FAQ Category: Managed Network Switches
Managed Network Switches — Frequently Asked Questions
Before anything else, you need to know how to reach the switch’s web interface. Maple Systems unmanaged switches are typically plug-and-play, but Maple’s managed or industrial Ethernet switches require initial setup through their default IP. Here are the first steps:
The default IP address for our Fully-Managed and Lite-Managed Network Switches is 192.168.100.254.
Duplex mode determines how data is transmitted between network devices. Full-duplex allows simultaneous sending and receiving of data. Half-duplex only allows one direction at a time, causing potential collisions. Full-duplex…
VLAN Tagging is a method used to identify and separate network traffic in Virtual Local Area Networks (VLANs). Defined by the IEEE 802.1Q standard, it adds a VLAN ID to…
Port Authentication is a network security feature used to control access to network ports based on device credentials. Defined by the IEEE 802.1X standard, it ensures only authorized devices can…
An Active VLAN is a VLAN that is actively used to separate traffic on a network. It helps keep devices isolated within their own virtual network while controlling communication. Active…
Link Aggregation combines multiple physical network links into one logical connection, increasing bandwidth and providing redundancy. By using IEEE 802.1ad (QinQ), Link Aggregation encapsulates multiple VLANs within another VLAN, enhancing…
1000BASE-SX and 1000BASE-LX are Gigabit Ethernet standards using fiber optic cables for high-speed communication. Defined by the IEEE 802.3z standard, they support 1 Gbps data transmission. 1000BASE-SX operates on multimode fiber (MMF), reaching up to 550 meters, while 1000BASE-LX uses single-mode fiber (SMF), extending up to 10 km. These…
Storm control monitors the rate of incoming packets on a port. It compares the rate of broadcast, multicast, or unknown unicast traffic to a configured Storm Threshold. When the traffic rate exceeds…
Class of Service (CoS) is a networking feature that prioritizes data traffic to improve performance and reduce latency. CoS is defined by the IEEE 802.1p standard, which assigns priority levels to network packets and is commonly used in industrial automation, VoIP, and video streaming, where certain data needs higher priority. CoS helps ensure critical traffic, like SCADA commands, is delivered without delays. CoS is implemented at Layer 2 using VLAN tagging to classify and prioritize network traffic. Example Scenario: Real-Time SCADA Communication with CoS: In a SCADA system, an HMI sends real-time control commands to a PLC over a managed switch. Without CoS, critical control packets may compete with regular network traffic, causing delays. CoS assigns higher priority to control data, ensuring immediate delivery even during network congestion preventing communication delays between the HMI and PLC, maintaining real-time system responsiveness. As a result, industrial processes run smoothly without interruptions or unsafe conditions.
RSTP (Rapid Spanning Tree Protocol) is an improved version of STP, defined by the IEEE 802.1w standard. RSPT provides faster convergence by quickly transitioning ports to forwarding or blocking states, improving network recovery time. RSTP removes the listening and…
STP (Spanning Tree Protocol) is a network protocol defined by the IEEE 802.1D standard to prevent network loops by ensuring there is only one active path between devices in redundant network…
Nway Auto-Negotiation, defined by the IEEE 802.3 standard, allows network devices to automatically determine the best duplex mode and speed. It eliminates manual configuration by exchanging capabilities between devices. This process…
Flow Control is a standard defined by IEEE 802.3x that manages data transmission to prevent packet loss during network congestion. It uses pause frames to temporarily stop the sending of data, allowing the receiving device…
A MAC table is used by network switches to map MAC addresses to specific switch ports. This allows the switch to efficiently forward data frames based on their destination MAC address. The switch dynamically…
Bridge Protocol Data Units (BPDU) are network messages used by switches to share Spanning Tree Protocol (STP) information. These packets help prevent loops by identifying redundant links in a network.…
Local Link Discovery Protocol (LLDP) is a standardized data link layer protocol used to discover and exchange information about network devices. Defined by the IEEE 802.1AB standard, LLDP allows devices to advertise their identity, capabilities,…
Port-Based VLAN is a method of network segmentation that assigns specific switch ports to different VLANs (Virtual Local Area Networks). Each port on a switch can be configured to belong…
A Jumbo Frame is an Ethernet frame with a Maximum Transmission Unit (MTU) larger than the standard 1500-byte size, typically supporting 9000 bytes or more. This larger MTU reduces the…
Industrial QoS (iQoS) ensures reliable communication by prioritizing critical protocols like PROFINET, EtherNet/IP, and GOOSE in automation networks. These protocols require low latency and minimal packet loss for real-time control…
