Advantech EKI-7716G-4F4CI 8GE+4SFP+4G Combo port Managed Redundant Industrial Switch User Manual
Add to My manuals173 Pages
advertisement
User Manual
EKI-7716 Series
8GE+4SFP+4G Combo port
Managed Redundant Industrial
Switch
Copyright
The documentation and the software included with this product are copyrighted 2021 by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co.,
Ltd. Information provided in this manual is intended to be accurate and reliable. How ever, Advantech Co., Ltd. assumes no responsibility for its use, nor for any infringe ments of the rights of third parties, which may result from its use.
Acknowledgements
Intel and Pentium are trademarks of Intel Corporation.
Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corp.
All other product names or trademarks are properties of their respective owners.
Product Warranty (5 years)
Advantech warrants to you, the original purchaser, that each of its products will be free from defects in materials and workmanship for five years from the date of pur chase.
This warranty does not apply to any products which have been repaired or altered by persons other than repair personnel authorized by Advantech, or which have been liability under the terms of this warranty as a consequence of such events.
subject to misuse, abuse, accident or improper installation. Advantech assumes no
Because of Advantech’s high quality-control standards and rigorous testing, most of our customers never need to use our repair service. If an Advantech product is defec tive, it will be repaired or replaced at no charge during the warranty period. For out ofwarranty repairs, you will be billed according to the cost of replacement materials, service time and freight. Please consult your dealer for more details.
If you think you have a defective product, follow these steps:
1.
Collect all the information about the problem encountered. (For example, CPU speed, Advantech products used, other hardware and software used, etc.) Note anything abnormal and list any on screen messages you get when the problem occurs.
2.
Call your dealer and describe the problem. Please have your manual, product, and any helpful information readily available.
3.
If your product is diagnosed as defective, obtain an RMA (return merchandize authorization) number from your dealer. This allows us to process your return more quickly.
4.
Carefully pack the defective product, a fully-completed Repair and Replacement
Order Card and a photocopy proof of purchase date (such as your sales receipt) in a shippable container. A product returned without proof of the purchase date is not eligible for warranty service.
5.
Write the RMA number visibly on the outside of the package and ship it prepaid to your dealer.
EKI-7716 Series User Manual
Printed in Taiwan ii
Edition 1
May 2021
Declaration of Conformity
CE
This product has passed the CE test for environmental specifications. Test conditions for passing included the equipment being operated within an industrial enclosure. In order to protect the product from being damaged by ESD (Electrostatic Discharge) and EMI leakage, we strongly recommend the use of CE-compliant industrial enclo sure products.
FCC Class A
Note: This equipment has been tested and found to comply with the limits for a Class
A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Opera tion of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.
Technical Support and Assistance
1.
Visit the Advantech web site at www.advantech.com/support where you can find the latest information about the product.
2.
Contact your distributor, sales representative, or Advantech's customer service center for technical support if you need additional assistance. Please have the following information ready before you call:
– Product name and serial number
– Description of your peripheral attachments
– Description of your software (operating system, version, application software, etc.)
– A complete description of the problem
– The exact wording of any error messages iii EKI-7716 Series User Manual
Warnings, Cautions and Notes
Warning!
Warnings indicate conditions, which if not observed, can cause personal injury!
Caution!
Cautions are included to help you avoid damaging hardware or losing data. e.g.
There is a danger of a new battery exploding if it is incorrectly installed.
Do not attempt to recharge, force open, or heat the battery. Replace the battery only with the same or equivalent type recommended by the man ufacturer. Discard used batteries according to the manufacturer's instructions.
Note!
Notes provide optional additional information.
Document Feedback
To assist us in making improvements to this manual, we would welcome comments and constructive criticism. Please send all such - in writing to: support@advant ech.com
Packing List
Before setting up the system, check that the items listed below are included and in good condition. If any item does not accord with the table, please contact your dealer immediately.
1 x Industrial Ethernet Switch
1 x DIN-Rail mounting Bracket and Screws
1 x Wall-mounting Bracket
EKI-7716 Series User Manual iv
Safety Instructions
1.
Read these safety instructions carefully.
2.
Keep this User Manual for later reference.
3.
Disconnect this equipment from any AC outlet before cleaning. Use a damp cloth. Do not use liquid or spray detergents for cleaning.
4.
For plug-in equipment, the power outlet socket must be located near the equip ment and must be easily accessible.
5.
Keep this equipment away from humidity.
6.
Put this equipment on a reliable surface during installation. Dropping it or letting it fall may cause damage.
7.
The openings on the enclosure are for air convection. Protect the equipment from overheating. DO NOT COVER THE OPENINGS.
8.
Make sure the voltage of the power source is correct before connecting the equipment to the power outlet.
9.
Position the power cord so that people cannot step on it. Do not place anything over the power cord.
10.
All cautions and warnings on the equipment should be noted.
11.
If the equipment is not used for a long time, disconnect it from the power source to avoid damage by transient overvoltage.
12.
Never pour any liquid into an opening. This may cause fire or electrical shock.
13.
Never open the equipment. For safety reasons, the equipment should be opened only by qualified service personnel.
14.
If one of the following situations arises, get the equipment checked by service personnel:
15.
The power cord or plug is damaged.
16.
Liquid has penetrated into the equipment.
17.
The equipment has been exposed to moisture.
18.
The equipment does not work well, or you cannot get it to work according to the user's manual.
19.
The equipment has been dropped and damaged.
20.
The equipment has obvious signs of breakage.
21.
DO NOT LEAVE THIS EQUIPMENT IN AN ENVIRONMENT WHERE THE
STORAGE TEMPERATURE MAY GO -40°C (-40°F) ~ 85°C (185°F). THIS
COULD DAMAGE THE EQUIPMENT. THE EQUIPMENT SHOULD BE IN A
CONTROLLED ENVIRONMENT.
22.
CAUTION: DANGER OF EXPLOSION IF BATTERY IS INCORRECTLY
REPLACED. REPLACE ONLY WITH THE SAME OR EQUIVALENT TYPE
RECOMMENDED BY THE MANUFACTURER, DISCARD USED BATTERIES
ACCORDING TO THE MANUFACTURER'S INSTRUCTIONS.
23.
The sound pressure level at the operator's position according to IEC 704-1:1982 is no more than 70 dB (A).
DISCLAIMER: This set of instructions is given according to IEC 704-1. Advantech disclaims all responsibility for the accuracy of any statements contained herein.
v EKI-7716 Series User Manual
Wichtige Sicherheishinweise
1.
Bitte lesen sie Sich diese Hinweise sorgfältig durch.
2.
Heben Sie diese Anleitung für den späteren Gebrauch auf.
3.
Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie
Keine Flüssig-oder Aerosolreiniger. Am besten dient ein angefeuchtetes Tuch zur Reinigung.
4.
Die NetzanschluBsteckdose soll nahe dem Gerät angebracht und leicht zugänglich sein.
5.
Das Gerät ist vor Feuchtigkeit zu schützen.
6.
Bei der Aufstellung des Gerätes ist auf sicheren Stand zu achten. Ein Kippen oder Fallen könnte Verletzungen hervorrufen.
7.
Die Belüftungsöffnungen dienen zur Luftzirkulation die das Gerät vor über hitzung schützt. Sorgen Sie dafür, daB diese Öffnungen nicht abgedeckt werden.
8.
Beachten Sie beim. AnschluB an das Stromnetz die AnschluBwerte.
9.
Verlegen Sie die NetzanschluBleitung so, daB niemand darüber fallen kann. Es sollte auch nichts auf der Leitung abgestellt werden.
10.
Alle Hinweise und Warnungen die sich am Geräten befinden sind zu beachten.
11.
Wird das Gerät über einen längeren Zeitraum nicht benutzt, sollten Sie es vom
Stromnetz trennen. Somit wird im Falle einer Überspannung eine Beschädigung vermieden.
12.
Durch die Lüftungsöffnungen dürfen niemals Gegenstände oder Flüssigkeiten in das Gerät gelangen. Dies könnte einen Brand bzw. elektrischen Schlag aus lösen.
13.
Öffnen Sie niemals das Gerät. Das Gerät darf aus Gründen der elektrischen
Sicherheit nur von authorisiertem Servicepersonal geöffnet werden.
14.
Wenn folgende Situationen auftreten ist das Gerät vom Stromnetz zu trennen und von einer qualifizierten Servicestelle zu überprüfen:
15.
Netzkabel oder Netzstecker sind beschädigt.
16.
Flüssigkeit ist in das Gerät eingedrungen.
17.
Das Gerät war Feuchtigkeit ausgesetzt.
18.
Wenn das Gerät nicht der Bedienungsanleitung entsprechend funktioniert oder
Sie mit Hilfe dieser Anleitung keine Verbesserung erzielen.
19.
Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt.
20.
Wenn das Gerät deutliche Anzeichen eines Defektes aufweist.
21.
VOSICHT: Explisionsgefahr bei unsachgemaben Austausch der Batterie.Ersatz nur durch densellben order einem vom Hersteller empfohlene-mahnlichen Typ.
Entsorgung gebrauchter Batterien navh Angaben des Herstellers.
22.
ACHTUNG: Es besteht die Explosionsgefahr, falls die Batterie auf nicht fachmännische Weise gewechselt wird. Verfangen Sie die Batterie nur gleicher oder entsprechender Type, wie vom Hersteller empfohlen. Entsorgen Sie Batterien nach Anweisung des Herstellers.
23.
Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt
70dB(A) oder weiger.
Haftungsausschluss: Die Bedienungsanleitungen wurden entsprechend der IEC-
704-1 erstellt. Advantech lehnt jegliche Verantwortung für die Richtigkeit der in die sem Zusammenhang getätigten Aussagen ab.
EKI-7716 Series User Manual vi
Safety Precaution - Static Electricity
Static electricity can cause bodily harm or damage electronic devices. To avoid dam age, keep static-sensitive devices in the static-protective packaging until the installa tion period. The following guidelines are also recommended:
Wear a grounded wrist or ankle strap and use gloves to prevent direct contact to the device before servicing the device. Avoid nylon gloves or work clothes, which tend to build up a charge.
Always disconnect the power from the device before servicing it.
Before plugging a cable into any port, discharge the voltage stored on the cable by touching the electrical contacts to the ground surface.
vii EKI-7716 Series User Manual
Contents
Chapter 1
Product Overview
................................1
Chapter 2
Switch Installation
...............................7
2.1.1 Connecting Hardware ................................................................... 8
Verifying Switch Operation........................................................................ 8
2.3.1 DIN Rail Mounting......................................................................... 8
2.3.2 Wall-Mounting............................................................................. 10
Installing and Removing SFP Modules ................................................... 12
2.4.1 Installing SFP Modules ............................................................... 13
2.4.2 Removing SFP Modules ............................................................. 14
Connecting the Switch to Ethernet Ports ................................................ 15
2.5.1 RJ45 Ethernet Cable Wiring ....................................................... 15
Connecting the Switch to Console Port................................................... 16
Power Supply Installation........................................................................ 17
2.7.2 Considerations............................................................................ 18
2.7.3 Grounding the Device ................................................................. 18
2.7.4 Wiring a Relay Contact ............................................................... 19
2.7.5 Wiring the Power Inputs.............................................................. 20
Chapter 3
Configuration Utility
..........................22
3.1.3 Administrative Interface Access.................................................. 23
3.1.4 Using the Graphical (Web) Interface........................................... 24
3.1.5 Configuring the Switch for Network Access ................................ 24
3.1.6 Configuring the Ethernet Ports.................................................... 25
Command Line Interface Configuration .................................................. 26
3.2.1 Introduction to Command-Line Interface (CLI)............................ 26
3.2.2 Accessing the CLI....................................................................... 26
Web Browser Configuration .................................................................... 27
3.3.1 Preparing for Web Configuration ................................................ 27
3.3.2 System Login .............................................................................. 27
Chapter 4
Managing Switch
...............................28
Recommended Practices........................................................................ 29
4.2.1 Changing Default Password ....................................................... 29
EKI-7716 Series User Manual viii
4.3.1 Device Information...................................................................... 30
4.3.2 Logging Message........................................................................ 31
4.3.3 Port Monitoring............................................................................ 32
4.3.4 Link Aggregation......................................................................... 34
4.3.5 LLDP Statistics............................................................................ 34
4.3.6 IGMP Statistics ........................................................................... 35
4.3.7 MLD Statistics............................................................................. 36
4.4.3 DHCP Client Option 82............................................................... 39
4.4.4 DHCP Auto Provision.................................................................. 41
4.4.5 Management VLAN..................................................................... 41
4.4.6 System Time............................................................................... 42
4.5.1 Port Configuration....................................................................... 45
4.5.3 Link Aggregation......................................................................... 47
4.5.4 802.1Q VLAN.............................................................................. 51
4.5.7 802.3az EEE............................................................................... 58
4.5.9 Jumbo Frame.............................................................................. 64
4.5.10 Spanning Tree ............................................................................ 64
4.5.13 Loopback Detection .................................................................... 74
MAC Address Table................................................................................ 77
4.6.2 MAC Aging Time......................................................................... 77
4.6.3 Dynamic Forwarding Table......................................................... 78
4.7.1 Storm Control.............................................................................. 79
4.7.3 Protected Ports ........................................................................... 81
4.7.4 DoS Prevention........................................................................... 81
4.7.9 Access Control List ..................................................................... 91
4.7.10 IP Source Guard ......................................................................... 94
4.7.11 DHCP Snooping.......................................................................... 96
4.7.12 ARP Spoofing ............................................................................. 99
4.8.2 QoS Basic Mode....................................................................... 105
4.8.4 Bandwidth Guarantee ............................................................... 109
4.9.3 Power Over Ethernet ................................................................ 118
4.9.4 TCP Modbus Settings............................................................... 120
4.9.5 DHCP Server ............................................................................ 121
4.9.6 SMTP Client.............................................................................. 125
ix EKI-7716 Series User Manual
4.9.8 NTP Server............................................................................... 131
4.10.1 Cable Diagnostics..................................................................... 132
4.10.3 IPv6 Ping Test .......................................................................... 133
4.10.4 System Log............................................................................... 135
4.10.6 LED Indication .......................................................................... 138
4.11.2 Backup Manager....................................................................... 139
4.11.3 Upgrade Manager..................................................................... 140
4.11.5 Save Configuration ................................................................... 142
4.11.6 User Account ............................................................................ 142
4.11.8 Reset System ........................................................................... 143
4.11.9 Reboot Device .......................................................................... 143
Modbus/TCP Mapping .......................................................................... 144
4.12.1 Modbus/TCP Mapping Table.................................................... 144
Chapter 5 Troubleshooting
.............................. 156
EKI-7716 Series User Manual x
List of Figures
xi EKI-7716 Series User Manual
L2 Switching > Link Aggregation > Load Balance Information .................................... 48
L2 Switching > Link Aggregation > LAG Management................................................ 48
L2 Switching > Link Aggregation > LAG Management Information............................. 49
L2 Switching > Link Aggregation > LACP Port Information Settings........................... 51
L2 Switching > 802.1Q VLAN > VLAN Management .................................................. 52
L2 Switching > 802.1Q VLAN > Port-VLAN Mapping.................................................. 55
L2 Switching > 802.1Q VLAN > RSPAN VLAN Mapping ............................................ 55
L2 Switching > Multicast > IGMP Snooping > IGMP Settings ..................................... 60
L2 Switching > Multicast > IGMP Snooping > IGMP Snooping Information................ 60
L2 Switching > Multicast > IGMP Snooping > IGMP Querier ...................................... 60
L2 Switching > Multicast > IGMP Snooping > IGMP Querier Status........................... 61
L2 Switching > Multicast > IGMP Snooping > IGMP Static Groups ............................ 61
L2 Switching > Multicast > IGMP Snooping > Multicast Groups ................................. 61
L2 Switching > Multicast > IGMP Snooping > Router Ports ........................................ 61
L2 Switching > Multicast > MLD Snooping > MLD Settings ........................................ 62
L2 Switching > Multicast > MLD Snooping > MLD Snooping Information ................... 62
L2 Switching > Multicast > MLD Snooping > MLD Snooping Table ............................ 62
L2 Switching > Multicast > MLD Snooping > MLD Querier ......................................... 63
L2 Switching > Multicast > MLD Snooping > MLD Static Group ................................. 63
L2 Switching > Multicast > MLD Snooping > Multicast Groups ................................... 64
L2 Switching > Multicast > MLD Snooping > Router Ports.......................................... 64
L2 Switching > Spanning Tree > STP Port Advanced Settings................................... 67
L2 Switching > Spanning Tree > MST Config Identification ........................................ 68
L2 Switching > Spanning Tree > STP Bridge Status................................................... 70
L2 Switching > Spanning Tree > MSTI Port Advanced settings.................................. 70
L2 Switching > Spanning Tree > STP Statistics.......................................................... 70
L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro Groups Settings........ 72
EKI-7716 Series User Manual xii
L2 Switching > X-Ring Pro > X-Ring Pro Groups > Chain Settings............................. 72
L2 Switching > X-Ring Pro > X-Ring Pro Groups > Couple Setting ............................ 73
L2 Switching > X-Ring Pro > X-Ring Pro Groups > Pair Settings................................ 73
L2 Switching > X-Ring Pro > X-Ring Pro Groups > RPair Settings............................. 73
L2 Switching > Loopback Detection > Loopback Detection Global Information .......... 74
Security > Storm Control > Storm Control Global Information..................................... 79
Security > Security Login > Global Settings > Global Settings.................................... 89
Security > Security Login > Global Settings > RADIUS Settings................................. 89
Security > Security Login > Global Settings > TACACS Settings................................ 90
Security > Security Login > Global Settings > Global Information............................... 90
Security > Security Login > Access Control Settings > Security Login Type Settings. 90
Security > Security Login > Access Control Settings > Security Login Type Settings. 91
Security > Security Login > Access Control Settings > Access Control Information ... 91
Security > Access Control List > MAC ACL > Entry Settings ...................................... 92
Security > DHCP Snooping > Global Settings > DHCP Snooping State Settings....... 96
Security > DHCP Snooping > Global Settings > DHCP Snooping Port Settings......... 96
Security > DHCP Snooping > Global Settings > DHCP Snooping Binding Port Settings
Security > DHCP Snooping > Global Settings > DHCP Snooping Information ........... 97
Security > DHCP Snooping > Entry Settings > Entry Information ............................... 97
Security > DHCP Snooping > L2-Relay VLAN Settings .............................................. 98
xiii EKI-7716 Series User Manual
Management > LLDP > LLDP Port Settings > LLDP Port Configuration................... 112
Management > LLDP > LLDP Port Settings > Optional TLVs Selection................... 112
Management > LLDP > LLDP Port Settings > VLAN Name TLV VLAN Selection.... 113
Management > LLDP > LLDP Remote Device Info................................................... 114
Management > SNMP > SNMP Community ............................................................. 116
Management > SNMP > SNMP Community ............................................................. 116
Management > SNMP > SNMPv3 EngineID............................................................. 116
Management > Power Over Ethernet > PoE System Settings.................................. 119
Management > Power Over Ethernet > PoE Port Settings ....................................... 119
Management > TCP Modbus Settings > TCP Modbus Settings ............................... 120
Management > TCP Modbus Settings > TCP Modbus Settings ............................... 120
Management > DHCP Server > Option 82 Settings.................................................. 123
Management > DHCP Server > Option 82 Settings.................................................. 124
Management > DHCP Server > Client MAC Settings ............................................... 124
Management > SMTP Client > Profile Settings > Profile Settings............................. 125
Management > SMTP Client > Profile Settings > Profile Target Mail Settings.......... 126
Management > SMTP Client > Sending Message .................................................... 127
EKI-7716 Series User Manual xiv
xv EKI-7716 Series User Manual
Chapter
1
Product Overview
1
1.1
Specifications
Specifications Description
Interface
Physical
LED Display
Environment
I/O Port 8 x Ethernet ports + 4 x SFP + 4 x Copper/SFP combo ports
Power Connector 6-pin removable screw terminal (power & relay)
Enclosure Metal Shell
Protection Class IP30
Installation
Dimensions
(W x H x D)
DIN-rail, wall mount
74 x 152 x 105mm (2.91” x 5.98” x 4.13”)
System LED
Port LED
Operating Tem perature
SYS, R.M, PWR1, PWR2, Alarm
Speed, Link, Activity
EKI-7716E-4F4C/EKI-7716G-4F4C: -10°C ~ 60°C
(14°F ~ 140°F)
EKI-7716E-4F4CI/EKI-7716G-4F4CI: -40°C ~ 75°C
(-40°F ~ 167°F)
-40°C ~ 85°C (-40°F ~ 185°F) Storage Tempera ture
Ambient Relative
Humidity
Switch Properties MAC Address
Switch Capacity
10 ~ 95% (non-condensing)
8K-entry
EKI-7716E: 17.6Gbps
EKI-7716G: 32Gbps
Power Power
Consumption
Power Input
15W @ 48V (full load)
Certifications Safety
EMC
12~48 V
DC
, redundant dual power input
UL 61010
EN 61000-4-2
EN 61000-4-3
EN 61000-4-4
EN 61000-4-5
EN 61000-4-6
EN 61000-4-8
EN 50121-4
NEMA TS2
EMI
Shock
Freefall
Vibration
Railway Track
Side
CE, FCC Class A
IEC 60068-2-27
IEC 60068-2-32
IEC 60068-2-6
EN 50121-4
2 EKI-7716 Series User Manual
1.2
Hardware Views
1.2.1
Front View
1
11
9
12
10
12
EKI-7716E
12
11
10
9
SYS
R.M.
PWR1
PWR2
Alarm
Reset
Console
6
2
11
7
8
9
7
5
10
8
16
6
15
15
LNK/ACT
16
13 14
3
9
3 4 14
4
5
1 2 13
Figure 1.1 Front View
No. Item Description
1 ETH port
2 ETH port
3 ETH port
4 LNK/ACT LED
5 Speed LED
Copper/SFP combo ports x 8
RJ45 combo ports x 4
RJ45 ports x 4
Link activity LED
Amber: 100M
Green: 1G
6
System LED panel See “System LED Panel” on page 4 for further details.
7 Reset button Button allows for system soft reset or factory default reset.
8 Console serial port Console cable port to COM port (DB9 male) on computer to
RS232 managed switch (RJ45).
9 ETH port SFP ports x 4
EKI-7716 Series User Manual 3
1.2.1.1
System LED Panel
No. LED Name
1 SYS
2 R.M.
3 PWR1
4 PWR2
5 Alarm
SYS
R.M.
PWR1
PWR2
Alarm
1
2
3
4
5
Figure 1.2 System LED Panel
LED Color Description
Solid green
Off
Solid green
Solid green
Off
Solid green
System is operating normally
System is powered down / system crash / operation initiating
Active when determining ring master
Powered up
Powered down or not installed
Powered up
Off
Solid red
Power down or not installed
Defined major policies are detected
Blinking Red Defined minor policies are detected
Off Powered off or system is operating normally
4 EKI-7716 Series User Manual
1.2.2
Rear View
1
2
1
Figure 1.3 Rear View
No. Item Description
1 Wall mounting holes Screw holes (x6) used in the installation of a wall mounting plate
2 DIN-Rail mounting plate
Mounting plate used for the installation to a standard DIN rail
EKI-7716 Series User Manual 5
1.2.3
Top View
1
V2+V2V1+V1-
1A@24V
PWR2 P-Fail PWR1
DC12-48V
2
No. Item
1 Ground terminal
2 Terminal block
1.3
Dimensions
83.50 [3.287]
Figure 1.4 Top View
Description
Screw terminal used to ground chassis
Connect cabling for power and alarm wiring
42.25 [1.781]
74 [2.913]
9.90 [0.390]
114 [4.488]
105 [4.134]
36.25
[1.427]
40.64
[1.600]
37 [1.457]
35 [1.378]
19.50
[0.768]
114 [4.488]
6-M3xP0.5
Figure 1.5 Dimensions
6 EKI-7716 Series User Manual
Chapter
2
Switch Installation
2
2.1
Installation Guidelines
The following guidelines are provided to optimize the device performance. Review the guidelines before installing the device.
Make sure cabling is away from sources of electrical noise. Radios, power lines, and fluorescent lighting fixtures can interference with the device performance.
Make sure the cabling is positioned away from equipment that can damage the cables.
Operating environment is within the ranges listed range, see “Specifications” on page 2.
Relative humidity around the switch does not exceed 95 percent (noncondens ing).
Altitude at the installation site is not higher than 10,000 feet.
In 10/100 and 10/100/1000 fixed port devices, the cable length from the switch to connected devices can not exceed 100 meters (328 feet).
Make sure airflow around the switch and respective vents is unrestricted. With out proper airflow the switch can overheat. To prevent performance degredation and damage to the switch, make sure there is clerance at the top and bottom and around the exhaust vents.
2.1.1
Connecting Hardware
In this instruction, it will explain how to find a proper location for your Modbus Gate ways, and how to connect to the network, hock up the power cable, and connect to the EKI-7716 Series.
2.2
Verifying Switch Operation
Before installing the device in a rack or on a wall, power on the switch to verify that the switch passes the power-on self-test (POST). To connect the cabling to the power
source see “Power Supply Installation” on page 17.
At startup (POST), the System LED blinks green, while the remaining LEDs are a solidy green. Once the switch passes POST self-test, the System LED turns green.
The other LEDs turn off and return to their operating status. If the switch fails POST, the System LED switches to an amber state.
After a successful self-test, power down the switch and disconnect the power cabling.
The switch is now ready for installation on its final location.
2.3
Installing the Switch
2.3.1
DIN Rail Mounting
The DIN rail mount option is the quickest installation option. Additionally, it optimizes the use of rail space.
The metal DIN rail kit is secured to the rear of the switch. The device can be mounted onto a standard 35mm (1.37”) x 75 mm (3”) height DIN rail. The devices can be mation.
mounted vertically or horizontally. Refer to the following guidelines for further infor -
Note!
A corrosion-free mounting rail is advisable.
When installing, make sure to allow for enough space to properly install the cabling.
8 EKI-7716 Series User Manual
2.3.1.1
Installing the DIN-Rail Mounting Kit
1.
Position the rear panel of the switch directly in front of the DIN rail, making sure that the top of the DIN rail clip hooks over the top of the DIN rail, as shown in the following illustration.
Warning!
Do not install the DIN rail under or in front of the spring mechanism on the DIN rail clip to prevent damage to the DIN rail clip or the DIN rail.
Make sure the DIN rail is inserted behind the spring mechanism.
2.
Once the DIN rail is seated correctly in the DIN rail clip, press the front of the switch to rotate the switch down and into the release tab on the DIN rail clip.
If seated correctly, the bottom of the DIN rail should be fully inserted in the release tab.
DIN rail clip
DIN rail
DIN rail clip release tab
Figure 2.1 Installing the DIN-Rail Mounting Kit
See the following figure for an illustration of a completed DIN installation proce dure.
EKI-7716 Series User Manual
Figure 2.2 Correctly Installed DIN Rail Kit
9
3.
Grasp the bottom of the switch and slightly rotate it upwards. If there is resis tance, the switch is correctly installed. Otherwise, re-attempt the installation pro cess from the beginning.
2.3.1.2
Removing the DIN-Rail Mounting Kit
1.
Ensure that power is removed from the switch, and disconnect all cables and connectors from the front panel of the switch.
2.
Push down on the top of the DIN rail clip release tab with your finger. As the clip releases, lift the bottom of the switch, as shown in the following illustration.
\
Figure 2.3 Removing the DIN-Rail
2.3.2
Wall-Mounting
The wall mounting option provides better shock and vibration resistance than the DIN rail vertical mount.
Note!
When installing, make sure to allow for enough space to properly install the cabling.
Before the device can be mounted on a wall, you will need to remove the DIN rail plate.
1.
Rotate the device to the rear side and locate the DIN mounting plate.
2.
Remove the screws securing the DIN mounting plate to the rear panel of the switch.
3.
Remove the DIN mounting plate. Store the DIN mounting plate and provided screws for later use.
4.
Align the wall mounting plates on the rear side. The screw holes on the device and the mounting plates must be aligned, see the following illustration.
10 EKI-7716 Series User Manual
5.
Secure the wall mount plates with M3 screws, see the following figure.
Figure 2.4 Installing Wall Mount Plates
Once the wall mounting plates are secure on the device, you will need to attach the wall screws (x6).
6.
Locate the installation site and place the switch against the wall, making sure it is the final installation location.
7.
Use the wall mount plates as a guide to mark the locations of the screw holes.
8.
Drill four holes over the four marked locations on the wall, keeping in mind that the holes must accommodate wall sinks in addition to the screws.
9.
Insert the wall sinks into the walls.
10.
Insert the screws into the wall sinks. Leave a 2 mm gap between the wall and the screw head to allow for wall mount plate insertion.
4.5 mm
2.0 mm
3.0 mm
Figure 2.5 Securing Wall Mounting Screws
Note!
Make sure the screws dimensions are suitable for use with the wall mounting plate.
Do not completely tighten the screws into the wall. A final adjust ment may be needed before fully securing the wall mounting plates on the wall.
EKI-7716 Series User Manual 11
11.
Align the wall mount plate over the screws on the wall.
12.
Install the wall mount plate on the screws and slide it forward to lock in place, see the following figure.
2
1
2
Figure 2.6 Wall Mount Installation
13.
Once the device is installed on the wall, tighten the screws to secure the device.
2.4
Installing and Removing SFP Modules
Up to two fiber optic ports are available (dependent on model) for use in the switch.
Refer to the technical specifications for details.
The Gigabit Ethernet ports on the switch are 100/1000Base SFP Fiber ports, which require using the 100M or 1G mini-GBIC fiber transceivers to work properly. Advant ech provides completed transceiver models for different distance requirement.
The concept behind the LC port and cable is quite straight forward. Suppose that you are connecting devices I and II; contrary to electrical signals, optical signals do not require a circuit in order to transmit data. Consequently, one of the optical lines is used to transmit data from device I to device II, and the other optical line is used transmit data from device II to device I, for full-duplex transmission.
Remember to connect the Tx (transmit) port of device I to the Rx (receive) port of device II, and the Rx (receive) port of device I to the Tx (transmit) port of device II. If you make your own cable, we suggest labeling the two sides of the same line with the same letter (A-to-A and B-to-B, as shown below, or A1-to-A2 and B1-to-B2).
Note!
This is a Class 1 Laser/LED product. To avoid causing serious damage to your eyes, do not stare directly into the Laser Beam.
12 EKI-7716 Series User Manual
2.4.1
Installing SFP Modules
To connect the fiber transceiver and LC cable, use the following guidelines:
1.
Remove the dust plug from the fiber optic slot chosen for the SFP transceiver.
Figure 2.7 Removing the Dust Plug from an SFP Slot
Note!
Do not remove the dust plug from the SFP slot if you are not installing the transceiver at this time. The dust plug protects hardware from dust contamination.
2.
Position the SFP transceiver with the handle on top, see the following figure.
3.
Locate the triangular marking in the slot and align it with the bottom of the trans ceiver.
4.
Insert the SFP transceiver into the slot until it clicks into place.
5.
Make sure the module is seated correctly before sliding the module into the slot.
A click sounds when it is locked in place.
Handle
Figure 2.8 Installing an SFP Transceiver
Note!
If you are attaching fiber optic cables to the transceiver, continue with the following step. Otherwise, repeat the previous steps to install the remaining SFP transceivers in the device.
6.
Remove the protective plug from the SFP transceiver.
Note!
Do not remove the dust plug from the transceiver if you are not installing the fiber optic cable at this time. The dust plug protects hardware from dust contamination.
EKI-7716 Series User Manual 13
7.
Insert the fiber cable into the transceiver. The connector snaps into place and locks.
Figure 2.9 Attaching a Fiber Optic Cable to a Transceiver
8.
Repeat the previous procedures to install any additional SFP transceivers in the switch.
The fiber port is now setup.
2.4.2
Removing SFP Modules
To disconnect an LC connector, use the following guidelines:
1.
Press down and hold the locking clips on the upper side of the optic cable.
2.
Pull the optic cable out to release it from the transceiver.
Figure 2.10 Removing a Fiber Optic Cable to a Transceiver
3.
Hold the handle on the transceiver and pull the transceiver out of the slot.
Handle
Figure 2.11 Removing an SFP Transceiver
Note!
Replace the dust plug on the slot if you are not installing a transceiver.
The dust plug protects hardware from dust contamination.
14 EKI-7716 Series User Manual
2.5
Connecting the Switch to Ethernet Ports
2.5.1
RJ45 Ethernet Cable Wiring
For RJ45 connectors, data-quality, twisted pair cabling (rated CAT5 or better) is rec ommended. The connector bodies on the RJ45 Ethernet ports are metallic and con nected to the GND terminal. For best performance, use shielded cabling. Shielded cabling may be used to provide further protection.
Straight-thru Cable Wiring
Pin 1
Pin 2
Pin 3
Pin 6
Pin 1
Pin 2
Pin 3
Pin 6
Cross-over Cable Wiring
Pin 1
Pin 2
Pin 3
Pin 6
Pin 3
Pin 6
Pin 1
Pin 2
8
1
Figure 2.12 Ethernet Plug & Connector Pin Position
Maximum cable length: 100 meters (328 ft.) for 10/100BaseT.
EKI-7716 Series User Manual 15
2.6
Connecting the Switch to Console Port
The industrial switch supports a secondary means of management. By connecting the RJ45 to RS232 serial cable between a COM port on your PC (9-pin D-sub be established.
female) and the switch’s RJ45 (RJ45) port, a wired connection for management can
To terminal or PC
Figure 2.13 Serial Console Cable
5
9
1
6
Figure 2.14 DB 9 Pin Position
DB9 Connector
5
3
NC
NC
NC
NC
2
NC
RJ45 Connector
1 Orange/White
2 Orange
3 Green/White
4 Blue
5 Blue/White
6 Green
7 Brown/White
8 Brown
DB9
Female
RJ45
Male
RXD
TXD
RTS
CTS
DTR
DSR
GND
4
6
5
7
8
2
3
5
4
7
2
8
1
3
6
Figure 2.15 Pin Assignment
TXD
RXD
NC
NC
NC
NC
GND
GND
To console port
16 EKI-7716 Series User Manual
2.7
Power Supply Installation
2.7.1
Overview
Warning!
Power down and disconnect the power cord before servicing or wiring the switch.
Caution!
Do not disconnect modules or cabling unless the power is first switched off.
The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch device.
Caution!
Disconnect the power cord before installation or cable wiring.
The switches can be powered by using the same DC source used to power other devices. A DC voltage range of 12 to 48 V
DC
must be applied between the V1+ termi nal and the V1- terminal (PW1), see the following illustrations. A Class 2 power sup ply is required to maintain a UL60950 panel listing. The chassis ground screw
terminal should be tied to the panel or chassis ground. A redundant power configura tion is supported through a secondary power supply unit to reduce network down time as a result of power loss.
EKI-7716 Series support 12 to 48 V
DC you to connect a backup power source.
. Dual power inputs are supported and allow
Single DC Power Redundant DC Power
P2 P1 P2 P1
One DC Supply
Chassis
GND
(pane)
Chassis
GND
(pane)
Dual DC Supplies
Figure 2.16 Power Wiring for EKI-7716 Series
EKI-7716 Series User Manual 17
2.7.2
Considerations
Take into consideration the following guidelines before wiring the device:
The Terminal Block (CN1) is suitable for 12-24 AWG (3.31 - 0.205 mm 2 value 7 lb-in.
). Torque
The cross sectional area of the earthing conductors shall be at least 3.31 mm 2 .
Calculate the maximum possible current for each power and common wire.
Make sure the power draw is within limits of local electrical code regulations.
For best practices, route wiring for power and devices on separate paths.
Do not bundle together wiring with similar electrical characteristics.
Make sure to separate input and output wiring.
Label all wiring and cabling to the various devices for more effective manage ment and servicing.
Note!
Routing communications and power wiring through the same conduit may cause signal interference. To avoid interference and signal degra dation, route power and communications wires through separate con duits.
2.7.3
Grounding the Device
Caution!
Do not disconnect modules or cabling unless the power is first switched off.
The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch device.
Caution!
Before connecting the device properly ground the device. Lack of a proper grounding setup may result in a safety risk and could be hazard ous.
Caution!
Do not service equipment or cables during periods of lightning activity.
18 EKI-7716 Series User Manual
Caution!
Do not service any components unless qualified and authorized to do so.
Caution!
Do not block air ventilation holes.
Electromagnetic Interference (EMI) affects the transmission performance of a device.
By properly grounding the device to earth ground through a drain wire, you can setup the best possible noise immunity and emissions.
Connection to
Grounding Point
Drain Wire with Lug
Figure 2.17 Grounding Connection
By connecting the ground terminal by drain wire to earth ground the switch and chas sis can be ground.
Note!
Before applying power to the grounded switch, it is advisable to use a volt meter to ensure there is no voltage difference between the power supply’s negative output terminal and the grounding point on the switch.
2.7.4
Wiring a Relay Contact
The following section details the wiring of the relay output. The terminal block on the
EKI-7716 Series is wired and then installed onto the terminal receptor located on the
EKI-7716 Series.
V2+V2V1+V1DC12-48V
1A@24V
PWR2 P-Fail PWR1
Figure 2.18 Terminal Receptor: Relay Contact
The terminal receptor includes a total of six pins: two for PWR1, two for PWR2 and two for a fault circuit.
EKI-7716 Series User Manual 19
2.7.5
Wiring the Power Inputs
Caution!
Do not disconnect modules or cabling unless the power is first switched off.
The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch devic
Warning!
Power down and disconnect the power cord before servicing or wiring the switch.
There are two power inputs for normal and redundant power configurations. The power input 2 is used for wiring a redundant power configuration. See the following for terminal block connector views.
V2+V2V1+V1DC12-48V
1A@24V
PWR2 P-Fail PWR1
Figure 2.19 Terminal Receptor: Power Input Contacts
To wire the power inputs:
Make sure the power is not connected to the switch or the power converter before proceeding.
1.
Loosen the screws securing terminal block to the terminal block receptor.
2.
Remove the terminal block from the switch.
1A@24V
Figure 2.20 Removing a Terminal Block
3.
Insert a small flat-bladed screwdriver in the V1+/V1- wire-clamp screws, and loosen the screws.
4.
Insert the negative/positive DC wires into the V+/V- terminals of PW1. If setting up power redundancy, connect PW2 in the same manner.
20 EKI-7716 Series User Manual
5.
Tighten the wire-clamp screws to secure the DC wires in place.
Loosening
Wire-clamp
Screws
Securing Wireclamp Screws
1A@24V 1A@24V
Installing DC
Wires
Figure 2.21 Installing DC Wires in a Terminal Block
6.
Align the terminal block over the terminal block receptor on the switch.
7.
Insert the terminal block and press it in until it is flush with the terminal block receptor.
8.
Tighten the screws on the terminal block to secure it to the terminal block recep tor.
If there is no gap between the terminal block and the terminal receptor, the ter minal block is seated correctly.
1A@24V
Figure 2.22 Securing a Terminal Block to a Receptor
2.8
Reset Button
Reset configuration to factory default:
Press and hold Reset button for 5 seconds.
System reboot:
Press and hold Reset button for 2 seconds.
Note!
Do NOT power off the Ethernet switch when loading default settings.
EKI-7716 Series User Manual 21
Chapter
3
Configuration Utility
3
3.1
First Time Setup
3.1.1
Overview
The Industrial Ethernet Managed Switch is a configurable device that facilitates the interconnection of Ethernet devices on an Ethernet network. This includes comput ers, operator interfaces, I/O, controllers, RTUs, PLCs, other switches/hubs or any device that supports the standard IEEE 802.3 protocol.
This switch has all the capabilities of a store and forward Ethernet switch plus advanced management features such as SNMP, RSTP and port mirroring. This man ual details how to configure the various management parameters in this easy to use switch.
3.1.2
Introduction
To take full advantage of all the features and resources available from the switch, it must be configured for your network.
The switch implements Rapid Spanning Tree Protocol (RSTP) and Simple Network
Management Protocol (SNMP) to provide most of the services offered by the switch.
Rapid Spanning Tree Protocol allows managed switches to communicate with each other to ensure that there exists only one active route between each pair of network explanation of how RSTP works is given in the Spanning Tree section.
nodes and provides automatic failover to the next available redundant route. A brief
The switch is capable of communicating with other SNMP capable devices on the network to exchange management information. This statistical/derived information from the network is saved in the Management Information Base (MIB) of the switch.
The MIB is divided into several different information storage groups. These groups will be elaborated in detail in the Management and SNMP information section of this optimize the flow of multicast traffic on your network.
document. The switch implements Internet Group Management Protocol (IGMP) to
The switch supports both port-based and tag-based Virtual LANs for flexible integra tion with VLAN-aware networks with support for VLAN-unaware devices.
3.1.3
Administrative Interface Access
There are several administrative interfaces to the switch:
1.
A graphical web interface accessible via the switch's built-in web server. Both
HTTP and secure HTTPS with SSL are supported.
Note!
This is the recommended method for managing the switch.
2.
A terminal interface via the RS232/USB port or over the network using telnet or
Secure Shell (SSH).
3.
An SNMP interface can be used to read/write many settings.
4.
Command Line Interface (CLI) can be used to read/write most settings. Initial setup must be done using an Ethernet connection (recommended) or the serial port.
EKI-7716 Series User Manual 23
3.1.4
Using the Graphical (Web) Interface
The graphical interface is provided via a web server in the switch and can be accessed via a web browser such as Chrome, Firefox, or Internet Explorer.
Note!
JavaScript must be supported and enabled in your browser for the graphical interface to work correctly.
HTTP and HTTPS (secure HTTP) are supported for access to the web server. By default, only HTTP is enabled. Either or both may be enabled or disabled to secure the switch. (See the Remote Access Security topic in this section.)
To access the graphical interface, enter a URL like HTTP://192.168.1.1 in your browser's address bar. Replace “http” with “https” to use secure http and replace
“192.168.1.1” with your switch's IP address if you've changed it from the factory default.
The web server in the switch uses a signed security certificate. When you access the server via https, you may see a warning dialog indicating that the certificate was future you can choose to install the certificate on your computer.
signed by an unknown authority. This is expected and to avoid this message in the
Note!
This manual describes and depicts the web user interface in detail. The terminal interface is not specifically shown but is basically the same.
3.1.5
Configuring the Switch for Network Access
To control and monitor the switch via the network, it must be configured with basic network settings, including an IP address and subnet mask.
To configure the switch for network access, select [Add Menu Address Here] to reach the System Settings menu. The settings in this menu control the switch's general net work configuration.
DHCP Enabled/Disabled: The switch can automatically obtain an IP address from a server using the Dynamic Host Configuration Protocol (DHCP). This can speed up initial set up, as the network administrator does not have to find an open IP address.
IP Address and subnet mask configuration: The IP address for the switch can be changed to a user-defined address along with a customized subnet mask to separate subnets.
Note!
Advanced users can set the IP address to 0.0.0.0 to disable the use of an IP address for additional security. However, any features requiring an
IP address (i.e., web interface, etc.) will no longer be available.
Default Gateway Selection: A Gateway Address is chosen to be the address of a router that connects two different networks. This can be an IP address or a
Fully Qualified Domain Name (FQDN) such as “domainname.org”.
NTP Server: The IP address or domain name of an NTP (Network Time Proto col) server from which the switch may retrieve the current time at startup.
Please note that using a domain name requires that at least one domain name server be configured.
24 EKI-7716 Series User Manual
3.1.6
Configuring the Ethernet Ports
The switch comes with default port settings that should allow you to connect to the
Ethernet Ports with out any necessary configuration. Should there be a need to change the name of the ports, negotiation settings or flow control settings, you can
Main menu, and then selecting Main Settings.
do this in the Port Configuration menu. Access this menu by selecting Setup from the
Port Name: Each port in the managed switch can be identified with a custom name. Specify a name for each port here.
Admin: Ports can be enabled or disabled in the managed switch. For ports that are disabled, they are virtually non-existent (not visible in terms of switch opera tion or spanning tree algorithm). Choose to enable or disable a port by selecting
Enabled or Disabled, respectively.
Negotiation: All copper ports and gigabit fiber ports in the managed switch are capable of autonegotiation such that the fastest bandwidth is selected. Choose to enable auto-negotiation or use fixed settings. 100Mbps Fiber ports are Fixed speed only.
Speed/Duplex/Flow Control: The managed switch accepts three local area net work Ethernet Standards. The first standard, 10BASE-T, runs 10Mbps with twisted pair Ethernet cable between network interfaces. The second local area network standard is 100BASE-T, which runs at 100Mbps over the same twisted pair Ethernet cable. Lastly, there is 100BASE-F, which enables fast Ethernet
(100Mbps) over fiber.
These options are available:
10h–10 Mbps, Half Duplex
10f –10 Mbps, Full Duplex
100h–100 Mbps, Half Duplex
100f –100 Mbps, Full Duplex
1000f–1000 Mbps, Full Duplex
On managed switches with gigabit combination ports, those ports with have two rows, a standard row of check boxes and a row labeled “SFP” with radio buttons. The
SFP setting independently sets the speed at which a transceiver will operate if one is ing settings for it.
plugged in. Otherwise, the switch will use the fixed Ethernet port and the correspond -
Note!
When 100f is selected for the SFP of a gigabit combination port, the cor responding fixed Ethernet jack will be disabled unless it is changed back to 1000F.
EKI-7716 Series User Manual 25
3.2
Command Line Interface Configuration
3.2.1
Introduction to Command-Line Interface (CLI)
The command-line interface (CLI) is constructed with an eye toward automation of
CLI-based configuration. The interaction is modeled on that used in many Internet protocols such as Telnet, FTP, and SMTP. After each command is entered and pro cessed, the switch will issue a reply that consists of a numeric status code and a human-readable explanation of the status.
The general format of commands is: section parameter [value] where:
– section is used to group parameters.
– parameter will specify the parameter within the section. For example, the net work section will have parameters for DHCP, IP address, subnet mask, and default gateway.
– value is the new value of the parameter. If value is omitted, the current value is displayed.
Please note that new values will not take effect until explicitly committed.
Sections and parameter names are case sensitive (e.g., “Network” is not the same as
“network”).
Note!
Any commands in the CLI Commands section of this chapter, with the exception of the global commands, must be prefaced with the name of the section they are in. For example, to change the IP address of the switch, you would type: network address <newIP>
3.2.2
Accessing the CLI
To access the CLI interface, establish Ethernet or serial connectivity to the switch.
To connect by Ethernet, open a command prompt window and type: telnet <switchip> (where <switchip> is the IP address of the switch)
At the login prompt, type “cli” for the username and “admin” for the password. The switch will respond with “Managed switch configuration CLI ready”.
26 EKI-7716 Series User Manual
3
3.3
Web Browser Configuration
The switch has an HTML based user interface embedded in the flash memory. The interface offers an easy to use means to manage basic and advanced switch func tions. The interface allows for local or remote switch configuration anywhere on the network.
The interface is designed for use with [Internet Explorer (6.0), Chrome, Firefox].
3.3.1
Preparing for Web Configuration
The interface requires the installation and connection of the switch to the existing net work. A PC also connected to the network is required to connect to the switch and provided as follows: access the interface through a web browser. The required networking information is
IP address: 192.168.1.1
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.254
User name: admin
Password: admin
3.3.2
System Login
Once the switch is installed and connected, power on the switch. The following infor mation guides you through the logging in process.
1.
Launch your web browser on the PC.
2.
In the browser’s address bar, type the switch’s default IP address (192.168.1.1).
The login screen displays.
3.
Enter the user default name and password (admin / admin).
4.
Click OK on the login screen to log in.
The main interface displays.
EKI-7716 Series User Manual 27
Chapter
4
Managing Switch
4
4.1
Log In
To access the login window, connect the device to the network, see “Connecting the
Switch to Ethernet Ports” on page 15. Once the switch is installed and connected,
power on the switch see the following procedures to log into your switch.
When the switch is first installed, the default network configuration is set to DHCP enabled. You will need to make sure your network environment supports the switch setup before connecting it to the network.
1.
Launch your web browser on a computer.
2.
In the browser’s address bar type in the switch’s default IP address
(192.168.1.1). The login screen displays.
3.
Enter the default user name and password (admin/admin) to log into the man agement interface. You can change the default password after you have suc cessfully logged in.
4.
Click Login to enter the management interface.
Figure 4.1 Login Screen
4.2
Recommended Practices
One of the easiest things to do to help increase the security posture of the network infrastructure is to implement a policy and standard for secure management. This practice is an easy way to maintain a healthy and secure network.
After you have performed the basic configurations on your switches, the following is a recommendation which is considered best practice policy.
4.2.1
Changing Default Password
In keeping with good management and security practices, it is recommended that you change the default password as soon as the device is functioning and setup cor rectly. The following details the necessary steps to change the default password.
To change the password:
1.
Navigate to Tools > User Account .
2.
From the User drop-down menu, select the Admin (default) account.
3.
In the User Name field, enter admin for this account. It is not necessary to change the user name, however, a change in the default settings increases the security settings.
4.
In the Password field, type in the new password. Re-type the same password in the Retype Password field.
EKI-7720 Series User Manual 29
5.
Click Apply to change the current account settings.
Figure 4.2 Changing a Default Password
After saving all the desired settings, perform a system save ( Tools > Save Configu ration ). The changes are saved.
4.3
Monitoring
4.3.1
Device Information
The Device Information menu lists information, such as: System Name, System
Location, MAC Address, Firmware version, and more, pertaining to the system. The item within the user interface.
information is for review only. To modify the device information, see the respective
To access this page, click Monitoring > Device Information .
Figure 4.3 Monitoring > Device Information
The following table describes the items in the previous figure.
Item
System Name
System Location
Description
Click Switch to enter the system name: up to 128 alphanumeric char acters (default is Switch).
Click Default to enter the location: up to 256 alphanumeric characters
(default is Default).
30 EKI-7720 Series User Manual
Item
System Contact
MAC Address
IP Address
Subnet Mask
Gateway
Loader Version
Loader Date
Firmware Version
Firmware Date
Build Version
System Object ID
System Up Time
Description
Click Default to enter the contact person: up to 128 alphanumeric characters (default is Default).
Displays the MAC address of the switch.
Displays the assigned IP address of the switch.
Displays the assigned subnet mask of the switch.
Displays the assigned gateway of the switch.
Displays the current loader version of the switch.
Displays the current loader build date of the switch.
Displays the current firmware version of the switch.
Displays the current firmware build date of the switch.
Displays the current firmware build version of the switch.
Displays the base object ID of the switch.
Displays the time since the last switch reboot.
4.3.2
Logging Message
The Logging Message Filter page allows you to enable the display of logging mes sage filter.
To access this page, click Monitoring > Logging Message .
Figure 4.4 Monitoring > Logging Message
The following table describes the items in the previous figure.
Item
Target
Severity
Category
Description
Click the drop-down menu to select a target to store the log mes sages.
Buffered: Store log messages in RAM. All log messages are cleared after system reboot.
File: Store log messages in a file.
The setting allows you to designate a severity level for the Logging
Message Filter function.
Click the drop-down menu to select the severity level target setting.
The level options are:
emerg: Indicates system is unusable. It is the highest level of severity.
alert: Indicates action must be taken immediately.
crit: Indicates critical conditions.
error: Indicates error conditions.
warning: Indicates warning conditions.
notice: Indicates normal but significant conditions.
info: Indicates informational messages.
debug: Indicates debug-level messages.
Click the drop-down menu to select the category level target setting.
EKI-7720 Series User Manual 31
Item
View
Refresh
Clear buffered mes sages
Description
Click View to display all Logging Information and Logging Message information.
Click Refresh to update the screen.
Click Clear buffered messages to clear the logging buffer history list.
The ensuing table for Logging Information table settings are informational only:
Target, Severity and Category.
Figure 4.5 Monitoring > Logging Information
The ensuing table for Logging Message table settings are informational only:
No, Time Stamp, Category, Severity, and Message.
Figure 4.6 Monitoring > Logging Message
4.3.3
Port Monitoring
Port Network Monitor is a bandwidth and network monitoring tool for the purpose of capturing network traffic and measuring of network throughput. The monitoring func tionality includes listing of port statistics as well as port utilization.
4.3.3.1
Port Statistics
To access this page, click Monitoring > Port Monitoring > Port Statistics .
Figure 4.7 Monitoring > Port Monitoring > Port Statistics
The following table describes the items in the previous figure.
Item
Port
Clear
Description
Click the drop-down menu to select a port and its captured statistical setting values.
Click Clear to clear the counter selections.
32 EKI-7720 Series User Manual
The following table provides information for IF MIB Counters settings.
Figure 4.8 Monitoring > Port Monitoring > IF MIB Counters
The following table provides information for Ether-Like MIB Counters settings.
Figure 4.9 Monitoring > Port Monitoring > Ether-Like MIB Counters
The following table provides information for RMON MIB Counters settings.
Figure 4.10 Monitoring > Port Monitoring > Ether-Like MIB Counters
4.3.3.2
Port Utilization
To access this page, click Monitoring > Port Monitoring > Port Utilization .
Figure 4.11 Monitoring > Port Monitoring > Port Utilization
EKI-7720 Series User Manual 33
The following table describes the items in the previous figure.
Item
Refresh period
IFG
Description
Click the drop-down menu to select and designate a period (second intervals) to refresh the information (TX and RX) listings.
Click the drop-down menu to enable or disable the Interframe Gap
(IFG) statistic.
4.3.3.3
Port Error Disable
The Port Error Disable page displays the error information of the switch ports. To access this page, click Monitoring > Port Monitoring > Port Error Disable
Figure 4.12 Monitoring > Port Monitoring > Port Error Disable
The following table describes the items in the previous figure.
Item Description bpduguard storm-control ingress-bandwidthcontrol
Displays the error status.
Displays the error status.
Displays the error status.
loopback-detection Displays the error status.
4.3.4
Link Aggregation
The Link Aggregation function provides LAG information for each trunk. It displays membership status, link state and membership type for each port.
To access this page, click Monitoring > Link Aggregation .
Figure 4.13 Monitoring > Link Aggregation
4.3.5
LLDP Statistics
The LLDP Statistics page displays the LLDP statistics.
34 EKI-7720 Series User Manual
To access this page, click Monitoring > LLDP Statistics .
Figure 4.14 Monitoring > LLDP Statistics
The following table describes the items in the previous figure.
Item
Clear
Refresh
Description
Click Clear to reset LLDP Statistics of all the interfaces.
Click Refresh to update the data on the screen with the present state of the data in the switch.
The following figure displays the LLDP Port Statistics settings.
Figure 4.15 Monitoring > LLDP Port Statistics
4.3.6
IGMP Statistics
The IGMP Statistics function displays statistical package information for IP multi casting.
EKI-7720 Series User Manual 35
To access this page, click Monitoring > IGMP Statistics .
Figure 4.16 Monitoring > IGMP Statistics
The following table describes the items in the previous figure.
Item
Clear
Refresh
Description
Click Clear to refresh IGMP Statistics of all the interfaces.
Click Refresh to update the data on the screen with the present state of the data in the switch.
The ensuing table for IGMP Statistics settings are informational only: Total RX, Valid
RX, Invalid RX, Other RX, Leave RX, Report RX, General Query RX, Special Group
TX, Special Group Query TX and Special Group & Source Query TX.
Query RX, Special Group & Source Query RX, Leave TX, Report TX, General Query
4.3.7
MLD Statistics
The MLD Statistics function displays statistical package information for MLD mes sage.
36 EKI-7720 Series User Manual
To access this page, click Monitoring > MLD Statistics .
Figure 4.17 Monitoring > MLD Statistics
The following table describes the items in the previous figure.
Item
Clear
Refresh
Description
Click Clear to refresh MLD Statistics of all the interfaces.
Click Refresh to update the data on the screen with the present state of the data in the switch.
The ensuing table for IGMP Statistics settings are informational only: Total RX, Valid
RX, Invalid RX, Other RX, Leave RX, Report RX, General Query RX, Special Group
TX, Special Group Query TX and Special Group & Source Query TX.
Query RX, Special Group & Source Query RX, Leave TX, Report TX, General Query
EKI-7720 Series User Manual 37
4.4
System
4.4.1
IP Settings
The IP Settings menu allows you to select a static or DHCP network configuration.
The Static displays the configurable settings for the static option.
To access this page, click System > IP Settings .
Figure 4.18 System > IP Settings
The following table describes the items in the previous figure.
Item
Mode
IP Address
Subnet Mask
Gateway
DNS Server 1
DNS Server 2
Apply
Description
Click the radio button to select the IP Address Setting mode: Static or
DHCP.
Enter a value to specify the IP address of the interface. The default is
192.168.1.1.
Enter a value to specify the IP subnet mask for the interface. The default is 255.255.255.0.
Enter a value to specify the default gateway for the interface. The default is 192.168.1.254.
Enter a value to specify the DNS server 1 for the interface. The default is 168.95.1.1.
Enter a value to specify the DNS server 2 for the interface. The default is 168.95.192.1.
Click Apply to save the values and update the screen.
The following figure displays the IP Address Information settings
Figure 4.19 System > IP Address Information
38 EKI-7720 Series User Manual
4.4.2
IPv6 Settings
To access this page, click System > IPv6 Settings .
Figure 4.20 System > IPv6 Settings
The following table describes the items in the previous figure.
Item Description
Auto Configuration Select the radio button to enable or disable the IPv6.
IPv6 Address
Gateway
Enter the IPv6 address for the system.
Enter the gateway address for the system.
DHCPv6 Client
Apply
Enter the DHCPv6 address for the system.
Click Apply to save the values and update the screen.
The ensuing table for IPv6 Information settings are informational only: Auto Config uration, IPv6 In Use Address, IPv6 In Use Router, IPv6 Static Address, IPv6 Static
Router and DHCPv6 Client.
The following figure displays the IPv6 Information settings
Figure 4.21 System > IPv6 Information
4.4.3
DHCP Client Option 82
The DHCP Client Option 82 configurable Circuit ID and Remote ID feature enhances validation security by allowing you to select naming choices suboptions. You can
You can also configure an ASCII text string to override the circuit ID. select a switch-configured hostname or specify an ASCII test string for the remote ID.
EKI-7720 Series User Manual 39
To access this page, click System > DHCP Client Option 82 .
Figure 4.22 System > DHCP Client Option 82
The following table describes the items in the previous figure.
Item Description
Mode
Circuit ID Format
Circuit ID String
Circuit ID Hex
Circuit ID User-
Define
Click the radio button to enable or disable the DHCP Client Option 82 mode.
Click the drop-down menu to set the ID format: String, Hex, User Defi nition.
Enter the string ID of the corresponding class.
Enter the hex string of the corresponding class.
Enter the user definition of the corresponding class.
Remote ID Format Click the drop-down menu to set the Remote ID format: String, Hex,
User Definition.
Remote ID String Enter the remote string ID of the corresponding class.
Remote ID Hex
Remote ID User-
Define
Enter the remote hex string of the corresponding class.
Enter the remote user definition of the corresponding class.
Apply Click Apply to save the values and update the screen.
The ensuing table for DHCP Client Option 82 Information table settings are infor mational only: Status, Circuit ID Format, Circuit ID String, Circuit ID Hex, Circuit ID
User-Define.
User-Define, Remote ID Format, Remote ID String, Remote ID Hex and Remote ID
40 EKI-7720 Series User Manual
The following figure displays the DHCP Client Option 82 Information settings
Figure 4.23 System > DHCP Client Option 82 Information
4.4.4
DHCP Auto Provision
The DHCP Auto Provision feature allows you to load configurations using a server with DHCP options. Through the remote connection, the switch obtains information from a configuration file available through the TFTP server.
To access this page, click System > DHCP Auto Provision .
Figure 4.24 System > DHCP Auto Provision
The following table describes the items in the previous figure.
Item
Status
Apply
Description
Select the radio button to enable or disable the DHCP Auto Provision ing Setting.
Click Apply to save the values and update the screen.
The following figure displays the DHCP Auto Provision Information settings
Figure 4.25 System > DHCP Auto Provision Information
4.4.5
Management VLAN
By default the VLAN is the management VLAN providing communication with the switch management interface.
EKI-7720 Series User Manual 41
To access this page, click System > Management VLAN .
Figure 4.26 System > Management VLAN
The following table describes the items in the previous figure.
Item Description
Management VLAN Click the drop-down menu to select a defined VLAN.
Apply Click Apply to save the values and update the screen.
The ensuing table for Management VLAN State are informational only: Management
VLAN.
4.4.6
System Time
To access this page, click System > System Time .
Figure 4.27 System > System Time
The following table describes the items in the previous figure.
Item
Enable SNTP
Description
Click the radio button to enable or disable the SNTP.
42 EKI-7720 Series User Manual
Item Description
SNTP/NTP Server
Address
SNTP Port
Enter the address of the SNTP server. This is a text string of up to 64 characters containing the encoded unicast IP address or hostname of a SNTP server. Unicast SNTP requests will be sent to this address. If this address is a DNS hostname, then that hostname should be resolved into an IP address each time a SNTP request is sent to it.
Enter the port on the server to which SNTP requests are to be sent.
Allowed range is 1 to 65535 (default: 123).
Click the drop-down menus to set local date and time of the system.
Manual Time
Time Zone Click the drop-down menu to select a system time zone.
Daylight Saving Time Click the drop-down menu to enable or disable the daylight saving time settings.
Daylight Saving Time
Offset
Recurring From
Apply
Enter the offsetting variable in seconds to adjust for daylight saving time.
Click the drop-down menu to designate the start date and time for daylight saving time.
Recurring To Click the drop-down menu to designate the end date and time for day light saving time.
Non-Recurring From Click the drop-down menu to designate a start date and time for a non-recurring daylight saving time event.
Non-Recurring To Click the drop-down menu to designate the end date and time for a non-recurring daylight saving time event.
Click Apply to save the values and update the screen.
The following figure displays the System Time Information settings
Figure 4.28 System > System Time Information
4.4.7
Network Port
To access this page, click System > Network Port .
EKI-7720 Series User Manual
Figure 4.29 System > Network Port
43
The following table describes the items in the previous figure.
Item
HTTP
HTTPS
TELNET
SSH
Apply
Description
By default, the HTTPS port setting is set to port 80. To assign the web interface to a different port, enter the port number in the field.
By default, the HTTPS port setting is set to port 443. To assign the web interface to a different port, enter the port number in the field.
By default, the TELNET port setting is set to port 23. To assign the web interface to a different port, enter the port number in the field.
By default, the SSH port setting is set to port 22. To assign the web interface to a different port, enter the port number in the field.
Click Apply to save the values and update the screen.
The ensuing table for Network Port Information are informational only: HTTP,
HTTPS, TELNET and SSH.
44 EKI-7720 Series User Manual
4.5
L2 Switching
4.5.1
Port Configuration
Port Configuration describes how to use the user interface to configure LAN ports on the switch.
To access this page, click L2 Switching > Port Configuration .
Figure 4.30 L2 Switching > Port Configuration
The following table describes the items in the previous figure.
Item
Port
Enabled
Speed
Duplex
Flow Control
Downshift
Fiber Port
Enabled
Speed
Duplex
Flow Control
Apply
Description
Click the drop-down menu to select the port for the L2 Switch setting.
Click the radio-button to enable or disable the Port Setting function.
Click the drop-down menu to select the port speed: Auto, Auto-10M,
Auto-100M, Auto-1000M, Auto-10/100M, 10M, 100M, or 1000M.
Click the drop-down menu to select the duplex setting: Auto, Half or Full.
Click the radio button to enable or disable the flow control function.
Click the radio button to enable or disable the downshift function for speed.
Click the drop-down menu to select the port for the L2 Switch Fiber port setting.
Click the radio-button to enable or disable the Fiber Port Setting function.
Click the drop-down menu to select the fiber port speed: Auto, Auto-
1000M, 100M, or 1000M.
Click the drop-down menu to select the duplex setting: Half or Full.
Click the radio button to enable or disable the flow control function.
Click Apply to save the values and update the screen.
The following figure shows the Port Name Settings with Display Method.
Figure 4.31 L2 Switching > Port Name Settings
EKI-7720 Series User Manual 45
The following figure displays the Port Status settings.
Figure 4.32 L2 Switching > Port Status
4.5.2
Port Mirror
Port mirroring function allows the sending of a copy of network packets seen on one switch port to a network monitoring connection on another switch port. Port mirroring can be used to analyze and debug data or diagnose errors on a network or to mirror either inbound or outbound traffic (or both).
There are no preset values in the Port Mirror. The displayed values do not represent the actual setting values.
To access this page, click L2 Switching > Port Mirror .
Figure 4.33 L2 Switching > Port Mirror
The following table describes the items in the previous figure.
Item Description
Session ID Click the drop-down menu to select a port mirroring session from the list. The number of sessions allowed is platform specific.
Monitor session state Click the drop-down menu to enable or disable the session mode for a selected session ID.
Destination Port
Allow-ingress
Click the drop-down menu to select the destination port and receive all the traffic from configured mirrored port(s).
Click the drop-down menu to enable or disable the Allow-ingress func tion.
46 EKI-7720 Series User Manual
Item
Sniffer RX Ports
Sniffer TX Ports
Apply
Description
Enter the variable to define the RX port.
Enter the variable to define the TX port.
Click Apply to save the values and update the screen.
RSPAN Settings allow you to analyze network traffic passing trough VLANs or ports by using the RSPAN function to direct a copy of the traffic to a corresponding port.
The following figure displays the RSPAN settings.
Item
Session ID
Rspan VLAN
Rspan tag action
Apply
Figure 4.34 L2 Switching > RSPAN
Description
Enter the session ID for RSPAN
Enter the value to the corresponding RSPAN VLAN ID
Click to add, remove, and no-modify the entry.
Click Apply to save the values and update the screen.
The following figure displays the Mirror Status settings.
Figure 4.35 L2 Switching > Mirror Status
4.5.3
Link Aggregation
Link Aggregation is a method for combining multiple network connections in parallel in order to increase throughput beyond the capability of a single connection, and to provide redundancy in case one of the links should fail.
4.5.3.1
Load Balance
The Load Balancing page allows you to select between a MAC Address or IP/MAC
Address algorithm for the even distribution of IP traffic across two or more links.
To access this page, click L2 Switching > Link Aggregation > Load Balance .
Figure 4.36 L2 Switching > Link Aggregation > Load Balance
EKI-7720 Series User Manual 47
The following table describes the items in the previous figure.
Item
Load Balance Algo rithm
Apply
Description
Select the radio button to select the Load Balance Setting: MAC
Address, IP/MAC Address or Source Port.
Click Apply to save the values and update the screen.
The following figure displays the Load Balance Information settings.
Figure 4.37 L2 Switching > Link Aggregation > Load Balance Information
4.5.3.2
LAG Management
Link aggregation is also known as trunking. It is a feature available on the Ethernet gateway and is used with Layer 2 Bridging. Link aggregation allows for the logical merging of multiple ports into a single link.
To access this page, click L2 Switching > Link Aggregation > LAG Management .
Item
LAG
Name
Type
Ports
Apply
Figure 4.38 L2 Switching > Link Aggregation > LAG Management
The following table describes the items in the previous figure.
Description
Click the drop-down menu to select the designated trunk group:
Trunk 1 ~8.
Enter an entry to specify the LAG name.
Click the radio button to specify the type mode: Static or LACP.
Click the drop-down menu to select designated ports: FE1-8 or
GE1-2.
Click Apply to save the values and update the screen.
48 EKI-7720 Series User Manual
The following figure displays the LAG Management Information settings.
Figure 4.39 L2 Switching > Link Aggregation > LAG Management Information
4.5.3.3
LAG Port Settings
The LAG Port Settings page allows you to enable or disable, set LAG status, speed and flow control functions.
In this example we will configure a LAG between the following switches:
To access this page, click L2 Switching > Link Aggregation > LAG Port Settings .
Figure 4.40 L2 Switching > Link Aggregation > LAG Port Settings
The following table describes the items in the previous figure.
Item
LAG Select
Enabled
Speed
Flow Control
Apply
Description
Click the drop-down menu to select a predefined LAG trunk definition:
LAG 1-8.
Click the radio button to enable or disable the LAG Port.
Click the drop-down menu to select the port speed: Auto, Auto-10M,
Auto-100M, Auto-1000M, Auto-10/100M, 10M, 100M, or 1000M.
Click the radio button to enable or disable the Flow Control for the
LAG Port.
Click Apply to save the values and update the screen.
EKI-7720 Series User Manual 49
The following figure displays the LAG Port Status settings
Figure 4.41 L2 Switching > Link Aggregation > LAG Port Status
4.5.3.4
LACP Priority Settings
The LACP Priority Settings page allows you to configure the system priority for LACP.
To access this page, click L2 Switching > Link Aggregation > LACP Priority Set tings .
Figure 4.42 L2 Switching > Link Aggregation > LACP Priority Settings
The following table describes the items in the previous figure.
Item
System Priority
Apply
Description
Enter the value (1-65535) to designate the LACP system priority.
Click Apply to save the values and update the screen.
The ensuing table for LACP Information settings are informational only: System Pri ority.
4.5.3.5
LACP Port Settings
Link Aggregation Control Protocol (LACP) provides a method to control the bundling of several physical ports together to form a single logical channel. By configuring the
LACP packets to the peer device (also implementing LACP).
LACP function, the switch can negotiate an automatic bundling of links by sending
To access this page, click L2 Switching > Link Aggregation > LACP Port Settings .
Figure 4.43 L2 Switching > Link Aggregation > LACP Port Settings
50 EKI-7720 Series User Manual
The following table describes the items in the previous figure.
Item
Port Select
Priority
Timeout
Mode
Apply
Description
Select a port for the LACP Port Settings. The listed available settings are: FE1-FE8, GE1-GE2.
However, the available settings are dependent on the connected
LACP device and may not be listed as displayed in the current figure.
Enter a variable (1 to 65535) to assign a priority to the defined port selection.
Click the radio button to select a long or short timeout period.
Click the radio button to select the setting mode: Active or Passive.
Active: Enables LACP unconditionally.
Passive: Enables LACP only when an LACP device is detected
(default state).
Click Apply to save the values and update the screen.
The following figure displays the LACP Port Information settings.
Figure 4.44 L2 Switching > Link Aggregation > LACP Port Information Settings
4.5.4
802.1Q VLAN
The 802.1Q VLAN feature allows for a single VLAN to support multiple VLANs. With the 802.1Q feature you can preserve VLAN IDs and segregate different VLAN traffic.
The 802.1Q VLAN tag feature encapsulates the 802.1Q VLAN tagging within another
802.1Q VLAN tag. The outer tag is assigned following the AP group, while the inner
VLAN ID is assigned dynamically by the AAA server.
4.5.4.1
VLAN Management
The management of VLANs is available through the VLAN Settings page. Through entry. this page you can add or delete VLAN listings and add a prefix name to an added
EKI-7720 Series User Manual 51
To access this page, click L2 Switching > 802.1Q VLAN > VLAN Management .
Figure 4.45 L2 Switching > 802.1Q VLAN > VLAN Management
The following table describes the items in the previous figure.
Item Description
VLAN Action Click the radio button to add or delete the VLAN entry shown in the previous field.
VLAN ID / VLAN List Enter the name of the VLAN entry to setup.
VLAN Name / VLAN
Prefix
Apply
Enter the prefix to be used by the VLAN list entry in the previous field.
Click Apply to save the values and update the screen.
The following figure displays the VLAN Table settings.
Figure 4.46 L2 Switching > 802.1Q VLAN > VLAN Table
4.5.4.2
PVID Settings
The PVID Settings page allows you to designate a PVID for a selected port, define the accepted type and enable/disable the ingress filtering.
To access this page, click L2 Switching > 802.1Q VLAN > PVID Settings .
Figure 4.47 L2 Switching > 802.1Q VLAN > PVID Settings
The following table describes the items in the previous figure.
Item
Port Select
Description
Click the drop-down menu to select a port and edit its settings: FE1-
FE8, GE1-GE2, or Trunk1 - Trunk8.
52 EKI-7720 Series User Manual
Item
PVID
Accepted Type
Ingress Filtering
Apply
Description
Enter the VLAN ID you want assigned to untagged or priority tagged frames received on this port. The value ranges 1 to 4094. The default is 1.
Click the radio button to specify which frames to forward.
Tag Only discards any untagged or priority tagged frames.
Untag Only discards any tagged frames.
All accepts all untagged and tagged frames.
Whichever you select, VLAN tagged frames are forwarded in accor dance with the IEEE 802.1Q VLAN standard. The default is All.
Click the radio button to specify how you want the port to handle tagged frames. If you enable Ingress Filtering, a tagged frame will be discarded if this port is not a member of the VLAN identified by the
VLAN ID in the tag. If you select Disabled, all tagged frames will be accepted. The default is Disabled.
Click Apply to save the values and update the screen.
The ensuing table for Port VLAN Status settings are informational only: Port, Inter face VLAN Mode, PVID, Accept Frame Type and Ingress Filtering.
4.5.4.3
Port to VLAN
The Port to VLAN page allows you to add a port to a VLAN and select the related parameters.
To access this page, click L2 Switching > 802.1Q VLAN > Port to VLAN .
EKI-7720 Series User Manual 53
Figure 4.48 L2 Switching > 802.1Q VLAN > Port to VLAN
The following table describes the items in the previous figure.
Item Description
Port Displays the assigned port to the entry.
Interface VLAN Mode Displays the Hybrid mode to the listed VLAN port.
Membership
Apply
Displays the assigned membership status of the port entry, options include: Forbidden, Excluded Tagged or Untagged.
Click Apply to save the values and update the screen.
54 EKI-7720 Series User Manual
4.5.4.4
Port-VLAN Mapping
The following figure displays the Port-VLAN Mapping Table settings.
Figure 4.49 L2 Switching > 802.1Q VLAN > Port-VLAN Mapping
4.5.4.5
RSPAN VLAN
The RSPAN VLAN page allows user to process monitoring RSPAN feature of the
VLAN. The following figure displays the RSPAN VLAN Table settings.
Figure 4.50 L2 Switching > 802.1Q VLAN > RSPAN VLAN Mapping
The following table describes the items in the previous figure.
Item
VLAN ID
Apply
Description
Click the drop-down menu to select the corresponding VLAN ID to map.
Click Apply to save the values and update the screen.
4.5.5
Q-in-Q
Q-in-Q is commonly referred as VLAN stacking in which VLANs are nested by adding two tags to each frame instead of one. Network service provider and users both can allowed by 802.1Q.
use VLANs and makes it possible to have more than the 4094 separate VLANs
There are three ways in which a machine can be connected to a network carrying double-tagged 802.1ad traffic:
via a untagged port, where both inner and outer VLANs are handled by the switch or switches (so the attached machine sees ordinary Ethernet frames);
via a single-tagged (tunnel) port, where the outer VLAN only is handled by the switch (so the attached machine sees single-tagged 802.1Q VLAN frames); or
via a double-tagged (trunk) port, where both inner and outer VLANs are handled by the attached machine (which sees double-tagged 802.1ad VLAN frames).
4.5.5.1
Global Settings
The Global Settings page allows you to set the outer VLAN Ethertype setting.
EKI-7720 Series User Manual 55
To access this page, click L2 Switching > Q-in-Q > Global Settings .
Figure 4.51 L2 Switching > Q-in-Q > Global Settings
The following table describes the items in the previous figure.
Item
Outer VLAN Ether type
Apply
Description
Enter the outer VLAN handled by the switch giving the attached machine a single-tagged 802.1Q VLAN frame.
Click Apply to save the values and update the screen.
The ensuing table for QinQ Global Information settings are informational only:
Outer VLAN Ethertype.
4.5.5.2
Port Settings
The Port Settings page allows you to define the outer PVID and outer mode for a selected port.
To access this page, click L2 Switching > Q-in-Q > Port Settings .
Figure 4.52 L2 Switching > Q-in-Q > Port Settings
The following table describes the items in the previous figure.
Item
Port Select
Outer PVID
Outer Mode
Apply
Description
Enter the switch port (part of VLAN configuration) to configure the selection as a tunnel port.
Enter the Port VLAN ID (PVID) to assigned the native VLAN ID. All untagged traffic coming in or out of the 802.1Q port is forwarded based on the PVID value
Click the drop-down menu to select between UNI or NNI role.
UNI: Selects a user-network interface which specifies communi cation between the specified user and a specified network.
NNI: Selects a network-to-network interface which specifies communication between two specified networks.
Click Apply to save the values and update the screen.
56 EKI-7720 Series User Manual
The following figure displays the QinQ Port Information settings.
Figure 4.53 L2 Switching > QinQ Port Information
4.5.6
GARP
The Generic Attribute Registration Protocol (GARP) is a local area network (LAN) protocol. The protocol defines procedures for the registration and de-registration of attributes (network identifiers or addresses) by end stations and switches with each other.
4.5.6.1
GARP Settings
To access this page, click L2 Switching > GARP > GARP Settings .
Figure 4.54 L2 Switching > GARP > GARP Settings
The following table describes the items in the previous figure.
Item
Join Time
Leave Time
Leave All Time
Apply
Description
Enter a value to specify the time between the transmission of GARP
PDUs registering (or re-registering) membership for a VLAN or multi cast group in centiseconds. Enter a number between 6 and 600. An instance of this timer exists for each GARP participant for each port.
Enter a value to specify the time to wait after receiving an unregister request for a VLAN or multicast group before deleting the associated entry, in centiseconds. This allows time for another station to assert registration for the same attribute in order to maintain uninterrupted service. Enter a number between 12 and 3000. An instance of this timer exists for each GARP participant for each port.
Enter a value to specify the Leave All Time controls how frequently
Leave All PDUs are generated. A Leave All PDU indicates that all reg istrations will shortly be deregistered. Participants will need to rejoin in order to maintain registration. The Leave All Period Timer is set to a random value in the range of LeaveAllTime to 1.5*LeaveAllTime. The timer is specified in centiseconds. Enter a number between 12 and
12000. An instance of this timer exists for each GARP participant for each port.
Click Apply to save the values and update the screen.
The ensuing table for GARP Information settings are informational only: Join Time,
Leave Time and Leave All Time.
EKI-7720 Series User Manual 57
4.5.6.2
GVRP Settings
The GVRP Settings page allows you to enable or disable the GVRP (GARP VLAN tates control of virtual local area networks (VLANs) within a larger network.
Registration Protocol or Generic VLAN Registration Protocol) protocol which facili -
To access this page, click L2 Switching > GARP > GVRP Settings .
Figure 4.55 L2 Switching > GARP > GVRP Settings
The following table describes the items in the previous figure.
Item
Status
Apply
Description
Click to enable or disable the GARP VLAN Registration Protocol administrative mode for the switch. The factory default is Disable.
Click Apply to save the values and update the screen.
The ensuing table for GVRP Information settings are informational only: GVRP.
4.5.6.3
GMRP Settings
To access this page, click L2 Switching > GARP > GMRP Settings .
Figure 4.56 L2 Switching > GARP > GMRP Settings
The following table describes the items in the previous figure.
Item
State
Apply
Description
Click to enable or disable the GMRP mode for the switch. The factory default is Disable.
Click Apply to save the values and update the screen.
The ensuing table for GMRP Information settings are informational only: GMRP.
The ensuing table for Multicast Groups settings are informational only: VLAN ID,
MAC Address, Type and Member Ports.
4.5.7
802.3az EEE
The 802.3az Energy Efficient Ethernet (EEE) innovative green feature reduces energy consumption through intelligent functionality:
Traffic detection — Energy Efficient Ethernet (EEE) compliance
Inactive link detection
Inactive link detection function automatically reduces power usage when inactive links or devices are detected.
58 EKI-7720 Series User Manual
To access this page, click L2 Switching > 802.3az EEE .
Figure 4.57 L2 Switching > 802.3az EEE
The following table describes the items in the previous figure.
Item
Port Select
State
Apply
Description
Enter the port to setup the EEE function.
Click Enabled or Disabled to set the state mode of the port select setting.
Click Apply to save the values and update the screen.
The ensuing table for EEE Enable Status settings are informational only: Port and
EEE State.
4.5.8
Multicast
Multicast forwarding allows a single packet to be forwarded to multiple destinations.
The service is based on L2 switch receiving a single packet addressed to a specific the packets to the relevant ports.
Multicast address. Multicast forwarding creates copies of the packet, and transmits
4.5.8.1
Multicast Filtering
The Multicast Filtering page allows for the definition of action settings when an unknown multicast request is received. The options include: Drop, Flood, or Router
Port.
To access this page, click L2 Switching > Multicast > Multicast Filtering .
Figure 4.58 L2 Switching > Multicast > Multicast Filtering
The following table describes the items in the previous figure.
Item
Unknown Multicast
Action
Apply
Description
Select the configuration protocol: Drop, Flood, or Router Port, to apply for any unknown multicast event.
Click Apply to save the values and update the screen.
The ensuing table for Properties Information settings are informational only:
Unknown Multicast Action.
4.5.8.2
IGMP Snooping
IGMP Snooping is defined as the process of listening to Internet Group Management
Protocol (IGMP) network traffic. IGMP Snooping allows a network switch to listen in on the IGMP conversation between hosts and routers and maintain a map of which
EKI-7720 Series User Manual 59
links need which IP multicast streams. Multicasts can be filtered from the links which do not need them in turn controlling which ports receive specific multicast traffic.
IGMP Settings
To access this page, click L2 Switching > Multicast > IGMP Snooping > IGMP Set tings .
Figure 4.59 L2 Switching > Multicast > IGMP Snooping > IGMP Settings
The following table describes the items in the previous figure.
Item
IGMP Snooping
State
IGMP Snooping Ver sion
IGMP Snooping
Report Suppression
Apply
Description
Select Enable or Disable to designate the IGMP Snooping State.
Select designate the IGMP Snooping Version: V2 or V3.
Select Enable or Disable to setup the report suppression for IGMP
Snooping.
Click Apply to save the values and update the screen.
The following figure displays the IGMP Snooping Information settings.
Figure 4.60 L2 Switching > Multicast > IGMP Snooping > IGMP Snooping
Information
IGMP Querier
IGMP Querier allows snooping to function by creating the tables for snooping. Gen eral queries must be unconditionally forwarded by all switches involved in IGMP snooping.
To access this page, click L2 Switching > Multicast > IGMP Snooping > IGMP
Querier .
Figure 4.61 L2 Switching > Multicast > IGMP Snooping > IGMP Querier
The following table describes the items in the previous figure.
Item
VLAN ID
Description
Select the VLAN ID to define the local IGMP querier.
60 EKI-7720 Series User Manual
Item
Querier State
Querier Version
Apply
Description
Select Disable or Enable to configure the VLAN ID (IGMP Querier).
Select the querier version (V2 or V3) designated to the selected VLAN
ID.
Click Apply to save the values and update the screen.
The following figure displays the IGMP Querier Status settings.
Figure 4.62 L2 Switching > Multicast > IGMP Snooping > IGMP Querier Status
IGMP Static Groups
To access this page, click L2 Switching > Multicast > IGMP Snooping > IGMP
Static Groups .
Figure 4.63 L2 Switching > Multicast > IGMP Snooping > IGMP Static Groups
The following table describes the items in the previous figure.
Item
VLAN ID
Group IP Address
Member Ports
Add
Description
Select the VLAN ID to define IGMP static group.
Enter the IP address assigned to the VLAN ID.
Enter the port numbers to associate with the static group.
Click Add to add an IGMP group.
The ensuing table for IGMP Static Groups Status settings are informational only:
VLAN ID, Group IP Address, Member Ports and Modify.
Multicast Groups
To access this page, click L2 Switching > Multicast > IGMP Snooping > Multicast
Groups .
The following figure displays the Multicast Groups settings.
Figure 4.64 L2 Switching > Multicast > IGMP Snooping > Multicast Groups
Router Ports
To access this page, click L2 Switching > Multicast > IGMP Snooping > Router
Ports .
The following figure displays the Router Ports settings.
Figure 4.65 L2 Switching > Multicast > IGMP Snooping > Router Ports
EKI-7720 Series User Manual 61
4.5.8.3
MLD Snooping
The MLD Snooping page allows you to select the snooping status (enable or dis able), the version (v1 or v2) and the enabling/disabling of the report suppression for the MLD querier, which sends out periodic general MLD queries and are forwarded through all ports in the VLAN.
MLD Settings
To access this page, click L2 Switching > Multicast > MLD Snooping > MLD Set tings .
Figure 4.66 L2 Switching > Multicast > MLD Snooping > MLD Settings
The following table describes the items in the previous figure.
Item Description
MLD Snooping State Select Enable or Disable to setup the MLD Snooping State.
MLD Snooping Ver sion
Select the querier version (V1 or V2) designated to the MLD Snooping
Version.
MLD Snooping
Report Suppression
Select Enable or Disable to designate the status of the report sup pression.
Apply Click Apply to save the values and update the screen.
The following figure displays the MLD Snooping Information settings.
Figure 4.67 L2 Switching > Multicast > MLD Snooping > MLD Snooping
Information
The following figure displays the MLD Snooping Table settings.
Figure 4.68 L2 Switching > Multicast > MLD Snooping > MLD Snooping Table
62 EKI-7720 Series User Manual
MLD Querier
The MLD Querier page allows you to select and enable/disable the MLD querier and define the version (IGMPv1 or IGMPv2) when enabled.
To access this page, click L2 Switching > Multicast > MLD Snooping > MLD Que rier .
Figure 4.69 L2 Switching > Multicast > MLD Snooping > MLD Querier
The following table describes the items in the previous figure.
Item
VLAN ID
Querier State
Querier Version
Apply
Description
Enter the VLAN ID to configure.
Select Enable or Disable status on the selected VLAN.
Enable: Enable IGMP Querier Election.
Disable: Disable IGMP Querier Election.
Select the querier version (IGMPV1 or IGMPV2) designated to the
MLD Querier function.
Click Apply to save the values and update the screen.
The ensuing table for MLD Querier Status settings are informational only: VLAN ID,
Querier State, Querier Status, Querier Version and Querier IP.
MLD Static Group
The MLD Static Group page allows you to configure specified ports as static member ports.
To access this page, click L2 Switching > Multicast > MLD Snooping > MLD Static
Group .
Figure 4.70 L2 Switching > Multicast > MLD Snooping > MLD Static Group
The following table describes the items in the previous figure.
Item
VLAN ID
Group IP Address
Member Ports
Add
Description
Enter the VLAN ID to define the local MLD Static Group.
Enter the IP address associated with the static group.
Enter the ports designated with the static group.
Click Add to add a MLD static group.
The ensuing table for MLD Static Groups Status settings are informational only:
VLAN ID, Group IP Address, Member Ports and Modify.
EKI-7720 Series User Manual 63
Multicast Groups
To access this page, click L2 Switching > Multicast > MLD Snooping > Multicast
Groups .
The following figure displays the Multicast Groups settings.
Figure 4.71 L2 Switching > Multicast > MLD Snooping > Multicast Groups
Router Ports
To access this page, click L2 Switching > Multicast > MLD Snooping > Router
Ports .
The following figure displays the Router Ports settings.
Figure 4.72 L2 Switching > Multicast > MLD Snooping > Router Ports
4.5.9
Jumbo Frame
Jumbo frames are frames larger than the standard Ethernet frame size of 1518 bytes. The Jumbo Frame function allows the configuration of Ethernet frame size.
To access this page, click L2 Switching > Jumbo Frame .
Figure 4.73 L2 Switching > Jumbo Frame
The following table describes the items in the previous figure.
Item
Jumbo Frame
(Bytes)
Apply
Description
Enter the variable in bytes (1518 to 10240) to define the jumbo frame size.
Click Apply to save the values and update the screen.
The ensuing table for Jumbo Frame Config settings are informational only: Jumbo
Frame (Bytes).
4.5.10
Spanning Tree
The Spanning Tree Protocol (STP) is a network protocol to ensure loop-free topology for any bridged Ethernet local area network.
4.5.10.1
STP Global Settings
The STP Global Settings page allows you to set the STP status, select the configura tion for a BPDU packet, choose the path overhead, force version and set the configu ration revision range.
64 EKI-7720 Series User Manual
To access this page, click L2 Switching > Spanning Tree > STP Global Settings .
Figure 4.74 L2 Switching > Spanning Tree > STP Global Settings
The following table describes the items in the previous figure.
Item
Enabled
BPDU Forward
BPDU Guard
PathCost Method
Force Version
Apply
Description
Click the radio-button to enable or disable the STP status.
Select flooding or filtering to designate the type of BPDU packet.
Click the radio-button to enable or disable the BPDU guard. When enabled, BPDU Guard can disable edge ports that receive BPDU packets. This prevents a new device from entering the existing STP topology. Thus devices that were originally not a part of STP are not allowed to influence the STP topology
Select short or long to define the method of used for path cost calcula tions.
Click the drop-down menu to select the operating mode for STP.
STP-Compatible: 802.1D STP operation.
RSTP-Operation: 802.1w operation.
MSTP-Operation: 802.1s operation.
Click Apply to save the values and update the screen.
The following figure displays the STP Information settings.
Figure 4.75 L2 Switching > Spanning Tree > STP Information
4.5.10.2
STP Port Settings
The STP Port Settings page allows you to configure the ports for the setting, port’s contribution, configure edge port, and set the status of the BPDU filter.
EKI-7720 Series User Manual 65
To access this page, click L2 Switching > Spanning Tree > STP Port Settings .
Figure 4.76 L2 Switching > Spanning Tree > STP Port Settings
The following table describes the items in the previous figure.
Item Description
Port Select
Edge Port
Select the port list to specify the ports that apply to this setting.
Admin Enable Select Enabled or Disabled to setup the admin profile for the STP port.
Path Cost (0 = Auto) Set the port’s cost contribution. For a root port, the root path cost for the bridge. (0 means Auto).
Click the drop-down menu to set the edge port configuration.
No: Force to false state (as link to a bridge).
Yes: Force to true state (as link to a host).
P2P MAC
Migrate
Apply
Click the drop-down menu to set the Point-to-Point port configuration.
No: Force to false state.
Yes: Force to true state.
Click the check box to enable the migrate function.
Forces the port to use the new MST/RST BPDUs, requiring the switch to test on the LAN segment. for the presence of legacy devices, which are not able to understand the new BPDU formats.
Click Apply to save the values and update the screen.
The ensuing table for STP Port Status settings are informational only: Port, Admin
Enable, Path Cost, Edge Port and P2P MAC.
4.5.10.3
STP Bridge Settings
The STP Bridge Settings page allows you to configure the priority, forward delay, maximum age, Tx hold count, and the hello time for the bridge.
66 EKI-7720 Series User Manual
To access this page, click L2 Switching > Spanning Tree > STP Bridge Settings .
Figure 4.77 L2 Switching > Spanning Tree > STP Bridge Settings
The following table describes the items in the previous figure.
Item
Priority
Forward Delay
Max Age
Tx Hold Count
Hello Time
Apply
Description
Click the drop-down menu to select the STP bridge priority.
Enter the variable (4 to 30) to set the forward delay for STP bridge set tings.
Enter the variable (6 to 40) to set the Max age for STP bridge settings.
Enter the variable (1 to 10) to designate the TX hold count for STP bridge settings.
Enter the variable (1 to 10) to designate the Hello Time for STP bridge settings.
Click Apply to save the values and update the screen.
The ensuing table for STP Bridge Information settings are informational only: Prior ity, Forward Delay, Max Age, Tx Hold Count and Hello Time.
The ensuing table for STP Bridge Status settings are informational only: Bridge
Identifier, Designated Root Bridge, Root Path Cost, Designated Bridge, Root Port and Last Topology Change.
4.5.10.4
STP Port Advanced Settings
The STP Port Advanced Settings page allows you to select the port list to apply this setting.
To access this page, click L2 Switching > Spanning Tree > STP Port Advanced
Settings .
Figure 4.78 L2 Switching > Spanning Tree > STP Port Advanced Settings
The following table describes the items in the previous figure.
Item
Port Select
Description
Select the port to designate the STP settings.
EKI-7720 Series User Manual 67
Item
Priority
Apply
Description
Click the drop-down menu to designate a priority.
Click Apply to save the values and update the screen.
The following figure displays the STP Port Status settings.
Figure 4.79 L2 Switching > Spanning Tree > STP Port Status
4.5.10.5
MST Config Identification
The MST Config Identification page allows you to configure the identification setting name and the identification range.
To access this page, click L2 Switching > Spanning Tree > MST Config Identifica tion .
Figure 4.80 L2 Switching > Spanning Tree > MST Config Identification
The following table describes the items in the previous figure.
Item Description
Configuration Name Enter the identifier used to identify the configuration currently being used. It may be up to 32 characters.
Revision Level
Apply
Enter the identifier for the Revision Configuration, range: 0 to 65535
(default: 0).
Click Apply to save the values and update the screen.
The ensuing table for MST Configuration Identification Information settings are informational only: Configuration Name and Revision Level.
4.5.10.6
MST ID Settings
The MST Instance ID Settings page allows you to edit the MSTI ID and VID List set tings.
68 EKI-7720 Series User Manual
To access this page, click L2 Switching > Spanning Tree > MST ID Settings .
Figure 4.81 L2 Switching > Spanning Tree > MST ID Settings
The following table describes the items in the previous figure.
Item
MSTI ID
VID List
Move
Description
Enter the MST instance ID (0-15).
Enter the pre-configured VID list.
Click Move to save the values and update the screen.
The ensuing table for MST ID Information settings are informational only: MSTI ID and VID List.
4.5.10.7
MSTI Priority Settings
The MST Instance Priority Settings allows you to specify the MST instance and the bridge priority in that instance.
To access this page, click L2 Switching > Spanning Tree > MSTI Priority Settings .
Figure 4.82 L2 Switching > Spanning Tree > MSTI Priority Settings
The following table describes the items in the previous figure.
Item
MSTI ID
Priority
Apply
Description
Click the drop-down menu to specify the MST instance.
Click the drop-down menu set the bridge priority in the specified MST instance
Click Apply to save the values and update the screen.
The ensuing table for MSTI Priority Information settings are informational only:
MSTI ID, Priority and Action.
4.5.10.8
MSTI Bridge Info
To access this page, click L2 Switching > Spanning Tree > MSTI Bridge Info .
EKI-7720 Series User Manual 69
The following figure displays the STP Bridge Status settings.
Figure 4.83 L2 Switching > Spanning Tree > STP Bridge Status
4.5.10.9
MSTI Port Advanced settings
To access this page, click L2 Switching > Spanning Tree > MSTI Port Advanced .
The following figure displays the MSTI Port Advanced settings.
Figure 4.84 L2 Switching > Spanning Tree > MSTI Port Advanced settings
4.5.10.10
STP Statistics
To access this page, click L2 Switching > Spanning Tree > STP Statistics .
The following figure displays the STP Statistics settings.
Figure 4.85 L2 Switching > Spanning Tree > STP Statistics
4.5.11
X-Ring Elite
The X-Ring Elite function provides an improvement over Spanning Tree and Rapid
Spanning Tree and a rapid auto recovery in the event that the network suffers a cor rupt or broken link and prevents network loops.
4.5.11.1
X-Ring Elite Settings
The X-Ring Elite Settings allows you to enable or disable the state of the X-Ring set tings.
70 EKI-7720 Series User Manual
To access this page, click L2 Switching > X-Ring Elite > X-Ring Elite Settings .
Figure 4.86 L2 Switching > X-Ring Elite > X-Ring Elite Settings
The following table describes the items in the previous figure.
Item
State
Apply
Description
Select Enabled or Disabled to setup the X-Ring Elite mode.
Click Apply to save the values and update the screen.
The ensuing table for Information settings are informational only: X-Ring Elite State.
4.5.11.2
X-Ring Elite Groups
The X-Ring Elite Groups page allows you to select the function and role for each device and the connected ports.
To access this page, click L2 Switching > X-Ring Elite > X-Ring Elite Groups .
Figure 4.87 L2 Switching > X-Ring Elite > X-Ring Elite Groups
The following table describes the items in the previous figure.
Item
Ring ID
Role
Port 1
Port 2
Add
Description
Enter a number to specifies a ranging from 1 to 255 to identify a given
X-Ring Elite group.
Click the drop-down menu to select the ring role.
Click the drop-down menu to define the port designation.
Click the drop-down menu to define the port designation.
Click Add to save the values and update the screen.
The ensuing table for Information settings are informational only: Ring ID, Role, Port
1, Port 2 and Delete (click to delete the desired Ring ID).
4.5.12
X-Ring Pro
The X-Ring Pro function provides an improvement over Spanning Tree and Rapid
Spanning Tree and a rapid auto recovery in the event that the network suffers a cor rupt or broken link and prevents network loops.
4.5.12.1
X-Ring Pro Settings
The X-Ring Pro Settings page allows you to configure the status (enabled or dis abled) of the function.
EKI-7720 Series User Manual 71
To access this page, click L2 Switching > X-Ring Pro > X-Ring Pro Settings .
Figure 4.88 L2 Switching > X-Ring Pro > X-Ring Pro Settings
The following table describes the items in the previous figure.
Item
State
Apply
Description
Select Enabled or Disabled to setup the X-Ring Pro mode.
Click Apply to save the values and update the screen.
The ensuing table for Information settings are informational only: X-Ring Pro State.
4.5.12.2
X-Ring Pro Groups
The X-Ring Pro Groups page allows you to select the function and role for each ring
ID and its connected ports.
To access this page, click L2 Switching > X-Ring Pro > X-Ring Pro Groups .
Figure 4.89 L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro
Groups Settings
The following table describes the items in the previous figure.
Item
Ring ID
Port 1
Port 2
Add
Description
Enter a number to specifies a ranging from 1 to 255 to identify a given
X-Ring Pro group.
Click the drop-down menu to define the port designation.
Click the drop-down menu to define the port designation.
Click Add to save the values and update the screen.
Figure 4.90 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Chain Settings
The following table describes the items in the previous figure.
Item
Chain Ring ID
Role
Head Port
Description
Enter a number to specifies a ranging from 1 to 255 to identify a chain ring ID.
Click the drop-down menu to select the ring role.
Click the drop-down menu to define the port designation.
72 EKI-7720 Series User Manual
Item
Member Port
Add
Description
Click the drop-down menu to define the port designation.
Click Add to save the values and update the screen.
Figure 4.91 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Couple Setting
The following table describes the items in the previous figure.
Item
Couple Ring ID
Port
Master Ring ID
Add
Description
Enter a number to specifies a ranging from 1 to 255 to identify a given
X-Ring group.
Enter the port to assign to define the couple setting.
Click the drop-down menu to designate the master ring.
Click Add to save the values and update the screen.
Figure 4.92 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Pair Settings
The following table describes the items in the previous figure.
Item
Pair Ring ID
Port
Master Ring ID
Add
Description
Enter a number to specifies a ranging from 1 to 255 to identify a pair ring ID.
Enter the port to assign to define the couple setting.
Click the drop-down menu to designate the master ring.
Click Add to save the values and update the screen.
Figure 4.93 L2 Switching > X-Ring Pro > X-Ring Pro Groups > RPair Settings
The following table describes the items in the previous figure.
Item
RPair Ring ID
Port
Description
Enter a number to specifies a ranging from 1 to 255 to identify a Rpair ring ID.
Enter the port to assign to define the couple setting.
EKI-7720 Series User Manual 73
Item
Master Ring ID
Add
Description
Click the drop-down menu to designate the master ring.
Click Add to save the values and update the screen.
The ensuing table for Information settings are informational only: Ring ID, Mode,
Role, Operation State, Port 1, Forwarding State, Port 2, Forwarding State and Delete
(click to delete the desired Ring ID).
4.5.13
Loopback Detection
The Loopback Detection function is used to detect looped links. By sending detection frames and then checking to see if the frames returned to any port on the device, the function is used to detect loops.
4.5.13.1
Global Settings
The Global Settings page allows you to configure the state (enabled or disabled) of the function, select the interval at which frames are transmitted and the delay before recovery.
To access this page, click L2 Switching > Loopback Detection > Global Settings .
Figure 4.94 L2 Switching > Loopback Detection > Global Settings
The following table describes the items in the previous figure.
Item
State
Interval
Recover Time
Apply
Description
Select Enabled or Disabled to setup the loopback mode.
Enter the variable in seconds (1 to 32767) to set the interval at which frames are transmitted.
Enter the variable in seconds (60 to 1000000) to define the delay before recovery.
Click Apply to save the values and update the screen.
To access this page, click L2 Switching > Loopback Detection > Loopback Detec tion Global Information .
The following figure displays the Loopback Detection Global Information settings.
Figure 4.95 L2 Switching > Loopback Detection > Loopback Detection Global
Information
4.5.13.2
Port Settings
The Port Settings page allows you to select ports that are detected by the loopback detection function and configure their status (enabled or disabled).
74 EKI-7720 Series User Manual
To access this page, click L2 Switching > Loopback Detection > Port Settings .
Figure 4.96 L2 Switching > Loopback Detection > Port Settings
The following table describes the items in the previous figure.
Item
Port Select
Enabled
Apply
Description
Enter the port to define the local loopback detection setting.
Select Enabled or Disabled to setup the Loopback Detection func tion.
Click Apply to save the values and update the screen.
The ensuing table for Loopback Detection Port Information settings are informa tional only: Port, Enable State and Loop Status.
4.5.14
ERPS
4.5.14.1
ERPS Settings
To access this page, click L2 Switching > ERPS > ERPS Settings .
Figure 4.97 L2 Switching > ERPS > ERPS Settings
The following table describes the items in the previous figure.
Item
State
Apply
Description
Click Enabled or Disabled to enable ERPS settings.
Click Apply to save the values and update the screen.
The ensuing table for Information settings are informational only: ERPS State.
EKI-7720 Series User Manual 75
4.5.14.2
ERPS Groups
To access this page, click L2 Switching > ERPS > ERPS Groups .
Figure 4.98 L2 Switching > ERPS > ERPS Groups
The following table describes the items in the previous figure.
Item
ERP Instance
Ring ID
Role
East Link
RPL
West Link
RPL
MEL
R-APS Channel
VLAN
Traffic Channel
Instance
Type
WTR Timer
Guard Timer
Hold-off Timer
Apply
Description
Enter the value to set the ERP instance.
Enter the value to set the ring ID.
Click the drop down menu to select the role. Options include: RPL
Owner, RPL Neighbor or Other.
Enter the port to define the east link.
Check the check box to enable RPL.
Enter the port to define the west link.
Check the check box to enable RPL.
Enter the value to set minimum equipment list.
Click the drop down menu to select the VLAN.
Click the drop down menu to select the traffic channel instance.
Click the drop down menu to select the ERP group type.
Enter the value to set WTR timer.
Enter the value to set guard timer.
Enter the value to set hold-off timer.
Click Apply to save the values and update the screen.
The ensuing table for Information settings are informational only: ERP Instance,
Ring ID, Role, State, East Link, West Link, MEL, R-APS Channel VLAN, Traffic Chan nel Instance, Type, WTR Timer, Guard Timer, Hold-off Timer and Delete (Click
Delete to delete the desired Ring ID).
76 EKI-7720 Series User Manual
4.6
MAC Address Table
The MAC Address Table provides access to the Static MAC Settings, MAC Aging
Time, and Dynamic Forwarding.
4.6.1
Static MAC
The Static MAC page allows you to configure the address for forwarding of packets, the VLAN ID of the listed MAC address and the designated Port.
To access this page, click MAC Address Table > Static MAC .
Figure 4.99 MAC Address Table > Static MAC
The following table describes the items in the previous figure.
Item
MAC Address
VLAN
Port
Apply
Description
Enter the MAC address to which packets are statically forwarded.
Click the drop-down menu to select the VLAN ID number of the VLAN for which the MAC address is residing.
Click the drop-down menu to select the port number.
Click Apply to save the values and update the screen.
To access this page, click MAC Address Table > Static MAC Status .
The following figure displays the Static MAC Status settings.
Figure 4.100 MAC Address Table > Static MAC Status
4.6.2
MAC Aging Time
The MAC Aging Time page allows you to set the MAC address of the aging time to study.
To access this page, click MAC Address Table > MAC Aging Time .
Figure 4.101 MAC Address Table > MAC Aging Time
EKI-7720 Series User Manual 77
The following table describes the items in the previous figure.
Item
Aging Time
Apply
Description
Enter the variable (10 to 630) to define the time required for aging.
Click Apply to save the values and update the screen.
The ensuing table for Dynamic Address Status settings are informational only:
Aging time.
4.6.3
Dynamic Forwarding Table
The Dynamic Forwarding function allows you to configure an address tables, which contain the following:
The port each hardware address is associated with
The VLAN to show or clear dynamic MAC entries
The MAC address selection
To access this page, click MAC Address Table > Dynamic Forwarding Table .
Figure 4.102 MAC Address Table > Dynamic Forwarding Table
The following table describes the items in the previous figure.
Item
Port
VLAN
MAC Address
View
Clear
Description
Click the drop-down menu to select the port number to show or clear dynamic MAC entries. If a port, VLAN or MAC address is not selected the whole dynamic MAC table is displayed or cleared.
Click the drop-down menu to select the VLAN to show or clear dynamic MAC entries.
Enter the MAC address to show or clear dynamic MAC entries. If a port, VLAN or MAC address is not selected the whole dynamic MAC table is displayed or cleared.
Click View to display the MAC address information.
Click Clear to clear the MAC Address Information table.
To access this page, click MAC Address Table > MAC Address Information .
The following figure displays the MAC Address Information settings.
Figure 4.103 MAC Address Table > MAC Address Information
78 EKI-7720 Series User Manual
4.7
Security
The Security function allows for the configuration of Storm Control, Port Security, Pro tected Ports, DoS Prevention, Applications, 802.1x, and IP Security.
4.7.1
Storm Control
The Storm Control page allows you to setup the units and Preamble/IFG to manage the occurrence of packet flooding on the LAN and consequent traffic to prevent the degrading of network performance.
4.7.1.1
Global Settings
To access this page, click Security > Storm Control > Global Settings .
Figure 4.104 Security > Storm Control > Global Settings
The following table describes the items in the previous figure.
Item
Unit
Preamble & IFG
Shutdown Recover
Time
Apply
Description
Select pps or bps control units for the Storm Control function.
Select Excluded or Included to setup the Storm Control Global set tings.
Excluded: exclude preamble & IFG (20 bytes) when count ingress storm control rate.
Included: include preamble & IFG (20 bytes) when count ingress storm control rate.
Enter the shutdown recover time in seconds with range 0 or 30 ~
10000000.
Click Apply to save the values and update the screen.
To access this page, click Security > Storm Control > Storm Control Global Infor mation .
The following figure displays the Storm Control Global Information settings.
Figure 4.105 Security > Storm Control > Storm Control Global Information
4.7.1.2
Port Settings
The Port Settings page allows you to configure the port and the type of storm control association along with the value of the storm rate for the selected port.
EKI-7720 Series User Manual 79
To access this page, click Security > Storm Control > Port Settings .
Figure 4.106 Security > Storm Control > Port Settings
The following table describes the items in the previous figure.
Item
Port
Port State
Action
Type Enable
Apply
Description
Enter the port number to designate the local port for the Storm Control function.
Select Disabled or Enabled to define the port state
Click the drop-down menu to select the type of action to designate for the selected port during a Storm Control incident. The options are
Drop and Shutdown.
Click the radio button to enable Broadcast, Unknown Multicast, or
Unknown Unicast.
Broadcast: Select the variable in Kbps to define the broadcast bandwidth.
Unknown Multicast: Select the variable in Kbps to define the unknown multicast setting.
Unknown Unicast: Select the variable in Kbps to define the unknown unicast setting.
Click Apply to save the values and update the screen.
The ensuing table for Storm Control Port Information settings are informational only:
Port, Port State, Broadcast (Kbps), Unknown Multicast (Kbps), Unknown
Unicast (Kbps) and Action.
The following figure displays the Storm Control Port Information settings.
Figure 4.107 Security > Storm Control > Storm Control Port Information
4.7.2
Port Security
The Port Security page allows you to configure port isolation behavior.
80 EKI-7720 Series User Manual
To access this page, click Security > Port Security .
Figure 4.108 Security > Port Security
The following table describes the items in the previous figure.
Item
Port Select
Enabled
FDB Learn Limit
(0-64)
Violation MAC Notifi cation
Apply
Description
Enter a single or multiple port numbers to configure.
Select Enabled or Disabled to define the selected Port.
Enter the variable (0 to 64) to set the learn limit for the FDB setting.
Select Enabled or Disabled to define the selected Port.
Click Apply to save the values and update the screen.
The ensuing table for Port Security Information settings are informational only:
Port, Enabled, FDB Learn Limit and Violation MAC Notification.
4.7.3
Protected Ports
The Protected Port page allows you to configure a single or multiple ports as a pro tected or unprotected type.
To access this page, click Security > Protected Ports .
Figure 4.109 Security > Protected Ports
The following table describes the items in the previous figure.
Item
Port List
Port Type
Apply
Description
Enter the port number to designate for the Protected Port setting.
Select Unprotected or Protected to define the port type.
Click Apply to save the values and update the screen.
The ensuing table for Protected Ports Status settings are informational only: Pro tected Ports and Unprotected Ports.
4.7.4
DoS Prevention
The DoS Prevention page allows you to setup (enabled or disabled) the denial of ser vice.
EKI-7720 Series User Manual 81
4.7.4.1
DoS Global Settings
The DoS Global Settings page allows you to configure (enabled or disabled) the set ting for each function.
To access this page, click Security > DoS Prevention > DoS Global Settings .
Figure 4.110 Security > DoS Prevention > DoS Global Settings
The following table describes the items in the previous figure.
Item
DMAC = SMAC
LAND
UDP Blat
TCP Blat
POD
Description
Click Enabled or Disabled to define DMAC-SMAC for the DoS Global settings.
Click Enabled or Disabled to define LAND for the DoS Global set tings.
Click Enabled or Disabled to define UDP Blat for the DoS Global set tings.
Click Enabled or Disabled to define TCP Blat for the DoS Global set tings.
Click Enabled or Disabled to define POD for the DoS Global settings.
82 EKI-7720 Series User Manual
Item Description
IPv6 Min Fragment Click Enabled or Disabled to define minimum fragment size for the
IPv6 protocol.
Enter the variable in bytes (0 to 65535) to set the minimum fragment size when the function is enabled.
ICMP Fragments Click Enabled or Disabled to define the ICMP Fragments function.
IPv4 Ping Max Size Click Enabled or Disabled to set the maximum ping size for the IPv4 protocol.
IPv6 Ping Max Size Click Enabled or Disabled to set a maximum ping size for the IPv6 protocol.
Ping Max Size Set ting
Enter the variable in bytes (0 to 65535) to set the maximum ping size.
Smurf Attack Click Enabled or Disabled to set the Smurf Attack function.
TCP Min Hdr Size Click Enabled or Disabled to set the minimum header size.
Enter the variable in bytes (0 to 31) to set the minimum header size.
TCP-SYN (SPORT <
1024)
Null Scan Attack
Click Enabled or Disabled to set the TCP synchronization function
(sport < 1021).
Click Enabled or Disabled to set the Null Scan Attack function.
X-Mas Scan Attack Click Enabled or Disabled to set the X-Mas Scan function.
TCP SYN-FIN Attack Click Enabled or Disabled to set the TCP synchronization termina tion attack function.
TCP SYN-RST
Attack
TCP Fragment (Off set = 1)
Apply
Click Enabled or Disabled to set the TCP synchronization reset attack function.
Click Enabled or Disabled to set the TCP fragment function (offset
=1).
Click Apply to save the values and update the screen.
To access this page, click Security > DoS Prevention > DoS Global Information .
The following figure displays the DoS Global Information settings.
Figure 4.111 Security > Storm Control > DoS Global Information
4.7.4.2
DoS Port Settings
The DoS Port Settings page allow you to configure DoS security (enabled or dis abled) for the selected port.
EKI-7720 Series User Manual 83
To access this page, click Security > DoS Prevention > DoS Port Settings .
Figure 4.112 Security > DoS Prevention > DoS Port Settings
The following table describes the items in the previous figure.
Item
Port
DoS Protection
Apply
Description
Select the port to configure for the DoS prevention function.
Click Enabled or Disabled to set the DoS Port security function state.
Click Apply to save the values and update the screen.
The ensuing table for DoS Port Status settings are informational only: Port and DoS
Protection.
4.7.5
Applications
The Applications function allows you to configure various types of AAA lists.
4.7.5.1
TELNET
The TELNET page allows you to combine all kinds of AAA lists with the Telnet line.
To access this page, click Security > Applications > TELNET .
Figure 4.113 Security > Applications > TELNET
The following table describes the items in the previous figure.
Item
Telnet Service
Apply
Disconnect
Description
Click Enabled or Disabled to set remote access through the Telnet
Service function.
Click Apply to save the values and update the screen.
Click Disconnect to disable the current Telnet service.
The ensuing table for Telnet Information settings are informational only: Telnet Ser vice and Current Telnet Sessions Count.
4.7.5.2
SSH
Secure Shell (SSH) is a protocol providing secure (encrypted) management connec tion to a remote device.
84 EKI-7720 Series User Manual
To access this page, click Security > Applications > SSH .
Figure 4.114 Security > Applications > SSH
The following table describes the items in the previous figure.
Item
SSH Service
Apply
Description
Click Enabled or Disabled to set up Ethernet encapsulation (remote access) through the Secure Shell (SSH) function.
Click Apply to save the values and update the screen.
The ensuing table for SSH Information settings are informational only: SSH.
4.7.5.3
HTTP
The HTTP page allows you to combine all kinds of AAA lists to the HTTP line.
Attempts to access the switch’s Web UI from HTTP are first authenticated.
To access this page, click Security > Applications > HTTP .
Figure 4.115 Security > Applications > HTTP
The following table describes the items in the previous figure.
Item
HTTP Service
Session Timeout
Apply
Description
Click Enabled or Disabled to set up Ethernet encapsulation (remote access) through HTTP function.
Enter the variable in minutes (0 to 86400) to define the timeout period for the HTTP session.
Click Apply to save the values and update the screen.
The ensuing table for HTTP Information settings are informational only: HTTP Ser vice and Session Timeout.
4.7.5.4
HTTPS
The HTTPS page allows you to combine all kinds of AAA lists on the HTTPS line.
Attempts to access the switch’s Web UI from HTTPS are first authenticated.
EKI-7720 Series User Manual 85
To access this page, click Security > Applications > HTTPS .
Figure 4.116 Security > Applications > HTTPS
The following table describes the items in the previous figure.
Item
HTTPS Service
Session Timeout
Apply
Description
Click Enabled or Disabled to set up Ethernet encapsulation over
HTTPS.
Enter the variable in minutes (0 to 86400) to define the timeout period for the HTTP session.
Click Apply to save the values and update the screen.
The ensuing table for HTTPS Information settings are informational only: HTTPS
Service and Session Timeout.
4.7.6
802.1x
The 802.1x function provides port-based authentication to prevent unauthorized devices (clients) from gaining access to the network.
4.7.6.1
802.1x Global Settings
The 802.1x Global Settings page allows you to set the state (enabled or disabled) for the selected IP server address, port, accounting port and associated password, including a reauthentication period.
To access this page, click Security > 802.1x
> 802.1x Global Settings .
Figure 4.117 Security > 802.1x > 802.1x Global Settings
The following table describes the items in the previous figure.
Item
State
Server IP
Description
Click Enabled or Disabled to set up 802.1x Setting function.
Enter the IP address of the local server providing authentication func tion.
86 EKI-7720 Series User Manual
Item
Server Port
Accounting Port
Security Key
Reauth Period
Apply
Description
Enter the port number (1 to 65535) assigned to the listed Server IP.
Enter the port number (1 to 65535) assigned to the listed server IP configured to provide authorization and authentication for network access.
Enter the variable to define the network security key used in authenti cation.
Enter the variable in seconds to define the period of time between authentication attempts.
Click Apply to save the values and update the screen.
To access this page, click Security > 802.1x > 802.1x Information .
The following figure displays the 802.1x Information settings.
Figure 4.118 Security > 802.1x > 802.1x Information
4.7.6.2
802.1x Port Configuration
The 802.1x Port Configuration page allows you to identify the authorization state for a port by using a MAC or Port authentication base.
To access this page, click Security > 802.1x
> 802.1x Port Configuration .
Figure 4.119 Security > 802.1x > 802.1x Port Configuration
The following table describes the items in the previous figure.
Item Description
Authentication based Click Port , Mac or Mac-Auth-Bypass to designate the type of config uration for the 802.1x Port setting.
Port Select
State
Apply
Enter the port number associated with the configuration setting.
Click Authorize or Disabled to define the listed port’s state mode.
Click Apply to save the values and update the screen.
The ensuing table for 802.1x Port Authorization settings are informational only: Port and Port State.
4.7.7
IP Security
This section provides you a means to configure the IP Security settings.
EKI-7720 Series User Manual 87
4.7.7.1
Global Settings
The Global Settings page allows you to set the IP Security status (enabled or dis abled).
To access this page, click Security > IP Security > Global Settings .
Figure 4.120 Security > IP Security > Global Settings
The following table describes the items in the previous figure.
Item
Status
Apply
Description
Click Enabled or Disabled to define the global setting for the IP secu rity function.
Click Apply to save the values and update the screen.
The ensuing table for IP Security Status settings are informational only: IP Security.
4.7.7.2
Entry Settings
Once the Global Setting is enabled, use the Entry Settings to define an IP Security entry.
To access this page, click Security > IP Security > Entry Settings .
Figure 4.121 Security > IP Security > Entry Settings
The following table describes the items in the previous figure.
Item
IP Address
IP Mask
Services
Apply
Description
Enter the source IP address to apply the IP Security function.
Enter the IP address for use in masking the previous IP Address.
Enter the type of services to associate with the entry setting.
Click Apply to save the values and update the screen.
The ensuing table for IP Security Entry Information settings are informational only:
IP Address, IP Mask, Services and Action.
88 EKI-7720 Series User Manual
4.7.8
Security Login
4.7.8.1
Global Settings
This function provides a means to enable or disable the global security settings for the system.
To access this page, click Security > Security Login > Global Settings .
Figure 4.122 Security > Security Login > Global Settings > Global Settings
The following table describes the items in the previous figure.
Item
State
Apply
Description
Click Enabled or Disabled to set up security login global setting sta tus.
Click Apply to save the values and update the screen.
Figure 4.123 Security > Security Login > Global Settings > RADIUS Settings
The following table describes the items in the previous figure.
Item
Server IP
Server Port
Security Key
Auth Type
Apply
Description
Enter the IP address of the local server providing authentication func tion.
Enter the port number (1 to 65535) assigned to the listed Server IP.
Enter the variable to define the network security key used in authenti cation.
Click the drop down menu to select the Authentication type with option
MD5, TTLS or PEAP. Each authentication type is mapping to specified authentication protocol as below:
MD5: Using authentication protocol with None.
TTLS: Using authentication protocol with TTLS.
PEAP: Using authentication protocol with PEAP.
Click Apply to save the values and update the screen.
EKI-7720 Series User Manual 89
Figure 4.124 Security > Security Login > Global Settings > TACACS Settings
The following table describes the items in the previous figure.
Item
Server IP
Server Port
Security Key
Apply
Description
Enter the IP address of the local server providing authentication func tion.
Enter the port number (1 to 65535) assigned to the listed Server IP.
Enter the variable to define the network security key used in authenti cation.
Click Apply to save the values and update the screen.
To access this page, click Security > Security Login > Global Settings > Global
Information .
The following figure displays the Global Information settings.
Figure 4.125 Security > Security Login > Global Settings > Global Information
4.7.8.2
Access Control Settings
This function specifies the login authentication type for the system.
To access this page, click Security > Security Login > Security Login Access
Control Settings .
Figure 4.126 Security > Security Login > Access Control Settings > Security
Login Type Settings
90 EKI-7720 Series User Manual
The following table describes the items in the previous figure.
Item
Login Type
Apply
Description
Click to select the login type. Options include: None Used, RADIUS
Only, TACACS Only, RADIUS & TACACS or RADIUS & TACACS &
WEB.
Click Apply to save the values and update the screen.
Figure 4.127 Security > Security Login > Access Control Settings > Security
Login Type Settings
The following table describes the items in the previous figure.
Item
HTTP
TELNET
SSH
Apply
Description
Click Enabled or Disabled to set up HTTP.
Click Enabled or Disabled to set up HTTPS.
Click Enabled or Disabled to set up SSH.
Click Apply to save the values and update the screen.
To access this page, click Security > Security Login > Access Control Settings >
Global Information .
The following figure displays the Access Control Information settings.
Figure 4.128 Security > Security Login > Access Control Settings > Access
Control Information
4.7.9
Access Control List
The Access Control List is the basic traffic filter for ingress and egress packets. Allow user to filter criteria for diverse protocols and deny access to specific source or desti nation IP/MAC addresses.
4.7.9.1
MAC ACL
Entry Settings
EKI-7720 Series User Manual 91
To access this page, click Security > Access Control List > MAC ACL > Entry Set tings .
Figure 4.129 Security > Access Control List > MAC ACL > Entry Settings
The following table describes the items in the previous figure.
Item Description
Entry ID
Destination MAC
Address
Destination MAC
Mask
Source MAC
Address
Type in the value designating the entry ID.
Enter the MAC address to set destination MAC address.
Enter a value to specify the subnet mask for the destination MAC address.
Enter the MAC address to set source MAC address.
Source MAC Mask Enter a value to specify the subnet mask for the source MAC address.
Ether Type Enter a value to specify the DNS server for the interface.
VLAN ID
Portlist
Action
Type in the value designating the VLAN ID.
Select the port to configure for the MAC ACL function.
Assign Queue
Status
Add
Click the drop down menu to select the MAC ACL action. Options include: Permit, Drop, Assign Queue, Redirect Port or Redirect Port list.
Click the drop down menu to select the queue. The function is only available when Action is Assign Queue .
Click the drop down menu to select the MAC ACL status. Options include: Active or Inactive.
Click Add to add a MAC ACL entry.
92 EKI-7720 Series User Manual
Entry List
To access this page, click Security > Access Control List > MAC ACL > Entry List .
The following figure displays the Entry List settings.
Figure 4.130 Security > Access Control List > MAC ACL > Entry List
4.7.9.2
IP ACL
Entry Settings
To access this page, click Security > Access Control List > IP ACL > Entry Set tings .
Figure 4.131 Security > Access Control List > IP ACL > Entry Settings
The following table describes the items in the previous figure.
Item Description
Entry ID Type in the value designating the entry ID.
Destination IP
Address
Enter the IP address to set destination IP address.
Destination IP Mask Enter a value to specify the subnet mask for the destination IP address.
Source IP Address Enter the IP address to set source IP address.
Source IP Mask Enter a value to specify the subnet mask for the source IP address.
IP Protocol Click the drop down menu to select the IP protocol. Options include: none, ICMP, TCP or UDP.
L4 Destination Port Enter a value to specify the L4 destination port.
L4 Source Port Enter a value to specify the L4 source port.
EKI-7720 Series User Manual 93
Item
Portlist
Action
Assign Queue
Status
Add
Description
Select the port to configure for the IP ACL function.
Click the drop down menu to select the IP ACL action. Options include: Permit, Drop or Assign Queue.
Click the drop down menu to select the queue. The function is only available when Action is Assign Queue .
Click the drop down menu to select the IP ACL status. Options include: Active or Inactive.
Click Add to add an IP ACL entry.
Entry List
To access the Entry List, click Security > Access Control List > IP ACL > Entry
List .
The ensuing figure for IP ACL Information settings are informational only: Entry ID,
Summary, Portlist, Action, Status and Modify (Click Edit to edit the desire entry id or
Delete to remove the desired entry id).
Figure 4.132 Security > Access Control List > IP ACL > Entry List
4.7.10
IP Source Guard
4.7.10.1
Global Settings
To access this page, click Security > IP Source Guard > Global Settings .
Figure 4.133 Security > IP Source Guard > Global Settings
The following table describes the items in the previous figure.
Item
Portlist
Modify
Description
Select the port to verify.
Click Modify to save the values and update the screen.
94 EKI-7720 Series User Manual
The following figure displays the Global Information settings.
Figure 4.134 Security > IP Source Guard > Global Information
4.7.10.2
Entry Settings
To access this page, click Security > IP Source Guard > Entry Settings .
Figure 4.135 Security > IP Source Guard > Entry Settings
The following table describes the items in the previous figure.
Item Description
Source MAC
Address
Enter the MAC address to set source MAC address.
Source IP Address Enter the IP address to set source IP address.
Port Select the port to configure for the IP source guard.
Add Click Add to add an IP source guard.
To access this page, click Security > IP Source Guard > Entry Information .
The following figure displays the Entry Information settings.
Figure 4.136 Security > IP Source Guard > Entry Information
EKI-7720 Series User Manual 95
4.7.11
DHCP Snooping
4.7.11.1
Global Settings
To access this page, click Security > DHCP Snooping > Global Settings .
Figure 4.137 Security > DHCP Snooping > Global Settings > DHCP Snooping
State Settings
The following table describes the items in the previous figure.
Item
DHCP Snooping
State
Apply
Description
Click Enabled or Disabled to set DHCP snooping state.
Click Apply to save the values and update the screen.
Figure 4.138 Security > DHCP Snooping > Global Settings > DHCP Snooping
Port Settings
The following table describes the items in the previous figure.
Item
DHCP Snooping Port
Select
Enabled
Apply
Description
Select the port to configure for the DHCP Snooping port.
Click Enabled or Disabled to enable DHCP Snooping port.
Click Apply to save the values and update the screen.
Figure 4.139 Security > DHCP Snooping > Global Settings > DHCP Snooping
Binding Port Settings
The following table describes the items in the previous figure.
Item
DHCP Snooping
Binding Port Select
Enabled
Apply
Description
Select the port to configure for the DHCP snooping binding port.
Click Enabled or Disabled to enable DHCP Snooping binding.
Click Apply to save the values and update the screen.
96 EKI-7720 Series User Manual
To access this page, click Security > DHCP Snooping > Global Settings > DHCP
Snooping Information .
The following figure displays the DHCP Snooping Information settings.
Figure 4.140 Security > DHCP Snooping > Global Settings > DHCP Snooping
Information
4.7.11.2
Entry Settings
To access this page, click Security > DHCP Snooping > Entry Settings .
The following figure displays the IP Security Entry Information settings.
Figure 4.141 Security > DHCP Snooping > Entry Settings > Entry Information
4.7.11.3
L2-Relay State Settings
To access this page, click Security > DHCP Snooping > L2-Relay Settings .
The following figure displays the L2-Relay State settings.
Figure 4.142 Security > DHCP Snooping > L2-Relay Settings
The following table describes the items in the previous figure.
Item
L2-Relay State
Apply
Description
Click Enable or Disable to set the function state.
Click Apply to save the values and update the screen.
To access this page, click Security > DHCP Snooping > L2-Relay Port Settings .
The following figure displays the L2-Relay Port settings.
Figure 4.143 Security > DHCP Snooping > L2-Relay Port Settings
The following table describes the items in the previous figure.
Item Description
L2-Relay Port Select Enter the port number to add the corresponding port to the relay.
Enabled Click Enable or Disable to set the function state.
Apply Click Apply to save the values and update the screen.
To access this page, click Security > DHCP Snooping > L2-Relay VLAN Settings .
EKI-7720 Series User Manual 97
The following figure displays the L2-Relay VLAN settings.
Figure 4.144 Security > DHCP Snooping > L2-Relay VLAN Settings
The following table describes the items in the previous figure.
Item Description
L2-Relay VLAN List Enter the port number to add the corresponding port to the relay.
Enabled Click Enable or Disable to set the function state.
Apply Click Apply to save the values and update the screen.
To access this page, click Security > DHCP Snooping > Circuit ID Settings .
The following figure displays the Circuit ID Settings & Remote ID settings.
Figure 4.145 Security > DHCP Snooping > Circuit ID Settings
The following table describes the items in the previous figure.
Item
Circuit ID Type
Circuit-ID User-
Define String
Remote ID Type
Description
Enter the port number to add the corresponding port to the relay.
Click Enable or Disable to set the function state.
Remote-ID User-
Define String
Apply
Remote ID type: Select the remote ID type to be user-define or reserved.
User-define: Manually specify a remote ID type.
Reserved: Set up the remote ID type by reserved format.
Enter the string variable (max. 64 characters) to correspond to the user defined Remote-ID entry when User-define is selected.
Click Apply to save the values and update the screen.
To access this page, click Security > DHCP Snooping > L2 Relay Information . The following figure displays the L2 Relay Information settings.
Figure 4.146 Security > DHCP Snooping > L2 Relay Information
The following table describes the items in the previous figure.
98 EKI-7720 Series User Manual
4.7.12
ARP Spoofing
To access this page, click Security > ARP Spoofing .
Figure 4.147 Security > ARP Spoofing
The following table describes the items in the previous figure.
Item Description
Source MAC
Address
Enter the MAC address to set source MAC address.
Source IP Address Enter the IP address to set source IP address.
Add Click Add to add an ARP spoofing.
To access this page, click Security > Entry Information .
The following figure displays the Entry Information settings.
Figure 4.148 Security > Entry Information
The following table describes the items in the previous figure.
EKI-7720 Series User Manual 99
4.8
QoS
The QoS function allows you to configure settings for the switch QoS interface and how the switch connects to a remote server to get services.
4.8.1
General
Traditionally, networks operate on a best-effort delivery basis, all traffic has equal pri ority and an equal chance of being delivered in a timely manner. When there is con gestion, all traffic has an equal chance of being dropped.
The QoS feature can be configured for congestion-management and congestionavoidance to specifically manage the priority of the traffic delivery. Implementing QoS effective.
in the network makes performance predictable and bandwidth utilization much more
The QoS implementation is based on the prioritization values in Layer 2 frames.
4.8.1.1
QoS Properties
The QoS Properties allows you to set the QoS mode.
To access this page, click QoS > General > QoS Properties .
Figure 4.149 QoS > General > QoS Properties
The following table describes the items in the previous figure.
