background image

over a wide band of frequencies. This technique reduces interference. If synchronized properly, a single
logical channel is maintained. (Compare with 

DSSS (Direct-Sequence Spread Spectrum)

.)

IBSS

An IBSS is the 802.11 term for an ad hoc network. See 

ad hoc mode

.

MIC

Message Integrity Check (or Code), also called ‘Michael’, is part of WPA and TKIP. The MIC is an
additional 8-byte code inserted before the standard 4-byte ICV appended in by standard WEP to the
802.11 message. This greatly increases the difficulty in carrying out forgery attacks. 
Both integrity check mechanisms are calculated by the receiver and compared against the values sent
by the sender in the frame. If the values match, there is assurance that the message has not been
tampered with.

netmask

A netmask is a string of 0s and 1s that mask, or screen out, the network part of an IP address, so that
only the host computer part of the address remains. A frequently-used netmask is 255.255.255.0, used
for a Class C subnet (one with up to 255 host computers). The ".0" in the netmask allows the specific
host computer address to be visible.

PEAP

Protected Extensible Authentication Protocol is an IETF draft standard to authenticate wireless LAN
clients without requiring them to have certificates. In PEAP authentication, first the user authenticates
the authentication server, then the authentication server authenticates the user. If the first phase is
successful, the user is then authenticated over the SSL tunnel created in phase one using EAP-Generic
Token Card (EAP-GTC) or Microsoft Challenged Handshake Protocol Version 2 (MSCHAP V2). (See also

EAP-TLS/EAP-TTLS

.)

PoE

The Power over Ethernet standard (IEEE 802.3af) defines how power can be provided to network
devices over existing Ethernet connections, eliminating the need for additional external power supplies.

QoS

Quality of Service is a technique that is used to manage network resources and guarantee a bandwidth
relationship between individual applications or protocols. A communications network transports a
multitude of applications and data, including high-quality video and delay-sensitive data such as real-
time voice. Networks must provide secure, predictable, measurable, and sometimes guaranteed
services. Achieving the required QoS becomes the secret to a successful end-to-end business solution.

SSL

Secure Socket Layer is a protocol for transmitting private documents using the Internet. SSL works by
using a public key to encrypt data that is transferred over the SSL connection. SSL uses the public-and-
private key encryption system, which includes the use of a digital certificate. SSL is used for other
applications than SSH, for example, OpenFlow.

syslog

A protocol used for the transmission of event notification messages across networks, originally
developed on the University of California Berkeley Software Distribution (BSD) TCP/IP system
implementations, and now embedded in many other operating systems and networked devices. A

Glossary

ISW Series Managed Industrial Ethernet Switch Quick Installation Guide

30

Содержание 16801

Страница 1: ...aged Industrial Ethernet Switch Quick Installation Guide ISW 4 10 100P 2 10 100T 2 SFP PN 16801 ISW 4GbP 2GbT 2 SFP PN 16803 ISW 8 10 100P 4 SFP PN 16802 ISW 8GbP 4 SFP PN 16804 9034964 Rev 03 Publish...

Страница 2: ...etworks and the Extreme Networks logo are trademarks or registered trademarks of Extreme Networks Inc in the United States and or other countries All other names including any product names mentioned...

Страница 3: ...nnection 11 LED Status Indicators 12 Chapter 2 Installation 15 Mounting the ISW DIN Rail 15 Mounting the ISW Wall 16 Connecting the Ethernet Interface RJ45 Ethernet 17 Connecting the Ethernet Interfac...

Страница 4: ...The words enter and type When you see the word enter in this guide you must type something and then press the Return or Enter key Do not press the Return or Enter key when an instruction simply says t...

Страница 5: ...Authorization numbers Subscribing to Service Notifications You can subscribe to email notifications for product and software release announcements Vulnerability Notices and Service Notifications 1 Go...

Страница 6: ...ation Development team you can do so in two ways Use our short online feedback form at https www extremenetworks com documentation feedback Email us at documentation extremenetworks com Please provide...

Страница 7: ...andard industrial applications Managed switches are easier to prioritize partition and organize user s network providing a more reliable and better quality services This guide covers installation for...

Страница 8: ...1000 Mbps speed auto negotiation MDI MDIX Auto crossover SFP pluggable Ports 100 1000Base SFP slot Fiber port connector LC typically for fiber depends on module Power Power input Redundant Input Term...

