EKI-7659CPI 8+2G Combo Ports Industrial PoE Managed Redundant Gigabit Ethernet Switch User Manual
Copyright The documentation and the software included with this product are copyrighted 2007 by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co., Ltd. Information provided in this manual is intended to be accurate and reliable.
Product Warranty (2 years) Advantech warrants to you, the original purchaser, that each of its products will be free from defects in materials and workmanship for two years from the date of purchase. This warranty does not apply to any products which have been repaired or altered by persons other than repair personnel authorized by Advantech, or which have been subject to misuse, abuse, accident or improper installation.
Declaration of Conformity CE This product has passed the CE test for environmental specifications. Test conditions for passing included the equipment being operated within an industrial enclosure. In order to protect the product from being damaged by ESD (Electrostatic Discharge) and EMI leakage, we strongly recommend the use of CE-compliant industrial enclosure products.
Safety Instructions 1. Read these safety instructions carefully. 2. Keep this User's Manual for later reference. 3. Disconnect this equipment from any AC outlet before cleaning. Use a damp cloth. Do not use liquid or spray detergents for cleaning. 4. For plug-in equipment, the power outlet socket must be located near the equipment and must be easily accessible. 5. Keep this equipment away from humidity. 6. Put this equipment on a reliable surface during installation.
Safety Precaution - Static Electricity Follow these simple precautions to protect yourself from harm and the products from damage. 1. To avoid electrical shock, always disconnect the power from your PC chassis before you work on it. Don't touch any components on the CPU card or other cards while the PC is on. 2. Disconnect power before making any configuration changes. The sudden rush of power as you connect a jumper or install a card may damage sensitive electronic components.
Chapter 1 Contents Overview .......................................... 2 1.1 Introduction ........................................................ 2 1.1.1 The SFP Advantage.................................. 2 1.1.2 Power-over-Ethernet (PoE) ....................... 2 1.1.3 High-Speed Transmissions ....................... 2 1.1.4 Dual Power Input ...................................... 2 1.1.5 Flexible Mounting ...................................... 3 1.1.6 Advanced Protection ...............................
Figure 3.4: Command Line Interface .......................... 27 3.1.1 Commands Level .................................... 27 Table 3.1: Command Level ......................................... 27 3.1.2 Commands Set List................................. 28 Table 3.2: Commands Set List .................................... 28 3.1.3 System Commands Set .......................... 28 Table 3.3: System Commands Set ............................... 28 3.1.4 Port Commands Set................................
Figure 3.13: TFTP – Update Firmware ....................... 44 Figure 3.14: TFTP – Restore Configuration ................ 45 Figure 3.15: TFTP – Backup Configuration ................ 45 Figure 3.16: Syslog Configuration .............................. 46 Figure 3.17: SMTP Configuration ............................... 47 Figure 3.18: Event Configuration ................................ 48 Figure 3.19: Fault Relay Alarm ................................... 49 Table 3.18: UTC Timezone ...........................
Figure A.2: EIA/TIA-568B ......................................... 86 Figure A.3: EIA/TIA-568A ......................................... 86 Figure A.4: DB 9-pin female connector ...................... 87 Appendix B EKI-7659CPI_Manual_ed33 Compatible SFP Modules ...........
CHAPTER Overview Sections include: Introduction Features Specifications Packing List Safety Precaution 1 Chapter1
Chapter 1 Overview 1.1 Introduction To create reliability in your network, the EKI-7659CPI comes equipped with a proprietary redundant network protocol—X-Ring that was developed by Advantech, which provides users with an easy way to establish a redundant Ethernet network with ultra high-speed recovery time less than 10 ms. Aside from 8 x 10/100Base-TX fast Ethernet ports, the EKI-7659CPI comes equipped with 2 combo 10/100/1000 Mbps RJ-45 copper ports or mini-GBIC expansion ports.
EKI-7659CPI redundant power input design is with power reserve protection to prevent the switch device broken by wrong power wiring. When one of power input is fail, PFail LED will turn on and send an alarm through a relay output for notifying user. 1.1.5 Flexible Mounting EKI-7659CPI is compact and can be mounted on a DIN-rail or panel, so it is suitable for any space-constrained environment. 1.1.
1.2 Features • 2 Gigabit Copper/SFP combo ports, plus 8 Fast Ethernet ports • SFP socket for Easy and Flexible Fiber Expansion • Redundancy: Gigabit X-Ring (ultra high-speed recovery time<10ms), RSTP/STP (802.1w/1D) • Management: Web, Telnet, Serial Console, Windows Utility and SNMP • Control: VLAN/GVRP, QOS, IGMP Snooping, LACP, and Rate Limit • Security: IP/MAC and port binding, DHCP Server, IP access list, 802.
1.3 Specification Communications Standard LAN Transmission Distance Transmission Speed IEEE 802.3, 802.3u, 802.3x, 802.3z, 802.1d IEEE 802.1w, 802.1p, 802.1Q, 802.1X, 802.3ad, 802.3af 10/100/1000Base-TX, Optional 100Base-FX, 1000Base-SX/LX/LHX/XD/ZX/EZX Ethernet: Up to 100m (4-wire Cat.5e, Cat.
Overload 3.5A@12VDC (Fuse) Environment Operating Temperature Operating Humidity Storage Temperature Storage Humidity MTBF -10 ~ 60 ℃ (14 ~ 140 ℉) EKI-7659CPI (Wide temp.): -40~75 ℃ (-40~167 ℉) 5 ~ 95% (non-condensing) -40 ~ 85 ℃ (-40~185 ℉) 5 ~ 95% (non-condensing) 190287 hours Certifications Safety EMC Freefall Shock Vibration EKI-7659CPI_Manual_ed33 UL, 60950-1, CAN/CSA-C22.2 No.
1.4 Packing List • • • • • • • 1 x EKI-7659CPI Industrial Managed Gigabit Ethernet Switch 1 x eAutomation Industrial Communication CD-ROM with User manual 2 x Wall Mounting Bracket and Screws 1 x DIN-rail Mounting Bracket and Screws 1 x 8-pin RJ-45 to RS-232 serial cable 1 x DC Jack Cable φ2.0/150mm 1 x EKI-7659CPI Startup Manual 1.5 Safety Precaution Attention IF DC voltage is supplied by an external circuit, please use a protection device on the power supply input.
EKI-7659CPI_Manual_ed33 8
CHAPTER Installation Sections include: LED Indicators Dimensions Mounting Network Connection Connection to a Fiber Optic Network Power Connection 9 Chapter2
Chapter 2 Installation In this chapter, you will be given an overview of the EKI-7659CPI hardware installation procedures. 2.1 LED Indicators There are few LEDs display the power status and network status located on the front panel of EKI-7659CPI, each of them has its own specific meaning shown as below. Table 2.1: EKI-7659CPI LED Definition LED Color PWR Green R.M.
PoE (P1 ~ P8) On A powered device is connected utilizing Power over Ethernet on the port Off No device is connected or power forwarding fails Green 11 Chapter2
2.2 Dimensions (units: mm) Figure 2.
Figure 2.
Figure 2.
Figure 2.
2.3 Mounting The EKI-7659CPI supports two mounting methods: DIN-rail & Wall. 2.3.1 Wall mounting EKI-7659CPI can be wall-mounted by using the included mounting kit. Then, hang on the EKI-7659CPI to the nails on the wall. First, use the screws included in the package to combine the EKI-7659CPI and metal mounting kit. And then you can install the device firmly via the components, please see Figure 2.5 as below. Figure 2.
2.3.2 DIN-rail Mounting You can also mount EKI-7659CPI on a standard DIN-rail by steps below. The DIN-rail kit is screwed on the industrial switch when out of factory. If the DIN-rail kit is not screwed on the industrial switch, please screw the DIN-rail kit on the switch first. First, hang the EKI-7659CPI to the DIN-rail with angle of inclination. See Figure 2.6. Figure 2.
Then, let the device down straight to slide over the rail smoothly. See Figure 2.7. Figure 2.
2.4 Network Connection The EKI-7659CPI has 8 x RJ-45 ports that support connection to 10 Mbps Ethernet, or 100 Mbps Fast Ethernet, and half or full duplex operation. EKI-7659CPI can be connected to other hubs or switches via a twisted-pair straight-through or crossover cable up to 100m long. The connection can be made from any TX port of the EKI7659CPI (MDI-X) to another hub or switch either MDI-X or uplink MDI port. The EKI-7659CPI supports auto-crossover to make networking more easy and flexible.
Figure 2.9: Transceiver Inserted Second, insert the fiber cable of LC connector into the transceiver. Figure 2.
To remove the LC connector from the transceiver, please follow the steps shown below: First, press the upper side of the LC connector to release from the transceiver and pull it out. Figure 2.11: Remove LC connector Second, push down the metal loop and pull the transceiver out by the plastic handle. Figure 2.
2.6 Power Connection The EKI-7659CPI supports dual +12 ~ 48 VDC power inputs and power-fail relay output. Figure 2.8: Pin Assignment of the Power Connector You can connect an alarm indicator, buzzer or other signaling equipment through the relay output. The relay opens if power input 1, 2 fails or port link down/break (″Open″ means if you connect relay output with an LED, the light would be off).
23 Chapter2
CHAPTER Configuration Sections include: EKI-7659CPI_Manual_ed33 RS-232 Console Web Browser Mounting Self Diagnosis 24
Chapter 3 Configuration The EKI-7659CPI can be configured in two ways: via RS-232 Console or a web browser. 3.1 RS-232 Console EKI-7659CPI’s RS-232 console is designed for rapidly configuring which provides the console management – CLI command. Attach the supplied cable, which one end is RJ-45 and the other end is female DB9, to connect EKI7659CPI and your host PC or terminal. The connected PC or terminal must support the terminal emulation program.
Select the appropriate COM port, and set the parameter as Fig.3.2 (9600 for Baud Rate, 8 for Data Bits, None for Parity, 1 for Stop Bits, and None for Flow Control). Figure 3.2: COM Port Properties Setting Press Enter for login screen (If you can not find the login screen, press Enter one more time). The default user name and password are both “admin”. Key-in the user name and password to enter the command line interface. Figure 3.
After you have logged in to the system, you will see a command prompt. To enter CLI management interface, type in “enable” command. Figure 3.4: Command Line Interface The following table lists the CLI commands and description. 3.1.1 Commands Level Table 3.1: Command Level Modes Access Method Prompt Begin a session with your switch. User EXEC Privileged EXEC Global configuration VLAN database Interface configuration Exit Method About This Model Enter logout or quit.
3.1.2 Commands Set List Table 3.2: Commands Set List Command 3.1.3 Code Word User EXEC E Privileged EXEC P Global configuration G VLAN database V Interface configuration I System Commands Set Table 3.
dhcpserver subnetmask [Subnet mask] dhcpserver gateway [Gateway] G G dhcpserver dnsip [DNS IP] G dhcpserver leasetime [Hours] G dhcpserver ipbinding [IP address] show dhcpserver configuration show dhcpserver clients show dhcpserver ip-binding no dhcpserver I P P P G security enable G security http G security telnet G security ip [Index(1..10)] [IP Address] show security G P no security G no security http G no security telnet 3.1.
bandwidth type all I bandwidth type broadcast-multicastflooded-unicast I bandwidth type broadcast-multicast I bandwidth type broadcast-only I bandwidth in [Value] I bandwidth out [Value] show bandwidth I state [Enable | Disable] Set interface ingress limit frame type to “only accept broadcast frame” switch(config)#interface fastEthernet 2 switch(config-if)#bandwidth type broadcast-only Set interface input bandwidth.
aggregator group [GroupID] [Port-list] nolacp G show aggregator Assign a static trunk group. [GroupID] :1~3 [Port-list]:Member port list, This parameter could be a port range(ex.1-4) or a port list separate by a comma(ex.
vlan 8021q trunk [PortNumber] access-link untag [UntaggedVID] vlan 8021q trunk [PortNumber] trunk-link tag [TaggedVID List] V V vlan 8021q trunk [PortNumber] hybrid-link untag [UntaggedVID] tag [TaggedVID List] show vlan [GroupID] or show vlan V switch(vlan)#vlan 8021q trunk 3 access-link untag 33 Assign a trunk link for VLAN by trunk switch(vlan)#vlan 8021q trunk 3 trunk-link tag 2,3,6,99 group or switch(vlan)#vlan 8021q trunk 3 trunk-link tag 320 switch(vlan)#vlan 8021q trunk 3 hybrid-link untag Ass
stp-admin-p2p [Auto|True|False] stp-admin-edge [True|False] stp-admin-non-stp [True|False] show spanning-tree I I I E no spanning-tree 3.1.8 G position as the root switch. Admin P2P of STP priority on this interface. Admin Edge of STP priority on this interface. Admin NonSTP of STP priority on this interface. Displays a summary of the spanning-tree states. Disable spanning-tree.
Table 3.10: Mac/Filter Table Commands Set Commands Level mac-address-table static hwaddr [MAC] I mac-address-table filter hwaddr [MAC] show mac-address-table show mac-address-table static show mac-address-table filter no mac-address-table static hwaddr [MAC] G P P P I no mac-address-table filter hwaddr [MAC] no mac-address-table 3.1.
sub-oid [OID] show snmp no snmp community-strings [Community] no snmp-server host [Host-address] no snmpv3 user [User Name] no snmpv3 access context-name [Context Name ] group [Group Name ] security-level [NoAuthNoPriv|AuthNoPriv|AuthPriv] match-rule [Exact|Prifix] views [Read View Name] [Write View Name] [Notify View Name] no snmpv3 mibview view [View Name] type [Excluded|Included] sub-oid [OID] 3.1.12 P G G G switch#show snmp Show SNMP configuration Remove the specified community.
8021x system accountport [port ID] G 8021x system sharekey [ID] G 8021x system nasid [words] G 8021x misc quietperiod [sec.] G 8021x misc txperiod [sec.] G 8021x misc supportimeout [sec.] G 8021x misc servertimeout [sec.] G 8021x misc maxrequest [number] G 8021x misc reauthperiod [sec.] G 8021x portstate [disable | reject | accept | authorize] I show 8021x E no 8021x G 3.1.14 change the radious server port Use the 802.
systemlog mode [client|server|both] G show systemlog show systemlog E no systemlog smtp enable smtp serverip [IP address] smtp authentication smtp account [account] smtp password [password] smtp rcptemail [Index] [Email address] show smtp no smtp event device-cold-start [Systemlog|SMTP|Both] G G P G G G G G P G switch(config)# systemlog mode both Displays system log.
show sntp timezone Show index number of time zone list switch#show sntp timezone P no sntp G Disable SNTP function switch(config)#no sntp no sntp daylight G Disable daylight saving time switch(config)#no sntp daylight 3.1.17 X-ring Commands Set Table 3.
3.2 Web Browser EKI-7659CPI provides a convenient configuring way via web browser. You can follow the steps below to access EKI-7659CPI. EKI-7659CPI’s default IP is 192.168.1.1. Make sure your host PC and EKI-7659 are on the same logical sub-network. Warning Your host PC should be in the same VLAN setting with EKI-7659CPI, or the management will not be configured. Connect EKI-7659CPI to the Ethernet then your host PC could be configured via Ethernet.
Figure 3.7: Main page 3.2.1 System System Information Here you can view the system information and assign the system name and location to make this switch more easily to be identified on your network. • • • • • • • System Name: Assign the name of the switch. The maximum length is 64 bytes. System Description: Displays the description of switch. Read only cannot be modified. System Location: Assign the switch physical location. The maximum length is 64 bytes.
Figure 3.8: System Information IP Configuration User can configure the IP Settings and DHCP client function here. • DHCP Client: To enable or disable the DHCP client function. When DHCP client function is enabled, the industrial switch will be assigned the IP address from the network DHCP server. The default IP address will be replaced by the DHCP server assigned IP address. After user click “Apply” button, a popup dialog show up.
Figure 3.9: IP Configuration DHCP Server – System configuration DHCP is the abbreviation of Dynamic Host Configuration Protocol that is a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device's IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses.
Figure 3.10: DHCP Server - System Configuration DHCP Client – System Configuration When the DHCP server function is active, the system will collect the DHCP client information and displays them here. Figure 3.11: DHCP Server – Client Entries DHCP Server - Port and IP Bindings You can assign a specific IP address, which is the IP in dynamic IP assign range, to the specific port.
Figure 3.12: DHCP Server – Port and IP Binding TFTP - Update Firmware Trivial File Transfer Protocol (TFTP) is a very simple file transfer protocol, with the functionality of a very basic form of FTP. It provides the functions to allow the user to update the switch firmware. Before updating, make sure you have your TFTP server ready and the firmware image is on the TFTP server. • TFTP Server IP Address: fill in your TFTP server IP. • Firmware File Name: the name of firmware image.
You can restore Flash ROM value from TFTP server, but you must put the image file on TFTP server first, switch will download back flash image. • TFTP Server IP Address: fill in the TFTP server IP. • Restore File Name: fill in the correct restore file name. • Click Apply Figure 3.14: TFTP – Restore Configuration TFTP - Backup Configuration You can save current Flash ROM value from the switch to TFTP server, then go to the TFTP restore configuration page to restore the Flash ROM value.
Configure the system event mode and system log server IP which you want to collect. • Syslog Client Mode: select the system log mode – client only, server only, or both S/C. • System Log Server IP Address: assign the system log server IP. • Click Reload to refresh the events log. • Click to clear all current events log. Clear • After configuring, Click Apply . Figure 3.
• Click Apply . Figure 3.17: SMTP Configuration System Event Log - Event Configuration You can select the ‘Syslog’ and ‘SMTP’ events for each port. When selected events occur, the system will send out the log information to the system log server. After configuring, Click Apply . • System event selection: 4 selections – Device cold start, Device warm start, SNMP Authentication Failure, and X-ring topology change. Mark the checkbox to select the event.
Figure 3.18: Event Configuration Fault Relay Alarm • Power Failure: Mark the check box to enable the function of lighting up FAULT LED on the panel when power fails. • Port Link Down/Broken: Mark the check box to enable the function of lighting up FAULT LED on the panel when ports’ states are link-down or broken.
Figure 3.19: Fault Relay Alarm SNTP Configuration You can configure the SNTP (Simple Network Time Protocol) settings. The SNTP allows you to synchronize switch clocks on the Internet. • SNTP Client: enable or disable SNTP function to get the time from the SNTP server. • Daylight Saving Time: enable or disable daylight saving time function. When daylight saving time is enabled, you need to configure the daylight saving time period. • UTC Timezone: set the switch location time zone.
MST - Mountain Standard PDT - Pacific Daylight -7 hours 5 am PST - Pacific Standard ADT - Alaskan Daylight -8 hours 4 am ALA - Alaskan Standard -9 hours 3 am HAW - Hawaiian Standard -10 hours 2 am Nome, Alaska -11 hours 1 am CET - Central European FWT - French Winter MET - Middle European MEWT - Middle European Winter SWT - Swedish Winter +1 hour 1 pm EET - Eastern European, USSR Zone 1 +2 hours 2 pm BT - Baghdad, USSR Zone 2 +3 hours 3 pm ZP4 - USSR Zone 3 +4 hours 4 pm ZP5 - USSR
Figure 3.20: SNTP Configuration IP Security IP security function allows the user to assign 10 specific IP addresses that have permission to access the switch through the web browser for the securing switch management. • IP Security Mode: when this option is in Enable mode, the Enable HTTP Server and Enable Telnet Server check boxes will then be available. • Enable HTTP Server: when this check box is checked, the IP addresses among Security IP1 ~ IP10 will be allowed to access via HTTP service.
Figure 3.21: IP Security User Authentication You can change login user name and password for the management security issue. • User name: Key in the new user name (The default is “admin”) • Password: Key in the new password (The default is “admin”) • Confirm password: Re-type the new password • And then, click Apply button to apply the configuration.
Figure 3.
3.2.2 Port Port setting includes Port Statistics, Port Control, Port Trunk, Port Mirroring, and Rate Limiting. User can use this interface to set the parameters and control the packet flow among the ports. Port Statistics The following information provides the current port statistic information. • • • • • • • • • • • • • • Port: The port number. Type: Displays the current speed of connection to the port. Link: The status of linking—‘Up’ or ‘Down’. State: It’s set by Port Control.
• Speed: set the port link speed. • Duplex: set full-duplex or half-duplex mode of the port. • Flow Control: set flow control function as Enable or Disable in Full Duplex mode. The default value is Enable. • Security: when its state is “On” that means this port accepts only one MAC address. • Click Apply button to apply the configuration. Figure 3.
• If LACP enable, you can configure LACP Active/Passive status in each ports on State Activity page. • Click Apply . • Use Apply button to delete Trunk Group. Select the Group ID and click Delete button. Figure 3.25: Aggregator Setting Aggregator Information When you have set up the aggregator setting with LACP disabled, you will see the local static trunk group information here. Figure 3.
When you had set up the LACP aggregator, you can configure port state activity. You can mark or unmark the port. When you mark the port and click Apply button the port state activity will change to Active. Opposite is Passive. • Active: The port automatically sends LACP protocol packets. • Passive: The port does not automatically send LACP protocol packets, and responds only if it receives LACP protocol packets from the opposite device.
Figure 3.28: Port Mirroring Rate Limiting You can set up the bandwidth rate and frame limitation type for each port. • Ingress Limit Frame type: select the frame type that wants to filter. The frame types have 4 options for selecting: All, Broadcast/Multicast/Flooded Unicast, Broadcast/Multicast and Broadcast only. Broadcast/Multicast/Flooded Unicast, Broadcast/Multicast and Bbroadcast only types are only for ingress frames. The egress rate only supports All type.
Figure 3.
3.2.3 Protocol User can set the layer 2 protocol setting via this interface. VLAN configuration A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain, which would allow you to isolate network traffic, so only the members of the VLAN will receive traffic from the same members of VLAN. Basically, creating a VLAN from a switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch.
Figure 3.31: Port based mode • Pull down the select item menu of VLAN Operation Mode, and select Port Based mode.
Figure 3.32: Port based mode-Add interface • You will see the VLAN displays. • Use Delete button to delete unwanted VLAN. • Use Edit button to modify existing VLAN group. Note Remember to execute the “Save Configuration” action, otherwise the new configuration will lose when switch power off. 802.1Q VLAN Tagged-based VLAN is an IEEE 802.1Q specification standard. Therefore, it is possible to create a VLAN across devices from different switch venders. IEEE 802.
Figure 3.33: 802.1Q VLAN Configuration 802.1Q Configuration • Pull down the select item menu of VLAN Operation Mode, and select Port Based mode. • Enable GVRP Protocol: mark the check box to enable GVRP protocol that allows network devices to dynamically exchange VLAN configuration information with other devices. If GVRP protocol is not enabled, user has to set the tagging information manually. • Select the port that you want to configure. • Link Type: there are 3 types of link type.
Figure 3.34: 802.1Q Group Configuration • You can Change the VLAN group name and VLAN ID. • Click Apply . Figure 3.35: 802.
Rapid Spanning Tree The Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol and provides for faster spanning tree convergence after a topology change. The system also supports STP and the system will auto detect the connected device that is running STP or RSTP protocol. RSTP - System Configuration • User can view spanning tree information about the Root Bridge • User can modify RSTP state.
Figure 3.36: RSTP System Configuration interface RSTP - Port Configuration You can configure the path cost and priority of each port. • Select the port in Port column. • Path Cost: The cost of the path to the other bridge from this transmitting bridge at the specified port. Enter a number 1 through 200000000. • Priority: Decide which port should be blocked by priority in LAN. Enter a number 0 through 240. The value of priority must be the multiple of 16.
SNMP Configuration Simple Network Management Protocol (SNMP) is the protocol developed to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth. Network management systems learn of problems by receiving traps or change notices from network devices implementing SNMP.
Trap Configuration A trap manager is a management station that receives traps, the system alerts generated by the switch. If no trap manager is defined, no traps will issue. Create a trap manager by entering the IP address of the station and a community string. To define management stations as trap manager and enter SNMP community strings and selects the SNMP version. • IP Address: Enter the IP address of trap manager. • Community: Enter the community string.
• Click Remove to remove unwanted context name. Figure 3.40: SNMP V3 configuration interface Group Table Configure SNMP v3 group table. • Security Name (User ID): Assign the user name that you have set up in user table. • Group Name: Set up the group name.
• Click Add to add context name. • Click Remove to remove unwanted context name. Access Table Configure SNMP v3 access table. • • • • • • • Context Prefix: Set up the context name. Group Name: Set up the group. Security Level: Set up the access level. Context Match Rule: Select the context match rule. Read View Name: Set up the read view. Write View Name: Set up the write view. Notify View Name: Set up the notify view. • Click Add to add context name. • Click Remove to remove unwanted context name.
QoS Configuration You can configure Qos policy and priority setting, per port priority setting, COS and TOS setting. QoS Policy and Priority Type • Qos Policy: select the Qos policy rule. Use an 8,4,2,1 weighted fair queuing scheme: The switch will follow 8:4:2:1 rate to process priority queue from High to Lowest queue.
Figure 3.41: QoS Configuration interface Port Base Priority Configure per port priority level. • Port 1 ~ Port 10: each port has 4 priority levels – High, Middle, Low, and Lowest. • Click Apply .
Set up the COS priority level. • COS priority: Set up the COS priority level 0~7 –High, Middle, Low, Lowest. • Click Apply . TOS Configuration Set up the TOS priority. • TOS priority: the system provides 0~63 TOS priority level. Each level has 4 types of priority – high, middle, low, and lowest. The default value is “Lowest” priority for each level. When the IP packet is received, the system will check the TOS level value in the IP packet that has received. For example, user set the TOS level 25 is high.
Figure 3.42: IGMP Configuration interface X-Ring X-Ring provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the algorithms not the same. In the X-Ring topology, every switch should enable X-Ring function and assign two member ports in the ring. Only one switch in the X-Ring group would be set as a master switch, one of its path would be blocked, called backup port, and another port is called working port.
Figure 3.43: X-ring Interface Note When the X-Ring function enable, user must disable the RSTP. The X-Ring function and RSTP function cannot exist at the same time. Remember to execute the “Save Configuration” action, otherwise the new configuration will lose when switch power off.
3.2.4 Security In this section, you can configure 802.1x and MAC address table. 802.1X/Radius Configuration 802.1x is an IEEE authentication specification that allows a client to connect to a wireless access point or wired switch but prevents the client from gaining access to the Internet until it provides authority, like a user name and password that are verified by a separate server. 802.1X/Radius - System Configuration After enabling the IEEE 802.
Figure 3.45: 802.1x/Radius - Port Setting interface 802.1X/Radius - Misc Configuration • Quiet Period: set the period during which the port doesn’t try to acquire a supplicant. • TX Period: set the period the port wait for retransmit next EAPOL PDU during an authentication session. • Supplicant Timeout: set the period of time the switch waits for a supplicant response to an EAP request. • Server Timeout: set the period of time the switch waits for a server response to an authentication request.
Figure 3.46: 802.1x/Radius - Misc Configuration MAC Address Table Use the MAC address table to ensure the port security. You can add a static MAC address; it remains in the switch's address table, regardless of whether the device is physically connected to the switch. This saves the switch from having to re-learn a device's MAC address when the disconnected or powered-off device is active on the network again. You can add / modify / delete a static MAC address.
Figure 3.48: MAC Filtering interface • MAC Address: Enter the MAC address that you want to filter. • Click Add . • If you want to delete the MAC address from filtering table, select the MAC address and click Delete . MAC Address Table - All MAC Addresses You can view the port of the connected device’s MAC address and related devices’ MAC address. • Select the port. • The selected port of static MAC address information will be displayed here.
Power over Ethernet This segment shows the Power over Ethernet function. Figure 3.50: PoE Status • Maximum Power Available: Displays the maximum power supply in Watt. • Actual Power Consumption: This column shows the real-time total power consumption. • Main Supply Voltage: This column shows the output voltage of the system for PoE ports. d means 1/10, and supply 48V when work on PoE situation. • Firmware Version: This column shows the PoE chip’s firmware version.
• Voltage (V): Displays the operating voltage of the port. • Power (mW): Displays the power consumption of the port. • Determined Class: Displays the PD’s class. And then, click Apply to carry into effect. Factory Default Reset switch to default configuration. Click Reset to reset all configurations to the default value. Figure 3.51: Factory Default interface Save Configuration Save all configurations that you have made in the system. To ensure the all configuration will be saved.
Figure 3.53: System Reboot interface Reboot the switch in software reset. Click EKI-7659CPI_Manual_ed33 Reboot 82 to reboot the system.
CHAPTER Troubleshooting 83
Chapter 4 Troubleshooting Verify that is using the right power cord/adapter (+12~48VDC), please don’t use the power adaptor with DC output voltage higher than 48 V, or it will burn this converter down. Select the proper UTP cable to construct user network. Please check that is using the right cable. Use Unshielded Twisted-Pair (UTP) or Shielded Twisted-Pair (STP) cable for RJ-45 connections: 100 Category 3, 4 or 5 cable for 10 Mbps connections or 100 Category 5 cable for 100 Mbps connections.
APPENDIX Pin Assignment & Wiring 85
Appendix A Pin Assignment & Wiring It is suggested to adopt ELA/TIA as the wiring of the RJ-45. Figure A.1: RJ-45 Pin Assignment Figure A.2: EIA/TIA-568B Figure A.
Figure A.
EKI-7659CPI_Manual_ed33 88
APPENDIX Compatible SFP Modules 89
Appendix B Compatible SFP Modules The table below shows compatible SFP modules for EKI-7659CPI.
91