EasyManua.ls Logo

Hirschmann MACH 100

Hirschmann MACH 100
294 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Basic Configuration
Release
6.0
07/2010
Technical Support
HAC.Support@Belden.com
User Manual
Basic Configuration
Industrial ETHERNET (Gigabit) Switch
RS20/RS30/RS40, MS20/MS30, OCTOPUS, PowerMICE,
RSR20/RSR30, MACH 100, MACH 1000, MACH 4000

Table of Contents

Other manuals for Hirschmann MACH 100

Question and Answer IconNeed help?

Do you have a question about the Hirschmann MACH 100 and is the answer not in the manual?

Hirschmann MACH 100 Specifications

General IconGeneral
Switching TechnologyStore-and-Forward
ManagedYes
Operating Temperature-40°C to +70°C (depending on model)
Mounting TypeDIN rail
Power ConsumptionVaries by model
Switching CapacityVaries by model
Forwarding RateVaries by model
DimensionsVaries by model
WeightVaries by model
MAC Address TableVaries by model
Port Type10/100/1000Base-T, 1000Base-X SFP

Summary

Access to the User Interfaces

Command Line Interface

Enables device configuration via local/remote connection, script compatibility for multiple devices.

Web-based Interface

User-friendly graphical interface for device operation and configuration via web browser.

Entering the IP Parameters

Entering IP parameters via CLI

Step-by-step guide for entering IP parameters using the Command Line Interface via V.24.

Entering the IP Parameters via HiDiscovery

Describes using the HiDiscovery protocol to assign IP parameters to devices over Ethernet.

System configuration via BOOTP

Details configuring the device using the BOOTP protocol for automatic IP address assignment.

LoadingSaving Settings

Loading Settings

Details loading configuration data from local non-volatile memory, ACA, network files, or PC.

Saving Settings

Covers saving the current configuration to the device, files via URL, or to a PC.

Loading Software Updates

Configuring the Ports

Protection from Unauthorized Access

Password for SNMP Access

Details setting passwords for SNMP access to protect device MIB and ensure authorized access.

Port Authentication IEEE 802.1 X

Describes IEEE 802.1X port-based network access control for protecting networks from unauthorized access.

Synchronizing the System Time in the Network

Precision Time Protocol

Explains the IEEE 1588 Precision Time Protocol (PTP) for precise time synchronization in LANs.

Network Load Control

Rate Limiter

Allows limiting message traffic rates during heavy flow to prevent overload and manage traffic types.

QoSPriority

Prevents disruption of time-critical data by assigning priority queues and traffic classes.

VLANs

Describes Virtual LANs (VLANs) for network segmentation, load limiting, and flexibility.

Operation Diagnosis

Detecting IP Address Conflicts

Detects and helps eliminate duplicate IP address assignments within a subnetwork to prevent communication disruptions.

Detecting Loops

Detects network loops caused by incorrect configurations, reporting them to the management station.

Setting up the Configuration Environment

Preparing Access via SSH

Covers generating SSH keys, uploading them to the device, and establishing SSH connections.

Related product manuals