The leader in industrial automation and control solutions
Watch on YouTube

Lite-Managed Industrial Network Switch Setup and Configuration Overview

In this tutorial, you will learn how to set up and configure a Maple Systems Lite-Managed Industrial Network Switch. We’ll start by walking through the hardware features of the switch, then guide you through the setup steps like connecting to the device, logging into the web interface, adjusting settings such as the IP address and port configuration, security settings, diagnostics and management.


Software Required


Hardware Required


MS1-L05G01F

Features and Specs (Front)

RJ45 Ethernet Ports

RJ45 Copper Ports5
RJ45 Speed10/100/1000 BASE-T
SFP PortsSpeeds of 100/1000 Mbps
Switch Fabric12 Gbps
L2 Forwarding Rate8.9 Mpps

The 10/100/1000Base-T ports support network speeds of 10 Mbps, 100 Mbps, or 1000 Mbps and can operate in both half- and full-duplex modes. These ports also feature automatic MDI/MDI-X crossover detection, providing true “plug-and-play” capability—just connect the network cables, and the ports will automatically adjust to the connected end-node devices. The following cabling is recommended for the RJ45 connectors:

  1. 10 Mbps – Cat 3 or better
  2. 100/1000 Mbps – Cat 5e or better

SFP Module Port

The two SFP slots are designed to accommodate 100FX or Gigabit SFP modules that support network speeds of 100 Mbps or 1000 Mbps.

LED Indicators

System LEDs
PWR  IlluminatedPrimary Power on
OffPrimary Power off or failure
RPS  IlluminatedRedundant (secondary) Power on
OffRedundant Power off or failure
ALM  IlluminatedAlarm for following conditions(when the DIP switches are turned on) Primary Power lostSecondary Power lost Threshold exceedLoop detection
OffNormal operation
Interface LED
SFP IlluminatedEthernet link-up
BlinkingActivity (receiving or transmitting data)
OffPort disconnected or link failed
Port Number 1-5 LED
1000  IlluminatedLink speed at 1000Mbps
OffLink speed at 10/100Mbps
LNK/ACT  IlluminatedEthernet link-up
BlinkingActivity (receiving or transmitting data)
OffPort disconnected or link failed
Features and Specs (Top)

DIP Switches

DIPFunction Description
PWRPrimary power input from terminal block
ON – Primary power alarm reporting is enabled
OFF – Primary power alarm reporting is disabled
RPSRedundant power input from terminal block
ON – Redundant power alarm reporting is enabled OFF – Redundant power alarm reporting is disabled

Power (Primary and Redundant)

Please refer to the “Lite-Managed Network Switch Operations Manual” for more wiring information and the DS-MS1LM

Input Voltage (Primary)20-57 VDC
Input Voltage (Redundant)20-57 VDC
Input ConnectorTerminal Block
Max Input Current0.35A @ 24 VDC without alarm (1.35A @ 24 VDC with alarm)
Max Power Consumption10W

Alarm Relay

1 Relay Output , 1A @ 24 VDC

Please refer to the “Lite-Managed Network Switch Operations Manual” for more wiring information and the DS-MS1LM

Grounding Screw

Ground the Switch: Before powering on the switch, ground the switch to earth.

Please refer to the “Lite-Managed Network Switch Operations Manual” for more grounding information and the DS-MS1LM

Features and Specs (Bottom)

Manual Reboot / Reset Switch

The switch includes a “Reset” button that allows you to manually reboot the device or restore it to factory default settings.

  • Press the “Reset” button for more than 2 seconds to reboot the switch.
  • Press the “Reset” button for more than 5 seconds to reload the factory default settings to the switch.

MS1-L08G

Features and Specs (Front)

RJ45 Ethernet Ports

RJ45 Copper Ports8
RJ45 Speed10/100/1000 BASE-T
Switch Fabric16 Gbps
L2 Forwarding Rate11.9 Mpps

The 10/100/1000Base-T ports support network speeds of 10 Mbps, 100 Mbps, or 1000 Mbps and can operate in both half- and full-duplex modes. These ports also feature automatic MDI/MDI-X crossover detection, providing true “plug-and-play” capability—just connect the network cables, and the ports will automatically adjust to the connected end-node devices. The following cabling is recommended for the RJ45 connectors:

  1. 10 Mbps – Cat 3 or better
  2. 100/1000 Mbps – Cat 5e or better

LED Indicators

System LEDs
PWR  IlluminatedPrimary Power on
OffPrimary Power off or failure
RPS  IlluminatedRedundant (secondary) Power on
OffRedundant Power off or failure
ALM  IlluminatedAlarm for following conditions(when the DIP switches are turned on) Primary Power lostSecondary Power lost Threshold exceedLoop detection
OffNormal operation
Port Number 1-8 LED
1000  IlluminatedLink speed at 1000Mbps
OffLink speed at 10/100Mbps
LNK/ACT  IlluminatedEthernet link-up
BlinkingActivity (receiving or transmitting data)
OffPort disconnected or link failed
Features and Specs (Top)

DIP Switches

DIPFunction Description
PWRPrimary power input from terminal block
ON – Primary power alarm reporting is enabled
OFF – Primary power alarm reporting is disabled
RPSRedundant power input from terminal block
ON – Redundant power alarm reporting is enabled OFF – Redundant power alarm reporting is disabled

Power (Primary and Redundant)

Please refer to the “Lite-Managed Network Switch Operations Manual” for more wiring information and the DS-MS1LM

Input Voltage (Primary)20-57 VDC
Input Voltage (Redundant)20-57 VDC
Input ConnectorTerminal Block
Max Input Current0.35A @ 24 VDC without alarm (1.35A @ 24 VDC with alarm)
Max Power Consumption10W

Alarm Relay

1 Relay Output, 1A @ 24 VDC

Please refer to the “Lite-Managed Network Switch Operations Manual” for more wiring information and the DS-MS1LM

Manual Reboot/ Reset Switch

The switch includes a “Reset” button that allows you to manually reboot the device or restore it to factory default settings.

  • Press the “Reset” button for more than 2 seconds to reboot the switch.
  • Press the “Reset” button for more than 5 seconds to reload the factory default settings to the switch

Grounding Screw

Ground the Switch: Before powering on the switch, ground the switch to earth.

Please refer to the “Lite-Managed Network Switch Operations Manual” for more grounding information and the DS-MS1LM

Network Configuration

Initially, the new switch connects to the network using the default IP address (192.168.100.254). Enter this IP address in a web browser to access the setup Wizard. After three seconds, the ‘Welcome’ screen will automatically transition to the setup screen, as shown below.”

UI Settings

Wizard Settings

Step 1: Account Settings – Configure user credentials to access the device. This step helps establish the strength of your device’s security.

Step 2: IP Address – Configure the management IP address. The user can select either DHCP mode or Static mode to set the switch’s IP address, as shown below.

Step 3: Access Mode – Choose how to access the device. There are two options: Security Mode (HTTPS, SSH, and SNMPv3) and Normal Mode (HTTP, TELNET, and SNMPv1/v2).

Default:

User name: admin

Password: admin

Dashboard Settings

Learn:
Retrieves the current port registration information.

Reset:
Resets the port registration information.

Port:
Allows the user to select individual or all ports to reset their registration information to default values.

Download:
Downloads port-down statistics, including date and time.

CPU Usage:
Configures CPU usage thresholds—Normal, Alert, or Critical—or disables the feature.

Memory Usage:
Configures memory usage thresholds—Normal, Alert, or Critical—or disables the feature.

Port Tx Usage:
Sets threshold values for transmit (Tx) usage on the interface—Normal, Alert, or Critical—or disables the feature.

Port Rx Usage:
Sets threshold values for receive (Rx) usage on the interface—Normal, Alert, or Critical—or disables the feature.

Apply:
Applies the changes made.

Default:
Restores the switch to its default settings.

Port Settings

Port Settings allow administrators to manage the behavior and performance of individual switch ports. Each port can be enabled or disabled, with disabled ports remaining inactive. Speed and duplex mode settings define how fast a port operates (10, 100, or 1000 Mbps) and whether it uses half-duplex (one-way at a time) or full-duplex (simultaneous two-way) communication. Flow control, based on IEEE 802.3x, helps prevent data loss by pausing traffic when a port’s buffer is full. The link status indicates whether the port is currently active. Additionally, Port Priority settings let users assign traffic priority levels using 802.1p tagging, ensuring that critical data receives higher precedence during network congestion, which improves reliability and overall network performance.

Future Tutorial How to Configure Ports Settings and Port Priority

Loop Detection –

Loop Detection is a network feature designed to identify and prevent loop conditions, typically caused by human error such as accidentally connecting two ports with the same cable. These loops can lead to broadcast storms that degrade network performance. The switch periodically sends probe packets to detect loops; if a probe returns to the same port, the switch disables that port to stop the loop. After a preset recovery time, the port is re-enabled and monitoring resumes, allowing for automatic recovery while maintaining network stability.

Future Tutorial How to Use Loop Detection to Protect Your Network

Ring Settings

The ERPS (Ethernet Ring Protection Switching) feature provides redundancy in ring topologies by preventing loops and enabling rapid recovery from link failures. Key components include the Guard Timer, which suppresses outdated messages during switch events, and the Wait-To-Restore (WTR) Timer, which delays reverting traffic paths to prevent frequent switching. ERPS supports revertive and non-revertive modes, determining whether traffic returns to the original path after recovery. ERPS instances in version 2 allow VLAN-based traffic control, separating control and data via Control VLANs. In contrast, version 1 blocks all traffic on a blocked port. (R)STP (Rapid Spanning Tree Protocol) complements ERPS by eliminating loops and managing backup paths. Its key timers—Forward Delay, Max Age, and Hello Time—ensure proper state transitions and topology updates. STP port settings like Path Cost, Bridge/Port Priority, and protective features like BPDU Guard, BPDU Filter, and Root Guard help optimize loop prevention, root bridge selection, and enforce topology control.

Future Tutorial How to configure ERPS and RSTP/STP for Reliable Ring Network Protection

System Settings

Host Name

The hostname is the same as the SNMP system name. Its length is up to 64 characters.

Management VLAN

The Management VLAN is used to configure the switch management VLAN

Modbus TCP Settings

Modbus TCP supports different types of data format for reading. The primary four types are:

Data Access TypeFunction CodeFunction Name
Bit accessPhysical Discrete Inputs2Read Discrete Inputs
Internal Bits or Physical Coils1Read Coils
Word access (16-bit access)Physical Input Registers4 Read Input Registers
Physical Output Registers3Read Holding Registers

Future Tutorial How to Configure a Modbus TCP Client on Your Network

IGMP Snooping

IGMP Snooping is a network feature that enables a switch to efficiently manage multicast traffic by passively monitoring IGMP packets exchanged between multicast routers/switches and hosts to learn group memberships. Based on this information, the switch forwards multicast traffic only to ports that are members of a multicast group, reducing unnecessary traffic and improving performance. IGMP Snooping can be enabled globally or per VLAN and supports up to 4094 VLANs. In automatic mode, the switch learns group memberships dynamically; in fixed mode, only specified VLANs participate. If IGMP Snooping is disabled globally, it is disabled for all VLANs regardless of individual VLAN settings.

Future Tutorial How IGMP Snooping Works and How to Enable It on VLANs

IPV4 Settings

IPv4 Settings are used to configure the switch’s management IP address, either statically or by using a DHCP client.

Example:

  • The default DHCP client is disabled.
  • The default Static IP is 192.168.0.254
  • Subnet Mask is 255.255.255.0
  • Default Gateway is 0.0.0.0

Example: The procedures to configure an IP address for the Switch.

To enter the configure node:

  • L2SWITCH#configure terminal
  • L2SWITCH(config)#

To enter the ETH0 interface node:

  • L2SWITCH(config)#interface eth0
  • L2SWITCH(config-if)#

To get an IP address from a DHCP server:

  • L2SWITCH(config-if)#ip dhcp client enable

To configure a static IP address and a gateway for the Switch:

  • L2SWITCH(config-if)#ip address 192.168.202.111/24
  • L2SWITCH(config-if)#ip address default-gateway 192.168.202.1

Network Topology

Topology Settings

Map Settings

Picture – Select the file you want to display as the background. The Preview window will immediately show your selection. When you click the “Upgrade” button, the file will be downloaded to the switch and applied after the next reboot.

Color – Allows the user to select a standard background color. The Preview window will immediately display the selected color.

Neighbor Devices

LLDP – The Link Layer Discovery Protocol (LLDP), as defined in the IEEE 802 standard, enables devices connected to the same LAN to advertise their key capabilities to each other. This includes system information such as supported features, management addresses, and details identifying the device’s connection point on the network. LLDP helps management systems discover and manage devices on the network more effectively. The information distributed by LLDP is stored by receiving devices in a standardized Management Information Base (MIB). This allows a Network Management System (NMS) to access the information using a management protocol such as Simple Network Management Protocol (SNMP).

Default Settings

The LLDP on the Switch is enabled.

Tx Interval          :  30 seconds.

Tx Hold               :  4 times.

Time To Live      :  120 seconds.

Manual Registration – If devices do not support LLDP or ONVIF, the user must manually enter their details using the manual registration feature. This function supports four device types: IP Camera, PLC, Switch, and PC.

ONVIF – ONVIF is an open industry forum that promotes standardized interfaces to ensure effective interoperability of IP-based physical security products. The switch uses ONVIF to detect whether any ONVIF-compliant devices are connected to it.

Topology Map

The Topology Map is a feature that allows users to view information about neighboring devices and configure them easily. When you click on “Topology Map,” the system will display a visual layout of the network. All devices directly connected to the switch and supporting LLDP will appear on the screen.

If the neighboring device is a switch that supports the Lamungan server function, you can right-click on its icon to open a context menu. From this menu, you can select configuration options for that switch.

NOTE: The Topology map can be viewed only on Google or Firefox browsers.

When you click the “Topology Map Lock”, a green circle on the devices indicates they are working normally.

Security

Security Settings

802.1x

802.1X is a port-based network authentication protocol involving three entities: the supplicant (client device), the authenticator (typically a switch or access point), and the authentication server (usually a RADIUS server). The authenticator acts as a gatekeeper, allowing network access only after verifying the supplicant’s credentials, such as a username/password or digital certificate. It supports various control modes, including auto (access granted after authentication), force-authorized (access without authentication), and force-unauthorized (no access). The system includes configurable timers for re-authentication intervals, authentication timeouts, and retries to enhance security and stability. Local user accounts allow authentication without a server but have limitations. The Guest VLAN feature provides limited network access to clients needing to download or update 802.1X software when they don’t respond to authentication requests.

Future Tutorial How to Configure and Set Up 802.1X Port-Based Authentication

ACL (Access Control List)

An Access Control List (ACL) is a set of rules that define which users or devices can access a network object and what actions they’re allowed to perform. In Layer 2 (L2) ACLs, rules can be configured to reject packets based on source or destination MAC addresses from specific ingress ports or all ports. When a packet matches a rule, the defined action—typically “deny”—is enforced. If multiple rules match, the system uses the Action Resolution engine to apply the action and metering results from the highest-priority matching rule.

Future Tutorial How to Use ACLs for Enhanced Network Security Port Security

Port Security

The Switch learns the MAC address of the device directly connected to each port and allows traffic through accordingly. But how do we control who—and how many—devices can connect to a switch port? This is where port security helps. Port security allows us to control which devices can connect to a switch port and how many devices are allowed to connect, such as when a hub or another switch is connected to that port.

For example, imagine you have only one free switch port but need to connect five hosts. One solution is to connect a hub or another switch to that free port. However, connecting a hub or switch increases network traffic and can introduce risks such as network loops, especially if connected by unauthorized users. To prevent this, it’s best to restrict the number of hosts allowed to connect at the switch level.

This restriction can be configured using the port-security limit command, which sets the maximum number of MAC addresses allowed to source traffic through a port. Port security enforces a maximum number of MAC addresses per interface. When the limit is exceeded, incoming packets with new MAC addresses are dropped. The switch uses its MAC address table to enforce this limit, and static MAC addresses count toward the maximum allowed.

Default Settings:

Port security on the switch is disabled

The max number of MAC addresses allowed per port is 5

The port security state on the port is disabled

Server Control

This function allows users to enable or disable the HTTP, HTTPS, SNMPv1/v2c, SNMPv3, SSH, and Telnet services individually.

Storm Control

A broadcast storm occurs when a network is overwhelmed by continuous broadcast or multicast traffic. This can eventually cause a complete loss of network connectivity as packets multiply uncontrollably.

Storm Control protects the switch’s bandwidth from being flooded by such packets, including broadcast, multicast, and destination lookup failure (DLF) packets.

Broadcast storm control limits the number of broadcast, multicast, and unknown unicast (also called DLF) packets the switch receives per second on its ports. When the maximum allowed number of these packets per second is reached, any additional packets are discarded.

Enabling this feature helps reduce broadcast, multicast, and unknown unicast traffic in your network.

Alarm Threshold – When the selected packet rate exceeds the alarm threshold, the Switch will send a syslog alarm to the syslog server

By default, the rate limit is set to 300 packets per second (pps) for broadcast and DLF traffic. You can configure the maximum rate up to 5000 pps for multicast, broadcast, or DLF packets.

VLAN

A Virtual LAN (VLAN) is a group of hosts with a common set of requirements that communicate as if they were in the same broadcast domain, regardless of their physical location. A VLAN has the same characteristics as a physical LAN but allows end stations to be logically grouped even if they are connected to different network switches.

On the Maple Systems Lite Managed Switches, users can configure a maximum of 5 VLANs per interface, using a format such as 1, 3, 7, 10, 25.

VLANs enable flexible and efficient network reconfiguration through software, eliminating the need to physically relocate devices.

Future Tutorial What is a VLAN and How to Manage it on Your Network

Diagnostics

Diagnosis Information

Diagnosis

Alarm Information

  • Purpose: To alert users when critical events occur (e.g., power failure).
  • Configuration: Use the Alarm DIP Switch to enable or disable alarms for specific events.

Future Tutorial How to Configure Alarms and Syslog for Effective Network Monitoring

Port Mirror

Port-Based Mirroring is used on a network switch to send a copy of network packets sent or received on one switch port to a network monitoring connection on another switch port (Destination Port). This is commonly used for network appliances that require monitoring of network traffic, such as an intrusion detection system.
Port Mirroring, together with a network traffic analyzer, helps monitor network traffic.

Default Settings

Mirror Configurations:

State – Disabled

Monitor Port – 1

Ingress port(s) – None

Egress port(s) – None

Port Statistics – This feature helps users monitor port statistics by displaying traffic utilization for link-up ports only.

Port Utilization – This feature helps users monitor the traffic utilization of ports, displaying only those that are currently link-up.

Syslog

The syslog function records certain system information for debugging purposes. Each log message is recorded with one of the following levels: Alert, Critical, Error, Warning, Notice, or Information. The syslog function can be enabled or disabled; by default, it is disabled. Log messages are stored in the switch’s file system. If a syslog server IP address is configured, the switch will also send a copy of each log message to the syslog server.
The log file is limited to 2,000 entries. When the file is full, the oldest entry will be overwritten.

Future Tutorial How to Configure Alarms and Syslog for Effective Network Monitoring

Utilization Threshold – This feature alerts the user when the packet rate on a particular port exceeds the specified threshold.

Management

SNMP, SNTP, Maintenance, User Settings

SNMP

Simple Network Management Protocol (SNMP) is used in network management systems to monitor network-attached devices for conditions that require administrative attention. It is a component of the Internet Protocol Suite, as defined by the Internet Engineering Task Force (IETF). SNMP consists of a set of standards for network management, including an application-layer protocol, a database schema, and a collection of data objects.
SNMP exposes management data as variables on managed systems, which describe system configurations. These variables can be queried—and, in some cases, modified—by managing applications.

Trap Event – The features allow users to enable or disable individual trap notifications.

Future Tutorial How to Enable and Manage SNMP Trap Receivers

SNMPv3

SNMP version 3 (SNMPv3) supports both authentication and encryption. It uses the User-Based Security Model (USM) for message security and the View-Based Access Control Model (VACM) for access control. USM defines mechanisms for authentication and encryption.

For more details on SNMPv3 please refer to the Lite Managed Network witch Operations Manual7.2

SNTP

The Network Time Protocol (NTP) is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks. A simplified version of NTP, called the Simple Network Time Protocol (SNTP), uses the same protocol but does not require maintaining state information over long periods. NTP provides time in Coordinated Universal Time (UTC). It does not transmit information about time zones or daylight saving time—this data must be managed separately.

To get more detailed information on SNTP, please refer to the Lite Managed Network Switch Operations Manual – 7.3 SNTP

System Information

The System Information window appears automatically each time you log into the program. You can also access it manually by clicking System Information.

System Maintenance

Configuration

  1. Click the “Choose File” button to select the new configuration file you want to upload to the switch.
  2. Click the “Upload” button to begin the upgrade process.
  3. Click the “Download” button to download the current configuration to your local host.

Reset Configuration
Click the “Reset” button to restore the system configuration to its default values.

Firmware

  1. Click the “Choose File” button to select the new firmware file you want to upload to the switch.
  2. Click the “Upgrade” button to begin the upgrade process.

Reboot –

Click the “Reboot” button to restart the switch.

User Account

The switch allows users to create up to six user accounts. Each username and password must be a combination of letters and/or digits. The last remaining admin account cannot be deleted. A valid user account is required to log in to the CLI or web interface.

User Authority

The switch supports two types of user accounts:

  • Admin – Read/Write access
  • Normal – Read-only access (cannot apply any configuration changes via the web interface)

The default user account is:
Username: admin
Password: admin

The switch also supports a backdoor user account feature. If a user forgets their username or password, the switch can generate a temporary backdoor account using the system’s MAC address. This account allows access to the switch so users can create a new user account.

Default Settings

  • Maximum number of user accounts: 6
  • Maximum username length: 32 characters
  • Maximum password length: 32 characters
  • Default admin account: admin / admin

Notices

  • The switch supports up to six user accounts.
  • Usernames and passwords must consist of letters and/or digits.
  • The last admin account cannot be deleted.
  • The maximum length for both usernames and passwords is 32 characters.

Resources & Documentation

Lite-Managed Network Switches Resources:

More
Tutorials
Sample Projects
Software Downloads

See our Support Center for a complete list of Quick Start and Installation Guides

Kyle Nicholas Avatar