Simple Network Management Protocol (SNMP) monitors and manages devices on an IP network. SNMP uses a structured format with Object Identifiers (OIDs) to retrieve and modify device parameters and supports…
What is an Access Control List? An Access Control List (ACL) is used to filter network traffic based on predefined rules. Traffic is allowed or denied based on IP addresses,…
The IEC 60068-2 standard is part of the IEC 60068 series, which covers environmental testing for electrical and electronic equipment. Specifically, IEC 60068-2 refers to various test methods and procedures…
A switch fabric refers to the internal architecture of a network switch that connects its ports and facilitates data forwarding. It enables communication between the switch’s ports by determining how…
Network device flapping occurs when a network device repeatedly connects and disconnects in short intervals. This issue affects stability and can cause network disruptions. Flapping is commonly seen in links…
A Command Line Interface (CLI) is a text-based interface used to configure and manage operating systems or network devices. Users enter text commands to perform tasks like configuring settings, managing…
HTTP (Hyper Text Transfer Protocol) is the foundational protocol used to transfer data on the web. It allows the client (like a browser) to request resources from a web server.…
An Industrial Network Switch is a type of switch designed to operate in harsh environments typically found in industrial settings. It is built to withstand factors like temperature extremes, humidity,…
The Generic Object-Oriented Substation Event (GOOSE) protocol is a communication standard used in electrical substations for rapid data exchange. It operates within the IEC 61850 standard and enables real-time messaging…
Traffic Control is a method used to manage network traffic, ensuring optimal performance, prioritization, and efficient data flow. It involves various techniques that control the rate, direction, and volume of…
Ethernet Ring Protection Switching (ERPS) is a network protocol designed to provide fault tolerance and network resiliency in networks. It ensures uninterrupted service by creating a redundant ring topology, where…
Loop Detection is a network feature used to identify and prevent network loops in networks. A network loop occurs when data packets continuously circulate in the network without reaching their…
MapleLink’s ModbusTCP allows a network device to act as a Modbus TCP slave, enabling remote access by a ModbusTCP master device. With this feature, you can read and write to…
VLAN Data Forwarding is the process of directing network traffic between devices within a Virtual Local Area Network (VLAN). When a packet is sent within a VLAN, it is forwarded…
Reverse Polarity Protection is a safety feature that prevents damage to electronic devices when the power supply connections are reversed. When the positive and negative wires are mistakenly swapped, reverse…
Power Surge Protection is a safety feature that safeguards electrical devices from voltage spikes or surges. It may occur due to lightning strikes, power outages, or electrical faults. These surges…
Over Voltage Protection (OVP) safeguards devices from voltage spikes and surges that could cause damage. When voltage exceeds safe levels, OVP mechanisms activate to prevent equipment failure. Certifications such as…
ESD Protection refers to the methods and components used to protect electronic devices from electrostatic discharge (ESD). ESD occurs when static electricity is suddenly released, which can damage sensitive electronic…
Code redundancy refers to the practice of adding duplicate or backup code within a system to enhance its reliability and fault tolerance. By including extra functions or processes, systems can…
Maple Systems products offer the ability to remotely reboot a device. Maple Systems brand network switches can be remotely accessed via its HTTP/HTTPs or TELNET/SSH servers. Once connected you may…
A DHCP Client allows a device to automatically obtain an IP address from a DHCP Server. When enabled, the client requests network settings, including IP address, subnet mask, and gateway.…
An Ethernet Management Port in our system refers to a dedicated console port or USB port for device management. It provides administrators with direct access to configure and troubleshoot network…
An Element Management System (EMS) is a software platform for managing network devices like switches and routers. It helps monitor, configure, and troubleshoot these devices in a centralized manner. EMS…
Port-Based 802.1X is a network access control protocol that authenticates devices attempting to connect to a network using port authentication. When a device connects, 802.1X requires it to authenticate, usually…
Port Utilization refers to the amount of bandwidth a network port is using compared to its total capacity. It helps monitor how effectively a port is being used for data…
Simple Network Time Protocol (SNTP) is a protocol used to synchronize the clocks of network devices. It allows devices to receive time information from a time server over the network.…