Страница 9: ...Faceplate and Panels Figure 1 4 Port PoE Series Faceplate Industrial Series Switch Overview ISW Series Managed Industrial Ethernet Switch Quick Installation Guide 9...

Страница 10: ...atus LED P1 P2 and Alarm Gigabit Ethernet Copper Ports RJ45 Gigabit Ethernet SFP ports SFP Slots POE LED POE port status RR RS LED Device info status Industrial Series Switch Overview ISW Series Manag...

Страница 11: ...middle of the DC terminal block connector as shown in Figure 4 The alarm relay out is Normal Open and it will be closed when detected any predefined failure such as power failures or Ethernet link fa...

Страница 12: ...n Green Ethernet link up but no traffic is detected Flashing Green Ethernet link up and there is traffic detected Off Ethernet link down Copper ports Speed On Yellow A 100 Mbps or a 1000 Mbps connecti...

Страница 13: ...ort links are down the RS LED will be ON 2 If the device has any of Redundant Master Ring Master Ring Coupling Backup Dual Homing Chain Head Balancing Chain Central Block and detects a Ring Coupling D...

Страница 14: ...Industrial Series Switch Overview ISW Series Managed Industrial Ethernet Switch Quick Installation Guide 14...

Страница 15: ...ting the Power Terminal Block Console Connection Mounting the ISW DIN Rail Mounting steps 1 Screw the DIN Rail bracket on with the bracket and screws in the accessory kit 2 Hook the unit over the DIN...

Страница 16: ...5 DIN Rail Mounting Mounting the ISW Wall Attach the wall mounting plates with the screws provided in the accessory kit Installation ISW Series Managed Industrial Ethernet Switch Quick Installation Gu...

Страница 17: ...use a straight through or a cross over Ethernet cable To connect the ISW copper port to an Ethernet device use UTP Unshielded Twisted Pair or STP Shielded Twisted Pair Ethernet cables The pin assignm...

Страница 18: ...an LC connector The fiber transceivers have options of multimode single mode long haul or special application transceivers Prepare a proper SFP module and install it into the optical port Then you can...

Страница 19: ...hat might be emitting laser energy Do not power up the laser product without connecting the laser to the optical fiber and putting the cover in position as laser outputs will emit infrared laser light...

Страница 20: ...and negative wires into V and V contacts on the terminal block respectively and tighten the wire clamp screws to prevent the wires from being loosened Note The DC power should be connected to a well...

Страница 21: ...nector to the PC COM port Important Using a different cable than the one provided with the switch may cause bootup issues Once the host PC is connected to the switch enter the following terminal setti...

Страница 22: ...Figure 11 Console Cable Pin Assignment Installation ISW Series Managed Industrial Ethernet Switch Quick Installation Guide 22...

Страница 23: ...ensure your browser is supported 5 Enter the account name and password 6 Click Sign in For information on configuring and monitoring the switch through the web interface see the ISW Series Managed In...

Страница 24: ...hrome with the following default settings is recommended Web page font Times New Roman Encoding Unicode UTF 8 Text size Medium Configuration ISW Series Managed Industrial Ethernet Switch Quick Install...

Страница 25: ...rect the interference at his own expense Warning Changes or modifications made to this device which are not expressly approved by the party responsible for compliance could void the user s authority t...

Страница 26: ...d Emissions EN 61000 3 2 2014 EN 61000 3 3 2013 RCM Australia MSIP KCC Korea BSMI Taiwan Korea EMC Statement KCC BSMI EMC Statement Taiwan This is a Class A product In a domestic environemnt this prod...

Страница 27: ...ion Protocol is one of the two main authentication protocols used to verify a user s name and password for PPP Internet connections CHAP is more secure because it performs a three way handshake during...

Страница 28: ...d the network It relies on client side and server side certificates to perform authentication and can be used to dynamically generate user based and session based WEP keys EAP TTLS Tunneled Transport...

Страница 29: ...ww extremenetworks com product extremecloud ExtremeSwitching ExtremeSwitching is the family of products comprising different switch types Modular X8 and 8000 series formerly BlackDiamond and S and K s...

Страница 30: ...he user is then authenticated over the SSL tunnel created in phase one using EAP Generic Token Card EAP GTC or Microsoft Challenged Handshake Protocol Version 2 MSCHAP V2 See also EAP TLS EAP TTLS PoE...

Страница 31: ...syslog is 514 RFC 3164 VLAN The term VLAN is used to refer to a collection of devices that communicate as if they are on the same physical LAN Any set of ports including all ports on the switch is co...

Отзывы: