Advantech EKI-7716G-4F4CI 8GE+4SFP+4G Combo port Managed Redundant Industrial Switch User Manual

Add to My manuals
173 Pages

advertisement

Advantech EKI-7716G-4F4CI 8GE+4SFP+4G Combo port Managed Redundant Industrial Switch User Manual | Manualzz

User Manual

EKI-7716 Series

8GE+4SFP+4G Combo port

Managed Redundant Industrial

Switch

Copyright

The documentation and the software included with this product are copyrighted 2021 by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co.,

Ltd. Information provided in this manual is intended to be accurate and reliable. How ever, Advantech Co., Ltd. assumes no responsibility for its use, nor for any infringe ments of the rights of third parties, which may result from its use.

Acknowledgements

Intel and Pentium are trademarks of Intel Corporation.

Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corp.

All other product names or trademarks are properties of their respective owners.

Product Warranty (5 years)

Advantech warrants to you, the original purchaser, that each of its products will be free from defects in materials and workmanship for five years from the date of pur chase.

This warranty does not apply to any products which have been repaired or altered by persons other than repair personnel authorized by Advantech, or which have been liability under the terms of this warranty as a consequence of such events.

subject to misuse, abuse, accident or improper installation. Advantech assumes no

Because of Advantech’s high quality-control standards and rigorous testing, most of our customers never need to use our repair service. If an Advantech product is defec tive, it will be repaired or replaced at no charge during the warranty period. For out ofwarranty repairs, you will be billed according to the cost of replacement materials, service time and freight. Please consult your dealer for more details.

If you think you have a defective product, follow these steps:

1.

Collect all the information about the problem encountered. (For example, CPU speed, Advantech products used, other hardware and software used, etc.) Note anything abnormal and list any on screen messages you get when the problem occurs.

2.

Call your dealer and describe the problem. Please have your manual, product, and any helpful information readily available.

3.

If your product is diagnosed as defective, obtain an RMA (return merchandize authorization) number from your dealer. This allows us to process your return more quickly.

4.

Carefully pack the defective product, a fully-completed Repair and Replacement

Order Card and a photocopy proof of purchase date (such as your sales receipt) in a shippable container. A product returned without proof of the purchase date is not eligible for warranty service.

5.

Write the RMA number visibly on the outside of the package and ship it prepaid to your dealer.

EKI-7716 Series User Manual

Printed in Taiwan ii

Edition 1

May 2021

Declaration of Conformity

CE

This product has passed the CE test for environmental specifications. Test conditions for passing included the equipment being operated within an industrial enclosure. In order to protect the product from being damaged by ESD (Electrostatic Discharge) and EMI leakage, we strongly recommend the use of CE-compliant industrial enclo sure products.

FCC Class A

Note: This equipment has been tested and found to comply with the limits for a Class

A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Opera tion of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.

Technical Support and Assistance

1.

Visit the Advantech web site at www.advantech.com/support where you can find the latest information about the product.

2.

Contact your distributor, sales representative, or Advantech's customer service center for technical support if you need additional assistance. Please have the following information ready before you call:

– Product name and serial number

– Description of your peripheral attachments

– Description of your software (operating system, version, application software, etc.)

– A complete description of the problem

– The exact wording of any error messages iii EKI-7716 Series User Manual

Warnings, Cautions and Notes

Warning!

Warnings indicate conditions, which if not observed, can cause personal injury!

Caution!

Cautions are included to help you avoid damaging hardware or losing data. e.g.

There is a danger of a new battery exploding if it is incorrectly installed.

Do not attempt to recharge, force open, or heat the battery. Replace the battery only with the same or equivalent type recommended by the man ufacturer. Discard used batteries according to the manufacturer's instructions.

Note!

Notes provide optional additional information.

Document Feedback

To assist us in making improvements to this manual, we would welcome comments and constructive criticism. Please send all such - in writing to: support@advant ech.com

Packing List

Before setting up the system, check that the items listed below are included and in good condition. If any item does not accord with the table, please contact your dealer immediately.

 1 x Industrial Ethernet Switch

 1 x DIN-Rail mounting Bracket and Screws

 1 x Wall-mounting Bracket

EKI-7716 Series User Manual iv

Safety Instructions

1.

Read these safety instructions carefully.

2.

Keep this User Manual for later reference.

3.

Disconnect this equipment from any AC outlet before cleaning. Use a damp cloth. Do not use liquid or spray detergents for cleaning.

4.

For plug-in equipment, the power outlet socket must be located near the equip ment and must be easily accessible.

5.

Keep this equipment away from humidity.

6.

Put this equipment on a reliable surface during installation. Dropping it or letting it fall may cause damage.

7.

The openings on the enclosure are for air convection. Protect the equipment from overheating. DO NOT COVER THE OPENINGS.

8.

Make sure the voltage of the power source is correct before connecting the equipment to the power outlet.

9.

Position the power cord so that people cannot step on it. Do not place anything over the power cord.

10.

All cautions and warnings on the equipment should be noted.

11.

If the equipment is not used for a long time, disconnect it from the power source to avoid damage by transient overvoltage.

12.

Never pour any liquid into an opening. This may cause fire or electrical shock.

13.

Never open the equipment. For safety reasons, the equipment should be opened only by qualified service personnel.

14.

If one of the following situations arises, get the equipment checked by service personnel:

15.

The power cord or plug is damaged.

16.

Liquid has penetrated into the equipment.

17.

The equipment has been exposed to moisture.

18.

The equipment does not work well, or you cannot get it to work according to the user's manual.

19.

The equipment has been dropped and damaged.

20.

The equipment has obvious signs of breakage.

21.

DO NOT LEAVE THIS EQUIPMENT IN AN ENVIRONMENT WHERE THE

STORAGE TEMPERATURE MAY GO -40°C (-40°F) ~ 85°C (185°F). THIS

COULD DAMAGE THE EQUIPMENT. THE EQUIPMENT SHOULD BE IN A

CONTROLLED ENVIRONMENT.

22.

CAUTION: DANGER OF EXPLOSION IF BATTERY IS INCORRECTLY

REPLACED. REPLACE ONLY WITH THE SAME OR EQUIVALENT TYPE

RECOMMENDED BY THE MANUFACTURER, DISCARD USED BATTERIES

ACCORDING TO THE MANUFACTURER'S INSTRUCTIONS.

23.

The sound pressure level at the operator's position according to IEC 704-1:1982 is no more than 70 dB (A).

DISCLAIMER: This set of instructions is given according to IEC 704-1. Advantech disclaims all responsibility for the accuracy of any statements contained herein.

v EKI-7716 Series User Manual

Wichtige Sicherheishinweise

1.

Bitte lesen sie Sich diese Hinweise sorgfältig durch.

2.

Heben Sie diese Anleitung für den späteren Gebrauch auf.

3.

Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie

Keine Flüssig-oder Aerosolreiniger. Am besten dient ein angefeuchtetes Tuch zur Reinigung.

4.

Die NetzanschluBsteckdose soll nahe dem Gerät angebracht und leicht zugänglich sein.

5.

Das Gerät ist vor Feuchtigkeit zu schützen.

6.

Bei der Aufstellung des Gerätes ist auf sicheren Stand zu achten. Ein Kippen oder Fallen könnte Verletzungen hervorrufen.

7.

Die Belüftungsöffnungen dienen zur Luftzirkulation die das Gerät vor über hitzung schützt. Sorgen Sie dafür, daB diese Öffnungen nicht abgedeckt werden.

8.

Beachten Sie beim. AnschluB an das Stromnetz die AnschluBwerte.

9.

Verlegen Sie die NetzanschluBleitung so, daB niemand darüber fallen kann. Es sollte auch nichts auf der Leitung abgestellt werden.

10.

Alle Hinweise und Warnungen die sich am Geräten befinden sind zu beachten.

11.

Wird das Gerät über einen längeren Zeitraum nicht benutzt, sollten Sie es vom

Stromnetz trennen. Somit wird im Falle einer Überspannung eine Beschädigung vermieden.

12.

Durch die Lüftungsöffnungen dürfen niemals Gegenstände oder Flüssigkeiten in das Gerät gelangen. Dies könnte einen Brand bzw. elektrischen Schlag aus lösen.

13.

Öffnen Sie niemals das Gerät. Das Gerät darf aus Gründen der elektrischen

Sicherheit nur von authorisiertem Servicepersonal geöffnet werden.

14.

Wenn folgende Situationen auftreten ist das Gerät vom Stromnetz zu trennen und von einer qualifizierten Servicestelle zu überprüfen:

15.

Netzkabel oder Netzstecker sind beschädigt.

16.

Flüssigkeit ist in das Gerät eingedrungen.

17.

Das Gerät war Feuchtigkeit ausgesetzt.

18.

Wenn das Gerät nicht der Bedienungsanleitung entsprechend funktioniert oder

Sie mit Hilfe dieser Anleitung keine Verbesserung erzielen.

19.

Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt.

20.

Wenn das Gerät deutliche Anzeichen eines Defektes aufweist.

21.

VOSICHT: Explisionsgefahr bei unsachgemaben Austausch der Batterie.Ersatz nur durch densellben order einem vom Hersteller empfohlene-mahnlichen Typ.

Entsorgung gebrauchter Batterien navh Angaben des Herstellers.

22.

ACHTUNG: Es besteht die Explosionsgefahr, falls die Batterie auf nicht fachmännische Weise gewechselt wird. Verfangen Sie die Batterie nur gleicher oder entsprechender Type, wie vom Hersteller empfohlen. Entsorgen Sie Batterien nach Anweisung des Herstellers.

23.

Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt

70dB(A) oder weiger.

Haftungsausschluss: Die Bedienungsanleitungen wurden entsprechend der IEC-

704-1 erstellt. Advantech lehnt jegliche Verantwortung für die Richtigkeit der in die sem Zusammenhang getätigten Aussagen ab.

EKI-7716 Series User Manual vi

Safety Precaution - Static Electricity

Static electricity can cause bodily harm or damage electronic devices. To avoid dam age, keep static-sensitive devices in the static-protective packaging until the installa tion period. The following guidelines are also recommended:

 Wear a grounded wrist or ankle strap and use gloves to prevent direct contact to the device before servicing the device. Avoid nylon gloves or work clothes, which tend to build up a charge.

 Always disconnect the power from the device before servicing it.

 Before plugging a cable into any port, discharge the voltage stored on the cable by touching the electrical contacts to the ground surface.

vii EKI-7716 Series User Manual

Contents

Chapter 1

Product Overview

................................1

1.1

1.2

1.3

Specifications............................................................................................ 2

Hardware Views........................................................................................ 3

1.2.1 Front View..................................................................................... 3

1.2.2 Rear View ..................................................................................... 5

1.2.3 Top View....................................................................................... 6

Dimensions ............................................................................................... 6

Chapter 2

Switch Installation

...............................7

2.1

2.2

2.3

2.4

2.5

2.6

2.7

2.8

Installation Guidelines............................................................................... 8

2.1.1 Connecting Hardware ................................................................... 8

Verifying Switch Operation........................................................................ 8

Installing the Switch .................................................................................. 8

2.3.1 DIN Rail Mounting......................................................................... 8

2.3.2 Wall-Mounting............................................................................. 10

Installing and Removing SFP Modules ................................................... 12

2.4.1 Installing SFP Modules ............................................................... 13

2.4.2 Removing SFP Modules ............................................................. 14

Connecting the Switch to Ethernet Ports ................................................ 15

2.5.1 RJ45 Ethernet Cable Wiring ....................................................... 15

Connecting the Switch to Console Port................................................... 16

Power Supply Installation........................................................................ 17

2.7.1 Overview..................................................................................... 17

2.7.2 Considerations............................................................................ 18

2.7.3 Grounding the Device ................................................................. 18

2.7.4 Wiring a Relay Contact ............................................................... 19

2.7.5 Wiring the Power Inputs.............................................................. 20

Reset Button ........................................................................................... 21

Chapter 3

Configuration Utility

..........................22

3.1

3.2

3.3

First Time Setup...................................................................................... 23

3.1.1 Overview..................................................................................... 23

3.1.2 Introduction ................................................................................. 23

3.1.3 Administrative Interface Access.................................................. 23

3.1.4 Using the Graphical (Web) Interface........................................... 24

3.1.5 Configuring the Switch for Network Access ................................ 24

3.1.6 Configuring the Ethernet Ports.................................................... 25

Command Line Interface Configuration .................................................. 26

3.2.1 Introduction to Command-Line Interface (CLI)............................ 26

3.2.2 Accessing the CLI....................................................................... 26

Web Browser Configuration .................................................................... 27

3.3.1 Preparing for Web Configuration ................................................ 27

3.3.2 System Login .............................................................................. 27

Chapter 4

Managing Switch

...............................28

4.1

4.2

Log In ...................................................................................................... 29

Recommended Practices........................................................................ 29

4.2.1 Changing Default Password ....................................................... 29

EKI-7716 Series User Manual viii

4.3

4.4

4.5

4.6

4.7

4.8

4.9

Monitoring ............................................................................................... 30

4.3.1 Device Information...................................................................... 30

4.3.2 Logging Message........................................................................ 31

4.3.3 Port Monitoring............................................................................ 32

4.3.4 Link Aggregation......................................................................... 34

4.3.5 LLDP Statistics............................................................................ 34

4.3.6 IGMP Statistics ........................................................................... 35

4.3.7 MLD Statistics............................................................................. 36

System .................................................................................................... 38

4.4.1 IP Settings................................................................................... 38

4.4.2 IPv6 Settings............................................................................... 39

4.4.3 DHCP Client Option 82............................................................... 39

4.4.4 DHCP Auto Provision.................................................................. 41

4.4.5 Management VLAN..................................................................... 41

4.4.6 System Time............................................................................... 42

4.4.7 Network Port ............................................................................... 43

L2 Switching............................................................................................ 45

4.5.1 Port Configuration....................................................................... 45

4.5.2 Port Mirror................................................................................... 46

4.5.3 Link Aggregation......................................................................... 47

4.5.4 802.1Q VLAN.............................................................................. 51

4.5.5 Q-in-Q ......................................................................................... 55

4.5.6 GARP.......................................................................................... 57

4.5.7 802.3az EEE............................................................................... 58

4.5.8 Multicast...................................................................................... 59

4.5.9 Jumbo Frame.............................................................................. 64

4.5.10 Spanning Tree ............................................................................ 64

4.5.11 X-Ring Elite................................................................................. 70

4.5.12 X-Ring Pro .................................................................................. 71

4.5.13 Loopback Detection .................................................................... 74

4.5.14 ERPS .......................................................................................... 75

MAC Address Table................................................................................ 77

4.6.1 Static MAC.................................................................................. 77

4.6.2 MAC Aging Time......................................................................... 77

4.6.3 Dynamic Forwarding Table......................................................... 78

Security ................................................................................................... 79

4.7.1 Storm Control.............................................................................. 79

4.7.2 Port Security ............................................................................... 80

4.7.3 Protected Ports ........................................................................... 81

4.7.4 DoS Prevention........................................................................... 81

4.7.5 Applications................................................................................. 84

4.7.6 802.1x ......................................................................................... 86

4.7.7 IP Security................................................................................... 87

4.7.8 Security Login ............................................................................. 89

4.7.9 Access Control List ..................................................................... 91

4.7.10 IP Source Guard ......................................................................... 94

4.7.11 DHCP Snooping.......................................................................... 96

4.7.12 ARP Spoofing ............................................................................. 99

QoS....................................................................................................... 100

4.8.1 General ..................................................................................... 100

4.8.2 QoS Basic Mode....................................................................... 105

4.8.3 Rate Limit.................................................................................. 107

4.8.4 Bandwidth Guarantee ............................................................... 109

Management ......................................................................................... 111

4.9.1 LLDP......................................................................................... 111

4.9.2 SNMP........................................................................................ 115

4.9.3 Power Over Ethernet ................................................................ 118

4.9.4 TCP Modbus Settings............................................................... 120

4.9.5 DHCP Server ............................................................................ 121

4.9.6 SMTP Client.............................................................................. 125

ix EKI-7716 Series User Manual

4.10

4.11

4.12

4.9.7 RMON....................................................................................... 127

4.9.8 NTP Server............................................................................... 131

Diagnostics ........................................................................................... 132

4.10.1 Cable Diagnostics..................................................................... 132

4.10.2 Ping Test................................................................................... 132

4.10.3 IPv6 Ping Test .......................................................................... 133

4.10.4 System Log............................................................................... 135

4.10.5 DDM.......................................................................................... 137

4.10.6 LED Indication .......................................................................... 138

Tools ..................................................................................................... 139

4.11.1 IXM ........................................................................................... 139

4.11.2 Backup Manager....................................................................... 139

4.11.3 Upgrade Manager..................................................................... 140

4.11.4 Dual Image ............................................................................... 141

4.11.5 Save Configuration ................................................................... 142

4.11.6 User Account ............................................................................ 142

4.11.7 N-Key....................................................................................... 143

4.11.8 Reset System ........................................................................... 143

4.11.9 Reboot Device .......................................................................... 143

Modbus/TCP Mapping .......................................................................... 144

4.12.1 Modbus/TCP Mapping Table.................................................... 144

Chapter 5 Troubleshooting

.............................. 156

5.1

Troubleshooting .................................................................................... 157

EKI-7716 Series User Manual x

List of Figures

Figure 4.7

Figure 4.8

Figure 4.9

Figure 4.10

Figure 4.11

Figure 4.12

Figure 4.13

Figure 4.14

Figure 4.15

Figure 4.16

Figure 4.17

Figure 4.18

Figure 4.19

Figure 4.20

Figure 4.21

Figure 4.22

Figure 4.23

Figure 4.24

Figure 4.25

Figure 4.26

Figure 4.27

Figure 4.28

Figure 4.29

Figure 4.30

Figure 2.13

Figure 2.14

Figure 2.15

Figure 2.16

Figure 2.17

Figure 2.18

Figure 2.19

Figure 2.20

Figure 2.21

Figure 2.22

Figure 4.1

Figure 4.2

Figure 4.3

Figure 4.4

Figure 4.5

Figure 4.6

Figure 1.1

Figure 1.2

Figure 1.3

Figure 1.4

Figure 2.1

Figure 2.2

Figure 2.3

Figure 2.4

Figure 2.5

Figure 2.6

Figure 2.7

Figure 2.8

Figure 2.9

Figure 2.10

Figure 2.11

Figure 2.12

Front View ..................................................................................................................... 3

System LED Panel ........................................................................................................ 4

Rear View ...................................................................................................................... 5

Top View........................................................................................................................ 6

Installing the DIN-Rail Mounting Kit............................................................................... 9

Correctly Installed DIN Rail Kit ...................................................................................... 9

Removing the DIN-Rail................................................................................................ 10

Installing Wall Mount Plates ........................................................................................ 11

Securing Wall Mounting Screws.................................................................................. 11

Wall Mount Installation ................................................................................................ 12

Removing the Dust Plug from an SFP Slot ................................................................. 13

Installing an SFP Transceiver...................................................................................... 13

Attaching a Fiber Optic Cable to a Transceiver........................................................... 14

Removing a Fiber Optic Cable to a Transceiver.......................................................... 14

Removing an SFP Transceiver.................................................................................... 14

Ethernet Plug & Connector Pin Position...................................................................... 15

Serial Console Cable................................................................................................... 16

DB 9 Pin Position......................................................................................................... 16

Pin Assignment............................................................................................................ 16

Power Wiring for EKI-7716 Series............................................................................... 17

Grounding Connection................................................................................................. 19

Terminal Receptor: Relay Contact .............................................................................. 19

Terminal Receptor: Power Input Contacts................................................................... 20

Removing a Terminal Block......................................................................................... 20

Installing DC Wires in a Terminal Block ...................................................................... 21

Securing a Terminal Block to a Receptor .................................................................... 21

Login Screen ............................................................................................................... 29

Changing a Default Password ..................................................................................... 30

Monitoring > Device Information.................................................................................. 30

Monitoring > Logging Message ................................................................................... 31

Monitoring > Logging Information................................................................................ 32

Monitoring > Logging Message ................................................................................... 32

Monitoring > Port Monitoring > Port Statistics ............................................................. 32

Monitoring > Port Monitoring > IF MIB Counters ......................................................... 33

Monitoring > Port Monitoring > Ether-Like MIB Counters............................................ 33

Monitoring > Port Monitoring > Ether-Like MIB Counters............................................ 33

Monitoring > Port Monitoring > Port Utilization ............................................................ 33

Monitoring > Port Monitoring > Port Error Disable....................................................... 34

Monitoring > Link Aggregation..................................................................................... 34

Monitoring > LLDP Statistics ....................................................................................... 35

Monitoring > LLDP Port Statistics................................................................................ 35

Monitoring > IGMP Statistics ....................................................................................... 36

Monitoring > MLD Statistics......................................................................................... 37

System > IP Settings ................................................................................................... 38

System > IP Address Information................................................................................ 38

System > IPv6 Settings ............................................................................................... 39

System > IPv6 Information .......................................................................................... 39

System > DHCP Client Option 82................................................................................ 40

System > DHCP Client Option 82 Information............................................................. 41

System > DHCP Auto Provision .................................................................................. 41

System > DHCP Auto Provision Information ............................................................... 41

System > Management VLAN ..................................................................................... 42

System > System Time................................................................................................ 42

System > System Time Information............................................................................. 43

System > Network Port................................................................................................ 43

L2 Switching > Port Configuration ............................................................................... 45

xi EKI-7716 Series User Manual

Figure 4.63

Figure 4.64

Figure 4.65

Figure 4.66

Figure 4.67

Figure 4.68

Figure 4.69

Figure 4.70

Figure 4.71

Figure 4.72

Figure 4.73

Figure 4.74

Figure 4.75

Figure 4.76

Figure 4.77

Figure 4.78

Figure 4.79

Figure 4.80

Figure 4.81

Figure 4.82

Figure 4.83

Figure 4.84

Figure 4.85

Figure 4.86

Figure 4.87

Figure 4.88

Figure 4.89

Figure 4.47

Figure 4.48

Figure 4.49

Figure 4.50

Figure 4.51

Figure 4.52

Figure 4.53

Figure 4.54

Figure 4.55

Figure 4.56

Figure 4.57

Figure 4.58

Figure 4.59

Figure 4.60

Figure 4.61

Figure 4.62

Figure 4.31

Figure 4.32

Figure 4.33

Figure 4.34

Figure 4.35

Figure 4.36

Figure 4.37

Figure 4.38

Figure 4.39

Figure 4.40

Figure 4.41

Figure 4.42

Figure 4.43

Figure 4.44

Figure 4.45

Figure 4.46

L2 Switching > Port Name Settings............................................................................. 45

L2 Switching > Port Status .......................................................................................... 46

L2 Switching > Port Mirror ........................................................................................... 46

L2 Switching > RSPAN................................................................................................ 47

L2 Switching > Mirror Status........................................................................................ 47

L2 Switching > Link Aggregation > Load Balance ....................................................... 47

L2 Switching > Link Aggregation > Load Balance Information .................................... 48

L2 Switching > Link Aggregation > LAG Management................................................ 48

L2 Switching > Link Aggregation > LAG Management Information............................. 49

L2 Switching > Link Aggregation > LAG Port Settings ................................................ 49

L2 Switching > Link Aggregation > LAG Port Status ................................................... 50

L2 Switching > Link Aggregation > LACP Priority Settings ......................................... 50

L2 Switching > Link Aggregation > LACP Port Settings.............................................. 50

L2 Switching > Link Aggregation > LACP Port Information Settings........................... 51

L2 Switching > 802.1Q VLAN > VLAN Management .................................................. 52

L2 Switching > 802.1Q VLAN > VLAN Table .............................................................. 52

L2 Switching > 802.1Q VLAN > PVID Settings ........................................................... 52

L2 Switching > 802.1Q VLAN > Port to VLAN............................................................. 54

L2 Switching > 802.1Q VLAN > Port-VLAN Mapping.................................................. 55

L2 Switching > 802.1Q VLAN > RSPAN VLAN Mapping ............................................ 55

L2 Switching > Q-in-Q > Global Settings..................................................................... 56

L2 Switching > Q-in-Q > Port Settings......................................................................... 56

L2 Switching > QinQ Port Information ......................................................................... 57

L2 Switching > GARP > GARP Settings...................................................................... 57

L2 Switching > GARP > GVRP Settings...................................................................... 58

L2 Switching > GARP > GMRP Settings ..................................................................... 58

L2 Switching > 802.3az EEE ....................................................................................... 59

L2 Switching > Multicast > Multicast Filtering.............................................................. 59

L2 Switching > Multicast > IGMP Snooping > IGMP Settings ..................................... 60

L2 Switching > Multicast > IGMP Snooping > IGMP Snooping Information................ 60

L2 Switching > Multicast > IGMP Snooping > IGMP Querier ...................................... 60

L2 Switching > Multicast > IGMP Snooping > IGMP Querier Status........................... 61

L2 Switching > Multicast > IGMP Snooping > IGMP Static Groups ............................ 61

L2 Switching > Multicast > IGMP Snooping > Multicast Groups ................................. 61

L2 Switching > Multicast > IGMP Snooping > Router Ports ........................................ 61

L2 Switching > Multicast > MLD Snooping > MLD Settings ........................................ 62

L2 Switching > Multicast > MLD Snooping > MLD Snooping Information ................... 62

L2 Switching > Multicast > MLD Snooping > MLD Snooping Table ............................ 62

L2 Switching > Multicast > MLD Snooping > MLD Querier ......................................... 63

L2 Switching > Multicast > MLD Snooping > MLD Static Group ................................. 63

L2 Switching > Multicast > MLD Snooping > Multicast Groups ................................... 64

L2 Switching > Multicast > MLD Snooping > Router Ports.......................................... 64

L2 Switching > Jumbo Frame...................................................................................... 64

L2 Switching > Spanning Tree > STP Global Settings................................................ 65

L2 Switching > Spanning Tree > STP Information ...................................................... 65

L2 Switching > Spanning Tree > STP Port Settings.................................................... 66

L2 Switching > Spanning Tree > STP Bridge Settings................................................ 67

L2 Switching > Spanning Tree > STP Port Advanced Settings................................... 67

L2 Switching > Spanning Tree > STP Port Status....................................................... 68

L2 Switching > Spanning Tree > MST Config Identification ........................................ 68

L2 Switching > Spanning Tree > MST ID Settings ...................................................... 69

L2 Switching > Spanning Tree > MSTI Priority Settings.............................................. 69

L2 Switching > Spanning Tree > STP Bridge Status................................................... 70

L2 Switching > Spanning Tree > MSTI Port Advanced settings.................................. 70

L2 Switching > Spanning Tree > STP Statistics.......................................................... 70

L2 Switching > X-Ring Elite > X-Ring Elite Settings .................................................... 71

L2 Switching > X-Ring Elite > X-Ring Elite Groups ..................................................... 71

L2 Switching > X-Ring Pro > X-Ring Pro Settings....................................................... 72

L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro Groups Settings........ 72

EKI-7716 Series User Manual xii

Figure 4.90

Figure 4.91

Figure 4.92

Figure 4.93

Figure 4.94

Figure 4.95

Figure 4.96

Figure 4.97

L2 Switching > X-Ring Pro > X-Ring Pro Groups > Chain Settings............................. 72

L2 Switching > X-Ring Pro > X-Ring Pro Groups > Couple Setting ............................ 73

L2 Switching > X-Ring Pro > X-Ring Pro Groups > Pair Settings................................ 73

L2 Switching > X-Ring Pro > X-Ring Pro Groups > RPair Settings............................. 73

L2 Switching > Loopback Detection > Global Settings................................................ 74

L2 Switching > Loopback Detection > Loopback Detection Global Information .......... 74

L2 Switching > Loopback Detection > Port Settings.................................................... 75

L2 Switching > ERPS > ERPS Settings ...................................................................... 75

Figure 4.98

Figure 4.99

L2 Switching > ERPS > ERPS Groups........................................................................ 76

