Using Virtual LAN ............................................................................................................. 3-35
The Virtual LAN (VLAN) Concept ........................................................................ 3-35
Sample Applications of VLANs using MOXA EDS-516A .................................... 3-37
Configuring Virtual LAN........................................................................................ 3-38
Using Multicast Filtering.................................................................................................... 3-41
The Concept of Multicast Filtering ......................................................................... 3-41
Configuring IGMP Snooping .................................................................................. 3-44
Add Static Multicast MAC...................................................................................... 3-45
Configuring GMRP ................................................................................................. 3-46
GMRP Table ........................................................................................................... 3-46
Using Bandwidth Management .......................................................................................... 3-47
Configuring Bandwidth Management ..................................................................... 3-47
Broadcast Storm Protection..................................................................................... 3-47
Traffic Rate Limiting Settings................................................................................. 3-47
Using Port Access Control.................................................................................................. 3-48
Configuring Static Port Lock .................................................................................. 3-50
Configuring IEEE 802.1X....................................................................................... 3-50
Using Auto Warning ........................................................................................................... 3-53
Configuring Email Warning.................................................................................... 3-53
Event Type .............................................................................................................. 3-54
Email Setup ............................................................................................................. 3-55
Configuring Relay Warning .................................................................................... 3-56
Event Setup ............................................................................................................. 3-57
Warning List............................................................................................................ 3-58
Using Line-Swap-Fast-Recovery........................................................................................ 3-58
Configuring Line-Swap Fast Recovery ................................................................... 3-58
Using Set Device IP............................................................................................................ 3-58
Configuring Set Device IP ...................................................................................... 3-60
Using Diagnosis.................................................................................................................. 3-60
Mirror Port .............................................................................................................. 3-60
Ping ......................................................................................................................... 3-61
Using Monitor .................................................................................................................... 3-61
Monitor by Switch................................................................................................... 3-61
Monitor by Port ....................................................................................................... 3-62
Using the MAC Address Table ........................................................................................... 3-63
Using System Log .............................................................................................................. 3-63
Event Log................................................................................................................ 3-63
Syslog Settings ........................................................................................................ 3-64
Using HTTPS/SSL ............................................................................................................. 3-65
Chapter 4
EDS Configurator GUI ...............................................................................4-1
Starting EDS Configurator ................................................................................................... 4-2
Broadcast Search .................................................................................................................. 4-2
Search by IP address............................................................................................................. 4-3
Upgrade Firmware................................................................................................................ 4-3
Modify IP Address................................................................................................................ 4-4
Export Configuration............................................................................................................ 4-5
Import Configuration............................................................................................................ 4-6
Unlock Server....................................................................................................................... 4-7