................................................................... 63 PHOENIX CONTACT 3 / 122 Product designation 5 LACP – Link Aggregation Control Protocol ..............................................................................73 6 SNMP – Simple Network Management Protocol .....................................................................75 7 LLDP – Link Layer Discovery Protocol .....................................................................................79 8 Multicast Filtering .....................................................................................................................83 9 Virtual Local Area Network – VLAN ..........................................................................................85 10 Operation as a PROFINET device ...........................................................................................89 10.1 Preparing the switch for PROFINET operating mode .......................................... 89 10.2 Switch as a PROFINET device ............................................................................ 90 10.2.1 Configuration in the engineering tool .................................................... 90 10.2.2 Configuring the switch as a PROFINET device .................................... 91 10.2.3 Configuration via the engineering tool .................................................. 91 10.2.4 Device naming ..................................................................................... 97 10.2.5 Operating in the PROFINET environment ............................................ 97 10.3 PROFINET alarms............................................................................................... 98 10.3.1 Alarms in WBM .................................................................................... 98 10.4 Process data communication .............................................................................. 99 10.4.1 Control word/status word ..................................................................... 99 10.4.2 Other cyclic process data ..................................................................... 99 10.5 PDEV function description................................................................................. 100 11 Layer 3 functions – routing and NAT ......................................................................................101 A 11.1 Factory default................................................................................................... 101 11.2 Creating interfaces ............................................................................................ 101 11.3 Static routing ..................................................................................................... 103 11.4 Configuration of 1:1 NAT ................................................................................... 104 11.5 Configuration of virtual NAT............................................................................... 106 11.6 Configuration of IP masquerading ..................................................................... 107 11.7 Configuration of port forwarding ........................................................................ 108 11.8 Application examples ........................................................................................ 110 Appendix for document lists....................................................................................................113 4 / 122 PHOENIX CONTACT A1 List of figures ..................................................................................................... 113 A2 List of tables ...................................................................................................... 117 A3 Index.................................................................................................................. 119 108998_en_01 For your safety 1 For your safety Read this user manual carefully and keep it for future reference. 1.1 Identification of warning notes This symbol indicates hazards that could lead to personal injury. There are three signal words indicating the severity of a potential injury. DANGER Indicates a hazard with a high risk level. If this hazardous situation is not avoided, it will result in death or serious injury. WARNING Indicates a hazard with a medium risk level. If this hazardous situation is not avoided, it could result in death or serious injury. CAUTION Indicates a hazard with a low risk level. If this hazardous situation is not avoided, it could result in minor or moderate injury. This symbol together with the NOTE signal word warns the reader of actions that might cause property damage or a malfunction. Here you will find additional information or detailed sources of information. 1.2 Qualification of users The use of products described in this user manual is oriented exclusively to: – Electrically skilled persons or persons instructed by them. The users must be familiar with the relevant safety concepts of automation technology as well as applicable standards and other regulations. – Qualified application programmers and software engineers. The users must be familiar with the relevant safety concepts of automation technology as well as applicable standards and other regulations. 1.3 Product changes Modifications to hardware and firmware of the device are not permitted. Incorrect operation or modifications to the device can endanger your safety or damage the device. Do not repair the device yourself. If the device is defective, please contact Phoenix Contact. 108998_en_01 PHOENIX CONTACT 5 / 122 FL SWITCH 2000 / FL NAT 2000 6 / 122 PHOENIX CONTACT 108998_en_01 Startup and function 2 Startup and function 2.1 Delivery state/factory settings 2.1.1 Initial IP configuration in the delivery state 2.1.1.1 Firmware revision 2.72 and earlier The device does not have an initial IP configuration. 2.1.1.2 Firmware revision 2.80 In the delivery state, the device has an initial static IP configuration, which enables you to access the web-based management and to assign an IP address. – IP address: 169.254.2.1 – Subnet mask: 255.255.0.0 This initial IP configuration is deactivated as soon as the switch is assigned an IP configuration via a different IP address assignment mechanism, e.g., via BootP, DHCP, DCP, webbased management. Depending on the switch version, BootP or DCP is activated for address assignment in the delivery state (see “Configuration in the delivery state” on page 8). 2.1.1.3 Firmware revision 2.90 or later In the delivery state, the device has an initial IP configuration and an individual DNS host name. You can therefore access the web-based management and configure the device. In the factory default configuration, the device adopts an IP address from the link-local network (169.254.0.0/16). The IP address 169.254.2.1 is preferably selected, provided it is not already present in the network. You can thus specifically configure individual devices via this IP address. To avoid IP address conflicts when starting multiple devices simultaneously, conflict detection is also active. If the switch detects that the adopted IP address is already assigned, it chooses another at random. With this dynamic method, it is difficult to find out which switch has which IP address when dealing with multiple devices. You can therefore also access the device via a DNS host name. In the factory default configuration, this name is made up of the device family and the individual part of the MAC address, e.g., SWITCH2000-ea165f or NAT2000-ef245c. Access is then possible using a browser, for example, via http://SWITCH2000-ea165f.local. For name resolution, mDNS (standard for Linux and macOS systems) and LLMNR (usually used for Windows systems) are supported. This initial IP configuration is deactivated as soon as the switch is assigned an IP configuration via a different IP address assignment mechanism, e.g., via BootP, DHCP, DCP, webbased management. Depending on the switch version, BootP or DCP is activated for address assignment in the delivery state (see “Configuration in the delivery state” on page 8). 108998_en_01 PHOENIX CONTACT 7 / 122 FL SWITCH 2000 / FL NAT 2000 If you want to reactivate the initial IP configuration at a later date, this only works through a reset (factory default) of the switch using web-based management (see “System – Configuration Handling” on page 31). A reset using the Smart mode button does not activate the initial IP configuration. 2.1.2 Configuration in the delivery state In the delivery state or after the system is reset to the factory settings, the following functions and properties are available: – All IP parameters are deleted. The switch has no valid IP address. An exception is the initial IP configuration in the delivery state (see “Initial IP configuration in the delivery state” on page 7). – BootP for assigning IP parameters is activated. – DNS name resolution is activated and the device can be accessed via the individual host name. – The DHCP server is deactivated. – There is a user account with the user name “admin” and the password “private”. – The available RJ45 ports are set to auto negotiation and auto crossing. – All counters of the SNMP agent are reset. – The web server (HTTP) and SNMPv2 are activated. – CLI (Telnet) is activated. – Port mirroring and MRP are deactivated. – Rapid Spanning Tree (RSTP) is activated (firmware version 2.01 or later). – The digital alarm output/signal contact is activated for the “Power Supply Lost” event. – The MAC address table does not contain any entries. – LLDP is activated. – SNTP is deactivated. – 802.1x and port-based security are deactivated. – The “Universal” Quality of Service profile is activated. – Syslog is deactivated. – Port statistics have been reset. Delivery state of the NAT versions in relation to the layer 3 functions: – Routing globally activated. – LAN1 created (IP addressing: BOOTP, ports: 2 ... 8) – LAN2 created (IP addressing: DHCP, port: 1) 8 / 118 PHOENIX CONTACT 108998_en_01 Startup and function The delivery state of the PROFINET versions (PN) differs as follows: – – – – PROFINET mode is activated. PROFINET device is activated. DCP for assigning the device name and the IP parameters is activated. The “PROFINET” Quality of Service profile is activated. 2.2 Using Smart mode In Smart mode, you can change the operating mode of the switch, without having access to one of the management interfaces. Press the Mode button to enter Smart mode, select the desired setting, and exit Smart mode. The four Mode LEDs indicate the setting that is currently selected, which will also apply when exiting Smart mode. The following setting options can be selected via Smart mode: – Reset the IP configuration – Operation in EtherNet/IP mode – Operation in PROFINET mode – Operation with static IP address – Operation in Unmanaged mode – Reset to factory settings A reset to the factory settings (factory reset), including the activation of the initial IP configuration, and the individual host name, is not possible via Smart mode. This is only possible via web-based management. 2.2.1 • Following the boot phase of the switch, as soon as the LEDs of all ports go out, press and hold down the Mode button for more than five seconds. If Smart mode is active, the four LEDs of port XF1 and XF2 will flash. The active state is indicated alternately by the flash sequence of all four LEDs. When Smart mode is started, the switch is initially in the “Exit without changes” state. 2.2.2 • Entering Smart mode Selecting the desired setting To select the various settings, press the Mode button briefly and select the desired operating mode (see Table “Operating modes in Smart mode” on page 10). 2.2.3 Possible operating modes in Smart mode The switch supports the selection of the following operating modes in Smart mode: 108998_en_01 PHOENIX CONTACT 9 / 122 FL SWITCH 2000 / FL NAT 2000 Table 2-1 Operating modes in Smart mode LED 11 LED 21 LED 31 LED 41 Exit Smart mode without changes On Off Off Off Set Universal mode (factory setting on standard versions) Off On Off Off Set PROFINET mode (factory setting on PROFINET versions)2 On On Off Off Mode Set EtherNet/IP mode Off Off On Off Operation with default IP address Off On On Off Reset IP configuration On On On Off Operation in Unmanaged mode Off On Off On 1 On the 20xx/21xx/22xx/23xx versions, the two LEDs (LNK/ACT and SPD) of port 1 and 2 respectively are used – the reading direction on the device is from top to bottom (LED 1 = LNK/ACT of port 1, LED 4 = SPD of port 2). On the 24xx/25xx versions, the four LNK/ACT LEDs of port 1 - 4 are used – the port number corresponds to the LED number. 2 The 20xx/21xx versions do not support PROFINET mode. 2.2.4 • Exiting Smart mode To exit this mode, press and hold down the Mode button for at least five seconds. The previously selected operating mode is saved and activated as soon as you release the button. 2.2.5 Operation in Universal mode Activating Universal mode resets the device as described in “Configuration in the delivery state” on page 8. This deletes any configurations stored on the device. An automation protocol is not activated in this mode. 2.2.6 Operation in PROFINET mode Activating PROFINET mode resets the device as described in “Configuration in the delivery state” on page 8 and activates the PROFINET device and DCP functions for IP address assignment. In addition, the “PROFINET” Quality of Service profile is activated. This deletes any configurations stored on the device. The PROFINET automation protocol is activated in this mode. 2.2.7 Operation in EtherNet/IP mode Activating EtherNet/IP mode resets the device as described in “Configuration in the delivery state” on page 8 and activates the IGMP snooping and IGMP querier (version 2) functions. In addition, the “EtherNet/IP” Quality of Service profile is activated. This deletes any configurations stored on the device. 10 / 118 PHOENIX CONTACT 108998_en_01 Startup and function 2.2.8 Operation with default IP address For operation with a default IP address, the device is assigned a fixed IP address. A DHCP server is activated on the switch and assigns an IP address to the connected PC via DHCP. To start up the device with a default IP address, activate the “Operation with static IP address” Smart mode as described in section “Using Smart mode” on page 9. 1. In the network settings on your PC, select the “Obtain an IP address automatically” option. Deactivate all other network interfaces on your PC. 2. 3. 4. 5. Connect the switch to your PC. Select the “Operation with default IP address” smart mode as described in section “Using Smart mode” on page 9. The switch assigns an IP address to the PC via DHCP The switch can now be accessed via IP address “192.168.0.254”. Set the desired IP address via web-based management. 2.2.9 Reset IP configuration When the “Reset IP configuration” Smart mode is activated, the IP address, subnet mask, and default gateway are reset to 0.0.0.0 and BootP is activated. Any other configurations stored on the device are retained and are not deleted. 2.2.10 Operation in Unmanaged mode When operating in Unmanaged mode, the switch can be used without an IP address. Here, the switch adopts the static IP address 0.0.0.0. The subnet mask and gateway are also configured to 0.0.0.0. This means that web-based management can no longer be accessed and the switch no longer sends BootP and DHCP requests. The main functions remain active in Unmanaged mode: – Redundancy mechanisms for loop suppression (RSTP, FRD, LTS) – Functions for hardening the network (broadcast/multicast limiter) – Functions for reducing the network load (IGMP snooping) Use of IGMP in Unmanaged mode is limited to IGMP snooping. The switch requires an IP address if the device is also to be used as an IGMP querier. The functions must be configured in Managed mode and will remain active when switching to Unmanaged mode. Alternatively, Unmanaged mode can be activated using a configuration file and SD card. Unmanaged mode can only be exited by switching to a different Smart mode or by resetting the switch to the factory settings. 