EKI-2548I 8-port 10/100TX Managed Ethernet Switch with Wide Operating Temperature User Manual
Copyright The documentation and the software included with this product are copyrighted 2010 by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co., Ltd. Information provided in this manual is intended to be accurate and reliable.
Product Warranty (2 years) Advantech warrants to you, the original purchaser, that each of its products will be free from defects in materials and workmanship for two years from the date of purchase. This warranty does not apply to any products which have been repaired or altered by persons other than repair personnel authorized by Advantech, or which have been subject to misuse, abuse, accident or improper installation.
Declaration of Conformity CE This product has passed the CE test for environmental specifications. Test conditions for passing included the equipment being operated within an industrial enclosure. In order to protect the product from being damaged by ESD (Electrostatic Discharge) and EMI leakage, we strongly recommend the use of CE-compliant industrial enclosure products.
Safety Instructions 1. Read these safety instructions carefully. 2. Keep this User's Manual for later reference. 3. Disconnect this equipment from any AC outlet before cleaning. Use a damp cloth. Do not use liquid or spray detergents for cleaning. 4. For plug-in equipment, the power outlet socket must be located near the equipment and must be easily accessible. 5. Keep this equipment away from humidity. 6. Put this equipment on a reliable surface during installation.
Contents Chapter 1 Overview............................................. 2 1.1 Introduction ........................................................... 2 1.1.1 High-Speed Transmissions.......................... 2 1.1.2 Dual Power Inputs........................................ 2 1.1.3 Flexible Mounting......................................... 2 1.1.4 Wide Operating Temperature ...................... 2 1.1.5 Easy Troubleshooting .................................. 2 1.2 Features ...............................
Figure 3.1-7 System Log Configuration..................................27 Figure 3.1-8 Event Configuration............................................28 Table 3.1: UTC Timezone ..........................................................29 Figure 3.1-9 SNTP Configuration ...........................................30 Figure 3.1-10 IP Security...........................................................31 Figure 3.1-11 Security Manager ................................................32 Figure 3.
viii
CHAPTER Overview Sections include: z Introduction z Features z Specifications z Packing List z Safety Precaution 1 Chapter1
Chapter 1 Overview 1.1 Introduction To create reliability in your network, the EKI-2548I comes equipped with a proprietary redundant network protocol—X-Ring that was developed by Advantech, which provides users with an easy way to establish a redundant Ethernet network with ultra high-speed recovery time less than 10 ms. 1.1.1 High-Speed Transmissions The EKI-2548I includes a switch controller that can automatically sense transmission speeds (10/100 Mbps).
1.2 Features • Provides 8 x 10/100 Mbps Ethernet ports with RJ45 connector • Redundancy: X-Ring, Dual Homing, Couple Ring, IEEE802.1d STP & IEEE802.
1.3 Specifications Communications Standard LAN Transmission Distance Transmission Speed IEEE 802.3, 802.3u, 802.3x IEEE 802.1d, 802.1p, 802.1Q, 802.1w 10/100Base-TX Up to 100m (4-wire Cat.5e, Cat.6 RJ-45 cable suggested) Up to 100Mbps Interface Connectors LED Indicators 8 x RJ-45 6-pin terminal block (Power & Relay) System: PWR1, PWR2, R.M., P-Fail Copper: Link/Activity, Speed Network Management Configuration VLAN Redundancy Security Traffic Control Diagnostics Web browser, SNMP v1/v2c IEEE 802.
Environment Operating Temperature Operating Humidity Storage Temperature Storage Humidity -40 ~ 75oC -40 ~ 60oC (non-air-flow environment) 5 ~ 95% (non-condensing) -40 ~ 85oC 5 ~ 95% (non-condensing) Certifications Safety Hazardous Location EMC Free Fall Shock Vibration UL 508 UL/cUL Class I, Division 2, Group A, B, C and D FCC Class A, CE EN61000-6-4 CE EN61000-6-2 CE EN61000-4-2 (ESD) CE EN61000-4-3 (RS) CE EN61000-4-4 (EFT) CE EN61000-4-5 (Surge) CE EN61000-4-6 (CS) CE EN61000-4-8 (Magnetic Field) CE
1.4 Packing List • • • • • • 1 x EKI-2548I Industrial Managed Fast Ethernet Switch 1 x eAutomation Industrial Communication CD-ROM and User manual 2 x Wall Mounting Bracket and Screws 1 x DIN-rail Mounting Bracket and Screws 1 x DC Jack Cable φ2.0/150mm 1 x EKI-2548I Startup Manual 1.5 Safety Precaution Attention IF DC voltage is supplied by an external circuit, please use a protection device on the power supply input.
