background image

 

Web application

 

 

 

PROmesh P20 - User Manual  

40 

 

Configure the protocol for your application case: 

  Forward delay: The time that a port waits before it switches from RSTP Learning and Listening 

status in den Forwarding status. Enter a value between 4 and 30 seconds. 

  Maximum age: The time that a bridge  waits before  trying  a new configuration  without receiving 

messages from the Spanning Tree configuration protocol. Enter a value between 6 and 40 seconds. 

  Priority: This value is used for the negotiation of the root bridge. The bridge with the lowest value 

has highest priority and is selected as root bridge. The value has to lie between 0 and 61440 and 

be a multiple of 4096. 

  Hello time: The time interval in which the switch sends BPDU packages (Bridge Protocol Data Unit) 

to check the current status of the RSTP. Enter a value between 1 and 10 seconds. 

  Max hop: Here you can limit the number of hops. After the specified number has been reached, the 

BPDU package is rejected. 

  Revision & Name: These values are important for MSTP. Switches that use the same values belong 

to a single MST region. 

 

 

 

Use  the  rule  mentioned  below  to  configure  Forward  Delay,  Maximum  Age  and  Hello  Time: 

2*(ForwardDelayTime-1) >= MaxAge >= 2*(He1) 

 

 

Recommended procedure for setting the parameter: First select a value for the 

Hello Time

. Subsequently 

calculate the lower limit of the Maximum Age with the formula 2 * (Hello Time + 1). Now select a value for 

the 

Forward  Delay  Time

.  From  this,  calculate  the  upper  limit  for  the  Maximum  Age  with  the  formula 

2*(Forward Delay Time – 1). Subsequently, set the Maximum Age to a value that lies between the lower 

and  upper  limits  calculated  earlier.  Keep  in  mind  that  the  value  additionally  must  lie  between  6  and  40 

seconds. If this is not the case, use new values for 

Hello Time

 and 

Forward Delay Time

 to determine the 

Maximum Age with upper and lower limit. 

After suitable values have been created, click Apply to save the changes. The Root bridge information is 

now displayed in the upper area of the page. 

Instance Configuration 

In this menu, you can create Multiple Spanning Tree instances. In principle, you could create a separate 

spanning tree for each VLAN. The following settings are required for this: 

 

MSTI ID

: Select the “Multiple Spanning Tree Instance ID here. This ID has to identical for all 

switches that belong to the same spanning tree. 

 

Bridge Priority

: Each device participating in an MSTI can be assigned a priority. The values can 

be assigned in steps of 4096 (starting with 4096). The lower the value, the higher the assigned 

priority. The device that has the lowest priority is declared to be the spanning tree master. 

Summary of Contents for PROmesh P20

Page 1: ......

Page 2: ...ndu sol com Our Technical Support team can be contacted at 49 0 34491 58 18 14 on workdays from 7 30 a m 16 30 p m CET Or send us an e mail to support indu sol com Your system is at a standstill You c...

Page 3: ...the written consent of Indu Sol GmbH All rights under copyright law are expressly reserved for Indu Sol GmbH W A R N I N G This device may only be put into operation and operated by qualified personne...

Page 4: ...ing 14 2 5 1 Data ports 14 2 5 2 Media selection and connection 14 2 5 3 Cabling 15 2 6 Network topology and media redundancy 16 2 6 1 Network topology 16 2 7 Ring structure 17 2 7 1 Ring redundancy 1...

Page 5: ...ia Redundancy Protocol MRP 43 3 8 Network security 44 3 8 1 Access control 44 3 8 2 E mail alarm 44 3 9 NAT configuration 44 3 9 1 NAT configuration rules 44 3 9 2 NAT binding 45 3 10 Advanced config...

Page 6: ...s 16x RJ45 10Base T 100Base TX 4x SFP 10 100Base TX 1000Base X PHY and MAC completely compatible to IEEE 802 3 IEEE802 3u and IEEE 802 3x Auto MDI MDI X for 10 100BASE TX autonegotiation Switch mode S...