MAC Address Table > Static MAC .............................................................................. 77

Figure 4.100

MAC Address Table > Static MAC Status ................................................................... 77

Figure 4.101

MAC Address Table > MAC Aging Time ..................................................................... 77

Figure 4.102

MAC Address Table > Dynamic Forwarding Table ..................................................... 78

Figure 4.103

MAC Address Table > MAC Address Information ....................................................... 78

Figure 4.104

Security > Storm Control > Global Settings................................................................. 79

Figure 4.105

Security > Storm Control > Storm Control Global Information..................................... 79

Figure 4.106

Security > Storm Control > Port Settings..................................................................... 80

Figure 4.107

Security > Storm Control > Storm Control Port Information ........................................ 80

Figure 4.108

Security > Port Security............................................................................................... 81

Figure 4.109

Security > Protected Ports........................................................................................... 81

Figure 4.110

Security > DoS Prevention > DoS Global Settings...................................................... 82

Figure 4.111

Security > Storm Control > DoS Global Information.................................................... 83

Figure 4.112

Security > DoS Prevention > DoS Port Settings.......................................................... 84

Figure 4.113

Security > Applications > TELNET .............................................................................. 84

Figure 4.114

Security > Applications > SSH..................................................................................... 85

Figure 4.115

Security > Applications > HTTP................................................................................... 85

Figure 4.116

Security > Applications > HTTPS ................................................................................ 86

Figure 4.117

Security > 802.1x > 802.1x Global Settings ................................................................ 86

Figure 4.118

Security > 802.1x > 802.1x Information....................................................................... 87

Figure 4.119

Security > 802.1x > 802.1x Port Configuration............................................................ 87

Figure 4.120

Security > IP Security > Global Settings...................................................................... 88

Figure 4.121

Security > IP Security > Entry Settings........................................................................ 88

Figure 4.122

Security > Security Login > Global Settings > Global Settings.................................... 89

Figure 4.123

Security > Security Login > Global Settings > RADIUS Settings................................. 89

Figure 4.124

Security > Security Login > Global Settings > TACACS Settings................................ 90

Figure 4.125

Security > Security Login > Global Settings > Global Information............................... 90

Figure 4.126

Security > Security Login > Access Control Settings > Security Login Type Settings. 90

Figure 4.127

Security > Security Login > Access Control Settings > Security Login Type Settings. 91

Figure 4.128

Security > Security Login > Access Control Settings > Access Control Information ... 91

Figure 4.129

Security > Access Control List > MAC ACL > Entry Settings ...................................... 92

Figure 4.130

Security > Access Control List > MAC ACL > Entry List.............................................. 93

Figure 4.131

Security > Access Control List > IP ACL > Entry Settings........................................... 93

Figure 4.132

Security > Access Control List > IP ACL > Entry List .................................................. 94

Figure 4.133

Security > IP Source Guard > Global Settings ............................................................ 94

Figure 4.134

Security > IP Source Guard > Global Information ....................................................... 95

Figure 4.135

Security > IP Source Guard > Entry Settings .............................................................. 95

Figure 4.136

Security > IP Source Guard > Entry Information ......................................................... 95

Figure 4.137

Security > DHCP Snooping > Global Settings > DHCP Snooping State Settings....... 96

Figure 4.138

Security > DHCP Snooping > Global Settings > DHCP Snooping Port Settings......... 96

Figure 4.139

Security > DHCP Snooping > Global Settings > DHCP Snooping Binding Port Settings

96

Figure 4.140

Security > DHCP Snooping > Global Settings > DHCP Snooping Information ........... 97

Figure 4.141

Security > DHCP Snooping > Entry Settings > Entry Information ............................... 97

Figure 4.142

Security > DHCP Snooping > L2-Relay Settings......................................................... 97

Figure 4.143

Security > DHCP Snooping > L2-Relay Port Settings ................................................. 97

Figure 4.144

Security > DHCP Snooping > L2-Relay VLAN Settings .............................................. 98

Figure 4.145

Security > DHCP Snooping > Circuit ID Settings ........................................................ 98

Figure 4.146

Security > DHCP Snooping > L2 Relay Information.................................................... 98

Figure 4.147

Security > ARP Spoofing............................................................................................. 99

Figure 4.148

Security > Entry Information ........................................................................................ 99

xiii EKI-7716 Series User Manual

Figure 4.149

QoS > General > QoS Properties.............................................................................. 100

Figure 4.150

QoS > General > QoS Settings ................................................................................. 100

Figure 4.151

QoS > General > QoS Status.................................................................................... 101

Figure 4.152

QoS > General > QoS Scheduling ............................................................................ 102

Figure 4.153

QoS > General > QoS Information ............................................................................ 102

Figure 4.154

QoS > General > CoS Mapping ................................................................................ 103

Figure 4.155

QoS > General > CoS Mapping ................................................................................ 103

Figure 4.156

QoS > General > CoS Mapping ................................................................................ 104

Figure 4.157

QoS > General > DSCP Mapping ............................................................................. 104

Figure 4.158

QoS > General > IP Precedence Mapping................................................................ 105

Figure 4.159

QoS > QoS Basic Mode > Global Settings................................................................ 106

Figure 4.160

QoS > General > Global Settings.............................................................................. 106

Figure 4.161

QoS > QoS Basic Mode > Port Settings ................................................................... 106

Figure 4.162

QoS > Rate Limit > Ingress Bandwidth Control......................................................... 107

Figure 4.163

QoS > Rate Limit > Ingress Bandwidth Control......................................................... 107

Figure 4.164

QoS > Rate Limit > Ingress Bandwidth Control......................................................... 107

Figure 4.165

QoS > Rate Limit > Egress Bandwidth Control ......................................................... 108

Figure 4.166

QoS > Rate Limit > Egress Bandwidth Control ......................................................... 108

Figure 4.167

QoS > Rate Limit > Egress Queue............................................................................ 108

Figure 4.168

QoS > Bandwidth Guarantee > Global Settings........................................................ 109

Figure 4.169

QoS > Bandwidth Guarantee > Global Settings........................................................ 110

Figure 4.170

QoS > Bandwidth Guarantee > Utilization................................................................. 110

Figure 4.171

Management > LLDP > LLDP System Settings ........................................................ 111

Figure 4.172

Management > LLDP > LLDP System Settings ........................................................ 111

Figure 4.173

Management > LLDP > LLDP Port Settings > LLDP Port Configuration................... 112

Figure 4.174

Management > LLDP > LLDP Port Settings > Optional TLVs Selection................... 112

Figure 4.175

Management > LLDP > LLDP Port Settings > VLAN Name TLV VLAN Selection.... 113

Figure 4.176

Management > LLDP > LLDP Local Device Info....................................................... 114

Figure 4.177

Management > LLDP > LLDP Local Device Info....................................................... 114

Figure 4.178

Management > LLDP > LLDP Remote Device Info................................................... 114

Figure 4.179

Management > LLDP > LLDP Overloading............................................................... 115

Figure 4.180

Management > SNMP > SNMP Settings .................................................................. 115

Figure 4.181

Management > SNMP > SNMP Community ............................................................. 116

Figure 4.182

Management > SNMP > SNMP Community ............................................................. 116

Figure 4.183

Management > SNMP > SNMPv3 EngineID............................................................. 116

Figure 4.184

Management > SNMP > SNMPv3 Settings............................................................... 117

Figure 4.185

Management > SNMP > SNMP Trap ........................................................................ 118

Figure 4.186

Management > Power Over Ethernet > PoE System Settings.................................. 119

Figure 4.187

Management > Power Over Ethernet > PoE Port Settings ....................................... 119

Figure 4.188

Management > TCP Modbus Settings > TCP Modbus Settings ............................... 120

Figure 4.189

Management > TCP Modbus Settings > TCP Modbus Settings ............................... 120

Figure 4.190

Management > DHCP Server > Status Settings ....................................................... 121

Figure 4.191

Management > DHCP Server > Global Settings ....................................................... 121

Figure 4.192

Management > DHCP Server > Global Settings ....................................................... 122

Figure 4.193

Management > DHCP Server > Port Settings........................................................... 122

Figure 4.194

Management > DHCP Server > Option 82 Settings.................................................. 123

Figure 4.195

Management > DHCP Server > Option 82 Settings.................................................. 124

Figure 4.196

Management > DHCP Server > Client MAC Settings ............................................... 124

Figure 4.197

Management > DHCP Server > Lease Entry ............................................................ 125

Figure 4.198

Management > SMTP Client > Global Settings......................................................... 125

Figure 4.199

Management > SMTP Client > Profile Settings > Profile Settings............................. 125

Figure 4.200

Management > SMTP Client > Profile Settings > Profile Target Mail Settings.......... 126

Figure 4.201

Management > DHCP Server > Lease Entry ............................................................ 126

Figure 4.202

Management > SMTP Client > Sending Message .................................................... 127

Figure 4.203

Management > RMON > RMON Statistics................................................................ 127

Figure 4.204

Management > RMON > RMON History ................................................................... 128

Figure 4.205

Management > RMON > RMON Alarm..................................................................... 129

Figure 4.206

Management > RMON > RMON Event ..................................................................... 130

Figure 4.207

Management > NTP Server....................................................................................... 131

Figure 4.208

Diagnostics > Cable Diagnostics............................................................................... 132

EKI-7716 Series User Manual xiv

Figure 4.209

Diagnostics > Ping Test............................................................................................. 132

Figure 4.210

Diagnostics > IPv6 Ping Test..................................................................................... 134

Figure 4.211

Diagnostics > System Log > Logging Service........................................................... 135

Figure 4.212

Diagnostics > System Log > Local Logging .............................................................. 135

Figure 4.213

Diagnostics > System Log > System Log Server ...................................................... 136

Figure 4.214

Diagnostics > DDM > Diagnostic Alarm Settings ...................................................... 137

Figure 4.215

Diagnostics > DDM > DMI INFO ............................................................................... 137

Figure 4.216

Diagnostics > LED Indication..................................................................................... 138

Figure 4.217

Diagnostics > LED Indication..................................................................................... 138

Figure 4.218

Tools > IXM ............................................................................................................... 139

Figure 4.219

Tools > Backup Manager........................................................................................... 140

Figure 4.220

Tools > Upgrade Manager......................................................................................... 141

Figure 4.221

Tools > Dual Image ................................................................................................... 141

Figure 4.222

Tools > User Account ................................................................................................ 142

Figure 4.223

Tools > User Account ................................................................................................ 142

Figure 4.224

Tools > User Account ................................................................................................ 143

Figure 4.225

Tools > N-Key............................................................................................................ 143

Figure 4.226

Tools > N-Key Information......................................................................................... 143

xv EKI-7716 Series User Manual

Chapter

1

Product Overview

1

1.1

Specifications

Specifications Description

Interface

Physical

LED Display

Environment

I/O Port 8 x Ethernet ports + 4 x SFP + 4 x Copper/SFP combo ports

Power Connector 6-pin removable screw terminal (power & relay)

Enclosure Metal Shell

Protection Class IP30

Installation

Dimensions

(W x H x D)

DIN-rail, wall mount

74 x 152 x 105mm (2.91” x 5.98” x 4.13”)

System LED

Port LED

Operating Tem perature

SYS, R.M, PWR1, PWR2, Alarm

Speed, Link, Activity

EKI-7716E-4F4C/EKI-7716G-4F4C: -10°C ~ 60°C

(14°F ~ 140°F)

EKI-7716E-4F4CI/EKI-7716G-4F4CI: -40°C ~ 75°C

(-40°F ~ 167°F)

-40°C ~ 85°C (-40°F ~ 185°F) Storage Tempera ture

Ambient Relative

Humidity

Switch Properties MAC Address

Switch Capacity

10 ~ 95% (non-condensing)

8K-entry

 EKI-7716E: 17.6Gbps

 EKI-7716G: 32Gbps

Power Power

Consumption

Power Input

15W @ 48V (full load)

Certifications Safety

EMC

12~48 V

DC

, redundant dual power input

UL 61010

 EN 61000-4-2

 EN 61000-4-3

 EN 61000-4-4

 EN 61000-4-5

 EN 61000-4-6

 EN 61000-4-8

 EN 50121-4

 NEMA TS2

EMI

Shock

Freefall

Vibration

Railway Track

Side

CE, FCC Class A

IEC 60068-2-27

IEC 60068-2-32

IEC 60068-2-6

EN 50121-4

2 EKI-7716 Series User Manual

1.2

Hardware Views

1.2.1

Front View

1

11

9

12

10

12

EKI-7716E

12

11

10

9

SYS

R.M.

PWR1

PWR2

Alarm

Reset

Console

6

2

11

7

8

9

7

5

10

8

16

6

15

15

LNK/ACT

16

13 14

3

9

3 4 14

4

5

1 2 13

Figure 1.1 Front View

No. Item Description

1 ETH port

2 ETH port

3 ETH port

4 LNK/ACT LED

5 Speed LED

Copper/SFP combo ports x 8

RJ45 combo ports x 4

RJ45 ports x 4

Link activity LED

 Amber: 100M

 Green: 1G

6

System LED panel See “System LED Panel” on page 4 for further details.

7 Reset button Button allows for system soft reset or factory default reset.

8 Console serial port Console cable port to COM port (DB9 male) on computer to

RS232 managed switch (RJ45).

9 ETH port SFP ports x 4

EKI-7716 Series User Manual 3

1.2.1.1

System LED Panel

No. LED Name

1 SYS

2 R.M.

3 PWR1

4 PWR2

5 Alarm

SYS

R.M.

PWR1

PWR2

Alarm

1

2

3

4

5

Figure 1.2 System LED Panel

LED Color Description

Solid green

Off

Solid green

Solid green

Off

Solid green

System is operating normally

System is powered down / system crash / operation initiating

Active when determining ring master

Powered up

Powered down or not installed

Powered up

Off

Solid red

Power down or not installed

Defined major policies are detected

Blinking Red Defined minor policies are detected

Off Powered off or system is operating normally

4 EKI-7716 Series User Manual

1.2.2

Rear View

1

2

1

Figure 1.3 Rear View

No. Item Description

1 Wall mounting holes Screw holes (x6) used in the installation of a wall mounting plate

2 DIN-Rail mounting plate

Mounting plate used for the installation to a standard DIN rail

EKI-7716 Series User Manual 5

1.2.3

Top View

1

V2+V2V1+V1-

1A@24V

PWR2 P-Fail PWR1

DC12-48V

2

No. Item

1 Ground terminal

2 Terminal block

1.3

Dimensions

83.50 [3.287]

Figure 1.4 Top View

Description

Screw terminal used to ground chassis

Connect cabling for power and alarm wiring

42.25 [1.781]

74 [2.913]

9.90 [0.390]

114 [4.488]

105 [4.134]

36.25

[1.427]

40.64

[1.600]

37 [1.457]

35 [1.378]

19.50

[0.768]

114 [4.488]

6-M3xP0.5

Figure 1.5 Dimensions

6 EKI-7716 Series User Manual

Chapter

2

Switch Installation

2

2.1

Installation Guidelines

The following guidelines are provided to optimize the device performance. Review the guidelines before installing the device.

 Make sure cabling is away from sources of electrical noise. Radios, power lines, and fluorescent lighting fixtures can interference with the device performance.

 Make sure the cabling is positioned away from equipment that can damage the cables.

Operating environment is within the ranges listed range, see “Specifications” on page 2.

 Relative humidity around the switch does not exceed 95 percent (noncondens ing).

 Altitude at the installation site is not higher than 10,000 feet.

 In 10/100 and 10/100/1000 fixed port devices, the cable length from the switch to connected devices can not exceed 100 meters (328 feet).

 Make sure airflow around the switch and respective vents is unrestricted. With out proper airflow the switch can overheat. To prevent performance degredation and damage to the switch, make sure there is clerance at the top and bottom and around the exhaust vents.

2.1.1

Connecting Hardware

In this instruction, it will explain how to find a proper location for your Modbus Gate ways, and how to connect to the network, hock up the power cable, and connect to the EKI-7716 Series.

2.2

Verifying Switch Operation

Before installing the device in a rack or on a wall, power on the switch to verify that the switch passes the power-on self-test (POST). To connect the cabling to the power

source see “Power Supply Installation” on page 17.

At startup (POST), the System LED blinks green, while the remaining LEDs are a solidy green. Once the switch passes POST self-test, the System LED turns green.

The other LEDs turn off and return to their operating status. If the switch fails POST, the System LED switches to an amber state.

After a successful self-test, power down the switch and disconnect the power cabling.

The switch is now ready for installation on its final location.

2.3

Installing the Switch

2.3.1

DIN Rail Mounting

The DIN rail mount option is the quickest installation option. Additionally, it optimizes the use of rail space.

The metal DIN rail kit is secured to the rear of the switch. The device can be mounted onto a standard 35mm (1.37”) x 75 mm (3”) height DIN rail. The devices can be mation.

mounted vertically or horizontally. Refer to the following guidelines for further infor -

Note!

A corrosion-free mounting rail is advisable.

When installing, make sure to allow for enough space to properly install the cabling.

8 EKI-7716 Series User Manual

2.3.1.1

Installing the DIN-Rail Mounting Kit

1.

Position the rear panel of the switch directly in front of the DIN rail, making sure that the top of the DIN rail clip hooks over the top of the DIN rail, as shown in the following illustration.

Warning!

Do not install the DIN rail under or in front of the spring mechanism on the DIN rail clip to prevent damage to the DIN rail clip or the DIN rail.

Make sure the DIN rail is inserted behind the spring mechanism.

2.

Once the DIN rail is seated correctly in the DIN rail clip, press the front of the switch to rotate the switch down and into the release tab on the DIN rail clip.

If seated correctly, the bottom of the DIN rail should be fully inserted in the release tab.

DIN rail clip

DIN rail

DIN rail clip release tab

Figure 2.1 Installing the DIN-Rail Mounting Kit

See the following figure for an illustration of a completed DIN installation proce dure.

EKI-7716 Series User Manual

Figure 2.2 Correctly Installed DIN Rail Kit

9

3.

Grasp the bottom of the switch and slightly rotate it upwards. If there is resis tance, the switch is correctly installed. Otherwise, re-attempt the installation pro cess from the beginning.

2.3.1.2

Removing the DIN-Rail Mounting Kit

1.

Ensure that power is removed from the switch, and disconnect all cables and connectors from the front panel of the switch.

2.

Push down on the top of the DIN rail clip release tab with your finger. As the clip releases, lift the bottom of the switch, as shown in the following illustration.

\

Figure 2.3 Removing the DIN-Rail

2.3.2

Wall-Mounting

The wall mounting option provides better shock and vibration resistance than the DIN rail vertical mount.

Note!

When installing, make sure to allow for enough space to properly install the cabling.

Before the device can be mounted on a wall, you will need to remove the DIN rail plate.

1.

Rotate the device to the rear side and locate the DIN mounting plate.

2.

Remove the screws securing the DIN mounting plate to the rear panel of the switch.

3.

Remove the DIN mounting plate. Store the DIN mounting plate and provided screws for later use.

4.

Align the wall mounting plates on the rear side. The screw holes on the device and the mounting plates must be aligned, see the following illustration.

10 EKI-7716 Series User Manual

5.

Secure the wall mount plates with M3 screws, see the following figure.

Figure 2.4 Installing Wall Mount Plates

Once the wall mounting plates are secure on the device, you will need to attach the wall screws (x6).

6.

Locate the installation site and place the switch against the wall, making sure it is the final installation location.

7.

Use the wall mount plates as a guide to mark the locations of the screw holes.

8.

Drill four holes over the four marked locations on the wall, keeping in mind that the holes must accommodate wall sinks in addition to the screws.

9.

Insert the wall sinks into the walls.

10.

Insert the screws into the wall sinks. Leave a 2 mm gap between the wall and the screw head to allow for wall mount plate insertion.

4.5 mm

2.0 mm

3.0 mm

Figure 2.5 Securing Wall Mounting Screws

Note!

 Make sure the screws dimensions are suitable for use with the wall mounting plate.

 Do not completely tighten the screws into the wall. A final adjust ment may be needed before fully securing the wall mounting plates on the wall.

EKI-7716 Series User Manual 11

11.

Align the wall mount plate over the screws on the wall.

12.

Install the wall mount plate on the screws and slide it forward to lock in place, see the following figure.

2

1

2

Figure 2.6 Wall Mount Installation

13.

Once the device is installed on the wall, tighten the screws to secure the device.

2.4

Installing and Removing SFP Modules

Up to two fiber optic ports are available (dependent on model) for use in the switch.

Refer to the technical specifications for details.

The Gigabit Ethernet ports on the switch are 100/1000Base SFP Fiber ports, which require using the 100M or 1G mini-GBIC fiber transceivers to work properly. Advant ech provides completed transceiver models for different distance requirement.

The concept behind the LC port and cable is quite straight forward. Suppose that you are connecting devices I and II; contrary to electrical signals, optical signals do not require a circuit in order to transmit data. Consequently, one of the optical lines is used to transmit data from device I to device II, and the other optical line is used transmit data from device II to device I, for full-duplex transmission.

Remember to connect the Tx (transmit) port of device I to the Rx (receive) port of device II, and the Rx (receive) port of device I to the Tx (transmit) port of device II. If you make your own cable, we suggest labeling the two sides of the same line with the same letter (A-to-A and B-to-B, as shown below, or A1-to-A2 and B1-to-B2).

Note!

This is a Class 1 Laser/LED product. To avoid causing serious damage to your eyes, do not stare directly into the Laser Beam.

12 EKI-7716 Series User Manual

2.4.1

Installing SFP Modules

To connect the fiber transceiver and LC cable, use the following guidelines:

1.

Remove the dust plug from the fiber optic slot chosen for the SFP transceiver.

Figure 2.7 Removing the Dust Plug from an SFP Slot

Note!

Do not remove the dust plug from the SFP slot if you are not installing the transceiver at this time. The dust plug protects hardware from dust contamination.

2.

Position the SFP transceiver with the handle on top, see the following figure.

3.

Locate the triangular marking in the slot and align it with the bottom of the trans ceiver.

4.

Insert the SFP transceiver into the slot until it clicks into place.

5.

Make sure the module is seated correctly before sliding the module into the slot.

A click sounds when it is locked in place.

Handle

Figure 2.8 Installing an SFP Transceiver

Note!

If you are attaching fiber optic cables to the transceiver, continue with the following step. Otherwise, repeat the previous steps to install the remaining SFP transceivers in the device.

6.

Remove the protective plug from the SFP transceiver.

Note!

Do not remove the dust plug from the transceiver if you are not installing the fiber optic cable at this time. The dust plug protects hardware from dust contamination.

EKI-7716 Series User Manual 13

7.

Insert the fiber cable into the transceiver. The connector snaps into place and locks.

Figure 2.9 Attaching a Fiber Optic Cable to a Transceiver

8.

Repeat the previous procedures to install any additional SFP transceivers in the switch.

The fiber port is now setup.

2.4.2

Removing SFP Modules

To disconnect an LC connector, use the following guidelines:

1.

Press down and hold the locking clips on the upper side of the optic cable.

2.

Pull the optic cable out to release it from the transceiver.

Figure 2.10 Removing a Fiber Optic Cable to a Transceiver

3.

Hold the handle on the transceiver and pull the transceiver out of the slot.

Handle

Figure 2.11 Removing an SFP Transceiver

Note!

Replace the dust plug on the slot if you are not installing a transceiver.

The dust plug protects hardware from dust contamination.

14 EKI-7716 Series User Manual

2.5

Connecting the Switch to Ethernet Ports

2.5.1

RJ45 Ethernet Cable Wiring

For RJ45 connectors, data-quality, twisted pair cabling (rated CAT5 or better) is rec ommended. The connector bodies on the RJ45 Ethernet ports are metallic and con nected to the GND terminal. For best performance, use shielded cabling. Shielded cabling may be used to provide further protection.

Straight-thru Cable Wiring

Pin 1

Pin 2

Pin 3

Pin 6

Pin 1

Pin 2

Pin 3

Pin 6

Cross-over Cable Wiring

Pin 1

Pin 2

Pin 3

Pin 6

Pin 3

Pin 6

Pin 1

Pin 2

8

1

Figure 2.12 Ethernet Plug & Connector Pin Position

Maximum cable length: 100 meters (328 ft.) for 10/100BaseT.

EKI-7716 Series User Manual 15

2.6

Connecting the Switch to Console Port

The industrial switch supports a secondary means of management. By connecting the RJ45 to RS232 serial cable between a COM port on your PC (9-pin D-sub be established.

female) and the switch’s RJ45 (RJ45) port, a wired connection for management can

To terminal or PC

Figure 2.13 Serial Console Cable

5

9

1

6

Figure 2.14 DB 9 Pin Position

DB9 Connector

5

3

NC

NC

NC

NC

2

NC

RJ45 Connector

1 Orange/White

2 Orange

3 Green/White

4 Blue

5 Blue/White

6 Green

7 Brown/White

8 Brown

DB9

Female

RJ45

Male

RXD

TXD

RTS

CTS

DTR

DSR

GND

4

6

5

7

8

2

3

5

4

7

2

8

1

3

6

Figure 2.15 Pin Assignment

TXD

RXD

NC

NC

NC

NC

GND

GND

To console port

16 EKI-7716 Series User Manual

2.7

Power Supply Installation

2.7.1

Overview

Warning!

Power down and disconnect the power cord before servicing or wiring the switch.

Caution!

Do not disconnect modules or cabling unless the power is first switched off.

The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch device.

Caution!

Disconnect the power cord before installation or cable wiring.

The switches can be powered by using the same DC source used to power other devices. A DC voltage range of 12 to 48 V

DC

must be applied between the V1+ termi nal and the V1- terminal (PW1), see the following illustrations. A Class 2 power sup ply is required to maintain a UL60950 panel listing. The chassis ground screw

terminal should be tied to the panel or chassis ground. A redundant power configura tion is supported through a secondary power supply unit to reduce network down time as a result of power loss.

EKI-7716 Series support 12 to 48 V

DC you to connect a backup power source.

. Dual power inputs are supported and allow

Single DC Power Redundant DC Power

P2 P1 P2 P1

One DC Supply

Chassis

GND

(pane)

Chassis

GND

(pane)

Dual DC Supplies

Figure 2.16 Power Wiring for EKI-7716 Series

EKI-7716 Series User Manual 17

2.7.2

Considerations

Take into consideration the following guidelines before wiring the device:

 The Terminal Block (CN1) is suitable for 12-24 AWG (3.31 - 0.205 mm 2 value 7 lb-in.

). Torque

 The cross sectional area of the earthing conductors shall be at least 3.31 mm 2 .

 Calculate the maximum possible current for each power and common wire.

Make sure the power draw is within limits of local electrical code regulations.

 For best practices, route wiring for power and devices on separate paths.

 Do not bundle together wiring with similar electrical characteristics.

 Make sure to separate input and output wiring.

 Label all wiring and cabling to the various devices for more effective manage ment and servicing.

Note!

Routing communications and power wiring through the same conduit may cause signal interference. To avoid interference and signal degra dation, route power and communications wires through separate con duits.

2.7.3

Grounding the Device

Caution!

Do not disconnect modules or cabling unless the power is first switched off.

The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch device.

Caution!

Before connecting the device properly ground the device. Lack of a proper grounding setup may result in a safety risk and could be hazard ous.

Caution!

Do not service equipment or cables during periods of lightning activity.

18 EKI-7716 Series User Manual

Caution!

Do not service any components unless qualified and authorized to do so.

Caution!

Do not block air ventilation holes.

Electromagnetic Interference (EMI) affects the transmission performance of a device.

By properly grounding the device to earth ground through a drain wire, you can setup the best possible noise immunity and emissions.

Connection to

Grounding Point

Drain Wire with Lug

Figure 2.17 Grounding Connection

By connecting the ground terminal by drain wire to earth ground the switch and chas sis can be ground.

Note!

