Advantech EKI-2548I User Manual

Advantech EKI-2548I User Manual

8-port 10/100tx managed ethernet switch with wide operating temperature
Table of Contents

Advertisement

EKI-2548I
8-port 10/100TX Managed
Ethernet Switch with Wide
Operating Temperature

User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the EKI-2548I and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Advantech EKI-2548I

  • Page 1: User Manual

    EKI-2548I 8-port 10/100TX Managed Ethernet Switch with Wide Operating Temperature User Manual...
  • Page 2 The documentation and the software included with this product are copyrighted 2010 by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co., Ltd.
  • Page 3 Because of Advantech′s high quality-control standards and rigorous testing, most of our customers never need to use our repair service. If an Advantech product is defective, it will be repaired or replaced at no charge during the warranty period. For out-of-warranty repairs, you will be billed according to the cost of replacement materials, service time and freight.
  • Page 4 Step 2. Contact your distributor, sales representative, or Advantech’s customer service center for technical support if you need additional assistance. Please have the following information ready before you call: - Product name and serial number...
  • Page 5 Safety Instructions 1. Read these safety instructions carefully. 2. Keep this User's Manual for later reference. 3. Disconnect this equipment from any AC outlet before cleaning. Use a damp cloth. Do not use liquid or spray detergents for cleaning. 4. For plug-in equipment, the power outlet socket must be located near the equipment and must be easily accessible.
  • Page 6: Table Of Contents

    1.3 Specification............4 1.4 Packing List............6 1.5 Safety Precaution..........6 Chapter 2 Installation ......... 8 2.1 LED Indicators............8 Table 2.1: EKI-2548I LED Definition..........8 2.2 DIP Switch............. 9 DIP switch definition ..............9 2.3 Reset Button ............9 Figure 2.3-1 Reset Button............9...
  • Page 7 Figure 3.1-7 System Log Configuration........27 Figure 3.1-8 Event Configuration..........28 Table 3.1: UTC Timezone ............29 Figure 3.1-9 SNTP Configuration ...........30 Figure 3.1-10 IP Security............31 Figure 3.1-11 Security Manager ..........32 Figure 3.1-12 Email Alert Configuration ........33 Figure 3.1-13 Event Configuration..........34 Figure 3.1-14 Power Alarm Configuration........35 3.1.2 Port ............
  • Page 8 viii...
  • Page 9 Overview Sections include: Introduction Features Specifications Packing List Safety Precaution Chapter1...
  • Page 10: Introduction

    ) dual power inputs. If there is power failure, EKI-2548I will automatically switch to the secondary power input. 1.1.3 Flexible Mounting EKI-2548I is compact and can be mounted on a DIN-rail or panel, so it is suitable for any space-constrained environment. 1.1.4 Wide Operating Temperature The operating temperature of the EKI-2548I is between -40 ~ 75 C.
  • Page 11: Features

    1.2 Features • Provides 8 x 10/100 Mbps Ethernet ports with RJ45 connector • Redundancy: X-Ring, Dual Homing, Couple Ring, IEEE802.1d STP & IEEE802.1w RSTP • Management: Web, TFTP, SNMP • Traffic Control: IGMP Snooping, Query for multicast group management, Rate limit and storm control •...
  • Page 12: Specification

    LED Indicators Copper: Link/Activity, Speed Network Management Web browser, SNMP v1/v2c Configuration IEEE 802.1Q, Port-based VLAN VLAN ADVANTECH X-Ring (Recovery time < 10ms), Redundancy Dual Homing, Couple Ring, and 802.1w/d RSTP/STP IP Access Security Security IGMP Snooping/Query for multicast group...
  • Page 13 Environment -40 ~ 75 Operating Temperature -40 ~ 60 C (non-air-flow environment) 5 ~ 95% (non-condensing) Operating Humidity -40 ~ 85 Storage Temperature 5 ~ 95% (non-condensing) Storage Humidity Certifications UL 508 Safety UL/cUL Hazardous Location Class I, Division 2, Group A, B, C and D FCC Class A, CE EN61000-6-4 CE EN61000-6-2...
  • Page 14: Packing List

    1.4 Packing List • 1 x EKI-2548I Industrial Managed Fast Ethernet Switch • 1 x eAutomation Industrial Communication CD-ROM and User manual • 2 x Wall Mounting Bracket and Screws • 1 x DIN-rail Mounting Bracket and Screws • 1 x DC Jack Cable φ2.0/150mm •...
  • Page 15: Chapter 2 Installation

    Installation Sections include: LED Indicators DIP Switch Reset Button Dimensions Mounting Power Connection Chapter2...
  • Page 16: Led Indicators

    Chapter 2 Installation In this chapter, you will be given an overview of the EKI-2548I hardware installation procedures. 2.1 LED Indicators The LED indicators located on the front panel display the power status and network status of EKI-2548I; each has its own specific meaning as the table shown below.
  • Page 17: Dip Switch

    2.3 Reset Button Figure 2.3-2 Reset Button EKI-2548I provides users a quick and easy way to restart the system or reset the configuration back to default value by pressing the reset button. • Restart: press the button for 2 seconds and then release to restart the system.
  • Page 18: Dimensions (Units: Mm)

    2.4 Dimensions (units: mm) 59.6 Figure 2.4-1 Front View of EKI-2548I EKI-2548I_Manual_ed2...
  • Page 19 41.3 Figure 2.4-2 Side View of EKI-2548I Chapter2...
  • Page 20 15.2 Figure 2.4-3 Rear View of EKI-2548I EKI-2548I_Manual_ed2...
  • Page 21 114.62 0.62 Figure 2.4-4 Top View of EKI-2548I Chapter2...
  • Page 22: Mounting

    The EKI-2548I supports two mounting methods: DIN-rail & Wall mountings. 2.5.1 Wall Mounting EKI-2548I can be wall-mounted by using the included mounting kit. Then, hang on the EKI-2548I to the nails on the wall. First, use the screws included in the package to combine the EKI-2548I and metal mounting kit.
  • Page 23: Din-Rail Mounting

    The DIN-rail kit is screwed on the industrial switch when out of factory. If the DIN-rail kit is not screwed on the industrial switch, please screw the DIN-rail kit on the switch first. First, hang the EKI-2548I to the DIN-rail with angle of inclination. See the figure below. Figure 2.5-2...
  • Page 24: Installation To Din-Rail Step 2

    Then, hook the device over the DIN rail and let it drop down straight to slide over the rail smoothly. Figure 2.5-3 Installation to DIN-rail Step 2 EKI-2548I_Manual_ed2...
  • Page 25: Wiring Power And P-Fail Contacts

    2.6 Wiring Power and P-Fail Contacts The EKI-2548I supports dual +12 ~ 48 V and 24 V power inputs, and P-Fail relay output. Terminal Block Front View for P-Fail Alarm 24Vdc, 1A Contacts Resistance P-Fail Alarm Application Example Figure 2.6-1...
  • Page 26: X-Ring Application

    2.7 X-Ring Application The industrial switch supports the X-Ring protocol that can help the network system recover from network connection failure within 300ms or less and make the network system more reliable. The X-Ring algorithm is similar to Spanning Tree Protocol (STP) and Rapid STP (RSTP) algorithm but its recovery time is less than STP/RSTP.
  • Page 27: Coupling Ring Application

    2.8 Coupling Ring Application As the illustration shown below, users can use the X-Ring groups to form a coupling ring for redundant backup. It can ensure the transmissions between X-Ring groups not to fail. The following figure is a sample of coupling ring application. Note The Ethernet switches with firmware version before v3.0 use the X-Ring function that has the limitations as follows.
  • Page 28: Dual Homing Application

    2.9 Dual Homing Application The Dual Homing function is to prevent the connection loss between the particular X-Ring group and the upper level/core switch. Assign one port, and only one, to be the Dual Homing port that is the backup port in each single X-Ring group.
  • Page 29: Chapter 3 Configuration

    Configuration Sections include: Web Browser Chapter3...
  • Page 30: Web Browser

    • Subnet Mask: 255.255.255.0 • Default Gateway: 192.168.1.254 • User Name: admin • Password: admin Open Internet Explorer and type EKI-2548I’s IP in the Address field then press Enter to open the web login page. Figure 3.1-1 Type the address in the URL Figure 3.1-2...
  • Page 31 You can change the password in the system setting. In the main page, you can find the tree menu structure of the EKI-2548I in the left side. Click the “+” symbol to unroll the hiding hyperlink, and click the hyperlink to open the function page you want to configure.
  • Page 32: System