108998_en_01 PHOENIX CONTACT 11 / 122 FL SWITCH 2000 / FL NAT 2000 2.3 Assigning IP parameters via BootP On the standard versions, BootP is activated in the delivery state. On the PROFINET versions, DCP is activated in the delivery state. The device uses the BootP protocol for IP address assignment. Numerous BootP servers are available on the Internet. You can use any of these programs for address assignment. This section explains IP address assignment using the “FL NETWORK MANAGER BASIC” (Order No. 2702889) and the “IP Assignment Tool” software tools from Phoenix Contact. Notes on BootP During initial startup, the device sends BootP requests without interruption until it receives a valid IP address. As soon as the device receives a valid IP address, it stops sending further BootP requests. After a restart, the device sends three BootP requests and will only then adopt the old IP address if there is no BootP response. 2.3.1 Assigning the IP address using FL NETWORK MANAGER BASIC Requirements The device is connected to a PC with a Microsoft Windows operating system and the FL NETWORK MANAGER has been successfully installed. Step 1: Parameterizing the BootP server • • • • • 12 / 118 PHOENIX CONTACT Open the FL NETWORK MANAGER software Open a new project in the software Under Extras  Options, select the BOOTP/DHCP SERVER menu item Configure the network interface on your PC to which the device is connected and select “BootP” operating mode. You can also adjust the subnet mask and configure a default gateway. Click “OK” to confirm the parameterization 108998_en_01 Startup and function Figure 2-1 Settings for the BootP server Step 2: Starting the BootP server • • In your project in the BOOTP/DHCP SERVER window, click on the “play” icon next to the selected network interface. The BootP server is now activated. BootP requests that are received are listed in the BOOTP/DHCP SERVER window in table format Figure 2-2 BootP server Step 3: Inserting incoming BootP requests in the reservation list and assigning IP parameters • • • 108998_en_01 If you would now like to assign IP parameters to a device, such as IP address, subnet mask or default gateway, right-click on an incoming BootP request in the BOOTP/ DHCP SERVER window and select “Add to BOOTP/DHCP reservations”. Enter the IP address to be assigned in the BOOTP/DHCP reservations window. The IP parameters are immediately transferred to the device. You can check whether IP address assignment was successful in the “IP address” column in the BOOTP/DHCP SERVER window. PHOENIX CONTACT 13 / 122 FL SWITCH 2000 / FL NAT 2000 Figure 2-3 FL Network Manager with BootP/DHCP reservation list shown The IP parameters set here can be changed in web-based management, if required (see section “Network” on page 37). 2.3.2 Assigning the IP address using IPAssign.exe Requirements The device is connected to a computer with a Microsoft Windows operating system. Step 1: Downloading and running the program • • • On the Internet, select the link phoenixcontact.net/products. Follow further instructions to access the search field. Enter order number 2702323 in the search field, for example. The BootP IP addressing tool can be found among the various downloads for the product. • Double-click on the “IPAssign.exe” file. • In the window that opens, click on the “Run” button. Step 2: “IP Assignment Wizard” The program opens and the start screen of the addressing tool appears. The program is mainly in English for international purposes. However, the program buttons change according to the country-specific settings. 14 / 118 PHOENIX CONTACT 108998_en_01 Startup and function The start screen displays the IP address of the PC. This helps when addressing the device in the subsequent steps. • Click on the “Next” button. Step 3: “IP Address Request Listener” All devices that send a BootP request are listed in the window that opens. These devices are waiting for a new IP address. Figure 2-4 “IP Address Request Listener” window The MAC address of your switch can be found on the sticker on the side. In this example, the switch has MAC address 00.A0.45.04.08.A3. • Select the device to which you want to assign an IP address. • Click on the “Next” button. Step 4: “Set IP Address” The following information is displayed in the window that opens: – IP address of the PC – MAC address of the selected device – IP parameters of the selected device (IP address, subnet mask, and gateway address) – Any incorrect settings Figure 2-5 108998_en_01 “Set IP Address” window with incorrect settings PHOENIX CONTACT 15 / 122 FL SWITCH 2000 / FL NAT 2000 • Adjust the IP parameters according to your requirements. If inconsistencies are no longer detected, a message appears indicating that a valid IP address has been set. • Click on the “Next” button. Step 5: “Assign IP Address” The program attempts to transfer the set IP parameters to the device. Figure 2-6 “Assign IP Address” window Following successful transfer, the next window opens. Step 6: Completing IP address assignment The window that opens informs you that IP address assignment has been completed successfully. It provides an overview of the IP parameters that have been transferred to the device with the MAC address shown. To assign IP parameters for additional devices: • Click on the “Back” button. To exit IP address assignment: • Click on the “Finish” button. The IP parameters set here can be changed in web-based management, if required (see Section “Network” on page 37). 16 / 118 PHOENIX CONTACT 108998_en_01 Frame switching 3 Frame switching The switch operates in store-and-forward mode. When receiving a data packet, the switch analyzes the source and destination addresses. The switch stores up to 8192 MAC addresses in its address table with an adjustable aging time of 10 to 825 seconds. 3.1 Store and forward All data telegrams received by the switch are stored and their validity is checked. Invalid or faulty data packets (for example: CRC errors) and fragments (1518 bytes). The MTU size is set to 9600 bytes following activation. MTU: Here, you can set the maximum transmission unit (MTU). Packet sizes between 1522 bytes and 9600 bytes are accepted. Flow Control: Flow control for the selected port can be enabled and disabled here. CRC Surveillance Received Pkts: Shows the number of packets received at the selected port since the last reboot or counter reset. CRC Errors: Shows the number of CRC errors at the selected port since the last reboot or counter reset. CRC Proportion Peak (ppm): Shows the highest proportion of CRC errors that occurred in a 30-second interval, relative to the total number of packets received in this interval since the last reboot or counter reset. CRC Port Status: Shows the status of the current port. Critical Threshold (ppm): Here, you can enter the threshold value at which the CRC Port Status switches to Critical (1000 ppm - 1,000,000 ppm are acceptable). Warning Threshold (ppm): Shows the threshold value in ppm at which the CRC Port Status switches to Warning (50% of Critical Threshold). Clear CRC Peak and CRC Status: Clicking the “Clear” button resets the CRC Peak and CRC Status. Port Counter Overview: Clicking on the “Monitor all ports simultaneously” link takes you to the “Port Counter” web page. 44 / 122 PHOENIX CONTACT 108998_en_01 Configuration and diagnostics in web-based management Port Configuration – Advanced Port Configuration Advanced Port Configuration Port Configuration Table: Clicking on the “Configure all ports simultaneously” link takes you to the “Port Configuration Table” page. There, you can set the status, mode, link monitoring, jumbo frames, and flow control for all ports. Figure 4-28 108998_en_01 “Port Configuration Table” web page Port Mirroring: Clicking on the “Configure Port Mirroring” button takes you to the port mirroring configuration (see “Port Mirroring” on page 64). VLAN Port Configuration: Clicking on the “Configure Port Settings for a VLAN” button takes you to the “VLAN Port Configuration” page (see “VLAN Configuration” on page 85). Link Aggregation: Clicking on the “Configure Link Aggregation” button takes you to the “Link Aggregation” page (see “LACP – Link Aggregation Control Protocol” on page 73). Port Based Security: Clicking on the “Configure Port Based Security” button takes you to the “Port Based Security” page (see “Security” on page 51). PHOENIX CONTACT 45 / 122 FL SWITCH 2000 / FL NAT 2000 4.2.3.8 VLAN Configuration For further information on “VLAN”, refer to section Section “Virtual Local Area Network – VLAN” on page 85. Figure 4-29 4.2.3.9 “VLAN Configuration” web page Multicast Filtering For further information on “Multicast”, refer to section “Multicast Filtering” on page 83. Figure 4-30 46 / 122 PHOENIX CONTACT “Multicast Filtering” web page 108998_en_01 Configuration and diagnostics in web-based management 4.2.3.10 Network Redundancy Figure 4-31 Network Redundancy “Spanning-Tree Configuration” area Spanning-Tree Configuration RSTP Mode: – – Disable: The RSTP function is not activated 802.1D: The RSTP function is activated globally and working in accordance with standard IEEE802.1D-2004 The functions below are only available if “802.1D” is activated. The Large Tree Support and Fast Ring Detection functions are only available on the 22xx/23xx/24xx/25xx versions. 108998_en_01 Large Tree Support: The “Large Tree Support” option makes the ring topology suitable for 28 switches along the relevant path if RSTP is used. The Large Tree Support option could provide an RSTP ring topology with up to 57 devices. Fast Ring Detection: This function speeds up switch-over to a redundant path in the event of an error and enables easy diagnostics. RSTP Fast Ring Detection assigns an ID to each ring. This ID is communicated to every switch in the respective ring. One switch can belong to several different rings at the same time. PHOENIX CONTACT 47 / 122 FL SWITCH 2000 / FL NAT 2000 Bridge Priority: The bridge and backup root can be specified via “Bridge Priority”. Only multiples of 4096 are permitted. The value will be rounded automatically to the next multiple of 4096. When you click on “Apply&Save”, the initialization mechanism is started (default value: 32,768). Bridge Hello Time: Specifies the time interval within which the root bridge regularly reports to the other switches via BPDU. Bridge Forward Delay: The value indicates how long the switches are to wait for the port state in STP mode to change from “Discarding” to “Listening” and from “Listening” to “Learning” (2 x Forward Delay). Bridge Max Age: The parameter is set by the root switch and used by all switches in the ring. The parameter is sent to ensure that each switch in the network has a constant value, which is used as the basis for testing the age of the saved configuration. Clicking on the “RSTP Port Configuration” button takes you to the “RSTP Port Configuration” pop-up (see page 49). Clicking on the “RSTP Port Configuration Table” button takes you to the “RSTP Port Configuration Table” pop-up (see page 50). Clicking on the “RSTP Diagnostics” button opens the “RSTP Diagnostics” page as a pop-up (see page 63). Network Redundancy Media Redundancy Protocol (MRP) MRP device mode: – Disable: The MRP function is not activated – Client: The MRP function is activated and the switch is the client – Manager: The MRP function is activated and the switch is the ring manager The MRP manager function is only available on 22xx/23xx/24xx/25xx versions and can be implemented via the FL SD FLASH/MRM configuration memory. 48 / 122 PHOENIX CONTACT VLAN: If the VLAN mode is set to “Tagging”, you can select the VLAN here to which the MRP control packets should be forwarded. Ring Port 1: Select the first MRP ring port here Ring Port 2: Select the second MRP ring port here 108998_en_01 Configuration and diagnostics in web-based management Pop-up: RSTP Port Configuration Figure 4-32 108998_en_01 “RSTP Port Configuration” web page Select Port: Here, select the port for which you want to change the RSTP settings. RSTP Enable: – – Admin Path Cost: Displays the path costs set for this port. A path cost equal to “0” activates cost calculation according to the transmission speed (10 Mbps = 2,000,000; 100 Mbps = 200,000). Operating Path Cost: Displays the path costs used for this port. Auto Edge: Here, you can specify whether to automatically switch from nonedge port to edge port after a link up. Admin Edge: Here, you can specify whether this port is to be operated as an edge port (default setting), if possible. Operating Edge: Shows whether this port is operated as an edge port or a nonedge port. Priority: Shows the priority set for this port (default value: 128). Forward Transitions: Indicates the number of times the port has switched from the “Discarding” state to the “Forwarding” state. Designated Root: Shows the root bridge for this spanning tree. Designated Bridge: Indicates the switch from which the port receives the best BPDUs. Designated Port ID: Indicates the port via which the BPDUs are sent from the designated bridge. The value is based on the port priority (2 digits) and the port number. Enable: RSTP is activated for the port Disable: RSTP is deactivated for the port PHOENIX CONTACT 49 / 122 FL SWITCH 2000 / FL NAT 2000 Designated Cost: Shows the path costs of this segment to the root switch. Protocol Version: Shows the protocol version. Force RSTP: Clicking on the “Force RSTP” button activates RSTP for the port as long as it has been operated in STP mode beforehand. Pop-up: RSTP Port Configuration Table Figure 4-33 “RSTP Port Configuration Table” web page Port: Shows the ports for which RSTP is available. RSTP Enable: Here, you can activate or deactivate RSTP for each port individually. Admin Edge: Here, you can specify whether this port is to be operated as an edge port (default setting), if possible. Admin Cost: Displays the path costs set for this port. A path cost equal to “0” activates cost calculation according to the transmission speed (10 Mbps = 2,000,000; 100 Mbps = 200,000). Link Aggregation Clicking on the link takes you to the configuration page for link aggregation. 