Barox L Series Operating Instructions Manual Download Page 56

barox Kommunikation 

 

 

 

56 

 

The new configuration is effected in two steps:  
 
 

Step 1: 

 
The next example shows the setting of the following values for a new configuration:  

 

Trap Config Name -> A name should be allocated 

UDP or TCP 

– UDP should be used for a start as usual 

Trap Version -> Selection of SNMP v3 

Trap Community -> The previously generated community name must be entered here 

Trap Destination Address -> Entry of the IP address of the trap recipient  

Trap Destination Port -> Entry of the port at the recipient 

Trap Inform Mode -> Disabled in this example 

Trap Inform Timeout (seconds) -> 3 is entered (Standard) 

Trap Inform Retry Times -> 5 (Standard) 

Trap Probe Security Engine ID -> Should be disabled 

Trap Security Engine ID -

> The user‘s Engine ID must be entered here 

Trap Security Name -

> Currently only „None“ can be selected 

 

Following this the settings are conf

irmed by clicking „Apply“. 

 

 
 
 

Following the confirmation of the configuration a note is displayed, that a respective Security Name 
should be set. This is configured in step 2. 
 
 

 

 

Summary of Contents for L Series

Page 1: ...23 26 RY LGSO25 24 RY LGSO25 28 RY LGSP16 10 RY LGSP23 10G RY LGSP23 26 xxx RY LGSP23 28 xxx RY LGSP23 52 xxx RY LGSPTR23 26 RY Industrial Switches of the L series RY LPIGE 602GBTME RY LPIGE 804GBTME...

Page 2: ...ed trademark or registered brand mentioned in this manual is the property of the respective manufacturer Liability Information contained in this document may be changed without prior notice barox Komm...

Page 3: ...figuration 19 3 11 2 PoE Power Delay 20 3 11 3 PoE Schedule 21 3 11 4 PoE Auto Checking 21 3 11 5 PoE Chip Reset Schedule 22 3 12 Saving and Retrieving the Configuration 22 3 12 1 Download Configurati...

Page 4: ...Trap Configuration 46 5 4 3 Supplementary Information regarding the Sending of SNMP Traps 49 5 5 SNMP v3 Configuration 51 5 5 1 Activation of the SNMP v3 Function 51 5 5 2 SNMP Trap Configuration 55 5...

Page 5: ...s well as download links to our data sheets documentation and the latest firmware are available on our website www barox ch 1 4 Support Our POWERHAUS Partners are available to help you should you have...

Page 6: ...These allow the user to quickly access specific network equipment even without special knowledge of the IP structure Finalised plans can then be exported and included in the documentation 3 Commission...

Page 7: ...rox Kommunikation 7 3 2 System Information This page displays the most important information on the switch Key 1 Name of the switch model 2 Firmware version 3 Hardware version 4 MAC address 1 3 2 4 1...

Page 8: ...needs to be changed DHCP If the switch is to be integrated into a network where a DHCP server allocates the IP addresses the check box underneath IPv4 DHCP needs to be checked The DHCP server will th...

Page 9: ...eated using the right address The network address must be set to 0 0 0 0 and the mask length to 0 Then all that needs to be done is to rewrite the gateway address using one that corresponds to the net...

Page 10: ...IP address of the DHCP server is then displayed in the line below However if the time is to be retrieved from another specific source for example from a time server NTP server firewall etc the respec...

Page 11: ...stem Time menu As time servers generally broadcast Greenwich Mean Time the Time Zone must be selected accordingly to ensure that 1 the time is correct and 2 the system switches correctly between summe...

Page 12: ...ports are also equipped with an Auto mode This is different to the auto negotiation procedure used by copper ports SFP ports are only capable of recognising the transmission speed through auto negotia...

Page 13: ...s Another user can be generated by clicking on Add New User Then the User Name Password and Privilege Level need to be defined The exact range of rights applying to the new user can now be defined in...

Page 14: ...ature was specially designed to handle such situations Once this feature has been activated it is possible to define whether the respective port should be shut down merely an entry made in the log fil...

Page 15: ...il in Wikipedia https de wikipedia org wiki Spanning_Tree_Protocol 3 9 1 Ring Master In a ring topology one switch must be defined as the master which then assumes the task of monitoring the ring In t...

Page 16: ...for A to B connections which meant that they were expensive Example In a larger ring with numerous terminal devices and larger data volumes it makes sense to channel the data flow within the ring to d...

