Barox L Series Скачать руководство пользователя страница 53

barox Kommunikation 

 

 

 

53 

 

Generation of a new User 

 
When configuring a new user attention should be paid for imperatively adding the Engine ID to 
the new user object. It can simply be copied and inserted from the „

default_user

“-entry. In this 

example the security level „

Auth, Priv

“ shall also be set along with the determination of the user 

name. When selecting the authentication „MD5“ and the privacy protocol DES attention shall be 
paid as the length of both passwords must be at least eight characters (numbers and character 
combinations). 

 
 

 

 

 

 

Содержание L Series

Страница 1: ...23 26 RY LGSO25 24 RY LGSO25 28 RY LGSP16 10 RY LGSP23 10G RY LGSP23 26 xxx RY LGSP23 28 xxx RY LGSP23 52 xxx RY LGSPTR23 26 RY Industrial Switches of the L series RY LPIGE 602GBTME RY LPIGE 804GBTME...

Страница 2: ...ed trademark or registered brand mentioned in this manual is the property of the respective manufacturer Liability Information contained in this document may be changed without prior notice barox Komm...

Страница 3: ...figuration 19 3 11 2 PoE Power Delay 20 3 11 3 PoE Schedule 21 3 11 4 PoE Auto Checking 21 3 11 5 PoE Chip Reset Schedule 22 3 12 Saving and Retrieving the Configuration 22 3 12 1 Download Configurati...

Страница 4: ...Trap Configuration 46 5 4 3 Supplementary Information regarding the Sending of SNMP Traps 49 5 5 SNMP v3 Configuration 51 5 5 1 Activation of the SNMP v3 Function 51 5 5 2 SNMP Trap Configuration 55 5...

Страница 5: ...s well as download links to our data sheets documentation and the latest firmware are available on our website www barox ch 1 4 Support Our POWERHAUS Partners are available to help you should you have...

Страница 6: ...These allow the user to quickly access specific network equipment even without special knowledge of the IP structure Finalised plans can then be exported and included in the documentation 3 Commission...

Страница 7: ...rox Kommunikation 7 3 2 System Information This page displays the most important information on the switch Key 1 Name of the switch model 2 Firmware version 3 Hardware version 4 MAC address 1 3 2 4 1...

Страница 8: ...needs to be changed DHCP If the switch is to be integrated into a network where a DHCP server allocates the IP addresses the check box underneath IPv4 DHCP needs to be checked The DHCP server will th...

Страница 9: ...eated using the right address The network address must be set to 0 0 0 0 and the mask length to 0 Then all that needs to be done is to rewrite the gateway address using one that corresponds to the net...

Страница 10: ...IP address of the DHCP server is then displayed in the line below However if the time is to be retrieved from another specific source for example from a time server NTP server firewall etc the respec...

Страница 11: ...stem Time menu As time servers generally broadcast Greenwich Mean Time the Time Zone must be selected accordingly to ensure that 1 the time is correct and 2 the system switches correctly between summe...

Страница 12: ...ports are also equipped with an Auto mode This is different to the auto negotiation procedure used by copper ports SFP ports are only capable of recognising the transmission speed through auto negotia...

Страница 13: ...s Another user can be generated by clicking on Add New User Then the User Name Password and Privilege Level need to be defined The exact range of rights applying to the new user can now be defined in...

Страница 14: ...ature was specially designed to handle such situations Once this feature has been activated it is possible to define whether the respective port should be shut down merely an entry made in the log fil...

Страница 15: ...il in Wikipedia https de wikipedia org wiki Spanning_Tree_Protocol 3 9 1 Ring Master In a ring topology one switch must be defined as the master which then assumes the task of monitoring the ring In t...

Страница 16: ...for A to B connections which meant that they were expensive Example In a larger ring with numerous terminal devices and larger data volumes it makes sense to channel the data flow within the ring to d...

Страница 17: ...e video cameras causing a bottleneck Scenario 3 RTSP active the master and Path Cost have been defined This configuration precisely defines how the data should flow The load is distributed on two side...

Страница 18: ...between two switches Hybrid Connection between two switches or to a terminal device The allowed VLANs can be defined in the Allowed VLANs column both in Trunk and Hybrid mode 3 11 Power over Ethernet...

Страница 19: ...POE appliances are divided into various categories depending on their respective consumption Class Power available to the powered device Classification signature 0 0 44 12 96 W 0 to 4 mA 1 0 44 3 84...

Страница 20: ...d 3 11 2 PoE Power Delay As already mentioned the switch can provide a limited amount of power However today s IP cameras require an ever increasing amount of power If a pan tilt camera with an integr...

Страница 21: ...every day from 06 00 to 18 00 Hrs in Profile 1 3 11 4 PoE Auto Checking PoE Auto Checking is used to monitor functionality For example the camera connected to port 1 with IP address 192 168 1 25 can...

Страница 22: ...set command can be sent daily or once a week for example at 03 00 Hrs This command causes the PoE chip in the camera to reboot 3 12 Saving and Retrieving the Configuration All changes must be saved Cl...

Страница 23: ...where several switches are to be identically configured and only the respective IP address changed That saves a huge amount of time We strongly recommend saving the startup config file 3 12 2 Upload C...

Страница 24: ...e terminal device or are no longer available in the network e g service laptop that is taken home by the installation technician after having completed the configuration To be able to use DMS one swit...

Страница 25: ...in other network segments are listed This useful function helps when a non configured device is integrated into the network the IP address of which is unknown The connection to a device can be checked...

Страница 26: ...ess data rate etc are displayed next to the symbol All the settings can also be manually configured By clicking on a symbol the Dashboard of the respective device is displayed In this Dashboard the de...

Страница 27: ...ew and the Remove symbol is made available in the Dashboard By clicking on Remove this device is permanently removed from the topology view It is vital to select Remove when for example a defective ca...

Страница 28: ...device is displayed in blue in the network diagram This tool also offers the option of printing out the network plan in SVG or PNG format or directly to a PDF document This requires first selecting th...

Страница 29: ...carrying out on site tasks and can also be printed out to document the system as described above To position a camera or switch in a plan all that needs to be done is to click on the respective device...

Страница 30: ...aintenance menu The path and file name must be entered in the Floor Image menu and then uploaded using Add The uploaded plans are then listed in the lower section of the web page Up to 50 files can be...

Страница 31: ...data sent and received by each port during the course of the day One can choose between displaying the information for a specific date or in a day or week view If one now clicks on the bar of any indi...

Страница 32: ...ettings The manual selection of the required ETH standard is required in some scenarios For example in case of a connection of network components which do not provide an automatic negotiation of the s...

Страница 33: ...calculating the demand 5 1 3 Securing the ports using MAC configuration settings The MAC table Besides the automatic management the MAC table can basically also be adjusted manually This is often requ...

Страница 34: ...r planning purposes the complete number of network devices including the unmanaged switch which are connected to the respective port of the barox switch needs to be determined E g The total limit is 4...

Страница 35: ...rabilities Example of a basic configuration and commissioning of the DHCP service At first the VLAN range of the service is determined Then the service is generally activated in the Mode with the sett...

Страница 36: ...wing this a DHCP service name is determined and confirmed Following the determination of the name the settings are called up by selecting the name as shown below The following configuration appears up...

Страница 37: ...nts can be realised using ARP Inspection Following activation of the functions the DHCP clients can be managed statically as recipients in a table The setting of the size of the DHCP address pool usin...

Страница 38: ...ng this the VLANs which shall be included in the check are determined and the log type trust position is determined as shown below The DHCP clients can be connected upon the completion of the settings...

Страница 39: ...barox Kommunikation 39 The following screenshot shows a static entry An IP address is reserved for the client according to the table...

Страница 40: ...on is switched on the configuration can be effected using static entries as shown below The use of IP Source Guard enables the extended protection function by securing the ports by means of the MAC an...

Страница 41: ...user Basic settings of user rights and privileges The privilege level serves the purpose of grading the rights to apply configuration settings and read write rights of such values resp It is generall...

Страница 42: ...hods can be set as shown below The use of the SSH protocol for the command line based management CLI is recommended as this method provides the encrypted connection Management of the access to the web...

Страница 43: ...and Use of HTTPS The setting option for using the HTTPS protocol is shown below The standard port can be changed also for this method The http option should be disabled where this mode is activated Th...

