Advantech EKI-7758F User Manual page 10

8g ports industrial managed redundant gigabit ethernet switch, 4 gigabit copper and 4 gigabit sfp
Table of Contents

Advertisement

Appendix B
Appendix C
EKI-7758F User Manual
Figure A.4: DB 9-pin female connector ...................... 87
X-View ........................................... 92
Figure C.1: X-View interface ...................................... 92
Figure C.5: Login interface ......................................... 94
Figure C.7: Reboot function ........................................ 95
Figure C.9: Refresh for single function ....................... 96
C.1
System .............................................. 98
C.1.1 System Information ..................... 98
Figure C.12: System information ................................ 98
C.1.2 IP Configuration .......................... 98
Figure C.13: IP Configuration-DHCP ...................... 99
Figure C.14: IP Configuration-Auto range ............... 99
Figure C.15: IP Configuration-Manual ................... 100
C.1.3 DHCP Server ............................ 100
Figure C.16: DHCP Server interface ......................... 101
Figure C.17: DHCP Server - Client Entries .............. 101
Figure C.18: DHCP Server - Port and IP Binding .... 102
C.1.4 TFTP Transaction...................... 102
Figure C.19: TFTP Transaction - Upgrade 1 ............ 102
Figure C.20: TFTP Transaction - Upgrade 2 ............ 103
Figure C.21: TFTP Transaction -Restore 1 ............... 103
Figure C.22: TFTP Transaction - Restore 2 .............. 104
Figure C.23: TFTP Transaction - Backup 1 .............. 104
Figure C.24: TFTP Transaction - Backup 2 .............. 105
C.1.5 System Event Log ..................... 105
Figure C.25: Syslog Configuration ............................ 105
Figure C.26: Syslog Table ......................................... 106
Figure C.27: SMTP Configuration ............................ 106
Figure C.28: Event Configuration ............................. 107
C.1.6 Time (SNTP) ............................. 107
Figure C.29: Event Configuration ............................. 108
C.1.7 IP Security ................................. 108
Figure C.30: IP Security ............................................ 109
C.1.8 User Authentication ................... 109
Figure C.31: User Authentication .............................. 109
C.2
Port .................................................. 110
C.2.1 Port Statistics ............................ 110
Figure C.32: Port Statistics ........................................ 110
C.2.2 Port Control ............................... 110
x

Advertisement

Table of Contents
loading

Table of Contents