Page 17: ...e video cameras causing a bottleneck Scenario 3 RTSP active the master and Path Cost have been defined This configuration precisely defines how the data should flow The load is distributed on two side...

Page 18: ...between two switches Hybrid Connection between two switches or to a terminal device The allowed VLANs can be defined in the Allowed VLANs column both in Trunk and Hybrid mode 3 11 Power over Ethernet...

Page 19: ...POE appliances are divided into various categories depending on their respective consumption Class Power available to the powered device Classification signature 0 0 44 12 96 W 0 to 4 mA 1 0 44 3 84...

Page 20: ...d 3 11 2 PoE Power Delay As already mentioned the switch can provide a limited amount of power However today s IP cameras require an ever increasing amount of power If a pan tilt camera with an integr...

Page 21: ...every day from 06 00 to 18 00 Hrs in Profile 1 3 11 4 PoE Auto Checking PoE Auto Checking is used to monitor functionality For example the camera connected to port 1 with IP address 192 168 1 25 can...

Page 22: ...set command can be sent daily or once a week for example at 03 00 Hrs This command causes the PoE chip in the camera to reboot 3 12 Saving and Retrieving the Configuration All changes must be saved Cl...

Page 23: ...where several switches are to be identically configured and only the respective IP address changed That saves a huge amount of time We strongly recommend saving the startup config file 3 12 2 Upload C...

Page 24: ...e terminal device or are no longer available in the network e g service laptop that is taken home by the installation technician after having completed the configuration To be able to use DMS one swit...

Page 25: ...in other network segments are listed This useful function helps when a non configured device is integrated into the network the IP address of which is unknown The connection to a device can be checked...

Page 26: ...ess data rate etc are displayed next to the symbol All the settings can also be manually configured By clicking on a symbol the Dashboard of the respective device is displayed In this Dashboard the de...

Page 27: ...ew and the Remove symbol is made available in the Dashboard By clicking on Remove this device is permanently removed from the topology view It is vital to select Remove when for example a defective ca...

Page 28: ...device is displayed in blue in the network diagram This tool also offers the option of printing out the network plan in SVG or PNG format or directly to a PDF document This requires first selecting th...

Page 29: ...carrying out on site tasks and can also be printed out to document the system as described above To position a camera or switch in a plan all that needs to be done is to click on the respective device...

Page 30: ...aintenance menu The path and file name must be entered in the Floor Image menu and then uploaded using Add The uploaded plans are then listed in the lower section of the web page Up to 50 files can be...

Page 31: ...data sent and received by each port during the course of the day One can choose between displaying the information for a specific date or in a day or week view If one now clicks on the bar of any indi...

Page 32: ...ettings The manual selection of the required ETH standard is required in some scenarios For example in case of a connection of network components which do not provide an automatic negotiation of the s...

Page 33: ...calculating the demand 5 1 3 Securing the ports using MAC configuration settings The MAC table Besides the automatic management the MAC table can basically also be adjusted manually This is often requ...

Page 34: ...r planning purposes the complete number of network devices including the unmanaged switch which are connected to the respective port of the barox switch needs to be determined E g The total limit is 4...

Page 35: ...rabilities Example of a basic configuration and commissioning of the DHCP service At first the VLAN range of the service is determined Then the service is generally activated in the Mode with the sett...

Page 36: ...wing this a DHCP service name is determined and confirmed Following the determination of the name the settings are called up by selecting the name as shown below The following configuration appears up...

Page 37: ...nts can be realised using ARP Inspection Following activation of the functions the DHCP clients can be managed statically as recipients in a table The setting of the size of the DHCP address pool usin...

Page 38: ...ng this the VLANs which shall be included in the check are determined and the log type trust position is determined as shown below The DHCP clients can be connected upon the completion of the settings...

Page 39: ...barox Kommunikation 39 The following screenshot shows a static entry An IP address is reserved for the client according to the table...

Page 40: ...on is switched on the configuration can be effected using static entries as shown below The use of IP Source Guard enables the extended protection function by securing the ports by means of the MAC an...

Page 41: ...user Basic settings of user rights and privileges The privilege level serves the purpose of grading the rights to apply configuration settings and read write rights of such values resp It is generall...

Page 42: ...hods can be set as shown below The use of the SSH protocol for the command line based management CLI is recommended as this method provides the encrypted connection Management of the access to the web...

