Auto-sensing of port speed and auto-negotiation of duplex on all switch ports for optimizing bandwidth
Medium-dependent interface crossover ( Auto-MDIX ) capability on 10/100 and 10/100/1000 mbps interfaces that enables the interface to automatically detect the required cable type ( straight thru or crossover ) and to configure the connection appropriately
|802.3x flow control|
IEEE 802.3x flow control on all ports. ( The switch does not initiate pause frames )
|link Aggregation protocol|
Increase port bandwidth through link aggregation. Support is provided for IEEE 802.3ad using link Aggregation Control Protocol ( LACP ). Up to eight ( 8 ) ports in a single port-channel
|Static link Aggregation|
Provides the ability to operate under a static ( manual ) link aggregation scenario ( where the remote switch peer does not support LACP )
Storm control prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast storm on one of the physical interfaces. A LAN storm occurs when packets flood the LAN, creating excessive traffic and degrading network performance. Storm Control enables limits to be placed on broadcast, multicast and unicast traffic
|Bandwidth Control Monitoring|
Bandwidth Control provides the ability to monitor the flow rates on a per port basis and the ability to cause an SNMP trap to occur ( selectable ) and put the port in an "error-disabled" state
|Static MAC Addressing|
This feature enables the manual configuration of the MAC addresses on a per port basis. Flooding is prevented by retaining MAC entries across a reboot of the switch.
Port Blocking provides the ability to block the flooding of unknown layer 2 unicast and multicast traffic on an Interface
|IPV4 IGMP Snooping|
Internet Group Management Protocol ( IGMP ) constrains the flooding of multicast traffic by dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces associated with IP multicast devices.
IGMPv1, v2, v3, IGMP snooping querier mode, IGMP report suppression, topology change notification and robustness variable features are supported
|IPV6 MLD Snooping|
With Multicast Listener Discovery ( MLD) snooping, IPv6 multicast data is selectively forwarded to a list of ports that want to receive the data, instead of being flooded to all ports in a VLAN. This list is constructed by snooping IPv6 multicast control packets
GARP Multicast Registration Protocol ( GMRP ) provides a constrained multicast flooding facility similar to IGMP snooping.
GMRP provides a mechanism that allows bridges and end stations to dynamically register group membership information with the MAC bridges attached to the same LAN segment and for that information to be disseminated across all bridges in the Bridged LAN that supports extended filtering services
|Port Quick Disconnect|
In some network environments, it is desirable to move an Ethernet from one switch port to another and have the device come on-line quickly. The Port Quick Disconnect feature if enabled, provides an immediate age-out of the MAC addresses learned on the port when the port status changes from a link-up to a link-down state
|Web Device Manager|
The Perle Web Device Manager is an embedded Web based application that provides an easy to use browser interface for managing the switch. Operates with both http and secure https streams. Unlike competitive products, Java applet technology is not required or used
|Command Line Interface ( CLI )|
A familiar text-based Command Line Interface that is based on accepted industry standard syntax and structure. Ideal for CCNA and CCNP trained engineers, this interface is available via in-band Telnet/SSH or the out-band serial console port
|Industrial Ethernet Protocols|
Manage Perle IDS-300 switches via PLC, NMS, HMI or SCADA systems using PROFINET or Modbus TCP.
Manage the switch with an SNMP compatible management station that is running platforms such as HP Openview or Perle’s PerleVIEW NMS. SNMP V1 and V2C
PerleVIEW is Perle’s SNMP-based network management system that provides a view of the network with a large scale of Perle networking devices.
Manage with an IPv4 or IPV6 address
|DHCP Client Auto-Configuration|
Automates configuration of switch information such as IP address, default gateway, hostname and Domain Name System ( DNS ) as well as TFTP server names. Firmware and configuration file locations are provided through options 54, 66, 67, 125 and 150
DHCP Relay is used for forwarding requests from DHCP clients when they are not on the same physical subnet. As a DHCP relay agent the switch operates as a Layer 3 device that forwards DHCP packets between clients and servers.
|DHCP Option 82 Insertion|
Normally used in metro or large enterprise deployments DHCP Option 82 insertion is used to provide additional information on “physical attachment” of the client. As per RFC 3046, option 82 enables additional pre-defined information to be inserted into the DHCP request packet ( for DHCP Servers that support this option )
For networks where a central DHCP server is not provided, the switch can provide a DHCP Server function for allocation of IP addresses to the connected devices
|DHCP server port-based address allocation|
When Ethernet switches are deployed in the network, they offer connectivity to the directly connected devices. In some environments, such as on a factory floor, if a device fails, the replacement device must be working immediately in the existing network
When configured, the DHCP server port-based address allocation feature ensures that the same IP address is always offered to the same connected port even as the client identifier or client hardware address changes in the DHCP messages received on that port
LLDP-link Layer Discovery Protocol as per IEEE 802.1AB is a neighbor discovery protocol that is used for network devices to advertise information about themselves to other devices on the network. This protocol runs over the data-link layer, which allows two systems running different network layer protocols to learn about each other ( via TLVs – Type-Length-Value )
LLDP Media Endpoint Discovery is an extension to LLDP that operates between endpoint devices such as IP phones and network devices such as switches. It specifically provides support for voice over IP (VoIP) applications and provides additional TLVs for capabilities discovery, network policy, Power over Ethernet, inventory management and location information
The switch can provide the time to NTP/SNTP capable client devices ( or other switches, etc ). You can run the SNTP client and the NTP server concurrently on your system. Therefore you can obtain time from an outside source and serve that time to the devices connected to the switch.
|IEEE 1588 – PTP ( Precision Time Protocol )|
IEEE 1588 V1 and V2
Boundary Clock V1
Boundary Clock V2
End-to-End Transparent Clock Sync Two Step Operation
End-to-End Transparent Clock Sync One Step Operation
Peer-to-Peer Transparent Clock
End-to-end Boundary clock
Peer-to-peer boundary clock
Firmware can be transferred via TFTP, SCP, HTTP, or HTTPS. Text-based files that can be created or edited by common text editors.
|Secure Copy Protocol ( SCP )|
SCP based on the Secure Shell (SSH) protocol, is a means of securely transferring computer files between a local host and a remote host or between two remote hosts.
|Availability and Redundancy Features|
|Spanning Tree Protocol ( STP )|
IEEE 802.1D now incorporated in IEEE 802.1Q-2014, STP prevents bridge loops and the broadcast radiation that results from them.
Other Spanning Tree features include BPDU guard, Root guard, loop guard, root guard and TCN Guard
|Rapid Spanning Tree Protocol ( RSTP )|
Interoperable with STP, RSTP ( IEEE 802.1w ) takes advantage of point-to-point wiring and provides rapid convergence of the spanning tree. Reconfiguration of the spanning tree can occur in less than 1 second
|Multiple Spanning Tree Protocol ( MSTP )|
Originally defined in IEEE 802.1s and now incorporated IEEE 802.1Q-2014, defines an extension to RSTP for use with VLANs. The Multiple Spanning Tree Protocol configures a separate Spanning Tree for each VLAN group and blocks all but one of the possible alternate paths within each Spanning Tree.
Media Redundancy Protocol ( IEC 62439-2 ).
Fast convergence protocol designed for industrial networks. Recovery time of 10 ms or better in rings composed of up to 14 switches.
Prevents a switch loop scenario in a ring topology.
P-Ring provides an easy to use method for configuring a ring network using standard spanning tree protocols.
Prevents a switch loop scenario in a ring topology.
A link recovery feature using a primary and backup link. Provides a simple alternative to spanning tree protocols for link redundancy
Up to 256 VLANS across a VLAN ID range of 1 to 4000
Generic Attribute Registration Protocol (GARP) VLAN Registration Protocol (GVRP) is an application defined in the IEEE 802.1Q standard that allows for the control of VLANs. With GVRP, the switch can exchange VLAN configuration information with other GVRP switches, prune unnecessary broadcast and unknown unicast traffic, and dynamically create and manage VLANs on switches that are connected through 802.1Q trunk ports.
Voice VLANs enables one to separate, prioritize, and authenticate voice traffic moving through your network, and to avoid the possibility of broadcast storms affecting VoIP (Voice-over-IP) operation. With an IP Phone connected to an access port, a switchport voice VLAN enables the use of one VLAN for voice traffic and another VLAN for data traffic from an Ethernet device attached to the phone
Perle switches provide the ability to configure management VLAN interfaces. This enables network administrators to access the switch’s management interface from separate VLAN networks
Provides secure access to switch ports from a central RADIUS server. The switch operating as an authenticator interacting with an 802.1X compliant supplicant ( PC or industrial device) through the use of the EAPOL protocol. Authentication will be granted/denied through an external RADIUS server.
RADIUS assigned VLAN
Guest VLAN and Restricted VLANs are supported
For non-802.1X devices found in industrial applications, the switch can use the client MAC address for authorization through the use if MAB ( MAC Authentication Bypass )
Switch can also be configured as an 802.1X supplicant ( edge switch ) with an 802.1x-aware upstream switch
|Login Banner and MOTD|
A login message banner presented during sign-on can be configured by the network administrator.
A Message Of The Day can also be created for presentation to an authenticated user.
Password Strength Checking
Many organizations require stringent management over the strength level of their passwords. When enabled, Perle extends this capability to local passwords stored on the switch enforcing strong passwords to be used.
|Port Security – Secure MAC Addresses|
This port security feature provides the ability to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port ( Access or Trunk ) and will take specific actions when violations occur.
Restricting access to management functions can be configured by protocol or IP address selection are provided. This enables administrators to allow only specific workstations using particular protocols to be able to access the management functions of the switch
|RADIUS Management Access Authentication|
AAA support for RADIUS servers that Authenticate, Authorize and Account management sessions
|TACACS+ Management Access Authentication|
AAA support for TACACS+ servers that Authenticate, Authorize and Account management sessions
|Secure Socket Layer ( SSL )|
SSL provided for secure browser sessions using HTTPS
|Secure Shell ( SSH )|
SSH provided for secure SSH session for CLI and SCP file transfer sessions
Support provided for secure version 3 of SNMP
|Quality of Service ( QoS ) and Class of Service ( CoS ) Features|
IP ToS/DSCP and IEEE 802.1p CoS
Weighted Fair Queuing or Strict Queuing
|Egress Queues and scheduling|
N:1 Port Mirroring is a method of monitoring network traffic. With port mirroring enabled, the switch sends a copy of one or more ports to a predefined destination port. Selection of Transmit, Receive frames or both can be made
RMON statistics provided for statistics, history, alarms and events for network monitoring and traffic analysis
Facility for logging systems messages to an external SYSLOG server
Facility for logging systems messages locally
Layer 2 traceroute to identify the path that a frame takes from source to destination
|Virtual cable test|
A test that enables the detection of potential copper cabling issues such as pair polarity pair swaps and excessive pair skew as well as any opens, shorts or any impedance mismatch. Will report the distance in the cable to the open or short.
|Power Supply Monitoring|
Provides the status of power supplies of the switch
|Internal Temperature Monitoring|
The internal ambient temperature of the switch can be obtained from the management interfaces
The switch can monitor global switch conditions as well as individual ports. These alarms can be configured to send messages to ;
Global Status Monitoring Alarms
Port Status Monitoring Alarms
link Fault Alarm ( IE loss of signal )
Port not forwarding alarm
Port not operating alarm ( failure upon start up tests )
FCS Bit error rate alarm
When enabled, energizes the built-alarm relay triggering an external alarm circuit such as a bell, light or other signaling device according to alarm conditions set
|Management and Standards|
IEEE 802.3 for 10base-T
IEEE 802.3u for 100base-T(X) and 100base-X
IEEE 802.3ab for 1000base-T
EEE 802.3z for 1000baseX
IEEE 802.3x for Flow Control
IEEE 802.1D-2004 for Spanning Tree Protocol
IEEE 802.1w for Rapid STP
EEE 802.1s for Multiple Spanning Tree Protocol
IEEE 802.1Q for VLAN Tagging
IEEE 802.1p for Class of Service
IEEE 802.1X for Authentication
IEEE 802.3ad for Port Trunk with LACP
IEEE 802.1AB LLDP
IEEE 1588v1 PTP Precision Time Protocol
IEEE 1588v2 PTP Precision Time Protocol
|SNMP MIB Objects|