50 / 122 PHOENIX CONTACT 108998_en_01 Configuration and diagnostics in web-based management 4.2.3.11 Security Figure 4-34 “Security” web page UI Security Secure UIs: Clicking on the “Security Context” link opens the pop-up of the same name (see “Pop-up: Security Context” on page 34). Port Based Security 108998_en_01 Port Security Status: Here, you can globally enable and disable port-based security. Port Based Configuration: Clicking on the “Configure Port Based Security” link takes you to the configuration page for port-based security (see ““Port Based Security” web page” on page 52). Clear Illegal Counter: Clicking on the “Clear” button sets the illegal access counter for all of the ports to zero. PHOENIX CONTACT 51 / 122 FL SWITCH 2000 / FL NAT 2000 Security Global Radius Authentication Server Configuration Radius Server IP Address: Here, you can set the IP address of the RADIUS authentication server. Radius Server Port: Here, you can set the UDP port of the RADIUS server (default: 1812). Radius Shared Secret: Here, you can set the shared secret required for encrypted communication with the RADIUS authentication server. The shared secret must not exceed 128 characters. Dot1x Authenticator: Here, you can specify whether the device should be an 802.1x authenticator or not. One end device can be authenticated via 802.1x per port. Port Authentication Table: Clicking on the “Dot1x Port Configuration Table” link takes you to the table-based configuration page for RADIUS authentication (see ““Dot1x Port Configuration Table” web page” on page 54). Port Authentication: Clicking on the “Dot1x Port Configuration” link takes you to the port-based configuration page for RADIUS authentication (see ““Dot1x Port Configuration” web page” on page 55). “Port Based Security” web page All of the configurations on the “Port Based Security” web page only take effect if the “Port Security Status” function is activated on the “Security” web page (see section “Security” on page 51). Figure 4-35 52 / 122 PHOENIX CONTACT “Port Based Security” web page 108998_en_01 Configuration and diagnostics in web-based management Port: Select the port for which the security settings should be made. Name: Displays the name of the selected port. Security Mode: Here, set what happens if a MAC address that is not permitted is detected by the device. – None: No security settings for this port. – Trap: If a MAC address that is not permitted is detected at the port, a trap is sent to the defined SNMP trap server (see section “Trap Manager” on page 65). The packets are not blocked. – Block: If a MAC address that is not permitted is detected at the port, all packets are blocked at the port and a trap is sent to the defined SNMP trap server (see section “Trap Manager” on page 65). The packets at this port remain blocked until a permitted MAC address is detected. Last MAC Address Learnt: Displays the MAC address of the last connected device. By clicking on the green checkmark, this MAC address can be added to the list of permitted MAC addresses. Illegal Address Counter: Displays the number of times a port has been accessed illegally. Each initial access by a MAC address is counted. Repeated access by known MAC addresses are counted twice if a different MAC address has accessed the port in the meantime. 108998_en_01 PHOENIX CONTACT 53 / 122 FL SWITCH 2000 / FL NAT 2000 “Port Based Security” web page Allowed MAC Addresses Up to 50 MAC addresses are permitted per port. Each MAC address can only be permitted at one port. MAC addresses that are permitted at one port also cannot be dynamically learned at other ports. The web-based management or network cannot be accessed via a MAC address that is permitted at another port. Index: Displays the index of the permitted MAC addresses. Description: Here, you can provide a description for a permitted MAC address. MAC Address: Enter a MAC address for which you want to allow access. Alternatively, you can select the green checkmark to the right of the “Last MAC Address Learned” field to use the last MAC address that was learned. VLAN ID: Enter the VLAN where the device with the permitted MAC address is located. Clicking on the red “X” to the right of this column deletes the permitted MAC address for this port. “Dot1x Port Configuration Table” web page Figure 4-36 54 / 122 PHOENIX CONTACT “Dot1x Port Configuration Table” web page Interface/Port: Displays the port number. Mode: Here, you can set the authentication mode for the port. – Auto: Devices connected to the port are authenticated via 802.1x. 802.1x (Dot1x Authenticator) must be activated for this. – Force Authenticate: All of the devices connected to the port are authenticated. – Force Unauthenticate: None of the devices connected to the port are authenticated. Status: Displays the authentication status of the port 108998_en_01 Configuration and diagnostics in web-based management “Dot1x Port Configuration” web page Figure 4-37 108998_en_01 “Dot1x Port Configuration” web page Port: Here, select the port for which you wish to carry out RADIUS configuration. Authentication Mode: Here, you can set the authentication mode for the port. – Auto: Devices connected to the port are authenticated via 802.1x. 802.1x (Dot1x Authenticator) must be activated for this. – Force Authenticate: All of the devices connected to the port are authenticated. – Force Unauthenticate: None of the devices connected to the port are authenticated. Authentication Status: Displays the authentication status of the port Re-Authentication Mode: Here, you can specify whether a client should be re-authenticated at a regular interval. Re-Authentication Period (secs): Here, you can set the interval at which a client should be reauthenticated (1 ... 65,535 seconds). EAPOL Frames Received: Displays the received EAPOL packets. Last EAPOL Frame Source: Displays the last MAC address from which an EAPOL packet was received at the port. PHOENIX CONTACT 55 / 122 FL SWITCH 2000 / FL NAT 2000 4.2.3.12 Figure 4-38 DHCP Service “DHCP Service” web page DHCP network services are only available on the 22xx/23xx/24xx/25xx versions. DHCP Network Service: Here, select the DHCP service you wish to use. – None: No DHCP service will be used on the switch. – Relay Agent: The DHCP relay agent (DHCP option 82) is enabled. – Server: The switch will be used as the DHCP server. The following fields are only available after selecting “Relay Agent” as the DHCP network service. Option 82: Here, select the address that should be used as the remote ID. – IP: Uses the IP address of the switch as the remote ID. – MAC: Uses the MAC address of the switch as the remote ID. Server IP Address: Here, set the IP address of the DHCP server in your network. Port Mode: Here, select the ports for which the DHCP relay agent should be activated. The following fields are only available after selecting “Server” as the DHCP network service. The “Server” DHCP network service can only be activated if the IP Address Assignment mode is set to “STATIC”. 56 / 122 PHOENIX CONTACT 108998_en_01 Configuration and diagnostics in web-based management Running State: Shows the current status of the DHCP server. The status is “Inactive” if some setting options are incorrect. Pool Start Address: Here, set the first IP address of the DHCP server address pool. Pool Size: Here, set the number of IP addresses in the DHCP server address pool. Please note that the number of IP addresses must match the configured subnet. Network Mask: Here, set the subnet mask that is assigned to the DHCP clients. Router IP: Here, set the router/default gateway IP address that is assigned to the DHCP clients. DNS IP: Here, set the DNS IP address that is assigned to the DHCP clients. Lease Time (s): Here, you can set the time that the DHCP server leases an IP address to a client before it has to report to the server again. The value must be between 300 and 2,592,000 seconds; “0” is interpreted as an infinite time (default: 3600). Accept Bootp: Here, you can specify whether the switch acting as the DHCP server accepts BootP requests. If this function is activated, an IP address with an infinite lease time is assigned to the requesting DHCP clients. DHCP Port-based Service: Clicking on the “Port-based DHCP Configuration” link opens the “Port-based DHCP Configuration” pop-up (see “Pop-up: Portbased DHCP Configuration” on page 58). Leases Clicking on the “Current DHCP leases” link opens the “Current DHCP leases” pop-up where the IP addresses that are currently assigned are displayed (see “Pop-up: Current DHCP Leases” on page 58). Clicking on the “DHCP static leases” link opens the “DHCP Static Leases” pop-up for configuring static IP address assignments (see “Pop-up: DHCP Static Leases” on page 59). 108998_en_01 PHOENIX CONTACT 57 / 122 FL SWITCH 2000 / FL NAT 2000 Pop-up: Port-based DHCP Configuration You can configure the port-based DHCP server function in this pop-up. Figure 4-39 “DHCP Port Local Service” pop-up Select Port: Here, select the port for which you wish to carry out port-based DHCP server configuration. Local Service enable: Here, activate the port-based DHCP server function for the selected port. Local IP: Here, enter the IP address that is assigned to the client at the selected port. Netmask: Here, enter the subnet mask that is assigned to the client at the selected port. Router: Here, enter the gateway address that is assigned to the client at the selected port. DNS: Here, enter the DNS address that is assigned to the client at the selected port. Pop-up: Current DHCP Leases This pop-up displays the IP addresses that are currently assigned. 58 / 122 PHOENIX CONTACT Leased IP: Displays the assigned IP addresses. Client ID: Displays the MAC address of the client to which the IP address is assigned. System Uptime: Displays the time that has elapsed since the IP address was assigned to the client. Local Port: Displays the port to which the client is connected. State: Displays the status of the client. Lease count: Displays the number of assigned IP addresses. Release: Clicking on the “Release” button releases unused entries again. 108998_en_01 Configuration and diagnostics in web-based management Pop-up: DHCP Static Leases This pop-up displays the configured static IP assignments. In addition, you can create new static IP assignments by assigning a fixed IP address to MAC addresses. Figure 4-40 “DHCP Static Leases” pop-up Lease list IP address: Displays the static IP address that is assigned. Client address: Displays the MAC address of the client. Delete: Clicking on the red “X” in the “Delete” column deletes the entry. Create new static entry 108998_en_01 IP address: Here, enter the static IP address that you wish to assign. Client address: Here, enter the MAC address to which you wish to assign a static IP address. Create: Click on the “Create” button to perform the static assignment. Clear static table: Click on the “Clear” button to delete all the static DHCP leases. PHOENIX CONTACT 59 / 122 FL SWITCH 2000 / FL NAT 2000 4.2.3.13 Figure 4-41 Local Events “Local Events” web page Alarm output 1 Here, you can activate the digital alarm output (22xx/23xx versions) or signal contact and read the current status (if a red “o” is present, this event has occurred). Events Here, you can specify the conditions under which the digital alarm output or signal contact should report an error. 60 / 122 PHOENIX CONTACT Power Supply lost: An error message is generated if supply voltage US1 or US2 is lost Monitored link down: Under “Advanced”, select the ports to which link down behavior should be reported. MRP Ring Failure: An error message is generated in the event of an MRP ring error. Pluggable Memory Missing: An error message is generated if no memory card is present. 108998_en_01 Configuration and diagnostics in web-based management 4.2.3.14 Figure 4-42 Quality of Service “Quality of Service” web page Traffic Prioritization The switches have eight priority queues into which incoming data traffic is sorted according to specific criteria. These queues are processed in descending order of priority. High-priority data traffic is therefore always forwarded first. Quality of Service Profile: 108998_en_01 Here, select the profile for prioritizing data traffic. The following selection options are available: – Universal: This profile is the factory setting on standard versions. Class of Service (VLAN tag priority) is activated for data prioritization. – PROFINET: This profile is the factory setting on PROFINET versions. Data prioritization based on Ethertype is activated in addition to Class of Service. In this profile, PROFINET data packets are always forwarded with high priority. Only control packets of redundancy protocols (RSTP and MRP) are given even higher priority. – EtherNet/IP: In this profile, prioritization via DSCP values is activated in addition to Class of Service. This means that preferential treatment is given to EtherNet/IP data traffic. Only control packets of redundancy protocols (RSTP and MRP) are given even higher priority. PHOENIX CONTACT 61 / 122 FL SWITCH 2000 / FL NAT 2000 Port Priority: Clicking on the link takes you directly to the configuration page for the default priority. Incoming data traffic on the device that does not have a priority tag is marked according to the setting and is assigned to a priority queue. To activate these settings, the VLAN mode of the device must also be set to “Tagged”. Broadcast Limiter Broadcast: Here, activate or deactivate the broadcast limiter. Broadcast Threshold: Here, set the threshold value in frames per second for the broadcast limiter. The value entered is rounded down to the next valid value. Multicast: Here, you can activate or deactivate the multicast limiter. Multicast Threshold: Here, set the threshold value in frames per second for the multicast limiter. The value entered is rounded down to the next valid value. Unknown Unicast: Here, you can activate or deactivate the limiter for unknown unicasts. Unicasts of a MAC address that have been learned by the switch are not affected. Unicast Threshold: Here, set the threshold value in frames per second for the limiter of unknown unicasts. The value entered is rounded down to the next valid value. Flow Control Port Configuration: Clicking on the “Configure Flow Control per port” link opens the “Port Configuration” web page, which contains the configuration options for flow control. Port Configuration Table: Clicking on the “Configure Flow control for multiple ports at once” link opens the “Port Configuration Table” web page where flow control can be configured for all ports. The layer 3 functions supported by the NAT versions are described in “Layer 3 functions – routing and NAT”. 62 / 122 PHOENIX CONTACT 108998_en_01 Configuration and diagnostics in web-based management 4.2.4 WBM diagnostics area 4.2.4.1 LLDP topology For further information, please refer to section “LLDP – Link Layer Discovery Protocol” on page 79. 4.2.4.2 RSTP Diagnostic Figure 4-43 “RSTP Diagnostic” web page Designated Root: Shows the root bridge for this spanning tree. Root Port: Displays the port to which the root is connected. If the root is not directly connected, it shows the direction of the root. Root Cost: Displays the total path costs for the root. Topology Changes: Displays the number of topology changes. Last Topology Change: Displays when the last topology changes took place. Hello Time: Shows the hello time set at the root. Forward Delay: Shows the forward delay set at the root. Max Age: Shows the maximum age time set at the root. Clicking on the “Redundancy Port Table” button opens a table containing information about the individual ports and their redundancy mechanism assignment. 4.2.4.3 Figure 4-44 108998_en_01 MRP Diagnostic “MRP Diagnostic” web page PHOENIX CONTACT 63 / 122 FL SWITCH 2000 / FL NAT 2000 Operating Mode: Displays the current MRP device status. MRP Manager Function: Indicates whether an MRP manager license (MRM) is available. The following fields are only available after selecting “Manager” as the operating mode. Ring Status: Displays the current status of the MRP ring. Change Counter: Displays the number of status changes in the MRP ring. Clicking on the “Redundancy Port Table” button opens a table containing information about the individual ports and their redundancy mechanism assignment. 4.2.4.4 Current VLANs For further information, please refer to Section “Pop-up: Current VLANs” on page 87. 4.2.4.5 Current Multicast Groups For further information, please refer to Section “Multicast Filtering” on page 83. 4.2.4.6 Port Mirroring The port mirroring function allows you to mirror the incoming and outgoing data traffic of individual ports to one port where it can be analyzed using a connected diagnostic device or tool. Figure 4-45 “Port Mirroring” web page Global Status: – – Enable: Port mirroring is activated globally Disable: Port mirroring is deactivated globally Destination Port: Under “Destination Port”, select the port to which the diagnostic device or tool is connected. Mirrored Ports (Ingress): Here, specify the ports from which the incoming data traffic should be mirrored. Mirrored Ports (Egress): Here, specify the ports from which the outgoing data traffic should be mirrored. 64 / 122 PHOENIX CONTACT 108998_en_01 Configuration and diagnostics in web-based management 4.2.4.7 Trap Manager Figure 4-46 “Trap Manager” web page Trap Mode: – – Enable: The sending of SNMP traps is enabled Disable: The sending of SNMP traps is disabled Trap Server: All trap servers that are to receive SNMP traps from this device are displayed here. Add Trap Server: Here, enter the IP address or DNS name of a trap server and click on “Apply&Save” to create this trap server. Test Trap Connection: Click on the “Send Trap” button to test the connection to the trap server. The table lists the SNMP traps that the device can send. Here, you can select the actions for which SNMP traps should be sent. 108998_en_01 PHOENIX CONTACT 65 / 122 FL SWITCH 2000 / FL NAT 2000 4.2.4.8 Port Counter This page provides an overview of the port statistics for the device. Four views provide an overview of the general, sent and received packets, errors, and collisions on the individual ports. Figure 4-47 “Port Counter” web page Interface/Port Clicking on one of the port numbers in the “Interface/Port” column takes you to the port details pages. Here, you can view detailed statistics about the sent and received data packets for every port. In addition, the current and maximum port utilization is displayed as a percentage. Clear statistics of all ports: Clicking on the “Clear” button resets all of the port counters in the Overview, Transmit, and Receive views to zero. In Surveillance view, click the button to reset the CRC Proportion Peak and CRC Status of all ports. Port Configuration: 66 / 122 PHOENIX CONTACT Clicking on the “Configure Ports” link opens the “Port Configuration” page (see page 43). 108998_en_01 Configuration and diagnostics in web-based management Port details page Figure 4-48 “Port Details” web page Port Counter Overview: Clicking on the “Monitor all ports simultaneously” link takes you back to the “Port Counter” overview page. Clear Port Statistics: 4.2.4.9 Clicking on the “Clear” button resets all of the counters for the currently displayed port to zero. Port Utilization Here you will find an overview of the percentage port utilization for this device. For a detailed overview, click on the graph of an individual port. Figure 4-49 108998_en_01 “Port Utilization” web page PHOENIX CONTACT 67 / 122 FL SWITCH 2000 / FL NAT 2000 4.2.4.10 Snapshot You can use the snapshot function to capture and download all parameters relevant to the runtime (e.g., configuration, events, etc.) and provide them to a service technician. Figure 4-50 “Snapshot” web page Take snapshot: Click the “Snapshot” button to take a snapshot. Current snapshot state: Indicates whether the snapshot is available, is currently being generated or does not exist. Timestamp of last snap- Displays the time at which the last snapshot was generated. shot: Download of snapshot file: 68 / 122 PHOENIX CONTACT Clicking on the “File transfer” link opens the window for manual file download. 108998_en_01 Configuration and diagnostics in web-based management 4.2.4.11 Syslog The Syslog function enables messages or events to be transmitted to one or more servers via UDP. In the event that two Syslog servers have been configured, the switch sends all messages/events to both servers. Figure 4-51 “Syslog” web page Activate syslog: Activate or deactivate the Syslog function here. Syslog server 1: Set the IP address or DNS name of the first Syslog server here. Syslog server 1 port: Set the UDP port of the first Syslog server here (default: 514). Syslog server 2: Set the IP address or DNS name of the second Syslog server here. Syslog server 2 port: Set the UDP port of the second Syslog server here (default: 514). Syslog test message: Click on the “Send message” button to test the connection to the Syslog server. With Syslog, message reception is not confirmed by the server. Therefore the connection status can only be checked on the server, and not in the web-based management of the switch. Status: Use the check boxes in the “Status” column to select the categories whose events are to be sent to the Syslog server. The table below provides an overview of the specific events in the respective categories. 108998_en_01 PHOENIX CONTACT 69 / 122 FL SWITCH 2000 / FL NAT 2000 Table 4-1 Connectivity Syslog IP conflict detected TFTP connection failed ACDconflict detected IP LLDP new neighbor on port LLDP neighbor information changed on port Link monitor alarm raises on port IP address changed on interface Port Link up/down SFP module plugged on Port ACD device has no IP MTU size changed Diagnosis CRC status and peak on port reset CRC status on port changed to ok CRC status on port changed to critical CRC thresholds on port changed by user Alarm output failed CRC status on port changed to warning Automation protocol PROFINET diagnosis available IP address changed via PROFINET Name of the device changed via PROFINET PROFINET connection lost PROFINET module different on slot 70 / 122 PHOENIX CONTACT 108998_en_01 Configuration and diagnostics in web-based management System information System time synchronized Pluggable memory removed Update firmware successful Configuration saved/loaded on/from pluggable memory Update failed Configuration difference detected Configuration saved/loaded successfully Configuration parameter changed Smart Mode entered Smart Mode button enabled/disabled SD card slot enabled/disabled Error in configuration file Pluggable memory cleared New interface created Power supply lost Name of the device changed Parameter has been changed by the user FW image not valid Update processing Write to flash memory Wrong update image IGMP Snooping mode changed IGMP Snooping aging time changed Syslog test message Start FW update Write FW image into flash Redundancy RSTP ring detected RSTP topology changed RSTP root changed RSTP ring failed MRP client/manager activated MRP ring failed MRP link failed at port 108998_en_01 PHOENIX CONTACT 71 / 122 FL SWITCH 2000 / FL NAT 2000 Security Port access violation on Port Radius Authentication Server shared secret changed Port successfully authenticated Password changed User authentication failed Radius Authentication Server IP/UDP address changed User configuration changed User Login/Logout Unauthorized access 4.2.4.12 SFP Diagnostics This page is only available on devices with SFP ports. Here you will find an overview of the SFP ports. Figure 4-52 72 / 122 PHOENIX CONTACT “SFP Diagnostics” web page Interface/Port The ports that can be used with SFP modules are displayed here. Clicking on a port number opens the port configuration for that port. Type: The type of SFP module used is displayed here. If no SFP module is inserted, “NO SFP” is displayed. Serial No: This column displays the serial number of the SFP module used. RX Power(dBm): This column displays the incoming power level. TX Power (dBm): This column displays the outgoing power level. 108998_en_01 LACP – Link Aggregation Control Protocol 5 LACP – Link Aggregation Control Protocol The Link Aggregation function enables you to bundle several physical LAN interfaces to create a logical channel referred to as a trunk. This makes it possible to transfer larger quantities of data and improve failsafe performance. If one or more physical connections of a trunk fail, the remaining connections handle the data load as far as possible. Using a trunk does not mean that the data throughput is multiplied, as all data communication frames are always processed via a single connection only. I.e., a trunk with two connections cannot automatically transmit 2 Gbps in the case of a Gigabit switch. Figure 5-1 “Link Aggregation” web page Algorithm: Here, you can set the algorithm that is responsible for the load distribution and that decides which physical connection is used for data communication. The various algorithms use the MAC or IP addresses of the source or destination fields, or the TCP/UDP port numbers. 108998_en_01 Name of New Trunk: Here, you can enter a name for a new trunk. Create New Trunk: Click on the “Create” button to create a new empty trunk. Configure: Clicking on the “Configure” link in the table containing all the created trunks opens the configuration page for the respective trunk. PHOENIX CONTACT 73 / 122 FL SWITCH 2000 / FL NAT 2000 Figure 5-2 “Configure Trunk” web page Trunk Number: Here, select the trunk to be configured by entering its ID. Admin Mode: Here, you can enable and disable a trunk. Spanning-Tree Mode: Here, select whether the RSTP protocol is to be enabled for this trunk. Trunk Name: Here, you can change the name of the trunk. Mode: Here, you can specify how ports are to be added to the trunk. – If you select “Static”, the ports are immediately added to the trunk. – When “LACP Active/Passive” is selected, the two members of a link aggregation first exchange information via LACPDUs: – With “Active”, this is regardless of whether the peer also has LACP. – With “Passive”, this only occurs after LACPDUs have been received by the peer. If the switch is used as an MRP client and if a trunk port was selected for at least one ring port, increased recovery times may be required in the MRP ring if “LACP Active/Passive” is activated. In this case, it is therefore recommended to select “Static” mode. Member-Ports: 74 / 122 PHOENIX CONTACT Here, select up to four ports that are to belong to the trunk. 108998_en_01 SNMP – Simple Network Management Protocol 6 SNMP – Simple Network Management Protocol General function SNMP is a non-proprietary standard for network management. It defines commands for reading and writing information, and defines formats for error and status messages. SNMP is also a structured model that consists of agents, their respective MIB (Management Information Base), and a manager. The manager is a software tool that is executed on a network management station. The agents are located inside switches, bus terminals, routers, and other devices that support SNMP. The task of the agents is to collect and provide data in the MIB. The manager regularly requests and displays this information. The devices can be configured via data that is written to the MIB by the manager. In the event of an emergency, the agents can also send messages (traps) directly to the manager. All configuration changes that are to take effect after a device restart must be saved permanently using the “flWorkFWCtrlConfSave” object. SNMP interface All managed Factoryline components have an SNMP agent. The agent for this type of device manages the following MIBs (Management Information Bases): – FL Managed Infrastructure MIB – lldpMIB – RFC1213 MIB – rmon – snmpMIB – ifMIB – snmpFrameworkMIB – etherMIB – pBridgeMIB – qBridgeMIB – dot1dBridge – rstpMIB – IP MIB Network management stations, such as a PC with an MIB browser, can read and modify the configuration and diagnostic data of network devices via the Simple Network Management Protocol. In addition, any SNMP tools or network management tools can be used to access Factoryline products via SNMP. To do this, the MIBs supported by the respective device must be made available to the SNMP management tools. On the one hand, these are globally valid MIBs, which are defined and described in RFCs (Requests for Comments). For example, this includes MIB2 in accordance with RFC1213, which is supported by all SNMP-capable network devices. On the other hand, manufacturers can define their own private SNMP objects, which are then assigned to a private manufacturer area in the large SNMP object tree. Manufacturers are then responsible for their own private (enterprise) areas, i.e., they must ensure that only one object (object name and 108998_en_01 PHOENIX CONTACT 75 / 122 FL SWITCH 2000 / FL NAT 2000 parameters) may be assigned to an object ID and published. If this object is then no longer needed, it is labeled as expired, but it cannot be reused, e.g., with other parameters, under any circumstances. Phoenix Contact provides notification of ASN1 SNMP objects by publishing their descriptions on the Internet. Reading SNMP objects is not password protected. Although a password is required for read access in SNMP, this is set to “public”, which is usual for network devices, and cannot be changed. In the delivery state, the password for write access is “private” and can be changed by the user. SNMP and the web interface use the same password, which can be changed by the user. Use of SNMPv3 When using SNMPv3, several points must be observed when accessing the SNMP objects. In contrast to SNMPv2, SNMPv3 is a protected protocol where the message contents and passwords are transmitted in encrypted format. To use SNMPv3, you must first configure the switch accordingly (see “Service” on page 39). In addition, you need to switch your MIB browser to SNMPv3: – MD5 as the algorithm for authentication – DES as the algorithm for privacy – User name: “admin” – Password: Current device password of the user „admin“ (Note: The password must be at least eight characters long. If the default password is “private”, “private_” must be used for access.). If the “separate SNMPv3 password” option is activated, this applies in combination with the user “admin”. Another benefit for the user is the option of sending traps using the Simple Network Management Protocol (see “Trap Manager” on page 65). Management Information Base (MIB) Description which contains all the data (objects and variables) required for network management. Agent An agent is a software tool which collects data from the network device on which it is installed and transmits this data on request. Agents reside in all managed network components and transmit the values of specific settings and parameters to the management station. On request by a manager or in response to a specific event, the agent transmits the collected information to the management station. Not all devices support all object classes. – If an unsupported object class is requested, an error message is generated. – If an attempt is made to modify an unsupported object class, an error message is also generated. 76 / 122 PHOENIX CONTACT 108998_en_01 SNMP – Simple Network Management Protocol The descriptions of the individual SNMP objects are located in the respective MIBs and can be downloaded from the Phoenix Contact e-shop. Please note that the MIB is located in the respective software package (zip file) of a firmware. 108998_en_01 PHOENIX CONTACT 77 / 122 FL SWITCH 2000 / FL NAT 2000 78 / 122 PHOENIX CONTACT 108998_en_01 LLDP – Link Layer Discovery Protocol 7 LLDP – Link Layer Discovery Protocol Basic principles LLDP The switch supports LLDP in accordance with IEEE 802.1ab and thus enables topology detection of devices that also have LLDP activated. Advantages of using LLDP: – Improved error location detection – Improved device replacement – More efficient network configuration The following information is received by or sent to neighbors, as long as LLDP is activated: – The device sends its own management and connection information to neighboring devices. – The device receives management and connection information from neighboring devices. Please note that a port that is blocked via RSTP does not receive any LLDP BPDUs, but is still able to send them. LLDP general The Link Layer Discovery Protocol (LLDP) in accordance with IEEE 802.1ab is used by network devices to learn and maintain the individual neighbor relationships. Function A network infrastructure component sends a port-specific BPDU (Bridge Protocol Data Unit), which contains the individual device information, at the “Message Transmit Interval” to each port in order to distribute topology information. The peer connected to the respective port learns the corresponding port-specific neighbors from these BPDUs. The information learned from the BPDUs is saved for a defined period of time known as the TTL (Time To Live) value. Subsequent receipt of the same BPDUs increases the TTL value again and the information is still saved. If the TTL expires, the neighbor information is deleted. The switch manages a maximum of 50 items of neighbor information. Any information beyond this is ignored. If several neighbors are displayed at one switch port, then at least one other switch/hub that does not support LLDP or does not have LLDP activated is installed between this switch and the neighbor indicated. 108998_en_01 PHOENIX CONTACT 79 / 122 FL SWITCH 2000 / FL NAT 2000 Table 7-1 Event table for LLDP Event Action of the individual LLDP agent Response of the neighboring LLDP agent Activate LLDP agent or device start Transmit LLDP BPDUs to all ports Include sender in the list of neighbors Deactivate LLDP agent or software reset Transmit LLDP BPDUs with a TTL value of 0 seconds to all ports Delete sender from the list of neighbors Link up Transmit port-specific LLDP BPDUs Include sender in the list of neighbors Link down Delete all neighbors for this port - Timer (Message Transmit Interval) Cyclic transmission of BPDUs to all ports Update information Aging (Time To Live) Delete neighbor information - Receipt of a BPDU from a new neighbor Extend list of neighbors and respond with port-specific BPDU Include sender in the list of neighbors LLDP configuration in web-based management Figure 7-1 “Link Layer Discovery Protocol” web page For 20xx/21xx version devices, LLDP can be activated or deactivated globally for all ports. The 22xx/23xx/24xx/25xx version devices also offer a port-based configuration option for sending and receiving LLDP BPDUs. LLDP can be configured in WBM (see “Service” on page 39). 80 / 122 PHOENIX CONTACT 108998_en_01 LLDP – Link Layer Discovery Protocol LLDP diagnostics in webbased management Figure 7-2 “LLDP Topology” web page A table is created for known neighbors and contains the following four columns: 108998_en_01 Local Port: Contains the port number of the local switch that is used to connect a neighbor to this switch. Chassis ID: MAC address of the connected neighboring device. IP Address: Management IP address for the neighbor. Remote Port: Port number of the neighboring switch that is used to connect the neighbor to the local switch. PHOENIX CONTACT 81 / 122 FL SWITCH 2000 / FL NAT 2000 82 / 122 PHOENIX CONTACT 108998_en_01 Multicast Filtering 8 Multicast Filtering Multicast Configuration Multicast Filtering Figure 8-1 “Multicast Filtering” web page IGMP Snooping: – – disable: The “IGMP Snooping” function is disabled. enable: The “IGMP Snooping” function is enabled. Snoop Aging Time: Here, you can set the snoop aging time. The snoop aging time is the time period during which membership reports are expected from the querier. If no membership reports are received during this time, the associated ports are deleted from the multicast groups. The value must be between 30 and 3600 (default: 300). IGMP Query Version: Here, you can set the IGMP query version which the switch should use to send the queries. The switches support IGMP query versions v1 and v2. For EtherNet/IP applications, it is recommended that you activate version v2. Query Interval: Here, you can set the interval at which the switch should send the queries. Current Querier: Displays the IP address of the current querier in the network. The IGMP querier function can only be used if the device has an IP address. Use of multicast filtering in Unmanaged mode is therefore limited to IGMP snooping. 108998_en_01 PHOENIX CONTACT 83 / 122 FL SWITCH 2000 / FL NAT 2000 Extensions FUQ (Forward Unknown to Querier): Here, specify whether a multicast group should be created for unknown multicast packets, which forwards the packets in the direction of the querier. Extension BUQ (Block Unknown at Querier): Here, specify whether unknown multicast packets should be blocked at the querier. Auto Query Ports: Here, specify whether automatic selection of additional query ports is activated. Ports are automatically integrated in every multicast group. In the case of redundancy switch-over, the multicast packets are not blocked because the ports required are already members of the multicast group. Clear AQP: Button for deleting the ports that are automatically assigned to the groups. Static Query Ports: Select the ports that are static query ports. Clicking on the “Current multicast groups” link opens the “Current Multicast Groups” web page as a pop-up. The device can manage up to 50 dynamic multicast groups. Figure 8-2 84 / 122 PHOENIX CONTACT “Current Multicast Groups” web page 108998_en_01 Virtual Local Area Network – VLAN 9 Virtual Local Area Network – VLAN VLAN Configuration Figure 9-1 “VLAN Configuration” web page VLAN Mode: – – Transparent: In “Transparent” mode, the switch processes the incoming data packets as described in the “Frame switching” section. Neither the structure nor the contents of the data packets are changed. The information about VLAN assignment from a tag that may be contained in the data packet is ignored. Tagged: In “Tagged” mode, the switch forwards the data packets based on the VLAN assignment. Static VLANs Static VLAN Configuration Webpages: Clicking on the “Static VLAN Configuration” link takes you to the “Static VLAN Configuration” web page (see page 86). Up to eight (20xx/21xx version) or up to 32 (22xx/23xx/24xx/25xx version) static VLANs can be set up here. Clicking on the “VLAN Port Configuration” link takes you to the “VLAN Port configuration” web page (see page 87). Clicking on the “VLAN Port Configuration Table” link takes you to the VLAN port table (see page 87). VLAN Diagnostic VLAN Diagnostic Webpages: 108998_en_01 Clicking on the “Current VLANs” link opens the “Current VLANs” web page as a pop-up (see page 87). PHOENIX CONTACT 85 / 122 FL SWITCH 2000 / FL NAT 2000 Pop-up: Static VLAN Configuration Figure 9-2 “Static VLAN Configuration” web page List of Static VLANs: All VLANs created up to this point are displayed here. VLAN ID: Set the VLAN ID you wish to assign to the new VLAN. The value must be between 2 and 4094. VLAN Name: Specify the VLAN name you wish to create. VLAN Memberships: Specify which ports are to be located in the VLAN. – T: Tagged port – U: Untagged port – -: Not a member of the VLAN Use the “Delete” button to delete the VLAN selected in the list. VLAN 1 cannot be deleted. 86 / 122 PHOENIX CONTACT 108998_en_01 Virtual Local Area Network – VLAN Pop-up: VLAN Port configuration Figure 9-3 “VLAN Port configuration” web page Port Number: Select the port for which you want to change the VLAN settings. Default VLAN ID: Select the VLAN ID that is to be assigned to the port. Default Priority: Set the VLAN priority for the selected port. Ingress Filter: Specify whether the ingress filter should be activated. Pop-up: VLAN Port Configuration Table Figure 9-4 “VLAN Port Configuration Table” web page Pop-up: Current VLANs This page lists the current VLANs and displays the ports for each VLAN, which are either “Tagged” or “Untagged”. Figure 9-5 108998_en_01 “Current VLANs” web page PHOENIX CONTACT 87 / 122 FL SWITCH 2000 / FL NAT 2000 88 / 122 PHOENIX CONTACT 108998_en_01 Operation as a PROFINET device 10 Operation as a PROFINET device In PC Worx version 5.00.26 or later, the switch is supported as a PROFINET device. The PROFINET controller can therefore support the startup of the switch within a PROFINET application. This includes the assignment of the IP parameters, comparison of the target/ actual configuration, and archiving of the alarms sent by the switch. In the event that a device is replaced, the controller recognizes the replacement device and starts it up automatically. As a PROFINET device, the switch provides, e.g., the link states for the control program as process data items. 10.1 Preparing the switch for PROFINET operating mode In the delivery state, the standard versions of the FL SWITCH 22xx/23xx/24xx/25xx and FL NAT 22xx/23xx are in “Universal mode” and must be set to “PROFINET mode” once. Two mechanisms are available for switching the mode: – After startup and IP address assignment, the operating mode/automation profile can be changed on the “Quick Setup” page in web-based management (see “Quick Setup” on page 35). – By using Smart mode (see “Using Smart mode” on page 9). When “PROFINET mode” is activated, the following presets are applied for operation: – The Link Layer Discovery Protocol (LLDP) is enabled with the following configuration specifications for PROFINET components: a) The Discovery and Configuration Protocol (DCP) is activated as the mechanism for assigning IP parameters. b) The MRP protocol is not activated. Additionally, the configuration is stored automatically and the device is restarted when changing to “PROFINET mode”. The switch then starts up in “PROFINET mode” for the first time, and waits for a name and PROFINET IP address to be assigned (see “Device naming” on page 97 and “Operating in the PROFINET environment” on page 97). If the switch is set from “PROFINET mode” back to “Universal mode”, the following settings are made: – LLDP remains active with the delivery state values. – IP address assignment is set to BootP. – The station name for the switch does not change. If no station name has been specified, the device type is entered. It is recommended that you save the new configuration after changing the operating mode. Please note that some configuration changes only take effect after a restart. 108998_en_01 PHOENIX CONTACT 89 / 122 FL SWITCH 2000 / FL NAT 2000 10.2 Switch as a PROFINET device 10.2.1 Configuration in the engineering tool 10.2.1.1 Specifying the bus configuration The switch can be operated as a PROFINET device if it is integrated under a controller in the bus configuration in the engineering tool. A GSD file and an FDCML file for integration can be downloaded at phoenixcontact.net/products. Figure 10-1 Integrating the devices in the engineering tool If the switch is not listed in the device catalog, the device description provided by Phoenix Contact needs to be imported. The latest device description can be downloaded at phoenixcontact.net/products. If the device description is available in the device catalog, the following options are available for bus configuration: – Manual: The components are transferred to the bus configuration from the device catalog using drag and drop. – Automatic: The devices are entered via the “Read PROFINET” function, which means that they can be accessed in the network via DCP (Discovery and Configuration Protocol). The devices must be supplied with voltage and “PROFINET mode” must be activated. 90 / 122 PHOENIX CONTACT 108998_en_01 Operation as a PROFINET device 10.2.2 Configuring the switch as a PROFINET device Once all the switches have been added to the bus configuration, you need to make the following settings for the individual switches via the “Detail View” tab (device details): – Check the PROFINET device name. If necessary, change it. – Check the IP address and subnet mask. Change both, if necessary. – The update time for inputs should be set to “512 ms” (default). – The update time for outputs should be set to “512 ms” (default). – The monitoring time should be set to “2000 ms” (default). After that, you can create and use the PROFINET variables in the control program. In addition to the “PNIO_DATA_STATE” standard variable, the switch provides the link status for each port as a process data byte. If the “PNIO_DATA_VALID” bit for the “PNIO_DATA_STATE” variable declares the switch process data as valid, the process data item for a port can have the following values (see “Other cyclic process data” on page 99): Value = 1: Active link Value = 2: Link available, but the peer cannot establish the link (for FX ports only – far end fault detection) Process data can only be accessed if the parameterized target configuration matched the actual configuration on device startup. 10.2.3 Configuration via the engineering tool The switch can be configured via the engineering tool (PC Worx) using the universal parameter editor (UPE). 10.2.3.1 Structure of the process data The tables below provide an overview of the information contained in the various slots. Table 10-1 Byte PN information Table 1,2 Control word Table 10-10 4 Link states of ports 1 - 8 Table 10-11 5 Link states of ports 9 - 16 6 Link states of ports 17 - 24 7 Diagnostics Table 10-2 108998_en_01 Slot 1/1 inputs Table 10-12 Slot 1/1 outputs Byte PN information Table 1,2 Status word Table 10-10 PHOENIX CONTACT 91 / 122 FL SWITCH 2000 / FL NAT 2000 Table 10-3 Byte PN information Table 1 Port 1 Table 10-13 2 Port 2 3 Port 3 ... ... 16 Port 16 10.2.3.2 Table 10-4 Slot 2/1 inputs PN records (acyclic) Record index 0x0PP (PP - port number) – Slot2 Subslot1 Byte Item No. Data type Permission Default Valid options 0 Block version Byte Read-only 0 0 - indicates this data set 1 Port mode Byte Read/write 0 0 - no changes 1 - auto negotiation 2 - 10 Mbps HD 3 - 10 Mbps FD 4 - 100 Mbps HD 5 - 100 Mbps FD 20 - auto negotiation 10/100 only 21 - fast startup 2 Port enable status Byte Read/write 0 0 - no changes 1 - disable 2 - enable 3 Alarm link monitoring Byte Read/write 0 0 - no changes 1 - disable 2 - enable 4 Reserved 5 Alarm SFP missing Byte Read/write 0 0 - no changes 1 - disable 2 - enable 92 / 122 PHOENIX CONTACT 108998_en_01 Operation as a PROFINET device Table 10-5 Record index 0x1PP (PP - port number) – Slot2 Subslot1 Byte Item No. Data type Permission Default Valid options 0 Block version Byte Read-only 0 0 - indicates this data set 1 Port speed Byte Read-only 0 0 - not connected 1 - 10 Mbps 2 - 100 Mbps 3 - 1 Gbps port duplex 2 Port duplex Byte Read-only 0 0 - unknown 1 - full duplex 2 - half duplex 3 Port utilization RX Byte Read-only 0 In % 4 Port utilization TX Byte Read-only 0 In % 5 Max. utilization RX Byte Read-only 0 In % 6-9 Padding 10 11 Fiber transceiver RX power Int16 Read-only 0 Value in 0.1 dBm 12 13 Fiber transceiver TX power Int16 Read-only 0 Value in 0.1 dBm 16 RX unicasts packet count Uint32 Read-only 0 0 20 RX broadcasts packet count Uint32 Read-only 0 24 RX multicasts packet count Uint32 Read-only 0 28 Fragment error count Uint32 Read-only 0 32 Undersized packet count Uint32 Read-only 0 36 Oversized packet count Uint32 Read-only 0 40 CRC error count Uint32 Read-only 0 Table 10-6 Record index 1 – Slot1 Subslot1 Byte Item No. Data type Permission Default Valid options 0 Block version Byte Read-only 0 0 - indicates this data set 1 Alarm power supply Byte Read/write 0 0 - no changes 1 - disable 2 - enable 2 Alarm module remove Byte Read/write 0 0 - no changes 1 - disable 2 - enable 3 Alarm MRP ring failure Byte Read/write 0 0 - no changes 1 - disable 2 - enable 108998_en_01 PHOENIX CONTACT 93 / 122 FL SWITCH 2000 / FL NAT 2000 Table 10-6 Record index 1 – Slot1 Subslot1 [...] Byte Item No. Data type Permission Default Valid options 4 PlugMem missing Byte Read/write 0 0 - no changes 1 - disable 2 - enable 5-9 Padding 10 RSTP mode Byte Read/write 0 0 - no changes 1 - RSTP 2 - RSTP/FRD 3 - RSTP/LTS 4 - RSTP/LTS/FRD 11 RSTP priority Byte Read/write 16 0 ... 