Страница 44: ...e use should be verified as the connection to the management can only be effected using the media with enabled certificate Setting options and methods resp are shown in the following Generation of the...

Страница 45: ...4 1 Configuration of SNMP v2c The following example describes a basic SNMP v2 configuration for a system status enquiry or the transmission of system events via SNMP traps The following steps shall sh...

Страница 46: ...nfig Name A name should be allocated Trap Mode UDP or TCP As usual UDP should be used for a start Trap Version Selection of SNMP v2c Trap Community The previously generated community name must be ente...

Страница 47: ...barox Kommunikation 47 Step 2 Following the generation of a new configuration such configuration is opened by selecting the name...

Страница 48: ...barox Kommunikation 48 Activation of the SNMP Trap Function The general mode must be enabled following completion of the trap configuration...

Страница 49: ...er terminal device elsewhere in the configuration menu as shown in the following screenshot Some events such like e g port events must also be set accordingly in the port configuration ATTENTION For i...

Страница 50: ...barox Kommunikation 50...

Страница 51: ...ed using SNMP in version 3 with authentication The following example describes a basic SNMP v3 configuration for a system status enquiry or the transmission of system events via SNMP traps The followi...

Страница 52: ...eneration of a dedicated Community When generating the community the setting of source IP and mask can remain as 0 0 0 0 in each case This enables the transmission and the receipt of SNMP messages acr...

Страница 53: ...can simply be copied and inserted from the default_user entry In this example the security level Auth Priv shall also be set along with the determination of the user name When selecting the authentic...

Страница 54: ...iously generated user name shall be selected as Security Name following this a group name must be determined Setting the View Configuration At the beginning the View Name is determined Setting the OID...

Страница 55: ...lected in Group Name Furthermore the Security Model usm and the Security Level Auth Priv are allocated to the group The latter ones are required for reading and writing the views which were previously...

Страница 56: ...of the IP address of the trap recipient Trap Destination Port Entry of the port at the recipient Trap Inform Mode Disabled in this example Trap Inform Timeout seconds 3 is entered Standard Trap Inform...

Страница 57: ...barox Kommunikation 57 Step 2 Following the generation of a new configuration such configuration is opened by selecting the name Now the entry Trap Security Name can be set to the SNMP user name...

Страница 58: ...barox Kommunikation 58 Activation of the SNMP Trap Function The general mode must be enabled following completion of the trap configuration...

Страница 59: ...re configured accordingly These settings can be configured per terminal device elsewhere in the configuration menu as shown in the following screenshot Some events such like e g port events must also...

Страница 60: ...ng the following example Starting position A PoE camera is unplugged and plugged in again at the Ethernet port 3 of the switch A PC in the network is configured for the receipt of SNMP traps The softw...

Страница 61: ...barox Kommunikation 61 View of the information in the SNMP browser PoE camera is connected again PD device is online Recording of the information which is sent by the switch...

Страница 62: ...ecause of manufacturer specific aspects so called MIB files are frequently required for enquiring the devices These files comprise information about the identification parameters of the functions Enqu...

Страница 63: ...rox Kommunikation 63 Please pay attention to the respective software vendor s licencing conditions when using the software Following the successful import the MIB structures are available as shown bel...

Страница 64: ...x switches The basic SNMP configurations at the switch and of the MIB browser are preconditions In the following an example for using the SET operation for triggering a port deactivation and re activa...

Страница 65: ...ion is opened by a click on Go and the OID entry is complemented by 2 label of port 2 In addition to this the value 1 for activation is entered and confirmed by OK A respective success message is gene...

Страница 66: ...re as the software is regularly updated to remove bugs New features are also introduced Following the upgrade the new firmware is immediately available Any old firmware can very simply be re activated...

Страница 67: ...s at any time This is done either via the Maintenance Factory Defaults menu or by pressing the reset button at the front for longer than 10 seconds Checking the Keep IP setup box ensures that the swit...

Страница 68: ...r Report When submitting a request for support the server report should also be provided This contains a description of the whole configuration as well as useful information for the support technician...

Страница 69: ...emoved rendered illegible or changed In addition the warranty shall not cover the following damage 1 Damage caused by an accident or improper or incorrect operation of the device in particular non com...

Отзывы: