background image

Glossary

ad hoc mode

An 802.11 networking framework in which devices or stations communicate directly with each other,
without the use of an AP.

ARP

Address Resolution Protocol is part of the TCP/IP suite used to dynamically associate a device's physical
address (MAC address) with its logical address (IP address). The system broadcasts an ARP request,
containing the IP address, and the device with that IP address sends back its MAC address so that traffic
can be transmitted.

ATM

Asynchronous Transmission Mode is a start/stop transmission in which each character is preceded by a
start signal and followed by one or more stop signals. A variable time interval can exist between
characters. ATM is the preferred technology for the transfer of images.

BSS

Basic Service Set is a wireless topology consisting of one access point connected to a wired network
and a set of wireless devices. Also called an infrastructure network. See also 

IBSS (Independent Basic

Service Set)

.

Chalet

Chalet is a web-based user interface for setting up and viewing information about a switch, removing
the need to enter common commands individually in the CLI.

CHAP

Challenge-Handshake Authentication Protocol is one of the two main authentication protocols used to
verify a user's name and password for PPP Internet connections. CHAP is more secure because it
performs a three-way handshake during the initial link establishment between the home and remote
machines. It can also repeat the authentication anytime after the link has been established.

CLI

Command Line Interface. The CLI provides an environment to issue commands to monitor and manage
switches and wireless appliances.

Data Center Connect

DCC, formerly known as DCM (Data Center Manager), is a data center fabric management and
automation tool that improves the efficiency of managing a large virtual and physical network. DCC
provides an integrated view of the server, storage, and networking operations, removing the need to
use multiple tools and management systems. DCC automates VM assignment, allocates appropriate
network resources, and applies individual policies to various data objects in the switching fabric
(reducing VM sprawl). Learn more about DCC a

http://www.extremenetworks.com/product/data-

center-connect/

.

DoS attack

Denial of Service attacks occur when a critical network or computing resource is overwhelmed so that
legitimate requests for service cannot succeed. In its simplest form, a DoS attack is indistinguishable

ISW Series Managed Industrial Ethernet Switch Quick Installation Guide

27

Содержание 16801

Страница 1: ...aged Industrial Ethernet Switch Quick Installation Guide ISW 4 10 100P 2 10 100T 2 SFP PN 16801 ISW 4GbP 2GbT 2 SFP PN 16803 ISW 8 10 100P 4 SFP PN 16802 ISW 8GbP 4 SFP PN 16804 9034964 Rev 03 Publish...

Страница 2: ...etworks and the Extreme Networks logo are trademarks or registered trademarks of Extreme Networks Inc in the United States and or other countries All other names including any product names mentioned...

Страница 3: ...nnection 11 LED Status Indicators 12 Chapter 2 Installation 15 Mounting the ISW DIN Rail 15 Mounting the ISW Wall 16 Connecting the Ethernet Interface RJ45 Ethernet 17 Connecting the Ethernet Interfac...

Страница 4: ...The words enter and type When you see the word enter in this guide you must type something and then press the Return or Enter key Do not press the Return or Enter key when an instruction simply says t...

Страница 5: ...Authorization numbers Subscribing to Service Notifications You can subscribe to email notifications for product and software release announcements Vulnerability Notices and Service Notifications 1 Go...

Страница 6: ...ation Development team you can do so in two ways Use our short online feedback form at https www extremenetworks com documentation feedback Email us at documentation extremenetworks com Please provide...

Страница 7: ...andard industrial applications Managed switches are easier to prioritize partition and organize user s network providing a more reliable and better quality services This guide covers installation for...

Страница 8: ...1000 Mbps speed auto negotiation MDI MDIX Auto crossover SFP pluggable Ports 100 1000Base SFP slot Fiber port connector LC typically for fiber depends on module Power Power input Redundant Input Term...

Страница 9: ...Faceplate and Panels Figure 1 4 Port PoE Series Faceplate Industrial Series Switch Overview ISW Series Managed Industrial Ethernet Switch Quick Installation Guide 9...

Страница 10: ...atus LED P1 P2 and Alarm Gigabit Ethernet Copper Ports RJ45 Gigabit Ethernet SFP ports SFP Slots POE LED POE port status RR RS LED Device info status Industrial Series Switch Overview ISW Series Manag...