15 - priority value as multiple of 4K 16 - no changes 12 Web server Byte Read/write 0 0 - no changes 1 - disable 2 - HTTP 3 - HTTPS 13 SNMP agent Byte Read/write 0 0 - no changes 1 - disable 2 - SNMPv2 3 - SNMPv3 14 CLI service Byte Read/write 0 0 - no changes 1 - disable 2 - Telnet 3 - SSH 15 CLI network scripting Byte Read/write 0 0 - no changes 1 - disable 2 - enable 16 Alarm output: Power supply Byte Read/write 0 0 - no changes 1 - disable 2 - enable 17 Alarm output: Link monitoring Byte Read/write 0 0 - no changes 1 - disable 2 - enable 18 Alarm output: MRP Byte Read/write 0 0 - no changes 1 - disable 2 - enable 19 Alarm output: Pluggable memory missing Byte Read/write 0 0 - no changes 1 - disable 2 - enable 20 31 Padding 32 95 Current admin password (valid access used when setting new password) Char array Write 0 Empty string if not used 96 159 New password to configure Byte Read/write 0 Empty string if not used 94 / 122 PHOENIX CONTACT 108998_en_01 Operation as a PROFINET device Table 10-6 Record index 1 – Slot1 Subslot1 [...] Byte Item No. Data type Permission Default Valid options 160 SNTP mode Byte Read/write 0 0 - no changes 1 - disable 2 - unicast mode 3 - broadcast mode 161 SNTP UTC offset Byte Read/write 0 0 - no changes Offset values 1 - 25 representing offset from -12h to +12h 162 SNTP server IP address Char array Read/write 0 Empty string - no changes IP address in dotted string notation, e.g., 192.168.0.1 178 SNTP backup IP address Char array Read/write 0 Empty string - no changes IP address in dotted string notation, e.g., 192.168.0.1 194 DNS server IP address Char array Read/write 0 Same as above 210 Second DNS server IP address Char array Read/write 0 Same as above Table 10-7 Record index 2 – Slot1 Subslot1 Byte Item No. Data type Permission Default Valid options 0 Block version Byte Read-only 0 0 - indicates this data set 1 Pluggable memory status Byte Read-only 0 0 - unknown 1 - present valid 2 - present invalid 3 - not present 2 Reserved 3 Power supply Byte Read-only 0 Bit mask of valid power source Table 10-8 Record index 3 – Slot1 Subslot1 Byte Item No. Data type Permission Default Valid options 0 Block version Byte Read/write 0 0 - indicates this data set 1 Clear packet statistics Byte Read/write 0 0 - do nothing 255 - clear statistics of all ports Any other - select port number to clear 108998_en_01 PHOENIX CONTACT 95 / 122 FL SWITCH 2000 / FL NAT 2000 10.2.3.3 • • • • • • • • Table 10-9 PDEV standard records Port mode – Status of PDEV port Link state – Read/enable alarm device properties/status of PDEV port Neighbor – Read/enable alarm by setting expected neighboring device properties/status of PDEV port MRP role – Read/write device properties/status of PDEV interface MRP ports – Read/write device properties/status of PDEV interface MRP ring state – Read/enable alarm device properties/status of PDEV interface Fiber optic type – Read/write device properties/status of PDEV port Port statistics counter – Read statistics counter of PDEV port Standard record information Item Identifier Elements Step 7 dialog window PDPortDataReal 0x802A Getting media type, mau type, and neighborhood information from the device Device status of PDEV port subslot (X1 py) PDPortDataAdjust 0x802F Setting mau type of this port (auto neg., 10/100, HD/FD) Device properties of PDEV port subslot (X1 py) PDPortDataCheck 0x802B Enable alarm for data transmission impossible and remote mismatch by specifying expected mau type, link state, and neighbor Device properties of PDEV port subslot (X1 py) PDInterfaceMrpDataReal 0x8050 Get current MRP role (client, manDevice status of PDEV interface ager) and ring state from the device (X1) PDInterfaceMrpDataAdjust 0x8052 Set MRP role Device properties of PDEV interface subslot (X1) PDInterfaceMrpDataCheck 0x8051 Enable alarm for MRP mismatch Device properties of PDEV interface subslot (X1) PDPortMrpDataReal 0x8054 Get MRP port state Device properties of PDEV interface subslot (X1) PDPortMrpDataAdjust 0x8053 Set MRP ports Device properties of PDEV interface subslot (X1) PDPortFODataReal 0x8060 Get adjusted fiber optic type and fiber optic cable type as well as the current power budget Device status of PDEV interface subslot (X1 py) 96 / 122 PHOENIX CONTACT 108998_en_01 Operation as a PROFINET device Table 10-9 Standard record information [...] Item Identifier Elements Step 7 dialog window PDPortFODataAdjust 0x8062 Set fiber optic type and fiber optic cable type (will be saved together with the system configuration) Device properties of PDEV port subslot (X1 py) PDPortFODataCheck 0x8061 Enable alarm for fiber optic mismatch Device properties of PDEV port subslot (X1 py) PDPortStatistic 0x8072 Statistics counter of the port corre- Not available yet sponding to IF MIB: ifInOctets, ifOutOctets, ifInDiscards, ifOutDiscards, ifInErrors, ifOutErrors 10.2.3.4 • • • • • I&M record data I&M0 – Vendor ID, device order ID and serial number, HW and SW revision, device status of the DAP module (slot 0) / 0xAFF0 I&M1 – Contains location and function description, device identification / 0xAFF1 I&M2 – Contains installation date, device identification / 0xAFF2 I&M3 – Contains description text, device identification / 0xAFF3 I&M4 – Contains signature, device identification / 0xAFF4 10.2.4 Device naming In order to start up a switch in “PROFINET” operating mode, each switch must be assigned a name once, i.e., each PROFINET device is assigned a unique device name. A device search (“Read PROFINET” function in PC Worx) is performed via the engineering tool, where all the devices that can be accessed in the network are listed. After identifying unknown devices via the specified MAC address or the “flashing” function, the device name configured in the engineering tool is saved permanently on the switch using the “Assign Name” function. 10.2.5 Operating in the PROFINET environment A switch that has already been assigned a name starts in “PROFINET” operating mode without an IP address and waits for an IP configuration to be assigned. Once the project has been translated and downloaded to the controller, the controller implements startup and configuration. As soon as a communication relationship has been successfully established between the switch and the controller, the switch starts its management interfaces. The switch indicates that the PROFINET connection has been established correctly by means of an entry in the event table. 108998_en_01 PHOENIX CONTACT 97 / 122 FL SWITCH 2000 / FL NAT 2000 10.3 PROFINET alarms The FL SWITCH 22xx/23xx/24xx/25xx versions are able to send the following alarms (the alarms are deactivated upon device start): • Power supply management agent – (Slot 1) appears when redundant power supply is lost • MRP ring failure management agent – (Slot 1) appears when MRP manager detects ring failure, MRP clients do not support this alarm, PlugMem missing • PlugMem missing – (Slot 1) appears when pluggable memory is missing • Link monitoring – (SFP, interface or fixed) appears when link is down on that port • SFP module missing Standard PROFINET alarms • • • • Data transmission impossible – Appears when link is down or port mode does not match the specified values (default: disabled) Remote mismatch – Appears when neighbor information does not match the specified values (default: disabled) Media redundancy mismatch – Appears when MRP manager detects ring failures (default: disabled) Fiber optic mismatch – Appears when system reserve is reached or consumed on POF SCRJ ports (default: disabled) 10.3.1 Alarms in WBM In “PROFINET” operating mode, the “PROFINET Alarms” web page appears in the navigation bar under “Switch Station / Diagnostics”. All the alarms supported by the PN device can be activated there. The PN devices transmit the PROFINET alarms to the controller. The settings made for the PROFINET alarms can be saved with the configuration. The controller can transmit a differing alarm configuration to the switch and thereby overwrite the configuration settings. 98 / 122 PHOENIX CONTACT 108998_en_01 Operation as a PROFINET device 10.4 Process data communication 10.4.1 Control word/status word The control word is a special process data item which is used to make settings that cannot be implemented using standard process data. A command consisting of two bytes can be written to the control word of the management agent. The device responds with the same command in the status word. Byte 0 specifies the action and the new status; byte 1 specifies the port number. If a command is to apply to all the ports, value 0xFF can be sent instead of the port number. A command should only be sent once, but never in a process data communication cycle. The following alarms and settings can be activated or deactivated via the control word: Table 10-10 Alarms and settings Action Alarm link monitoring Status Byte 0 Byte 1 Enable 0x01 Portnum or 0xFF Disable 0x02 Portnum or 0xFF Enable 0x05 0x00 Disable 0x06 0x00 Enable 0x09 0x00 Disable 0x0a 0x00 Enable 0x0b 0x00 Disable 0x0c 0x00 Enable 0x0d Portnum or 0xFF Disable 0x0e Portnum or 0xFF Reset packet error indicator Reset 0x1F 0x00 Link enable status Enable 0x20 Portnum Disable 0x21 Portnum Alarm power supply Alarm MRP ring failure PlugMem missing SFP missing 10.4.2 • Other cyclic process data Diagnostic data – Link states of all ports (up to 4 bytes) Table 10-11 108998_en_01 Diagnostic data/link states Bit 7 6 5 4 3 2 1 0 Port 8/16/24 7/15/23 6/14/22 5/13/21 4/12/20 3/11/19 2/10/18 1/9/17 PHOENIX CONTACT 99 / 122 FL SWITCH 2000 / FL NAT 2000 – – Table 10-12 MRP ring failure Alarm contact Diagnostic data/link states Bit 7 6 5 4 Port MRP status Packet error indicator Alarm contact 1 0 - no diagnostics 1 - MRP ring failure 0 - no error 1 - error counter increased 0 - closed 1 - open – Table 10-13 3 2 1 0 Port information, one byte per port (ports constitute individual slot 2, subslot 1) – Blocking state – Port enable status – Far end fault status – Link status – SFP module available Diagnostic data/meaning Bit 7 3 2 1 0 Port Blocking mode 6 5 SFP modules Port enable status Far end fault Link status 0 - forwarding 1 - blocking 0 - none 1 - available 0 - enabled 1 - disabled 0 - no fault 1 - FEFI 0 - link down 1 - link up – 10.5 4 Additional bit for changing an error counter. The bit should be acknowledged before it is reset to “0” in order to prevent the loss of information. PDEV function description The PDEV function provides an extended range of functions for switches in PROFINET mode. This includes displaying of neighbor and topology information in the engineering tool. This information is determined using the Link Layer Discovery Protocol (LLDP) and can be used, for example, to compare the target and actual network. In addition, the PDEV function is used to display the transmitted information via the respective Ethernet ports. The PDEV function uses two submodules: – Interface submodule with port number 0x8X00 (X: from 0 to F) – Port submodule with port number 0x8IXX (I: interface ID; X: port number) These submodules are represented in the Step 7 engineering tool. PROFINET communication enables information about the port speed, duplex mode, and the link status to be read. An engineering tool reads the neighbor and topology information via SNMP, which it then displays. 100 / 122 PHOENIX CONTACT 108998_en_01 Layer 3 functions – routing and NAT 11 Layer 3 functions – routing and NAT The NAT switches of the FL NAT 2000 series provide a flexible port constellation and can thus be adapted to practically any application. Once the necessary interfaces have been created, the relevant ports can be defined, and the NAT mechanism or routing function can be configured. In a NAT application, all of the LAN devices that should be accessible from the WAN require a gateway address. An FL NAT 2000 switch should not simultaneously operate in NAT mode and as an MRP manager, because temporary connection interruptions can occur as a result of switchover or topology changes. This particularly applies to applications with real-time data communication (e.g., PROFINET). 11.1 Factory default To set the device to the factory default configuration, see “Using Smart mode” on page 9. The following NAT configuration is preset in the default state: – Routing active – LAN1 created (IP addressing: BootP, ports: 2 to 8) – LAN2 created (IP addressing: DHCP, ports: 1) 11.2 Creating interfaces New interfaces can be created in WBM under the NAT item. No NAT mode should be set on LAN1 if possible, as this interface provides additional LAN services (e.g., PROFINET and DHCP server). Figure 11-1 “Routing Interface / LAN” web page Here, the “+” character is used to create a new routing interface. The interface mode describes which type of interface is being created. The following options are available here: 108998_en_01 PHOENIX CONTACT 101 / 122 FL SWITCH 2000 / FL NAT 2000 Interface Mode: – LAN: The LAN type represents a simple routing interface. It is used if the NAT switch is to be used in a simple router mode or as an interface for a LAN area that is to be translated to another network. – 1 to 1 NAT: This setting creates a WAN interface that uses the 1:1 NAT mechanism to translate IP addresses from a LAN area to the WAN. – Virtual NAT: This setting creates a WAN interface that uses the virtual NAT mechanism to translate IP addresses from a LAN area to the WAN. – IP Masquerading: This setting creates a WAN interface that uses the IP masquerading mechanism to translate IP addresses from a LAN area to the WAN. IP Address: The IP address of the new interface is entered here. Network Mask: The subnet mask of the new interface is entered here. Following confirmation of the previous parameters, the physical ports can be assigned to the created interface: Figure 11-2 Interface Table: Figure 11-3 102 / 122 PHOENIX CONTACT “Routing Interface / LAN 1” web page Clicking on the “NAT Interface Table” link takes you to an overview table of all the configured interfaces. “NAT Interfaces Table” web page 108998_en_01 Layer 3 functions – routing and NAT 11.3 Static routing Static routing enables communication between two or more different subnets. The devices of the NAT 2000 series automatically route between the created LAN interfaces. You can create static routes via a link on the “Routing” page in the web interface: Figure 11-4 “Routing” web page The static routes can be configured by clicking on the “Static Routes Configuration” link: Figure 11-5 108998_en_01 “Static Routes Configuration” web page Network Address: IP address of the target network to which the static route refers. Network Mask: Subnet mask of the target network to which the static route refers. PHOENIX CONTACT 103 / 122 FL SWITCH 2000 / FL NAT 2000 Next Hop: IP address of the next router on the way to the target network. Preference: Specifies the priority of the static route. The lower the value, the higher the priority. The exception is “0”, which is used if no priority should be applied. Clear Static Routing Table: Click on the “Clear” button to delete all the static routes. For a default route, value 0.0.0.0 must be set for the network address and network mask. 11.4 Configuration of 1:1 NAT With 1:1 NAT, each device in the LAN is assigned an IP address from the higher-level network (WAN). The device can then be addressed from the WAN via this assigned address. Advantages: – No route/gateway configuration necessary in the WAN – Communication can be established from both the LAN and WAN – Not restricted to dedicated protocols Disadvantage: – An IP address must be reserved in the WAN for each device that should be accessible in the LAN Figure 11-6 “Routing Interface / 1TO1 1” web page Having created an interface with 1:1 NAT, you can configure the NAT rules via the “NAT 1-to-1” link: 104 / 122 PHOENIX CONTACT 108998_en_01 Layer 3 functions – routing and NAT Figure 11-7 108998_en_01 “1-to-1 NAT Configuration” web page Select Interface Select the correct interface from the list of all created 1:1 NAT interfaces. Start LAN IP Address Start IP address of the area that is to be translated. Start WAN IP Address Start IP address of the area that is to be translated to. Device Range Number of IP addresses that are to be translated. Clear 1-to-1 Click on the “Clear” button to delete the complete table for the selected interface. PHOENIX CONTACT 105 / 122 FL SWITCH 2000 / FL NAT 2000 11.5 Configuration of virtual NAT Virtual NAT Virtual NAT combines 1:1 NAT with a virtual router level. In this router level, the address is mapped from the LAN and is then transferred to the WAN from the virtual intermediate level as with standard routing. Advantage: – Only one IP address is required from the WAN for the NAT interface itself Disadvantage: – In the WAN, the route to the (virtual) network must be indicated and the NAT WAN interface entered as the next hop or gateway address. Figure 11-8 “Routing Interface / VIRT 1” web page Having created an interface using virtual NAT, you can configure the details via the “NAT Virtual” link: Figure 11-9 106 / 122 PHOENIX CONTACT “Virtual NAT Configuration” web page 108998_en_01 Layer 3 functions – routing and NAT Select Interface: Select the correct interface from the list of all created 1:1 NAT interfaces. Virtual Network: The IP address of the virtual network is entered here. LAN Start IP: Start IP address of the area that is to be translated to the virtual network. Device Range: Number of IP addresses that are to be translated. 