Advantech EKI-7559MI 8FE+2FE SC Multi-mode Managed Ethernet Switch User Manual

Add to My manuals
105 Pages

advertisement

Advantech EKI-7559MI 8FE+2FE SC Multi-mode Managed Ethernet Switch User Manual | Manualzz

EKI-7559MI/SI

8+2 100FX Port Managed

Redundant Industrial

Ethernet Switch (Wide Temp.)

User Manual

Copyright

The documentation and the software included with this product are copyrighted 2010 by

Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co., Ltd. Information provided in this manual is intended to be accurate and reliable. However, Advantech Co., Ltd. assumes no responsibility for its use, nor for any infringements of the rights of third parties, which may result from its use.

Acknowledgements

Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corp.

All other product names or trademarks are properties of their respective owners.

Part No.

Printed in China

2nd Edition

October 2010

EKI-7559MI_SI User Manual ii

Product Warranty (2 years)

Advantech warrants to you, the original purchaser, that each of its products will be free from defects in materials and workmanship for two years from the date of purchase.

This warranty does not apply to any products which have been repaired or altered by persons other than repair personnel authorized by Advantech, or which have been subject to misuse, abuse, accident or improper installation. Advantech assumes no liability under the terms of this warranty as a consequence of such events.

Because of Advantech′s high quality-control standards and rigorous testing, most of our customers never need to use our repair service. If an Advantech product is defective, it will be repaired or replaced at no charge during the warranty period. For out-of-warranty repairs, you will be billed according to the cost of replacement materials, service time and freight. Please consult your dealer for more details.

If you think you have a defective product, follow these steps:

1. Collect all the information about the problem encountered. (For example, network speed,

Advantech products used, other hardware and software used etc.) Note anything abnormal and list any onscreen messages you get when the problem occurs.

2. Call your dealer and describe the problem. Please have your manual, product, and any helpful information readily available.

3. If your product is diagnosed as defective, obtain an RMA (return merchandize authorization) number from your dealer. This allows us to process your return more quickly.

4. Carefully pack the defective product, a fully-completed Repair and Replacement Order

Card and a photocopy proof of purchase date (such as your sales receipt) in a shippable container. A product returned without proof of the purchase date is not eligible for warranty service.

5. Write the RMA number visibly on the outside of the package and ship it prepaid to your dealer.

iii

Declaration of Conformity

CE

This product has passed the CE test for environmental specifications. Test conditions for passing included the equipment being operated within an industrial enclosure. In order to protect the product from being damaged by ESD (Electrostatic Discharge) and EMI leakage, we strongly recommend the use of CE-compliant industrial enclosure products.

FCC Class A

This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.

Technical Support and Assistance

Step 1. Visit the Advantech web site at

www.advantech.com/support

where you can find the latest information about the product.

Step 2. Contact your distributor, sales representative, or Advantech’s customer service

center for technical support if you need additional assistance. Please have the

following information ready before you call:

- Product name and serial number

- Description of your peripheral attachments

- Description of your software (operating system, version, application software

etc.)

- A complete description of the problem

- The exact wording of any error messages

EKI-7559MI_SI User Manual iv

Safety Instructions

1. Read these safety instructions carefully.

2. Keep this User's Manual for later reference.

3. Disconnect this equipment from any AC outlet before cleaning. Use a damp cloth. Do not use liquid or spray detergents for cleaning.

4. For plug-in equipment, the power outlet socket must be located near the equipment and must be easily accessible.

5. Keep this equipment away from humidity.

6. Put this equipment on a reliable surface during installation. Dropping it or letting it fall may cause damage.

7. The openings on the enclosure are for air convection. Protect the equipment from overheating. DO NOT COVER THE OPENINGS.

8. Make sure the voltage of the power source is correct before connecting the equipment to the power outlet.

9. Position the power cord so that people cannot step on it. Do not place anything over the power cord.

10. All cautions and warnings on the equipment should be noted.

11. If the equipment is not used for a long time, disconnect it from the power source to avoid damage by transient overvoltage.

12. Never pour any liquid into an opening. This may cause fire or electrical shock.

13. Never open the equipment. For safety reasons, the equipment should be opened only by qualified service personnel.

14. If one of the following situations arises, get the equipment checked by service personnel: a. The power cord or plug is damaged. b. Liquid has penetrated into the equipment. c. The equipment has been exposed to moisture. d. The equipment does not work well, or you cannot get it to work according to the user's manual. e. The equipment has been dropped and damaged. f. The equipment has obvious signs of breakage.

15. DO NOT LEAVE THIS EQUIPMENT IN AN ENVIRONMENT WHERE THE STORAGE

TEMPERATURE MAY GO BELOW -40 ℃ (-40℉) OR ABOVE 85 ℃ (185 ℉ ). THIS

COULD DAMAGE THE EQUIPMENT. THE EQUIPMENT SHOULD BE IN A

CONTROLLED ENVIRONMENT.

v

Safety Precaution - Static Electricity

Follow these simple precautions to protect yourself from harm and the products from damage.

1. To avoid electrical shock, always disconnect the power from your equipment chassis before you work on it.

2. Disconnect power before making any configuration changes.

EKI-7559MI_SI User Manual vi

Contents

Chapter 1 Overview............................................. 2

1.1

Introduction ........................................................... 2

1.1.1

High-Speed Transmissions ............................ 2

1.1.2

Dual Power Inputs.......................................... 2

1.1.3

Flexible Mounting ........................................... 2

1.1.4

Wide Operating Temperature......................... 2

1.1.5

Easy Troubleshooting .................................... 2

1.2

Features................................................................ 3

1.3

Specifications ........................................................ 4

1.4

Packing List........................................................... 6

1.5

Safety Precaution.................................................. 6

Chapter 2 Installation ......................................... 8

2.1

LED Indicators....................................................... 8

Table 2.1: EKI-7559MI/SI LED Definition.....................................8

2.2

Dimensions (units: mm) ........................................ 9

Figure 2.2-1 Front View of EKI-7559MI/SI ................................9

Figure 2.2-2 Side View of EKI-7559MI/SI ................................10

Figure 2.2-3 Rear View of EKI-7559MI/SI ...............................11

Figure 2.2-4 Top View of EKI-7559MI/SI.................................12

2.3

Mounting ............................................................. 13

2.3.1

Wall mounting .............................................. 13

Figure 2.3-1 Combine the Metal Mounting Kit..........................13

2.3.2

DIN-rail Mounting ......................................... 14

Figure 2.3-2 Installation to DIN-rail Step 1................................14

Figure 2.3-3 Installation to DIN-rail Step 2................................15

2.4

Network Connection............................................ 16

2.5

Power Connection............................................... 17

Figure 2.5-1 Pinouts of the Power Connector ............................17

2.6

X-Ring Application............................................... 18

2.7

Coupling Ring Application ................................... 19

2.8

Dual Homing Application..................................... 20

Chapter 3 Configuration ................................... 22

3.1

RS-232 Console.................................................. 22

Figure 3.1-1 Console Cable ........................................................22

Figure 3.1-2 Launching Hyper Terminal....................................22

Figure 3.1-3 COM Port Properties Setting .................................23

Figure 3.1-4 Login Screen: RS-232 Configuration ....................23

Figure 3.1-5 Command Line Interface .......................................24

3.2

Commands Set ................................................... 25

3.2.1

Commands Level ......................................... 25

Table 3.1: Command Level............................................................25

3.2.2

Commands Set List...................................... 25

Table 3.2: Commands Set List.......................................................25

vii Contents

3.2.3

System Commands Set ............................... 26

Table 3.3: System Commands Set .................................................26

3.2.4

Port Commands Set..................................... 27

Table 3.4: Port Commands Set .....................................................27

3.2.5

Trunk Commands Set .................................. 28

Table 3.5: Trunk Commands Set ..................................................28

3.2.6

VLAN Commands Set .................................. 28

Table 3.6: VLAN Commands Set .................................................28

3.2.7

Spanning Tree Commands Set.................... 29

Table 3.7: Spanning Tree Commands Set.....................................29

3.2.8

QOS Commands Set ................................... 30

Table 3.8: QOS Commands Set ....................................................30

3.2.9

IGMP Commands Set .................................. 31

Table 3.9: QOS Commands Set ....................................................31

3.2.10

Mac/Filter Table Commands Set ............. 31

Table 3.10: Mac/Filter Table Commands Set ................................31

3.2.11

SNMP Commands Set ............................ 31

Table 3.11: SNMP Commands Set ................................................31

3.2.12

Port Mirroring Commands Set ................. 32

Table 3.12: Port Mirroring Commands Set....................................32

3.2.13

802.1x Commands Set ............................ 33

Table 3.13: 802.1x Commands Set ...............................................33

3.2.14

TFTP Commands Set.............................. 34

Table 3.14: TFTP Commands Set.................................................34

3.2.15

SystemLog, SMTP and Event ................. 34

Table 3.15: SysLog,SMTP,Event Commands Set ........................34

3.2.16

SNTP Commands Set ............................. 35

Table 3.16: SNTP Commands Set .................................................35

3.2.17

X-ring Commands Set ............................. 35

Table 3.17: X-ring Commands Set ................................................35

3.3

Web Browser....................................................... 37

Figure 3.3-1 Type the address in the URL .................................37

Figure 3.3-2 Web Login Window...............................................37

Figure 3.3-3 Main page...............................................................38

3.3.1

System ......................................................... 39

Figure 3.3-4 System Information................................................39

Figure 3.3-5 IP Configuration.....................................................40

Figure 3.3-6 DHCP Server - System Configuration...................41

Figure 3.3-7 DHCP Server – Client Entries ...............................42

Figure 3.3-8 DHCP Server – Port and IP Binding......................43

Figure 3.3-9 TFTP – Update Firmware ......................................44

Figure 3.3-10 TFTP – Restore Configuration...............................45

Figure 3.3-11 TFTP – Backup Configuration...............................46

Figure 3.3-12 Syslog Configuration .............................................47

Figure 3.3-13 SMTP Configuration..............................................48

Figure 3.3-14 Event Configuration...............................................49

Figure 3.3-15 Fault Relay Alarm..................................................50

EKI-7559MI_SI User Manual viii

Table 3.18: UTC Timezone ...........................................................51

Figure 3.3-16 SNTP Configuration ..............................................52

Figure 3.3-17 IP Security..............................................................53

Figure 3.3-18 User Authentication ...............................................54

3.3.2

Port............................................................... 55

Figure 3.3-19 Port Statistics .........................................................55

Figure 3.3-20 Port Control............................................................56

Figure 3.3-21 Aggregator Setting .................................................57

Figure 3.3-22 2 work ports with LACP disabled..........................58

Figure 3.3-23 Static trunking group of 2 ports .............................58

Figure 3.3-24 Aggregator Information .........................................59

Figure 3.3-25 State Activity .........................................................60

Figure 3.3-26 Port Mirroring ........................................................61

Figure 3.3-27 Rate Limiting .........................................................62

3.3.3

Protocol ........................................................ 63

Figure 3.3-28 VLAN Configuration .............................................63

Figure 3.3-29 Port based mode .....................................................64

Figure 3.3-30 Port based mode-Add interface..............................65

Figure 3.3-31 Port based mode-Edit/Delete interface ..................65

Figure 3.3-32 802.1Q VLAN Configuration ................................67

Figure 3.3-33 Edit Group Configuration interface .......................68

Figure 3.3-34 802.1Q Group Configuration—Edit ......................68

Figure 3.3-35 RSTP System Configuration interface...................69

Figure 3.3-36 RSTP Port Configuration interface ........................70

Figure 3.3-37 SNMP System Configuration interface .................71

Figure 3.3-38 Trap Configuration interface..................................72

Figure 3.3-39 SNMP V3 Configuration interface ........................74

Figure 3.3-40 QoS Configuration interface ..................................75

Table 3.19: IGMP types .................................................................77

Figure 3.3-41 IGMP Configuration interface ...............................77

Figure 3.3-42 X-ring interface ......................................................79

Figure 3.3-43 LLDP Configuration interface ...............................80

3.3.4

Security ........................................................ 81

Figure 3.3-44 802.1x/Radius System Configuration ....................81

Figure 3.3-45 802.1x/Radius - Port Setting ..................................82

Figure 3.3-46 802.1x/Radius - Misc Configuration......................83

Figure 3.3-47 Static MAC Addresses interface ............................84

Figure 3.3-48 MAC Filtering interface.........................................85

Figure 3.3-49 All MAC Address interface ...................................86

Figure 3.3-50 All MAC Address interface ...................................87

Figure 3.3-51 Factory Default interface .......................................88

Figure 3.3-52 Save Configuration interface .................................89

Figure 3.3-53 System Reboot interface ........................................90

Chapter 4 Troubleshooting .............................. 92

Appendix A Pin Assignments & Wiring ......... 94

Figure A.1: RJ-45 Pin Assignments...............................................94

Figure A.2: EIA/TIA-568B............................................................94

Figure A.3: EIA/TIA-568A ...........................................................94

Figure A.4: DB 9-pin female connector ........................................95

ix Contents

Overview

Sections include:

z

Introduction

z z z

Features

Specifications

Packing List

Safety Precaution

z

1 Chapter1

Chapter 1 Overview

1.1 Introduction

To create reliability in your network, the EKI-7559MI/SI comes equipped with a proprietary redundant network protocol—X-Ring that was developed by Advantech, which provides users with an easy way to establish a redundant Ethernet network with ultra high-speed recovery time less than 10 ms.

Aside from 8 x 10/100Base-TX fast Ethernet ports, the EKI-7559MI/SI comes equipped with 2 100Mbps fiber expansion ports. The fiber ports can be used for the application of wideband uploading and long distance transmissions to fit the field request flexibility.

The EKI-7559MI/SI includes a switch controller that can automatically sense transmission speeds (10/100 Mbps). The RJ-45 interface can also be auto-detected, so MDI or MDI-X is automatically selected and a crossover cable is not required. All

Ethernet ports have memory buffers that support the store-and-forward mechanism.

This assures that data is properly transmitted.

1.1.2 Dual Power Inputs

To reduce the risk of power failure, EKI-7559MI/SI provides +12 ~ 48 V

DC

dual power inputs. If there is power failure, EKI-7559MI/SI will automatically switch to the secondary power input.

EKI-7559MI/SI is compact and can be mounted on a DIN-rail or panel, so it is suitable for any space-constrained environment.

1.1.4 Wide Operating Temperature

The operating temperature of the EKI-7559MI/SI is between -40 ~ 75 o

C. With such a wide range, you can use the EKI-7559MI/SI in some of the harshest industrial environments that exist.

LED indicators make troubleshooting quick and easy. Each 10/100 Base-TX port has 2

LEDs that display the link status, transmission speed and collision status. Also the indicators PWR, PWR1, PWR2, R.M., and P-Fail help you diagnose immediately.

EKI-7559MI_SI User Manual 2

1.2 Features

• Provides 8 x 10/100 Mbps Ethernet ports with RJ45 connector

• Provides 2 x 100 Mbps single-mode SC type fiber ports (EKI-7559MI: Multi-mode,

EKI-7559SI: Single-mode.)

• Redundancy: X-Ring (ultra high-speed recovery time<10ms), RSTP/STP (802.1w/1D)

• Management: Web, Telnet, Serial Console, Windows Utility and SNMP

• Control: VLAN/GVRP, QOS, IGMP Snooping, LACP, and Rate Limit

• Security: IP/MAC and port binding, DHCP Server, IP access list, 802.1x, SNMPv3

• Diagnostic: Port Statistic, Port Mirroring, RMON, Trap, SNMP Alert, and Syslog

• Dual 12 ~ 48 V

DC

power input and 1 Relay Output

• Supports wide operating temperature from -40 o

C ~ 75

• Robust mechanism and special heat spreader design o

C

3 Chapter1

1.3 Specifications

Communications

Standard

LAN

Transmission Distance

Transmission Speed

Interface

Connectors

LED Indicators

Console

Power

Power Consumption

Power Input

Overload Current Protection

Relay Alarm

Mechanism

Dimensions (WxHxD)

Enclosure

Mounting

Environment

Operating Temperature

Operating Humidity

Storage Temperature

Storage Humidity

MTBF

IEEE 802.3, 802.3ad, 802.3u, 802.3x

IEEE 802.1D, 802.1w, 802.1p, 802.1Q, 802.1X,

802.1ab

10/100Base-TX, 100Base-FX

Ethernet: Up to 100 m

Single Mode Fiber: Up to 30 km

Up to 100 Mbps

8 x RJ-45

2 x SC type fiber connectors

6-pin removable screw terminal (power & relay)

PWR, PWR1, PWR2, R.M., P-Fail, 10/100 Mbps

RS-232 (RJ-45)

Max. 8.4W

2 x Unregulated +12 ~ 48 V

DC

(0.7A max.)

3.5A@12V

DC

(Fuse)

1 Relay Output

79 x 152 x 105 mm

IP30, metal shell with solid mounting kits

DIN-rail, wall

-10 ~ 60 o

C (standard model)

-40 ~ 75 o

C (wide operating temp. model)

5 ~ 95% (non-condensing)

-40 ~ 85 o C (-40 ~ 185 o

F)

0 ~ 95% (non-condensing)

274,038 hours

EKI-7559MI_SI User Manual 4

Certifications

Safety

EMC

Freefall

Shock

Vibration

UL, 60950-1, CAN/CSA-C22.2 No.60950

EU: EN55011, EN61000-6-4

EN55022, Class A,

EN61000-3-2/3

EN55024

IEC61000-4-2/3/4/5/6/8

EN61000-6-2

IEC60068-2-32

IEC60068-2-27

IEC60068-2-6

5 Chapter1

• 1 x EKI-7559MI/SI Industrial Managed Gigabit Ethernet Switch

• 1 x eAutomation Industrial Communication CD-ROM with software, and User manual

• 2 x Wall Mounting Bracket and Screws

• 1 x DIN-rail Mounting Bracket and Screws

• 1 x 8-pin RJ-45 to RS-232 serial cable

• 1 x DC Jack Cable φ2.0/150mm

• 1 x EKI-7559MI/SI Startup Manual

Attention IF DC voltage is supplied by an external circuit, please use a protection device on the power supply input.

EKI-7559MI_SI User Manual 6

Installation

Sections include:

z

LED Indicators

z

Dimensions

Mounting

z z z z z z

Network Connection

Connection to a Fiber Optic Network

Power Connection

X-Ring Application

Couple Ring Application

Dual Homing Application

z

7 Chapter2

Chapter 2 Installation

In this chapter, you will be given an overview of EKI-7559MI/SI hardware installation procedures.

There are few LEDs located on the front panel indicate the power status and network status of EKI-

7559MI/SI. Each of them has its own specific meaning shown as below.

Table 2.1: EKI-7559MI/SI LED Definition

On

PWR Green

Off

System power on

No power input

On

R.M. Green

Off

On

PWR1 Green

Off

The industrial switch is the master of the X-ring group

The industrial switch is not the master of the X-ring group

Power input 1 is active

On

PWR2 Green

Off

Power input 1 is inactive

Power input 2 is active

On

P-Fail Red

Off

On

Link/Active

(9, 10)

Green

Flashing

Off

Power input 2 is inactive

Power input 1 or 2 is inactive or port link down

(depends on Fault Relay Alarm configuration)

Power input 1 and 2 are both active, or no power input

Connected to network

Networking is active

Not connected to network

Link/Active

(1~8)

Duplex/Collision

(1~8)

Green

Orange

On Connected to network

Flashing Networking is active

Off

On

Not connected to network

Ethernet port full duplex

Flashing Collision of packets occurs

Off Ethernet port half duplex or not connected to network

EKI-7559MI_SI User Manual 8

2.2 Dimensions (units: mm)

Figure 2.2-1 Front View of EKI-7559MI/SI

9 Chapter2

Figure 2.2-2 Side View of EKI-7559MI/SI

EKI-7559MI_SI User Manual 10

Figure 2.2-3 Rear View of EKI-7559MI/SI

11 Chapter2

Figure 2.2-4 Top View of EKI-7559MI/SI

EKI-7559MI_SI User Manual 12

2.3 Mounting

The EKI-7559MI/SI supports two mounting methods: DIN-rail & Wall.

EKI-7559MI/SI can be wall-mounted by using the included mounting kit. Then, hang on the EKI-

7559MI/SI to the nails on the wall.

First, use the screws included in the package to combine the EKI-7559MI/SI and metal mounting kit. And then you can install the device firmly via the components. Please see the figure below.

Unit: mm

Figure 2.3-1 Combine the Metal Mounting Kit

13 Chapter2

Mounting

You can also mount EKI-7559MI/SI on a standard DIN-rail by steps below.

The DIN-rail kit is screwed on the industrial switch when out of factory. If the DIN-rail kit is not screwed on the industrial switch, please screw the DIN-rail kit on the switch first.

First, hang the EKI-7559MI/SI to the DIN-rail with angle of inclination. See the figure below.

Figure 2.3-2 Installation to DIN-rail Step 1

EKI-7559MI_SI User Manual 14

Then, hook the device over the DIN rail and let it drop down straight to slide over the rail smoothly.

Figure 2.3-3 Installation to DIN-rail Step 2

15 Chapter2

EKI-7559MI/SI has 8 x RJ-45 ports that support connection to 10 Mbps Ethernet, or 100 Mbps Fast

Ethernet, and half or full duplex operation. EKI-7559MI/SI can be connected to other hubs or switches via a twisted-pair straight-through or crossover cable up to 100m long. The connection can be made from any TX port of EKI-7559MI/SI (MDI-X) to another hub or switch either MDI-X or uplink MDI port. Besides,

EKI-7559MI/SI provides fiber ports for long distance uplinks up to 30km (single mode).

EKI-7559MI/SI supports auto-crossover to make networking more easy and flexible. You can connect any RJ-45 (MDI-X) port on the switch to any device such as a switch, bridge or router.

EKI-7559MI_SI User Manual 16

The EKI-7559MI/SI supports dual +12 ~ 48 V

DC

power inputs and power-fail relay output.

Figure 2.5-1 Pinouts of the Power Connector

You can connect an alarm indicator, buzzer or other signaling equipment through the relay output. The relay opens if power input 1, 2 fails or port link down/break (″Open″ means if you connect relay output with an LED, the light would be off).

17 Chapter2

The industrial switch supports the X-Ring protocol that can help the network system recover from network connection failure within 10ms or less and make the network system more reliable. The X-Ring algorithm is similar to Spanning Tree Protocol (STP) and Rapid STP (RSTP) algorithm but its recovery time is less than STP/RSTP. The figure below is a sample of X-Ring application.

Note The Ethernet switches with firmware version before v3.0 use the X-Ring function that has the limitation as follows. However, the one with firmware version after v3.0 (included) use the X-Ring Pro function that gets rid of the limitation.

1. The X-Ring is supposed to recover from connection failure within

10ms when the amount of the connected devices of the X-Ring group is less than 50.

EKI-7559MI_SI User Manual 18

2.7 Coupling Ring Application

As the illustration shown below, users can use the X-Ring groups to form a coupling ring for redundant backup. It can ensure the transmissions between X-Ring groups not to fail. The following figure is a sample of coupling ring application.

Note The Ethernet switches with firmware version before v3.0 use the X-Ring function that has the limitations as follows. However, the ones with firmware version after v3.0 (included) use the X-Ring Pro function that gets rid of the limitations.

1. To ensure the coupling ring to work normally, the connection between control ports of each X-ring group, as the figure illustrated above, should always be active.

2. The switches to be configured as members of the Coupling Ring group cannot be the X-Ring Master device of their X-ring group.

3. As the figure illustrated above, Coupling Ring only supports two X-ring groups.

19 Chapter2

2.8 Dual Homing Application

The Dual Homing function is to prevent the connection loss between the particular X-Ring group and the upper level/core switch. Assign one port, and only one, to be the Dual Homing port that is the backup port in each single X-Ring group. The Dual Homing function only works when the X-Ring function is active.

Note The Ethernet switches with firmware version before v3.0 use the X-Ring function that has the limitations as follows. However, the ones with firmware version after v3.0 (included) use the X-Ring Pro function that gets rid of the limitations.

1. In Dual Homing application architecture, the upper level switches need to enable their Rapid Spanning Tree protocol.

2. The switches to be configured as members of the Dual Homing group cannot be the X-Ring Master device of their X-ring group.

3. As the figure illustrated above, Dual Homing only supports two X-ring groups.

EKI-7559MI_SI User Manual 20

Configuration

Sections include:

z

RS-232 Console

z

Commands Set

z

Web Browser

21 Chapter3

Chapter 3 Configuration

The EKI-7559MI/SI can be configured via RS-232 Console or a web browser.

EKI-7559MI/SI’s RS-232 console is designed for rapidly configuring which provides the console management—CLI command.

Attach the supplied cable, which one end is RJ-45 and the other end is female DB9, to connect EKI-

7559MI/SI and your host PC or terminal. The connected PC or terminal must support the terminal emulation program.

From the Windows desktop, click:

Figure 3.1-1 Console Cable

Start/Programs/Accessories/Communications/HyperTerminal

to open the Hyper Terminal program.

Figure 3.1-2 Launching Hyper Terminal

EKI-7559MI_SI User Manual 22

Select the appropriate COM port, and set the parameter as the figure shown below (9600 for Baud Rate,

8

for Data Bits, None for Parity, 1 for Stop Bits, and None for Flow Control).

Figure 3.1-3 COM Port Properties Setting

Press Enter for login screen (If you can not find the login screen, press Enter one more time). The default user name and password are both “admin”. Key-in the user name and password to enter the command line interface.

Figure 3.1-4 Login Screen: RS-232 Configuration

23 Chapter3

After you have logged in to the system, you will see a command prompt. To enter CLI management interface, type in “enable” command.

Figure 3.1-5 Command Line Interface

EKI-7559MI_SI User Manual 24

The following table lists the CLI commands and description.

Table 3.1: Command Level

Modes

User EXEC

Access Method

Begin a session with your switch.

Prompt

switch>

Privileged

EXEC

Enter the enable command while in user EXEC mode.

Global

Configuration

VLAN database

Interface configuration

Enter the configure command while in privileged EXEC mode.

Enter the vlan

database

command while in privileged

EXEC mode.

Enter the interface command with a specific interface while in the Global

Configuration mode switch# switch(config)# switch(vlan)# switch(config-if)#

Exit Method About This Model

Enter logout or quit. The user commands available at the user level are a subset of those available at the privileged level.

Use this mode to

Perform basic tests.

Display system information.

Enter disable to exit. The privileged commands are the advanced mode. Use this mode to

Display advanced function status

Save configuration

To exit to the

Privileged EXEC mode, enter exit or

end

To return to the User

EXEC mode, enter

exit

.

Use this mode to configure the parameters to be applied to your switch

Use this mode to configure

VLAN-specific parameters.

To return to the previous mode, enter

exit

or end.

Use this mode to configure the parameters for the switch and

Ethernet ports.

3.2.2 Commands Set List

Table 3.2: Commands Set List

Command Code Word

User EXEC E

Privileged EXEC

Global configuration

P

G

VLAN database

Interface configuration

V

I

25 Chapter3

Commands show config show terminal write memory system name

[System Name] system location

[System Location] system description

[System Description] system contact

[System Contact] show system-info ip address

[Ip-address] [Subnet-mask]

[Gateway] ip dhcp show ip no ip dhcp reload default admin username

[Username] admin password

[Password] show admin dhcpserver enable

Dhcpserver disable dhcpserver lowip

[Low IP] dhcpserver highip

[High IP] dhcpserver subnetmask

[Subnet mask] dhcpserver gateway

[Gateway] dhcpserver dnsip

[DNS IP] dhcpserver leasetime

[Hours] dhcpserver ipbinding

[IP address] show dhcpserver configuration show dhcpserver clients show dhcpserver ip-binding no dhcpserver security enable security http security telnet security ip

[Index(1..10)] [IP Address]

3.2.3 System Commands Set

Table 3.3: System Commands Set

Level

G

Description Example

E

Show switch configuration

P

Show console information

P

Save user configuration into permanent memory (flash rom)

Configure system name

G

G

Set switch system location string switch>show config switch#show terminal switch#write memory switch(config)#system name xxx switch(config)#system location xxx

G

Set switch system description string switch(config)#system description xxx

G

Set switch system contact window string switch(config)#system contact xxx

E

Show system information switch>show system-info

Configure the IP address of switch switch(config)#ip address 192.168.1.1

G

G

P

Show IP information of switch

G

Disable DHCP client function of switch

G

Halt and perform a cold restart

G

Restore to default

G

G

Enable DHCP client function of switch

Changes a login username.

(maximum 10 words)

Specifies a password

(maximum 10 words)

P

Show administrator information

G

Enable DHCP Server

255.255.255.0 192.168.1.254

switch(config)#ip dhcp switch#show ip switch(config)#no ip dhcp switch(config)#reload switch(config)#default switch(config)#admin username xxxxxx switch(config)#admin password xxxxxx switch#show admin switch(config)#dhcpserver enable

G

Disable DHCP Server switch(config)#no dhcpserver

Configure low IP address for IP pool switch(config)#dhcpserver lowip 192.168.1.100

G

G

Configure high IP address for IP pool switch(config)#dhcpserver highip 192.168.1.200

Configure subnet mask for DHCP clients switch(config)#dhcpserver subnetmask

255.255.255.0

Configure gateway for DHCP clients switch(config)#dhcpserver gateway 192.168.1.254

G

Configure DNS IP for DHCP clients switch(config)#dhcpserver dnsip 192.168.1.1

G

Configure lease time (in hour) switch(config)#dhcpserver leasetime 1

G

I

Set static IP for DHCP clients by port switch(config)#interface fastEthernet 2 switch(config)#dhcpserver ipbinding 192.168.1.1

P

Show configuration of DHCP server switch#show dhcpserver configuration

P

Show client entries of DHCP server switch#show dhcpserver clients

P

Show IP-Binding information of

DHCP server switch#show dhcpserver ip-binding

Disable DHCP server function switch(config)#no dhcpserver

G

Enable IP security function switch(config)#security enable

G

Enable IP security of HTTP server switch(config)#security http

G

Enable IP security of telnet server switch(config)#security telnet

G

Set the IP security list switch(config)#security ip 1 192.168.1.55

G

EKI-7559MI_SI User Manual 26

show security

Show the information of IP security switch#show security

P no security

Disable IP security function switch(config)#no security

G no security http

Disable IP security of HTTP server switch(config)#no security http

G no security telnet

Disable IP security of telnet server switch(config)#no security telnet

G

3.2.4 Port Commands Set

Table 3.4: Port Commands Set

interface fastEthernet

[Portid]

duplex

[full | half]

speed

Commands

[10|100|1000|auto]

no flowcontrol security enable no security bandwidth type all bandwidth type broadcast-multicastflooded-unicast bandwidth type broadcast-multicast bandwidth type broadcast-only bandwidth in

[Value]

bandwidth out

[Value]

show bandwidth state

[Enable | Disable]

Level Description Example

Choose the port for modification. switch(config)#interface fastEthernet 2

G

I

I

Use the duplex configuration command to specify the duplex mode of operation for Fast

Ethernet. switch(config)#interface fastEthernet 2 switch(config-if)#duplex full

Use the speed configuration command to specify the speed mode of operation for Fast

Ethernet., the speed can’t be set to

1000 if the port isn’t a giga port..

Disable flow control of interface switch(config)#interface fastEthernet 2 switch(config-if)#speed 100 switch(config-if)#no flowcontrol

I

I

I

Enable security of interface

Disable security of interface switch(config)#interface fastEthernet 2 switch(config-if)#security enable switch(config)#interface fastEthernet 2 switch(config-if)#no security

I

Set interface ingress limit frame type to “accept all frame” switch(config)#interface fastEthernet 2 switch(config-if)#bandwidth type all

I

I

I

I

I

I

Set interface ingress limit frame type to “accept broadcast, multicast, and flooded unicast frame”

Set interface ingress limit frame type to “accept broadcast and multicast frame”

Set interface ingress limit frame type to “only accept broadcast frame” switch(config)#interface fastEthernet 2 switch(config-if)#bandwidth type broadcast-

multicast-flooded-unicast

switch(config)#interface fastEthernet 2 switch(config-if)#bandwidth type broadcast-

multicast

switch(config)#interface fastEthernet 2 switch(config-if)#bandwidth type broadcast-only

Set interface input bandwidth. Rate

Range is from 100 kbps to 102400 kbps or to 256000 kbps for giga ports, and zero means no limit.

Set interface output bandwidth.

Rate Range is from 100 kbps to

102400 kbps or to 256000 kbps for giga ports, and zero means no limit. switch(config)#interface fastEthernet 2 switch(config-if)#bandwidth in 100 switch(config)#interface fastEthernet 2 switch(config-if)#bandwidth out 100

Show interfaces bandwidth control switch(config)#interface fastEthernet 2 switch(config-if)#show bandwidth

Use the state interface configuration command to specify the state mode of operation for

Ethernet ports. Use the disable switch(config)#interface fastEthernet 2 switch(config-if)#state Disable

27 Chapter3

form of this command to disable the port.

show interface configuration show interface status show interface accounting no accounting

I

I

I

I

show interface configuration status switch(config)#interface fastEthernet 2 switch(config-if)#show interface configuration show interface actual status switch(config)#interface fastEthernet 2 switch(config-if)#show interface status show interface statistic counter switch(config)#interface fastEthernet 2 switch(config-if)#show interface accounting

Clear interface accounting information switch(config)#interface fastEthernet 2 switch(config-if)#no accounting

3.2.5 Trunk Commands Set

Table 3.5: Trunk Commands Set

Commands aggregator priority

[1~65535]

aggregator activityport

[ Group ID ]

[Port Numbers]

aggregator group

[GroupID] [Port-list]

lacp workp

[Workport]

aggregator group

[GroupID] [Port-list]

nolacp show aggregator no aggregator lacp

[GroupID]

Level

G

Description

Set port group system priority

Set activity port

G

Example

switch(config)#aggregator priority 22 switch(config)#aggregator activityport 2

G

G

P

Assign a trunk group with LACP active.

[GroupID] :1~3

[Port-list]:Member port list, This parameter could be a port range(ex.1-4) or a port list separate by a comma(ex.2, 3, 6)

[Workport]: The amount of work ports, this value could not be less than zero or be large than the amount of member ports.

Assign a static trunk group.

[GroupID] :1~3

[Port-list]:Member port list, This parameter could be a port range(ex.1-4) or a port list separate by a comma(ex.2, 3, 6) switch(config)#aggregator group 1 1-4 lacp workp

2

or switch(config)#aggregator group 2 1,4,3 lacp

workp 3

switch(config)#aggregator group 1 2-4 nolacp or switch(config)#aggregator group 1 3,1,2 nolacp

Show the information of trunk group switch#show aggregator 1 or switch#show aggregator 2 or switch#show aggregator 3

Disable the LACP function of trunk group switch(config)#no aggreator lacp 1

G

switch(config)#no aggreator group 2

no aggregator group

[GroupID]

G

Remove a trunk group

3.2.6 VLAN Commands Set

Table 3.6: VLAN Commands Set

Commands vlan database

Vlanmode

Level Description

P

Enter VLAN configure mode

V

To set switch VLAN mode.

Example

switch#vlan database switch(vlan)#vlanmode portbase

EKI-7559MI_SI User Manual 28

[portbase| 802.1q | gvrp]

no vlan

Ported based VLAN configuration vlan port-based grpname

[Group Name]

grpid

[GroupID]

port

[PortNumbers]

show vlan

[GroupID] or

show vlan no vlan group

[GroupID]

V

No VLAN

V

V

V

Add new port based VALN

Show VLAN information

Delete port base group ID or switch(vlan)#vlanmode 802.1q or switch(vlan)#vlanmode gvrp

Switch(vlan)#no vlan switch(vlan)#vlan port-based grpname test grpid

2 port 2-4

or switch(vlan)#vlan port-based grpname test grpid

2 port 2,3,4

switch(vlan)#show vlan 23 switch(vlan)#no vlan group 2

IEEE 802.1Q VLAN vlan 8021q name

[GroupName]

vid

[VID]

vlan 8021q port

[PortNumber]

access-link untag

[UntaggedVID]

vlan 8021q port

[PortNumber]

trunk-link tag

[TaggedVID List]

vlan 8021q port

[PortNumber]

hybrid-link untag

[UntaggedVID]

tag

[TaggedVID List]

vlan 8021q trunk

[PortNumber]

access-link untag

[UntaggedVID]

vlan 8021q trunk

[PortNumber]

trunk-link tag

[TaggedVID List]

V

V

V

V

V

Change the name of VLAN group, if the group didn’t exist, this command can’t be applied. switch(vlan)#vlan 8021q name test vid 22

Assign a access link for VLAN by port, if the port belong to a trunk group, this command can’t be applied.

Assign a trunk link for VLAN by port, if the port belong to a trunk group, this command can’t be applied.

Assign a hybrid link for VLAN by port, if the port belong to a trunk group, this command can’t be applied. switch(vlan)#vlan 8021q port 3 access-link untag

33

switch(vlan)#vlan 8021q port 3 trunk-link tag

2,3,6,99

or switch(vlan)#vlan 8021q port 3 trunk-link tag 3-20 switch(vlan)#vlan 8021q port 3 hybrid-link untag 4

tag 3,6,8

or switch(vlan)#vlan 8021q port 3 hybrid-link untag 5

tag 6-8

Assign a access link for VLAN by trunk group switch(vlan)#vlan 8021q trunk 3 access-link untag

33 vlan 8021q trunk

[PortNumber]

hybrid-link untag

[UntaggedVID]

tag

[TaggedVID List]

show vlan

[GroupID] or

show vlan

V

V

V

Assign a trunk link for VLAN by trunk group

Assign a hybrid link for VLAN by trunk group switch(vlan)#vlan 8021q trunk 3 trunk-link tag

2,3,6,99

or switch(vlan)#vlan 8021q trunk 3 trunk-link tag 3-

20

switch(vlan)#vlan 8021q trunk 3 hybrid-link untag

4 tag 3,6,8

or switch(vlan)#vlan 8021q trunk 3 hybrid-link untag

5 tag 6-8

Show VLAN information

no vlan group

[GroupID]

V

Delete port base group ID

3.2.7 Spanning Tree Commands Set

Table 3.7: Spanning Tree Commands Set

switch(vlan)#show vlan 23 switch(vlan)#no vlan group 2

Commands spanning-tree enable

Level

G

Description

Enable spanning tree

Example

switch(config)#spanning-tree enable

29 Chapter3

spanning-tree priority

[0~61440]

spanning-tree max-age

[seconds]

spanning-tree hello-time

[seconds]

spanning-tree forward-time

[seconds]

stp-path-cost

[1~200000000]

stp-path-priority

[Port Priority]

stp-admin-p2p

[Auto|True|False]

stp-admin-edge

[True|False]

stp-admin-non-stp

[True|False]

show spanning-tree no spanning-tree

G

G

G

Configure spanning tree priority parameter

Use the spanning-tree max-age global configuration command to change the interval between messages the spanning tree receives from the root switch. If a switch does not receive a bridge protocol data unit (BPDU) message from the root switch within this interval, it recomputed the Spanning Tree Protocol (STP) topology.

Use the spanning-tree hello-time global configuration command to specify the interval between hello bridge protocol data units

(BPDUs). switch(config)#spanning-tree priority 32767 switch(config)#spanning-tree max-age 15 switch(config)#spanning-tree hello-time 3

G

I

I

Use the spanning-tree forwardtime global configuration command to set the forwarding-time for the specified spanning-tree instances.

The forwarding time determines how long each of the listening and learning states last before the port begins forwarding.

Use the spanning-tree cost interface configuration command to set the path cost for Spanning

Tree

Protocol (STP) calculations. In the event of a loop, spanning tree considers the path cost when selecting an interface to place into the forwarding state.

Use the spanning-tree port-priority interface configuration command to configure a port priority that is used when two switches tie for position as the root switch. switch(config)#spanning-tree forward-time 20 switch(config)#interface fastEthernet 2 switch(config-if)#stp-path-cost 20 switch(config)#interface fastEthernet 2 switch(config-if)#stp-path-priority 128

I

I

I

Admin P2P of STP priority on this interface.

Admin Edge of STP priority on this interface.

Admin NonSTP of STP priority on this interface.

E

Displays a summary of the spanning-tree states.

G

Disable spanning-tree. switch(config)#interface fastEthernet 2 switch(config-if)#stp-admin-p2p Auto switch(config)#interface fastEthernet 2 switch(config-if)#stp-admin-edge True switch(config)#interface fastEthernet 2 switch(config-if)#stp-admin-non-stp False switch>show spanning-tree switch(config)#no spanning-tree

3.2.8 QOS Commands Set

Table 3.8: QOS Commands Set

Commands qos policy

[weighted-fair|strict]

qos prioritytype

[port-based|cos-only|tos-only|cosfirst|tos-first]

qos priority portbased

[Port] [lowest|low|middle|high]

qos priority cos

[Priority][lowest|low|middle|high]

qos priority tos

[Priority][lowest|low|middle|high]

Level

G

Description

Select QOS policy scheduling

Setting of QOS priority type

G

Configure Port-based Priority

G

G

Configure COS Priority

Configure TOS Priority

G

Example

switch(config)#qos policy weighted-fair switch(config)#qos prioritytype switch(config)#qos priority portbased 1 low switch(config)#qos priority cos 0 middle switch(config)#qos priority tos 3 high

EKI-7559MI_SI User Manual 30

show qos no qos

P

G

Displays the information of QoS configuration

Disable QoS function

3.2.9 IGMP Commands Set

Table 3.9: QOS Commands Set

Switch#show qos switch(config)#no qos

Commands Level Description Example igmp enable

Enable IGMP snooping function switch(config)#igmp enable

G

Igmp-query auto

Set IGMP query to auto mode switch(config)#Igmp-query auto

G

Igmp-query force

Set IGMP query to force mode switch(config)#Igmp-query force

G show igmp configuration show igmp multi no igmp

P

P

Displays the details of an IGMP configuration. switch#show igmp configuration

Displays the details of an IGMP snooping entries. switch#show igmp multi

Disable IGMP snooping function switch(config)#no igmp

G no igmp-query

Disable IGMP query

G

3.2.10 Mac/Filter Table Commands Set

Table 3.10: Mac/Filter Table Commands Set

switch#no igmp-query

Commands mac-address-table static hwaddr

[MAC]

mac-address-table filter hwaddr

[MAC]

show mac-address-table show mac-address-table static show mac-address-table filter no mac-address-table static hwaddr

[MAC]

no mac-address-table filter hwaddr

[MAC]

no mac-address-table

Level Description Example

I

Configure MAC address table of interface (static).

G

Configure MAC address table(filter)

P

Show all MAC address table

P

Show static MAC address table

P

Show filter MAC address table.

I

Remove an entry of MAC address table of interface (static)

G

G

Remove an entry of MAC address table (filter)

Remove dynamic entry of MAC address table switch(config)#interface fastEthernet 2 switch(config-if)#mac-address-table static hwaddr

000012345678

switch(config)#mac-address-table filter hwaddr

000012348678

switch#show mac-address-table switch#show mac-address-table static switch#show mac-address-table filter switch(config)#interface fastEthernet 2 switch(config-if)#no mac-address-table static

hwaddr 000012345678

switch(config)#no mac-address-table filter hwaddr

000012348678

switch(config)#no mac-address-table

3.2.11 SNMP Commands Set

Table 3.11: SNMP Commands Set

Commands snmp system-name

[System Name]

Level

G

Description

Set SNMP agent system name

Example

switch(config)#snmp system-name l2switch

31 Chapter3

snmp system-location

[System Location]

snmp system-contact

[System Contact]

snmp agent-mode

[v1v2c|v3|v1v2cv3]

snmp community-strings

[Community]

right

[RO/RW]

snmp-server host

[IP address]

community

[Community-string]

trap-version

[v1|v2c]

snmpv3 context-name

[Context Name ]

snmpv3 user

[User Name]

group

[Group Name]

password

[Authentication Password] [Privacy

Password]

snmpv3 access context-name

[Context Name ]

group

[Group Name ]

security-level

[NoAuthNoPriv|AuthNoPriv|AuthPriv]

match-rule

[Exact|Prifix]

views

[Read View Name] [Write View Name]

[Notify View Name]

snmpv3 mibview view

[View Name]

type

[Excluded|Included]

sub-oid

[OID]

show snmp no snmp community-strings

[Community]

no snmp-server host

[Host-address]

no snmpv3 user

[User Name]

no snmpv3 access context-name

[Context Name ]

group

[Group Name ]

security-level

[NoAuthNoPriv|AuthNoPriv|AuthPriv]

match-rule

[Exact|Prifix]

views

[Read View Name] [Write View Name]

[Notify View Name]

no snmpv3 mibview view

[View Name]

type

[Excluded|Included]

sub-oid

[OID]

G

G

G

G

G

G

G

G

G

switch(config)#snmp-server host 192.168.1.50

community public trap-version v1

(remove)

Switch(config)#

no snmp-server host

192.168.1.50

switch(config)#snmpv3 context-name Test

Configure the userprofile for

SNMPV3 agent. Privacy password could be empty. switch(config)#snmpv3 user test01 group G1

password AuthPW PrivPW

switch(config)#snmpv3 access context-name Test

group G1 security-level AuthPriv match-rule Exact views V1 V1 V1

P

Show SNMP configuration

G

switch#show snmp

Remove the specified community.

switch(config)#no snmp community-strings public

G

G

G

G

Set SNMP agent system location switch(config)#snmp system-location lab

Set SNMP agent system contact switch(config)#snmp system-contact where

Select the agent mode of SNMP switch(config)#snmp agent-mode v1v2cv3

Add SNMP community string.

Configure SNMP server host information and community string

Configure the context name

Configure the access table of

SNMPV3 agent

Configure the mibview table of

SNMPV3 agent switch(config)#snmp community-strings public

right rw

switch(config)#snmpv3 mibview view V1 type

Excluded sub-oid 1.3.6.1

Remove the SNMP server host. switch(config)#no snmp-server 192.168.1.50

Remove specified user of SNMPv3 agent. switch(config)#no snmpv3 user Test

Remove specified access table of

SNMPv3 agent. switch(config)#no snmpv3 access context-name

Test group G1 security-level AuthPr iv match-rule Exact views V1 V1 V1

Remove specified mibview table of

SNMPV3 agent. switch(config)#no snmpv3 mibview view V1 type

Excluded sub-oid 1.3.6.1

3.2.12 Port Mirroring Commands Set

Table 3.12: Port Mirroring Commands Set

EKI-7559MI_SI User Manual 32

monitor rx monitor tx monitor

[RX|TX|Both]

show monitor no monitor

Commands show monitor

Level

G

G

Description Example

Set RX destination port of monitor function

Set TX destination port of monitor function switch(config)#monitor rx switch(config)#monitor tx

Show port monitor information switch#show monitor

P

I

I

I

Configure source port of monitor function

Show port monitor information

Disable source port of monitor function switch(config)#interface fastEthernet 2 switch(config-if)#monitor RX switch(config)#interface fastEthernet 2 switch(config-if)#show monitor switch(config)#interface fastEthernet 2 switch(config-if)#no monitor

3.2.13 802.1x Commands Set

Table 3.13: 802.1x Commands Set

8021x enable

[IP address]

[port ID]

[port ID]

[words]

Commands

8021x system radiusip

8021x system serverport

8021x system accountport

8021x system sharekey

[ID]

8021x system nasid

8021x misc quietperiod

[sec.]

8021x misc txperiod

[sec.]

8021x misc supportimeout

8021x misc servertimeout

8021x misc maxrequest

[sec.]

[sec.]

[number]

8021x misc reauthperiod [sec.]

8021x portstate

[disable | reject | accept | authorize] show 8021x

Level

G

G

G

G

G

G

G

G

G

G

G

G

I

E

Description Example

Use the 802.1x global configuration command to enable

802.1x protocols.

Use the 802.1x system radius IP global configuration command to change the radius server IP.

Use the 802.1x system server port global configuration command to change the radius server port

Use the 802.1x system account port global configuration command to change the accounting port

Use the 802.1x system share key global configuration command to change the shared key value.

Use the 802.1x system nasid global configuration command to change the NAS ID

Use the 802.1x misc quiet period global configuration command to specify the quiet period value of the switch. switch(config)# 8021x enable switch(config)# 8021x system radiusip 192.168.1.1 switch(config)# 8021x system serverport 1815 switch(config)# 8021x system accountport 1816 switch(config)# 8021x system sharekey 123456 switch(config)# 8021x system nasid test1 switch(config)# 8021x misc quietperiod 10

Use the 802.1x misc TX period global configuration command to set the TX period.

Use the 802.1x misc supp timeout global configuration command to set the supplicant timeout.

Use the 802.1x misc server timeout global configuration command to set the server timeout.

Use the 802.1x misc max request global configuration command to set the MAX requests.

Use the 802.1x misc reauth period global configuration command to set the reauth period.

Use the 802.1x port state interface configuration command to set the state of the selected port.