Страница 11: ...middle of the DC terminal block connector as shown in Figure 4 The alarm relay out is Normal Open and it will be closed when detected any predefined failure such as power failures or Ethernet link fa...

Страница 12: ...n Green Ethernet link up but no traffic is detected Flashing Green Ethernet link up and there is traffic detected Off Ethernet link down Copper ports Speed On Yellow A 100 Mbps or a 1000 Mbps connecti...

Страница 13: ...ort links are down the RS LED will be ON 2 If the device has any of Redundant Master Ring Master Ring Coupling Backup Dual Homing Chain Head Balancing Chain Central Block and detects a Ring Coupling D...

Страница 14: ...Industrial Series Switch Overview ISW Series Managed Industrial Ethernet Switch Quick Installation Guide 14...

Страница 15: ...ting the Power Terminal Block Console Connection Mounting the ISW DIN Rail Mounting steps 1 Screw the DIN Rail bracket on with the bracket and screws in the accessory kit 2 Hook the unit over the DIN...

Страница 16: ...5 DIN Rail Mounting Mounting the ISW Wall Attach the wall mounting plates with the screws provided in the accessory kit Installation ISW Series Managed Industrial Ethernet Switch Quick Installation Gu...

Страница 17: ...use a straight through or a cross over Ethernet cable To connect the ISW copper port to an Ethernet device use UTP Unshielded Twisted Pair or STP Shielded Twisted Pair Ethernet cables The pin assignm...

Страница 18: ...an LC connector The fiber transceivers have options of multimode single mode long haul or special application transceivers Prepare a proper SFP module and install it into the optical port Then you can...

Страница 19: ...hat might be emitting laser energy Do not power up the laser product without connecting the laser to the optical fiber and putting the cover in position as laser outputs will emit infrared laser light...

Страница 20: ...and negative wires into V and V contacts on the terminal block respectively and tighten the wire clamp screws to prevent the wires from being loosened Note The DC power should be connected to a well...

Страница 21: ...nector to the PC COM port Important Using a different cable than the one provided with the switch may cause bootup issues Once the host PC is connected to the switch enter the following terminal setti...

Страница 22: ...Figure 11 Console Cable Pin Assignment Installation ISW Series Managed Industrial Ethernet Switch Quick Installation Guide 22...

Страница 23: ...ensure your browser is supported 5 Enter the account name and password 6 Click Sign in For information on configuring and monitoring the switch through the web interface see the ISW Series Managed In...

Страница 24: ...hrome with the following default settings is recommended Web page font Times New Roman Encoding Unicode UTF 8 Text size Medium Configuration ISW Series Managed Industrial Ethernet Switch Quick Install...

Страница 25: ...rect the interference at his own expense Warning Changes or modifications made to this device which are not expressly approved by the party responsible for compliance could void the user s authority t...

Страница 26: ...d Emissions EN 61000 3 2 2014 EN 61000 3 3 2013 RCM Australia MSIP KCC Korea BSMI Taiwan Korea EMC Statement KCC BSMI EMC Statement Taiwan This is a Class A product In a domestic environemnt this prod...

Страница 27: ...ion Protocol is one of the two main authentication protocols used to verify a user s name and password for PPP Internet connections CHAP is more secure because it performs a three way handshake during...

Страница 28: ...d the network It relies on client side and server side certificates to perform authentication and can be used to dynamically generate user based and session based WEP keys EAP TTLS Tunneled Transport...

Страница 29: ...ww extremenetworks com product extremecloud ExtremeSwitching ExtremeSwitching is the family of products comprising different switch types Modular X8 and 8000 series formerly BlackDiamond and S and K s...

Страница 30: ...he user is then authenticated over the SSL tunnel created in phase one using EAP Generic Token Card EAP GTC or Microsoft Challenged Handshake Protocol Version 2 MSCHAP V2 See also EAP TLS EAP TTLS PoE...

Страница 31: ...syslog is 514 RFC 3164 VLAN The term VLAN is used to refer to a collection of devices that communicate as if they are on the same physical LAN Any set of ports including all ports on the switch is co...

Отзывы: