1783-Um007 - En-P - Statrix 5700
1783-Um007 - En-P - Statrix 5700
1783-Um007 - En-P - Statrix 5700
Original Instructions
WARNING: Identifies information about practices or circumstances that can cause an explosion in a hazardous
environment, which may lead to personal injury or death, property damage, or economic loss.
ATTENTION: Identifies information about practices or circumstances that can lead to personal injury or death, property
damage, or economic loss. Attentions help you identify a hazard, avoid a hazard, and recognize the consequence.
IMPORTANT
Identifies information that is critical for successful application and understanding of the product.
Table of Contents
Summary of Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Access Product Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Chapter 1
About the Switches
17
17
17
18
19
20
23
23
24
25
26
Chapter 2
Get Started
28
28
30
32
33
35
36
37
38
41
43
43
43
44
46
48
50
52
54
55
56
58
59
59
60
3
Table of Contents
61
62
64
65
65
66
67
Chapter 3
Install Stratix 5400 Switches
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Parts List and Required Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Install or Remove the SD Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Verify Switch Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mount the Switch on a DIN Rail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Remove the Switch from the DIN Rail . . . . . . . . . . . . . . . . . . . . . . . . . .
Ground the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Wire the Switch DC Power Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Attach the Switch Power Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . .
Install an SFP Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Remove an SFP Module from an SFP Slot . . . . . . . . . . . . . . . . . . . . . .
Wire the External Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Attach the Alarm Relay Connector to the Switch . . . . . . . . . . . . . . . .
Connect to 10/100 and 10/100/1000 Ports . . . . . . . . . . . . . . . . . . . . .
Connect to 10BASE-T, 100BASE-TX, or 1000BASE-T Ports . . . .
Connect to PoE Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Connect to SFP Module Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Connect to a Dual-purpose Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
73
73
75
76
77
78
78
79
80
83
84
86
87
90
90
91
92
92
93
Chapter 4
Install Stratix 5410 Switches
Switch Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Power Supply Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Parts List and Required Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Install or Remove the SD Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Verify Switch Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Mount the Switch on a Rack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Attach Brackets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Mount the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Mount the Switch on a Wall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Attach the Brackets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Mount the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Ground the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Install a Power Supply Module in the Switch . . . . . . . . . . . . . . . . . . . 113
Wire the Power Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Remove a Power Supply Module from the Switch . . . . . . . . . . . . . . . 118
Rockwell Automation Publication 1783-UM007E-EN-P - June 2016
Table of Contents
Chapter 5
Install Stratix 5700 Switches
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Parts List and Required Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Install or Remove the SD Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Verify Switch Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Mount the Switch on a DIN Rail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Remove the Switch from the DIN Rail . . . . . . . . . . . . . . . . . . . . . . . . . 135
Ground the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Wire the Switch DC Power Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Attach the Switch Power Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Wire the Power over Ethernet DC Power Source . . . . . . . . . . . . . . . 142
Attach the PoE Power Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Install an SFP Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Remove an SFP Module from an SFP Slot . . . . . . . . . . . . . . . . . . . . . . 146
Wire the External Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Attach the Alarm Relay Connector to the Switch . . . . . . . . . . . . . . . 150
Connect to 10/100 and 10/100/1000 Ports . . . . . . . . . . . . . . . . . . . . 150
Connect to 10BASE-T, 100BASE-TX, or 1000BASE-T Ports . . . 151
Connect to PoE Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Connect to SFP Module Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Connect to a Dual-purpose Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Chapter 6
Install Stratix 8000 and 8300
Switches
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Parts List and Required Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Attach Expansion Modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Mount the Switch on a DIN Rail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Mount the Switch on a Wall or Panel . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Install an SFP Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Ground the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Wire the DC Power Source for the Switch . . . . . . . . . . . . . . . . . . . . . 169
Wire the DC Power Source for the PoE Expansion Module. . . . . . 171
Attach the Power and Relay Connector to the Switch . . . . . . . . . . . 173
Attach the Power Connector to the PoE Expansion Module . . . . . 175
Wire External Alarms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Connect to 10/100 Copper Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Connect to a PoE Expansion Module Port . . . . . . . . . . . . . . . . . . . . . 177
Rockwell Automation Publication 1783-UM007E-EN-P - June 2016
Table of Contents
Chapter 7
Configure Switch Features
Table of Contents
Table of Contents
Chapter 8
Monitor the Switch
Chapter 9
Troubleshoot the Switch
Table of Contents
Appendix A
Data Types
Appendix B
Port Assignments for CIP Data
Table of Contents
Appendix C
Port Numbering
Appendix D
Cables and Connectors
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
10
Summary of Changes
This manual contains new and updated information as indicated in the
following table.
Topic
Page
Software features
19
28
55
NTP-PTP Clock mode for Stratix 5400 and Stratix 5410 switches
193, 200
218, 224
223
247, 349
Network Address Translation (NAT) wizard in the Logix Designer application for
Stratix 5410 switches
274
283
285, 286
358
373
429
470
484
11
Summary of Changes
Notes:
12
Preface
This publication describes the embedded software features and tools for
configuring and managing Stratix managed switches. In addition, this
publication provides troubleshooting information to help you resolve basic
switch and network issues.
This manual assumes that you understand the following:
Local area network (LAN) switch fundamentals
Concepts and terminology of the Ethernet protocol and local area
networking
Product release notes are available online within the Product Compatibility
and Download Center.
1. From the Quick Links list on http://www.ab.com, choose Product
Compatibility and Download Center.
2. From the Compatibility Scenarios tab or the Get Downloads tab, search
for and choose your product.
13
Preface
Additional Resources
Description
14
Chapter
Topic
Page
17
18
Software Features
19
Hardware Features
20
Memory Allocation
23
15
Chapter 1
Description
Layer 2 modular managed switches available with copper, fiber, small form-factor pluggable (SFP),
and Power over Ethernet (PoE) expansion modules.
Available in 626 port versions.
Layer 3 modular managed switches available with copper, fiber, SFP, and Power over Ethernet (PoE)
expansion modules.
Available in 626 port versions.
16
Chapter 1
Description
Explicit Messaging
Explicit Messaging connections provide generic, multi-purpose communication paths between two devices. These connections are often referred
to as messaging connections. Explicit messages provide request/response-oriented network communication. Each request is typically directed at
another data item. Explicit messages can be used to configure, monitor, and troubleshoot the switch.
The Explicit Messaging interface is used by the Studio 5000 Logix Designer application.
Implicit messaging
(I/O connections)
I/O connections provide dedicated, special purpose communication paths between a producing application and one or more consuming
applications. The application-specific I/O data that moves through these connections is typically a fixed, cyclical structure.
The switch supports two I/O connection choices.
Input Only
Exclusive Owner
Both connections are cyclic and adjustable from 300...5000 ms.
The Input Only connection contains a data structure with status information on the switch in general and specific status on each of the ports. This
connection is multicast. Multiple controllers can share the connection.
The Exclusive Owner connection uses the same Input data structure as the Input Only connection, but adds an Output data structure. The Output
data contains a bit for each port that lets you enable or disable each port separately. While the Input data on this connection can be shared via
multicast by multiple controllers, only one controller can own the Output data. If a second controller attempts to open this connection, the
connection is rejected.
IMPORTANT
Because the controller sends output data cyclically, the output data
overrides attempts by other software tools or visualization stations
to enable or disable a port.
17
Chapter 1
Some features for Stratix 5700 switches depend on whether the switches have
Full or Lite firmware. All Stratix 8000 and ArmorStratix 5700 switches have
Full firmware.
To determine the firmware type available for specific catalog numbers, see the
Stratix 5700 switch descriptions in Table 151 on page 485.
Feature
Lite Firmware
Full Firmware
Separate option
FlexLinks
64
128
64
255
IPv6 support
Port mirroring
Syslog
Smartports
18
Chapter 1
Software Features
Some features are available only on select switches and expansion modules.
Table 2 - Software Features
Feature
Switches
Device Manager
All
Alarms
All
All
EtherChannels
All
All
All Stratix 5400, 5410, 5700, ArmorStratix 5700, and Stratix 8000 switches
Port Mirroring
All
Port Security
All
Port Thresholds
All
Logix Designer
19
Chapter 1
Switches
Device Manager
Logix Designer
All
All
All
Smartports
All
All
All
Hardware Features
20
Chapter 1
Table 3 - Hardware Features for Stratix 5400, Stratix 5700, ArmorStratix 5700, and Stratix 8000/8300 Switches
Feature
Description
You connect the power and alarm signals to the front panel of a switch:
Stratix 5400 switchesOne connector provides primary DC power. A second connector provides secondary power. The two connectors are
physically identical. You can activate alarms for environmental, power supply, and port status alarm conditions. You can configure an alarm
to indicate open or closed contacts. There is no separate power connector for PoE.
Stratix 5700 switchesOne connector provides primary DC power and a second connector provides secondary power. The two connectors
are physically identical. You can activate alarms for environmental, power supply, and port status alarm conditions. You can configure an
alarm to indicate open or closed contacts. A separate power connector is required for PoE.
ArmorStratix 5700 switchesOne cable provides DC power from one or dual power sources. Relay connectors and alarm relays are
available for only catalog numbers 1783-ZMS4T4E2TGP, 1783-ZMS8T8E2TGP, 1783-ZMS4T4E2TGN, and 1783-ZMS8T8E2TGN. There is no
separate power connector for PoE.
Stratix 8000/8300 switchesOne connector provides primary DC power (supply A) and the major alarm signal. A second connector
provides secondary power (supply B) and the minor alarm signal. The two connectors are physically identical and are in the upper-left side
of the front panel.
The power and relay connectors also provide an interface for two independent alarm relays: the major alarm and the minor alarm. You can
activate the relays for environmental, power supply, and port status alarm conditions. You can configure an alarm to indicate open or closed
contacts. The relay itself is normally open, so under power failure conditions, the contacts are open. From the Command-line interface (CLI),
you can associate any alarm condition with one alarm relay or with both relays.
When dual power sources are operational for any of the switches, the switch draws power from the DC source with the higher voltage. If one of
the two power sources fail, the other continues to power the switch.
Console port
To configure, monitor, and manage a switch, you can connect a switch to a computer through the console port:
Stratix 5400 and Stratix 5700 switchesConnect to the console port with an RJ45-to-DB-9 adapter cable or a mini USB cable. The mini USB
driver is available in the firmware download section at http://www.rockwellautomation.com.
ArmorStratix 5700 switches Connect to the console port with an M12-to-DB-9 cable. See page 512.
Stratix 8000/8300 switchesConnect to the console port with an RJ45-to-DB-9 adapter cable.
Dual-purpose (combo)
uplink ports
You can configure the dual-purpose uplink ports available on some models for RJ45 (copper) or SFP (fiber) media types. Only one of these
connections in each of the dual-purpose ports can be active at a time. If both ports are connected, the SFP module port has priority.
You can set the copper RJ45 ports to operate at 10 Mbps, 100 Mbps, or 1000 Mbps, full-duplex, or half-duplex. You can configure them as fixed
10 Mbps, 100 Mbps, or 1000 Mbps (Gigabit) Ethernet ports and can configure the duplex setting. 1000 Mbps is not supported on all modules
with combo ports.
You can use approved Gigabit (or 100 Mbps) Ethernet SFP modules to establish fiber-optic connections to other devices. These transceiver
modules are field-replaceable and provide the uplink interfaces when inserted into an SFP module slot. You use fiber-optic cables with LC
connectors to connect to a fiber-optic SFP module. These ports operate only in full-duplex.
You can set the 10/100 copper ports to operate at 10 Mbps or 100 Mbps, full-duplex, or half-duplex. You can also set these ports for speed and
duplex autonegotiation in compliance with IEEE 802.3-2002. The default setting is autonegotiate.
When set for autonegotiation, the port senses the speed and duplex settings of the attached device. If the connected device also supports
autonegotiation, the switch port negotiates the connection with the fastest line speed that both devices support. The port also negotiates
full-duplex transmission if the attached device supports it. The port then configures itself accordingly. In all cases, the attached device must be
within 100 m (328 ft) of the switch.
The SFP ports on some models provide full-duplex, 100- or 1000-Mbps connectivity.
ArmorStratix 5700 switches and Stratix 8000/8300 base switches do not have SFP ports.
PoE/PoE+ ports
The PoE ports available on some switches and expansion modules can be configured for PoE (IEEE 802.3af) or PoE+ (IEEE 802.3at Type 2). You
can configure PoE /PoE+ ports in any combination of PoE and PoE+.
Stratix 5400 and ArmorStratix 5700 switches use one power connection for both basic power supply and PoE power supply.
Stratix 5700 switches and Stratix 8000/8300 expansion modules require a dedicated power supply for PoE.
See the following for PoE requirements:
For Stratix 5400 switches, see page 80
For Stratix 5700 switches, see page 142.
For ArmorStratix 5700 switches, see page 156.
For Stratix 8000/8300 expansion modules, see page 171.
Auto-MDIX
When connecting the switch to workstations, servers, and routers, straight-through cables are typically used. However, the automatic
medium-dependent interface crossover (auto-MDIX) feature of the switch is enabled by default and reconfigures the ports to use either a
straight-through or crossover cable type.
The auto-MDIX feature is enabled by default. When the auto-MDIX feature is enabled, the switch detects the required cable type
(straight-through or crossover) for copper Ethernet connections and configures the interfaces accordingly.
You can use the Command-line interface (CLI) to disable the auto-MDIX feature. See the online help for more information.
21
Chapter 1
Description
Depending on the switch model, one AC or DC power supply module comes pre-installed in the switch. You can order an optional second power
supply of any voltage type to provide redundancy and additional power for PoE devices:
One power supply provides 60 W for PoE/PoE+.
Two power supplies provide 185 W for PoE/PoE+.
The power-input terminal on the cable-side of the switch provides connections for high-voltage AC, high-voltage DC, or low-voltage DC power
for the two power supplies. When dual power sources are operational, the switch draws power from the power source with the higher voltage.
If one of the two power sources fail, the other continues to power the switch.
The front panel alarm port uses an RJ45 connector. You can connect four alarm inputs and one alarm output for environmental, power supply,
and port status conditions. You can configure an alarm to indicate open or closed contacts.
Console port
To configure, monitor, and manage a switch, you can connect a switch to a computer through the console port:
Connect to the console port with an RJ45-to-DB-9 adapter cable or a mini USB cable. The mini USB driver is available in the firmware download
section at http://www.rockwellautomation.com.
10/100/1000 Ethernet,
PoE/PoE+ ports
You can set the 10/100/1000 ports to operate at 10 Mbps, 100 Mbps, or 1000 Mbps, full-duplex, or half-duplex. You can also set these ports for
speed and duplex autonegotiation in compliance with IEEE 802.3-2002. The default setting is autonegotiate.
When set for autonegotiation, the port senses the speed and duplex settings of the attached device. If the connected device also supports
autonegotiation, the switch port negotiates the connection with the fastest line speed that both devices support. The port also negotiates
full-duplex transmission if the attached device supports it. The port then configures itself accordingly. In all cases, the attached device must be
within 100 m (328 ft) of the switch.
The ports can also be configured for PoE (IEEE 802.3af) or PoE+ (IEEE 802.3at Type 2):
You can configure the ports in any combination of PoE and PoE+.
A second power supply is required to support PoE+.
The ports deliver up to 15.4 W of PoE and 30 W of PoE+.
The ports can be designated as high or low priority PoE/PoE+ ports. When two power-supply modules are installed, the system has enough
power to support all ports as PoE/PoE+ ports. If one of the power-supply modules fails, the power to the low priority ports is dropped, while
power to the high priority ports remains uninterrupted. For more information, see pages 298, 305, and 308.
The ports use RJ45 connectors with Ethernet pinouts. The maximum cable length is 100 m (328 ft).
1000 SFP ports provide only 1-Gbps connectivity. These uplink ports are available on catalog numbers1783-IMS28GNDC, 1783-IMS28GNAC,
1783-IMS28GRDC, and 1783-IMS28GRAC.
1000/10 Gigabit SFP/SFP+ ports 1000/10 Gigabit SFP/SFP+ ports provide full-duplex, 1-Gbps or 10-Gbps connectivity. The port speed is 1 Gbps when a 1000BASE SFP module
is installed and 10 Gbps when an 10GBASE SFP+ module is installed.
Auto-MDIX
When connecting the switch to workstations, servers, and routers, straight-through cables are typically used. However, the automatic
medium-dependent interface crossover (auto-MDIX) feature of the switch is enabled by default and reconfigures the ports to use either a
straight-through or crossover cable type.
The auto-MDIX feature is enabled by default. When the auto-MDIX feature is enabled, the switch detects the required cable type (straightthrough or crossover) for copper Ethernet connections and configures the interfaces accordingly.
You can use the Command-line interface (CLI) to disable the auto-MDIX feature. See the online help for more information.
Inter-range instrumentation
group (IRIG) time codes
Time of day (ToD)
synchronization
22
Memory Allocation
Chapter 1
Memory Allocation
IPv4 Default
Dual IPv4/IPv6
Routing
16K
16K
16K
16K
1K
1K
1K
18K
5.25K
24K
6K
1K
1K
5.25K
7K
16K
4K
16K
4K
4K
4K
2K
1.25K
8K
2K
5.25K
3K
0.125K
0.25K
0.375K
0.125K
1.875K
0.5K
0.5K
0.5K
1.875K
0.75K
1K
0.625K
0.25K
0.125K
0.375K
0.125K
0.375K
0.125K
23
Chapter 1
Memory Allocation
16K
1K IPv4
Direct routes
1K IPv4
Indirect routes
0.25K IPv4
1K (IPv4 QoS)
1K (IPv4 ACL)
24
Memory Allocation
Default
Dual-default
IPv4 Routing
Dual-routing
16K
16K
16K
16K
1K IPv4
1K IPv4
1K IPv6
1K IPv4
1K IPv4
1K IPv6
Direct routes
16K IPv4
4K IPv4
4K IPv6
16K IPv4
4K IPv4
4K IPv6
Indirect routes
2K IPv4
1.25K IPv4
1.25K IPv6
8K IPv4
2K IPv4
3K IPv6
1K (IPv4 ACL)
Chapter 1
Memory Allocation
Default
Lanbase Routing
8K
4K
7.5K
0.25K
0.25K
0.25K
4.25K
0.375K
4K
0.25K
0.375K
0.375K
0.375K
0.375K
0.375K
0.375K
0.125K
25
Chapter 1
26
Memory Allocation
Default
Lanbase Routing
8K
4K
0.25K
0.25K
0.75
0.75
16
0.375K
0.375K
0.375K
0.375K
Chapter
Get Started
Topic
Page
28
32
37
38
41
Global Macro
43
43
46
50
58
Configuration Files
59
61
65
Firmware Updates
65
66
Command-line Interface
67
27
Chapter 2
Get Started
When you first install the switch, use Express Setup to perform these initial
setup tasks:
Assign the switch an initial IP address. You can then access the switch
through the IP address for more configuration.
Run the global macro to set initial configuration parameters, as
described on page 42.
Stratix 5400
Stratix 5410
Stratix 5700
ArmorStratix 5700
Stratix 8000
28
Get Started
Chapter 2
Requirement
Hardware
Processor
RAM
16 GB (32-bit) or 20 GB (64-bit)
Software
Operating system
Windows 7
Web browser
Computer-to-switch connection
(single-mode Express Setup or
multi-mode Express Setup in
Short Press mode)
For Stratix 5700 or ArmorStratix 5700 switches, make sure that the SD
card is not inserted.
29
Chapter 2
Get Started
30
Get Started
Chapter 2
31
Chapter 2
Get Started
Enable method
Between seconds 1115 and after 21 seconds, the Setup status indicator turns off. If you release the
Express Setup button while the Setup status indicator is off, no Express Setup mode is enabled.
Setup status indicator
Function
32
Get Started
Chapter 2
To run multi-mode Express Setup in Short Press mode, follow these steps.
1. Apply power to the switch.
When the switch powers on, it begins its power-on sequence. The
power-on sequence can take as many as 90 seconds to complete.
2. Make sure that the power-on sequence has completed by verifying that
the EIP Mod and Setup status indicators are flashing green.
If the switch fails the power-on sequence, the EIP Mod status indicator
turns red.
If you do not press the Express Setup button within 5 minutes after the
power-on sequence is complete, the Setup status indicator turns off.
However, you can still run Express Setup after the Setup status indicator
turns off.
3. Press and hold the Express Setup button until the Setup status indicator
flashes green during seconds 14, and then release.
The switch selects a port to use for Express Setup.
33
Chapter 2
Get Started
Port Gi1/1 does not flash during setup, but must be used to connect
1783-BMS4S2SGL or 1783-BMS4S2SGA switches to a computer.
Once you connect the switch to the computer, the following occurs:
The status indicator for the port connected to the computer changes
from flashing green to solid green.
The switch acts as a DHCP server on VLAN 1000 with an address of
169.254.0.1.
IMPORTANT The IP address of the switch for multi-mode Express Setup is
different than the IP address for single-mode Express Setup.
The switch assigns the computer an IP address of 192.168.1.1 on
VLAN 1000.
The Setup status indicator changes from flashing green to solid
green.
5. Proceed to Configure Network Settings via Device Manager on page 38.
34
Get Started
Chapter 2
IMPORTANT
Before you begin, make sure that your system has a DHCP server configured
to assign the switch an IP address. You can configure a switch to be a DHCP
server, as described on page 230.
To run multi-mode Express Setup in Medium Press mode, follow these steps.
1. Apply power to the switch.
When the switch powers on, it begins its power-on sequence. The
power-on sequence can take as many as 90 seconds to complete.
2. Make sure that the power-on sequence has completed by verifying that
the EIP Mod and Setup status indicators are flashing green:
If the switch fails the power-on sequence, the EIP Mod status
indicator turns red.
If you do not press the Express Setup button within 5 minutes after
the power-on sequence is complete, the Setup status indicator turns
off.
3. Press and hold the Express Setup button until the Setup status indictor
flashes red during seconds 610, and then release:
IMPORTANT You must complete the switch setup within 10 minutes of releasing
the Express Setup button. Otherwise, the switch exits Express Setup.
The Setup status indicator flashes green during seconds 15, and
then red during seconds 610.
The switch broadcasts a DHCP request out of all ports on VLAN 1.
VLAN 1 is configured with the IP address returned by the DHCP
server.
The default login credentials are set to the following:
User name: [no user name/blank]
Password: switch
CIP is enabled on VLAN 1 with CIP security password set to
switch.
35
Chapter 2
Get Started
To run multi-mode Express Setup in Long Press mode, do the following at any
time.
Press and hold the Express Setup button until the Setup status indicator flashes
alternating green and red during seconds 1620, and then release.
Upon release of the Express Setup button, the switch restarts with factory
default settings.
36
Get Started
Chapter 2
Port Gi1/1 does not flash during setup, but must be used to connect
1783-BMS4S2SGL or 1783-BMS4S2SGA switches to a computer.
IMPORTANT
If you wait too long to connect the cable, the Setup status indicator
turns off.
37
Chapter 2
Get Started
To configure network settings via Device Manager after you run Express Setup,
follow these steps.
1. Start a web browser session on the computer and go to
http://169.254.0.1.
2. Enter the default user name and password to display the Express Setup
page:
User name: [no user name/blank]
Password: switch
If the Express Setup page does not appear, do the following:
Verify that your network adapter is set to accept a DHCP address
Enter the URL of a well-known website in your browser to be sure
that the browser is working correctly. Your browser then redirects to
Express Setup.
Verify that any proxy settings or pop-up blockers are disabled on your
browser.
Verify that any wireless interface is disabled on the computer.
3. Complete the fields.
To view fields for Common Industrial Protocol (CIP), click Advanced
Settings.
38
Get Started
Field
Chapter 2
Description
Network Settings
Host Name
Management Interface (VLAN ID) The name and ID of the management VLAN through which the switch is managed. The management VLAN is the broadcast domain through
which management traffic is sent between specific users or devices. It provides broadcast control and security for management traffic that
must be limited to a specific group of users, such as the administrators of your network. It also provides secure administrative access to all
devices in the network.
Choose an existing VLAN as the management VLAN. The default management VLAN ID is 1 and the VLAN name is default.
Valid IDs for single-mode Express Setup: 11001
Valid IDs for multi-mode Express Setup: 14096
IMPORTANT: Be sure that the switch and your network management station are in the same VLAN. Otherwise, you lose management
connectivity to the switch.
IP Assignment Mode
The IP Assignment mode determines whether the switch IP information is manually assigned (static) or is automatically assigned by a
Dynamic Host Configuration Protocol (DHCP) server. The default is Static.
We recommend that you click Static and manually assign the IP address for the switch. You can then use the same IP address whenever you
want to access Device Manager.
If you click DHCP, the DHCP server automatically assigns an IP address, subnet mask, and default gateway to the switch. Unless restarted, the
switch continues to use the DHCP-assigned information, and you are able to use the DHCP-assigned address to access Device Manager.
For a manually assigned IP address in a network that uses a DHCP server, make sure that the IP address is not within the range of addresses
that the DHCP server assigns. Otherwise, IP address conflicts can occur between the switch and another device.
IP Address
The IP address and associated subnet mask are unique identifiers for the switch in a network:
The IP address format is a 32-bit numeric address that is written as four numbers that are separated by periods. Each number can be from
0255.
The subnet mask is the network address that identifies the subnetwork (subnet) to which the switch belongs. Subnets are used to segment
the devices in a network into smaller groups. The default is 255.255.255.0.
IMPORTANT: If you run multi-mode Express Setup in Medium Press mode, the IP Address field displays the address received from the DHCP
server. If you change the address, the connection drops. To re-establish the connection with the new address, close your web browser and go
to the address you specified.
Make sure that the IP address that you assign to the switch is not assigned to another device in your network. The IP address and the default
gateway cannot be the same.
The IP address for the default gateway. A gateway is a router or a dedicated network device that enables the switch to communicate with
devices in other networks or subnetworks. The default gateway IP address must be part of the same subnet as the switch IP address. The
switch IP address and the default gateway IP address cannot be the same.
If all of your devices are in the same network and a default gateway is not used, you do not need to enter an IP address in this field. This field is
enabled only if the IP assignment mode is Static.
If your network management station and the switch are in different networks or subnetworks, you must specify a default gateway. Otherwise,
the switch and your network management station cannot communicate with each other.
NTP Server
The IP address of the Network Time Protocol (NTP) server. NTP is a networking protocol for clock synchronization between computer systems
over packet-switched, variable-latency data networks.
User
The password for the switch can have up to 63 alphanumeric characters, can start with a number, is case-sensitive, and can have embedded
spaces. The password cannot be one digit, it cannot contain a ? or a tab, and it does not allow spaces at the beginning or the end. The default is
switch.
To complete initial setup, you must change the password from the default password, switch.
This password is also used as the Control Industrial Protocol (CIP) security password. We recommend that you provide a password to the switch
to secure access to Device Manager.
Advanced Settings
CIP VLAN
The VLAN on which Common Industrial Protocol (CIP) is enabled. The CIP VLAN can be the same as the management VLAN or you can isolate
CIP traffic on another VLAN that is already configured on this device.
IP Address
The IP address and subnet mask for the CPI VLAN if the CIP VLAN differs from the management VLAN. The format is a 32-bit numeric address
that is written as four numbers that are separated by periods. Each number can be from 0255.
Make sure that the IP address that you assign to this device is not being used by another device in your network.
Indicates whether the settings for the CIP VLAN are the same as the management VLAN.
Sets the password that is used for Telnet and CIP security to the same user password specified under Network Settings.
39
Chapter 2
Get Started
4. Click Submit.
The switch initializes its configuration for typical industrial
EtherNet/IP applications by running the global macro as described on
page 42. You can then log on to Device Manager for further
configuration or exit the application.
5. Turn off DC or AC power at the source, disconnect any cables to the
switch, and install the switch in your network.
IMPORTANT
40
Get Started
Chapter 2
Field
Description
Displays the IP address assigned to the switch by the DHCP server during Express Setup. This value must match the IP address on the General
view. If you change the assigned IP address, make sure that the new IP address is not assigned to another device in your network. The IP
address and the default gateway cannot be the same.
IMPORTANT: If you reconfigure your switch with another IP address, you can lose communication with the switch when you click Set. To
correct this problem, you must return to the Express Setup and General view, set the new IP address, and download to the controller.
41
Chapter 2
Get Started
Field
Description
Subnet Mask
Displays the IP address assigned to the switch by the DHCP server during Express Setup. The subnet mask is the network address that identifies
the subnetwork (subnet) to which the switch belongs. Subnets are used to segment the devices in a network into smaller groups.
The subnet mask is a 32-bit number. Set each octet between 0255. The default is 255.255.255.0.
Host Name
Type a name to identify the switch. The name can be up to 64 characters and can include alphanumeric and special characters (comma and
dash).
Gateway Address
Displays the gateway address assigned to the switch by the DHCP server during Express Setup. A gateway is a router or a dedicated network
device that enables the switch to communicate with devices in other networks or subnetworks. The default gateway IP address must be part of
the same subnet as the switch IP address. The switch IP address and the default gateway IP address cannot be the same.
If all of your devices are in the same network and a default gateway is not used, you do not need to enter an IP address in this field. This field is
enabled only if the IP assignment mode is Static.
If your network management station and the switch are in different networks or subnetworks, you must specify a default gateway. Otherwise,
the switch and your network management station cannot communicate with each other.
IMPORTANT: Communication is disrupted when you change the gateway (IP) address.
(Optional). Type the IP address of the NTP server. NTP is a networking protocol for clock synchronization between computer systems over
packet-switched, variable-latency data networks.
User
The password for the switch can have up to 63 alphanumeric characters, can start with a number, is case-sensitive, and can have embedded
spaces. The password cannot be one digit, it cannot contain a ? or a tab, and it does not allow spaces at the beginning or the end. The default
password is switch.
To complete initial setup, you must change the password from the default password.
This password is also used as the Control Industrial Protocol (CIP) security password. You must provide a password to the switch to secure
access to Device Manager.
6. Click OK.
The switch initializes its configuration for typical industrial
EtherNet/IP applications by running the global macro as described on
page 42. You can then use the AOP for further configuration or exit the
application.
7. Turn off DC or AC power at the source, disconnect any cables to the
switch, and install the switch in your network.
IMPORTANT
8. For Stratix 5400 and Stratix 5410 switches, synchronize the SD card
that came with the switch with the internal memory of the switch, as
described on page 64.
42
Get Started
Global Macro
Chapter 2
Once you complete Express Setup, the switch runs a global macro (ab-global).
This macro configures the switch for industrial automation applications that
use the EtherNet/IP protocol. This macro sets many parameters, including
these major settings:
Enable IGMP snooping and querier
Enable CIP
Configure QoS settings and classify CIP, PTP, and other traffic (does
not apply to switches with lite firmware revisions)
Enables alarms, SYSLOG, and SNMP notifications
Enables Rapid Spanning Tree (RSTP), BPDU Guard, BPDU Filter, and
loop guard
If you do not run Express Setup to initialize the switch, the global macro does
not run. You can use the CLI to run the global macro.
The EtherNet/IP network interface also supports the List Identity command
that is used by CIP-based network tools, such as the RSLinx software RSWho
function. RSWho enables you to locate and identify your switch on the
network by using the electronic data sheet (EDS) files.
To access the RSWho function, from the RSLinx software toolbar, choose
Communications > RSWho.
IMPORTANT
After using the RSWho function, if you access the switch and view the
Ethernet link counters, you see the counts for only the first port (Port Gi1/1).
43
Chapter 2
Get Started
You can also obtain the EDS files in either of these two ways:
By downloading it from
http://www.rockwellautomation.com/resources/eds/.
By using the RSLinx EDS Hardware Installation tool.
To upload the EDS files directly from the switch over the network, follow these
steps.
1. From the Start menu, choose Programs >
Rockwell Software >RSLinx >Tools > EDS Hardware Installation Tool.
2. To launch the EDS Wizard and add the selected hardware description
and associated files, click Add.
Details
44
Module identification (vendor ID, device type, product code, product name, revision, serial number)
Major/minor fault status, I/O connection, module identity match
Active alarms
Major alarm relay (open, closed)
Active faults
Switch uptime since last restart
Switch internal temperature in degrees Centigrade
Management CPU utilization in percentage
Power supply A present: yes, no
Power supply B present: yes, no
Number of active multicast groups
IOS release version
DLR ring status, members, and faults
CIP connection counters: open/close requests, open/close rejects, timeouts
Port alarm status per port: OK, Link Fault, Not Forwarding, Not Operating, High Bit Error Rate
Port fault status per port: Error Disable, SFP Error, Native VLAN Mismatch, MAC address Flap Condition, Security Violation
Port diagnostic counters per port: Ethernet interface counters (10), Ethernet media counters (12)
Link status
Traffic threshold exceeded per port: unicast, multicast, broadcast
Cable diagnostics per port selected
DHCP pool display: name, starting and ending IP address
NAT: display name of instance, VLANs assigned per instance
NAT diagnostics: active translations, total translated packets, blocked and pass-through traffic, ICMP and ARP fixups
Get Started
Data Type
Details
Configuration data
Chapter 2
Role
VLAN
45
Chapter 2
Get Started
Configuration via
Device Manager
You can manage the switch by using Device Manager to configure and monitor
the switch. Device Manager is a web-based management tool for configuring,
monitoring, and troubleshooting individual switches.
Device Manager displays real-time views of switch configuration and
performance. It simplifies configuration tasks with features such as Smartports.
It uses graphical, color-coded displays, such as the front panel view, graphs, and
animated indicators to simplify monitoring tasks. It provides alert tools to help
you to identify and to solve networking problems.
You can display Device Manager from anywhere in your network through a
web browser such as Microsoft Internet Explorer.
Table 11 - Device Manager Hardware Requirements
Attribute
Requirement
Processor speed
RAM
Number of colors
256
Resolution
1024 x 768
Font size
Small
Version
Mozilla Firefox
Device Manager verifies the browser version when starting a session to be sure
that the browser is supported.
To make sure that Device Manager runs properly, disable any pop-up blockers
or proxy settings in your browser and any wireless clients on your computer or
laptop.
46
Get Started
Chapter 2
To use Device Manager to configure and monitor the switch, follow these
steps.
1. Launch a web browser on your workstation.
2. Enter the switch IP address in the web browser, and click Enter to
display Device Manager.
3. Enter the switch name and password.
4. Use Device Manager for basic switch configuration and monitoring.
47
Chapter 2
Get Started
Table 13 lists the basic settings for the switch ports. To change these settings,
click the radio button next to the port name and click Edit to display the Edit
Physical Port window.
48
Get Started
Chapter 2
Description
Port Name
The number of the switch port, including port type, such as Fa for Fast Ethernet and Gi for Gigabit Ethernet, and the specific port number:
Gi/1 is the gigabit port 1 of the switch.
Fa1/1 is Fast Ethernet port 1 on the switch.
Description
Port Status
The state of the switch port. The default is Enabled. You can change this setting on the Edit Physical Port window by checking or clearing the
Administrative checkbox.
We recommend disabling the port if the port is not in use and is not attached to a device.
An example of when to change this setting is during troubleshooting. You can troubleshoot a suspected unauthorized connection by administratively
disabling the port.
Speed
The operating speed of the switch port. You can choose Auto (autonegotiation) if the connected device can negotiate the link speed with the switch
port. The default is Auto.
We recommend that you use the default so that the speed setting on the switch port automatically matches the setting on the connected device.
Change the switch port speed if the connected device requires a specific speed.
An example of when to change this setting is during troubleshooting. If you are troubleshooting a connectivity problem, you can change this setting to
see if the switch port and connected device have a speed mismatch.
Duplex
Auto-MDIX
Whether the automatic medium-dependent interface crossover (auto-MDIX) feature can automatically detect the required cable connection type
(straight-through or crossover) and configure the connection appropriately. The default is Enable.
This setting is not available on the SFP module ports.
Media Type
The active port type (either the RJ45 port or the SFP module port) of a dual-purpose uplink port.
By default, the switch detects whether the RJ45 port or SFP module port of a dual-purpose port is connected and uses the port accordingly. Only one
port can be active at a time. If both ports are connected, the SFP module port has priority. You cannot change the priority setting.
Choose from the following media types:
SFPThe SFP module port is active. If you choose this option, the speed and duplex displays the current settings and auto-MDIX displays N/A.
RJ45The RJ45 port is active. If you choose this option, you can set the port speed, duplex, and auto-MDIX values.
Auto (autonegotiation)Either port can be active. If you choose this option, the speed and duplex is set to auto and auto-MDIX displays N/A.
The default is Auto.
Operational Mode
The operational state of the port. Displays the administrative mode or Down (if disabled).
Access VLAN
The VLAN that an interface belongs to and carries traffic for, when the link is configured as or is acting as a nontrunking interface.
Administrative Mode
49
Chapter 2
Get Started
You can manage the switch by using the Logix Designer application in the
Studio 5000 environment. The Logix Designer application is IEC 61131-3
compliant and offers relay ladder, Structured Text, function block diagram, and
sequential function chart editors for you to develop application programs.
Table 14 - Logix Designer Hardware Requirements
Attribute
Requirement
Processor speed
RAM
128 MB min
256 MB recommended
3 GB
Optical drives
DVD
Video requirements
Resolution
50
Get Started
Chapter 2
3. On the Select Module Type dialog box, select the switch and click
Create.
If you do not see the switch on the list, you can obtain the AOP from the
Rockwell Automation support website:
http://www.rockwellautomation.com/support/
51
Chapter 2
Get Started
General Properties
To configure general properties, follow these steps.
1. In the navigation pane, click General and complete the fields.
IMPORTANT
52
Make sure that the IP address and host name match the values you used
during Express Setup. On the Module Properties dialog box, you can choose
either an IP address or host name. Only one of these two choices is
enabled.
Field
Description
Name
Description
A description that helps you remember something important about the switch.
Ethernet Address
Get Started
Chapter 2
Field
Description
Revision
Electronic Keying
Connection
(Data connections only). Enter the password for accessing the switch.
Switch Base
(Stratix 8000/8300 switches)
Displays the switch base catalog number for the selected module.
Switch Expansion 1
(Stratix 8000/8300 switches)
(14, 18, 22 and 26 port switches only). The catalog number for the copper or fiber expansion modules you are using.
For 14 and 18-port switches, user selection of the expansion module is supported.
For 22 and 26-port switches, Switch Expansion 1 displays 1783-MX08T. User selection of the expansion module is not supported.
Switch Expansion 2
(Stratix 8000/8300 switches)
(22 and 26 port switches only). The catalog number for the copper or fiber expansion modules you are using. User selection of the expansion
module is supported.
53
Chapter 2
Get Started
Connection Properties
In the navigation pane, click Connection.
Description
Inhibit Module
Check to have the controller create a major fault if connection fails in Run mode.
Module Fault
Displays the fault code from the controller and the text that indicates the module fault has occurred.
54
Get Started
Chapter 2
Switch Configuration
You can configure IP settings and administrative parameters. The IP address
can be manually assigned (static) or it can be automatically assigned by a
Dynamic Host Configuration Protocol (DHCP) server. The default is Static.
We recommend that you choose Static and manually assign the IP address for
the switch. You can then use the same IP address whenever you want to access
the switch.
StaticManually enter the IP address, subnet mask, and gateway.
DHCPThe switch automatically obtains an IP address, default
gateway, and subnet mask from the DHCP server. As long as the switch
is not restarted, it continues to use the assigned IP information.
In the navigation pane, click Switch Configuration.
Figure 1 - Switch Configuration
Description
Contact
(Optional). Enter contact information for the switch, up to 200 characters. The contact information can include alphanumeric and
special characters (dash and comma) and a carriage return.
Geographic Location
(Optional). Enter a geographic location of the switch, up to 200 characters. The geographic location can include alphanumeric and
special characters (dash and comma) and a carriage return.
Displays the VLAN through which the switch is managed. The management VLAN is the broadcast domain through which
management traffic is sent between specific users or devices. It provides broadcast control and security for management traffic that
must be limited to a specific group of users, such as the administrators of your network. It also provides secure administrative access to
all devices in the network.
IMPORTANT: Be sure that the switch and your network management station are in the same VLAN. Otherwise, you lose management
connectivity to the switch.
To enable dual-power supply alarms, check the checkbox. The feature is disabled by default.
55
Chapter 2
Get Started
Port Configuration
Port settings determine how data is received and sent between the switch and
the attached device.
In the navigation pane, click Port Configuration.
Description
Unit
(Stratix 8000/8300 switches)
Port
The port that is selected for configuration. The port number includes the port type (Fa for Fast Ethernet, Gi for Gigabit Ethernet, or Te for Ten
Gigabit Ethernet) and the specific port number.
EXAMPLE: Gi1/1 is Gigabit Ethernet port 1.
Enable
56
Get Started
Chapter 2
Description
Auto-negotiate
If you want the port and end-device to auto-negotiate the link speed and Duplex mode, check the checkbox.
To specify the desired port speed and Duplex mode manually, clear the checkbox.
We recommend that you use the default (auto-negotiate) so that the speed and duplex settings on the switch port automatically match the
setting on the connected device. Change the switch port speed and duplex if the connected device requires a specific speed and duplex. If you set
the speed and duplex for the switch port, the connected device must be configured for the same speed and duplex and not set to auto-negotiate.
Otherwise, a speed/duplex mismatch occurs.
Fiber-optic interfaces do not support auto-negotiation.
Speed
Duplex
57
Chapter 2
Get Started
You can add, modify, or delete users and user login information for the switch
via Device Manager.
From the Admin menu, choose Users.
For each user, you can specify the information in Table 18.
Description
Name
Privilege
Password
The password that is required for access with this user name.
Confirm Password
58
Get Started
Configuration Files
Chapter 2
59
Chapter 2
Get Started
60
Get Started
Chapter 2
61
Chapter 2
Get Started
62
Get Started
Chapter 2
Description
SD Card Status
Indicates whether SD card is present, the status of the card, and from where its
configuration was started.
SD to Flash Sync
Flash to SD Sync
Description
Configuration
Image (IOS)
63
Chapter 2
Get Started
64
Field
Description
SD Flash Status
Indicates whether the SD card is present and the status. of the card
Synchronization Status
Indicates whether the configuration files and the IOS are synchronized or
unsynchronized.
Get Started
Chapter 2
The CompactFlash card for Stratix 8000/8300 switches contains the switch
IOS operating system, Device Manager firmware, and user-defined
configuration settings. Without the CompactFlash card, the switch cannot
power up or restart.
If you remove the card with the switch running, the switch continues to
function. However, Device Manager is no longer available.
If you change the switch configuration after the card is removed, they are
applied and used by the switch. However, the changes are not saved. If you
insert the CompactFlash card later, the previous changes are still not saved to
the card. Only changes that are made while the card is inserted are saved.
Each time a change is made with the card installed, both the AOP and Device
Manager save the entire running configuration to the card.
Firmware Updates
65
Chapter 2
Get Started
With firmware revision 2.001 or later, the firmware is installed to the running
nonvolatile memory location:
If you start the switch with the SD card inserted, the firmware is
installed on the SD card.
If you start the switch from internal memory without the SD card
inserted, the firmware is installed in the internal memory.
IMPORTANT Wait for the update process to complete. Do not use or close the browser
session with Device Manager active. Do not access Device Manager from
another browser session.
When the update process completes, a success message appears, and the switch
automatically restarts. It can take a few minutes for the switch to restart with
the new firmware.
Verify that the latest firmware revision on the switch appears in the Software
field in the Switch Information area of the dashboard.
For more information, see the online help for Device Manager.
Cisco Network Assistant is a web interface that you download from Ciscos
website and run on your computer. It offers advanced options for configuring
and monitoring multiple devices, including switches, switch clusters, switch
stacks, routers, and access points.
Follow these steps to use the software.
1. Go to http://www.cisco.com/go/NetworkAssistant.
You must be a registered user, but you need no other access privileges.
2. Find the Network Assistant installer.
3. Download the Network Assistant installer, and run it.
You can run it directly from the web if your browser offers this choice.
4. When you run the installer, follow the displayed instructions.
5. In the final panel, click Finish to complete the Network Assistant
installation.
For more information, see the online help for Network Assistant.
66
Get Started
Command-line Interface
Chapter 2
You can manage the switch from the Command-line interface (CLI) by
connecting your personal computer directly to the switch console port or
through the network by using Telnet.
Follow these steps to access the CLI through the console port.
1. Connect to the console port in one of these ways:
To connect to the standard 9-pin serial port on a computer, use a
RJ45-to-DB-9 adapter cable (not supplied with the switch).
(Stratix 5400, Stratix 5410, Stratix 5700, and ArmorStratix 5700
switches). Use a standard mini-USB cable to connect to the miniUSB port on a computer. If you use the USB cable, download the
drivers for Microsoft Windows from
http://www.rockwellautomation.com. The USB cable is not
provided with the switch.
2. Connect the other end of the cable to the console port on the switch.
WARNING: The console port is intended only for temporary local
programming purposes and not intended for permanent connection.
If you connect or disconnect the console cable with power applied to
this module or the programming device on the other end of the
cable, an electrical arc can occur. This could cause an explosion in
hazardous location installations. Be sure that power is removed or
the area is nonhazardous before proceeding.
3. Start a terminal-emulation program on the computer.
4. Configure the computer terminal emulation software for 9600 bps,
eight data bits, no parity, one stop bit, and no flow control.
67
Chapter 2
Get Started
Notes:
68
Chapter
Topic
Page
Specifications
73
Overview
73
75
76
77
78
78
79
80
83
84
86
87
90
91
92
92
93
69
Chapter 3
Products marked "CL I, DIV 2, GP A, B, C, D" are suitable for use in Class I Division 2 Groups
A, B, C, D, Hazardous Locations and nonhazardous locations only. Each product is
supplied with markings on the rating nameplate indicating the hazardous location
temperature code. When combining products within a system, the most adverse
temperature code (lowest "T" number) may be used to help determine the overall
temperature code of the system. Combinations of equipment in your system are subject
to investigation by the local Authority Having Jurisdiction at the time of installation.
Les produits marqus "CL I, DIV 2, GP A, B, C, D" ne conviennent qu' une utilisation en
environnements de Classe I Division 2 Groupes A, B, C, D dangereux et non dangereux.
Chaque produit est livr avec des marquages sur sa plaque d'identification qui indiquent
le code de temprature pour les environnements dangereux. Lorsque plusieurs produits
sont combins dans un systme, le code de temprature le plus dfavorable (code de
temprature le plus faible) peut tre utilis pour dterminer le code de temprature
global du systme. Les combinaisons d'quipements dans le systme sont sujettes
inspection par les autorits locales qualifies au moment de l'installation.
70
Chapter 3
WARNING: When you connect or disconnect the Power or Alarm Removable Terminal Blocks (RTBs) with field side power
applied, an electrical arc can occur. This could cause an explosion in hazardous location installations.
Be sure that power is removed or the area is nonhazardous before proceeding.
WARNING: If you connect or disconnect communication cables with power applied to this module or any device on the network,
an electrical arc can occur. This could cause an explosion in hazardous location installations.
Be sure that power is removed or the area is nonhazardous before proceeding.
WARNING: Use supply wires suitable for 30 C (86 F) above surrounding ambient.
WARNING: If you connect or disconnect wiring while the field-side power is on, an electrical arc can occur. This could cause an
explosion in hazardous location installations.
Be sure that power is removed or the area is nonhazardous before proceeding.
II 3 G: Such modules:
Are Equipment Group II, Equipment Category 3, and comply with the Essential Health and Safety Requirements relating to the design and construction of such equipment given
in Annex II to Directive 94/9/EC. See the EC Declaration of Conformity at http://www.rockwellautomation.com/products/certification for details.
The type of protection is "Ex nA nC IIC T3 Gc according to EN 60079-15.
Comply to Standards: EN 60079-0:2012+A11:2013, EN 60079-15:2010, reference certificate number DEMKO14ATEX1423X.
Are intended for use in areas in which explosive atmospheres caused by gases, vapors, mists, or air are unlikely to occur, or are likely to occur only infrequently and for short
periods. Such locations correspond to Zone 2 classification according to ATEX directive 1999/92/EC.
71
Chapter 3
ATTENTION: If this equipment is used in a manner not specified by the manufacturer, the protection provided by the equipment
may be impaired.
ATTENTION: Before installing, configuring, operating, or maintaining this product, read this document and the documents
listed in the additional resources section for installing, configuring, or operating equipment. Users should familiarize themselves
with installation and wiring instructions in addition to requirements of all applicable codes, laws, and standards.
ATTENTION: Installation, adjustments, putting into service, use, assembly, disassembly, and maintenance shall be carried out by
suitably trained personnel in accordance with applicable code of practice. In case of malfunction or damage, no attempts at
repair should be made. The module should be returned to the manufacturer for repair. Do not dismantle the module.
ATTENTION: This equipment is certified for use only within the surrounding air temperature range
ATTENTION: Solid state equipment has operational characteristics differing from those of electromechanical equipment. Safety
Guidelines for the Application, Installation, and Maintenance of Solid State Controls, publication SGI-1.1, available from your
local Rockwell Automation sales office or online at http://www.rockwellautomation.com/literature, describes some important
differences between solid state equipment and hard-wired electromechanical devices.
ATTENTION: Use only a soft dry anti-static cloth to wipe down equipment. Do not use any cleaning agents.
72
Chapter 3
For additional specifications and certifications, see the Stratix Ethernet Device
Specifications Technical Data, publication 1783-TD001.
Specifications
Attribute
1783-HMS8T4CGN, 1783-HMS16T4CGN,
1783-HMS8TG4CGN, 1783-HMS8TG4CGR,
1783-HMS4T4E4CGN
1783-HMS4C4CGN, 1783-HMS4S8E4CGN,
1783-HMS8TG8EG4CGN, 1783-HMS4SG8EG4CGN,
1783-HMS4EG8CGN, 1783-HMS4EG8CGR,
1783-HMS8TG8EG4CGR, 1783-HMS4SG8EG4CGR,
1783-HMS16TG4CGN, 1783-HMS16TG4CGR
1783-HMS8S4CGN, 1783-HMS8SG4CGN,
1783-HMS8SG4CGR
Power supply
Alarm relay
Temp code
T3
Overview
73
Chapter 3
74
Chapter 3
Verify that you have these items. The secure digital (SD) card comes installed
in the SD slot on the front panel of the switch.
1
SD card
Documentation
At the end of its life, this equipment should be collected separately from any
unsorted municipal waste.
Obtain these tools:
Ratcheting torque screwdriver that exerts up to 1.69 Nm (15 inlbs) of
pressure
Small, flat-blade screwdriver
#6 ring terminal lug for 5.3 mm (10 AWG) wire, such as Thomas &
Bett part number 10RC6 or equivalent
Crimping tool, such as Thomas & Bett part number WT2000,
ERG-2001, or equivalent
5.3 mm2 (10 AWG) copper ground wire, such as Belden part number
9912 or equivalent
Wire-stripping tool
For panel-mounting without a DIN rail, M5 or #10-24 or #10-32 bolts
or screws with 1.27 cm (0.5 in.) O.D. flat washers
For simplified cabling, the automatic medium-dependent interface crossover
(auto-MDIX) feature is enabled by default on the switch. With auto-MDIX
enabled, the switch detects the required cable type for copper Ethernet
connections and configures the interfaces accordingly. Therefore, you can use
either a crossover or a straight-through cable for connections to a 10/100 or
10/100/1000 Ethernet switch port, regardless of the type of device on the
other end of the connection.
Rockwell Automation Publication 1783-UM007E-EN-P - June 2016
75
Chapter 3
A secure digital (SD) card ships with the Stratix 5400 switch. The SD card
contains the switch firmware and initial configuration. You can order a
replacement SD card from Rockwell Automation, catalog number 1784-SD1,
if needed. The replacement card ships without firmware and must be synced
with the internal memory of the switch. See page 61.
To install or replace the SD card, follow these steps.
1. On the front of the switch, locate the door that protects the SD card
slot.
2. Loosen the captive thumb screw at the top of the door by using a
screwdriver to open the door.
3. Install or remove the card.
To install the card, slide it into the slot, and press it firmly in place until
it latches in the spring loaded mechanism. The card is keyed so that you
cannot fully insert it the wrong way.
32555-M
To remove the card, push it in and let it pop out via the spring-loaded
mechanism. Grasp the card top and pull it out. Place it in an antistatic
bag to protect it from static discharge.
32556-M
4. Close the guard door and fasten the captive screw by using a screwdriver
to keep the door in place.
76
Chapter 3
Before installing the switch in its final location, power on the switch, and verify
that the switch powers up.
The time that is required for the switch to start up is directly related to your
switch configuration. Start time is negatively affected by such things as the
following:
Spanning Tree Learning mode
Number of files or images in onboard memory
To test the switch, follow these steps.
1. Apply power to the switch.
If the switch is directly connected to a DC power source, locate the
circuit breaker on the panel board that services the DC circuit, and
switch the circuit breaker to the ON position.
2. Verify the start-up process.
When you power on the switch, it begins a start-up process. The Setup
status indicator blinks green as the IOS software image loads. If the
routine fails, the Setup status indicator turns red.
IMPORTANT
IMPORTANT You can disable Boot Fast and run the Power-on self-test (POST) by
using the CLI. For more information, see the documentation at
http://www.Cisco.com.
3. After successfully running this test, do the following:
a. Turn off power to the switch.
b. Disconnect the cables.
c. Decide where you want to install the switch
77
Chapter 3
The switch ships with a spring-loaded latch on the rear panel for mounting on
a DIN rail.
ATTENTION: To prevent the switch from overheating, make sure these
minimum clearances:
Top and bottom: 50.8 mm (2.0 in.)
Exposed side (not connected to the module): 50.8 mm (2.0 in.)
Front: 50.8 mm (2.0 in.)
To attach the switch to a DIN rail, follow these steps.
1. Position the rear panel of the switch directly in front of the DIN rail.
Make sure that the DIN rail fits in the space between the two hooks near
the top of the switch and the spring-loaded latch near the bottom.
2. Hold the bottom of the switch away from the DIN rail, and place the
two hooks on the back of the switch over the top of the DIN rail.
32513-M
3. Push the switch toward the DIN rail to cause the spring loaded latch at
the bottom rear of the switch to move down and snap into place.
To remove the switch from a DIN rail or a rack, follow these steps.
1. Remove power from the switch, and disconnect all cables and
connectors from the front panel of the switch.
2. Insert a tool, such as a flat-head screwdriver, in the slot at the bottom of
the spring-loaded latch and use it to release the latch from the DIN rail.
78
Chapter 3
For DC power connections, use UL- and CSA-rated, style 1007 or 1569
twisted-pair copper appliance wiring material (AWM) wire.
ATTENTION: To make sure that the equipment is reliably connected to earth
ground, follow the grounding procedure instructions and use a suitable ring
terminal lug, such as Thomas & Betts part number 10RCR or equivalent.
ATTENTION: For proper grounding, you must always connect the power
supply functional-ground screw when connecting the power supply. You
must provide an acceptable grounding path for each device in your
application. For more information on proper grounding guidelines, refer to
publication 1770-4.1, Industrial Automation Wiring and Grounding
Guidelines.
When using DIN rail mounting, additional grounding can also be accomplished
through the DIN rail. Use zinc-plated, yellow-chromate steel DIN rail to assure
proper grounding to an Earth Grounding path. Secure DIN rail to mounting
surface approximately every 200 mm (7.8 in.) using end-anchors appropriately
and using a washer plate along the entire length of the DIN rail.
Use at least 4 mm2 (12 AWG) wire to connect to the external grounding screw.
The ground lug is not supplied with the switch. You can use one of the these
options:
Single ring terminal
Two single ring terminals
To ground the switch to earth ground, follow these steps. Be sure to follow any
grounding requirements at your site.
1. Use a Phillips screwdriver or a ratcheting torque screwdriver with a
Phillips head to remove the ground screw from the front panel of the
switch.
Store the ground screw for later use.
2. Use the guidelines from the manufacturer to determine the wire length
to be stripped.
3. Insert the ground wire into the ring terminal lug and use a crimping tool
to crimp the terminal to the wire.
If you are using two ring terminals, repeat this action for the second ring
terminal.
79
Chapter 3
32515-M
For switches with Power over Ethernet (PoE) capability, PoE power is drawn
from the single power connection. There is no separate power input for PoE.
Switch Configuration
PoE
PoE+
Non-PoE
Allen-Bradley Products
Switched-mode power
supplies:
1606-XL Standard
1606-XLE Essential
1606-XLP Compact
1606-XLS Performance
To wire the DC power source for the switch, follow these steps.
1. Locate the power connector.
80
Chapter 3
5. Loosen the two captive screws that attach the power connector to the
switch, and remove the power connector.
Remove both connectors if you are connecting to two power sources.
32558-M
6. Insert the exposed part of the positive wire into the connection labeled
DC+ and the exposed part of the return wire into the connection
labeled DC-.
Be sure that you cannot see any wire lead. Only wire with insulation can
extend from the connector.
ATTENTION: An exposed wire lead from a DC input power source can
conduct harmful levels of electricity. Be sure that no exposed portion
of the DC input power source wire extends from the connectors or
terminal blocks.
DC+
DC-
32279-M
81
Chapter 3
32281-M
8. Connect the other end of the positive wire to the positive terminal on
the DC power source.
9. Connect the other end of the return wire to the return terminal on the
DC power source.
When you are testing the switch, one power connection is sufficient. If
you are installing the switch and are using a second power source, repeat
this procedure with the second power connector.
The following figure shows the completed DC input wiring on a power
connector for a primary power source and an optional secondary power
source.
32282-M
82
Chapter 3
To attach the switch power connectors to the front panel of the switch, follow
these steps. There is no separate power connector for PoE.
1. Insert one power connector into the Pwr A receptacle on the switch
front panel, and the other into the Pwr B receptacle.
Pwr A Receptacle
Pwr B Receptacle
32559-M
32514-M
When you test the switch, one power source is sufficient. If you install
the switch and use a second power source, repeat this procedure for the
second power connector (Pwr B), which installs just below the primary
power connector (Pwr A).
3. When you install the switch, secure the wires from the power connectors
to the rack by using tie wraps.
4. Insert the exposed part of the positive wire into the DC+ connection
and the exposed part of the return wire into the DC- connection.
Make sure that you cannot see any wire lead. Only wire with insulation
can extend from the connector.
DC+
DC-
83
Chapter 3
Installing and removing an SFP module can shorten its useful life. Do not
remove and insert SFP modules more often than is necessary.
84
Chapter 3
SFP Module
32560-M
4. Remove the dust plugs from the SFP module optical ports, store them
for later use.
IMPORTANT
Do not remove the dust plugs from the SFP module port or the
rubber caps from the fiber-optic cable until you are ready to connect
the cable.
The plugs and caps help protect the SFP module ports and cables
from contamination and ambient light.
85
Chapter 3
32561-M
5. Grasp the SFP module between your thumb and index finger, and
carefully remove it from the module slot.
6. Place the removed SFP module in an antistatic bag or other protective
environment.
86
Chapter 3
87
Chapter 3
The labels for the alarm relay connector are on the switch panel.
Table 22 - Alarm Relay Connector Labels
Label
Connection
NO
COM
NC
IN2
Alarm Input 2
REF
IN1
Alarm Input 1
32562-M
88
Chapter 3
32288-M
6. Repeat the preceding procedure to insert the input and output wires of
one more external alarm device into the alarm relay connector.
The following figure shows the completed wiring for two external alarm
devices. The first alarm device circuit is wired as an alarm relay input
circuitthe IN1 and REF connections complete the circuit. The
second alarm device circuit is wired as an alarm relay output circuit by
using the normally open side of the form C relay contacts. The NO and
COM connections complete the circuit.
COMWired Connection
NOWired Connection
32289-M
89
Chapter 3
To attach the alarm relay connector to the front panel of the switch, follow
these steps.
1. Insert the alarm relay connector into the receptacle on the switch front
panel.
2. Use a ratcheting torque flathead screwdriver to tighten the captive
screws on the sides of the alarm relay connector.
32563-M
90
Connect to 10BASE-T,
100BASE-TX, or 1000BASE-T
Ports
Chapter 3
32564-M
2. Connect the other end of the cable to an RJ45 connector on the other
device.
The Port status indicator turns on when both the switch and the
connected device have an established link.
The Port status indicator is amber while Spanning Tree Protocol (STP)
discovers the topology and searches for loops. This can take up to 30
seconds, and then the Port status indicator turns green.
The following conditions can prevent the Port status indicator from
turning On:
The device at the other end is not turned On.
A problem exists with a cable or the adapter that is installed in the
attached device.
3. Reconfigure and restart the connected device if necessary.
4. Repeat this procedure to connect each device.
91
Chapter 3
Switches with PoE ports require a separate power supply. For power supply
requirements based on your application, refer to page 80.
32565-M
2. Insert the other cable end into an RJ45 connector on the other PoE
powered device.
92
Connect to a
Dual-purpose Port
Chapter 3
A dual-purpose port is one port with two interfaces, one for an RJ45 cable and
another for an approved SFP module. Only one interface can be active at a
time. If both interfaces are connected, the SFP module has priority.
ATTENTION: Do not remove the rubber plugs from the SFP module port or
the rubber caps from the fiber-optic cable until you are ready to connect the
cable. The plugs and caps protect the SFP module ports and cables from
contamination and ambient light.
To connect to a dual-purpose port, follow these steps.
1. Connect an RJ45 connector to the 10/100/1000 port, or install an SFP
module into the SFP module slot, and connect a cable to the SFP
module port.
2. Connect the other end of the cable to the other device.
By default, the switch detects whether an RJ45 connector or SFP
module is connected to a dual-purpose port and configures the port
accordingly. You can change this setting and configure the port to
recognize only an RJ45 connector or only an SFP module by using the
media type interface configuration command.
93
Chapter 3
Notes:
94
Chapter
Topic
Page
Switch Specifications
99
99
Overview
100
101
103
105
105
109
112
113
114
118
118
120
121
122
122
124
95
Chapter 4
Products marked "CL I, DIV 2, GP A, B, C, D" are suitable for use in Class I Division 2 Groups
A, B, C, D, Hazardous Locations and nonhazardous locations only. Each product is
supplied with markings on the rating nameplate indicating the hazardous location
temperature code. When combining products within a system, the most adverse
temperature code (lowest "T" number) may be used to help determine the overall
temperature code of the system. Combinations of equipment in your system are subject
to investigation by the local Authority Having Jurisdiction at the time of installation.
Les produits marqus "CL I, DIV 2, GP A, B, C, D" ne conviennent qu' une utilisation en
environnements de Classe I Division 2 Groupes A, B, C, D dangereux et non dangereux.
Chaque produit est livr avec des marquages sur sa plaque d'identification qui indiquent
le code de temprature pour les environnements dangereux. Lorsque plusieurs produits
sont combins dans un systme, le code de temprature le plus dfavorable (code de
temprature le plus faible) peut tre utilis pour dterminer le code de temprature
global du systme. Les combinaisons d'quipements dans le systme sont sujettes
inspection par les autorits locales qualifies au moment de l'installation.
II 3 G: Such modules:
Are Equipment Group II, Equipment Category 3, and comply with the Essential Health and Safety Requirements relating to the design and construction of such equipment given
in Annex II to Directive 94/9/EC. See the EC Declaration of Conformity at http://www.rockwellautomation.com/products/certification for details.
The type of protection is Ex nA nC IIC T4 Gc according to EN 60079-15.
Comply to Standards EN 60079-0:2012+A11:2013, EN 60079-15:2010, reference certificate number DEMKO15ATEX1492X.
Are intended for use in areas in which explosive atmospheres caused by gases, vapors, mists, or air are unlikely to occur, or are likely to occur only infrequently and for short
periods. Such locations correspond to Zone 2 classification according to ATEX directive 1999/92/EC.
96
Chapter 4
WARNING: Use supply wires suitable for 30 C (86 F) above surrounding ambient.
WARNING: When used in a Class I, Division 2, hazardous location, this equipment must be mounted in a suitable enclosure with
proper wiring method that complies with the governing electrical codes.
WARNING: If you connect or disconnect wiring while the field-side power is on, an electrical arc can occur. This could cause an
explosion in hazardous location installations.
Be sure that power is removed or the area is nonhazardous before proceeding.
WARNING: When you insert or remove the CompactFlash/SD memory Card while power is on, an electrical arc can occur. This
could cause an explosion in hazardous location installations.
Be sure that power is removed or the area is nonhazardous before proceeding.
WARNING: When you insert or remove the small form-factor pluggable (SFP) optical transceiver while power is on, an electrical
arc can occur. This could cause an explosion in hazardous location installations.
Be sure that power is removed or the area is nonhazardous before proceeding.
97
Chapter 4
ATTENTION: The USB port is intended for temporary local programming purposes only and not intended for permanent
connection. The USB cable is not to exceed 3.0 m (9.84 ft) and must not contain hubs.
ATTENTION: This product is grounded through the DIN rail to chassis ground. Use zinc-plated yellow-chromate steel DIN rail to
assure proper grounding. The use of other DIN rail materials (for example, aluminum or plastic) that can corrode, oxidize, or are
poor conductors, can result in improper or intermittent grounding. Secure DIN rail to mounting surface approximately every 200
mm (7.8 in.) and use end-anchors appropriately.
ATTENTION: Under certain conditions, viewing the optical port may expose the eye to hazard. When viewed under some
conditions, the optical port may expose the eye beyond the maximum permissible exposure recommendations.
ATTENTION: Class 1 laser product. Laser radiation is present when the system is open and interlocks bypassed. Only trained and
qualified personnel should be allowed to install, replace, or service this equipment.
ATTENTION: If this equipment is used in a manner not specified by the manufacturer, the protection provided by the equipment
may be impaired.
ATTENTION: Read this document and the documents listed in the additional resources section about installation, configuration,
and operation of this equipment before you install, configure, operate, or maintain this product. Users are required to familiarize
themselves with installation and wiring instructions in addition to requirements of all applicable codes, laws, and standards.
ATTENTION: Activities including installation, adjustments, putting into service, use, assembly, disassembly, and maintenance
are required to be carried out by suitably trained personnel in accordance with applicable code of practice.
In case of malfunction or damage, no attempts at repair should be made. The module should be returned to the manufacturer for
repair. Do not dismantle the module.
ATTENTION: This equipment is certified for use only within the surrounding air temperature range of -4060 C
(-40140 F). The equipment must not be used outside of this range.
98
Chapter 4
ATTENTION: Use only a soft dry anti-static cloth to wipe down equipment. Do not use any cleaning agents.
Switch Specifications
For additional specifications and certifications, see the Stratix Ethernet Device
Specifications Technical Data, publication 1783-TD001.
Attribute
1783-IMS28NDC, 1783-IMS28RDC,
1783-IMS28NAC, 1783-IMS28RAC,
1783-IMS28GNDC, 1783-IMS28GRDC 1783-IMS28GNAC, 1783-IMS28GRAC
Power input
2460V DC, 10 A
PoE output
PoE+ output
Alarm relay
Torque,
power supply mount screw
Torque,
functional ground lug screw
Operating temperature
Attribute
1783-IMXDC
1783-IMXAC
Input
2460V DC, 10 A
Output
-54V DC2.9 A
4.5V DC, 0.5 A
99
Chapter 4
Overview
100
Chapter 4
Verify that you have these items. The Secure Digital (SD) card and power
supply comes pre-installed in the switch.
1
PWR-RGD-AC-DC
PSU OK
5
4
SD card
Mounting kit(1)
Documentation
At the end of its life, this equipment should be collected separately from any
unsorted municipal waste.
101
Chapter 4
102
Chapter 4
A Secure Digital (SD) card ships with the Stratix 5410 switch. The SD card
contains the switch firmware and initial configuration. You can order a
replacement SD card from Rockwell Automation, catalog number 1784-SD1,
if needed. The replacement card ships without firmware and must be synced
with the internal memory of the switch. See page 61.
To install or replace the SD card, follow these steps.
1. On the front of the switch, locate the door that protects the SD card
slot.
2. Loosen the captive thumb screw on the door by using a screwdriver and
open the door.
Use caution when removing the non-captive door.
13
16 17
12 25 26
20 21
EIP Mod
EIP Net
Setup
GPS
TimeCD
1
3
2
4
Out
2
1
Speed
Duplex
PRP
DLR
PoE
24 27 28
Alarms PSU
Disp.
Mode
Express
Setup
13
16
32566-M
13
16 17
20 21
12 25 26
24 27 28
GPS
TimeCD
1
3
2
4
Out
2
1
Speed
Duplex
PRP
DLR
PoE
EIP Mod
EIP Net
Setup
Alarms PSU
Disp.
Mode
Express
Setup
13
16
32567-M
103
Chapter 4
13
16 17
GPS
20 21
Alarms PSU
12 25 26
24 27 28
TimeCD
1
3
2
4
Out
2
1
Speed
Duplex
PRP
DLR
PoE
EIP Mod
EIP Net
Setup
Disp.
Mode
Express
Setup
13
16
32568-M
4. Close the guard door and fasten the captive screw by using a screwdriver
to keep the door in place.
104
Chapter 4
Before installing the switch in its final location, power on the switch, and verify
that the switch powers up.
The time that is required for the switch to start up is directly related to your
switch configuration. Start time is negatively affected by such things as the
following:
Spanning Tree Learning mode
Number of files or images in onboard memory
To test the switch, follow these steps.
1. Apply power to the switch.
If the switch is directly connected to a power source, locate the circuit
breaker on the panel board that services the circuit. Switch the circuit
breaker to the On position.
2. Verify the start-up process.
When you power on the switch, it begins a start-up process. The Setup
status indicator blinks green as the IOS software image loads. If the
process fails, the Setup status indicator turns red.
IMPORTANT
IMPORTANT You can disable Boot Fast and run the Power-on self-test (POST) by
using the CLI. For more information, see the documentation at
http://www.Cisco.com.
3. After successfully running this test, do the following:
a. Turn off power to the switch.
b. Disconnect the cables.
c. Decide where you want to install the switch.
Attach Brackets
To attach brackets on the switch, follow this procedure.
1. Identify a mount position and attach brackets to both sides of the
switch.
105
Chapter 4
TOD
Console
32573-M
TOD
Console
Alarm
32574-M
106
Chapter 4
2. Insert the rubber plugs in the unused holes on both sides of the switch.
TOD
Console
Alarm
32572-M
32571-M
107
Chapter 4
32576-M
13
16 17
12 25 26
20 21
TimeCD
1
3
2
4
Out
2
1
EIP Mod
EIP Net
Setup
GPS
24 27 28
Speed
Duplex
PRP
DLR
PoE
Alarms PSU
10/100/1000 PoE+
12
Disp.
Mode
IN
Express
Setup
IN
OUT
GPS ANT.
13
16
17
100/1000 SFP
20
21
24
25
OUT
DIG.TimeCode
ANA.TimeCode
1000/10G SFP+
28
TOD
Console
Alarm
32577-M
13
16 17
12 25 26
20 21
TimeCD
1
3
2
4
Out
2
1
EIP Mod
EIP Net
Setup
GPS
24 27 28
Speed
Duplex
PRP
DLR
PoE
Alarms PSU
10/100/1000 PoE+
12
Disp.
Mode
IN
Express
Setup
IN
OUT
GPS ANT.
13
16
17
100/1000 SFP
20
21
24
25
OUT
DIG.TimeCode
1000/10G SFP+
ANA.TimeCode
28
TOD
Console
Alarm
32578-M
PWR-RGD-AC-DC
PSU OK
PWR-RGD-AC-DC
PSU OK
108
Chapter 4
32579-M
109
Chapter 4
2. Insert the rubber plugs in the unused holes on both sides of the switch.
TOD
Console
Alarm
32572-M
32571-M
110
Chapter 4
32580-M
111
Chapter 4
To ground the switch, follow these steps. Be sure to follow any grounding
requirements at your site.
1. To remove the ground screw from the cable side of the switch, use a
Phillips screwdriver or a ratcheting torque screwdriver with a Phillips
head.
Store the ground screw for later use.
2. Strip the 13.3 mm2 (6 AWG) ground wire to 12.7 mm (0.5 in.) 0.5
mm (0.02 in.).
Stripping more than the recommended amount of wire can leave
exposed wire from the connector.
12.7 mm (0.5 in.) 0.5 mm (0.02 in.)
Wire Lead
Insulation
3. Insert the ground wire into the terminal lug, and crimp the terminal to
the wire.
4. Slide the ground screw from Step 1 through the terminal lug, and insert
the ground screws into the opening on the cable side.
IN
OU
ANA.TimeCode
28
TOD
Console
Alarm
32560-M
112
Chapter 4
The switch ships with one pre-installed power supply. To install a second
power supply, follow these steps.
WARNING: If you connect or disconnect wiring while the field-side power is
on, an electrical arc can occur. This could cause an explosion in hazardous
location installations.
1. Turn power off at the AC and DC circuits.
IMPORTANT
2. To loosen the two captive screws of the blank power-supply module and
gently pull it out, use a Phillips screwdriver.
PWR-RGD-AC-DC
PSU OK
32555-M
PWR-RGD-AC-DC
PSU OK
32556-M
113
Chapter 4
3. Insert the power supply module into the slot, and gently push it in.
When inserted correctly, the power-supply module is flush with the
switch.
PWR-RGD-AC-DC
PSU OK
PWR-RGD-AC-D
PSU OK
32557-M
2. To loosen the captive screw on the power input terminal, use a Phillips
screwdriver.
IN
OU
ANA.TimeCode
28
TOD
Console
Alarm
32558-M
114
Chapter 4
OU
ANA.TimeCode
28
TOD
Console
32559-M
1
2
3
4
5
6
7
8
9
10
11
12
13
14
IMPORTANT The power supply module 1 connection is labeled PSU1, and the
power supply module 2 connection is labeled PSU2. Make sure that
you connect the wires to the correct terminal screws.
4. To connect from the power-input terminal to the power source, use
twisted-pair copper wire (12-AWG to 18-AWG).
IMPORTANT
115
Chapter 4
5. Strip each of the two wires to 6.3 mm (0.25 in.) 0.5 mm (0.02 in.).
Do not strip more than 6.8 mm (0.27 in.) of insulation from the wire.
Stripping more than the recommended amount of wire can leave
exposed wire from the connector after installation.
6.3 mm (0.25 in.) 0.5 mm (0.02 in.)
6. Insert the wire into a spade terminal, and crimp it to the wire.
You can also use a ring or flanged spade terminal.
7. Loosen the terminal screw, and slide the terminal under the screw and
washer.
IMPORTANT
Use the appropriate terminal screws that are based on power supply
type: high-voltage (AC or DC) or a low-voltage (DC).
Make sure that you cannot see any wire lead. Only wire with
insulation should extend from the terminal screw.
For AC power, connect the line wire into the terminal screw that is
labeled L and the neutral wire into the terminal screw labeled N.
32562-M
116
Chapter 4
For DC power, connect the positive wire into the terminal screw that
is labeled +, and the negative wire into the terminal screw labeled -.
For low-voltage DC power, connect the wires to the terminals labeled
Lo.
For high-voltage DC power, connect the wires to the terminals
labeled Hi.
32563-M
Make sure that you cannot see any wire lead. Only wire with
insulation should extend from the terminal screw.
For AC power, connect the other end of the line wire (the one
connected to L) to the line terminal on the AC power source.
Connect the other end of the neutral wire (the one connected to N)
to the neutral terminal on the AC power source.
For DC power, connect the other end of the positive wire (the one
connected to +) to the positive terminal on the DC power source.
Connect the other end of the negative wire (the one connected to )
to the negative terminal on the DC power source.
11. Close the power input terminal cover.
12. Use a ratcheting torque screwdriver to torque the screw to 0.79 Nm
(7 lbin).
13. Turn on the power at the AC or DC circuit.
14. Verify that the PSU 1 or 2 status indicator on the switch and PSU OK
status indicator on the power supply module are green.
117
Chapter 4
By removing the power-supply modules, you can power off the switch without
disconnecting the wiring from the power-input terminal.
To remove a power supply module from the switch, follow these steps.
1. Turn power off at the AC and DC circuits.
IMPORTANT
2. Verify that the PSU 1 or 2 and PSU OK status indicators are blinking
red or are off.
3. Use a Phillips screwdriver to loosen the captive screws that secure the
power-supply module to the switch.
4. Remove the power-supply module from the power slot. The powersupply module might be hot.
5. Install a new power-supply module or a blank cover.
118
Installing and removing an SFP module can shorten its useful life. Do not
remove and insert SFP modules more often than is necessary.
Chapter 4
SFP modules are inserted into SFP module slots on the front of the switch.
These field-replaceable modules provide the uplink optical interfaces, send
(TX) and receive (RX).
You can use any combination of compatible SFP modules:
Each SFP module must be of the same type as the SFP module on the
other end of the cable. The cable must not exceed the stipulated cable
length for reliable communications.
Once you install SFP modules in the switch, be aware that the overall
temperature rating of the combined modules (switch and SFP modules)
is limited to the lowest maximum temperature rating and the highest
minimum temperature rating.
For cable length and temperature specifications, see the Stratix Ethernet Device
Specifications Technical Data, publication 1783-TD001.
To insert an SFP module into an SFP slot, follow these steps.
1. Attach an ESD-preventive wrist strap to your wrist and to a bare metal
surface.
2. Find the send (TX) and receive (RX) markings on the top of the
module.
On some SFP modules, the send and receive (TX and RX) markings are
replaced by arrows that show the direction of the connection.
3. If the module has a bale-clasp latch, move it to the open, unlocked
position.
4. Align the module in front of the slot opening and push until you feel the
connector snap into place.
13
16 17
GPS
20 21
Alarms PSU
12 25 26
24 27 28
TimeCD
1
3
2
4
Out
2
1
Speed
Duplex
PRP
DLR
PoE
EIP Mod
EIP Net
Setup
Disp.
Mode
Express
Setup
13
16
32569-M
119
Chapter 4
6. For fiber-optic SFP modules, remove the dust plugs and save.
ATTENTION: Do not remove the rubber plugs from the SFP module port or
the rubber caps from the fiber-optic cable until you are ready to connect the
cable. The plugs and caps protect the SFP module ports and cables from
contamination and ambient light.
7. Connect the SFP cables.
13
16 17
20 21
Alarms PSU
12 25 26
24 27 28
EIP Mod
EIP Net
Setup
GPS
TimeCD
1
3
2
4
Out
2
1
Speed
Duplex
PRP
DLR
PoE
Disp.
Mode
Express
Setup
13
16
32570-M
5. Grasp the SFP module, and carefully remove it from the slot.
6. Place the module in an antistatic bag or other protective environment.
120
Chapter 4
The switch has four alarm inputs and one Form C (single-pole, double-throw)
alarm output relay circuits for external alarms. The input alarm relay circuits
are designed to sense if the alarm input is open or closed relative to the alarm
input reference pin. The output alarm relay circuit has one Form C relay, with
one normally open (NO) and one normally closed (NC) contact. You can
configure the output alarm relay as either normally energized or normally deenergized by using the CLI.
See Appendix D for an alarm wiring example.
Alarm signals are connected to the switch through the 8-way alarm relay RJ45
connector. Five connections are dedicated to the four alarm input circuits:
Alarm input 1
Alarm input 2
Alarm input 3
Alarm input 4
Common
An alarm input and the common wiring connection are required to complete
one input alarm circuit. You must provide either an NO or an NC dry contact
to complete the alarm circuit between common and one of the four alarm
inputs.
ATTENTION: Do not apply an external voltage source to the alarm inputs.
Limit alarm output wiring to 48 V DC, 0.5 A.
The three remaining connections for the Form C output alarm circuit are as
follows:
NO output
NC output
Common
An alarm output and the common wiring connection are required to complete
one output alarm circuit. The Form C output alarm relay provides one NO
and one NC dry contact.
121
Chapter 4
Insert the alarm relay RJ45 connector into the receptacle on the switch front
panel.
Connect to 10/100/1000
Ethernet, PoE/PoE+ Ports
122
Chapter 4
Crossover Cable(1)
Yes
Yes
No
No
Straight-through Cable(1)
No
No
Yes
Yes
(1) 100BASE-TX and 1000BASE-T traffic requires twisted four-pair, Category 5, Category 5e, or Category 6 cable. 10BASE-T traffic
uses Category 3 or Category 4 cable.
32561-M
2. Connect the other end of the cable to an RJ45 connector on the other
device.
The port status indicator turns on when both the switch and the
connected device have an established link.
The port status indicator is amber while Spanning Tree Protocol (STP)
discovers the topology and searches for loops. This process can take as
long as 30 seconds, and then the Port status indicator turns green.
The following conditions can prevent the Port status indicator from
turning On:
The device at the other end is not turned On.
A problem exists with a cable or the adapter that is installed in the
attached device.
3. Reconfigure and restart the connected device if necessary.
4. To connect another device, repeat this procedure.
123
Chapter 4
124
Chapter
Topic
Page
Specifications
128
Overview
128
130
131
132
133
135
135
137
141
142
143
144
146
147
150
150
151
152
152
153
125
Chapter 5
Products marked "CL I, DIV 2, GP A, B, C, D" are suitable for use in Class I Division 2
Groups A, B, C, D, Hazardous Locations and nonhazardous locations only. Each product is
supplied with markings on the rating nameplate indicating the hazardous location
temperature code. When combining products within a system, the most adverse
temperature code (lowest "T" number) may be used to help determine the overall
temperature code of the system. Combinations of equipment in your system are subject
to investigation by the local Authority Having Jurisdiction at the time of installation.
Les produits marqus "CL I, DIV 2, GP A, B, C, D" ne conviennent qu' une utilisation en
environnements de Classe I Division 2 Groupes A, B, C, D dangereux et non dangereux.
Chaque produit est livr avec des marquages sur sa plaque d'identification qui indiquent
le code de temprature pour les environnements dangereux. Lorsque plusieurs produits
sont combins dans un systme, le code de temprature le plus dfavorable (code de
temprature le plus faible) peut tre utilis pour dterminer le code de temprature
global du systme. Les combinaisons d'quipements dans le systme sont sujettes
inspection par les autorits locales qualifies au moment de l'installation.
126
Chapter 5
II 3 G: Such modules:
Are Equipment Group II, Equipment Category 3, and comply with the Essential Health and Safety Requirements relating to the design and construction of such equipment given
in Annex II to Directive 94/9/EC. See the EC Declaration of Conformity at http://www.rockwellautomation.com/products/certification for details.
The type of protection is "Ex nA nC IIC T3 Gc according to EN 60079-15.
Are intended for use in areas in which explosive atmospheres caused by gases, vapors, mists, air or dust mixtures are unlikely to occur, or are likely to occur only infrequently and
for short periods. Such locations correspond to Zone 2 classification according to ATEX directive 1999/92/EC.
Comply to Standards: EN 60079-0:2012, EN 60079-15:2010, reference certificate number DEMKO 12 ATEX8694536X.
WARNING: If you connect or disconnect Ethernet cables with power applied to this module or any device on the network, an
electrical arc can occur. This could cause an explosion in hazardous location installations.
Be sure that power is removed or the area is nonhazardous before proceeding.
ATTENTION: The alarm port cables are not to exceed 10.0 m (32.81 ft).
127
Chapter 5
For additional specifications and certifications, see the Stratix Ethernet Device
Specifications Technical Data, publication 1783-TD001.
Specifications
Table 23 - Stratix 5700 Switches
Attribute
0.50.8 mm2 (1820 AWG) twisted-pair copper wire suitable for 30 C (86 F) above surrounding ambient temperature outside of the enclosure
Power supply
0.50.8 mm2 (1820 AWG) twisted-pair copper wire suitable for 30 C (86 F) above surrounding ambient temperature outside of the enclosure
Application
PoE only (IEEE 802.3af)
PoE and PoE+ (IEEE 802.3at Type 2)
Overview
Power Consumption
4457V DC (48V DC nom)
5057V DC (54V DC nom)
128
1783-BMS06TGL
1783-BMS06TGA
1783-BMS10CGL
1783-BMS10CGA
1783-BMS10CGN
1783-BMS10CGP
1783-BMS12T4E2CGNK
1783-BMS12T4E2CGP
1783-BMS12T4E2CGL
1783-BMS20CGL
1783-BMS20CGN
1783-BMS20CGP
1783-BMS20CGPK
Chapter 5
129
Chapter 5
Documentation
PoE connector
SD card
At the end of its life, this equipment should be collected separately from any
unsorted municipal waste.
Obtain these tools:
Ratcheting torque screwdriver that exerts up to 1.69 Nm (15 inlbs) of
pressure
Small, flat-blade screwdriver
#6 ring terminal lug for 5.3 mm (10 AWG) wire, such as Thomas &
Bett part number 10RC6 or equivalent
Crimping tool, such as Thomas & Bett part number WT2000,
ERG-2001, or equivalent
5.3 mm2 (10 AWG) copper ground wire, such as Belden part number
9912 or equivalent
Wire-stripping tool
For panel-mounting without a DIN rail, M5 or #10-24 or #10-32 bolts
or screws with 1.27 cm (0.5 in.) O.D. flat washers
130
Chapter 5
32271-M
131
Chapter 5
To remove the card, push it in and let it pop out via the spring-loaded
mechanism. Grasp the card top and pull it out. Place it in an antistatic
bag to protect it from static discharge.
Setu
IN1
EIP
Net
EIP
Mod
Ala
rm
IN2
OU
32272-M
4. Close the guard door and fasten the captive screw by using a screwdriver
to keep the door in place.
Before installing the switch in its final location, power on the switch, and verify
that the switch powers up.
The time that is required for the switch to start up is directly related to your
switch configuration. Start time is negatively affected by such things as the
following:
Spanning Tree Learning mode
Number of files or images in onboard memory
To test the switch, follow these steps.
1. Apply power to the switch.
If the switch is directly connected to a DC power source, locate the
circuit breaker on the panel board that services the DC circuit, and
switch the circuit breaker to the ON position.
2. Verify the start-up sequence.
When you power on the switch, it begins a start-up routine. The Setup
status indicator blinks green as the IOS software image loads. If the
routine fails, the Setup status indicator turns red.
IMPORTANT
IMPORTANT You can disable Boot Fast and run the Power-on self-test (POST) by
using the CLI. For more information, see the documentation at
http://www.Cisco.com.
132
Chapter 5
The switch ships with a spring-loaded latch on the rear panel for mounting on
a DIN rail.
WARNING: If you connect or disconnect console port cables with power
applied to this module or any device on the network, an electrical arc can
occur. This could cause an explosion in hazardous location installations.
Be sure that power is removed or the area is nonhazardous before proceeding.
133
Chapter 5
32285-M
3. Push the switch toward the DIN rail to cause the spring loaded latch at
the bottom rear of the switch to move down and snap into place.
134
Chapter 5
To remove the switch from a DIN rail or a rack, follow these steps.
1. Remove power from the switch, and disconnect all cables and
connectors from the front panel of the switch.
2. Insert a tool, such as a flat-head screwdriver, in the slot at the bottom of
the spring-loaded latch and use it to release the latch from the DIN rail.
32286-M
For DC power connections, use UL- and CSA-rated, style 1007 or 1569
twisted-pair copper appliance wiring material (AWM) wire.
WARNING: If you connect or disconnect power or alarm wiring while the
field-side power is on, an electrical arc can occur. This could cause an
explosion in hazardous location installations. Be sure that power is removed
or the area is nonhazardous before proceeding.
ATTENTION: This equipment must be grounded. Never defeat the ground
conductor or operate the equipment in the absence of a suitably installed
ground conductor. Contact the appropriate electrical inspection authority or
an electrician if you are uncertain that suitable grounding is available.
This equipment is intended to be grounded to comply with emission and
immunity requirements. Make sure that the switch functional ground lug is
connected to earth ground during normal use.
ATTENTION: To make sure that the equipment is reliably connected to earth
ground, follow the grounding procedure instructions and use a suitable ring
terminal lug, such as Thomas & Betts part number 10RCR or equivalent.
ATTENTION: For proper grounding, you must always connect the power
supply functional-ground screw when connecting the power supply. You
must provide an acceptable grounding path for each device in your
application. For more information on proper grounding guidelines, refer to
publication 1770-4.1, Industrial Automation Wiring and Grounding
Guidelines.
135
Chapter 5
Use at least 4 mm2 (12 AWG) wire to connect to the external grounding screw.
The ground lug is not supplied with the switch. You can use one of the these
options:
Single ring terminal
Two single ring terminals
To ground the switch to earth ground, follow these steps. Be sure to follow any
grounding requirements at your site.
1. Use a Phillips screwdriver or a ratcheting torque screwdriver with a
Phillips head to remove the ground screw from the front panel of the
switch.
Store the ground screw for later use.
2. Use the guidelines from the manufacturer to determine the wire length
to be stripped.
3. Insert the ground wire into the ring terminal lug and use a crimping tool
to crimp the terminal to the wire.
If you are using two ring terminals, repeat this action for the second ring
terminal.
32273-M
136
Chapter 5
5. Insert the ground screw into the functional ground screw opening on
the front panel.
To wire the DC power source for the switch, follow these steps.
ATTENTION: Before performing any of the following procedures, make sure that power is removed from the DC circuit or the
area is nonhazardous before proceeding:
This product is intended to be supplied by a Class 2 power source marked with Class 2 and rated from 12, 24, or 48V DC, 2.5 A.
To comply with the CE Low Voltage Directive (LVD), this equipment must be powered from a source compliant with the safety
extra low voltage (SELV) or protected extra low voltage (PELV).
A readily accessible two-poled disconnect device must be incorporated in the fixed wiring.
This product relies on the buildings installation for short-circuit (overcurrent) protection. Make sure that the protective device is
rated not greater than 3 A.
Installation of the equipment must comply with local and national electrical codes.
Allow only trained and qualified personnel to install, replace, or service this equipment.
ATTENTION: For wire connections to the power and relay connector, you must use UL- and CSA-rated, style 1007 or 1569
twisted-pair copper appliance wiring material (AWM) wire.
137
Chapter 5
32280-M
5. Loosen the two captive screws that attach the power connector to the
switch, and remove the power connector.
Remove both connectors if you are connecting to two power sources.
32278-M
6. Insert the exposed part of the positive wire into the connection labeled
DC+ and the exposed part of the return wire into the connection
labeled DC-.
138
Chapter 5
Be sure that you cannot see any wire lead. Only wire with insulation can
extend from the connector.
ATTENTION: An exposed wire lead from a DC input power source can
conduct harmful levels of electricity. Be sure that no exposed portion
of the DC input power source wire extends from the connectors or
terminal blocks.
32279-M
32281-M
139
Chapter 5
8. Connect the other end of the positive wire to the positive terminal on
the DC power source.
9. Connect the other end of the return wire to the return terminal on the
DC power source.
When you are testing the switch, one power connection is sufficient. If
you are installing the switch and are using a second power source, repeat
this procedure with the second power connector.
The following figure shows the completed DC input wiring on a power
connector for a primary power source and an optional secondary power
source.
32282-M
140
Chapter 5
To attach the switch power connectors to the front panel of the switch, follow
these steps.
1. Insert one power connector into the Pwr A receptacle on the switch
front panel, and the other into the Pwr B receptacle.
Pwr A Receptacle
Pwr B Receptacle
32283-M
32284-M
When you test the switch, one power source is sufficient. If you install
the switch and use a second power source, repeat this procedure for the
second power connector (Pwr B), which installs just below the primary
power connector (Pwr A).
3. When you install the switch, secure the wires from the power connectors
to the rack by using tie wraps.
141
Chapter 5
WARNING: The console port is intended only for temporary local programming purposes and not intended for permanent
connection. If you connect or disconnect the console cable with power applied to this module or the programming device on the
other end of the cable, an electrical arc can occur. This could cause an explosion in hazardous location installations. Be sure that
power is removed or the area is nonhazardous before proceeding.
ATTENTION: To comply with the CE Low Voltage Directive (LVD), this equipment must be powered from a source compliant with
the safety extra low voltage (SELV) or protected extra low voltage (PELV).
To comply with UL restrictions, this equipment must be powered from a source compliant with Class 2 or Limited Voltage/Current.
The switch must be wired and grounded.
Power input requirements depend on your application.
Application
Power Consumption
Allen-Bradley Products
PoE only
IEEE 802.3af
15.4 W, max
WARNING: Before performing any of the following procedures, make sure that power is removed from the DC circuit or the area
is nonhazardous before proceeding.
1. Measure a length of 0.820.52 mm2 (1820 AWG) copper wire long
enough to connect to the DC power source.
2. Using an 18-gauge wire-stripping tool, strip each of the two wires to
6.3 mm (0.25 in.) 0.5 mm (0.02 in.).
Do not strip more than 6.8 mm (0.27 in.) of insulation from the wire.
Stripping more than the recommended amount of wire can leave wire
exposed after installation.
142
Chapter 5
4. Insert the exposed part of the positive wire into the DC+ connection
and the exposed part of the return wire into the DC- connection.
Make sure that you cannot see any wire lead. Only wire with insulation
can extend from the connector.
DCDC+
PoE
Inpu
48VDC, t Pwr
1.2A
143
Chapter 5
Installing and removing an SFP module can shorten its useful life. Do not
remove and insert SFP modules more often than is necessary.
144
Chapter 5
SFP Module
(Bale-type Latch Shown)
32293-M
4. Remove the dust plugs from the SFP module optical ports, store them
for later use.
IMPORTANT
Do not remove the dust plugs from the SFP module port or the
rubber caps from the fiber-optic cable until you are ready to connect
the cable.
The plugs and caps help protect the SFP module ports and cables
from contamination and ambient light.
145
Chapter 5
32294-M
5. Grasp the SFP module between your thumb and index finger, and
carefully remove it from the module slot.
6. Place the removed SFP module in an antistatic bag or other protective
environment.
146
Chapter 5
147
Chapter 5
The labels for the alarm relay connector are on the switch panel.
Table 25 - Alarm Relay Connector Labels
Label
Connection
NO
COM
NC
IN2
Alarm Input 2
REF
IN1
Alarm Input 1
32287-M
148
Chapter 5
32288-M
6. Repeat the preceding procedure to insert the input and output wires of
one more external alarm device into the alarm relay connector.