Before applying power to the grounded switch, it is advisable to use a volt meter to ensure there is no voltage difference between the power supply’s negative output terminal and the grounding point on the switch.

2.7.4

Wiring a Relay Contact

The following section details the wiring of the relay output. The terminal block on the

EKI-7716 Series is wired and then installed onto the terminal receptor located on the

EKI-7716 Series.

V2+V2V1+V1DC12-48V

1A@24V

PWR2 P-Fail PWR1

Figure 2.18 Terminal Receptor: Relay Contact

The terminal receptor includes a total of six pins: two for PWR1, two for PWR2 and two for a fault circuit.

EKI-7716 Series User Manual 19

2.7.5

Wiring the Power Inputs

Caution!

Do not disconnect modules or cabling unless the power is first switched off.

The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch devic

Warning!

Power down and disconnect the power cord before servicing or wiring the switch.

There are two power inputs for normal and redundant power configurations. The power input 2 is used for wiring a redundant power configuration. See the following for terminal block connector views.

V2+V2V1+V1DC12-48V

1A@24V

PWR2 P-Fail PWR1

Figure 2.19 Terminal Receptor: Power Input Contacts

To wire the power inputs:

Make sure the power is not connected to the switch or the power converter before proceeding.

1.

Loosen the screws securing terminal block to the terminal block receptor.

2.

Remove the terminal block from the switch.

1A@24V

Figure 2.20 Removing a Terminal Block

3.

Insert a small flat-bladed screwdriver in the V1+/V1- wire-clamp screws, and loosen the screws.

4.

Insert the negative/positive DC wires into the V+/V- terminals of PW1. If setting up power redundancy, connect PW2 in the same manner.

20 EKI-7716 Series User Manual

5.

Tighten the wire-clamp screws to secure the DC wires in place.

Loosening

Wire-clamp

Screws

Securing Wireclamp Screws

1A@24V 1A@24V

Installing DC

Wires

Figure 2.21 Installing DC Wires in a Terminal Block

6.

Align the terminal block over the terminal block receptor on the switch.

7.

Insert the terminal block and press it in until it is flush with the terminal block receptor.

8.

Tighten the screws on the terminal block to secure it to the terminal block recep tor.

If there is no gap between the terminal block and the terminal receptor, the ter minal block is seated correctly.

1A@24V

Figure 2.22 Securing a Terminal Block to a Receptor

2.8

Reset Button

Reset configuration to factory default:

Press and hold Reset button for 5 seconds.

System reboot:

Press and hold Reset button for 2 seconds.

Note!

Do NOT power off the Ethernet switch when loading default settings.

EKI-7716 Series User Manual 21

Chapter

3

Configuration Utility

3

3.1

First Time Setup

3.1.1

Overview

The Industrial Ethernet Managed Switch is a configurable device that facilitates the interconnection of Ethernet devices on an Ethernet network. This includes comput ers, operator interfaces, I/O, controllers, RTUs, PLCs, other switches/hubs or any device that supports the standard IEEE 802.3 protocol.

This switch has all the capabilities of a store and forward Ethernet switch plus advanced management features such as SNMP, RSTP and port mirroring. This man ual details how to configure the various management parameters in this easy to use switch.

3.1.2

Introduction

To take full advantage of all the features and resources available from the switch, it must be configured for your network.

The switch implements Rapid Spanning Tree Protocol (RSTP) and Simple Network

Management Protocol (SNMP) to provide most of the services offered by the switch.

Rapid Spanning Tree Protocol allows managed switches to communicate with each other to ensure that there exists only one active route between each pair of network explanation of how RSTP works is given in the Spanning Tree section.

nodes and provides automatic failover to the next available redundant route. A brief

The switch is capable of communicating with other SNMP capable devices on the network to exchange management information. This statistical/derived information from the network is saved in the Management Information Base (MIB) of the switch.

The MIB is divided into several different information storage groups. These groups will be elaborated in detail in the Management and SNMP information section of this optimize the flow of multicast traffic on your network.

document. The switch implements Internet Group Management Protocol (IGMP) to

The switch supports both port-based and tag-based Virtual LANs for flexible integra tion with VLAN-aware networks with support for VLAN-unaware devices.

3.1.3

Administrative Interface Access

There are several administrative interfaces to the switch:

1.

A graphical web interface accessible via the switch's built-in web server. Both

HTTP and secure HTTPS with SSL are supported.

Note!

This is the recommended method for managing the switch.

2.

A terminal interface via the RS232/USB port or over the network using telnet or

Secure Shell (SSH).

3.

An SNMP interface can be used to read/write many settings.

4.

Command Line Interface (CLI) can be used to read/write most settings. Initial setup must be done using an Ethernet connection (recommended) or the serial port.

EKI-7716 Series User Manual 23

3.1.4

Using the Graphical (Web) Interface

The graphical interface is provided via a web server in the switch and can be accessed via a web browser such as Chrome, Firefox, or Internet Explorer.

Note!

JavaScript must be supported and enabled in your browser for the graphical interface to work correctly.

HTTP and HTTPS (secure HTTP) are supported for access to the web server. By default, only HTTP is enabled. Either or both may be enabled or disabled to secure the switch. (See the Remote Access Security topic in this section.)

To access the graphical interface, enter a URL like HTTP://192.168.1.1 in your browser's address bar. Replace “http” with “https” to use secure http and replace

“192.168.1.1” with your switch's IP address if you've changed it from the factory default.

The web server in the switch uses a signed security certificate. When you access the server via https, you may see a warning dialog indicating that the certificate was future you can choose to install the certificate on your computer.

signed by an unknown authority. This is expected and to avoid this message in the

Note!

This manual describes and depicts the web user interface in detail. The terminal interface is not specifically shown but is basically the same.

3.1.5

Configuring the Switch for Network Access

To control and monitor the switch via the network, it must be configured with basic network settings, including an IP address and subnet mask.

To configure the switch for network access, select [Add Menu Address Here] to reach the System Settings menu. The settings in this menu control the switch's general net work configuration.

 DHCP Enabled/Disabled: The switch can automatically obtain an IP address from a server using the Dynamic Host Configuration Protocol (DHCP). This can speed up initial set up, as the network administrator does not have to find an open IP address.

 IP Address and subnet mask configuration: The IP address for the switch can be changed to a user-defined address along with a customized subnet mask to separate subnets.

Note!

Advanced users can set the IP address to 0.0.0.0 to disable the use of an IP address for additional security. However, any features requiring an

IP address (i.e., web interface, etc.) will no longer be available.

 Default Gateway Selection: A Gateway Address is chosen to be the address of a router that connects two different networks. This can be an IP address or a

Fully Qualified Domain Name (FQDN) such as “domainname.org”.

 NTP Server: The IP address or domain name of an NTP (Network Time Proto col) server from which the switch may retrieve the current time at startup.

Please note that using a domain name requires that at least one domain name server be configured.

24 EKI-7716 Series User Manual

3.1.6

Configuring the Ethernet Ports

The switch comes with default port settings that should allow you to connect to the

Ethernet Ports with out any necessary configuration. Should there be a need to change the name of the ports, negotiation settings or flow control settings, you can

Main menu, and then selecting Main Settings.

do this in the Port Configuration menu. Access this menu by selecting Setup from the

 Port Name: Each port in the managed switch can be identified with a custom name. Specify a name for each port here.

 Admin: Ports can be enabled or disabled in the managed switch. For ports that are disabled, they are virtually non-existent (not visible in terms of switch opera tion or spanning tree algorithm). Choose to enable or disable a port by selecting

Enabled or Disabled, respectively.

 Negotiation: All copper ports and gigabit fiber ports in the managed switch are capable of autonegotiation such that the fastest bandwidth is selected. Choose to enable auto-negotiation or use fixed settings. 100Mbps Fiber ports are Fixed speed only.

 Speed/Duplex/Flow Control: The managed switch accepts three local area net work Ethernet Standards. The first standard, 10BASE-T, runs 10Mbps with twisted pair Ethernet cable between network interfaces. The second local area network standard is 100BASE-T, which runs at 100Mbps over the same twisted pair Ethernet cable. Lastly, there is 100BASE-F, which enables fast Ethernet

(100Mbps) over fiber.

These options are available:

 10h–10 Mbps, Half Duplex

 10f –10 Mbps, Full Duplex

 100h–100 Mbps, Half Duplex

 100f –100 Mbps, Full Duplex

 1000f–1000 Mbps, Full Duplex

On managed switches with gigabit combination ports, those ports with have two rows, a standard row of check boxes and a row labeled “SFP” with radio buttons. The

SFP setting independently sets the speed at which a transceiver will operate if one is ing settings for it.

plugged in. Otherwise, the switch will use the fixed Ethernet port and the correspond -

Note!

When 100f is selected for the SFP of a gigabit combination port, the cor responding fixed Ethernet jack will be disabled unless it is changed back to 1000F.

EKI-7716 Series User Manual 25

3.2

Command Line Interface Configuration

3.2.1

Introduction to Command-Line Interface (CLI)

The command-line interface (CLI) is constructed with an eye toward automation of

CLI-based configuration. The interaction is modeled on that used in many Internet protocols such as Telnet, FTP, and SMTP. After each command is entered and pro cessed, the switch will issue a reply that consists of a numeric status code and a human-readable explanation of the status.

The general format of commands is: section parameter [value] where:

– section is used to group parameters.

– parameter will specify the parameter within the section. For example, the net work section will have parameters for DHCP, IP address, subnet mask, and default gateway.

– value is the new value of the parameter. If value is omitted, the current value is displayed.

Please note that new values will not take effect until explicitly committed.

Sections and parameter names are case sensitive (e.g., “Network” is not the same as

“network”).

Note!

Any commands in the CLI Commands section of this chapter, with the exception of the global commands, must be prefaced with the name of the section they are in. For example, to change the IP address of the switch, you would type: network address <newIP>

3.2.2

Accessing the CLI

To access the CLI interface, establish Ethernet or serial connectivity to the switch.

To connect by Ethernet, open a command prompt window and type: telnet <switchip> (where <switchip> is the IP address of the switch)

At the login prompt, type “cli” for the username and “admin” for the password. The switch will respond with “Managed switch configuration CLI ready”.

26 EKI-7716 Series User Manual

3

3.3

Web Browser Configuration

The switch has an HTML based user interface embedded in the flash memory. The interface offers an easy to use means to manage basic and advanced switch func tions. The interface allows for local or remote switch configuration anywhere on the network.

The interface is designed for use with [Internet Explorer (6.0), Chrome, Firefox].

3.3.1

Preparing for Web Configuration

The interface requires the installation and connection of the switch to the existing net work. A PC also connected to the network is required to connect to the switch and provided as follows: access the interface through a web browser. The required networking information is

 IP address: 192.168.1.1

 Subnet mask: 255.255.255.0

 Default gateway: 192.168.1.254

 User name: admin

 Password: admin

3.3.2

System Login

Once the switch is installed and connected, power on the switch. The following infor mation guides you through the logging in process.

1.

Launch your web browser on the PC.

2.

In the browser’s address bar, type the switch’s default IP address (192.168.1.1).

The login screen displays.

3.

Enter the user default name and password (admin / admin).

4.

Click OK on the login screen to log in.

The main interface displays.

EKI-7716 Series User Manual 27

Chapter

4

Managing Switch

4

4.1

Log In

To access the login window, connect the device to the network, see “Connecting the

Switch to Ethernet Ports” on page 15. Once the switch is installed and connected,

power on the switch see the following procedures to log into your switch.

When the switch is first installed, the default network configuration is set to DHCP enabled. You will need to make sure your network environment supports the switch setup before connecting it to the network.

1.

Launch your web browser on a computer.

2.

In the browser’s address bar type in the switch’s default IP address

(192.168.1.1). The login screen displays.

3.

Enter the default user name and password (admin/admin) to log into the man agement interface. You can change the default password after you have suc cessfully logged in.

4.

Click Login to enter the management interface.

Figure 4.1 Login Screen

4.2

Recommended Practices

One of the easiest things to do to help increase the security posture of the network infrastructure is to implement a policy and standard for secure management. This practice is an easy way to maintain a healthy and secure network.

After you have performed the basic configurations on your switches, the following is a recommendation which is considered best practice policy.

4.2.1

Changing Default Password

In keeping with good management and security practices, it is recommended that you change the default password as soon as the device is functioning and setup cor rectly. The following details the necessary steps to change the default password.

To change the password:

1.

Navigate to Tools > User Account .

2.

From the User drop-down menu, select the Admin (default) account.

3.

In the User Name field, enter admin for this account. It is not necessary to change the user name, however, a change in the default settings increases the security settings.

4.

In the Password field, type in the new password. Re-type the same password in the Retype Password field.

EKI-7720 Series User Manual 29

5.

Click Apply to change the current account settings.

Figure 4.2 Changing a Default Password

After saving all the desired settings, perform a system save ( Tools > Save Configu ration ). The changes are saved.

4.3

Monitoring

4.3.1

Device Information

The Device Information menu lists information, such as: System Name, System

Location, MAC Address, Firmware version, and more, pertaining to the system. The item within the user interface.

information is for review only. To modify the device information, see the respective

To access this page, click Monitoring > Device Information .

Figure 4.3 Monitoring > Device Information

The following table describes the items in the previous figure.

Item

System Name

System Location

Description

Click Switch to enter the system name: up to 128 alphanumeric char acters (default is Switch).

Click Default to enter the location: up to 256 alphanumeric characters

(default is Default).

30 EKI-7720 Series User Manual

Item

System Contact

MAC Address

IP Address

Subnet Mask

Gateway

Loader Version

Loader Date

Firmware Version

Firmware Date

Build Version

System Object ID

System Up Time

Description

Click Default to enter the contact person: up to 128 alphanumeric characters (default is Default).

Displays the MAC address of the switch.

Displays the assigned IP address of the switch.

Displays the assigned subnet mask of the switch.

Displays the assigned gateway of the switch.

Displays the current loader version of the switch.

Displays the current loader build date of the switch.

Displays the current firmware version of the switch.

Displays the current firmware build date of the switch.

Displays the current firmware build version of the switch.

Displays the base object ID of the switch.

Displays the time since the last switch reboot.

4.3.2

Logging Message

The Logging Message Filter page allows you to enable the display of logging mes sage filter.

To access this page, click Monitoring > Logging Message .

Figure 4.4 Monitoring > Logging Message

The following table describes the items in the previous figure.

Item

Target

Severity

Category

Description

Click the drop-down menu to select a target to store the log mes sages.

 Buffered: Store log messages in RAM. All log messages are cleared after system reboot.

 File: Store log messages in a file.

The setting allows you to designate a severity level for the Logging

Message Filter function.

Click the drop-down menu to select the severity level target setting.

The level options are:

 emerg: Indicates system is unusable. It is the highest level of severity.

 alert: Indicates action must be taken immediately.

 crit: Indicates critical conditions.

 error: Indicates error conditions.

 warning: Indicates warning conditions.

 notice: Indicates normal but significant conditions.

 info: Indicates informational messages.

 debug: Indicates debug-level messages.

Click the drop-down menu to select the category level target setting.

EKI-7720 Series User Manual 31

Item

View

Refresh

Clear buffered mes sages

Description

Click View to display all Logging Information and Logging Message information.

Click Refresh to update the screen.

Click Clear buffered messages to clear the logging buffer history list.

The ensuing table for Logging Information table settings are informational only:

Target, Severity and Category.

Figure 4.5 Monitoring > Logging Information

The ensuing table for Logging Message table settings are informational only:

No, Time Stamp, Category, Severity, and Message.

Figure 4.6 Monitoring > Logging Message

4.3.3

Port Monitoring

Port Network Monitor is a bandwidth and network monitoring tool for the purpose of capturing network traffic and measuring of network throughput. The monitoring func tionality includes listing of port statistics as well as port utilization.

4.3.3.1

Port Statistics

To access this page, click Monitoring > Port Monitoring > Port Statistics .

Figure 4.7 Monitoring > Port Monitoring > Port Statistics

The following table describes the items in the previous figure.

Item

Port

Clear

Description

Click the drop-down menu to select a port and its captured statistical setting values.

Click Clear to clear the counter selections.

32 EKI-7720 Series User Manual

The following table provides information for IF MIB Counters settings.

Figure 4.8 Monitoring > Port Monitoring > IF MIB Counters

The following table provides information for Ether-Like MIB Counters settings.

Figure 4.9 Monitoring > Port Monitoring > Ether-Like MIB Counters

The following table provides information for RMON MIB Counters settings.

Figure 4.10 Monitoring > Port Monitoring > Ether-Like MIB Counters

4.3.3.2

Port Utilization

To access this page, click Monitoring > Port Monitoring > Port Utilization .

Figure 4.11 Monitoring > Port Monitoring > Port Utilization

EKI-7720 Series User Manual 33

The following table describes the items in the previous figure.

Item

Refresh period

IFG

Description

Click the drop-down menu to select and designate a period (second intervals) to refresh the information (TX and RX) listings.

Click the drop-down menu to enable or disable the Interframe Gap

(IFG) statistic.

4.3.3.3

Port Error Disable

The Port Error Disable page displays the error information of the switch ports. To access this page, click Monitoring > Port Monitoring > Port Error Disable

Figure 4.12 Monitoring > Port Monitoring > Port Error Disable

The following table describes the items in the previous figure.

Item Description bpduguard storm-control ingress-bandwidthcontrol

Displays the error status.

Displays the error status.

Displays the error status.

loopback-detection Displays the error status.

4.3.4

Link Aggregation

The Link Aggregation function provides LAG information for each trunk. It displays membership status, link state and membership type for each port.

To access this page, click Monitoring > Link Aggregation .

Figure 4.13 Monitoring > Link Aggregation

4.3.5

LLDP Statistics

The LLDP Statistics page displays the LLDP statistics.

34 EKI-7720 Series User Manual

To access this page, click Monitoring > LLDP Statistics .

Figure 4.14 Monitoring > LLDP Statistics

The following table describes the items in the previous figure.

Item

Clear

Refresh

Description

Click Clear to reset LLDP Statistics of all the interfaces.

Click Refresh to update the data on the screen with the present state of the data in the switch.

The following figure displays the LLDP Port Statistics settings.

Figure 4.15 Monitoring > LLDP Port Statistics

4.3.6

IGMP Statistics

The IGMP Statistics function displays statistical package information for IP multi casting.

EKI-7720 Series User Manual 35

To access this page, click Monitoring > IGMP Statistics .

Figure 4.16 Monitoring > IGMP Statistics

The following table describes the items in the previous figure.

Item

Clear

Refresh

Description

Click Clear to refresh IGMP Statistics of all the interfaces.

Click Refresh to update the data on the screen with the present state of the data in the switch.

The ensuing table for IGMP Statistics settings are informational only: Total RX, Valid

RX, Invalid RX, Other RX, Leave RX, Report RX, General Query RX, Special Group

TX, Special Group Query TX and Special Group & Source Query TX.

Query RX, Special Group & Source Query RX, Leave TX, Report TX, General Query

4.3.7

MLD Statistics

The MLD Statistics function displays statistical package information for MLD mes sage.

36 EKI-7720 Series User Manual

To access this page, click Monitoring > MLD Statistics .

Figure 4.17 Monitoring > MLD Statistics

The following table describes the items in the previous figure.

Item

Clear

Refresh

Description

Click Clear to refresh MLD Statistics of all the interfaces.

Click Refresh to update the data on the screen with the present state of the data in the switch.

The ensuing table for IGMP Statistics settings are informational only: Total RX, Valid

RX, Invalid RX, Other RX, Leave RX, Report RX, General Query RX, Special Group

TX, Special Group Query TX and Special Group & Source Query TX.

Query RX, Special Group & Source Query RX, Leave TX, Report TX, General Query

EKI-7720 Series User Manual 37

4.4

System

4.4.1

IP Settings

The IP Settings menu allows you to select a static or DHCP network configuration.

The Static displays the configurable settings for the static option.

To access this page, click System > IP Settings .

Figure 4.18 System > IP Settings

The following table describes the items in the previous figure.

Item

Mode

IP Address

Subnet Mask

Gateway

DNS Server 1

DNS Server 2

Apply

Description

Click the radio button to select the IP Address Setting mode: Static or

DHCP.

Enter a value to specify the IP address of the interface. The default is

192.168.1.1.

Enter a value to specify the IP subnet mask for the interface. The default is 255.255.255.0.

Enter a value to specify the default gateway for the interface. The default is 192.168.1.254.

Enter a value to specify the DNS server 1 for the interface. The default is 168.95.1.1.

Enter a value to specify the DNS server 2 for the interface. The default is 168.95.192.1.

Click Apply to save the values and update the screen.

The following figure displays the IP Address Information settings

Figure 4.19 System > IP Address Information

38 EKI-7720 Series User Manual

4.4.2

IPv6 Settings

To access this page, click System > IPv6 Settings .

Figure 4.20 System > IPv6 Settings

The following table describes the items in the previous figure.

Item Description

Auto Configuration Select the radio button to enable or disable the IPv6.

IPv6 Address

Gateway

Enter the IPv6 address for the system.

Enter the gateway address for the system.

DHCPv6 Client

Apply

Enter the DHCPv6 address for the system.

Click Apply to save the values and update the screen.

The ensuing table for IPv6 Information settings are informational only: Auto Config uration, IPv6 In Use Address, IPv6 In Use Router, IPv6 Static Address, IPv6 Static

Router and DHCPv6 Client.

The following figure displays the IPv6 Information settings

Figure 4.21 System > IPv6 Information

4.4.3

DHCP Client Option 82

The DHCP Client Option 82 configurable Circuit ID and Remote ID feature enhances validation security by allowing you to select naming choices suboptions. You can

You can also configure an ASCII text string to override the circuit ID. select a switch-configured hostname or specify an ASCII test string for the remote ID.

EKI-7720 Series User Manual 39

To access this page, click System > DHCP Client Option 82 .

Figure 4.22 System > DHCP Client Option 82

The following table describes the items in the previous figure.

Item Description

Mode

Circuit ID Format

Circuit ID String

Circuit ID Hex

Circuit ID User-

Define

Click the radio button to enable or disable the DHCP Client Option 82 mode.

Click the drop-down menu to set the ID format: String, Hex, User Defi nition.

Enter the string ID of the corresponding class.

Enter the hex string of the corresponding class.

Enter the user definition of the corresponding class.

Remote ID Format Click the drop-down menu to set the Remote ID format: String, Hex,

User Definition.

Remote ID String Enter the remote string ID of the corresponding class.

Remote ID Hex

Remote ID User-

Define

Enter the remote hex string of the corresponding class.

Enter the remote user definition of the corresponding class.

Apply Click Apply to save the values and update the screen.

The ensuing table for DHCP Client Option 82 Information table settings are infor mational only: Status, Circuit ID Format, Circuit ID String, Circuit ID Hex, Circuit ID

User-Define.

User-Define, Remote ID Format, Remote ID String, Remote ID Hex and Remote ID

40 EKI-7720 Series User Manual

The following figure displays the DHCP Client Option 82 Information settings

Figure 4.23 System > DHCP Client Option 82 Information

4.4.4

DHCP Auto Provision

The DHCP Auto Provision feature allows you to load configurations using a server with DHCP options. Through the remote connection, the switch obtains information from a configuration file available through the TFTP server.

To access this page, click System > DHCP Auto Provision .

Figure 4.24 System > DHCP Auto Provision

The following table describes the items in the previous figure.

Item

Status

Apply

Description

Select the radio button to enable or disable the DHCP Auto Provision ing Setting.

Click Apply to save the values and update the screen.

The following figure displays the DHCP Auto Provision Information settings

Figure 4.25 System > DHCP Auto Provision Information

4.4.5

Management VLAN

By default the VLAN is the management VLAN providing communication with the switch management interface.

EKI-7720 Series User Manual 41

To access this page, click System > Management VLAN .

Figure 4.26 System > Management VLAN

The following table describes the items in the previous figure.

Item Description

Management VLAN Click the drop-down menu to select a defined VLAN.

Apply Click Apply to save the values and update the screen.

The ensuing table for Management VLAN State are informational only: Management

VLAN.

4.4.6

System Time

To access this page, click System > System Time .

Figure 4.27 System > System Time

The following table describes the items in the previous figure.

Item

Enable SNTP

Description

Click the radio button to enable or disable the SNTP.

42 EKI-7720 Series User Manual

Item Description

SNTP/NTP Server

Address

SNTP Port

Enter the address of the SNTP server. This is a text string of up to 64 characters containing the encoded unicast IP address or hostname of a SNTP server. Unicast SNTP requests will be sent to this address. If this address is a DNS hostname, then that hostname should be resolved into an IP address each time a SNTP request is sent to it.

Enter the port on the server to which SNTP requests are to be sent.

Allowed range is 1 to 65535 (default: 123).

Click the drop-down menus to set local date and time of the system.

Manual Time

Time Zone Click the drop-down menu to select a system time zone.

Daylight Saving Time Click the drop-down menu to enable or disable the daylight saving time settings.

Daylight Saving Time

Offset

Recurring From

Apply

Enter the offsetting variable in seconds to adjust for daylight saving time.

Click the drop-down menu to designate the start date and time for daylight saving time.

Recurring To Click the drop-down menu to designate the end date and time for day light saving time.

Non-Recurring From Click the drop-down menu to designate a start date and time for a non-recurring daylight saving time event.

Non-Recurring To Click the drop-down menu to designate the end date and time for a non-recurring daylight saving time event.

Click Apply to save the values and update the screen.

The following figure displays the System Time Information settings

Figure 4.28 System > System Time Information

4.4.7

Network Port

To access this page, click System > Network Port .

EKI-7720 Series User Manual

Figure 4.29 System > Network Port

43

The following table describes the items in the previous figure.

Item

HTTP

HTTPS

TELNET

SSH

Apply

Description

By default, the HTTPS port setting is set to port 80. To assign the web interface to a different port, enter the port number in the field.

By default, the HTTPS port setting is set to port 443. To assign the web interface to a different port, enter the port number in the field.

By default, the TELNET port setting is set to port 23. To assign the web interface to a different port, enter the port number in the field.

By default, the SSH port setting is set to port 22. To assign the web interface to a different port, enter the port number in the field.

Click Apply to save the values and update the screen.

The ensuing table for Network Port Information are informational only: HTTP,

HTTPS, TELNET and SSH.

44 EKI-7720 Series User Manual

4.5

L2 Switching

4.5.1

Port Configuration

Port Configuration describes how to use the user interface to configure LAN ports on the switch.

To access this page, click L2 Switching > Port Configuration .

Figure 4.30 L2 Switching > Port Configuration

The following table describes the items in the previous figure.

Item

Port

Enabled

Speed

Duplex

Flow Control

Downshift

Fiber Port

Enabled

Speed

Duplex

Flow Control

Apply

Description

Click the drop-down menu to select the port for the L2 Switch setting.

Click the radio-button to enable or disable the Port Setting function.

Click the drop-down menu to select the port speed: Auto, Auto-10M,

Auto-100M, Auto-1000M, Auto-10/100M, 10M, 100M, or 1000M.

Click the drop-down menu to select the duplex setting: Auto, Half or Full.

Click the radio button to enable or disable the flow control function.

Click the radio button to enable or disable the downshift function for speed.

Click the drop-down menu to select the port for the L2 Switch Fiber port setting.

Click the radio-button to enable or disable the Fiber Port Setting function.

Click the drop-down menu to select the fiber port speed: Auto, Auto-

1000M, 100M, or 1000M.

Click the drop-down menu to select the duplex setting: Half or Full.

Click the radio button to enable or disable the flow control function.

Click Apply to save the values and update the screen.

The following figure shows the Port Name Settings with Display Method.

Figure 4.31 L2 Switching > Port Name Settings

EKI-7720 Series User Manual 45

The following figure displays the Port Status settings.

Figure 4.32 L2 Switching > Port Status

4.5.2

Port Mirror

Port mirroring function allows the sending of a copy of network packets seen on one switch port to a network monitoring connection on another switch port. Port mirroring can be used to analyze and debug data or diagnose errors on a network or to mirror either inbound or outbound traffic (or both).

There are no preset values in the Port Mirror. The displayed values do not represent the actual setting values.

To access this page, click L2 Switching > Port Mirror .

Figure 4.33 L2 Switching > Port Mirror

The following table describes the items in the previous figure.

Item Description

Session ID Click the drop-down menu to select a port mirroring session from the list. The number of sessions allowed is platform specific.

Monitor session state Click the drop-down menu to enable or disable the session mode for a selected session ID.

Destination Port

Allow-ingress

Click the drop-down menu to select the destination port and receive all the traffic from configured mirrored port(s).

Click the drop-down menu to enable or disable the Allow-ingress func tion.

46 EKI-7720 Series User Manual

Item

Sniffer RX Ports

Sniffer TX Ports

Apply

Description

Enter the variable to define the RX port.

Enter the variable to define the TX port.

Click Apply to save the values and update the screen.

RSPAN Settings allow you to analyze network traffic passing trough VLANs or ports by using the RSPAN function to direct a copy of the traffic to a corresponding port.

The following figure displays the RSPAN settings.

Item

Session ID

Rspan VLAN

Rspan tag action

Apply

Figure 4.34 L2 Switching > RSPAN

Description

Enter the session ID for RSPAN

Enter the value to the corresponding RSPAN VLAN ID

Click to add, remove, and no-modify the entry.

Click Apply to save the values and update the screen.

The following figure displays the Mirror Status settings.

Figure 4.35 L2 Switching > Mirror Status

4.5.3

Link Aggregation

Link Aggregation is a method for combining multiple network connections in parallel in order to increase throughput beyond the capability of a single connection, and to provide redundancy in case one of the links should fail.

4.5.3.1

Load Balance

The Load Balancing page allows you to select between a MAC Address or IP/MAC

Address algorithm for the even distribution of IP traffic across two or more links.

To access this page, click L2 Switching > Link Aggregation > Load Balance .

Figure 4.36 L2 Switching > Link Aggregation > Load Balance

EKI-7720 Series User Manual 47

The following table describes the items in the previous figure.

Item

Load Balance Algo rithm

Apply

Description

Select the radio button to select the Load Balance Setting: MAC

Address, IP/MAC Address or Source Port.

Click Apply to save the values and update the screen.

The following figure displays the Load Balance Information settings.

Figure 4.37 L2 Switching > Link Aggregation > Load Balance Information

4.5.3.2

LAG Management

Link aggregation is also known as trunking. It is a feature available on the Ethernet gateway and is used with Layer 2 Bridging. Link aggregation allows for the logical merging of multiple ports into a single link.

To access this page, click L2 Switching > Link Aggregation > LAG Management .

Item

LAG

Name

Type

Ports

Apply

Figure 4.38 L2 Switching > Link Aggregation > LAG Management

The following table describes the items in the previous figure.

Description

Click the drop-down menu to select the designated trunk group:

Trunk 1 ~8.

Enter an entry to specify the LAG name.

Click the radio button to specify the type mode: Static or LACP.

Click the drop-down menu to select designated ports: FE1-8 or

GE1-2.

Click Apply to save the values and update the screen.

48 EKI-7720 Series User Manual

The following figure displays the LAG Management Information settings.

Figure 4.39 L2 Switching > Link Aggregation > LAG Management Information

4.5.3.3

LAG Port Settings

The LAG Port Settings page allows you to enable or disable, set LAG status, speed and flow control functions.

In this example we will configure a LAG between the following switches:

To access this page, click L2 Switching > Link Aggregation > LAG Port Settings .

Figure 4.40 L2 Switching > Link Aggregation > LAG Port Settings

The following table describes the items in the previous figure.

Item

LAG Select

Enabled

Speed

Flow Control

Apply

Description

Click the drop-down menu to select a predefined LAG trunk definition:

LAG 1-8.

Click the radio button to enable or disable the LAG Port.

Click the drop-down menu to select the port speed: Auto, Auto-10M,

Auto-100M, Auto-1000M, Auto-10/100M, 10M, 100M, or 1000M.

Click the radio button to enable or disable the Flow Control for the

LAG Port.

Click Apply to save the values and update the screen.

EKI-7720 Series User Manual 49

The following figure displays the LAG Port Status settings

Figure 4.41 L2 Switching > Link Aggregation > LAG Port Status

4.5.3.4

LACP Priority Settings

The LACP Priority Settings page allows you to configure the system priority for LACP.

To access this page, click L2 Switching > Link Aggregation > LACP Priority Set tings .

Figure 4.42 L2 Switching > Link Aggregation > LACP Priority Settings

The following table describes the items in the previous figure.

Item

System Priority

Apply

Description

Enter the value (1-65535) to designate the LACP system priority.

Click Apply to save the values and update the screen.

The ensuing table for LACP Information settings are informational only: System Pri ority.

4.5.3.5

LACP Port Settings

Link Aggregation Control Protocol (LACP) provides a method to control the bundling of several physical ports together to form a single logical channel. By configuring the

LACP packets to the peer device (also implementing LACP).

LACP function, the switch can negotiate an automatic bundling of links by sending

To access this page, click L2 Switching > Link Aggregation > LACP Port Settings .

Figure 4.43 L2 Switching > Link Aggregation > LACP Port Settings

50 EKI-7720 Series User Manual

The following table describes the items in the previous figure.

Item

Port Select

Priority

Timeout

Mode

Apply

Description

Select a port for the LACP Port Settings. The listed available settings are: FE1-FE8, GE1-GE2.

However, the available settings are dependent on the connected

LACP device and may not be listed as displayed in the current figure.

Enter a variable (1 to 65535) to assign a priority to the defined port selection.

Click the radio button to select a long or short timeout period.

Click the radio button to select the setting mode: Active or Passive.

 Active: Enables LACP unconditionally.

 Passive: Enables LACP only when an LACP device is detected

(default state).

Click Apply to save the values and update the screen.

The following figure displays the LACP Port Information settings.

Figure 4.44 L2 Switching > Link Aggregation > LACP Port Information Settings

4.5.4

802.1Q VLAN

The 802.1Q VLAN feature allows for a single VLAN to support multiple VLANs. With the 802.1Q feature you can preserve VLAN IDs and segregate different VLAN traffic.

The 802.1Q VLAN tag feature encapsulates the 802.1Q VLAN tagging within another

802.1Q VLAN tag. The outer tag is assigned following the AP group, while the inner

VLAN ID is assigned dynamically by the AAA server.

4.5.4.1

VLAN Management

The management of VLANs is available through the VLAN Settings page. Through entry. this page you can add or delete VLAN listings and add a prefix name to an added

EKI-7720 Series User Manual 51

To access this page, click L2 Switching > 802.1Q VLAN > VLAN Management .

Figure 4.45 L2 Switching > 802.1Q VLAN > VLAN Management

The following table describes the items in the previous figure.

Item Description

VLAN Action Click the radio button to add or delete the VLAN entry shown in the previous field.

VLAN ID / VLAN List Enter the name of the VLAN entry to setup.

VLAN Name / VLAN

Prefix

Apply

Enter the prefix to be used by the VLAN list entry in the previous field.

Click Apply to save the values and update the screen.

The following figure displays the VLAN Table settings.

Figure 4.46 L2 Switching > 802.1Q VLAN > VLAN Table

4.5.4.2

PVID Settings

The PVID Settings page allows you to designate a PVID for a selected port, define the accepted type and enable/disable the ingress filtering.

To access this page, click L2 Switching > 802.1Q VLAN > PVID Settings .

Figure 4.47 L2 Switching > 802.1Q VLAN > PVID Settings

The following table describes the items in the previous figure.

Item

Port Select

Description

Click the drop-down menu to select a port and edit its settings: FE1-

FE8, GE1-GE2, or Trunk1 - Trunk8.

52 EKI-7720 Series User Manual

Item

PVID

Accepted Type

Ingress Filtering

Apply

Description

Enter the VLAN ID you want assigned to untagged or priority tagged frames received on this port. The value ranges 1 to 4094. The default is 1.

Click the radio button to specify which frames to forward.

Tag Only discards any untagged or priority tagged frames.

Untag Only discards any tagged frames.

All accepts all untagged and tagged frames.

Whichever you select, VLAN tagged frames are forwarded in accor dance with the IEEE 802.1Q VLAN standard. The default is All.

Click the radio button to specify how you want the port to handle tagged frames. If you enable Ingress Filtering, a tagged frame will be discarded if this port is not a member of the VLAN identified by the

VLAN ID in the tag. If you select Disabled, all tagged frames will be accepted. The default is Disabled.

Click Apply to save the values and update the screen.

The ensuing table for Port VLAN Status settings are informational only: Port, Inter face VLAN Mode, PVID, Accept Frame Type and Ingress Filtering.

4.5.4.3

Port to VLAN

The Port to VLAN page allows you to add a port to a VLAN and select the related parameters.

To access this page, click L2 Switching > 802.1Q VLAN > Port to VLAN .

EKI-7720 Series User Manual 53

Figure 4.48 L2 Switching > 802.1Q VLAN > Port to VLAN

The following table describes the items in the previous figure.

Item Description

Port Displays the assigned port to the entry.

Interface VLAN Mode Displays the Hybrid mode to the listed VLAN port.

Membership

Apply

Displays the assigned membership status of the port entry, options include: Forbidden, Excluded Tagged or Untagged.

Click Apply to save the values and update the screen.

54 EKI-7720 Series User Manual

4.5.4.4

Port-VLAN Mapping

The following figure displays the Port-VLAN Mapping Table settings.

Figure 4.49 L2 Switching > 802.1Q VLAN > Port-VLAN Mapping

4.5.4.5

RSPAN VLAN

The RSPAN VLAN page allows user to process monitoring RSPAN feature of the

VLAN. The following figure displays the RSPAN VLAN Table settings.

Figure 4.50 L2 Switching > 802.1Q VLAN > RSPAN VLAN Mapping

The following table describes the items in the previous figure.

Item

VLAN ID

Apply

Description

Click the drop-down menu to select the corresponding VLAN ID to map.

Click Apply to save the values and update the screen.

4.5.5

Q-in-Q

Q-in-Q is commonly referred as VLAN stacking in which VLANs are nested by adding two tags to each frame instead of one. Network service provider and users both can allowed by 802.1Q.

use VLANs and makes it possible to have more than the 4094 separate VLANs

There are three ways in which a machine can be connected to a network carrying double-tagged 802.1ad traffic:

 via a untagged port, where both inner and outer VLANs are handled by the switch or switches (so the attached machine sees ordinary Ethernet frames);

 via a single-tagged (tunnel) port, where the outer VLAN only is handled by the switch (so the attached machine sees single-tagged 802.1Q VLAN frames); or

 via a double-tagged (trunk) port, where both inner and outer VLANs are handled by the attached machine (which sees double-tagged 802.1ad VLAN frames).

4.5.5.1

Global Settings

The Global Settings page allows you to set the outer VLAN Ethertype setting.

EKI-7720 Series User Manual 55

To access this page, click L2 Switching > Q-in-Q > Global Settings .

Figure 4.51 L2 Switching > Q-in-Q > Global Settings

The following table describes the items in the previous figure.

Item

Outer VLAN Ether type

Apply

Description

Enter the outer VLAN handled by the switch giving the attached machine a single-tagged 802.1Q VLAN frame.

Click Apply to save the values and update the screen.

The ensuing table for QinQ Global Information settings are informational only:

Outer VLAN Ethertype.

4.5.5.2

Port Settings

The Port Settings page allows you to define the outer PVID and outer mode for a selected port.

To access this page, click L2 Switching > Q-in-Q > Port Settings .

Figure 4.52 L2 Switching > Q-in-Q > Port Settings

The following table describes the items in the previous figure.

Item

Port Select

Outer PVID

Outer Mode

Apply

Description

Enter the switch port (part of VLAN configuration) to configure the selection as a tunnel port.

Enter the Port VLAN ID (PVID) to assigned the native VLAN ID. All untagged traffic coming in or out of the 802.1Q port is forwarded based on the PVID value

Click the drop-down menu to select between UNI or NNI role.

 UNI: Selects a user-network interface which specifies communi cation between the specified user and a specified network.

 NNI: Selects a network-to-network interface which specifies communication between two specified networks.

Click Apply to save the values and update the screen.

56 EKI-7720 Series User Manual

The following figure displays the QinQ Port Information settings.

Figure 4.53 L2 Switching > QinQ Port Information

4.5.6

GARP

The Generic Attribute Registration Protocol (GARP) is a local area network (LAN) protocol. The protocol defines procedures for the registration and de-registration of attributes (network identifiers or addresses) by end stations and switches with each other.

4.5.6.1

GARP Settings

To access this page, click L2 Switching > GARP > GARP Settings .

Figure 4.54 L2 Switching > GARP > GARP Settings

The following table describes the items in the previous figure.

Item

Join Time

Leave Time

Leave All Time

Apply

Description

Enter a value to specify the time between the transmission of GARP

PDUs registering (or re-registering) membership for a VLAN or multi cast group in centiseconds. Enter a number between 6 and 600. An instance of this timer exists for each GARP participant for each port.

Enter a value to specify the time to wait after receiving an unregister request for a VLAN or multicast group before deleting the associated entry, in centiseconds. This allows time for another station to assert registration for the same attribute in order to maintain uninterrupted service. Enter a number between 12 and 3000. An instance of this timer exists for each GARP participant for each port.

Enter a value to specify the Leave All Time controls how frequently

Leave All PDUs are generated. A Leave All PDU indicates that all reg istrations will shortly be deregistered. Participants will need to rejoin in order to maintain registration. The Leave All Period Timer is set to a random value in the range of LeaveAllTime to 1.5*LeaveAllTime. The timer is specified in centiseconds. Enter a number between 12 and

12000. An instance of this timer exists for each GARP participant for each port.

Click Apply to save the values and update the screen.

The ensuing table for GARP Information settings are informational only: Join Time,

Leave Time and Leave All Time.

EKI-7720 Series User Manual 57

4.5.6.2

GVRP Settings

The GVRP Settings page allows you to enable or disable the GVRP (GARP VLAN tates control of virtual local area networks (VLANs) within a larger network.

Registration Protocol or Generic VLAN Registration Protocol) protocol which facili -

To access this page, click L2 Switching > GARP > GVRP Settings .

Figure 4.55 L2 Switching > GARP > GVRP Settings

The following table describes the items in the previous figure.

Item

Status

Apply

Description

Click to enable or disable the GARP VLAN Registration Protocol administrative mode for the switch. The factory default is Disable.

Click Apply to save the values and update the screen.

The ensuing table for GVRP Information settings are informational only: GVRP.

4.5.6.3

GMRP Settings

To access this page, click L2 Switching > GARP > GMRP Settings .

Figure 4.56 L2 Switching > GARP > GMRP Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Click to enable or disable the GMRP mode for the switch. The factory default is Disable.

Click Apply to save the values and update the screen.

The ensuing table for GMRP Information settings are informational only: GMRP.

The ensuing table for Multicast Groups settings are informational only: VLAN ID,

MAC Address, Type and Member Ports.

4.5.7

802.3az EEE

The 802.3az Energy Efficient Ethernet (EEE) innovative green feature reduces energy consumption through intelligent functionality:

 Traffic detection — Energy Efficient Ethernet (EEE) compliance

 Inactive link detection

Inactive link detection function automatically reduces power usage when inactive links or devices are detected.

58 EKI-7720 Series User Manual

To access this page, click L2 Switching > 802.3az EEE .

Figure 4.57 L2 Switching > 802.3az EEE

The following table describes the items in the previous figure.

Item

Port Select

State

Apply

Description

Enter the port to setup the EEE function.

Click Enabled or Disabled to set the state mode of the port select setting.

Click Apply to save the values and update the screen.

The ensuing table for EEE Enable Status settings are informational only: Port and

EEE State.

4.5.8

Multicast

Multicast forwarding allows a single packet to be forwarded to multiple destinations.

The service is based on L2 switch receiving a single packet addressed to a specific the packets to the relevant ports.

Multicast address. Multicast forwarding creates copies of the packet, and transmits

4.5.8.1

Multicast Filtering

The Multicast Filtering page allows for the definition of action settings when an unknown multicast request is received. The options include: Drop, Flood, or Router

Port.

To access this page, click L2 Switching > Multicast > Multicast Filtering .

Figure 4.58 L2 Switching > Multicast > Multicast Filtering

The following table describes the items in the previous figure.

Item

Unknown Multicast

Action

Apply

Description

Select the configuration protocol: Drop, Flood, or Router Port, to apply for any unknown multicast event.

Click Apply to save the values and update the screen.

The ensuing table for Properties Information settings are informational only:

Unknown Multicast Action.

4.5.8.2

IGMP Snooping

IGMP Snooping is defined as the process of listening to Internet Group Management

Protocol (IGMP) network traffic. IGMP Snooping allows a network switch to listen in on the IGMP conversation between hosts and routers and maintain a map of which

EKI-7720 Series User Manual 59

links need which IP multicast streams. Multicasts can be filtered from the links which do not need them in turn controlling which ports receive specific multicast traffic.

IGMP Settings

To access this page, click L2 Switching > Multicast > IGMP Snooping > IGMP Set tings .

Figure 4.59 L2 Switching > Multicast > IGMP Snooping > IGMP Settings

The following table describes the items in the previous figure.

Item

IGMP Snooping

State

IGMP Snooping Ver sion

IGMP Snooping

Report Suppression

Apply

Description

Select Enable or Disable to designate the IGMP Snooping State.

Select designate the IGMP Snooping Version: V2 or V3.

Select Enable or Disable to setup the report suppression for IGMP

Snooping.

Click Apply to save the values and update the screen.

The following figure displays the IGMP Snooping Information settings.

Figure 4.60 L2 Switching > Multicast > IGMP Snooping > IGMP Snooping

Information

IGMP Querier

IGMP Querier allows snooping to function by creating the tables for snooping. Gen eral queries must be unconditionally forwarded by all switches involved in IGMP snooping.

To access this page, click L2 Switching > Multicast > IGMP Snooping > IGMP

Querier .

Figure 4.61 L2 Switching > Multicast > IGMP Snooping > IGMP Querier

The following table describes the items in the previous figure.

Item

VLAN ID

Description

Select the VLAN ID to define the local IGMP querier.

60 EKI-7720 Series User Manual

Item

Querier State

Querier Version

Apply

Description

Select Disable or Enable to configure the VLAN ID (IGMP Querier).

Select the querier version (V2 or V3) designated to the selected VLAN

ID.

Click Apply to save the values and update the screen.

The following figure displays the IGMP Querier Status settings.

Figure 4.62 L2 Switching > Multicast > IGMP Snooping > IGMP Querier Status

IGMP Static Groups

To access this page, click L2 Switching > Multicast > IGMP Snooping > IGMP

Static Groups .

Figure 4.63 L2 Switching > Multicast > IGMP Snooping > IGMP Static Groups

The following table describes the items in the previous figure.

Item

VLAN ID

Group IP Address

Member Ports

Add

Description

Select the VLAN ID to define IGMP static group.

Enter the IP address assigned to the VLAN ID.

Enter the port numbers to associate with the static group.

Click Add to add an IGMP group.

The ensuing table for IGMP Static Groups Status settings are informational only:

VLAN ID, Group IP Address, Member Ports and Modify.

Multicast Groups

To access this page, click L2 Switching > Multicast > IGMP Snooping > Multicast

Groups .

The following figure displays the Multicast Groups settings.

Figure 4.64 L2 Switching > Multicast > IGMP Snooping > Multicast Groups

Router Ports

To access this page, click L2 Switching > Multicast > IGMP Snooping > Router

Ports .

The following figure displays the Router Ports settings.

Figure 4.65 L2 Switching > Multicast > IGMP Snooping > Router Ports

EKI-7720 Series User Manual 61

4.5.8.3

MLD Snooping

The MLD Snooping page allows you to select the snooping status (enable or dis able), the version (v1 or v2) and the enabling/disabling of the report suppression for the MLD querier, which sends out periodic general MLD queries and are forwarded through all ports in the VLAN.

MLD Settings

To access this page, click L2 Switching > Multicast > MLD Snooping > MLD Set tings .

Figure 4.66 L2 Switching > Multicast > MLD Snooping > MLD Settings

The following table describes the items in the previous figure.

Item Description

MLD Snooping State Select Enable or Disable to setup the MLD Snooping State.

MLD Snooping Ver sion

Select the querier version (V1 or V2) designated to the MLD Snooping

Version.

MLD Snooping

Report Suppression

Select Enable or Disable to designate the status of the report sup pression.

Apply Click Apply to save the values and update the screen.

The following figure displays the MLD Snooping Information settings.

Figure 4.67 L2 Switching > Multicast > MLD Snooping > MLD Snooping

Information

The following figure displays the MLD Snooping Table settings.

Figure 4.68 L2 Switching > Multicast > MLD Snooping > MLD Snooping Table

62 EKI-7720 Series User Manual

MLD Querier

The MLD Querier page allows you to select and enable/disable the MLD querier and define the version (IGMPv1 or IGMPv2) when enabled.

To access this page, click L2 Switching > Multicast > MLD Snooping > MLD Que rier .

Figure 4.69 L2 Switching > Multicast > MLD Snooping > MLD Querier

The following table describes the items in the previous figure.

Item

VLAN ID

Querier State

Querier Version

Apply

Description

Enter the VLAN ID to configure.

Select Enable or Disable status on the selected VLAN.

 Enable: Enable IGMP Querier Election.

 Disable: Disable IGMP Querier Election.

Select the querier version (IGMPV1 or IGMPV2) designated to the

MLD Querier function.

Click Apply to save the values and update the screen.

The ensuing table for MLD Querier Status settings are informational only: VLAN ID,

Querier State, Querier Status, Querier Version and Querier IP.

MLD Static Group

The MLD Static Group page allows you to configure specified ports as static member ports.

To access this page, click L2 Switching > Multicast > MLD Snooping > MLD Static

Group .

Figure 4.70 L2 Switching > Multicast > MLD Snooping > MLD Static Group

The following table describes the items in the previous figure.

Item

VLAN ID

Group IP Address

Member Ports

Add

Description

Enter the VLAN ID to define the local MLD Static Group.

Enter the IP address associated with the static group.

Enter the ports designated with the static group.

Click Add to add a MLD static group.

The ensuing table for MLD Static Groups Status settings are informational only:

VLAN ID, Group IP Address, Member Ports and Modify.

EKI-7720 Series User Manual 63

Multicast Groups

To access this page, click L2 Switching > Multicast > MLD Snooping > Multicast

Groups .

The following figure displays the Multicast Groups settings.

Figure 4.71 L2 Switching > Multicast > MLD Snooping > Multicast Groups

Router Ports

To access this page, click L2 Switching > Multicast > MLD Snooping > Router

Ports .

The following figure displays the Router Ports settings.

Figure 4.72 L2 Switching > Multicast > MLD Snooping > Router Ports

4.5.9

Jumbo Frame

Jumbo frames are frames larger than the standard Ethernet frame size of 1518 bytes. The Jumbo Frame function allows the configuration of Ethernet frame size.

To access this page, click L2 Switching > Jumbo Frame .

Figure 4.73 L2 Switching > Jumbo Frame

The following table describes the items in the previous figure.

Item

Jumbo Frame

(Bytes)

Apply

Description

Enter the variable in bytes (1518 to 10240) to define the jumbo frame size.

Click Apply to save the values and update the screen.

The ensuing table for Jumbo Frame Config settings are informational only: Jumbo

Frame (Bytes).

4.5.10

Spanning Tree

The Spanning Tree Protocol (STP) is a network protocol to ensure loop-free topology for any bridged Ethernet local area network.

4.5.10.1

STP Global Settings

The STP Global Settings page allows you to set the STP status, select the configura tion for a BPDU packet, choose the path overhead, force version and set the configu ration revision range.

64 EKI-7720 Series User Manual

To access this page, click L2 Switching > Spanning Tree > STP Global Settings .

Figure 4.74 L2 Switching > Spanning Tree > STP Global Settings

The following table describes the items in the previous figure.

Item

Enabled

BPDU Forward

BPDU Guard

PathCost Method

Force Version

Apply

Description

Click the radio-button to enable or disable the STP status.

Select flooding or filtering to designate the type of BPDU packet.

Click the radio-button to enable or disable the BPDU guard. When enabled, BPDU Guard can disable edge ports that receive BPDU packets. This prevents a new device from entering the existing STP topology. Thus devices that were originally not a part of STP are not allowed to influence the STP topology

Select short or long to define the method of used for path cost calcula tions.

Click the drop-down menu to select the operating mode for STP.

 STP-Compatible: 802.1D STP operation.

 RSTP-Operation: 802.1w operation.

 MSTP-Operation: 802.1s operation.

Click Apply to save the values and update the screen.

The following figure displays the STP Information settings.

Figure 4.75 L2 Switching > Spanning Tree > STP Information

4.5.10.2

STP Port Settings

The STP Port Settings page allows you to configure the ports for the setting, port’s contribution, configure edge port, and set the status of the BPDU filter.

EKI-7720 Series User Manual 65

To access this page, click L2 Switching > Spanning Tree > STP Port Settings .

Figure 4.76 L2 Switching > Spanning Tree > STP Port Settings

The following table describes the items in the previous figure.

Item Description

Port Select

Edge Port

Select the port list to specify the ports that apply to this setting.

Admin Enable Select Enabled or Disabled to setup the admin profile for the STP port.

Path Cost (0 = Auto) Set the port’s cost contribution. For a root port, the root path cost for the bridge. (0 means Auto).

Click the drop-down menu to set the edge port configuration.

 No: Force to false state (as link to a bridge).

 Yes: Force to true state (as link to a host).

P2P MAC

Migrate

Apply

Click the drop-down menu to set the Point-to-Point port configuration.

 No: Force to false state.

 Yes: Force to true state.

Click the check box to enable the migrate function.

Forces the port to use the new MST/RST BPDUs, requiring the switch to test on the LAN segment. for the presence of legacy devices, which are not able to understand the new BPDU formats.

Click Apply to save the values and update the screen.

The ensuing table for STP Port Status settings are informational only: Port, Admin

Enable, Path Cost, Edge Port and P2P MAC.

4.5.10.3

STP Bridge Settings

The STP Bridge Settings page allows you to configure the priority, forward delay, maximum age, Tx hold count, and the hello time for the bridge.

66 EKI-7720 Series User Manual

To access this page, click L2 Switching > Spanning Tree > STP Bridge Settings .

Figure 4.77 L2 Switching > Spanning Tree > STP Bridge Settings

The following table describes the items in the previous figure.

Item

Priority

Forward Delay

Max Age

Tx Hold Count

Hello Time

Apply

Description

Click the drop-down menu to select the STP bridge priority.

Enter the variable (4 to 30) to set the forward delay for STP bridge set tings.

Enter the variable (6 to 40) to set the Max age for STP bridge settings.

Enter the variable (1 to 10) to designate the TX hold count for STP bridge settings.

Enter the variable (1 to 10) to designate the Hello Time for STP bridge settings.

Click Apply to save the values and update the screen.

The ensuing table for STP Bridge Information settings are informational only: Prior ity, Forward Delay, Max Age, Tx Hold Count and Hello Time.

The ensuing table for STP Bridge Status settings are informational only: Bridge

Identifier, Designated Root Bridge, Root Path Cost, Designated Bridge, Root Port and Last Topology Change.

4.5.10.4

STP Port Advanced Settings

The STP Port Advanced Settings page allows you to select the port list to apply this setting.

To access this page, click L2 Switching > Spanning Tree > STP Port Advanced

Settings .

Figure 4.78 L2 Switching > Spanning Tree > STP Port Advanced Settings

The following table describes the items in the previous figure.

Item

Port Select

Description

Select the port to designate the STP settings.

EKI-7720 Series User Manual 67

Item

Priority

Apply

Description

Click the drop-down menu to designate a priority.

Click Apply to save the values and update the screen.

The following figure displays the STP Port Status settings.

Figure 4.79 L2 Switching > Spanning Tree > STP Port Status

4.5.10.5

MST Config Identification

The MST Config Identification page allows you to configure the identification setting name and the identification range.

To access this page, click L2 Switching > Spanning Tree > MST Config Identifica tion .

Figure 4.80 L2 Switching > Spanning Tree > MST Config Identification

The following table describes the items in the previous figure.

Item Description

Configuration Name Enter the identifier used to identify the configuration currently being used. It may be up to 32 characters.

Revision Level

Apply

Enter the identifier for the Revision Configuration, range: 0 to 65535

(default: 0).

Click Apply to save the values and update the screen.

The ensuing table for MST Configuration Identification Information settings are informational only: Configuration Name and Revision Level.

4.5.10.6

MST ID Settings

The MST Instance ID Settings page allows you to edit the MSTI ID and VID List set tings.

68 EKI-7720 Series User Manual

To access this page, click L2 Switching > Spanning Tree > MST ID Settings .

Figure 4.81 L2 Switching > Spanning Tree > MST ID Settings

The following table describes the items in the previous figure.

Item

MSTI ID

VID List

Move

Description

Enter the MST instance ID (0-15).

Enter the pre-configured VID list.

Click Move to save the values and update the screen.

The ensuing table for MST ID Information settings are informational only: MSTI ID and VID List.

4.5.10.7

MSTI Priority Settings

The MST Instance Priority Settings allows you to specify the MST instance and the bridge priority in that instance.

To access this page, click L2 Switching > Spanning Tree > MSTI Priority Settings .

Figure 4.82 L2 Switching > Spanning Tree > MSTI Priority Settings

The following table describes the items in the previous figure.

Item

MSTI ID

Priority

Apply

Description

Click the drop-down menu to specify the MST instance.

Click the drop-down menu set the bridge priority in the specified MST instance

Click Apply to save the values and update the screen.

The ensuing table for MSTI Priority Information settings are informational only:

MSTI ID, Priority and Action.

4.5.10.8

MSTI Bridge Info

To access this page, click L2 Switching > Spanning Tree > MSTI Bridge Info .

EKI-7720 Series User Manual 69

The following figure displays the STP Bridge Status settings.

Figure 4.83 L2 Switching > Spanning Tree > STP Bridge Status

4.5.10.9

MSTI Port Advanced settings

To access this page, click L2 Switching > Spanning Tree > MSTI Port Advanced .

The following figure displays the MSTI Port Advanced settings.

Figure 4.84 L2 Switching > Spanning Tree > MSTI Port Advanced settings

4.5.10.10

STP Statistics

To access this page, click L2 Switching > Spanning Tree > STP Statistics .

The following figure displays the STP Statistics settings.

Figure 4.85 L2 Switching > Spanning Tree > STP Statistics

4.5.11

X-Ring Elite

The X-Ring Elite function provides an improvement over Spanning Tree and Rapid

Spanning Tree and a rapid auto recovery in the event that the network suffers a cor rupt or broken link and prevents network loops.

4.5.11.1

X-Ring Elite Settings

The X-Ring Elite Settings allows you to enable or disable the state of the X-Ring set tings.

70 EKI-7720 Series User Manual

To access this page, click L2 Switching > X-Ring Elite > X-Ring Elite Settings .

Figure 4.86 L2 Switching > X-Ring Elite > X-Ring Elite Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Select Enabled or Disabled to setup the X-Ring Elite mode.

Click Apply to save the values and update the screen.

The ensuing table for Information settings are informational only: X-Ring Elite State.

4.5.11.2

X-Ring Elite Groups

The X-Ring Elite Groups page allows you to select the function and role for each device and the connected ports.

To access this page, click L2 Switching > X-Ring Elite > X-Ring Elite Groups .

Figure 4.87 L2 Switching > X-Ring Elite > X-Ring Elite Groups

The following table describes the items in the previous figure.

Item

Ring ID

Role

Port 1

Port 2

Add

Description

Enter a number to specifies a ranging from 1 to 255 to identify a given

X-Ring Elite group.

Click the drop-down menu to select the ring role.

Click the drop-down menu to define the port designation.

Click the drop-down menu to define the port designation.

Click Add to save the values and update the screen.

The ensuing table for Information settings are informational only: Ring ID, Role, Port

1, Port 2 and Delete (click to delete the desired Ring ID).

4.5.12

X-Ring Pro

The X-Ring Pro function provides an improvement over Spanning Tree and Rapid

Spanning Tree and a rapid auto recovery in the event that the network suffers a cor rupt or broken link and prevents network loops.

4.5.12.1

X-Ring Pro Settings

The X-Ring Pro Settings page allows you to configure the status (enabled or dis abled) of the function.

EKI-7720 Series User Manual 71

To access this page, click L2 Switching > X-Ring Pro > X-Ring Pro Settings .

Figure 4.88 L2 Switching > X-Ring Pro > X-Ring Pro Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Select Enabled or Disabled to setup the X-Ring Pro mode.

Click Apply to save the values and update the screen.

The ensuing table for Information settings are informational only: X-Ring Pro State.

4.5.12.2

X-Ring Pro Groups

The X-Ring Pro Groups page allows you to select the function and role for each ring

ID and its connected ports.

To access this page, click L2 Switching > X-Ring Pro > X-Ring Pro Groups .

Figure 4.89 L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro

Groups Settings

The following table describes the items in the previous figure.

Item

Ring ID

Port 1

Port 2

Add

Description

Enter a number to specifies a ranging from 1 to 255 to identify a given

X-Ring Pro group.

Click the drop-down menu to define the port designation.

Click the drop-down menu to define the port designation.

Click Add to save the values and update the screen.

Figure 4.90 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Chain Settings

The following table describes the items in the previous figure.

Item

Chain Ring ID

Role

Head Port

Description

Enter a number to specifies a ranging from 1 to 255 to identify a chain ring ID.

Click the drop-down menu to select the ring role.

Click the drop-down menu to define the port designation.

72 EKI-7720 Series User Manual

Item

Member Port

Add

Description

Click the drop-down menu to define the port designation.

Click Add to save the values and update the screen.

Figure 4.91 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Couple Setting

The following table describes the items in the previous figure.

Item

Couple Ring ID

Port

Master Ring ID

Add

Description

Enter a number to specifies a ranging from 1 to 255 to identify a given

X-Ring group.

Enter the port to assign to define the couple setting.

Click the drop-down menu to designate the master ring.

Click Add to save the values and update the screen.

Figure 4.92 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Pair Settings

The following table describes the items in the previous figure.

Item

Pair Ring ID

Port

Master Ring ID

Add

Description

Enter a number to specifies a ranging from 1 to 255 to identify a pair ring ID.

Enter the port to assign to define the couple setting.

Click the drop-down menu to designate the master ring.

Click Add to save the values and update the screen.

Figure 4.93 L2 Switching > X-Ring Pro > X-Ring Pro Groups > RPair Settings

The following table describes the items in the previous figure.

Item

RPair Ring ID

Port

Description

Enter a number to specifies a ranging from 1 to 255 to identify a Rpair ring ID.

Enter the port to assign to define the couple setting.

EKI-7720 Series User Manual 73

Item

Master Ring ID

Add

Description

Click the drop-down menu to designate the master ring.

Click Add to save the values and update the screen.

The ensuing table for Information settings are informational only: Ring ID, Mode,

Role, Operation State, Port 1, Forwarding State, Port 2, Forwarding State and Delete

(click to delete the desired Ring ID).

4.5.13

Loopback Detection

The Loopback Detection function is used to detect looped links. By sending detection frames and then checking to see if the frames returned to any port on the device, the function is used to detect loops.

4.5.13.1

Global Settings

The Global Settings page allows you to configure the state (enabled or disabled) of the function, select the interval at which frames are transmitted and the delay before recovery.

To access this page, click L2 Switching > Loopback Detection > Global Settings .

Figure 4.94 L2 Switching > Loopback Detection > Global Settings

The following table describes the items in the previous figure.

Item

State

Interval

Recover Time

Apply

Description

Select Enabled or Disabled to setup the loopback mode.

Enter the variable in seconds (1 to 32767) to set the interval at which frames are transmitted.

Enter the variable in seconds (60 to 1000000) to define the delay before recovery.

Click Apply to save the values and update the screen.

To access this page, click L2 Switching > Loopback Detection > Loopback Detec tion Global Information .

The following figure displays the Loopback Detection Global Information settings.

Figure 4.95 L2 Switching > Loopback Detection > Loopback Detection Global

Information

4.5.13.2

Port Settings

The Port Settings page allows you to select ports that are detected by the loopback detection function and configure their status (enabled or disabled).

74 EKI-7720 Series User Manual

To access this page, click L2 Switching > Loopback Detection > Port Settings .

Figure 4.96 L2 Switching > Loopback Detection > Port Settings

The following table describes the items in the previous figure.

Item

Port Select

Enabled

Apply

Description

Enter the port to define the local loopback detection setting.

Select Enabled or Disabled to setup the Loopback Detection func tion.

Click Apply to save the values and update the screen.

The ensuing table for Loopback Detection Port Information settings are informa tional only: Port, Enable State and Loop Status.

4.5.14

ERPS

4.5.14.1

ERPS Settings

To access this page, click L2 Switching > ERPS > ERPS Settings .

Figure 4.97 L2 Switching > ERPS > ERPS Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Click Enabled or Disabled to enable ERPS settings.

Click Apply to save the values and update the screen.

The ensuing table for Information settings are informational only: ERPS State.

EKI-7720 Series User Manual 75

4.5.14.2

ERPS Groups

To access this page, click L2 Switching > ERPS > ERPS Groups .

Figure 4.98 L2 Switching > ERPS > ERPS Groups

The following table describes the items in the previous figure.

Item

ERP Instance

Ring ID

Role

East Link

RPL

West Link

RPL

MEL

R-APS Channel

VLAN

Traffic Channel

Instance

Type

WTR Timer

Guard Timer

Hold-off Timer

Apply

Description

Enter the value to set the ERP instance.

Enter the value to set the ring ID.

Click the drop down menu to select the role. Options include: RPL

Owner, RPL Neighbor or Other.

Enter the port to define the east link.

Check the check box to enable RPL.

Enter the port to define the west link.

Check the check box to enable RPL.

Enter the value to set minimum equipment list.

Click the drop down menu to select the VLAN.

Click the drop down menu to select the traffic channel instance.

Click the drop down menu to select the ERP group type.

Enter the value to set WTR timer.

Enter the value to set guard timer.

Enter the value to set hold-off timer.

Click Apply to save the values and update the screen.

The ensuing table for Information settings are informational only: ERP Instance,

Ring ID, Role, State, East Link, West Link, MEL, R-APS Channel VLAN, Traffic Chan nel Instance, Type, WTR Timer, Guard Timer, Hold-off Timer and Delete (Click

Delete to delete the desired Ring ID).

76 EKI-7720 Series User Manual

4.6

MAC Address Table

The MAC Address Table provides access to the Static MAC Settings, MAC Aging

Time, and Dynamic Forwarding.

4.6.1

Static MAC

The Static MAC page allows you to configure the address for forwarding of packets, the VLAN ID of the listed MAC address and the designated Port.

To access this page, click MAC Address Table > Static MAC .

Figure 4.99 MAC Address Table > Static MAC

The following table describes the items in the previous figure.

Item

MAC Address

VLAN

Port

Apply

Description

Enter the MAC address to which packets are statically forwarded.

Click the drop-down menu to select the VLAN ID number of the VLAN for which the MAC address is residing.

Click the drop-down menu to select the port number.

Click Apply to save the values and update the screen.

To access this page, click MAC Address Table > Static MAC Status .

The following figure displays the Static MAC Status settings.

Figure 4.100 MAC Address Table > Static MAC Status

4.6.2

MAC Aging Time

The MAC Aging Time page allows you to set the MAC address of the aging time to study.

To access this page, click MAC Address Table > MAC Aging Time .

Figure 4.101 MAC Address Table > MAC Aging Time

EKI-7720 Series User Manual 77

The following table describes the items in the previous figure.

Item

Aging Time

Apply

Description

Enter the variable (10 to 630) to define the time required for aging.

Click Apply to save the values and update the screen.

The ensuing table for Dynamic Address Status settings are informational only:

Aging time.

4.6.3

Dynamic Forwarding Table

The Dynamic Forwarding function allows you to configure an address tables, which contain the following:

 The port each hardware address is associated with

 The VLAN to show or clear dynamic MAC entries

 The MAC address selection

To access this page, click MAC Address Table > Dynamic Forwarding Table .

Figure 4.102 MAC Address Table > Dynamic Forwarding Table

The following table describes the items in the previous figure.

Item

Port

VLAN

MAC Address

View

Clear

Description

Click the drop-down menu to select the port number to show or clear dynamic MAC entries. If a port, VLAN or MAC address is not selected the whole dynamic MAC table is displayed or cleared.

Click the drop-down menu to select the VLAN to show or clear dynamic MAC entries.

Enter the MAC address to show or clear dynamic MAC entries. If a port, VLAN or MAC address is not selected the whole dynamic MAC table is displayed or cleared.

Click View to display the MAC address information.

Click Clear to clear the MAC Address Information table.

To access this page, click MAC Address Table > MAC Address Information .

The following figure displays the MAC Address Information settings.

Figure 4.103 MAC Address Table > MAC Address Information

78 EKI-7720 Series User Manual

4.7

Security

The Security function allows for the configuration of Storm Control, Port Security, Pro tected Ports, DoS Prevention, Applications, 802.1x, and IP Security.

4.7.1

Storm Control

The Storm Control page allows you to setup the units and Preamble/IFG to manage the occurrence of packet flooding on the LAN and consequent traffic to prevent the degrading of network performance.

4.7.1.1

Global Settings

To access this page, click Security > Storm Control > Global Settings .

Figure 4.104 Security > Storm Control > Global Settings

The following table describes the items in the previous figure.

Item

Unit

Preamble & IFG

Shutdown Recover

Time

Apply

Description

Select pps or bps control units for the Storm Control function.

Select Excluded or Included to setup the Storm Control Global set tings.

 Excluded: exclude preamble & IFG (20 bytes) when count ingress storm control rate.

 Included: include preamble & IFG (20 bytes) when count ingress storm control rate.

Enter the shutdown recover time in seconds with range 0 or 30 ~

10000000.

Click Apply to save the values and update the screen.

To access this page, click Security > Storm Control > Storm Control Global Infor mation .

The following figure displays the Storm Control Global Information settings.

Figure 4.105 Security > Storm Control > Storm Control Global Information

4.7.1.2

Port Settings

The Port Settings page allows you to configure the port and the type of storm control association along with the value of the storm rate for the selected port.

EKI-7720 Series User Manual 79

To access this page, click Security > Storm Control > Port Settings .

Figure 4.106 Security > Storm Control > Port Settings

The following table describes the items in the previous figure.

Item

Port

Port State

Action

Type Enable

Apply

Description

Enter the port number to designate the local port for the Storm Control function.

Select Disabled or Enabled to define the port state

Click the drop-down menu to select the type of action to designate for the selected port during a Storm Control incident. The options are

Drop and Shutdown.

Click the radio button to enable Broadcast, Unknown Multicast, or

Unknown Unicast.

 Broadcast: Select the variable in Kbps to define the broadcast bandwidth.

 Unknown Multicast: Select the variable in Kbps to define the unknown multicast setting.

 Unknown Unicast: Select the variable in Kbps to define the unknown unicast setting.

Click Apply to save the values and update the screen.

The ensuing table for Storm Control Port Information settings are informational only:

Port, Port State, Broadcast (Kbps), Unknown Multicast (Kbps), Unknown

Unicast (Kbps) and Action.

The following figure displays the Storm Control Port Information settings.

Figure 4.107 Security > Storm Control > Storm Control Port Information

4.7.2

Port Security

The Port Security page allows you to configure port isolation behavior.

80 EKI-7720 Series User Manual

To access this page, click Security > Port Security .

Figure 4.108 Security > Port Security

The following table describes the items in the previous figure.

Item

Port Select

Enabled

FDB Learn Limit

(0-64)

Violation MAC Notifi cation

Apply

Description

Enter a single or multiple port numbers to configure.

Select Enabled or Disabled to define the selected Port.

Enter the variable (0 to 64) to set the learn limit for the FDB setting.

Select Enabled or Disabled to define the selected Port.

Click Apply to save the values and update the screen.

The ensuing table for Port Security Information settings are informational only:

Port, Enabled, FDB Learn Limit and Violation MAC Notification.

4.7.3

Protected Ports

The Protected Port page allows you to configure a single or multiple ports as a pro tected or unprotected type.

To access this page, click Security > Protected Ports .

Figure 4.109 Security > Protected Ports

The following table describes the items in the previous figure.

Item

Port List

Port Type

Apply

Description

Enter the port number to designate for the Protected Port setting.

Select Unprotected or Protected to define the port type.

Click Apply to save the values and update the screen.

The ensuing table for Protected Ports Status settings are informational only: Pro tected Ports and Unprotected Ports.

4.7.4

DoS Prevention

The DoS Prevention page allows you to setup (enabled or disabled) the denial of ser vice.

EKI-7720 Series User Manual 81

4.7.4.1

DoS Global Settings

The DoS Global Settings page allows you to configure (enabled or disabled) the set ting for each function.

To access this page, click Security > DoS Prevention > DoS Global Settings .

Figure 4.110 Security > DoS Prevention > DoS Global Settings

The following table describes the items in the previous figure.

Item

DMAC = SMAC

LAND

UDP Blat

TCP Blat

POD

Description

Click Enabled or Disabled to define DMAC-SMAC for the DoS Global settings.

Click Enabled or Disabled to define LAND for the DoS Global set tings.

Click Enabled or Disabled to define UDP Blat for the DoS Global set tings.

Click Enabled or Disabled to define TCP Blat for the DoS Global set tings.

Click Enabled or Disabled to define POD for the DoS Global settings.

82 EKI-7720 Series User Manual

Item Description

IPv6 Min Fragment Click Enabled or Disabled to define minimum fragment size for the

IPv6 protocol.

Enter the variable in bytes (0 to 65535) to set the minimum fragment size when the function is enabled.

ICMP Fragments Click Enabled or Disabled to define the ICMP Fragments function.

IPv4 Ping Max Size Click Enabled or Disabled to set the maximum ping size for the IPv4 protocol.

IPv6 Ping Max Size Click Enabled or Disabled to set a maximum ping size for the IPv6 protocol.

Ping Max Size Set ting

Enter the variable in bytes (0 to 65535) to set the maximum ping size.

Smurf Attack Click Enabled or Disabled to set the Smurf Attack function.

TCP Min Hdr Size Click Enabled or Disabled to set the minimum header size.

Enter the variable in bytes (0 to 31) to set the minimum header size.

TCP-SYN (SPORT <

1024)

Null Scan Attack

Click Enabled or Disabled to set the TCP synchronization function

(sport < 1021).

Click Enabled or Disabled to set the Null Scan Attack function.

X-Mas Scan Attack Click Enabled or Disabled to set the X-Mas Scan function.

TCP SYN-FIN Attack Click Enabled or Disabled to set the TCP synchronization termina tion attack function.

TCP SYN-RST

Attack

TCP Fragment (Off set = 1)

Apply

Click Enabled or Disabled to set the TCP synchronization reset attack function.

Click Enabled or Disabled to set the TCP fragment function (offset

=1).

Click Apply to save the values and update the screen.

To access this page, click Security > DoS Prevention > DoS Global Information .

The following figure displays the DoS Global Information settings.

Figure 4.111 Security > Storm Control > DoS Global Information

4.7.4.2

DoS Port Settings

The DoS Port Settings page allow you to configure DoS security (enabled or dis abled) for the selected port.

EKI-7720 Series User Manual 83

To access this page, click Security > DoS Prevention > DoS Port Settings .

Figure 4.112 Security > DoS Prevention > DoS Port Settings

The following table describes the items in the previous figure.

Item

Port

DoS Protection

Apply

Description

Select the port to configure for the DoS prevention function.

Click Enabled or Disabled to set the DoS Port security function state.

Click Apply to save the values and update the screen.

The ensuing table for DoS Port Status settings are informational only: Port and DoS

Protection.

4.7.5

Applications

The Applications function allows you to configure various types of AAA lists.

4.7.5.1

TELNET

The TELNET page allows you to combine all kinds of AAA lists with the Telnet line.

To access this page, click Security > Applications > TELNET .

Figure 4.113 Security > Applications > TELNET

The following table describes the items in the previous figure.

Item

Telnet Service

Apply

Disconnect

Description

Click Enabled or Disabled to set remote access through the Telnet

Service function.

Click Apply to save the values and update the screen.

Click Disconnect to disable the current Telnet service.

The ensuing table for Telnet Information settings are informational only: Telnet Ser vice and Current Telnet Sessions Count.

4.7.5.2

SSH

Secure Shell (SSH) is a protocol providing secure (encrypted) management connec tion to a remote device.

84 EKI-7720 Series User Manual

To access this page, click Security > Applications > SSH .

Figure 4.114 Security > Applications > SSH

The following table describes the items in the previous figure.

Item

SSH Service

Apply

Description

Click Enabled or Disabled to set up Ethernet encapsulation (remote access) through the Secure Shell (SSH) function.

Click Apply to save the values and update the screen.

The ensuing table for SSH Information settings are informational only: SSH.

4.7.5.3

HTTP

The HTTP page allows you to combine all kinds of AAA lists to the HTTP line.

Attempts to access the switch’s Web UI from HTTP are first authenticated.

To access this page, click Security > Applications > HTTP .

Figure 4.115 Security > Applications > HTTP

The following table describes the items in the previous figure.

Item

HTTP Service

Session Timeout

Apply

Description

Click Enabled or Disabled to set up Ethernet encapsulation (remote access) through HTTP function.

Enter the variable in minutes (0 to 86400) to define the timeout period for the HTTP session.

Click Apply to save the values and update the screen.

The ensuing table for HTTP Information settings are informational only: HTTP Ser vice and Session Timeout.

4.7.5.4

HTTPS

The HTTPS page allows you to combine all kinds of AAA lists on the HTTPS line.

Attempts to access the switch’s Web UI from HTTPS are first authenticated.

EKI-7720 Series User Manual 85

To access this page, click Security > Applications > HTTPS .

Figure 4.116 Security > Applications > HTTPS

The following table describes the items in the previous figure.

Item

HTTPS Service

Session Timeout

Apply

Description

Click Enabled or Disabled to set up Ethernet encapsulation over

HTTPS.

Enter the variable in minutes (0 to 86400) to define the timeout period for the HTTP session.

Click Apply to save the values and update the screen.

The ensuing table for HTTPS Information settings are informational only: HTTPS

Service and Session Timeout.

4.7.6

802.1x

The 802.1x function provides port-based authentication to prevent unauthorized devices (clients) from gaining access to the network.

4.7.6.1

802.1x Global Settings

The 802.1x Global Settings page allows you to set the state (enabled or disabled) for the selected IP server address, port, accounting port and associated password, including a reauthentication period.

To access this page, click Security > 802.1x

> 802.1x Global Settings .

Figure 4.117 Security > 802.1x > 802.1x Global Settings

The following table describes the items in the previous figure.

Item

State

Server IP

Description

Click Enabled or Disabled to set up 802.1x Setting function.

Enter the IP address of the local server providing authentication func tion.

86 EKI-7720 Series User Manual

Item

Server Port

Accounting Port

Security Key

Reauth Period

Apply

Description

Enter the port number (1 to 65535) assigned to the listed Server IP.

Enter the port number (1 to 65535) assigned to the listed server IP configured to provide authorization and authentication for network access.

Enter the variable to define the network security key used in authenti cation.

Enter the variable in seconds to define the period of time between authentication attempts.

Click Apply to save the values and update the screen.

To access this page, click Security > 802.1x > 802.1x Information .

The following figure displays the 802.1x Information settings.

Figure 4.118 Security > 802.1x > 802.1x Information

4.7.6.2

802.1x Port Configuration

The 802.1x Port Configuration page allows you to identify the authorization state for a port by using a MAC or Port authentication base.

To access this page, click Security > 802.1x

> 802.1x Port Configuration .

Figure 4.119 Security > 802.1x > 802.1x Port Configuration

The following table describes the items in the previous figure.

Item Description

Authentication based Click Port , Mac or Mac-Auth-Bypass to designate the type of config uration for the 802.1x Port setting.

Port Select

State

Apply

Enter the port number associated with the configuration setting.

Click Authorize or Disabled to define the listed port’s state mode.

Click Apply to save the values and update the screen.

The ensuing table for 802.1x Port Authorization settings are informational only: Port and Port State.

4.7.7

IP Security

This section provides you a means to configure the IP Security settings.

EKI-7720 Series User Manual 87

4.7.7.1

Global Settings

The Global Settings page allows you to set the IP Security status (enabled or dis abled).

To access this page, click Security > IP Security > Global Settings .

Figure 4.120 Security > IP Security > Global Settings

The following table describes the items in the previous figure.

Item

Status

Apply

Description

Click Enabled or Disabled to define the global setting for the IP secu rity function.

Click Apply to save the values and update the screen.

The ensuing table for IP Security Status settings are informational only: IP Security.

4.7.7.2

Entry Settings

Once the Global Setting is enabled, use the Entry Settings to define an IP Security entry.

To access this page, click Security > IP Security > Entry Settings .

Figure 4.121 Security > IP Security > Entry Settings

The following table describes the items in the previous figure.

Item

IP Address

IP Mask

Services

Apply

Description

Enter the source IP address to apply the IP Security function.

Enter the IP address for use in masking the previous IP Address.

Enter the type of services to associate with the entry setting.

Click Apply to save the values and update the screen.

The ensuing table for IP Security Entry Information settings are informational only:

IP Address, IP Mask, Services and Action.

88 EKI-7720 Series User Manual

4.7.8

Security Login

4.7.8.1

Global Settings

This function provides a means to enable or disable the global security settings for the system.

To access this page, click Security > Security Login > Global Settings .

Figure 4.122 Security > Security Login > Global Settings > Global Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Click Enabled or Disabled to set up security login global setting sta tus.

Click Apply to save the values and update the screen.

Figure 4.123 Security > Security Login > Global Settings > RADIUS Settings

The following table describes the items in the previous figure.

Item

Server IP

Server Port

Security Key

Auth Type

Apply

Description

Enter the IP address of the local server providing authentication func tion.

Enter the port number (1 to 65535) assigned to the listed Server IP.

Enter the variable to define the network security key used in authenti cation.

Click the drop down menu to select the Authentication type with option

MD5, TTLS or PEAP. Each authentication type is mapping to specified authentication protocol as below:

 MD5: Using authentication protocol with None.

 TTLS: Using authentication protocol with TTLS.

 PEAP: Using authentication protocol with PEAP.

Click Apply to save the values and update the screen.

EKI-7720 Series User Manual 89

Figure 4.124 Security > Security Login > Global Settings > TACACS Settings

The following table describes the items in the previous figure.

Item

Server IP

Server Port

Security Key

Apply

Description

Enter the IP address of the local server providing authentication func tion.

Enter the port number (1 to 65535) assigned to the listed Server IP.

Enter the variable to define the network security key used in authenti cation.

Click Apply to save the values and update the screen.

To access this page, click Security > Security Login > Global Settings > Global

Information .

The following figure displays the Global Information settings.

Figure 4.125 Security > Security Login > Global Settings > Global Information

4.7.8.2

Access Control Settings

This function specifies the login authentication type for the system.

To access this page, click Security > Security Login > Security Login Access

Control Settings .

Figure 4.126 Security > Security Login > Access Control Settings > Security

Login Type Settings

90 EKI-7720 Series User Manual

The following table describes the items in the previous figure.

Item

Login Type

Apply

Description

Click to select the login type. Options include: None Used, RADIUS

Only, TACACS Only, RADIUS & TACACS or RADIUS & TACACS &

WEB.

Click Apply to save the values and update the screen.

Figure 4.127 Security > Security Login > Access Control Settings > Security

Login Type Settings

The following table describes the items in the previous figure.

Item

HTTP

TELNET

SSH

Apply

Description

Click Enabled or Disabled to set up HTTP.

Click Enabled or Disabled to set up HTTPS.

Click Enabled or Disabled to set up SSH.

Click Apply to save the values and update the screen.

To access this page, click Security > Security Login > Access Control Settings >

Global Information .

The following figure displays the Access Control Information settings.

Figure 4.128 Security > Security Login > Access Control Settings > Access

Control Information

4.7.9

Access Control List

The Access Control List is the basic traffic filter for ingress and egress packets. Allow user to filter criteria for diverse protocols and deny access to specific source or desti nation IP/MAC addresses.

4.7.9.1

MAC ACL

Entry Settings

EKI-7720 Series User Manual 91

To access this page, click Security > Access Control List > MAC ACL > Entry Set tings .

Figure 4.129 Security > Access Control List > MAC ACL > Entry Settings

The following table describes the items in the previous figure.

Item Description

Entry ID

Destination MAC

Address

Destination MAC

Mask

Source MAC

Address

Type in the value designating the entry ID.

Enter the MAC address to set destination MAC address.

Enter a value to specify the subnet mask for the destination MAC address.

Enter the MAC address to set source MAC address.

Source MAC Mask Enter a value to specify the subnet mask for the source MAC address.

Ether Type Enter a value to specify the DNS server for the interface.

VLAN ID

Portlist

Action

Type in the value designating the VLAN ID.

Select the port to configure for the MAC ACL function.

Assign Queue

Status

Add

Click the drop down menu to select the MAC ACL action. Options include: Permit, Drop, Assign Queue, Redirect Port or Redirect Port list.

Click the drop down menu to select the queue. The function is only available when Action is Assign Queue .

Click the drop down menu to select the MAC ACL status. Options include: Active or Inactive.

Click Add to add a MAC ACL entry.

92 EKI-7720 Series User Manual

Entry List

To access this page, click Security > Access Control List > MAC ACL > Entry List .

The following figure displays the Entry List settings.

Figure 4.130 Security > Access Control List > MAC ACL > Entry List

4.7.9.2

IP ACL

Entry Settings

To access this page, click Security > Access Control List > IP ACL > Entry Set tings .

Figure 4.131 Security > Access Control List > IP ACL > Entry Settings

The following table describes the items in the previous figure.

Item Description

Entry ID Type in the value designating the entry ID.

Destination IP

Address

Enter the IP address to set destination IP address.

Destination IP Mask Enter a value to specify the subnet mask for the destination IP address.

Source IP Address Enter the IP address to set source IP address.

Source IP Mask Enter a value to specify the subnet mask for the source IP address.

IP Protocol Click the drop down menu to select the IP protocol. Options include: none, ICMP, TCP or UDP.

L4 Destination Port Enter a value to specify the L4 destination port.

L4 Source Port Enter a value to specify the L4 source port.

EKI-7720 Series User Manual 93

Item

Portlist

Action

Assign Queue

Status

Add

Description

Select the port to configure for the IP ACL function.

Click the drop down menu to select the IP ACL action. Options include: Permit, Drop or Assign Queue.

Click the drop down menu to select the queue. The function is only available when Action is Assign Queue .

Click the drop down menu to select the IP ACL status. Options include: Active or Inactive.

Click Add to add an IP ACL entry.

Entry List

To access the Entry List, click Security > Access Control List > IP ACL > Entry

List .

The ensuing figure for IP ACL Information settings are informational only: Entry ID,

Summary, Portlist, Action, Status and Modify (Click Edit to edit the desire entry id or

Delete to remove the desired entry id).

Figure 4.132 Security > Access Control List > IP ACL > Entry List

4.7.10

IP Source Guard

4.7.10.1

Global Settings

To access this page, click Security > IP Source Guard > Global Settings .

Figure 4.133 Security > IP Source Guard > Global Settings

The following table describes the items in the previous figure.

Item

Portlist

Modify

Description

Select the port to verify.

Click Modify to save the values and update the screen.

94 EKI-7720 Series User Manual

The following figure displays the Global Information settings.

Figure 4.134 Security > IP Source Guard > Global Information

4.7.10.2

Entry Settings

To access this page, click Security > IP Source Guard > Entry Settings .

Figure 4.135 Security > IP Source Guard > Entry Settings

The following table describes the items in the previous figure.

Item Description

Source MAC

Address

Enter the MAC address to set source MAC address.

Source IP Address Enter the IP address to set source IP address.

Port Select the port to configure for the IP source guard.

Add Click Add to add an IP source guard.

To access this page, click Security > IP Source Guard > Entry Information .

The following figure displays the Entry Information settings.

Figure 4.136 Security > IP Source Guard > Entry Information

EKI-7720 Series User Manual 95

4.7.11

DHCP Snooping

4.7.11.1

Global Settings

To access this page, click Security > DHCP Snooping > Global Settings .

Figure 4.137 Security > DHCP Snooping > Global Settings > DHCP Snooping

State Settings

The following table describes the items in the previous figure.

Item

DHCP Snooping

State

Apply

Description

Click Enabled or Disabled to set DHCP snooping state.

Click Apply to save the values and update the screen.

Figure 4.138 Security > DHCP Snooping > Global Settings > DHCP Snooping

Port Settings

The following table describes the items in the previous figure.

Item

DHCP Snooping Port

Select

Enabled

Apply

Description

Select the port to configure for the DHCP Snooping port.

Click Enabled or Disabled to enable DHCP Snooping port.

Click Apply to save the values and update the screen.

Figure 4.139 Security > DHCP Snooping > Global Settings > DHCP Snooping

Binding Port Settings

The following table describes the items in the previous figure.

Item

DHCP Snooping

Binding Port Select

Enabled

Apply

Description

Select the port to configure for the DHCP snooping binding port.

Click Enabled or Disabled to enable DHCP Snooping binding.

Click Apply to save the values and update the screen.

96 EKI-7720 Series User Manual

To access this page, click Security > DHCP Snooping > Global Settings > DHCP

Snooping Information .

The following figure displays the DHCP Snooping Information settings.

Figure 4.140 Security > DHCP Snooping > Global Settings > DHCP Snooping

Information

4.7.11.2

Entry Settings

To access this page, click Security > DHCP Snooping > Entry Settings .

The following figure displays the IP Security Entry Information settings.

Figure 4.141 Security > DHCP Snooping > Entry Settings > Entry Information

4.7.11.3

L2-Relay State Settings

To access this page, click Security > DHCP Snooping > L2-Relay Settings .

The following figure displays the L2-Relay State settings.

Figure 4.142 Security > DHCP Snooping > L2-Relay Settings

The following table describes the items in the previous figure.

Item

L2-Relay State

Apply

Description

Click Enable or Disable to set the function state.

Click Apply to save the values and update the screen.

To access this page, click Security > DHCP Snooping > L2-Relay Port Settings .

The following figure displays the L2-Relay Port settings.

Figure 4.143 Security > DHCP Snooping > L2-Relay Port Settings

The following table describes the items in the previous figure.

Item Description

L2-Relay Port Select Enter the port number to add the corresponding port to the relay.

Enabled Click Enable or Disable to set the function state.

Apply Click Apply to save the values and update the screen.

To access this page, click Security > DHCP Snooping > L2-Relay VLAN Settings .

EKI-7720 Series User Manual 97

The following figure displays the L2-Relay VLAN settings.

Figure 4.144 Security > DHCP Snooping > L2-Relay VLAN Settings

The following table describes the items in the previous figure.

Item Description

L2-Relay VLAN List Enter the port number to add the corresponding port to the relay.

Enabled Click Enable or Disable to set the function state.

Apply Click Apply to save the values and update the screen.

To access this page, click Security > DHCP Snooping > Circuit ID Settings .

The following figure displays the Circuit ID Settings & Remote ID settings.

Figure 4.145 Security > DHCP Snooping > Circuit ID Settings

The following table describes the items in the previous figure.

Item

Circuit ID Type

Circuit-ID User-

Define String

Remote ID Type

Description

Enter the port number to add the corresponding port to the relay.

Click Enable or Disable to set the function state.

Remote-ID User-

Define String

Apply

Remote ID type: Select the remote ID type to be user-define or reserved.

 User-define: Manually specify a remote ID type.

 Reserved: Set up the remote ID type by reserved format.

Enter the string variable (max. 64 characters) to correspond to the user defined Remote-ID entry when User-define is selected.

Click Apply to save the values and update the screen.

To access this page, click Security > DHCP Snooping > L2 Relay Information . The following figure displays the L2 Relay Information settings.

Figure 4.146 Security > DHCP Snooping > L2 Relay Information

The following table describes the items in the previous figure.

98 EKI-7720 Series User Manual

4.7.12

ARP Spoofing

To access this page, click Security > ARP Spoofing .

Figure 4.147 Security > ARP Spoofing

The following table describes the items in the previous figure.

Item Description

Source MAC

Address

Enter the MAC address to set source MAC address.

Source IP Address Enter the IP address to set source IP address.

Add Click Add to add an ARP spoofing.

To access this page, click Security > Entry Information .

The following figure displays the Entry Information settings.

Figure 4.148 Security > Entry Information

The following table describes the items in the previous figure.

EKI-7720 Series User Manual 99

4.8

QoS

The QoS function allows you to configure settings for the switch QoS interface and how the switch connects to a remote server to get services.

4.8.1

General

Traditionally, networks operate on a best-effort delivery basis, all traffic has equal pri ority and an equal chance of being delivered in a timely manner. When there is con gestion, all traffic has an equal chance of being dropped.

The QoS feature can be configured for congestion-management and congestionavoidance to specifically manage the priority of the traffic delivery. Implementing QoS effective.

in the network makes performance predictable and bandwidth utilization much more

The QoS implementation is based on the prioritization values in Layer 2 frames.

4.8.1.1

QoS Properties

The QoS Properties allows you to set the QoS mode.

To access this page, click QoS > General > QoS Properties .

Figure 4.149 QoS > General > QoS Properties

The following table describes the items in the previous figure.

Item

QoS Mode

Apply

Description

Select Disabled or Basic to setup the QoS function.

Click Apply to save the values and update the screen.

The ensuing table for QoS Global Information settings are informational only: QoS

Mode.

4.8.1.2

QoS Settings

Once the QoS function is enabled, you can configure the available settings.

To access this page, click QoS > General > QoS Settings .

Figure 4.150 QoS > General > QoS Settings

100 EKI-7720 Series User Manual

The following table describes the items in the previous figure.

Item

Port

CoS Value

Remark CoS

Remark DSCP

Remark IP Prece dence

Apply

Description

Enter the port number to associate with the QoS setting.

Click the drop-down menu to designate the Class of Service (CoS) value (0 to 7) for the Port entry.

Click Disabled or Enabled to setup the Remark CoS function. When enabled the LAN (preassigned priority values) is marked at Layer 2 boundary to CoS values.

Click Disabled or Enabled to setup the DSCP remark option for the

QoS function.

Click Disabled or Enabled to setup the Remark IP Precedence for the QoS function.

Click Apply to save the values and update the screen.

To access this page, click QoS > General > QoS Status .

The following figure displays the QoS Status settings.

Figure 4.151 QoS > General > QoS Status

4.8.1.3

Queue Scheduling

The switch support eight CoS queues for each egress port. For each of the eight queues, two types of scheduling can be configured: Strict Priority and Weighted

Round Robin (WRR).

Strict Priority scheduling is based on the priority of queues. Packets in a high-priority queue are always sent first and packets in a low-priority queue are only sent after all the high priority queues are empty.

Weighted RoundRobin (WRR) scheduling is based on the user priority specification to indicate the importance (weight) of the queue relative to the other CoS queues.

WRR scheduling prevents low-priority queues from being completely ignored during periods of high priority traffic. The WRR scheduler sends some packets from each queue in turn.

EKI-7720 Series User Manual 101

To access this page, click QoS > General > QoS Scheduling .

Figure 4.152 QoS > General > QoS Scheduling

The following table describes the items in the previous figure.

Item Description

Queue

Strict

WRR

Queue entry for egress port.

Select Strict to assign the scheduling designation to the selected queue.

Select WRR to assign the scheduling designation to the selected queue.

Weight

Apply

Enter a queue priority (weight) relative to the defined entries (WRR only).

% of WRR Bandwidth Displays the allotted bandwidth for the queue entry in percentage val ues.

Click Apply to save the values and update the screen.

To access this page, click QoS > General > QoS Information .

The following figure displays the Queue Information settings.

Figure 4.153 QoS > General > QoS Information

4.8.1.4

CoS Mapping

The CoS Mapping allows you to apply CoS mapping.

102 EKI-7720 Series User Manual

To access this page, click QoS > General > CoS Mapping .

Figure 4.154 QoS > General > CoS Mapping

The following table describes the items in the previous figure.

Item Description

CoS to Queue Mapping

Class of Service

Queue

Displays the CoS for the queue entry.

Click the drop-down menu to select the queue priority for selected

CoS.

Queue to CoS Mapping

Queue Displays the queue entry for CoS mapping.

Class of Service

Apply

Click the drop-down menu to select the CoS type

Click Apply to save the values and update the screen.

To access this page, click QoS > General > CoS Mapping .

The following figure displays the CoS Mapping Information settings.

Figure 4.155 QoS > General > CoS Mapping

To access this page, click QoS > General > CoS Mapping .

EKI-7720 Series User Manual 103

The following figure displays the Queue Mapping Information settings.

Figure 4.156 QoS > General > CoS Mapping

4.8.1.5

DSCP Mapping

The DSCP to Queue mapping function maps queue values in incoming packets to a lowing table shows the DSCP to Queue map.

DSCP value that QoS uses internally to represent the priority of the traffic. The fol -

If these values are not appropriate for your network, you need to modify them.

To access this page, click QoS > General > DSCP Mapping .

Figure 4.157 QoS > General > DSCP Mapping

The following table describes the items in the previous figure.

Item Description

DSCP to Queue Mapping

DSCP

Queue

Enter the DSCP entry to define the precedence values.

Click the drop-down menu to select the queue designation for the

DSCP value.

Queue to DSCP Mapping

Queue Displays the queue value for the DSCP map.

DSCP

Apply

Enter the DSCP entry to define the precedence values.

Click Apply to save the values and update the screen.

The ensuing table for DSCP Mapping Information settings are informational only:

DSCP and Mapping to Queue.

The ensuing table for Queue Mapping Information settings are informational only:

Queue and Mapping to DSCP.

104 EKI-7720 Series User Manual

4.8.1.6

IP Precedence Mapping

The IP Precedence Mapping allows you to set IP Precedence mapping.

To access this page, click QoS > General > IP Precedence Mapping .

Figure 4.158 QoS > General > IP Precedence Mapping

The following table describes the items in the previous figure.

Item Description

IP Precedence to Queue Mapping

IP Precedence

Queue

Displays the IP precedence value for the queue map.

Click the drop-down menu to map a queue value to the selected IP precedence.

Queue to IP Precedence Mapping

Queue Displays the queue entry for mapping IP precedence values.

IP Precedence

Apply

Click the drop-down menu to map an IP precedence value to the selected queue.

Click Apply to save the values and update the screen.

The ensuing table for IP Precedence Mapping Information settings are informa tional only: IP Precedence and Mapping to Queue.

The ensuing table for Queue Mapping Information settings are informational only:

Queue and Mapping to IP Precedence.

4.8.2

QoS Basic Mode

Quality of Service (QoS) allows to give preferential treatment to certain types of traffic at the expense of others. Without QoS, the switch offers best-effort service to each assurance of reliability, delay bounds, or throughput.

packet, regardless of the packet contents or size sending the packets without any

QoS mode supports two modes: 802.1p and DSCP.

EKI-7720 Series User Manual 105

4.8.2.1

Global Settings

The Global Settings page allows you to configure the trust mode to a port selection.

To access this page, click QoS > QoS Basic Mode > Global Settings .

The function is only available when QoS Properties is set to Basic .

Figure 4.159 QoS > QoS Basic Mode > Global Settings

The following table describes the items in the previous figure.

Item

Trust Mode

Apply

Description

Click the drop-down menu to select the trust state of the QoS basic mode. Settings: None, CoS/802.1p, DSCP, CoS/802.1p-DSCP and IP

Precedence.

Click Apply to save the values and update the screen.

To access this page, click QoS > General > Global Settings .

The following figure displays the QoS Information settings.

Figure 4.160 QoS > General > Global Settings

4.8.2.2

Port Settings

The Port Settings page allows you to define a trust state (enabled or disabled) to a listed port.

To access this page, click QoS > QoS Basic Mode > Port Settings .

Figure 4.161 QoS > QoS Basic Mode > Port Settings

The following table describes the items in the previous figure.

Item

Port

Trust State

Apply

Description

Enter the port number for the QoS basic mode setting.

Select Enabled or Disabled to set the port’s trust state status.

Click Apply to save the values and update the screen.

The ensuing table for QoS Port Status settings are informational only: Port and Trust

State.

106 EKI-7720 Series User Manual

4.8.3

Rate Limit

Rate Limits features control on a per port basis. Bandwidth control is supported for the following: Ingress Bandwidth Control, Egress Bandwidth Control and Egress

Queue.

4.8.3.1

Ingress Bandwidth Control

The Ingress Bandwidth Control page allows you to configure the bandwidth control for a listed port.

To access this page, click QoS > Rate Limit > Ingress Bandwidth Control .

Figure 4.162 QoS > Rate Limit > Ingress Bandwidth Control

The following table describes the items in the previous figure.

Item

Port

State

Rate (Kbps)

Action

Apply

Description

Enter the port number for the rate limit setup.

Select Disabled or Enabled to set the port’s state status.

Enter the value in Kbps (16 to 1000000) to set as the bandwidth rate for the selected port.

Select the Ingress port action to be Drop or Shutdown.

Click Apply to save the values and update the screen.

To access this page, click QoS > Rate Limit > Ingress Bandwidth Control .

The following figure displays the Ingress Bandwidth Control Recover Time set tings.

Figure 4.163 QoS > Rate Limit > Ingress Bandwidth Control

To access this page, click QoS > Rate Limit > Ingress Bandwidth Control .

The following figure displays the Ingress Bandwidth Control Status settings.

Figure 4.164 QoS > Rate Limit > Ingress Bandwidth Control

4.8.3.2

Egress Bandwidth Control

The Egress Bandwidth Control page allows you to set the egress bandwidth control for a listed port.

EKI-7720 Series User Manual 107

To access this page, click QoS > Rate Limit > Egress Bandwidth Control .

Figure 4.165 QoS > Rate Limit > Egress Bandwidth Control

The following table describes the items in the previous figure.

Item

Port

State

Rate (Kbps)

Apply

Description

Enter the port number to set the Egress Bandwidth Control.

Select Disabled or Enabled to set the Egress Bandwidth Control state.

Enter the value in Kbps (16 to 1000000) to set the Egress Bandwidth rate.

Click Apply to save the values and update the screen.

To access this page, click QoS > Rate Limit > Egress Bandwidth Control .

The following figure displays the Egress Bandwidth Control Status settings.

Figure 4.166 QoS > Rate Limit > Egress Bandwidth Control

4.8.3.3

Egress Queue

The Egress Queue page allows you to set the egress bandwidth parameters.

To access this page, click QoS > Rate Limit > Egress Queue .

Figure 4.167 QoS > Rate Limit > Egress Queue

108 EKI-7720 Series User Manual

The following table describes the items in the previous figure.

Item

Port

Queue

State

CIR (Kbps)

Apply

Description

Click the drop-down menu to select the port to define the Egress queue.

Click the drop-down menu to set the queue order for the Egress set ting.

Click Disabled or Enabled to set the Egress queue state.

Enter the value in Kbps (16 to 1000000) to set the CIR rate for the

Egress queue.

Click Apply to save the values and update the screen.

The ensuing table for FE1 Egress Per Queue Status settings are informational only:

Queue Id and Egress Rate Limit (Kbps).

4.8.4

Bandwidth Guarantee

4.8.4.1

Global Settings

To access this page, click QoS > Bandwidth Guarantee > Global Settings .

Figure 4.168 QoS > Bandwidth Guarantee > Global Settings

The following table describes the items in the previous figure.

Item

Status

Guarantee Band width

Type

Description

Click Disabled or Enabled to set the guarantee bandwidth.

Enter the value for the guarantee bandwidth.

UDP Source Port

Force Mode

Apply

Click UDP Source Port or RTP H.264

to set the guarantee bandwidth type.

Enter the port number for the UDP source.

Click the check box to enable the force mode.

Click Apply to save the values and update the screen.

To access this page, click QoS > Bandwidth Guarantee > Global Settings .

EKI-7720 Series User Manual 109

The following figure displays the Ingress Bandwidth Control Status settings.

Figure 4.169 QoS > Bandwidth Guarantee > Global Settings

4.8.4.2

Utilization

To access this page, click QoS > Bandwidth Guarantee > Utilization .

Figure 4.170 QoS > Bandwidth Guarantee > Utilization

The following table describes the items in the previous figure.

Item

Refresh period

Apply

Description

Click the drop-down menu to select refresh time.

Click Apply to save the values and update the screen.

110 EKI-7720 Series User Manual

4.9

Management

4.9.1

LLDP

LLDP is a one-way protocol without request/response sequences. Information is advertised by stations implementing the transmit function, and is received and pro cessed by stations implementing the receive function.

4.9.1.1

LLDP System Settings

The LLDP System Settings allows you to configure the status (enabled or disabled) for the protocol, set the interval for frame transmission, set the hold time multiplier and the re-initialization delay.

To access this page, click Management > LLDP > LLDP System Settings .

Figure 4.171 Management > LLDP > LLDP System Settings

The following table describes the items in the previous figure.

Item Description

Enabled

LLDP PDU Disable

Action

Click Enabled or Disabled to set the Global Settings state.

Click to select the LLDP PDU handling action when LLDP is globally disabled. Options include: Filtered, Bridged, or Flooded.

Transmission Interval Select the interval at which frames are transmitted. The default is 30 seconds, and the valid range is 5 to 32768 seconds.

Holdtime Multiplier Select the multiplier on the transmit interval to assign to TTL.

Reinitialization Delay Select the delay length before re-initialization.

Transmit Delay Select the delay after an LLDP frame is sent.

Apply Click Apply to save the values and update the screen.

To access this page, click Management > LLDP > LLDP System Settings .

The following figure displays the LLDP Global Config settings.

Figure 4.172 Management > LLDP > LLDP System Settings

EKI-7720 Series User Manual 111

4.9.1.2

LLDP Port Settings

The LLDP Port Settings page allows you to configure the state (enabled or disabled) of the selected port.

To access this page, click Management > LLDP > LLDP Port Settings .

Figure 4.173 Management > LLDP > LLDP Port Settings > LLDP Port

Configuration

The following table describes the items in the previous figure.

Item

Port Select

State

Apply

Description

Enter the port number associated with the LLDP setting.

Click the drop-down menu to select the LLDP port state.

Click Apply to save the values and update the screen.

The following figure displays the Optional TLVs Selection settings.

Figure 4.174 Management > LLDP > LLDP Port Settings > Optional TLVs

Selection

The following table describes the items in the previous figure.

Item

Port Select

Description

Enter the port number associated with the TLV (optional) selection.

112 EKI-7720 Series User Manual

Item Description

Optional TLV Select Click the drop-down menu to select the LLDP optional TLVs to be car ried (multiple selections are allowed).

 System Name: To include system name TLV in LLDP frames.

 Port Description: To include port description TLV in LLDP frames.

 System Description: To include system description TLV in LLDP frames.

 System Capability: To include system capability TLV in LLDP frames.

 802.3 MAC-PHY: To indicate the current duplex and bit rate set tings of the device.

 802.3 Link Aggregation: To indicate the link can be aggregated.

 802.3 Maximum Frame Size: To indicate the maximum frame size capability of the MAC-PHY implementation.

 Management Address: To select the advertising IP management address.

 802.1 PVID: To select to advertise the PVID in the TLV.

Apply Click Apply to save the values and update the screen.

The following figure displays the LLDP Port Status settings.

Figure 4.175 Management > LLDP > LLDP Port Settings > VLAN Name TLV

VLAN Selection

The following table describes the items in the previous figure.

Item

Port Select

VLAN Select

Description

Enter the port number to associated with the TLV selection.

Select the VLAN Name ID to be carried out (multiple selection is allowed).

Click Apply to save the values and update the screen.

Apply

The ensuing table for LLDP Port VLAN TLV Status settings are informational only:

Port and Selected VLAN.

4.9.1.3

LLDP Local Device Info

The LLDP Local Device Info page allows you to view information regarding network devices.

devices, providing that the switch has already obtained LLDP information on the

To access this page, click Management > LLDP > LLDP Local Device Info .

EKI-7720 Series User Manual 113

The following figure displays the Local Device Summary settings.

Figure 4.176 Management > LLDP > LLDP Local Device Info

To access this page, click Management > LLDP > LLDP Local Device Info .

The following figure displays the Port Status settings.

Figure 4.177 Management > LLDP > LLDP Local Device Info

4.9.1.4

LLDP Remote Device Info

The LLDP Remote Device Info page allows you to view information about remote devices, LLDP information must be available on the switch.

To access this page, click Management > LLDP > LLDP Remote Device Info .

Figure 4.178 Management > LLDP > LLDP Remote Device Info

The following table describes the items in the previous figure.

Item

Detail

Delete

Refresh

Description

Click to display the device details.

Click to delete the selected devices.

Click to refresh the remote device information list.

4.9.1.5

LLDP Overloading

To access this page, click Management > LLDP > LLDP Overloading .

114 EKI-7720 Series User Manual

The following figure displays the LLDP Overloading settings.

Figure 4.179 Management > LLDP > LLDP Overloading

4.9.2

SNMP

Simple Network Management Protocol (SNMP) is a protocol to facilitate the monitor ing and exchange of management information between network devices. Through

SNMP, the health of the network or status of a particular device can be determined.

4.9.2.1

SNMP Settings

The SNMP Settings page allows you to set the SNMP daemon state (enabled or dis abled).

To access this page, click Management > SNMP > SNMP Settings .

Figure 4.180 Management > SNMP > SNMP Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Click Enabled or Disabled to define the SNMP daemon.

Click Apply to save the values and update the screen.

The ensuing table for SNMP Information settings are informational only: SNMP.

4.9.2.2

SNMP Community

The SNMP Community page provides configuration options for the community.

SNMP v1 and SNMP v2c use the group name (Community Name) certification. It’s role is similar to the password function. If SNMP v1 and SNMP v2c are used, you can munity.

go directly from the configuration settings to this page to configure the SNMP com -

EKI-7720 Series User Manual 115

To access this page, click Management > SNMP > SNMP Community .

Figure 4.181 Management > SNMP > SNMP Community

The following table describes the items in the previous figure.

Item Description

Community Name Enter a community name (up to 20 characters).

Access Right Click the radio box to specify the access level (read only or read write)

Apply Click Apply to save the values and update the screen.

To access this page, click Management > SNMP > SNMP Community .

The following figure displays the Community Status settings.

Figure 4.182 Management > SNMP > SNMP Community

4.9.2.3

SNMPv3 EngineID

To access this page, click Management > SNMP > SNMPv3 EngineID .

Figure 4.183 Management > SNMP > SNMPv3 EngineID

The following table describes the items in the previous figure.

Item

SNMP EngineID

Description

Enter the hexadecimal string to define the engine ID for SNMPv3 agent.

4.9.2.4

SNMPv3 Settings

The SNMPv3 Settings page allows you to create SNMP groups. The users have the tings.

same level of security and access control permissions as defined by the group set -

116 EKI-7720 Series User Manual

To access this page, click Management > SNMP > SNMPv3 Settings .

Figure 4.184 Management > SNMP > SNMPv3 Settings

The following table describes the items in the previous figure.