A User Account with Authority (802.1X) is a network access control protocol that authenticates devices before granting network access. It requires users or devices to provide valid credentials, such as…
A Trusted Managed Host is a device or system that is authorized and trusted to manage and control network resources. It has higher security privileges, allowing it to configure, monitor,…
A DHCP Relay (or Relay Agent) is a network function that forwards DHCP messages between clients and servers across different IP subnets or VLANs. Operating as an intermediary agent, the…
Dual Homing is a redundancy method where a device connects two separate network paths for reliability. If one connection fails, traffic switches to the other, ensuring continuous network access. On…
An IP Address (Internet Protocol Address) is a unique identifier assigned to each device on a network. Thus, allowing it to communicate with other devices. It serves as both the…
MEL (Maintenance Entity Level) in ERPS (Ethernet Ring Protection Switching) defines the hierarchy of OAM (Operations, Administration, and Maintenance) messages used for fault detection and network monitoring. MEL determines the…
DHCP Snooping is a security feature that prevents unauthorized DHCP Servers from assigning IP addresses to clients. It monitors DHCP traffic and only allows responses from trusted servers on specified…
ARP Inspection is a security feature that prevents Address Resolution Protocol (ARP) spoofing attacks. It verifies ARP packets against a trusted database to block malicious attempts to redirect network traffic.…
Auto Provision is a service that allows a network switch to automatically retrieve and apply configuration files from a remote server. This simplifies the configuration process by eliminating the need…
IP DiffServ (Differentiated Services) is a network architecture designed to manage traffic and prioritize packets for improved Quality of Service (QoS). It classifies and marks packets using the DSCP (Differentiated…
IP Source Guard is a security feature that prevents IP address spoofing by binding IP addresses to specific ports and MAC addresses. It ensures that only devices with valid IP-MAC…
A Binding Table is a data structure that maps IP addresses to specific MAC addresses and ports on a network switch. It is used to validate and control traffic flow.…
Traffic Monitor is a network management tool that allows you to observe and analyze the flow of network traffic through a Maple Systems switch. It helps administrators monitor specific traffic…
Port Mirroring is a network feature that copies traffic from one or more source ports to a designated destination port for monitoring and analysis. This allows administrators to inspect network…
A Management Host is a designated device or system authorized to access and configure a network switch. It typically refers to a computer or server used for administrative tasks. Such…
Ring Settings configure a network redundancy mechanism that ensures continuous operation in case of a link failure. This feature is commonly used in industrial networks to create a ring topology…
Port Priority is a traffic management feature that controls the importance of data sent through specific ports on a network switch. It ensures that higher-priority traffic is processed first, reducing…
A DIP Switch (Dual In-line Package Switch) is a small physical switch used to configure hardware settings on a device. On Maple Systems network switches, DIP Switches are primarily used…
IGMP (Internet Group Management Protocol) is a network protocol used to manage multicast group membership on IPv4 networks. It allows devices to join or leave multicast groups, ensuring that multicast…
WTR (Wait-to-Restore) is a timer mechanism used in ERPS (Ethernet Ring Protection Switching). It prevents network instability after a failure has been resolved. ERPS is a protocol that ensures fast…
Guard Timer in ERPS (Ethernet Ring Protection Switching) is a mechanism that prevents frequent or rapid state transitions in the network after a topology change. When a failure occurs and…
Rate Limitation is a feature used to control the amount of network traffic that is allowed to pass through a device. It includes Bandwidth Limitation and Storm Control. Bandwidth Limitation…
LLDP Neighbors refers to devices on the network that support LLDP (Link Layer Discovery Protocol) and are directly connected to a network switch. LLDP is a vendor-neutral protocol. It allows…
RMON (Remote Monitoring) is a network management protocol that provides in-depth traffic analysis and port statistics on network switches. It enhances traditional SNMP (Simple Network Management Protocol) by enabling switches…
Revertive in ERPS (Ethernet Ring Protection Switching) is a feature that dictates how the network should behave when a primary path is restored. When Revertive mode is enabled, the ERPS…
A Filter Table in ARP Inspection is used to store valid ARP (Address Resolution Protocol) entries that have been verified to ensure legitimate traffic on the network. This table helps…