The following figure shows the completed wiring for two external alarm
devices. The first alarm device circuit is wired as an alarm relay input
circuitthe IN1 and REF connections complete the circuit. The
second alarm device circuit is wired as an alarm relay output circuit by
using the normally open side of the form C relay contacts. The NO and
COM connections complete the circuit.
COMWired Connection
NOWired Connection
32289-M
149
Chapter 5
To attach the alarm relay connector to the front panel of the switch, follow
these steps.
1. Insert the alarm relay connector into the receptacle on the switch front
panel.
2. Use a ratcheting torque flathead screwdriver to tighten the captive
screws on the sides of the alarm relay connector.
32290-M
150
Connect to 10BASE-T,
100BASE-TX, or 1000BASE-T
Ports
Chapter 5
10/100 Port
32291-M
10/100/1000 Port
2. Connect the other end of the cable to an RJ45 connector on the other
device.
The Port status indicator turns on when both the switch and the
connected device have an established link.
The Port status indicator is amber while Spanning Tree Protocol (STP)
discovers the topology and searches for loops. This can take up to 30
seconds, and then the Port status indicator turns green.
The following conditions can prevent the Port status indicator from
turning On:
The device at the other end is not turned On.
A problem exists with a cable or the adapter that is installed in the
attached device.
3. Reconfigure and restart the connected device if necessary.
4. Repeat this procedure to connect each device.
151
Chapter 5
Switches with PoE ports require a separate power supply. For power supply
requirements based on your application, refer to page 142.
PoE Port
PoE
Inp
48VDC, ut Pwr
1.2A
2. Insert the other cable end into an RJ45 connector on the other PoE
powered device.
LC Connector
3. Insert the other cable end into a fiber-optic receptacle on a target device.
152
Chapter 5
Connect to a
Dual-purpose Port
A dual-purpose port is one port with two interfaces, one for an RJ45 cable and
another for an approved SFP module. Only one interface can be active at a
time. If both interfaces are connected, the SFP module has priority.
ATTENTION: Do not remove the rubber plugs from the SFP module port or
the rubber caps from the fiber-optic cable until you are ready to connect the
cable. The plugs and caps protect the SFP module ports and cables from
contamination and ambient light.
To connect to a dual-purpose port, follow these steps.
1. Connect an RJ45 connector to the 10/100/1000 port, or install an SFP
module into the SFP module slot, and connect a cable to the SFP
module port.
LC Connector
RJ45 Connector
32296-M
153
Chapter 5
Notes:
154
Chapter
Topic
Page
Specifications
157
Overview
158
160
162
164
165
166
168
169
171
Attach the Power and Relay Connector to the Switch to the Switch
173
175
175
177
177
178
179
179
155
Chapter 6
Products marked "CL I, DIV 2, GP A, B, C, D" are suitable for use in Class I Division 2 Groups
A, B, C, D, Hazardous Locations and nonhazardous locations only. Each product is
supplied with markings on the rating nameplate indicating the hazardous location
temperature code. When combining products within a system, the most adverse
temperature code (lowest "T" number) may be used to help determine the overall
temperature code of the system. Combinations of equipment in your system are subject
to investigation by the local Authority Having Jurisdiction at the time of installation.
Les produits marqus "CL I, DIV 2, GP A, B, C, D" ne conviennent qu' une utilisation en
environnements de Classe I Division 2 Groupes A, B, C, D dangereux et non dangereux.
Chaque produit est livr avec des marquages sur sa plaque d'identification qui indiquent
le code de temprature pour les environnements dangereux. Lorsque plusieurs produits
sont combins dans un systme, le code de temprature le plus dfavorable (code de
temprature le plus faible) peut tre utilis pour dterminer le code de temprature
global du systme. Les combinaisons d'quipements dans le systme sont sujettes
inspection par les autorits locales qualifies au moment de l'installation.
WARNING:
This equipment shall be mounted in an ATEX-certified enclosure with a minimum ingress protection rating of at least IP54
(as defined in IEC60529) and used in an environment of not more than Pollution Degree 2 (as defined in IEC 60664-1) when
applied in Zone 2 environments. The enclosure must have a tool-removable cover or door.
This equipment shall be used within its specified ratings defined by Rockwell Automation.
Provision shall be made to prevent the rated voltage from being exceeded by transient disturbances of more than 140% of the
rated voltage when applied in Zone 2 environments.
Secure any external connections that mate to this equipment by using screws, sliding latches, threaded connectors, or other
means provided with this product.
Do not disconnect equipment unless power has been removed or the area is known to be nonhazardous.
156
Chapter 6
ATTENTION: To comply with the CE Low Voltage Directive (LVD), all connections to this equipment must be powered from a
source compliant with safety extra low voltage (SELV) or protected extra low voltage (PELV).
To comply with UL restrictions, all connections to this equipment must be powered from a source compliant with Class 2 or Limited
Voltage/Current.
For additional specifications and certifications, see the Stratix Ethernet Device
Specifications Technical Data, publication 1783-TD001.
Specifications
Table 26 - Stratix 8000 and 8300 Switches
Attribute
1783-MX08T
1783-MX08F
1783-MX04S
1783-MX08S
NA
NA
NA
Table 27 - Stratix 8000 and 8300 Power over Ethernet Expansion Modules
Attribute
1783-MX04E
1783-MX04T04E
2 (1820 AWG) twisted-pair copper wire suitable for 30 C (86 F) above surrounding ambient temperature outside the
0.50.8 mm
enclosure
48/54V DC
2.5 A
2.5 A
7.3 W
7.9 W
3.3V DC @ 0.94 A
3.3V DC @ 1.08 A
157
Chapter 6
Overview
158
Chapter 6
159
Chapter 6
4
5
3
V RT
A A
V RT
A A
31774-M
Documentation
Console cable
If you plan to install a PoE expansion module, verify that you have a PoE power
connector.
32437-M
At the end of its life, this equipment should be collected separately from any
unsorted municipal waste.
160
Chapter 6
161
Chapter 6
IMPORTANT
If you are adding expansion modules, attach the expansion modules to the
switch before mounting the switch.
The switch can operate as a standalone device with two uplink ports and four
or eight Fast Ethernet ports, or you can increase the number of Fast Ethernet
ports by 8 or 16 by connecting expansion modules.
You can install as many as two expansion modules per base unit. However, only
one of the two modules can be a 1783-MX08F or 1783-MX08S fiber
expansion module.
If you install a 1783-MX08F or 1783-MX08S fiber expansion module, the
module must be in the right-most position.
Base Unit
Expansion Module
1783-MX08F or
1783-MX08S
Expansion Module
Depending on the mix of switches and expansion modules, you can have as
many 24 Fast Ethernet ports.
To connect the expansion modules to the switch, follow these steps.
IMPORTANT You must add expansion modules to the base unit before you apply power to
the switch. Remove power from the switch when reconfiguring it.
1. Remove the right side panel by firmly grasping both sides of it in the
middle and pulling it outward.
If necessary, use a screwdriver to pry open the side panel.
31779-M
162
Chapter 6
31787-M
3. Push the upper module latches up and the lower module latches down.
Then slide the switch and module together.
The expansion module is shown with the side panel removed. Do not
remove this panel unless you plan to install another module.
31780-M
4. Push the upper and lower module latches in to secure the module to the
switch.
31781-M
5. If you are installing a second module, repeat steps 1...4, but secure the
second module to the right side of the first module.
IMPORTANT You cannot install an expansion module to the right of the
1783-MX08F or 1783-MX08S fiber expansion module.
163
Chapter 6
31776-M
Foot
Latch
31777-M
164
Chapter 6
3. Position the rear panel of the switch directly in front of the DIN rail,
making sure that the DIN rail fits in the space between the two latches.
DIN Rail
Latch
31778-M
4. Push the DIN rail latches in after the switch is over the DIN rail to
secure the switch to the rail.
31777-M
2. Rotate all feet to their recessed positions so that the switch can mount
flat on the wall or pane.
If greater air circulation around the switch is required, rotate the feet to
their extended positions before mounting the switch on the wall.
165
Chapter 6
3. Position the rear panel of the switch against the wall or a panel in the
desired location, as shown in this figure.
P w r A (2
4 V DC or
4 8 V DC )
R tn A
M a jor A l
a rm
! WARNIN
G
T his uni t
power comight have more
electric rd. To reduce than one
power coshock disconnecthe risk of
r ds b ef o r
t
e s e r v i c i t h e t wo
ng uni t .
P w r B (2
4 V DC or
4 8 V DC )
R tn B
M inor A l
a rm
E x p re s s
S y s te m
A la r m
S e tup
S e tup
Pwr A
Pwr B
C is c o C a
ta ly s t
166
Installing and removing an SFP module can shorten its useful life. Do not
remove and insert SFP modules more often than is necessary.
Chapter 6
31782-M
167
Chapter 6
ATTENTION: For proper grounding, you must always connect the power
supply functional-ground screw when connecting the power supply. You
must provide an acceptable grounding path for each device in your
application. For more information on proper grounding guidelines, refer to
publication 1770-4.1, Industrial Automation Wiring and Grounding
Guidelines.
ATTENTION: You must use the external grounding screw on the front of the
switch to ground the switch. Use a 5.3 mm2 (10 AWG) ground wire.
Follow these steps to connect the switch to a protective ground.
1. Use a screwdriver to remove the ground screw from the front panel of
the switch.
Store the ground screw for later use.
2. If your ground wire is insulated, use a wire stripping tool to strip the
5.3 mm2 (10 AWG) ground wire to 12.7 mm (0.5 in.) 0.5 mm
(0.02 in.).
168
Chapter 6
31790-M
V
RT
A
A
31791-M
7. Use a ratcheting torque screwdriver to tighten the ground screw and ring
terminal lug to the switch front panel to 0.96 Nm (8.5 lbin).
8. Attach the other end of the ground wire to a grounded bare-metal
surface, such as a ground bus, or a grounded DIN rail.
169
Chapter 6
31783-M
4. Insert the exposed part of the positive wire into the connection labeled
V and the exposed part of the return wire into the connection labeled
RT.
Make sure that you cannot see any wire lead. Only wire with insulation
can extend from the connector.
V RT A
A
V
RT
31785-M
170
Chapter 6
7. If you are installing the switch and are using a second power source,
repeat these with a second power and relay connector.
ATTENTION: If multiple power sources are used, do not exceed the
specified isolation voltage.
Power Consumption
PoE only
IEEE 802.3af
4457V DC (48V DC
nom)
15.4 W, max
5057V DC (54V DC
nom)
DC -
32437-M
DC +
171
Chapter 6
4. Insert the exposed part of the positive wire into the DC + connection
and the exposed part of the return wire into the DC - connection.
5. Make sure that you cannot see any wire lead; only wire with insulation
can extend from the connector.
DC +
DC 32436-M
172
Chapter 6
173
Chapter 6
Follow these steps to connect the DC power source and relay connector to the
switch.
1. Insert the power and relay connector into the Pwr A receptacle on the
switch front panel.
V
RT
A
A
31786-M
2. Use a screwdriver to tighten the captive screws on the sides of the power
and relay connector.
3. If a second power source is required, insert a second power and relay
connector into the Pwr B receptacle on the switch front panel.
ATTENTION: If multiple power sources are used, do not exceed the
specified isolation voltage
.
V
RT
A
A
V
RT
A
A
31788-M
4. Use a screwdriver to tighten the captive screws on the sides of the second
power and relay connector.
174
Chapter 6
If you have a PoE expansion module, follow these steps to connect the DC
power source to the PoE expansion module.
1. Insert the power connector into the DC input terminal block on the
PoE expansion module.
2. Use a screwdriver to tighten the captive screws on the sides of the power
connector.
The alarm relays on the switch are normally open. To connect an external alarm
device to the relays, you must connect two relay contact wires to complete an
electrical circuit. Because each external alarm device requires two connections
to a relay, the switch supports a maximum of two external alarm devices.
ATTENTION: The input voltage source of the alarm circuits must be an
isolated source and limited to less than or equal to 24 V DC, 1 A.
For wire connections to the power and relay connector, you must use UL and CSA
rated, style 1007 or 1569 twisted-pair copper appliance wiring material (AWM)
wire (such as Belden part number 9318).
Follow these steps to wire alarms.
1. Measure two strands of twisted-pair wire (18...20 AWG) long enough to
connect to the external alarm device.
2. Use a wire stripper to remove the casing from both ends of each wire to
6.3 mm (0.25 in.) 0.5 mm (0.02 in.).
IMPORTANT
Do not strip more than 6.8 mm (0.27 in.) of insulation from the
wires. Stripping more than the recommended amount of wire can
leave exposed wire from the power and relay connector after
installation.
175
Chapter 6
3. Insert the exposed wires for the external alarm device into the two
connections labeled A, as shown in the following figure.
1
2
6 24
! !
-
4. Use a screwdriver to torque the power and relay connector captive screw
(above the installed wire leads) to 0.23 Nm (2.0 lbin).
V RT A
A
V
RT
31785-M
5. Repeat these steps to insert the input and output wires of an additional
external alarm device into the second power and relay connector.
The following figure shows the completed wiring for two power supplies
and two external alarm devices.
1
5
3
6 24
! !
6 24
! !
-
176
Connect to 10/100
Copper Ports
Chapter 6
V
RT
A
A
To 10/100 ports
31795-M
2. Insert the other cable end into an RJ45 connector on the other device.
Connect to a PoE
Expansion Module Port
32386-M
2. Insert the other cable end into an RJ45 connector on the other PoE
powered device.
177
Chapter 6
Connect to Dual-purpose
Uplink Ports
The switches have two dual-purpose uplink ports. Each dual-purpose uplink
port has a 10/100/1000 RJ45 connector for a copper interface and a slot for an
SFP module. Only one port of the dual-purpose port can be active at a time. If
an SFP module port is connected, the SFP module port has priority.
V
RT
A
A
To 10/100/1000 Ports
31795-M
2. Insert the other cable end into an RJ45 connector on the other device.
V
RT
A
A
31796-M
Chapter 6
The switches ship with the CompactFlash card installed. Follow this procedure
when you need to install or remove it from the switch.
WARNING: When you insert or remove the CompactFlash Card while power
is on, an electrical arc can occur. This could cause an explosion in hazardous
location installations. Be sure that power is removed or the area is
nonhazardous before proceeding.
Install or remove the CompactFlash card by grasping the tab on the card and
either inserting it or removing it from the slot at the bottom of the switch.
V
RT
A
A
31792-M
IMPORTANT You can install and remove the CompactFlash card while the switch is
powered. However, if you do not have a CompactFlash card installed in the
switch, you are unable to do the following:
Start the Device Manager web interface when you apply power to the
switch.
Save configuration changes you made with the AOP via software.
Start up the switch.
179
Chapter 6
Notes:
180
Chapter
Page
182
Alarms
187
192
209
209
230
EtherChannels
236
239
241
283
Port Mirroring
285
Port Security
287
Port Thresholds
293
298
309
Layer 3 Routing
314
316
321
331
Smartports
334
345
349
181
Chapter 7
This chapter describes software features that you can configure via
Device Manager, the Studio 5000 Logix Designer application, or both. More
software features are available. You can configure some features with the global
macro or Smartports feature.
For information about how to configure features not available in Device
Manager or the Logix Designer application, see the documentation available at
http://www.Cisco.com:
Some features are available only on select switch models and firmware types.
See Lite Versus Full Firmware Features (Stratix 5700 Switches) on page 18 and
Software Features on page 19.
ACLs, also called access lists, filter traffic as it passes through the switch. ACLs
permit or deny packets as they cross specified interfaces or VLANs. You
configure ACLs on switches with Layer 2 or Layer 3 firmware to provide basic
security for your network. If you do not configure ACLs, all packets that pass
through the switch can be allowed onto all parts of the network. You can use
ACLs to control which hosts can access different parts of a network or to
decide which types of traffic are forwarded or blocked at router interfaces.
An ACL contains an ordered list of access control entries (ACEs). Each ACE
specifies whether to permit or deny packets. An ACE also specifies a set of
conditions a packet must satisfy to match the ACE. The meaning of permit or
deny depends on the context in which the ACL is used.
When a packet is received on a port, the switch compares the fields in the
packet against any ACLs applied to the port. Based on the criteria in the ACL,
the switch determines whether the packet has the required conditions to be
forwarded. One by one, it tests packets against the conditions in an ACL. The
first match decides whether the switch accepts or rejects the packets. Because
the switch stops testing after the first match, the order of conditions in the list
is critical. If no conditions match, the switch rejects the packet. If there are no
restrictions, the switch forwards the packet. Otherwise, the switch drops the
packet.
182
Chapter 7
Create an ACL
To create an ACL, follow these steps.
1. From the ACL window, click the ACL List tab.
2. Click Add, and then complete the fields in the header area.
183
Chapter 7
184
Field
Description
ACL Type
ACL Name
ACL Number
The number of the ACL, which shows the type of access list:
199IP standard access list.
100199IP extended access list.
13001999IP standard access list (expanded range).
20002699IP extended access list (expanded range).
Implicit Deny
(Not editable). By default, all ACLs have an implicit deny statement at the end. If a packet does
not match any of the criteria that are specified in the ACL, it is denied.
Log
Check the checkbox to enable informational logging messages about packets that are
permitted or denied by an ACL to be sent to the system log.
To view the system log, from the Monitor menu, choose Syslog.
Chapter 7
3. To define the ACL entry, click Add in the table area, and then complete
the fields.
Field
Description
Permit
Protocol
Source Type
Source Address
Type the address of the network or host from which the packet is sent.
Source Wildcard
Source Operator
(Extended ACL only). To compare the source, choose an operator from the pull-down menu.
Source Port
Destination Type
(Extended ACL only). Choose the type of the destination to which the packet is sent:
Host
Any
Network
Dest Address
(Extended ACL only). Type the network or host number to which the packet is sent.
Dest Wildcard
Dest Operator
(Extended ACL only). To compare the destination, choose an operator from the pull-down
menu.
Dest Port
4. Click Save.
5. Repeat Steps 3 and 4 to create as many conditions as needed.
6. To order the conditions in the list, use the Move buttons
.
IMPORTANT The order of the conditions is critical to whether a packet is
forwarded. The first condition in the list that matches a packet
allows the packet to be forwarded. After the first match, the switch
stops testing.
7. Click Submit.
185
Chapter 7
Apply an ACL
You can apply inbound and outbound ACLs to ports:
Inbound ACLs can be applied to any port.
Outbound ACLs can be applied to only routed ports or ports assigned
to an Access VLAN. You can configure these port settings in the
Administrative Mode field on the Edit Physical Port window (Figure 2).
For more information about configuring port settings, see Port
Configuration on page 56.
Figure 2 - Edit Physical Port Window
186
Chapter 7
Alarms
Table 28 - Alarm Descriptions
Switch
Alarm Description
The switch lets you connect two alarm inputs from external devices, such as a door or temperature gauge, to the alarm input port on the
front panel of the switch.
An over- or under-temperature alarm or a port not forwarding condition automatically triggers the default output. You can configure the
output alarm relay as either normally energized or de-energized.
The switch lets you connect two alarm inputs from external devices, such as a door or temperature gauge, to the alarm input port on the
front panel of the switch.
An over- or under-temperature alarm or a port not forwarding condition automatically triggers the default output. You can configure the
output alarm relay as either normally energized or de-energized.
187
Chapter 7
188
Chapter 7
Global Alarms
From the Configure menu, choose Alarm Settings and click the Global tab.
Description
The frame check sequence (FCS) error hysteresis threshold is used to determine when an alarm condition is cleared. This value is expressed as a
percentage of fluctuation from the FCS bit error rate. The default setting is 8 percent.
You can adjust the percentage to prevent toggling the alarm condition when the FCS bit error rate fluctuates near the configured bit error rate.
Valid percentages for global settings are 110. This setting can also be configured on an individual port by clicking the Port tab.
Alarm Name
DM Alarms
SNMP Trap
Alarm traps are sent to an SNMP server, if SNMP is enabled on the Configure > Security > SNMP window.
HW Relay
If the alarm relay is triggered, the switch sends a fault signal to a connected external alarm device, such as a bell, light, or other signaling device.
Syslog
Alarm traps are recorded in the syslog. You can view the syslog on the Monitor > Syslog window.
Thresholds (MAX) in C
The maximum temperature threshold for the corresponding Temperature-Primary or Temperature-Secondary alarm, if enabled.
Thresholds (MIN) in C
The minimum temperature threshold for the corresponding Temperature-Primary or Temperature-Secondary alarm, if enabled.
189
Chapter 7
Port Alarms
From the Configure menu, choose Alarm Settings and click the Port tab.
For each port, choose an Alarm Profile and set the FCS threshold. The frame
check sequence (FCS) error hysteresis threshold is expressed as a percentage of
fluctuation from the FCS bit error rate. The default setting is 8 percent. You
can adjust the percentage to prevent toggling the alarm condition when the
FCS bit error rate fluctuates near the configured bit error rate. Valid
percentages for port settings are 611.
Alarm Profiles
You can use alarm profiles to apply a group of alarm settings to multiple
interfaces. These alarm profiles are created for you:
defaultPort
ab-alarm (created during Express Setup)
From the Configure menu, choose Alarm Profiles.
190
Chapter 7
On the Add/Edit Profile Instance window, you can configure the alarms and
actions for an alarm profile.
Description
Name
Alarm Name
DM Alarms
SNMP Trap
Alarm traps are sent to an SNMP server, if SNMP is enabled on the Configure > Security >
SNMP window.
HW Relay
If the alarm relay is triggered, the switch sends a fault signal to a connected external alarm
device, such as a bell, light, or other signaling device.
Syslog
Alarm traps are recorded in the syslog. You can view the syslog on the Monitor > Syslog
window.
191
Chapter 7
CIP Sync time synchronization refers to the IEEE 1588 standard for Precision
Time Protocol (PTP). The protocol enables precise synchronization of clocks
in measurement and control systems. Clocks are synchronized with
nanosecond accuracy over the EtherNet/IP communication network. PTP
enables systems that include clocks of various precisions, resolution, and
stability to synchronize. PTP generates a master-slave relationship among the
clocks in the system. All clocks ultimately derive their time from a clock that is
selected as the grandmaster clock.
By default, PTP is disabled on all Fast Ethernet and Gigabit Ethernet ports.
You can enable or disable PTP on a per-port basis. For a list of switches that
support PTP, see page 19.
To configure PTP, you choose one of these clock modes:
Boundary mode
End to End Transparent mode
Forward mode (default)
NTP-PTP Clock mode
For more information about these modes, refer to the Converged Plantwide
Ethernet Design and Implementation Guide, publication ENET-TD001.
Boundary Mode
In Boundary mode, the switch participates in selecting the best master clock. If
the switch does not detect a better clock, the switch becomes the grandmaster
clock on the network and the parent clock to all connected devices. If the best
master is determined to be a clock connected to the switch, the switch
synchronizes to that clock as a child to the clock, and then acts as a parent clock
to devices connected to other ports.
After initial synchronization, the switch and the connected devices exchange
timing messages to correct time skew caused by clock offsets and network
delays. This mode can eliminate the effects of latency fluctuations. Because
jitter and errors can accumulate in cascaded topologies, choose this mode only
for networks with less than four layers of cascaded devices.
The clock selection process is determined in part by the relative priority of the
switches in the network. You can define the priorities of switches in the
Priority 1 and Priority 2 fields in either Device Manager or the Logix Designer
application.
In Boundary mode, one or more switch ports can be PTP-enabled.
192
Chapter 7
End to End Transparent mode does not work with redundant gateways in a
device-level ring (DLR). For more information about redundant gateways,
see page 212.
Forward Mode
In Forward mode, the switch passes PTP packets as normal multicast traffic.
All switch ports are PTP-enabled by default. Forward mode is the default
mode.
193
Chapter 7
Description
Priority 1
(Boundary or NTP-PTP Clock mode). Type a value to override the default criteria (clock
quality, clock class, and so on) for the best master clock selection. A lower value takes
precedence.
Valid values: 0255
Default: 128
Priority 2
(Boundary or NTP-PTP Clock mode). Type a value to use as a tie-breaker between two
devices that are otherwise equally matched in the default criteria. For example, you can
give a specific switch priority over other identical switches. A lower value takes
precedence.
Valid values: 0255
Default: 128
Clock Identity
Offset From Master (ns) Displays the time offset in nanoseconds between the slave and master clocks.
Passthrough
(Stratix 8000/8300
switches)
(Boundary or End to End Transparent mode). Check the checkbox to enable PTP passthrough processing.
After PTP pass-through is enabled, all PTP messages are passed to and from the
expansion module ports in the VLAN on which the packets are received. The PTP passthrough feature is not compatible with the Virtual Routing and Forwarding (VRF),
PolicyBased Routing (PBR), and PVLAN (Private Virtual Local Area Network) features.
194
Mode
Reference
Boundary
End to End
Forward
NTP-PTP Clock
Chapter 7
Description
Displays the PTP clock type of the switch, as determined by the Mode setting.
195
Chapter 7
Description
Clock Quality
Steps Removed
Displays the number of hops from the local clock to the grandmaster clock.
Indicates whether the current Coordinated Universal Time (UTC) offset is valid.
Displays the offset between the International Atomic Time (TAI) and UTC in seconds.
Time Source
Displays the number of seconds that time properties are preserved after a primary grandmaster clock fails and a secondary grandmaster clock
takes over.
Displays the time on the switch, obtained from the time source.
State
Displays the synchronization state of the switch port with the parent or grandmaster clock:
InitializingThe switch port is waiting while a parent or grandmaster clock is selected.
ListeningThe switch port is waiting while a parent or grandmaster clock is selected.
Pre-masterThe switch port is transitioning to change to Master state.
MasterThe switch is acting as a parent clock to the devices connected to that switch port.
PassiveThe switch has detected a redundant path to a parent or grandmaster clock. For example, two different switch ports claim the same
parent or grandmaster clock. To prevent a loop in the network, one of the ports changes to Passive state.
UncalibratedThe switch port cannot synchronize with the parent or grandmaster clock.
SlaveThe switch port is connected to and synchronizing with the parent or grandmaster clock.
FaultyEither PTP is not operating properly on the switch port or nothing is connected to the port.
DisabledPTP is not enabled on the switch port.
Enable
Check the checkbox for each port on which to enable PTP. You can enable one or more switch ports.
By default, PTP is enabled on all the Fast Ethernet and Gigabit Ethernet ports.
For Stratix 8000/8300 switches, only the ports on the base switch module are PTP-capable. The switch expansion modules do not support PTP.
When at least one switch port is PTP-enabled, the End to End Transparent mode is selected by default.
Announce Timeout
Type the number of announce intervals, specified as the logarithmic mean in seconds, that must pass without receipt of an announce message
from the parent or grand master clock before the switch selects a new parent or grand master clock.
Valid values: 210
Default: 3 (8 seconds)
196
Chapter 7
Description
Announce Interval
Type the time interval, specified as the logarithmic mean in seconds, for sending announce messages.
Valid values:
01 second
12 seconds
2 4 seconds
3 8 seconds
416 seconds
Default: 1 (2 seconds)
Sync Interval
Type the time interval, specified as the logarithmic mean in seconds, for sending synchronization messages.
Valid values:
-1half second
01 second
1 2 seconds
Default: 0 (1 second)
Type the maximum clock offset before PTP attempts to reacquire synchronization.
Valid values: 50500000000 nanoseconds
Default: 50000 nanoseconds
IMPORTANT: We recommend against setting the sync limit below the default (50000 nanoseconds). Use values below 50000 nanoseconds only in
networks with a very high-precision grandmaster clock. These networks have a critical need to keep very sensitive devices synchronized.
Vlan Id
(Not available on
Stratix 8000/8300 switches)
To configure PTP on a VLAN of a trunk port, type the VLAN ID. Only PTP packets in the VLAN you specify are processed. PTP packets from other
VLANs are dropped. You can only enable PTP on one VLAN on a trunk port.
Valid values: 14094
The default is the native VLAN of the trunk port.
Description
Displays the PTP clock type of the switch, as determined by the Mode setting.
Displays the time on the switch, obtained from the time source.
197
Chapter 7
Description
Port Name
State
(Not available on
Stratix 8000/8300 switches)
Displays the synchronization state of the switch port with the parent or grandmaster clock:
InitializingThe switch port is waiting while a parent or grandmaster clock is selected.
ListeningThe switch port is waiting while a parent or grandmaster clock is selected.
Pre-masterThe switch port is transitioning to change to Master state.
MasterThe switch is acting as a parent clock to the devices connected to that switch port.
PassiveThe switch has detected a redundant path to a parent or grandmaster clock. For example, two different switch ports claim the same
parent or grandmaster clock. To prevent a loop in the network, one of the ports changes to Passive state.
UncalibratedThe switch port cannot synchronize with the parent or grandmaster clock.
SlaveThe switch port is connected to and synchronizing with the parent or grandmaster clock.
FaultyEither PTP is not operating properly on the switch port or nothing is connected to the port.
DisabledPTP is not enabled on the switch port.
Enable
Check the checkbox for each port on which to enable PTP. You can enable one or more switch ports.
By default, PTP is enabled on all the Fast Ethernet and Gigabit Ethernet ports.
For Stratix 8000/8300 switches, only the ports on the base switch module are PTP-capable. The switch expansion modules do not support PTP.
When at least one switch port is PTP-enabled, the End to End Transparent mode is selected by default.
Announce Timeout
(Not available on
Stratix 8000/8300 switches)
Type the number of announce intervals, specified as the logarithmic mean in seconds, that must pass without receipt of an announce message
from the parent or grand master clock before the switch selects a new parent or grand master clock.
Valid values: 210
Default: 3 (8 seconds)
Announce Interval
(Not available on
Stratix 8000/8300 switches)
Type the time interval, specified as the logarithmic mean in seconds, for sending announce messages.
Valid values:
01 second
12 seconds
2 4 seconds
3 8 seconds
416 seconds
Default: 1 (2 seconds)
198
Chapter 7
Description
Sync Interval
(Not available on
Stratix 8000/8300 switches)
Type the time interval, specified as the logarithmic mean in seconds, for sending synchronization messages.
Valid values:
-1half second
01 second
1 2 seconds
Default: 0 (1 second)
Type the maximum clock offset before PTP attempts to reacquire synchronization.
Valid values: 50500000000 nanoseconds
Default: 50000 nanoseconds
IMPORTANT: We recommend against setting the sync limit below the default (50000 nanoseconds). Use values below 50000 nanoseconds only in
networks with a very high-precision grandmaster clock. These networks have a critical need to keep very sensitive devices synchronized.
Vlan Id
(Not available on
Stratix 8000/8300 switches)
Stratix To configure PTP on a VLAN of a trunk port, type the VLAN ID. Only PTP packets in the VLAN you specify are processed. PTP packets from
other VLANs are dropped. You can only enable PTP on one VLAN on a trunk port.
Valid values: 14094
The default is the native VLAN of the trunk port.
Description
Displays the time on the switch, obtained from the time source.
199
Chapter 7
Description
Displays the PTP clock type of the switch, as determined by the Mode setting.
Clock Quality
Steps Removed
Displays the number of hops from the local clock to the grandmaster clock.
Indicates whether the current Coordinated Universal Time (UTC) offset is valid.
Displays the offset between the International Atomic Time (TAI) and UTC in seconds.
200
Chapter 7
Description
Time Source
Displays the time on the switch, obtained from the time source.
State
Displays the synchronization state on the switch port with the parent or grandmaster clock:
InitializingThe switch port is waiting while a parent or grandmaster clock is selected.
ListeningThe switch port is waiting while a parent or grandmaster clock is selected.
Pre-masterThe switch port is transitioning to change to Master state.
MasterThe switch is acting as a parent clock to the devices connected to that switch port.
PassiveThe switch has detected a redundant path to a parent or grandmaster clock. For example, two different switch ports claim the same
parent or grandmaster clock. To prevent a loop in the network, one of the ports changes to Passive state.
UncalibratedThe switch port cannot synchronize with the parent or grandmaster clock.
SlaveThe switch port is connected to and synchronizing with the parent or grandmaster clock.
FaultyEither PTP is not operating properly on that switch port or nothing is connected to the port.
DisabledPTP is not enabled on the switch port.
Enable
Check the checkbox for each port on which to enable PTP. You can enable one or more switch ports.
By default, PTP is enabled on all the Fast Ethernet and Gigabit Ethernet ports.
For Stratix 8000/8300 switches, only the ports on the base switch module are PTP-capable. The switch expansion modules do not support PTP.
When at least one switch port is PTP-enabled, the End to End Transparent mode is selected by default.
Type the recommended to connected devices to send delay request messages when the switch port is in the master state.
Valid values:
-1half second
01 second
12 seconds
24 seconds
38 seconds
416 seconds
532 seconds
664 seconds
Default: 5 (32 seconds)
Announce Timeout
Type the number of announce intervals, specified as the logarithmic mean in seconds, that must pass without receipt of an announce message
from the parent or grand master clock before the switch selects a new parent or grand master clock.
Valid values: 210
Default: 3 (8 seconds)
Announce Interval
Type the time interval, specified as the logarithmic mean in seconds, for sending announce messages.
Valid values:
01 second
12 seconds
2 4 seconds
3 8 seconds
416 seconds
Default: 1 (2 seconds)
201
Chapter 7
Description
Sync Interval
Type the time interval, specified as the logarithmic mean in seconds, for sending synchronization messages.
Valid values:
-1half second
01 second
1 2 seconds
Default: 0 (1 second)
Type the maximum clock offset before PTP attempts to reacquire synchronization.
Valid values: 50500000000 nanoseconds
Default: 50000 nanoseconds
IMPORTANT: We recommend against setting the sync limit below the default (50000 nanoseconds). Use values below 50000 nanoseconds only in
networks with a very high-precision grandmaster clock. These networks have a critical need to keep very sensitive devices synchronized.
Vlan Id
To configure PTP on a VLAN of a trunk port, type the VLAN ID. Only PTP packets in the VLAN you specify are processed. PTP packets from other
VLANs are dropped. You can only enable PTP on one VLAN on a trunk port.
Valid values: 14094
The default is the native VLAN of the trunk port.
202
Chapter 7
Table 35 - Time Sync Configuration Fields for Stratix 5700, ArmorStratix 5700, and Stratix 8000/8300 Switches
Field
Description
Priority 1
The switch that is used to override the default criteria, such as clock quality or clock class, for the best master clock selection.
Priority 2
The switch that is used as a tie-breaker between two devices that are otherwise equally matched in the default criteria. For example, you can
give a specific switch priority over other identical switches. The range is from 0255. A lower value take precedence. The default is 128.
Clock Identity
Port
Displays the port that is selected for configuration. The port number includes the port type (Fa for Fast Ethernet and Gi for Gigabit Ethernet),
and the specific port number.
EXAMPLE: Gi1/1 is Gigabit Ethernet port 1.
Enable
VLAN ID
203
Chapter 7
Table 35 - Time Sync Configuration Fields for Stratix 5700, ArmorStratix 5700, and Stratix 8000/8300 Switches (Continued)
Field
Description
State
The time interval that is recommended to connected devices to send delay request messages when the switch port is in the master state:
-1 means half second
0 means 1 second
1 means 2 seconds
2 means 4 seconds
3 means 8 seconds
4 means 16 seconds
5 means 32 seconds
6 means 64 seconds
The default is 5 (32 seconds).
Announce Timeout
The number of announce intervals that must pass without receipt of an announce message from the grandmaster clock before the switch
selects a new grandmaster clock. The number can be from 210. The default is 3.
Announce Interval
Sync Interval
204
Chapter 7
205
Chapter 7
Table 36 - Time Sync Configuration Fields for Stratix 5400 and Stratix 5410 Switches
Field
Description
Check to enable time synchronization on the device. By default, time synchronization is enabled on all of the Fast Ethernet and Gigabit Ethernet
ports on the switch.
Clear the checkbox to disable the PTP on the device.
The Port Enable and Port State features appear dimmed when the Switch PTP Enable checkbox is cleared.
Port
Displays the port selected for configuration. The port number includes the port type (Fa for Fast Ethernet and Gi for Gigabit Ethernet), and the
specific port number.
EXAMPLE: Gi1/1 is Gigabit Ethernet port 1.
206
Chapter 7
Figure 10 - Time Sync Information for Stratix 5700, ArmorStratix 5700, and Stratix 8000/8300 Switches
Figure 11 - Time Sync Information for Stratix 5400 and Stratix 5410 Switches
207
Chapter 7
Description
Displays whether the Precision Time Protocol is enabled or disabled on the device.
Identity
Displays the unique identifier for the grandmaster clock. The format depends on the network protocol.
Class
Displays a measure of the quality of the grandmaster clock. Values are defined from 0255 with 0 as the best clock.
Accuracy
Indicates the expected absolute accuracy of the Grandmaster clock relative to CIP Sync time synchronization epoch (31 December, 1969
23:59:51.99918 UTC). The accuracy is specified as a graduated scale starting at 25 ns and ending at greater than 10 seconds or unknown.
For example, a GPS time source has an accuracy of approximately 250 ns. A hand-set clock typically has an accuracy less than 10 seconds. The
lower the accuracy value, the better the clock.
Variance
Displays the measure of inherent stability properties of the grandmaster clock. The value is in offset scaled log units. The lower the variance,
the better the clock.
Source
Priority 1
Priority 2
Displays the relative priority of the grandmaster clock to other clocks in the system.
The value is between 0255. The highest priority is 0.
Local Clock
Sync Status
Displays whether the local clock is synchronized or asynchronized with the grandmaster clock.
Identity
Displays the unique identifier for the local clock. The format depends on the network protocol.
The Ethernet protocol encodes the MAC address into the identifier.
The DeviceNet and ControlNet protocols encode the Vendor ID and serial number into the identifier.
Class
Displays a measure of the quality of the local clock. Values are defined from 0255 with 0 as the best clock.
Accuracy
Indicates the expected absolute accuracy of the local clock relative to CIP Sync time synchronization epoch (31 December, 1969 23:59:51.99918
UTC). The accuracy is specified as a graduated scale starting at 25 ns and ending at greater than 10 seconds or unknown.
For example, a GPS time source has an accuracy of approximately 250 ns. A hand-set clock typically has an accuracy less than 10 seconds. The
lower the accuracy value, the better the clock.
Variance
Displays the measure of inherent stability properties of the local clock. The value is in offset scaled log units. The lower the variance, the better
the clock.
Source
208
Chapter 7
The cryptographic IOS for Stratix managed switches is an optional IOS. The
IOS provides network security by encrypting administrator traffic during
Telnet and SNMP sessions. The cryptographic IOS supports all features of the
standard IOS and these protocols:
Secure Shell (SSH) Protocol v2
SNMPv3
HTTPS
The software is available to download from the Product Compatibility and
Download Center on http://www.ab.com.
209
Chapter 7
Express
Setup
Pwr A
Console
1783-ETAP
DC+
DCPwr B
DC+
Alarm
IN1 IN2 OUT
Com
IN2
Ref
IN1
1783-ETAP
1783-ETAP
1756-EN2TR
1756 I/O Modules
IMPORTANT
1734-AENTR
1734 I/O Modules
1738-AENTR
1738 I/O Modules
1769-AENTR
1769 I/O Modules
Only one ring is supported per Stratix 5700 or ArmorStratix 5700 switch.
Description
Supervisor node
Ring node
A ring node is any node that operates on the network to process data that is transmitted over the network. A ring node can also pass on the data
to the next node on the network. When a fault occurs on the DLR network, the ring nodes reconfigure themselves and relearn the network
topology. Additionally, ring nodes can report fault locations to the active ring supervisor.
210
Chapter 7
1783-BMS10CGP
Fa 1/7
Fa 1/8
Gi 1/1
Gi 1/2
1783-BMS10CGN
Fa 1/7
Fa 1/8
Gi 1/1
Gi 1/2
1783-BMS12T4E2CGL
Fa 1/15
Fa 1/16
Gi 1/1
Gi 1/2
1783-BMS12T4E2CGP
Fa 1/15
Fa 1/16
Gi 1/1
Gi 1/2
1783-BMS12T4E2CGNK
Fa 1/15
Fa 1/16
Gi 1/1
Gi 1/2
1783-BMS20CL
Fa 1/15
Fa 1/16
Fa 1/17
Fa 1/18
Fa 1/19
Fa 1/20
1783-BMS20CA
Fa 1/15
Fa 1/16
Fa 1/17
Fa 1/18
Fa 1/19
Fa 1/20
1783-BMS20CGL
Fa 1/15
Fa 1/16
Gi 1/1
Gi 1/2
Fa 1/17
Fa 1/18
1783-BMS20CGP
Fa 1/15
Fa 1/16
Gi 1/1
Gi 1/2
Fa 1/17
Fa 1/18
1783-BMS20CGN
Fa 1/15
Fa 1/16
Gi 1/1
Gi 1/2
Fa 1/17
Fa 1/18
1783-BMS20CGPK
Fa 1/15
Fa 1/16
Gi 1/1
Gi 1/2
Fa 1/17
Fa 1/18
1783-ZMS4T4E2TGP
Fa 1/7
Fa 1/8
Gi 1/1
Gi 1/2
1783-ZMS8T8E2TGP
Fa 1/15
Fa 1/16
Gi 1/1
Gi 1/2
1783-ZMS4T4E2TGN
Fa 1/7
Fa 1/8
Gi 1/1
Gi 1/2
1783-ZMS8E82TGN
Fa 1/15
Fa 1/16
Gi 1/1
Gi 1/2
211
Chapter 7
DLR Considerations
IMPORTANT
Redundant Gateways
(Stratix 5700 and ArmorStratix 5700 Switches)
IMPORTANT
Redundant gateways do not work with End to End Transparent mode for
Precision Time Protocol. For more information about End to End Transparent
mode, see page 193.
212
Chapter 7
213
Chapter 7
D
E
Port
Configuration
Non-DLR port
When the switch acts as the active redundant gateway, traffic on the switch
that is assigned to VLAN 1 can flow between ports A, B, C, D, and E.
When the switch acts a backup redundant gateway, traffic on the switch that is
assigned to VLAN 1 can flow as follows:
Between only Ports A and B
Between only Ports C, D, and E
To join the ring, traffic on Ports C, D, and E must flow through the nonDLR port, through devices connected to the backup redundant gateway,
and then through the active redundant gateway (see Figure 14).
IMPORTANT Traffic flow restrictions from the backup gateway to the ring include
CIP and Device Manager traffic. As a result, all traffic flowing from a
ring device to the backup gateway must use this path:
Exit the ring through the active gateway
Flow through the outside network above the ring
Enter the backup gateway through the uplink port.
If the backup gateway subsequently becomes the active gateway, traffic
then begins to flow between all ports.
214
Chapter 7
Switch
Switch
Switch
Switch
DLR Device
DLR Active
Gateway
DLR Backup
Gateway
DLR Active
Supervisor
215
Chapter 7
You can configure redundant gateways on switches that are either ring
supervisors or ring nodes.
Figure 15 shows two Stratix 5700 switches that are configured as ring
supervisors with redundant gateway:
One switch is configured as the active ring supervisor and also the active
redundant gateway.
The other switch is configured as a backup ring supervisor and the
backup redundant gateway.
In this example, the switch acts as a ring supervisor. The switch also manages
redundant gateway switchovers.
Figure 15 - Ring Supervisor with Redundant Gateway
Outside Network
Express
Setup
Express
Setup
Pwr A
DC+
DC+
DCDC-
Pwr B
Pwr B
DC+
Alarm
IN1 IN2 OUT
DC+
Alarm
IN1 IN2 OUT
Com
IN2
Ref
IN1
216
Pwr A
Console
Console
Outside Network
Com
IN2
Ref
IN1
Chapter 7
Figure 16 shows two Stratix 5700 switches that are configured as ring nodes
with redundant gateway:
One switch is configured as a ring node and also the active redundant
gateway.
The other switch is configured as a ring node and the backup redundant
gateway.
In this example, the switch provides redundant gateway functionality, so that
all ring nodes have access to the outside network.
Figure 16 - Ring Node with Redundant Gateway
Outside Network
Outside Network
Express
Setup
Express
Setup
Pwr A
DC+
Pwr A
Console
Console
DC+
DCDC-
Pwr B
Pwr B
DC+
Alarm
IN1 IN2 OUT
DC+
Alarm
IN1 IN2 OUT
Com
IN2
Ref
IN1
Com
IN2
Ref
IN1
Express
Setup
Express
Setup
Pwr A
Console
Console
Pwr A
DC+
DC+
DC-
DC-
Pwr B
Pwr B
DC+
Alarm
IN1 IN2 OUT
DC+
Alarm
IN1 IN2 OUT
Com
Com
IN2
Ref
IN1
IN2
Ref
IN1
217
Chapter 7
DHCP for ring devices does not work with DHCP peristence, as described on
page 233. Configure only one of these features on your switch.
218
Chapter 7
219
Chapter 7
In this example, the active ring DHCP server recognizes IP address requests
from ring devices 3, 4, and 6 and responds with the position-based IP address
specified in the DHCP table (Table 38). The ring device index numbers in the
DCHP table begin incrementing in order from the device connected to the
lowest DLR port. For example, in Figure 18, the DLR ports are Gi1/1 and
Gi1/2. The lowest DLR port is Gi1/1, so the device connected to Gi1/1 has an
index number of 2.
Figure 18 - DHCP for Ring Devices
Outside Network
Ring Device 1
Active Ring Supervisor
Active Ring DHCP Server
Static IP Address: 192.168.1.10
Express
Setup
Express
Setup
Pwr A
Console
Console
Pwr A
DC+
DC+
DCDC-
Pwr B
Pwr B
DC+
Alarm
IN1 IN2 OUT
DC+
Alarm
IN1 IN2 OUT
Ring Device 2
Backup Ring Supervisor
Backup Ring DHCP Server
Static IP Address: 192.168.1.11
Com
Com
IN2
Ref
IN1
Ring Device 6
BOOTP IP Address:
192.168.1.15
IN2
Ref
IN1
Ring Device 5
Static IP Address:
192.168.1.14
Ring Device 4
DHCP IP Address:
192.168.1.13
Ring Device 3
BOOTP IP Address:
192.168.1.12
IP Address
Host Name
DHCP Pool
192.168.1.12
Rack 2
Pool 1
192.168.1.13
Rack 3
Pool 1
192.168.1.15
Rack 5
Pool 1
5
6
(1) Index 1 represents the active ring DHCP server and is not configurable.
220
Chapter 7
You can configure DHCP for ring devices on the Config DHCP tab in Device
Manager, as shown on page 224. Before you configure DHCP for ring devices,
you must enable DHCP and configure an IP address pool to use for the ring
devices, as described on page 230.
Once you configure DHCP for ring devices, the changes take effect when the
ring converges after the loss of a network connection. However, if you assign a
new IP address to a device currently in use, the new IP address does not take
effect until the devices current address lease expires or until the device restarts.
Be aware that a mismatch between the number of configured devices and the
number of physical ring devices triggers an alarm. This mismatch can be a
result of a topology change or a configuration change.
221
Chapter 7
222
Chapter 7
Description
Mode
Port1
Choose a ring port. By default, if the switch is the ring supervisor, port 1 is node 1 on the ring, and port 2 is blocked.
Port2
Role (Precedence)
Choose a role to assign to the ring supervisor that corresponds to a predefined precedence value. The switch transmits the precedence value in beacon
frames and uses it to determine the active ring supervisor when multiple supervisors are configured. A higher value means higher precedence. When two
DLR supervisors have the same precedence, the device with the numerically highest MAC address becomes the active supervisor.
Valid values:
None0
Primary255
Backup 1100
Backup 290
Backup 380
CustomType a value from 0255
Beacon Interval
Beacon Timeout
Type the amount of time ring nodes wait before timing out in the absence of received beacon messages.
Valid values: 200500,000 s
Default: 1960 s
DLR Vlan Id
Enable Redundant
Gateway
Check the checkbox to enable the configuration of redundant gateways. The configuration fields are available only after you enable the feature.
Default: Disabled
Role (Precedence)
Choose a role to assign to the redundant gateway that corresponds to a predefined precedence value. The switch transmits the precedence value is
advertise messages and is used to select the redundant gateway when multiple redundant gateways are configured. A higher value means higher
precedence. When two DLR redundant gateways have the same precedence, the device with the numerically highest MAC address will become the
redundant gateway.
Valid values:
None0
Primary255
Backup 1100
Backup 290
Backup 380
CustomType a value from 0255
Advertise Interval
Type the time interval for the gateway to transmit advertise messages.
Valid values: 200100,000 s
Default: 2000 s
Advertise Timeout
Type the duration of time for nodes to wait before timing out in the absence of received advertise messages.
Valid values: 200500,000 s
Default: 5000 s
Learning Update
Uplink Ports
Check the checkbox for each uplink port on which to enable redundant gateway.
223
Chapter 7
Description
Check the checkbox to enable the ring DHCP server on the DLR supervisor device.
Role
Check the checkbox to restrict the broadcast of DHCP requests from going beyond the ring. Only devices in the ring
receive address assignments from the DHCP server.
DHCP snooping is enabled by default. If you are not using DLR DHCP, you must disable Ring DHCP Snooping to use
DHCP server functionality outside of the ring.
Status
Number of Devices
Backup Interval
Type the interval in seconds at which the backup ring DHCP server reads the reference table of the active ring DHCP
server.
Valid values:165535 seconds
Default: 60
224
Chapter 7
Field
Description
Index
IP Address
Host Name
Type a host name to associate with the IP address for the entry.
DHCP Pool
Choose the name of the IP address pool to use for ring devices.
This pool must be previously configured, as described on page 230.
DHCP persistance and DHCP for ring devices can coexist, but cannot share the same pool.
Field
Description
Starting Index
Type a value that indicates the starting location of the ring devices in the range.
Valid values: 2 255
Starting IP Address
Number of Entries
DHCP Pool
Choose the name of the IP address pool to use for ring devices.
This pool must be previously configured, as described on page 230.
DHCP persistance and DHCP for ring devices can coexist, but cannot share the same pool.
225
Chapter 7
Description
Enable Ring 1
Check to enable DLR on the ports that are specified in the Port 1 and Port 2 fields.
Port 1
Port 2
Choose a ring port. Port 1 and Port 2 cannot be the same port. The default value is None.
This field is unavailable if the Enable Ring 1 checkbox is cleared.
Supervisor Enabled
Displays whether the switch is a ring supervisor. You set this value on the Ring 1 dialog box. See Table 42.
Valid values:
True The switch is a ring supervisor.
FalseThe switch is a ring node.
Network Topology
Network Status
226
Chapter 7
Description
Network Topology
Network Status
Check to make the switch a ring supervisor. The configuration takes effect immediately.
Displays the number of faults that are currently detected in the ring.
When a DLR network is powered-up, the supervisor can detect ring faults as a result of powering up before other devices on the
network. You can use an MSG instruction to clear the faults.
Supervisor Status
Displays whether the switch is operating as the active ring supervisor or back-up ring supervisor.
Valid values:
Active
Backup
227
Chapter 7
Description
Network Topology
Displays the precedence that is currently assigned to the active ring supervisor.
Supervisor Mode
Displays the status of Supervisor mode. You set this value on the Ring 1 dialog box. See Table 42.
Valid values:
Enabled
Disabled (default)
Supervisor Precedence
Type a precedence value to assign to the ring supervisor. When multiple supervisors are configured, the precedence value determines
the active ring supervisor. Only one supervisor can be active at one time. The precedence is transmitted in beacon frames.
When two supervisors have the same precedence, the device with the numerically highest MAC address becomes the active
supervisor.
Valid values: 0255.
The default precedence is 0.
The highest precedence is 255.
Beacon Interval
Beacon Timeout
Type the amount of time ring nodes wait before timing out in the absence of received beacon messages.
Valid values: 400500,000 s
The default timeout is 1960 s.
228
Chapter 7
The Members dialog box displays each device in the ring only when the switch
is the ring supervisor. Otherwise, no devices are listed.
Description
Ring Member
Displays the order of devices in the ring when the switch is the ring supervisor.
The switch is always ring member 1.
IP Address
MAC Address
229
Chapter 7
230
Chapter 7
231
Chapter 7
Field
Description
The name of the DHCP IP address pool that is configured on the switch. The name can have up to 31 alphanumeric characters. The
name cannot contain a ? or a tab. This field is required.
A DHCP IP address pool is a range (or pool) of available IP addresses that the switch can assign to connected devices.
The subnetwork IP address of the DHCP IP address pool. The format is a 32-bit numeric address that is written as four numbers that
are separated by periods. Each number can be from 0255. This field is required.
Subnet Mask
The network address that identifies the subnetwork (subnet) of the DHCP IP address pool. Subnets segment the devices in a network
into smaller groups. The default is 255.255.255.0. This field is required.
Starting IP
The starting IP address that defines the range of addresses in the DHCP IP address pool. The format is a 32-bit numeric address that is
written as four numbers that are separated by periods. Each number can be from 0255.
Be sure that none of the IP addresses that you assign are being used by another device in your network.
This field is required.
Ending IP
The ending IP address that defines the range of addresses in the DHCP IP address pool. The format is a 32-bit numeric address that is
written as four numbers that are separated by periods. Each number can be from 0255.
Make sure that none of the IP address you assign are being used by other devices in your network.
This field is required.
Default Router
The default router IP address for the DHCP client that uses this server. The format is a 32-bit numeric address that is written as four
numbers that are separated by periods. Each number can be from 0 255.
Domain Name
The domain name for the DHCP client. The name can have up to 31 alphanumeric characters. The name cannot contain a ? or a tab.
DNS Server
The IP addresses of the domain name system (DNS) IP servers available to a DHCP client. The format is a 32-bit numeric address that
is written as four numbers that are separated by periods. Each number can be from 0255.
CIP Instance
[Lease Length]
The duration of the lease for an IP address that is assigned to a DHCP client. Click one of the following:
Never Expires
User Defined
If you click User Defined, enter the duration of the lease in the numbers of days, hours, and minutes. This lease length is used for all
assignments.
232
Chapter 7
DHCP persistence does not work with DHCP for ring devices, as described on
page 218. Configure only one of these features on your switch.
You can reserve and preassign an IP address from the IP address pool to a
specific switch port. As a result, a device that is connected to that switch port
always receives the same IP address regardless of its MAC address.
DHCP persistence is useful in networks that you configure in advance, where
dependencies on the exact IP addresses of some devices exist. Use DHCP
persistence when the attached device has a specific role to play and when other
devices know its IP address. If the device is replaced, the replacement device is
assigned the same IP address, and the other devices in the network require no
reconfiguration.
When the DHCP persistence feature is enabled, the switch acts as a DHCP
server for other devices on the same subnet, including devices that are
connected to other switches. If the switch receives a DHCP request, it
responds with any unassigned IP addresses in its pool. To prevent the switch
from responding when it receives a request, check the Reserve Only box on the
DHCP window.
When DHCP persistence is enabled and a DHCP request is made from a
connected device on that port, the switch assigns the IP address for that port. It
also broadcasts the DHCP request to the remainder of the network. If another
DHCP server with available addresses is on the network and receives this
request, it can try to respond. The response can override the initial IP address
the switch assigns depending on how the end device behaves (takes first IP
address response or the last). To prevent the IP address from being overridden,
enable DHCP snooping on the appropriate VLAN. Enabling DHCP
snooping blocks the broadcast of this DHCP request, so that no other server,
including another Stratix switch with DHCP persistence enabled, responds.
If you are using DHCP persistence, we recommend that you initially assign
static IP addresses to end devices. If an end device fails and is replaced, the
DHCP persistence feature assigns an IP address from the DHCP persistence
table. The device functions properly with this IP address, but we recommend
that you reassign a static IP address to the replaced devices.
233
Chapter 7
FA1
FA2
Switch 2
FA3
FA7
FA4
FA5
FA6
FA8
Then
A new device that is connected to switch 1 FA1 receives an IP address from the switch 1 persistence table.
A broadcast request is also sent across the network. Switch 2 responds if there is an unassigned address in
its pool. The response can override the assignment that is made by switch 1.
A new device that is connected to switch 1 FA1 receives an IP address from the switch 1 persistence table.
A broadcast request is also sent across the network. Switch 2 does not respond to the request. If the
device is connected to FA7 of switch 1, it does not receive an IP address from the switch pool because it is
not defined in the persistence table. Also, unused addresses in the pool are blocked.
A new device is connected to FA1 receives an IP address from the persistence table. A broadcast request is
also sent across the network. Switch 2 does not respond to the request. In addition, a device that is
connected to FA4 receives an IP address from the switch 2 persistence table. A broadcast request is sent
out, and switch 1 responds with an unused IP address from its pool. The response can override the
assigned port.
A new device that is connected to switch 1 FA1 receives an IP address from the Switch 1 persistence table.
A broadcast request is not sent across the network, so Switch 2 does not respond. If a device is connected
to FA7 of Switch 1, it does not receive an IP address from the switch pool because it is not defined in the
persistence table. Also, unused addresses in the pool are blocked.
A new device that is connected to switch 1 FA1 receives an IP address from the Switch 1 persistence table.
A broadcast request is not sent across the network, therefore Switch 2 does not respond. If a device is
connected to FA7 (not defined in the DHCP persistence table) of Switch 1, it receives an unassigned IP
address from the switch 1 pool.
Description
Interface
The number of the switch port, including port type (such as Fa for Fast Ethernet and Gi for Gigabit Ethernet), and the specific port
number. For example, Fa1/1 is Fast Ethernet port 1 on the switch.
Pool Name
The name of the DHCP IP address pool that is configured on the switch.
IP Address
The IP address that is assigned to the switch port. The IP address that you assign is reserved for the selected port and is not available
for normal DHCP dynamic assignment. The IP address must be an address from the pool that is specified in the DHCP Pool Name field.
234
Chapter 7
Description
Unit
(Stratix 8000/8300 switches)
Port
Displays the ports available for the configuration. The port number includes the port type (Fa for Fast Ethernet and Gi for Gigabit Ethernet), the
base or expansion module number (1, 2, or 3), and the port number:
Gi1/1 is Gigabit Ethernet port 1 on the base.
Fa1/1 is Fast Ethernet port 1 on the base.
Fa2/1 is Fast Ethernet port 1 on the first expansion module.
Fa3/1 is Fast Ethernet port 1 on the second expansion module.
Pool
Displays the pool names from the DHCP IP address pool that corresponds to the instances available in the switch.
If you delete all rows that contain pools on the DHCP Pool Display tab and click Refresh, the Pool field is blank.
IP Address
Displays the IP address that is assigned to the switch port. The format is a 32-bit numeric address that is written as four numbers that are
separated by periods (for example, 255.255.255.255). Each number can be from 0255.
The IP address that you assign is reserved for the selected port and is not available for normal DHCP dynamic assignment. The IP address must
be an address from the pool that is specified in the DHCP Pool Name field.
235
Chapter 7
EtherChannels
236
Chapter 7
Switch B
WAN/Internet
Router with
Firewall
Switch C
Access
Point
Network
Management
Switch D
PC
MAC
Guest
Printer
Printer
237
Chapter 7
Description
A number from 1 to 6 that identifies this EtherChannel. You can configure as many as six EtherChannels.
Channel Mode
Determines how ports become active. With all options except On, negotiations occur to determine which ports become active. Incompatible ports
are put into an independent state and continue to carry data traffic, but do not participate in the EtherChannel.
IMPORTANT: Make sure that all ports in an EtherChannel are configured with the same speed and duplex mode.
These modes are available:
StaticAll ports join the EtherChannel, without negotiations. This mode can be useful if the remote device does not support the protocols
that other modes require. The switches at both ends of the link must be configured in On mode.
PAgPThis mode enables Port Aggregation Protocol (PAgP), a Cisco-proprietary protocol. The port responds to requests to create
EtherChannels but does not initiate such negotiations. This silent mode is recommended when a port is connected to a device, such as a file
server or a packet analyzer that is unlikely to send PAgP packets. A port in the Auto mode can form an EtherChannel with another port in the
Desirable mode.
PAgP (non-silent)This mode is the same as Auto mode but is recommended when the port is connected to a device that is expected to be
active in initiating EtherChannels. A port in the Auto mode can form an EtherChannel with another port in the Desirable mode.
PAgP DesirableThis mode enables Port Aggregation Protocol (PAgP), a Cisco-proprietary protocol. The port initiates negotiations to form
EtherChannels by sending PAgP packets to other ports. This "silent" mode is recommended when a port is connected to a device, such as a file
server or a packet analyzer that is unlikely to send PAgP packets. A port in the Desirable mode can form an EtherChannel with another port that
is in the Desirable or Auto mode.
PAgP Desirable (non-silent)This mode is the same as Desirable mode but is recommended when the port is connected to a device that
initiates EtherChannels.
LACP (Active)This mode enables Link Aggregation Control Protocol (LACP) unconditionally. The port sends LACP packets to other ports to
initiate negotiations to create EtherChannels. A port in Active mode can form an EtherChannel with another port that is in Active or Passive
mode. The ports must be configured for Full-duplex.
LACP (Passive)This mode enables Link Aggregation Control Protocol only if an LACP device is detected at the other end of the link. The port
responds to requests to create EtherChannels but does not initiate such negotiations. The ports must be configured for Full-duplex.
Ports
Channel Status
238
Chapter 7
Layer 2 switches can use IGMP snooping to constrain the flooding of multicast
traffic. IGMP snooping dynamically configures Layer 2 interfaces so that
multicast traffic is forwarded to only those interfaces that are associated with
IP multicast devices. IGMP snooping requires the LAN switch to snoop on
the IGMP transmissions between the host and the router and track multicast
groups and member ports. When the switch receives an IGMP report from a
host for a particular multicast group, it adds the host port number to the
forwarding table entry. When the switch receives an IGMP Leave Group
message from a host, it removes the host port from the table entry. It also
periodically deletes entries if it does not receive IGMP membership reports
from the multicast clients.
The multicast router sends out periodic general queries to all VLANs. All hosts
that are interested in this multicast traffic send join requests and are added to
the forwarding table entry. The switch creates one entry per VLAN in the
IGMP snooping IP multicast forwarding table for each group from which it
receives an IGMP join request.
The switch supports IP multicast group-based bridging, rather than MACaddressed based groups. With multicast MAC address-based groups, if an IP
address being configured translates (aliases) to a previously configured MAC
address or to any reserved multicast MAC addresses (in the range 224.0.0.xxx),
the command fails. Because the switch uses IP multicast groups, there are no
address alias issues.
Table 49 defines the default number of supported multicast groups. You can
modify the number of multicast groups that are supported by using the
Command-line interface.
1024
256
If you exceed 180 multicast groups, we recommend that you switch to the routing SDM template via Device Manager.
256
If you exceed180 multicast groups, we recommend that you modify the number of multicast groups by changing the
SDM template to the Lanbase Routing template via Device Manager.
1024
The IP multicast groups that are learned through IGMP snooping are
dynamic. If you specify group membership for a multicast group address
statically, your setting supersedes any automatic manipulation by IGMP
snooping. Multicast group membership lists can consist of both user-defined
and IGMP snooping-learned settings. The switch learns multicast IP addresses
that are used by the EtherNet/IP network for I/O traffic.
IGMP implementation in the switch is IGMP V2. This version is
backward-compatible with switches running IGMP V1. The switch has a builtin querier function, and the global macro enables on IGMP Snooping and the
querier.
239
Chapter 7
240
Chapter 7
Configuration Overview
To configure NAT, you create one or more unique NAT instances. A NAT
instance contains entries that define each address translation and other
configuration parameters.
IMPORTANT
Before you create NAT instances, configure all Smartport roles and VLANs.
The translations that you define depend on whether traffic is routed through a
Layer 3 switch or router or a Layer 2 switch.
IMPORTANT
(1) The terms private and public differentiate the two networks on either side of the NAT device. The terms do not mean that the
public network must be Internet routable.
241
Chapter 7
If traffic is routed through a Layer 3 switch or router (Figure 20 and Figure 21),
you define the following:
A private-to-public translation for each device on the private subnet that
communicates on the public subnet.(1)
A gateway translation for the Layer 3 switch or router.
You do not need to configure NAT for all devices on the private subnet.
For example, you can choose to omit some devices from NAT to increase
security, decrease traffic, or conserve public address space. By default,
untranslated packets are dropped at the NAT boundary.
Figure 20 - Layer 3 Example with NAT in Stratix 5700 Switch
HMI 10.200.1.2
VLAN 200
VLAN 200
Line Controller
10.200.1.3
Controller 1
192.168.1.10
10.10.1.10
VLAN 10
Machine
Mach
Ma
chin
ch
inee 1
in
Machine 2
VVLAN 100
VLAN 10
I/O
192.168.1.11
Drive
192.168.1.12
Controller 2
192.168.1.10
10.10.1.11
I/O
192.168.1.11
Drive
192.168.1.12
(1) Machines that communicate with each other within the same VLAN and subnet across a NAT boundary also require public-toprivate translations.
242
Chapter 7
Figure 21 - Layer 3 Example with NAT in Stratix 5410 Layer 3 Firmware Model
HMI 10.200.1.2
VLAN 200
VLAN 200
Stratix 5410 with Layer 3 Firmware
VLANs 10...80: 10.10.1.1...10.10.8.1
NAT Gateway: 192.168.1.1
VLAN 200: 10.200.1.1
NAT Instances on NAT Ports 1...8
VLAN 10
Controller 1
192.168.1.10
10.10.1.10
Line Controller
10.200.1.3
VLAN 20
Machine 1
Machine 2
Stratix 5700
192.168.1.2
Stratix 5700
192.168.1.2
VVLAN 10
VLAN 20
I/O
192.168.1.11
Controller 2
192.168.1.10
10.10.2.10
Drive
192.168.1.12
I/O
192.168.1.11
Drive
192.168.1.12
VLANs 30...80
Machines 3...8
Stratix 5700
192.168.1.2
VLANs
VLA
ANs 30...80
80
Controllers 3...8
192.168.1.10
10.10.3.10...10.10.8.10
I/O
192.168.1.11
Drive
192.168.1.12
243
Chapter 7
If traffic is routed through a Layer 2 switch (Figure 22 and Figure 23), you
define the following.
A private-to-public translation for each device on the private subnet that
communicates on the public subnet.
A public-to-private translation for each device on the public subnet that
communicates on the private subnet.
Figure 22 - Layer 2 Example with NAT in Stratix 5700 Switch
HMI 10.10.1.101
VLAN 10
VLAN 10
Line Controller
10.10.1.100
192.168.1.100
Controller 1
192.168.1.10
10.10.1.10
244
VLAN 10
Mach
Ma
chin
ch
inee 1
in
Machine
Machine 2
VVLAN
LAN 10
VLAN 10
I/O
192.168.1.11
Drive
192.168.1.12
Controller 2
192.168.1.10
10.10.1.11
I/O
192.168.1.11
Drive
192.168.1.12
Chapter 7
Figure 23 - Layer 2 Example with NAT in Stratix 5410 Layer 2 Firmware Model
HMI 10.10.1.101
VLAN 10
VLAN 10
VLAN 10
Controller 1
192.168.1.10
10.10.1.10
Line Controller
10.10.1.100
192.168.1.100
VLAN 10
Machine
Mach
Ma
chin
ch
inee 1
in
Machine 2
Stratix 5700
192.168.1.2
Stratix 5700
192.168.1.2
VVLAN 100
VLAN 10
I/O
192.168.1.11
Controller 2
192.168.1.10
10.10.1.11
Drive
192.168.1.12
I/O
192.168.1.11
Drive
192.168.1.12
VLAN 10
Machines 3...8
Stratix 5700
192.168.1.2
VVLAN 10
Controllers 3...8
192.168.1.10
10.10.1.12...10.10.1.17
I/O
192.168.1.11
Drive
192.168.1.12
245
Chapter 7
Translation
Entries
Description
Single
Range
Multiple
Subnet
246
Switch
Stratix 5410
Chapter 7
VLAN Assignments
When configuring NAT, you can assign one or more VLANs to a NAT
instance. When you assign a VLAN to a NAT instance, the traffic that is
associated with that VLAN is subject to the configuration parameters of the
NAT instance. Configuration parameters include whether traffic is translated,
fixed up, blocked, or passed through.
IMPORTANT
Changes to the native VLAN on a port assigned to a NAT instance can break
existing NAT configurations. If you change the VLAN assigned to a port
associated with a NAT instance, you must reassign VLANs to that NAT
instance.
Make sure all VLANs and Smartport roles are configured prior to NAT
configuration.
247
Chapter 7
248
Chapter 7
Configuration Considerations
Consider these guidelines and limitations when configuring NAT:
All switches can translate only IPv4 addresses.
All switches can have a maximum of 128 NAT instances.
Switch-specific features are shown in the following table.
Feature
Uplink Ports
4(2)
Downlink Ports
8(2)
Translation Entries(1)
128
128
256(3)
(1) A subnet translation counts as only one translation entry, but includes translations for many devices
(2) Both uplink and downlink ports can be configured for as many as 8 NAT ports.
(3) 128 entries across ports 16 and 1318, plus 128 entries across ports 712, 1924, and 2528 for a total of 256 entries.
IMPORTANT
Ports that are configured for NAT do not support the following across the
NAT boundary due to embedded IP addresses that are not fixed up, encrypted
IP addresses, or reliance on multicast traffic:
Traffic encryption and integrity checking protocols incompatible with
NAT, including IPsec Transport mode (1756-EN2TSC module)
Applications that use dynamic session initiations, such as NetMeeting
File transfer protocol (FTP)
Microsoft Distributed Component Object Model (DCOM), which is
used in Open Platform Communications (OPC)
Multicast traffic, including applications that use multicast, such as
CIP Sync (IEEE1588) and ControlLogix redundancy
249
Chapter 7
250
IMPORTANT
Configure all Smartport roles and VLANs before creating NAT instances.
If you change a Smartport role or the native VLAN for a port that is associated
with a NAT instance, you must reassign VLANs to the NAT instance.
IMPORTANT
Chapter 7
Create NAT Instances for Traffic Routed through a Layer 3 Switch or Router
To create a NAT instance for traffic that is routed through a Layer 3 switch or
router, follow these steps.
1. From the Configure menu, choose NAT to display the NAT window.
2. Click Add to display the General tab of the Add/Edit NAT Instance
window.
251
Chapter 7
252
Chapter 7
Description
Private IP Address
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 192.168.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 192.168.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE: 192.168.1.16
253
Chapter 7
Field
Description
Public IP Address
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 10.200.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 10.200.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE: 10.200.1.16
Type
Range
Type the number of addresses to translate. This field is available only if you choose Range in the Type field.
Valid values: 2128
Default value = 1
IMPORTANT: Each address in the range counts as one translation entry. The switch supports a maximum of 128 translation entries.
Subnet Mask
6. In the Gateway Translation area, click Add Row, complete the fields, and
click Save.
The gateway translation enables devices on the public subnet to
communicate with devices on the private subnet.
Field
Description
Public
Type the default gateway address of the Layer 3 switch or router that is connected to the
uplink port of the switch.
Private
Type a unique IP address to represent the Layer 3 switch or router on the private network.
254
Chapter 7
2. Click Add to display the General tab of the Add/Edit NAT Instance
window.
255
Chapter 7
256
Chapter 7
Description
Private IP Address
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 192.168.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 192.168.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE: 192.168.1.16
257
Chapter 7
Field
Description
Public IP Address
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 10.200.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 10.200.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE: 10.200.1.16
Type
Range
Type the number of addresses to translate. This field is available only if you choose Range in the Type field.
Valid values: 2128
Default value = 1
IMPORTANT: Each address in the range counts as one translation entry. The switch supports a maximum of 128 translation entries.
Subnet Mask
258
Chapter 7
Description
Public IP Address
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 10.200.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 10.200.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE: 10.200.1.16
259
Chapter 7
Field
Description
Private IP Address
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 192.168.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 192.168.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE: 10.200.1.16
Type
Range
Type the number of addresses to translate. This field is available only if you choose Range in the Type field.
Valid values: 2128
Default value = 1
IMPORTANT: Each address in the range counts as one translation entry. The switch supports a maximum of 128 translation entries.
Subnet Mask
260
Chapter 7
2. Choose one of these options for incoming and outgoing packets that are
not handled by NAT:
Pass-throughPermit the packets to pass across the NAT boundary.
BlockedDrop the packets.
3. In the Fix up Packets area, check or clear the checkboxes to enable or
disable fixups for ARP and ICMP.
By default, fixups are enabled for both ARP and ICMP.
4. Click Submit.
261
Chapter 7
Description
Instance Name
Gi1/1 VLANs
Gi1/2 VLANs
Delete
Click to delete a NAT instance permanently. The switch deletes the instance when you click Set.
Edit
Diagnostics
Click to view translation diagnostics for an instance. See Monitor NAT Statistics via the Logix Designer Application on page 383.
Global Diagnostics
Displays the total number of translations that occurred within the last 90 seconds across all NAT instances.
Total Translations
Displays the total number of translated packets across all NAT instances.
Displays the total number of packets that have been bypassed across all NAT instances.
262
Chapter 7
To configure NAT, follow one of these procedures that are based on your
application:
Create NAT Instances for Traffic Routed through a Layer 3 Switch
or Router
For an example of this application, see Figure 21 on page 243.
Create NAT Instances for Traffic Routed through a Layer 2 Switch
For an example of this application, see Figure 22 on page 244.
IMPORTANT
Configure all Smartport roles and VLANs before creating NAT instances.
If you change a Smartport role or the native VLAN for a port that is
associated with a NAT instance, you must reassign VLANs to the NAT
instance.
IMPORTANT
Create NAT Instances for Traffic Routed through a Layer 3 Switch or Router
To create a NAT instance for traffic that is routed through a Layer 3 switch or
router, follow these steps.
1. From the NAT view, click New Instance to display the General tab.
263
Chapter 7
Description
Type of Entry
Type the existing address for the device on the private subnet.
Displays the existing address for the device on the private subnet that is configured for translation.
If blank, verify that the values in the preceding fields are valid.
264
Chapter 7
Description
Type of Entry
Choose Range.
Type the existing starting address for the device on the private subnet.
Range
Displays the range of existing addresses for devices on the private subnet that are configured for translation.
If blank, verify that the values in the preceding fields are valid.
Description
Type of Entry
Choose Subnet.
Type the existing starting address for a device on the private subnet. This address must correspond to the size of the subnet mask to translate.
Subnet Mask
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 192.168.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 192.168.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE: 192.168.1.16
Type a unique, starting public address to represent the devices. This address must correspond to the size of the subnet mask to translate.
Subnet Mask
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 10.200.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 10.200.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE: 10.200.1.16
265
Chapter 7
Description
Subnet Mask
Displays the range of existing addresses for devices on the private subnet that are configured for translation.
If blank, verify that the values in the preceding fields are valid.
6. Click OK.
7. Complete the Gateway Translation fields to enable devices on the public
subnet to communicate with devices on the private subnet:
PublicType the default gateway address of the Layer 3 switch or
router that is connected to the uplink port of the switch.
PrivateType a unique IP address to represent the Layer 3 switch or
router on the private network.
8. To configure traffic permits and packet fixups, see Configure Traffic
Permits and Fixups on page 261.
9. Click Set.
266
Chapter 7
267
Chapter 7
Description
Type of Entry
Type the existing address for the device on the private subnet.
Displays the existing address for the device on the private subnet that is configured for translation.
If blank, verify that the values in the preceding fields are valid.
Description
Type of Entry
Choose Range.
Type the existing starting address for the device on the private subnet.
Range
Displays the range of existing addresses for devices on the private subnet that are configured for translation.
If blank, verify that the values in the preceding fields are valid.
268
Chapter 7
Description
Type of Entry
Choose Subnet.
Type the existing starting address for a device on the private subnet. This address must correspond to the size of the subnet mask to translate.
Subnet Mask
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 192.168.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 192.168.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE: 192.168.1.16
Type a unique, starting public address to represent the devices. This address must correspond to the size of the subnet mask to translate.
Subnet Mask
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 10.200.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 10.200.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE: 10.200.1.16
Subnet Mask
Displays the range of existing addresses for devices on the private subnet that are configured for translation.
If blank, verify that the values in the preceding fields are valid.
269
Chapter 7
6. Click OK.
7. Click the Public to Private tab.
Chapter 7
Description
Type of Entry
Type the existing address for the device on the public subnet.
Displays the existing address for the device on the public subnet that is configured for translation.
If blank, verify that the values in the preceding fields are valid.
Description
Type of Entry
Choose Range.
Type the existing starting address for the device on the public subnet.
Range
Displays the range of existing addresses for devices on the public subnet that are configured for translation.
If blank, verify that the values in the preceding fields are valid.
Description
Type of Entry
Choose Subnet.
Type the existing starting address for a device on the public subnet. This address must correspond to the size of the subnet mask to translate.
Subnet Mask
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 10.200.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 10.200.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208,
224, 240.
EXAMPLE: 10.200.1.16
271
Chapter 7
Description
Type a unique, starting private address to represent the devices. This address must correspond to the size of the subnet mask to translate.
Subnet Mask
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet must in one of the following: 0, 64, 128, 192.
EXAMPLE: 192.168.1.64
255.255.255.224
The last octet must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE: 192.168.1.32
255.255.255.240
The last octet must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208,
224, 240.
EXAMPLE: 192.168.1.16
Subnet Mask
Displays the range of existing addresses for devices on the public subnet that are configured for translation.
If blank, verify that the values in the preceding fields are valid.
272
Chapter 7
2. In the Traffic Permits table, choose one of these options for unsupported
incoming and outgoing packets:
Pass-ThroughPermit the packets to pass across the NAT boundary.
BlockedDrop the packets.
3. In the Fix-up Packets area, check or clear the checkboxes to enable or
disable protocol fixups for ARP and ICMP.
By default, fixups are enabled for both ARP and ICMP.
273
Chapter 7
Description
Instance Name
Port Type
Ports
Identifies the port numbers that are assigned to each NAT instance.
VLANs
Displays the VLANs assigned to each NAT instance on port listed in the Port column.
Delete
Click to delete a NAT instance permanently. The switch deletes the instance when you click Set.
Edit
Diagnostics
Click to view translation diagnostics for an instance. See Monitor NAT Statistics via the Logix Designer Application on page 383.
Global Diagnostics
Total Translations
Total Translations
(Gi1/1-Gi1/6, Gi1/13-Gi1/18)
Displays the total number of translations across port ranges Gi1/1Gi1/6 and Gi1/13Gi1/18. These ranges can include a
combined maximum of 128 translations.
274
Chapter 7
Description
Total Translations
Displays the total number of translations across port ranges Gi1/7Gi1/12, Gi1/19Gi1/24 and Te1/25Te1/28. These ranges
(Gi1/7-Gi1/12, Gi1/19-Gi1/24, Te1/25-Te1/28) can include a combined maximum of 128 translations.
Total Translated Packets
Displays the total number of translated packets across all NAT instances.
Displays the total number of packets that have passed throughl all NAT instances without being translated.
Configure all Smartport roles and VLANs before creating NAT instances.
If you change a Smartport role or the native VLAN for a port that is
associated with a NAT instance, you must reassign VLANs to the NAT
instance.
IMPORTANT
1. From the NAT view, click New Instance to display the Ports view.
275
Chapter 7
Downlink
or
Uplink
276
Chapter 7
4. For each port, select one or more VLANs to assign to the NAT instance.
The VLANs available for selection are VLANs previously assigned to
the port. You can select the same VLAN for multiple ports. VLANs
assigned to another NAT instance are unavailable for selection.
5. Click Next to display the Gateway Address view.
If you assigned only one VLAN to the NAT instance and use a Layer 3
gateway, specify the following addresses:
Public Gateway AddressType the default gateway address of the
Layer 3 switch or router for this subnet.
Private Gateway Translation AddressType a unique IP address to
represent the Layer 3 switch or router on the private network.
277
Chapter 7
278
Chapter 7
279
Chapter 7
Description
Device Location
Private IP Address
Public IP Address
Type
Count
(Range translation types only). Choose the number of addresses to include in the range.
Valid values: 2128
IMPORTANT: Each address in a range counts as one translation entry:
Port ranges Gi1/1Gi1/6 and Gi1/13Gi1/18 can include a combined maximum of 128 translation entries.
Port ranges Gi1/7Gi1/12, Gi1/19Gi1/24, and Te1/25Te1/28 can include a combined maximum of 128 translation
entries.
Subnet Mask
(Subnet translation types only). Choose the subnet mask for the addresses to translate.
Valid values:
Class B: 255.255.0.0
Class C: 255.255.255.0
Portion of Class C:
255.255.255.128 (provides 128 addresses per translation entry)
255.255.255.192 (provides 64 addresses per translation entry)
255.255.255.224 (provides 32 addresses per translation entry)
255.255.255.240 (provides 16 addresses per translation entry)
IMPORTANT: Each subnet mask counts as one translation entry:
Port ranges Gi1/1Gi1/6 and Gi1/13Gi1/18 can include a combined maximum of 128 translation entries.
Port ranges Gi1/7Gi1/12, Gi1/19Gi1/24, and Te1/25Te1/28 can include a combined maximum of 128 translation
entries.
Delete
280
Chapter 7
Subnet Address
255.255.0.0
255.255.255.0
255.255.255.128
255.255.255.192
The last octet of the address must end in one of the following: 0, 64, 128, 192.
EXAMPLE:
Private address: 192.168.1.64
Public address: 10.200.1.64
255.255.255.224
The last octet of the address must in one of the following: 0, 32, 64, 96, 128, 160, 192, 224.
EXAMPLE:
Private address: 192.168.1.32
Public address: 10.200.1.32
255.255.255.240
The last octet of the address must in one of the following: 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240.
EXAMPLE:
Private address: 192.168.1.16
Public address: 10.200.1.16
281
Chapter 7
9. In the Incoming and Outgoing fields for each type of traffic, choose one
of these options:
Pass-ThroughPermit unsupported packets to pass across the NAT
boundary.
BlockedDrop unsupported packets.
10. To disable protocol fixups for ARP, clear the Fix up ARP checkbox.
11. To disable protocol fixups for ICMP, clear the Fix up ARP checkbox.
By default, fixups are enabled for both ARP and ICMP.
12. Click OK to return to the Translations view.
13. On the Translations view, click Finish.
282
Chapter 7
283
Chapter 7
You can add, edit, and delete NTP associations in the table area on the NTP
page. You can add multiple NTP servers.
To add an association, follow these steps.
1. Click Add.
284
Field
Description
Clock Status
Stratum
Reference
Displays the address of the peer that the system is synchronized with.
NTP Up Time
Resolution
Reference Time
Clock Offset
Displays the offset of the system clock to the synchronized peer in milliseconds.
Root Delay
Displays the total delay along the path to the root clock in milliseconds.
Root Dispersion
Displays the number that indicates the maximum error relative to the primary reference
source at the root of the synchronization subnet in milliseconds.
Peer Dispersion
Displays the number that indicates the maximum error relative to the synchronized peer
(in milliseconds).
Last Update
Displays the time the system last updated its NTP information.
Chapter 7
Description
Port Mirroring
Status
Configured
IP Address
Prefer
If checked, the peer or server is the preferred one that provides synchronization.
Ref Clock
Displays a 32-bit code or Internet address that identifies the reference clock of the peer.
Stratum
When
Displays the time in seconds since the last NTP packet was received from the peer.
Poll
Delay
Offset
Displays the relative time of the peer clock to the local clock in milliseconds.
Port mirroring is a tool for analyzing end node traffic. Because the switch can
filter certain network control traffic, we recommend that you do not use port
mirroring when you require an exact copy of all network traffic.
285
Chapter 7
Field
Description
Interface Name
Role
Ingress Vlan
Source Interface
Choose the port to monitor. The port you assigned to the Port Mirroring role monitors traffic
that passes through this port.
286
Port Security
Chapter 7
Automation Device
Not restricted
Not restricted
Not restricted
Not restricted
Port Mirroring
Not restricted
None
Not restricted
287
Chapter 7
Security Violations
It is a security violation when one of these situations occurs:
The maximum number of secure MAC addresses that have been
configured for a port are in the address table. A station whose MAC
address is not in the address table attempts to access the interface.
An address that is learned or configured on one secure interface is seen
on another secure interface in the same VLAN.
When a violation occurs, the port goes into the Restrict mode. In this mode,
packets with unknown source addresses are dropped and you are notified that a
security violation has occurred. An SNMP trap is sent, a syslog message is
logged, and the violation counter increments.
288
Chapter 7
Port security limits and identifies the MAC addresses of devices that can send
traffic through the switch port. The switch port does not forward traffic from
devices outside the defined group of devices. A security violation occurs when
any of the following conditions occur:
A device, which has a MAC address different from any identified secure
MAC addresses, attempts to access the switch port.
The number of MAC addresses on the port exceeds the maximum
number that is supported on the port.
Port security supports multiple security levels:
The ability to define the number of devices that are connected to a given
port. Devices are assigned on a first-come, first-served basis and time out
after a certain period of inactivity.
The ability to store the existing MAC Address configuration by
selecting Add Learned MAC Addresses on the Static MAC Address
Table.
The ability to add and remove manually MAC Addresses on a per port
basis.
289
Chapter 7
To change the Static MAC Addresses table for a port, follow these steps.
1. Click the radio button next to the port to configure.
2. Click Edit.
3. Clear or check the Enable checkbox.
4. Configure MAC addresses as follows:
To add the existing MAC addresses of devices that are currently
connected to a port, click Add Learned MAC Addresses.
To add a specific MAC address to the table, type a MAC address in
the format fields and click Add.
To remove a MAC address from the table, select the MAC address
and click Remove.
To clear the MAC address table, click Remove All.
5. Click OK.
290
Chapter 7
Description
Port
Enable
MAC Addresses
291
Chapter 7
For Stratix 8000/8300 switches, in the navigation pane, click Advanced Port
Configuration.
Figure 26 - Advanced Port Configuration for Stratix 8000/8300 Switches
Description
Unit
Port
Smartport
See Assign Smartports and VLANs via the Logix Designer Application on page 342.
292
To authorize a specific MAC address to communicate on the port, type the MAC address of the device that is connected to the port. You can authorize
only one MAC address to communicate on the port. If other MAC addresses communicate on the port, they are blocked. This feature must not be set
for ports that are connected to other switches or routers.
The MAC address is also known as Ethernet address, physical address, or hardware address. Each node on the network has a unique MAC address.
The MAC ID is six hexadecimal numbers, such as 00-00-BC-22-A0-D8.
Port Thresholds
Chapter 7
293
Chapter 7
Forwarded Traffic
Blocked Traffic
Total Number of Broadcast
Packets or Bytes
Threshold
T1
T2
T3
T4
T5
Time
The combination of the storm-control suppression level and the 1-second time
interval controls the way the port thresholds algorithm works. A higher
threshold enables more packets to pass through. A threshold value of 100%
means that no limit is placed on the traffic. A value of 0.0 means that all
broadcast, multicast, or unicast traffic on that port is blocked.
IMPORTANT
294
Chapter 7
Description
Incoming
Unicast
Multicast
Broadcast
All Traffic
295
Chapter 7
Table 69 - Port Threshold Fields for Stratix 5400, Stratix 5410, Stratix 5700, and ArmorStratix 5700 Switches
Field
Description
Port
The port selected for configuration. The port number includes the port type (Fa for Fast Ethernet and Gi for Gigabit Ethernet),
and the specific port number.
EXAMPLE: Gi1/1 is Gigabit Ethernet port 1.
Enable incoming thresholds and set the threshold values for the unicast, multicast, and broadcast traffic for each port.
Valid values for units:
Packets per second (pps)
Percentage of total bandwidth (%)
Bits per second (bps)
Enable outgoing thresholds and set the threshold values for the traffic for each port.
Units % = Percentage of total bandwidth
296
Chapter 7
Description
Unit
Port
Set the threshold values for the broadcast, unicast, and multicast traffic for each port. The number of packets being sent is
compared against the threshold value. If an undesirable network event occurs and the threshold value has been exceeded, a
Yes value appears on the Port Status view and in the Traffic Threshold Exceeded on Any Port field on the Switch Status view.
Network traffic of the type that exceeded threshold (broadcast, unicast, or multicast) is dropped until it falls below the falling
threshold. The falling threshold is automatically set to 5% less than the entered threshold value.
297
Chapter 7
Switches and expansion modules with PoE ports are software-configurable and
provide these features:
Support for IEEE 802.3af (PoE)-compliant devices.
Support for IEEE 802.3at Type 2 (PoE+), which increases the available
power that can be drawn by powered devices from 15.430 W per port.
Automatic detection and power budgeting. The switch maintains a
power budget, monitors and tracks requests for power, and grants power
only when it is available.
Power to connected Cisco pre-standard and IEEE 802.3af-compliant
powered devices if the switch detects that there is no power on the
circuit.
Support for Cisco Discovery Protocol (CDP) with power consumption.
CDP applies only when using switches with Cisco end devices. The
powered Cisco end device notifies the switch of the amount of power it
is consuming. The switch can supply or remove power from the PoE
port.
Support for Cisco intelligent power management. A powered Cisco end
device and the switch negotiate through power-negotiation CDP
messages for an agreed power-consumption level. The negotiation
allows a high-powered device consuming more than 7 W to operate at
its highest power mode. The powered device first starts up in Lowpower mode, consumes less than 7 W, and negotiates to obtain enough
power to operate in High-power mode. The device changes to Highpower mode only when it receives confirmation from the switch.
Cisco intelligent power management is backward-compatible with CDP
with power consumption. The module responds according to the CDP
message that it receives. CDP is not supported on third-party powered
devices, so the module uses the IEEE classification to determine the
power usage of the device.
(Stratix 5410 switches) Support for high and low priority PoE/PoE+
ports. When two power-supply modules are installed, the system has
enough power to support all ports as PoE/PoE+ ports. If one
power-supply modules fails, the system drops power to the low priority
ports. Power to the high priority ports remains uninterrupted. If there is
not enough power for one supply to support all high priority ports,
ports are dropped by port number from highest to lowest port number.
PoE and PoE+ features are supported on switches and expansion modules with
PoE ports when a correct power supply is connected to the switch. For power
supply requirements, see page 142.
298
Chapter 7
IMPORTANT
When you make PoE configuration changes to a port, the port drops power.
Whether the port powers up again depends on the new configuration, the
state of the other PoE ports, and the state of the power budget.
For example, if port 1 is in Auto mode and the On state, and you configure it
for Static mode, the switch removes power from port 1, detects the powered
device, and repowers the port.
If port 1 is in Auto mode and the On state and you configure it with a
maximum wattage of 10 W, the switch removes power from the port and
then redetects the powered device. The switch repowers the port only if the
powered device is a Class 1, Class 2, or a Cisco-only powered device.
15.4 W
4W
7W
15.4 W
299
Chapter 7
300
Grants power
Updates the power budget
Turns on power to the port on a first-come, first-served basis
Updates the status indicators
Chapter 7
If enough power is available for all powered devices that are connected
to the switch, power is turned on to all devices. If there is not enough
power to accommodate all connected devices and if a device is
reconnected while other devices are waiting for power, it cannot be
determined which devices are granted or are denied power.
If granting power exceeds the system power budget, the switch denies
power, verifies that power to the port is turned off, generates a syslog
message, and updates the status indicators. After power has been denied,
the switch periodically rechecks the power budget and continues to
attempt to grant the request for power.
If a device being powered by the switch is then connected to wall power,
the switch can continue to power the device. The switch can continue to
report that it is still powering the device whether the device is being
powered by the switch or receiving power from an AC power source.
If a powered device is removed, the switch automatically detects the
disconnect and removes power from the port. You can connect a
nonpowered device without damaging it.
You can specify the maximum wattage that is allowed on the port. If the
IEEE-class maximum wattage of the powered device is greater than the
configured maximum value, the switch does not provide power to the
port. If the switch powers a Cisco end device, but the device later
requests through CDP messages more than the configured maximum
value, the switch removes power to the port. The power that was
allocated to the powered device is reclaimed into the global power
budget. If you do not specify a wattage, the switch delivers the maximum
value.
StaticThe switch pre-allocates power to the port even when no
powered device is connected and makes sure that power is available for
the port. The switch allocates the port-configured maximum wattage,
and the amount is never adjusted through the IEEE class or by CDP
messages from a powered Cisco end device. Because power is preallocated, any powered device that uses less than or equal to the
maximum wattage is guaranteed to be powered when it is connected to
the static port. The port no longer participates in the first-come, firstserved model.
However, if the powered-device IEEE class is greater than the maximum
wattage, the switch does not supply power to it. If the switch learns
through CDP messages that a powered Cisco end device needs more
than the maximum wattage, the powered device is shut down.
If you do not specify a wattage, the switch pre-allocates the maximum
value. The switch powers the port only if it discovers a powered device.
Use the static setting on a high-priority interface.
OffThe switch disables powered-device detection and never powers
the PoE port, even if an unpowered device is connected. Use this mode
only when you want to make sure that power is never applied to a PoE
port, making the port a data-only port.
Rockwell Automation Publication 1783-UM007E-EN-P - June 2016
301
Chapter 7
302
Chapter 7
Because the switch supports external removable power supplies for PoE/PoE+
and can configure the budget per the power supply that is used, the total
amount of power available varies depending on the power supply
configuration:
If a power supply is removed and replaced by a new power supply with
less power and there is insufficient power for the powered devices, power
is denied to PoE ports that are in Auto mode. If there is still insufficient
power, power is denied to PoE ports in Static mode. In both cases, power
is denied in descending order of the port numbers.
If the new power supply supports more power than the previous one,
and more power is available, power is granted to the PoE ports in Static
mode. If power is still available, the power is granted to PoE ports in
Auto mode. In both cases, power is granted in ascending order of the
port numbers.
IMPORTANT
For power to be assigned accurately, the total wattage of the power supply
must be manually configured via Device Manager or CIP.
303
Chapter 7
Figure 31 - PoE Configuration for Stratix 5400, Stratix 5700, and ArmorStratix 5700 Switches
Description
Selected Module
(Stratix 8000/8300 switches)
To limit the total PoE power budget, type an appropriate value that is based on the power source:
A 48V power source supports a maximum of 65 W.
A 54V power source supports a maximum of 130 W.
When you save this setting, it changes the total PoE power budget and resets the powered devices to meet the new budget.
IMPORTANT: A mismatch between the total power that is supported and the power supply can cause damage to the switch. Take care not
to oversubscribe the power supply:
If you intend to connect to a power supply that allows more wattage than configured, change the power supply and then specify the
total power supported.
If you intend to connect to a power supply that allows less wattage than configured, change the total power that is supported to an
appropriate value and then change the power supply.
Interface
304
Chapter 7
Description
Mode
Status
Power (Watts)
Indicates the power override configured for the port. This configuration overrides both the IEEE classification that is shown in the Class
column and power negotiation. If no override is configured, the field displays N/A.
You can configure a power override only by using the Command-line interface (CLI). For more information, see the Cisco IE-3000 Software
Configuration Guide.
EXAMPLE: An administrator can choose to configure an override when the power requirement of a connected device is known and is less
than the maximum value for the class. For instance, if a device requires only 5 W but is in Class 0, which allows a maximum of 15.4 W,
configuring an override allows more power to other devices.
Device
Displays the device that is connected to the port. If no device is connected to the port, the field displays N/A.
Class
Power Priority
(Stratix 5410 switches)
Choose a power priority to assign to the port if there is a reduced power budget, such as a power supply failure. The system selectively
removes PoE power and shuts down lower priority ports to keep higher priority ports active. When multiple ports have the same priority
level, ports are shut down from highest port number to lowest port number. The system removes power from only the number of ports
necessary to maintain system operation without power cycling or other such disruptive results.
Low (default)
High
305
Chapter 7
306
Chapter 7
Figure 34 - PoE Configuration for Stratix 5400, Stratix 5700, and ArmorStratix 5700 Switches
307
Chapter 7
Description
Power over Ethernet (PoE) Port Configuration
Port
Mode
Status
Choose a power priority to assign to the port if there is a reduced power budget, such as a power supply failure. The system selectively
removes PoE power and shuts down lower priority ports to keep higher priority ports active. When multiple ports have the same priority
level, ports are shut down from highest port number to lowest port number. The system removes power from only the number of ports
necessary to maintain system operation without power cycling or other such disruptive results.
Low (default)
High
Switch/Expansion Module Statistics
To limit the total PoE power budget, type an appropriate value that is based on the power source:
A 48V power source supports a maximum of 65 W.
A 54V power source supports a maximum of 130 W.
For Stratix 5410 switches use the following values:
One power supply supports a maximum of 65 W.
Two power supplies support a maximum of 185 W.
When you save this setting, it changes the total PoE power budget and resets the powered devices to meet the new budget.
IMPORTANT: A mismatch between the total power that is supported and the power supply can cause damage to the device. Take care not
to oversubscribe the power supply:
If you intend to connect to a power supply that allows more wattage than configured, change the power supply and then specify the
total power supported.
If you intend to connect to a power supply that allows less wattage than configured, change the total power that is supported to an
appropriate value. Then change the power supply.
308
Chapter 7
309
Chapter 7
REP and STP can coexist on the same switch, but not on the same port. REP
does not interact with STP. For example, if a port is configured as an REP port,
STP is disabled on that port. STP bridge protocol data units (BPDUs) are not
accepted on or sent from REP ports. However, adjacent REP and STP rings or
domains can share a common link. This common link can be used for passing
REP and STP date plane traffic, or for the STP control plane traffic.
Figure 36 shows an example of a segment consisting of six ports that are spread
across four switches. Ports E1 and E2 are configured as edge ports. When all
ports are operational (as in the segment on the left), one port is blocked, shown
by the diagonal line. When there is a failure in the network, as shown in the
diagram on the right, the blocked port returns to the forwarding state to
minimize network disruption.
Edge Port
Blocked Port
Link Failure
E2
E1
E2
201888
E1
310
Chapter 7
201889
E1
311
Chapter 7
E2
273792
E1
Link Integrity
REP does not use an end-to-end polling mechanism between edge ports to
verify link integrity. It implements local link failure detection. The REP Link
Status Layer (LSL) detects its REP-aware neighbor and establishes
connectivity within the segment. All VLANs are blocked on an interface until
it detects the neighbor. After the neighbor is identified, REP determines the
neighbor port to become the alternate port and which ports forward traffic.
Each port in a segment has a unique port ID. The port ID format is similar to
the format used by the spanning tree algorithm: a port number (unique on the
bridge), associated to a MAC address (unique in the network). When a
segment port is coming up, its LSL starts sending packets that include the
segment ID and the port ID. The port is declared as operational after it
performs a three-way handshake with a neighbor in the same segment.
312
Chapter 7
Description
Port Name
The number of the switch port, including port type (such as Fa for Fast Ethernet and Gi for Gigabit Ethernet).
Mode
The administrative mode. To set this mode, from the Configure menu, choose Port Settings.
Segment ID
The ID of the segment. The segment ID range is from 11024. If no segment ID is set, REP is disabled.
Port Type
Each REP segment must have exactly two primary edge ports and can have secondary ports to use when a primary port fails. You can specify
preferred primary and secondary ports. Configuring a port as preferred does not mean that it becomes the alternate port but gives it a slight
edge among equal contenders. You can indicate that a port connects to switches that do not support REP.
Choose one of these port types:
EdgeA secondary edge port that participates in VLAN load balancing.
Edge no-neighborA secondary edge port that is connected to a non-REP switch.
Edge no-neighbor preferredA secondary edge port that is connected to a non-REP switch and is the preferred alternate port for VLAN
load balancing.
Edge no-neighbor primaryA secondary edge port that always participates in VLAN load balancing in this REP segment and is
connected to a non-REP switch.
Edge no-neighbor primary preferredAn edge port that always participates in VLAN load balancing in this REP segment, is connected
to a non-REP switch, and is the preferred port for VLAN load balancing.
Edge preferredA secondary edge port that is the preferred alternate port for VLAN load balancing.
Edge primaryAn edge port that always participates in VLAN load balancing in this REP segment.
Edge primary preferredAn edge port that always participates in VLAN load balancing in this REP segment and is the preferred port for
VLAN load balancing.
NoneThis port is not part of the REP segment. The default is None.
PreferredA secondary edge port that is the preferred alternate port for VLAN load balancing.
313
Chapter 7
Description
STCN Interface
Configure segment topology change notices (STCNs) for a port. The default is None.
TCNs are used within the segment to notify REP neighbors of topology changes. At the edge of the segment, REP can propagate the
notification to the STP or to the other REP segments.
STCN Segment
STCN STP
Layer 3 Routing
Stratix 8300 and Stratix 5400 and Stratix 5410 Layer 3 firmware models use
IP address routing to map subnetworks (subnets) to an individual VLAN. In
some network environments, VLANs are associated with individual networks
or subnets. In an IP network, each subnetis mapped to an individual VLAN.
Configuring VLANs helps control the size of the broadcast domain and keeps
local traffic local. However, network devices in different VLANs cannot
communicate with one another without a Layer 3 device to route traffic
between the VLAN, referred to as inter-VLAN routing. You configure one or
more Layer 3 capable switches to route traffic to the appropriate destination
VLAN.
Figure 39 shows a basic routing topology.
Figure 39 - Example of Routing Topology
VLAN 10
Layer 3 Switch
Switch A
VLAN 20
Switch B
Host
Host
Host
ISL Trunks
Switch A is in VLAN 10, and Switch B is in VLAN 20. The Layer 3 switch has
an interface in each VLAN.
When Host A in VLAN 10 communicates with Host B in VLAN 10, it sends a
packet that is addressed to that host. Switch A forwards the packet directly to
Host B, without sending it to the Layer 3 switch.
When Host A sends a packet to Host C in VLAN 20, Switch A forwards the
packet to the Layer 3 switch, which receives the traffic on the VLAN 10
interface. The Layer 3 switch checks the routing table, finds the correct
outgoing interface, and forwards the packet on the VLAN 20 interface to
Switch B. Switch B receives the packet and forwards it to Host C.
314
Chapter 7
Types of Routing
Stratix 8300 and Stratix 5400 and Stratix 5410 Layer 3 firmware models can
route packets by using these methods.
Table 75 - Layer 3 Routing
Feature
Description
Dynamic routing
Dynamic routing protocols are used by Layer 3 switches to calculate dynamically the best route for forwarding traffic. There are two
types of dynamic routing protocols:
Distance-vector protocols
Link-state protocols
Layer 3 switches using distance-vector protocols maintain routing tables with distance values of networked resources, and
periodically pass these tables to their neighbors. Distance-vector protocols use one or a series of metrics for calculating the best
routes. These protocols are easy to configure and use.
The switch supports these distance-vector protocols:
Routing Information Protocol (RIP), which uses a distance metric (cost) to determine the best path
Border Gateway Protocol (BGP), which adds a path vector mechanism
The switch also supports the Open Shortest Path First (OSPF) link-state protocol and Enhanced IGRP (EIGRP). The features add
link-state routing features to traditional Interior Gateway Routing Protocol (IGRP) to improve efficiency.
Routers that use link-state protocols maintain a complex database of network topology, which is based on the exchange of linkstate advertisements (LSAs) between routers. An event in the network triggers LSAs, which speeds up the convergence time or time
that is required to respond to these changes. Link-state protocols respond quickly to topology changes, but require greater
bandwidth and more resources than distance-vector protocols
Unicast routing
Unicast routing is used for all network processes where a private or unique resource is requested.
Multicast routing
In multicast routing, routers create optimal distribution paths for data that is sent to a multicast destination address spanning tree
in real time. Multicast routing protocols that are supported are PIM (SM, SM, SDM), DVMRP tunneling.
Redundant routing
Redundant routing localizes the effects of route failures, and reduces control traffic overhead and route reconfiguration time by
providing a redundant network path. Redundant routing protocols that are supported are HSRP (Hot Standby Router Protocol) and
CEF (Cisco Express Forwarding).
IPv6 routing
IPv6 network segments, also known as links or subnets, are connected by IPv6 routers, which are devices that pass IPv6 packets
from one network segment to another. EIGRP is the supported protocol.
VRF Lite
Virtual Routing and Forwarding (VRF) lets multiple instances of a routing table to coexist within the same router simultaneously.
Because the routing instances are independent, the same or overlapping IP addresses can be used without conflicting with each
other. The simplest form of VRF implementation is VRF Lite. In this implementation, each router within the network participates in
the virtual routing environment in a peer-based fashion.
315
Chapter 7
316
Chapter 7
Description
EIRGP InstancesAdd EIGRP instances to the EIGRP table. To customize the default settings for an instance, see page 320.
EIGRP ID
Type the Autonomous System (AS) number of the EIGRP routing process.
Valid values: 165535.
Router ID
Type the IP address of the router that is associated with the EIGRP instance.
Choose the Autonomous System (AS) number of the EIGRP routing process.
Network Address
Type the address of the network that is associated with an EIGRP routing process. EIGRP sends updates to the interfaces in the specified networks.
Wildcard Mask
Choose a wildcard mask. A wildcard mask indicates a subnetwork, bitwise complement of the subnet mask.
Passive InterfacesAdd passive interfaces to prevent other routers on a local network from dynamically learning about routes.
EIGRP ID
Check the checkbox to suppress routing update messages from being sent through all interfaces.
Interface
Passive
Check the checkbox to suppress routing update messages from being sent through the corresponding interface.
Choose the Autonomous System (AS) number of the EIGRP routing process.
Interface
Hello Interval
Hold Time
Type the hold time interval for an EIGRP routing process. The hello packet advertises the hold time. The hold time indicates to EIGRP neighbors the
length of time for the neighbor to consider the router reachable.
Valid values: 165535 seconds
Default: 180 seconds for low-speed NBMA networks and 15 seconds for all other networks
317
Chapter 7
Description
Check the checkbox to enable split horizon on the interface. Split horizon controls the sending of EIGRP update and query packets. When split
horizon is enabled on an interface, update and query packets are not sent to destinations for which this interface is the next hop. Controlling
update and query packets in this manner reduces the possibility of routing loops.
By default, split horizon is enabled on all interfaces.
In general, we recommend that you not change the default state of split horizon unless you are certain that your application requires the change
to properly advertise routes.
Delay
Type the delay value in tens of microseconds for the interface. The interface delay value to use in EIGRP distance calculations. Type the value in
tens of microseconds for the interface.
Authentication
Enable MD5 Authentication
Check the checkbox to enable message digest algorithm 5 (MD5) authentication in EIGRP packets.
EIGRP route authentication provides MD5 authentication of routing updates from the EIGRP routing protocol. The MD5 keyed digest in each EIGRP
packet prevents the introduction of unauthorized or false routing messages from unapproved sources. All EIGRP neighbors on interfaces that are
configured for EIGRP message authentication must be configured with the same authentication mode and key for adjacencies to be established.
Type a name for the authentication key chain for EIGRP authentication.
MD5 Key ID
Type an identification number for an authentication key on the key chain. The range of keys is from 02147483647. The key identification
numbers do not need to be consecutive.
MD5 Key
Type an authentication string that must be sent and received in the EIGRP packets being authenticated. The string can contain from 180
uppercase and lowercase alphanumeric characters.
RedistributionRedistribute routes that are discovered by RIP and OSPF into the EIGRP routing process. You can also redistribute static and connected routes into the EIGRP
routing process. If connected routes fall within the range of a network statement in the EIGRP configuration, you do not need to redistribute the routes.
EIGRP ID
Choose the Autonomous System (AS) number of the EIGRP routing process.
Protocol
Click the route type for redistribution into the EIGRP routing process:
Static-Redistributes static routes into the EIGRP routing process.
ConnectedRedistributes connected routes into the EIGRP routing process.
OSPFRedistributes routes from an OSPF routing process into the EIGRP routing process.
RIPRedistributes routes from an RIP routing process into the EIGRP routing process.
Match
(Optional). Match and set properties of routes that are imported from OSPF:
InternalMatches internal OSPF routes.
External 1Matches Type 1 external routes.
External 2Matches Type 2 external routes.
NSSA External 1Matches Type 1 NSSA routes.
NSSA External 2Matches Type 2 NSSA routes.
Bandwidth
Delay
Reliability
Type a number from 0 through 255 that represents likelihood of successful packet transmission.
Valid values: 0255 where 255 means 100 percent reliability; 0 means no reliability
Loading
MTU
Type the smallest allowed value for the maximum transmission unit (MTU) in bytes.
Valid values: 165535
318
Chapter 7
Description
Static NeighborEIGRP hello packets are sent as multicast packets. If an EIGRP neighbor is located across a nonbroadcast network, such as a tunnel, you must manually define
that neighbor. When you manually define an EIGRP neighbor, hello packets are sent to that neighbor as unicast messages.
EIGRP ID
Choose the Autonomous System (AS) number of the EIGRP routing process.
Neighbor
Interface
Choose the Autonomous System (AS) number of the EIGRP routing process.
Network Address
Net Mask
Administrative Distance
To change the default settings after adding an EIGRP instance, on the EIGRP
Instances tab, click the button in the row to customize, and then click
Customize Default Settings.
IMPORTANT
319
Chapter 7
Description
EIGRP ID
(Not editable). Displays the Autonomous System (AS) number of the EIGRP routing process.
Auto-Summary
Check the checkbox to allow the automatic summarization of subnet routes into network-level routes. This feature is disabled by default (the
software sends subprefix routing information across classful network boundaries). EIGRP summary routes are given an administrative distance
value of 5. You cannot configure this value.
Administrative Distance
Internal Distance
Type an administrative distance for EIGRP internal routes. Internal routes are routes that are learned from another entity within the same
autonomous system.
Valid values: 1255
Default: 90
External Distance
Type an administrative distance for EIGRP external routes. External routes are routes for which the best path is learned from a neighbor external to
the autonomous system.
Valid values: 1255
Default: 170
Metrics
Bandwidth
Loading
Reliability
320
Chapter 7
Description
Delay
MTU
Type the smallest allowed value for the maximum transmission unit (MTU), in bytes.
Valid values: 165535
Adjacency Changes
Log Neighbor Changes
Stub
Receive Only
Check the checkbox to restrict the router from sharing any of its routes with any other router in the EIGRP autonomous system. When you enable
this parameter, you cannot specify any other Stub parameters because it prevents any type of route from being advertised.
Default: Disabled
Connected
Check the checkbox to permit EIGRP stub routing to send connected routes.
If the connected routes are not covered by a network statement, they can be redistributed using the Redistributed parameter.
Default: Disabled
Redistributed
Check the checkbox to permit EIGRP stub routing to advertise other routing protocols and autonomous systems. If this parameter is not enabled,
EIGRP does not advertise redistributed routes.
Default: Disabled
Static
Check the checkbox to permit EIGRP stub routing to advertise static routes. If you do not select this option, EIGRP does not send any static routes,
including internal static routes that normally would be automatically redistributed. It is still necessary to redistribute static routes with the
Redistributed parameter.
Default: Disabled
Summary
Check the checkbox to permit EIGRP stub routing to advertise summary routes. You can manually create summary routes on the Summary Address
page or automatically at a major network border router by enabling the Auto-Summary feature.
Default: Disabled
OSPF is available on Stratix 8300switches and Stratix 5400 and 5410 switches
with Layer 3 firmware.
OSPF is an interior gateway routing protocol that uses link states rather than
distance vectors for path selection. OSPF propagates link-state advertisements
(LSAs) rather than routing table updates. Because only LSAs are exchanged
instead of the entire routing tables, OSPF networks converge more quickly
than Routing Information Protocol (RIP) networks.
OSPF uses a link-state algorithm to build and calculate the shortest path to all
known destinations. Each router in an OSPF area contains an identical linkstate database, which is a list of each of the router usable interfaces and
reachable neighbors. Routing decisions are based on cost, which is an
indication of the overhead that is required to send packets across a certain
interface. The router calculates the cost of an interface that is based on link
bandwidth rather than the number of hops to the destination. The cost can be
configured to specify preferred paths.
321
Chapter 7
322
Chapter 7
Description
OSPF InstancesAdd OSPF instances to the OSPF table. To customize the default settings for an instance, see page 326.
Instance ID
Router ID
Type the IP address of the router that is associated with the OSPF instance.
Area/NetworksConfigure the area properties and networks for the OSPF instance.
OSPF ID
Area ID
Type an identifier of the area to associate with the OSPF address range. You can use either a decimal value or an IP address. If you intend to
associate areas with IP subnets, you can specify a subnet address as the value.
Area Type
Network Address
Network Mask
Authentication
Default Cost
323
Chapter 7
Description
Route SummarizationRoute summarization consolidates and summarizes addresses for an area and is used only with area border routers (ABRs). In OSPF, an ABR advertises
networks in one area into another area. If the network numbers in an area are contiguous, you can configure the ABR to advertise a summary route that covers all individual
networks within the area that are in the specified range. Routing information is condensed at area boundaries. External to the area, one route is advertised for each address range.
OSPF ID
Area ID
IP Address
Netmask
Advertise Routes
Check the checkbox to set the address range status to advertise and generate a Type 3 summary link-state advertisement (LSA).
AuthenticationOSPF supports MD5 and clear text neighbor authentication. Use authentication with all routing protocols when possible because route redistribution between
OSPF and other protocols (like RIP) can potentially be used by attackers to subvert routing information.
Interface Name
Authentication
Authentication Password
Type a shared password to be used by neighboring OSPF routers on a network segment that is using the OSPF simple password authentication.
The password can be any string of keyboard-entered characters up to 8 bytes in length. All neighboring routers on the same network must have
the same password to exchange OSPF information.
MD5 Key ID
Type an identifier.
Valid values: 1255.
MD5 Key
RedistributionRedistributing routes into OSPF from other routing protocols or from static routes causes these routes to become OSPF external routes.
OSPF ID
Protocol
Click the route type for redistribution into the OSPF routing process:
Static-Redistributes static routes into the OSPF routing process.
ConnectedRedistributes connected routes into the OSPF routing process.
OSPFRedistributes routes from an OSPF routing process into another OSPF routing process.
RIPRedistributes routes from an RIP routing process into the OSPF routing process.
EIGRPRedistributes routes from an EIGRP routing process into the OSPF routing process.
Match
(Optional). Match and set properties of routes that are imported from OSPF:
InternalMatches internal OSPF routes.
External 1Matches Type 1 external routes.
External 2Matches Type 2 external routes.
NSSA External 1Matches Type 1 NSSA routes.
NSSA External 2Matches Type 2 NSSA routes.
Metric Value
Metric Type
Tag Value
Subnets
Static NeighborDefine static OSPF neighbors to advertise OSPF routes over a point-to-point, non-broadcast network.
OSPF ID
Neighbor
324
Chapter 7
Description
Summary AddressAn OSPF ASBR uses a summary address to advertise one external route as an aggregate for all redistributed routes that are covered by the address.
OSPF ID
IP Address
Net Mask
Virtual LinkIn OSPF, all areas must be connected to a backbone area. You can establish a virtual link if there is a backbone-continuity break by configuring two Area Border
Routers as endpoints of a virtual link. Configuration information includes the identity of the other virtual endpoint (the other ABR) and the nonbackbone link that the two routers
have in common (the transit area). Virtual links cannot be configured through a stub area.
OSPF ID
Area ID
Choose the area ID for the area that is assigned to the OSPF virtual link.
Peer Router ID
Authentication
Authentication Password
Type a shared password to be used by neighboring OSPF routers on a network segment that is using the OSPF simple password authentication.
The password can be any string of keyboard-entered characters up to 8 bytes in length. All neighboring routers on the same network must have
the same password to exchange OSPF information.
MD5 Key ID
Type an identifier.
Valid values: 1c255.
MD5 Key
Hello
Type the time (in seconds) between the hello packets that the software sends on an interface. The hello interval is an unsigned integer value to be
advertised in the hello packets. The value must be the same for all routers and access servers that are attached to a common network.
Valid values: 18192
Default: 10
Transmit Delay
Type the estimated time (in seconds) required to send a link-state update packet on the interface. The integer value that must be greater than
zero. LSAs in the update packet have their age that is incremented by this amount before transmission.
Valid values: 18192
Default: 1
Retransmit
Type the time (in seconds) between link-state advertisement (LSA) retransmissions for adjacencies belonging to the interface. The retransmit
interval is the expected round-trip delay between any two routers on the attached network. The value must be greater than the expected roundtrip delay.
Valid values: 18192
Default: 5
Dead Interval
Type the time (in seconds) that hello packets are not seen before a neighbor declares the router down. The dead interval is an unsigned integer
value. The default is four times the hello interval, or 40 seconds. As with the hello interval, this value must be the same for all routers and access
servers that are attached to a common network.
325
Chapter 7
To change the default settings after adding an EIGRP instance, on the EIGRP
Instances tab, click the button in the row to customize, and then click
Customize Default Settings.
IMPORTANT
Description
OSPF ID
Administrative Distance
Inter Area
Intra Area
External Area
Type an administrative distance for routes from another routing domain that is learned through redistribution.
Valid values: 1255
Default: 20
Timers
LSA Arrival Interval
326
Type the minimum delay in milliseconds that must pass between acceptance of the same LSA arriving from neighbors. The same LSA is an LSA
instance that contains the same LSA ID number, LSA type, and advertising router ID. If an instance of the same LSA arrives sooner than the interval
that is set, the LSA is dropped.
Valid values: 0600,000 ms
Default: 1000 ms
Chapter 7
Description
Flood Pacing
Type the time at which LSAs in the flooding queue are paced between updates.
Valid values: 5100 ms
Default: 33 ms
The default settings for OSPF packet pacing timers are suitable for most OSPF deployments.
Do not change the packet pacing timers unless all other options to meet OSPF packet flooding requirements have been exhausted. Specifically, we
recommend that network operators use summarization, stub area usage, queue tuning, and buffer tuning before changing the default flood
timers. There are no guidelines for changing timer values; each OSPF deployment is unique and must be considered on a case-by-case basis.
Type the number of seconds in the interval at which LSAs are grouped and refreshed, checksummed, or aged.
OSPF LSA group pacing allows the router to group OSPF LSAs and pace the refreshing, check-summing, and aging functions for more efficient
router use. The optimum group pacing interval is inversely proportional to the number of LSAs the router is refreshing, check-summing, and aging.
For example, if you have approximately 10,000 LSAs in the database, decreasing the pacing interval is beneficial. If you have a small database
(40100 LSAs), increasing the pacing interval to 1020 minutes can benefit you slightly.
Valid values: 101800 s
Default: 240 s
Retransmission
Type the time in milliseconds at which LSAs in the retransmission queue are paced.
Valid values: 5200 ms
Default: 66 ms.
Type the delay in milliseconds to generate the first occurrence of the LSA.
Default: 0 ms
Type the time in milliseconds between when OSPF receives a topology change and when the SPF calculation starts. Valid values: 060,0000 ms
Type the maximum wait time between two consecutive SPF calculations.
Valid values: 060,0000 ms
Adjacency Changes
Log Neighbor Changes
Include Detail
Enables the logging of syslog messages whenever any state change occurs, not just when a neighbor goes up or down.
Default: Disabled
327
Chapter 7
328
Chapter 7
3. Click Submit.
4. When a message appears prompting you to continue, click OK.
IMPORTANT The process of changing the template causes the switch to restart.
A message appears once the process is complete.
329
Chapter 7
From the Routing window, you can enable connected routing only or both
static and connected routing. When static routing is enabled, connected
routing is enabled by default. For more information about these routing types,
refer to Layer 3 Routing on page 314.
330
Field
Description
Destination Network
Destination Mask
The IP address of the router where this device sends the packets for the
specified destination.
Simple Network
Management Protocol
(SNMP)
Chapter 7
The switch supports SNMP versions 1, 2C, and 3. SNMP enables the switch to
be remotely managed through other network management software. This
feature is disabled by default.
SNMP is based on three concepts:
SNMP managers (client software)
SNMP agents (network devices)
Management Information Base (MIB)
Refer to Supported MIBs on page 332 for the MIBs supported on the switch.
The SNMP manager runs SNMP management software. Network devices to
be managed, such as bridges, routers, servers, and workstations, have an agent
software module. The agent provides access to a local MIB of objects that
reflects the resources and activity of the device. The agent also responds to
manager commands to retrieve values from the MIB and to set values in the
MIB. The agent and the MIB are on the switch. To configure SNMP on the
switch, you define the relationship between the manager and the agent.
Both SNMPv1 and v2C use a community-based form of security. SNMP
managers can access the agent MIB through passwords referred to as
community strings. SNMPv1 and v2C are used for network monitoring
without network control.
SNMPv3 provides network monitoring and control. It provides secure access
to devices by a combination of authenticating and encrypting packets over the
network. The security model that is used by SNMPv3 is an authentication
strategy that is set up for a user and user group. A security level is the permitted
level of security within a security model. A combination of a security model
and a security level determines which security mechanism is used for an SNMP
packet.
The following are guidelines for SNMPv3 objects:
IMPORTANT
331
Chapter 7
Supported MIBs
Stratix managed switches support the following MIBs.
Table 80 - Supported MIBs
MIB Name
BRIDGE-MIB
CISCO-MEMORY-POOL-MIB
IP-MIB
CALISTA-DPA-MIB
CISCO-PAE-MIB
LLDP-EXT-MED-MIB
CISCO-ACCESS-ENVMON-MIB
CISCO-PAGP-MIB
LLDP-MIB
CISCO-ADMISSION-POLICY-MIB
CISCO-PING-MIB
NETRANGER
CISCO-AUTH-FRAMEWORK-MIB
CISCO-PORT-QOS-MIB
NOTIFICATION-LOG-MIB
CISCO-BRIDGE-EXT-MIB
CISCO-PORT-SECURITY-MIB
OLD-CISCO-CHASSIS-MIB
CISCO-BULK-FILE-MIB
CISCO-PORT-STORM-CONTROL-MIB
OLD-CISCO-CPU-MIB
CISCO-CABLE-DIAG-MIB
CISCO-PRIVATE-VLAN-MIB
OLD-CISCO-FLASH-MIB
CISCO-CALLHOME-MIB
CISCO-PROCESS-MIB
OLD-CISCO-INTERFACES-MIB
CISCO-CAR-MIB
CISCO-PRODUCTS-MIB
OLD-CISCO-IP-MIB
CISCO-CDP-MIB
CISCO-RESILIENT-ETHERNET-PROTOCOL-MIB
OLD-CISCO-MEMORY-MIB
CISCO-CIRCUIT-INTERFACE-MIB
CISCO-RTTMON-ICMP-MIB
OLD-CISCO-SYS-MIB
CISCO-CLUSTER-MIB
CISCO-RTTMON-IP-EXT-MIB
OLD-CISCO-SYSTEM-MIB
CISCO-CONFIG-COPY-MIB
CISCO-RTTMON-MIB
OLD-CISCO-TCP-MIB
CISCO-CONFIG-MAN-MIB
CISCO-RTTMON-RTP-MIB
OLD-CISCO-TS-MIB
CISCO-DATA-COLLECTION-MIB
CISCO-SNMP-TARGET-EXT-MIB
RMON-MIB
CISCO-DHCP-SNOOPING-MIB
CISCO-STACK-MIB
RMON2-MIB
CISCO-EMBEDDED-EVENT-MGR-MIB
CISCO-STACKMAKER-MIB
SMON-MIB
CISCO-ENTITY-ALARM-MIB
CISCO-STP-EXTENSIONS-MIB
SNMP-COMMUNITY-MIB
CISCO-ENTITY-VENDORTYPE-OID-MIB
CISCO-SYSLOG-MIB
SNMP-FRAMEWORK-MIB
CISCO-ENVMON-MIB
CISCO-TCP-MIB
SNMP-MPD-MIB
CISCO-ERR-DISABLE-MIB
CISCO-UDLDP-MIB
SNMP-NOTIFICATION-MIB
CISCO-FLASH-MIB
CISCO-VLAN-IFTABLE-RELATIONSHIP-MIB
SNMP-PROXY-MIB
CISCO-FTP-CLIENT-MIB
CISCO-VLAN-MEMBERSHIP-MIB
SNMP-TARGET-MIB
CISCO-IF-EXTENSION-MIB
CISCO-VTP-MIB
SNMP-USM-MIB
CISCO-IGMP-FILTER-MIB
ENTITY-MIB
SNMP-VIEW-BASED-ACM-MIB
CISCO-IMAGE-MIB
ETHERLIKE-MIB
SNMPv2-MIB
CISCO-IP-STAT-MIB
HC-RMON-MIB
TCP-MIB
CISCO-LAG-MIB
IEEE8021-PAE-MIB
UDP-MIB
CISCO-LICENSE-MGMT-MIB
IEEE8023-LAG-MIB
CISCO-MAC-AUTH-BYPASS-MIB
IF-MIB
CISCO-MAC-NOTIFICATION-MIB
IP-FORWARD-MIB
332
Chapter 7
333
Chapter 7
Smartports
TIP
Use Smartport roles immediately after the initial setup of the switch to
configure the switch ports before they connect to devices.
The port roles that are described in Table 81 are based on the type of devices to
be connected to the switch ports. For example, the Desktop for Automation
port role is specifically for switch ports to be connected to desktop and laptop
computers.
Table 81 - Smartport Roles
Port Role
Description
Automation Device
Apply this role to ports to be connected to EtherNet/IP (Ethernet Industrial Protocol) devices. It can be used for industrial automation devices,
such as logic controllers and I/O:
Port is set to Access mode.
Port security supports only one MAC ID.
Optimize queue management for CIP traffic.
Apply this role to DLR-enabled ports and ports connected to multiport EtherNet/IP devices. Devices include multiport EtherNet/IP devices
arranged in a linear or daisy chain topology, the 1783-ETAP module (for connection to only the device port), unmanaged switches, such as the
Stratix 2000, and managed switches with Remote Spanning Tree Protocol (RSTP) disabled:
Port is set to Access mode.
No port security.
Optimized queue management for CIP traffic.
Apply this role to ports to be connected to desktop devices, such as desktop computers, workstations, notebook computers, and other
client-based hosts:
Port is set to Access mode.
Portfast enabled.
Port security supports only one MAC ID.
Do not apply to ports to be connected to switches, routers, or access points.
Apply this role to ports connected to computer running virtualization software. This can be used with devices running up to two MAC addresses:
Port is set to Access mode.
Portfast is enabled.
Port security supports two MAC IDs.
IMPORTANT: Do not apply the Virtual Desktop for Automation role to ports that are connected to switches, routers, or access points.
Apply this role to ports to be connected to other switches with Spanning Tree enabled.
Port is set to Trunk mode.
Apply this role to ports to be connected to routers or Layer 3 switches with routing services enabled.
Apply this role to ports to be connected to IP phones. A desktop device, such as a computer, can be connected to the IP phone. Both the IP phone
and the connected computer have network access through the port:
Port is set to Trunk mode.
Port security supports three MAC IDs to this port.
This role prioritizes voice traffic over general data traffic to provide clear voice reception on the IP phones.
Apply this role to ports to be connected to wireless access points. The access point can provide network access to as many as 30 wireless users.
334
Chapter 7
Description
Port Mirroring
Apply this role to ports monitored by a network analyzer. For more information about port mirroring, see Port Mirroring on page 285.
None
Apply this role to ports if you do not want a specialized Smartport role on the port. This role can be used on connections to any device, including
devices with other Smartport roles.
CS1CS10
Custom Smartport roles. You can create a customized port role with a user-defined name. See Custom Smartport Roles on page 335.
335
Chapter 7
336
Chapter 7
337
Chapter 7
5. Click Submit.
338
Chapter 7
339
Chapter 7
4. Click Edit.
4. Click Delete.
340
Chapter 7
4. Click Browse.
341
Chapter 7
342
Chapter 7
343
Chapter 7
For Stratix 8000/8300 switches, in the navigation pane, click Advanced Port
Configuration.
Figure 41 - Advanced Port Configuration for Stratix 8000/8300 Switches
Description
Unit
(Stratix 8000/8300 switches)
Port
Smartport
Choose the Smartport role to apply to the connected port. For descriptions of each role, see Table 81 on page 334.
The Smartport roles are recommended configurations for the ports. These configurations are referred to as port roles. They optimize the switch
connections and help ensure security, transmission quality, and reliability to traffic from the switch ports. These configurations also prevent
problems that are caused by port misconfigurations.
The port roles are based on the type of device that is connected to the switch port. Make sure that you decide which port to connect to which type
of device before you choose a Smartport role.
Choose a VLAN to assign to the port. Only the first 128 VLANs are listed:
NativeRepresents the valid Native VLAN ID for ports set to the Router for Automation and Switch for Automation role. A native VLAN is for
ports that can belong to a VLAN trunk (a port belonging to more than one VLAN).
The Native VLAN feature is blank when the Smartport role is set to any value other than Switch for Automation and Router for Automation.
AccessRepresents the valid Access VLAN ID for ports set to Automation Device, Desktop for Automation, Phone for Automation for
Automation, Wireless, and Automation Device with QoS role. An access VLAN is for ports that can belong to only one VLAN.
The Access VLAN feature is blank when the Smartport role is set to Switch for Automation and Router for Automation.
VoiceRepresents the valid Voice VLAN ID for ports set to the Phone for Automation role. The voice VLAN helps ensure that all voice traffic has
better quality of service and is not mixed with data traffic.
The Voice VLAN feature is blank when the Smartport role is set to any value other than Phone for Automation.
See Configure Port Security via the Logix Designer Application on page 291.
344
Chapter 7
345
Chapter 7
Global Settings
To choose the STP mode for the switch or to configure STP on individual
VLANs, click the Global tab. On the Global tab, you can add, edit, or delete
instances. If you choose PVST+ or Rapid PVST+ mode, you can enable or
disable STP on each instance.
346
Chapter 7
PortFast Settings
To enable PortFast and related features, click the PortFast tab. On the PortFast
tab, you can change the way that STP is implemented on individual ports.
PortFast features are typically enabled only on access ports. Access ports
connect to devices such as personal computers, access points, and servers that
are not expected to send bridge protocol data units (BPDUs). These features
are typically not enabled on ports that connect to switches because spanning
tree loops can occur.
BPDU Features
Switches exchange special frames that are called BPDUs to communicate
network information, to track changes, and to create the STP topology.
Because transmitted BPDUs reveal network information and received BPDUs
can influence your STP topology, consider enabling BPDU Filtering and
BPDU Guard on your access ports. These features prevent a rogue device from
interfering with your STP topology. However, we recommend you use these
features with caution:
BPDU FilteringThis PortFast feature blocks all sending and receiving
of BPDUs through all PortFast-enabled ports. This feature effectively
disables STP on these ports and loops can result. If a BPDU is received,
PortFast is disabled on the port and the global STP settings apply. To
enable BPDU Filtering on all PortFast-enabled ports, check Enable.
BPDU GuardThis PortFast feature shuts down a port if it receives a
BPDU. To enable BPDU Guard on all Port Fast-enabled ports, check
Enable.
If you enable both of these features, BPDU Guard has no effect because BPDU
Filtering prevents the port from receiving any BPDUs.
347
Chapter 7
348
Chapter 7
The default VLAN alone can be sufficient based on the size and requirements
of your network. We recommend that you first determine your VLAN needs
before creating VLANs.
With custom Smartports, you can specify the type of VLAN you want to
implement on that port. The custom Smartports feature is not available on
Stratix 8000/8300 switches.
The default VLAN is also the management VLAN. After the initial setup, you
can create VLANs and designate any VLAN on the switch as the management
VLAN. The management VLAN provides administrative access to the switch.
You must assign one of the switch ports to the management VLAN.
Otherwise, you do not have administrative access to the switch. Initially, all
ports are assigned to the management VLAN.
You can assign all ports, regardless of their Smartport role, to the default
VLAN (default).
349
Chapter 7
Switch B
Switch A
Network
Management
WAN/Internet
Router with
Firewall
Access Point
R
o
Switch D
Switch C
PC
MAC
Guest
Guest
Printer
Printer
VLAN 3
350
VLAN 5
VLAN 7
VLAN 9
Chapter 7
Group Users
The network that is shown in Figure 43 provides access to three types of
network users:
Wired employees
Wireless employees
Wired or wireless company visitors
Each user type requires different access levels to the company network. VLANs
and security policies on a router or Layer 3 switch can enforce privileges and
restrictions to different user types.
Refer to Figure 43 on page 350:
VLAN 5 offers employee-level access to the company resources. This
network access requires a direct connection to the specific switch ports.
VLAN 7 offers Internet-only access to company visitors. Visitors with
wired or wireless connections to switch ports are assigned to this VLAN,
which automatically restricts guest access to only the Internet.
VLAN 9, which has one or more switch ports that are connected to the
wireless access point, enforces security policies:
Identifies the wireless user as an employee or a guest, for example.
Determines what the user can do on the network, such as access only
the Internet or access other network resources.
351
Chapter 7
To assign ports to VLANs, use the Edit Physical Ports window, as described on
page 48. Before you assign ports to VLANs, make sure that each port has the
appropriate port role.
352
Chapter 7
To assign ports to VLANs, see Assign Smartports and VLANs via the Logix
Designer Application on page 342.
353
Chapter 7
Notes:
354
Chapter
Topic
Page
356
372
376
Trends
378
Port Statistics
379
NAT Statistics
380
REP Topology
387
CIP Status
387
DLR Status
389
Port Diagnostics
391
Cable Diagnostics
393
395
355
Chapter 8
The Dashboard window in Device Manager lets you monitor switch status and
performance.
The Dashboard window is similar to the Monitor > Trends window. The
Dashboard window displays the instantaneous status while the Trends window
displays the historical status. By using them together, you can gather the
detailed conditions of the switch and its ports. For information about the
Trends window, see page 378.
The Front Panel has four areas to monitor the status of the switch:
Front Panel, as described on page 357
Switch Information, as described on page 369
Switch Health, as described on page 370
Port Utilization, as described on page 371
356
Chapter 8
Front Panel
The Front Panel view on the dashboard is a graphical display of the switch
front panel. The switch components on the front panel view are color-coded
by status. The status indicators on the view in Device Manager match the status
indicators on the physical switch:
System status indicators let you monitor the status of the switch,
network status, power, and alarms.
Port status indicators let you monitor the status of each port. Each
combo port has two indicators: one for the SFP module and one for the
RF45 connector. You can change the behavior of the port status
indicators by choosing a view mode from the View pull-down on the
front panel view. Stratix 5400 and Stratix 5410 switches also have a
Mode button on the physical switch that affects the behavior of the port
status indicators.
Figure 46 - Front Panel View Menu
To display specific information about the port and its status, hover your mouse
pointer over a port image. When you choose Smartports from the View pulldown menu, the hover text for a port image shows the Smartport role and
VLAN assigned to the port.
Figure 47 - Port Hover Text
357
Chapter 8
You can identify the physical switch in the group of similar devices by checking
the Locate Switch checkbox on the Front Panel view.
Figure 48 - Locate Switch Checkbox
When you check the Locate Switch checkbox, the system status indicators on
the physical switch (Setup, EIP NET, EIP Mod, Alarm) flash green to visually
notify you that the feature is enabled. The status indicators continue to flash
green for the length of time you specify in the adjacent field. Valid values are
9255 seconds.
358
Chapter 8
Status
Setup
The Setup status indicator shows the status of the initial setup of the switch.
EIP Net
EIP Mod
DC_A/PWR A
DC_B/PWR B
Alarm IN1
Alarm IN2
Alarm Out
Description
Off
Solid green
Flashing green
Solid red
The switch failed to start initial setup or recovery because there is no available switch port to connect to the management station.
Disconnect a device from a switch port, then press the Express Setup button on the switch.
The EIP Net status indicator shows the network status of the switch.
Off
Solid green
The switch has an established CIP connection to one or more attached devices.
Flashing green
The switch has an IP address but the switch does not have an established connection to one or more attached devices.
Flashing red
Solid Red
The switch has detected that its IP address is already in use by another device in the network.
The EIP Mod status indicator shows the status of the switch.
Off
Solid green
Flashing green
The switch is not configured. For example, the switch does not have an IP address configured.
Flashing red
Solid red
The power status indicators show the status of power to the switch.
Off
Solid green
Solid red
Power is not present on the associated circuit, and the switch is configured for dual-input power.
The alarm input status indicators show the status of the alarm inputs.
Off
Solid green
Flashing red
Solid red
The alarm out status indicators show the status of the alarm output.
Off
Solid green
Flashing red
359
Chapter 8
Status
Status
In Status mode, the port status indicators show the connection and activity status of the port. Status mode is the default mode.
Duplex
Speed
Power
360
Description
Off
Solid green
Solid amber
In Duplex mode, the port status indicators show the Duplex mode (Full-duplex or Half-duplex) of the ports. The 10/100/1000 ports operate only in Full-duplex
mode.
Off
Solid amber
Solid green
In Speed mode, the port status indicators show the operating speed of the ports.
Off
Solid amber
Solid green
Flashing green
In Power mode, the port status indicators show the status of PoE on switch models with PoE capability.
Off
Solid green
Flashing amber
PoE is denied because it exceeds the configured power limit for the switch port.
Chapter 8
In addition to the View modes on the Dashboard window, the Stratix 5400
switch has a Display Mode button on the physical switch. The Display Mode
button changes the behavior of the port status indicators based on the selected
mode. Select a mode by pressing the Display Mode button on the physical
switch. Each time that you press the switch, the active mode moves from the
default Status mode to Speed, Duplex, PRP, and PoE respectively, and then
back to Status mode. For a description of the modes, see Table 86.
When a mode is active, its mode status indicator turns on. When a mode is
inactive, its mode status indicator turns off. When all status indicators for
Speed, Duplex, PRP, DLR, and PoE are off, the switch is in the default Status
mode.
Figure 49 - Stratix 5410 Display Modes
Display Modes
361
Chapter 8
Status
Setup
The Setup status indicator shows the status of the initial setup of the switch.
EIP Net
EIP Mod
Pwr A
Pwr B
Alarm IN1
Alarm IN2
Alarm Out
362
Description
Off
Solid green
Flashing green
Solid red
The switch failed to start initial setup or recovery because there is no available switch port to connect to the management station.
Disconnect a device from a switch port, then press the Express Setup button on the switch.
The EIP Net status indicator shows the network status of the switch.
Off
Solid green
The switch has an established CIP connection to one or more attached devices.
Flashing green
The switch has an IP address but the switch does not have an established connection to one or more attached devices.
Flashing red
Solid Red
The switch has detected that its IP address is already in use by another device in the network.
The EIP Mod status indicator shows the status of the switch.
Off
Solid green
Flashing green
The switch is not configured. For example, the switch does not have an IP address configured.
Flashing red
Solid red
The power status indicators show the status of power to the switch.
Off
Solid green
Solid red
Power is not present on the associated circuit, and the switch is configured for dual-input power.
The alarm input status indicators show the status of the alarm inputs.
Off
Solid green
Flashing red
Solid red
The alarm out status indicator shows the status of the alarm output.
Off
Solid green
Flashing red
Chapter 8
Status
Status
In Status mode, the port status indicators show the connection and activity status of the port. Status mode is the default mode. You can choose Status mode via
the View pull-down menu in Device Manager. You can also choose Status mode by pressing the Disp. Mode button on the physical switch until all mode status
indicators on the switch turn off.
Duplex
Speed
PRP
Description
Off
Solid green
Solid amber
In Duplex mode, the port status indicators show the Duplex mode (Full-duplex or Half-duplex) of the ports. The 10/100/1000 ports operate only in Full-duplex
mode.
Off
Solid amber
Solid green
In Speed mode, the port status indicators show the operating speed of the ports.
Off
Solid amber
Solid green
Flashing green
In PRP mode, the port status indicators show the status of Parallel Redundancy Protocol (PRP). This mode is available only via the Disp. Mode button on the
physical switch.
Off
Solid green
In Power or PoE mode, the port status indicators show the status of PoE on switch models with PoE capability.
The Power mode available via the View pull-down menu in Device Manager is the same as the PoE mode available via the Disp. Mode button on the physical
switch.
Off
Solid green
Flashing amber
PoE is denied because it exceeds the configured power limit for the switch port.
363
Chapter 8
In addition to the View modes on the Dashboard window, the Stratix 5410
switch has a Disp. Mode button on the physical switch that changes the
behavior of the port status indicators based on the selected mode. Select a
mode by pressing the Disp. Mode button on the physical switch. Each time
that you press the switch, the active mode moves from the default Status mode
to Speed, Duplex, PRP, and PoE respectively, and then back to Status mode.
For a description of the modes, see Table 88.
When a mode is active, its mode status indicator turns on. When a mode is
inactive, its mode status indicator turns off. When all status indicators for
Speed, Duplex, PRP, DLR, and PoE are off, the switch is in the default Status
mode.
Figure 50 - Stratix 5410 Modes
364
Chapter 8
Status
EIP Mod
The EIP Mod status indicator shows the status of the switch.
EIP Net
Setup
Description
Off
Solid green
Flashing green
The switch is not configured. For example, the switch does not have an IP address configured.
Flashing red
Solid red
The EIP Net status indicator shows the network status of the switch.
Off
Solid green
The switch has an established CIP connection to one or more attached devices.
Flashing green
The switch has an IP address but the switch does not have an established connection to one or more attached devices.
Flashing red
Solid Red
The switch has detected that its IP address is already in use by another device in the network.
The Setup status indicator shows the status of the initial setup of the switch.
Off
Solid green
Flashing green
Solid amber
The switch failed to start initial setup or recovery because there is no available switch port to connect to the management station.
Disconnect a device from a switch port, then press the Express Setup button on the switch.
GPS
TimeCD
Alarms 14
The alarm input status indicators show the status of the alarm inputs.
Alarm Out
PSU 1
PSU 2
Off
Solid green
Solid red
Flashing red
The alarm input status indicator shows the status of the alarm output.
Off
Solid green
Solid red
Alarm detected.
The power status indicators show the status of power to the switch.
Off
Power is not present on the circuit, or the system is not powered up.
Solid green
Flashing red
Solid red
365
Chapter 8
Status
Description
Status
In Status mode, the port status indicators show the connection and activity status of the port. Status mode is the default mode. You can choose Status mode via
the View pull-down menu in Device Manager. You can also choose Status mode by pressing the Disp. Mode button on the physical switch until all mode status
indicators on the switch turn off.
Off
Solid green
In Speed mode, the port status indicators show the operating speed of the ports.
Off
Solid amber
Solid green
Flashing green
Duplex
PRP
Solid green
Flashing green
In Duplex mode, the port status indicators show the Duplex mode (Full-duplex or Half-duplex) of the ports. The 10/100/1000 ports operate only in Full-duplex
mode.
Off
Solid amber
Solid green
In PRP mode, the port status indicators show the status of Parallel Redundancy Protocol (PRP). This mode is available only via the Disp. Mode button on the
physical switch.
Off
Solid green
Solid amber
In Power or PoE mode, the port status indicators show the status of PoE.
The Power mode available via the View pull-down menu in Device Manager is the same as the PoE mode available via the Disp. Mode button on the physical
switch.
Off
Solid green
Alternating green and amber PoE is enabled on the port, but power is disconnected or failing on this low priority port.
366
Flashing amber
PoE is enabled on the port, but power is disconnected or failing on this high priority port.
Solid amber
Chapter 8
Status
EIP Mod
The EIP Mod status indicator shows the status of the switch.
EIP Net
Setup
Description
Off
Solid green
Flashing green
The switch is not configured. For example, the switch does not have an IP address configured.
Flashing red
The switch has detected a recoverable system fault. Use the system log to see more details about the problem. See System Log
Messages on page 376.
Solid red
The switch has detected a nonrecoverable system. Use the system log to see more details about the problem. See System Log
Messages on page 376.
The EIP Net status indicator shows the network status of the switch.
Off
Solid green
The switch has an established CIP connection to one or more attached devices.
Flashing green
The switch has an IP address but the switch does not have an established connection to one or more attached devices.
Flashing red
Solid red
The switch has detected that its IP address is already in use by another device in the network.
The switch is configured as a managed switch or the switch is operating as an unmanaged switch.
Flashing green
Switch is in the initial Setup mode or is in the Direct Managed mode, or the initial setup is incomplete.
Solid green
Power is present.
Solid red
Power to the switch is not present and the power alarm is on.
367
Chapter 8
Status
Description
Status
In Status mode, the port status indicators show the status of the ports. Status is the default mode.
Off
No link
Solid green
No activity on link.
Flashing green
Link activity.
Solid brown
Yellow
Duplex
Speed
368
Flashing amber
Solid amber
In Duplex mode, the port status indicators show the Duplex mode (Full-duplex or Half-duplex) of the ports. The 10/100/1000 ports operate only in Full-duplex
mode.
Off
No link.
Solid green
In Speed mode, the port status indicators show the operating speed of the ports.
Off
No link.
10 Mbps
Solid green
100 Mbps
Flashing green
1000 Mbps
Chapter 8
Switch Information
The Switch Information area on the Dashboard displays information about the
switch.
Table 91 - Switch Information Fields
Field
Description
Host Name
A descriptive name for this switch. The default name is Switch. You can set this parameter on the Admin > Express Setup window.
IP Address
The IP address of this switch. You can configure this setting on the Admin > Express Setup window.
MAC Address
Product ID
License Level
The type of firmware on the switch: Full or Lite. This information cannot be changed.
CIP Revision
The version of Common Industrial Protocol (CIP) that is supported on this switch. This information cannot be changed.
Serial Number
Version ID
Software
The version of IOS that this switch is running. This information is updated when you upgrade the switch firmware.
Contact
The person who is the administrative contact for this switch. You can set this parameter on the Configure > SNMP window.
Location
The physical location of this switch. You can set this parameter on the Configure > SNMP window.
369
Chapter 8
Switch Health
You can use the health gauges to monitor CPU utilization and temperature.
The CPU Utilization gauge shows the percentage of CPU processing power
that is in use on the switch. Data is collected at each 60-second system refresh.
The gauge changes as the switch experiences the network activity from devices
sending data through the network. As network activity increases, so does
contention between devices to send data through the network.
As you monitor utilization on the switch, note whether the percentage of usage
is what you expect during that given time of network activity. If utilization is
high when you expect it to be low, perhaps a problem exists. As you monitor
the switch, note if the bandwidth utilization is consistently high, which can
indicate congestion in the network. If the switch reaches its maximum
bandwidth (above 90 % utilization) and its buffers become full, it begins to
discard the data packets that it receives. Some packet loss in the network is not
considered unusual, and the switch is configured to help recover lost packets,
such as by signaling to other devices to resend data. However, excessive packet
loss can create packet errors, which can degrade overall network performance.
To reduce congestion, consider segmenting the network into subnetworks that
are connected by other switches or routers. Look for other causes, such as faulty
devices or connections, which can also increase bandwidth utilization on the
switch.
The Temperature gauge shows the internal temperature of the switch. For
information about the switch temperature range and the operating
environment guidelines, see the Stratix Ethernet Device Specifications
Technical Data, publication 1783-TD001.
370
Chapter 8
Port Utilization
You can choose which types of network traffic to display and in what format:
Types of trafficBy default, all traffic is displayed for all interfaces.
Click the links above the display area to display all traffic, errors,
received traffic, or transmitted traffic.
FormatsClick the buttons below the display area to view the data in
Chart Mode or Grid Mode.
Chart detailsWhen displaying a chart, position your mouse pointer
over a bar or a point on the chart to view the data.
As you monitor the usage on the ports, note whether the percentage is what
you expect during that given time of network activity. If usage is high when you
expect it to be low, a problem can exist. Bandwidth allocation can also be based
on whether the connection is operating in Half-duplex or Full-duplex mode.
Reasons for errors that are received on or sent from the switch ports include the
following:
Bad cable connection
Defective ports
Software problems
Driver problems
Data is collected at each 60-second system refresh.
See Trends on page 378 for a graph to view per-port patterns over incremental
instances in time (by 60 seconds, 1 hour, 1 day, or 1 week).
See Port Statistics on page 379 for details on the specific port errors that are
detected on each port.
371
Chapter 8
The Switch Status view in the Studio 5000 Logix Designer application lets you
view status parameters for the switch.
In the navigation pane, click Switch Status.
Description
Active Faults
Health
Switch Uptime
Displays the days, hours, and minutes that the switch has been functioning since the last restart.
Switch Temperature
Displays the current internal temperature (in degree Celsius) of the switch.
Bandwidth Utilization
Displays a yes or no value to indicate whether the current unicast, multicast, and broadcast thresholds have been
exceeded on any port.
Image
IOS Release
License File
372
Chapter 8
Description
SD Card Present
Power
Power Present on Terminal A
Displays the type of power supply installed in the PSU1 slot. If a fault exists with a power supply, the field displays
either AC_Fault or DC_Fault.
Valid values:
AC
AC_Fault
DC
DC_Fault
None
Displays the type of power supply installed in the PSU2 slot. If a fault exists with a power supply, the field displays
either AC_Fault or DC_Fault.
Valid values:
AC
AC_Fault
DC
DC_Fault
None
If you need to physically connect or disconnect ports or move a switch in a group of similar devices, you can identify
the switch in the group by checking the Blink EIP LED checkbox.
When you check the checkbox, the system status indicators on the physical switch (Setup, EIP NET, EIP Mod, Alarm)
flash green for 4 minutes or until you clear the Blink EIP LED checkbox.
Time Remaining
Displays the amount of time remaining for the system status indicators to continue flashing while the Blink EIP LED
checkbox is checked.
373
Chapter 8
You can also monitor the switch status on the Module Info view.
.
Description
Identification
Status
374
Chapter 8
Port Status
In the navigation pane, click Port Status.
You can monitor alarms, statuses, thresholds, and bandwidth utilization for
each switch port. You can also access port and cable diagnostics.
Description
Unit
(Stratix 8000/8300 switches)
Port
Displays the selected port. The port number includes the port type (Fa for Fast Ethernet and Gi for Gigabit Ethernet) and the specific port number.
EXAMPLE: Gi1/1 is Gigabit Ethernet port 1.
Link Status
375
Chapter 8
Description
Threshold Exceeded
Bandwidth Utilization Percent Displays the percentage of the bandwidth being used. Note whether the percentage of usage is what you expect during the given time of
network activity. If usage is higher than expected, an issue can exist.
Port Diagnostics
Click to display information to diagnose a network performance issue for the corresponding port. See page 391.
Cable Diagnostics
Click to display information to diagnose a cable issue for the corresponding port. See page 393.
In Device Manager, the system log displays events that occur on the switch and
its ports. The events are based on the Alarm Settings you configure on the
Configure > Alarm Settings window.
From the Monitor menu, choose Syslog.
376
Chapter 8
Description
Time Stamp
Severity Level
Description
The description of the problem, including the port on which the problem was detected.
377
Chapter 8
In Device Manager, you can view historical data to help you to analyze traffic
patterns and to identify problems. Data can be displayed in increments of
seconds, minutes, hours, or days.
Trends
To view the data in a table, click the Grid Mode button below the area. To
display a chart, click the Chart Mode button. Use the 60 s, 1 h, 1 d, and 1 w
links to display the data in increments of 60 seconds, 1 hour, 1 day, or 1 week.
From the Monitor menu, choose Trends.
Description
Bandwidth Utilization
The Bandwidth Utilization graph indicates the percentage of the available bandwidth that was used. The graph can show the bandwidth usage
patterns over incremental instances in time (by 60 seconds, 60 minutes, 24 hours, or 14 days). This graph also marks the highest peak reached. The
default is 60 seconds.
You can use this data to determine when network usage is high or low.
Packet Error
The Packet Error graph shows the percentage of packet errors that are collected over incremental instances in time (by 60 seconds, 60 minutes,
24 hours, or 14 days). The default is 60 seconds.
Use this graph to audit the effect that connected devices have on the switch performance or the network. For example, if you suspect that a
connected device is sending error packets, you can verify if the data on the graph changes when you disconnect and reconnect the device.
Port Utilization/Errors
The Port Utilization/Errors graph shows the usage patterns of a specific port over incremental instances in time by 60 seconds, 60 minutes, 24
hours, or 14 days. The default is 60 seconds.
To display the trends for a specific port, choose a port from the Port list.
Use these graphs to observe the performance of a specific port. For example, if a network user is having intermittent network connectivity, use the
Port Utilization graph to observe the traffic patterns on the port to which the computer is connected. You can also use the Port Errors graph to see
if the port is receiving or sending error packets.
PoE Utilization
For PoE switches, the PoE Utilization graph shows the power that is allocated to the connected devices.
378
Port Statistics
Chapter 8
In Device Manager, you can view statistics for data that passes through the
switch ports.
From the Monitor menu, choose Port Statistics. For more information, see the
online help for Device Manager.
The types of port statistics are grouped under these tabs on the Port Statistics
window:
Overview tabUse this tab to display the number of error packets that
is received and sent from the port. This level of detail is not available
from the Dashboard graphs.
The number of error packets can mean a duplex mismatch,
incompatibilities with the port and its attached device, or faulty cables
or attached devices. Any of these problems can cause slow network
performance, data loss, or lack of connectivity.
Transmit Detail tabUse this tab to troubleshoot unusual changes in
network traffic. This tab displays these statistics:
Unicast, multicast, and broadcast packets that are sent from each port
Detailed statistics of errors that are sent to each port
If a port is sending an unusually high amount of traffic, such as multicast
or broadcast packets, monitor the connected device to see whether the
traffic pattern is normal.
Receive Detail tabUse this tab to troubleshoot unusual changes in
network traffic. This tab displays these statistics:
Unicast, multicast, and broadcast packets that are received on each
port
Detailed statistics of errors that are received on each port
If a port is receiving an unusually high amount of traffic, such as
multicast or broadcast packets, monitor the connected device to see
whether the traffic pattern is normal.
379
Chapter 8
NAT Statistics
You can monitor NAT statistics in both Device Manager and the Logix
Designer application.
380
Chapter 8
381
Chapter 8
Description
The number of IP addresses that have been translated within the last 90 seconds across all NAT instances.
Total Translations
The total number of packets that have been dropped across all NAT instances.
The number of IP addresses that have been translated within the last 90 seconds across all NAT instances for ports
16 and 1318.
The number of IP addresses that have been translated within the last 90 seconds across all NAT instances for ports
712, 1924, and 2528.
The total number of translations across all NAT instances for ports 16 and 1318.
The total number translations across all NAT instances for ports 712, 1924, and 2528.
The total number of NAT instances across ports 712, 1924, and 2528.
The total number of packets across all NAT instances for all ports.
The total number of packets that have been dropped across all NAT instances for all ports.
Instance Statistics
Selected Instance
From the pull-down menu, choose the instance for which to view statistics.
The number of translations that have occurred within the last 90 seconds for the instance.
The total number of packets that have been translated for the instance.
The total number of packets that have been dropped for the instance.
The total number of translations that are configured for devices on the private subnet.
The total number of translations that are configured for devices on the public subnet.
Total Translations
The total number of translations that are configured for the instance.
ARP Fixup
The number of ARP packets that have been fixed up for the instance.
ICMP Fixup
The number of ICMP packets that have been fixed up for the instance.
Total Fixups
The total number of ARP and ICMP packets that have been fixed up for the instance.
The number of packets with untranslated unicast traffic for the instance.
Multicast Traffic
IGMP Traffic
382
Chapter 8
The NAT Diagnostics dialog box displays diagnostics for the selected instance.
383
Chapter 8
Description
Displays the number of translations that have occurred within the last 90 seconds across all NAT instances.
Displays the total number of packets that have been translated for this instance.
ARP Fixup
Displays the number of ARP packets that have been fixed up for this instance.
ICMP Fixup
Displays the number of ICMP packets that have been fixed up for this instance.
Total Fixups
Displays the number of ARP and ICMP packets that have been fixed up for this instance.
Displays the number of incoming packets with untranslated traffic that NAT passed through for this instance.
Displays the number of outgoing packets with untranslated traffic that NAT blocked for this instance.
Displays the number of incoming packets with multicast traffic that NAT blocked for this instance.
Displays the number of outgoing packets of multicast traffic that NAT passed through for this instance.
Displays the number of incoming packets with IGMP traffic that NAT blocked for this instance.
Displays the number of outgoing packets with IGMP traffic that NAT blocked for this instance.
Click to view private-to-public translation diagnostics for the instance. See Private-to-Public Translation Diagnostics
on page 385.
Click to view private-to-public translation diagnostics for the instance. See Public-to-Private Translation Diagnostics
on page 386.
384
Chapter 8
Description
Private
Public
Displays a unique public address that represents the corresponding device on the private subnet.
Subnet
Number of Packets
385
Chapter 8
Description
Public
Displays the unique IP address on the public subnet that represents the corresponding IP address on the private
subnet.
Private
Displays the IP address on the private subnet that was changed to a unique IP address on the public subnet.
Subnet
Number of Packets
386
REP Topology
Chapter 8
In Device Manager, you can review the REP topology for one or all network
segments.
From the Monitor menu, choose REP.
To display an archived REP topology, click the Archived Topology tab and
then select the segment ID.
CIP Status
Except for Active Multicast Groups, all other categories are related to the CIP
server in the switch. The categories pertain to CIP traffic directed to the
switch as a CIP target device. The categories do not refer to CIP (EtherNet/IP)
traffic that flows through the switch among these devices:
Various CIP controllers
HMI devices
Configuration tools
Other CIP target devices, such as drives, I/O modules, motor starters,
sensors, and valves
387
Chapter 8
Description
Overview
State
Vlan
The IP address of the device to and from which application-specific I/O output data is sent and received.
Percentage of the Management CPU used for management functions. Switch functions have dedicated ASICs. Management functions
do not impact the ASICs.
The number of multicast groups, including CIP multicast groups that flow through the switch.
Connection Details
Open Requests
The number of Forward Open requests received by the switch to establish a connection with the switch.
Close Requests
The number of Forward Close requests received by the switch after a connection was successfully established with the switch.
The number of Forward Open requests directed to the switch that failed because the request is not in the proper format.
The number of Forward Close requests directed to the switch that failed because the request is not in the proper format.
The number of Forward Open requests that failed to establish a new connection for reasons such as insufficient memory.
The number of Forward Close requests that failed for reasons such as incompatible electronic keying.
The number of Forward Open requests that failed for reasons such as incompatible electronic keying.
Connection Timeouts
388
DLR Status
Chapter 8
You can monitor device-level ring (DLR) status in both Device Manager and
the Logix Designer application.
For more information about DLR troubleshooting, see
Troubleshoot EtherNet/IP Networks, publication ENET-AT003.
389
Chapter 8
390
Chapter 8
Port Diagnostics
The Port Diagnostics feature in the Logix Designer application lets you view
the status of the link performance:
View octet and packet counters
View collisions on the link
View errors on the link
You can also reset and clear all status counters.
In the navigation pane, click Port Status, and then click the button in the Port
Diagnostics column for the corresponding port.
391
Chapter 8
Description
Unit
Indicates where the port resides:
(Stratix 8000/8300 switches) Base (for example, 1783-MS10T).
Expansion module (for example, 1783-MX08T).
Port
The port that is selected for configuration. The port number includes the port type (Fa for Fast Ethernet and Gi for Gigabit Ethernet), the base or
expansion module for Stratix 8000/8300 switches, and the specific port number.
EXAMPLE:
Gi1/1 is Gigabit Ethernet port 1 on the base.
Fa2/1 is Fast Ethernet port 1 on the first expansion module.
Interface Counters
These counters let you view status of octets received and sent, and packets received and sent:
Octets InThe number of octets that are received by the port.
Octets OutThe number of octets that are sent by the port.
Ucast Packets InThe number of unicast packets that are received by the port.
Ucast Packets OutThe number of unicast packets that are sent by the port.
NUcast packets InThe number of multicast packets that are received by the port.
NUcast packets OutThe number of multicast packets that are sent by the port.
Discards InThe number of inbound packets that have been discarded.
Discards OutThe number of outbound packets that have been discarded.
Errors InThe number of inbound packets that contain errors.
Errors OutThe number of outbound packets that contain errors.
Unknown Protos (Protocols) In The number of inbound packets with unknown protocols.
Media Counters
392
Cable Diagnostics
Chapter 8
The Cable Diagnostics feature lets you run a test on each switch port to
determine the integrity of the cable that is connected to the RJ45 (copper)
ports. The test determines the distance to the break from the switch for each
cable with a plus or minus error value individually listed. This feature is not
available for fiber ports.
393
Chapter 8
Description
Port
The port that is selected for configuration. The port number includes the port type (Fa for Fast Ethernet and Gi for Gigabit Ethernet), and the
specific port number.
EXAMPLE: Gi1/1 is Gigabit Ethernet port 1.
The time the test was last executed. The date time format is mm/dd/yy hh:mm:ss tt. If the test has never been run, the time and all distance and
status information is blank.
Pair
Each pair of cables in the network individually listed. If pair does not exist or test has never beeto indicate run, this field is blank.
Status
Specifies the link state the last time the test was executed. If pair does not exist or test has never run, status is blank. For distance, if the pair is
Normal status, No Break Detected is shown. No distance is displayed.
Distance to Break
The distance to the break from the switch for each estimated pair with a plus or minus error value individually listed. A value is displayed only
when the status of an existing pair is not Normal. This field is blank if the test was never run before. If a pair does not exist, ??? appears.
Diagnose Cable
Click to run the Diagnose Cable test. A connection interruption warning appears:
If you are sure that you want to continue with the test, click Yes. Be prepared to enter a valid password to run the test.
If you do not want to run the test, click No or close the window.
IMPORTANT: To run a valid test on gigabit ports, you must first configure the gigabit port as an RJ45 media type in Device Manager, as described
in Configure Port Settings on page 48.
IMPORTANT: This test can interrupt connections to the module and to any other modules connected through this module. Also, the connection
between workstation and controller can be interrupted. You must have the correct privilege to run this test.
394
Chapter 8
You can view DHCP address pool information for the switch. You can view
015 pools. This information is gathered directly from the switch. Each row
represents one instance, and instance values cannot be consecutive.
Description
Enables or disables pools. If selected, all controls on the grid are set to online and the appropriate values are obtained from the
switch and displayed. If cleared, all fields on the view become unavailable. From the keyboard, press Alt - D.
Pool Name
Displays the name of the DHCP IP address pool that is configured on the switch. A DHCP IP address pool is a range (or pool) of
available IP addresses that the switch can assign to connected devices. The name can have up to 31 alphanumeric characters. The
name cannot contain a ? or a tab.
Starting IP Address
Displays the starting IP address that defines the range of addresses in the DHCP IP address pool. The format is a 32-bit numeric
address that is written as four numbers that are separated by periods (for example, 255.255.255.255). Each number can be from
0255.
Ending IP Address
Displays the ending IP address that defines the range of addresses in the DHCP IP address pool. The format is a 32-bit numeric
address that is written as four numbers that are separated by periods (for example, 255.255.255.255). Each number can be from
0255.
Delete Pool
Click to delete currently selected DHCP pool row. Afterwards, if you click Set, a confirmation dialog box is displayed and all
persistent addresses that are associated with the selected DHCP pool row are also deleted.
Delete Pool is available only when the switch is online, the Enable Dynamic Host Configuration Protocol (DHCP) checkbox is
checked, and when the respective row is populated.
Click to display the DHCP Pool Definition and Edit dialog box and populate it with values from the instance that corresponds to the
current row.
The Edit column button is available only when the switch is online, the Enable Dynamic Host Configuration Protocol (DHCP)
checkbox is selected, and when the respective row is populated.
New Pool
Click to display the DHCP Pool Definition and Edit dialog box (all fields are blank and the Custom radio button is not selected).
Additionally, a new row/instance is added to the grid on the Module Properties dialog box - DHCP Pool Display. From the keyboard,
press Alt - N.
395
Chapter 8
Notes:
396
Chapter
Topic
Page
398
401
Troubleshoot IP Addresses
401
401
402
402
404
406
406
407
This chapter helps you resolve issues that are related to Stratix switches and
perform common functions, such as reset the switch.
For more troubleshooting, see the following:
Port Diagnostics on page 391
Cable Diagnostics on page 393
System Log Messages on page 376
See also Troubleshoot EtherNet/IP Networks, publication ENET-AT003.
397
Chapter 9
398
Chapter 9
399
Chapter 9
Link Status
Verify that both sides have a network link. A broken wire or one shut down
port can cause one side to show a link, but not the other side. A Link status
indicator does not indicate that the cable is fully functional. The cable can
encounter physical stress that causes it to function at a marginal level. If the
Link status indicator for the port is not lit, do the following:
Connect the cable from the switch to a known good device.
Make sure that both ends of the cable are connected to the correct ports.
Verify that both devices have power.
Verify that you are using the correct cable type.
Rule out loose connections. Sometimes a cable appears to be seated, but
is not. Disconnect the cable, and then reconnect it.
Transceiver Issues
Use only Rockwell Automation SFP modules on the switch. Each SFP module
has an internal serial EEPROM that is encoded with security information.
This encoding identifies and validates that the module meets the requirements
for the switch.
Check these items:
Verify that the SFP module is valid and functional. Exchange a suspect
module with a known good module. Verify that the module is supported
on this platform.
Use the CLI show interfaces command or the CLI show int status
command to verify the error-disabled or shutdown status of the port or
module. Re-enable the port if needed.
Make sure that all fiber connections are properly cleaned and securely
connected.
Chapter 9
Boot Fast failures are potentially fatal to the switch. Contact your Rockwell
Automation representative if your switch does not successfully complete Boot
Fast. You can disable Boot Fast and run a power-on self-test (POST) by using
the CLI.
Troubleshoot IP Addresses
The following table includes basic troubleshooting for issues that are related to
the switch IP address.
Issue
Resolution
If the switch does not receive an IP address from an upstream device operating as a DHCP server, make sure that the
device is operating as a DHCP server. Repeat Express Setup.
If the switch is installed in your network but you cannot access the switch because it has the wrong IP address, assign a
new switch IP address. Refer to Access Direct Managed Mode on page 402 to assign the IP address, and then update the
switch IP address on the Express Setup window.
Troubleshoot
Device Manager
The following table includes basic troubleshooting for issues that are related to
Device Manager.
Issue
Resolution
If you cannot display Device Manager from your computer, make sure that you entered the correct switch IP address in
the browser.
If you entered the correct switch IP address in the browser, make sure that the switch and your computer are in the
same network or subnetwork:
For example, if your switch IP address is 172.20.20.85 and your computer address is 172.20.20.84, both devices are
in the same network.
For example, if your switch IP address is 172.20.20.85 and your computer IP address is 10.0.0.2, the devices are in
different networks and cannot directly communicate without a router. You must either change the switch IP address
or change the computer IP address.
If the issue persists, follow the procedure in Access Direct Managed Mode on page 402, and then update the switch
network settings on the Express Setup window.
If the issue still persists, follow the procedure in the Recover the Switch Firmware on page 406.
Follow the procedure in Access Direct Managed Mode on page 402, and then update the switch network settings on the
Express Setup window.
If the issue persists, follow the procedure in Recover the Switch Firmware on page 406.
If you cannot access Device Manager remotely from a web browser, follow the procedure in the Access Direct Managed
Mode on page 402.
401
Chapter 9
The following table includes basic troubleshooting for issues that are related to
switch performance.
Troubleshoot Switch
Performance
Issue
Resolution
Port statistics that show a large amount of alignment errors, frame check sequence (FCS), or late-collisions errors can
indicate a speed or duplex mismatch.
Common speed and duplex issues occur when duplex settings are mismatched between two switches, between a switch
and a router, or between the switch and a computer. These issues can occur from manually setting the speed and duplex
or from autonegotiation issues between the two devices. A mismatch occurs under these circumstances:
A manually set speed or duplex parameter differs from the manually set speed or duplex parameter on the
connected port.
A port is set to autonegotiate, and the connected port is set to full-duplex with no autonegotiation.
To maximize switch performance and be sure of a link, follow one of these guidelines when changing the settings for
duplex and speed:
Let both ports autonegotiate both speed and duplex.
Manually set the same speed and duplex parameters for the ports on both ends of the connection to the same
values.
If a remote device does not autonegotiate, configure the duplex settings on the two ports to the same values.
The speed parameter can adjust itself even if the connected port does not autonegotiate.
Issues sometimes occur between the switch and third-party network interface cards (NICs). By default, the switch ports
and interfaces are set to autonegotiate. It is common for devices like laptops or other devices to be set to autonegotiate
as well, yet sometimes autonegotiation issues occur.
To troubleshoot autonegotiation issues, try manually setting both sides of the connection. If the issues persist, try
upgrading the NIC driver to the latest firmware or software.
Cable distance
If the port statistics show excessive FCS, late-collision, or alignment errors, verify that the cable distance from the switch
to the connected device meets the recommended guidelines.
You can display Device Manager and manage the switch through a physical
connection between one of the switch ports and your computer or laptop. This
type of management connection is referred to as the Direct Managed mode.
This mode is typically used to connect to the switch by using Device Manager
when the IP address of the switch is unknown.
Before you can access Direct Managed mode, you must make sure of the
following:
You must have physical access to the switch.
Make sure that at least one switch port is enabled and is not connected
to a device.
402
Chapter 9
403
Chapter 9
If you cannot solve an issue by reconfiguring a feature, you can restart or reset
the switch to solve the issue. If the issue exists after you reset the switch to its
default settings, it is unlikely that the switch is causing the issue.
Option
Description
Restart
This option restarts the switch without turning off power. The switch retains its saved
configuration settings during the restart process. However, Device Manager is unavailable
during the process. When the process completes, the switch displays Device Manager.
This option resets the switch, deletes the current configuration settings, returns to the
factory default settings, and then restarts the switch.
ATTENTION: When reset, the switch deletes all customized switch settings, including the IP
address, and returns the switch to the factory default settings. The same software image is
retained. You must reconfigure the basic switch settings with Express Setup.
IMPORTANT
Description
Saves any changes in the running configuration before the switch restarts.
Resets the device to the factory default settings, which deletes the current configuration settings, and then restarts
the device.
You lose connectivity with the device and must run Express Setup to reconfigure the device.
404
Chapter 9
All connections to or through the switch are closed when you reset a
module. Connection loss can result in loss of control.
From Module Properties dialog box within the Studio 5000 Logix Designer
application, do the following.
1. In the navigation pane, click Module Info.
2. To perform a switch reset (power cycle) with the current configuration
file, click Reset Module.
A password prompt appears.
3. Enter your password and click Enter.
405
Chapter 9
Before you can recover switch firmware, make sure of the following:
You have physical access to the switch.
At least one switch port is enabled and is not connected to a device.
You can recover the switch firmware if needed, such as in these scenarios:
The image is corrupted, as indicated by continuous attempts by the
switch to restart.
You deleted the image due to a failed firmware update.
You forget the switch password.
When you recover switch firmware, all configuration settings are deleted, and
the switch returns to its factory default settings.
This procedure resets the switch to its original factory settings. Any
configuration changes that you have made are lost.
2. Press and hold the Express Setup button for 10 seconds until the EIP
Mod status indicator turns red, and then immediately release the Express
Setup button.
IMPORTANT
406
Chapter 9
Troubleshoot a
Firmware Update
If you attempted to update the switch firmware but received a message that the
update failed, make sure that you still have access to the switch. If you still have
switch access, follow these steps.
1. Make sure that you downloaded the correct .tar file from
http://www.rockwellautomation.com.
2. If you downloaded the correct .tar file, refresh the browser session for
Device Manager to verify connectivity between the switch and your
computer or network drive.
If you have connectivity to the switch and Device Manager, retry the
update.
If you do not have connectivity to the switch and Device Manager,
refer to Recover the Switch Firmware on page 406.
407
Chapter 9
Notes:
408
Appendix
Data Types
Topic
Page
410
429
434
461
In the Studio 5000 Logix Designer application, predefined tags for Input and
Output data types have a structure that corresponds to the switch selected
when it was added to the I/O tree. Its members are named in accordance with
the port names.
You can disable a switch port by setting the corresponding bit in the output tag.
The output bits are applied every time that the switch receives the output data
from the controller when the controller is in Run mode. When the controller is
in Program mode, the output bits are not applied.
The port is enabled if the corresponding output bit is 0. If you enable or disable
a port by using Device Manager or the CLI, the port setting can be overridden
by the output bits the next time they are applied. The output bits always take
precedence, regardless of whether Device Manager or the CLI is used to enable
or disable the port.
409
Appendix A
Data Types
The following tables list module-defined data types for Stratix 5400 switches.
The tables include information for input (I) and output (O).
8-port Switches
Catalog number 1783-HMS4C4CGN
Table 106 - Input Data Types (8-port switches)
AB:STRATIX_5400_8PORT_MANAGED:I:0
410
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortGi1_1Connected
BOOL
Decimal
LinkStatus:1
PortGi1_2Connected
BOOL
Decimal
LinkStatus:2
PortGi1_3Connected
BOOL
Decimal
LinkStatus:3
PortGi1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortGi1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortGi1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortGi1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortGi1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
AllPortsUtilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
Valid Values
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortGi1_3Utilization
SINT
Decimal
PortGi1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
PortFa1_8Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
AlarmRelay:0
MinorAlarmRelay
BOOL
Decimal
AlarmRelay:1
MulticastGroupActive
DINT
Binary
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortGi1_1Disable
BOOL
Decimal
DisablePort:1
PortGi1_2Disable
BOOL
Decimal
DisablePort:2
PortGi1_3Disable
BOOL
Decimal
DisablePort:3
PortGi1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
411
Appendix A
Data Types
12-port Switches
Catalog numbers 1783-HMS8T4CGN,1783-HMS8S4CGN,
1783-HMS4T4E4CGN
Table 108 - Input Data Types (12-port switches)
AB:STRATIX_5400_12PORT_MANAGED:I:0
412
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortGi1_1Connected
BOOL
Decimal
LinkStatus:1
PortGi1_2Connected
BOOL
Decimal
LinkStatus:2
PortGi1_3Connected
BOOL
Decimal
LinkStatus:3
PortGi1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
PortFa1_9Connected
BOOL
Decimal
LinkStatus:9
PortFa1_10Connected
BOOL
Decimal
LinkStatus:10
PortFa1_11Connected
BOOL
Decimal
LinkStatus:11
PortFa1_12Connected
BOOL
Decimal
LinkStatus:12
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortGi1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortGi1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortFa1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortFa1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortFa1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
PortFa1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortGi1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortGi1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
Valid Values
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortFa1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortFa1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortFa1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortFa1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
AllPortsUtilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
PortGi1_3Utilization
SINT
Decimal
PortGi1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
PortFa1_8Utilization
SINT
Decimal
PortFa1_9Utilization
SINT
Decimal
PortFa1_10Utilization
SINT
Decimal
PortFa1_11Utilization
SINT
Decimal
PortFa1_12Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
AlarmRelay:0
MinorAlarmRelay
BOOL
Decimal
AlarmRelay:1
MulticastGroupActive
DINT
Binary
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortGi1_1Disable
BOOL
Decimal
DisablePort:1
PortGi1_2Disable
BOOL
Decimal
DisablePort:2
PortGi1_3Disable
BOOL
Decimal
DisablePort:3
PortGi1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
PortFa1_9Disable
BOOL
Decimal
DisablePort:9
413
Appendix A
Data Types
Type
Default Display
Style
Valid Values
PortFa1_10Disable
BOOL
Decimal
DisablePort:10
PortFa1_11Disable
BOOL
Decimal
DisablePort:11
PortFa1_12Disable
BOOL
Decimal
DisablePort:12
414
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortGi1_1Connected
BOOL
Decimal
LinkStatus:1
PortGi1_2Connected
BOOL
Decimal
LinkStatus:2
PortGi1_3Connected
BOOL
Decimal
LinkStatus:3
PortGi1_4Connected
BOOL
Decimal
LinkStatus:4
PortGi1_5Connected
BOOL
Decimal
LinkStatus:5
PortGi1_6Connected
BOOL
Decimal
LinkStatus:6
PortGi1_7Connected
BOOL
Decimal
LinkStatus:7
PortGi1_8Connected
BOOL
Decimal
LinkStatus:8
PortGi1_9Connected
BOOL
Decimal
LinkStatus:9
PortGi1_10Connected
BOOL
Decimal
LinkStatus:10
PortGi1_11Connected
BOOL
Decimal
LinkStatus:11
PortGi1_12Connected
BOOL
Decimal
LinkStatus:12
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortGi1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortGi1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortGi1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortGi1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortGi1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortGi1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortGi1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortGi1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
Valid Values
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortGi1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
PortGi1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortGi1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortGi1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortGi1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortGi1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortGi1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortGi1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortGi1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortGi1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortGi1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortGi1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
AllPortsUtilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
PortGi1_3Utilization
SINT
Decimal
PortGi1_4Utilization
SINT
Decimal
PortGi1_5Utilization
SINT
Decimal
PortGi1_6Utilization
SINT
Decimal
PortGi1_7Utilization
SINT
Decimal
PortGi1_8Utilization
SINT
Decimal
PortGi1_9Utilization
SINT
Decimal
PortGi1_10Utilization
SINT
Decimal
PortGi1_11Utilization
SINT
Decimal
PortGi1_12Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
AlarmRelay:0
MinorAlarmRelay
BOOL
Decimal
AlarmRelay:1
MulticastGroupActive
DINT
Binary
415
Appendix A
Data Types
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortGi1_1Disable
BOOL
Decimal
DisablePort:1
PortGi1_2Disable
BOOL
Decimal
DisablePort:2
PortGi1_3Disable
BOOL
Decimal
DisablePort:3
PortGi1_4Disable
BOOL
Decimal
DisablePort:4
PortGi1_5Disable
BOOL
Decimal
DisablePort:5
PortGi1_6Disable
BOOL
Decimal
DisablePort:6
PortGi1_7Disable
BOOL
Decimal
DisablePort:7
PortGi1_8Disable
BOOL
Decimal
DisablePort:8
PortGi1_9Disable
BOOL
Decimal
DisablePort:9
PortGi1_10Disable
BOOL
Decimal
DisablePort:10
PortGi1_11Disable
BOOL
Decimal
DisablePort:11
PortGi1_12Disable
BOOL
Decimal
DisablePort:12
16-port Switches
Catalog number 1783-HMS8S8E4CGN
Table 112 - Input Data Type (16-port switches)
AB:STRATIX_5400_16PORT_MANAGED:I:0
416
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortGi1_1Connected
BOOL
Decimal
LinkStatus:1
PortGi1_2Connected
BOOL
Decimal
LinkStatus:2
PortGi1_3Connected
BOOL
Decimal
LinkStatus:3
PortGi1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
PortFa1_9Connected
BOOL
Decimal
LinkStatus:9
PortFa1_10Connected
BOOL
Decimal
LinkStatus:10
PortFa1_11Connected
BOOL
Decimal
LinkStatus:11
PortFa1_12Connected
BOOL
Decimal
LinkStatus:12
PortFa1_13Connected
BOOL
Decimal
LinkStatus:13
PortFa1_14Connected
BOOL
Decimal
LinkStatus:14
Valid Values
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortFa1_15Connected
BOOL
Decimal
LinkStatus:15
PortFa1_16Connected
BOOL
Decimal
LinkStatus:16
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortGi1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortGi1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortFa1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortFa1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortFa1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
PortFa1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortFa1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortFa1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortFa1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortFa1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortGi1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortGi1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortFa1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortFa1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortFa1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortFa1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortFa1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortFa1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortFa1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortFa1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
AllPortsUtilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
417
Appendix A
Data Types
Type
Default Display
Style
Valid Values
PortGi1_2Utilization
SINT
Decimal
PortGi1_3Utilization
SINT
Decimal
PortGi1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
PortFa1_8Utilization
SINT
Decimal
PortFa1_9Utilization
SINT
Decimal
PortFa1_10Utilization
SINT
Decimal
PortFa1_11Utilization
SINT
Decimal
PortFa1_12Utilization
SINT
Decimal
PortFa1_13Utilization
SINT
Decimal
PortFa1_14Utilization
SINT
Decimal
PortFa1_15Utilization
SINT
Decimal
PortFa1_16Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
AlarmRelay:0
MinorAlarmRelay
BOOL
Decimal
AlarmRelay:1
MulticastGroupActive
DINT
Binary
418
Member Name
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortGi1_1Disable
BOOL
Decimal
DisablePort:1
PortGi1_2Disable
BOOL
Decimal
DisablePort:2
PortGi1_3Disable
BOOL
Decimal
DisablePort:3
PortGi1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
PortFa1_9Disable
BOOL
Decimal
DisablePort:9
PortFa1_10Disable
BOOL
Decimal
DisablePort:10
PortFa1_11Disable
BOOL
Decimal
DisablePort:11
PortFa1_12Disable
BOOL
Decimal
DisablePort:12
PortFa1_13Disable
BOOL
Decimal
DisablePort:13
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortFa1_14Disable
BOOL
Decimal
DisablePort:14
PortFa1_15Disable
BOOL
Decimal
DisablePort:15
PortFa1_16Disable
BOOL
Decimal
DisablePort:16
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortGi1_1Connected
BOOL
Decimal
LinkStatus:1
PortGi1_2Connected
BOOL
Decimal
LinkStatus:2
PortGi1_3Connected
BOOL
Decimal
LinkStatus:3
PortGi1_4Connected
BOOL
Decimal
LinkStatus:4
PortGi1_5Connected
BOOL
Decimal
LinkStatus:5
PortGi1_6Connected
BOOL
Decimal
LinkStatus:6
PortGi1_7Connected
BOOL
Decimal
LinkStatus:7
PortGi1_8Connected
BOOL
Decimal
LinkStatus:8
PortGi1_9Connected
BOOL
Decimal
LinkStatus:9
PortGi1_10Connected
BOOL
Decimal
LinkStatus:10
PortGi1_11Connected
BOOL
Decimal
LinkStatus:11
PortGi1_12Connected
BOOL
Decimal
LinkStatus:12
PortGi1_13Connected
BOOL
Decimal
LinkStatus:13
PortGi1_14Connected
BOOL
Decimal
LinkStatus:14
PortGi1_15Connected
BOOL
Decimal
LinkStatus:15
PortGi1_16Connected
BOOL
Decimal
LinkStatus:16
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortGi1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortGi1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortGi1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortGi1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortGi1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
Valid Values
419
Appendix A
Data Types
420
Member Name
Type
Default Display
Style
Valid Values
PortGi1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortGi1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortGi1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortGi1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
PortGi1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortGi1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortGi1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortGi1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortGi1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortGi1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortGi1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortGi1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortGi1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortGi1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortGi1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortGi1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortGi1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortGi1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortGi1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortGi1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortGi1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortGi1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortGi1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
AllPortsUtilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
PortGi1_3Utilization
SINT
Decimal
PortGi1_4Utilization
SINT
Decimal
PortGi1_5Utilization
SINT
Decimal
PortGi1_6Utilization
SINT
Decimal
PortGi1_7Utilization
SINT
Decimal
PortGi1_8Utilization
SINT
Decimal
PortGi1_9Utilization
SINT
Decimal
PortGi1_10Utilization
SINT
Decimal
PortGi1_11Utilization
SINT
Decimal
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortGi1_12Utilization
SINT
Decimal
PortGi1_13Utilization
SINT
Decimal
PortGi1_14Utilization
SINT
Decimal
PortGi1_15Utilization
SINT
Decimal
PortGi1_16Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
AlarmRelay:0
MinorAlarmRelay
BOOL
Decimal
AlarmRelay:1
MulticastGroupActive
DINT
Binary
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortGi1_1Disable
BOOL
Decimal
DisablePort:1
PortGi1_2Disable
BOOL
Decimal
DisablePort:2
PortGi1_3Disable
BOOL
Decimal
DisablePort:3
PortGi1_4Disable
BOOL
Decimal
DisablePort:4
PortGi1_5Disable
BOOL
Decimal
DisablePort:5
PortGi1_6Disable
BOOL
Decimal
DisablePort:6
PortGi1_7Disable
BOOL
Decimal
DisablePort:7
PortGi1_8Disable
BOOL
Decimal
DisablePort:8
PortGi1_9Disable
BOOL
Decimal
DisablePort:9
PortGi1_10Disable
BOOL
Decimal
DisablePort:10
PortGi1_11Disable
BOOL
Decimal
DisablePort:11
PortGi1_12Disable
BOOL
Decimal
DisablePort:12
PortGi1_13Disable
BOOL
Decimal
DisablePort:13
PortGi1_14Disable
BOOL
Decimal
DisablePort:14
PortGi1_15Disable
BOOL
Decimal
DisablePort:15
PortGi1_16Disable
BOOL
Decimal
DisablePort:16
421
Appendix A
Data Types
20-port Switches
Catalog number 1783-HMS16T4CGN
Table 116 - Input Data Type (20-port switches)
AB:STRATIX_5400_20PORT_MANAGED:I:0
422
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortGi1_1Connected
BOOL
Decimal
LinkStatus:1
PortGi1_2Connected
BOOL
Decimal
LinkStatus:2
PortGi1_3Connected
BOOL
Decimal
LinkStatus:3
PortGi1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
PortFa1_9Connected
BOOL
Decimal
LinkStatus:9
PortFa1_10Connected
BOOL
Decimal
LinkStatus:10
PortFa1_11Connected
BOOL
Decimal
LinkStatus:11
PortFa1_12Connected
BOOL
Decimal
LinkStatus:12
PortFa1_13Connected
BOOL
Decimal
LinkStatus:13
PortFa1_14Connected
BOOL
Decimal
LinkStatus:14
PortFa1_15Connected
BOOL
Decimal
LinkStatus:15
PortFa1_16Connected
BOOL
Decimal
LinkStatus:16
PortFa1_17Connected
BOOL
Decimal
LinkStatus:17
PortFa1_18Connected
BOOL
Decimal
LinkStatus:18
PortFa1_19Connected
BOOL
Decimal
LinkStatus:19
PortFa1_20Connected
BOOL
Decimal
LinkStatus:20
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortGi1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortGi1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortFa1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortFa1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortFa1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
Valid Values
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortFa1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortFa1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortFa1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortFa1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortFa1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
PortFa1_17UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:17
PortFa1_18UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:18
PortFa1_19UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:19
PortFa1_20UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:20
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortGi1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortGi1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortFa1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortFa1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortFa1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortFa1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortFa1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortFa1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortFa1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortFa1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
PortFa1_17Threshold
BOOL
Decimal
ThresholdExceeded:17
PortFa1_18Threshold
BOOL
Decimal
ThresholdExceeded:18
PortFa1_19Threshold
BOOL
Decimal
ThresholdExceeded:19
PortFa1_20Threshold
BOOL
Decimal
ThresholdExceeded:20
AllPortsUtilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
PortGi1_3Utilization
SINT
Decimal
PortGi1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
423
Appendix A
Data Types
Type
Default Display
Style
Valid Values
PortFa1_8Utilization
SINT
Decimal
PortFa1_9Utilization
SINT
Decimal
PortFa1_10Utilization
SINT
Decimal
PortFa1_11Utilization
SINT
Decimal
PortFa1_12Utilization
SINT
Decimal
PortFa1_13Utilization
SINT
Decimal
PortFa1_14Utilization
SINT
Decimal
PortFa1_15Utilization
SINT
Decimal
PortFa1_16Utilization
SINT
Decimal
PortFa1_17Utilization
SINT
Decimal
PortFa1_18Utilization
SINT
Decimal
PortFa1_19Utilization
SINT
Decimal
PortFa1_20Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
AlarmRelay:0
MinorAlarmRelay
BOOL
Decimal
AlarmRelay:1
MulticastGroupActive
DINT
Binary
424
Member Name
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortGi1_1Disable
BOOL
Decimal
DisablePort:1
PortGi1_2Disable
BOOL
Decimal
DisablePort:2
PortGi1_3Disable
BOOL
Decimal
DisablePort:3
PortGi1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
PortFa1_9Disable
BOOL
Decimal
DisablePort:9
PortFa1_10Disable
BOOL
Decimal
DisablePort:10
PortFa1_11Disable
BOOL
Decimal
DisablePort:11
PortFa1_12Disable
BOOL
Decimal
DisablePort:12
PortFa1_13Disable
BOOL
Decimal
DisablePort:13
PortFa1_14Disable
BOOL
Decimal
DisablePort:14
PortFa1_15Disable
BOOL
Decimal
DisablePort:15
PortFa1_16Disable
BOOL
Decimal
DisablePort:16
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortFa1_17Disable
BOOL
Decimal
DisablePort:17
PortFa1_18Disable
BOOL
Decimal
DisablePort:18
PortFa1_19Disable
BOOL
Decimal
DisablePort:19
PortFa1_20Disable
BOOL
Decimal
DisablePort:20
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortGi1_1Connected
BOOL
Decimal
LinkStatus:1
PortGi1_2Connected
BOOL
Decimal
LinkStatus:2
PortGi1_3Connected
BOOL
Decimal
LinkStatus:3
PortGi1_4Connected
BOOL
Decimal
LinkStatus:4
PortGi1_5Connected
BOOL
Decimal
LinkStatus:5
PortGi1_6Connected
BOOL
Decimal
LinkStatus:6
PortGi1_7Connected
BOOL
Decimal
LinkStatus:7
PortGi1_8Connected
BOOL
Decimal
LinkStatus:8
PortGi1_9Connected
BOOL
Decimal
LinkStatus:9
PortGi1_10Connected
BOOL
Decimal
LinkStatus:10
PortGi1_11Connected
BOOL
Decimal
LinkStatus:11
PortGi1_12Connected
BOOL
Decimal
LinkStatus:12
PortGi1_13Connected
BOOL
Decimal
LinkStatus:13
PortGi1_14Connected
BOOL
Decimal
LinkStatus:14
PortGi1_15Connected
BOOL
Decimal
LinkStatus:15
PortGi1_16Connected
BOOL
Decimal
LinkStatus:16
PortGi1_17Connected
BOOL
Decimal
LinkStatus:17
PortGi1_18Connected
BOOL
Decimal
LinkStatus:18
PortGi1_19Connected
BOOL
Decimal
LinkStatus:19
PortGi1_20Connected
BOOL
Decimal
LinkStatus:20
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
Valid Values
425
Appendix A
Data Types
426
Member Name
Type
Default Display
Style
Valid Values
PortGi1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortGi1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortGi1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortGi1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortGi1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortGi1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortGi1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortGi1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortGi1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
PortGi1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortGi1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortGi1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortGi1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortGi1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
PortGi1_17UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:17
PortGi1_18UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:18
PortGi1_19UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:19
PortGi1_20UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:20
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortGi1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortGi1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortGi1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortGi1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortGi1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortGi1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortGi1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortGi1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortGi1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortGi1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortGi1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortGi1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortGi1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortGi1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
PortGi1_17Threshold
BOOL
Decimal
ThresholdExceeded:17
PortGi1_18Threshold
BOOL
Decimal
ThresholdExceeded:18
PortGi1_19Threshold
BOOL
Decimal
ThresholdExceeded:19
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortGi1_20Threshold
BOOL
Decimal
ThresholdExceeded:20
AllPortsUtilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
PortGi1_3Utilization
SINT
Decimal
PortGi1_4Utilization
SINT
Decimal
PortGi1_5Utilization
SINT
Decimal
PortGi1_6Utilization
SINT
Decimal
PortGi1_7Utilization
SINT
Decimal
PortGi1_8Utilization
SINT
Decimal
PortGi1_9Utilization
SINT
Decimal
PortGi1_10Utilization
SINT
Decimal
PortGi1_11Utilization
SINT
Decimal
PortGi1_12Utilization
SINT
Decimal
PortGi1_13Utilization
SINT
Decimal
PortGi1_14Utilization
SINT
Decimal
PortGi1_15Utilization
SINT
Decimal
PortGi1_16Utilization
SINT
Decimal
PortGi1_17Utilization
SINT
Decimal
PortGi1_18Utilization
SINT
Decimal
PortGi1_19Utilization
SINT
Decimal
PortGi1_20Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
AlarmRelay:0
MinorAlarmRelay
BOOL
Decimal
AlarmRelay:1
MulticastGroupActive
DINT
Binary
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortGi1_1Disable
BOOL
Decimal
DisablePort:1
PortGi1_2Disable
BOOL
Decimal
DisablePort:2
PortGi1_3Disable
BOOL
Decimal
DisablePort:3
PortGi1_4Disable
BOOL
Decimal
DisablePort:4
PortGi1_5Disable
BOOL
Decimal
DisablePort:5
PortGi1_6Disable
BOOL
Decimal
DisablePort:6
PortGi1_7Disable
BOOL
Decimal
DisablePort:7
427
Appendix A
Data Types
428
Member Name
Type
Default Display
Style
Valid Values
PortGi1_8Disable
BOOL
Decimal
DisablePort:8
PortGi1_9Disable
BOOL
Decimal
DisablePort:9
PortGi1_10Disable
BOOL
Decimal
DisablePort:10
PortGi1_11Disable
BOOL
Decimal
DisablePort:11
PortGi1_12Disable
BOOL
Decimal
DisablePort:12
PortGi1_13Disable
BOOL
Decimal
DisablePort:13
PortGi1_14Disable
BOOL
Decimal
DisablePort:14
PortGi1_15Disable
BOOL
Decimal
DisablePort:15
PortGi1_16Disable
BOOL
Decimal
DisablePort:16
PortGi1_17Disable
BOOL
Decimal
DisablePort:17
PortGi1_18Disable
BOOL
Decimal
DisablePort:18
PortGi1_19Disable
BOOL
Decimal
DisablePort:19
PortGi1_20Disable
BOOL
Decimal
DisablePort:20
Data Types
Appendix A
The following tables list module-defined data types for Stratix 5410 switches.