Item

User Name

Access Right

Encrypted

Auth-Protocol

Password

Priv-Protocol

Password

Add

Description

Enter a user name (up to 32 characters) to create an SNMP profile.

Click read-only or read-write to define the access right for the profile.

Click the option to set the encrypted option for the user setting.

Click the drop-down menu to select the authentication level: MD5 or

SHA. The field requires a user password.

 MD5: specify HMAC-MD5-96 authentication level

 SHA: specify HMAC-SHA authentication protocol

Enter the characters to define the password associated with the authentication protocol.

Click the drop-down menu to select an authorization protocol: none or

DES.The field requires a user password.

 None: no authorization protocol in use

 DES: specify 56-bit encryption in use

Enter the characters to define the password associated with the authorization protocol.

Click Add to save the values and update the screen.

The ensuing table for User Status settings are informational only: User Name,

Access Right, Auth-Protocol, Priv-Protocol and Delete (click to delete the desired user name).

4.9.2.5

SNMP Trap

The SNMP Trap page allows you to set the IP address of the node and the SNMP credentials corresponding to the version that is included in the trap message.

EKI-7720 Series User Manual 117

To access this page, click Management > SNMP > SNMP Trap .

Figure 4.185 Management > SNMP > SNMP Trap

The following table describes the items in the previous figure.

Item

IP Address

Community Name/

User Name

Version

Description

Enter the IP address to designate the SNMP trap host.

Click the drop-down menu to select a defined community name.

Add

Click the drop-down menu to designate the SNMP version credentials

(v1, v2c - trap, v2c - inform, v2c - trap or v2c - inform).

Click Add to save the values and update the screen.

The ensuing table for Trap Host Status settings are informational only: No., IP

Address, Community Name, Version and Delete (click to delete the desired IP address).

4.9.3

Power Over Ethernet

Power Over Ethernet is the function supplying power to Powered Devices (PD) through the switch in the event that AC power is not readily available.

Power over Ethernet can be used for the following areas:

 Surveillance devices

 I/O sensors for security requirements

 Wireless access points

Series

EKI

Supported Models

EKI-7708E/G-4FP, EKI-7710E/G-2CP, EKI-7712E/G-4FP, EKI-7720G-

4FP, EKI-7428G-4CP

4.9.3.1

PoE System Settings

The PoE System Settings page allows you to configure the overload disconnect and the maximum available wattage.

118 EKI-7720 Series User Manual

To access this page, click Management > Power Over Ethernet > PoE System

Settings .

Figure 4.186 Management > Power Over Ethernet > PoE System Settings

The following table describes the items in the previous figure.

Item

Maximum Power

Available

OverLoad Discon nect Mode

Apply

Description

Select the value in Watts to set the maximum available power.

Click the drop-down menu to designate the overload mode:

 Overload Port First:

 Port-Based Priority:

Click Apply to save the values and update the screen.

The ensuing table for PoE System Information settings are informational only: Firm ware Version, Maximum Power Available, Actual Power Consumption and Overload

Disconnect Type.

4.9.3.2

PoE Port Settings

The PoE Port Settings page allows you to configure the port status, its power limita tions, legacy mode status, and power limit settings.

To access this page, click Management > Power Over Ethernet > PoE Port Set tings .

Figure 4.187 Management > Power Over Ethernet > PoE Port Settings

The following table describes the items in the previous figure.

Item

Port

Enabled

Description

Click the drop-down menu to select a PoE port.

Select Enabled or Disabled to designate the PoE port function by ports.

EKI-7720 Series User Manual 119

Item

Power Limit From

Classification

Legacy Mode

Priority

Power Limit

Apply

Description

Select Enabled or Disabled to designate the power limit classifica tion.

Select Enabled or Disable d to designate the legacy mode option for the port.

Click the drop-down menu to configure the power supply priority: Crit ical , Low , Medium or High . Default is Low .

Enter a number to set the port power current limitation to be given to the Powered Device (PD)

Click Apply to save the values and update the screen.

The ensuing table for PoE Information settings are informational only: Port, Enable

State, Power Limit From Classification, Priority, Legacy and Power Limit (W).

4.9.3.3

PoE Port Status

To access this page, click Management > Power Over Ethernet > PoE Port Status .

The ensuing table for PoE Port Status settings are informational only: Port, Current

(mA), Voltage (V), Power (W) and Temp. (°C).

4.9.4

TCP Modbus Settings

The TCP Modbus function allows for client-server communication between a switch module (server) and a device in the networking running MODBUS client software (cli ent).

4.9.4.1

TCP Modbus Settings

The TCP Modbus Settings page allows you to configure the modbus function.

To access this page, click Management > TCP Modbus Settings > TCP Modbus

Settings .

Figure 4.188 Management > TCP Modbus Settings > TCP Modbus Settings

The following table describes the items in the previous figure.

Item

State

Time out

Apply

Description

Click Disabled or Enabled to set the TCP Modbus state.

Enter the value (1 to 86400) to define the timeout period between transport time.

Click Apply to save the values and update the screen.

To access this page, click Management > TCP Modbus Settings > TCP Modbus

Settings .

The following figure displays the TCP Modbus Status settings.

Figure 4.189 Management > TCP Modbus Settings > TCP Modbus Settings

120 EKI-7720 Series User Manual

4.9.5

DHCP Server

The Dynamic Host Configuration Protocol (DHCP) is a network protocol enabling a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network.

4.9.5.1

Status Settings

The Status Settings page allows you to configure the DHCP server mode (enabled or disabled).

To access this page, click Management > DHCP Server > Status Settings .

Figure 4.190 Management > DHCP Server > Status Settings

The following table describes the items in the previous figure.

Item

DHCP Server

Apply

Restart

Description

Select Enable or Disable to designate the DHCP server function type.

When a new DHCP server mode is selected, the switch requires a system restart for the new mode to take effect.

Click Apply to save the values and update the screen.

Click Restart to have the switch perform a system restart function. In the event that the IP settings are changed, the DHCP server must be restarted for the IP settings to take effect.

The ensuing table for Status Information settings are informational only: DHCP

Server Service.

4.9.5.2

Global Settings

The Global Settings page allows you to configure the global settings for the DHCP function.

To access this page, click Management > DHCP Server > Global Settings .

Figure 4.191 Management > DHCP Server > Global Settings

EKI-7720 Series User Manual 121

The following table describes the items in the previous figure.

Item

Lease Time

Low IP Address

High IP Address

Subnet Mask

Gateway

DNS

Apply

Description

Type in the value designating the lease time (60 - 864000) in seconds for each setting lease.

Type in the value designating the lowest range in the IP address pool.

Type in the value designating the highest range in the IP address pool.

Type in the value designating the subnet mask for the IP address pool.

Type in the value designating the gateway for the IP address pool.

Type in the value designating the DNS for the IP address pool.

Click Apply to save the values and update the screen.

To access this page, click Management > DHCP Server > Global Settings .

The following figure displays the Global Information settings.

Figure 4.192 Management > DHCP Server > Global Settings

4.9.5.3

Port Settings

The Port Settings page allows you to configure selected ports for the DHCP function.

To access this page, click Management > DHCP Server > Port Settings .

Figure 4.193 Management > DHCP Server > Port Settings

The following table describes the items in the previous figure.

Item

Port Select

Low IP Address

Description

Click the drop-down menu to select a pre-defined port to configure.

The sub options are designated for the selected port.

Type in the value designating the lowest range in the IP address pool.

122 EKI-7720 Series User Manual

4.9.5.4

Option 82 Settings

The Option 82 Settings, also known as the DHCP relay agent information option, pro vide information about the network location of a DHCP client. In turn, the DHCP server uses the information to implement IP addresses or other parameters for the client.

To access this page, click Management > DHCP Server > Option 82 Settings .

Figure 4.194 Management > DHCP Server > Option 82 Settings

The following table describes the items in the previous figure.

Item Description

Entry

Circuit ID Format

Click the drop-down menu to select an entry for the Option 82 setting.

Click the drop-down menu to select the format of the circuit ID: string or hex.

Circuit ID Content Enter the circuit ID string on the switch on which the request was received.

Remote ID Format Click the drop-down menu to select the format of the remote ID: string or hex.

Remote ID Content Enter the remote ID string of the host.

Low IP Address Type in the value designating the lowest range in the IP address pool.

High IP Address

Subnet Mask

Type in the value designating the highest range in the IP address pool.

Type in the value designating the subnet mask for the IP address pool.

Gateway

DNS

Apply

Type in the value designating the gateway for the IP address pool.

Type in the value designating the DNS for the IP address pool.

Click Apply to save the values and update the screen.

To access this page, click Management > DHCP Server > Option 82 Settings .

EKI-7720 Series User Manual 123

The following figure displays the Entry Information settings.

Figure 4.195 Management > DHCP Server > Option 82 Settings

4.9.5.5

Client MAC Settings

To access this page, click Management > DHCP Server > Client MAC Settings .

Figure 4.196 Management > DHCP Server > Client MAC Settings

The following table describes the items in the previous figure.

Item Description

Entry ID Type in the value designating the entry ID.

Client MAC Address Enter the MAC address for DHCP server.

IP Address Enter a value to specify the IP address of the interface.

Subnet Mask

Gateway

DNS

Apply

Enter a value to specify the IP subnet mask for the interface.

Enter a value to specify the gateway for the interface.

Enter a value to specify the DNS server for the interface.

Click Apply to save the values and update the screen.

The ensuing table for Client MAC Information settings are informational only: Entry

ID, Client MAC Address, IP Address, Subnet Mask and Modify (Click Detail to dis play the detail information of desired entry id or Delete to delete the desired entry id).

4.9.5.6

Lease Entry

To access this page, click Management > DHCP Server > Lease Entry .

124 EKI-7720 Series User Manual

The following figure displays the Lease entry Table s ettings.

Figure 4.197 Management > DHCP Server > Lease Entry

4.9.6

SMTP Client

Simple Mail Transfer Protocol (SMTP) is a protocol to send e-mail messages between servers. SMTP is used to send messages from a mail client to a mail server.

SMTP by default uses TCP port 25.

4.9.6.1

Global Settings

The Global Settings page allows you to set the active profile for the SMTP client.

To access this page, click Management > SMTP Client > Global Settings.

Figure 4.198 Management > SMTP Client > Global Settings

The following table describes the items in the previous figure.

Item

Active Profile

Apply

Description

Click the drop-down menu to select the profile status (None, 1 or 2).

Click Apply to save the values and update the screen.

The ensuing table for SMTP Information settings are informational only: Active Pro file Id.

4.9.6.2

Profile Settings

The Profile Settings page allows you to select the server IP, the server port, and sender mail for the listed profile.

To access this page, click Management > SMTP Client > Profile Settings .

Figure 4.199 Management > SMTP Client > Profile Settings > Profile Settings

EKI-7720 Series User Manual 125

The following table describes the items in the previous figure.

Item

Profile ID

Server IP

Server Port

Sender Mail

Apply

Description

Click the drop-down menu to select the identification type for the pro file (1 or 2).

Enter the IP address to designate the server host.

Enter the port number to designate the port associated with the server

IP address.

Enter the email address of the sender client.

Click Apply to save the values and update the screen.

Figure 4.200 Management > SMTP Client > Profile Settings > Profile Target Mail

Settings

The following table describes the items in the previous figure.

Item

Profile ID

Target Mail

Apply

Description

Click the drop-down menu to select the identification type for the pro file (1 or 2).

Enter the email address of the target client.

Click Apply to save the values and update the screen.

To access this page, click Management > SMTP Client > Profile Settings > Profile

Target Mail Settings .

The following figure displays the Profile Information settings.

Figure 4.201 Management > DHCP Server > Lease Entry

4.9.6.3

Sending Message

The Sending Message page allows you to setup the log message for use with the

SMTP client.

126 EKI-7720 Series User Manual

To access this page, click Management > SMTP Client > Sending Message .

Figure 4.202 Management > SMTP Client > Sending Message

The following table describes the items in the previous figure.

Item

Title

Content

Apply

Description

Assign the title of the email. The maximum length is 20 characters

(alphanumeric, symbols (. (dot), _ (underline), - (dash line) and space).

Assign the content of the email. The maximum length is 64 characters

(alphanumeric, symbols (. (dot), _ (underline), - (dash line) and space).

Click Apply to save the values and update the screen.

4.9.7

RMON

Remote monitoring (RMON) uses a client-server model to monitor/manage remote devices on a network.

4.9.7.1

RMON Statistics

The RMON Statistics page allows you to view information regarding packet sizes and

RMON standard.

information for physical layer errors. The information displayed is according to the

To access this page, click Management > RMON > RMON Statistics .

Figure 4.203 Management > RMON > RMON Statistics

EKI-7720 Series User Manual 127

The following table describes the items in the previous figure.

Item

Index

Port

Owner

Apply

Description

Enter an entry selection (1 to 65535) to display its statistical informa tion.

Enter the respective port number for the selected entry.

Enter the name of the owner of the RMON group.

Click Apply to save the values and update the screen.

The ensuing table for Statistics Information settings are informational only: Index,

Port, Drop Events, Octets, Packets, Broadcast, Multi-cast, Owner and Delete (click to delete the desired index).

4.9.7.2

RMON History

The RMON History page allows you to configure the display of history entries.

To access this page, click Management > RMON > RMON History .

Figure 4.204 Management > RMON > RMON History

The following table describes the items in the previous figure.

Item Description

Index

Port Select the specific port switch.

Buckets Requested Enter the specific (1-50) number of samples to store.

Interval

Enter the index entry (1 to 65535) to select the number of new history table entries.

Owner

Apply

Enter value in seconds (1 to 3600) to designate a specific interval time for the collection of samples.

Enter the name of the owner of the RMON history group.

Click Apply to save the values and update the screen.

The ensuing table for History Information settings are informational only: Index,

Port, Buckets Requested, Interval, Owner and Delete (click to delete the desired index).

4.9.7.3

RMON Alarm

The RMON Alarm page allows you to configure RMON statistics group and alarm groups.

128 EKI-7720 Series User Manual

To access this page, click Management > RMON > RMON Alarm .

Figure 4.205 Management > RMON > RMON Alarm

The following table describes the items in the previous figure.

Item Description

Index

Interval

Variable

Sample Type

Rising Threshold

Falling Threshold

Enter the index entry (1 to 65535) to define a specific Alarm Collection history entry.

Enter a value (1 to 2147483647) to define the interval value for the

Alarm Collection history.

Enter the alarm variables to define the monitoring triggers.

Enter the variable sample type.

Enter the rising alarm threshold trigger.

Enter the falling alarm threshold trigger.

Rising Event Index Enter the rising event index (1-65535) to define the alarm group.

Falling Event Index Enter the falling event index (1-65535) to define the alarm group.

Owner

Apply

Enter the name of the owner of the RMON alarm group.

Click Apply to save the values and update the screen.

The ensuing table for Alarm Information settings are informational only: Index,

Interval, Variable, Sample Type, Rising Threshold, Falling Threshold, Rising Event

Index, Falling Event Index, Owner and Delete (click to delete the desired index).

4.9.7.4

RMON Event

The RMON Event page is used to configure RMON event groups.

EKI-7720 Series User Manual 129

To access this page, click Management > RMON > RMON Event .

Figure 4.206 Management > RMON > RMON Event

The following table describes the items in the previous figure.

Item

Index

Description

Type

Community

Owner

Apply

Description

Enter the index entry (1 to 65535) to define a specific RMON event.

Enter a value (1 to 2147483647) to define the interval value for the

Alarm Collection history.

Click the drop-down menu to define the event type: None, Log, SNMP

Trap, Log and Trap.

Enter the community string to be passed for the specified event.

Enter the name of the owner of the RMON event.

Click Apply to save the values and update the screen.

The ensuing table for Event Information settings are informational only: Index,

Description, Type, Community, Owner and Delete (click to delete the desired index).

130 EKI-7720 Series User Manual

4.9.8

NTP Server

To access this page, click Management > NTP Server .

Figure 4.207 Management > NTP Server

The following table describes the items in the previous figure.

Item

NTP Server

Manual Time

Server Address 1 ~

Server Address 10

Apply

Description

Click the radio button to enable or disable the NTP server function.

Click the radio button to enable or disable the manual time function.

Enter the address of the NTP server. This is a text string of up to 64 characters containing the encoded unicast IP address or hostname of a NTP server.

Click Apply to save the values and update the screen.

The ensuing table for NTP Server Status settings are informational only: INTP

Server Status, Manual Time, Server AddressInformation Value, Server 1, Server 2,

Server 3, Server 4, Server 5, Server 6, Server 7, Server 8, Server 9 and Server 10.

EKI-7720 Series User Manual 131

4.10

Diagnostics

Through the Diagnostics function configuration of settings for the switch diagnostics is available.

4.10.1

Cable Diagnostics

The Cable Diagnostics page allows you to select the port for applying a copper test.

To access this page, click Diagnostics > Cable Diagnostics .

Figure 4.208 Diagnostics > Cable Diagnostics

The following table describes the items in the previous figure.

Item

Port

Copper Test

Description

Click the drop-down menu to select a pre-defined port for diagnostic testing. Giga ports are displayed with a channel A to D designation.

Click Copper Test to display the test result for the selected port.

The ensuing table for Test Result settings are informational only: Port, Channel A,

Cable Length A, Channel B, Cable Length B, Channel C, Cable Length C, Channel D and Cable Length D.

4.10.2

Ping Test

The Ping Test page allows you to configure the test log page.

To access this page, click Diagnostics > Ping Test .

Figure 4.209 Diagnostics > Ping Test

132 EKI-7720 Series User Manual

The following table describes the items in the previous figure.

Item

IP Address

Count

Interval (in sec)

Size (in bytes)

Ping Results

Apply

Description

Enter the IP address or host name of the station to ping. The initial value is blank. The IP Address or host name you enter is not retained across a power cycle. Host names are composed of series of labels concatenated with periods. Each label must be between 1 and 63 characters long, maximum of 64 characters.

Enter the number of echo requests to send. The default value is 4.

The value ranges from 1 to 5. The count entered is not retained across a power cycle.

Enter the interval between ping packets in seconds. The default value is 1. The value ranges from 1 to 5. The interval entered is not retained across a power cycle.

Enter the size of ping packet. The default value is 56. The value ranges from 8 to 5120. The size entered is not retained across a power cycle.

Display the reply format of ping.

PING 172.17.8.254 (172.17.8.254): 56 data bytes

--- 172.17.8.254 ping statistics ---

4 packets transmitted, 0 packets received, 100% packet loss

Or

PING 172.17.8.93 (172.17.8.93): 56 data bytes

64 bytes from 172.17.8.93: icmp_seq=0 ttl=128 time=0.0 ms

64 bytes from 172.17.8.93: icmp_seq=1 ttl=128 time=0.0 ms

64 bytes from 172.17.8.93: icmp_seq=2 ttl=128 time=0.0 ms

64 bytes from 172.17.8.93: icmp_seq=3 ttl=128 time=0.0 ms

--- 172.17.8.93 ping statistics ---

4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 0.0/0.0/0.0 ms

Click Apply to display ping result for the IP address.

4.10.3

IPv6 Ping Test

The IPv6 Ping Test page allows you to configure the Ping Test for IPv6.

EKI-7720 Series User Manual 133

To access this page, click Diagnostics > IPv6 Ping Test .

Figure 4.210 Diagnostics > IPv6 Ping Test

The following table describes the items in the previous figure.

Item

IPv6 Address

Count

Interval (in sec)

Size (in bytes)

Description

Enter the IP address or host name of the station you want the switch to ping. The initial value is blank. The IP Address or host name you enter is not retained across a power cycle. Host names are composed of series of labels concatenated with dots. Each label must be between 1 and 63 characters long, and the entire hostname has a maximum of 64 characters.

Enter the number of echo requests you want to send. The default value is 4. The value ranges from 1 to 5. The count you enter is not retained across a power cycle.

Enter the interval between ping packets in seconds. The default value is 1. The value ranges from 1 to 5. The interval you enter is not retained across a power cycle.

Enter the size of ping packet. The default value is 56. The value ranges from 8 to 5120. The size you enter is not retained across a power cycle.

134 EKI-7720 Series User Manual

Item

Ping Results

Apply

Description

Display the reply format of ping.

PING 2222::777 (2222::777): 56 data bytes

--- 2222::777 ping statistics ---

4 packets transmitted, 0 packets received, 100% packet loss

Or

PING 2222::717 (2222::717): 56 data bytes

64 bytes from 2222::717: icmp6_seq=0 ttl=128 time=10.0 ms

64 bytes from 2222::717: icmp6_seq=1 ttl=128 time=0.0 ms

64 bytes from 2222::717: icmp6_seq=2 ttl=128 time=0.0 ms

64 bytes from 2222::717: icmp6_seq=3 ttl=128 time=0.0 ms

--- 2222::717 ping statistics ---

4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 0.0/2.5/10.0 ms

Click Apply to display ping result for the IP address.

4.10.4

System Log

4.10.4.1

Logging Service

The Logging Service page allows you to setup the logging services feature for the system log.

To access this page, click Diagnostics > System Log > Logging Service .

Figure 4.211 Diagnostics > System Log > Logging Service

The following table describes the items in the previous figure.

Item

Logging Service

Apply

Description

Click Enabled or Disabled to set the Logging Service status.

Click Apply to save the values and update the screen.

The ensuing table for Logging Information settings are informational only: Logging

Service.

4.10.4.2

Local Logging

The Local Logging page allows you to designate a local target when the severity cri teria is reached.

To access this page, click Diagnostics > System Log > Local Logging .

Figure 4.212 Diagnostics > System Log > Local Logging

EKI-7720 Series User Manual 135

The following table describes the items in the previous figure.

Item

Target

Severity

Apply

Description

Enter the local logging target.

Click the drop-down menu to select the severity level for local log messages.

The level options are:

 emerg: Indicates system is unusable. It is the highest level of severity

 alert: Indicates action must be taken immediately

 crit: Indicates critical conditions

 error: Indicates error conditions

 warning: Indicates warning conditions

 notice: Indicates normal but significant conditions

 info: Indicates informational messages

 debug: Indicates debug-level messages

Click Apply to save the values and update the screen.

The ensuing table for Local Logging Settings Status settings are informational only: Status, Target, Severity and Delete (click to delete the desired target).

4.10.4.3

System Log Server

The System Log Server page allows you to configure the log server.

To access this page, click Diagnostics > System Log > System Log Server .

Figure 4.213 Diagnostics > System Log > System Log Server

The following table describes the items in the previous figure.

Item

Server Address

Server Port

Description

Enter the IP address of the log server.

Enter the Udp port number of the log server.

136 EKI-7720 Series User Manual

Item

Severity

Facility

Apply

Description

Click the drop-down menu to select the severity level for local log messages. The default is emerg.

The level options are:

 emerg: Indicates system is unusable. It is the highest level of severity

 alert: Indicates action must be taken immediately

 crit: Indicates critical conditions

 error: Indicates error conditions

 warning: Indicates warning conditions

 notice: Indicates normal but significant conditions

 info: Indicates informational messages

 debug: Indicates debug-level messages

Click the drop-down menu to select facility to which the message refers.

Click Apply to save the values and update the screen.

The ensuing table for Remote Logging Setting Status settings are informational only: Status, Server Info, Severity, Facility and Delete (click to delete the desired server address).

4.10.5

DDM

The DDM page allows you to setup the diagnostic alarm status.

To access this page, click Diagnostics > DDM .

Figure 4.214 Diagnostics > DDM > Diagnostic Alarm Settings

The following table describes the items in the previous figure.

Item

Diagnostic Alarm

Apply

Description

Click the drop-down menu to designate the announcement method:

Disabled, SysLog, E-mail, or SNMP.

Click Apply to save the values and update the screen.

The ensuing table for Diagnostic Alarm Information settings are informational only:

Diagnostic Alarm.

EKI-7720 Series User Manual

Figure 4.215 Diagnostics > DDM > DMI INFO

137

The following table describes the items in the previous figure.

Item

High Alarm

High Warning

Low Alarm

Low Warning

Apply

Description

Click Enabled or Disabled to set the alarm state.

Click Enabled or Disabled to set the alarm state.

Click Enabled or Disabled to set the alarm state.

Click Enabled or Disabled to set the alarm state.

Click Apply to save the values and update the screen.

The ensuing table for Vendor Info settings are informational only: Refresh (click to reload the vendor information), Port, Connector, Speed, VendorName, VendorOui,

VendorPn, VendorRev, VendorSn and DateCode.

4.10.6

LED Indication

To access this page, click Diagnostics > LED Indication .

Figure 4.216 Diagnostics > LED Indication

The following table describes the items in the previous figure.

Item

LED

State

Event

Apply

Description

Click the drop-down menu to select LED indicator.

Select Enable or Disable to enable LED alarm.

Click to select the event of LED alarm.

Click Apply to save the values and update the screen.

To access this page, click Diagnostics > LED Indication .

The following figure displays the LED Information settings.

Figure 4.217 Diagnostics > LED Indication

138 EKI-7720 Series User Manual

4.11

Tools

4.11.1

IXM

The IXM tool is an industrial Ethernet switch solution to help the users deploy indus trial Ethernet switch hardware by allowing users with multiple, managed Ethernet switches in the field to eliminate the need to individually connect to each device to configure it.

To access this page, click Tools > IXM .

Figure 4.218 Tools > IXM

The following table describes the items in the previous figure.

Item

Search Field

#

Device Name

Device Model

Category

IP Address

MAC Address

Firmware Version

System Indicator

Previous

Next

Description

Enter criteria to search the IXM information.

Displays the reference to the device number.

Displays the device name.

Displays the device model type.

Displays the device’s category type.

Displays the device’s IP address.

Displays the device’s IP MAC address.

Displays the device’s firmware version.

Displays the device’s system indicator.

Click Previous to back to previous page.

Click Next to go to next page.

4.11.2

Backup Manager

The Backup Manager page allows you to configure a remote TFTP sever or host file system in order to backup the firmware image or configuration file.

EKI-7720 Series User Manual 139

To access this page, click Tools > Backup Manager .

Figure 4.219 Tools > Backup Manager

The following table describes the items in the previous figure.

Item

Backup Method

Server IP

Backup Type

Image

Backup

Description

Click the drop-down menu to select the backup method: TFTP or

HTTP.

Enter the IP address of the backup server.

Click a type to define the backup method: image: running configura tion, startup configuration, custom configuration, flash log, or buffered log.

Click the format for the image type: Active or Backup.

Click Backup to backup the settings.

4.11.3

Upgrade Manager

The Upgrade Manager page allows you to configure a remote TFTP sever or host file system in order to upload firmware upgrade images or configuration files.

140 EKI-7720 Series User Manual

To access this page, click Tools > Upgrade Manager .

Figure 4.220 Tools > Upgrade Manager

The following table describes the items in the previous figure.

Item

Upgrade Method

Server IP

File Name

Upgrade Type

Description

Click the drop-down menu to select the upgrade method: TFTP or

HTTP.

Enter the IP address of the upgrade server.

Enter the file name of the new firmware version.

Click a type to define the upgrade method: image, startup configura tion, running configuration, or custom configuration.

Click the format for the image type: Active, Backup, or auto.

Click Upgrade to upgrade to the current version.

Image

Upgrade

4.11.4

Dual Image

The Dual Image page allows you to setup an active and backup partitions for firm ware image redundancy.

To access this page, click Tools > Dual Image .

Figure 4.221 Tools > Dual Image

The following table describes the items in the previous figure.

Item

Active Image

Save

Description

Click the format for the image type: Active or Backup.

Click Save to save and keep the new settings.

EKI-7720 Series User Manual 141

The ensuing table for Image Information 0/1 settings are informational only: Flash

Partition, Image Name, Image Size and Created Time.

4.11.5

Save Configuration

To access this page, click Tools > Save Configuration .

Click Save Configuration to FLASH to have configuration changes you have made to be saved across a system reboot. All changes submitted since the previous save or system reboot will be retained by the switch.