Page 7: ...to the first commissioning insert the external memory card into the appropriate slot on the rear of the device see Figure 1 Figure 1 Micro SD card slot at the rear of the PROmesh P20 1 3 Safety inform...

Page 8: ...ptimal use The device has been developed for IP30 compliant protective environments If you use the device in a different environment take suitable measures to ensure proper operation of the device Do...

Page 9: ...Device ports and status indicators PROmesh P20 User Manual 9 2 Device ports and status indicators 2 1 Device ports Figure 2 Device ports...

Page 10: ...ropriate spare parts to mount the device in your system in such a way that it has adequate electrical contact and can withstand the mechanical stress 2 2 Installation instructions The PROmesh P20 is i...

Page 11: ...al heat radiation and observe the approved temperature range for storage and operation 2 3 Voltage supply connection and fault relay Operate your PROmesh P20 with a nominal voltage of DC 12 V to 48 V...

Page 12: ...ntial free fault relay contact opener at the device internal OUT terminal The relay serves as an alarm receiver and can be linked in the software with various alarm triggers Depending on the configura...

Page 13: ...OFINET network see Table 1 LED Status Meaning VDC1 Green Voltage at terminal is sufficient Off Voltage at terminal is not sufficient VDC2 Green Voltage at terminal is sufficient Off Voltage at termina...

Page 14: ...via the Web Based Management WBM of the PROmesh P20 The PROmesh P20 fully supports all media types and associated functions of the PHY layer and LNK layer also via the four SFP slots Take care to sel...

Page 15: ...wisted pair cables Cat 5 or higher with a max line length of up to 100 m The actual line length has to be limited depending on the project planning and commissioning as well as the attenuation values...

Page 16: ...s described as a star structure see Figure 6 in which each device can exchange information with the other network devices via a central distributor If the network structure is expanded by meshing seve...

Page 17: ...between two devices of the ring structure should be interrupted The industrial Ethernet switch plays a key role in the implementation of a redundant network structure by logically restricting the forw...

Page 18: ...ncy The PROmesh P20 makes it possible to set up simple ring redundancies as described in Section 2 7 The following function protocols are used to set up ring structures 2 7 1 1 Netload balancing In th...

Page 19: ...ell as NET routing functionality with basic firewall properties Network devices within the LAN automation environment are thus efficiently protected against access of network components that are outsi...

Page 20: ...resses can be conducted easily with the Indu Sol ServiceTool This is available for download free of charge from the following link https www indu sol com servicetool Our software is updated regularly...

Page 21: ...sed in the web interface for a simple status indication of the individual ports No fault Communication is functioning without any problems Warning At least one communication fault discard error has oc...

Page 22: ...pective detail information The number of messages that occurred is displayed in the Messages window The entries in the Message list are opened automatically with a mouse click on the alarm bell The me...

Page 23: ...m an overview of the activated or deactivated protocols and functions are displayed in addition to the device information By selecting the respective edit button you can switch directly to the corresp...

Page 24: ...tion are displayed in the information bar at the top right and help you assign the web interface to a device Figure 9 Basic settings of the PROmesh P20 3 5 2 Network settings The IP can be configured...

Page 25: ...that there are no problems with double IP addresses that can negatively influence your entire network The format of the IP address the subnet mask and the gateway has to be entered with decimal points...

Page 26: ...en selecting the password Avoid dictionary entries Choose complex character strings Create combinations of letters numerals and special characters Use uppercase and lowercase letters Password length A...

Page 27: ...and Hypertext Transfer Protocol Secure HTTPS are communication protocols in the World Wide Web Contrary to HTTP HTTPS offers advanced security mechanisms In this menu you can activate or deactivate th...

Page 28: ...in addition to the current value Using this function the PROmesh series also offers mechanisms for detecting EMC interference or couplings Other functions Downloading the frequency spectrum after a th...

Page 29: ...ROFINET field devices The file is written in General Station Description Markup Language GSDML and serves as a basis for planning the configuration of a PROFINET IO system The option is also available...

Page 30: ...cal fibre Status Status signals the current status of the port o Link The port is activated and a connection has been established o Lose The port is inactive or deactivated Transmission rate The baud...