In SNMP (Simple Network Management Protocol), a Community is a logical group used for authentication purposes and functions as a password or access control mechanism that defines the level of…
Storm Control is a network feature used to prevent broadcast, multicast, and unknown unicast storms on a switch. It limits the traffic volume to a predefined threshold, preventing network congestion…
L2 Forwarding Rate is the speed at which a network device can process and forward Layer 2 (L2) Ethernet frames. It is a key performance metric that determines how quickly…
The Configuration Backup/Restore Utility is available on all Maple Systems managed network switches. It allows network administrators to securely backup and restore switch configurations. This utility ensures that device settings,…
A MAC VLAN is a feature that allows network administrators to filter traffic based on the MAC (Media Access Control) address of devices. This feature enables the network switch to…
Port Statistics provide detailed data about the performance and activity of a network port. This information includes metrics such as data transfer rates, packet counts, and error rates. Administrators use…
MAC Limit Port Security is a feature that restricts the number of MAC addresses allowed on a specific switch port. It helps prevent unauthorized devices from connecting to the network.…
Short Circuit Protection (SCP) is a safety feature that prevents damage to electrical devices or circuits when a short circuit occurs. A short circuit happens when the electrical current bypasses…
Port Isolation is a network feature that restricts communication between devices connected to different ports on the same switch yet allows connected devices to communicate with the switch. Port Isolation…
Over Current Protection (OCP) is a safety feature designed to prevent electrical devices from being damaged by excessive current. When the current flowing through a circuit exceeds the device’s safe…
A Management VLAN (MVLAN) is a dedicated Virtual Local Area Network (VLAN) used specifically for managing network devices. The MLVAN enhances both security and network efficiency by isolating management traffic…
The Topology Map is a feature used in Maple Systems lite managed and fully managed network switches to provide a visual representation of the devices and connections within a network.…
DSCP (Differentiated Services Code Point) tags are part of the IP header used to indicate the priority or Quality of Service (QoS) level for network traffic. DSCP tags are 6-bit…
VLAN Passthrough is a network feature that allows VLAN-tagged traffic to pass through a device without altering or stripping the VLAN tags. When a device is configured for VLAN passthrough,…
A VLAN packet is a data frame that includes information for a Virtual Local Area Network (VLAN) that allows devices to communicate within a specific segment of a network. The…
ONVIF (Open Network Video Interface Forum) is an open standard for network video surveillance devices. ONVIF ensures interoperability between different manufacturers’ equipment enablings devices like IP cameras, NVRs (Network Video…
A Downlink Port is a network port used to connect a device to another device or network segment and refers to a physical port on a switch or router that…
Syslog is a standard protocol used for sending and receiving log or event messages in a network. It allows devices like routers, switches, and servers to send log data to…
Relay Contact Outputs on unmanaged and managed switches are controlled by a DIP-switch that can be toggled on or off. When set to ON, the DIP-switch activates a relay contact,…
Redundant power input is the inclusion of multiple power sources to ensure continuous device operation in case of a power failure. When one power source fails, the system automatically switches…
Electromagnetic Interference (EMI) refers to unwanted electromagnetic energy that disrupts the normal operation of electronic devices. It can be caused by various sources, such as electrical circuits, radio frequency signals,…
A virtual local area network (VLAN) segments a physical network into smaller, isolated networks. It can help improve security and performance on a network. Layer 2 switches may create and…
A layer 3 network switch operates at the Network Layer of the OSI model. Read more information about the OSI Model. Layer 3 network switches forward data based on IP…
A layer 2 network switch operates at the Data Link Layer of the OSI model. Read more information about the OSI Model. Layer 2 network switches forward data based on…
The Open Systems Interconnection (OSI) model is a reference model which describes seven layers of communication between computing systems over a network. These seven layers are as outlined: Layer 1…
A UDP port is a communication endpoint for transmitting data between devices on a network using the UDP protocol. On Maple Systems products, UDP ports enable fast, connectionless communication for…
A TCP port is a communication endpoint for transmitting data between devices on a network using the TCP protocol. On Maple Systems products, TCP ports facilitate connections between HMIs, PLCs,…