CHAPTER Installation Sections include: z LED Indicators z DIP Switch z Reset Button z Dimensions z Mounting z Power Connection 7 Chapter2
Chapter 2 Installation In this chapter, you will be given an overview of the EKI-2548I hardware installation procedures. 2.1 LED Indicators The LED indicators located on the front panel display the power status and network status of EKI-2548I; each has its own specific meaning as the table shown below. Table 2.
2.2 DIP Switch The EKI-2548I Managed Industrial Switch provides a 9-pole DIP switch for configuring the relay alarm operation mode and the master ring operation mode. The user can enable the managed industrial switch as the ring master in the X-Ring group and RMaster LED indicator will light up. If the user enables the Port Alarm function, the PFail LED indicator will light up when link-down event of the respective port occurs. Each pole of the DIP switch is set to OFF by default. Pole No.
2.4 Dimensions (units: mm) 59.6 152 Figure 2.
41.3 40 9.6 50 48.5 53.5 Figure 2.
9.6 15.2 Figure 2.
9 114.62 105 Figure 2.4-4 0.
2.5 Mounting The EKI-2548I supports two mounting methods: DIN-rail & Wall mountings. 2.5.1 Wall Mounting EKI-2548I can be wall-mounted by using the included mounting kit. Then, hang on the EKI-2548I to the nails on the wall. First, use the screws included in the package to combine the EKI-2548I and metal mounting kit. And then you can install the device firmly via the components, please see Figure 2.5 as below. Figure 2.
2.5.2 DIN-rail Mounting You can also mount EKI-2548I on a standard DIN-rail by following the steps below. The DIN-rail kit is screwed on the industrial switch when out of factory. If the DIN-rail kit is not screwed on the industrial switch, please screw the DIN-rail kit on the switch first. First, hang the EKI-2548I to the DIN-rail with angle of inclination. See the figure below. Figure 2.
Then, hook the device over the DIN rail and let it drop down straight to slide over the rail smoothly. Figure 2.
2.6 Wiring Power and P-Fail Contacts The EKI-2548I supports dual +12 ~ 48 VDC and 24 VAC power inputs, and P-Fail relay output. Terminal Block Front View for P-Fail Alarm Contacts 24Vdc, 1A Resistance P-Fail Alarm Application Example Figure 2.6-1 Pin Assignments of the Terminal Block You can connect an alarm indicator, buzzer or other signaling equipment through the relay output.
2.7 X-Ring Application The industrial switch supports the X-Ring protocol that can help the network system recover from network connection failure within 300ms or less and make the network system more reliable. The X-Ring algorithm is similar to Spanning Tree Protocol (STP) and Rapid STP (RSTP) algorithm but its recovery time is less than STP/RSTP. The figure below is a sample of X-Ring application. Note The Ethernet switches with firmware version before v3.
2.8 Coupling Ring Application As the illustration shown below, users can use the X-Ring groups to form a coupling ring for redundant backup. It can ensure the transmissions between X-Ring groups not to fail. The following figure is a sample of coupling ring application. Note The Ethernet switches with firmware version before v3.0 use the X-Ring function that has the limitations as follows. However, the ones with firmware version after v3.
2.9 Dual Homing Application The Dual Homing function is to prevent the connection loss between the particular X-Ring group and the upper level/core switch. Assign one port, and only one, to be the Dual Homing port that is the backup port in each single X-Ring group. The Dual Homing function only works when the X-Ring function is active. Note The Ethernet switches with firmware version before v3.0 use the X-Ring function that has the limitations as follows. However, the ones with firmware version after v3.
CHAPTER Configuration Sections include: z Web Browser 21 Chapter3
Chapter 3 Configuration 3.1 Web Browser EKI-2548I provides a convenient configuring way via web browser. You can follow the steps below to access EKI-2548I. EKI-2548I’s default IP is 192.168.1.1. Make sure your host PC and EKI-2548I are on the same logical sub-network. Warning Your host PC should be in the same VLAN setting with EKI-2548I, or the management will not be configured. Connect EKI-2548I to the Ethernet then your host PC could be configured via Ethernet.
The default user name and password are both admin, fill in the user name and password then press OK to enter the configuration. You can change the password in the system setting. In the main page, you can find the tree menu structure of the EKI-2548I in the left side. Click the “+” symbol to unroll the hiding hyperlink, and click the hyperlink to open the function page you want to configure. Figure 3.
3.1.1 System Switch Settings This page displays system information and gives users the interface to assign the system name, location, system contact, etc. • • • • • • • • System Description: Displays the description of switch. Read only cannot be modified. System Name: Assign the name of the switch. The maximum length is 64 bytes. System Location: Assign the switch physical location. The maximum length is 64 bytes. System Contact: Enter the name of contact person or organization.
IP Configuration Users can configure the IP Settings and DHCP client function here. • DHCP Client: Enable or disable the DHCP client function. When DHCP client is enabled, the industrial switch will be assigned an IP address from the network DHCP server. The default IP address will be replaced by the assigned IP address from DHCP server. After users click the Apply button, a popup dialog shows up.
TFTP - Update Firmware Trivial File Transfer Protocol (TFTP) is a very simple file transfer protocol with the functionality of a very basic form of FTP. It provides functions allowing the user to update the switch firmware. Before updating, make sure you have your TFTP server ready and the firmware image is on the TFTP server. • TFTP Server IP Address: Fill in your TFTP server IP. • Firmware File Name: Type in the name of firmware image. • And then, click Apply Figure 3.
System Log – System Log Configuration Configure the system event mode to collect system log. • System Log Mode: Select the system log mode—Client Only, Server Only, or Both. • System Log Server IP: Assign the system log server IP. • When System Log Mode is set to Client Only, the system event log will only be reserved in the switch’s RAM until next reboot.
System Log – Event Configuration • System event selection: There are 4 event types—Device cold start, Power status, SNMP Authentication Failure, and X-ring topology change. Tick the check box beside the event label to collect the log information. ¾ Device cold start: When the device executes cold start action, the system will issue a log event. ¾ Power status: When the power status of the device changes, the system will issue a log event.
SNTP Configuration You can configure the SNTP (Simple Network Time Protocol) settings which allow you to synchronize the switch clock with an Internet time server. • UTC Timezone: Set the switch location time zone. The following table lists the different location time zone for your reference. Table 3.
ZP6 - USSR Zone 5 +6 hours 6 pm WAST - West Australian Standard +7 hours 7 pm CCT - China Coast, USSR Zone 7 +8 hours 8 pm JST - Japan Standard, USSR Zone 8 +9 hours 9 pm EAST - East Australian Standard GST Guam Standard, USSR Zone 9 +10 hours 10 pm IDLE - International Date Line NZST - New Zealand Standard NZT - New Zealand +12 hours Midnight • SNTP Sever IP: Set the SNTP server IP address. • Switch Timer: Displays the current time of the switch.
IP Security The IP security function allows the user to assign 10 specific IP addresses that have permission to access the switch through the web browser for securing switch management. • IP Security Mode: Tick this check box to enable IP security. • Security IP 1 ~ 10: The system allows the user to assign up to 10 specific IP addresses for access security. Only these 10 IP addresses can access and manage the switch through the HTTP service. • And then, click Apply to have the configuration take effect.
Security Manager Change web management login user name and password for the management security issue. • User Name: Key in the new user name (The default is “admin”). • New Password: Key in the new password (The default is “admin”). • Confirm Password: Re-type the new password for confirmation. • And then, click Apply to have the configuration take effect. Figure 3.
Alert – Email Alert Configuration When the specific event occurs, the system will send the alert to the email account assigned by users. Users can assign the mail server IP, email account, and forwarded email account for receiving the event alert. • Email Alert: Enable or disable the email alert function. • SMTP Server IP Address: Assign the mail server IP address. • Authentication: Tick the check box to enable and configure the email account/password for authentication.
Alert – Event Configuration The selected events that occur will cause the system to send out alerts to the assigned SMTP server. Also, users can select port events for alerting. • System event selection: 4 selections – Device cold start, Power status, SNMP Authentication Failure, and X-Ring topology changes. Tick the check box to select the event. When selected events occur, the system will sent out the alert.
Alert – Power Alarm Configuration The power alarm configuration enables the Relay alarm. • Tick the check box and click Apply to have the configuration take effect. Figure 3.
3.1.2 Port Port setting includes Port Status, Port Statistics, Port Control, Port Mirroring, and Rate Control. Through this interface, users can set the parameters and control the packet flow among the ports. Port Status Displays port status depending on user’s setting and the negotiation result. • • • • Port: Displays the port number. Type: Displays the media type of the port. Link: The status of linking—‘Up’ or ‘Down’.
Port Statistics The following information provides the current port statistics. • • • • • • • • • • • • • Port: Displays the port number. Type: Displays the media type of the port. Link: The status of linking—‘Up’ or ‘Down’. State: The user can set the state of the port to ‘Enable’ or ‘Disable’ via the Port Control section. When the state is disabled, the port will not transmit or receive any packet. Tx Good Packet: The counts of transmitting good packets via this port.
Port Control In Port Control, you can select ports and click the pull-down menus to set parameters of each port to control the transmitting/receiving packets. • Port: Select the port that you want to configure. • State: Current port status. The port can be set to Disable or Enable mode. When disabled, it will not receive or transmit any packet. • Negotiation: Auto and Force. Being set to Auto, the speed and duplex mode are negotiated automatically.
Port Mirroring The Port mirroring is a method to monitor traffic in switched networks. Traffic through ports can be monitored by one specific port. That is, traffic goes in or out monitored ports will be duplicated into the mirroring port. • Port Mirroring Mode: Set mirroring mode -- Disable, TX Only, and Both. The default value is “Disable”. • Analysis Port: Select one port to be the mirroring port to see all monitored port traffic. Users can connect the mirroring port to LAN analyzer or Netxray.
Rate Control Here you can set up every port’s packet limitation type and bandwidth rate. • Limit Packet Type: Select the packet type you want to filter. The packet types have 4 options for selecting: All, Broadcast/Multicast/Unknown Unicast, Broadcast/Multicast, and Broadcast only. The four packet type options are for ingress frames limitation. The egress rate only supports ‘All’ type.
3.1.3 Protocol The user can configure the layer 2 protocol setting via this interface. VLAN configuration A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain, which would allow you to isolate network traffic, so only the members of the same VLAN will receive traffic from the others of the same VLAN. Basically, creating a VLAN on the switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch.
VLAN configuration - Port-based VLAN Packets can go among only members of the same VLAN group. Note all unselected ports are treated as belonging to another single VLAN. If the port-based VLAN enabled, the VLAN-tagging is ignored.
Figure 3.1-22 Port-based Mode--Add • Enter Group Name and VLAN ID. Having selected the port numbers, click Add to add the ports to the right field to group these members into a VLAN group or remove any of them listed in the right field from the VLAN. • And then, click Apply to have the settings take effect. • You will see the VLAN displays. Figure 3.1-23 Port-based Edit/Delete • Select the VLAN group name and click Delete to delete the VLAN.
• Select the VLAN group name and click members of the existing VLAN group. Note EKI-2548I_Manual_ed2 Edit to modify group name, VLAN ID, or add/remove the Remember to click the Save button of the Save Configuration page, otherwise the new configuration will lose when switch powers off.
802.1Q VLAN Tagged-based VLAN is an IEEE 802.1Q specification standard. Therefore, it is possible to create a VLAN across devices from different switch venders. IEEE 802.1Q VLAN uses a technique to insert a “tag” into the Ethernet frames. The tag contains a VLAN Identifier (VID) that indicates the VLAN numbers. You can create a Tag-based VLAN, and enable/disable the GVRP protocol. Up to 256 VLAN groups are provided for configuring. With 802.
Add Add an 802.1Q-based VLAN group. • Group Name: Specify the group name for the VLAN. • VLAN ID: Please enter the VLAN ID in the range of 2 to 4094. • Select ports and click the Add button to add them to the right field. • Click Next . • Click the pull-down menu to select Tag/Untag for each VLAN member. Setting the port to Tag means that the outgoing frames are tagged with VLAN ID. While setting the port to Untag means that the outgoing frames are not tagged with VLAN ID.
Figure 3.1-26 Tag/Untag Member Ports Edit/Delete Modify or delete the existed VLAN groups. • Select an existed VLAN group from the list. • Click Edit to modify Group Name, VLAN ID or change the members of the VLAN. • Or click Delete to delete the VLAN.
802.1Q Configuration – Port VLAN ID Assign the Port VLAN ID for the selected ports. • Port: Select ports to be assigned a Port VLAN ID. • Port VLAN ID: Enter the Port VLAN ID in the range between 1 and 4094. • Click Apply to have the settings take effect. Figure 3.
Rapid Spanning Tree The Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol and provides for faster spanning tree convergence after a topology change. The system also supports STP and the system will auto-detect the connected device that is running STP or RSTP protocol. RSTP - System Configuration • The user can view spanning tree information of the Root Bridge. • The user can modify RSTP state. After modification, click Apply button.
RSTP - Port Configuration Here you can configure the path cost and priority of each port. • Select the port in the port column field. • Path Cost: The cost of the path to the other bridge from this transmitting bridge at the specified port. Enter a number between 1 and 200,000,000. • Priority: Decide which port should be blocked by priority in LAN. Enter a number between 0 and 240 (the port of the highest value will be blocked). The value of priority must be the multiple of 16.
SNMP Configuration Simple Network Management Protocol (SNMP) is the protocol developed to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth. Network management systems learn of problems by receiving traps or change notices from network devices implementing SNMP.
• Click Add . • To remove the community string, select the community string listed in the current managers field and click Remove .
QoS Configuration Here you can configure Qos policy and priority setting, port priority setting, COS and TOS setting. QoS Policy • Qos Policy: Select the QoS policy rule. ¾ Use an 8,4,2,1 weighted fair queuing scheme: The switch will follow 8:4:2:1 rate to process priority queue from High to lowest queue.
Figure 3.
IGMP Configuration The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet Protocol (IP) suite. IP manages multicast traffic by using switches, routers, and hosts that support IGMP. Enabling IGMP allows the ports to detect IGMP queries, report packets, and manage IP multicast traffic through the switch. IGMP have three fundamental types of message shown as follows: Table 3.
X-Ring X-Ring provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the algorithms between them are not the same. In the X-Ring topology, each switch should be enabled with the X-Ring function and two ports of each switch should be configured as the member ports in the ring.
Note To enable the X-Ring function, users must disable the RSTP first. The X-Ring function and RSTP function cannot both be activated on a single switch. Remember to click the Save button of the Save Configuration page, otherwise the new configuration will lose when switch powers off.
3.1.4 Configuration Backup This interface allows users to back up the current configuration on the switch to the TFTP server. Also, users can restore the industrial switch to the backup configuration from the TFTP server. Figure 3.1-34 TFTP Restore Configuration TFTP Restore Configuration • TFTP Server IP Address: Enter the IP address of the TFTP server. • Restore File Name: Enter the file name to be restored. • Click Apply . Figure 3.
3.1.5 Factory Default Reset the switch to default configuration. Tick the check boxes to keep the current IP address, user name and password before reset. Click Reset to reset all configurations to the default value. Figure 3.1-36 3.1.6 Factory Default Save Configuration Save all configurations that you have made to the system. Click Save to save all configurations to the flash memory. Figure 3.1-37 3.1.7 Save Configuration System Reboot Reboot the switch in software reset.
EKI-2548I_Manual_ed2 60
CHAPTER Troubleshooting 61 Appendix A
Chapter 4 Troubleshooting Verify that you are using the right power cord/adapter. Don’t use the power adaptor with DC output voltage higher than the power rating of the equipment. Otherwise, it will burn down. Select the proper UTP cable to construct the user network.
APPENDIX Pin Assignments & Wiring 63 Appendix A
Appendix A Pin Assignments & Wiring A.1 RJ-45 Port It is suggested to adopt ELA/TIA as the wiring of the RJ-45. Figure A.1: RJ-45 Pin Assignments RJ-45 Pin Assignments Note Pin Number Function 1 TX+ 2 TX- 3 RX+ 6 RX- “+” and “-” signs represent the polarity of the wires that make up each wire pair.
MDI/MDI-X Pin Assignments Pin Number MDI-X Signal Name MDI Signal Name 1 Receive Data plus (RD+) Transmit Data plus (TD+) 2 Receive Data minus (RD-) Transmit Data minus (TD-) 3 Transmit Data plus (TD+) Receive Data plus (RD+) 6 Transmit Data minus (TD-) Receive Data minus (RD-) Straight-through Cable Schematic Switch 3 TD+ 6 TD- Router / PC 3 RD+ 6 RD- 1 RD+ 2 RD- 1 TD+ 2 TD- Cross-over Cable Schematic Switch 3 TD+ 6 TD- Switch 3 RD+ 6 RD- 1 RD+ 2 RD- 1 TD+ 2 TD- Figure A.