Page 43: ...and Use of HTTPS The setting option for using the HTTPS protocol is shown below The standard port can be changed also for this method The http option should be disabled where this mode is activated Th...

Page 44: ...e use should be verified as the connection to the management can only be effected using the media with enabled certificate Setting options and methods resp are shown in the following Generation of the...

Page 45: ...4 1 Configuration of SNMP v2c The following example describes a basic SNMP v2 configuration for a system status enquiry or the transmission of system events via SNMP traps The following steps shall sh...

Page 46: ...nfig Name A name should be allocated Trap Mode UDP or TCP As usual UDP should be used for a start Trap Version Selection of SNMP v2c Trap Community The previously generated community name must be ente...

Page 47: ...barox Kommunikation 47 Step 2 Following the generation of a new configuration such configuration is opened by selecting the name...

Page 48: ...barox Kommunikation 48 Activation of the SNMP Trap Function The general mode must be enabled following completion of the trap configuration...

Page 49: ...er terminal device elsewhere in the configuration menu as shown in the following screenshot Some events such like e g port events must also be set accordingly in the port configuration ATTENTION For i...

Page 50: ...barox Kommunikation 50...

Page 51: ...ed using SNMP in version 3 with authentication The following example describes a basic SNMP v3 configuration for a system status enquiry or the transmission of system events via SNMP traps The followi...

Page 52: ...eneration of a dedicated Community When generating the community the setting of source IP and mask can remain as 0 0 0 0 in each case This enables the transmission and the receipt of SNMP messages acr...

Page 53: ...can simply be copied and inserted from the default_user entry In this example the security level Auth Priv shall also be set along with the determination of the user name When selecting the authentic...

Page 54: ...iously generated user name shall be selected as Security Name following this a group name must be determined Setting the View Configuration At the beginning the View Name is determined Setting the OID...

Page 55: ...lected in Group Name Furthermore the Security Model usm and the Security Level Auth Priv are allocated to the group The latter ones are required for reading and writing the views which were previously...

Page 56: ...of the IP address of the trap recipient Trap Destination Port Entry of the port at the recipient Trap Inform Mode Disabled in this example Trap Inform Timeout seconds 3 is entered Standard Trap Inform...

Page 57: ...barox Kommunikation 57 Step 2 Following the generation of a new configuration such configuration is opened by selecting the name Now the entry Trap Security Name can be set to the SNMP user name...

Page 58: ...barox Kommunikation 58 Activation of the SNMP Trap Function The general mode must be enabled following completion of the trap configuration...

Page 59: ...re configured accordingly These settings can be configured per terminal device elsewhere in the configuration menu as shown in the following screenshot Some events such like e g port events must also...

Page 60: ...ng the following example Starting position A PoE camera is unplugged and plugged in again at the Ethernet port 3 of the switch A PC in the network is configured for the receipt of SNMP traps The softw...

Page 61: ...barox Kommunikation 61 View of the information in the SNMP browser PoE camera is connected again PD device is online Recording of the information which is sent by the switch...

Page 62: ...ecause of manufacturer specific aspects so called MIB files are frequently required for enquiring the devices These files comprise information about the identification parameters of the functions Enqu...

Page 63: ...rox Kommunikation 63 Please pay attention to the respective software vendor s licencing conditions when using the software Following the successful import the MIB structures are available as shown bel...

Page 64: ...x switches The basic SNMP configurations at the switch and of the MIB browser are preconditions In the following an example for using the SET operation for triggering a port deactivation and re activa...

Page 65: ...ion is opened by a click on Go and the OID entry is complemented by 2 label of port 2 In addition to this the value 1 for activation is entered and confirmed by OK A respective success message is gene...

Page 66: ...re as the software is regularly updated to remove bugs New features are also introduced Following the upgrade the new firmware is immediately available Any old firmware can very simply be re activated...

Page 67: ...s at any time This is done either via the Maintenance Factory Defaults menu or by pressing the reset button at the front for longer than 10 seconds Checking the Keep IP setup box ensures that the swit...

Page 68: ...r Report When submitting a request for support the server report should also be provided This contains a description of the whole configuration as well as useful information for the support technician...

Page 69: ...emoved rendered illegible or changed In addition the warranty shall not cover the following damage 1 Damage caused by an accident or improper or incorrect operation of the device in particular non com...

Reviews: