Advantech EKI-7706G-2FI 4GE+2G SFP Managed Ethernet Switch User Manual

Add to My manuals
173 Pages

advertisement

Advantech EKI-7706G-2FI 4GE+2G SFP Managed Ethernet Switch User Manual | Manualzz

User Manual

EKI-7706 Series

4FE+2G SFP/4GE+2G SFP L2

Managed Switch

Copyright

The documentation and the software included with this product are copyrighted 2018 by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co.,

Ltd. Information provided in this manual is intended to be accurate and reliable. However, Advantech Co., Ltd. assumes no responsibility for its use, nor for any infringements of the rights of third parties, which may result from its use.

Acknowledgements

Intel and Pentium are trademarks of Intel Corporation.

Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corp.

All other product names or trademarks are properties of their respective owners.

Product Warranty (5 years)

Advantech warrants to you, the original purchaser, that each of its products will be free from defects in materials and workmanship for five years from the date of purchase.

This warranty does not apply to any products which have been repaired or altered by persons other than repair personnel authorized by Advantech, or which have been subject to misuse, abuse, accident or improper installation. Advantech assumes no liability under the terms of this warranty as a consequence of such events.

Because of Advantech’s high quality-control standards and rigorous testing, most of our customers never need to use our repair service. If an Advantech product is defective, it will be repaired or replaced at no charge during the warranty period. For out ofwarranty repairs, you will be billed according to the cost of replacement materials, service time and freight. Please consult your dealer for more details.

If you think you have a defective product, follow these steps:

1.

Collect all the information about the problem encountered. (For example, CPU speed, Advantech products used, other hardware and software used, etc.) Note anything abnormal and list any on screen messages you get when the problem occurs.

2.

Call your dealer and describe the problem. Please have your manual, product, and any helpful information readily available.

3.

If your product is diagnosed as defective, obtain an RMA (return merchandize authorization) number from your dealer. This allows us to process your return more quickly.

4.

Carefully pack the defective product, a fully-completed Repair and Replacement

Order Card and a photocopy proof of purchase date (such as your sales receipt) in a shippable container. A product returned without proof of the purchase date is not eligible for warranty service.

5.

Write the RMA number visibly on the outside of the package and ship it prepaid to your dealer.

Part No. XXXXXXXXXX

Printed in Taiwan ii

Edition 1

September 2019

EKI-7706 Series User Manual

Declaration of Conformity

CE

This product has passed the CE test for environmental specifications. Test conditions for passing included the equipment being operated within an industrial enclosure. In order to protect the product from being damaged by ESD (Electrostatic Discharge) and EMI leakage, we strongly recommend the use of CE-compliant industrial enclosure products.

FCC Class A

Note: This equipment has been tested and found to comply with the limits for a Class

A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.

Technical Support and Assistance

1.

Visit the Advantech web site at www.advantech.com/support where you can find the latest information about the product.

2.

Contact your distributor, sales representative, or Advantech's customer service center for technical support if you need additional assistance. Please have the following information ready before you call:

– Product name and serial number

– Description of your peripheral attachments

– Description of your software (operating system, version, application software, etc.)

– A complete description of the problem

– The exact wording of any error messages

EKI-7706 Series User Manual iii

Warnings, Cautions and Notes

Warning!

Warnings indicate conditions, which if not observed, can cause personal injury!

Caution!

Cautions are included to help you avoid damaging hardware or losing data. e.g.

There is a danger of a new battery exploding if it is incorrectly installed.

Do not attempt to recharge, force open, or heat the battery. Replace the battery only with the same or equivalent type recommended by the manufacturer. Discard used batteries according to the manufacturer's instructions.

Note!

Notes provide optional additional information.

Document Feedback

To assist us in making improvements to this manual, we would welcome comments and constructive criticism. Please send all such - in writing to: [email protected]

Packing List

Before setting up the system, check that the items listed below are included and in good condition. If any item does not accord with the table, please contact your dealer immediately.

 1 x Industrial Ethernet Switch

 1 x DIN-Rail mounting Bracket and Screws

 1 x Wall-mounting Bracket

 1 x Startup Manual iv EKI-7706 Series User Manual

Safety Instructions

1.

Read these safety instructions carefully.

2.

Keep this User Manual for later reference.

3.

Disconnect this equipment from any AC outlet before cleaning. Use a damp cloth. Do not use liquid or spray detergents for cleaning.

4.

For plug-in equipment, the power outlet socket must be located near the equipment and must be easily accessible.

5.

Keep this equipment away from humidity.

6.

Put this equipment on a reliable surface during installation. Dropping it or letting it fall may cause damage.

7.

The openings on the enclosure are for air convection. Protect the equipment from overheating. DO NOT COVER THE OPENINGS.

8.

Make sure the voltage of the power source is correct before connecting the equipment to the power outlet.

9.

Position the power cord so that people cannot step on it. Do not place anything over the power cord.

10.

All cautions and warnings on the equipment should be noted.

11.

If the equipment is not used for a long time, disconnect it from the power source to avoid damage by transient overvoltage.

12.

Never pour any liquid into an opening. This may cause fire or electrical shock.

13.

Never open the equipment. For safety reasons, the equipment should be opened only by qualified service personnel.

14.

If one of the following situations arises, get the equipment checked by service personnel:

15.

The power cord or plug is damaged.

16.

Liquid has penetrated into the equipment.

17.

The equipment has been exposed to moisture.

18.

The equipment does not work well, or you cannot get it to work according to the user's manual.

19.

The equipment has been dropped and damaged.

20.

The equipment has obvious signs of breakage.

21.

DO NOT LEAVE THIS EQUIPMENT IN AN ENVIRONMENT WHERE THE

STORAGE TEMPERATURE MAY GO -40°C (-40°F) ~ 85°C (185°F). THIS

COULD DAMAGE THE EQUIPMENT. THE EQUIPMENT SHOULD BE IN A

CONTROLLED ENVIRONMENT.

22.

CAUTION: DANGER OF EXPLOSION IF BATTERY IS INCORRECTLY

REPLACED. REPLACE ONLY WITH THE SAME OR EQUIVALENT TYPE

RECOMMENDED BY THE MANUFACTURER, DISCARD USED BATTERIES

ACCORDING TO THE MANUFACTURER'S INSTRUCTIONS.

23.

The sound pressure level at the operator's position according to IEC 704-1:1982 is no more than 70 dB (A).

DISCLAIMER: This set of instructions is given according to IEC 704-1. Advantech disclaims all responsibility for the accuracy of any statements contained herein.

EKI-7706 Series User Manual v

Wichtige Sicherheishinweise

1.

Bitte lesen sie Sich diese Hinweise sorgfältig durch.

2.

Heben Sie diese Anleitung für den späteren Gebrauch auf.

3.

Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie

Keine Flüssig-oder Aerosolreiniger. Am besten dient ein angefeuchtetes Tuch zur Reinigung.

4.

Die NetzanschluBsteckdose soll nahe dem Gerät angebracht und leicht zugänglich sein.

5.

Das Gerät ist vor Feuchtigkeit zu schützen.

6.

Bei der Aufstellung des Gerätes ist auf sicheren Stand zu achten. Ein Kippen oder Fallen könnte Verletzungen hervorrufen.

7.

Die Belüftungsöffnungen dienen zur Luftzirkulation die das Gerät vor überhitzung schützt. Sorgen Sie dafür, daB diese Öffnungen nicht abgedeckt werden.

8.

Beachten Sie beim. AnschluB an das Stromnetz die AnschluBwerte.

9.

Verlegen Sie die NetzanschluBleitung so, daB niemand darüber fallen kann. Es sollte auch nichts auf der Leitung abgestellt werden.

10.

Alle Hinweise und Warnungen die sich am Geräten befinden sind zu beachten.

11.

Wird das Gerät über einen längeren Zeitraum nicht benutzt, sollten Sie es vom

Stromnetz trennen. Somit wird im Falle einer Überspannung eine Beschädigung vermieden.

12.

Durch die Lüftungsöffnungen dürfen niemals Gegenstände oder Flüssigkeiten in das Gerät gelangen. Dies könnte einen Brand bzw. elektrischen Schlag auslösen.

13.

Öffnen Sie niemals das Gerät. Das Gerät darf aus Gründen der elektrischen

Sicherheit nur von authorisiertem Servicepersonal geöffnet werden.

14.

Wenn folgende Situationen auftreten ist das Gerät vom Stromnetz zu trennen und von einer qualifizierten Servicestelle zu überprüfen:

15.

Netzkabel oder Netzstecker sind beschädigt.

16.

Flüssigkeit ist in das Gerät eingedrungen.

17.

Das Gerät war Feuchtigkeit ausgesetzt.

18.

Wenn das Gerät nicht der Bedienungsanleitung entsprechend funktioniert oder

Sie mit Hilfe dieser Anleitung keine Verbesserung erzielen.

19.

Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt.

20.

Wenn das Gerät deutliche Anzeichen eines Defektes aufweist.

21.

VOSICHT: Explisionsgefahr bei unsachgemaben Austausch der Batterie.Ersatz nur durch densellben order einem vom Hersteller empfohlene-mahnlichen Typ.

Entsorgung gebrauchter Batterien navh Angaben des Herstellers.

22.

ACHTUNG: Es besteht die Explosionsgefahr, falls die Batterie auf nicht fachmännische Weise gewechselt wird. Verfangen Sie die Batterie nur gleicher oder entsprechender Type, wie vom Hersteller empfohlen. Entsorgen Sie Batterien nach Anweisung des Herstellers.

23.

Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt

70dB(A) oder weiger.

Haftungsausschluss: Die Bedienungsanleitungen wurden entsprechend der IEC-

704-1 erstellt. Advantech lehnt jegliche Verantwortung für die Richtigkeit der in diesem Zusammenhang getätigten Aussagen ab.

vi EKI-7706 Series User Manual

Safety Precaution - Static Electricity

Static electricity can cause bodily harm or damage electronic devices. To avoid damage, keep static-sensitive devices in the static-protective packaging until the installation period. The following guidelines are also recommended:

 Wear a grounded wrist or ankle strap and use gloves to prevent direct contact to the device before servicing the device. Avoid nylon gloves or work clothes, which tend to build up a charge.

 Always disconnect the power from the device before servicing it.

 Before plugging a cable into any port, discharge the voltage stored on the cable by touching the electrical contacts to the ground surface.

EKI-7706 Series User Manual vii

Contents

Chapter 1

Product Overview

................................1

1.1

1.2

Specifications ............................................................................................ 2

Hardware Views ........................................................................................ 3

1.2.1

Front View..................................................................................... 3

1.2.2

Rear View ..................................................................................... 5

1.2.3

Top View ....................................................................................... 5

1.2.4

Bottom View.................................................................................. 6

Chapter 2

Switch Installation

...............................7

2.1

2.2

2.3

2.4

2.5

2.6

2.7

2.8

Installation Guidelines ............................................................................... 8

2.1.1

Connecting Hardware ................................................................... 8

Verifying Switch Operation........................................................................ 8

Installing the Switch .................................................................................. 9

2.3.1

DIN Rail Mounting......................................................................... 9

2.3.2

Wall-Mounting ............................................................................. 11

Installing and Removing SFP Modules ................................................... 14

2.4.1

Installing SFP Modules ............................................................... 14

2.4.2

Removing SFP Modules ............................................................. 16

Connecting the Switch to Ethernet Ports ................................................ 17

2.5.1

RJ45 Ethernet Cable Wiring ....................................................... 17

Connecting the Switch to Console Port................................................... 18

Power Supply Installation........................................................................ 19

2.7.1

Overview ..................................................................................... 19

2.7.2

Considerations ............................................................................ 20

2.7.3

Grounding the Device ................................................................. 20

2.7.4

Wiring a Relay Contact ............................................................... 21

2.7.5

Wiring the Power Inputs.............................................................. 21

Reset Button ........................................................................................... 23

Chapter 3

Configuration Utility

..........................24

3.1

3.2

3.3

First Time Setup...................................................................................... 25

3.1.1

Overview ..................................................................................... 25

3.1.2

Introduction ................................................................................. 25

3.1.3

Administrative Interface Access.................................................. 25

3.1.4

Using the Graphical (Web) Interface........................................... 26

3.1.5

Configuring the Switch for Network Access ................................ 26

3.1.6

Configuring the Ethernet Ports.................................................... 27

Command Line Interface Configuration .................................................. 28

3.2.1

Introduction to Command-Line Interface (CLI)............................ 28

3.2.2

Accessing the CLI ....................................................................... 28

Web Browser Configuration .................................................................... 29

3.3.1

Preparing for Web Configuration ................................................ 29

3.3.2

System Login .............................................................................. 29

Chapter 4

Managing Switch

...............................30

4.1

4.2

Log In ...................................................................................................... 31

Recommended Practices ........................................................................ 31

4.2.1

Changing Default Password ....................................................... 31

viii EKI-7706 Series User Manual

4.3

4.4

4.5

4.6

4.7

4.8

4.9

Monitoring ............................................................................................... 32

4.3.1

Device Information...................................................................... 32

4.3.2

Logging Message ....................................................................... 33

4.3.3

Port Monitoring ........................................................................... 34

4.3.4

Link Aggregation......................................................................... 35

4.3.5

LLDP Statistics ........................................................................... 36

4.3.6

IGMP Statistics ........................................................................... 37

4.3.7

MLD Statistics............................................................................. 38

System .................................................................................................... 39

4.4.1

IP Settings .................................................................................. 39

4.4.2

IPv6 Settings............................................................................... 40

4.4.3

DHCP Client Option 82............................................................... 41

4.4.4

DHCP Auto Provision ................................................................. 42

4.4.5

Management VLAN .................................................................... 42

4.4.6

System Time............................................................................... 43

4.4.7

Network Port ............................................................................... 44

L2 Switching............................................................................................ 45

4.5.1

Port Configuration....................................................................... 45

4.5.2

Port Mirror................................................................................... 46

4.5.3

Link Aggregation......................................................................... 47

4.5.4

802.1Q VLAN.............................................................................. 50

4.5.5

Q-in-Q ......................................................................................... 53

4.5.6

GARP.......................................................................................... 55

4.5.7

802.3az EEE............................................................................... 57

4.5.8

Multicast...................................................................................... 57

4.5.9

Jumbo Frame.............................................................................. 62

4.5.10 Spanning Tree ............................................................................ 63

4.5.11 X-Ring Elite................................................................................. 68

4.5.12 X-Ring Pro .................................................................................. 69

4.5.13 Loopback Detection .................................................................... 72

4.5.14 ERPS .......................................................................................... 73

MAC Address Table................................................................................ 75

4.6.1

Static MAC.................................................................................. 75

4.6.2

MAC Aging Time......................................................................... 75

4.6.3

Dynamic Forwarding Table......................................................... 76

Security ................................................................................................... 77

4.7.1

Storm Control.............................................................................. 77

4.7.2

Port Security ............................................................................... 79

4.7.3

Protected Ports ........................................................................... 79

4.7.4

DoS Prevention........................................................................... 80

4.7.5

Applications ................................................................................ 82

4.7.6

802.1x ......................................................................................... 85

4.7.7

IP Security .................................................................................. 86

4.7.8

Security Login ............................................................................. 87

4.7.9

Access Control List ..................................................................... 90

4.7.10 IP Source Guard ......................................................................... 92

4.7.11 DHCP Snooping ......................................................................... 93

4.7.12 ARP Spoofing ............................................................................. 94

QoS......................................................................................................... 95

4.8.1

General ....................................................................................... 95

4.8.2

QoS Basic Mode....................................................................... 101

4.8.3

Rate Limit.................................................................................. 102

4.8.4

Bandwidth Guarantee ............................................................... 104

Management ......................................................................................... 106

4.9.1

LLDP......................................................................................... 106

4.9.2

SNMP ....................................................................................... 109

4.9.3

Power Over Ethernet ................................................................ 112

4.9.4

TCP Modbus Settings............................................................... 114

4.9.5

DHCP Server ............................................................................ 115

4.9.6

SMTP Client.............................................................................. 121

EKI-7706 Series User Manual ix

4.10

4.11

4.12

4.9.7

RMON ....................................................................................... 123

4.9.8

NTP Server ............................................................................... 127

Diagnostics............................................................................................ 128

4.10.1 Cable Diagnostics ..................................................................... 128

4.10.2 Ping Test................................................................................... 129

4.10.3 IPv6 Ping Test........................................................................... 130

4.10.4 System Log ............................................................................... 132

4.10.5 DDM.......................................................................................... 134

4.10.6 LED Indication........................................................................... 135

Tools ..................................................................................................... 136

4.11.1 IXM............................................................................................ 136

4.11.2 Backup Manager....................................................................... 136

4.11.3 Upgrade Manager ..................................................................... 138

4.11.4 Dual Image................................................................................ 139

4.11.5 Save Configuration ................................................................... 139

4.11.6 User Account ............................................................................ 139

4.11.7 N-Key ....................................................................................... 140

4.11.8 Reset System............................................................................ 140

4.11.9 Reboot Device .......................................................................... 140

Modbus/TCP Mapping .......................................................................... 140

4.12.1 Modbus/TCP Mapping Table .................................................... 142

Chapter 5

Troubleshooting

..............................158

5.1

Troubleshooting .................................................................................... 159

x EKI-7706 Series User Manual

List of Figures

Figure 4.5

Figure 4.6

Figure 4.7

Figure 4.8

Figure 4.9

Figure 4.10

Figure 4.11

Figure 4.12

Figure 4.13

Figure 4.14

Figure 4.15

Figure 4.16

Figure 4.17

Figure 4.18

Figure 4.19

Figure 4.20

Figure 4.21

Figure 4.22

Figure 4.23

Figure 4.24

Figure 4.25

Figure 4.26

Figure 4.27

Figure 4.28

Figure 2.12

Figure 2.13

Figure 2.14

Figure 2.15

Figure 2.16

Figure 2.17

Figure 2.18

Figure 2.19

Figure 2.20

Figure 2.21

Figure 2.22

Figure 2.23

Figure 4.1

Figure 4.2

Figure 4.3

Figure 4.4

Figure 1.1

Figure 1.2

Figure 1.3

Figure 1.4

Figure 1.5

Figure 2.1

Figure 2.2

Figure 2.3

Figure 2.4

Figure 2.5

Figure 2.6

Figure 2.7

Figure 2.8

Figure 2.9

Figure 2.10

Figure 2.11

Front View ..................................................................................................................... 3

System LED Panel ........................................................................................................ 4

Rear View...................................................................................................................... 5

Top View ....................................................................................................................... 5

Bottom View .................................................................................................................. 6

Installing the DIN-Rail Mounting Kit............................................................................... 9

Correctly Installed DIN Rail Kit ................................................................................... 10

Removing the DIN-Rail................................................................................................ 10

Removing DIN Mount Plate......................................................................................... 11

Installing Wall Mount Plates ........................................................................................ 12

Securing Wall Mounting Screws.................................................................................. 12

Wall Mount Installation ................................................................................................ 13

Removing the Dust Plug from an SFP Slot ................................................................. 14

Installing an SFP Transceiver ..................................................................................... 15

Attaching a Fiber Optic Cable to a Transceiver........................................................... 15

Removing a Fiber Optic Cable to a Transceiver ......................................................... 16

Removing an SFP Transceiver ................................................................................... 16

Ethernet Plug & Connector Pin Position...................................................................... 17

Serial Console Cable................................................................................................... 18

DB 9 Pin Position ........................................................................................................ 18

Pin Assignment ........................................................................................................... 18

Power Wiring for EKI-7706 Series............................................................................... 19

Grounding Connection ................................................................................................ 21

Terminal Receptor: Relay Contact .............................................................................. 21

Terminal Receptor: Power Input Contacts .................................................................. 22

Removing a Terminal Block ........................................................................................ 22

Installing DC Wires in a Terminal Block ...................................................................... 22

Securing a Terminal Block to a Receptor.................................................................... 23

Login Screen ............................................................................................................... 31

Changing a Default Password..................................................................................... 32

Monitoring > Device Information.................................................................................. 32

Monitoring > Logging Message ................................................................................... 33

Monitoring > Port Monitoring > Port Statistics ............................................................. 34

Monitoring > Port Monitoring > Port Utilization............................................................ 35

Monitoring > LLDP Statistics ....................................................................................... 36

Monitoring > IGMP Statistics ....................................................................................... 37

Monitoring > MLD Statistics......................................................................................... 38

System > IP Settings ................................................................................................... 39

System > IPv6 Settings ............................................................................................... 40

System > DHCP Client Option 82 ............................................................................... 41

System > DHCP Auto Provision .................................................................................. 42

System > Management VLAN ..................................................................................... 42

System > System Time ............................................................................................... 43

System > Network Port................................................................................................ 44

L2 Switching > Port Configuration ............................................................................... 45

L2 Switching > Port Mirror ........................................................................................... 46

L2 Switching > Link Aggregation > Load Balance....................................................... 47

L2 Switching > Link Aggregation > LAG Management................................................ 47

L2 Switching > Link Aggregation > LAG Port Settings ................................................ 48

L2 Switching > Link Aggregation > LACP Priority Settings ......................................... 48

L2 Switching > Link Aggregation > LACP Port Settings.............................................. 49

L2 Switching > 802.1Q VLAN > VLAN Management .................................................. 50

L2 Switching > 802.1Q VLAN > PVID Settings ........................................................... 51

L2 Switching > 802.1Q VLAN > Port to VLAN............................................................. 52

L2 Switching > Q-in-Q > Global Settings..................................................................... 53

L2 Switching > Q-in-Q > Port Settings ........................................................................ 54

EKI-7706 Series User Manual xi

Figure 4.45

Figure 4.46

Figure 4.47

Figure 4.48

Figure 4.49

Figure 4.50

Figure 4.51

Figure 4.52

Figure 4.53

Figure 4.54

Figure 4.55

Figure 4.56

Figure 4.57

Figure 4.58

Figure 4.59

Figure 4.60

Figure 4.29

Figure 4.30

Figure 4.31

Figure 4.32

Figure 4.33

Figure 4.34

Figure 4.35

Figure 4.36

Figure 4.37

Figure 4.38

Figure 4.39

Figure 4.40

Figure 4.41

Figure 4.42

Figure 4.43

Figure 4.44

Figure 4.61

Figure 4.62

Figure 4.63

Figure 4.64

Figure 4.65

Figure 4.66

Figure 4.67

Figure 4.68

Figure 4.69

Figure 4.70

Figure 4.71

Figure 4.72

Figure 4.73

Figure 4.74

Figure 4.75

Figure 4.76

Figure 4.77

Figure 4.78

Figure 4.79

Figure 4.80

Figure 4.81

Figure 4.82

Figure 4.83

Figure 4.84

Figure 4.85

Figure 4.86

L2 Switching > GARP > GARP Settings...................................................................... 55

L2 Switching > GARP > GVRP Settings...................................................................... 56

L2 Switching > GARP > GMRP Settings ..................................................................... 56

L2 Switching > 802.3az EEE ....................................................................................... 57

L2 Switching > Multicast > Multicast Filtering .............................................................. 57

L2 Switching > Multicast > IGMP Snooping > IGMP Settings ..................................... 58

L2 Switching > Multicast > IGMP Snooping > IGMP Querier ...................................... 59

L2 Switching > Multicast > IGMP Snooping > IGMP Static Groups ............................ 59

L2 Switching > Multicast > MLD Snooping > MLD Settings ........................................ 60

L2 Switching > Multicast > MLD Snooping > MLD Querier ......................................... 61

L2 Switching > Multicast > MLD Snooping > MLD Static Group ................................. 61

L2 Switching > Jumbo Frame ...................................................................................... 62

L2 Switching > Spanning Tree > STP Global Settings ................................................ 63

L2 Switching > Spanning Tree > STP Port Settings .................................................... 64

L2 Switching > Spanning Tree > STP Bridge Settings ................................................ 65

L2 Switching > Spanning Tree > STP Port Advanced Settings ................................... 66

L2 Switching > Spanning Tree > MST Config Identification ........................................ 66

L2 Switching > Spanning Tree > MST Instance ID Settings........................................ 67

L2 Switching > Spanning Tree > MST Instance Priority Settings ................................ 67

L2 Switching > X-Ring Elite > X-Ring Elite Settings .................................................... 68

L2 Switching > X-Ring Elite > X-Ring Elite Groups ..................................................... 69

L2 Switching > X-Ring Pro > X-Ring Pro Settings ....................................................... 69

L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro Groups Settings........ 70

L2 Switching > X-Ring Pro > X-Ring Pro Groups > Chain Settings............................. 70

L2 Switching > X-Ring Pro > X-Ring Pro Groups > Couple Setting ............................ 70

L2 Switching > X-Ring Pro > X-Ring Pro Groups > Pair Settings................................ 71

L2 Switching > X-Ring Pro > X-Ring Pro Groups > RPair Settings ............................. 71

L2 Switching > Loopback Detection > Global Settings................................................ 72

L2 Switching > Loopback Detection > Port Settings.................................................... 73

L2 Switching > ERPS > ERPS Settings ...................................................................... 73

L2 Switching > ERPS >

ERPS Groups........................................................................ 74

MAC Address Table > Static MAC .............................................................................. 75

MAC Address Table > MAC Aging Time ..................................................................... 75

MAC Address Table > Dynamic Forwarding Table ..................................................... 76

Security > Storm Control > Global Settings................................................................. 77

Security > Storm Control > Port Settings..................................................................... 78

Security > Port Security ............................................................................................... 79

Security > Protected Ports........................................................................................... 79

Security > DoS Prevention > DoS Global Settings...................................................... 80

Security > DoS Prevention > DoS Port Settings.......................................................... 82

Security > Applications > TELNET .............................................................................. 82

Security > Applications > SSH..................................................................................... 83

Security > Applications > HTTP................................................................................... 83

Security > Applications > HTTPS ................................................................................ 84

Security > 802.1x > 802.1x Global Settings ................................................................ 85

Security > 802.1x > 802.1x Port Configuration............................................................ 86

Security > IP Security > Global Settings...................................................................... 86

Security > IP Security > Entry Settings........................................................................ 87

Security > Security Login > Global Settings > Global Settings.................................... 87

Security > Security Login > Global Settings > RADIUS Settings................................. 88

Security > Security Login > Global Settings > TACACS Settings................................ 88

Security > Security Login > Access Control Settings > Security Login

Type Settings............................................................................................................... 89

Security > Security Login > Access Control Settings > Security Login

Type Settings............................................................................................................... 89

Security > Access Control List > MAC ACL > Entry Settings ...................................... 90

Security > Access Control List > IP ACL > Entry Settings........................................... 91

Security > IP Source Guard > Global Settings ............................................................ 92

Security > IP Source Guard > Entry Settings .............................................................. 92

Security > DHCP Snooping > Global Settings > DHCP Snooping State Settings....... 93

xii EKI-7706 Series User Manual

Figure 4.87

Figure 4.88

Security > DHCP Snooping > Global Settings > DHCP Snooping Port Settings ........ 93

Security > DHCP Snooping > Global Settings > DHCP Snooping Binding

Figure 4.89

Figure 4.90

Figure 4.91

Figure 4.92

Figure 4.93

Figure 4.94

Figure 4.95

Figure 4.96

Figure 4.97

Figure 4.98

Figure 4.99

Port Settings................................................................................................................ 94

Security > ARP Spoofing............................................................................................. 94

QoS > General > QoS Properties................................................................................ 95

QoS > General > QoS Settings ................................................................................... 96

QoS > General > QoS Scheduling .............................................................................. 97

QoS > General > CoS Mapping .................................................................................. 98

QoS > General > DSCP Mapping ............................................................................... 99

QoS > General > IP Precedence Mapping................................................................ 100

QoS > QoS Basic Mode > Global Settings................................................................ 101

QoS > QoS Basic Mode > Port Settings ................................................................... 101

QoS > Rate Limit > Ingress Bandwidth Control......................................................... 102

QoS > Rate Limit > Egress Bandwidth Control ......................................................... 102

Figure 4.100

QoS > Rate Limit > Egress Queue............................................................................ 103

Figure 4.101

QoS > Bandwidth Guarantee > Global Settings........................................................ 104

Figure 4.102

QoS > Bandwidth Guarantee > Utilzation ................................................................. 105

Figure 4.103

Management > LLDP > LLDP System Settings ........................................................ 106

Figure 4.104

Management > LLDP > LLDP Port Settings > LLDP Port Configuration................... 107

Figure 4.105

Management > LLDP > LLDP Port Settings > Optional TLVs Selection ................... 107

Figure 4.106

Management > LLDP > LLDP Port Settings > VLAN Name TLV VLAN Selection.... 108

Figure 4.107

Management > LLDP > LLDP Remote Device Info................................................... 108

Figure 4.108

Management > SNMP > SNMP Settings .................................................................. 109

Figure 4.109

Management > SNMP > SNMP Community ............................................................. 109

Figure 4.110

Management > SNMP > SNMPv3 EngineID............................................................. 110

Figure 4.111

Management > SNMP > SNMPv3 Settings............................................................... 110

Figure 4.112

Management > SNMP > SNMP Trap ........................................................................ 111

Figure 4.113

Management > Power Over Ethernet > PoE System Settings.................................. 112

Figure 4.114

Management > Power Over Ethernet > PoE Port Settings ....................................... 113

Figure 4.115

Management > TCP Modbus Settings > TCP Modbus Settings ............................... 114

Figure 4.116

Management > DHCP Server > Status Settings ....................................................... 115

Figure 4.117

Management > DHCP Server > Global Settings ....................................................... 116

Figure 4.118

Management > DHCP Server > Port Settings........................................................... 117

Figure 4.119

Management > DHCP Server > VLAN Settings ........................................................ 118

Figure 4.120

Management > DHCP Server > Option 82 Settings.................................................. 119

Figure 4.121

Management > DHCP Server > Client MAC Settings ............................................... 120

Figure 4.122

Management > SMTP Client > Global Settings......................................................... 121

Figure 4.123

Management > SMTP Client > Profile Settings > Profile Settings............................. 121

Figure 4.124

Management > SMTP Client > Profile Settings > Profile Target Mail Settings.......... 122

Figure 4.125

Management > SMTP Client > Sending Message .................................................... 122

Figure 4.126

Management > RMON > Rmon Statistics ................................................................. 123

Figure 4.127

Management > RMON > RMON History ................................................................... 124

Figure 4.128

Management > RMON > Rmon Alarm ...................................................................... 125

Figure 4.129

Management > RMON > RMON Event ..................................................................... 126

Figure 4.130

Management > NTP Server....................................................................................... 127

Figure 4.131

Diagnostics > Cable Diagnostics............................................................................... 128

Figure 4.132

Diagnostics > Ping Test............................................................................................. 129

Figure 4.133

Diagnostics > IPv6 Ping Test .................................................................................... 130

Figure 4.134

Diagnostics > System Log > Logging Service........................................................... 132

Figure 4.135

Diagnostics > System Log > Local Logging .............................................................. 132

Figure 4.136

Diagnostics > System Log > System Log Server ...................................................... 133

Figure 4.137

Diagnostics > DDM > Diagnostic Alarm Settings ...................................................... 134

Figure 4.138

Diagnostics > DDM > DMI INFO ............................................................................... 134

Figure 4.139

Diagnostics > LED Indication .................................................................................... 135

Figure 4.140

Tools > IXM ............................................................................................................... 136

Figure 4.141

Tools > Backup Manager .......................................................................................... 137

Figure 4.142

Tools > Upgrade Manager......................................................................................... 138

Figure 4.143

Tools > Dual Image ................................................................................................... 139

Figure 4.144

Tools > User Account ................................................................................................ 139

Figure 4.145

Tools > N-Key ........................................................................................................... 140

EKI-7706 Series User Manual xiii

Chapter

1

Product Overview

1

1.1

Specifications

Specifications Description

Interface

Physical

LED Display

Environment

I/O Port 4 x RJ45 + 2 x Fiber

Power Connector 6-pin removable screw terminal (power & relay)

Enclosure Metal shell

Protection Class IP30

Installation DIN-Rail

43 x 120 x 84mm (1.69 x 4.72 x 3.30 inches) Dimensions

(W x H x D)

System LED SYS, R.M, PWR1, PWR2, Alarm

Port LED

Operating

Temperature

Storage

Temperature

Ambient

Relative Humidity

Speed, Link, Activity

Standard Temperature: -10°C ~ 60°C (14°F ~ 140°F)

Wide Temperature: -40°C ~ 85°C (-40°F ~ 185°F)

-40°C ~ 85°C (-40°F ~ 185°F)

10 ~ 95% (non-condensing)

Switch Properties MAC Address

Power Power

Consumption

Certifications

Power Input

EMI

Safety

EMC

8K

5.28W @ 48VDC (System)

12 ~ 48 VDC, redundant dual power input

CE, FCC Class A

UL61010

EN 61000-4-2

EN 61000-4-3

EN 61000-4-4

EN 61000-4-5

EN 61000-4-6

EN 61000-4-8

Shock

Freefall

Vibration

IEC 60068-2-27

IEC 60068-2-32

IEC 60068-2-6

EKI-7706 Series User Manual 2

1.2

Hardware Views

1.2.1

Front View

1

2

3

4

5

6

7 5

1

3

EKI-7706G

SYS R.M PW1 PW2 Alarm

Reset

Console

2

4

6

Figure 1.1 Front View

4

5

6

No.

Item

1

2

3

7

System LED panel

Reset button

Description

See “System LED Panel” on page 4 for further details.

Button allows for system soft reset or factory default reset.

Console serial port Console cable port to COM port (DB9 male) on computer to

RS232 managed switch (RJ45 female).

ETH port RJ45 ports x 4.

LNK/ACT LED

Speed LED

ETH port

Link activity LED.

Orange: 100M

Green: 1G

SFP ports x 2.

3 EKI-7706 Series User Manual

1.2.1.1

System LED Panel

1 2 3 4 5

No.

LED Name

1 SYS

4

5

2

3

R.M.

PWR1

PWR2

Alarm

SYS R.M PW1 PW2 Alarm

LED Color

Solid green

Off

Solid green

Solid green

Off

Solid green

Off

Solid red

Blinking Red

Off

Figure 1.2 System LED Panel

Description

System is operating normally

System is powered down / system crash / operation initiating

Active when determining ring master

Powered up

Powered down or not installed

Powered up

Power down or not installed

Defined major policies are detected

Defined minor policies are detected

Powered off or system is operating normally

EKI-7706 Series User Manual 4

1.2.2

Rear View

1

2

Figure 1.3 Rear View

No.

Item

1

2

DIN-Rail mounting plate

Description

Mounting plate used for the installation to a standard DIN rail

Wall mounting holes Screw holes (x3) used in the installation of a wall mounting plate

1.2.3

Top View

P-Fail

V1+ V1V2+ V2-

1

R1 PW 1A@24V PWR2 DC12-48V

No.

Item

1 Terminal block

Figure 1.4 Top View

Description

Connect cabling for power and alarm wiring

5 EKI-7706 Series User Manual

1.2.4

Bottom View

1

No.

Item

1 Ground terminal

Figure 1.5 Bottom View

Description

Screw terminal used to ground chassis

EKI-7706 Series User Manual 6

Chapter

2

Switch Installation

2

2.1

Installation Guidelines

The following guidelines are provided to optimize the device performance. Review the guidelines before installing the device.

 Make sure cabling is away from sources of electrical noise. Radios, power lines, and fluorescent lighting fixtures can interference with the device performance.

 Make sure the cabling is positioned away from equipment that can damage the cables.

Operating environment is within the ranges listed range, see “Specifications” on page 2.

 Relative humidity around the switch does not exceed 95 percent (noncondensing).

 Altitude at the installation site is not higher than 10,000 feet.

 In 10/100 and 10/100/1000 fixed port devices, the cable length from the switch to connected devices can not exceed 100 meters (328 feet).

 Make sure airflow around the switch and respective vents is unrestricted. Without proper airflow the switch can overheat. To prevent performance degradation and damage to the switch, make sure there is clearance at the top and bottom and around the exhaust vents.

2.1.1

Connecting Hardware

In this instruction, it will explain how to find a proper location for your Modbus Gateways, and how to connect to the network, hock up the power cable, and connect to the EKI-7706 Series.

2.2

Verifying Switch Operation

Before installing the device in a rack or on a wall, power on the switch to verify that the switch passes the power-on self-test (POST). To connect the cabling to the power

source see “Power Supply Installation” on page 19.

At startup (POST), the System LED blinks green, while the remaining LEDs are a solid green. Once the switch passes POST self-test, the System LED turns green.

The other LEDs turn off and return to their operating status. If the switch fails POST, the System LED switches to an amber state.

After a successful self-test, power down the switch and disconnect the power cabling.

The switch is now ready for installation on its final location.

EKI-7706 Series User Manual 8

2.3

Installing the Switch

You can mount the switch to a DIN rail or to a wall. The switch is equipped with a DIN rail clip assembly and a wall mounting bracket for either configuration.

2.3.1

DIN Rail Mounting

The DIN rail mount option is the quickest installation option. Additionally, it optimizes the use of rail space.

The metal DIN rail kit is secured to the rear of the switch. The device can be mounted onto a standard 35mm (1.37”) x 75 mm (3”) height DIN rail. The devices can be mounted vertically or horizontally. Refer to the following guidelines for further information.

Note!

A corrosion-free mounting rail is advisable.

When installing, make sure to allow for enough space to properly install the cabling.

2.3.1.1

Installing the DIN-Rail Mounting Kit

1.

Position the rear panel of the switch directly in front of the DIN rail, making sure that the top of the DIN rail clip hooks over the top of the DIN rail, as shown in the following illustration.

Warning!

Do not install the DIN rail under or in front of the spring mechanism on the DIN rail clip to prevent damage to the DIN rail clip or the DIN rail.

Make sure the DIN rail is inserted behind the spring mechanism.

2.

Once the DIN rail is seated correctly in the DIN rail clip, press the front of the switch to rotate the switch down and into the release tab on the DIN rail clip.

If seated correctly, the bottom of the DIN rail should be fully inserted in the release tab.

DIN rail clip

DIN rail

DIN rail clip release tab

Figure 2.1 Installing the DIN-Rail Mounting Kit

9 EKI-7706 Series User Manual

See the following figure for an illustration of a completed DIN installation procedure.

Figure 2.2 Correctly Installed DIN Rail Kit

3.

Grasp the bottom of the switch and slightly rotate it upwards. If there is resistance, the switch is correctly installed. Otherwise, re-attempt the installation process from the beginning.

2.3.1.2

Removing the DIN-Rail Mounting Kit

1.

Ensure that power is removed from the switch, and disconnect all cables and connectors from the front panel of the switch.

2.

Push down on the top of the DIN rail clip release tab with your finger. As the clip releases, lift the bottom of the switch, as shown in the following illustration.

\

Figure 2.3 Removing the DIN-Rail

EKI-7706 Series User Manual 10

2.3.2

Wall-Mounting

The wall mounting option provides better shock and vibration resistance than the DIN rail vertical mount.

Note!

When installing, make sure to allow for enough space to properly install the cabling.

Before the device can be mounted on a wall, you will need to remove the DIN rail plate.

1.

Rotate the device to the rear side and locate the DIN mounting plate.

2.

Remove the screws securing the DIN mounting plate to the rear panel of the switch.

3.

Remove the DIN mounting plate. Store the DIN mounting plate and provided screws for later use.

Figure 2.4 Removing DIN Mount Plate

11 EKI-7706 Series User Manual

4.

Align the wall mounting plate on the rear side. The screw holes on the device and the mounting plate must be aligned, see the following illustration.

5.

Secure the wall mounting plate with M3 screws, see the following figure.

Figure 2.5 Installing Wall Mount Plates

Once the wall mounting plate is secured on the device, you will need to attach the wall screws (x3).

6.

Locate the installation site and place the switch against the wall, making sure it is the final installation location.

7.

Use the wall mount plates as a guide to mark the locations of the screw holes.

8.

Drill four holes over the four marked locations on the wall, keeping in mind that the holes must accommodate wall sinks in addition to the screws.

9.

Insert the wall sinks into the walls.

10.

Insert the screws into the wall sinks. Leave a 2 mm gap between the wall and the screw head to allow for wall mount plate insertion.

4.5 mm

2.0 mm

3.0 mm

Figure 2.6 Securing Wall Mounting Screws

Note!

 Make sure the screws dimensions are suitable for use with the wall mounting plate.

 Do not completely tighten the screws into the wall. A final adjustment may be needed before fully securing the wall mounting plates on the wall.

EKI-7706 Series User Manual 12

11.

Align the wall mount plate over the screws on the wall.

12.

Install the wall mount plate on the screws and slide it forward to lock in place, see the following figure.

13.

Once the device is installed on the wall, tighten the screws to secure the device.

Figure 2.7 Wall Mount Installation

13 EKI-7706 Series User Manual

2.4

Installing and Removing SFP Modules

Up to two fiber optic ports are available (dependent on model) for use in the switch.

Refer to the technical specifications for details.

The Gigabit Ethernet ports on the switch are 100/1000Base SFP Fiber ports, which require using the 100M or 1G mini-GBIC fiber transceivers to work properly. Advantech provides completed transceiver models for different distance requirement.

The concept behind the LC port and cable is quite straight forward. Suppose that you are connecting devices I and II; contrary to electrical signals, optical signals do not require a circuit in order to transmit data. Consequently, one of the optical lines is used to transmit data from device I to device II, and the other optical line is used transmit data from device II to device I, for full-duplex transmission.

Remember to connect the Tx (transmit) port of device I to the Rx (receive) port of device II, and the Rx (receive) port of device I to the Tx (transmit) port of device II. If you make your own cable, we suggest labeling the two sides of the same line with the same letter (A-to-A and B-to-B, as shown below, or A1-to-A2 and B1-to-B2).

Note!

This is a Class 1 Laser/LED product. To avoid causing serious damage to your eyes, do not stare directly into the Laser Beam.

2.4.1

Installing SFP Modules

To connect the fiber transceiver and LC cable, use the following guidelines:

1.

Remove the dust plug from the fiber optic slot chosen for the SFP transceiver.

Figure 2.8 Removing the Dust Plug from an SFP Slot

Note!

Do not remove the dust plug from the SFP slot if you are not installing the transceiver at this time. The dust plug protects hardware from dust contamination.

2.

Position the SFP transceiver with the handle on top, see the following figure.

3.

Locate the triangular marking in the slot and align it with the bottom of the transceiver.

4.

Insert the SFP transceiver into the slot until it clicks into place.

EKI-7706 Series User Manual 14

5.

Make sure the module is seated correctly before sliding the module into the slot.

A click sounds when it is locked in place.

Handle

Figure 2.9 Installing an SFP Transceiver

Note!

If you are attaching fiber optic cables to the transceiver, continue with the following step. Otherwise, repeat the previous steps to install the remaining SFP transceivers in the device.

6.

Remove the protective plug from the SFP transceiver.

Note!

Do not remove the dust plug from the transceiver if you are not installing the fiber optic cable at this time. The dust plug protects hardware from dust contamination.

7.

Insert the fiber cable into the transceiver. The connector snaps into place and locks.

Figure 2.10 Attaching a Fiber Optic Cable to a Transceiver

8.

Repeat the previous procedures to install any additional SFP transceivers in the switch.

The fiber port is now setup.

15 EKI-7706 Series User Manual

2.4.2

Removing SFP Modules

To disconnect an LC connector, use the following guidelines:

1.

Press down and hold the locking clips on the upper side of the optic cable.

2.

Pull the optic cable out to release it from the transceiver.

Figure 2.11 Removing a Fiber Optic Cable to a Transceiver

3.

Hold the handle on the transceiver and pull the transceiver out of the slot.

Handle

Figure 2.12 Removing an SFP Transceiver

Note!

Replace the dust plug on the slot if you are not installing a transceiver.

The dust plug protects hardware from dust contamination.

EKI-7706 Series User Manual 16

2.5

Connecting the Switch to Ethernet Ports

2.5.1

RJ45 Ethernet Cable Wiring

For RJ45 connectors, data-quality, twisted pair cabling (rated CAT5 or better) is recommended. The connector bodies on the RJ45 Ethernet ports are metallic and connected to the GND terminal. For best performance, use shielded cabling. Shielded cabling may be used to provide further protection.

Straight-thru Cable Wiring

Pin 1

Pin 2

Pin 3

Pin 6

Pin 1

Pin 2

Pin 3

Pin 6

Cross-over Cable Wiring

Pin 1

Pin 2

Pin 3

Pin 6

Pin 3

Pin 6

Pin 1

Pin 2

8

1

Figure 2.13 Ethernet Plug & Connector Pin Position

Maximum cable length: 100 meters (328 ft.) for 10/100/1000BaseT.

17 EKI-7706 Series User Manual

2.6

Connecting the Switch to Console Port

The industrial switch supports a secondary means of management. By connecting the RJ45 to RS232 serial cable between a COM port on your PC (9-pin D-sub female) and the switch’s RJ45 (RJ45) port, a wired connection for management can be established.

To terminal or PC

Figure 2.14 Serial Console Cable

To console port

5

9

1

6

Figure 2.15 DB 9 Pin Position

DB9 Connector

5

3

NC

NC

NC

NC

2

NC

RJ45 Connector

1 Orange/White

2 Orange

3 Green/White

4 Blue

5 Blue/White

6 Green

7 Brown/White

8 Brown

RXD

TXD

RTS

CTS

DTR

DSR

GND

DB9

Female

4

6

5

7

8

2

3

RJ45

Male

5

4

7

2

8

1

3

6

TXD

RXD

NC

NC

NC

NC

GND

GND

Figure 2.16 Pin Assignment

EKI-7706 Series User Manual 18

2.7

Power Supply Installation

2.7.1

Overview

Warning!

Power down and disconnect the power cord before servicing or wiring the switch.

Caution!

Do not disconnect modules or cabling unless the power is first switched off.

The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch device.

Caution!

Disconnect the power cord before installation or cable wiring.

The switches can be powered by using the same DC source used to power other devices. A DC voltage range of 12 to 48 VDC must be applied between the V1+ terminal and the V1- terminal (PW1), see the following illustrations. A Class 2 power supply is required to maintain a UL panel listing. The chassis ground screw terminal should be tied to the panel or chassis ground. A redundant power configuration is supported through a secondary power supply unit to reduce network down time as a result of power loss.

EKI-7706E-2F, EKI-7706E-2FI, EKI-7706G-2F, EKI-7706G-2FI support 12~48 VDC.

Dual power inputs are supported, which allow you to connect to a backup power source.

Single DC Power Redundant DC Power

P2 P1 P2 P1

One DC Supply

Chassis

GND

(pane)

Dual DC Supplies

Chassis

GND

(pane)

Figure 2.17 Power Wiring for EKI-7706 Series

19 EKI-7706 Series User Manual

2.7.2

Considerations

Take into consideration the following guidelines before wiring the device:

 The Terminal Block (CN1) is suitable for 12-24 AWG (3.31 - 0.205 mm

2

). Torque value 7 lb-in.

 The cross sectional area of the earthing conductors shall be at least 3.31 mm

2

.

 Calculate the maximum possible current for each power and common wire.

Make sure the power draw is within limits of local electrical code regulations.

 For best practices, route wiring for power and devices on separate paths.

 Do not bundle together wiring with similar electrical characteristics.

 Make sure to separate input and output wiring.

 Label all wiring and cabling to the various devices for more effective management and servicing.

Note!

Routing communications and power wiring through the same conduit may cause signal interference. To avoid interference and signal degradation, route power and communications wires through separate conduits.

2.7.3

Grounding the Device

Caution!

Do not disconnect modules or cabling unless the power is first switched off.

The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch device.

Caution!

Before connecting the device properly ground the device. Lack of a proper grounding setup may result in a safety risk and could be hazardous.

Caution!

Do not service equipment or cables during periods of lightning activity.

Caution!

Do not service any components unless qualified and authorized to do so.

Caution!

Do not block air ventilation holes.

EKI-7706 Series User Manual 20

Electromagnetic Interference (EMI) affects the transmission performance of a device.

By properly grounding the device to earth ground through a drain wire, you can setup the best possible noise immunity and emissions.

Connection to

Grounding Point

Drain Wire with Lug

Figure 2.18 Grounding Connection

By connecting the ground terminal by drain wire to earth ground the switch and chassis can be ground.

Note!

Before applying power to the grounded switch, it is advisable to use a volt meter to ensure there is no voltage difference between the power supply’s negative output terminal and the grounding point on the switch.

2.7.4

Wiring a Relay Contact

The following section details the wiring of the relay output. The terminal block on the

EKI-7706 Series is wired and then installed onto the terminal receptor located on the

EKI-7706 Series.

DC 12-48V PWR2 1A@24V PWR1

V2V2+ V1- V1+

P-Fail

Figure 2.19 Terminal Receptor: Relay Contact

The terminal receptor includes a total of six pins: two for PWR1, two for PWR2 and two for a fault circuit.

2.7.5

Wiring the Power Inputs

Caution!

Do not disconnect modules or cabling unless the power is first switched off.

The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch device

Warning!

Power down and disconnect the power cord before servicing or wiring the switch.

21 EKI-7706 Series User Manual

There are two power inputs for normal and redundant power configurations. The power input 2 is used for wiring a redundant power configuration. See the following for terminal block connector views.

DC 12-48V PWR2 1A@24V PWR1

V2V2+ V1- V1+

P-Fail

Figure 2.20 Terminal Receptor: Power Input Contacts

To wire the power inputs:

Make sure the power is not connected to the switch or the power converter before proceeding.

1.

Loosen the screws securing terminal block to the terminal block receptor.

2.

Remove the terminal block from the switch.

Figure 2.21 Removing a Terminal Block

3.

Insert a small flat-bladed screwdriver in the V1+/V1- wire-clamp screws, and loosen the screws.

4.

Insert the negative/positive DC wires into the V+/V- terminals of PW1. If setting up power redundancy, connect PW2 in the same manner.

5.

Tighten the wire-clamp screws to secure the DC wires in place.

Loosening

Wire-clamp

Screws

Securing Wireclamp Screws

Installing DC

Wires

Figure 2.22 Installing DC Wires in a Terminal Block

EKI-7706 Series User Manual 22

6.

Align the terminal block over the terminal block receptor on the switch.

7.

Insert the terminal block and press it in until it is flush with the terminal block receptor.

8.

Tighten the screws on the terminal block to secure it to the terminal block receptor.

If there is no gap between the terminal block and the terminal receptor, the terminal block is seated correctly.

Figure 2.23 Securing a Terminal Block to a Receptor

2.8

Reset Button

Reset configuration to factory default:

Press and hold Reset button for 5 seconds.

System reboot:

Press and hold Reset button for 2 seconds.

Note!

Do NOT power off the Ethernet switch when loading default settings.

23 EKI-7706 Series User Manual

Chapter

3

Configuration Utility

3

3.1

First Time Setup

3.1.1

Overview

The Industrial Ethernet Managed Switch is a configurable device that facilitates the interconnection of Ethernet devices on an Ethernet network. This includes computers, operator interfaces, I/O, controllers, RTUs, PLCs, other switches/hubs or any device that supports the standard IEEE 802.3 protocol.

This switch has all the capabilities of a store and forward Ethernet switch plus advanced management features such as SNMP, RSTP and port mirroring. This manual details how to configure the various management parameters in this easy to use switch.

3.1.2

Introduction

To take full advantage of all the features and resources available from the switch, it must be configured for your network.

The switch implements Rapid Spanning Tree Protocol (RSTP) and Simple Network

Management Protocol (SNMP) to provide most of the services offered by the switch.

Rapid Spanning Tree Protocol allows managed switches to communicate with each other to ensure that there exists only one active route between each pair of network nodes and provides automatic failover to the next available redundant route. A brief explanation of how RSTP works is given in the Spanning Tree section.

The switch is capable of communicating with other SNMP capable devices on the network to exchange management information. This statistical/derived information from the network is saved in the Management Information Base (MIB) of the switch.

The MIB is divided into several different information storage groups. These groups will be elaborated in detail in the Management and SNMP information section of this document. The switch implements Internet Group Management Protocol (IGMP) to optimize the flow of multicast traffic on your network.

The switch supports both port-based and tag-based Virtual LANs for flexible integration with VLAN-aware networks with support for VLAN-unaware devices.

3.1.3

Administrative Interface Access

There are several administrative interfaces to the switch:

1.

A graphical web interface accessible via the switch's built-in web server. Both

HTTP and secure HTTPS with SSL are supported.

Note!

This is the recommended method for managing the switch.

2.

A terminal interface via the RS232/USB port or over the network using telnet or

Secure Shell (SSH).

3.

An SNMP interface can be used to read/write many settings.

4.

Command Line Interface (CLI) can be used to read/write most settings. Initial setup must be done using an Ethernet connection (recommended) or the serial port.

25 EKI-7706 Series User Manual

3.1.4

Using the Graphical (Web) Interface

The graphical interface is provided via a web server in the switch and can be accessed via a web browser such as Opera, Mozilla, or Internet Explorer.

Note!

JavaScript must be supported and enabled in your browser for the graphical interface to work correctly.

HTTP and HTTPS (secure HTTP) are supported for access to the web server. By default, both protocols are enabled. Either or both may be disabled to secure the switch. (See the Remote Access Security topic in this section.)

To access the graphical interface, enter a URL like HTTP://192.168.1.1 in your browser's address bar. Replace “http” with “https” to use secure http and replace

“192.168.1.1” with your switch's IP address if you've changed it from the factory default.

The web server in the switch uses a signed security certificate. When you access the server via https, you may see a warning dialog indicating that the certificate was signed by an unknown authority. This is expected and to avoid this message in the future you can choose to install the certificate on your computer.

Note!

This manual describes and depicts the web user interface in detail. The terminal interface is not specifically shown but is basically the same.

3.1.5

Configuring the Switch for Network Access

To control and monitor the switch via the network, it must be configured with basic network settings, including an IP address and subnet mask. Refer to the quick start guide in Section 1 for how to initially access your switch.

To configure the switch for network access, select [Add Menu Address Here] to reach the System Settings menu. The settings in this menu control the switch's general network configuration.

 DHCP Enabled/Disabled: The switch can automatically obtain an IP address from a server using the Dynamic Host Configuration Protocol (DHCP). This can speed up initial set up, as the network administrator does not have to find an open IP address.

 IP Address and subnet mask configuration: The IP address for the switch can be changed to a user-defined address along with a customized subnet mask to separate subnets.

Note!

Advanced users can set the IP address to 0.0.0.0 to disable the use of an IP address for additional security. However, any features requiring an

IP address (i.e., web interface, etc.) will no longer be available.

 Default Gateway Selection: A Gateway Address is chosen to be the address of a router that connects two different networks. This can be an IP address or a

Fully Qualified Domain Name (FQDN) such as “domainname.org”.

 NTP Server: The IP address or domain name of an NTP (Network Time Protocol) server from which the switch may retrieve the current time at startup.

Please note that using a domain name requires that at least one domain name server be configured.

EKI-7706 Series User Manual 26

3.1.6

Configuring the Ethernet Ports

The switch comes with default port settings that should allow you to connect to the

Ethernet Ports with out any necessary configuration. Should there be a need to change the name of the ports, negotiation settings or flow control settings, you can do this in the Port Configuration menu. Access this menu by selecting Setup from the

Main menu, and then selecting Main Settings.

 Port Name: Each port in the managed switch can be identified with a custom name. Specify a name for each port here.

 Admin: Ports can be enabled or disabled in the managed switch. For ports that are disabled, they are virtually non-existent (not visible in terms of switch operation or spanning tree algorithm). Choose to enable or disable a port by selecting

Enabled or Disabled, respectively.

 Negotiation: All copper ports and gigabit fiber ports in the managed switch are capable of autonegotiation such that the fastest bandwidth is selected. Choose to enable auto-negotiation or use fixed settings. 100Mbps Fiber ports are Fixed speed only.

 Speed/Duplex/Flow Control: The managed switch accepts three local area network Ethernet Standards. The first standard, 10BASE-T, runs 10Mbps with twisted pair Ethernet cable between network interfaces. The second local area network standard is 100BASE-T, which runs at 100Mbps over the same twisted pair Ethernet cable. Lastly, there is 100BASE-F, which enables fast Ethernet

(100Mbps) over fiber.

These options are available:

 10h–10 Mbps, Half Duplex

 10f –10 Mbps, Full Duplex

 100h–100 Mbps, Half Duplex

 100f –100 Mbps, Full Duplex

 1000f–1000 Mbps, Full Duplex

On managed switches with gigabit combination ports, those ports with have two rows, a standard row of check boxes and a row labeled “SFP” with radio buttons. The

SFP setting independently sets the speed at which a transceiver will operate if one is plugged in. Otherwise, the switch will use the fixed Ethernet port and the corresponding settings for it.

Note!

When 100f is selected for the SFP of a gigabit combination port, the corresponding fixed Ethernet jack will be disabled unless it is changed back to 1000F.

27 EKI-7706 Series User Manual

3.2

Command Line Interface Configuration

3.2.1

Introduction to Command-Line Interface (CLI)

The command-line interface (CLI) is constructed with an eye toward automation of

CLI-based configuration. The interaction is modeled on that used in many Internet protocols such as Telnet, FTP, and SMTP. After each command is entered and processed, the switch will issue a reply that consists of a numeric status code and a human-readable explanation of the status.

The general format of commands is: section parameter [value] where:

– section is used to group parameters.

– parameter will specify the parameter within the section. For example, the network section will have parameters for DHCP, IP address, subnet mask, and default gateway.

– value is the new value of the parameter. If value is omitted, the current value is displayed.

Please note that new values will not take effect until explicitly committed.

Sections and parameter names are case sensitive (e.g., “Network” is not the same as

“network”).

Note!

Any commands in the CLI Commands section of this chapter, with the exception of the global commands, must be prefaced with the name of the section they are in. For example, to change the IP address of the switch, you would type: network address <newIP>

3.2.2

Accessing the CLI

To access the CLI interface, establish Ethernet or serial connectivity to the switch.

To connect by Ethernet, open a command prompt window and type: telnet <switchip> (where <switchip> is the IP address of the switch)

At the login prompt, type “cli” for the username and “admin” for the password. The switch will respond with “Managed switch configuration CLI ready”.

EKI-7706 Series User Manual 28

3.3

Web Browser Configuration

The switch has an HTML based user interface embedded in the flash memory. The interface offers an easy to use means to manage basic and advanced switch functions. The interface allows for local or remote switch configuration anywhere on the network.

The interface is designed for use with [Internet Explorer (6.0), Chrome, Firefox].

3.3.1

Preparing for Web Configuration

The interface requires the installation and connection of the switch to the existing network. A PC also connected to the network is required to connect to the switch and access the interface through a web browser. The required networking information is provided as follows:

 IP address: 192.168.1.1

 Subnet mask: 255.255.255.0

 Default gateway: 192.168.1.254

 User name: admin

 Password: admin

3.3.2

System Login

Once the switch is installed and connected, power on the switch. The following information guides you through the logging in process.

1.

Launch your web browser on the PC.

2.

In the browser’s address bar, type the switch’s default IP address (192.168.1.1).

The login screen displays.

3.

Enter the user default name and password (admin / admin).

4.

Click OK on the login screen to log in.

The main interface displays.

29 EKI-7706 Series User Manual

Chapter

4

Managing Switch

4

4.1

Log In

To access the login window, connect the device to the network, see “Connecting the

Switch to Ethernet Ports” on page 17. Once the switch is installed and connected,

power on the switch see the following procedures to log into your switch.

When the switch is first installed, the default network configuration is set to DHCP enabled. You will need to make sure your network environment supports the switch setup before connecting it to the network.

1.

Launch your web browser on a computer.

2.

In the browser’s address bar type in the default IP address: 192.168.1.1.

The login screen displays.

3.

Enter the default user name and password (admin/admin) to log into the management interface. You can change the default password after you have successfully logged in.

4.

Click Login to enter the management interface.

Figure 4.1 Login Screen

4.2

Recommended Practices

One of the easiest things to do to help increase the security posture of the network infrastructure is to implement a policy and standard for secure management. This practice is an easy way to maintain a healthy and secure network.

After you have performed the basic configurations on your switches, the following is a recommendation which is considered best practice policy.

4.2.1

Changing Default Password

In keeping with good management and security practices, it is recommended that you change the default password as soon as the device is functioning and setup correctly. The following details the necessary steps to change the default password.

To change the password:

1.

Navigate to Tools > User Account .

2.

From the User drop-down menu, select the Admin (default) account.

3.

In the User Name field, enter admin for this account. It is not necessary to change the user name, however, a change in the default settings increases the security settings.

4.

In the Password field, type in the new password. Re-type the same password in the Retype Password field.

31 EKI-7706 Series User Manual

5.

Click Apply to change the current account settings.

Figure 4.2 Changing a Default Password

After saving all the desired settings, perform a system save ( Tools > Save

Configuration ) to permanently save the changes.

4.3

Monitoring

4.3.1

Device Information

The Device Information menu lists information, such as: System Name, System

Location, MAC Address, Firmware version, and more, pertaining to the system. The information is for review only. To modify the device information, see the respective item within the user interface.

To access this page, click Monitoring > Device Information .

EKI-7706 Series User Manual

Figure 4.3 Monitoring > Device Information

32

The following table describes the items in the previous figure.

Item

System Name

System Location

System Contact

MAC Address

IP Address

Subnet Mask

Gateway

Loader Version

Loader Date

Firmware Version

Firmware Date

System Object ID

System Up Time

Description

Click Switch to enter the system name: up to 128 alphanumeric characters (default is Switch).

Click Default to enter the location: up to 256 alphanumeric characters

(default is Default).

Click Default to enter the contact person: up to 128 alphanumeric characters (default is Default).

Displays the MAC address of the switch.

Displays the assigned IP address of the switch.

Displays the assigned subnet mask of the switch.

Displays the assigned gateway of the switch.

Displays the current loader version of the switch.

Displays the current loader build date of the switch.

Displays the current firmware version of the switch.

Displays the current firmware build date of the switch.

Displays the base object ID of the switch.

Displays the time since the last switch reboot.

4.3.2

Logging Message

The Logging Message Filter page allows you to enable the display of logging message filter.

To access this page, click Monitoring > Logging Message .

Figure 4.4 Monitoring > Logging Message

The following table describes the items in the previous figure.

Item

Target

Description

Click the drop-down menu to select a target to store the log messages.

Buffered: Store log messages in RAM. All log messages are cleared after system reboot.

File: Store log messages in a file.

33 EKI-7706 Series User Manual

Item Description

Severity

Category

View

The setting allows you to designate a severity level for the Logging

Message Filter function.

Click the drop-down menu to select the severity level target setting.

The level options are:

 emerg: Indicates system is unusable. It is the highest level of severity.

 alert: Indicates action must be taken immediately.

 crit: Indicates critical conditions.

 error: Indicates error conditions.

 warning: Indicates warning conditions.

 notice: Indicates normal but significant conditions.

 info: Indicates informational messages.

 debug: Indicates debug-level messages.

Click the drop-down menu to select the category level target setting.

Click View to display all Logging Information and Logging Message information.

Click Refresh to update the screen.

Click Clear buffered messages to clear the logging buffer history list.

Refresh

Clear buffered messages

The ensuing table for Logging Information table settings are informational only: Target, Severity and Category.

The ensuing table for Logging Message table settings are informational only: No.,

Time Stamp, Category, Severity and Message.

4.3.3

Port Monitoring

Port Network Monitor is a bandwidth and network monitoring tool for the purpose of capturing network traffic and measuring of network throughput. The monitoring functionality includes listing of port statistics as well as port utilization.

4.3.3.1

Port Statistics

To access this page, click Monitoring > Port Monitoring > Port Statistics .

Figure 4.5 Monitoring > Port Monitoring > Port Statistics

The following table describes the items in the previous figure.

Item

Port

Description

Click the drop-down menu to select a port and its captured statistical setting values.

Click Clear to clear the counter selections.

Clear

The ensuing table for IF MIB Counters settings are informational only: ifInOctets, ifInUcastPkts, ifInNUcastPkts, ifInDiscards, ifOutOctets, ifOutUcastPkts, ifOutNUcast-

Pkts, ifOutDiscards, ifInMulticastPkts, ifInBroadcastPkts, ifOutMulticastPkts and ifOutBroadcastPkts.

EKI-7706 Series User Manual 34

The ensuing table for Ether-Like MIB Counters settings are informational only: dot3StatsAlignmentErrors, dot3StatsFCSErrors, dot3StatsSingleCollisionFrames, dot3StatsMultipleCollisionFrames, dot3StatsDeferredTransmissions, dot3StatsLate-

Collisions, dot3StatsExcessiveCollisions, dot3StatsFrameTooLongs, dot3StatsSymbolErrors, dot3ControlInUnknownOpcodes, dot3InPauseFrames and dot3OutPauseFrames.

The ensuing table for Rmon MIB Counters settings are informational only: ether-

StatsDropEvents, etherStatsOctets, etherStatsPkts, etherStatsBroadcastPkts, ether-

StatsMulticastPkts, etherStatsCRCAlignErrors, etherStatsUnderSizePkts, etherStatsOverSizePkts, etherStatsFragments, etherStatsJabbers, etherStatsCollisions, etherStatsPkts64Octets, etherStatsPkts65to127Octets, etherStatsPkts128to255Octets, etherStatsPkts256to511Octets, etherStatsPkts512to1023Octets and etherStatsPkts1024to1518Octets.

4.3.3.2

Port Utilization

To access this page, click Monitoring > Port Monitoring > Port Utilization .

Figure 4.6 Monitoring > Port Monitoring > Port Utilization

The following table describes the items in the previous figure.

Item

Refresh period

IFG

Description

Click the drop-down menu to select and designate a period (second intervals) to refresh the information (TX and RX) listings.

Click the drop-down menu to enable or disable the Interframe Gap

(IFG) statistic.

4.3.4

Link Aggregation

The Link Aggregation function provides LAG information for each trunk. It displays membership status, link state and membership type for each port.

To access this page, click Monitoring > Link Aggregation .

The ensuing table for Link Aggregation Group Status settings are informational only: LAG, Name, Type, Link State, Active Member and Standby Member.

The ensuing table for LACP Information settings are informational only: LAG, Port,

PartnerSysId, PnKey, AtKey, Sel, Mux, Receiv, PrdTx, AtState and PnState.

35 EKI-7706 Series User Manual

4.3.5

LLDP Statistics

The LLDP Statistics page displays the LLDP statistics.

To access this page, click Monitoring > LLDP Statistics .

Figure 4.7 Monitoring > LLDP Statistics

The following table describes the items in the previous figure.

Item

Clear

Refresh

Description

Click Clear to reset LLDP Statistics of all the interfaces.

Click Refresh to update the data on the screen with the present state of the data in the switch.

The ensuing table for LLDP Global Statistics settings are informational only: Insertions, Deletions, Drops and Age Outs.

The ensuing table for LLDP Port Statistics settings are informational only: Port, TX

Frames (Total), RX Frames (Total, Discarded and Errors), RX TLVs (Discarded and

Unrecognized) and RX Ageouts (Total).

EKI-7706 Series User Manual 36

4.3.6

IGMP Statistics

The IGMP Statistics function displays statistical package information for IP multicasting.

To access this page, click Monitoring > IGMP Statistics .

Figure 4.8 Monitoring > IGMP Statistics

The following table describes the items in the previous figure.

Item

Clear

Refresh

Description

Click Clear to refresh IGMP Statistics of all the interfaces.

Click Refresh to update the data on the screen with the present state of the data in the switch.

The ensuing table for IGMP Statistics settings are informational only: Total RX, Valid

RX, Invalid RX, Other RX, Leave RX, Report RX, General Query RX, Special Group

Query RX, Special Group & Source Query RX, Leave TX, Report TX, General Query

TX, Special Group Query TX and Special Group & Source Query TX.

37 EKI-7706 Series User Manual

4.3.7

MLD Statistics

The MLD Statistics function displays statistical package information for MLD message.

To access this page, click Monitoring > MLD Statistics .

Figure 4.9 Monitoring > MLD Statistics

The following table describes the items in the previous figure.

Item

Clear

Refresh

Description

Click Clear to refresh MLD Statistics of all the interfaces.

Click Refresh to update the data on the screen with the present state of the data in the switch.

The ensuing table for IGMP Statistics settings are informational only: Total RX, Valid

RX, Invalid RX, Other RX, Leave RX, Report RX, General Query RX, Special Group

Query RX, Special Group & Source Query RX, Leave TX, Report TX, General Query

TX, Special Group Query TX and Special Group & Source Query TX.

EKI-7706 Series User Manual 38

4.4

System

4.4.1

IP Settings

The IP Settings menu allows you to select a static or DHCP network configuration.

The Static displays the configurable settings for the static option.

To access this page, click System > IP Settings .

Figure 4.10 System > IP Settings

The following table describes the items in the previous figure.

Item

Mode

IP Address

Subnet Mask

Gateway

DNS Server 1

DNS Server 2

Description

Click the radio button to select the IP Address Setting mode: Static or

DHCP.

Enter a value to specify the IP address of the interface. The default is

192.168.1.1.

Enter a value to specify the IP subnet mask for the interface. The default is 255.255.255.0.

Enter a value to specify the default gateway for the interface. The default is 192.168.1.254.

Enter a value to specify the DNS server 1 for the interface. The default is 168.95.1.1.

Enter a value to specify the DNS server 2 for the interface. The default is 168.95.192.1.

Click Apply to save the values and update the screen.

Apply

The ensuing table for IP Address Information settings are informational only: DHCP

State, Static IP Address, Static Subnet Mask, Static Gateway, Static DNS Server 1 and Static DNS Server 2.

39 EKI-7706 Series User Manual

4.4.2

IPv6 Settings

To access this page, click System > IPv6 Settings .

Figure 4.11 System > IPv6 Settings

The following table describes the items in the previous figure.

Item Description

Auto Configuration Select the radio button to enable or disable the IPv6.

IPv6 Address Enter the IPv6 address for the system.

Gateway

DHCPv6 Client

Apply

Enter the gateway address for the system.

Enter the DHCPv6 address for the system.

Click Apply to save the values and update the screen.

The ensuing table for IPv6 Information settings are informational only: Auto Configuration, IPv6 In Use Address, IPv6 In Use Router, IPv6 Static Address, IPv6 Static

Router and DHCPv6 Client.

EKI-7706 Series User Manual 40

4.4.3

DHCP Client Option 82

The DHCP Client Option 82 configurable Circuit ID and Remote ID feature enhances validation security by allowing you to select naming choices suboptions. You can select a switch-configured hostname or specify an ASCII test string for the remote ID.

You can also configure an ASCII text string to override the circuit ID.

To access this page, click System > DHCP Client Option 82 .

Figure 4.12 System > DHCP Client Option 82

The following table describes the items in the previous figure.

Item Description

Mode

Circuit ID Format

Circuit ID String

Circuit ID Hex

Circuit ID User-

Define

Click the radio button to enable or disable the DHCP Client Option 82 mode.

Click the drop-down menu to set the ID format: String, Hex, User Definition.

Enter the string ID of the corresponding class.

Enter the hex string of the corresponding class.

Enter the user definition of the corresponding class.

Remote ID Format Click the drop-down menu to set the Remote ID format: String, Hex,

User Definition.

Remote ID String Enter the remote string ID of the corresponding class.

Remote ID Hex

Remote ID User-

Define

Enter the remote hex string of the corresponding class.

Enter the remote user definition of the corresponding class.

Apply Click Apply to save the values and update the screen.

The ensuing table for DHCP Client Option 82 Information table settings are informational only: Status, Circuit ID Format, Circuit ID String, Circuit ID Hex, Circuit ID

User-Define, Remote ID Format, Remote ID String, Remote ID Hex and Remote ID

User-Define.

41 EKI-7706 Series User Manual

4.4.4

DHCP Auto Provision

The DHCP Auto Provision feature allows you to load configurations using a server with DHCP options. Through the remote connection, the switch obtains information from a configuration file available through the TFTP server.

To access this page, click System > DHCP Auto Provision .

Figure 4.13 System > DHCP Auto Provision

The following table describes the items in the previous figure.

Item

Status

Description

Select the radio button to enable or disable the DHCP Auto Provisioning Setting.

Click Apply to save the values and update the screen.

Apply

The ensuing table for DHCP Auto Provision Information settings are informational only: Status.

4.4.5

Management VLAN

By default the VLAN is the management VLAN providing communication with the switch management interface.

To access this page, click System > Management VLAN .

Figure 4.14 System > Management VLAN

The following table describes the items in the previous figure.

Item Description

Management VLAN Click the drop-down menu to select a defined VLAN.

Apply Click Apply to save the values and update the screen.

The ensuing table for Management VLAN State are informational only: Management

VLAN.

EKI-7706 Series User Manual 42

4.4.6

System Time

To access this page, click System > System Time .

Figure 4.15 System > System Time

The following table describes the items in the previous figure.

Item Description

Enable SNTP

SNTP/NTP Server

Address

Click the radio button to enable or disable the SNTP.

Enter the address of the SNTP server. This is a text string of up to 64 characters containing the encoded unicast IP address or hostname of a SNTP server. Unicast SNTP requests will be sent to this address. If this address is a DNS hostname, then that hostname should be resolved into an IP address each time a SNTP request is sent to it.

SNTP Port

Manual Time

Enter the port on the server to which SNTP requests are to be sent.

Allowed range is 1 to 65535 (default: 123).

Click the drop-down menus to set local date and time of the system.

Time Zone Click the drop-down menu to select a system time zone.

Daylight Saving Time Click the drop-down menu to enable or disable the daylight saving time settings.

Daylight Saving Time

Offset

Enter the offsetting variable in seconds to adjust for daylight saving time.

Recurring From Click the drop-down menu to designate the start date and time for daylight saving time.

Recurring To Click the drop-down menu to designate the end date and time for daylight saving time.

43 EKI-7706 Series User Manual

Item Description

Non-Recurring From Click the drop-down menu to designate a start date and time for a non-recurring daylight saving time event.

Non-Recurring To Click the drop-down menu to designate the end date and time for a non-recurring daylight saving time event.

Apply Click Apply to save the values and update the screen.

The ensuing table for System Time Information settings are informational only: Current Date/Time, SNTP, SNTP Server Address, SNTP Server Port, Time zone, Daylight Saving Time, Daylight Saving Time Offset, From and To.

4.4.7

Network Port

To access this page, click System > Network Port .

Figure 4.16 System > Network Port

The following table describes the items in the previous figure.

Item

HTTP

HTTPS

TELNET

SSH

Description

By default, the HTTPS port setting is set to port 80. To assign the web interface to a different port, enter the port number in the field.

By default, the HTTPS port setting is set to port 443. To assign the web interface to a different port, enter the port number in the field.

By default, the TELNET port setting is set to port 23. To assign the web interface to a different port, enter the port number in the field.

By default, the SSH port setting is set to port 22. To assign the web interface to a different port, enter the port number in the field.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Network Port Information are informational only: HTTP,

HTTPS, TELNET and SSH.

EKI-7706 Series User Manual 44

4.5

L2 Switching

4.5.1

Port Configuration

Port Configuration describes how to use the user interface to configure LAN ports on the switch.

To access this page, click L2 Switching > Port Configuration .

Figure 4.17 L2 Switching > Port Configuration

The following table describes the items in the previous figure.

Item

Port

Enabled

Speed

Duplex

Flow Control

Fiber Port

Enabled

Speed

Duplex

Flow Control

Apply

Description

Click the drop-down menu to select the port for the L2 Switch setting.

Click the radio-button to enable or disable the Port Setting function.

Click the drop-down menu to select the port speed: Auto, Auto-10M,

Auto-100M, Auto-1000M, Auto-10/100M, 10M, 100M, or 1000M.

Click the drop-down menu to select the duplex setting: Auto, Half or

Full.

Click the radio button to enable or disable the flow control function.

Click the drop-down menu to select the port for the L2 Switch Fiber port setting.

Click the radio-button to enable or disable the Fiber Port Setting function.

Click the drop-down menu to select the fiber port speed: Auto, Auto-

1000M, 100M, or 1000M.

Click the drop-down menu to select the duplex setting: Half or Full.

Click the radio button to enable or disable the flow control function.

Click Apply to save the values and update the screen.

The ensuing table for Port Status settings are informational only: Port, Edit (click to enter description), Enable State, Link Status, Speed, Duplex, FlowCtrl Config and

FlowCtrl Status.

45 EKI-7706 Series User Manual

4.5.2

Port Mirror

Port mirroring function allows the sending of a copy of network packets seen on one switch port to a network monitoring connection on another switch port. Port mirroring can be used to analyze and debug data or diagnose errors on a network or to mirror either inbound or outbound traffic (or both).

There are no preset values in the Port Mirror. The displayed values do not represent the actual setting values.

To access this page, click L2 Switching > Port Mirror .

Figure 4.18 L2 Switching > Port Mirror

The following table describes the items in the previous figure.

Item Description

Session ID Click the drop-down menu to select a port mirroring session from the list. The number of sessions allowed is platform specific.

Monitor session state Click the drop-down menu to enable or disable the session mode for a selected session ID.

Destination Port

Allow-ingress

Click the drop-down menu to select the destination port and receive all the traffic from configured mirrored port(s).

Click the drop-down menu to enable or disable the Allow-ingress function.

Sniffer RX Ports

Sniffer TX Ports

Apply

Enter the variable to define the RX port.

Enter the variable to define the TX port.

Click Apply to save the values and update the screen.

The ensuing table for Mirror Status settings are informational only: Session ID, Destination Port, Ingress State, Source TX Port and Source RX Port.

EKI-7706 Series User Manual 46

4.5.3

Link Aggregation

Link Aggregation is a method for combining multiple network connections in parallel in order to increase throughput beyond the capability of a single connection, and to provide redundancy in case one of the links should fail.

4.5.3.1

Load Balance

The Load Balancing page allows you to select between a MAC Address or IP/MAC

Address algorithm for the even distribution of IP traffic across two or more links.

To access this page, click L2 Switching > Link Aggregation > Load Balance .

Figure 4.19 L2 Switching > Link Aggregation > Load Balance

The following table describes the items in the previous figure.

Item

Load Balance Algorithm

Apply

Description

Select the radio button to select the Load Balance Setting: MAC

Address, IP/MAC Address or Source Port.

Click Apply to save the values and update the screen.

The ensuing table for Load Balance Information settings are informational only:

Load Balance Algorithm.

4.5.3.2

LAG Management

Link aggregation is also known as trunking. It is a feature available on the Ethernet gateway and is used with Layer 2 Bridging. Link aggregation allows for the logical merging of multiple ports into a single link.

To access this page, click L2 Switching > Link Aggregation > LAG Management .

Item

LAG

Name

Type

Ports

Apply

Figure 4.20 L2 Switching > Link Aggregation > LAG Management

The following table describes the items in the previous figure.

Description

Click the drop-down menu to select the designated trunk group:

Trunk 1 ~8.

Enter an entry to specify the LAG name.

Click the radio button to specify the type mode: Static or LACP.

Click the drop-down menu to select designated ports: FE1-8 or

GE1-2.

Click Apply to save the values and update the screen.

47 EKI-7706 Series User Manual

The ensuing table for LAG Management Information settings are informational only: LAG, Name, Type, Link State, Active Member, Standby Member, Edit (click to modify the settings) and Clear (click to load default settings).

4.5.3.3

LAG Port Settings

The LAG Port Settings page allows you to enable or disable, set LAG status, speed and flow control functions.

In this example we will configure a LAG between the following switches:

To access this page, click L2 Switching > Link Aggregation > LAG Port Settings .

Figure 4.21 L2 Switching > Link Aggregation > LAG Port Settings

The following table describes the items in the previous figure.

Item

LAG Select

Enabled

Speed

Flow Control

Description

Click the drop-down menu to select a predefined LAG trunk definition:

LAG 1-8.

Click the radio button to enable or disable the LAG Port.

Click the drop-down menu to select the port speed: Auto, Auto-10M,

Auto-100M, Auto-1000M, Auto-10/100M, 10M, 100M, or 1000M.

Click the radio button to enable or disable the Flow Control for the

LAG Port.

Click Apply to save the values and update the screen.

Apply

The ensuing table for LAG Port Status settings are informational only: LAG, Description, Port Type, Enable State, Link Status, Speed, Duplex, FlowCtrl Config and

FlowCtrl Status.

4.5.3.4

LACP Priority Settings

The LACP Priority Settings page allows you to configure the system priority for LACP.

To access this page, click L2 Switching > Link Aggregation > LACP Priority Settings .

Figure 4.22 L2 Switching > Link Aggregation > LACP Priority Settings

The following table describes the items in the previous figure.

Item

System Priority

Apply

Description

Enter the value (1-65535) to designate the LACP system priority.

Click Apply to save the values and update the screen.

EKI-7706 Series User Manual 48

The ensuing table for LACP Information settings are informational only: System Priority.

4.5.3.5

LACP Port Settings

Link Aggregation Control Protocol (LACP) provides a method to control the bundling of several physical ports together to form a single logical channel. By configuring the

LACP function, the switch can negotiate an automatic bundling of links by sending

LACP packets to the peer device (also implementing LACP).

To access this page, click L2 Switching > Link Aggregation > LACP Port Settings .

Figure 4.23 L2 Switching > Link Aggregation > LACP Port Settings

The following table describes the items in the previous figure.

Item

Port Select

Priority

Timeout

Mode

Description

Select a port for the LACP Port Settings. The listed available settings are: FE1-FE8, GE1-GE2.

However, the available settings are dependent on the connected

LACP device and may not be listed as displayed in the current figure.

Enter a variable (1 to 65535) to assign a priority to the defined port selection.

Click the radio button to select a long or short timeout period.

Click the radio button to select the setting mode: Active or Passive.

Active: Enables LACP unconditionally.

Passive: Enables LACP only when an LACP device is detected

(default state).

Click Apply to save the values and update the screen.

Apply

The ensuing table for LACP Port Information settings are informational only: Port

Name, Priority, Timeout and Mode.

49 EKI-7706 Series User Manual

4.5.4

802.1Q VLAN

The 802.1Q VLAN feature allows for a single VLAN to support multiple VLANs. With the 802.1Q feature you can preserve VLAN IDs and segregate different VLAN traffic.

The 802.1Q VLAN tag feature encapsulates the 802.1Q VLAN tagging within another

802.1Q VLAN tag. The outer tag is assigned following the AP group, while the inner

VLAN ID is assigned dynamically by the AAA server.

4.5.4.1

VLAN Management

The management of VLANs is available through the VLAN Settings page. Through this page you can add or delete VLAN listings and add a prefix name to an added entry.

To access this page, click L2 Switching > 802.1Q VLAN > VLAN Management .

Figure 4.24 L2 Switching > 802.1Q VLAN > VLAN Management

The following table describes the items in the previous figure.

Item Description

VLAN Action Click the radio button to add or delete the VLAN entry shown in the previous field.

VLAN ID / VLAN List Enter the name of the VLAN entry to setup.

VLAN Name / VLAN

Prefix

Enter the prefix to be used by the VLAN list entry in the previous field.

Apply Click Apply to save the values and update the screen.

The ensuing table for VLAN Table settings are informational only: VLAN ID, VLAN

Name, VLAN Type and Edit (click to enter VLAN name).

EKI-7706 Series User Manual 50

4.5.4.2

PVID Settings

The PVID Settings page allows you to designate a PVID for a selected port, define the accepted type and enable/disable the ingress filtering.

To access this page, click L2 Switching > 802.1Q VLAN > PVID Settings .

Figure 4.25 L2 Switching > 802.1Q VLAN > PVID Settings

The following table describes the items in the previous figure.

Item

Port Select

PVID

Accepted Type

Ingress Filtering

Description

Click the drop-down menu to select a port and edit its settings: FE1-

FE8, GE1-GE2, or Trunk1 - Trunk8.

Enter the VLAN ID you want assigned to untagged or priority tagged frames received on this port. The value ranges 1 to 4094. The default is 1.

Click the radio button to specify which frames to forward.

Tag Only discards any untagged or priority tagged frames.

Untag Only discards any tagged frames.

All accepts all untagged and tagged frames.

Whichever you select, VLAN tagged frames are forwarded in accordance with the IEEE 802.1Q VLAN standard. The default is All.

Click the radio button to specify how you want the port to handle tagged frames. If you enable Ingress Filtering, a tagged frame will be discarded if this port is not a member of the VLAN identified by the

VLAN ID in the tag. If you select Disabled, all tagged frames will be accepted. The default is Disabled.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Port VLAN Status settings are informational only: Port, Interface VLAN Mode, PVID, Accept Frame Type and Ingress Filtering.

51 EKI-7706 Series User Manual

4.5.4.3

Port to VLAN

The Port to VLAN page allows you to add a port to a VLAN and select the related parameters.

To access this page, click L2 Switching > 802.1Q VLAN > Port to VLAN .

Figure 4.26 L2 Switching > 802.1Q VLAN > Port to VLAN

The following table describes the items in the previous figure.

Item Description

Port Displays the assigned port to the entry.

Interface VLAN Mode Displays the assigned mode to the listed VLAN port.

Hybrid: Port hybrid model.

Access: Port hybrid model.

Trunk: Port hybrid model.

Tunnel: Port hybrid model.

Membership

Apply

Displays the assigned membership status of the port entry, options include: Forbidden, Excluded Tagged or Untagged.

Click Apply to save the values and update the screen.

EKI-7706 Series User Manual 52

4.5.4.4

Port-VLAN Mapping

To access this page, click L2 Switching > 802.1Q VLAN > Port-VLAN Mapping .

The ensuing table for Port-VLAN Mapping Table settings are informational only:

Port, Mode, Administrative VLANs and Operational VLANs.

4.5.5

Q-in-Q

Q-in-Q is commonly referred as VLAN stacking in which VLANs are nested by adding two tags to each frame instead of one. Network service provider and users both can use VLANs and makes it possible to have more than the 4094 separate VLANs allowed by 802.1Q.

There are three ways in which a machine can be connected to a network carrying double-tagged 802.1ad traffic:

 via a untagged port, where both inner and outer VLANs are handled by the switch or switches (so the attached machine sees ordinary Ethernet frames);

 via a single-tagged (tunnel) port, where the outer VLAN only is handled by the switch (so the attached machine sees single-tagged 802.1Q VLAN frames); or

 via a double-tagged (trunk) port, where both inner and outer VLANs are handled by the attached machine (which sees double-tagged 802.1ad VLAN frames).

4.5.5.1

Global Settings

The Global Settings page allows you to set the outer VLAN Ethertype setting.

To access this page, click L2 Switching > Q-in-Q > Global Settings .

Figure 4.27 L2 Switching > Q-in-Q > Global Settings

The following table describes the items in the previous figure.

Item

Outer VLAN Ethertype

Apply

Description

Enter the outer VLAN handled by the switch giving the attached machine a single-tagged 802.1Q VLAN frame.

Click Apply to save the values and update the screen.

The ensuing table for QinQ Global Information settings are informational only:

Outer VLAN Ethertype.

53 EKI-7706 Series User Manual

4.5.5.2

Port Settings

The Port Settings page allows you to define the outer PVID and outer mode for a selected port.

To access this page, click L2 Switching > Q-in-Q > Port Settings .

Figure 4.28 L2 Switching > Q-in-Q > Port Settings

The following table describes the items in the previous figure.

Item

Port Select

Outer PVID

Outer Mode

Description

Enter the switch port (part of VLAN configuration) to configure the selection as a tunnel port.

Enter the Port VLAN ID (PVID) to assigned the native VLAN ID. All untagged traffic coming in or out of the 802.1Q port is forwarded based on the PVID value

Click the drop-down menu to select between UNI or NNI role.

UNI: Selects a user-network interface which specifies communication between the specified user and a specified network.

NNI: Selects a network-to-network interface which specifies communication between two specified networks.

Click Apply to save the values and update the screen.

Apply

The ensuing table for QinQ Port Information settings are informational only: Port,

Outer PVID and Outer Mode.

EKI-7706 Series User Manual 54

4.5.6

GARP

The Generic Attribute Registration Protocol (GARP) is a local area network (LAN) protocol. The protocol defines procedures for the registration and de-registration of attributes (network identifiers or addresses) by end stations and switches with each other.

4.5.6.1

GARP Settings

To access this page, click L2 Switching > GARP > GARP Settings .

Figure 4.29 L2 Switching > GARP > GARP Settings

The following table describes the items in the previous figure.

Item

Join Time

Leave Time

Leave All Time

Description

Enter a value to specify the time between the transmission of GARP

PDUs registering (or re-registering) membership for a VLAN or multicast group in centiseconds. Enter a number between 6 and 600. An instance of this timer exists for each GARP participant for each port.

Enter a value to specify the time to wait after receiving an unregister request for a VLAN or multicast group before deleting the associated entry, in centiseconds. This allows time for another station to assert registration for the same attribute in order to maintain uninterrupted service. Enter a number between 12 and 3000. An instance of this timer exists for each GARP participant for each port.

Enter a value to specify the Leave All Time controls how frequently

Leave All PDUs are generated. A LeaveAll PDU indicates that all registrations will shortly be deregistered. Participants will need to rejoin in order to maintain registration. The Leave All Period Timer is set to a random value in the range of LeaveAllTime to 1.5*LeaveAllTime. The timer is specified in centiseconds. Enter a number between 12 and

12000. An instance of this timer exists for each GARP participant for each port.

Click Apply to save the values and update the screen.

Apply

The ensuing table for GARP Information settings are informational only: Join Time,

Leave Time and Leave All Time.

55 EKI-7706 Series User Manual

4.5.6.2

GVRP Settings

The GVRP Settings page allows you to enable or disable the GVRP (GARP VLAN

Registration Protocol or Generic VLAN Registration Protocol) protocol which facilitates control of virtual local area networks (VLANs) within a larger network.

To access this page, click L2 Switching > GARP > GVRP Settings .

Figure 4.30 L2 Switching > GARP > GVRP Settings

The following table describes the items in the previous figure.

Item

Status

Apply

Description

Click to enable or disable the GARP VLAN Registration Protocol administrative mode for the switch. The factory default is Disable.

Click Apply to save the values and update the screen.

The ensuing table for GVRP Information settings are informational only: GVRP.

4.5.6.3

GMRP Settings

To access this page, click L2 Switching > GARP > GMRP Settings .

Figure 4.31 L2 Switching > GARP > GMRP Settings

The following table describes the items in the previous figure.

Item

State

Description

Click to enable or disable the GMRP mode for the switch. The factory default is Disable.

Click Apply to save the values and update the screen.

Apply

The ensuing table for GMRP Information settings are informational only: GMRP.

The ensuing table for Multicast Groups settings are informational only: VLAN ID,

MAC Address, Type and Member Ports.

EKI-7706 Series User Manual 56

4.5.7

802.3az EEE

The 802.3az Energy Efficient Ethernet (EEE) innovative green feature reduces energy consumption through intelligent functionality:

 Traffic detection — Energy Efficient Ethernet (EEE) compliance

 Inactive link detection

Inactive link detection function automatically reduces power usage when inactive links or devices are detected.

To access this page, click L2 Switching > 802.3az EEE .

Figure 4.32 L2 Switching > 802.3az EEE

The following table describes the items in the previous figure.

Item

Port Select

State

Description

Enter the port to setup the EEE function.

Click Enabled or Disabled to set the state mode of the port select setting.

Click Apply to save the values and update the screen.

Apply

The ensuing table for EEE Enable Status settings are informational only: Port and

EEE State.

4.5.8

Multicast

Multicast forwarding allows a single packet to be forwarded to multiple destinations.

The service is based on L2 switch receiving a single packet addressed to a specific

Multicast address. Multicast forwarding creates copies of the packet, and transmits the packets to the relevant ports.

4.5.8.1

Multicast Filtering

The Multicast Filtering page allows for the definition of action settings when an unknown multicast request is received. The options include: Drop, Flood, or Router

Port.

To access this page, click L2 Switching > Multicast > Multicast Filtering .

Figure 4.33 L2 Switching > Multicast > Multicast Filtering

The following table describes the items in the previous figure.

Item

Unknown Multicast

Action

Apply

Description

Select the configuration protocol: Drop, Flood, or Router Port, to apply for any unknown multicast event.

Click Apply to save the values and update the screen.

57 EKI-7706 Series User Manual

The ensuing table for Properties Information settings are informational only:

Unknown Multicast Action.

4.5.8.2

IGMP Snooping

IGMP Snooping is defined as the process of listening to Internet Group Management

Protocol (IGMP) network traffic. IGMP Snooping allows a network switch to listen in on the IGMP conversation between hosts and routers and maintain a map of which links need which IP multicast streams. Multicasts can be filtered from the links which do not need them in turn controlling which ports receive specific multicast traffic.

IGMP Settings

To access this page, click L2 Switching > Multicast > IGMP Snooping > IGMP Settings .

Figure 4.34 L2 Switching > Multicast > IGMP Snooping > IGMP Settings

The following table describes the items in the previous figure.

Item Description

IGMP Snooping

State

IGMP Snooping Version

IGMP Snooping

Report Suppression

Apply

Select Enable or Disable to designate the IGMP Snooping State.

Select designate the IGMP Snooping Version: V2 or V3.

Select Enable or Disable to setup the report suppression for IGMP

Snooping.

Click Apply to save the values and update the screen.

The ensuing table for IGMP Snooping Information settings are informational only:

IGMP Snooping State, IGMP Snooping Version and IGMP Snooping V2 Report Suppression.

The ensuing table for IGMP Snooping Table settings are informational only: Entry

No., VLAN ID, IGMP Snooping Operation State, Router Ports Auto Learn, Query

Robustness, Query Interval (sec.), Query Max Response Interval (sec.), Last Member Query count, Last Member Query Interval (sec), Immediate Leave and Edit (click to modify the settings).

EKI-7706 Series User Manual 58

IGMP Querier

IGMP Querier allows snooping to function by creating the tables for snooping. General queries must be unconditionally forwarded by all switches involved in IGMP snooping.

To access this page, click L2 Switching > Multicast > IGMP Snooping > IGMP

Querier .

Figure 4.35 L2 Switching > Multicast > IGMP Snooping > IGMP Querier

The following table describes the items in the previous figure.

Item

VLAN ID

Querier State

Querier Version

Description

Select the VLAN ID to define the local IGMP querier.

Select Disable or Enable to configure the VLAN ID (IGMP Querier).

Select the querier version (V2 or V3) designated to the selected VLAN

ID.

Click Apply to save the values and update the screen.

Apply

The ensuing table for IGMP Querier Status settings are informational only: VLAN ID,

Querier State, Querier Status, Querier Version and Querier IP.

IGMP Static Groups

To access this page, click L2 Switching > Multicast > IGMP Snooping > IGMP

Static Groups.

Figure 4.36 L2 Switching > Multicast > IGMP Snooping > IGMP Static Groups

The following table describes the items in the previous figure.

Item

VLAN ID

Group IP Address

Member Ports

Add

Description

Select the VLAN ID to define IGMP static group.

Enter the IP address assigned to the VLAN ID.

Enter the port numbers to associate with the static group.

Click Add to add an IGMP group.

The ensuing table for IGMP Static Groups Status settings are informational only:

VLAN ID, Group IP Address, Member Ports and Modify.

59 EKI-7706 Series User Manual

Multicast Groups

To access this page, click L2 Switching > Multicast > IGMP Snooping > Multicast

Groups .

The ensuing table for Multicast Groups settings are informational only: VLAN ID,

Group IP Address, Member Ports, Type and Life (Sec).

Router Ports

To access this page, click L2 Switching > Multicast > IGMP Snooping > Router

Ports .

The ensuing table for Router Ports settings are informational only: VLAN ID, Port and Expiry Time (Sec).

4.5.8.3

MLD Snooping

The MLD Snooping page allows you to select the snooping status (enable or disable), the version (v1 or v2) and the enabling/disabling of the report suppression for the MLD querier, which sends out periodic general MLD queries and are forwarded through all ports in the VLAN.

MLD Settings

To access this page, click L2 Switching > Multicast > MLD Snooping > MLD Settings .

Figure 4.37 L2 Switching > Multicast > MLD Snooping > MLD Settings

The following table describes the items in the previous figure.

Item Description

MLD Snooping State Select Enable or Disable to setup the MLD Snooping State.

MLD Snooping Version

Select the querier version (V1 or V2) designated to the MLD Snooping

Version.

MLD Snooping

Report Suppression

Apply

Select

Click

Enable pression.

Apply

or Disable to designate the status of the report sup-

to save the values and update the screen.

The ensuing table for MLD Snooping Information settings are informational only:

MLD Snooping State, MLD Snooping Version and MLD Snooping V2 Report Suppression.

The ensuing table for MLD Snooping Table settings are informational only: Entry

No., VLAN ID, MLD Snooping Operation State, Router Ports Auto Learn, Query

Robustness, Query Interval (sec.), Query Max Response Interval (sec.), Last Member Query count, Last Member Query Interval (sec), Immediate Leave and Edit (click to modify the settings).

EKI-7706 Series User Manual 60

MLD Querier

The MLD Querier page allows you to select and enable/disable the MLD querier and define the version (IGMPv1 or IGMPv2) when enabled.

To access this page, click L2 Switching > Multicast > MLD Snooping > MLD Querier .

Figure 4.38 L2 Switching > Multicast > MLD Snooping > MLD Querier

The following table describes the items in the previous figure.

Item

VLAN ID

Querier State

Querier Version

Description

Enter the VLAN ID to configure.

Select Enable or Disable status on the selected VLAN.

Enable: Enable IGMP Querier Election.

Disable: Disable IGMP Querier Election.

Select the querier version (IGMPV1 or IGMPV2) designated to the

MLD Querier function.

Click Apply to save the values and update the screen.

Apply

The ensuing table for MLD Querier Status settings are informational only: VLAN ID,

Querier State, Querier Status, Querier Version and Querier IP.

MLD Static Group

The MLD Static Group page allows you to configure specified ports as static member ports.

To access this page, click L2 Switching > Multicast > MLD Snooping > MLD Static

Group .

Figure 4.39 L2 Switching > Multicast > MLD Snooping > MLD Static Group

The following table describes the items in the previous figure.

Item

VLAN ID

Group IP Address

Member Ports

Add

Description

Enter the VLAN ID to define the local MLD Static Group.

Enter the IP address associated with the static group.

Enter the ports designated with the static group.

Click Add to add a MLD static group.

The ensuing table for MLD Static Groups Status settings are informational only:

VLAN ID, Group IP Address, Member Ports and Modify.

61 EKI-7706 Series User Manual

Multicast Groups

To access this page, click L2 Switching > Multicast > MLD Snooping > Multicast

Groups .

The ensuing table for Multicast Groups settings are informational only: ID, Group IP

Address, Member Ports, Type and Life (Sec).

Router Ports

To access this page, click L2 Switching > Multicast > MLD Snooping > Router

Ports .

The ensuing table for Router Ports settings are informational only: VLAN ID, Port and Expiry Time (Sec).

4.5.9

Jumbo Frame

Jumbo frames are frames larger than the standard Ethernet frame size of 1518 bytes. The Jumbo Frame function allows the configuration of Ethernet frame size.

To access this page, click L2 Switching > Jumbo Frame .

Figure 4.40 L2 Switching > Jumbo Frame

The following table describes the items in the previous figure.

Item

Jumbo Frame

(Bytes)

Apply

Description

Enter the variable in bytes (1518 to 9216) to define the jumbo frame size.

Click Apply to save the values and update the screen.

The ensuing table for Jumbo Frame Config settings are informational only: Jumbo

Frame (Bytes).

EKI-7706 Series User Manual 62

4.5.10

Spanning Tree

The Spanning Tree Protocol (STP) is a network protocol to ensure loop-free topology for any bridged Ethernet local area network.

4.5.10.1

STP Global Settings

The STP Global Settings page allows you to set the STP status, select the configuration for a BPDU packet, choose the path overhead, force version and set the configuration revision range.

To access this page, click L2 Switching > Spanning Tree > STP Global Settings .

Figure 4.41 L2 Switching > Spanning Tree > STP Global Settings

The following table describes the items in the previous figure.

Item

Enabled

BPDU Forward

BPDU Guard

PathCost Method

Force Version

Description

Click the radio-button to enable or disable the STP status.

Select flooding or filtering to designate the type of BPDU packet.

Click the radio-button to enable or disable the BPDU guard. When enabled, BPDU Guard can disable edge ports that receive BPDU packets. This prevents a new device from entering the existing STP topology. Thus devices that were originally not a part of STP are not allowed to influence the STP topology

Select short or long to define the method of used for path cost calculations.

Click the drop-down menu to select the operating mode for STP.

STP-Compatible: 802.1D STP operation.

RSTP-Operation: 802.1w operation.

MSTP-Operation: 802.1s operation.

Click Apply to save the values and update the screen.

Apply

The ensuing table for STP Information settings are informational only: STP, BPDU

Forward, BPDU Guard, PathCost Method and Force Version.

63 EKI-7706 Series User Manual

4.5.10.2

STP Port Settings

The STP Port Settings page allows you to configure the ports for the setting, port’s contribution, configure edge port, and set the status of the BPDU filter.

To access this page, click L2 Switching > Spanning Tree > STP Port Settings .

Figure 4.42 L2 Switching > Spanning Tree > STP Port Settings

The following table describes the items in the previous figure.

Item Description

Port Select

Admin Enable

Select the port list to specify the ports that apply to this setting.

Select Enabled or Disabled to setup the admin profile for the STP port.

Path Cost (0 = Auto) Set the port’s cost contribution. For a root port, the root path cost for the bridge. (0 means Auto).

Edge Port Click the drop-down menu to set the edge port configuration.

No: Force to false state (as link to a bridge).

Yes: Force to true state (as link to a host).

P2P MAC Click the drop-down menu to set the Point-to-Point port configuration.

No: Force to false state.

Yes: Force to true state.

Migrate

Apply

Click the check box to enable the migrate function.

Forces the port to use the new MST/RST BPDUs, requiring the switch to test on the LAN segment. for the presence of legacy devices, which are not able to understand the new BPDU formats.

Click Apply to save the values and update the screen.

The ensuing table for STP Port Status settings are informational only: Port, Admin

Enable, Path Cost, Edge Port and P2P MAC.

EKI-7706 Series User Manual 64

4.5.10.3

STP Bridge Settings

The STP Bridge Settings page allows you to configure the priority, forward delay, maximum age, Tx hold count, and the hello time for the bridge.

To access this page, click L2 Switching > Spanning Tree > STP Bridge Settings .

Figure 4.43 L2 Switching > Spanning Tree > STP Bridge Settings

The following table describes the items in the previous figure.

Item

Priority

Forward Delay

Max Age

Tx Hold Count

Hello Time

Description

Click the drop-down menu to select the STP bridge priority.

Enter the variable (4 to 30) to set the forward delay for STP bridge settings.

Enter the variable (6 to 40) to set the Max age for STP bridge settings.

Enter the variable (1 to 10) to designate the TX hold count for STP bridge settings.

Enter the variable (1 to 10) to designate the Hello Time for STP bridge settings.

Click Apply to save the values and update the screen.

Apply

The ensuing table for STP Bridge Information settings are informational only: Priority, Forward Delay, Max Age, Tx Hold Count and Hello Time.

The ensuing table for STP Bridge Status settings are informational only: Bridge

Identifier, Designated Root Bridge, Root Path Cost, Designated Bridge, Root Port and Last Topology Change.

65 EKI-7706 Series User Manual

4.5.10.4

STP Port Advanced Settings

The STP Port Advanced Settings page allows you to select the port list to apply this setting.

To access this page, click L2 Switching > Spanning Tree > STP Port Advanced

Settings .

Figure 4.44 L2 Switching > Spanning Tree > STP Port Advanced Settings

The following table describes the items in the previous figure.

Item

Port Select

Priority

Apply

Description

Select the port to designate the STP settings.

Click the drop-down menu to designate a priority.

Click Apply to save the values and update the screen.

The ensuing table for STP Port Status settings are informational only: Port, Identifier

(Priority / Port Id), Path Cost Conf/Oper, Designated Root Bridge, Root Path Cost,

Designated Bridge, Edge Port Conf/Oper, P2P MAC Conf/Oper, Port Role and Port

State.

4.5.10.5

MST Config Identification

The MST Config Identification page allows you to configure the identification setting name and the identification range.

To access this page, click L2 Switching > Spanning Tree > MST Config Identification .

Figure 4.45 L2 Switching > Spanning Tree > MST Config Identification

The following table describes the items in the previous figure.

Item Description

Configuration Name Enter the identifier used to identify the configuration currently being used. It may be up to 32 characters.

Revision Level Enter the identifier for the Revision Configuration, range: 0 to 65535

(default: 0).

Apply Click Apply to save the values and update the screen.

The ensuing table for MST Configuration Identification Information settings are informational only: Configuration Name and Revision Level.

EKI-7706 Series User Manual 66

4.5.10.6

MST Instance ID Settings

The MST Instance ID Settings page allows you to edit the MSTI ID and VID List settings.

To access this page, click L2 Switching > Spanning Tree > MST Instance ID Settings .

Figure 4.46 L2 Switching > Spanning Tree > MST Instance ID Settings

The following table describes the items in the previous figure.

Item

MSTI ID

VID List

Move

Description

Enter the MST instance ID (0-15).

Enter the pre-configured VID list.

Click Move to save the values and update the screen.

The ensuing table for MST Instance ID Information settings are informational only:

MSTI ID and VID List.

4.5.10.7

MST Instance Priority Settings

The MST Instance Priority Settings allows you to specify the MST instance and the bridge priority in that instance.

To access this page, click L2 Switching > Spanning Tree > MST Instance Priority

Settings .

Figure 4.47 L2 Switching > Spanning Tree > MST Instance Priority Settings

The following table describes the items in the previous figure.

Item

MSTI ID

Priority

Description

Click the drop-down menu to specify the MST instance.

Click the drop-down menu set the bridge priority in the specified MST instance

Click Apply to save the values and update the screen.

Apply

The ensuing table for MST Instance Priority Information settings are informational only: MSTI ID, Priority and Action.

67 EKI-7706 Series User Manual

4.5.10.8

MST Instance Info

To access this page, click L2 Switching > Spanning Tree > MST Instance Info .

The ensuing table for STP Bridge Status settings are informational only: Bridge

Identifier, Designated Root Bridge, Root Path Cost, Designated Bridge, Root Port and TCNLast Topology Change.

The ensuing table for STP Port Status settings are informational only: Port, Identifier

(Priority / Port Id), Path Cost Conf/Oper, Designated Root Bridge, Root Path Cost,

Designated Bridge, Edge Port Conf/Oper, P2P MAC Conf/Oper, Port Role and Port

State.

4.5.10.9

STP Statistics

To access this page, click L2 Switching > Spanning Tree > STP Statistics .

The ensuing table for STP Statistics settings are informational only: Port, Configuration BPDUs Received, TCN BPDUs Received, Configuration BPDUs Transmitted and TCN BPDUs Transmitted.

4.5.11

X-Ring Elite

The X-Ring Elite function provides an improvement over Spanning Tree and Rapid

Spanning Tree and a rapid auto recovery in the event that the network suffers a corrupt or broken link and prevents network loops.

4.5.11.1

X-Ring Elite Settings

The X-Ring Elite Settings allows you to enable or disable the state of the X-Ring settings.

To access this page, click L2 Switching > X-Ring Elite > X-Ring Elite Settings .

Figure 4.48 L2 Switching > X-Ring Elite > X-Ring Elite Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Select Enabled or Disabled to setup the X-Ring Elite mode.

Click Apply to save the values and update the screen.

The ensuing table for Information settings are informational only: X-Ring Elite State.

EKI-7706 Series User Manual 68

4.5.11.2

X-Ring Elite Groups

The X-Ring Elite Groups page allows you to select the function and role for each device and the connected ports.

To access this page, click L2 Switching > X-Ring Elite > X-Ring Elite Groups .

Figure 4.49 L2 Switching > X-Ring Elite > X-Ring Elite Groups

The following table describes the items in the previous figure.

Item

Ring ID

Role

Port 1

Port 2

Add

Description

Enter a number to specifies a ranging from 1 to 255 to identify a given

X-Ring Elite group.

Click the drop-down menu to select the ring role.

Click the drop-down menu to define the port designation.

Click the drop-down menu to define the port designation.

Click Add to save the values and update the screen.

The ensuing table for Information settings are informational only: Ring ID, Role, Port

1, Port 2 and Delete (click to delete the desired Ring ID).

4.5.12

X-Ring Pro

The X-Ring Pro function provides an improvement over Spanning Tree and Rapid

Spanning Tree and a rapid auto recovery in the event that the network suffers a corrupt or broken link and prevents network loops.

4.5.12.1

X-Ring Pro Settings

The X-Ring Pro Settings page allows you to configure the status (enabled or disabled) of the function.

To access this page, click L2 Switching > X-Ring Pro > X-Ring Pro Settings .

Figure 4.50 L2 Switching > X-Ring Pro > X-Ring Pro Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Select Enabled or Disabled to setup the X-Ring Pro mode.

Click Apply to save the values and update the screen.

The ensuing table for Information settings are informational only: X-Ring Pro State.

69 EKI-7706 Series User Manual

4.5.12.2

X-Ring Pro Groups

The X-Ring Pro Groups page allows you to select the function and role for each ring

ID and its connected ports.

To access this page, click L2 Switching > X-Ring Pro > X-Ring Pro Groups .

Figure 4.51 L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro

Groups Settings

The following table describes the items in the previous figure.

Item

Ring ID

Port 1

Port 2

Add

Description

Enter a number to specifies a ranging from 1 to 255 to identify a given

X-Ring Pro group.

Click the drop-down menu to define the port designation.

Click the drop-down menu to define the port designation.

Click Add to save the values and update the screen.

Figure 4.52 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Chain Settings

The following table describes the items in the previous figure.

Item

Chain Ring ID

Role

Head Port

Member Port

Add

Description

Enter a number to specifies a ranging from 1 to 255 to identify a chain ring ID.

Click the drop-down menu to select the ring role.

Click the drop-down menu to define the port designation.

Click the drop-down menu to define the port designation.

Click Add to save the values and update the screen.

Figure 4.53 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Couple Setting

The following table describes the items in the previous figure.

Item

Couple Ring ID

Description

Enter a number to specifies a ranging from 1 to 255 to identify a given

X-Ring group.

EKI-7706 Series User Manual 70

Item

Port

Master Ring ID

Add

Description

Enter the port to assign to define the couple setting.

Click the drop-down menu to designate the master ring.

Click Add to save the values and update the screen.

Figure 4.54 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Pair Settings

The following table describes the items in the previous figure.

Item

Pair Ring ID

Port

Master Ring ID

Add

Description

Enter a number to specifies a ranging from 1 to 255 to identify a pair ring ID.

Enter the port to assign to define the couple setting.

Click the drop-down menu to designate the master ring.

Click Add to save the values and update the screen.

Figure 4.55 L2 Switching > X-Ring Pro > X-Ring Pro Groups > RPair Settings

The following table describes the items in the previous figure.

Item

RPair Ring ID

Port

Master Ring ID

Add

Description

Enter a number to specifies a ranging from 1 to 255 to identify a rpair ring ID.

Enter the port to assign to define the couple setting.

Click the drop-down menu to designate the master ring.

Click Add to save the values and update the screen.

The ensuing table for Information settings are informational only: Ring ID, Mode,

Role, Operation State, Port 1, Forwarding State, Port 2, Forwarding State and Delete

(click to delete the desired Ring ID).

71 EKI-7706 Series User Manual

4.5.13

Loopback Detection

The Loopback Detection function is used to detect looped links. By sending detection frames and then checking to see if the frames returned to any port on the device, the function is used to detect loops.

4.5.13.1

Global Settings

The Global Settings page allows you to configure the state (enabled or disabled) of the function, select the interval at which frames are transmitted and the delay before recovery.

To access this page, click L2 Switching > Loopback Detection > Global Settings .

Figure 4.56 L2 Switching > Loopback Detection > Global Settings

The following table describes the items in the previous figure.

Item

State

Interval

Recover Time

Description

Select Enabled or Disabled to setup the loopback mode.

Enter the variable in seconds (1 to 32767) to set the interval at which frames are transmitted.

Enter the variable in seconds (60 to 1000000) to define the delay before recovery.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Loopback Detection Global Information settings are informational only: State, Interval and Recover Time.

EKI-7706 Series User Manual 72

4.5.13.2

Port Settings

The Port Settings page allows you to select ports that are detected by the loopback detection function and configure their status (enabled or disabled).

To access this page, click L2 Switching > Loopback Detection > Port Settings .

Figure 4.57 L2 Switching > Loopback Detection > Port Settings

The following table describes the items in the previous figure.

Item

Port Select

Enabled

Description

Enter the port to define the local loopback detection setting.

Select Enabled or Disabled to setup the Loopback Detection function.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Loopback Detection Port Information settings are informational only: Port, Enable State and Loop Status.

4.5.14

ERPS

4.5.14.1

ERPS Settings

To access this page, click L2 Switching > ERPS > ERPS Settings .

Figure 4.58 L2 Switching > ERPS > ERPS Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Click Enabled or Disabled to enable ERPS settings.

Click Apply to save the values and update the screen.

The ensuing table for Information settings are informational only: ERPS State.

73 EKI-7706 Series User Manual

4.5.14.2

ERPS Groups

To access this page, click L2 Switching > ERPS > ERPS Groups .

Figure 4.59 L2 Switching > ERPS > ERPS Groups

The following table describes the items in the previous figure.

Item

ERP Instance

Ring ID

Role

East Link

RPL

West Link

RPL

MEL

R-APS Channel

VLAN

Traffic Channel

Instance

Type

WTR Timer

Guard Timer

Hold-off Timer

Apply

Description

Enter the value to set the ERP instance.

Enter the value to set the ring ID.

Click the drop down menu to select the role. Options include: RPL

Owner, RPL Neighbor or Other.

Enter the port to define the east link.

Check the check box to enable RPL.

Enter the port to define the west link.

Check the check box to enable RPL.

Enter the value to set minimum equipment list.

Click the drop down menu to select the VLAN.

Click the drop down menu to select the traffic channel instance.

Click the drop down menu to select the ERP group type.

Enter the value to set WTR timer.

Enter the value to set guard timer.

Enter the value to set hold-off timer.

Click Apply to save the values and update the screen.

The ensuing table for Information settings are informational only: ERP Instance,

Ring ID, Role, State, East Link, West Link, MEL, R-APS Channel VLAN, Traffic Channel Instance, Type, WTR Timer, Guard Timer, Hold-off Timer and Delete (Click

Delete to delete the desired Ring ID).

EKI-7706 Series User Manual 74

4.6

MAC Address Table

The MAC Address Table provides access to the Static MAC Settings, MAC Aging

Time, and Dynamic Forwarding.

4.6.1

Static MAC

The Static MAC page allows you to configure the address for forwarding of packets, the VLAN ID of the listed MAC address and the designated Port.

To access this page, click MAC Address Table > Static MAC .

Figure 4.60 MAC Address Table > Static MAC

The following table describes the items in the previous figure.

Item

MAC Address

VLAN

Port

Apply

Description

Enter the MAC address to which packets are statically forwarded.

Click the drop-down menu to select the VLAN ID number of the VLAN for which the MAC address is residing.

Click the drop-down menu to select the port number.

Click Apply to save the values and update the screen.

The ensuing table for Static MAC Status settings are informational only: No., MAC

Address, VLAN, Port and Delete (click to delete the desired MAC address).

4.6.2

MAC Aging Time

The MAC Aging Time page allows you to set the MAC address of the aging time to study.

To access this page, click MAC Address Table > MAC Aging Time .

Figure 4.61 MAC Address Table > MAC Aging Time

The following table describes the items in the previous figure.

Item

Aging Time

Apply

Description

Enter the variable (10 to 630) to define the time required for aging.

Click Apply to save the values and update the screen.

The ensuing table for Dynamic Address Status settings are informational only:

Aging time.

75 EKI-7706 Series User Manual

4.6.3

Dynamic Forwarding Table

The Dynamic Forwarding function allows you to configure an address tables, which contain the following:

 The port each hardware address is associated with

 The VLAN to show or clear dynamic MAC entries

 The MAC address selection

To access this page, click MAC Address Table > Dynamic Forwarding Table .

Figure 4.62 MAC Address Table > Dynamic Forwarding Table

The following table describes the items in the previous figure.

Item

Port

VLAN

MAC Address

View

Clear

Description

Click the drop-down menu to select the port number to show or clear dynamic MAC entries. If a port, VLAN or MAC address is not selected the whole dynamic MAC table is displayed or cleared.

Click the drop-down menu to select the VLAN to show or clear dynamic MAC entries.

Enter the MAC address to show or clear dynamic MAC entries. If a port, VLAN or MAC address is not selected the whole dynamic MAC table is displayed or cleared.

Click View to display the MAC address information.

Click Clear to clear the MAC Address Information table.

The ensuing table for MAC Address Information settings are informational only:

MAC Address, VLAN, Type, Port and Add to Static MAC (click to add the MAC address to static MAC address list).

EKI-7706 Series User Manual 76

4.7

Security

The Security function allows for the configuration of Storm Control, Port Security, Protected Ports, DoS Prevention, Applications, 802.1x, and IP Security.

4.7.1

Storm Control

The Storm Control page allows you to setup the units and Preamble/IFG to manage the occurrence of packet flooding on the LAN and consequent traffic to prevent the degrading of network performance.

4.7.1.1

Global Settings

To access this page, click Security > Storm Control > Global Settings .

Figure 4.63 Security > Storm Control > Global Settings

The following table describes the items in the previous figure.

Item

Unit

Preamble & IFG

Description

Select pps or bps control units for the Storm Control function.

Select Excluded or Included to setup the Storm Control Global settings.

Excluded: exclude preamble & IFG (20 bytes) when count ingress storm control rate.

Included: include preamble & IFG (20 bytes) when count ingress storm control rate.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Storm Control Global Information settings are informational only: Unit and Preamble & IFG.

77 EKI-7706 Series User Manual

4.7.1.2

Port Settings

The Port Settings page allows you to configure the port and the type of storm control association along with the value of the storm rate for the selected port.

To access this page, click Security > Storm Control > Port Settings .

Figure 4.64 Security > Storm Control > Port Settings

The following table describes the items in the previous figure.

Item

Port

Port State

Action

Type Enable

Description

Enter the port number to designate the local port for the Storm Control function.

Select Disabled or Enabled to define the port state

Click the drop-down menu to select the type of action to designate for the selected port during a Storm Control incident. The options are

Drop and Shutdown.

Click the radio button to enable Broadcast, Unknown Multicast, or

Unknown Unicast.

Broadcast: Select the variable in Kbps to define the broadcast bandwidth.

Unknown Multicast: Select the variable in Kbps to define the unknown multicast setting.

Unknown Unicast: Select the variable in Kbps to define the unknown unicast setting.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Storm Control Port Information settings are informational only: Port, Port State, Broadcast (Kbps), Unknown Multicast (Kbps), Unknown Unicast (Kbps) and Action.

EKI-7706 Series User Manual 78

4.7.2

Port Security

The Port Security page allows you to configure port isolation behavior.

To access this page, click Security > Port Security .

Figure 4.65 Security > Port Security

The following table describes the items in the previous figure.

Item

Port Select

Enabled

FDB Learn Limit

(0-64)

Violation MAC Notification

Apply

Description

Enter a single or multiple port numbers to configure.

Select Enabled or Disabled to define the selected Port.

Enter the variable (0 to 64) to set the learn limit for the FDB setting.

Select Enabled or Disabled to define the selected Port.

Click Apply to save the values and update the screen.

The ensuing table for Port Security Information settings are informational only:

Port, Enabled, FDB Learn Limit and Violation MAC Notification.

4.7.3

Protected Ports

The Protected Port page allows you to configure a single or multiple ports as a protected or unprotected type.

To access this page, click Security > Protected Ports .

Figure 4.66 Security > Protected Ports

The following table describes the items in the previous figure.

Item

Port List

Port Type

Apply

Description

Enter the port number to designate for the Protected Port setting.

Select Unprotected or Protected to define the port type.

Click Apply to save the values and update the screen.

The ensuing table for Protected Ports Status settings are informational only: Protected Ports and Unprotected Ports.

79 EKI-7706 Series User Manual

4.7.4

DoS Prevention

The DoS Prevention page allows you to setup (enabled or disabled) the denial of service.

4.7.4.1

DoS Global Settings

The DoS Global Settings page allows you to configure (enabled or disabled) the setting for each function.

To access this page, click Security > DoS Prevention > DoS Global Settings .

Figure 4.67 Security > DoS Prevention > DoS Global Settings

The following table describes the items in the previous figure.

Item

DMAC = SMAC

LAND

Description

Click Enabled or Disabled to define DMAC-SMAC for the DoS Global settings.

Click Enabled or Disabled to define LAND for the DoS Global settings.

EKI-7706 Series User Manual 80

Item Description

UDP Blat

TCP Blat

Click Enabled or Disabled to define UDP Blat for the DoS Global settings.

Click Enabled or Disabled to define TCP Blat for the DoS Global settings.

POD Click Enabled or Disabled to define POD for the DoS Global settings.

IPv6 Min Fragment Click Enabled or Disabled to define minimum fragment size for the

IPv6 protocol.

Enter the variable in bytes (0 to 65535) to set the minimum fragment size when the function is enabled.

ICMP Fragments Click Enabled or Disabled to define the ICMP Fragments function.

IPv4 Ping Max Size Click Enabled or Disabled to set the maximum ping size for the IPv4 protocol.

IPv6 Ping Max Size Click Enabled or Disabled to set a maximum ping size for the IPv6 protocol.

Ping Max Size Setting

Enter the variable in bytes (0 to 65535) to set the maximum ping size.

Smurf Attack

TCP Min Hdr Size

Click Enabled or Disabled to set the Smurf Attack function.

Click Enabled or Disabled to set the minimum header size.

Enter the variable in bytes (0 to 31) to set the minimum header size.

TCP-SYN (SPORT <

1024)

Click Enabled or Disabled to set the TCP synchronization function

(sport < 1021).

Null Scan Attack Click Enabled or Disabled to set the Null Scan Attack function.

X-Mas Scan Attack Click Enabled or Disabled to set the X-Mas Scan function.

TCP SYN-FIN Attack Click Enabled or Disabled to set the TCP synchronization termination attack function.

TCP SYN-RST

Attack

TCP Fragment (Offset = 1)

Apply

Click

Click

=1).

Click

Enabled

Enabled

Apply

or attack function.

or

Disabled

Disabled

to set the TCP synchronization reset

to set the TCP fragment function (offset

to save the values and update the screen.

The ensuing table for DoS Global Information settings are informational only:

DMAC = SMAC, Land Attack, UDP Blat, TCP Blat, POD (Ping of Death), IPv6 Min

Fragment Size, ICMP Fragment Packets, IPv4 Ping Max Packet Size, IPv6 Ping Max

Packet Size, Smurf Attack, TCP Min Header Length, TCP Syn (SPORT < 1024), Null

Scan Attack, X-Mas Scan Attack, TCP SYN-FIN Attack, TCP SYN-RST Attack and

TCP Fragment (Offset = 1).

81 EKI-7706 Series User Manual

4.7.4.2

DoS Port Settings

The DoS Port Settings page allow you to configure DoS security (enabled or disabled) for the selected port.

To access this page, click Security > DoS Prevention > DoS Port Settings .

Figure 4.68 Security > DoS Prevention > DoS Port Settings

The following table describes the items in the previous figure.

Item

Port

DoS Protection

Apply

Description

Select the port to configure for the DoS prevention function.

Click Enabled or Disabled to set the DoS Port security function state.

Click Apply to save the values and update the screen.

The ensuing table for DoS Port Status settings are informational only: Port and DoS

Protection.

4.7.5

Applications

The Applications function allows you to configure various types of AAA lists.

4.7.5.1

TELNET

The TELNET page allows you to combine all kinds of AAA lists with the Telnet line.

To access this page, click Security > Applications > TELNET .

Figure 4.69 Security > Applications > TELNET

The following table describes the items in the previous figure.

Item

Telnet Service

Apply

Disconnect

Description

Click Enabled or Disabled to set remote access through the Telnet

Service function.

Click Apply to save the values and update the screen.

Click Disconnect to disable the current Telnet service.

The ensuing table for Telnet Information settings are informational only: Telnet Service and Current Telnet Sessions Count.

EKI-7706 Series User Manual 82

4.7.5.2

SSH

Secure Shell (SSH) is a protocol providing secure (encrypted) management connection to a remote device.

To access this page, click Security > Applications > SSH .

Figure 4.70 Security > Applications > SSH

The following table describes the items in the previous figure.

Item

SSH Service

Apply

Description

Click Enabled or Disabled to set up Ethernet encapsulation (remote access) through the Secure Shell (SSH) function.

Click Apply to save the values and update the screen.

The ensuing table for SSH Information settings are informational only: SSH.

4.7.5.3

HTTP

The HTTP page allows you to combine all kinds of AAA lists to the HTTP line.

Attempts to access the switch’s Web UI from HTTP are first authenticated.

To access this page, click Security > Applications > HTTP .

Figure 4.71 Security > Applications > HTTP

The following table describes the items in the previous figure.

Item

HTTP Service

Session Timeout

Description

Click Enabled or Disabled to set up Ethernet encapsulation (remote access) through HTTP function.

Enter the variable in minutes (0 to 86400) to define the timeout period for the HTTP session.

Click Apply to save the values and update the screen.

Apply

The ensuing table for HTTP Information settings are informational only: HTTP Service and Session Timeout.

83 EKI-7706 Series User Manual

4.7.5.4

HTTPS

The HTTPS page allows you to combine all kinds of AAA lists on the HTTPS line.

Attempts to access the switch’s Web UI from HTTPS are first authenticated.

To access this page, click Security > Applications > HTTPS .

Figure 4.72 Security > Applications > HTTPS

The following table describes the items in the previous figure.

Item

HTTPS Service

Session Timeout

Description

Click Enabled or Disabled to set up Ethernet encapsulation over

HTTPS.

Enter the variable in minutes (0 to 86400) to define the timeout period for the HTTP session.

Click Apply to save the values and update the screen.

Apply

The ensuing table for HTTPS Information settings are informational only: HTTPS

Service and Session Timeout.

EKI-7706 Series User Manual 84

4.7.6

802.1x

The 802.1x function provides port-based authentication to prevent unauthorized devices (clients) from gaining access to the network.

4.7.6.1

802.1x Global Settings

The 802.1x Global Settings page allows you to set the state (enabled or disabled) for the selected IP server address, port, accounting port and associated password, including a reauthentication period.

To access this page, click Security > 802.1x

> 802.1x Global Settings .

Figure 4.73 Security > 802.1x > 802.1x Global Settings

The following table describes the items in the previous figure.

Item

State

Server IP

Server Port

Accounting Port

Security Key

Reauth Period

Description

Click Enabled or Disabled to set up 802.1x Setting function.

Enter the IP address of the local server providing authentication function.

Enter the port number (1 to 65535) assigned to the listed Server IP.

Enter the port number (1 to 65535) assigned to the listed server IP configured to provide authorization and authentication for network access.

Enter the variable to define the network security key used in authentication.

Enter the variable in seconds to define the period of time between authentication attempts.

Click Apply to save the values and update the screen.

Apply

The ensuing table for 802.1x Information settings are informational only: 802.1x

State, Server IP, Server Port, Accounting Port, Security Key and Reauth Period.

85 EKI-7706 Series User Manual

4.7.6.2

802.1x Port Configuration

The 802.1x Port Configuration page allows you to identify the authorization state for a port by using a MAC or Port authentication base.

To access this page, click Security > 802.1x

> 802.1x Port Configuration .

Figure 4.74 Security > 802.1x > 802.1x Port Configuration

The following table describes the items in the previous figure.

Item Description

Authentication based Click Port , Mac or Mac-Auth-Bypass to designate the type of configuration for the 802.1x Port setting.

Port Select Enter the port number associated with the configuration setting.

State

Apply

Click Authorize or Disabled to define the listed port’s state mode.

Click Apply to save the values and update the screen.

The ensuing table for 802.1x Port Authorization settings are informational only: Port and Port State.

4.7.7

IP Security

This section provides you a means to configure the IP Security settings.

4.7.7.1

Global Settings

The Global Settings page allows you to set the IP Security status (enabled or disabled).

To access this page, click Security > IP Security > Global Settings .

Figure 4.75 Security > IP Security > Global Settings

The following table describes the items in the previous figure.

Item

Status

Apply

Description

Click Enabled or Disabled to define the global setting for the IP security function.

Click Apply to save the values and update the screen.

The ensuing table for IP Security Status settings are informational only: IP Security.

EKI-7706 Series User Manual 86

4.7.7.2

Entry Settings

Once the Global Setting is enabled, use the Entry Settings to define an IP Security entry.

To access this page, click Security > IP Security > Entry Settings .

Figure 4.76 Security > IP Security > Entry Settings

The following table describes the items in the previous figure.

Item

IP Address

IP Mask

Services

Apply

Description

Enter the source IP address to apply the IP Security function.

Enter the IP address for use in masking the previous IP Address.

Enter the type of services to associate with the entry setting.

Click Apply to save the values and update the screen.

The ensuing table for IP Security Entry Information settings are informational only:

IP Address, IP Mask, Services and Action.

4.7.8

Security Login

4.7.8.1

Global Settings

This function provides a means to enable or disable the global security settings for the system.

To access this page, click Security > Security Login > Global Settings .

Figure 4.77 Security > Security Login > Global Settings > Global Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Click Enabled or Disabled to set up security login global setting status.

Click Apply to save the values and update the screen.

87 EKI-7706 Series User Manual

Figure 4.78 Security > Security Login > Global Settings > RADIUS Settings

The following table describes the items in the previous figure.

Item

Server IP

Server Port

Security Key

Apply

Description

Enter the IP address of the local server providing authentication function.

Enter the port number (1 to 65535) assigned to the listed Server IP.

Enter the variable to define the network security key used in authentication.

Click Apply to save the values and update the screen.

Figure 4.79 Security > Security Login > Global Settings > TACACS Settings

The following table describes the items in the previous figure.

Item

Server IP

Server Port

Security Key

Description

Enter the IP address of the local server providing authentication function.

Enter the port number (1 to 65535) assigned to the listed Server IP.

Enter the variable to define the network security key used in authentication.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Global Information settings are informational only: State,

RADIUS Server IP, RADIUS Server Port, RADIUS Security Key, TACACS Server IP,

TACACS Server Port and TACACS Security Key.

EKI-7706 Series User Manual 88

4.7.8.2

Access Control Settings

This function specifies the login authentication type for the system.

To access this page, click Security > Security Login > Security Login Access

Control Settings .

Figure 4.80 Security > Security Login > Access Control Settings > Security

Login Type Settings

The following table describes the items in the previous figure.

Item

Login Type

Apply

Description

Click to select the login type. Options include: None Used, RADIUS

Only, TACACS Only, RADIUS & TACACS or RADIUS & TACACS &

WEB.

Click Apply to save the values and update the screen.

Figure 4.81 Security > Security Login > Access Control Settings > Security

Login Type Settings

The following table describes the items in the previous figure.

Item

HTTP

TELNET

SSH

Apply

Description

Click Enabled or Disabled to set up HTTP.

Click Enabled or Disabled to set up HTTPS.

Click Enabled or Disabled to set up SSH.

Click Apply to save the values and update the screen.

The ensuing table for Access Control Information settings are informational only:

Login Type, HTTP, TELNET and SSH.

89 EKI-7706 Series User Manual

4.7.9

Access Control List

4.7.9.1

MAC ACL

Entry Settings

To access this page, click Security > Access Control List > MAC ACL > Entry Settings .

Figure 4.82 Security > Access Control List > MAC ACL > Entry Settings

The following table describes the items in the previous figure.

Item Description

Entry ID

Destination MAC

Address

Destination MAC

Mask

Source MAC

Address

Type in the value designating the entry ID.

Enter the MAC address to set destination MAC address.

Enter a value to specify the subnet mask for the destination MAC address.

Enter the MAC address to set source MAC address.

Source MAC Mask Enter a value to specify the subnet mask for the source MAC address.

Ether Type Enter a value to specify the DNS server for the interface.

VLAN ID

Portlist

Action

Type in the value designating the VLAN ID.

Select the port to configure for the MAC ACL function.

Assign Queue

Click the drop down menu to select the MAC ACL action. Options include: Permit, Drop or Assign Queue.

Click the drop down menu to select the queue. The function is only available when Action is Assign Queue .

Status

Add

Click the drop down menu to select the MAC ACL status. Options include: Active or Inactive.

Click Add to add a MAC ACL entry.

EKI-7706 Series User Manual 90

Entry List

To access this page, click Security > Access Control List > MAC ACL > Entry List .

The ensuing table for MAC ACL Information settings are informational only: Entry

ID, Summary, Portlist, Action, Status and Modify (Click Edit to edit the desire entry id or Delete to delete the desired entry id).

4.7.9.2

IP ACL

Entry Settings

To access this page, click Security > Access Control List > IP ACL > Entry Settings .

Figure 4.83 Security > Access Control List > IP ACL > Entry Settings

The following table describes the items in the previous figure.

Item Description

Entry ID

Destination IP

Address

Source IP Mask

IP Protocol

Type in the value designating the entry ID.

Enter the IP address to set destination IP address.

Destination IP Mask Enter a value to specify the subnet mask for the destination IP address.

Source IP Address Enter the IP address to set source IP address.

Enter a value to specify the subnet mask for the source IP address.

Click the drop down menu to select the IP protocol. Options include: none, ICMP, TCP or UDP.

L4 Destination Port Enter a value to specify the L4 destination port.

L4 Source Port Enter a value to specify the L4 source port.

Portlist

Action

Select the port to configure for the IP ACL function.

Click the drop down menu to select the IP ACL action. Options include: Permit, Drop or Assign Queue.

91 EKI-7706 Series User Manual

Item Description

Assign Queue

Status

Add

Click the drop down menu to select the queue. The function is only available when Action is Assign Queue .

Click the drop down menu to select the IP ACL status. Options include: Active or Inactive.

Click Add to add an IP ACL entry.

Entry List

To access this page, click Security > Access Control List > IP ACL > Entry List .

The ensuing table for IP ACL Information settings are informational only: Entry ID,

Summary, Portlist, Action, Status and Modify (Click Edit to edit the desire entry id or

Delete to delete the desired entry id).

4.7.10

IP Source Guard

4.7.10.1

Global Settings

To access this page, click Security > IP Source Guard > Global Settings .

Figure 4.84 Security > IP Source Guard > Global Settings

The following table describes the items in the previous figure.

Item

Portlist

Modify

Description

Select the port to verify.

Click Modify to save the values and update the screen.

The ensuing table for Global Information settings are informational only: Verify

Ports.

4.7.10.2

Entry Settings

To access this page, click Security > IP Source Guard > Entry Settings .

Figure 4.85 Security > IP Source Guard > Entry Settings

The following table describes the items in the previous figure.

Item Description

Source MAC

Address

Enter the MAC address to set source MAC address.

Source IP Address Enter the IP address to set source IP address.

EKI-7706 Series User Manual 92

Item

Port

Add

Description

Select the port to configure for the IP source guard.

Click Add to add an IP source guard.

The ensuing table for Entry Information settings are informational only: Source

MAC, Source IP, Port and Modify (Click Delete to delete the desired option).

4.7.11

DHCP Snooping

4.7.11.1

Global Settings

To access this page, click Security > DHCP Snooping > Global Settings .

Figure 4.86 Security > DHCP Snooping > Global Settings > DHCP Snooping

State Settings

The following table describes the items in the previous figure.

Item

DHCP Snooping

State

Apply

Description

Click Enabled or Disabled to set DHCP snooping state.

Click Apply to save the values and update the screen.

Figure 4.87 Security > DHCP Snooping > Global Settings > DHCP Snooping

Port Settings

The following table describes the items in the previous figure.

Item Description

DHCP Snooping Port

Select

Select the port to configure for the DHCP Snooping port.

Enabled Click Enabled or Disabled to enable DHCP Snooping port.

Apply Click Apply to save the values and update the screen.

93 EKI-7706 Series User Manual

Figure 4.88 Security > DHCP Snooping > Global Settings > DHCP Snooping

Binding Port Settings

The following table describes the items in the previous figure.

Item

DHCP Snooping

Binding Port Select

Enabled

Apply

Description

Select the port to configure for the DHCP snooping binding port.

Click Enabled or Disabled to enable DHCP Snooping binding.

Click Apply to save the values and update the screen.

The ensuing table for DHCP Snooping Information settings are informational only:

DHCP Snooping, DHCP Snooping Port and DHCP Snooping Binding Port.

4.7.11.2

Entry Settings

To access this page, click Security > DHCP Snooping > Entry Settings .

The ensuing table for IP Security Entry Information settings are informational only:

MAC Address, IP Address, Lease Time, VLAN Id and Port.

4.7.12

ARP Spoofing

To access this page, click Security > ARP Spoofing .

Figure 4.89 Security > ARP Spoofing

The following table describes the items in the previous figure.

Item Description

Source MAC

Address

Enter the MAC address to set source MAC address.

Source IP Address Enter the IP address to set source IP address.

Add Click Add to add an ARP spoofing.

The ensuing table for Entry Information settings are informational only: Source

MAC, Source IP and Modify.

EKI-7706 Series User Manual 94

4.8

QoS

The QoS function allows you to configure settings for the switch QoS interface and how the switch connects to a remote server to get services.

4.8.1

General

Traditionally, networks operate on a best-effort delivery basis, all traffic has equal priority and an equal chance of being delivered in a timely manner. When there is congestion, all traffic has an equal chance of being dropped.

The QoS feature can be configured for congestion-management and congestionavoidance to specifically manage the priority of the traffic delivery. Implementing QoS in the network makes performance predictable and bandwidth utilization much more effective.

The QoS implementation is based on the prioritization values in Layer 2 frames.

4.8.1.1

QoS Properties

The QoS Properties allows you to set the QoS mode.

To access this page, click QoS > General > QoS Properties .

Figure 4.90 QoS > General > QoS Properties

The following table describes the items in the previous figure.

Item

QoS Mode

Apply

Description

Select Disabled or Basic to setup the QoS function.

Click Apply to save the values and update the screen.

The ensuing table for QoS Global Information settings are informational only: QoS

Mode.

95 EKI-7706 Series User Manual

4.8.1.2

QoS Settings

Once the QoS function is enabled, you can configure the available settings.

To access this page, click QoS > General > QoS Settings .

Figure 4.91 QoS > General > QoS Settings

The following table describes the items in the previous figure.

Item

Port

CoS Value

Remark CoS

Remark DSCP

Remark IP Precedence

Apply

Description

Enter the port number to associate with the QoS setting.

Click the drop-down menu to designate the Class of Service (CoS) value (0 to 7) for the Port entry.

Click Disabled or Enabled to setup the Remark CoS function. When enabled the LAN (preassigned priority values) is marked at Layer 2 boundary to CoS values.

Click Disabled or Enabled to setup the DSCP remark option for the

QoS function.

Click Disabled or Enabled to setup the Remark IP Precedence for the QoS function.

Click Apply to save the values and update the screen.

The ensuing table for QoS Status settings are informational only: Port, CoS value,

Remark CoS, Remark DSCP and Remark IP Precedence.

EKI-7706 Series User Manual 96

4.8.1.3

Queue Scheduling

The switch support eight CoS queues for each egress port. For each of the eight queues, two types of scheduling can be configured: Strict Priority and Weighted

Round Robin (WRR).

Strict Priority scheduling is based on the priority of queues. Packets in a high-priority queue are always sent first and packets in a low-priority queue are only sent after all the high priority queues are empty.

Weighted RoundRobin (WRR) scheduling is based on the user priority specification to indicate the importance (weight) of the queue relative to the other CoS queues.

WRR scheduling prevents low-priority queues from being completely ignored during periods of high priority traffic. The WRR scheduler sends some packets from each queue in turn.

To access this page, click QoS > General > QoS Scheduling .

Figure 4.92 QoS > General > QoS Scheduling

The following table describes the items in the previous figure.

Item Description

Queue

Strict

WRR

Queue entry for egress port.

Select Strict to assign the scheduling designation to the selected queue.

Select WRR to assign the scheduling designation to the selected queue.

Weight Enter a queue priority (weight) relative to the defined entries (WRR only).

% of WRR Bandwidth Displays the allotted bandwidth for the queue entry in percentage values.

Apply Click Apply to save the values and update the screen.

The ensuing table for Queue Information settings are informational only: Strict Priority Queue Number.

97 EKI-7706 Series User Manual

4.8.1.4

CoS Mapping

The CoS Mapping allows you to apply CoS mapping.

To access this page, click QoS > General > CoS Mapping .

Figure 4.93 QoS > General > CoS Mapping

The following table describes the items in the previous figure.

Item Description

CoS to Queue Mapping

Class of Service

Queue

Displays the CoS for the queue entry.

Click the drop-down menu to select the queue priority for selected

CoS.

Queue to CoS Mapping

Queue Displays the queue entry for CoS mapping.

Class of Service

Apply

Click the drop-down menu to select the CoS type

Click Apply to save the values and update the screen.

The ensuing table for CoS Mapping Information settings are informational only:

CoS and Mapping to Queue.

The ensuing table for Queue Mapping Information settings are informational only:

Queue and Mapping to CoS.

EKI-7706 Series User Manual 98

4.8.1.5

DSCP Mapping

The DSCP to Queue mapping function maps queue values in incoming packets to a

DSCP value that QoS uses internally to represent the priority of the traffic. The following table shows the DSCP to Queue map.

If these values are not appropriate for your network, you need to modify them.

To access this page, click QoS > General > DSCP Mapping .

Figure 4.94 QoS > General > DSCP Mapping

The following table describes the items in the previous figure.

Item Description

DSCP to Queue Mapping

DSCP Enter the DSCP entry to define the precedence values.

Queue Click the drop-down menu to select the queue designation for the

DSCP value.

Queue to DSCP Mapping

Queue

DSCP

Apply

Displays the queue value for the DSCP map.

Enter the DSCP entry to define the precedence values.

Click Apply to save the values and update the screen.

The ensuing table for DSCP Mapping Information settings are informational only:

DSCP and Mapping to Queue.

The ensuing table for Queue Mapping Information settings are informational only:

Queue and Mapping to DSCP.

99 EKI-7706 Series User Manual

4.8.1.6

IP Precedence Mapping

The IP Precedence Mapping allows you to set IP Precedence mapping.

To access this page, click QoS > General > IP Precedence Mapping .

Figure 4.95 QoS > General > IP Precedence Mapping

The following table describes the items in the previous figure.

Item Description

IP Precedence to Queue Mapping

IP Precedence Displays the IP precedence value for the queue map.

Queue Click the drop-down menu to map a queue value to the selected IP precedence.

Queue to IP Precedence Mapping

Queue

IP Precedence

Displays the queue entry for mapping IP precedence values.

Click the drop-down menu to map an IP precedence value to the selected queue.

Apply Click Apply to save the values and update the screen.

The ensuing table for IP Precedence Mapping Information settings are informational only: IP Precedence and Mapping to Queue.

The ensuing table for Queue Mapping Information settings are informational only:

Queue and Mapping to IP Precedence.

EKI-7706 Series User Manual 100

4.8.2

QoS Basic Mode

Quality of Service (QoS) allows to give preferential treatment to certain types of traffic at the expense of others. Without QoS, the switch offers best-effort service to each packet, regardless of the packet contents or size sending the packets without any assurance of reliability, delay bounds, or throughput.

QoS mode supports two modes: 802.1p and DSCP.

4.8.2.1

Global Settings

The Global Settings page allows you to configure the trust mode to a port selection.

To access this page, click QoS > QoS Basic Mode > Global Settings .

The function is only available when QoS Properties is set to Basic .

Figure 4.96 QoS > QoS Basic Mode > Global Settings

The following table describes the items in the previous figure.

Item

Trust Mode

Apply

Description

Click the drop-down menu to select the trust state of the QoS basic mode.

Click Apply to save the values and update the screen.

The ensuing table for QoS Information settings are informational only: Trust Mode.

4.8.2.2

Port Settings

The Port Settings page allows you to define a trust state (enabled or disabled) to a listed port.

To access this page, click QoS > QoS Basic Mode > Port Settings .

Figure 4.97 QoS > QoS Basic Mode > Port Settings

The following table describes the items in the previous figure.

Item

Port

Trust State

Apply

Description

Enter the port number for the QoS basic mode setting.

Select Enabled or Disabled to set the port’s trust state status.

Click Apply to save the values and update the screen.

The ensuing table for QoS Port Status settings are informational only: Port and Trust

State.

101 EKI-7706 Series User Manual

4.8.3

Rate Limit

Rate Limits features control on a per port basis. Bandwidth control is supported for the following: Ingress Bandwidth Control, Egress Bandwidth Control and Egress

Queue.

4.8.3.1

Ingress Bandwidth Control

The Ingress Bandwidth Control page allows you to configure the bandwidth control for a listed port.

To access this page, click QoS > Rate Limit > Ingress Bandwidth Control .

Figure 4.98 QoS > Rate Limit > Ingress Bandwidth Control

The following table describes the items in the previous figure.

Item

Port

State

Rate (Kbps)

Description

Enter the port number for the rate limit setup.

Select Disabled or Enabled to set the port’s state status.

Enter the value in Kbps (16 to 1000000) to set as the bandwidth rate for the selected port.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Ingress Bandwidth Control Status settings are informational only: Port and Ingress Rate Limit (Kbps).

4.8.3.2

Egress Bandwidth Control

The Egress Bandwidth Control page allows you to set the egress bandwidth control for a listed port.

To access this page, click QoS > Rate Limit > Egress Bandwidth Control .

Figure 4.99 QoS > Rate Limit > Egress Bandwidth Control

The following table describes the items in the previous figure.

Item

Port

Description

Enter the port number to set the Egress Bandwidth Control.

EKI-7706 Series User Manual 102

Item Description

State

Rate (Kbps)

Select Disabled or Enabled to set the Egress Bandwidth Control state.

Enter the value in Kbps (16 to 1000000) to set the Egress Bandwidth rate.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Egress Bandwidth Control Status settings are informational only: Port and Egress Rate Limit (Kbps).

4.8.3.3

Egress Queue

The Egress Queue page allows you to set the egress bandwidth parameters.

To access this page, click QoS > Rate Limit > Egress Queue .

Figure 4.100 QoS > Rate Limit > Egress Queue

The following table describes the items in the previous figure.

Item

Port

Queue

State

CIR (Kbps)

Description

Click the drop-down menu to select the port to define the Egress queue.

Click the drop-down menu to set the queue order for the Egress setting.

Click Disabled or Enabled to set the Egress queue state.

Enter the value in Kbps (16 to 1000000) to set the CIR rate for the

Egress queue.

Click Apply to save the values and update the screen.

Apply

The ensuing table for FE1 Egress Per Queue Status settings are informational only:

Queue Id and Egress Rate Limit (Kbps).

103 EKI-7706 Series User Manual

4.8.4

Bandwidth Guarantee

4.8.4.1

Global Settings

To access this page, click QoS > Bandwidth Guarantee > Global Settings .

Figure 4.101 QoS > Bandwidth Guarantee > Global Settings

The following table describes the items in the previous figure.

Item

Status

Guarantee Bandwidth

Type

Description

Click Disabled or Enabled to set the guarantee bandwidth.

Enter the value for the guarantee bandwidth.

UDP Source Port

Force Mode

Apply

Click UDP Source Port or RTP H.264

to set the guarantee bandwidth type.

Enter the port number for the UDP source.

Click the check box to enable the force mode.

Click Apply to save the values and update the screen.

The ensuing table for Ingress Bandwidth Control Status settings are informational only: Status, Guarantee Bandwidth, Guarantee Type, UDP Source Port and Force

Mode.

EKI-7706 Series User Manual 104

4.8.4.2

Utilzation

To access this page, click QoS > Bandwidth Guarantee > Utilzation .

Figure 4.102 QoS > Bandwidth Guarantee > Utilzation

The following table describes the items in the previous figure.

Item

Refresh period

Apply

Description

Click the drop-down menu to select refresh time.

Click Apply to save the values and update the screen.

105 EKI-7706 Series User Manual

4.9

Management

4.9.1

LLDP

LLDP is a one-way protocol without request/response sequences. Information is advertised by stations implementing the transmit function, and is received and processed by stations implementing the receive function.

4.9.1.1

LLDP System Settings

The LLDP System Settings allows you to configure the status (enabled or disabled) for the protocol, set the interval for frame transmission, set the hold time multiplier and the re-initialization delay.

To access this page, click Management > LLDP > LLDP System Settings .

Figure 4.103 Management > LLDP > LLDP System Settings

The following table describes the items in the previous figure.

Item Description

Enabled Click Enabled or Disabled to set the Global Settings state.

LLDP PDU Disable

Action

Click to select the LLDP PDU handling action when LLDP is globally disabled. Options include: Filtered, Bridged, or Flooded.

Transmission Interval Select the interval at which frames are transmitted. The default is 30 seconds, and the valid range is 5 to 32768 seconds.

Holdtime Multiplier Select the multiplier on the transmit interval to assign to TTL.

Reinitialization Delay Select the delay length before re-initialization.

Transmit Delay

Apply

Select the delay after an LLDP frame is sent.

Click Apply to save the values and update the screen.

The ensuing table for LLDP Global Config settings are informational only: LLDP

Enabled, LLDP PDU Disable Action, Transmission Interval, Holdtime Multiplier,

Reinitialization Delay and Transmit Delay.

EKI-7706 Series User Manual 106

4.9.1.2

LLDP Port Settings

The LLDP Port Settings page allows you to configure the state (enabled or disabled) of the selected port.

To access this page, click Management > LLDP > LLDP Port Settings .

Figure 4.104 Management > LLDP > LLDP Port Settings > LLDP Port

Configuration

The following table describes the items in the previous figure.

Item

Port Select

State

Apply

Description

Enter the port number associated with the LLDP setting.

Click the drop-down menu to select the LLDP port state.

Click Apply to save the values and update the screen.

Figure 4.105 Management > LLDP > LLDP Port Settings > Optional TLVs

Selection

The following table describes the items in the previous figure.

Item Description

Port Select Enter the port number associated with the TLV (optional) selection.

Optional TLV Select Click the drop-down menu to select the LLDP optional TLVs to be carried (multiple selections are allowed).

System Name: To include system name TLV in LLDP frames.

Port Description: To include port description TLV in LLDP frames.

System Description: To include system description TLV in LLDP frames.

System Capability: To include system capability TLV in LLDP frames.

802.3 MAC-PHY:

802.3 Link Aggregation:

802.3 Maximum Frame Size:

Management Address:

802.1 PVID:

Apply Click Apply to save the values and update the screen.

107 EKI-7706 Series User Manual

The ensuing table for LLDP Port Status settings are informational only: Port, State and Selected Optional TLVs.

Figure 4.106 Management > LLDP > LLDP Port Settings > VLAN Name TLV

VLAN Selection

The following table describes the items in the previous figure.

Item

Port Select

VLAN Select

Description

Enter the port number to associated with the TLV selection.

Select the VLAN Name ID to be carried out (multiple selection is allowed).

Click Apply to save the values and update the screen.

Apply

The ensuing table for LLDP Port VLAN TLV Status settings are informational only:

Port and Selected VLAN.

4.9.1.3

LLDP Local Device Info

The LLDP Local Device Info page allows you to view information regarding network devices, providing that the switch has already obtained LLDP information on the devices.

To access this page, click Management > LLDP > LLDP Local Device Info .

The ensuing table for Local Device Summary settings are informational only: Chassis ID Subtype, Chassis ID, System Name, System Description, Capabilities Supported, Capabilities Enabled and Port ID Subtype.

The ensuing table for Port Status settings are informational only: Port, Selected

VLAN and Detail (click the radio box and click Detail to displays the details).

4.9.1.4

LLDP Remote Device Info

The LLDP Remote Device Info page allows you to view information about remote devices, LLDP information must be available on the switch.

To access this page, click Management > LLDP > LLDP Remote Device Info .

Figure 4.107 Management > LLDP > LLDP Remote Device Info

The following table describes the items in the previous figure.

Item

Detail

Delete

Refresh

Description

Click to display the device details.

Click to delete the selected devices.

Click to refresh the remote device information list.

EKI-7706 Series User Manual 108

4.9.1.5

LLDP Overloading

To access this page, click Management > LLDP > LLDP Overloading .

The ensuing table for LLDP Overloading settings are informational only: Port, Total

(Bytes), Left to Send (Bytes), Status and Status (Mandatory TLVs, 802.3 TLVs,

Optional TLVs and 802.1 TLVs).

4.9.2

SNMP

Simple Network Management Protocol (SNMP) is a protocol to facilitate the monitoring and exchange of management information between network devices. Through

SNMP, the health of the network or status of a particular device can be determined.

4.9.2.1

SNMP Settings

The SNMP Settings page allows you to set the SNMP daemon state (enabled or disabled).

To access this page, click Management > SNMP > SNMP Settings .

Figure 4.108 Management > SNMP > SNMP Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Click Enabled or Disabled to define the SNMP daemon.

Click Apply to save the values and update the screen.

The ensuing table for SNMP Information settings are informational only: SNMP.

4.9.2.2

SNMP Community

The SNMP Community page provides configuration options for the community.

SNMP v1 and SNMP v2c use the group name (Community Name) certification. It’s role is similar to the password function. If SNMP v1 and SNMP v2c are used, you can go directly from the configuration settings to this page to configure the SNMP community.

To access this page, click Management > SNMP > SNMP Community .

Figure 4.109 Management > SNMP > SNMP Community

The following table describes the items in the previous figure.

Item

Community Name

Description

Enter a community name (up to 20 characters).

109 EKI-7706 Series User Manual

Item

Access Right

Apply

Description

Click the radio box to specify the access level (read only or read write)

Click Apply to save the values and update the screen.

The ensuing table for Community Status settings are informational only: No., Community Name, Access Right and Delete (click to delete the desired community name).

4.9.2.3

SNMPv3 EngineID

To access this page, click Management > SNMP > SNMPv3 EngineID .

Figure 4.110 Management > SNMP > SNMPv3 EngineID

The following table describes the items in the previous figure.

Item

SNMP EngineID

Description

Enter the hexadecimal string to define the engine ID for SNMPv3 agent.

4.9.2.4

SNMPv3 Settings

The SNMPv3 Settings page allows you to create SNMP groups. The users have the same level of security and access control permissions as defined by the group settings.

To access this page, click Management > SNMP > SNMPv3 Settings .

Figure 4.111 Management > SNMP > SNMPv3 Settings

The following table describes the items in the previous figure.

Item

User Name

Access Right

Encrypted

Description

Enter a user name (up to 32 characters) to create an SNMP profile.

Click read-only or read-write to define the access right for the profile.

Click the option to set the encrypted option for the user setting.

EKI-7706 Series User Manual 110

Item Description

Auth-Protocol

Password

Priv-Protocol

Password

Click the drop-down menu to select the authentication level: MD5 or

SHA. The field requires a user password.

MD5: specify HMAC-MD5-96 authentication level

SHA: specify HMAC-SHA authentication protocol

Enter the characters to define the password associated with the authentication protocol.

Click the drop-down menu to select an authorization protocol: none or

DES.The field requires a user password.

None: no authorization protocol in use

DES: specify 56-bit encryption in use

Enter the characters to define the password associated with the authorization protocol.

Click Add to save the values and update the screen.

Add

The ensuing table for User Status settings are informational only: User Name,

Access Right, Auth-Protocol, Priv-Protocol and Delete (click to delete the desired user name).

4.9.2.5

SNMP Trap

The SNMP Trap page allows you to set the IP address of the node and the SNMP credentials corresponding to the version that is included in the trap message.

To access this page, click Management > SNMP > SNMP Trap .

Figure 4.112 Management > SNMP > SNMP Trap

The following table describes the items in the previous figure.

Item

IP Address

Community Name/

User Name

Version

Description

Enter the IP address to designate the SNMP trap host.

Click the drop-down menu to select a defined community name.

Click the drop-down menu to designate the SNMP version credentials

(v1, v2c - trap, v2c - inform, v2c - trap or v2c - inform).

Click Add to save the values and update the screen.

Add

The ensuing table for Trap Host Status settings are informational only: No., IP

Address, Community Name, Version and Delete (click to delete the desired IP address).

111 EKI-7706 Series User Manual

4.9.3

Power Over Ethernet

Power Over Ethernet is the function supplying power to Powered Devices (PD) through the switch in the event that AC power is not readily available.

Power over Ethernet can be used for the following areas:

 Surveillance devices

 I/O sensors for security requirements

 Wireless access points

Series

EKI

Supported Models

7712G-4FP, 7712G-4FPI

4.9.3.1

PoE System Settings

The PoE System Settings page allows you to configure the overload disconnect and the maximum available wattage.

To access this page, click Management > Power Over Ethernet > PoE System

Settings .

Figure 4.113 Management > Power Over Ethernet > PoE System Settings

The following table describes the items in the previous figure.

Item

Maximum Power

Available

OverLoad Disconnect Mode

Description

Select the value in Watts to set the maximum available power.

Click the drop-down menu to designate the overload mode:

Overload Port First:

Port-Based Priority:

Click Apply to save the values and update the screen.

Apply

The ensuing table for PoE System Information settings are informational only: Firmware Version, Maximum Power Available, Actual Power Consumption and Overload

Disconnect Type.

EKI-7706 Series User Manual 112

4.9.3.2

PoE Port Settings

The PoE Port Settings page allows you to configure the port status, its power limitations, legacy mode status, and power limit settings.

To access this page, click Management > Power Over Ethernet > PoE Port Settings .

Figure 4.114 Management > Power Over Ethernet > PoE Port Settings

The following table describes the items in the previous figure.

Item

Port

Enabled

Power Limit From

Classification

Legacy Mode

Priority

Power Limit

Description

Click the drop-down menu to select a PoE port.

Select Enabled or Disabled to designate the PoE port function by ports.

Select Enabled or Disabled to designate the power limit classification.

Select Enabled or Disable d to designate the legacy mode option for the port.

Click the drop-down menu to configure the power supply priority: Critical , Low , Medium or High . Default is Low .

Enter a number to set the port power current limitation to be given to the Powered Device (PD)

Click Apply to save the values and update the screen.

Apply

The ensuing table for PoE Information settings are informational only: Port, Enable

State, Power Limit From Classification, Priority, Legacy and Power Limit (W).

4.9.3.3

PoE Port Status

To access this page, click Management > Power Over Ethernet > PoE Port Status .

The ensuing table for PoE Port Status settings are informational only: Port, Current

(mA), Voltage (V), Power (W) and Temp. (°C).

113 EKI-7706 Series User Manual

4.9.4

TCP Modbus Settings

The TCP Modbus function allows for client-server communication between a switch module (server) and a device in the networking running MODBUS client software (client).

4.9.4.1

TCP Modbus Settings

The TCP Modbus Settings page allows you to configure the modbus function.

To access this page, click Management > TCP Modbus Settings > TCP Modbus

Settings .

Figure 4.115 Management > TCP Modbus Settings > TCP Modbus Settings

The following table describes the items in the previous figure.

Item

State

Time out

Description

Click Disabled or Enabled to set the TCP Modbus state.

Enter the value (1 to 86400) to define the timeout period between transport time.

Click Apply to save the values and update the screen.

Apply

The ensuing table for TCP Modbus Status settings are informational only: TCP Modbus status and TCP Modbus time out.

EKI-7706 Series User Manual 114

4.9.5

DHCP Server

The Dynamic Host Configuration Protocol (DHCP) is a network protocol enabling a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network.

4.9.5.1

Status Settings

The Status Settings page allows you to configure the DHCP server mode (enabled or disabled).

To access this page, click Management > DHCP Server > Status Settings .

Figure 4.116 Management > DHCP Server > Status Settings

The following table describes the items in the previous figure.

Item

DHCP Server

Apply

Restart

Description

Select Enable or Disable to designate the DHCP server function type.

When a new DHCP server mode is selected, the switch requires a system restart for the new mode to take effect.

Click Apply to save the values and update the screen.

Click Restart to have the switch perform a system restart function. In the event that the IP settings are changed, the DHCP server must be restarted for the IP settings to take effect.

The ensuing table for Status Information settings are informational only: DHCP

Server Service.

115 EKI-7706 Series User Manual

4.9.5.2

Global Settings

The Global Settings page allows you to configure the global settings for the DHCP function.

To access this page, click Management > DHCP Server > Global Settings .

Figure 4.117 Management > DHCP Server > Global Settings

The following table describes the items in the previous figure.

Item

Lease Time

Low IP Address

High IP Address

Subnet Mask

Gateway

DNS

Apply

Description

Type in the value designating the lease time (60 - 864000) in seconds for each setting lease.

Type in the value designating the lowest range in the IP address pool.

Type in the value designating the highest range in the IP address pool.

Type in the value designating the subnet mask for the IP address pool.

Type in the value designating the gateway for the IP address pool.

Type in the value designating the DNS for the IP address pool.

Click Apply to save the values and update the screen.

The ensuing table for Global Information settings are informational only: Lease

Time, Low IP Address, High IP Address, Subnet Mask, Gateway, DNS and Clear

(click to clear IP pool).

EKI-7706 Series User Manual 116

4.9.5.3

Port Settings

The Port Settings page allows you to configure selected ports for the DHCP function.

To access this page, click Management > DHCP Server > Port Settings .

Figure 4.118 Management > DHCP Server > Port Settings

The following table describes the items in the previous figure.

Item

Port Select

Low IP Address

High IP Address

Subnet Mask

Gateway

DNS

Apply

Description

Click the drop-down menu to select a pre-defined port to configure.

The suboptions are designated for the selected port.

Type in the value designating the lowest range in the IP address pool.

Type in the value designating the highest range in the IP address pool.

Type in the value designating the subnet mask for the IP address pool.

Type in the value designating the gateway for the IP address pool.

Type in the value designating the DNS for the IP address pool.

Click Apply to save the values and update the screen.

The ensuing table for Port Information settings are informational only: Port, Low IP

Address, High IP Address, Subnet Mask, Gateway, DNS, Edit (click to modify the settings) and Clear (click to clear the settings).

117 EKI-7706 Series User Manual

4.9.5.4

VLAN Settings

The VLAN Settings page allows you to configure selected ports for the VLAN function.

To access this page, click Management > DHCP Server > VLAN Settings .

Figure 4.119 Management > DHCP Server > VLAN Settings

The following table describes the items in the previous figure.

Item

Entry

VLAN ID

Low IP Address

High IP Address

Subnet Mask

Gateway

DNS

Apply

Description

Click the drop-down menu to select a pre-defined port to configure.

Type in the value to use as an identifier for the VLAN (1 to 4094).

Type in the value designating the lowest range in the IP address pool.

Type in the value designating the highest range in the IP address pool.

Type in the value designating the subnet mask for the IP address pool.

Type in the value designating the gateway for the IP address pool.

Type in the value designating the DNS for the IP address pool.

Click Apply to save the values and update the screen.

The ensuing table for Entry Information settings are informational only: Entry ID,

VLAN ID, Low IP Address, High IP Address, Subnet Mask, Gateway, DNS, Edit (click to modify the settings) and Clear (click to clear the settings).

EKI-7706 Series User Manual 118

4.9.5.5

Option 82 Settings

The Option 82 Settings, also known as the DHCP relay agent information option, provide information about the network location of a DHCP client. In turn, the DHCP server uses the information to implement IP addresses or other parameters for the client.

To access this page, click Management > DHCP Server > Option 82 Settings .

Figure 4.120 Management > DHCP Server > Option 82 Settings

The following table describes the items in the previous figure.

Item Description

Entry

Circuit ID Format

Circuit ID Content

Remote ID Format Click the drop-down menu to select the format of the remote ID: string or hex.

Remote ID Content Enter the remote ID string of the host.

Low IP Address

High IP Address

Type in the value designating the lowest range in the IP address pool.

Type in the value designating the highest range in the IP address pool.

Subnet Mask

Click the drop-down menu to select an entry for the Option 82 setting.

Click the drop-down menu to select the format of the circuit ID: string or hex.

Enter the circuit ID string on the switch on which the request was received.

Gateway

DNS

Apply

Type in the value designating the subnet mask for the IP address pool.

Type in the value designating the gateway for the IP address pool.

Type in the value designating the DNS for the IP address pool.

Click Apply to save the values and update the screen.

The ensuing table for Entry Information settings are informational only: Entry (click the drop-down menu to select an entry), Entry ID, Circuit ID Format, Circuit ID Content, Remote ID Format, Remote ID Content, Low IP Address, High IP Address, Subnet Mask, Gateway, DNS, Edit (click to modify the settings) and Clear (click to clear the settings).

119 EKI-7706 Series User Manual

4.9.5.6

Client MAC Settings

To access this page, click Management > DHCP Server > Client MAC Settings .

Figure 4.121 Management > DHCP Server > Client MAC Settings

The following table describes the items in the previous figure.

Item Description

Entry ID Type in the value designating the entry ID.

Client MAC Address Enter the MAC address for DHCP server.

IP Address Enter a value to specify the IP address of the interface.

Subnet Mask

Gateway

DNS

Apply

Enter a value to specify the IP subnet mask for the interface.

Enter a value to specify the gateway for the interface.

Enter a value to specify the DNS server for the interface.

Click Apply to save the values and update the screen.

The ensuing table for Client MAC Information settings are informational only: Entry

ID, Client MAC Address, IP Address, Subnet Mask and Modify (Click Detail to display the detail information of desired entry id or Delete to delete the desired entry id).

4.9.5.7

Lease Entry

To access this page, click Management > DHCP Server > Lease Entry .

The ensuing table for Lease entry Table settings are informational only: IP Address,

Client Mac, Start Time, End Time and Type.

EKI-7706 Series User Manual 120

4.9.6

SMTP Client

Simple Mail Transfer Protocol (SMTP) is a protocol to send e-mail messages between servers. SMTP is used to send messages from a mail client to a mail server.

SMTP by default uses TCP port 25.

4.9.6.1

Global Settings

The Global Settings page allows you to set the active profile for the SMTP client.

To access this page, click Management > SMTP Client > Global Settings.

Figure 4.122 Management > SMTP Client > Global Settings

The following table describes the items in the previous figure.

Item

Active Profile

Apply

Description

Click the drop-down menu to select the profile status (None, 1 or 2).

Click Apply to save the values and update the screen.

The ensuing table for SMTP Information settings are informational only: Active Profile Id.

4.9.6.2

Profile Settings

The Profile Settings page allows you to select the server IP, the server port, and sender mail for the listed profile.

To access this page, click Management > SMTP Client > Profile Settings .

Figure 4.123 Management > SMTP Client > Profile Settings > Profile Settings

The following table describes the items in the previous figure.

Item

Profile ID

Server IP

Server Port

Sender Mail

Apply

Description

Click the drop-down menu to select the identification type for the profile (1 or 2).

Enter the IP address to designate the server host.

Enter the port number to designate the port associated with the server

IP address.

Enter the email address of the sender client.

Click Apply to save the values and update the screen.

121 EKI-7706 Series User Manual

Figure 4.124 Management > SMTP Client > Profile Settings > Profile Target Mail

Settings

The following table describes the items in the previous figure.

Item

Profile ID

Target Mail

Apply

Description

Click the drop-down menu to select the identification type for the profile (1 or 2).

Enter the email address of the target client.

Click Apply to save the values and update the screen.

The ensuing table for Profile Information settings are informational only: Profile ID

(click the drop-down menu to select a profile ID), Server IP, Server Port and Sender

Mail Address.

4.9.6.3

Sending Message

The Sending Message page allows you to setup the log message for use with the

SMTP client.

To access this page, click Management > SMTP Client > Sending Message .

Figure 4.125 Management > SMTP Client > Sending Message

The following table describes the items in the previous figure.

Item

Title

Description

Assign the title of the email. The maximum length is 20 characters

(alphanumeric, symbols (. (dot), _ (underline), - (dash line) and space).

EKI-7706 Series User Manual 122

Item

Content

Apply

Description

Assign the content of the email. The maximum length is 64 characters

(alphanumeric, symbols (. (dot), _ (underline), - (dash line) and space).

Click Apply to save the values and update the screen.

4.9.7

RMON

Remote monitoring (RMON) uses a client-server model to monitor/manage remote devices on a network.

4.9.7.1

RMON Statistics

The RMON Statistics page allows you to view information regarding packet sizes and information for physical layer errors. The information displayed is according to the

RMON standard.

To access this page, click Management > RMON > RMON Statistics .

Figure 4.126 Management > RMON > Rmon Statistics

The following table describes the items in the previous figure.

Item

Index

Port

Owner

Apply

Description

Enter an entry selection (1 to 65535) to display its statistical information.

Enter the respective port number for the selected entry.

Enter the name of the owner of the RMON group.

Click Apply to save the values and update the screen.

The ensuing table for Statistics Information settings are informational only: Index,

Port, Drop Events, Octets, Packets, Broadcast, Multicast, Owner and Delete (click to delete the desired index).

123 EKI-7706 Series User Manual

4.9.7.2

RMON History

The RMON History page allows you to configure the display of history entries.

To access this page, click Management > RMON > RMON History .

Figure 4.127 Management > RMON > RMON History

The following table describes the items in the previous figure.

Item Description

Index

Port Select the specific port switch.

Buckets Requested Enter the specific (1-50) number of samples to store.

Interval

Enter the index entry (1 to 65535) to select the number of new history table entries.

Owner

Apply

Enter value in seconds (1 to 3600) to designate a specific interval time for the collection of samples.

Enter the name of the owner of the RMON history group.

Click Apply to save the values and update the screen.

The ensuing table for History Information settings are informational only: Index,

Port, Buckets Requested, Interval, Owner and Delete (click to delete the desired index).

EKI-7706 Series User Manual 124

4.9.7.3

RMON Alarm

The RMON Alarm page allows you to configure RMON statistics group and alarm groups.

To access this page, click Management > RMON > RMON Alarm .

Figure 4.128 Management > RMON > Rmon Alarm

The following table describes the items in the previous figure.

Item Description

Index Enter the index entry (1 to 65535) to define a specific Alarm Collection history entry.

Interval Enter a value (1 to 2147483647) to define the interval value for the

Alarm Collection history.

Enter the alarm variables to define the monitoring triggers.

Variable

Sample Type

Rising Threshold

Enter the variable sample type.

Enter the rising alarm threshold trigger.

Falling Threshold Enter the falling alarm threshold trigger.

Rising Event Index Enter the rising event index (1-65535) to define the alarm group.

Falling Event Index Enter the falling event index (1-65535) to define the alarm group.

Owner Enter the name of the owner of the RMON alarm group.

Apply Click Apply to save the values and update the screen.

The ensuing table for Alarm Information settings are informational only: Index,

Interval, Variable, Sample Type, Rising Threshold, Falling Threshold, Rising Event

Index, Falling Event Index, Owner and Delete (click to delete the desired index).

125 EKI-7706 Series User Manual

4.9.7.4

RMON Event

The RMON Event page is used to configure RMON event groups.

To access this page, click Management > RMON > RMON Event .

Figure 4.129 Management > RMON > RMON Event

The following table describes the items in the previous figure.

Item

Index

Description

Type

Community

Owner

Apply

Description

Enter the index entry (1 to 65535) to define a specific RMON event.

Enter a value (1 to 2147483647) to define the interval value for the

Alarm Collection history.

Click the drop-down menu to define the event type: None, Log, SNMP

Trap, Log and Trap.

Enter the community string to be passed for the specified event.

Enter the name of the owner of the RMON event.

Click Apply to save the values and update the screen.

The ensuing table for Event Information settings are informational only: Index,

Description, Type, Community, Owner and Delete (click to delete the desired index).

EKI-7706 Series User Manual 126

4.9.8

NTP Server

To access this page, click Management > NTP Server .

Figure 4.130 Management > NTP Server

The following table describes the items in the previous figure.

Item

NTP Server

Manual Time

Server Address 1 ~

Server Address 10

Description

Click the radio button to enable or disable the NTP server function.

Click the radio button to enable or disable the manual time function.

Enter the address of the NTP server. This is a text string of up to 64 characters containing the encoded unicast IP address or hostname of a NTP server.

Click Apply to save the values and update the screen.

Apply

The ensuing table for NTP Server Status settings are informational only: INTP

Server Status, Manual Time, Server AddressInformation Value, Server 1, Server 2,

Server 3, Server 4, Server 5, Server 6, Server 7, Server 8, Server 9 and Server 10.

127 EKI-7706 Series User Manual

4.10

Diagnostics

Through the Diagnostics function configuration of settings for the switch diagnostics is available.

4.10.1

Cable Diagnostics

The Cable Diagnostics page allows you to select the port for applying a copper test.

To access this page, click Diagnostics > Cable Diagnostics .

Figure 4.131 Diagnostics > Cable Diagnostics

The following table describes the items in the previous figure.

Item

Port

Description

Click the drop-down menu to select a pre-defined port for diagnostic testing. Giga ports are displayed with a channel A to D designation.

Click Copper Test to display the test result for the selected port.

Copper Test

The ensuing table for Test Result settings are informational only: Port, Channel A,

Cable Length A, Channel B, Cable Length B, Channel C, Cable Length C, Channel D and Cable Length D.

EKI-7706 Series User Manual 128

4.10.2

Ping Test

The Ping Test page allows you to configure the test log page.

To access this page, click Diagnostics > Ping Test .

Figure 4.132 Diagnostics > Ping Test

The following table describes the items in the previous figure.

Item

IP Address

Count

Interval (in sec)

Size (in bytes)

Description

Enter the IP address or host name of the station to ping. The initial value is blank. The IP Address or host name you enter is not retained across a power cycle. Host names are composed of series of labels concatenated with periods. Each label must be between 1 and 63 characters long, maximum of 64 characters.

Enter the number of echo requests to send. The default value is 4.

The value ranges from 1 to 5. The count entered is not retained across a power cycle.

Enter the interval between ping packets in seconds. The default value is 1. The value ranges from 1 to 5. The interval entered is not retained across a power cycle.

Enter the size of ping packet. The default value is 56. The value ranges from 8 to 5120. The size entered is not retained across a power cycle.

129 EKI-7706 Series User Manual

Item

Ping Results

Description

Display the reply format of ping.

PING 172.17.8.254 (172.17.8.254): 56 data bytes

--- 172.17.8.254 ping statistics ---

4 packets transmitted, 0 packets received, 100% packet loss

Or

PING 172.17.8.93 (172.17.8.93): 56 data bytes

64 bytes from 172.17.8.93: icmp_seq=0 ttl=128 time=0.0 ms

64 bytes from 172.17.8.93: icmp_seq=1 ttl=128 time=0.0 ms

64 bytes from 172.17.8.93: icmp_seq=2 ttl=128 time=0.0 ms

64 bytes from 172.17.8.93: icmp_seq=3 ttl=128 time=0.0 ms

--- 172.17.8.93 ping statistics ---

4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 0.0/0.0/0.0 ms

Click Apply to display ping result for the IP address.

Apply

4.10.3

IPv6 Ping Test

The IPv6 Ping Test page allows you to configure the Ping Test for IPv6.

To access this page, click Diagnostics > IPv6 Ping Test .

Figure 4.133 Diagnostics > IPv6 Ping Test

EKI-7706 Series User Manual 130

The following table describes the items in the previous figure.

Item

IPv6 Address

Count

Interval (in sec)

Size (in bytes)

Ping Results

Apply

Description

Enter the IP address or host name of the station you want the switch to ping. The initial value is blank. The IP Address or host name you enter is not retained across a power cycle. Host names are composed of series of labels concatenated with dots. Each label must be between 1 and 63 characters long, and the entire hostname has a maximum of 64 characters.

Enter the number of echo requests you want to send. The default value is 4. The value ranges from 1 to 5. The count you enter is not retained across a power cycle.

Enter the interval between ping packets in seconds. The default value is 1. The value ranges from 1 to 5. The interval you enter is not retained across a power cycle.

Enter the size of ping packet. The default value is 56. The value ranges from 8 to 5120. The size you enter is not retained across a power cycle.

Display the reply format of ping.

PING 2222::777 (2222::777): 56 data bytes

--- 2222::777 ping statistics ---

4 packets transmitted, 0 packets received, 100% packet loss

Or

PING 2222::717 (2222::717): 56 data bytes

64 bytes from 2222::717: icmp6_seq=0 ttl=128 time=10.0 ms

64 bytes from 2222::717: icmp6_seq=1 ttl=128 time=0.0 ms

64 bytes from 2222::717: icmp6_seq=2 ttl=128 time=0.0 ms

64 bytes from 2222::717: icmp6_seq=3 ttl=128 time=0.0 ms

--- 2222::717 ping statistics ---

4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 0.0/2.5/10.0 ms

Click Apply to display ping result for the IP address.

131 EKI-7706 Series User Manual

4.10.4

System Log

4.10.4.1

Logging Service

The Logging Service page allows you to setup the logging services feature for the system log.

To access this page, click Diagnostics > System Log > Logging Service .

Figure 4.134 Diagnostics > System Log > Logging Service

The following table describes the items in the previous figure.

Item

Logging Service

Apply

Description

Click Enabled or Disabled to set the Logging Service status.

Click Apply to save the values and update the screen.

The ensuing table for Logging Information settings are informational only: Logging

Service.

4.10.4.2

Local Logging

The Local Logging page allows you to designate a local target when the severity criteria is reached.

To access this page, click Diagnostics > System Log > Local Logging .

Figure 4.135 Diagnostics > System Log > Local Logging

The following table describes the items in the previous figure.

Item

Target

Description

Enter the local logging target.

EKI-7706 Series User Manual 132

Item

Severity

Description

Click the drop-down menu to select the severity level for local log messages.

The level options are:

 emerg: Indicates system is unusable. It is the highest level of severity

 alert: Indicates action must be taken immediately

 crit: Indicates critical conditions

 error: Indicates error conditions

 warning: Indicates warning conditions

 notice: Indicates normal but significant conditions

 info: Indicates informational messages

 debug: Indicates debug-level messages

Click Apply to save the values and update the screen.

Apply

The ensuing table for Local Logging Settings Status settings are informational only: Status, Target, Severity and Delete (click to delete the desired target).

4.10.4.3

System Log Server

The System Log Server page allows you to configure the log server.

To access this page, click Diagnostics > System Log > System Log Server .

Figure 4.136 Diagnostics > System Log > System Log Server

The following table describes the items in the previous figure.

Item

Server Address

Server Port

Severity

Description

Enter the IP address of the log server.

Enter the Udp port number of the log server.

Click the drop-down menu to select the severity level for local log messages. The default is emerg.

The level options are:

 emerg: Indicates system is unusable. It is the highest level of severity

 alert: Indicates action must be taken immediately

 crit: Indicates critical conditions

 error: Indicates error conditions

 warning: Indicates warning conditions

 notice: Indicates normal but significant conditions

 info: Indicates informational messages

 debug: Indicates debug-level messages

133 EKI-7706 Series User Manual

Item

Facility

Description

Click the drop-down menu to select facility to which the message refers.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Remote Logging Setting Status settings are informational only: Status, Server Info, Severity, Facility and Delete (click to delete the desired server address).

4.10.5

DDM

The DDM page allows you to setup the diagnostic alarm status.

To access this page, click Diagnostics > DDM .

Figure 4.137 Diagnostics > DDM > Diagnostic Alarm Settings

The following table describes the items in the previous figure.

Item

Diagnostic Alarm

Description

Click the drop-down menu to designate the announcement method:

Disabled, SysLog, E-mail, or SNMP.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Diagnostic Alarm Information settings are informational only:

Diagnostic Alarm.

Figure 4.138 Diagnostics > DDM > DMI INFO

The following table describes the items in the previous figure.

Item

High Alarm

High Warning

Low Alarm

Low Warning

Apply

Description

Click Enabled or Disabled to set the alarm state.

Click Enabled or Disabled to set the alarm state.

Click Enabled or Disabled to set the alarm state.

Click Enabled or Disabled to set the alarm state.

Click Apply to save the values and update the screen.

EKI-7706 Series User Manual 134

The ensuing table for Vendor Info settings are informational only: Refresh (click to reload the vendor information), Port, Connector, Speed, VendorName, VendorOui,

VendorPn, VendorRev, VendorSn and DateCode.

4.10.6

LED Indication

To access this page, click Diagnostics > LED Indication .

Figure 4.139 Diagnostics > LED Indication

The following table describes the items in the previous figure.

Item

LED

State

Event

Apply

Description

Click the drop-down menu to select LED indicator.

Select Enable or Disable to enable LED alarm.

Click to select the event of LED alarm.

Click Apply to save the values and update the screen.

The ensuing table for LED Information settings are informational only: Alarm.

The ensuing table for Event Information settings are informational only: LED (click the drop down menu to select LED), Event, State, and Delete (click to delete the desired event).

135 EKI-7706 Series User Manual

4.11

Tools

4.11.1

IXM

The IXM tool is an industrial Ethernet switch solution to help the users deploy industrial Ethernet switch hardware by allowing users with multiple, managed Ethernet switches in the field to eliminate the need to individually connect to each device to configure it.

To access this page, click Tools > IXM .

Figure 4.140 Tools > IXM

The following table describes the items in the previous figure.

Item

Search Field

#

Device Name

Device Model

Category

IP Address

MAC Address

Firmware Version

System Indicator

Previous

Next

Description

Enter criteria to search the IXM information.

Displays the reference to the device number.

Displays the device name.

Displays the device model type.

Displays the device’s category type.

Displays the device’s IP address.

Displays the device’s IP MAC address.

Displays the device’s firmware version.

Displays the device’s system indicator.

Click Previous to back to previous page.

Click Next to go to next page.

4.11.2

Backup Manager

The Backup Manager page allows you to configure a remote TFTP sever or host file system in order to backup the firmware image or configuration file.

To access this page, click Tools > Backup Manager .

EKI-7706 Series User Manual 136

The following figures represent multiple supported devices. Some interface screens may represent specific device models.

Figure 4.141 Tools > Backup Manager

The following table describes the items in the previous figure.

Item

Backup Method

Server IP

Backup Type

Image

Backup

Description

Click the drop-down menu to select the backup method: TFTP or

HTTP.

Enter the IP address of the backup server.

Click a type to define the backup method: image: running configuration, startup configuration, custom configuration, flash log, or buffered log.

Click the format for the image type: Active or Backup.

Click Backup to backup the settings.

137 EKI-7706 Series User Manual

4.11.3

Upgrade Manager

The Upgrade Manager page allows you to configure a remote TFTP sever or host file system in order to upload firmware upgrade images or configuration files.

To access this page, click Tools > Upgrade Manager .

The following figures represent multiple supported devices. Some interface screens may represent specific device models.

Figure 4.142 Tools > Upgrade Manager

The following table describes the items in the previous figure.

Item

Upgrade Method

Server IP

File Name

Upgrade Type

Image

Upgrade

Description

Click the drop-down menu to select the upgrade method: TFTP or

HTTP.

Enter the IP address of the upgrade server.

Enter the file name of the new firmware version.

Click a type to define the upgrade method: image, startup configuration, running configuration, or custom configuration.

Click the format for the image type: Active, Backup, or auto.

Click Upgrade to upgrade to the current version.

EKI-7706 Series User Manual 138

4.11.4

Dual Image

The Dual Image page allows you to setup an active and backup partitions for firmware image redundancy.

To access this page, click Tools > Dual Image .

The following figures represent multiple supported devices. Some interface screens may represent specific device models.

Figure 4.143 Tools > Dual Image

The following table describes the items in the previous figure.

Item

Active Image

Save

Description

Click the format for the image type: Active or Backup.

Click Save to save and keep the new settings.

The ensuing table for Image Information 0/1 are informational only: Flash Partition,

Image Name, Image Size and Created Time

4.11.5

Save Configuration

To access this page, click Tools > Save Configuration .

Click Save Configuration to FLASH to have configuration changes you have made to be saved across a system reboot. All changes submitted since the previous save or system reboot will be retained by the switch.

4.11.6

User Account

The User Account page allows you to setup a user and the related parameters.

To access this page, click Tools > User Account .

Figure 4.144 Tools > User Account

The following table describes the items in the previous figure.

Item

User Name

Description

Enter the name of the new user entry.

139 EKI-7706 Series User Manual

Item Description

Password Type

Password

Retype Password

Privilege Type

Click the drop-down menu to define the type of password: Clear Text ,

Encrypted or No Password .

Enter the character set for the define password type.

Retype the password entry to confirm the profile password.

Click the drop-down menu to designate privilege authority for the user entry: Admin or User .

Click Apply to create a new user account.

Apply

The ensuing table for Local Users settings are informational only: User Name, Password Type, Privilege Type and Delete (click to delete the desired user account).

4.11.7

N-Key

To access this page, click Tools > N-Key .

Figure 4.145 Tools > N-Key

The following table describes the items in the previous figure.

Item

Auto Mode

N-Key Status

Apply

Description

Click the option to set the auto mode for the N-Key status.

Click the drop-down menu to select N-Key status.

Click Apply to create a new user account.

The ensuing table for N-Key Information settings are informational only: Auto Mode and N-Key Status.

4.11.8

Reset System

To access this page, click Tools > Reset System .

Click Restore to have all configuration parameters reset to their factory default values. All changes that have been made will be lost, even if you have issued a save.

Click Select Excepted Configuration to keep the configuration you selected when resetting.

Reset settings take effect after a system reboot.

4.11.9

Reboot Device

To access this page, click Tools > Reboot Device .

Click Reboot to reboot the switch. Any configuration changes you have made since the last time you issued a save will be lost.

4.12

Modbus/TCP Mapping

The data map addresses of Advantech switches shown in the following table start from Modbus address 30001 for function code 4.

EKI-7706 Series User Manual 140

In the given example, the address offset 0x1000 (hex) equals Modbus address

34097, while the address offset 0x1100 (hex) equals Modbus address 34353.

The information given by the Advantech is shown in hex mode.

141 EKI-7706 Series User Manual

4.12.1

Modbus/TCP Mapping Table

Catelog

System Info

Name Data Type Interpretation Address

Offset (Hex)

0x0000

Address

3X

30001

Description

Vendor ID = 0x13FE Vendor ID =

0x‘13FE

1 word 16 bits HEX

Unit ID = 0xFF 1 word 16 bits HEX

Product Code 1 word 16 bits HEX

Vendor Name

= "Advantech"

16 words

32 chars

ASCII

Product Name

= "EKI-xxxx"

16 words

32 chars

ASCII

Firmware Version

2 words

32 bits HEX

Ethernet MAC

Address

3 words

48 bits HEX

0x0001

0x0002

0x0010

0x0020

0x020A

0x020E

30002

30003

30017

30033

30523

30527

Unit ID = 0xFF

Product Code

Vendor Name =

"Advantech"

Word 0 Hi byte = 'A'

Word 0 Lo byte = 'd'

Word 1 Hi byte = 'v'

Word 1 Lo byte = 'a'

Word 2 Hi byte = 'n'

Word 2 Lo byte = 't'

Word 3 Hi byte = 'e'

Word 3 Lo byte = 'c'

Word 4 Hi byte = 'h'

Word 4 Lo byte = '\0'

Product Name =

"EKI-xxxx"

Word 0 Hi byte = 'E'

Word 0 Lo byte = 'K'

Word 1 Hi byte = 'I'

Word 1 Lo byte = '-'

Word 2 Hi byte = 'x'

Word 2 Lo byte = 'x'

Word 3 Hi byte = 'x'

Word 3 Lo byte = 'x'

Word 4 Hi byte = '\0'

Firmware Version

Word 0 Hi byte = major

Word 0 Lo byte = minor

Word 1 Hi byte = release

Word 1 Lo byte = build

Ethernet MAC

Address

Ex: MAC = 00-19-

CB-01-02-03

Word 0 Hi byte =

0x00

Word 0 Lo byte =

0x19

Word 1 Hi byte =

0xCB

Word 1 Lo byte =

0x01

Word 2 Hi byte =

0x02

Word 2 Lo byte =

0x03

EKI-7706 Series User Manual 142

Catelog

System Info

Port Info

Name

Revision Number

16 words

32 chars

IP Address

Port Status

2 words

32 bits HEX

Port 1 Status 1 word 16 bits HEX

Port 2 Status 1 word 16 bits HEX

Port 3 Status 1 word 16 bits HEX

Port 4 Status 1 word 16 bits HEX

Port 5 Status 1 word 16 bits HEX

Port 6 Status 1 word 16 bits HEX

Port 7 Status 1 word 16 bits HEX

Port 8 Status 1 word 16 bits HEX

Port 9 Status 1 word 16 bits HEX

Port 10 Status 1 word 16 bits HEX

Port 11 Status 1 word 16 bits HEX

Port 12 Status 1 word 16 bits HEX

Port 13 Status 1 word 16 bits HEX

Port 14 Status 1 word 16 bits HEX

Port 15 Status 1 word 16 bits HEX

Port 16 Status 1 word 16 bits HEX

Port 17 Status 1 word 16 bits HEX

Port 18 Status 1 word 16 bits HEX

Port 19 Status 1 word 16 bits HEX

Port 20 Status 1 word 16 bits HEX

Port 21 Status 1 word 16 bits HEX

Port 22 Status 1 word 16 bits HEX

Port 23 Status 1 word 16 bits HEX

Port 24 Status 1 word 16 bits HEX

Port 25 Status 1 word 16 bits HEX

Port 26 Status 1 word 16 bits HEX

Port 27 Status 1 word 16 bits HEX

Port 28 Status 1 word 16 bits HEX

Data Type Interpretation

ASCII

1 word 16 bits HEX

0x1010

0x1011

0x1012

0x1013

0x1014

0x1015

0x1016

0x1017

0x1018

0x1019

0x101A

0x101B

0x1000

0x1001

0x1002

0x1003

0x1004

0x1005

0x1006

0x1007

0x1008

0x1009

0x100A

0x100B

0x100C

0x100D

0x100E

0x100F

Address

Offset (Hex)

0x0211

0x0400

0x1000 ~

0x101F

34113

34114

34115

34116

34117

34118

34119

34120

34121

34122

34123

34124

34106

34107

34108

34109

34110

34111

34112

34097

34098

34099

34100

34101

34102

34103

34104

34105

Address

3X

30530

31025

34097 ~

34128

Description

Product Name =

"YYY.xxxxx"

Word 0 Hi byte = 'Y'

Word 0 Lo byte = 'Y'

Word 1 Hi byte = 'Y'

Word 1 Lo byte = '.'

Word 2 Hi byte = 'x'

Word 2 Lo byte = 'x'

Word 3 Hi byte = 'x'

Word 3 Lo byte = 'x'

Word 4 Hi byte = 'x'

Word 4 Hi byte = '\0'

IP Address

Ex: IP = 192.168.1.1

Word 0 Hi byte =

0xC0

Word 0 Lo byte =

0xA8

Word 1 Hi byte =

0x01

Word 1 Lo byte =

0x01

Port Status

0x0000: Link down

0x0001: Link up

0xFFFF: No port

143 EKI-7706 Series User Manual

Catelog

Port Info

Name

Port 29 Status 1 word 16 bits HEX

Port 30 Status 1 word 16 bits HEX

Port 31 Status 1 word 16 bits HEX

Port 32 Status 1 word 16 bits HEX

Port Speed 1 word 16 bits HEX

Port 1 Speed 1 word 16 bits HEX

Port 2 Speed 1 word 16 bits HEX

Port 3 Speed 1 word 16 bits HEX

Port 4 Speed 1 word 16 bits HEX

Port 5 Speed 1 word 16 bits HEX

Port 6 Speed 1 word 16 bits HEX

Port 7 Speed 1 word 16 bits HEX

Port 8 Speed 1 word 16 bits HEX

Port 9 Speed 1 word 16 bits HEX

Port 10 Speed 1 word 16 bits HEX

Port 11 Speed 1 word 16 bits HEX

Port 12 Speed 1 word 16 bits HEX

Port 13 Speed 1 word 16 bits HEX

Port 14 Speed 1 word 16 bits HEX

Port 15 Speed 1 word 16 bits HEX

Port 16 Speed 1 word 16 bits HEX

Port 17 Speed 1 word 16 bits HEX

Port 18 Speed 1 word 16 bits HEX

Port 19 Speed 1 word 16 bits HEX

Port 20 Speed 1 word 16 bits HEX

Port 21 Speed 1 word 16 bits HEX

Port 22 Speed 1 word 16 bits HEX

Port 23 Speed 1 word 16 bits HEX

Port 24 Speed 1 word 16 bits HEX

Port 25 Speed 1 word 16 bits HEX

Port 26 Speed 1 word 16 bits HEX

Port 27 Speed 1 word 16 bits HEX

Port 28 Speed 1 word 16 bits HEX

Port 29 Speed 1 word 16 bits HEX

Port 30 Speed 1 word 16 bits HEX

Port 31 Speed 1 word 16 bits HEX

Port 32 Speed 1 word 16 bits HEX

Flow Control 1 word 16 bits HEX

Port 1 Flow

Control

Port 2 Flow

Control

Port 3 Flow

Control

Data Type Interpretation

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

0x110A

0x110B

0x110C

0x110D

0x110E

0x110F

0x1110

0x1111

0x1112

0x1113

0x1114

0x1115

0x1116

0x1117

0x1118

0x1100

0x1101

0x1102

0x1103

0x1104

0x1105

0x1106

0x1107

0x1108

0x1109

0x1119

0x111A

0x111B

0x111C

0x111D

0x111E

0x111F

0x1200 ~

0x121F

Address

Offset (Hex)

0x101C

0x101D

0x101E

0x101F

0x1100 ~

0x111F

0x1200

34370

34371

34372

34373

34374

34375

34376

34377

34363

34364

34365

34366

34367

34368

34369

34378

34379

34380

34381

34382

34383

34384

34609 ~

34640

34353

34354

34355

34356

34357

34358

34359

34360

34361

34362

Address

3X

34125

34126

34127

34128

34353 ~

34384

Description

Port Speed

0x0000: 10M-Half

0x0001: 10M-Full

0x0002: 100M-Half

0x0003: 100M-Full

0x0004: 1000M-Half

0x0005: 1000M-Full

0xFFFF: No port

Flow Control

0x0000: Off

0x0001: On

0xFFFF: No port

34609

0x1201

0x1202

34610

34611

EKI-7706 Series User Manual 144

Catelog

Port Info

Name Data Type Interpretation Address

Offset (Hex)

0x1203

Address

3X

34612 Port 4 Flow

Control

Port 5 Flow

Control

Port 6 Flow

Control

Port 7 Flow

Control

Port 8 Flow

Control

Port 9 Flow

Control

Port 10 Flow

Control

Port 11 Flow

Control

Port 12 Flow

Control

Port 13 Flow

Control

Port 14 Flow

Control

Port 15 Flow

Control

Port 16 Flow

Control

Port 17 Flow

Control

Port 18 Flow

Control

Port 19 Flow

Control

Port 20 Flow

Control

Port 21 Flow

Control

Port 22 Flow

Control

Port 23 Flow

Control

Port 24 Flow

Control

Port 25 Flow

Control

Port 26 Flow

Control

Port 27 Flow

Control

Port 28 Flow

Control

Port 29 Flow

Control

Port 30 Flow

Control

Port 31 Flow

Control

Port 32 Flow

Control

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

0x1204

0x1205

0x1206

0x1207

0x1208

0x1209

0x120A

0x120B

0x120C

0x120D

0x120E

0x120F

0x1210

0x1211

0x1212

0x1213

0x1214

0x1215

0x1216

0x1217

0x1218

0x1219

0x121A

0x121B

0x121C

0x121D

0x121E

0x121F

34613

34614

34615

34616

34617

34618

34619

34620

34621

34622

34623

34624

34625

34626

34627

34628

34629

34630

34631

34632

34633

34634

34635

34636

34637

34638

34639

34640

Description

145 EKI-7706 Series User Manual

Catelog

Port Info

Port 8

Description

Port 9

Description

Port 10

Description

Port 11

Description

Port 12

Description

Port 13

Description

Port 14

Description

Port 15

Description

Port 16

Description

Port 17

Description

Port 18

Description

Port 19

Description

Port 20

Description

Port 21

Description

Port 22

Description

Port 1

Description

Port 2

Description

Port 3

Description

Port 4

Description

Port 5

Description

Port 6

Description

Port 7

Description

Name Data Type

Port Description

20 words

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

Interpretation

ASCII

ASCII

Address

Offset (Hex)

0x1400 ~

0x166C

0x1400

Address

3X

35121 ~

35741

Description

Port Description

Port Description =

"100RX,RJ45."

Word 0 Hi byte = '1'

Word 0 Lo byte = '0'

Word 1Hi byte = '0'

Word 1 Lo byte = ‘R’

Word 2 Hi byte = 'X'

Word 2 Lo byte = ‘,’

Word 3 Hi byte = 'R'

Word 3 Lo byte = ‘J’

Word 4 Hi byte = ‘4’

Word 4 Lo byte = ‘5’

Word 5 Hi byte = ‘.’

Word 5 Lo byte = ‘\0’

35121

0x1414

0x1428

0x143C

0x1450

0x1464

0x1478

0x148C

0x14A0

0x14B4

0x14C8

0x14DC

0x14F0

0x1504

0x1518

0x152C

0x1540

0x1554

0x1568

0x157C

0x1590

0x15A4

35141

35161

35181

35201

35221

35241

35261

35281

35301

35321

35341

35361

35381

35401

35421

35441

35461

35481

35501

35521

35541

EKI-7706 Series User Manual 146

Catelog

Port Info

Name Data Type Interpretation Address

Offset (Hex)

0x15B8

Address

3X

35561 Port 23

Description

Port 24

Description

Port 25

Description

Port 26

Description

Port 27

Description

Port 28

Description

Port 29

Description

20 words

20 words

20 words

20 words

20 words

20 words

20 words

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

Port 30

Description

Port 31

Description

Port 32

Description

20 words

20 words

20 words

40 chars

40 chars

40 chars

ASCII

ASCII

ASCII

Link Up Counter

1 word 16 bits HEX

0x15CC

0x15E0

0x15F4

0x1608

0x161C

0x1630

0x1644

0x1658

0x166C

0x1700 ~

0x171F

35581

35601

35621

35641

35661

35681

35701

35721

35741

35889 ~

35920

Description

Link Up Counter

Ex: port link up counter = 13

Received MODBUS response: 0x000D

Port 1 Link Up

Counter

1 word 16 bits HEX

Port 2 Link Up

Counter

1 word 16 bits HEX

Port 3 Link Up

Counter

1 word 16 bits HEX

Port 4 Link Up

Counter

1 word 16 bits HEX

Port 5 Link Up

Counter

1 word 16 bits HEX

Port 6 Link Up

Counter

1 word 16 bits HEX

Port 7 Link Up

Counter

1 word 16 bits HEX

Port 8 Link Up

Counter

1 word 16 bits HEX

Port 9 Link Up

Counter

1 word 16 bits HEX

Port 10 Link

Up Counter

1 word 16 bits HEX

1 word 16 bits HEX Port 11 Link

Up Counter

Port 12 Link

Up Counter

Port 13 Link

Up Counter

Port 14 Link

Up Counter

1 word 16 bits

1 word 16 bits

1 word 16 bits

HEX

HEX

HEX

Port 15 Link

Up Counter

Port 16 Link

Up Counter

Port 17 Link

Up Counter

1 word 16 bits HEX

1 word 16 bits

1 word 16 bits

HEX

HEX

0x1700

0x1701

0x1702

0x1703

0x1704

0x1705

0x1706

0x1707

0x1708

0x1709

0x170A

0x170B

0x170C

0x170D

0x170E

0x170F

0x1710

35889

35890

35891

35892

35893

35894

35895

35896

35897

35898

35899

35900

35901

35902

35903

35904

35905

147 EKI-7706 Series User Manual

Catelog

Port Info

Port 1 PoE

Voltage

Port 2 PoE

Voltage

Port 3 PoE

Voltage

Port 4 PoE

Voltage

Port 5 PoE

Voltage

Port 6 PoE

Voltage

Port 7 PoE

Voltage

Port 8 PoE

Voltage

Port 9 PoE

Voltage

Port 10 PoE

Voltage

Port 11 PoE

Voltage

Port 12 PoE

Voltage

Port 13 PoE

Voltage

Name Data Type Interpretation Address

Offset (Hex)

0x1711

Address

3X

35906 Port 18 Link

Up Counter

Port 19 Link

Up Counter

Port 20 Link

Up Counter

Port 21 Link

Up Counter

Port 22 Link

Up Counter

Port 23 Link

Up Counter

Port 24 Link

Up Counter

Port 25 Link

Up Counter

Port 26 Link

Up Counter

Port 27 Link

Up Counter

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

Port 28 Link

Up Counter

Port 29 Link

Up Counter

Port 30 Link

Up Counter

1 word

1 word

1 word

16 bits

16 bits

16 bits

HEX

HEX

HEX

Port 31 Link

Up Counter

Port 32 Link

Up Counter

1 word

1 word

16 bits

16 bits

HEX

HEX

PoE Voltage 1 word 16 bits HEX

0x1712

0x1713

0x1714

0x1715

0x1716

0x1717

0x1718

0x1719

0x171A

0x171B

0x171C

0x171D

0x171E

0x171F

0x1800 ~

0x181F

35907

35908

35909

35910

35911

35912

35913

35914

35915

35916

35917

35918

35919

35920

36145 ~

36176

Description

PoE Voltage (V)

Ex: poe voltage = 5

Received MODBUS response: 0x0005

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

0x1800

0x1801

0x1802

0x1803

0x1804

0x1805

0x1806

0x1807

0x1808

0x1809

0x180A

0x180B

0x180C

36145

36146

36147

36148

36149

36150

36151

36152

36153

36154

36155

36156

36157

EKI-7706 Series User Manual 148

Catelog

Port Info

Port 1 PoE

Current

Port 2 PoE

Current

Port 3 PoE

Current

Port 4 PoE

Current

Port 5 PoE

Current

Port 6 PoE

Current

Port 7 PoE

Current

Port 8 PoE

Current

Port 9 PoE

Current

Name Data Type Interpretation Address

Offset (Hex)

0x180D

Address

3X

36158 Port 14 PoE

Voltage

Port 15 PoE

Voltage

Port 16 PoE

Voltage

Port 17 PoE

Voltage

Port 18 PoE

Voltage

Port 19 PoE

Voltage

Port 20 PoE

Voltage

Port 21 PoE

Voltage

Port 22 PoE

Voltage

Port 23 PoE

Voltage

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

Port 24 PoE

Voltage

Port 25 PoE

Voltage

Port 26 PoE

Voltage

Port 27 PoE

Voltage

Port 28 PoE

Voltage

Port 29 PoE

Voltage

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

HEX

HEX

HEX

HEX

HEX

HEX

Port 30 PoE

Voltage

Port 31 PoE

Voltage

Port 32 PoE

Voltage

1 word 16 bits

1 word 16 bits

1 word 16 bits

HEX

HEX

HEX

PoE Current 1 word 16 bits HEX

0x180E

0x180F

0x1810

0x1811

0x1812

0x1813

0x1814

0x1815

0x1816

0x1817

0x1818

0x1819

0x181A

0x181B

0x181C

0x181D

0x181E

0x181F

0x1820 ~

0x183F

36159

36160

36161

36162

36163

36164

36165

36166

36167

36168

36169

36170

36171

36172

36173

36174

36175

36176

36177 ~

36208

Description

PoE Current (mA)

Ex: poe current = 13

Received MODBUS response: 0x000D

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

0x1820

0x1821

0x1822

0x1823

0x1824

0x1825

0x1826

0x1827

0x1828

36177

36178

36179

36180

36181

36182

36183

36184

36185

149 EKI-7706 Series User Manual

Catelog

Port Info

Name Data Type Interpretation

1 word 16 bits HEX

Address

Offset (Hex)

0x1829

Address

3X

36186

Port 20 PoE

Current

Port 21 PoE

Current

Port 22 PoE

Current

Port 23 PoE

Current

Port 24 PoE

Current

Port 25 PoE

Current

Port 26 PoE

Current

Port 27 PoE

Current

Port 28 PoE

Current

Port 29 PoE

Current

Port 30 PoE

Current

Port 31 PoE

Current

Port 32 PoE

Current

PoE Power

Port 10 PoE

Current

Port 11 PoE

Current

Port 12 PoE

Current

Port 13 PoE

Current

Port 14 PoE

Current

Port 15 PoE

Current

Port 16 PoE

Current

Port 17 PoE

Current

Port 18 PoE

Current

Port 19 PoE

Current

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

1 word

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

16 bits

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

1 word 16 bits HEX

0x182A

0x182B

0x182C

0x182D

0x182E

0x182F

0x1830

0x1831

0x1832

0x1833

0x1834

0x1835

0x1836

0x1837

0x1838

0x1839

0x183A

0x183B

0x183C

0x183D

0x183E

0x183F

0x1840 ~

0x185F

36187

36188

36189

36190

36191

36192

36193

36194

36195

36196

36197

36198

36199

36200

36201

36202

36203

36204

36205

36206

36207

36208

36209 ~

36240

Description

PoE Power (W)

Ex: poe power = 10

Received MODBUS response: 0x000A

Port 1 PoE

Power

Port 2 PoE

Power

Port 3 PoE

Power

Port 4 PoE

Power

Port 5 PoE

Power

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

0x1840

0x1841

0x1842

0x1843

0x1844

36209

36210

36211

36212

36213

EKI-7706 Series User Manual 150

Catelog

Port Info

Name Data Type Interpretation Address

Offset (Hex)

0x1845

Address

3X

36214 Port 6 PoE

Power

Port 7 PoE

Power

Port 8 PoE

Power

Port 9 PoE

Power

Port 10 PoE

Power

Port 11 PoE

Power

Port 12 PoE

Power

Port 13 PoE

Power

Port 14 PoE

Power

Port 15 PoE

Power

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

Port 16 PoE

Power

Port 17 PoE

Power

Port 18 PoE

Power

Port 19 PoE

Power

Port 20 PoE

Power

Port 21 PoE

Power

Port 22 PoE

Power

Port 23 PoE

Power

Port 24 PoE

Power

Port 25 PoE

Power

Port 26 PoE

Power

Port 27 PoE

Power

Port 28 PoE

Power

Port 29 PoE

Power

Port 30 PoE

Power

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

1 word 16 bits

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

HEX

Port 31 PoE

Power

Port 32 PoE

Power

1 word 16 bits

1 word 16 bits

HEX

HEX

PoE Temperature

1 word 16 bits HEX

0x1846

0x1847

0x1848

0x1849

0x184A

0x184B

0x184C

0x184D

0x184E

0x184F

0x1850

0x1851

0x1852

0x1853

0x1854

0x1855

0x1856

0x1857

0x1858

0x1859

0x185A

0x185B

0x185C

0x185D

0x185E

0x185F

0x1860 ~

0x187F

36215

36216

36217

36218

36219

36220

36221

36222

36223

36224

36225

36226

36227

36228

36229

36230

36231

36232

36233

36234

36235

36236

36237

36238

36239

36240

36241 ~

36272

Description

PoE Temperature (C)

Ex: poe temperature

= 32

Received MODBUS response: 0x0020

151 EKI-7706 Series User Manual

Catelog

Port Info

Name Data Type Interpretation

1 word 16 bits HEX

Address

Offset (Hex)

0x1860

Address

3X

36241

Port 11 PoE

Temperature

Port 12 PoE

Temperature

Port 13 PoE

Temperature

Port 14 PoE

Temperature

Port 15 PoE

Temperature

Port 16 PoE

Temperature

Port 17 PoE

Temperature

Port 18 PoE

Temperature

Port 19 PoE

Temperature

Port 20 PoE

Temperature

Port 21 PoE

Temperature

Port 22 PoE

Temperature

Port 23 PoE

Temperature

Port 24 PoE

Temperature

Port 25 PoE

Temperature

Port 1 PoE

Temperature

Port 2 PoE

Temperature

Port 3 PoE

Temperature

Port 4 PoE

Temperature

Port 5 PoE

Temperature

Port 6 PoE

Temperature

Port 7 PoE

Temperature

Port 8 PoE

Temperature

Port 9 PoE

Temperature

Port 10 PoE

Temperature

Port 26 PoE

Temperature

Port 27 PoE

Temperature

Port 28 PoE

Temperature

Port 29 PoE

Temperature

Port 30 PoE

Temperature

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

0x1861

0x1862

0x1863

0x1864

0x1865

0x1866

0x1867

0x1868

0x1869

0x186A

0x186B

0x186C

0x186D

0x186E

0x186F

0x1870

0x1871

0x1872

0x1873

0x1874

0x1875

0x1876

0x1877

0x1878

0x1879

0x187A

0x187B

0x187C

0x187D

36242

36243

36244

36245

36246

36247

36248

36249

36250

36251

36252

36253

36254

36255

36256

36257

36258

36259

36260

36261

36262

36263

36264

36265

36266

36267

36268

36269

36270

Description

EKI-7706 Series User Manual 152

Catelog

Port Info

Packet Info

Port 15 Tx

Packets

Port 16 Tx

Packets

Port 17 Tx

Packets

Port 18 Tx

Packets

Port 19 Tx

Packets

Port 20 Tx

Packets

Port 21 Tx

Packets

Port 22 Tx

Packets

Port 23 Tx

Packets

Port 9 Tx

Packets

Port 10 Tx

Packets

Port 11 Tx

Packets

Port 12 Tx

Packets

Port 13 Tx

Packets

Port 14 Tx

Packets

Port 1 Tx

Packets

Port 2 Tx

Packets

Port 3 Tx

Packets

Port 4 Tx

Packets

Port 5 Tx

Packets

Port 6 Tx

Packets

Port 7 Tx

Packets

Port 8 Tx

Packets

Name Data Type Interpretation Address

Offset (Hex)

0x187E

Address

3X

36271 Port 31 PoE

Temperature

Port 32 PoE

Temperature

Tx Packets

Counter

1 word 16 bits HEX

1 word 16 bits HEX

4 words

64 bits HEX

0x187F

0x2000 ~

0x207C

36272

38193 ~

38317

Description

Tx Packets

Ex: port 1 Tx Packet

Amount = 11223344

Received MODBUS response: 0xAB4130

Word 0 = 0x0000

Word 1 = 0x0000

Word 2 = 0x00AB

Word 3 = 0x4130

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

0x2000

0x2004

0x2008

0x200C

0x2010

0x2014

0x2018

0x201C

0x2020

0x2024

0x2028

0x202C

0x2030

0x2034

0x2038

0x203C

0x2040

0x2044

0x2048

0x204C

0x2050

0x2054

0x2058

38193

38197

38201

38205

38209

38213

38217

38221

38225

38229

38233

38237

38241

38245

38249

38253

38257

38261

38265

38269

38273

38277

38281

153 EKI-7706 Series User Manual

Catelog

Packet Info

Port 1 Rx

Packets

Port 2 Rx

Packets

Port 3 Rx

Packets

Port 4 Rx

Packets

Port 5 Rx

Packets

Port 6 Rx

Packets

Port 7 Rx

Packets

Port 8 Rx

Packets

Port 9 Rx

Packets

Port 10 Rx

Packets

Port 11 Rx

Packets

Port 12 Rx

Packets

Port 13 Rx

Packets

Port 14 Rx

Packets

Port 15 Rx

Packets

Port 16 Rx

Packets

Name

Port 24 Tx

Packets

Port 25 Tx

Packets

Port 26 Tx

Packets

Port 27 Tx

Packets

Port 28 Tx

Packets

Port 29 Tx

Packets

Port 30 Tx

Packets

Port 31 Tx

Packets

Port 32 Tx

Packets

Rx Packets

Counter

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

Data Type Interpretation Address

Offset (Hex)

0x205C

Address

3X

38285 4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

0x2060

0x2064

0x2068

0x206C

0x2070

0x2074

0x2078

0x207C

0x2100

~0x217C

38289

38293

38297

38301

38305

38309

38313

38317

38449 ~

38573

Description

Rx Packets

Ex: port 1 Rx Packet

Amount = 11223344

Received MODBUS response: 0xAB4130

Word 0 = 0x0000

Word 1 = 0x0000

Word 2 = 0x00AB

Word 3 = 0x4130

0x2100

0x2104

0x2108

0x210C

0x2110

0x2114

0x2118

0x211C

0x2120

0x2124

0x2128

0x212C

0x2130

0x2134

0x2138

0x213C

38449

38453

38457

38461

38465

38469

38473

38477

38481

38485

38489

38493

38497

38501

38505

38509

EKI-7706 Series User Manual 154

Catelog

Packet Info

Name Data Type Interpretation Address

Offset (Hex)

0x2140

Address

3X

38513 Port 17 Rx

Packets

Port 18 Rx

Packets

Port 19 Rx

Packets

Port 20 Rx

Packets

Port 21 Rx

Packets

Port 22 Rx

Packets

Port 23 Rx

Packets

Port 24 Rx

Packets

Port 25 Rx

Packets

Port 26 Rx

Packets

Port 27 Rx

Packets

Port 28 Rx

Packets

Port 29 Rx

Packets

Port 30 Rx

Packets

Port 31 Rx

Packets

Port 32 Rx

Packets

4 words

4 words

4 words

4 words

4 words

4 words

Tx Error Packets Counter

2 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

32 bits HEX

0x2144

0x2148

0x214C

0x2150

0x2154

0x2158

0x215C

0x2160

0x2164

0x2168

0x216C

0x2170

0x2174

0x2178

0x217C

0x2200 ~

0x223E

38517

38521

38525

38529

38533

38537

38541

38545

38549

38553

38557

38561

38565

38569

38573

38705 ~

38767

Description

Tx Error Packets

Ex: port 1 Tx Packet

Amount = 11223344

Received MODBUS response: 0xAB4130

Word 0 = 0x00AB

Word 1 = 0x4130

Port 1 Tx Error

Packets

2 words

Port 2 Tx Error

Packets

2 words

Port 3 Tx Error

Packets

2 words

Port 4 Tx Error

Packets

2 words

Port 5 Tx Error

Packets

2 words

Port 6 Tx Error

Packets

2 words

Port 7 Tx Error

Packets

2 words

Port 8 Tx Error

Packets

2 words

Port 9 Tx Error

Packets

2 words

Port 10 Tx

Error Packets

2 words

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

0x2200

0x2202

0x2204

0x2206

0x2208

0x220A

0x220C

0x220E

0x2210

0x2212

38705

38707

38709

38711

38713

38715

38717

38719

38721

38723

155 EKI-7706 Series User Manual

Catelog

Packet Info

Name Data Type Interpretation Address

Offset (Hex)

0x2214

Address

3X

38725 Port 11 Tx

Error Packets

Port 12 Tx

Error Packets

Port 13 Tx

Error Packets

Port 14 Tx

Error Packets

Port 15 Tx

Error Packets

Port 16 Tx

Error Packets

Port 17 Tx

Error Packets

Port 18 Tx

Error Packets

Port 19 Tx

Error Packets

Port 20 Tx

Error Packets

Port 21 Tx

Error Packets

Port 22 Tx

Error Packets

Port 23 Tx

Error Packets

Port 24 Tx

Error Packets

Port 25 Tx

Error Packets

Port 26 Tx

Error Packets

Port 27 Tx

Error Packets

Port 28 Tx

Error Packets

Port 29 Tx

Error Packets

Port 30 Tx

Error Packets

Port 31 Tx

Error Packets

Port 32 Tx

Error Packets

2 words

Rx Error Packets Counter

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

0x2216

0x2218

0x221A

0x221C

0x221E

0x2220

0x2222

0x2224

0x2226

0x2228

0x222A

0x222C

0x222E

0x2230

0x2232

0x2234

0x2236

0x2238

0x223A

0x223C

0x223E

0x2300 ~

0x233E

38727

38729

38731

38733

38735

38737

38739

38741

38743

38745

38747

38749

38751

38753

38755

38757

38759

38761

38763

38765

38767

38961 ~

39023

Description

Rx Error Packets

Ex: port 1 Rx Packet

Amount = 11223344

Received MODBUS response: 0xAB4130

Word 0 = 0x00AB

Word 1 = 0x4130

Port 1 Rx

Error Packets

Port 2 Rx

Error Packets

Port 3 Rx

Error Packets

Port 4 Rx

Error Packets

2 words

2 words

2 words

2 words

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

0x2300

0x2302

0x2304

0x2306

38961

38963

38965

38967

EKI-7706 Series User Manual 156

Catelog

Packet Info

Name Data Type Interpretation Address

Offset (Hex)

0x2308

Address

3X

38969

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

Port 15 Rx

Error Packets

Port 16 Rx

Error Packets

Port 17 Rx

Error Packets

Port 18 Rx

Error Packets

Port 19 Rx

Error Packets

Port 20 Rx

Error Packets

Port 21 Rx

Error Packets

Port 22 Rx

Error Packets

Port 23 Rx

Error Packets

Port 24 Rx

Error Packets

Port 25 Rx

Error Packets

Port 26 Rx

Error Packets

Port 27 Rx

Error Packets

Port 28 Rx

Error Packets

Port 29 Rx

Error Packets

Port 30 Rx

Error Packets

Port 31 Rx

Error Packets

Port 32 Rx

Error Packets

Port 5 Rx

Error Packets

Port 6 Rx

Error Packets

Port 7 Rx

Error Packets

Port 8 Rx

Error Packets

Port 9 Rx

Error Packets

Port 10 Rx

Error Packets

Port 11 Rx

Error Packets

Port 12 Rx

Error Packets

Port 13 Rx

Error Packets

Port 14 Rx

Error Packets

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

0x230A

0x230C

0x230E

0x2310

0x2312

0x2314

0x2316

0x2318

0x231A

0x231C

0x231E

0x2320

0x2322

0x2324

0x2326

0x2328

0x232A

0x232C

0x232E

0x2330

0x2332

0x2334

0x2336

0x2338

0x233A

0x233C

0x233E

38971

38973

38975

38977

38979

38981

38983

38985

38987

38989

38991

38993

38995

38997

38999

39001

39003

39005

39007

39009

39011

39013

39015

39017

39019

39021

39023

Description

157 EKI-7706 Series User Manual

Chapter

5

Troubleshooting

5

5.1

Troubleshooting

 Verify that the device is using the right power cord/adapter (DC 48V); please do not use a power adapter with DC output higher than 48V, or the device may be damaged.

 Select the proper UTP/STP cable to construct the user network. Use unshielded twisted-pair (UTP) or shield twisted-pair (STP) cable for RJ-45 connections that depend on the connector type the switch equipped: 100R Category 3, 4 or 5 cable for 10Mbps connections, 100R Category 5 cable for 100Mbps connections, or 100R Category 5e/above cable for 1000Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters

(328 feet).

R = replacement letter for Ohm symbol.

 Diagnosing LED Indicators: To assist in identifying problems, the switch can be easily monitored through panel indicators, which describe common problems the user may encounter, so the user can be guided towards possible solutions.

 If the power indicator does not light on when the power cord is plugged in, you may have a problem with power cord. Check for loose power connections, power losses, or surges, at the power outlet. If you still cannot resolve the problem, contact a local dealer for assistance.

 If the LED indicators are normal and the connected cables are correct but packets still cannot be transmitted, please check the user system's Ethernet device configuration or status.

159 EKI-7706 Series User Manual

www.advantech.com

Please verify specifications before quoting. This guide is intended for reference purposes only.

All product specifications are subject to change without notice.

No part of this publication may be reproduced in any form or by any means, electronic, photocopying, recording or otherwise, without prior written permission of the publisher.

All brand and product names are trademarks or registered trademarks of their respective companies.

© Advantech Co., Ltd. 2019

advertisement

Related manuals

advertisement

Table of contents