4.11.6

User Account

4.11.6.1

Add and Edit Users

The User Account page allows you to setup a user and the related parameters.

To access this page, click Tools > User Account .

Figure 4.222 Tools > User Account

The following table describes the items in the previous figure.

Item

User Name

Password Type

Password

Retype Password

Privilege Type

Apply

Description

Enter the name of the new user entry.

Click the drop-down menu to define the type of password: Clear Text ,

Encrypted or No Password .

Enter the character set for the define password type.

Retype the password entry to confirm the profile password.

Click the drop-down menu to designate privilege authority for the user entry: Admin or User .

Click Apply to create a new user account.

4.11.6.2

Wrong Password

To access this page, click Tools > User Account .

The following figure displays the Wrong Password settings.

Figure 4.223 Tools > User Account

142 EKI-7720 Series User Manual

To access this page, click Tools > User Account .

Item

State

Retry Time

Block Time

Apply

Description

Click to enable or disable the wrong password detection function.

Enter a variable to designate the wrong password entry threshold,

State option must be enabled.

Enter a variable to designate the lockout period in minutes after the retry attempts threshold is reached.

Click Apply to create a new user account.

The following figure displays the Wrong Password Information settings.

Figure 4.224 Tools > User Account

4.11.7

N-Key

To access this page, click Tools > N-Key .

Figure 4.225 Tools > N-Key

The following table describes the items in the previous figure.

Item

Auto Mode

N-Key Status

Apply

Description

Click the option to set the auto mode for the N-Key status.

Click the drop-down menu to select N-Key status.

Click Apply to create a new user account.

To access this page, click Tools > N-Key .

The following figure displays the N-Key Information settings.

Figure 4.226 Tools > N-Key Information

4.11.8

Reset System

To access this page, click Tools > Reset System .

Click Restore to have all configuration parameters reset to their factory default val ues. All changes that have been made will be lost, even if you have issued a save.

Click Select Excepted Configuration to keep the configuration you selected when resetting.

Reset settings take effect after a system reboot.

4.11.9

Reboot Device

To access this page, click Tools > Reboot Device .

EKI-7720 Series User Manual 143

Click Reboot to reboot the switch. Any configuration changes you have made since the last time you issued a save will be lost.

4.12

Modbus/TCP Mapping

The data map addresses of Advantech switches shown in the following table start from Modbus address 30001 for function code 4.

In the given example, the address offset 0x1000 (hex) equals Modbus address

34097, while the address offset 0x1100 (hex) equals Modbus address 34353.

The information given by the Advantech is shown in hex mode.

4.12.1

Modbus/TCP Mapping Table

Catalog

System Info

Name Data Type Interpretation Address

Offset (Hex)

0x0000 Vendor ID =

0x‘13FE

1 word 16 bits HEX

Unit ID = 0xFF 1 word 16 bits HEX

Product Code 1 word 16 bits HEX

Vendor Name

= "Advantech"

16 words

32 chars

ASCII

0x0001

0x0002

0x0010

Address

3X

30001

30002

30003

30017

Product Name

= "EKI-xxxx"

16 words

Firmware Ver sion

2 words

Ethernet MAC

Address

3 words

32 chars

ASCII

32 bits HEX

48 bits HEX

0x0020

0x020A

0x020E

30033

30523

30527

Description

Vendor ID = 0x13FE

Unit ID = 0xFF

Product Code

Vendor Name = "Advant ech"

Word 0 Hi byte = 'A'

Word 0 Lo byte = 'd'

Word 1 Hi byte = 'v'

Word 1 Lo byte = 'a'

Word 2 Hi byte = 'n'

Word 2 Lo byte = 't'

Word 3 Hi byte = 'e'

Word 3 Lo byte = 'c'

Word 4 Hi byte = 'h'

Word 4 Lo byte = '\0'

Product Name = "EKIxxxx"

Word 0 Hi byte = 'E'

Word 0 Lo byte = 'K'

Word 1 Hi byte = 'I'

Word 1 Lo byte = '-'

Word 2 Hi byte = 'x'

Word 2 Lo byte = 'x'

Word 3 Hi byte = 'x'

Word 3 Lo byte = 'x'

Word 4 Hi byte = '\0'

Firmware Version

Word 0 Hi byte = major

Word 0 Lo byte = minor

Word 1 Hi byte = release

Word 1 Lo byte = build

Ethernet MAC Address

Ex: MAC = 00-19-CB-01-

02-03

Word 0 Hi byte = 0x00

Word 0 Lo byte = 0x19

Word 1 Hi byte = 0xCB

Word 1 Lo byte = 0x01

Word 2 Hi byte = 0x02

Word 2 Lo byte = 0x03

144 EKI-7720 Series User Manual

Catalog

System Info

Port Info

Name

IP Address

Port Status

Data Type

Revision Num ber

16 words

2 words

32 chars

Interpretation Address

Offset (Hex)

ASCII 0x0211

Address

3X

30530

32 bits HEX

1 word 16 bits HEX

0x0400

0x1000 ~

0x101F

31025

34097 ~

34128

Description

Product Name =

"YYY.xxxxx"

Word 0 Hi byte = 'Y'

Word 0 Lo byte = 'Y'

Word 1 Hi byte = 'Y'

Word 1 Lo byte = '.'

Word 2 Hi byte = 'x'

Word 2 Lo byte = 'x'

Word 3 Hi byte = 'x'

Word 3 Lo byte = 'x'

Word 4 Hi byte = 'x'

Word 4 Hi byte = '\0'

IP Address

Ex: IP = 192.168.1.1

Word 0 Hi byte = 0xC0

Word 0 Lo byte = 0xA8

Word 1 Hi byte = 0x01

Word 1 Lo byte = 0x01

Port Status

0x0000: Link down

0x0001: Link up

0xFFFF: No port

Port 1 Status 1 word 16 bits HEX

Port 2 Status 1 word 16 bits HEX

Port 3 Status 1 word 16 bits HEX

Port 4 Status 1 word 16 bits HEX

Port 5 Status 1 word 16 bits HEX

Port 6 Status 1 word 16 bits HEX

Port 7 Status 1 word 16 bits HEX

Port 8 Status 1 word 16 bits HEX

Port 9 Status 1 word 16 bits HEX

Port 10 Status 1 word 16 bits HEX

Port 11 Status 1 word 16 bits HEX

Port 12 Status 1 word 16 bits HEX

Port 13 Status 1 word 16 bits HEX

Port 14 Status 1 word 16 bits HEX

Port 15 Status 1 word 16 bits HEX

Port 16 Status 1 word 16 bits HEX

Port 17 Status 1 word 16 bits HEX

Port 18 Status 1 word 16 bits HEX

Port 19 Status 1 word 16 bits HEX

Port 20 Status 1 word 16 bits HEX

Port 21 Status 1 word 16 bits HEX

Port 22 Status 1 word 16 bits HEX

Port 23 Status 1 word 16 bits HEX

Port 24 Status 1 word 16 bits HEX

Port 25 Status 1 word 16 bits HEX

Port 26 Status 1 word 16 bits HEX

Port 27 Status 1 word 16 bits HEX

Port 28 Status 1 word 16 bits HEX

Port 29 Status 1 word 16 bits HEX

Port 30 Status 1 word 16 bits HEX

Port 31 Status 1 word 16 bits HEX

Port 32 Status 1 word 16 bits HEX

0x1018

0x1019

0x101A

0x101B

0x101C

0x101D

0x101E

0x101F

0x1010

0x1011

0x1012

0x1013

0x1014

0x1015

0x1016

0x1017

0x1008

0x1009

0x100A

0x100B

0x100C

0x100D

0x100E

0x100F

0x1000

0x1001

0x1002

0x1003

0x1004

0x1005

0x1006

0x1007

34121

34122

34123

34124

34125

34126

34127

34128

34113

34114

34115

34116

34117

34118

34119

34120

34105

34106

34107

34108

34109

34110

34111

34112

34097

34098

34099

34100

34101

34102

34103

34104

EKI-7720 Series User Manual 145

Catalog

Port Info

Name

Port Speed

Data Type Interpretation Address

Offset (Hex)

1 word 16 bits HEX 0x1100 ~

0x111F

Address

3X

34353 ~

34384

Description

Port Speed

0x0000: 10M-Half

0x0001: 10M-Full

0x0002: 100M-Half

0x0003: 100M-Full

0x0004: 1000M-Half

0x0005: 1000M-Full

0xFFFF: No port

Port 1 Speed 1 word 16 bits HEX

Port 2 Speed 1 word 16 bits HEX

Port 3 Speed 1 word 16 bits HEX

Port 4 Speed 1 word 16 bits HEX

Port 5 Speed 1 word 16 bits HEX

Port 6 Speed 1 word 16 bits HEX

Port 7 Speed 1 word 16 bits HEX

Port 8 Speed 1 word 16 bits HEX

Port 9 Speed 1 word 16 bits HEX

Port 10 Speed 1 word 16 bits HEX

Port 11 Speed 1 word 16 bits HEX

Port 12 Speed 1 word 16 bits HEX

Port 13 Speed 1 word 16 bits HEX

Port 14 Speed 1 word 16 bits HEX

Port 15 Speed 1 word 16 bits HEX

Port 16 Speed 1 word 16 bits HEX

Port 17 Speed 1 word 16 bits HEX

Port 18 Speed 1 word 16 bits HEX

Port 19 Speed 1 word 16 bits HEX

Port 20 Speed 1 word 16 bits HEX

Port 21 Speed 1 word 16 bits HEX

Port 22 Speed 1 word 16 bits HEX

Port 23 Speed 1 word 16 bits HEX

Port 24 Speed 1 word 16 bits HEX

Port 25 Speed 1 word 16 bits HEX

Port 26 Speed 1 word 16 bits HEX

Port 27 Speed 1 word 16 bits HEX

Port 28 Speed 1 word 16 bits HEX

Port 29 Speed 1 word 16 bits HEX

Port 30 Speed 1 word 16 bits HEX

Port 31 Speed 1 word 16 bits HEX

Port 32 Speed 1 word 16 bits HEX

Flow Control 1 word 16 bits HEX

0x1110

0x1111

0x1112

0x1113

0x1114

0x1115

0x1116

0x1117

0x1118

0x1119

0x111A

0x111B

0x111C

0x111D

0x111E

0x111F

0x1200 ~

0x121F

0x1108

0x1109

0x110A

0x110B

0x110C

0x110D

0x110E

0x110F

0x1100

0x1101

0x1102

0x1103

0x1104

0x1105

0x1106

0x1107

34369

34370

34371

34372

34373

34374

34375

34376

34377

34378

34379

34380

34381

34382

34383

34384

34609 ~

34640

34361

34362

34363

34364

34365

34366

34367

34368

34353

34354

34355

34356

34357

34358

34359

34360

Flow Control

0x0000: Off

0x0001: On

0xFFFF: No port

Port 1 Flow

Control

Port 2 Flow

Control

Port 3 Flow

Control

Port 4 Flow

Control

Port 5 Flow

Control

Port 6 Flow

Control

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

0x1200

0x1201

0x1202

0x1203

0x1204

0x1205

34609

34610

34611

34612

34613

34614

146 EKI-7720 Series User Manual

Catalog

Port Info

Name Data Type Interpretation Address

Offset (Hex)

1 word 16 bits HEX 0x1206

Address

3X

34615

Description

Port 22 Flow

Control

Port 23 Flow

Control

Port 24 Flow

Control

Port 25 Flow

Control

Port 26 Flow

Control

Port 27 Flow

Control

Port 28 Flow

Control

Port 29 Flow

Control

Port 30 Flow

Control

Port 31 Flow

Control

Port 32 Flow

Control

Port 14 Flow

Control

Port 15 Flow

Control

Port 16 Flow

Control

Port 17 Flow

Control

Port 18 Flow

Control

Port 19 Flow

Control

Port 20 Flow

Control

Port 21 Flow

Control

Port 7 Flow

Control

Port 8 Flow

Control

Port 9 Flow

Control

Port 10 Flow

Control

Port 11 Flow

Control

Port 12 Flow

Control

Port 13 Flow

Control

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

0x1207

0x1208

0x1209

0x120A

0x120B

0x120C

0x120D

0x120E

0x120F

0x1210

0x1211

0x1212

0x1213

0x1214

0x1215

0x1216

0x1217

0x1218

0x1219

0x121A

0x121B

0x121C

0x121D

0x121E

0x121F

34616

34617

34618

34619

34620

34621

34622

34623

34624

34625

34626

34627

34628

34629

34630

34631

34632

34633

34634

34635

34636

34637

34638

34639

34640

EKI-7720 Series User Manual 147

Catalog

Port Info

Name Data Type

Port Descrip tion

20 words

40 chars

Port 9

Description

Port 10

Description

Port 11

Description

Port 12

Description

Port 13

Description

Port 14

Description

Port 15

Description

Port 16

Description

Port 1

Description

Port 2

Description

Port 3

Description

Port 4

Description

Port 5

Description

Port 6

Description

Port 7

Description

Port 8

Description

Port 17

Description

Port 18

Description

Port 19

Description

Port 20

Description

Port 21

Description

Port 22

Description

Port 23

Description

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

20 words

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

Interpretation Address

Offset (Hex)

ASCII 0x1400 ~

0x166C

Address

3X

35121 ~

35741

Description

Port Description

Port Description =

"100RX,RJ45."

Word 0 Hi byte = '1'

Word 0 Lo byte = '0'

Word 1Hi byte = '0'

Word 1 Lo byte = ‘R’

Word 2 Hi byte = 'X'

Word 2 Lo byte = ‘,’

Word 3 Hi byte = 'R'

Word 3 Lo byte = ‘J’

Word 4 Hi byte = ‘4’

Word 4 Lo byte = ‘5’

Word 5 Hi byte = ‘.’

Word 5 Lo byte = ‘\0’

ASCII 0x1400 35121

0x1414

0x1428

0x143C

0x1450

0x1464

0x1478

0x148C

0x14A0

0x14B4

0x14C8

0x14DC

0x14F0

0x1504

0x1518

0x152C

0x1540

0x1554

0x1568

0x157C

0x1590

0x15A4

0x15B8

35141

35161

35181

35201

35221

35241

35261

35281

35301

35321

35341

35361

35381

35401

35421

35441

35461

35481

35501

35521

35541

35561

148 EKI-7720 Series User Manual

Catalog

Port Info

Name

Port 24

Description

Port 25

Description

Port 26

Description

Port 27

Description

Port 28

Description

Port 29

Description

Port 30

Description

Port 31

Description

Port 32

Description

Link Up Coun ter

Data Type Interpretation Address

Offset (Hex)

0x15CC 20 words

20 words

20 words

20 words

20 words

20 words

20 words

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

40 chars

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

ASCII

20 words

20 words

40 chars

40 chars

ASCII

ASCII

1 word 16 bits HEX

0x15E0

0x15F4

0x1608

0x161C

0x1630

0x1644

0x1658

0x166C

0x1700 ~

0x171F

Address

3X

35581

35601

35621

35641

35661

35681

35701

35721

35741

35889 ~

35920

Description

Link Up Counter

Ex: port link up counter =

13

Received MODBUS response: 0x000D

Port 1 Link Up

Counter

Port 2 Link Up

Counter

Port 3 Link Up

Counter

Port 4 Link Up

Counter

Port 5 Link Up

Counter

Port 6 Link Up

Counter

Port 7 Link Up

Counter

Port 8 Link Up

Counter

Port 9 Link Up

Counter

Port 10 Link

Up Counter

Port 11 Link

Up Counter

Port 12 Link

Up Counter

Port 13 Link

Up Counter

Port 14 Link

Up Counter

Port 15 Link

Up Counter

Port 16 Link

Up Counter

Port 17 Link

Up Counter

Port 18 Link

Up Counter

Port 19 Link

Up Counter

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

0x1700

0x1701

0x1702

0x1703

0x1704

0x1705

0x1706

0x1707

0x1708

0x1709

0x170A

0x170B

0x170C

0x170D

0x170E

0x170F

0x1710

0x1711

0x1712

35889

35890

35891

35892

35893

35894

35895

35896

35897

35898

35899

35900

35901

35902

35903

35904

35905

35906

35907

EKI-7720 Series User Manual 149

Catalog

Port Info

Packet Info

Port 8 Tx

Packets

Port 9 Tx

Packets

Port 10 Tx

Packets

Port 11 Tx

Packets

Port 12 Tx

Packets

Port 13 Tx

Packets

Port 1 Tx

Packets

Port 2 Tx

Packets

Port 3 Tx

Packets

Port 4 Tx

Packets

Port 5 Tx

Packets

Port 6 Tx

Packets

Port 7 Tx

Packets

Name Data Type Interpretation Address

Offset (Hex)

1 word 16 bits HEX 0x1713

Address

3X

35908

Description

Port 27 Link

Up Counter

Port 28 Link

Up Counter

Port 29 Link

Up Counter

Port 30 Link

Up Counter

Port 31 Link

Up Counter

Port 32 Link

Up Counter

Tx Packets

Counter

Port 20 Link

Up Counter

Port 21 Link

Up Counter

Port 22 Link

Up Counter

Port 23 Link

Up Counter

Port 24 Link

Up Counter

Port 25 Link

Up Counter

Port 26 Link

Up Counter

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

1 word 16 bits HEX

4 words

64 bits HEX

0x1714

0x1715

0x1716

0x1717

0x1718

0x1719

0x171A

0x171B

0x171C

0x171D

0x171E

0x171F

0x2000 ~

0x207C

35909

35910

35911

35912

35913

35914

35915

35916

35917

35918

35919

35920

38193 ~

38317

Tx Packets

Ex: port 1 Tx Packet

Amount = 11223344

Received MODBUS response: 0xAB4130

Word 0 = 0x0000

Word 1 = 0x0000

Word 2 = 0x00AB

Word 3 = 0x4130

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

0x2000

0x2004

0x2008

0x200C

0x2010

0x2014

0x2018

0x201C

0x2020

0x2024

0x2028

0x202C

0x2030

38193

38197

38201

38205

38209

38213

38217

38221

38225

38229

38233

38237

38241

150 EKI-7720 Series User Manual

Catalog

Packet Info

Port 1 Rx

Packets

Port 2 Rx

Packets

Port 3 Rx

Packets

Port 4 Rx

Packets

Port 5 Rx

Packets

Port 6 Rx

Packets

Port 7 Rx

Packets

Name

Port 21 Tx

Packets

Port 22 Tx

Packets

Port 23 Tx

Packets

Port 24 Tx

Packets

Port 25 Tx

Packets

Port 26 Tx

Packets

Port 27 Tx

Packets

Port 28 Tx

Packets

Port 14 Tx

Packets

Port 15 Tx

Packets

Port 16 Tx

Packets

Port 17 Tx

Packets

Port 18 Tx

Packets

Port 19 Tx

Packets

Port 20 Tx

Packets

Port 29 Tx

Packets

Port 30 Tx

Packets

Port 31 Tx

Packets

Port 32 Tx

Packets

Rx Packets

Counter

4 words

4 words

4 words

4 words

4 words

4 words

4 words

Data Type Interpretation Address

Offset (Hex)

64 bits HEX 0x2034

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

0x2038

0x203C

0x2040

0x2044

0x2048

0x204C

0x2050

0x2054

0x2058

0x205C

0x2060

0x2064

0x2068

0x206C

0x2070

0x2074

0x2078

0x207C

0x2100

~0x217C

Address

3X

38245

38249

38253

38257

38261

38265

38269

38273

38277

38281

38285

38289

38293

38297

38301

38305

38309

38313

38317

38449 ~

38573

Description

Rx Packets

Ex: port 1 Rx Packet

Amount = 11223344

Received MODBUS response: 0xAB4130

Word 0 = 0x0000

Word 1 = 0x0000

Word 2 = 0x00AB

Word 3 = 0x4130

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

0x2100

0x2104

0x2108

0x210C

0x2110

0x2114

0x2118

38449

38453

38457

38461

38465

38469

38473

EKI-7720 Series User Manual 151

Catalog

Packet Info

Name

Port 23 Rx

Packets

Port 24 Rx

Packets

Port 25 Rx

Packets

Port 26 Rx

Packets

Port 27 Rx

Packets

Port 28 Rx

Packets

Port 29 Rx

Packets

Port 30 Rx

Packets

Port 31 Rx

Packets

Port 32 Rx

Packets

Tx Error Pack ets Counter

Port 15 Rx

Packets

Port 16 Rx

Packets

Port 17 Rx

Packets

Port 18 Rx

Packets

Port 19 Rx

Packets

Port 20 Rx

Packets

Port 21 Rx

Packets

Port 22 Rx

Packets

Port 8 Rx

Packets

Port 9 Rx

Packets

Port 10 Rx

Packets

Port 11 Rx

Packets

Port 12 Rx

Packets

Port 13 Rx

Packets

Port 14 Rx

Packets

Data Type Interpretation Address

Offset (Hex)

64 bits HEX 0x211C

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

2 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

4 words

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

64 bits HEX

32 bits HEX

0x2120

0x2124

0x2128

0x212C

0x2130

0x2134

0x2138

0x213C

0x2140

0x2144

0x2148

0x214C

0x2150

0x2154

0x2158

0x215C

0x2160

0x2164

0x2168

0x216C

0x2170

0x2174

0x2178

0x217C

0x2200 ~

0x223E

Address

3X

38477

38481

38485

38489

38493

38497

38501

38505

38509

38513

38517

38521

38525

38529

38533

38537

38541

38545

38549

38553

38557

38561

38565

38569

38573

38705 ~

38767

Description

Tx Error Packets

Ex: port 1 Tx Packet

Amount = 11223344

Received MODBUS response: 0xAB4130

Word 0 = 0x00AB

Word 1 = 0x4130

Port 1 Tx Error

Packets

Port 2 Tx Error

Packets

2 words

2 words

32 bits HEX

32 bits HEX

0x2200

0x2202

38705

38707

152 EKI-7720 Series User Manual

Catalog

Packet Info

Name

Port 18 Tx

Error Packets

Port 19 Tx

Error Packets

Port 20 Tx

Error Packets

Port 21 Tx

Error Packets

Port 22 Tx

Error Packets

Port 23 Tx

Error Packets

Port 24 Tx

Error Packets

Port 25 Tx

Error Packets

Port 26 Tx

Error Packets

Port 27 Tx

Error Packets

Port 28 Tx

Error Packets

Port 29 Tx

Error Packets

Port 30 Tx

Error Packets

Port 31 Tx

Error Packets

Port 32 Tx

Error Packets

Port 3 Tx Error

Packets

Port 4 Tx Error

Packets

Port 5 Tx Error

Packets

Port 6 Tx Error

Packets

Port 7 Tx Error

Packets

Port 8 Tx Error

Packets

Port 9 Tx Error

Packets

Port 10 Tx

Error Packets

Port 11 Tx

Error Packets

Port 12 Tx

Error Packets

Port 13 Tx

Error Packets

Port 14 Tx

Error Packets

Port 15 Tx

Error Packets

Port 16 Tx

Error Packets

Port 17 Tx

Error Packets

Data Type Interpretation Address

Offset (Hex)

32 bits HEX 0x2204

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

0x2206

0x2208

0x220A

0x220C

0x220E

0x2210

0x2212

0x2214

0x2216

0x2218

0x221A

0x221C

0x221E

0x2220

0x2222

0x2224

0x2226

0x2228

0x222A

0x222C

0x222E

0x2230

0x2232

0x2234

0x2236

0x2238

0x223A

0x223C

0x223E

Address

3X

38709

38711

38713

38715

38717

38719

38721

38723

38725

38727

38729

38731

38733

38735

38737

38739

38741

38743

38745

38747

38749

38751

38753

38755

38757

38759

38761

38763

38765

38767

Description

EKI-7720 Series User Manual 153

Catalog

Packet Info

Name

Rx Error Pack ets Counter

Data Type

2 words

Interpretation Address

Offset (Hex)

32 bits HEX 0x2300 ~

0x233E

32 bits HEX 0x2300

Address

3X

38961 ~

39023

Description

Rx Error Packets

Ex: port 1 Rx Packet

Amount = 11223344

Received MODBUS response: 0xAB4130

Word 0 = 0x00AB

Word 1 = 0x4130

38961

Port 17 Rx

Error Packets

Port 18 Rx

Error Packets

Port 19 Rx

Error Packets

Port 20 Rx

Error Packets

Port 21 Rx

Error Packets

Port 22 Rx

Error Packets

Port 23 Rx

Error Packets

Port 24 Rx

Error Packets

Port 25 Rx

Error Packets

Port 26 Rx

Error Packets

Port 27 Rx

Error Packets

Port 9 Rx

Error Packets

Port 10 Rx

Error Packets

Port 11 Rx

Error Packets

Port 12 Rx

Error Packets

Port 13 Rx

Error Packets

Port 14 Rx

Error Packets

Port 15 Rx

Error Packets

Port 16 Rx

Error Packets

Port 1 Rx

Error Packets

Port 2 Rx

Error Packets

Port 3 Rx

Error Packets

Port 4 Rx

Error Packets

Port 5 Rx

Error Packets

Port 6 Rx

Error Packets

Port 7 Rx

Error Packets

Port 8 Rx

Error Packets

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

2 words

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

0x2302

0x2304

0x2306

0x2308

0x230A

0x230C

0x230E

0x2310

0x2312

0x2314

0x2316

0x2318

0x231A

0x231C

0x231E

0x2320

0x2322

0x2324

0x2326

0x2328

0x232A

0x232C

0x232E

0x2330

0x2332

0x2334

38963

38965

38967

38969

38971

38973

38975

38977

38979

38981

38983

38985

38987

38989

38991

38993

38995

38997

38999

39001

39003

39005

39007

39009

39011

39013

154 EKI-7720 Series User Manual

Catalog

Packet Info

Name

Port 28 Rx

Error Packets

Port 29 Rx

Error Packets

Port 30 Rx

Error Packets

Port 31 Rx

Error Packets

Port 32 Rx

Error Packets

Data Type Interpretation Address

Offset (Hex)

32 bits HEX 0x2336 2 words

2 words

2 words

2 words

2 words

32 bits HEX

32 bits HEX

32 bits HEX

32 bits HEX

0x2338

0x233A

0x233C

0x233E

Address

3X

39015

39017

39019

39021

39023

Description

EKI-7720 Series User Manual 155

Chapter

5

Troubleshooting

5

5.1

Troubleshooting

 Verify that the device is using the right power cord/adapter (DC 48V); please do not use a power adapter with DC output higher than 48V, or the device may be damaged.

 Select the proper UTP/STP cable to construct the user network. Use unshielded twisted-pair (UTP) or shield twisted-pair (STP) cable for RJ-45 connections that depend on the connector type the switch equipped: 100R Category 3, 4 or 5 cable for 10Mbps connections, 100R Category 5 cable for 100Mbps connec tions, or 100R Category 5e/above cable for 1000Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters

(328 feet).

R = replacement letter for Ohm symbol.

 Diagnosing LED Indicators: To assist in identifying problems, the switch can be easily monitored through panel indicators, which describe common problems the user may encounter, so the user can be guided towards possible solutions.

 If the power indicator does not light on when the power cord is plugged in, you may have a problem with power cord. Check for loose power connections, power losses, or surges, at the power outlet. If you still cannot resolve the prob lem, contact a local dealer for assistance.

 If the LED indicators are normal and the connected cables are correct but pack ets still cannot be transmitted, please check the user system's Ethernet device configuration or status.

EKI-7716 Series User Manual 157

www.advantech.com

Please verify specifications before quoting. This guide is intended for reference purposes only.

All product specifications are subject to change without notice.

No part of this publication may be reproduced in any form or by any means, electronic, photocopying, recording or otherwise, without prior written permis

-

sion of the publisher.

All brand and product names are trademarks or registered trademarks of their respective companies.

© Advantech Co., Ltd. 2021

advertisement

Related manuals

Download PDF

advertisement

Table of contents