11.6 Configuration of IP masquerading The NAT device acts as a proxy, so that all of the LAN devices communicate externally using the IP address of the NAT/WAN port. Various TCP/UDP ports are used to differentiate between the different LAN devices. Advantages: – No additional WAN addresses are required aside from the address for the NAT device itself – No route/gateway configuration necessary in the WAN Disadvantage: – WAN devices can only communicate with LAN devices via port forwarding Figure 11-10 “Routing Interface / MASQ 1” web page Having created an interface with IP masquerading, you can configure the details via the “NAT Port Forwarding” link so that port forwarding can be used. Standard IP masquerading does not require any detailed configuration and is automatically active following creation of the interface. Thus, all LAN areas are translated to this interface. 108998_en_01 PHOENIX CONTACT 107 / 122 FL SWITCH 2000 / FL NAT 2000 11.7 Configuration of port forwarding Enables a specific service of a specific LAN device to be accessed from the WAN network. During this process, the WAN interface of the NAT device is addressed using a defined TCP/UDP port number so that it can be forwarded to the desired LAN device. Figure 11-11 “IP Masquerading Configuration” web page Select Interface: Select the correct interface from the list of all created IP masquerading interfaces. Direction Select whether the WAN-to-LAN standard (destination) or LAN-to-WAN standard (source) should be applied. The configuration web page differs depending on the selected direction: Clear Port Forwarding: Click on the “Clear” button to delete the complete table for the selected interface. Destination port forwarding: Out IP Address: 108 / 122 PHOENIX CONTACT Target address for outgoing packets. 108998_en_01 Layer 3 functions – routing and NAT In TCP/UDP Port: Incoming TCP/UDP target port on the WAN side. Out TCP/UDP Port: Target port number with which the packet should be forwarded to the LAN (typical service port to be addressed, e.g., http (port 80)). Protocol: Select whether only UDP or TCP packets or both should be translated. Source port forwarding: Only necessary if protocols are being used that have a fixed port number as the specified source and they do not support dynamic port assignment. Figure 11-12 108998_en_01 “IP Masquerading Configuration” web page In IP Address: LAN address of the sending device for which this standard applies. Out IP Address: Source IP address used for the WAN. This is usually the WAN interface address (preset). In TCP/UDP Port: Source port of the sending device for which this standard applies. Out TCP/UDP Port: Source port used for communication from the NAT router to the device in the WAN. Protocol: Select whether only UDP or TCP packets or both should be translated. PHOENIX CONTACT 109 / 122 FL SWITCH 2000 / FL NAT 2000 11.8 Application examples To illustrate the configuration sequence, the following shows how a machine is connected to two higher-level WAN networks via 1:1 NAT. Five devices from the machine should be accessible from both higher-level networks: 192.168.10.2-192.168.10.6. Figure 11-13 Typical connection of a machine Step 1: Setting up the LAN interface – – – Once an IP address has been assigned on the LAN side, it can be used to access the web interface via the LAN ports. In this example, the NAT switch on the LAN has IP address 192.168.10.254. The configuration options for the NAT function are available under the “NAT” menu item. Two LAN interfaces have already been created in default mode. LAN1 with ports 2 to 8, and LAN2 with port 1. LAN1 is configured as the internal LAN interface with ports 3 to 8. LAN port assignment is based on the WAN configuration. Step 2: Setting up both WAN interfaces Setting up the first WAN interface: 1. Select LAN2 and set it up as a 1:1 NAT interface via the drop-down menu 2. Set the WAN IP parameters 3. Confirm the settings with “Apply” Setting up the second WAN interface: 1. Create another interface using the “+” button 2. Select 1:1 NAT and set the IP parameters 3. Confirm the settings with “Apply” 4. Use the check box to assign Port2 to the second WAN interface (The port is automatically deleted from LAN1) 5. Confirm the settings with “Apply” 110 / 122 PHOENIX CONTACT 108998_en_01 Layer 3 functions – routing and NAT Step 3: Configuring both NAT tables – 108998_en_01 There is a link in the 1:1 NAT interfaces for configuring the 1:1 NAT tables. The configuration window is opened via this link. You must set the following parameters there: Parameters for WAN 1 (1TO1 1) – Start LAN IP Address: 192.168.10.8 – Start WAN IP Address: 172.16.1.8 – Device Range: 8 Devices Parameters for WAN2 (1TO1 2) – Start LAN IP Address: 192.168.10.8 – Start WAN IP Address: 172.16.2.8 – Device Range: 8 Devices PHOENIX CONTACT 111 / 122 FL SWITCH 2000 / FL NAT 2000 112 / 122 PHOENIX CONTACT 108998_en_01 Appendix for document lists A Appendix for document lists A1 List of figures Section 2 Figure 2-1: Settings for the BootP server .............................................................. 13 Figure 2-2: BootP server ....................................................................................... 13 Figure 2-3: FL Network Manager with BootP/DHCP reservation list shown .......... 14 Figure 2-4: “IP Address Request Listener” window ............................................... 15 Figure 2-5: “Set IP Address” window with incorrect settings ................................. 15 Figure 2-6: “Assign IP Address” window ............................................................... 16 Figure 4-1: Login window ...................................................................................... 19 Figure 4-2: Start page for web-based management (example) ............................. 20 Figure 4-3: Web-based management header ....................................................... 21 Figure 4-4: “Help & Documentation” web page ..................................................... 22 Figure 4-5: “Device Status” web page ................................................................... 23 Figure 4-6: “Local Diagnostics” web page ............................................................. 23 Figure 4-7: “Alarm & Events” web page ................................................................ 24 Figure 4-8: “Port Table” web page ........................................................................ 25 Figure 4-9: “MAC Address Table” web page ......................................................... 26 Figure 4-10: “PROFINET Status” web page ............................................................ 26 Figure 4-11: “User Management” web page ........................................................... 27 Figure 4-12: “System” web page ............................................................................. 29 Figure 4-13: “Firmware update via HTTP” pop-up ................................................... 30 Figure 4-14: “Firmware update via TFTP” pop-up ................................................... 30 Figure 4-15: “Advanced Configuration” – transferring the configuration file via HTTP .................................................................................................. 32 Figure 4-16: “Advanced Configuration” – transferring the snapshot file via HTTP .................................................................................................. 32 Figure 4-17: “Advanced Configuration” – transferring the configuration file via TFTP ................................................................................................... 33 Figure 4-18: “Advanced Configuration” – transferring the snapshot file via TFTP ................................................................................................... 33 Figure 4-19: “Security Context” pop-up ................................................................... 34 Figure 4-20: “Administrator Password” configuration area ...................................... 34 Section 4 108998_en_01 PHOENIX CONTACT 113 / 122 FL SWITCH 2000 / FL NAT 2000 Figure 4-21: “Administrator Password” configuration area ...................................... 35 Figure 4-22: “Quick Setup” web page ..................................................................... 35 Figure 4-23: “Network” web page ............................................................................ 37 Figure 4-24: ACD status information on the “Device Status” page .......................... 38 Figure 4-25: “Service” web page ............................................................................. 39 Figure 4-26: “PROFINET Configuration” web page ................................................. 42 Figure 4-27: “Port Configuration” web page ............................................................ 43 Figure 4-28: “Port Configuration Table” web page .................................................. 45 Figure 4-29: “VLAN Configuration” web page ......................................................... 46 Figure 4-30: “Multicast Filtering” web page ............................................................. 46 Figure 4-31: “Spanning-Tree Configuration” area ................................................... 47 Figure 4-32: “RSTP Port Configuration” web page .................................................. 49 Figure 4-33: “RSTP Port Configuration Table” web page ........................................ 50 Figure 4-34: “Security” web page ............................................................................ 51 Figure 4-35: “Port Based Security” web page ......................................................... 52 Figure 4-36: “Dot1x Port Configuration Table” web page ........................................ 54 Figure 4-37: “Dot1x Port Configuration” web page .................................................. 55 Figure 4-38: “DHCP Service” web page .................................................................. 56 Figure 4-39: “DHCP Port Local Service” pop-up ..................................................... 58 Figure 4-40: “DHCP Static Leases” pop-up ............................................................. 59 Figure 4-41: “Local Events” web page .................................................................... 60 Figure 4-42: “Quality of Service” web page ............................................................. 61 Figure 4-43: “RSTP Diagnostic” web page .............................................................. 63 Figure 4-44: “MRP Diagnostic” web page ............................................................... 63 Figure 4-45: “Port Mirroring” web page ................................................................... 64 Figure 4-46: “Trap Manager” web page .................................................................. 65 Figure 4-47: “Port Counter” web page ..................................................................... 66 Figure 4-48: “Port Details” web page ...................................................................... 67 Figure 4-49: “Port Utilization” web page .................................................................. 67 Figure 4-50: “Snapshot” web page .......................................................................... 68 Figure 4-51: “Syslog” web page .............................................................................. 69 Figure 4-52: “SFP Diagnostics” web page .............................................................. 72 Figure 5-1: “Link Aggregation” web page .............................................................. 73 Figure 5-2: “Configure Trunk” web page ............................................................... 74 Section 5 114 / 122 PHOENIX CONTACT 108998_en_01 List of figures Section 7 Figure 7-1: “Link Layer Discovery Protocol” web page .......................................... 80 Figure 7-2: “LLDP Topology” web page ................................................................ 81 Figure 8-1: “Multicast Filtering” web page ............................................................. 83 Figure 8-2: “Current Multicast Groups” web page ................................................. 84 Figure 9-1: “VLAN Configuration” web page ......................................................... 85 Figure 9-2: “Static VLAN Configuration” web page ............................................... 86 Figure 9-3: “VLAN Port configuration” web page ................................................... 87 Figure 9-4: “VLAN Port Configuration Table” web page ........................................ 87 Figure 9-5: “Current VLANs” web page ................................................................. 87 Figure 10-1: Integrating the devices in the engineering tool .................................... 90 Figure 11-1: “Routing Interface / LAN” web page .................................................. 101 Figure 11-2: “Routing Interface / LAN 1” web page ............................................... 102 Figure 11-3: “NAT Interfaces Table” web page ..................................................... 102 Figure 11-4: “Routing” web page .......................................................................... 103 Figure 11-5: “Static Routes Configuration” web page ........................................... 103 Figure 11-6: “Routing Interface / 1TO1 1” web page ............................................. 104 Figure 11-7: “1-to-1 NAT Configuration” web page ............................................... 105 Figure 11-8: “Routing Interface / VIRT 1” web page .............................................. 106 Figure 11-9: “Virtual NAT Configuration” web page .............................................. 