The tables include information for input (I) and output (O).
Table 120 - Input Data Type
AB:STRATIX_5410_28PORT_GB_MANAGED:I:0
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortGi1_1Connected
BOOL
Decimal
LinkStatus:1
PortGi1_2Connected
BOOL
Decimal
LinkStatus:2
PortGi1_3Connected
BOOL
Decimal
LinkStatus:3
PortGi1_4Connected
BOOL
Decimal
LinkStatus:4
PortGi1_5Connected
BOOL
Decimal
LinkStatus:5
PortGi1_6Connected
BOOL
Decimal
LinkStatus:6
PortGi1_7Connected
BOOL
Decimal
LinkStatus:7
PortGi1_8Connected
BOOL
Decimal
LinkStatus:8
PortGi1_9Connected
BOOL
Decimal
LinkStatus:9
PortGi1_10Connected
BOOL
Decimal
LinkStatus:10
PortGi1_11Connected
BOOL
Decimal
LinkStatus:11
PortGi1_12Connected
BOOL
Decimal
LinkStatus:12
PortGi1_13Connected
BOOL
Decimal
LinkStatus:13
PortGi1_14Connected
BOOL
Decimal
LinkStatus:14
PortGi1_15Connected
BOOL
Decimal
LinkStatus:15
PortGi1_16Connected
BOOL
Decimal
LinkStatus:16
PortGi1_17Connected
BOOL
Decimal
LinkStatus:17
PortGi1_18Connected
BOOL
Decimal
LinkStatus:18
PortGi1_19Connected
BOOL
Decimal
LinkStatus:19
PortGi1_20Connected
BOOL
Decimal
LinkStatus:20
PortGi1_17Connected
BOOL
Decimal
LinkStatus:17
PortGi1_18Connected
BOOL
Decimal
LinkStatus:18
PortGi1_19Connected
BOOL
Decimal
LinkStatus:19
PortGi1_20Connected
BOOL
Decimal
LinkStatus:20
PortGi1_21Connected
BOOL
Decimal
LinkStatus:21
PortGi1_22Connected
BOOL
Decimal
LinkStatus:22
PortGi1_23Connected
BOOL
Decimal
LinkStatus:23
PortGi1_24Connected
BOOL
Decimal
LinkStatus:24
PortTe1_25Connected
or
PortGi1_25Connected
BOOL
Decimal
LinkStatus:25
PortTe1_26Connected
or
PortGi1_26Connected
BOOL
Decimal
LinkStatus:26
Valid Values
429
Appendix A
Data Types
430
Member Name
Type
Default Display
Style
Valid Values
PortTe1_27Connected
or
PortGi1_27Connected
BOOL
Decimal
LinkStatus:27
PortTe1_28Connected
or
PortGi1_28Connected
BOOL
Decimal
LinkStatus:28
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortGi1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortGi1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortGi1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortGi1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortGi1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortGi1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortGi1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortGi1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortGi1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
PortGi1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortGi1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortGi1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortGi1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortGi1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
PortGi1_17UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:17
PortGi1_18UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:18
PortGi1_19UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:19
PortGi1_20UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:20
PortGi1_21UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:21
PortGi1_22UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:22
PortGi1_23UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:23
PortGi1_24UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:24
PortTe1_25UnauthorizedDevice
or
PortGi1_25UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:25
PortTe1_26UnauthorizedDevice
or
PortGi1_26UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:26
PortTe1_27UnauthorizedDevice
or
PortGi1_27UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:27
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortTe1_28UnauthorizedDevice
or
PortGi1_28UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:28
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortGi1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortGi1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortGi1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortGi1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortGi1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortGi1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortGi1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortGi1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortGi1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortGi1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortGi1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortGi1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortGi1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortGi1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
PortGi1_17Threshold
BOOL
Decimal
ThresholdExceeded:17
PortGi1_18Threshold
BOOL
Decimal
ThresholdExceeded:18
PortGi1_19Threshold
BOOL
Decimal
ThresholdExceeded:19
PortGi1_20Threshold
BOOL
Decimal
ThresholdExceeded:20
PortGi1_21Threshold
BOOL
Decimal
ThresholdExceeded:21
PortGi1_22Threshold
BOOL
Decimal
ThresholdExceeded:22
PortGi1_23Threshold
BOOL
Decimal
ThresholdExceeded:23
PortGi1_24Threshold
BOOL
Decimal
ThresholdExceeded:24
PortTe1_25Threshold
or
PortGi1_25Threshold
BOOL
Decimal
ThresholdExceeded:25
PortTe1_26Threshold
or
PortGi1_26Threshold
BOOL
Decimal
ThresholdExceeded:26
PortTe1_27Threshold
or
PortGi1_27Threshold
BOOL
Decimal
ThresholdExceeded:27
PortTe1_28Threshold
or
PortGi1_28Threshold
BOOL
Decimal
ThresholdExceeded:28
AllPortsUtilization
SINT
Decimal
431
Appendix A
Data Types
432
Member Name
Type
Default Display
Style
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
PortGi1_3Utilization
SINT
Decimal
PortGi1_4Utilization
SINT
Decimal
PortGi1_5Utilization
SINT
Decimal
PortGi1_6Utilization
SINT
Decimal
PortGi1_7Utilization
SINT
Decimal
PortGi1_8Utilization
SINT
Decimal
PortGi1_9Utilization
SINT
Decimal
PortGi1_10Utilization
SINT
Decimal
PortGi1_11Utilization
SINT
Decimal
PortGi1_12Utilization
SINT
Decimal
PortGi1_13Utilization
SINT
Decimal
PortGi1_14Utilization
SINT
Decimal
PortGi1_15Utilization
SINT
Decimal
PortGi1_16Utilization
SINT
Decimal
PortGi1_17Utilization
SINT
Decimal
PortGi1_18Utilization
SINT
Decimal
PortGi1_19Utilization
SINT
Decimal
PortGi1_20Utilization
SINT
Decimal
PortGi1_21Utilization
SINT
Decimal
PortGi1_22Utilization
SINT
Decimal
PortGi1_23Utilization
SINT
Decimal
PortGi1_24Utilization
SINT
Decimal
PortTe1_25Utilization
or
PortGi1_25Utilization
SINT
Decimal
PortTe1_26Utilization
or
PortGi1_26Utilization
SINT
Decimal
PortTe1_27Utilization
or
PortGi1_27Utilization
SINT
Decimal
PortTe1_28Utilization
or
PortGi1_28Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupActive
DINT
Binary
Valid Values
AlarmRelay:0
Data Types
Appendix A
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortGi1_1Disable
BOOL
Decimal
DisablePort:1
PortGi1_2Disable
BOOL
Decimal
DisablePort:2
PortGi1_3Disable
BOOL
Decimal
DisablePort:3
PortGi1_4Disable
BOOL
Decimal
DisablePort:4
PortGi1_5Disable
BOOL
Decimal
DisablePort:5
PortGi1_6Disable
BOOL
Decimal
DisablePort:6
PortGi1_7Disable
BOOL
Decimal
DisablePort:7
PortGi1_8Disable
BOOL
Decimal
DisablePort:8
PortGi1_9Disable
BOOL
Decimal
DisablePort:9
PortGi1_10Disable
BOOL
Decimal
DisablePort:10
PortGi1_11Disable
BOOL
Decimal
DisablePort:11
PortGi1_12Disable
BOOL
Decimal
DisablePort:12
PortGi1_13Disable
BOOL
Decimal
DisablePort:13
PortGi1_14Disable
BOOL
Decimal
DisablePort:14
PortGi1_15Disable
BOOL
Decimal
DisablePort:15
PortGi1_16Disable
BOOL
Decimal
DisablePort:16
PortGi1_17Disable
BOOL
Decimal
DisablePort:17
PortGi1_18Disable
BOOL
Decimal
DisablePort:18
PortGi1_19Disable
BOOL
Decimal
DisablePort:19
PortGi1_20Disable
BOOL
Decimal
DisablePort:20
PortGi1_21Disable
BOOL
Decimal
DisablePort:21
PortGi1_22Disable
BOOL
Decimal
DisablePort:22
PortGi1_23Disable
BOOL
Decimal
DisablePort:23
PortGi1_24Disable
BOOL
Decimal
DisablePort:24
PortTe1_25Disable
or
PortGi1_25Disable
BOOL
Decimal
DisablePort:25
PortTe1_26Disable
or
PortGi1_26Disable
BOOL
Decimal
DisablePort:26
PortTe1_27Disable
or
PortGi1_27Disable
BOOL
Decimal
DisablePort:27
PortTe1_28Disable
or
PortGi1_28Disable
BOOL
Decimal
DisablePort:28
433
Appendix A
Data Types
The following tables list module-defined data types for Stratix 5700 and
ArmorStratix 5700 switches. The tables include information for input (I) and
output (O).
6-port Gb Switches
Catalog numbers 1783-BMS4S2SGL, 1783-BMS4S2SGA,1783-BMS06SGL,
1783-BM06SGA, 1783-BMS06TGL, 1783-BMS06TGA
Table 122 - Input Data Types (6-port Gb switches)
AB:STRATIX_5700_6PORT_GB_MANAGED:I:O
434
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortGi1_1Connected
BOOL
Decimal
LinkStatus:5
PortGi1_2Connected
BOOL
Decimal
LinkStatus:6
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:5
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:6
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
PortFa1_4Utilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
Valid Values
Data Types
Appendix A
Type
Default Display
Style
PortGi1_2Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
Valid Values
AlarmRelay:0
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortFa1_1Disable
BOOL
Decimal
DisablePort:1
PortFa1_2Disable
BOOL
Decimal
DisablePort:2
PortFa1_3Disable
BOOL
Decimal
DisablePort:3
PortFa1_4Disable
BOOL
Decimal
DisablePort:4
PortGi1_1Disable
BOOL
Decimal
DisablePort:5
PortGi1_2Disable
BOOL
Decimal
DisablePort:6
6-port Switches
Catalog numbers 1783-BMS06SL, 1783-BMS06SA, 1783-BMS06TL,
1783-BMS06TA
Table 124 - Input Data Type (6-port switches)
AB:STRATIX_5700_6PORT_MANAGED:I:0
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
Valid Values
435
Appendix A
Data Types
Type
Default Display
Style
Valid Values
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
PortFa1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
AlarmRelay:0
436
Member Name
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortFa1_1Disable
BOOL
Decimal
DisablePort:1
PortFa1_2Disable
BOOL
Decimal
DisablePort:2
PortFa1_3Disable
BOOL
Decimal
DisablePort:3
PortFa1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
Data Types
Appendix A
8-port Switches
Catalog number 1783-ZMS8TA
Table 126 - Input Data Type (8-port switches)
AB:STRATIX_5700_8PORT_MANAGED:I:0
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:5
PortFa1_8Connected
BOOL
Decimal
LinkStatus:6
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:6
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
PortFa1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
Valid Values
437
Appendix A
Data Types
Type
Default Display
Style
PortFa1_7Utilization
SINT
Decimal
PortFa1_8Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
Valid Values
AlarmRelay:0
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortFa1_1Disable
BOOL
Decimal
DisablePort:1
PortFa1_2Disable
BOOL
Decimal
DisablePort:2
PortFa1_3Disable
BOOL
Decimal
DisablePort:3
PortFa1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
10-port Gb Switches
Catalog numbers 1783-BMS10CGL, 1783-BMS10CGA, 1783BMS10CGN, 1783-BMS10CGP, 1783-ZMS4T4E2TGN, 1783ZMS4T4E2TGP
Table 128 - Input Data Type (10-port Gb switches)
AB:STRATIX_5700_10PORT_GB_MANAGED:I:0
438
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
Valid Values
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortGi1_1Connected
BOOL
Decimal
LinkStatus:9
PortGi1_2Connected
BOOL
Decimal
LinkStatus:10
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:9
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:10
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
PortFa1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
PortFa1_8Utilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
AlarmRelay:0
439
Appendix A
Data Types
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortFa1_1Disable
BOOL
Decimal
DisablePort:1
PortFa1_2Disable
BOOL
Decimal
DisablePort:2
PortFa1_3Disable
BOOL
Decimal
DisablePort:3
PortFa1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
PortGi1_1Disable
BOOL
Decimal
DisablePort:9
PortGi1_2Disable
BOOL
Decimal
DisablePort:10
10-port Switches
Catalog numbers 1783-BMS10CL, 1783-BMS10CA
Table 130 - Input Data Type (10-port switches)
AB:STRATIX_5700_10PORT_MANAGED:I:0
440
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
PortFa1_9Connected
BOOL
Decimal
LinkStatus:9
PortFa1_10Connected
BOOL
Decimal
LinkStatus:10
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
Valid Values
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortFa1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortFa1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortFa1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortFa1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
PortFa1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
PortFa1_8Utilization
SINT
Decimal
PortFa1_9Utilization
SINT
Decimal
PortFa1_10Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
AlarmRelay:0
441
Appendix A
Data Types
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortFa1_1Disable
BOOL
Decimal
DisablePort:1
PortFa1_2Disable
BOOL
Decimal
DisablePort:2
PortFa1_3Disable
BOOL
Decimal
DisablePort:3
PortFa1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
PortFa1_9Disable
BOOL
Decimal
DisablePort:9
PortFa1_10Disable
BOOL
Decimal
DisablePort:10
16-port Switches
Catalog number 1783-ZMS16TA
Table 132 - Input Data Type (16-port switches)
AB:STRATIX_5700_16PORT_MANAGED:I:0
442
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
PortFa1_9Connected
BOOL
Decimal
LinkStatus:9
PortFa1_10Connected
BOOL
Decimal
LinkStatus:10
PortFa1_11Connected
BOOL
Decimal
LinkStatus:11
PortFa1_12Connected
BOOL
Decimal
LinkStatus:12
PortFa1_13Connected
BOOL
Decimal
LinkStatus:13
PortFa1_14Connected
BOOL
Decimal
LinkStatus:14
PortFa1_15Connected
BOOL
Decimal
LinkStatus:15
PortFa1_16Connected
BOOL
Decimal
LinkStatus:16
Valid Values
Data Types
Appendix A
Type
Default Display
Style
Valid Values
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortFa1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortFa1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortFa1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
PortFa1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortFa1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortFa1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortFa1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortFa1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortFa1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortFa1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortFa1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortFa1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortFa1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortFa1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortFa1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortFa1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
443
Appendix A
Data Types
Type
Default Display
Style
PortFa1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
PortFa1_8Utilization
SINT
Decimal
PortFa1_9Utilization
SINT
Decimal
PortFa1_10Utilization
SINT
Decimal
PortFa1_11Utilization
SINT
Decimal
PortFa1_12Utilization
SINT
Decimal
PortFa1_13Utilization
SINT
Decimal
PortFa1_14Utilization
SINT
Decimal
PortFa1_15Utilization
SINT
Decimal
PortFa1_16Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
Valid Values
AlarmRelay:0
444
Member Name
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortFa1_1Disable
BOOL
Decimal
DisablePort:1
PortFa1_2Disable
BOOL
Decimal
DisablePort:2
PortFa1_3Disable
BOOL
Decimal
DisablePort:3
PortFa1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
PortFa1_9Disable
BOOL
Decimal
DisablePort:9
PortFa1_10Disable
BOOL
Decimal
DisablePort:10
PortFa1_11Disable
BOOL
Decimal
DisablePort:11
PortFa1_12Disable
BOOL
Decimal
DisablePort:12
PortFa1_13Disable
BOOL
Decimal
DisablePort:13
PortFa1_14Disable
BOOL
Decimal
DisablePort:14
PortFa1_15Disable
BOOL
Decimal
DisablePort:15
PortFa1_16Disable
BOOL
Decimal
DisablePort:16
Data Types
Appendix A
20-port Gb Switches
Catalog numbers 1783-BMS20CGL, 1783-BMS20CGN, 1783-BMS20CGP,
1783-BMS20CGPK
Table 134 - Input Data Type (20-port Gb switches)
AB:STRATIX_5700_20PORT_GB_MANAGED:I:0
Member Name
Type
Default
Display Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
PortFa1_9Connected
BOOL
Decimal
LinkStatus:9
PortFa1_10Connected
BOOL
Decimal
LinkStatus:10
PortFa1_11Connected
BOOL
Decimal
LinkStatus:11
PortFa1_12Connected
BOOL
Decimal
LinkStatus:12
PortFa1_13Connected
BOOL
Decimal
LinkStatus:13
PortFa1_14Connected
BOOL
Decimal
LinkStatus:14
PortFa1_15Connected
BOOL
Decimal
LinkStatus:15
PortFa1_16Connected
BOOL
Decimal
LinkStatus:16
PortFa1_17Connected
BOOL
Decimal
LinkStatus:17
PortFa1_18Connected
BOOL
Decimal
LinkStatus:18
PortGi1_1Connected
BOOL
Decimal
LinkStatus:19
PortGi1_2Connected
BOOL
Decimal
LinkStatus:20
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortFa1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortFa1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortFa1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
Valid Values
445
Appendix A
Data Types
446
Member Name
Type
Default
Display Style
Valid Values
PortFa1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortFa1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortFa1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortFa1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortFa1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
PortFa1_17UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:17
PortFa1_18UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:18
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:19
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:20
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortFa1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortFa1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortFa1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortFa1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortFa1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortFa1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortFa1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortFa1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
PortFa1_17Threshold
BOOL
Decimal
ThresholdExceeded:17
PortFa1_18Threshold
BOOL
Decimal
ThresholdExceeded:18
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:19
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:20
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
PortFa1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
Data Types
Appendix A
Type
Default
Display Style
PortFa1_8Utilization
SINT
Decimal
PortFa1_9Utilization
SINT
Decimal
PortFa1_10Utilization
SINT
Decimal
PortFa1_11Utilization
SINT
Decimal
PortFa1_12Utilization
SINT
Decimal
PortFa1_13Utilization
SINT
Decimal
PortFa1_14Utilization
SINT
Decimal
PortFa1_15Utilization
SINT
Decimal
PortFa1_16Utilization
SINT
Decimal
PortFa1_17Utilization
SINT
Decimal
PortFa1_18Utilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
Valid Values
AlarmRelay:0
18-port Gb Switches
Catalog numbers 1783-BMS12T4E2CGNK, 1783-BMS12T4E2CGP,
1783-BMS12T4E2CGL, 1783-ZMS8T8E2TGN, 1783-ZMS8T8E2TGP
Table 135 - Input Data Type (18-port Gb switches)
AB:STRATIX_5700_18PORT_GB_MANAGED:I:0
Member Name
Type
Default
Display Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
PortFa1_9Connected
BOOL
Decimal
LinkStatus:9
PortFa1_10Connected
BOOL
Decimal
LinkStatus:10
PortFa1_11Connected
BOOL
Decimal
LinkStatus:11
Valid Values
447
Appendix A
Data Types
448
Member Name
Type
Default
Display Style
Valid Values
PortFa1_12Connected
BOOL
Decimal
LinkStatus:12
PortFa1_13Connected
BOOL
Decimal
LinkStatus:13
PortFa1_14Connected
BOOL
Decimal
LinkStatus:14
PortFa1_15Connected
BOOL
Decimal
LinkStatus:15
PortFa1_16Connected
BOOL
Decimal
LinkStatus:16
PortGi1_1Connected
BOOL
Decimal
LinkStatus:19
PortGi1_2Connected
BOOL
Decimal
LinkStatus:20
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortFa1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortFa1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortFa1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
PortFa1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortFa1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortFa1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortFa1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortFa1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:19
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:20
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortFa1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortFa1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortFa1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
Data Types
Appendix A
Type
Default
Display Style
Valid Values
PortFa1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortFa1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortFa1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortFa1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortFa1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:19
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:20
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
PortFa1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
PortFa1_8Utilization
SINT
Decimal
PortFa1_9Utilization
SINT
Decimal
PortFa1_10Utilization
SINT
Decimal
PortFa1_11Utilization
SINT
Decimal
PortFa1_12Utilization
SINT
Decimal
PortFa1_13Utilization
SINT
Decimal
PortFa1_14Utilization
SINT
Decimal
PortFa1_15Utilization
SINT
Decimal
PortFa1_16Utilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
AlarmRelay:0
449
Appendix A
Data Types
450
Member Name
Type
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortFa1_1Disable
BOOL
Decimal
DisablePort:1
PortFa1_2Disable
BOOL
Decimal
DisablePort:2
PortFa1_3Disable
BOOL
Decimal
DisablePort:3
PortFa1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
PortFa1_9Disable
BOOL
Decimal
DisablePort:9
PortFa1_10Disable
BOOL
Decimal
DisablePort:10
PortFa1_11Disable
BOOL
Decimal
DisablePort:11
PortFa1_12Disable
BOOL
Decimal
DisablePort:12
PortFa1_13Disable
BOOL
Decimal
DisablePort:13
PortFa1_14Disable
BOOL
Decimal
DisablePort:14
PortFa1_15Disable
BOOL
Decimal
DisablePort:15
PortFa1_16Disable
BOOL
Decimal
DisablePort:16
PortGi1_1Disable
BOOL
Decimal
DisablePort:19
PortGi1_2Disable
BOOL
Decimal
DisablePort:20
Data Types
Appendix A
20-port Gb Switches
Catalog numbers 1783-BMS20CGL, 1783-BMS20CGN, 1783-BMS20CGP,
1783-BMS20CGPK
Table 137 - Input Data Type (20-port Gb switches)
AB:STRATIX_5700_20PORT_GB_MANAGED:I:0
Member Name
Type
Default
Display Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
PortFa1_9Connected
BOOL
Decimal
LinkStatus:9
PortFa1_10Connected
BOOL
Decimal
LinkStatus:10
PortFa1_11Connected
BOOL
Decimal
LinkStatus:11
PortFa1_12Connected
BOOL
Decimal
LinkStatus:12
PortFa1_13Connected
BOOL
Decimal
LinkStatus:13
PortFa1_14Connected
BOOL
Decimal
LinkStatus:14
PortFa1_15Connected
BOOL
Decimal
LinkStatus:15
PortFa1_16Connected
BOOL
Decimal
LinkStatus:16
PortFa1_17Connected
BOOL
Decimal
LinkStatus:17
PortFa1_18Connected
BOOL
Decimal
LinkStatus:18
PortGi1_1Connected
BOOL
Decimal
LinkStatus:19
PortGi1_2Connected
BOOL
Decimal
LinkStatus:20
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortFa1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortFa1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortFa1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
Valid Values
451
Appendix A
Data Types
452
Member Name
Type
Default
Display Style
Valid Values
PortFa1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortFa1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortFa1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortFa1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortFa1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
PortFa1_17UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:17
PortFa1_18UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:18
PortGi1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:19
PortGi1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:20
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortFa1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortFa1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortFa1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortFa1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortFa1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortFa1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortFa1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortFa1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
PortFa1_17Threshold
BOOL
Decimal
ThresholdExceeded:17
PortFa1_18Threshold
BOOL
Decimal
ThresholdExceeded:18
PortGi1_1Threshold
BOOL
Decimal
ThresholdExceeded:19
PortGi1_2Threshold
BOOL
Decimal
ThresholdExceeded:20
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
PortFa1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
Data Types
Appendix A
Type
Default
Display Style
PortFa1_8Utilization
SINT
Decimal
PortFa1_9Utilization
SINT
Decimal
PortFa1_10Utilization
SINT
Decimal
PortFa1_11Utilization
SINT
Decimal
PortFa1_12Utilization
SINT
Decimal
PortFa1_13Utilization
SINT
Decimal
PortFa1_14Utilization
SINT
Decimal
PortFa1_15Utilization
SINT
Decimal
PortFa1_16Utilization
SINT
Decimal
PortFa1_17Utilization
SINT
Decimal
PortFa1_18Utilization
SINT
Decimal
PortGi1_1Utilization
SINT
Decimal
PortGi1_2Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
Valid Values
AlarmRelay:0
Type
Default
Display Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortFa1_1Disable
BOOL
Decimal
DisablePort:1
PortFa1_2Disable
BOOL
Decimal
DisablePort:2
PortFa1_3Disable
BOOL
Decimal
DisablePort:3
PortFa1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
PortFa1_9Disable
BOOL
Decimal
DisablePort:9
PortFa1_10Disable
BOOL
Decimal
DisablePort:10
PortFa1_11Disable
BOOL
Decimal
DisablePort:11
PortFa1_12Disable
BOOL
Decimal
DisablePort:12
PortFa1_13Disable
BOOL
Decimal
DisablePort:13
PortFa1_14Disable
BOOL
Decimal
DisablePort:14
PortFa1_15Disable
BOOL
Decimal
DisablePort:15
PortFa1_16Disable
BOOL
Decimal
DisablePort:16
PortFa1_17Disable
BOOL
Decimal
DisablePort:17
453
Appendix A
Data Types
Type
Default
Display Style
Valid Values
PortFa1_18Disable
BOOL
Decimal
DisablePort:18
PortGi1_1Disable
BOOL
Decimal
DisablePort:19
PortGi1_2Disable
BOOL
Decimal
DisablePort:20
20-port Switches
Catalog numbers 1783-BMS20CL, 1783-BMS20CA
Table 139 - Input Data Type (20-port switches)
AB:STRATIX_5700_20PORT_MANAGED:I:0
454
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
PortFa1_9Connected
BOOL
Decimal
LinkStatus:9
PortFa1_10Connected
BOOL
Decimal
LinkStatus:10
PortFa1_11Connected
BOOL
Decimal
LinkStatus:11
PortFa1_12Connected
BOOL
Decimal
LinkStatus:12
PortFa1_13Connected
BOOL
Decimal
LinkStatus:13
PortFa1_14Connected
BOOL
Decimal
LinkStatus:14
PortFa1_15Connected
BOOL
Decimal
LinkStatus:15
PortFa1_16Connected
BOOL
Decimal
LinkStatus:16
PortFa1_17Connected
BOOL
Decimal
LinkStatus:17
PortFa1_18Connected
BOOL
Decimal
LinkStatus:18
PortFa1_19Connected
BOOL
Decimal
LinkStatus:19
PortFa1_20Connected
BOOL
Decimal
LinkStatus:20
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
Valid Values
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortFa1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortFa1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortFa1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
PortFa1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortFa1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortFa1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortFa1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortFa1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
PortFa1_17UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:17
PortFa1_18UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:18
PortFa1_19UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:19
PortFa1_20UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:20
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortFa1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortFa1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortFa1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortFa1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortFa1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortFa1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortFa1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortFa1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
PortFa1_17Threshold
BOOL
Decimal
ThresholdExceeded:17
PortFa1_18Threshold
BOOL
Decimal
ThresholdExceeded:18
PortFa1_19Threshold
BOOL
Decimal
ThresholdExceeded:19
PortFa1_20Threshold
BOOL
Decimal
ThresholdExceeded:20
455
Appendix A
Data Types
Type
Default Display
Style
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
PortFa1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
PortFa1_8Utilization
SINT
Decimal
PortFa1_9Utilization
SINT
Decimal
PortFa1_10Utilization
SINT
Decimal
PortFa1_11Utilization
SINT
Decimal
PortFa1_12Utilization
SINT
Decimal
PortFa1_13Utilization
SINT
Decimal
PortFa1_14Utilization
SINT
Decimal
PortFa1_15Utilization
SINT
Decimal
PortFa1_16Utilization
SINT
Decimal
PortFa1_17Utilization
SINT
Decimal
PortFa1_18Utilization
SINT
Decimal
PortFa1_19Utilization
SINT
Decimal
PortFa1_20Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
Valid Values
AlarmRelay:0
456
Member Name
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortFa1_1Disable
BOOL
Decimal
DisablePort:1
PortFa1_2Disable
BOOL
Decimal
DisablePort:2
PortFa1_3Disable
BOOL
Decimal
DisablePort:3
PortFa1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
PortFa1_9Disable
BOOL
Decimal
DisablePort:9
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortFa1_10Disable
BOOL
Decimal
DisablePort:10
PortFa1_11Disable
BOOL
Decimal
DisablePort:11
PortFa1_12Disable
BOOL
Decimal
DisablePort:12
PortFa1_13Disable
BOOL
Decimal
DisablePort:13
PortFa1_14Disable
BOOL
Decimal
DisablePort:14
PortFa1_15Disable
BOOL
Decimal
DisablePort:15
PortFa1_16Disable
BOOL
Decimal
DisablePort:16
PortFa1_17Disable
BOOL
Decimal
DisablePort:17
PortFa1_18Disable
BOOL
Decimal
DisablePort:18
PortFa1_19Disable
BOOL
Decimal
DisablePort:19
PortFa1_20Disable
BOOL
Decimal
DisablePort:20
Valid Values
24-port Switches
Catalog number 1783-ZMS24TA
Table 141 - Input Data Type (24-port switches)
AB:STRATIX_5700_24PORT_MANAGED:I:0
Member Name
Type
Default Display
Style
Fault
DINT
Binary
AnyPortConnected
BOOL
Decimal
LinkStatus:0
PortFa1_1Connected
BOOL
Decimal
LinkStatus:1
PortFa1_2Connected
BOOL
Decimal
LinkStatus:2
PortFa1_3Connected
BOOL
Decimal
LinkStatus:3
PortFa1_4Connected
BOOL
Decimal
LinkStatus:4
PortFa1_5Connected
BOOL
Decimal
LinkStatus:5
PortFa1_6Connected
BOOL
Decimal
LinkStatus:6
PortFa1_7Connected
BOOL
Decimal
LinkStatus:7
PortFa1_8Connected
BOOL
Decimal
LinkStatus:8
PortFa1_9Connected
BOOL
Decimal
LinkStatus:9
PortFa1_10Connected
BOOL
Decimal
LinkStatus:10
PortFa1_11Connected
BOOL
Decimal
LinkStatus:11
PortFa1_12Connected
BOOL
Decimal
LinkStatus:12
PortFa1_13Connected
BOOL
Decimal
LinkStatus:13
PortFa1_14Connected
BOOL
Decimal
LinkStatus:14
PortFa1_15Connected
BOOL
Decimal
LinkStatus:15
PortFa1_16Connected
BOOL
Decimal
LinkStatus:16
457
Appendix A
Data Types
458
Member Name
Type
Default Display
Style
Valid Values
PortFa1_17Connected
BOOL
Decimal
LinkStatus:17
PortFa1_18Connected
BOOL
Decimal
LinkStatus:18
PortFa1_19Connected
BOOL
Decimal
LinkStatus:19
PortFa1_20Connected
BOOL
Decimal
LinkStatus:20
PortFa1_21Connected
BOOL
Decimal
LinkStatus:21
PortFa1_22Connected
BOOL
Decimal
LinkStatus:22
PortFa1_23Connected
BOOL
Decimal
LinkStatus:23
PortFa1_24Connected
BOOL
Decimal
LinkStatus:24
AnyPortUnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:0
PortFa1_1UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:1
PortFa1_2UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:2
PortFa1_3UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:3
PortFa1_4UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:4
PortFa1_5UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:5
PortFa1_6UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:6
PortFa1_7UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:7
PortFa1_8UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:8
PortFa1_9UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:9
PortFa1_10UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:10
PortFa1_11UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:11
PortFa1_12UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:12
PortFa1_13UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:13
PortFa1_14UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:14
PortFa1_15UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:15
PortFa1_16UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:16
PortFa1_17UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:17
PortFa1_18UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:18
PortFa1_19UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:19
PortFa1_20UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:20
PortFa1_21UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:21
PortFa1_22UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:22
PortFa1_23UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:23
PortFa1_24UnauthorizedDevice
BOOL
Decimal
UnauthorizedDevice:24
AnyPortThreshold
BOOL
Decimal
ThresholdExceeded:0
PortFa1_1Threshold
BOOL
Decimal
ThresholdExceeded:1
PortFa1_2Threshold
BOOL
Decimal
ThresholdExceeded:2
PortFa1_3Threshold
BOOL
Decimal
ThresholdExceeded:3
PortFa1_4Threshold
BOOL
Decimal
ThresholdExceeded:4
Data Types
Appendix A
Type
Default Display
Style
Valid Values
PortFa1_5Threshold
BOOL
Decimal
ThresholdExceeded:5
PortFa1_6Threshold
BOOL
Decimal
ThresholdExceeded:6
PortFa1_7Threshold
BOOL
Decimal
ThresholdExceeded:7
PortFa1_8Threshold
BOOL
Decimal
ThresholdExceeded:8
PortFa1_9Threshold
BOOL
Decimal
ThresholdExceeded:9
PortFa1_10Threshold
BOOL
Decimal
ThresholdExceeded:10
PortFa1_11Threshold
BOOL
Decimal
ThresholdExceeded:11
PortFa1_12Threshold
BOOL
Decimal
ThresholdExceeded:12
PortFa1_13Threshold
BOOL
Decimal
ThresholdExceeded:13
PortFa1_14Threshold
BOOL
Decimal
ThresholdExceeded:14
PortFa1_15Threshold
BOOL
Decimal
ThresholdExceeded:15
PortFa1_16Threshold
BOOL
Decimal
ThresholdExceeded:16
PortFa1_17Threshold
BOOL
Decimal
ThresholdExceeded:17
PortFa1_18Threshold
BOOL
Decimal
ThresholdExceeded:18
PortFa1_19Threshold
BOOL
Decimal
ThresholdExceeded:19
PortFa1_20Threshold
BOOL
Decimal
ThresholdExceeded:20
PortFa1_21Threshold
BOOL
Decimal
ThresholdExceeded:21
PortFa1_22Threshold
BOOL
Decimal
ThresholdExceeded:22
PortFa1_23Threshold
BOOL
Decimal
ThresholdExceeded:23
PortFa1_24Threshold
BOOL
Decimal
ThresholdExceeded:24
AllPortsUtilization
SINT
Decimal
PortFa1_1Utilization
SINT
Decimal
PortFa1_2Utilization
SINT
Decimal
PortFa1_3Utilization
SINT
Decimal
PortFa1_4Utilization
SINT
Decimal
PortFa1_5Utilization
SINT
Decimal
PortFa1_6Utilization
SINT
Decimal
PortFa1_7Utilization
SINT
Decimal
PortFa1_8Utilization
SINT
Decimal
PortFa1_9Utilization
SINT
Decimal
PortFa1_10Utilization
SINT
Decimal
PortFa1_11Utilization
SINT
Decimal
PortFa1_12Utilization
SINT
Decimal
PortFa1_13Utilization
SINT
Decimal
PortFa1_14Utilization
SINT
Decimal
PortFa1_15Utilization
SINT
Decimal
PortFa1_16Utilization
SINT
Decimal
PortFa1_17Utilization
SINT
Decimal
459
Appendix A
Data Types
Type
Default Display
Style
PortFa1_18Utilization
SINT
Decimal
PortFa1_19Utilization
SINT
Decimal
PortFa1_20Utilization
SINT
Decimal
PortFa1_21Utilization
SINT
Decimal
PortFa1_22Utilization
SINT
Decimal
PortFa1_23Utilization
SINT
Decimal
PortFa1_24Utilization
SINT
Decimal
MajorAlarmRelay
BOOL
Decimal
MulticastGroupsActive
DINT
Binary
Valid Values
AlarmRelay:0
460
Member Name
Type
Default Display
Style
Valid Values
AllPortsDisabled
BOOL
Decimal
DisablePort:0
PortFa1_1Disable
BOOL
Decimal
DisablePort:1
PortFa1_2Disable
BOOL
Decimal
DisablePort:2
PortFa1_3Disable
BOOL
Decimal
DisablePort:3
PortFa1_4Disable
BOOL
Decimal
DisablePort:4
PortFa1_5Disable
BOOL
Decimal
DisablePort:5
PortFa1_6Disable
BOOL
Decimal
DisablePort:6
PortFa1_7Disable
BOOL
Decimal
DisablePort:7
PortFa1_8Disable
BOOL
Decimal
DisablePort:8
PortFa1_9Disable
BOOL
Decimal
DisablePort:9
PortFa1_10Disable
BOOL
Decimal
DisablePort:10
PortFa1_11Disable
BOOL
Decimal
DisablePort:11
PortFa1_12Disable
BOOL
Decimal
DisablePort:12
PortFa1_13Disable
BOOL
Decimal
DisablePort:13
PortFa1_14Disable
BOOL
Decimal
DisablePort:14
PortFa1_15Disable
BOOL
Decimal
DisablePort:15
PortFa1_16Disable
BOOL
Decimal
DisablePort:16
PortFa1_17Disable
BOOL
Decimal
DisablePort:17
PortFa1_18Disable
BOOL
Decimal
DisablePort:18
PortFa1_19Disable
BOOL
Decimal
DisablePort:19
PortFa1_20Disable
BOOL
Decimal
DisablePort:20
PortFa1_21Disable
BOOL
Decimal
DisablePort:21
Data Types
Appendix A
Member Name
Type
Default Display
Style
Valid Values
PortFa1_22Disable
BOOL
Decimal
DisablePort:22
PortFa1_23Disable
BOOL
Decimal
DisablePort:23
PortFa1_24Disable
BOOL
Decimal
DisablePort:24
The following tables show input and output data types for all 26 ports of the
switch, as well as port assignments for data types.
Table 143 - Input Data Types
Tag Name
Type
Description
Fault
DINT
AnyPortConnected
BOOL
PortGi1_1Connected
BOOL
PortGi1_2Connected
BOOL
PortFa1_1Connected
BOOL
PortFa1_2Connected
BOOL
PortFa1_3Connected
BOOL
PortFa1_4Connected
BOOL
PortFa1_5Connected
BOOL
PortFa1_6Connected
BOOL
PortFa1_7Connected
BOOL
PortFa1_8Connected
BOOL
PortFa2_1Connected
BOOL
PortFa2_2Connected
BOOL
PortFa2_3Connected
BOOL
PortFa2_4Connected
BOOL
PortFa2_5Connected
BOOL
PortFa2_6Connected
BOOL
PortFa2_7Connected
BOOL
PortFa2_8Connected
BOOL
PortFa3_1Connected
BOOL
PortFa3_2Connected
BOOL
PortFa3_3Connected
BOOL
PortFa3_4Connected
BOOL
PortFa3_5Connected
BOOL
PortFa3_6Connected
BOOL
PortFa3_7Connected
BOOL
PortFa3_8Connected
BOOL
461
Appendix A
Data Types
462
Tag Name
Type
Description
AnyPortUnauthorizedDevice
BOOL
PortGi1_1UnauthorizedDevice
BOOL
PortGi1_2UnauthorizedDevice
BOOL
PortFa1_1UnauthorizedDevice
BOOL
PortFa1_2UnauthorizedDevice
BOOL
PortFa1_3UnauthorizedDevice
BOOL
PortFa1_4UnauthorizedDevice
BOOL
PortFa1_5UnauthorizedDevice
BOOL
PortFa1_6UnauthorizedDevice
BOOL
PortFa1_7UnauthorizedDevice
BOOL
PortFa1_8UnauthorizedDevice
BOOL
PortFa2_1UnauthorizedDevice
BOOL
PortFa2_2UnauthorizedDevice
BOOL
PortFa2_3UnauthorizedDevice
BOOL
PortFa2_4UnauthorizedDevice
BOOL
PortFa2_5UnauthorizedDevice
BOOL
PortFa2_6UnauthorizedDevice
BOOL
PortFa2_7UnauthorizedDevice
BOOL
PortFa2_8UnauthorizedDevice
BOOL
PortFa3_1UnauthorizedDevice
BOOL
PortFa3_2UnauthorizedDevice
BOOL
PortFa3_3UnauthorizedDevice
BOOL
PortFa3_4UnauthorizedDevice
BOOL
PortFa3_5UnauthorizedDevice
BOOL
PortFa3_6UnauthorizedDevice
BOOL
PortFa3_7UnauthorizedDevice
BOOL
PortFa3_8UnauthorizedDevice
BOOL
AnyPortThreshold
BOOL
Data Types
Appendix A
Type
Description
PortGi1_1Threshold
BOOL
PortGi1_2Threshold
BOOL
PortFa1_1Threshold
BOOL
PortFa1_2Threshold
BOOL
PortFa1_3Threshold
BOOL
PortFa1_4Threshold
BOOL
PortFa1_5Threshold
BOOL
PortFa1_6Threshold
BOOL
PortFa1_7Threshold
BOOL
PortFa1_8Threshold
BOOL
PortFa2_1Threshold
BOOL
PortFa2_2Threshold
BOOL
PortFa2_3Threshold
BOOL
PortFa2_4Threshold
BOOL
PortFa2_5Threshold
BOOL
PortFa2_6Threshold
BOOL
PortFa2_7Threshold
BOOL
PortFa2_8Threshold
BOOL
PortFa3_1Threshold
BOOL
PortFa3_2Threshold
BOOL
PortFa3_3Threshold
BOOL
PortFa3_4Threshold
BOOL
PortFa3_5Threshold
BOOL
PortFa3_6Threshold
BOOL
PortFa3_7Threshold
BOOL
PortFa3_8Threshold
BOOL
AllPortsUtilization
SINT
463
Appendix A
Data Types
464
Tag Name
Type
Description
PortGi1_1Utilization;
SINT
PortGi1_2Utilization;
SINT
PortFa1_1Utilization;
SINT
PortFa1_2Utilization;
SINT
PortFa1_3Utilization;
SINT
PortFa1_4Utilization;
SINT
PortFa1_5Utilization;
SINT
PortFa1_6Utilization;
SINT
PortFa1_7Utilization;
SINT
PortFa1_8Utilization;
SINT
PortFa2_1Utilization;
SINT
PortFa2_2Utilization;
SINT
PortFa2_3Utilization;
SINT
PortFa2_4Utilization;
SINT
PortFa2_5Utilization;
SINT
PortFa2_6Utilization;
SINT
PortFa2_7Utilization;
SINT
PortFa2_8Utilization;
SINT
PortFa3_1Utilization;
SINT
PortFa3_2Utilization;
SINT
PortFa3_3Utilization;
SINT
PortFa3_4Utilization;
SINT
PortFa3_5Utilization;
SINT
PortFa3_6Utilization;
SINT
PortFa3_7Utilization;
SINT
PortFa3_8Utilization;
SINT
MajorAlarmRelay
BOOL
MinorAlarmRelay
BOOL
MulticastGroupsActive
DINT
Data Types
Appendix A
Type
Description
AllPortsDisable
BOOL
PortGi1_1Disable
BOOL
PortGi1_2Disable
BOOL
PortFa1_1Disable
BOOL
PortFa1_2Disable
BOOL
PortFa1_3Disable
BOOL
PortFa1_4Disable
BOOL
PortFa1_5Disable
BOOL
PortFa1_6Disable
BOOL
PortFa1_7Disable
BOOL
PortFa1_8Disable
BOOL
PortFa2_1Disable
BOOL
PortFa2_2Disable
BOOL
PortFa2_3Disable
BOOL
PortFa2_4Disable
BOOL
PortFa2_5Disable
BOOL
PortFa2_6Disable
BOOL
PortFa2_7Disable
BOOL
PortFa2_8Disable
BOOL
PortFa3_1Disable
BOOL
PortFa3_2Disable
BOOL
PortFa3_3Disable
BOOL
PortFa3_4Disable
BOOL
PortFa3_5Disable
BOOL
PortFa3_6Disable
BOOL
PortFa3_7Disable
BOOL
PortFa3_8Disable
BOOL
465
Appendix A
Data Types
Notes:
466
Appendix
Topic
Page
468
470
471
472
473
The following tables identify the instance numbers of the Ethernet link objects
that are associated with each port on the switch. Instance 0 does not apply to all
ports as it does for bit maps.
The bit numbers identify each port when they are contained in a structure of
all ports, such as in the output assembly. Bit 0 refers to any or all ports.
467
Appendix B
Stratix 5400
Port Assignments
Table 145 - 8- and 12-port Switches
Bit
468
0 Any/All ports
Any/All ports
Any/All ports
Any/All ports
Any/All ports
Any/All ports
Any/All ports
1 Gi1/1
Gi1/1
Gi1/1
Gi1/1
Gi1/1
Gi1/1
Gi1/1
2 Gi1/2
Gi1/2
Gi1/2
Gi1/2
Gi1/2
Gi1/2
Gi1/2
3 Gi1/3
Gi1/3
Gi1/3
Gi1/3
Gi1/3
Gi1/3
Gi1/3
4 Gi1/4
Gi1/4
Gi1/4
Gi1/4
Gi1/4
Gi1/4
Gi1/4
5 Fa1/5
Fa1/5
Fa1/5
Fa1/5
Gi1/5
Gi1/5
Gi1/5
6 Fa1/6
Fa1/6
Fa1/6
Fa1/6
Gi1/6
Gi1/6
Gi1/6
7 Fa1/7
Fa1/7
Fa1/7
Fa1/7
Gi1/7
Gi1/7
Gi1/7
8 Fa1/8
Fa1/8
Fa1/8
Fa1/8
Gi1/8
Gi1/8
Gi1/8
Fa1/9
Fa1/9
Fa1/9
Gi1/9
Gi1/9
Gi1/9
10
Fa1/10
Fa1/10
Fa1/10
Gi1/10
Gi1/10
Gi1/10
11
Fa1/11
Fa1/11
Fa1/11
Gi1/11
Gi1/11
Gi1/11
12
Fa1/12
Fa1/12
Fa1/12
Gi1/12
Gi1/12
Gi1/12
27 SVI1
SVI1
SVI1
SVI1
SVI1
SVI1
SVI1
Appendix B
1783-HMS4S8E4CGN
1783-HMS4SG8EG4CGN
1783-HMS4SG8EG4CGR
1783-HMS16T4CGN
1783-HMS16TG4CGN
1783-HMS16TG4CGR
1783-HMS8TG8EG4CGN
1783-HMS8TG8EG4CGR
0 Any/All ports
Any/All ports
Any/All ports
Any/All ports
Any/All ports
1 Gi1/1
Gi1/1
Gi1/1
Gi1/1
Gi1/1
2 Gi1/2
Gi1/2
Gi1/2
Gi1/2
Gi1/2
3 Gi1/3
Gi1/3
Gi1/3
Gi1/3
Gi1/3
4 Gi1/4
Gi1/4
Gi1/4
Gi1/4
Gi1/4
5 Fa1/5
Gi1/5
Fa1/5
Gi1/5
Gi1/5
6 Fa1/6
Gi1/6
Fa1/6
Gi1/6
Gi1/6
7 Fa1/7
Gi1/7
Fa1/7
Gi1/7
Gi1/7
8 Fa1/8
Gi1/8
Fa1/8
Gi1/8
Gi1/8
9 Fa1/9
Gi1/9
Fa1/9
Gi1/9
Gi1/9
10 Fa1/10
Gi1/10
Fa1/10
Gi1/10
Gi1/10
11 Fa1/11
Gi1/11
Fa1/11
Gi1/11
Gi1/11
12 Fa1/12
Gi1/12
Fa1/12
Gi1/12
Gi1/12
13 Fa1/13
Gi1/13
Fa1/13
Gi1/13
Gi1/13
14 Fa1/14
Gi1/14
Fa1/14
Gi1/14
Gi1/14
15 Fa1/15
Gi1/15
Fa1/15
Gi1/15
Gi1/15
16 Fa1/16
Gi1/16
Fa1/16
Gi1/16
Gi1/16
17
Fa1/17
Gi1/17
Gi1/17
18
Fa1/18
Gi1/18
Gi1/18
19
Fa1/19
Gi1/19
Gi1/19
20
Fa1/20
Gi1/20
Gi1/20
SVI1
SVI1
SVI1
27 SVI1
SVI1
469
Appendix B
Stratix 5410
Port Assignments
Bit
470
Appendix B
Stratix 5700
Port Assignments
Table 147 - 6- and 10-port Switches
Bit
1783-BMS4S2SGL, 1783-BMS4S2SGA,
1783-BMS06SL, 1783-BMS06SA,
1783-BMS06TL, 1783-BMS06TA,
1783-BMS06SGL, 1783-BMS06SGA
1783-BMS06TGL,
1783-BMS06TGA
1783-BMS10CL,
1783-BMS10CA
1783-BMS10CGL, 1783-BMS10CGA,
1783-BMS10CGP, 1783-BMS10CGN
0 Any/All ports
Any/All ports
Any/All ports
Any/All ports
1 Fa1/1
Fa/1
Fa1/1
Fa1/1
2 Fa1/2
Fa1/2
Fa1/2
Fa1/2
3 Fa1/3
Fa1/3
Fa1/3
Fa1/3
4 Fa1/4
Fa1/4
Fa1/4
Fa1/4
5 Fa1/5
Gi1/1
Fa1/5
Fa1/5
6 Fa1/6
Gi1/2
Fa1/6
Fa1/6
Fa1/7
Fa1/7
Fa1/8
Fa1/8
Fa1/9
Gi1/1
10
Fa1/10
Gi1/2
SVI1
SVI1
27 SVI1
SVI1
1783-BMS12T4E2CGL, 1783-BMS12T4E2CGP,
1783-BMS12T4E2CGNK
1783-BMS20CL, 1783-BMS20CA
1783-BMS20CGL, 1783-BMS20CGN,
1783-BMS20CGP, 1783-BMS20CGPK
0 Any/All ports
Any/All ports
Any/All ports
1 Fa1/1
Fa1/1
Fa1/1
2 Fa1/2
Fa1/2
Fa1/2
3 Fa1/3
Fa1/3
Fa1/3
4 Fa1/4
Fa1/4
Fa1/4
5 Fa1/5
Fa1/5
Fa1/5
6 Fa1/6
Fa1/6
Fa1/6
7 Fa1/7
Fa1/7
Fa1/7
8 Fa1/8
Fa1/8
Fa1/8
9 Fa1/9
Fa1/9
Fa1/9
10 Fa1/10
Fa1/10
Fa1/10
11 Fa1/11
Fa1/11
Fa1/11
12 Fa1/12
Fa1/12
Fa1/12
13 Fa1/13
Fa1/13
Fa1/13
14 Fa1/14
Fa1/14
Fa1/14
15 Fa1/15
Fa1/15
Fa1/15
16 Gi1/1
Fa1/16
Fa1/16
17 Gi1/2
Fa1/17
Fa1/17
18 Gi1/3
Fa1/18
Fa1/18
471
Appendix B
1783-BMS12T4E2CGL, 1783-BMS12T4E2CGP,
1783-BMS12T4E2CGNK
1783-BMS20CL, 1783-BMS20CA
1783-BMS20CGL, 1783-BMS20CGN,
1783-BMS20CGP, 1783-BMS20CGPK
19
Fa1/19
Gi1/1
20
Fa1/20
Gi1/2
27 SVI1
SVI1
SVI1
ArmorStratix 5700
Port Assignments
Bit
1783-ZMS8TA
1783-ZMS4T4E2TGP,
1783-ZMS4T4E2TGN
1783-ZMS16TA
1783-ZMS8T8E2TGP,
1783-ZMS8T8E2TGN
1783-ZMS24TA
0 Any/All ports
Any/All ports
Any/All ports
Any/All ports
Any/All ports
1 Fa1/1
Fa/1
Fa1/1
Fa1/1
Fa1/1
2 Fa1/2
Fa1/2
Fa1/2
Fa1/2
Fa1/2
3 Fa1/3
Fa1/3
Fa1/3
Fa1/3
Fa1/3
4 Fa1/4
Fa1/4
Fa1/4
Fa1/4
Fa1/4
5 Fa1/5
Fa1/5
Fa1/5
Fa1/5
Fa1/5
6 Fa1/6
Fa1/6
Fa1/6
Fa1/6
Fa1/6
7 Fa1/7
Fa1/7
Fa1/7
Fa1/7
Fa1/7
8 Fa1/8
Fa1/8
Fa1/8
Fa1/8
Fa1/8
Gi1/1
Fa1/9
Fa1/9
Fa1/9
10
Gi1/2
Fa1/10
Fa1/10
Fa1/10
11
Fa1/11
Fa1/11
Fa1/11
12
Fa1/12
Fa1/12
Fa1/12
13
Fa1/13
Fa1/13
Fa1/13
14
Fa1/14
Fa1/14
Fa1/14
15
Fa1/15
Fa1/15
Fa1/15
16
Fa1/16
Fa1/16
Fa1/16
17
Gi1/1
Fa1/17
18
Gi1/2
Fa1/18
19
Fa1/19
20
Fa1/20
21
Fa1/21
22
Fa1/22
23
Fa1/23
24
Fa1/24
27 SVI1
472
SVI1
SVI1
SVI1
SVI1
Appendix B
6-port Managed
Ethernet Switch
14-port Managed
Ethernet Switch
18-port Managed
Ethernet Switch
0 Any/All ports
Any/All ports
Any/All ports
Any/All ports
Any/All ports
Any/All ports
Any/All ports
1 Gi1/1
Gi1/1
Gi1/1
Gi1/1
Gi1/1
Gi1/1
Gi1/1
2 Gi1/2
Gi1/2
Gi1/2
Gi1/2
Gi1/2
Gi1/2
Gi1/2
3 Fa1/1
Fa1/1
Fa1/1
Fa1/1
Fa1/1
Fa1/1
Fa1/1
4 Fa1/2
Fa1/2
Fa1/2
Fa1/2
Fa1/2
Fa1/2
Fa1/2
5 Fa1/3
Fa1/3
Fa1/3
Fa1/3
Fa1/3
Fa1/3
Fa1/3
6 Fa1/4
Fa1/4
Fa1/4
Fa1/4
Fa1/4
Fa1/4
Fa1/4
Fa1/5
Fa1/5
Fa1/5
Fa1/6
Fa1/6
Fa1/6
Fa1/7
Fa1/7
Fa1/7
10
Fa1/8
Fa1/8
Fa1/8
11
Fa2/1
Fa2/1
Fa2/1
Fa2/1
Fa2/1
12
Fa2/2
Fa2/2
Fa2/2
Fa2/2
Fa2/2
13
Fa2/3
Fa2/3
Fa2/3
Fa2/3
Fa2/3
14
Fa2/4
Fa2/4
Fa2/4
Fa2/4
Fa2/4
15
Fa2/5
Fa2/5
16
Fa2/6
Fa2/6
17
Fa2/7
Fa2/7
18
Fa2/8
Fa2/8
19
Fa3/1
20
Fa3/2
21
Fa3/3
22
Fa3/4
23
24
25
26
473
Appendix B
Notes:
474
Appendix
Port Numbering
Topic
Page
476
484
485
492
495
475
Appendix C
Port Numbering
Description
1783-HMS4C4CGN
1
2
3
4
5
6
7
8
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
1783-HMS8T4CGN
1
2
3
4
5
6
7
8
9
10
11
12
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
1783-HMS8S4CGN
1
2
3
4
5
6
7
8
9
10
11
12
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
476
Port Numbering
Appendix C
Description
1783-HMS4T4E4CGN
1
2
3
4
5
6
7
8
9
10
11
12
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
1783-HMS8TG4CGN
1
2
3
4
5
6
7
8
9
10
11
12
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
1783-HMS8SG4CGN
1
2
3
4
5
6
7
8
9
10
11
12
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
1783-HMS4EG8CGN
1
2
3
4
5
6
7
8
9
10
11
12
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
477
Appendix C
Port Numbering
Description
1783-HMS8S8E4CGN
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
Gi1/13
Gi1/14
Gi1/15
Gi1/16
478
Port Numbering
Appendix C
Description
1783-HMS16T4CGN
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Fa1/17
Fa1/18
Fa1/19
Fa1/20
1783-HMS16TG4CGN
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
Gi1/13
Gi1/14
Gi1/15
Gi1/16
Gi1/17
Gi1/18
Gi1/19
Gi1/20
479
Appendix C
Port Numbering
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
Gi1/13
Gi1/14
Gi1/15
Gi1/16
Gi1/17
Gi1/18
Gi1/19
Gi1/20
1783-HMS8TG4CGR
1
2
3
4
5
6
7
8
9
10
11
12
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
1783-HMS8SG4CGR
1
2
3
4
5
6
7
8
9
10
11
12
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
480
Description
Port Numbering
Appendix C
Description
1783-HMS4EG8CGR
1
2
3
4
5
6
7
8
9
10
11
12
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
481
Appendix C
Port Numbering
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
Gi1/13
Gi1/14
Gi1/15
Gi1/16
1783-HMS16TG4CGR
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
Gi1/13
Gi1/14
Gi1/15
Gi1/16
Gi1/17
Gi1/18
Gi1/19
Gi1/20
482
Description
Port Numbering
Appendix C
Description
1783-HMS8TG8EG4CGR
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
Gi1/13
Gi1/14
Gi1/15
Gi1/16
Gi1/17
Gi1/18
Gi1/19
Gi1/20
483
Appendix C
Port Numbering
Description
1783-IMS28NDC
1783-IMS28NAC
1783-IMS28RDC
1783-IMS28RAC
1783-IMS28GNDC
1783-IMS28GNAC
1783-IMS28GRDC
1783-IMS28GRAC
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Gi1/1
Gi1/2
Gi1/3
Gi1/4
Gi1/5
Gi1/6
Gi1/7
Gi1/8
Gi1/9
Gi1/10
Gi1/11
Gi1/12
Gi1/13
Gi1/14
Gi1/15
Gi1/16
Gi1/17
Gi1/18
Gi1/19
Gi1/20
Gi1/21
Gi1/22
Gi1/23
Gi1/24
Te1/25 or Gi1/25
Te1/26 or Gi1/26
Te1/27 or Gi1/27
Te1/28 or Gi1/28
484
Port Numbering
Appendix C
Description
1783-BMS4S2SGL
1
2
3
4
5
6
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
1783-BMS4S2SGA
1
2
3
4
5
6
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
1783-BMS06SL
1
2
3
4
5
6
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
1783-BMS06SA
1
2
3
4
5
6
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
1783-BMS06TL
1
2
3
4
5
6
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
1783-BMS06TA
1
2
3
4
5
6
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
1783-BMS06SGL
1
2
3
4
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Gi1/1
Gi1/2
485
Appendix C
Port Numbering
Description
1783-BM06SGA
1
2
3
4
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Gi1/1
Gi1/2
1783-BMS06TGL
1
2
3
4
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Gi1/1
Gi1/2
1783-BMS06TGA
1
2
3
4
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Gi1/1
Gi1/2
1783-BMS10CL
1
2
3
4
5
6
7
8
9
10
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
1783-BMS10CA
1
2
3
4
5
6
7
8
9
10
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
1783-BMS10CGL
1
2
3
4
5
6
7
8
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Gi1/1
Gi1/2
486
Port Numbering
Appendix C
Description
1783-BMS10CGA
1
2
3
4
5
6
7
8
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Gi1/1
Gi1/2
1783-BMS10CGN
1
2
3
4
5
6
7
8
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Gi1/1
Gi1/2
1783-BMS10CGP
1
2
3
4
5
6
7
8
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Gi1/1
Gi1/2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Gi1/1
Gi1/2
1783-BMS12T4E2CGNK 18-port (12 Ethernet ports; 4 PoE/PoE+ ports; 2 combo Gigabit ports)
managed switch; full firmware; PTP; NAT; conformal coating
487
Appendix C
Port Numbering
Description
1783-BMS12T4E2CGP
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Gi1/1
Gi1/2
1783-BMS12T4E2CGL
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Gi1/1
Gi1/2
1783-BMS20CL
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Fa1/17
Fa1/18
Fa1/19
Fa1/20
488
Port Numbering
Appendix C
Description
1783-BMS20CA
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Fa1/17
Fa1/18
Fa1/19
Fa1/20
1783-BMS20CGL
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Fa1/17
Fa1/18
Gi1/1
Gi1/2
489
Appendix C
Port Numbering
Description
1783-BMS20CGN
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Fa1/17
Fa1/18
Gi1/1
Gi1/2
1783-BMS20CGP
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Fa1/17
Fa1/18
Gi1/1
Gi1/2
490
Port Numbering
Appendix C
Description
1783-BMS20CGPK
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
1
2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Fa1/17
Fa1/18
Gi1/1
Gi1/2
491
Appendix C
Port Numbering
ArmorStratix 5700
Port Numbering
Description
1783-ZMS8TA
1
2
3
4
5
6
7
8
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
1783-ZMS4T4E2TGP
GE-1
GE-2
1
2
3
4
5
6
7
8
Gi1/1
Gi1/2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
1783-ZMS4T4E2TGN
GE-1
GE-2
1
2
3
4
5
6
7
8
Gi1/1
Gi1/2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
1783-ZMS16TA
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
492
Port Numbering
Appendix C
Description
1783-ZMS8T8E2TGP
GE-1
GE-2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Gi1/1
Gi1/2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
1783-ZMS8T8E2TGN
GE-1
GE-2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Gi1/1
Gi1/2
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
493
Appendix C
Port Numbering
Description
1783-ZMS24TA
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
494
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
Fa1/9
Fa1/10
Fa1/11
Fa1/12
Fa1/13
Fa1/14
Fa1/15
Fa1/16
Fa1/17
Fa1/18
Fa1/19
Fa1/20
Fa1/21
Fa1/22
Fa1/23
Fa1/24
Port Numbering
Appendix C
Table 153 - Stratix 8000/8300 Switch and Expansion Module Port Numbering
Cat. No.
Description
1783-MS06T
Gigabit ports:
1
2
Fast Ethernet ports:
1
2
3
4
Gigabit ports:
Gi1/1
Gi1/2
Fast Ethernet ports:
Fa1/1
Fa1/2
Fa1/3
Fa1/4
1783-MS10T
Gigabit ports:
1
2
Fast Ethernet ports:
1
2
3
4
5
6
7
8
Gigabit ports:
Gi1/1
Gi1/2
Fast Ethernet ports:
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
1783-RMS06T
Gigabit ports:
1
2
Fast Ethernet ports:
1
2
3
4
Gigabit ports:
Gi1/1
Gi1/2
Fast Ethernet ports:
Fa1/1
Fa1/2
Fa1/3
Fa1/4
1783-RMS10T
Gigabit ports:
1
2
Fast Ethernet ports:
1
2
3
4
5
6
7
8
Gigabit ports:
Gi1/1
Gi1/2
Fast Ethernet ports:
Fa1/1
Fa1/2
Fa1/3
Fa1/4
Fa1/5
Fa1/6
Fa1/7
Fa1/8
495
Appendix C
Port Numbering
Table 153 - Stratix 8000/8300 Switch and Expansion Module Port Numbering (Continued)
Cat. No.
Description
1783-MX04E
1
2
3
4
Fa#/1
Fa#/2
Fa#/3
Fa#/4
1783-MX04T04E
1
2
3
4
5
6
7
8
Fa#/1
Fa#/2
Fa#/3
Fa#/4
Fa#/5
Fa#/6
Fa#/7
Fa#/8
1783-MX04S
1
2
3
4
Fa#/1
Fa#/2
Fa#/3
Fa#/4
1783-MX08S
1
2
3
4
5
6
7
8
Fa#/1
Fa#/2
Fa#/3
Fa#/4
Fa#/5
Fa#/6
Fa#/7
Fa#/8
1783-MX08T
1
2
3
4
5
6
7
8
Fa#/1
Fa#/2
Fa#/3
Fa#/4
Fa#/5
Fa#/6
Fa#/7
Fa#/8
1783-MX08F
1
2
3
4
5
6
7
8
Fa#/1
Fa#/2
Fa#/3
Fa#/4
Fa#/5
Fa#/6
Fa#/7
Fa#/8
496
Appendix
Topic
Page
497
503
509
514
For recommended cables and SFP modules, see the Stratix Ethernet Device
Specifications Technical Data, publication 1783-TD001.
Stratix 5410
Cables and Connectors
10/100/1000 Ports
The 10/100/1000 Ethernet, PoE/PoE+ ports use standard RJ45 connectors
and Ethernet pinouts with internal crossovers.
Figure 53 - 10/100/1000 Connector Pinouts
Pin
Label
TP0+
TP0-
TP1+
TP2+
TP2-
TP1-
TP3+
TP3-
1 2 3 4 5 6 7 8
497
Appendix D
3 TD+
6 TD
3 RD+
6 RD
1 RD+
1 TD+
2 TD
2 RD
1 TPO+
1 TP1+
2 TPO-
2 TP1-
3 TP1+
3 TPO+
6 TP1-
6 TPO-
4 TP2+
4 TP3+
5 TP2-
5 TP3-
7 TP3+
7 TP2+
8 TP3-
8 TP2-
498
Appendix D
You can use Category 3, 4, or 5 cabling when connecting to 10BASE-Tcompatible devices. You must use Category 5 cabling when connecting to
100BASE-TX-compatible devices.
IMPORTANT
Use a four twisted-pair, Category 5 cable when connecting to a 1000BASE-Tcompatible device or PoE port.
Switch
Switch
3 TD+
6 TD
3 TD+
6 TD
1 RD+
2 RD
1 RD+
2 RD
H5579
Switch
1 TPO+
1 TP0+
2 TPO-
2 TP0-
3 TP1+
3 TP1+
6 TP1-
6 TP1-
4 TP2+
4 TP2+
5 TP2-
5 TP2-
7 TP3+
7 TP3+
8 TP3-
8 TP3-
499
Appendix D
Console Ports
Console ports enable you to connect a switch to a computer if you use the
Command-line interface (CLI) to configure and monitor a switch.
Stratix 5410 switches have these console ports:
A USB 5-pin mini-Type B port on the front panel
IN
OU
ANA.TimeCode
28
TOD
Console
The USB console port uses a USB Type A to 5-pin mini-Type B cable.
To use the USB cable, download the drivers for Microsoft Windows
from http://www.rockwellautomation.com. The USB cable is not
provided with the switch.
IN
OU
ANA.TimeCode
28
TOD
Console
Console Port
500
Appendix D
The following table lists the pinouts for the console port, the RJ45-to-DB-9
adapter cable, and the console device.
Table 154 - Pinouts with DB-9 Pin
Switch Console Port (DTE)
Console Device
Signal
DB-9 Pin
Signal
RTS
CTS
DTR
DSR
TxD
RxD
GND
GND
GND
GND
RxD
TxD
DSR
DTR
CTS
RTS
The following table lists the pinouts for the console port, RJ45-to-DB-25
female DTE adapter, and the console device. The RJ45-to-DB-25 female DTE
adapter is not supplied with the switch.
Table 155 - Pinouts with DB-25 Pin
Switch Console Port (DTE)
Signal
DB-25 Pin
Signal
RTS
CTS
DTR
DSR
TxD
RxD
GND
GND
GND
GND
RxD
TxD
DSR
20
DTR
CTS
RTS
501
Appendix D
Alarm Port
The front panel alarm port uses an RJ45 connector.
Figure 58 - Front Panel Alarm Connector
Label
Alarm 1 input
Alarm 2 input
Alarm 3 input
Alarm 4 input
1 2 3 4 5 6 7 8
502
Appendix D
This section describes how to connect to ports on Stratix 5400 and Stratix
5700 switches.
Label
RD+
RD-
TD+
NC
NC
TD-
NC
NC
1 2 3 4 5 6 7 8
Label
TP0+
TP0-
TP1+
TP2+
TP2-
TP1-
TP3+
TP3-
1 2 3 4 5 6 7 8
PoE ports integrate power and data signals on the same wires. The ports use
standard RJ45 connectors and Ethernet pinouts with internal crossovers.
Figure 62 - 10/100 PoE Connector Pinouts and Power Sourcing Equipment (PSE) Voltage
Pin
Label
Alternative A (MDI)
RD+
Positive V PSE
RD-
Positive V PSE
TD+
Negative V PSE
NC
NC
TD-
NC
NC
1 2 3 4 5 6 7 8
Negative V PSE
503
Appendix D
3 TD+
6 TD
3 RD+
6 RD
1 RD+
1 TD+
2 TD
2 RD
1 TPO+
1 TP1+
2 TPO-
2 TP1-
3 TP1+
3 TPO+
6 TP1-
6 TPO-
4 TP2+
4 TP3+
5 TP2-
5 TP3-
7 TP3+
7 TP2+
8 TP3-
8 TP2-
504
Appendix D
You can use Category 3, 4, or 5 cabling when connecting to 10BASE-Tcompatible devices. You must use Category 5 cabling when connecting to
100BASE-TX-compatible devices.
IMPORTANT
Use a four twisted-pair, Category 5 cable when connecting to a 1000BASE-Tcompatible device or PoE port.
Switch
Switch
3 TD+
6 TD
3 TD+
6 TD
1 RD+
2 RD
1 RD+
2 RD
H5579
Switch
1 TPO+
1 TP0+
2 TPO-
2 TP0-
3 TP1+
3 TP1+
6 TP1-
6 TP1-
4 TP2+
4 TP2+
5 TP2-
5 TP2-
7 TP3+
7 TP3+
8 TP3-
8 TP3-
Label
TP0+
TP0-
TP1+
TP2+
TP2-
TP1-
TP3+
TP3-
1 2 3 4 5 6 7 8
The SFP module slot on a dual-purpose port uses SFP modules for fiber-optic
ports. The auto-MDIX feature is enabled by default.
Rockwell Automation Publication 1783-UM007E-EN-P - June 2016
505
Appendix D
Console Ports
Console ports enable you to connect a switch to a computer if you use the
Command-line interface (CLI) to configure and monitor a switch.
Stratix 5700 switches have these console ports:
A USB 5-pin mini-Type B port on the front panel
The USB console port uses a USB Type A to 5-pin mini-Type B cable.
To use the USB cable, download the drivers for Microsoft Windows
from http://www.rockwellautomation.com. The USB cable is not
provided with the switch.
Console Port
506
Appendix D
The following table lists the pinouts for the console port, the RJ45-to-DB-9
adapter cable, and the console device.
Table 156 - Pinouts with DB-9 Pin
Switch Console Port (DTE)
Console Device
Signal
DB-9 Pin
Signal
RTS
CTS
DTR
DSR
TxD
RxD
GND
GND
GND
GND
RxD
TxD
DSR
DTR
CTS
RTS
The following table lists the pinouts for the console port, RJ45-to-DB-25
female DTE adapter, and the console device. The RJ45-to-DB-25 female DTE
adapter is not supplied with the switch.
Table 157 - Pinouts with DB-25 Pin
Switch Console Port (DTE)
Signal
DB-25 Pin
Signal
RTS
CTS
DTR
DSR
TxD
RxD
GND
GND
GND
GND
RxD
TxD
DSR
20
DTR
CTS
RTS
507
Appendix D
Alarm Ports
The front-panel alarm-relay connector ports are described in the following
illustration and table.
Figure 68 - Wiring Example for Alarm Inputs and Outputs
Alarms Connector
NO
To Alarm Input
1
Alarm
Relay
Coil
COM
2
NC
To Alarm Input
Alarm Input 2
IN2
4
REF
5
IN1
Alarm Input 1
6
Label
Connection
NO
COM
NC
IN2
Alarm Input 2
REF
IN1
Alarm Input 1
508
ArmorStratix 5700
Cables and Connectors
Appendix D
10/100 Ports
The 10/100 Ethernet ports use M12 D-coded 4-pin connectors and Ethernet
pinouts with twisted-pair crossovers or straight-through cables.
Figure 69 - 10/100 Connector Pinouts
RD+
TD+
RD-
TD-
100/1000 Ports
The 100/1000 Ethernet ports use M12 X-coded 8-pin connectors and
Ethernet pinouts with twisted-pair crossovers or straight-through cables.
Figure 70 - 100/1000 Connector Pinouts
BI_DA+
BI_DA-
BI_DB+
BI_DB-
BI_DD+
BI_DD-
BI_DC-
BI_DC+
509
Appendix D
3 TD+
6 TD
3 RD+
6 RD
1 RD+
1 TD+
2 TD
2 RD
510
Switch
1 TPO+
1 TP1+
2 TPO-
2 TP1-
3 TP1+
3 TPO+
6 TP1-
6 TPO-
4 TP2+
4 TP3+
5 TP2-
5 TP3-
7 TP3+
7 TP2+
8 TP3-
8 TP2-
Appendix D
Use a four twisted-pair, Category 5 cable when connecting to a 1000BASE-Tcompatible device or PoE port.
Switch
Switch
3 TD+
6 TD
3 TD+
6 TD
1 RD+
2 RD
1 RD+
2 RD
H5579
Switch
1 TPO+
1 TP0+
2 TPO-
2 TP0-
3 TP1+
3 TP1+
6 TP1-
6 TP1-
4 TP2+
4 TP2+
5 TP2-
5 TP2-
7 TP3+
7 TP3+
8 TP3-
8 TP3-
511
Appendix D
Console Port
ArmorStratix 5700 switches have one console port. The console port enables
you to connect the switch to a computer if you use the Command-line
interface (CLI) to configure and monitor the switch.
Connect to the console port with an M12-to-DB-9 cable (Figure 75):
Obtain a male 5-pin DC Micro-style (M12) connector configuration
cordset, such as Allen-Bradley Bulletin 889D. See publication
889DS-PP001.
Obtain a DB-9 connector and attach it to one end of the cable.
Figure 75 - M12-to-DB-9 Cable
32552-M
5
4
RTS
CTS
TXD
RXD
GND
2
6
3
7
4
4
8
5
9
32499
M8 Cable
512
DB9-S Connector
Pin
Function
Pin
Function
RTS
CTS
CTS
RTS
TD
RD
RD
TD
GRND
GRND
Appendix D
Alarm Ports
Alarm ports are included only on ArmorStratix 5700 switches with PoE.
Figure 78 shows the front-panel alarm relay connector and ports. The alarm
connector uses a male 5-pin DC Micro-style (M12) connector configuration
cordset, such as Allen-Bradley Bulletin 889D. See publication 889DS-PP001.
Figure 78 - Alarm Connector Pinout
1
5
4
NO
NC
Unconnected
Unconnected
Common
To Alarm Input
Alarm
Relay
Coil
NC
COM
5
Label
Connection
NO
NC
Unconnected
Unconnected
Unconnected
Unconnected
COM
513
Appendix D
Stratix 8000/8300
Cables and Connectors
Label
RD+
RD-
TD+
NC
NC
TD-
NC
NC
1 2 3 4 5 6 7 8
514
Pin
Label
TP0+
TP0-
TP1+
TP2+
TP2-
TP1-
TP3+
TP3-
1 2 3 4 5 6 7 8
Appendix D
The PoE ports on the PoE expansion modules integrate power and data signals
on the same wires. The ports use standard RJ45 connectors and Ethernet
pinouts with internal crossovers.
Figure 82 - 10/100 PoE Connector Pinouts and Power Sourcing Equipment (PSE) Voltage
Pin
Label
Alternative A (MDI)
RD+
Positive V PSE
RD-
Positive V PSE
TD+
Negative V PSE
NC
NC
TD-
NC
NC
1 2 3 4 5 6 7 8
Negative V PSE
3 TD+
6 TD
3 RD+
6 RD
1 RD+
1 TD+
2 TD
2 RD
1 TPO+
1 TP1+
2 TPO-
2 TP1-
3 TP1+
3 TPO+
6 TP1-
6 TPO-
4 TP2+
4 TP3+
5 TP2-
5 TP3-
7 TP3+
7 TP2+
8 TP3-
8 TP2-
515
Appendix D
Use a four twisted-pair, Category 5 cable when connecting to a 1000BASE-Tcompatible device or PoE port.
Switch
3 TD+
6 TD
3 TD+
6 TD
1 RD+
2 RD
1 RD+
2 RD
516
Switch
Switch
1 TPO+
1 TP0+
2 TPO-
2 TP0-
3 TP1+
3 TP1+
6 TP1-
6 TP1-
4 TP2+
4 TP2+
5 TP2-
5 TP2-
7 TP3+
7 TP3+
8 TP3-
8 TP3-
Appendix D
100Base-FX Ports
The 100Base-FX ports use the following:
LC connectors, as shown in the following figure
50/125- or 62.5 /125-micron multimode fiber-optic cables
Figure 87 - Fiber-optic SFP Module LC Connector
Dual-purpose Ports
The Ethernet port on a dual-purpose port uses standard RJ45 connectors. The
following figure shows the pinouts.
Figure 88 - Ethernet Port RJ45 Connector
Pin
Label
TP0+
TP0-
TP1+
TP2+
TP2-
TP1-
TP3+
TP3-
1 2 3 4 5 6 7 8
The SFP module slot on a dual-purpose port uses SFP modules for fiber-optic
ports.
IMPORTANT
517
Appendix D
Console Port
The console port enables you to connect the switch to a computer if you use
the Command-line interface (CLI) to configure and monitor the switch.
The console port uses an 8-pin RJ45 connector. The supplied RJ45-to-DB-9
adapter cable connects the console port of the switch to a computer. Obtain an
RJ45-to-DB-25 female DTE adapter if you want to connect the switch console
port to a terminal.
Table 158 lists the pinouts for the console port, the RJ45-to-DB-9 adapter
cable, and the console device.
Table 158 - Pinouts with CB-9 Pin
518
Console Device
Signal
DB-9 Pin
Signal
RTS
CTS
DTR
DSR
TxD
RxD
GND
GND
GND
GND
RxD
TxD
DSR
DTR
CTS
RTS
Appendix D
The following table lists the pinouts for the console port, RJ45-to-DB-25
female DTE adapter, and the console device.
The RJ45-to-DB-25 female DTE adapter is not supplied with the switch.
Table 159 - Pinouts with DB-25 Pin
Switch Console Port (DTE)
Console Device
Signal
DB-25 Pin
Signal
RTS
CTS
DTR
DSR
TxD
RxD
GND
GND
GND
GND
RxD
TxD
DSR
20
DTR
CTS
RTS
519
Appendix D
Notes:
520
Index
Numerics
10/100 ports
cable lengths 73, 128
connecting to 90, 122, 150
10/100/1000 ports
cable lengths 73, 100, 128
connecting to 90, 122, 150
A
ACLs 182 187
adapter pinouts
RJ45-to-DB-25 adapter 519
RJ45-to-DB-9 adapter 518
terminal
RJ45-to-DB-25 501, 507
RJ45-to-DB-9 501, 507
address aliasing 239
address translation 241
airflow around switch 158
airflow, required clearance 100
alarm relay connections 88, 89, 148, 149
connection procedures 89, 149
alert log 376
allocation, memory 28
announce interval 204
assign VLANs to NAT instance 247
Auto mode, PoE 300
auto-MDIX 91, 123, 151, 517
autonegotiation 90, 122, 150
Duplex mode 49
speed 49
troubleshoot 402
B
Boundary mode 192, 195
broadcast storms 293
C
cable diagnostics 376
cables
connect to 10BASE-T and 100BASE-TX
compatible devices 515
connect to console port 518
connect to copper ports 177
connect to dual-purpose ports 517
connect to dual-purpose uplink ports 178
connect to fiber ports 179, 517
connect to PoE ports 92, 152, 177
console 160
crossover
four twisted-pair pinout, 1000BASE-T
ports 499, 505, 511
identifying 498, 504, 510
D
DC power 132, 137
DC power, connect to 77, 80, 105
default gateway
NAT 242, 254, 266, 277
default router 232
default VLAN 337, 349
delay request interval 204
denial-of-service attack 293
521
Index
Device Manager
access web interface 47
hardware requirements 46
overview 46
software requirements 46
Device-level ring. See DLR
DHCP
for ring devices 218
IP address pool 231
persistence 233
server 230
troubleshoot 401
Direct Managed mode 402
DLR
considerations 212
DHCP 218
overview 209
port choices 211
redundant gateways 212
status 389
DNS server1 and 2 232
domain name 232
dual-purpose ports
connectors and cables 505, 517
duplex
troubleshooting 402
Duplex mode
default 49
setting 49
E
EIGRP 316 321
electrical noise, avoiding 74, 100, 129, 158
electrostatic discharge 72, 98, 133, 159
End to End Transparent mode 193, 197
EtherChannels
creating 238
deleting 238
modifying 238
EtherNet/IP CIP interface 17
EtherNet/IP protocol 334, 387
EtherNet/IP QuickConnect technology 17
expansion modules
installation 162
explicit messaging 17
Express Setup
button 30
global macro 43
Long Press mode 36
Medium Press mode 35
modes 32
Multi-mode 32
requirements 28
Short Press mode 33
Single-mode 37
external alarms 175
F
factory default settings 36, 406
522
G
global macro 43
grounding procedures 79, 80, 135, 137
H
Half-duplex mode 49
hardware features 20
hardware requirements
Device Manager 46
high priority PoE ports 298
I
IEEE power classifications 299
IGMP snooping
and address aliasing 239
definition 239
implicit messaging 17
installation
attach the power and relay connector 83,
90, 122, 141, 150
DIN rail 78, 134
expansion modules 162
grounding procedures 79, 80, 135, 137
mount Stratix 5410 on a rack 105
mount Stratix 5410 on a wall 109
POST 77, 105, 132, 133
pre-installation information and guidelines
74, 100, 129
procedure 74, 101, 129, 158
required clearance 100, 158
verify switch operation 77, 105, 132
wire relays 87, 89, 121, 147, 149
IP address
customization
connected devices 230, 235
DHCP IP address pool 232
switch port 233, 234
DHCP IP address pool
ending range 232
starting range 232
switch port 234
assigning 234
deleting 234
modifying 234
translation 241
troubleshoot 401
DHCP 401
wrong IP address 401
Index
L
LC connector 517
lease length 232
link integrity, verify with REP 312
lite versus full firmware 18
locate switch
via Device Manager 358
via Logix Designer application 373
Long Press mode Express Setup
overview 32
run 36
low priority PoE ports 298
M
macro, global 43
management interface 46
NAT 247
management VLAN 42, 349
Medium Press mode Express Setup
overview 32
requirements 28
run 35
memory 28
MIBs, supported 332
mismatch prevention, Smartport roles 335
mode
Access 334
Boundary 192, 195
DHCP Server 230
DLR 221, 223
dual power 189
End to End Transparent 193, 197
EtherChannel 237, 238
Express Setup 32
Forward 193, 199
NTP-PTP Clock 193, 200
PoE 300, 305, 308
PTP 203
REP 313
Restrict 288
Spanning Tree Learning 77, 105, 132
STP 346, 348
Trunk 334
modes, Express Setup 32
modes, management
Direct Managed 402
module-defined data types 409
monitor
alert log 376
port mirroring 285
monitoring
alert log 376
multicast storm 293
Multi-mode Express Setup
overview 32
requirements 28
N
NAT
configuration considerations 249
configuration overview 241
configure via Device Manager Web interface
250 261
configure via Logix Designer application
262, 273, 274
definition 241
diagnostics 380, 383 386
management interface 247
traffic permits and fixups 250, 261, 273
translation entry types 246
network address translation. See NAT
network settings
configure via Device Manager 38
configure via Logix Designer application 41
noise, electrical 74, 100, 129, 158
NTP
configure via Device Manager 283
overview 283
NTP-PTP Clock mode 193, 200
O
OSPF 321 327
Overview tab, dashboard 379
P
parts list 75, 101, 130, 160
pinouts
10/100 ports 517
crossover cables 516
four twisted-pair, 1000BASE-T ports
499, 505, 511
PoE 503, 515
RJ45-to-DB-25 adapter 519
RJ45-to-DB-25 terminal adapter 501, 507
RJ45-to-DB-9
adapter 518
terminal adapter 501, 507
SFP module 517
straight-through cables
two twisted-pair 498, 504, 510, 515
PoE
attach power connector 175
cable specifications 519
configure via Device Manager Web interface
298
connect to port 177
features 298 303
initial power allocation 299
pinouts 503, 515
power connector 130, 160
power management modes 300
powered device detection 299
wire DC power source 142, 171
pool name 234
pop-up blockers 46, 403
523
Index
port
assignments for CIP data 467, 475
configuration 56
dual-purpose 93, 153
numbering 49
roles 336
security 287, 288
status 375
threshold 295
thresholds 296
type 313
port settings
auto-MDIX 49
description 49
descriptions of 48
Duplex mode 49
enable/disable 49
default 49
speed 49
default 49
POST
description 77, 105, 132
results 77, 105, 132
power 77, 105
connect to
DC 80
power and relay connector
connecting to the switch 83, 90, 122, 141,
150
power classifications 299
power priority 305
prevent electrostatic discharge 72, 98, 133,
159
proxy settings 46, 403
PTP
configure via Device Manager 194
PTP modes
Boundary 192
End to End Transparent 193
Forward 193
NTP-PTP Clock 193
Q
QuickConnect technology 17
R
rear panel
clearance 74, 100, 129, 158
Receive Detail tab, dashboard 379
recovery
firmware upgrade 407
switch software 406
redundancy
EtherChannel 237
redundant gateway 212 217, 389
relays
wire 89, 149
removing SFP modules 86, 120, 146
524
REP 309
open segment 310
ring segment 311
segments
characteristics 311
verify link integrity 312
REP Admin VLAN 313
REP segments 309
configure 313
reset factory defaults 406
reset, troubleshoot 405
Resilient Ethernet Protocol
see REP 309
restart with factory default settings 36
RJ45 connector, console port 518
RSLinx software 43
RSTP
features 346
RSWho 43
S
SC connector 517
SD card
install or remove 76, 103, 131
synchronize
configuration 62
synchronize IOS files 62
SD Flash Sync 64
SDM template 329
security
configure for ports 288
violations 288
segment ID 313
segment topology change notices
See also STCNs 314
settings, factory default 36
SFP modules
bale-clasp latch removal 86, 120, 146
connect to 92, 124, 153
connectors 517
Short Press mode Express Setup
overview 32
run 33
Single-mode Express Setup
run 37
Smartport roles
applying 336
changing VLAN memberships 337
customization 337
optimize ports 334
mismatch prevention 335
Smartport roles and VLANs 342
SNMP
configuring 333
MIBs supported 332
snooping, IGMP 239
software features 19
customization
DHCP persistence settings 233
Index
T
threshold
port 295
traffic level 293
time synchronization
configure via Device Manager 194
configure via Logix Designer application 203
timing message settings 194
traffic fixups and NAT 250, 261, 273
traffic permits and NAT 250, 261, 273
traffic suppression 293
translate IP addresses 241
translation entry types 246
Transmit Detail tab, dashboard 379
troubleshoot
Device Manager display 401
Device Manager not accessible 401
DHCP 401
Direct Managed mode 402
firmware upgrade 65, 407
IP address problems 401
reset switch 405
speed, duplex, and autonegotiation 402
switch 397
switch performance 402
switch software 406
wrong IP address 401
U
unicast storm 293
upgrade firmware 65
V
verify switch operation 77, 105, 132
VLAN memberships
changing 337
prerequisite 337
VLANs
assign to NAT instance 247, 253, 257, 264,
267
default VLAN 349
grouping different users 351
isolate traffic 351
management VLAN 349
W
WINS server1 and 2 232
525
Index
Notes:
526
https://rockwellautomation.custhelp.com/
http://www.rockwellautomation.com/global/support/get-support-now.page
Find the Direct Dial Code for your product. Use the code to
route your call directly to a technical support engineer.
http://www.rockwellautomation.com/global/support/direct-dial.page
Literature Library
http://www.rockwellautomation.com/global/literature-library/overview.page
http://www.rockwellautomation.com/global/support/pcdc.page
Documentation Feedback
Your comments will help us serve your documentation needs better. If you have any suggestions on how to improve this document, complete the
How Are We Doing? form at http://literature.rockwellautomation.com/idc/groups/literature/documents/du/ra-du002_-en-e.pdf.
Rockwell Automation maintains current product environmental information on its website at http://www.rockwellautomation.com/rockwellautomation/about-us/sustainability-ethics/product-environmental-compliance.page.
Allen-Bradley, ArmorStratix, Rockwell Automation, Rockwell Software, RSLinx, RSLogix 5000, RSNetWorx, Stratix, Studio 5000, and Studio 5000 Logix Designer are trademarks of RockwellAutomation, Inc.
Trademarks not belonging to Rockwell Automation are property of their respective companies.
Rockwell Otomasyon Ticaret A.., Kar Plaza Merkezi E Blok Kat:6 34752 erenky, stanbul, Tel: +90 (216) 5698400
Copyright 2016 Rockwell Automation, Inc. All rights reserved. Printed in the U.S.A.