    3.1.1 System Switch Settings This page displays system information and gives users the interface to assign the system name, location, system contact, etc. • System Description: Displays the description of switch. Read only cannot be modified. • System Name: Assign the name of the switch. The maximum length is 64 bytes. •...
  • Page 33: Ip Configuration

    IP Configuration Users can configure the IP Settings and DHCP client function here. • DHCP Client: Enable or disable the DHCP client function. When DHCP client is enabled, the industrial switch will be assigned an IP address from the network DHCP server. The default IP address will be replaced by the assigned IP address from DHCP server.
  • Page 34: Tftp – Update Firmware

    TFTP - Update Firmware Trivial File Transfer Protocol (TFTP) is a very simple file transfer protocol with the functionality of a very basic form of FTP. It provides functions allowing the user to update the switch firmware. Before updating, make sure you have your TFTP server ready and the firmware image is on the TFTP server. •...
  • Page 35: Figure 3.1-7 System Log Configuration

    System Log – System Log Configuration Configure the system event mode to collect system log. • System Log Mode: Select the system log mode—Client Only, Server Only, or Both. • System Log Server IP: Assign the system log server IP. •...
  • Page 36: Figure 3.1-8 Event Configuration

    System Log – Event Configuration • System event selection: There are 4 event types—Device cold start, Power status, SNMP Authentication Failure, and X-ring topology change. Tick the check box beside the event label to collect the log information. Device cold start: When the device executes cold start action, the system will issue a log event.
  • Page 37: Table 3.1: Utc Timezone

    SNTP Configuration You can configure the SNTP (Simple Network Time Protocol) settings which allow you to synchronize the switch clock with an Internet time server. • UTC Timezone: Set the switch location time zone. The following table lists the different location time zone for your reference.
  • Page 38: Figure 3.1-9 Sntp Configuration

    ZP6 - USSR Zone 5 +6 hours 6 pm WAST - West Australian Standard +7 hours 7 pm CCT - China Coast, USSR Zone 7 +8 hours 8 pm JST - Japan Standard, USSR Zone 8 +9 hours 9 pm EAST - East Australian Standard GST +10 hours 10 pm...
  • Page 39: Figure 3.1-10 Ip Security

    IP Security The IP security function allows the user to assign 10 specific IP addresses that have permission to access the switch through the web browser for securing switch management. • IP Security Mode: Tick this check box to enable IP security. •...
  • Page 40: Figure 3.1-11 Security Manager

    Security Manager Change web management login user name and password for the management security issue. • User Name: Key in the new user name (The default is “admin”). • New Password: Key in the new password (The default is “admin”). •...
  • Page 41: Figure 3.1-12 Email Alert Configuration

    Alert – Email Alert Configuration When the specific event occurs, the system will send the alert to the email account assigned by users. Users can assign the mail server IP, email account, and forwarded email account for receiving the event alert.
  • Page 42: Figure 3.1-13 Event Configuration

    Alert – Event Configuration The selected events that occur will cause the system to send out alerts to the assigned SMTP server. Also, users can select port events for alerting. • System event selection: 4 selections – Device cold start, Power status, SNMP Authentication Failure, and X-Ring topology changes.
  • Page 43 Alert – Power Alarm Configuration The power alarm configuration enables the Relay alarm. • Tick the check box and click Apply to have the configuration take effect. Figure 3.1-14 Power Alarm Configuration Chapter3...
  • Page 44: Figure 3.1-15 Port Status

    3.1.2 Port Port setting includes Port Status, Port Statistics, Port Control, Port Mirroring, and Rate Control. Through this interface, users can set the parameters and control the packet flow among the ports. Port Status Displays port status depending on user’s setting and the negotiation result. •...
  • Page 45: Figure 3.1-16 Port Statistics

    Port Statistics The following information provides the current port statistics. • Port: Displays the port number. • Type: Displays the media type of the port. • Link: The status of linking—‘Up’ or ‘Down’. • State: The user can set the state of the port to ‘Enable’ or ‘Disable’ via the Port Control section. When the state is disabled, the port will not transmit or receive any packet.
  • Page 46: Figure 3.1-17 Port Control

    Port Control In Port Control, you can select ports and click the pull-down menus to set parameters of each port to control the transmitting/receiving packets. • Port: Select the port that you want to configure. • State: Current port status. The port can be set to Disable or Enable mode. When disabled, it will not receive or transmit any packet.
  • Page 47: Figure 3.1-18 Port Mirroring

    Port Mirroring The Port mirroring is a method to monitor traffic in switched networks. Traffic through ports can be monitored by one specific port. That is, traffic goes in or out monitored ports will be duplicated into the mirroring port. •...
  • Page 48 Rate Control Here you can set up every port’s packet limitation type and bandwidth rate. • Limit Packet Type: Select the packet type you want to filter. The packet types have 4 options for selecting: All, Broadcast/Multicast/Unknown Unicast, Broadcast/Multicast, and Broadcast only. The four packet type options are for ingress frames limitation.
  • Page 49: Figure 3.1-20 Vlan Configuration

    3.1.3 Protocol The user can configure the layer 2 protocol setting via this interface. VLAN configuration A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain, which would allow you to isolate network traffic, so only the members of the same VLAN will receive traffic from the others of the same VLAN.
  • Page 50 VLAN configuration - Port-based VLAN Packets can go among only members of the same VLAN group. Note all unselected ports are treated as belonging to another single VLAN. If the port-based VLAN enabled, the VLAN-tagging is ignored. In order for an end station to send packets to different VLAN groups, it itself has to be either capable of tagging packets it sends with VLAN tags or attached to a VLAN-aware bridge that is capable of classifying and tagging the packet with different VLAN ID based on not only default PVID but also other information about the packet, such as the protocol.
  • Page 51: Figure 3.1-22 Port-Based Mode--Add

    Figure 3.1-22 Port-based Mode--Add • Enter Group Name and VLAN ID. Having selected the port numbers, click Add to add the ports to the right field to group these members into a VLAN group or remove any of them listed in the right field from the VLAN.
  • Page 52 • Select the VLAN group name and click to modify group name, VLAN ID, or add/remove the Edit members of the existing VLAN group. Note Remember to click the Save button of the Save Configuration page, otherwise the new configuration will lose when switch powers off. EKI-2548I_Manual_ed2...
  • Page 53: Figure 3.1-24 802.1Q Vlan Configuration

    802.1Q VLAN Tagged-based VLAN is an IEEE 802.1Q specification standard. Therefore, it is possible to create a VLAN across devices from different switch venders. IEEE 802.1Q VLAN uses a technique to insert a “tag” into the Ethernet frames. The tag contains a VLAN Identifier (VID) that indicates the VLAN numbers. You can create a Tag-based VLAN, and enable/disable the GVRP protocol.
  • Page 54: Figure 3.1-25 Adding An 802.1Q Vlan

    Add an 802.1Q-based VLAN group. • Group Name: Specify the group name for the VLAN. • VLAN ID: Please enter the VLAN ID in the range of 2 to 4094. • Select ports and click the Add button to add them to the right field. •...
  • Page 55: Figure 3.1-26 Tag/Untag Member Ports

    Figure 3.1-26 Tag/Untag Member Ports Edit/Delete Modify or delete the existed VLAN groups. • Select an existed VLAN group from the list. • Click to modify Group Name, VLAN ID or change the members of the VLAN. Edit • Or click Delete to delete the VLAN. Chapter3...
  • Page 56: Figure 3.1-27 Port Vlan Id Setting

    802.1Q Configuration – Port VLAN ID Assign the Port VLAN ID for the selected ports. • Port: Select ports to be assigned a Port VLAN ID. • Port VLAN ID: Enter the Port VLAN ID in the range between 1 and 4094. •...
  • Page 57: Figure 3.1-28 Rstp System Configuration

    Rapid Spanning Tree The Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol and provides for faster spanning tree convergence after a topology change. The system also supports STP and the system will auto-detect the connected device that is running STP or RSTP protocol. RSTP - System Configuration •...
  • Page 58: Figure 3.1-29 Rstp Port Configuration

    RSTP - Port Configuration Here you can configure the path cost and priority of each port. • Select the port in the port column field. • Path Cost: The cost of the path to the other bridge from this transmitting bridge at the specified port. Enter a number between 1 and 200,000,000.
  • Page 59: Figure 3.1-30 Snmp Configuration

    SNMP Configuration Simple Network Management Protocol (SNMP) is the protocol developed to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth. Network management systems learn of problems by receiving traps or change notices from network devices implementing SNMP.
  • Page 60 • Click Add . • To remove the community string, select the community string listed in the current managers field and click Remove . EKI-2548I_Manual_ed2...
  • Page 61 QoS Configuration Here you can configure Qos policy and priority setting, port priority setting, COS and TOS setting. QoS Policy • Qos Policy: Select the QoS policy rule. Use an 8,4,2,1 weighted fair queuing scheme: The switch will follow 8:4:2:1 rate to process priority queue from High to lowest queue.
  • Page 62: Figure 3.1-31 Qos Configuration

    Figure 3.1-31 QoS Configuration EKI-2548I_Manual_ed2...
  • Page 63: Table 3.2: Igmp Types

    IGMP Configuration The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet Protocol (IP) suite. IP manages multicast traffic by using switches, routers, and hosts that support IGMP. Enabling IGMP allows the ports to detect IGMP queries, report packets, and manage IP multicast traffic through the switch.
  • Page 64 X-Ring X-Ring provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the algorithms between them are not the same. In the X-Ring topology, each switch should be enabled with the X-Ring function and two ports of each switch should be configured as the member ports in the ring.
  • Page 65 Note To enable the X-Ring function, users must disable the RSTP first. The X-Ring function and RSTP function cannot both be activated on a single switch. Remember to click the Save button of the Save Configuration page, otherwise the new configuration will lose when switch powers off. Chapter3...
  • Page 66: Figure 3.1-34 Tftp Restore Configuration

    3.1.4 Configuration Backup This interface allows users to back up the current configuration on the switch to the TFTP server. Also, users can restore the industrial switch to the backup configuration from the TFTP server. Figure 3.1-34 TFTP Restore Configuration TFTP Restore Configuration •...
  • Page 67: Figure 3.1-37 Save Configuration

    3.1.5 Factory Default Reset the switch to default configuration. Tick the check boxes to keep the current IP address, user name and password before reset. Click Reset to reset all configurations to the default value. Figure 3.1-36 Factory Default 3.1.6 Save Configuration Save all configurations that you have made to the system.
  • Page 68 EKI-2548I_Manual_ed2...
  • Page 69: Troubleshooting

    Troubleshooting Appendix A...
  • Page 70: Chapter 4 Troubleshooting

    Chapter 4 Troubleshooting Verify that you are using the right power cord/adapter. Don’t use the power adaptor with DC output voltage higher than the power rating of the equipment. Otherwise, it will burn down. Select the proper UTP cable to construct the user network. Use unshielded twisted-pair (UTP) or shield twisted-pair (STP) cable for RJ-45 connections: 100Ω...
  • Page 71 Pin Assignments & Wiring Appendix A...
  • Page 72: A.1 Rj-45 Port

    Appendix A Pin Assignments & Wiring A.1 RJ-45 Port It is suggested to adopt ELA/TIA as the wiring of the RJ-45. Figure A.1: RJ-45 Pin Assignments RJ-45 Pin Assignments Pin Number Function Note “+” and “-” signs represent the polarity of the wires that make up each wire pair. All ports on this industrial switch support automatic MDI/MDI-X operation, you can use straight-through cables (See the figure below) for all network connections to PCs or servers, or to other switches or hubs.
  • Page 73: Figure A.2: Eia/Tia-568B

    MDI/MDI-X Pin Assignments Pin Number MDI-X Signal Name MDI Signal Name Receive Data plus (RD+) Transmit Data plus (TD+) Receive Data minus (RD-) Transmit Data minus (TD-) Transmit Data plus (TD+) Receive Data plus (RD+) Transmit Data minus (TD-) Receive Data minus (RD-) Straight-through Cable Schematic Switch Router / PC...

Table of Contents