Item
QoS Mode
Apply
Description
Select Disabled or Basic to setup the QoS function.
Click Apply to save the values and update the screen.
The ensuing table for QoS Global Information settings are informational only: QoS
Mode.
4.8.1.2
QoS Settings
Once the QoS function is enabled, you can configure the available settings.
To access this page, click QoS > General > QoS Settings .
Figure 4.150 QoS > General > QoS Settings
100 EKI-7720 Series User Manual
The following table describes the items in the previous figure.
Item
Port
CoS Value
Remark CoS
Remark DSCP
Remark IP Prece dence
Apply
Description
Enter the port number to associate with the QoS setting.
Click the drop-down menu to designate the Class of Service (CoS) value (0 to 7) for the Port entry.
Click Disabled or Enabled to setup the Remark CoS function. When enabled the LAN (preassigned priority values) is marked at Layer 2 boundary to CoS values.
Click Disabled or Enabled to setup the DSCP remark option for the
QoS function.
Click Disabled or Enabled to setup the Remark IP Precedence for the QoS function.
Click Apply to save the values and update the screen.
To access this page, click QoS > General > QoS Status .
The following figure displays the QoS Status settings.
Figure 4.151 QoS > General > QoS Status
4.8.1.3
Queue Scheduling
The switch support eight CoS queues for each egress port. For each of the eight queues, two types of scheduling can be configured: Strict Priority and Weighted
Round Robin (WRR).
Strict Priority scheduling is based on the priority of queues. Packets in a high-priority queue are always sent first and packets in a low-priority queue are only sent after all the high priority queues are empty.
Weighted RoundRobin (WRR) scheduling is based on the user priority specification to indicate the importance (weight) of the queue relative to the other CoS queues.
WRR scheduling prevents low-priority queues from being completely ignored during periods of high priority traffic. The WRR scheduler sends some packets from each queue in turn.
EKI-7720 Series User Manual 101
To access this page, click QoS > General > QoS Scheduling .
Figure 4.152 QoS > General > QoS Scheduling
The following table describes the items in the previous figure.
Item Description
Queue
Strict
WRR
Queue entry for egress port.
Select Strict to assign the scheduling designation to the selected queue.
Select WRR to assign the scheduling designation to the selected queue.
Weight
Apply
Enter a queue priority (weight) relative to the defined entries (WRR only).
% of WRR Bandwidth Displays the allotted bandwidth for the queue entry in percentage val ues.
Click Apply to save the values and update the screen.
To access this page, click QoS > General > QoS Information .
The following figure displays the Queue Information settings.
Figure 4.153 QoS > General > QoS Information
4.8.1.4
CoS Mapping
The CoS Mapping allows you to apply CoS mapping.
102 EKI-7720 Series User Manual
To access this page, click QoS > General > CoS Mapping .
Figure 4.154 QoS > General > CoS Mapping
The following table describes the items in the previous figure.
Item Description
CoS to Queue Mapping
Class of Service
Queue
Displays the CoS for the queue entry.
Click the drop-down menu to select the queue priority for selected
CoS.
Queue to CoS Mapping
Queue Displays the queue entry for CoS mapping.
Class of Service
Apply
Click the drop-down menu to select the CoS type
Click Apply to save the values and update the screen.
To access this page, click QoS > General > CoS Mapping .
The following figure displays the CoS Mapping Information settings.
Figure 4.155 QoS > General > CoS Mapping
To access this page, click QoS > General > CoS Mapping .
EKI-7720 Series User Manual 103
The following figure displays the Queue Mapping Information settings.
Figure 4.156 QoS > General > CoS Mapping
4.8.1.5
DSCP Mapping
The DSCP to Queue mapping function maps queue values in incoming packets to a lowing table shows the DSCP to Queue map.
DSCP value that QoS uses internally to represent the priority of the traffic. The fol -
If these values are not appropriate for your network, you need to modify them.
To access this page, click QoS > General > DSCP Mapping .
Figure 4.157 QoS > General > DSCP Mapping
The following table describes the items in the previous figure.
Item Description
DSCP to Queue Mapping
DSCP
Queue
Enter the DSCP entry to define the precedence values.
Click the drop-down menu to select the queue designation for the
DSCP value.
Queue to DSCP Mapping
Queue Displays the queue value for the DSCP map.
DSCP
Apply
Enter the DSCP entry to define the precedence values.
Click Apply to save the values and update the screen.
The ensuing table for DSCP Mapping Information settings are informational only:
DSCP and Mapping to Queue.
The ensuing table for Queue Mapping Information settings are informational only:
Queue and Mapping to DSCP.
104 EKI-7720 Series User Manual
4.8.1.6
IP Precedence Mapping
The IP Precedence Mapping allows you to set IP Precedence mapping.
To access this page, click QoS > General > IP Precedence Mapping .
Figure 4.158 QoS > General > IP Precedence Mapping
The following table describes the items in the previous figure.
Item Description
IP Precedence to Queue Mapping
IP Precedence
Queue
Displays the IP precedence value for the queue map.
Click the drop-down menu to map a queue value to the selected IP precedence.
Queue to IP Precedence Mapping
Queue Displays the queue entry for mapping IP precedence values.
IP Precedence
Apply
Click the drop-down menu to map an IP precedence value to the selected queue.
Click Apply to save the values and update the screen.
The ensuing table for IP Precedence Mapping Information settings are informa tional only: IP Precedence and Mapping to Queue.
The ensuing table for Queue Mapping Information settings are informational only:
Queue and Mapping to IP Precedence.
4.8.2
QoS Basic Mode
Quality of Service (QoS) allows to give preferential treatment to certain types of traffic at the expense of others. Without QoS, the switch offers best-effort service to each assurance of reliability, delay bounds, or throughput.
packet, regardless of the packet contents or size sending the packets without any
QoS mode supports two modes: 802.1p and DSCP.
EKI-7720 Series User Manual 105
4.8.2.1
Global Settings
The Global Settings page allows you to configure the trust mode to a port selection.
To access this page, click QoS > QoS Basic Mode > Global Settings .
The function is only available when QoS Properties is set to Basic .
Figure 4.159 QoS > QoS Basic Mode > Global Settings
The following table describes the items in the previous figure.
Item
Trust Mode
Apply
Description
Click the drop-down menu to select the trust state of the QoS basic mode. Settings: None, CoS/802.1p, DSCP, CoS/802.1p-DSCP and IP
Precedence.
Click Apply to save the values and update the screen.
To access this page, click QoS > General > Global Settings .
The following figure displays the QoS Information settings.
Figure 4.160 QoS > General > Global Settings
4.8.2.2
Port Settings
The Port Settings page allows you to define a trust state (enabled or disabled) to a listed port.
To access this page, click QoS > QoS Basic Mode > Port Settings .
Figure 4.161 QoS > QoS Basic Mode > Port Settings
The following table describes the items in the previous figure.
Item
Port
Trust State
Apply
Description
Enter the port number for the QoS basic mode setting.
Select Enabled or Disabled to set the port’s trust state status.
Click Apply to save the values and update the screen.
The ensuing table for QoS Port Status settings are informational only: Port and Trust
State.
106 EKI-7720 Series User Manual
4.8.3
Rate Limit
Rate Limits features control on a per port basis. Bandwidth control is supported for the following: Ingress Bandwidth Control, Egress Bandwidth Control and Egress
Queue.
4.8.3.1
Ingress Bandwidth Control
The Ingress Bandwidth Control page allows you to configure the bandwidth control for a listed port.
To access this page, click QoS > Rate Limit > Ingress Bandwidth Control .
Figure 4.162 QoS > Rate Limit > Ingress Bandwidth Control
The following table describes the items in the previous figure.
Item
Port
State
Rate (Kbps)
Action
Apply
Description
Enter the port number for the rate limit setup.
Select Disabled or Enabled to set the port’s state status.
Enter the value in Kbps (16 to 1000000) to set as the bandwidth rate for the selected port.
Select the Ingress port action to be Drop or Shutdown.
Click Apply to save the values and update the screen.
To access this page, click QoS > Rate Limit > Ingress Bandwidth Control .
The following figure displays the Ingress Bandwidth Control Recover Time set tings.
Figure 4.163 QoS > Rate Limit > Ingress Bandwidth Control
To access this page, click QoS > Rate Limit > Ingress Bandwidth Control .
The following figure displays the Ingress Bandwidth Control Status settings.
Figure 4.164 QoS > Rate Limit > Ingress Bandwidth Control
4.8.3.2
Egress Bandwidth Control
The Egress Bandwidth Control page allows you to set the egress bandwidth control for a listed port.
EKI-7720 Series User Manual 107
To access this page, click QoS > Rate Limit > Egress Bandwidth Control .
Figure 4.165 QoS > Rate Limit > Egress Bandwidth Control
The following table describes the items in the previous figure.
Item
Port
State
Rate (Kbps)
Apply
Description
Enter the port number to set the Egress Bandwidth Control.
Select Disabled or Enabled to set the Egress Bandwidth Control state.
Enter the value in Kbps (16 to 1000000) to set the Egress Bandwidth rate.
Click Apply to save the values and update the screen.
To access this page, click QoS > Rate Limit > Egress Bandwidth Control .
The following figure displays the Egress Bandwidth Control Status settings.
Figure 4.166 QoS > Rate Limit > Egress Bandwidth Control
4.8.3.3
Egress Queue
The Egress Queue page allows you to set the egress bandwidth parameters.
To access this page, click QoS > Rate Limit > Egress Queue .
Figure 4.167 QoS > Rate Limit > Egress Queue
108 EKI-7720 Series User Manual
The following table describes the items in the previous figure.
Item
Port
Queue
State
CIR (Kbps)
Apply
Description
Click the drop-down menu to select the port to define the Egress queue.
Click the drop-down menu to set the queue order for the Egress set ting.
Click Disabled or Enabled to set the Egress queue state.
Enter the value in Kbps (16 to 1000000) to set the CIR rate for the
Egress queue.
Click Apply to save the values and update the screen.
The ensuing table for FE1 Egress Per Queue Status settings are informational only:
Queue Id and Egress Rate Limit (Kbps).
4.8.4
Bandwidth Guarantee
4.8.4.1
Global Settings
To access this page, click QoS > Bandwidth Guarantee > Global Settings .
Figure 4.168 QoS > Bandwidth Guarantee > Global Settings
The following table describes the items in the previous figure.
Item
Status
Guarantee Band width
Type
Description
Click Disabled or Enabled to set the guarantee bandwidth.
Enter the value for the guarantee bandwidth.
UDP Source Port
Force Mode
Apply
Click UDP Source Port or RTP H.264
to set the guarantee bandwidth type.
Enter the port number for the UDP source.
Click the check box to enable the force mode.
Click Apply to save the values and update the screen.
To access this page, click QoS > Bandwidth Guarantee > Global Settings .
EKI-7720 Series User Manual 109
The following figure displays the Ingress Bandwidth Control Status settings.
Figure 4.169 QoS > Bandwidth Guarantee > Global Settings
4.8.4.2
Utilization
To access this page, click QoS > Bandwidth Guarantee > Utilization .
Figure 4.170 QoS > Bandwidth Guarantee > Utilization
The following table describes the items in the previous figure.
Item
Refresh period
Apply
Description
Click the drop-down menu to select refresh time.
Click Apply to save the values and update the screen.
110 EKI-7720 Series User Manual
4.9
Management
4.9.1
LLDP
LLDP is a one-way protocol without request/response sequences. Information is advertised by stations implementing the transmit function, and is received and pro cessed by stations implementing the receive function.
4.9.1.1
LLDP System Settings
The LLDP System Settings allows you to configure the status (enabled or disabled) for the protocol, set the interval for frame transmission, set the hold time multiplier and the re-initialization delay.
To access this page, click Management > LLDP > LLDP System Settings .
Figure 4.171 Management > LLDP > LLDP System Settings
The following table describes the items in the previous figure.
Item Description
Enabled
LLDP PDU Disable
Action
Click Enabled or Disabled to set the Global Settings state.
Click to select the LLDP PDU handling action when LLDP is globally disabled. Options include: Filtered, Bridged, or Flooded.
Transmission Interval Select the interval at which frames are transmitted. The default is 30 seconds, and the valid range is 5 to 32768 seconds.
Holdtime Multiplier Select the multiplier on the transmit interval to assign to TTL.
Reinitialization Delay Select the delay length before re-initialization.
Transmit Delay Select the delay after an LLDP frame is sent.
Apply Click Apply to save the values and update the screen.
To access this page, click Management > LLDP > LLDP System Settings .
The following figure displays the LLDP Global Config settings.
Figure 4.172 Management > LLDP > LLDP System Settings
EKI-7720 Series User Manual 111
4.9.1.2
LLDP Port Settings
The LLDP Port Settings page allows you to configure the state (enabled or disabled) of the selected port.
To access this page, click Management > LLDP > LLDP Port Settings .
Figure 4.173 Management > LLDP > LLDP Port Settings > LLDP Port
Configuration
The following table describes the items in the previous figure.
Item
Port Select
State
Apply
Description
Enter the port number associated with the LLDP setting.
Click the drop-down menu to select the LLDP port state.
Click Apply to save the values and update the screen.
The following figure displays the Optional TLVs Selection settings.
Figure 4.174 Management > LLDP > LLDP Port Settings > Optional TLVs
Selection
The following table describes the items in the previous figure.
Item
Port Select
Description
Enter the port number associated with the TLV (optional) selection.
112 EKI-7720 Series User Manual
Item Description
Optional TLV Select Click the drop-down menu to select the LLDP optional TLVs to be car ried (multiple selections are allowed).
System Name: To include system name TLV in LLDP frames.
Port Description: To include port description TLV in LLDP frames.
System Description: To include system description TLV in LLDP frames.
System Capability: To include system capability TLV in LLDP frames.
802.3 MAC-PHY: To indicate the current duplex and bit rate set tings of the device.
802.3 Link Aggregation: To indicate the link can be aggregated.
802.3 Maximum Frame Size: To indicate the maximum frame size capability of the MAC-PHY implementation.
Management Address: To select the advertising IP management address.
802.1 PVID: To select to advertise the PVID in the TLV.
Apply Click Apply to save the values and update the screen.
The following figure displays the LLDP Port Status settings.
Figure 4.175 Management > LLDP > LLDP Port Settings > VLAN Name TLV
VLAN Selection
The following table describes the items in the previous figure.
Item
Port Select
VLAN Select
Description
Enter the port number to associated with the TLV selection.
Select the VLAN Name ID to be carried out (multiple selection is allowed).
Click Apply to save the values and update the screen.
Apply
The ensuing table for LLDP Port VLAN TLV Status settings are informational only:
Port and Selected VLAN.
4.9.1.3
LLDP Local Device Info
The LLDP Local Device Info page allows you to view information regarding network devices.
devices, providing that the switch has already obtained LLDP information on the
To access this page, click Management > LLDP > LLDP Local Device Info .
EKI-7720 Series User Manual 113
The following figure displays the Local Device Summary settings.
Figure 4.176 Management > LLDP > LLDP Local Device Info
To access this page, click Management > LLDP > LLDP Local Device Info .
The following figure displays the Port Status settings.
Figure 4.177 Management > LLDP > LLDP Local Device Info
4.9.1.4
LLDP Remote Device Info
The LLDP Remote Device Info page allows you to view information about remote devices, LLDP information must be available on the switch.
To access this page, click Management > LLDP > LLDP Remote Device Info .
Figure 4.178 Management > LLDP > LLDP Remote Device Info
The following table describes the items in the previous figure.
Item
Detail
Delete
Refresh
Description
Click to display the device details.
Click to delete the selected devices.
Click to refresh the remote device information list.
4.9.1.5
LLDP Overloading
To access this page, click Management > LLDP > LLDP Overloading .
114 EKI-7720 Series User Manual
The following figure displays the LLDP Overloading settings.
Figure 4.179 Management > LLDP > LLDP Overloading
4.9.2
SNMP
Simple Network Management Protocol (SNMP) is a protocol to facilitate the monitor ing and exchange of management information between network devices. Through
SNMP, the health of the network or status of a particular device can be determined.
4.9.2.1
SNMP Settings
The SNMP Settings page allows you to set the SNMP daemon state (enabled or dis abled).
To access this page, click Management > SNMP > SNMP Settings .
Figure 4.180 Management > SNMP > SNMP Settings
The following table describes the items in the previous figure.
Item
State
Apply
Description
Click Enabled or Disabled to define the SNMP daemon.
Click Apply to save the values and update the screen.
The ensuing table for SNMP Information settings are informational only: SNMP.
4.9.2.2
SNMP Community
The SNMP Community page provides configuration options for the community.
SNMP v1 and SNMP v2c use the group name (Community Name) certification. It’s role is similar to the password function. If SNMP v1 and SNMP v2c are used, you can munity.
go directly from the configuration settings to this page to configure the SNMP com -
EKI-7720 Series User Manual 115
To access this page, click Management > SNMP > SNMP Community .
Figure 4.181 Management > SNMP > SNMP Community
The following table describes the items in the previous figure.
Item Description
Community Name Enter a community name (up to 20 characters).
Access Right Click the radio box to specify the access level (read only or read write)
Apply Click Apply to save the values and update the screen.
To access this page, click Management > SNMP > SNMP Community .
The following figure displays the Community Status settings.
Figure 4.182 Management > SNMP > SNMP Community
4.9.2.3
SNMPv3 EngineID
To access this page, click Management > SNMP > SNMPv3 EngineID .
Figure 4.183 Management > SNMP > SNMPv3 EngineID
The following table describes the items in the previous figure.
Item
SNMP EngineID
Description
Enter the hexadecimal string to define the engine ID for SNMPv3 agent.
4.9.2.4
SNMPv3 Settings
The SNMPv3 Settings page allows you to create SNMP groups. The users have the tings.
same level of security and access control permissions as defined by the group set -
116 EKI-7720 Series User Manual
To access this page, click Management > SNMP > SNMPv3 Settings .
Figure 4.184 Management > SNMP > SNMPv3 Settings
The following table describes the items in the previous figure.
Item
User Name
Access Right
Encrypted
Auth-Protocol
Password
Priv-Protocol
Password
Add
Description
Enter a user name (up to 32 characters) to create an SNMP profile.
Click read-only or read-write to define the access right for the profile.
Click the option to set the encrypted option for the user setting.
Click the drop-down menu to select the authentication level: MD5 or
SHA. The field requires a user password.
MD5: specify HMAC-MD5-96 authentication level
SHA: specify HMAC-SHA authentication protocol
Enter the characters to define the password associated with the authentication protocol.
Click the drop-down menu to select an authorization protocol: none or
DES.The field requires a user password.
None: no authorization protocol in use
DES: specify 56-bit encryption in use
Enter the characters to define the password associated with the authorization protocol.
Click Add to save the values and update the screen.
The ensuing table for User Status settings are informational only: User Name,
Access Right, Auth-Protocol, Priv-Protocol and Delete (click to delete the desired user name).
4.9.2.5
SNMP Trap
The SNMP Trap page allows you to set the IP address of the node and the SNMP credentials corresponding to the version that is included in the trap message.
EKI-7720 Series User Manual 117
To access this page, click Management > SNMP > SNMP Trap .
Figure 4.185 Management > SNMP > SNMP Trap
The following table describes the items in the previous figure.
Item
IP Address
Community Name/
User Name
Version
Description
Enter the IP address to designate the SNMP trap host.
Click the drop-down menu to select a defined community name.
Add
Click the drop-down menu to designate the SNMP version credentials
(v1, v2c - trap, v2c - inform, v2c - trap or v2c - inform).
Click Add to save the values and update the screen.
The ensuing table for Trap Host Status settings are informational only: No., IP
Address, Community Name, Version and Delete (click to delete the desired IP address).
4.9.3
Power Over Ethernet
Power Over Ethernet is the function supplying power to Powered Devices (PD) through the switch in the event that AC power is not readily available.
Power over Ethernet can be used for the following areas:
Surveillance devices
I/O sensors for security requirements
Wireless access points
Series
EKI
Supported Models
EKI-7708E/G-4FP, EKI-7710E/G-2CP, EKI-7712E/G-4FP, EKI-7720G-
4FP, EKI-7428G-4CP
4.9.3.1
PoE System Settings
The PoE System Settings page allows you to configure the overload disconnect and the maximum available wattage.
118 EKI-7720 Series User Manual
To access this page, click Management > Power Over Ethernet > PoE System
Settings .
Figure 4.186 Management > Power Over Ethernet > PoE System Settings
The following table describes the items in the previous figure.
Item
Maximum Power
Available
OverLoad Discon nect Mode
Apply
Description
Select the value in Watts to set the maximum available power.
Click the drop-down menu to designate the overload mode:
Overload Port First:
Port-Based Priority:
Click Apply to save the values and update the screen.
The ensuing table for PoE System Information settings are informational only: Firm ware Version, Maximum Power Available, Actual Power Consumption and Overload
Disconnect Type.
4.9.3.2
PoE Port Settings
The PoE Port Settings page allows you to configure the port status, its power limita tions, legacy mode status, and power limit settings.
To access this page, click Management > Power Over Ethernet > PoE Port Set tings .
Figure 4.187 Management > Power Over Ethernet > PoE Port Settings
The following table describes the items in the previous figure.
Item
Port
Enabled
Description
Click the drop-down menu to select a PoE port.
Select Enabled or Disabled to designate the PoE port function by ports.
EKI-7720 Series User Manual 119
Item
Power Limit From
Classification
Legacy Mode
Priority
Power Limit
Apply
Description
Select Enabled or Disabled to designate the power limit classifica tion.
Select Enabled or Disable d to designate the legacy mode option for the port.
Click the drop-down menu to configure the power supply priority: Crit ical , Low , Medium or High . Default is Low .
Enter a number to set the port power current limitation to be given to the Powered Device (PD)
Click Apply to save the values and update the screen.
The ensuing table for PoE Information settings are informational only: Port, Enable
State, Power Limit From Classification, Priority, Legacy and Power Limit (W).
4.9.3.3
PoE Port Status
To access this page, click Management > Power Over Ethernet > PoE Port Status .
The ensuing table for PoE Port Status settings are informational only: Port, Current
(mA), Voltage (V), Power (W) and Temp. (°C).
4.9.4
TCP Modbus Settings
The TCP Modbus function allows for client-server communication between a switch module (server) and a device in the networking running MODBUS client software (cli ent).
4.9.4.1
TCP Modbus Settings
The TCP Modbus Settings page allows you to configure the modbus function.
To access this page, click Management > TCP Modbus Settings > TCP Modbus
Settings .
Figure 4.188 Management > TCP Modbus Settings > TCP Modbus Settings
The following table describes the items in the previous figure.
Item
State
Time out
Apply
Description
Click Disabled or Enabled to set the TCP Modbus state.
Enter the value (1 to 86400) to define the timeout period between transport time.
Click Apply to save the values and update the screen.
To access this page, click Management > TCP Modbus Settings > TCP Modbus
Settings .
The following figure displays the TCP Modbus Status settings.
Figure 4.189 Management > TCP Modbus Settings > TCP Modbus Settings
120 EKI-7720 Series User Manual
4.9.5
DHCP Server
The Dynamic Host Configuration Protocol (DHCP) is a network protocol enabling a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network.
4.9.5.1
Status Settings
The Status Settings page allows you to configure the DHCP server mode (enabled or disabled).
To access this page, click Management > DHCP Server > Status Settings .
Figure 4.190 Management > DHCP Server > Status Settings
The following table describes the items in the previous figure.
Item
DHCP Server
Apply
Restart
Description
Select Enable or Disable to designate the DHCP server function type.
When a new DHCP server mode is selected, the switch requires a system restart for the new mode to take effect.
Click Apply to save the values and update the screen.
Click Restart to have the switch perform a system restart function. In the event that the IP settings are changed, the DHCP server must be restarted for the IP settings to take effect.
The ensuing table for Status Information settings are informational only: DHCP
Server Service.
4.9.5.2
Global Settings
The Global Settings page allows you to configure the global settings for the DHCP function.
To access this page, click Management > DHCP Server > Global Settings .
Figure 4.191 Management > DHCP Server > Global Settings
EKI-7720 Series User Manual 121
The following table describes the items in the previous figure.
Item
Lease Time
Low IP Address
High IP Address
Subnet Mask
Gateway
DNS
Apply
Description
Type in the value designating the lease time (60 - 864000) in seconds for each setting lease.
Type in the value designating the lowest range in the IP address pool.
Type in the value designating the highest range in the IP address pool.
Type in the value designating the subnet mask for the IP address pool.
Type in the value designating the gateway for the IP address pool.
Type in the value designating the DNS for the IP address pool.
Click Apply to save the values and update the screen.
To access this page, click Management > DHCP Server > Global Settings .
The following figure displays the Global Information settings.
Figure 4.192 Management > DHCP Server > Global Settings
4.9.5.3
Port Settings
The Port Settings page allows you to configure selected ports for the DHCP function.
To access this page, click Management > DHCP Server > Port Settings .
Figure 4.193 Management > DHCP Server > Port Settings
The following table describes the items in the previous figure.
Item
Port Select
Low IP Address
Description
Click the drop-down menu to select a pre-defined port to configure.
The sub options are designated for the selected port.
Type in the value designating the lowest range in the IP address pool.
122 EKI-7720 Series User Manual
4.9.5.4
Option 82 Settings
The Option 82 Settings, also known as the DHCP relay agent information option, pro vide information about the network location of a DHCP client. In turn, the DHCP server uses the information to implement IP addresses or other parameters for the client.
To access this page, click Management > DHCP Server > Option 82 Settings .
Figure 4.194 Management > DHCP Server > Option 82 Settings
The following table describes the items in the previous figure.
Item Description
Entry
Circuit ID Format
Click the drop-down menu to select an entry for the Option 82 setting.
Click the drop-down menu to select the format of the circuit ID: string or hex.
Circuit ID Content Enter the circuit ID string on the switch on which the request was received.
Remote ID Format Click the drop-down menu to select the format of the remote ID: string or hex.
Remote ID Content Enter the remote ID string of the host.
Low IP Address Type in the value designating the lowest range in the IP address pool.
High IP Address
Subnet Mask
Type in the value designating the highest range in the IP address pool.
Type in the value designating the subnet mask for the IP address pool.
Gateway
DNS
Apply
Type in the value designating the gateway for the IP address pool.
Type in the value designating the DNS for the IP address pool.
Click Apply to save the values and update the screen.
To access this page, click Management > DHCP Server > Option 82 Settings .
EKI-7720 Series User Manual 123
The following figure displays the Entry Information settings.
Figure 4.195 Management > DHCP Server > Option 82 Settings
4.9.5.5
Client MAC Settings
To access this page, click Management > DHCP Server > Client MAC Settings .
Figure 4.196 Management > DHCP Server > Client MAC Settings
The following table describes the items in the previous figure.
Item Description
Entry ID Type in the value designating the entry ID.
Client MAC Address Enter the MAC address for DHCP server.
IP Address Enter a value to specify the IP address of the interface.
Subnet Mask
Gateway
DNS
Apply
Enter a value to specify the IP subnet mask for the interface.
Enter a value to specify the gateway for the interface.
Enter a value to specify the DNS server for the interface.
Click Apply to save the values and update the screen.
The ensuing table for Client MAC Information settings are informational only: Entry
ID, Client MAC Address, IP Address, Subnet Mask and Modify (Click Detail to dis play the detail information of desired entry id or Delete to delete the desired entry id).
4.9.5.6
Lease Entry
To access this page, click Management > DHCP Server > Lease Entry .
124 EKI-7720 Series User Manual
The following figure displays the Lease entry Table s ettings.
Figure 4.197 Management > DHCP Server > Lease Entry
4.9.6
SMTP Client
Simple Mail Transfer Protocol (SMTP) is a protocol to send e-mail messages between servers. SMTP is used to send messages from a mail client to a mail server.
SMTP by default uses TCP port 25.
4.9.6.1
Global Settings
The Global Settings page allows you to set the active profile for the SMTP client.
To access this page, click Management > SMTP Client > Global Settings.
Figure 4.198 Management > SMTP Client > Global Settings
The following table describes the items in the previous figure.
Item
Active Profile
Apply
Description
Click the drop-down menu to select the profile status (None, 1 or 2).
Click Apply to save the values and update the screen.
The ensuing table for SMTP Information settings are informational only: Active Pro file Id.
4.9.6.2
Profile Settings
The Profile Settings page allows you to select the server IP, the server port, and sender mail for the listed profile.
To access this page, click Management > SMTP Client > Profile Settings .
Figure 4.199 Management > SMTP Client > Profile Settings > Profile Settings
EKI-7720 Series User Manual 125
The following table describes the items in the previous figure.
Item
Profile ID
Server IP
Server Port
Sender Mail
Apply
Description
Click the drop-down menu to select the identification type for the pro file (1 or 2).
Enter the IP address to designate the server host.
Enter the port number to designate the port associated with the server
IP address.
Enter the email address of the sender client.
Click Apply to save the values and update the screen.
Figure 4.200 Management > SMTP Client > Profile Settings > Profile Target Mail
Settings
The following table describes the items in the previous figure.
Item
Profile ID
Target Mail
Apply
Description
Click the drop-down menu to select the identification type for the pro file (1 or 2).
Enter the email address of the target client.
Click Apply to save the values and update the screen.
To access this page, click Management > SMTP Client > Profile Settings > Profile
Target Mail Settings .
The following figure displays the Profile Information settings.
Figure 4.201 Management > DHCP Server > Lease Entry
4.9.6.3
Sending Message
The Sending Message page allows you to setup the log message for use with the
SMTP client.
126 EKI-7720 Series User Manual
To access this page, click Management > SMTP Client > Sending Message .
Figure 4.202 Management > SMTP Client > Sending Message
The following table describes the items in the previous figure.
Item
Title
Content
Apply
Description
Assign the title of the email. The maximum length is 20 characters
(alphanumeric, symbols (. (dot), _ (underline), - (dash line) and space).
Assign the content of the email. The maximum length is 64 characters
(alphanumeric, symbols (. (dot), _ (underline), - (dash line) and space).
Click Apply to save the values and update the screen.
4.9.7
RMON
Remote monitoring (RMON) uses a client-server model to monitor/manage remote devices on a network.
4.9.7.1
RMON Statistics
The RMON Statistics page allows you to view information regarding packet sizes and
RMON standard.
information for physical layer errors. The information displayed is according to the
To access this page, click Management > RMON > RMON Statistics .
Figure 4.203 Management > RMON > RMON Statistics
EKI-7720 Series User Manual 127
The following table describes the items in the previous figure.
Item
Index
Port
Owner
Apply
Description
Enter an entry selection (1 to 65535) to display its statistical informa tion.
Enter the respective port number for the selected entry.
Enter the name of the owner of the RMON group.
Click Apply to save the values and update the screen.
The ensuing table for Statistics Information settings are informational only: Index,
Port, Drop Events, Octets, Packets, Broadcast, Multi-cast, Owner and Delete (click to delete the desired index).
4.9.7.2
RMON History
The RMON History page allows you to configure the display of history entries.
To access this page, click Management > RMON > RMON History .
Figure 4.204 Management > RMON > RMON History
The following table describes the items in the previous figure.
Item Description
Index
Port Select the specific port switch.
Buckets Requested Enter the specific (1-50) number of samples to store.
Interval
Enter the index entry (1 to 65535) to select the number of new history table entries.
Owner
Apply
Enter value in seconds (1 to 3600) to designate a specific interval time for the collection of samples.
Enter the name of the owner of the RMON history group.
Click Apply to save the values and update the screen.
The ensuing table for History Information settings are informational only: Index,
Port, Buckets Requested, Interval, Owner and Delete (click to delete the desired index).
4.9.7.3
RMON Alarm
The RMON Alarm page allows you to configure RMON statistics group and alarm groups.
128 EKI-7720 Series User Manual
To access this page, click Management > RMON > RMON Alarm .
Figure 4.205 Management > RMON > RMON Alarm
The following table describes the items in the previous figure.
Item Description
Index
Interval
Variable
Sample Type
Rising Threshold
Falling Threshold
Enter the index entry (1 to 65535) to define a specific Alarm Collection history entry.
Enter a value (1 to 2147483647) to define the interval value for the
Alarm Collection history.
Enter the alarm variables to define the monitoring triggers.
Enter the variable sample type.
Enter the rising alarm threshold trigger.
Enter the falling alarm threshold trigger.
Rising Event Index Enter the rising event index (1-65535) to define the alarm group.
Falling Event Index Enter the falling event index (1-65535) to define the alarm group.
Owner
Apply
Enter the name of the owner of the RMON alarm group.
Click Apply to save the values and update the screen.
The ensuing table for Alarm Information settings are informational only: Index,
Interval, Variable, Sample Type, Rising Threshold, Falling Threshold, Rising Event
Index, Falling Event Index, Owner and Delete (click to delete the desired index).
4.9.7.4
RMON Event
The RMON Event page is used to configure RMON event groups.
EKI-7720 Series User Manual 129
To access this page, click Management > RMON > RMON Event .
Figure 4.206 Management > RMON > RMON Event
The following table describes the items in the previous figure.
Item
Index
Description
Type
Community
Owner
Apply
Description
Enter the index entry (1 to 65535) to define a specific RMON event.
Enter a value (1 to 2147483647) to define the interval value for the
Alarm Collection history.
Click the drop-down menu to define the event type: None, Log, SNMP
Trap, Log and Trap.
Enter the community string to be passed for the specified event.
Enter the name of the owner of the RMON event.
Click Apply to save the values and update the screen.
The ensuing table for Event Information settings are informational only: Index,
Description, Type, Community, Owner and Delete (click to delete the desired index).
130 EKI-7720 Series User Manual
4.9.8
NTP Server
To access this page, click Management > NTP Server .
Figure 4.207 Management > NTP Server
The following table describes the items in the previous figure.
Item
NTP Server
Manual Time
Server Address 1 ~
Server Address 10
Apply
Description
Click the radio button to enable or disable the NTP server function.
Click the radio button to enable or disable the manual time function.
Enter the address of the NTP server. This is a text string of up to 64 characters containing the encoded unicast IP address or hostname of a NTP server.
Click Apply to save the values and update the screen.
The ensuing table for NTP Server Status settings are informational only: INTP
Server Status, Manual Time, Server AddressInformation Value, Server 1, Server 2,
Server 3, Server 4, Server 5, Server 6, Server 7, Server 8, Server 9 and Server 10.
EKI-7720 Series User Manual 131
4.10
Diagnostics
Through the Diagnostics function configuration of settings for the switch diagnostics is available.
4.10.1
Cable Diagnostics
The Cable Diagnostics page allows you to select the port for applying a copper test.
To access this page, click Diagnostics > Cable Diagnostics .
Figure 4.208 Diagnostics > Cable Diagnostics
The following table describes the items in the previous figure.
Item
Port
Copper Test
Description
Click the drop-down menu to select a pre-defined port for diagnostic testing. Giga ports are displayed with a channel A to D designation.
Click Copper Test to display the test result for the selected port.
The ensuing table for Test Result settings are informational only: Port, Channel A,
Cable Length A, Channel B, Cable Length B, Channel C, Cable Length C, Channel D and Cable Length D.
4.10.2
Ping Test
The Ping Test page allows you to configure the test log page.
To access this page, click Diagnostics > Ping Test .
Figure 4.209 Diagnostics > Ping Test
132 EKI-7720 Series User Manual
The following table describes the items in the previous figure.
Item
IP Address
Count
Interval (in sec)
Size (in bytes)
Ping Results
Apply
Description
Enter the IP address or host name of the station to ping. The initial value is blank. The IP Address or host name you enter is not retained across a power cycle. Host names are composed of series of labels concatenated with periods. Each label must be between 1 and 63 characters long, maximum of 64 characters.
Enter the number of echo requests to send. The default value is 4.
The value ranges from 1 to 5. The count entered is not retained across a power cycle.
Enter the interval between ping packets in seconds. The default value is 1. The value ranges from 1 to 5. The interval entered is not retained across a power cycle.
Enter the size of ping packet. The default value is 56. The value ranges from 8 to 5120. The size entered is not retained across a power cycle.
Display the reply format of ping.
PING 172.17.8.254 (172.17.8.254): 56 data bytes
--- 172.17.8.254 ping statistics ---
4 packets transmitted, 0 packets received, 100% packet loss
Or
PING 172.17.8.93 (172.17.8.93): 56 data bytes
64 bytes from 172.17.8.93: icmp_seq=0 ttl=128 time=0.0 ms
64 bytes from 172.17.8.93: icmp_seq=1 ttl=128 time=0.0 ms
64 bytes from 172.17.8.93: icmp_seq=2 ttl=128 time=0.0 ms
64 bytes from 172.17.8.93: icmp_seq=3 ttl=128 time=0.0 ms
--- 172.17.8.93 ping statistics ---
4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 0.0/0.0/0.0 ms
Click Apply to display ping result for the IP address.
4.10.3
IPv6 Ping Test
The IPv6 Ping Test page allows you to configure the Ping Test for IPv6.
EKI-7720 Series User Manual 133
To access this page, click Diagnostics > IPv6 Ping Test .
Figure 4.210 Diagnostics > IPv6 Ping Test
The following table describes the items in the previous figure.
Item
IPv6 Address
Count
Interval (in sec)
Size (in bytes)
Description
Enter the IP address or host name of the station you want the switch to ping. The initial value is blank. The IP Address or host name you enter is not retained across a power cycle. Host names are composed of series of labels concatenated with dots. Each label must be between 1 and 63 characters long, and the entire hostname has a maximum of 64 characters.
Enter the number of echo requests you want to send. The default value is 4. The value ranges from 1 to 5. The count you enter is not retained across a power cycle.
Enter the interval between ping packets in seconds. The default value is 1. The value ranges from 1 to 5. The interval you enter is not retained across a power cycle.
Enter the size of ping packet. The default value is 56. The value ranges from 8 to 5120. The size you enter is not retained across a power cycle.
134 EKI-7720 Series User Manual
Item
Ping Results
Apply
Description
Display the reply format of ping.
PING 2222::777 (2222::777): 56 data bytes
--- 2222::777 ping statistics ---
4 packets transmitted, 0 packets received, 100% packet loss
Or
PING 2222::717 (2222::717): 56 data bytes
64 bytes from 2222::717: icmp6_seq=0 ttl=128 time=10.0 ms
64 bytes from 2222::717: icmp6_seq=1 ttl=128 time=0.0 ms
64 bytes from 2222::717: icmp6_seq=2 ttl=128 time=0.0 ms
64 bytes from 2222::717: icmp6_seq=3 ttl=128 time=0.0 ms
--- 2222::717 ping statistics ---
4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 0.0/2.5/10.0 ms
Click Apply to display ping result for the IP address.
4.10.4
System Log
4.10.4.1
Logging Service
The Logging Service page allows you to setup the logging services feature for the system log.
To access this page, click Diagnostics > System Log > Logging Service .
Figure 4.211 Diagnostics > System Log > Logging Service
The following table describes the items in the previous figure.
Item
Logging Service
Apply
Description
Click Enabled or Disabled to set the Logging Service status.
Click Apply to save the values and update the screen.
The ensuing table for Logging Information settings are informational only: Logging
Service.
4.10.4.2
Local Logging
The Local Logging page allows you to designate a local target when the severity cri teria is reached.
To access this page, click Diagnostics > System Log > Local Logging .
Figure 4.212 Diagnostics > System Log > Local Logging
EKI-7720 Series User Manual 135
The following table describes the items in the previous figure.
Item
Target
Severity
Apply
Description
Enter the local logging target.
Click the drop-down menu to select the severity level for local log messages.
The level options are:
emerg: Indicates system is unusable. It is the highest level of severity
alert: Indicates action must be taken immediately
crit: Indicates critical conditions
error: Indicates error conditions
warning: Indicates warning conditions
notice: Indicates normal but significant conditions
info: Indicates informational messages
debug: Indicates debug-level messages
Click Apply to save the values and update the screen.
The ensuing table for Local Logging Settings Status settings are informational only: Status, Target, Severity and Delete (click to delete the desired target).
4.10.4.3
System Log Server
The System Log Server page allows you to configure the log server.
To access this page, click Diagnostics > System Log > System Log Server .
Figure 4.213 Diagnostics > System Log > System Log Server
The following table describes the items in the previous figure.
Item
Server Address
Server Port
Description
Enter the IP address of the log server.
Enter the Udp port number of the log server.
136 EKI-7720 Series User Manual
Item
Severity
Facility
Apply
Description
Click the drop-down menu to select the severity level for local log messages. The default is emerg.
The level options are:
emerg: Indicates system is unusable. It is the highest level of severity
alert: Indicates action must be taken immediately
crit: Indicates critical conditions
error: Indicates error conditions
warning: Indicates warning conditions
notice: Indicates normal but significant conditions
info: Indicates informational messages
debug: Indicates debug-level messages
Click the drop-down menu to select facility to which the message refers.
Click Apply to save the values and update the screen.
The ensuing table for Remote Logging Setting Status settings are informational only: Status, Server Info, Severity, Facility and Delete (click to delete the desired server address).
4.10.5
DDM
The DDM page allows you to setup the diagnostic alarm status.
To access this page, click Diagnostics > DDM .
Figure 4.214 Diagnostics > DDM > Diagnostic Alarm Settings
The following table describes the items in the previous figure.
Item
Diagnostic Alarm
Apply
Description
Click the drop-down menu to designate the announcement method:
Disabled, SysLog, E-mail, or SNMP.
Click Apply to save the values and update the screen.
The ensuing table for Diagnostic Alarm Information settings are informational only:
Diagnostic Alarm.
EKI-7720 Series User Manual
Figure 4.215 Diagnostics > DDM > DMI INFO
137
The following table describes the items in the previous figure.
Item
High Alarm
High Warning
Low Alarm
Low Warning
Apply
Description
Click Enabled or Disabled to set the alarm state.
Click Enabled or Disabled to set the alarm state.
Click Enabled or Disabled to set the alarm state.
Click Enabled or Disabled to set the alarm state.
Click Apply to save the values and update the screen.
The ensuing table for Vendor Info settings are informational only: Refresh (click to reload the vendor information), Port, Connector, Speed, VendorName, VendorOui,
VendorPn, VendorRev, VendorSn and DateCode.
4.10.6
LED Indication
To access this page, click Diagnostics > LED Indication .
Figure 4.216 Diagnostics > LED Indication
The following table describes the items in the previous figure.
Item
LED
State
Event
Apply
Description
Click the drop-down menu to select LED indicator.
Select Enable or Disable to enable LED alarm.
Click to select the event of LED alarm.
Click Apply to save the values and update the screen.
To access this page, click Diagnostics > LED Indication .
The following figure displays the LED Information settings.
Figure 4.217 Diagnostics > LED Indication
138 EKI-7720 Series User Manual
4.11
Tools
4.11.1
IXM
The IXM tool is an industrial Ethernet switch solution to help the users deploy indus trial Ethernet switch hardware by allowing users with multiple, managed Ethernet switches in the field to eliminate the need to individually connect to each device to configure it.
To access this page, click Tools > IXM .
Figure 4.218 Tools > IXM
The following table describes the items in the previous figure.
Item
Search Field
#
Device Name
Device Model
Category
IP Address
MAC Address
Firmware Version
System Indicator
Previous
Next
Description
Enter criteria to search the IXM information.
Displays the reference to the device number.
Displays the device name.
Displays the device model type.
Displays the device’s category type.
Displays the device’s IP address.
Displays the device’s IP MAC address.
Displays the device’s firmware version.
Displays the device’s system indicator.
Click Previous to back to previous page.
Click Next to go to next page.
4.11.2
Backup Manager
The Backup Manager page allows you to configure a remote TFTP sever or host file system in order to backup the firmware image or configuration file.
EKI-7720 Series User Manual 139
To access this page, click Tools > Backup Manager .
Figure 4.219 Tools > Backup Manager
The following table describes the items in the previous figure.
Item
Backup Method
Server IP
Backup Type
Image
Backup
Description
Click the drop-down menu to select the backup method: TFTP or
HTTP.
Enter the IP address of the backup server.
Click a type to define the backup method: image: running configura tion, startup configuration, custom configuration, flash log, or buffered log.
Click the format for the image type: Active or Backup.
Click Backup to backup the settings.
4.11.3
Upgrade Manager
The Upgrade Manager page allows you to configure a remote TFTP sever or host file system in order to upload firmware upgrade images or configuration files.
140 EKI-7720 Series User Manual
To access this page, click Tools > Upgrade Manager .
Figure 4.220 Tools > Upgrade Manager
The following table describes the items in the previous figure.
Item
Upgrade Method
Server IP
File Name
Upgrade Type
Description
Click the drop-down menu to select the upgrade method: TFTP or
HTTP.
Enter the IP address of the upgrade server.
Enter the file name of the new firmware version.
Click a type to define the upgrade method: image, startup configura tion, running configuration, or custom configuration.
Click the format for the image type: Active, Backup, or auto.
Click Upgrade to upgrade to the current version.
Image
Upgrade
4.11.4
Dual Image
The Dual Image page allows you to setup an active and backup partitions for firm ware image redundancy.
To access this page, click Tools > Dual Image .
Figure 4.221 Tools > Dual Image
The following table describes the items in the previous figure.
Item
Active Image
Save
Description
Click the format for the image type: Active or Backup.
Click Save to save and keep the new settings.
EKI-7720 Series User Manual 141
The ensuing table for Image Information 0/1 settings are informational only: Flash
Partition, Image Name, Image Size and Created Time.
4.11.5
Save Configuration
To access this page, click Tools > Save Configuration .
Click Save Configuration to FLASH to have configuration changes you have made to be saved across a system reboot. All changes submitted since the previous save or system reboot will be retained by the switch.
4.11.6
User Account
4.11.6.1
Add and Edit Users
The User Account page allows you to setup a user and the related parameters.
To access this page, click Tools > User Account .
Figure 4.222 Tools > User Account
The following table describes the items in the previous figure.
Item
User Name
Password Type
Password
Retype Password
Privilege Type
Apply
Description
Enter the name of the new user entry.
Click the drop-down menu to define the type of password: Clear Text ,
Encrypted or No Password .
Enter the character set for the define password type.
Retype the password entry to confirm the profile password.
Click the drop-down menu to designate privilege authority for the user entry: Admin or User .
Click Apply to create a new user account.
4.11.6.2
Wrong Password
To access this page, click Tools > User Account .
The following figure displays the Wrong Password settings.
Figure 4.223 Tools > User Account
142 EKI-7720 Series User Manual
To access this page, click Tools > User Account .
Item
State
Retry Time
Block Time
Apply
Description
Click to enable or disable the wrong password detection function.
Enter a variable to designate the wrong password entry threshold,
State option must be enabled.
Enter a variable to designate the lockout period in minutes after the retry attempts threshold is reached.
Click Apply to create a new user account.
The following figure displays the Wrong Password Information settings.
Figure 4.224 Tools > User Account
4.11.7
N-Key
To access this page, click Tools > N-Key .
Figure 4.225 Tools > N-Key
The following table describes the items in the previous figure.
Item
Auto Mode
N-Key Status
Apply
Description
Click the option to set the auto mode for the N-Key status.
Click the drop-down menu to select N-Key status.
Click Apply to create a new user account.
To access this page, click Tools > N-Key .
The following figure displays the N-Key Information settings.
Figure 4.226 Tools > N-Key Information
4.11.8
Reset System
To access this page, click Tools > Reset System .
Click Restore to have all configuration parameters reset to their factory default val ues. All changes that have been made will be lost, even if you have issued a save.
Click Select Excepted Configuration to keep the configuration you selected when resetting.
Reset settings take effect after a system reboot.
4.11.9
Reboot Device
To access this page, click Tools > Reboot Device .
EKI-7720 Series User Manual 143
Click Reboot to reboot the switch. Any configuration changes you have made since the last time you issued a save will be lost.
4.12
Modbus/TCP Mapping
The data map addresses of Advantech switches shown in the following table start from Modbus address 30001 for function code 4.
In the given example, the address offset 0x1000 (hex) equals Modbus address
34097, while the address offset 0x1100 (hex) equals Modbus address 34353.
The information given by the Advantech is shown in hex mode.
4.12.1
Modbus/TCP Mapping Table
Catalog
System Info
Name Data Type Interpretation Address
Offset (Hex)
0x0000 Vendor ID =
0x‘13FE
1 word 16 bits HEX
Unit ID = 0xFF 1 word 16 bits HEX
Product Code 1 word 16 bits HEX
Vendor Name
= "Advantech"
16 words
32 chars
ASCII
0x0001
0x0002
0x0010
Address
3X
30001
30002
30003
30017
Product Name
= "EKI-xxxx"
16 words
Firmware Ver sion
2 words
Ethernet MAC
Address
3 words
32 chars
ASCII
32 bits HEX
48 bits HEX
0x0020
0x020A
0x020E
30033
30523
30527
Description
Vendor ID = 0x13FE
Unit ID = 0xFF
Product Code
Vendor Name = "Advant ech"
Word 0 Hi byte = 'A'
Word 0 Lo byte = 'd'
Word 1 Hi byte = 'v'
Word 1 Lo byte = 'a'
Word 2 Hi byte = 'n'
Word 2 Lo byte = 't'
Word 3 Hi byte = 'e'
Word 3 Lo byte = 'c'
Word 4 Hi byte = 'h'
Word 4 Lo byte = '\0'
Product Name = "EKIxxxx"
Word 0 Hi byte = 'E'
Word 0 Lo byte = 'K'
Word 1 Hi byte = 'I'
Word 1 Lo byte = '-'
Word 2 Hi byte = 'x'
Word 2 Lo byte = 'x'
Word 3 Hi byte = 'x'
Word 3 Lo byte = 'x'
Word 4 Hi byte = '\0'
Firmware Version
Word 0 Hi byte = major
Word 0 Lo byte = minor
Word 1 Hi byte = release
Word 1 Lo byte = build
Ethernet MAC Address
Ex: MAC = 00-19-CB-01-
02-03
Word 0 Hi byte = 0x00
Word 0 Lo byte = 0x19
Word 1 Hi byte = 0xCB
Word 1 Lo byte = 0x01
Word 2 Hi byte = 0x02
Word 2 Lo byte = 0x03
144 EKI-7720 Series User Manual
Catalog
System Info
Port Info
Name
IP Address
Port Status
Data Type
Revision Num ber
16 words
2 words
32 chars
Interpretation Address
Offset (Hex)
ASCII 0x0211
Address
3X
30530
32 bits HEX
1 word 16 bits HEX
0x0400
0x1000 ~
0x101F
31025
34097 ~
34128
Description
Product Name =
"YYY.xxxxx"
Word 0 Hi byte = 'Y'
Word 0 Lo byte = 'Y'
Word 1 Hi byte = 'Y'
Word 1 Lo byte = '.'
Word 2 Hi byte = 'x'
Word 2 Lo byte = 'x'
Word 3 Hi byte = 'x'
Word 3 Lo byte = 'x'
Word 4 Hi byte = 'x'
Word 4 Hi byte = '\0'
IP Address
Ex: IP = 192.168.1.1
Word 0 Hi byte = 0xC0
Word 0 Lo byte = 0xA8
Word 1 Hi byte = 0x01
Word 1 Lo byte = 0x01
Port Status
0x0000: Link down
0x0001: Link up
0xFFFF: No port
Port 1 Status 1 word 16 bits HEX
Port 2 Status 1 word 16 bits HEX
Port 3 Status 1 word 16 bits HEX
Port 4 Status 1 word 16 bits HEX
Port 5 Status 1 word 16 bits HEX
Port 6 Status 1 word 16 bits HEX
Port 7 Status 1 word 16 bits HEX
Port 8 Status 1 word 16 bits HEX
Port 9 Status 1 word 16 bits HEX
Port 10 Status 1 word 16 bits HEX
Port 11 Status 1 word 16 bits HEX
Port 12 Status 1 word 16 bits HEX
Port 13 Status 1 word 16 bits HEX
Port 14 Status 1 word 16 bits HEX
Port 15 Status 1 word 16 bits HEX
Port 16 Status 1 word 16 bits HEX
Port 17 Status 1 word 16 bits HEX
Port 18 Status 1 word 16 bits HEX
Port 19 Status 1 word 16 bits HEX
Port 20 Status 1 word 16 bits HEX
Port 21 Status 1 word 16 bits HEX
Port 22 Status 1 word 16 bits HEX
Port 23 Status 1 word 16 bits HEX
Port 24 Status 1 word 16 bits HEX
Port 25 Status 1 word 16 bits HEX
Port 26 Status 1 word 16 bits HEX
Port 27 Status 1 word 16 bits HEX
Port 28 Status 1 word 16 bits HEX
Port 29 Status 1 word 16 bits HEX
Port 30 Status 1 word 16 bits HEX
Port 31 Status 1 word 16 bits HEX
Port 32 Status 1 word 16 bits HEX
0x1018
0x1019
0x101A
0x101B
0x101C
0x101D
0x101E
0x101F
0x1010
0x1011
0x1012
0x1013
0x1014
0x1015
0x1016
0x1017
0x1008
0x1009
0x100A
0x100B
0x100C
0x100D
0x100E
0x100F
0x1000
0x1001
0x1002
0x1003
0x1004
0x1005
0x1006
0x1007
34121
34122
34123
34124
34125
34126
34127
34128
34113
34114
34115
34116
34117
34118
34119
34120
34105
34106
34107
34108
34109
34110
34111
34112
34097
34098
34099
34100
34101
34102
34103
34104
EKI-7720 Series User Manual 145
Catalog
Port Info
Name
Port Speed
Data Type Interpretation Address
Offset (Hex)
1 word 16 bits HEX 0x1100 ~
0x111F
Address
3X
34353 ~
34384
Description
Port Speed
0x0000: 10M-Half
0x0001: 10M-Full
0x0002: 100M-Half
0x0003: 100M-Full
0x0004: 1000M-Half
0x0005: 1000M-Full
0xFFFF: No port
Port 1 Speed 1 word 16 bits HEX
Port 2 Speed 1 word 16 bits HEX
Port 3 Speed 1 word 16 bits HEX
Port 4 Speed 1 word 16 bits HEX
Port 5 Speed 1 word 16 bits HEX
Port 6 Speed 1 word 16 bits HEX
Port 7 Speed 1 word 16 bits HEX
Port 8 Speed 1 word 16 bits HEX
Port 9 Speed 1 word 16 bits HEX
Port 10 Speed 1 word 16 bits HEX
Port 11 Speed 1 word 16 bits HEX
Port 12 Speed 1 word 16 bits HEX
Port 13 Speed 1 word 16 bits HEX
Port 14 Speed 1 word 16 bits HEX
Port 15 Speed 1 word 16 bits HEX
Port 16 Speed 1 word 16 bits HEX
Port 17 Speed 1 word 16 bits HEX
Port 18 Speed 1 word 16 bits HEX
Port 19 Speed 1 word 16 bits HEX
Port 20 Speed 1 word 16 bits HEX
Port 21 Speed 1 word 16 bits HEX
Port 22 Speed 1 word 16 bits HEX
Port 23 Speed 1 word 16 bits HEX
Port 24 Speed 1 word 16 bits HEX
Port 25 Speed 1 word 16 bits HEX
Port 26 Speed 1 word 16 bits HEX
Port 27 Speed 1 word 16 bits HEX
Port 28 Speed 1 word 16 bits HEX
Port 29 Speed 1 word 16 bits HEX
Port 30 Speed 1 word 16 bits HEX
Port 31 Speed 1 word 16 bits HEX
Port 32 Speed 1 word 16 bits HEX
Flow Control 1 word 16 bits HEX
0x1110
0x1111
0x1112
0x1113
0x1114
0x1115
0x1116
0x1117
0x1118
0x1119
0x111A
0x111B
0x111C
0x111D
0x111E
0x111F
0x1200 ~
0x121F
0x1108
0x1109
0x110A
0x110B
0x110C
0x110D
0x110E
0x110F
0x1100
0x1101
0x1102
0x1103
0x1104
0x1105
0x1106
0x1107
34369
34370
34371
34372
34373
34374
34375
34376
34377
34378
34379
34380
34381
34382
34383
34384
34609 ~
34640
34361
34362
34363
34364
34365
34366
34367
34368
34353
34354
34355
34356
34357
34358
34359
34360
Flow Control
0x0000: Off
0x0001: On
0xFFFF: No port
Port 1 Flow
Control
Port 2 Flow
Control
Port 3 Flow
Control
Port 4 Flow
Control
Port 5 Flow
Control
Port 6 Flow
Control
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
0x1200
0x1201
0x1202
0x1203
0x1204
0x1205
34609
34610
34611
34612
34613
34614
146 EKI-7720 Series User Manual
Catalog
Port Info
Name Data Type Interpretation Address
Offset (Hex)
1 word 16 bits HEX 0x1206
Address
3X
34615
Description
Port 22 Flow
Control
Port 23 Flow
Control
Port 24 Flow
Control
Port 25 Flow
Control
Port 26 Flow
Control
Port 27 Flow
Control
Port 28 Flow
Control
Port 29 Flow
Control
Port 30 Flow
Control
Port 31 Flow
Control
Port 32 Flow
Control
Port 14 Flow
Control
Port 15 Flow
Control
Port 16 Flow
Control
Port 17 Flow
Control
Port 18 Flow
Control
Port 19 Flow
Control
Port 20 Flow
Control
Port 21 Flow
Control
Port 7 Flow
Control
Port 8 Flow
Control
Port 9 Flow
Control
Port 10 Flow
Control
Port 11 Flow
Control
Port 12 Flow
Control
Port 13 Flow
Control
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
0x1207
0x1208
0x1209
0x120A
0x120B
0x120C
0x120D
0x120E
0x120F
0x1210
0x1211
0x1212
0x1213
0x1214
0x1215
0x1216
0x1217
0x1218
0x1219
0x121A
0x121B
0x121C
0x121D
0x121E
0x121F
34616
34617
34618
34619
34620
34621
34622
34623
34624
34625
34626
34627
34628
34629
34630
34631
34632
34633
34634
34635
34636
34637
34638
34639
34640
EKI-7720 Series User Manual 147
Catalog
Port Info
Name Data Type
Port Descrip tion
20 words
40 chars
Port 9
Description
Port 10
Description
Port 11
Description
Port 12
Description
Port 13
Description
Port 14
Description
Port 15
Description
Port 16
Description
Port 1
Description
Port 2
Description
Port 3
Description
Port 4
Description
Port 5
Description
Port 6
Description
Port 7
Description
Port 8
Description
Port 17
Description
Port 18
Description
Port 19
Description
Port 20
Description
Port 21
Description
Port 22
Description
Port 23
Description
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
20 words
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
Interpretation Address
Offset (Hex)
ASCII 0x1400 ~
0x166C
Address
3X
35121 ~
35741
Description
Port Description
Port Description =
"100RX,RJ45."
Word 0 Hi byte = '1'
Word 0 Lo byte = '0'
Word 1Hi byte = '0'
Word 1 Lo byte = ‘R’
Word 2 Hi byte = 'X'
Word 2 Lo byte = ‘,’
Word 3 Hi byte = 'R'
Word 3 Lo byte = ‘J’
Word 4 Hi byte = ‘4’
Word 4 Lo byte = ‘5’
Word 5 Hi byte = ‘.’
Word 5 Lo byte = ‘\0’
ASCII 0x1400 35121
0x1414
0x1428
0x143C
0x1450
0x1464
0x1478
0x148C
0x14A0
0x14B4
0x14C8
0x14DC
0x14F0
0x1504
0x1518
0x152C
0x1540
0x1554
0x1568
0x157C
0x1590
0x15A4
0x15B8
35141
35161
35181
35201
35221
35241
35261
35281
35301
35321
35341
35361
35381
35401
35421
35441
35461
35481
35501
35521
35541
35561
148 EKI-7720 Series User Manual
Catalog
Port Info
Name
Port 24
Description
Port 25
Description
Port 26
Description
Port 27
Description
Port 28
Description
Port 29
Description
Port 30
Description
Port 31
Description
Port 32
Description
Link Up Coun ter
Data Type Interpretation Address
Offset (Hex)
0x15CC 20 words
20 words
20 words
20 words
20 words
20 words
20 words
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
40 chars
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
ASCII
20 words
20 words
40 chars
40 chars
ASCII
ASCII
1 word 16 bits HEX
0x15E0
0x15F4
0x1608
0x161C
0x1630
0x1644
0x1658
0x166C
0x1700 ~
0x171F
Address
3X
35581
35601
35621
35641
35661
35681
35701
35721
35741
35889 ~
35920
Description
Link Up Counter
Ex: port link up counter =
13
Received MODBUS response: 0x000D
Port 1 Link Up
Counter
Port 2 Link Up
Counter
Port 3 Link Up
Counter
Port 4 Link Up
Counter
Port 5 Link Up
Counter
Port 6 Link Up
Counter
Port 7 Link Up
Counter
Port 8 Link Up
Counter
Port 9 Link Up
Counter
Port 10 Link
Up Counter
Port 11 Link
Up Counter
Port 12 Link
Up Counter
Port 13 Link
Up Counter
Port 14 Link
Up Counter
Port 15 Link
Up Counter
Port 16 Link
Up Counter
Port 17 Link
Up Counter
Port 18 Link
Up Counter
Port 19 Link
Up Counter
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
0x1700
0x1701
0x1702
0x1703
0x1704
0x1705
0x1706
0x1707
0x1708
0x1709
0x170A
0x170B
0x170C
0x170D
0x170E
0x170F
0x1710
0x1711
0x1712
35889
35890
35891
35892
35893
35894
35895
35896
35897
35898
35899
35900
35901
35902
35903
35904
35905
35906
35907
EKI-7720 Series User Manual 149
Catalog
Port Info
Packet Info
Port 8 Tx
Packets
Port 9 Tx
Packets
Port 10 Tx
Packets
Port 11 Tx
Packets
Port 12 Tx
Packets
Port 13 Tx
Packets
Port 1 Tx
Packets
Port 2 Tx
Packets
Port 3 Tx
Packets
Port 4 Tx
Packets
Port 5 Tx
Packets
Port 6 Tx
Packets
Port 7 Tx
Packets
Name Data Type Interpretation Address
Offset (Hex)
1 word 16 bits HEX 0x1713
Address
3X
35908
Description
Port 27 Link
Up Counter
Port 28 Link
Up Counter
Port 29 Link
Up Counter
Port 30 Link
Up Counter
Port 31 Link
Up Counter
Port 32 Link
Up Counter
Tx Packets
Counter
Port 20 Link
Up Counter
Port 21 Link
Up Counter
Port 22 Link
Up Counter
Port 23 Link
Up Counter
Port 24 Link
Up Counter
Port 25 Link
Up Counter
Port 26 Link
Up Counter
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
1 word 16 bits HEX
4 words
64 bits HEX
0x1714
0x1715
0x1716
0x1717
0x1718
0x1719
0x171A
0x171B
0x171C
0x171D
0x171E
0x171F
0x2000 ~
0x207C
35909
35910
35911
35912
35913
35914
35915
35916
35917
35918
35919
35920
38193 ~
38317
Tx Packets
Ex: port 1 Tx Packet
Amount = 11223344
Received MODBUS response: 0xAB4130
Word 0 = 0x0000
Word 1 = 0x0000
Word 2 = 0x00AB
Word 3 = 0x4130
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
0x2000
0x2004
0x2008
0x200C
0x2010
0x2014
0x2018
0x201C
0x2020
0x2024
0x2028
0x202C
0x2030
38193
38197
38201
38205
38209
38213
38217
38221
38225
38229
38233
38237
38241
150 EKI-7720 Series User Manual
Catalog
Packet Info
Port 1 Rx
Packets
Port 2 Rx
Packets
Port 3 Rx
Packets
Port 4 Rx
Packets
Port 5 Rx
Packets
Port 6 Rx
Packets
Port 7 Rx
Packets
Name
Port 21 Tx
Packets
Port 22 Tx
Packets
Port 23 Tx
Packets
Port 24 Tx
Packets
Port 25 Tx
Packets
Port 26 Tx
Packets
Port 27 Tx
Packets
Port 28 Tx
Packets
Port 14 Tx
Packets
Port 15 Tx
Packets
Port 16 Tx
Packets
Port 17 Tx
Packets
Port 18 Tx
Packets
Port 19 Tx
Packets
Port 20 Tx
Packets
Port 29 Tx
Packets
Port 30 Tx
Packets
Port 31 Tx
Packets
Port 32 Tx
Packets
Rx Packets
Counter
4 words
4 words
4 words
4 words
4 words
4 words
4 words
Data Type Interpretation Address
Offset (Hex)
64 bits HEX 0x2034
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
0x2038
0x203C
0x2040
0x2044
0x2048
0x204C
0x2050
0x2054
0x2058
0x205C
0x2060
0x2064
0x2068
0x206C
0x2070
0x2074
0x2078
0x207C
0x2100
~0x217C
Address
3X
38245
38249
38253
38257
38261
38265
38269
38273
38277
38281
38285
38289
38293
38297
38301
38305
38309
38313
38317
38449 ~
38573
Description
Rx Packets
Ex: port 1 Rx Packet
Amount = 11223344
Received MODBUS response: 0xAB4130
Word 0 = 0x0000
Word 1 = 0x0000
Word 2 = 0x00AB
Word 3 = 0x4130
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
0x2100
0x2104
0x2108
0x210C
0x2110
0x2114
0x2118
38449
38453
38457
38461
38465
38469
38473
EKI-7720 Series User Manual 151
Catalog
Packet Info
Name
Port 23 Rx
Packets
Port 24 Rx
Packets
Port 25 Rx
Packets
Port 26 Rx
Packets
Port 27 Rx
Packets
Port 28 Rx
Packets
Port 29 Rx
Packets
Port 30 Rx
Packets
Port 31 Rx
Packets
Port 32 Rx
Packets
Tx Error Pack ets Counter
Port 15 Rx
Packets
Port 16 Rx
Packets
Port 17 Rx
Packets
Port 18 Rx
Packets
Port 19 Rx
Packets
Port 20 Rx
Packets
Port 21 Rx
Packets
Port 22 Rx
Packets
Port 8 Rx
Packets
Port 9 Rx
Packets
Port 10 Rx
Packets
Port 11 Rx
Packets
Port 12 Rx
Packets
Port 13 Rx
Packets
Port 14 Rx
Packets
Data Type Interpretation Address
Offset (Hex)
64 bits HEX 0x211C
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
2 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
4 words
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
64 bits HEX
32 bits HEX
0x2120
0x2124
0x2128
0x212C
0x2130
0x2134
0x2138
0x213C
0x2140
0x2144
0x2148
0x214C
0x2150
0x2154
0x2158
0x215C
0x2160
0x2164
0x2168
0x216C
0x2170
0x2174
0x2178
0x217C
0x2200 ~
0x223E
Address
3X
38477
38481
38485
38489
38493
38497
38501
38505
38509
38513
38517
38521
38525
38529
38533
38537
38541
38545
38549
38553
38557
38561
38565
38569
38573
38705 ~
38767
Description
Tx Error Packets
Ex: port 1 Tx Packet
Amount = 11223344
Received MODBUS response: 0xAB4130
Word 0 = 0x00AB
Word 1 = 0x4130
Port 1 Tx Error
Packets
Port 2 Tx Error
Packets
2 words
2 words
32 bits HEX
32 bits HEX
0x2200
0x2202
38705
38707
152 EKI-7720 Series User Manual
Catalog
Packet Info
Name
Port 18 Tx
Error Packets
Port 19 Tx
Error Packets
Port 20 Tx
Error Packets
Port 21 Tx
Error Packets
Port 22 Tx
Error Packets
Port 23 Tx
Error Packets
Port 24 Tx
Error Packets
Port 25 Tx
Error Packets
Port 26 Tx
Error Packets
Port 27 Tx
Error Packets
Port 28 Tx
Error Packets
Port 29 Tx
Error Packets
Port 30 Tx
Error Packets
Port 31 Tx
Error Packets
Port 32 Tx
Error Packets
Port 3 Tx Error
Packets
Port 4 Tx Error
Packets
Port 5 Tx Error
Packets
Port 6 Tx Error
Packets
Port 7 Tx Error
Packets
Port 8 Tx Error
Packets
Port 9 Tx Error
Packets
Port 10 Tx
Error Packets
Port 11 Tx
Error Packets
Port 12 Tx
Error Packets
Port 13 Tx
Error Packets
Port 14 Tx
Error Packets
Port 15 Tx
Error Packets
Port 16 Tx
Error Packets
Port 17 Tx
Error Packets
Data Type Interpretation Address
Offset (Hex)
32 bits HEX 0x2204
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
0x2206
0x2208
0x220A
0x220C
0x220E
0x2210
0x2212
0x2214
0x2216
0x2218
0x221A
0x221C
0x221E
0x2220
0x2222
0x2224
0x2226
0x2228
0x222A
0x222C
0x222E
0x2230
0x2232
0x2234
0x2236
0x2238
0x223A
0x223C
0x223E
Address
3X
38709
38711
38713
38715
38717
38719
38721
38723
38725
38727
38729
38731
38733
38735
38737
38739
38741
38743
38745
38747
38749
38751
38753
38755
38757
38759
38761
38763
38765
38767
Description
EKI-7720 Series User Manual 153
Catalog
Packet Info
Name
Rx Error Pack ets Counter
Data Type
2 words
Interpretation Address
Offset (Hex)
32 bits HEX 0x2300 ~
0x233E
32 bits HEX 0x2300
Address
3X
38961 ~
39023
Description
Rx Error Packets
Ex: port 1 Rx Packet
Amount = 11223344
Received MODBUS response: 0xAB4130
Word 0 = 0x00AB
Word 1 = 0x4130
38961
Port 17 Rx
Error Packets
Port 18 Rx
Error Packets
Port 19 Rx
Error Packets
Port 20 Rx
Error Packets
Port 21 Rx
Error Packets
Port 22 Rx
Error Packets
Port 23 Rx
Error Packets
Port 24 Rx
Error Packets
Port 25 Rx
Error Packets
Port 26 Rx
Error Packets
Port 27 Rx
Error Packets
Port 9 Rx
Error Packets
Port 10 Rx
Error Packets
Port 11 Rx
Error Packets
Port 12 Rx
Error Packets
Port 13 Rx
Error Packets
Port 14 Rx
Error Packets
Port 15 Rx
Error Packets
Port 16 Rx
Error Packets
Port 1 Rx
Error Packets
Port 2 Rx
Error Packets
Port 3 Rx
Error Packets
Port 4 Rx
Error Packets
Port 5 Rx
Error Packets
Port 6 Rx
Error Packets
Port 7 Rx
Error Packets
Port 8 Rx
Error Packets
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
2 words
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
0x2302
0x2304
0x2306
0x2308
0x230A
0x230C
0x230E
0x2310
0x2312
0x2314
0x2316
0x2318
0x231A
0x231C
0x231E
0x2320
0x2322
0x2324
0x2326
0x2328
0x232A
0x232C
0x232E
0x2330
0x2332
0x2334
38963
38965
38967
38969
38971
38973
38975
38977
38979
38981
38983
38985
38987
38989
38991
38993
38995
38997
38999
39001
39003
39005
39007
39009
39011
39013
154 EKI-7720 Series User Manual
Catalog
Packet Info
Name
Port 28 Rx
Error Packets
Port 29 Rx
Error Packets
Port 30 Rx
Error Packets
Port 31 Rx
Error Packets
Port 32 Rx
Error Packets
Data Type Interpretation Address
Offset (Hex)
32 bits HEX 0x2336 2 words
2 words
2 words
2 words
2 words
32 bits HEX
32 bits HEX
32 bits HEX
32 bits HEX
0x2338
0x233A
0x233C
0x233E
Address
3X
39015
39017
39019
39021
39023
Description
EKI-7720 Series User Manual 155
Chapter
5
Troubleshooting
5
5.1
Troubleshooting
Verify that the device is using the right power cord/adapter (DC 48V); please do not use a power adapter with DC output higher than 48V, or the device may be damaged.
Select the proper UTP/STP cable to construct the user network. Use unshielded twisted-pair (UTP) or shield twisted-pair (STP) cable for RJ-45 connections that depend on the connector type the switch equipped: 100R Category 3, 4 or 5 cable for 10Mbps connections, 100R Category 5 cable for 100Mbps connec tions, or 100R Category 5e/above cable for 1000Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters
(328 feet).
R = replacement letter for Ohm symbol.
Diagnosing LED Indicators: To assist in identifying problems, the switch can be easily monitored through panel indicators, which describe common problems the user may encounter, so the user can be guided towards possible solutions.
If the power indicator does not light on when the power cord is plugged in, you may have a problem with power cord. Check for loose power connections, power losses, or surges, at the power outlet. If you still cannot resolve the prob lem, contact a local dealer for assistance.
If the LED indicators are normal and the connected cables are correct but pack ets still cannot be transmitted, please check the user system's Ethernet device configuration or status.
EKI-7716 Series User Manual 157
www.advantech.com
Please verify specifications before quoting. This guide is intended for reference purposes only.
All product specifications are subject to change without notice.
No part of this publication may be reproduced in any form or by any means, electronic, photocopying, recording or otherwise, without prior written permis
-
sion of the publisher.
All brand and product names are trademarks or registered trademarks of their respective companies.
© Advantech Co., Ltd. 2021
advertisement
Related manuals
advertisement
Table of contents
- 17 Specifications
- 18 Hardware Views
- 18 1.2.1 Front View
- 20 1.2.2 Rear View
- 21 1.2.3 Top View
- 21 Dimensions
- 23 Installation Guidelines
- 23 2.1.1 Connecting Hardware
- 23 Verifying Switch Operation
- 23 Installing the Switch
- 23 2.3.1 DIN Rail Mounting
- 25 2.3.2 Wall-Mounting
- 27 Installing and Removing SFP Modules
- 28 2.4.1 Installing SFP Modules
- 29 2.4.2 Removing SFP Modules
- 30 Connecting the Switch to Ethernet Ports
- 30 2.5.1 RJ45 Ethernet Cable Wiring
- 31 Connecting the Switch to Console Port
- 32 Power Supply Installation
- 32 2.7.1 Overview
- 33 2.7.2 Considerations
- 33 2.7.3 Grounding the Device
- 34 2.7.4 Wiring a Relay Contact
- 35 2.7.5 Wiring the Power Inputs
- 36 Reset Button
- 38 First Time Setup
- 38 3.1.1 Overview
- 38 3.1.2 Introduction
- 38 3.1.3 Administrative Interface Access
- 39 3.1.4 Using the Graphical (Web) Interface
- 39 3.1.5 Configuring the Switch for Network Access
- 40 3.1.6 Configuring the Ethernet Ports
- 41 Command Line Interface Configuration
- 41 3.2.1 Introduction to Command-Line Interface (CLI)
- 41 3.2.2 Accessing the CLI
- 42 Web Browser Configuration
- 42 3.3.1 Preparing for Web Configuration
- 42 3.3.2 System Login
- 44 Log In
- 44 Recommended Practices
- 44 4.2.1 Changing Default Password
- 45 Monitoring
- 45 4.3.1 Device Information
- 46 4.3.2 Logging Message
- 47 4.3.3 Port Monitoring
- 49 4.3.4 Link Aggregation
- 49 4.3.5 LLDP Statistics
- 50 4.3.6 IGMP Statistics
- 51 4.3.7 MLD Statistics
- 53 System
- 53 4.4.1 IP Settings
- 54 4.4.2 IPv6 Settings
- 54 4.4.3 DHCP Client Option
- 56 4.4.4 DHCP Auto Provision
- 56 4.4.5 Management VLAN
- 57 4.4.6 System Time
- 58 4.4.7 Network Port
- 60 L2 Switching
- 60 4.5.1 Port Configuration
- 61 4.5.2 Port Mirror
- 62 4.5.3 Link Aggregation
- 66 4.5.4 802.1Q VLAN
- 70 4.5.5 Q-in-Q
- 72 4.5.6 GARP
- 73 4.5.7 802.3az EEE
- 74 4.5.8 Multicast
- 79 4.5.9 Jumbo Frame
- 79 4.5.10 Spanning Tree
- 85 4.5.11 X-Ring Elite
- 86 4.5.12 X-Ring Pro
- 89 4.5.13 Loopback Detection
- 90 4.5.14 ERPS
- 92 MAC Address Table
- 92 4.6.1 Static MAC
- 92 4.6.2 MAC Aging Time
- 93 4.6.3 Dynamic Forwarding Table
- 94 Security
- 94 4.7.1 Storm Control
- 95 4.7.2 Port Security
- 96 4.7.3 Protected Ports
- 96 4.7.4 DoS Prevention
- 99 4.7.5 Applications
- 101 4.7.6 802.1x
- 102 4.7.7 IP Security
- 104 4.7.8 Security Login
- 106 4.7.9 Access Control List
- 109 4.7.10 IP Source Guard
- 111 4.7.11 DHCP Snooping
- 114 4.7.12 ARP Spoofing
- 115 4.8.1 General
- 120 4.8.2 QoS Basic Mode
- 122 4.8.3 Rate Limit
- 124 4.8.4 Bandwidth Guarantee
- 126 Management
- 126 4.9.1 LLDP
- 130 4.9.2 SNMP
- 133 4.9.3 Power Over Ethernet
- 135 4.9.4 TCP Modbus Settings
- 136 4.9.5 DHCP Server
- 140 4.9.6 SMTP Client
- 142 4.9.7 RMON
- 146 4.9.8 NTP Server
- 147 Diagnostics
- 147 4.10.1 Cable Diagnostics
- 147 4.10.2 Ping Test
- 148 4.10.3 IPv6 Ping Test
- 150 4.10.4 System Log
- 152 4.10.5 DDM
- 153 4.10.6 LED Indication
- 154 Tools
- 154 4.11.1 IXM
- 154 4.11.2 Backup Manager
- 155 4.11.3 Upgrade Manager
- 156 4.11.4 Dual Image
- 157 4.11.5 Save Configuration
- 157 4.11.6 User Account
- 158 4.11.7 N-Key
- 158 4.11.8 Reset System
- 158 4.11.9 Reboot Device
- 159 Modbus/TCP Mapping
- 159 4.12.1 Modbus/TCP Mapping Table
- 172 Troubleshooting