Displays a summary of the 802.1x properties and also the port sates.

switch(config)# 8021x misc txperiod 5 switch(config)# 8021x misc supportimeout 20 switch(config)#8021x misc servertimeout 20 switch(config)# 8021x misc maxrequest 3 switch(config)# 8021x misc reauthperiod 3000 switch(config)#interface fastethernet 3 switch(config-if)#8021x portstate accept switch>show 8021x

33 Chapter3

no 8021x G

Disable 802.1x function

3.2.14 TFTP Commands Set

Table 3.14: TFTP Commands Set

switch(config)#no 8021x

Commands backup flash:backup_cfg restore flash:restore_cfg upgrade flash:upgrade_fw

Level Description Defaults Example

G

G

G

Save configuration to TFTP and need to specify the IP of TFTP server and the file name of image. switch(config)#backup flash:backup_cfg switch(config)#restore flash:restore_cfg Get configuration from TFTP server and need to specify the IP of TFTP server and the file name of image.

Upgrade firmware by TFTP and need to specify the IP of TFTP server and the file name of image. switch(config)#upgrade lash:upgrade_fw

3.2.15 SystemLog, SMTP and Event

Table 3.15: SysLog,SMTP,Event Commands Set

Commands systemlog ip

[IP address]

systemlog mode

[client|server|both]

show systemlog show systemlog no systemlog smtp enable smtp serverip

[IP address]

smtp authentication smtp account

[account]

smtp password

[password]

smtp rcptemail

[Index] [Email address]

show smtp no smtp event device-cold-start

[Systemlog|SMTP|Both] event authentication-failure

[Systemlog|SMTP|Both]

event X-ring-topology-change

[Systemlog|SMTP|Both]

event systemlog

[Link-UP|Link-Down|Both]

event smtp

[Link-UP|Link-Down|Both]

show event no event device-cold-start no event authentication-failure no event X-ring-topology-change no event systemlog

Level Description Example

G

Set System log server IP address.

switch(config)# systemlog ip 192.168.1.100

Specified the log mode switch(config)# systemlog mode both

G

E

Displays system log.

P

Show system log client & server information

G

Disable systemlog functon

G

Enable SMTP function

G

Configure SMTP server IP switch>show systemlog switch#show systemlog switch(config)#no systemlog switch(config)#smtp enable switch(config)#smtp serverip 192.168.1.5

G

Enable SMTP authentication

G

switch(config)#smtp authentication

Configure authentication account switch(config)#smtp account User

G

Configure authentication password switch(config)#smtp password

G

Configure Rcpt e-mail Address switch(config)#smtp rcptemail 1

[email protected]

P

Show the information of SMTP

G

Disable SMTP function

Set cold start event type

G

switch#show smtp switch(config)#no smtp switch(config)#event device-cold-start both

G

G

Set Authentication failure event type

Set X - ring topology changed event type

Set port event for system log switch(config)#event authentication-failure both switch(config)#event X-ring-topology-change both

I

I

Set port event for SMTP switch(config)#interface fastethernet 3 switch(config-if)#event systemlog both switch(config)#interface fastethernet 3 switch(config-if)#event smtp both

P

Show event selection

G

Disable cold start event type

G

Disable Authentication failure event type switch#show event switch(config)#no event device-cold-start switch(config)#no event authentication-failure

G

Disable X - ring topology changed event type switch(config)#no event X-ring-topology-change

I

Disable port event for system log switch(config)#interface fastethernet 3

EKI-7559MI_SI User Manual 34

no event smpt

Disable port event for SMTP

I show systemlog

P

Show system log client & server information

3.2.16 SNTP Commands Set

Table 3.16: SNTP Commands Set

switch(config-if)#no event systemlog switch(config)#interface fastethernet 3 switch(config-if)#no event smtp switch#show systemlog

sntp enable sntp daylight sntp daylight-period

[Start time] [End time]

sntp daylight-offset

[Minute]

sntp ip

[IP]

Commands sntp timezone

[Timezone]

show sntp show sntp timezone

Level Description

Enable SNTP function

G

Example

switch(config)#sntp enable

G

G

G

Enable daylight saving time, if

SNTP function is inactive, this command can’t be applied. switch(config)#sntp daylight

Set period of daylight saving time, if SNTP function is inactive, this command can’t be applied.

Parameter format:

[yyyymmdd-hh:mm] switch(config)# sntp daylight-period 20060101-

01:01 20060202-01-01

Set offset of daylight saving time, if

SNTP function is inactive, this command can’t be applied. switch(config)#sntp daylight-offset 3 switch(config)#sntp ip 192.169.1.1

G

Set SNTP server IP, if SNTP function is inactive, this command can’t be applied.

G

Set timezone index, use “show sntp timzezone” command to get more information of index number

P

Show SNTP information

Show index number of time zone

P

list switch(config)#sntp timezone 22 switch#show sntp switch#show sntp timezone switch(config)#no sntp switch(config)#no sntp daylight

no sntp no sntp daylight

G

G

Disable SNTP function

Disable daylight saving time

3.2.17 X-ring Commands Set

Table 3.17: X-ring Commands Set

Commands ring enable ring master ring couplering ring dualhoming ring ringport

[1st Ring Port] [2nd Ring Port]

ring couplingport

[Coupling Port]

ring controlport

[Control Port]

ring homingport

[Dual Homing Port]

show ring no ring no ring master

Level Description Example

P

G

G

G

G

G

G

Enable X-ring

Enable ring master

Enable couple ring

Enable dual homing

Configure 1st/2nd Ring Port

G

G

Configure Coupling Port

Configure Control Port

G

G

Configure Dual Homing Port switch(config)#ring enable switch(config)#ring master switch(config)#ring couplering switch(config)#ring dualhoming switch(config)#ring ringport 7 8 switch(config)#ring couplingport 1 switch(config)#ring controlport 2 switch(config)#ring homingport 3

Show the information of X - Ring switch#show ring

Disable X-ring switch(config)#no ring

Disable ring master switch(config)# no ring master

35 Chapter3

no ring couplering no ring dualhoming

G

G

Disable couple ring

Disable dual homing switch(config)# no ring couplering switch(config)# no ring dualhoming

EKI-7559MI_SI User Manual 36

EKI-7559MI/SI provides a convenient configuring way via web browser. You can follow the steps below to access EKI-7559MI/SI.

EKI-7559MI/SI’s default IP is 192.168.1.1. Make sure your host PC and EKI-7659 are on the same logical sub-network.

Warning Your host PC should be in the same VLAN setting with EKI-7559MI/SI, or the management will not be configured.

Connect EKI-7559MI/SI to the Ethernet then your host PC could be configured via Ethernet. Or you can directly connect EKI-7559MI/SI to your host PC with a straight-through or cross over Ethernet cable.

Before to use web management, install the industrial switch on the network and make sure that any one of the PCs on the network can connect with the industrial switch through the web browser. The industrial switch default value of IP, subnet mask, username and password are as below:

• IP Address: 192.168.1.1

• Subnet Mask: 255.255.255.0

• Default Gateway: 192.168.1.254

• User Name: admin

• Password: admin

Open Internet Explorer and type EKI-7559MI/SI’s IP in the Address field and then press Enter to bring up the web login dialog box.

Figure 3.3-1 Type the address in the URL

Figure 3.3-2 Web Login Window

The default user name and password are both admin. Fill in the user name and password and then press OK to enter the configuration. You can change the password in the User Authentication section.

37 Chapter3

In the main page, you can find the tree menu structure of the Ethernet switch in the left side. Click the “+” symbol to unroll the hiding hyperlink, and click any one of the hyperlinks to open its function page.

Figure 3.3-3 Main page

EKI-7559MI_SI User Manual 38

3.3.1 System

System Information

Here you can view the system information and assign the system name and location to make this switch more easily to be identified on your network.

System Name: Assign the name of the switch. The maximum length is 64 bytes.

System Description: Displays the description of switch. Read only cannot be modified.

System Location: Assign the switch physical location. The maximum length is 64 bytes.

System Contact: Enter the name of contact person or organization.

Firmware Version: Displays the switch’s firmware version.

Kernel Version: Displays the kernel software version.

MAC Address: Displays the unique hardware address assigned by manufacturer (default).

Warning Don’t set “0” for the first segment of the subnet mask and default gateway

(000.xxx.xxx.xxx).

Refresh the web screen if the web could not be displayed while you change the setting.

Figure 3.3-4 System Information

39 Chapter3

The interface allows users to configure the switch to receive an IP address from DHCP server or manually fill in IP Address, Subnet Mask, Gateway, IP addresses of the primary and the secondary

DNS servers.

DHCP Client: Enable or disable the DHCP client function. When DHCP client function is enabled, the industrial switch will be assigned an IP address from the network DHCP server. The default IP address will be replaced by the assigned IP address on DHCP server. After users click Apply, a popup dialog shows up. It is to inform the user that when the DHCP client is enabled, the current IP will lose and user should find the new IP on the DHCP server.

IP Address: Assign the IP address that the network is using. If DHCP client function is enabled, and then the user doesn’t need to assign the IP address. And, the network DHCP server will assign the IP address displaying in this column for the industrial switch. The default IP is 192.168.1.1.

Subnet Mask: Assign the subnet mask to the IP address. If DHCP client function is enabled, and then the user does not need to assign the subnet mask.

Gateway: Assign the network gateway for the industrial switch. The default gateway is 192.168.1.254.

DNS1: The abbreviation of Domain Name Server—an Internet service that translate domain name into IP addresses. Domain name are alphabetic which are easy to be remembered. Because the

Internet is based on IP address; every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.net.com might translate to 192.168.1.1

DNS2: The backup for DNS1. When DNS1 cannot function, DNS2 will then replace DNS1 immediately.

• And then, click

Apply

.

Figure 3.3-5 IP Configuration

EKI-7559MI_SI User Manual 40

DHCP Server—System configuration

DHCP is the abbreviation of Dynamic Host Configuration Protocol that is a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different

IP address every time it connects to the network. In some systems, the device's IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses.

Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address.

The system provides the DHCP server function. The system provides the DHCP server function. Having enabled the DHCP server function, the switch system can be a DHCP server.

DHCP Server: Enable or Disable the DHCP Server function. Enable—the switch will be the DHCP server on your local network.

Low IP Address: Type in an IP address. Low IP address is the beginning of the dynamic IP range. For example, dynamic IP is in the range between 192.168.1.100 ~ 192.168.1.200. In contrast,

192.168.1.100 is the Low IP address.

High IP Address: Type in an IP address. High IP address is the end of the dynamic IP range. For example, dynamic IP is in the range between 192.168.1.100 ~ 192.168.1.200. In contrast,

192.168.1.200 is the High IP address.

Subnet Mask: Type in the subnet mask of the IP configuration.

Gateway: Type in the IP address of the gateway in your network.

DNS: Type in the Domain Name Server IP Address in your network.

Lease Time (sec): It is the time period that system will reset the dynamic IP assignment to ensure the dynamic IP will not been occupied for a long time or the server doesn’t know that the dynamic IP is idle.

• And then, click

Apply

.

Figure 3.3-6 DHCP Server - System Configuration

41 Chapter3

DHCP Server—Client Entries

When the DHCP server function is active, the system will collect the DHCP client information and displays them here.

Figure 3.3-7 DHCP Server – Client Entries

EKI-7559MI_SI User Manual 42

DHCP Server—Port and IP Bindings

You can assign a specific IP address, which is the IP in dynamic IP assign range, to the specific port.

When a device is connecting to the port and asks for dynamic IP assigning, the system will assign the IP address to the connected device.

Figure 3.3-8 DHCP Server – Port and IP Binding

43 Chapter3

TFTP—Update Firmware

Trivial File Transfer Protocol (TFTP) is a very simple file transfer protocol, with the functionality of a very basic form of FTP.

It provides the functions to allow the user to update the switch firmware. Before updating, make sure you have your TFTP server ready and the firmware image is on the TFTP server.

TFTP Server IP Address: Fill in your TFTP server IP.

Firmware File Name: Type in the name of firmware image.

• And then, click

Apply

.

Figure 3.3-9 TFTP – Update Firmware

EKI-7559MI_SI User Manual 44

TFTP – Restore Configuration

You can restore the configuration from TFTP server. Before doing that, you must put the image file on

TFTP server first and the switch will download back the flash image.

TFTP Server IP Address: Fill in the TFTP server IP.

Restore File Name: Fill in the correct file name for restoring.

• Click

Apply

.

Figure 3.3-10 TFTP – Restore Configuration

45 Chapter3

TFTP—Backup Configuration

You can save current Flash ROM value from the switch to TFTP server, then go to the TFTP restore configuration page to restore the Flash ROM value.

TFTP Server IP Address: fill in the TFTP server IP

Backup File Name: fill the file name

• Click

Apply

.

Figure 3.3-11 TFTP – Backup Configuration

EKI-7559MI_SI User Manual 46

System Event Log—Syslog Configuration

Configure the system event mode to collect system log.

Syslog Client Mode: Select the system log mode—Client Only, Server Only, or Both.

System Log Server IP Address: Assign the system log server IP.

• When Syslog Client Mode is set as Client Only, the system event log will only be reserved in the switch’s RAM until next reboot. When Syslog Client Mode is set as Server Only, the system log will only be sent to the syslog server and you have to type the IP address in the Sysylog Server IP Address column. If the Syslog Client Mode is set as Both, the system log will be reserved in the switch’s RAM and sent to server.

• Click

Reload

to refresh the events log.

• Click

Clear

to clear all current events log.

• After configuring, click

Apply

.

Figure 3.3-12 Syslog Configuration

47 Chapter3

System Event Log—SMTP Configuration

You can set up the mail server IP, mail account, password, and forwarded email account for receiving the event alert.

Email Alert: Enable or disable the email alert function.

SMTP Server IP: Set up the mail server IP address (when Email Alert enabled, this function will then be available).

Sender: Type in an alias of the switch in complete email address format, e.g. [email protected]

, to identify where the event log comes from.

Authentication: Tick the checkbox to enable this function, configuring the email account and password for authentication (when Email Alert enabled, this function will then be available).

Mail Account: Set up the email account, e.g.

Johnadmin , to receive the alert. It must be an existing email account on the mail server, which you had set up in SMTP Server IP Address column.

Password: Type in the password to the email account.

Confirm Password: Reconfirm the password.

Rcpt e-mail Address 1 ~ 6: You can also assign up to 6 e-mail accounts to receive the alert.

• Click

Apply

.

Figure 3.3-13 SMTP Configuration

EKI-7559MI_SI User Manual 48

System Event Log—Event Configuration

When the Syslog/SMTP checkbox is ticked, the event log will be sent to system log server/SMTP server.

Also, per port log (link up, link down, and both) events can be sent to the system log server/SMTP server with the respective checkbox ticked. After configuring, click ‘Apply’ to have the setting take effect.

System event selection: There are 4 event types—Device cold start, Device warm start,

Authentication Failure, and X-ring topology change. Before you can tick the checkbox of each event type, the Syslog Client Mode column on the Syslog Configuration tab/E-mail Alert column on the SMTP

Configuration tab must be enabled first.

¾ Device cold start: When the device executes cold start action, the system will issue a log event.

¾ Device warm start: When the device executes warm start, the system will issue a log event.

¾ Authentication Failure: When the SNMP authentication fails, the system will issue a log event.

¾ X-ring topology change: When the X-ring topology has changed, the system will issue a log event.

Port event selection: Also, before the drop-down menu items are available, the Syslog Client Mode column on the Syslog Configuration tab/E-mail Alert column on the SMTP Configuration tab must be enabled first. Those drop-down menu items have 3 selections—Link UP, Link Down, and Link UP &

Link Down. Disable means no event will be sent to the system log server/SMTP server.

¾ Link UP: The system will issue a log message when port connection links up only.

¾ Link Down: The system will issue a log message when port connection links down only.

¾ Link UP & Link Down: The system will issue a log message when port connection is up and down.

Figure 3.3-14 Event Configuration

49 Chapter3

Fault Relay Alarm

Power Failure: Tick the checkbox to enable the function of lighting up the FAULT LED on the panel when power fails.

Port Link Down/Broken: Tick the checkbox to enable the function of lighting up the FAULT LED on the panel when ports’ states are link-down or broken.

Figure 3.3-15 Fault Relay Alarm

EKI-7559MI_SI User Manual 50

SNTP Configuration

You can configure the SNTP (Simple Network Time Protocol) settings which allow you to synchronize switch clocks on the Internet.

SNTP Client: Enable/disable SNTP function to get the time from the SNTP server.

Daylight Saving Time: Enable/disable daylight saving time function. When daylight saving time is enabled, you need to configure the daylight saving time period.

UTC Timezone: Set the switch location time zone. The following table lists the different location time zone for your reference.

Table 3.18: UTC Timezone

Local Time Zone Conversion from UTC

November Time Zone

Oscar Time Zone

ADT - Atlantic Daylight

AST - Atlantic Standard

EDT - Eastern Daylight

EST - Eastern Standard

CDT - Central Daylight

CST - Central Standard

MDT - Mountain Daylight

MST - Mountain Standard

PDT - Pacific Daylight

PST - Pacific Standard

ADT - Alaskan Daylight

ALA - Alaskan Standard

- 1 hour

-2 hours

-3 hours

-4 hours

HAW - Hawaiian Standard -10 hours

Nome, Alaska

CET - Central European

FWT - French Winter

MET - Middle European

MEWT - Middle European Winter

SWT - Swedish Winter

-11 hours

+1 hour

EET - Eastern European, USSR Zone 1 +2 hours

BT - Baghdad, USSR Zone 2 +3 hours

ZP4 - USSR Zone 3 +4 hours

-5 hours

-6 hours

-7 hours

-8 hours

-9 hours

1 pm

2 pm

3 pm

4 pm

7 am

6 am

5 am

11am

10 am

9 am

8 am

4 am

3 am

2 am

1 am

Time at 12:00 UTC

51 Chapter3

ZP5 - USSR Zone 4

ZP6 - USSR Zone 5

WAST - West Australian Standard

+5 hours

+6 hours

+7 hours

5 pm

6 pm

7 pm

CCT - China Coast, USSR Zone 7 +8 hours 8 pm

JST - Japan Standard, USSR Zone 8 +9 hours 9 pm

EAST - East Australian Standard GST

Guam Standard, USSR Zone 9

IDLE - International Date Line

NZST - New Zealand Standard

NZT - New Zealand

+10 hours

+12 hours

10 pm

Midnight

SNTP Sever URL: Set the SNTP server IP address.

Switch Timer: Displays the current time of the switch.

Daylight Saving Period: Set up the Daylight Saving beginning time and Daylight Saving ending time.

Both will be different in every year.

Daylight Saving Offset (mins): For non-US and European countries, specify the amount of time for day light savings.

Synchronization Interval (secs): The Synchronization Interval is used for sending synchronizing packets periodically. Users can assign the time ranging from 64 to 1024 seconds. The “0” value displaying by default means that you disable the auto-synchronized feature in the SNTP client mode.

You can enable the feature by filling the interval range from 64 ~ 1024 seconds.

• Click

Apply

.

Figure 3.3-16 SNTP Configuration

EKI-7559MI_SI User Manual 52

IP Security

IP security function allows the user to assign 10 specific IP addresses that have permission to access the switch through the web browser for the securing switch management.

IP Security Mode: When this option is in Enable mode, the Enable HTTP Server and Enable Telnet

Server

checkboxes will then be available.

Enable HTTP Server: When this checkbox is ticked, the IP addresses among Security IP1 ~ IP10 will be allowed to access this switch via HTTP service.

Enable Telnet Server: When this checkbox is ticked, the IP addresses among Security IP1 ~ IP10 will be allowed to access this switch via telnet service.

Security IP 1 ~ 10: The system allows the user to assign up to 10 specific IP addresses for access security. Only these 10 IP addresses can access and manage the switch through the HTTP/Telnet service.

• And then, click

Apply

to have the configuration take effect.

Note Remember to execute the “Save Configuration” action, otherwise the new configuration will lose when switch power off.

Figure 3.3-17 IP Security

53 Chapter3

User Authentication

Change web management login user name and password for the management security issue.

User name: Key in the new user name (The default is “admin”).

Password: Key in the new password (The default is “admin”).

Confirm password: Re-type the new password.

• And then, click

Apply

to have the configuration take effect.

Figure 3.3-18 User Authentication

EKI-7559MI_SI User Manual 54

3.3.2 Port

Port setting includes Port Statistics, Port Control, Port Trunk, Port Mirroring, and Rate Limiting. The user can use this interface to set the parameters and control the packet flow among the ports.

Port Statistics

The following information provides the current port statistic information.

Port: Displays the port number.

Type: Displays the media type of the port.

Link: The status of linking—‘Up’ or ‘Down’.

State: The user can set the state of the port as ‘Enable’ or ‘Disable’ via Port Control. When the state is disabled, the port will not transmit or receive any packet.

Tx Good Packet: The counts of transmitting good packets via this port.

Tx Bad Packet: The counts of transmitting bad packets (including undersize [less than 64 bytes], oversize, CRC Align errors, fragments and jabbers packets) via this port.

Rx Good Packet: The counts of receiving good packets via this port.

Rx Bad Packet: The counts of receiving bad packets (including undersize [less than 64 bytes], oversize, CRC error, fragments and jabbers) via this port.

Tx Abort Packet: The aborted packet while transmitting.

Packet Collision: The counts of collision packet.

Packet Dropped: The counts of dropped packet.

Rx Bcast Packet: The counts of broadcast packet.

Rx Mcast Packet: The counts of multicast packet.

• Click

Clear

to clean all counts.

Figure 3.3-19 Port Statistics

55 Chapter3

Port Control

In Port Control, you can pull down the selection items to set the parameters of each port to control the transmitting/receiving packets.

Port: Select the port that you want to configure.

State: Current port status. The port can be set to disable or enable mode. If the port state is set as

‘Disable’, it will not receive or transmit any packet.

Negotiation: Auto and Force. Being set as Auto, the speed and duplex mode are negotiated automatically. When you set it as Force, you have to assign the speed and duplex mode manually.

Speed: It is available for selecting when the Negotiation column is set as Force. When the Negotiation column is set as Auto, this column is read-only.

Duplex: It is available for selecting when the Negotiation column is set as Force. When the Negotiation column is set as Auto, this column is read-only.

Flow Control: Set flow control function as Enable or Disable. When enabled, once the device exceed the input data rate of another device as a result the receiving device will send a PAUSE frame which halts the transmission of the sender for a specified period of time. When disabled, the receiving device will drop the packet if too much to process.

Security: Once the Security selection is set as ‘On’, any access from the device which connects to this port will be blocked unless the MAC address of the device is included in the static MAC address table.

See the segment of Static MAC Table.

• Click

Apply

to have the configuration take effect.

Figure 3.3-20 Port Control

EKI-7559MI_SI User Manual 56

Port Trunk

The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems on a link to allow their Link Aggregation Control instances to reach agreement on the identity of the Link Aggregation Group to which the link belongs, move the link to that

Link Aggregation Group, and enable its transmission and reception functions in an orderly manner. Link aggregation lets you group up to 4 ports into one dedicated connections. This feature can expand bandwidth to a device on the network. LACP operation requires full-duplex mode; for more details please refer to IEEE 802.3ad.

Aggregator setting

System Priority: A value which is used to identify the active LACP. The switch with the lowest value has the highest priority and is selected as the active LACP.

Group ID: There are four trunk groups to be selected. Choose the ‘Group ID’ and click

Select

.

LACP: When enabled, the trunk group is using LACP. A port which joins an LACP trunk group has to make an agreement with its member ports first. When disabled, the trunk group is a static trunk group.

The advantage of having the LACP disabled is that a port joins the trunk group without any handshaking with its member ports. But member ports won’t know that they should be aggregated together to form a logic trunk group.

Work ports: This column field allows the user to type in the total number of active port up to four. With

LACP trunk group, you create a trunk group by connecting two or more switches (e.g. you assign four ports to be the members of a trunk group whose work ports column field is set as two). The exceed ports are standby (the Aggregator Information tab will show standby status on the exceed ports) and can be aggregated if work ports fail. If it is a static trunk group, the number of work ports must equal the total number of group member ports.

• Select the ports to join the trunk group. The system allows four ports maximum to be aggregated in a trunk group. Click

Add

to add the port which is focused to the left field. To remove unwanted ports,

select the port and click

Remov

.

• When LACP enabled, you can configure LACP Active/Passive status for each port on State Activity page.

• Click

Apply

.

• Use

Apply

to delete Trunk Group. Select the Group ID and click

Delete

.

Figure 3.3-21 Aggregator Setting

57 Chapter3

Aggregator Information

When you have set up the aggregator setting with LACP disabled, you will see the local static trunk group information as below.

Figure 3.3-22 2 work ports with LACP disabled

Figure 3.3-23 Static trunking group of 2 ports

EKI-7559MI_SI User Manual 58

When you have set up the aggregator setting of two interconnected switches with LACP enabled, you will see the respective LACP trunk group information as below.

Figure 3.3-24 Aggregator Information

59 Chapter3

State Activity

Having set up the LACP aggregator on the tab of Aggregator Setting, you can configure the state activity for the members of the LACP trunk group. You can tick or cancel the checkbox beside the state display.

When you remove the tick mark to the port and click

Apply

, the port state activity will change to

Passive.

Active: The port automatically sends LACP protocol packets.

Passive: The port does not automatically send LACP protocol packets, and responds only if it receives

LACP protocol packets from the opposite device.

Note A link having either two active LACP nodes or one active node can perform dynamic LACP trunk.

A link having two passive LACP nodes will not perform dynamic LACP trunk because both ports are waiting for an LACP protocol packet from the opposite device.

Figure 3.3-25 State Activity

EKI-7559MI_SI User Manual 60

Port Mirroring

The Port mirroring is a method for monitoring traffic in switched networks. Traffic through ports can be monitored by one specific port which means traffic goes in or out monitored (source) ports will be duplicated into mirroring (destination) port.

Destination Port: There is only one port can be selected to be the destination (mirroring) port for monitoring both RX and TX traffic which come from the source port. Or, use one of two ports for monitoring RX traffic only and the other one for TX traffic only. The user can connect the mirroring port to LAN analyzer or Netxray.

Source Port: The ports that the user wants to monitor. All monitored port traffic will be copied to mirroring (destination) port. The user can select multiple source ports by ticking the RX or TX checkboxes to be monitored.

• And then, click

Apply

.

Figure 3.3-26 Port Mirroring

61 Chapter3

Rate Limiting

Here you can set up every port’s frame limitation type and bandwidth rate.

Ingress Limit Frame type: Select the frame type you want to filter. The frame types have 4 options for selecting: All, Broadcast/Multicast/Flooded Unicast, Broadcast/Multicast, and Broadcast only.

The four frame type options are for ingress frames limitation. The egress rate only supports ‘All’ type.

All ports support port ingress and egress rate control. For example, assume port 1 is 10Mbps; the user can set the effective egress rate of port 1 as 1Mbps, ingress rate of 500Kbps. The switch performs the ingress rate by packet counter to meet the specified rate.

Ingress: Enter the port effective ingress rate (The default value is “0”)

Egress: Enter the port effective egress rate (The default value is “0”)

• And then, click

Apply

to have the settings take effect.

Figure 3.3-27 Rate Limiting

EKI-7559MI_SI User Manual 62

3.3.3 Protocol

The user can set the layer 2 protocol setting via this interface.

VLAN configuration

A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain, which would allow you to isolate network traffic, so only the members of the same VLAN will receive traffic from the ones of the same VLAN. Basically, creating a VLAN from a switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch. However, all the network devices are still plugged into the same switch physically.

The switch supports Port-based and 802.1Q (tagged-based) VLAN. The default configuration of VLAN operation mode is “Disable”.

Figure 3.3-28 VLAN Configuration

63 Chapter3

VLAN configuration—Port-based VLAN

Packets can go among only members of the same VLAN group. Note all unselected ports are treated as belonging to another single VLAN. If the port-based VLAN enabled, the VLAN-tagging is ignored.

In order for an end station to send packets to different VLAN groups, it itself has to be either capable of tagging packets it sends with VLAN tags or attached to a VLAN-aware bridge that is capable of classifying and tagging the packet with different VLAN ID based on not only default PVID but also other information about the packet, such as the protocol.

Figure 3.3-29 Port based mode

• Pull down the selection item and focus on Port Based then press

Apply

to set the VLAN Operation

Mode in Port Based mode.

• Click

Add

to add a new VLAN group.

EKI-7559MI_SI User Manual 64

Figure 3.3-30 Port based mode-Add interface

• Enter the group name and VLAN ID. Add the port number having selected into the right field to group these members to be a VLAN group or remove any of them listed in the right field from the VLAN.

• And then, click Apply

to have the configuration take effect.

• You will see the VLAN displays.

Figure 3.3-31 Port based mode-Edit/Delete interface

• Click Delete to delete the VLAN.

• Click Edit to modify group name, VLAN ID, or add/remove the members of the existing VLAN group.

Note Remember to execute the “Save Configuration” action, otherwise the new configuration will lose when switch power off.

65 Chapter3

802.1Q VLAN

Tagged-based VLAN is an IEEE 802.1Q specification standard. Therefore, it is possible to create a VLAN across devices from different switch venders. IEEE 802.1Q VLAN uses a technique to insert a “tag” into the Ethernet frames. Tag contains a VLAN Identifier (VID) that indicates the VLAN numbers.

You can create Tag-based VLAN, and enable or disable GVRP protocol. There are 256 VLAN groups to provide configuration. Enable 802.1Q VLAN, all ports on the switch belong to default VLAN of VID 1. The default VLAN can’t be deleted.

GVRP (GARP VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network. GVRP conforms to the IEEE 802.1Q specification, which defines a method of tagging frames with VLAN configuration data. This allows network devices to dynamically exchange VLAN configuration information with other devices.

GVRP is based on GARP (Generic Attribute Registration Protocol), a protocol that defines procedures by which end stations and switches in a local area network (LAN) can register and de-register attributes, such as identifiers or addresses, with each other.

Every end station and switch thus has a current record of all the other end stations and switches that can be reached.

802.1Q Configuration

• Pull down the selection item and focus on 802.1Q then press Apply

to set the VLAN Operation

Mode in 802.1Q mode.

Enable GVRP Protocol: Tick the checkbox to enable GVRP protocol. This checkbox is available while the VLAN Operation Mode is in 802.1Q mode.

Management VLAN ID: The default value is ‘0’ which means VLAN function in 802.1Q mode is not available. While this column field is filled with a value from 1 to 4096, the member ports of this VLAN can access the management interface.

• Select the port you want to configure.

Link Type: there are 3 types of link type.

¾ Access Link: Single switch only, it allows the user to group ports by assigning the same

Untagged VID. While this link type is set, the Untagged VID column field is available but the

Tagged VID column field is disabled.

¾ Trunk Link: The extended application of Access Link. It allows the tagged frames go across two or more switches by assigning the tag with VID to the frames. Having set this link type, the

Tagged VID column field is available but the Untagged VID column field is disabled.

¾

Hybrid Link: Both Access Link and Trunk Link are available.

Untagged VID: Assign the untagged frame VID.

Tagged VID: Assign the tagged frame VID.

• Click

Apply

to have the configuration take effect.

EKI-7559MI_SI User Manual 66

Figure 3.3-32 802.1Q VLAN Configuration

67 Chapter3

Group Configuration

Edit the existing VLAN Group.

• Select the VLAN group in the table list.

• Click

Edit

.

Figure 3.3-33 Edit Group Configuration interface

• You can Change the VLAN group name and VLAN ID.

• Click Apply .

Figure 3.3-34 802.1Q Group Configuration—Edit

EKI-7559MI_SI User Manual 68

Rapid Spanning Tree

The Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol and provides for faster spanning tree convergence after a topology change. The system also supports STP and the system will auto-detect the connected device that is running STP or RSTP protocol.

RSTP - System Configuration

• The user can view spanning tree information of the Root Bridge.

• The user can modify RSTP state. After modification, click Apply

.

¾

RSTP mode: The user must enable the RSTP function first before configuring the related parameters.

¾ Priority (0-61440): The switch with the lowest value has the highest priority and is selected as the root. If the value is changed, the user must reboot the switch. The value must be a multiple of 4096 according to the protocol standard rule.

¾ Max Age (6-40): The number of seconds a switch waits without receiving Spanning-tree

Protocol configuration messages before attempting a reconfiguration. Enter a value between 6 through 40.

¾ Hello Time (1-10): The time that controls the switch to send out the BPDU packet to check

RSTP current status. Enter a value between 1 through 10.

¾ Forward Delay Time (4-30): The number of seconds a port waits before changing from its

Rapid Spanning-Tree Protocol learning and listening states to the forwarding state. Enter a value between 4 through 30.

Note Follow the rule to configure the MAX Age, Hello Time, and Forward Delay

Time.

2 x (Forward Delay Time value –1) > = Max Age value >= 2 x (Hello Time

value +1)

Figure 3.3-35 RSTP System Configuration interface

69 Chapter3

RSTP—Port Configuration

Here you can configure the path cost and priority of each port.

• Select the port in the port column field.

Path Cost: The cost of the path to the other bridge from this transmitting bridge at the specified port.

Enter a number 1 through 200,000,000.

Priority: Decide which port should be blocked by priority in LAN. Enter a number 0 through 240 (the port of the highest value will be blocked). The value of priority must be the multiple of 16.

Admin P2P: Some of the rapid state transactions that are possible within RSTP are dependent upon whether the port concerned can only be connected to exactly one other bridge (i.e. it is served by a point-to-point LAN segment), or can be connected to two or more bridges (i.e. it is served by a shared medium LAN segment). This function allows the P2P status of the link to be manipulated administratively. True is P2P enabling. False is P2P disabling.

Admin Edge: The port directly connected to end stations won’t create bridging loop in the network. To configure the port as an edge port, set the port to “True” status.

Admin Non Stp: The port includes the STP mathematic calculation. True is not including STP mathematic calculation. False is including the STP mathematic calculation.

• Click

Apply

.

Figure 3.3-36 RSTP Port Configuration interface

EKI-7559MI_SI User Manual 70

SNMP Configuration

Simple Network Management Protocol (SNMP) is the protocol developed to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth. Network management systems learn of problems by receiving traps or change notices from network devices implementing SNMP.

System Configuration

Community Strings

Here you can define the new community string set and remove the unwanted community string.

String: Fill the name string.

RO: Read only. Enables requests accompanied by this community string to display MIB-object information.

RW: Read write. Enables requests accompanied by this community string to display MIB-object information and to set MIB objects.

• Click

Add .

• To remove the community string, select the community string that you have defined and click

Remove

. You cannot edit the name of the default community string set.

Agent Mode

Select the SNMP version that you want to use and then click

Change

to switch to the selected SNMP version mode. The default value is ‘SNMP v1/v2c only’.

Figure 3.3-37 SNMP System Configuration interface

71 Chapter3

Trap Configuration

A trap manager is a management station that receives the trap messages generated by the switch. If no trap manager is defined, no traps will be issued. Create a trap manager by entering the IP address of the station and a community string. To define a management station as a trap manager, assign an IP address, enter the SNMP community strings, and select the SNMP trap version.

IP Address: Enter the IP address of the trap manager.

Community: Enter the community string.

Trap Version: Select the SNMP trap version type—v1 or v2c.

• Click Add .

• To remove the community string, select the community string listed in the current managers field and click Remove .

Figure 3.3-38 Trap Configuration interface

EKI-7559MI_SI User Manual 72

SNMPV3 Configuration

Configure the SNMP V3 function.

Context Table

Configure SNMP v3 context table. Assign the context name of context table. Click

Apply

to add the context name.

User Table

Configure SNMP v3 user table.

User ID: Set up the user name.

Authentication Password: Set up the authentication password.

Privacy Password: Set up the private password.

• Click

Add to add context name.

• Click Remove to remove unwanted context name.

Group Table

Configure SNMP v3 group table.

Security Name (User ID): Assign the user name that you have set up in user table.

Group Name: Set up the group name.

• Click

Add to add context name.

• Click Remove to remove the unwanted context name.

Access Table

Configure SNMP v3 access table.

Context Prefix: Set up the context name.

Group Name: Set up the group.

Security Level: Set up the access level.

Context Match Rule: Select the context match rule.

Read View Name: Set up the read view.

Write View Name: Set up the write view.

Notify View Name: Set up the notify view.

• Click

Add to add context name.

• Click Remove to remove unwanted context name.

MIBview Table

Configure MIB view table.

ViewName: Set up the name.

Sub-Oid Tree: Fill the Sub OID.

Type: Select the type—excluded or included.

• Click

Add to add context name.

• Click

Remove to remove unwanted context name.

73 Chapter3

Figure 3.3-39 SNMP V3 Configuration interface

EKI-7559MI_SI User Manual 74

QoS Configuration

Here you can configure Qos policy and priority setting, per port priority setting, COS and TOS setting.

QoS Policy and Priority Type

Qos Policy: Select the QoS policy rule.

¾ Use an 8,4,2,1 weighted fair queuing scheme: The switch will follow 8:4:2:1 rate to process priority queue from High to lowest queue. For example, while the system processing, 1 frame of the lowest queue, 2 frames of the low queue, 4 frames of the middle queue, and 8 frames of the high queue will be processed at the same time in accordance with the 8,4,2,1 policy rule.

¾ Use a strict priority scheme: Always the higher queue will be processed first, except the higher queue is empty.

¾ Priority Type: There are 5 priority type selections available—Port-based, TOS only, COS

only, TOS first, and COS first. Disable means no priority type is selected.

• Click

Apply to have the configuration take effect.

Figure 3.3-40 QoS Configuration interface

75 Chapter3

Port Base Priority

Configure the priority level for each port. With the drop-down selection item of Priority Type above being selected as Port-based, this control item will then be available to set the queuing policy for each port.

Port x: Each port has 4 priority levels—High, Middle, Low, and Lowest—to be chosen.

• Click Apply to have the configuration take effect.

COS Configuration

Set up the COS priority level. With the drop-down selection item of Priority Type above being selected as COS only/COS first, this control item will then be available to set the queuing policy for each port.

COS priority: Set up the COS priority level 0~7—High, Middle, Low, Lowest.

• Click

Apply .

TOS Configuration

Set up the TOS priority. With the drop-down selection item of Priority Type above being selected as TOS only/TOS first, this control item will then be available to set the queuing policy for each port.

TOS priority: The system provides 0~63 TOS priority level. Each level has 4 types of priority—High,

Middle, Low, and Lowest. The default value is ‘Lowest’ priority for each level. When the IP packet is received, the system will check the TOS level value in the IP packet that has received. For example, the user sets the TOS level 25 as high, the system will check the TOS value of the received IP packet.

If the TOS value of received IP packet is 25 (priority = high), and then the packet priority will have the highest priority.

• Click

Apply to have the configuration take effect.

EKI-7559MI_SI User Manual 76

IGMP Configuration

The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet Protocol (IP) suite.

IP manages multicast traffic by using switches, routers, and hosts that support IGMP. Enabling IGMP allows the ports to detect IGMP queries, report packets, and manage IP multicast traffic through the switch. IGMP have three fundamental types of message shown as follows:

Table 3.19: IGMP types

Message

Query

Description

A message sent from the querier (IGMP router or switch) asking for a response from each host belonging to the multicast group.

Report

A message sent by a host to the querier to indicate that the host wants to be or is a member of a given group indicated in the report message.

Leave Group

A message sent by a host to the querier to indicate that the host has quit being a member of a specific multicast group.

The switch supports IP multicast. You can enable IGMP protocol via setting the IGMP Configuration page to see the IGMP snooping information. IP multicast addresses are in the range of 224.0.0.0 through

239.255.255.255.

IGMP Protocol: Enable or disable the IGMP protocol.

IGMP Query: Select the IGMP query function as Enable or Auto to set the switch as a querier for

IGMP version 2 multicast networks.

• Click Apply

.

Figure 3.3-41 IGMP Configuration interface

77 Chapter3

X-Ring

X-Ring provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or

RSTP, but the algorithms between them are not the same.

In the X-Ring topology, each switch should be enabled with the X-Ring function and two ports of each switch should be configured as the member ports in the ring. Only one switch in the X-Ring group would be set as the master switch that one of its two member ports, known as backup port, would be blocked and the other port is called working port. Other switches in the X-Ring group are called working switches and their two member ports are called working ports. When the failure of network connection occurs, the backup port (blocked) of the master switch (Ring Master) will automatically become a working port to help the entire group recover from the failure.

The switch supports the function and interface to configure the switch being a ring master. The ring master can negotiate and place commands to other switches in the X-Ring group. If there are two or more switches in master mode, the software will configure the switch with lowest MAC address number as the ring master. The ring master mode can be enabled via the X-Ring configuration interface. Also, the user can identify whether the switch is the ring master by checking the corresponding LED indicator on the panel of the switch.

The system also supports the Couple Ring topology that can connect two X-Ring groups for the redundant backup function. Besides, the Dual Homing topology can prevent connection lose between the X-Ring group and the upper level/core switch.

Enable X-Ring: To enable the X-Ring function, tick the checkbox beside the Enable Ring string label.

If this checkbox is not ticked, all the ring functions are unavailable.

¾ Enable Ring Master: Tick the checkbox to enable this switch to be the ring master.

¾ 1st & 2nd Ring Ports: Pull down the selection menu to assign the ports as the member ports.

1

st

Ring Port is the working port and 2

nd

Ring Port is the backup port. When 1

st

Ring Port fails, the system will automatically upgrade the 2

nd

Ring Port to be the working port.

Enable Couple Ring: To enable the coupe ring function, tick the checkbox beside the Enable Couple

Ring string label.

¾ Couple port: Assign the member port which is connected to the other ring group.

¾ Control port: When the Enable Couple Ring checkbox is ticked, you have to assign the control port to form a couple-ring group between the two X-rings.

Enable Dual Homing: Set up one of the ports on the switch to be the Dual Homing port. For a switch, there is only one Dual Homing port. Dual Homing function only works when the X-Ring function enabled.

• And then, click

Apply to apply the configuration.

EKI-7559MI_SI User Manual 78

Note

Figure 3.3-42 X-ring interface

To enable the X-Ring function, users must disable the RSTP first. The X-Ring function and RSTP function cannot both be activated on a single switch.

Remember to execute the “Save Configuration” action, otherwise the new configuration will lose when switch powers off.

79 Chapter3

LLDP Configuration

LLDP (Link Layer Discovery Protocol) function allows the switch to advertise its information to other nodes on the network and store the information it discovers.

LLDP Protocol: Disable or enable LLDP function.

LLDP Interval: Set the interval of learning the information time in second.

• Click Apply

.

Figure 3.3-43 LLDP Configuration interface

EKI-7559MI_SI User Manual 80

3.3.4 Security

In this section, you can configure 802.1x and MAC address table.

802.1X/Radius Configuration

802.1x is an IEEE authentication specification which prevents the client from connecting to a wireless access point or wired switch until it provides authority, like the user name and password that are verified by an authentication server (such as RADIUS server).

802.1X/Radius - System Configuration

After enabling the IEEE 802.1X function, you can configure the parameters of this function.

IEEE 802.1x Protocol: Enable or disable 802.1x protocol.

Radius Server IP: Assign the RADIUS Server IP address.

Server Port: Set the UDP destination port for authentication requests to the specified RADIUS Server.

Accounting Port: Set the UDP destination port for accounting requests to the specified RADIUS

Server.

Shared Key: Set an encryption key for using during authentication sessions with the specified

RADIUS server. This key must match the encryption key used on the RADIUS Server.

NAS, Identifier: Set the identifier for the RADIUS client.

• Click

Apply .

Figure 3.3-44 802.1x/Radius System Configuration

802.1x/Radius—Port Configuration

You can configure the 802.1x authentication state for each port. The state provides Disable, Accept,

Reject, and Authorize.

Reject: The specified port is required to be held in the unauthorized state.

Accept: The specified port is required to be held in the Authorized state.

Authorized: The specified port is set to the Authorized or Unauthorized state in accordance with the outcome of an authentication exchange between the Supplicant and the authentication server.

Disable: When disabled, the specified port works without complying with 802.1x protocol.

• Click Apply

.

81 Chapter3

Figure 3.3-45 802.1x/Radius - Port Setting

EKI-7559MI_SI User Manual 82

802.1X/Radius—Misc Configuration

Quiet Period: Set the period which the port doesn’t try to acquire a supplicant.

TX Period: Set the period the port waits for retransmit next EAPOL PDU during an authentication session.

Supplicant Timeout: Set the period of time the switch waits for a supplicant response to an EAP request.

Server Timeout: Set the period of time the switch waits for a server response to an authentication request.

Max Requests: Set the number of authentication that must time-out before authentication fails and the authentication session ends.

Reauth period: Set the period of time which clients connected must be re-authenticated.

• Click Apply .

Figure 3.3-46 802.1x/Radius - Misc Configuration

83 Chapter3

MAC Address Table

Use the MAC address table to ensure the port security.

You can add a static MAC address; it remains in the switch's address table, regardless of whether the device is physically connected to the switch. This saves the switch from having to re-learn a device's

MAC address when the disconnected or powered-off device is active on the network again. You can add / modify / delete a static MAC address.

MAC Address Table—Static MAC Address

You can add static MAC address in the switch MAC table here.

MAC Address: Enter the MAC address of the port that should permanently forward traffic, regardless of the device network activity.

Port No.: Pull down the selection menu to select the port number.

• Click Add .

• If you want to delete the MAC address from filtering table, select the MAC address and click

Delete .

Figure 3.3-47 Static MAC Addresses interface

EKI-7559MI_SI User Manual 84

MAC Address Table—MAC Filtering

By filtering MAC address, the switch can easily filter the pre-configured MAC address and reduce the unsafety. You can add and delete filtering MAC address.

Figure 3.3-48 MAC Filtering interface

MAC Address: Enter the MAC address that you want to filter.

• Click

Add .

• If you want to delete the MAC address from filtering table, select the MAC address and click Delete

.

85 Chapter3

MAC Address Table—All MAC Addresses

You can view the port that connected device’s MAC address and the related devices’ MAC address.

• Select the port.

• The selected port of static & dynamic MAC address information will be displayed in here.

• Click

Clear MAC Table to clear the current port static MAC address information on screen.

Figure 3.3-49 All MAC Address interface

MAC Address Table—Multicast Filtering

Multicasts are similar to broadcasts, they are sent to all end stations on a LAN or VLAN. Multicast filtering is the system by which end stations only receive multicast traffic if they register to join specific multicast groups. With multicast filtering, network devices only forward multicast traffic to the ports that are connected to registered end stations.

IP Address: Assign a multicast group IP address in the range of 224.0.0.0 ~ 239.255.255.255.

Member Ports: Tick the check box beside the port number to include them as the member ports in the specific multicast group IP address.

• Click

Clear MAC Table to clear the current port static MAC address information on screen.

EKI-7559MI_SI User Manual 86

Figure 3.3-50 All MAC Address interface

87 Chapter3

Factory Default

Reset the switch to default configuration. Tick the check boxes to keep the current IP address, user name and password before reset. Click Reset to reset all configurations to the default value.

Figure 3.3-51 Factory Default interface

EKI-7559MI_SI User Manual 88

Save Configuration

Save all configurations that you have made to the system. Click Save to save all configurations to the flash memory.

Figure 3.3-52 Save Configuration interface

89 Chapter3

System Reboot

Reboot the switch in software reset. Click Reboot to reboot the system.

Figure 3.3-53 System Reboot interface

EKI-7559MI_SI User Manual 90

Troubleshooting

91

Chapter 4 Troubleshooting

Verify that you are using the included or appropriate power cord/adapter. Don’t use the power adaptor with DC output voltage higher than the power rating of the device. Otherwise, the device will burn down.

Select the proper UTP cable to construct the network. Use unshielded twisted-pair (UTP) or shield twisted-pair (STP) cable for RJ-45 connections: 100Ω Category 3, 4 or 5 cable for 10Mbps connections,

100Ω Category 5 cable for 100Mbps connections, or 100Ω Category 5e/above cable for 1000Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters

(328 feet).

Diagnosing LED Indicators

To assist in identifying problems, the switch can be easily monitored through panel indicators, which describe common problems the user may encounter and where the user can find possible solutions.

If the power indicator does not light on when the power cord is plugged in, you may have a problem with power cord. Then check for loose power connections, power losses or surges at power outlet. If you still cannot resolve the problem, contact the local dealer for assistance.

If the LED indicators are normal and the connected cables are correct but the packets still cannot be transmitted, please check the Ethernet devices’ configuration or status of the system.

EKI-7559MI_SI User Manual 92

Pin Assignments &

Wiring

93

Appendix A Pin Assignments & Wiring

It is suggested to adopt ELA/TIA as the wiring of the RJ-45.

Figure A.1: RJ-45 Pin Assignments

Figure A.2: EIA/TIA-568B

Figure A.3: EIA/TIA-568A

EKI-7559MI_SI User Manual 94

Figure A.4: DB 9-pin female connector

DB9 Connector

NC

2

3

NC

5

NC

NC

NC

RJ-45 Connector

1 Orange/White

2 Orange

3 Green/White

4 Blue

5 Blue/White

6 Green

7 Brown/White

8 Brown

95

advertisement

Related manuals