106 Figure 11-10: “Routing Interface / MASQ 1” web page ........................................... 107 Figure 11-11: “IP Masquerading Configuration” web page ...................................... 108 Figure 11-12: “IP Masquerading Configuration” web page ...................................... 109 Figure 11-13: Typical connection of a machine ....................................................... 110 Section 8 Section 9 Section 10 Section 11 108998_en_01 PHOENIX CONTACT 115 / 122 FL SWITCH 2000 / FL NAT 2000 116 / 122 PHOENIX CONTACT 108998_en_01 List of tables A2 List of tables Section 2 Table 2-1: Operating modes in Smart mode ......................................................... 10 Table 4-1: Syslog.................................................................................................. 70 Table 7-1: Event table for LLDP............................................................................ 80 Table 10-1: Slot 1/1 inputs ...................................................................................... 91 Table 10-2: Slot 1/1 outputs.................................................................................... 91 Table 10-4: Record index 0x0PP (PP - port number) – Slot2 Subslot1 ................... 92 Table 10-3: Slot 2/1 inputs ...................................................................................... 92 Table 10-5: Record index 0x1PP (PP - port number) – Slot2 Subslot1 ................... 93 Table 10-6: Record index 1 – Slot1 Subslot1.......................................................... 93 Table 10-7: Record index 2 – Slot1 Subslot1.......................................................... 95 Table 10-8: Record index 3 – Slot1 Subslot1.......................................................... 95 Table 10-9: Standard record information ................................................................ 96 Table 10-10: Alarms and settings ............................................................................. 99 Table 10-11: Diagnostic data/link states ................................................................... 99 Table 10-12: Diagnostic data/link states ................................................................. 100 Table 10-13: Diagnostic data/meaning ................................................................... 100 Section 4 Section 7 Section 10 108998_en_01 PHOENIX CONTACT 117 / 122 FL SWITCH 2000 / FL NAT 2000 118 / 122 PHOENIX CONTACT 108998_en_01 Index A3 Index Numerics 802.1w ........................................................................ 47 A ACD status.................................................................. Address Conflict Detection.......................................... Address table .............................................................. Admin Cost ................................................................. Admin Edge ................................................................ Admin Path Cost ......................................................... Administrator password .............................................. Agent .......................................................................... Alarm .......................................................................... Alarm contact .............................................................. ASN1 SNMP objects................................................... Auto Edge ................................................................... Auto Query Ports......................................................... Automation Profile....................................................... 38 38 17 50 49 49 34 76 24 60 76 49 84 36 B Baumstruktur der MIB ................................................. BootP .......................................................................... BootP request ............................................................. BPDU packets............................................................. Bridge Forward Delay ................................................. Bridge Hello Time ....................................................... Bridge Max Age .......................................................... Bridge Priority ............................................................. 77 12 12 18 48 48 48 48 Destination address .................................................... Destination address field............................................. Destination Port .......................................................... Device status .............................................................. DHCP Option 82 ......................................................... DHCP Relay Agent ..................................................... DHCP server............................................................... DHCP Services ........................................................... dot1dBridge ................................................................ 17 17 64 23 56 56 11 56 75 E Egress......................................................................... etherMIB ..................................................................... Events......................................................................... Extension BUQ ........................................................... Extensions FUQ.......................................................... 64 75 24 84 84 F Factory settings............................................................. 7 Fast Ring Detection .................................................... 47 Firmware Update ........................................................ 29 FL Managed Infrastructure MIB .................................. 75 Forward Delay............................................................. 48 Fragments................................................................... 17 H Hello Time................................................................... 48 I C Class of Service .......................................................... Clear AQP ................................................................... CoS............................................................................. CRC error.................................................................... 18 84 18 17 D Default IP address....................................................... 11 Default Priority............................................................. 44 Delivery state ................................................................ 7 Designated Bridge ...................................................... 49 Designated Cost ......................................................... 50 Designated Root ......................................................... 49 108998_en_01 IEEE 802.1D ............................................................... 18 ifMIB............................................................................ 75 IGMP Query Version ................................................... 83 IGMP Snooping........................................................... 83 Ingress ........................................................................ 64 IP configuration ............................................................. 9 IP MIB ......................................................................... 75 IPAssign.exe ............................................................... 14 L Learning addresses .................................................... Link Monitoring ........................................................... List of Static VLANs .................................................... LLDP........................................................................... PHOENIX CONTACT 17 44 86 40 119 / 122 FL SWITCH 2000 / FL NAT 2000 lldpMIB........................................................................ 75 Local Events ............................................................... 60 R MAC Address Table.................................................... 26 Management Information Base ............................. 75, 76 Max Age...................................................................... 48 MIB ............................................................................. 75 Mirroring................................................................ 45, 64 Monitored link ............................................................. 60 Multi-address function................................................. 17 Multicast/broadcast address ....................................... 17 Receive queue ............................................................ Redundancy ............................................................... Relay Agent ................................................................ Reset .......................................................................... RFC1213 MIB ............................................................. rmon............................................................................ Root ............................................................................ Root Cost.................................................................... Root Port..................................................................... RSTP .......................................................................... rstpMIB ....................................................................... N S Network Redundancy.................................................. 47 Simple Network Management..................................... 75 Smart mode .................................................................. 9 SNMP ......................................................................... 75 SNMP interface........................................................... 75 snmpFrameworkMIB................................................... 75 snmpMIB .................................................................... 75 Snoop Aging Time ...................................................... 83 Source and destination addresses.............................. 17 Static Query Ports ....................................................... 84 Store-and-forward mode............................................. 17 M O Operating Edge........................................................... Operating modes ........................................................ Operating Path Cost.................................................... Option 82 .................................................................... 49 10 49 56 P Packet processing sequence ...................................... 18 Password .................................................................... 34 Path Cost .................................................................... 49 pBridgeMIB ................................................................. 75 Port Counter................................................................ 66 Port ID ......................................................................... 49 Port Mirroring ........................................................ 45, 64 Port Table ................................................................... 25 Prioritization ................................................................ 18 Priority......................................................................... 18 Priority queues ............................................................ 18 Processing queue ....................................................... 18 Processing rules ......................................................... 18 18 47 56 29 75 75 49 63 63 47 75 T Tagged ....................................................................... Topology Change ....................................................... Traffic classes ............................................................. Transparent ................................................................ Trap ............................................................................ Trap Manager ............................................................. 85 63 18 85 75 65 U Utilization .................................................................... 67 V Q VLAN/priority tag......................................................... 18 qBridgeMIB ................................................................. QoS............................................................................. Quality of Service ........................................................ Query Interval.............................................................. Queue ......................................................................... Quick Setup ................................................................ 120 / 122 PHOENIX CONTACT 75 18 18 83 18 35 108998_en_01 Please observe the following notes General Terms and Conditions of use for technical documentation Phoenix Contact reserves the right to alter, correct, and/or improve the technical documentation and the products described in the technical documentation at its own discretion and without giving prior notice, insofar as this is reasonable for the user. The same applies to any technical changes that serve the purpose of technical progress. The receipt of technical documentation (in particular user documentation) does not constitute any further duty on the part of Phoenix Contact to furnish information on modifications to products and/or technical documentation. You are responsible to verify the suitability and intended use of the products in your specific application, in particular with regard to observing the applicable standards and regulations. All information made available in the technical data is supplied without any accompanying guarantee, whether expressly mentioned, implied or tacitly assumed. In general, the provisions of the current general Terms and Conditions of Phoenix Contact apply exclusively, in particular as concerns any warranty liability. This manual, including all illustrations contained herein, is copyright protected. Any changes to the contents or the publication of extracts of this document are prohibited. Phoenix Contact reserves the right to register its own intellectual property rights for the product identifications of Phoenix Contact products that are used here. Registration of such intellectual property rights by third parties is prohibited. Other product identifications may be afforded legal protection, even where they may not be indicated as such. PHOENIX CONTACT 121 / 122 122 How to contact us Internet Up-to-date information on Phoenix Contact products and our Terms and Conditions can be found on the Internet at: phoenixcontact.com Make sure you always use the latest documentation. It can be downloaded at: phoenixcontact.net/products Subsidiaries If there are any problems that cannot be solved using the documentation, please contact your Phoenix Contact subsidiary. Subsidiary contact information is available at phoenixcontact.com. Published by PHOENIX CONTACT GmbH & Co. KG Flachsmarktstraße 8 32825 Blomberg GERMANY Should you have any suggestions or recommendations for improvement of the contents and layout of our manuals, please send your comments to: tecdoc@phoenixcontact.com 122 / 122 PHOENIX CONTACT GmbH & Co. KG • Flachsmarktstraße 8 • 32825 Blomberg • Germany phoenixcontact.com © PHOENIX CONTACT 2020-07-07 108998_en_01 Order No. —01 PHOENIX CONTACT GmbH & Co. KG Flachsmarktstraße 8 32825 Blomberg, Germany Phone: +49 5235 3-00 Fax: +49 5235 3-41200 E-mail: info@phoenixcontact.com phoenixcontact.com
2702906 价格&库存

很抱歉,暂时无法提供与“2702906”相匹配的价格&库存,您可以联系我们找货

免费人工找货
2702906
  •  国内价格 香港价格
  • 1+20012.541511+2503.11041

库存:3

2702906
    •  国内价格
    • 1+15787.87684

    库存:1