Summary of Contents for Advantech EKI-7708G-2SI-AE
Page 1
User Manual EKI-7708 Series 4FE/4GE + 4G SFP Port Gigabit Managed Redundant Industrial Switch 4FE/4GE PoE + 4G SFP Port Gigabit Managed Redundant Industrial PoE Switch...
Page 2
No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co., Ltd. Information provided in this manual is intended to be accurate and reliable. How- ever, Advantech Co., Ltd.
Technical Support and Assistance Visit the Advantech web site at www.advantech.com/support where you can find the latest information about the product. Contact your distributor, sales representative, or Advantech's customer service center for technical support if you need additional assistance.
Warnings, Cautions and Notes Warning! Warnings indicate conditions, which if not observed, can cause personal injury! Caution! Cautions are included to help you avoid damaging hardware or losing data. e.g. There is a danger of a new battery exploding if it is incorrectly installed. Do not attempt to recharge, force open, or heat the battery.
The sound pressure level at the operator's position according to IEC 704-1:1982 is no more than 70 dB (A). DISCLAIMER: This set of instructions is given according to IEC 704-1. Advantech disclaims all responsibility for the accuracy of any statements contained herein.
Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt 70dB(A) oder weiger. Haftungsausschluss: Die Bedienungsanleitungen wurden entsprechend der IEC- 704-1 erstellt. Advantech lehnt jegliche Verantwortung für die Richtigkeit der in die- sem Zusammenhang getätigten Aussagen ab. EKI-7708 Series User Manual...
Page 7
Safety Precaution - Static Electricity Static electricity can cause bodily harm or damage electronic devices. To avoid dam- age, keep static-sensitive devices in the static-protective packaging until the installa- tion period. The following guidelines are also recommended: Wear a grounded wrist or ankle strap and use gloves to prevent direct contact to the device before servicing the device.
List of Figures Figure 1.1 Front View ........................4 Figure 1.2 Front View ........................5 Figure 1.3 System LED Panel ......................6 Figure 1.4 System LED Panel ......................6 Figure 1.5 Rear View ........................7 Figure 1.6 Top View........................8 Figure 1.7 Top View........................
Hardware Views 1.3.1 Front View The following view applies to EKI-7708E-4F, EKI-7708E-4FI, EKI-7708G-4F, and EKI-7708G-4FI. EKI-7708G-4F R.M. PWR1 PWR2 Alarm Reset Console LNK/ACT Figure 1.1 Front View Item Description ETH port SFP ports x 4. LNK/ACT LED RJ45 link activity LED. ETH port RJ45 ports x 4.
The following view applies to EKI-7708E-4FP, EKI-7708E-4FPI, EKI-7708G-4FP, and EKI-7708G-4FPI. EKI-7708G-4F R.M. PWR1 PWR2 Alarm Reset Console LNK/ACT Figure 1.2 Front View Item Description ETH port SFP ports x 4. LNK/ACT LED RJ45 link activity LED. ETH port RJ45 ports x 4. LNK/ACT LED Link activity LED.
1.3.1.1 System LED Panel R.M. PWR1 PWR2 Alarm Figure 1.3 System LED Panel LED Name LED Color Description Solid green System is operating normally System is powered down / system crash / oper- ation initiating R.M. Solid green Active when determining ring master PWR1 Solid green Powered up...
LED Name LED Color Description R.M. Solid green Active when determining ring master PWR1 Solid green Powered up Powered down or not installed PWR2 Solid green Powered up Power down or not installed Alarm Solid red Defined major policies are detected Blinking Red Defined minor policies are detected Powered off or system is operating normally...
1.3.3 Top View The following view applies to EKI-7708E-4F, EKI-7708E-4FI, EKI-7708G-4F, and EKI-7708G-4FI. V2+V2- V1+V1- DC12-48V 1A@24V PWR2 P-Fail PWR1 Figure 1.6 Top View Item Description Ground terminal Screw terminal used to ground chassis Terminal block Connect cabling for power and alarm wiring The following view applies to EKI-7708E-4FP, EKI-7708E-4FPI, EKI-7708G-4FP, and EKI-7708G-4FPI.
Installation Guidelines The following guidelines are provided to optimize the device performance. Review the guidelines before installing the device. Make sure cabling is away from sources of electrical noise. Radios, power lines, and fluorescent lighting fixtures can interference with the device performance. ...
2.3.1.1 Installing the DIN-Rail Mounting Kit Position the rear panel of the switch directly in front of the DIN rail, making sure that the top of the DIN rail clip hooks over the top of the DIN rail, as shown in the following illustration.
2.3.1.2 Removing the DIN-Rail Mounting Kit Ensure that power is removed from the switch, and disconnect all cables and connectors from the front panel of the switch. Push down on the top of the DIN rail clip release tab with your finger. As the clip releases, lift the bottom of the switch, as shown in the following illustration.
Secure the wall mount plates with M3 screws, see the following figure. Figure 2.4 Installing Wall Mount Plates Once the wall mounting plates are secure on the device, you will need to attach the wall screws (x6). Locate the installation site and place the switch against the wall, making sure it is the final installation location.
Install the wall mount plate on the screws and slide it forward to lock in place, see the following figure. Figure 2.6 Wall Mount Installation Once the device is installed on the wall, tighten the screws to secure the device. EKI-7708 Series User Manual...
Installing and Removing SFP Modules Up to two fiber optic ports are available (dependent on model) for use in the switch. Refer to the technical specifications for details. The Gigabit Ethernet ports on the switch are 100/1000Base SFP Fiber ports, which require using the 100M or 1G mini-GBIC fiber transceivers to work properly.
Make sure the module is seated correctly before sliding the module into the slot. A click sounds when it is locked in place. Handle Figure 2.8 Installing an SFP Transceiver Note! If you are attaching fiber optic cables to the transceiver, continue with the following step.
2.4.2 Removing SFP Modules To disconnect an LC connector, use the following guidelines: Press down and hold the locking clips on the upper side of the optic cable. Pull the optic cable out to release it from the transceiver. Figure 2.10 Removing a Fiber Optic Cable to a Transceiver Hold the handle on the transceiver and pull the transceiver out of the slot.
Connecting the Switch to Ethernet Ports 2.5.1 RJ45 Ethernet Cable Wiring For RJ45 connectors, data-quality, twisted pair cabling (rated CAT5 or better) is rec- ommended. The connector bodies on the RJ45 Ethernet ports are metallic and con- nected to the GND terminal. For best performance, use shielded cabling. Shielded cabling may be used to provide further protection.
Connecting the Switch to Console Port The industrial switch supports a secondary means of management. By connecting the RJ45 to RS232 serial cable between a COM port on your PC (9-pin D-sub female) and the switch’s RJ45 (RJ45) port, a wired connection for management can be established.
Power Supply Installation 2.7.1 Overview Warning! Power down and disconnect the power cord before servicing or wiring the switch. Caution! Do not disconnect modules or cabling unless the power is first switched off. The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch device.
2.7.2 Considerations Take into consideration the following guidelines before wiring the device: The Terminal Block (CN1) is suitable for 12-24 AWG (3.31 - 0.205 mm ). Torque value 7 lb-in. The cross sectional area of the earthing conductors shall be at least 3.31 mm ...
Electromagnetic Interference (EMI) affects the transmission performance of a device. By properly grounding the device to earth ground through a drain wire, you can setup the best possible noise immunity and emissions. Connection to Grounding Point Drain Wire with Lug Figure 2.17 Grounding Connection By connecting the ground terminal by drain wire to earth ground the switch and chas- sis can be ground.
2.7.5 Wiring the Power Inputs Caution! Do not disconnect modules or cabling unless the power is first switched off. The device only supports the voltage outlined in the type plate. Do not use any other power components except those specifically designated for the switch devic Warning! Power down and disconnect the power cord before servicing or wiring the switch.
Tighten the wire-clamp screws to secure the DC wires in place. Loosening Securing Wire- Wire-clamp clamp Screws Screws Installing DC Wires Figure 2.22 Installing DC Wires in a Terminal Block Align the terminal block over the terminal block receptor on the switch. Insert the terminal block and press it in until it is flush with the terminal block receptor.
First Time Setup 3.1.1 Overview The Industrial Ethernet Managed Switch is a configurable device that facilitates the interconnection of Ethernet devices on an Ethernet network. This includes comput- ers, operator interfaces, I/O, controllers, RTUs, PLCs, other switches/hubs or any device that supports the standard IEEE 802.3 protocol. This switch has all the capabilities of a store and forward Ethernet switch plus advanced management features such as SNMP, RSTP and port mirroring.
3.1.4 Using the Graphical (Web) Interface The graphical interface is provided via a web server in the switch and can be accessed via a web browser such as Opera, Mozilla, or Internet Explorer. Note! JavaScript must be supported and enabled in your browser for the graphical interface to work correctly.
3.1.6 Configuring the Ethernet Ports The switch comes with default port settings that should allow you to connect to the Ethernet Ports with out any necessary configuration. Should there be a need to change the name of the ports, negotiation settings or flow control settings, you can do this in the Port Configuration menu.
Command Line Interface Configuration 3.2.1 Introduction to Command-Line Interface (CLI) The command-line interface (CLI) is constructed with an eye toward automation of CLI-based configuration. The interaction is modeled on that used in many Internet protocols such as Telnet, FTP, and SMTP. After each command is entered and pro- cessed, the switch will issue a reply that consists of a numeric status code and a human-readable explanation of the status.
Web Browser Configuration The switch has an HTML based user interface embedded in the flash memory. The interface offers an easy to use means to manage basic and advanced switch func- tions. The interface allows for local or remote switch configuration anywhere on the network.
Log In To access the login window, connect the device to the network, see “Connecting the Switch to Ethernet Ports” on page 18. Once the switch is installed and connected, power on the switch see the following procedures to log into your switch. When the switch is first installed, the default network configuration is set to DHCP enabled.
Click Apply to change the current account settings. Figure 4.2 Changing a Default Password After saving all the desired settings, perform a system save (Tools > Save Configu- ration). The changes are saved. Monitoring 4.3.1 Device Information The Device Information menu lists information, such as: System Name, System Location, MAC Address, Firmware version, and more, pertaining to the system.
Item Description System Location Click Default to enter the location: up to 256 alphanumeric characters (default is Default). System Contact Click Default to enter the contact person: up to 128 alphanumeric characters (default is Default). MAC Address Displays the MAC address of the switch. IP Address Displays the assigned IP address of the switch.
Item Description Category Click the drop-down menu to select the category level target setting. View Click View to display all Logging Information and Logging Message information. Refresh Click Refresh to update the screen. Clear buffered mes- Click Clear buffered messages to clear the logging buffer history list. sages The ensuing table for Logging Information table settings are informational only: Tar- get, Severity and Category.
4.3.3.2 Port Utilization To access this page, click Monitoring > Port Monitoring > Port Utilization. Figure 4.6 Monitoring > Port Monitoring > Port Utilization The following table describes the items in the previous figure. Item Description Refresh period Click the drop-down menu to select and designate a period (second intervals) to refresh the information (TX and RX) listings.
The ensuing table for LLDP Port Statistics settings are informational only: Port, TX Frames (Total), RX Frames (Total, Discarded and Errors), RX TLVs (Discarded and Unrecognized) and RX Ageouts (Total). 4.3.6 IGMP Statistics The IGMP Statistics function displays statistical package information for IP multicast- ing.
System 4.4.1 IP Settings The IP Settings menu allows you to select a static or DHCP network configuration. The Static displays the configurable settings for the static option. To access this page, click System > IP Settings. Figure 4.9 System > IP Settings The following table describes the items in the previous figure.
4.4.2 DHCP Client Option 82 The DHCP Client Option 82 configurable Circuit ID and Remote ID feature enhances validation security by allowing you to select naming choices suboptions. You can select a switch-configured hostname or specify an ASCII test string for the remote ID. You can also configure an ASCII text string to override the circuit ID.
4.4.3 DHCP Auto Provision The DHCP Auto Provision feature allows you to load configurations using a server with DHCP options. Through the remote connection, the switch obtains information from a configuration file available through the TFTP server. To access this page, click System > DHCP Auto Provision. Figure 4.11 System >...
4.4.5 Management VLAN By default the VLAN is the management VLAN providing communication with the switch management interface. To access this page, click System > Management VLAN. Figure 4.13 System > Management VLAN The following table describes the items in the previous figure. Item Description Management VLAN...
4.4.6 System Time To access this page, click System > System Time. Figure 4.14 System > System Time The following table describes the items in the previous figure. Item Description Enable SNTP Click the radio button to enable or disable the SNTP. SNTP/NTP Server Enter the address of the SNTP server.
Item Description Recurring From Click the drop-down menu to designate the start date and time for daylight saving time. Recurring To Click the drop-down menu to designate the end date and time for day- light saving time. Non-Recurring From Click the drop-down menu to designate a start date and time for a non-recurring daylight saving time event.
4.5.2 Port Mirror Port mirroring function allows the sending of a copy of network packets seen on one switch port to a network monitoring connection on another switch port. Port mirroring can be used to analyze and debug data or diagnose errors on a network or to mirror either inbound or outbound traffic (or both).
4.5.3 Link Aggregation Link Aggregation is a method for combining multiple network connections in parallel in order to increase throughput beyond the capability of a single connection, and to provide redundancy in case one of the links should fail. 4.5.3.1 Load Balance The Load Balancing page allows you to select between a MAC Address or IP/MAC Address algorithm for the even distribution of IP traffic across two or more links.
The ensuing table for LAG Management Information settings are informational only: LAG, Name, Type, Link State, Active Member, Standby Member, Edit (click to modify the settings) and Clear (click to load default settings). 4.5.3.3 LAG Port Settings The LAG Port Settings page allows you to enable or disable, set LAG status, speed and flow control functions.
4.5.3.4 LACP Priority Settings The LACP Priority Settings page allows you to configure the system priority for LACP. To access this page, click L2 Switching > Link Aggregation > LACP Priority Set- tings. Figure 4.20 L2 Switching > Link Aggregation > LACP Priority Settings The following table describes the items in the previous figure.
The ensuing table for LACP Port Information settings are informational only: Port Name, Priority, Timeout and Mode. 4.5.4 802.1Q VLAN The 802.1Q VLAN feature allows for a single VLAN to support multiple VLANs. With the 802.1Q feature you can preserve VLAN IDs and segregate different VLAN traffic. The 802.1Q VLAN tag feature encapsulates the 802.1Q VLAN tagging within another 802.1Q VLAN tag.
4.5.4.2 PVID Settings The PVID Settings page allows you to designate a PVID for a selected port, define the accepted type and enable/disable the ingress filtering. To access this page, click L2 Switching > 802.1Q VLAN > PVID Settings. Figure 4.23 L2 Switching > 802.1Q VLAN > PVID Settings The following table describes the items in the previous figure.
4.5.4.3 Port to VLAN The Port to VLAN page allows you to add a port to a VLAN and select the related parameters. To access this page, click L2 Switching > 802.1Q VLAN > Port to VLAN. Figure 4.24 L2 Switching > 802.1Q VLAN > Port to VLAN The following table describes the items in the previous figure.
4.5.4.4 Port-VLAN Mapping To access this page, click L2 Switching > 802.1Q VLAN > Port-VLAN Mapping. The ensuing table for Port-VLAN Mapping Table settings are informational only: Port, Mode, Administrative VLANs and Operational VLANs. 4.5.5 Q-in-Q Q-in-Q is commonly referred as VLAN stacking in which VLANs are nested by adding two tags to each frame instead of one.
4.5.5.2 Port Settings The Port Settings page allows you to define the outer PVID and outer mode for a selected port. To access this page, click L2 Switching > Q-in-Q > Port Settings. Figure 4.26 L2 Switching > Q-in-Q > Port Settings The following table describes the items in the previous figure.
4.5.6 GARP The Generic Attribute Registration Protocol (GARP) is a local area network (LAN) protocol. The protocol defines procedures for the registration and de-registration of attributes (network identifiers or addresses) by end stations and switches with each other. 4.5.6.1 GARP Settings To access this page, click L2 Switching >...
4.5.6.2 GVRP Settings The GVRP Settings page allows you to enable or disable the GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) protocol which facili- tates control of virtual local area networks (VLANs) within a larger network. To access this page, click L2 Switching > GARP > GVRP Settings. Figure 4.28 L2 Switching >...
4.5.8 Multicast Multicast forwarding allows a single packet to be forwarded to multiple destinations. The service is based on L2 switch receiving a single packet addressed to a specific Multicast address. Multicast forwarding creates copies of the packet, and transmits the packets to the relevant ports.
4.5.8.2 IGMP Snooping IGMP Snooping is defined as the process of listening to Internet Group Management Protocol (IGMP) network traffic. IGMP Snooping allows a network switch to listen in on the IGMP conversation between hosts and routers and maintain a map of which links need which IP multicast streams.
IGMP Querier IGMP Querier allows snooping to function by creating the tables for snooping. Gen- eral queries must be unconditionally forwarded by all switches involved in IGMP snooping. To access this page, click L2 Switching > Multicast > IGMP Snooping > IGMP Querier.
Multicast Groups To access this page, click L2 Switching > Multicast > IGMP Snooping > Multicast Groups. The ensuing table for Multicast Groups settings are informational only: VLAN ID, Group IP Address, Member Ports, Type and Life (Sec). Router Ports To access this page, click L2 Switching >...
MLD Querier The MLD Querier page allows you to select and enable/disable the MLD querier and define the version (IGMPv1 or IGMPv2) when enabled. To access this page, click L2 Switching > Multicast > MLD Snooping > MLD Que- rier. Figure 4.35 L2 Switching >...
Multicast Groups To access this page, click L2 Switching > Multicast > MLD Snooping > Multicast Groups. The ensuing table for Multicast Groups settings are informational only: ID, Group IP Address, Member Ports, Type and Life (Sec). Router Ports To access this page, click L2 Switching > Multicast > MLD Snooping > Router Ports.
4.5.10 Spanning Tree The Spanning Tree Protocol (STP) is a network protocol to ensure loop-free topology for any bridged Ethernet local area network. 4.5.10.1 STP Global Settings The STP Global Settings page allows you to set the STP status, select the configura- tion for a BPDU packet, choose the path overhead, force version and set the configu- ration revision range.
4.5.10.2 STP Port Settings The STP Port Settings page allows you to configure the ports for the setting, port’s contribution, configure edge port, and set the status of the BPDU filter. To access this page, click L2 Switching > Spanning Tree > STP Port Settings. Figure 4.39 L2 Switching >...
4.5.10.3 STP Bridge Settings The STP Bridge Settings page allows you to configure the priority, forward delay, maximum age, Tx hold count, and the hello time for the bridge. To access this page, click L2 Switching > Spanning Tree > STP Bridge Settings. Figure 4.40 L2 Switching >...
4.5.10.4 STP Port Advanced Settings The STP Port Advanced Settings page allows you to select the port list to apply this setting. To access this page, click L2 Switching > Spanning Tree > STP Port Advanced Settings. Figure 4.41 L2 Switching > Spanning Tree > STP Port Advanced Settings The following table describes the items in the previous figure.
4.5.10.6 MST Instance ID Settings The MST Instance ID Settings page allows you to edit the MSTI ID and VID List set- tings. To access this page, click L2 Switching > Spanning Tree > MST Instance ID Set- tings. Figure 4.43 L2 Switching > Spanning Tree > MST Instance ID Settings The following table describes the items in the previous figure.
4.5.10.8 MST Instance Info To access this page, click L2 Switching > Spanning Tree > MST Instance Info. The ensuing table for STP Bridge Status settings are informational only: Bridge Identifier, Designated Root Bridge, Root Path Cost, Designated Bridge, Root Port and TCNLast Topology Change.
4.5.11.2 X-Ring Elite Groups The X-Ring Elite Groups page allows you to select the function and role for each device and the connected ports. To access this page, click L2 Switching > X-Ring Elite > X-Ring Elite Groups. Figure 4.46 L2 Switching > X-Ring Elite > X-Ring Elite Groups The following table describes the items in the previous figure.
4.5.12.2 X-Ring Pro Groups The X-Ring Pro Groups page allows you to select the function and role for each ring ID and its connected ports. To access this page, click L2 Switching > X-Ring Pro > X-Ring Pro Groups. Figure 4.48 L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro Groups Settings The following table describes the items in the previous figure.
4.5.13 Loopback Detection The Loopback Detection function is used to detect looped links. By sending detection frames and then checking to see if the frames returned to any port on the device, the function is used to detect loops. 4.5.13.1 Global Settings The Global Settings page allows you to configure the state (enabled or disabled) of the function, select the interval at which frames are transmitted and the delay before...
Item Description Enabled Select Enabled or Disabled to setup the Loopback Detection func- tion. Apply Click Apply to save the values and update the screen. The ensuing table for Loopback Detection Port Information settings are informa- tional only: Port, Enable State and Loop Status. MAC Address Table The MAC Address Table provides access to the Static MAC Settings, MAC Aging Time, and Dynamic Forwarding.
4.6.2 MAC Aging Time The MAC Aging Time page allows you to set the MAC address of the aging time to study. To access this page, click MAC Address Table > MAC Aging Time. Figure 4.53 MAC Address Table > MAC Aging Time The following table describes the items in the previous figure.
The ensuing table for MAC Address Information settings are informational only: MAC Address, VLAN, Type, Port and Add to Static MAC (click to add the MAC address to static MAC address list). Security The Security function allows for the configuration of Storm Control, Port Security, Pro- tected Ports, DoS Prevention, Applications, 802.1x, and IP Security.
4.7.1.2 Port Settings The Port Settings page allows you to configure the port and the type of storm control association along with the value of the storm rate for the selected port. To access this page, click Security > Storm Control > Port Settings. Figure 4.56 Security >...
4.7.2 Port Security The Port Security page allows you to configure port isolation behavior. To access this page, click Security > Port Security. Figure 4.57 Security > Port Security The following table describes the items in the previous figure. Item Description Port Select Enter a single or multiple port numbers to configure.
4.7.4 DoS Prevention The DoS Prevention page allows you to setup (enabled or disabled) the denial of ser- vice. 4.7.4.1 DoS Global Settings The DoS Global Settings page allows you to configure (enabled or disabled) the set- ting for each function. To access this page, click Security >...
Page 89
Item Description UDP Blat Click Enabled or Disabled to define UDP Blat for the DoS Global set- tings. TCP Blat Click Enabled or Disabled to define TCP Blat for the DoS Global set- tings. Click Enabled or Disabled to define POD for the DoS Global settings. IPv6 Min Fragment Click Enabled or Disabled to define minimum fragment size for the IPv6 protocol.
4.7.4.2 DoS Port Settings The DoS Port Settings page allow you to configure DoS security (enabled or dis- abled) for the selected port. To access this page, click Security > DoS Prevention > DoS Port Settings. Figure 4.60 Security > DoS Prevention > DoS Port Settings The following table describes the items in the previous figure.
4.7.5.2 Secure Shell (SSH) is a protocol providing secure (encrypted) management connec- tion to a remote device. To access this page, click Security > Applications > SSH. Figure 4.62 Security > Applications > SSH The following table describes the items in the previous figure. Item Description SSH Service...
4.7.5.4 HTTPS The HTTPS page allows you to combine all kinds of AAA lists on the HTTPS line. Attempts to access the switch’s Web UI from HTTPS are first authenticated. To access this page, click Security > Applications > HTTPS. Figure 4.64 Security >...
4.7.6 802.1x The 802.1x function provides port-based authentication to prevent unauthorized devices (clients) from gaining access to the network. 4.7.6.1 802.1x Settings The 802.1x Settings page allows you to set the state (enabled or disabled) for the selected IP server address, port, accounting port and associated password, including a reauthentication period.
4.7.6.2 802.1x Port Configuration The 802.1x Port Configuration page allows you to identify the authorization state for a port by using a MAC or Port authentication base. To access this page, click Security > 802.1x > 802.1x Port Configuration. Figure 4.66 Security > 802.1x > 802.1x Port Configuration The following table describes the items in the previous figure.
4.7.7.2 Entry Settings Once the Global Setting is enabled, use the Entry Settings to define an IP Security entry. To access this page, click Security > IP Security > Entry Settings. Figure 4.68 Security > IP Security > Entry Settings The following table describes the items in the previous figure.
The QoS function allows you to configure settings for the switch QoS interface and how the switch connects to a remote server to get services. 4.8.1 General Traditionally, networks operate on a best-effort delivery basis, all traffic has equal pri- ority and an equal chance of being delivered in a timely manner.
4.8.1.2 QoS Settings Once the QoS function is enabled, you can configure the available settings. To access this page, click QoS > General > QoS Settings. Figure 4.70 QoS > General > QoS Settings The following table describes the items in the previous figure. Item Description Port...
4.8.1.3 Queue Scheduling The switch support eight CoS queues for each egress port. For each of the eight queues, two types of scheduling can be configured: Strict Priority and Weighted Round Robin (WRR). Strict Priority scheduling is based on the priority of queues. Packets in a high-priority queue are always sent first and packets in a low-priority queue are only sent after all the high priority queues are empty.
4.8.1.4 CoS Mapping The CoS Mapping allows you to apply CoS mapping. To access this page, click QoS > General > CoS Mapping. Figure 4.72 QoS > General > CoS Mapping The following table describes the items in the previous figure. Item Description CoS to Queue Mapping...
4.8.1.5 DSCP Mapping The DSCP to Queue mapping function maps queue values in incoming packets to a DSCP value that QoS uses internally to represent the priority of the traffic. The fol- lowing table shows the DSCP to Queue map. If these values are not appropriate for your network, you need to modify them.
4.8.1.6 IP Precedence Mapping The IP Precedence Mapping allows you to set IP Precedence mapping. To access this page, click QoS > General > IP Precedence Mapping. Figure 4.74 QoS > General > IP Precedence Mapping The following table describes the items in the previous figure. Item Description IP Precedence to Queue Mapping...
4.8.2 QoS Basic Mode Quality of Service (QoS) allows to give preferential treatment to certain types of traffic at the expense of others. Without QoS, the switch offers best-effort service to each packet, regardless of the packet contents or size sending the packets without any assurance of reliability, delay bounds, or throughput.
4.8.3 Rate Limit Rate Limits features control on a per port basis. Bandwidth control is supported for the following: Ingress Bandwidth Control, Egress Bandwidth Control and Egress Queue. 4.8.3.1 Ingress Bandwidth Control The Ingress Bandwidth Control page allows you to configure the bandwidth control for a listed port.
Item Description Rate (Kbps) Enter the value in Kbps (16 to 1000000) to set the Egress Bandwidth rate. Apply Click Apply to save the values and update the screen. The ensuing table for Egress Bandwidth Control Status settings are informational only: Port and Egress Rate Limit (Kbps).
Management 4.9.1 LLDP LLDP is a one-way protocol without request/response sequences. Information is advertised by stations implementing the transmit function, and is received and pro- cessed by stations implementing the receive function. 4.9.1.1 LLDP System Settings The LLDP System Settings allows you to configure the status (enabled or disabled) for the protocol, set the interval for frame transmission, set the hold time multiplier and the re-initialization delay.
4.9.1.2 LLDP Port Settings The LLDP Port Settings page allows you to configure the state (enabled or disabled) of the selected port. To access this page, click Management > LLDP > LLDP Port Settings. Figure 4.81 Management > LLDP > LLDP Port Settings > LLDP Port Configuration The following table describes the items in the previous figure.
The ensuing table for LLDP Port Status settings are informational only: Port, State and Selected Optional TLVs. Figure 4.83 Management > LLDP > LLDP Port Settings > VLAN Name TLV VLAN Selection The following table describes the items in the previous figure. Item Description Port Select...
4.9.1.4 LLDP Remote Device Info The LLDP Remote Device Info page allows you to view information about remote devices, LLDP information must be available on the switch. To access this page, click Management > LLDP > LLDP Remote Device Info. Figure 4.85 Management >...
4.9.2 SNMP Simple Network Management Protocol (SNMP) is a protocol to facilitate the monitor- ing and exchange of management information between network devices. Through SNMP, the health of the network or status of a particular device can be determined. 4.9.2.1 SNMP Settings The SNMP Settings page allows you to set the SNMP daemon state (enabled or dis- abled).
4.9.2.3 SNMP User Settings The SNMP User Settings page allows you to create SNMP groups. The users have the same level of security and access control permissions as defined by the group settings. To access this page, click Management > SNMP > SNMP User Settings. Figure 4.89 Management >...
4.9.2.4 SNMP Trap The SNMP Trap page allows you to set the IP address of the node and the SNMP credentials corresponding to the version that is included in the trap message. To access this page, click Management > SNMP > SNMP Trap. Figure 4.90 Management >...
4.9.3.1 PoE System Settings The PoE System Settings page allows you to configure the overload disconnect and the maximum available wattage. To access this page, click Management > Power Over Ethernet > PoE System Settings. Figure 4.91 Management > Power Over Ethernet > PoE System Settings The following table describes the items in the previous figure.
4.9.3.2 PoE Port Settings The PoE Port Settings page allows you to configure the port status, its power limita- tions, legacy mode status, and power limit settings. To access this page, click Management > Power Over Ethernet > PoE Port Set- tings.
4.9.4 TCP Modbus The TCP Modbus function allows for client-server communication between a switch module (server) and a device in the networking running MODBUS client software (cli- ent). 4.9.4.1 TCP Modbus Settings The TCP Modbus Settings page allows you to configure the modbus function. To access this page, click Management >...
4.9.5 DHCP Server The Dynamic Host Configuration Protocol (DHCP) is a network protocol enabling a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network. 4.9.5.1 Status Settings The Status Settings page allows you to configure the DHCP server mode (enabled or disabled).
4.9.5.2 Global Settings The Global Settings page allows you to configure the global settings for the DHCP function. To access this page, click Management > DHCP Server > Global Settings. Figure 4.95 Management > DHCP Server > Global Settings The following table describes the items in the previous figure. Item Description Lease Time...
4.9.5.3 Port Settings The Port Settings page allows you to configure selected ports for the DHCP function. To access this page, click Management > DHCP Server > Port Settings. Figure 4.96 Management > DHCP Server > Port Settings The following table describes the items in the previous figure. Item Description Port Select...
4.9.5.4 Option 82 Settings The Option 82 Settings, also known as the DHCP relay agent information option, pro- vide information about the network location of a DHCP client. In turn, the DHCP server uses the information to implement IP addresses or other parameters for the client.
4.9.5.5 Lease Entry To access this page, click Management > DHCP Server > Lease Entry. Figure 4.98 Management > DHCP Server > Lease Entry The ensuing table for Lease entry Table settings are informational only: IP Address, Client Mac, Start Time, End Time and Type. 4.9.6 SMTP Client Simple Mail Transfer Protocol (SMTP) is a protocol to send e-mail messages...
4.9.6.2 Profile Settings The Profile Settings page allows you to select the server IP, the server port, and sender mail for the listed profile. To access this page, click Management > SMTP Client > Profile Settings. Figure 4.100 Management > SMTP Client > Profile Settings > Profile Settings The following table describes the items in the previous figure.
4.9.6.3 Sending Message The Sending Message page allows you to setup the log message for use with the SMTP client. To access this page, click Management > SMTP Client > Sending Message. Figure 4.102 Management > SMTP Client > Sending Message The following table describes the items in the previous figure.
4.9.7 RMON Remote monitoring (RMON) uses a client-server model to monitor/manage remote devices on a network. 4.9.7.1 RMON Statistics The RMON Statistics page allows you to view information regarding packet sizes and information for physical layer errors. The information displayed is according to the RMON standard.
4.9.7.2 RMON History The RMON History page allows you to configure the display of history entries. To access this page, click Management > RMON > RMON History. Figure 4.104 Management > RMON > RMON History The following table describes the items in the previous figure. Item Description Index...
4.9.7.3 RMON Alarm The RMON Alarm page allows you to configure RMON statistics group and alarm groups. To access this page, click Management > RMON > RMON Alarm. Figure 4.105 Management > RMON > Rmon Alarm The following table describes the items in the previous figure. Item Description Index...
4.9.7.4 RMON Event The RMON Event page is used to configure RMON event groups. To access this page, click Management > RMON > RMON Event. Figure 4.106 Management > RMON > RMON Event The following table describes the items in the previous figure. Item Description Index...
4.10 Diagnostics Through the Diagnostics function configuration of settings for the switch diagnostics is available. 4.10.1 Cable Diagnostics The Cable Diagnostics page allows you to select the port for applying a copper test. To access this page, click Diagnostics > Cable Diagnostics. Figure 4.107 Diagnostics >...
4.10.2 Ping Test The Ping Test page allows you to configure the test log page. To access this page, click Diagnostics > Ping Test. Figure 4.108 Diagnostics > Ping Test The following table describes the items in the previous figure. Item Description IP Address...
Page 128
Item Description Ping Results Display the reply format of ping. PING 172.17.8.254 (172.17.8.254): 56 data bytes --- 172.17.8.254 ping statistics --- 4 packets transmitted, 0 packets received, 100% packet loss PING 172.17.8.93 (172.17.8.93): 56 data bytes 64 bytes from 172.17.8.93: icmp_seq=0 ttl=128 time=0.0 ms 64 bytes from 172.17.8.93: icmp_seq=1 ttl=128 time=0.0 ms 64 bytes from 172.17.8.93: icmp_seq=2 ttl=128 time=0.0 ms 64 bytes from 172.17.8.93: icmp_seq=3 ttl=128 time=0.0 ms...
4.10.3 IPv6 Ping Test The IPv6 Ping Test page allows you to configure the Ping Test for IPv6. To access this page, click Diagnostics > IPv6 Ping Test. Figure 4.109 Diagnostics > IPv6 Ping Test The following table describes the items in the previous figure. Item Description IPv6 Address...
4.10.4.2 Local Logging The Local Logging page allows you to designate a local target when the severity cri- teria is reached. To access this page, click Diagnostics > System Log > Local Logging. Figure 4.111 Diagnostics > System Log > Local Logging The following table describes the items in the previous figure.
4.10.4.3 System Log Server The System Log Server page allows you to configure the log server. To access this page, click Diagnostics > System Log > System Log Server. Figure 4.112 Diagnostics > System Log > System Log Server The following table describes the items in the previous figure. Item Description Server Address...
4.10.5 The DDM page allows you to setup the diagnostic alarm status. To access this page, click Diagnostics > DDM. Figure 4.113 Diagnostics > DDM The following table describes the items in the previous figure. Item Description Diagnostic Alarm Click the drop-down menu to designate the announcement method: Disabled, SysLog, E-mail, or SNMP.
4.11 Tools 4.11.1 The IXM tool is an industrial Ethernet switch solution to help the users deploy indus- trial Ethernet switch hardware by allowing users with multiple, managed Ethernet switches in the field to eliminate the need to individually connect to each device to configure it.
4.11.2 Backup Manager The Backup Manager page allows you to configure a remote TFTP sever or host file system in order to backup the firmware image or configuration file. To access this page, click Tools > Backup Manager. Figure 4.116 Tools > Backup Manager The following table describes the items in the previous figure.
4.11.3 Upgrade Manager The Upgrade Manager page allows you to configure a remote TFTP sever or host file system in order to upload firmware upgrade images or configuration files. To access this page, click Tools > Upgrade Manager. Figure 4.117 Tools > Upgrade Manager The following table describes the items in the previous figure.
4.11.4 Dual Image The Dual Image page allows you to setup an active and backup partitions for firm- ware image redundancy. To access this page, click Tools > Dual Image. Figure 4.118 Tools > Dual Image The following table describes the items in the previous figure. Item Description Active Image...
Item Description Password Enter the character set for the define password type. Retype Password Retype the password entry to confirm the profile password. Privilege Type Click the drop-down menu to designate privilege authority for the user entry: Admin or User. Apply Click Apply to create a new user account.
4.12 Modbus/TCP Mapping The data map addresses of Advantech switches shown in the following table start from Modbus address 30001 for function code 4. In the given example, the address offset 0x1000 (hex) equals Modbus address 34097, while the address offset 0x1100 (hex) equals Modbus address 34353.
Page 140
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) System Info Revision Num- ASCII 0x0211 30530 Product Name = words chars "YYY.xxxxx" Word 0 Hi byte = 'Y' Word 0 Lo byte = 'Y' Word 1 Hi byte = 'Y' Word 1 Lo byte = '.' Word 2 Hi byte = 'x' Word 2 Lo byte = 'x'...
Page 141
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Port Info Port Speed 1 word 16 bits HEX 0x1100 ~ 34353 ~ Port Speed 0x111F 34384 0x0000: 10M-Half 0x0001: 10M-Full 0x0002: 100M-Half 0x0003: 100M-Full 0x0004: 1000M-Half 0x0005: 1000M-Full 0xFFFF: No port Port 1 Speed 1 word 16 bits HEX 0x1100...
Page 142
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Port Info Port 7 Flow 1 word 16 bits HEX 0x1206 34615 Control Port 8 Flow 1 word 16 bits HEX 0x1207 34616 Control Port 9 Flow 1 word 16 bits HEX 0x1208 34617 Control...
Page 143
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Port Info Port Descrip- ASCII 0x1400 ~ 35121 ~ Port Description tion words chars 0x166C 35741 Port Description = "100RX,RJ45." Word 0 Hi byte = '1' Word 0 Lo byte = '0' Word 1Hi byte = '0' Word 1 Lo byte = ‘R’...
Page 144
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Port Info Port 24 ASCII 0x15CC 35581 Description words chars Port 25 ASCII 0x15E0 35601 Description words chars Port 26 ASCII 0x15F4 35621 Description words chars Port 27 ASCII 0x1608 35641 Description words...
Page 145
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Port Info Port 20 Link 1 word 16 bits HEX 0x1713 35908 Up Counter Port 21 Link 1 word 16 bits HEX 0x1714 35909 Up Counter Port 22 Link 1 word 16 bits HEX 0x1715 35910 Up Counter...
Page 146
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Port Info Port 16 PoE 1 word 16 bits HEX 0x180F 36160 Voltage Port 17 PoE 1 word 16 bits HEX 0x1810 36161 Voltage Port 18 PoE 1 word 16 bits HEX 0x1811 36162 Voltage...
Page 147
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Port Info Port 12 PoE 1 word 16 bits HEX 0x182B 36188 Current Port 13 PoE 1 word 16 bits HEX 0x182C 36189 Current Port 14 PoE 1 word 16 bits HEX 0x182D 36190 Current...
Page 148
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Port Info Port 8 PoE 1 word 16 bits HEX 0x1847 36216 Power Port 9 PoE 1 word 16 bits HEX 0x1848 36217 Power Port 10 PoE 1 word 16 bits HEX 0x1849 36218 Power...
Page 149
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Port Info Port 4 PoE 1 word 16 bits HEX 0x1863 36244 Temperature Port 5 PoE 1 word 16 bits HEX 0x1864 36245 Temperature Port 6 PoE 1 word 16 bits HEX 0x1865 36246 Temperature...
Page 150
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Packet Info Tx Packets 64 bits HEX 0x2000 ~ 38193 ~ Tx Packets Counter words 0x207C 38317 Ex: port 1 Tx Packet Amount = 11223344 Received MODBUS response: 0xAB4130 Word 0 = 0x0000 Word 1 = 0x0000 Word 2 = 0x00AB Word 3 = 0x4130...
Page 151
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Packet Info Port 27 Tx 64 bits HEX 0x2068 38297 Packets words Port 28 Tx 64 bits HEX 0x206C 38301 Packets words Port 29 Tx 64 bits HEX 0x2070 38305 Packets words Port 30 Tx...
Page 152
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Packet Info Port 21 Rx 64 bits HEX 0x2150 38529 Packets words Port 22 Rx 64 bits HEX 0x2154 38533 Packets words Port 23 Rx 64 bits HEX 0x2158 38537 Packets words Port 24 Rx...
Page 153
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Packet Info Port 16 Tx 32 bits HEX 0x221E 38735 Error Packets words Port 17 Tx 32 bits HEX 0x2220 38737 Error Packets words Port 18 Tx 32 bits HEX 0x2222 38739 Error Packets...
Page 154
Catelog Name Data Type Interpretation Address Address Description Offset (Hex) Packet Info Port 11 Rx 32 bits HEX 0x2314 38981 Error Packets words Port 12 Rx 32 bits HEX 0x2316 38983 Error Packets words Port 13 Rx 32 bits HEX 0x2318 38985 Error Packets...
Troubleshooting Verify that the device is using the right DC power cord/adapter, or the device may be damaged. Select the proper UTP/STP cable to construct the user network. Use unshielded twisted-pair (UTP) or shield twisted-pair (STP) cable for RJ-45 connections that depend on the connector type the switch equipped: 100R Category 3, 4 or 5 cable for 10Mbps connections, 100R Category 5 cable for 100Mbps connec- tions, or 100R Category 5e/above cable for 1000Mbps connections.
Need help?
Do you have a question about the EKI-7708G-2SI-AE and is the answer not in the manual?
Questions and answers