Page 31: ...view provides the following settings Port Displays the port number that is also marked on the housing Broadcast The set limits are valid for all broadcast packages at all devices in the network Multic...

Page 32: ...destination port Destination Select a destination to which all source port data to be monitored is to be forwarded Direction Please select which package direction you want to mirror It is possible to...

Page 33: ...the option Network Limit messages can be sent if the configured limit is exceeded SD card error If an error occurs in the SD card a message is issued The created alarms can be linked to one or more al...

Page 34: ...Web application PROmesh P20 User Manual 34 Figure 18 Alarms Notifications Adding an alarm trigger...

Page 35: ...to combine the ports Port list From this list select the ports that are to be combined into a logical port Keep in mind that a port can only be assigned to a group 3 6 6 2 LACP Configuration In this...

Page 36: ...ics In the graphical display for the port load the current incoming or outgoing netload as well as the minimum average and maximum values for the selected port are displayed In particular for the low...

Page 37: ...on 3 7 1 VLAN configuration A virtual LAN VLAN is a logical group of network devices A VLAN permits the isolation of a part of the network All data traffic of network devices of a VLAN group is transf...

Page 38: ...t Connected devices can only communicate with each other if the ports to which the devices are connected have been configured for the same VLAN Trunk configuration In this menu you can configure the s...

Page 39: ...tting is 300 seconds Static MAC In this menu you can manually define MAC addresses for individual ports The device connected to the port is given this MAC address Additionally the device is assigned t...

Page 40: ...commended procedure for setting the parameter First select a value for the Hello Time Subsequently calculate the lower limit of the Maximum Age with the formula 2 Hello Time 1 Now select a value for t...

Page 41: ...ts The configuration can be done automatically or manually Instance port configuration In this menu you can select the instances specified in the Instance Configuration menu The overview provides the...

Page 42: ...When the IGMP Snooping function Fehler Verweisquelle konnte nicht gefunden werden is active the switch listens to the multicast traffic in the network Thus it need not output incoming multicasts to a...

Page 43: ...up to 50 devices in the ring is 200 ms In a typical application the convergence time is normally less than 50 ms The ring may only be physically closed when MRP has been configured completely Ring co...

Page 44: ...mail address Enter an e mail from which the alarms are to be sent Receive e mail address Enter an e mail to which the alarms are to be sent SMTP Server Enter the address of your SMTP server for the s...

Page 45: ...e can only use this specified port to access the internal device Figure 24 NAT Configuration Rule 3 9 2 NAT binding In this menu you can specify the IP address of the Layer 3 port This address has to...

Page 46: ...t priorities As with COS these priorities can be used to prioritise real time control data Voice over IP VoIP or audio data over normal data transmission Adapt the settings according to your requireme...

Page 47: ...ing on every device that supports LLDP This sends information about the own status in periodic intervals and receives information from the neighbouring devices You can set the interval at which the in...

Page 48: ...lays the currently defined community strings and access permissions The following entries are required for creating a community string Community string Define a community string here By default the st...

Page 49: ...ver For this the following steps are required Activate the time synchronizations by means of the NTP server Select the time zone where you are Enter an interval at which the time of the switch is regu...

Page 50: ...indow that opens Afterwards the device needs to be rebooted 3 11 4 Online update In this menu you can save your firmware to an TFTP server To do so the following entries have to be made TFTP server IP...

Page 51: ...k Act LEDs of the RJ45 sockets with cables If the connection is established the Link LEDs have to be lit or flash when data is transmitted If in doubt disconnect redundant network structures and reset...

Page 52: ...6 2 EN 55022 Class A LED indicators Status LEDs Port LEDs green voltage supply green IEEE IEEE 802 3 10Base T Ethernet IEEE 802 3u 100Base TX Fast Ethernet IEEE 802 3z 1000Base TX Gigabit Ethernet IEE...

Page 53: ...LAN IEEE 802 1Q Class of Service IEEE802 1p Class of Service with four priority queues per port Spanning Tree IEEE802 1d Spanning Tree and IEEE802 1w Rapid Spanning Tree IGMP IGMP v1 and Query mode wi...

Page 54: ......

Reviews: