Part No. XXXXXXXXXXEdition 1
Printed in TaiwanSeptember 2016
The documentation and the software included with this product are copyrighted 2016
by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right
to make improvements in the products described in this manual at any time without
notice. No part of this manual may be reproduced, copied, translated or transmitted
in any form or by any means without the prior written permission of Advantech Co.,
Ltd. Information provided in this manual is intended to be accurat e and reliable. However, Advantech Co., Ltd. assumes no responsibility for its use, nor for any infringements of the rights of third parties, which may result from its use.
Acknowledgements
Intel and Pentium are trademarks of Intel Corporation.
Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corp.
All other product names or trademarks are properties of their respective owners.
Product Warranty (5 years)
Advantech warrants to you, the original purchaser, that each of its products will be
free from defects in materials and workmanship for five years from the date of purchase.
This warranty does not apply to any products which have been repaired or altered by
persons other than repair personnel authorized by Advantech, or which have been
subject to misuse, abuse, accident or improper installation. Advantech assumes no
liability under the terms of this warranty as a consequence of such events.
Because of Advantech’s high quality-control standards and rigorous testing, most of
our customers never need to use our repair service. If an Advantech product is defective, it will be repaired or replaced at no charge during the warranty pe riod. For out ofwarranty repairs, you will be billed according to the cost of replacement materials,
service time and freight. Please consult your dealer for more details.
If you think you have a defective product, follow these steps:
1.Collect all the information about the problem encountered. (For example, CPU
speed, Advantech products used, other hardware and software used, etc.) Note
anything abnormal and list any on screen messages you get when the problem
occurs.
2.Call your dealer and describe the problem. Please have your manual, product,
and any helpful information readily available.
3.If your product is diagnosed as defective, obtain an RMA (return merchandize
authorization) number from your dealer. This allows us to process your return
more quickly.
4.Carefully pack the defective product, a fully-completed Repair and Replacement
Order Card and a photocopy proof of purchase date (such as your sales receipt)
in a shippable container. A product returned without proof of the purchase date
is not eligible for warranty service.
5.Write the RMA number visibly on the outside of the package and ship it prepaid
to your dealer.
EKI-9500 Series User Manualii
Declaration of Conformity
CE
This product has passed the CE test for environmental specifications when shielded
cables are used for external wiring. We recommend the use of shielded cables. This
kind of cable is available from Advantech. Please contact your local supplier for
ordering information.
This product has passed the CE test for environmental specifications. Test conditions
for passing included the equipment being operated within an industrial enclosure. In
order to protect the product from being damaged by ESD (Electrostatic Discharge)
and EMI leakage, we strongly recommend the use of CE-compliant industrial enclosure products.
FCC Class A
Note: This equipment has been tested and found to comply with the limit s for a Class
A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can
radiate radio frequency energy and, if not installed and used in accordance with the
instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in
which case the user will be required to correct the interference at his own expense.
FCC Class B
Note: This equipment has been tested and found to comply with the limit s for a Class
B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if
not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference
will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or
more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
FM
This equipment has passed the FM certification. According to the National Fire Protection Association, work sites are classified into different classes, divisions and
groups, based on hazard considerations. This equipment is compliant with the specifications of Class I, Division 2, Groups A, B, C and D indoor hazards.
iiiEKI-9500 Series User Manual
Technical Support and Assistance
1.Visit the Advantech web site at www .advantech.com/support where you can find
the latest information about the product.
2.Contact your distributor, sales representative, or Advantech's customer service
center for technical support if you need additional assistance. Please have the
following information ready before you call:
– Product name and serial number
– Description of your peripheral attachments
– Description of your software (operating system, version, application software,
etc.)
– A complete description of the problem
– The exact wording of any error messages
Warnings, Cautions and Notes
Warning! Warnings indicate conditions, which if not observed, can cause personal
injury!
Caution! Cautions are included to help you avoid damaging hardware or losing
data. e.g.
There is a danger of a new battery exploding if it is incorrectly installed.
Do not attempt to recharge, force open, or heat the battery. Replace the
battery only with the same or equivalent type recommended by the manufacturer. Discard used batteries according to the manufacturer's
instructions.
Note!Notes provide optional additional information.
Document Feedback
To assist us in making improvements to this manual, we would welcome comments
and constructive criticism. Please send all such - in writing to: support@advantech.com
Packing List
Before setting up the system, check that the items listed below are included and in
good condition. If any item does not accord with the table, please contact your dealer
immediately.
1 x Full Managed Ethernet Switch
1 x Startup Manual
EKI-9500 Series User Manualiv
Safety Instructions
1.Read these safety instructions carefully.
2.Keep this User Manual for later reference.
3.Disconnect this equipment from any AC outlet before cleaning. Use a damp
cloth. Do not use liquid or spray detergents for cleaning.
4.For plug-in equipment, the power outlet socket must be located near the equip-
ment and must be easily accessible.
5.Keep this equipment away from humidity.
6.Put this equipment on a reliable surface during installation. Dro pping it or letting
it fall may cause damage.
7.The openings on the enclosure are for air convection. Protect the equipment
from overheating. DO NOT COVER THE OPENINGS.
8.Make sure the voltage of the power source is correct before connecting the
equipment to the power outlet.
9.Position the power cord so that people cannot step on it. Do not place anything
over the power cord.
10. All cautions and warnings on the equipment should be noted.
11.If the equipment is not used for a long time, disconnect it from the power source
to avoid damage by transient overvoltage.
12. Never pour any liquid into an opening. This may cause fire or electrical shock.
13. Never open the equipment. For safety reasons, the equipment should be
opened only by qualified service personnel.
14. If one of the following situations arises, get the equipment checked by service
personnel:
15. The power cord or plug is damaged.
16. Liquid has penetrated into the equipment.
17. The equipment has been exposed to moisture.
18. The equipment does not work well, or you cannot get it to work according to the
user's manual.
19. The equipment has been dropped and damaged.
20. The equipment has obvious signs of breakage.
21. DO NOT LEAVE THIS EQUIPMENT IN AN ENVIRONMENT WHERE THE
STORAGE TEMPERA TURE MAY GO BELOW -20° C (-4° F) OR ABOVE 60° C
(140° F). THIS COULD DAMAGE THE EQUIPMENT. THE EQUIPMENT
SHOULD BE IN A CONTROLLED ENVIRONMENT.
22. CAUTION: DANGER OF EXPLOSION IF BATTERY IS INCORRECTLY
REPLACED. REPLACE ONLY WITH THE SAME OR EQUIVALENT TYPE
RECOMMENDED BY THE MANUFACTURER, DISCARD USED BATTERIES
ACCORDING TO THE MANUFACTURER'S INSTRUCTIONS.
23. The sound pressure level at the operator's position according to IEC 704-1:198 2
is no more than 70 dB (A).
DISCLAIMER: This set of instructions is given according to IEC 704-1. Advantech
disclaims all responsibility for the accuracy of any statements contained herein.
vEKI-9500 Series User Manual
Wichtige Sicherheishinweise
1.Bitte lesen sie Sich diese Hinweise sorgfältig durch.
2.Heben Sie diese Anleitung für den späteren Gebrauch auf.
3.Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie
Keine Flüssig-oder Aerosolreiniger. Am besten dient ein angefeuchtetes Tuch
zur Reinigung.
4.Die NetzanschluBsteckdose soll nahe dem Gerät angebracht und leicht zugän-
glich sein.
5.Das Gerät ist vor Feuchtigkeit zu schützen.
6.Bei der Aufstellung des Gerätes ist auf sicheren Stand zu achten. Ein Kippen
oder Fallen könnte Verletzungen hervorrufen.
7.Die Belüftungsöffnungen dienen zur Luftzirkulation die das Gerät vor überhit-
zung schützt. Sorgen Sie dafür, daB diese Öffnungen nicht abgedeckt werden.
8.Beachten Sie beim. AnschluB an das Stromnetz die AnschluBwerte.
9.Verlegen Sie die Netza nschluBleitung so , daB niemand darüber fallen kann. Es
sollte auch nichts auf der Leitung abgestellt werden.
10. Alle Hinweise und Warnungen die sich am Geräten befinden sind zu beachten.
11.Wird das Gerät über einen längeren Zeitraum nicht benutzt, sollten Sie es vom
Stromnetz trennen. Somit wird im Falle einer Übersp annung eine Beschädigung
vermieden.
12. Durch die Lüftungsöffnungen dürfen niemals Gegenstände oder Flü ssigkeiten in
das Gerät gelangen. Dies könnte einen Brand bzw. elektrischen Schlag auslösen.
13. Öffnen Sie niemals das Gerät. Das Gerät darf aus Gründen der elektrischen
Sicherheit nur von authorisiertem Servicepersonal geöffnet werden.
14. Wenn folgende Situationen auftreten ist das Gerät vom Stromnetz zu trennen
und von einer qualifizierten Servicestelle zu überprüfen:
15. Netzkabel oder Netzstecker sind beschädigt.
16. Flüssigkeit ist in das Gerät eingedrungen.
17. Das Gerät war Feuchtigkeit ausgesetzt.
18. Wenn das Gerät nicht der Bedienungsanleitung entsprechend funktioniert oder
Sie mit Hilfe dieser Anleitung keine Verbesserung erzielen.
19. Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt.
20. Wenn das Gerät deutliche Anzeichen eines Defektes aufweist.
21. VOSICHT: Explisionsgefahr bei unsachgemaben Austausch der Batterie.Ersatz
nur durch densellben order einem vom Hersteller empfohlene-mahnlichen Typ.
Entsorgung gebrauchter Batterien navh Angaben des Herstellers.
22. ACHTUNG: Es besteht die Explosionsgefahr, falls die Batterie auf nicht fach-
männische Weise gewechselt wird. Verfangen Sie die Batterie nur gleicher oder
entsprechender Type, wie vom Hersteller empfohlen. Entsorgen Sie Batterien
nach Anweisung des Herstellers.
23. Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt
70dB(A) oder weiger.
Haftungsausschluss: Die Bedienungsanleitungen wurden entsprechend der IEC704-1 erstellt. Advantech lehnt jegliche Verantwortung für die Richtigkeit der in diesem Zusammenhang getätigten Aussagen ab.
EKI-9500 Series User Manualvi
Safety Precaution - Static Electricity
Follow these simple precautions to protect yourself from harm and the products from
damage.
To avoid electrical shock, always disconnect the power from your PC chassis
before you work on it. Don't touch any components on the CPU card or other
cards while the PC is on.
Disconnect power before making any configuration changes. The sudden rush
of power as you connect a jumper or install a card may damage sensitive electronic components.
viiEKI-9500 Series User Manual
Technical Support and Assistance
1.Visit the Advantech web site at www .advantech.com/support where you can find
the latest information about the product.
2.Contract your distributor , sales represent ative, or Advantech's customer service
center for technical support if you need additional assistance. Please have the
following information ready before you call:
– Product name and serial number
– Description of your peripheral attachment
– Description of your sof tware (operating system, version, application sof tware,
etc.)
– A complete description of the problem
– The exact wording of any error messages
About This Manual
This user manual is intended to guide professional installers in installing and configuring the serial device server. It includes technical specifications, as well as procedures for the management of the devices.
Figure 4.286Security > Port Access Control > Configuration... 259
Figure 4.287Security > Port Access Control > Port Summary . 260
Figure 4.288Security > Port Access Control > Port
ShockIEC 61373 Cat 1 Class B
FreefallIEC 60068-2-32
VibrationIEC 61373 Cat 1 Class B
3EKI-9500 Series User Manual
1.3Hardware Views
1
3
4
67
9
8
2
5
1.3.1Front View
The following view applies to EKI-9516 and EKI-9516D.
DATADATADATA
1
2
3
4
5
4
6
3
7
2
1
8
Pair
Pin
+
1
DA
-
2
DA
+
DB
3
-
4
DB
+
DD
5
-
6
DD
-
7
DC
+
8
DC
EKI-9516
5
6
4
3
4
1
5
Power
PWR2
Pin PWR
+
L1
1
/
V
-
2
L1/V
2
3
GND
+
4
L2/
V
-
5
L
2/V
6
NA
3
1
6
2
3
Console
ALM
PWR1
SYS
CFG
ALM
153
Pin
1
2
3
4
5
Pin
1
2
3
4
5
Pin
1
2
3
4
5
DATA
13
14
15
16
2
4
Signal
DN
VBUS
NC
DP
GND
Signal
TX
RX
DSR
GND
DTR
Pair
P1-N
P1-P
P2-N
P2-P
NA
9
10
11
12
5
6
7
8
Figure 1.1 Front View
No. ItemDescription
1USB portM12 5-pin (female) port for FW backup access.
2Ground terminalScrew terminal used to ground chassis.
3Console portM12 5-pin (female) port to access the managed switch's soft-
ware.
4Power input portM23 connector 6-pin (male) DC power connector port.
5Alarm portM12 5-pin (female) port to attach monitoring wires.
6ETH port
EKI-9516: 10/100/1000BaseT(X) x 4 (X-coding)
EKI-9516D: 10/100/1000BaseT(X) x 4 (D-coding)
7ETH port
EKI-9516: 10/100/1000BaseT(X) x 12 (X-coding)
EKI-9516D: 10/100/1000BaseT(X) x 12 (D-coding)
8Mounting screw hole Screw holes (x6) used in the installation of a wall mounting plate
9System LED panelSee “System LED Panel” on page 8 for further details.
EKI-9500 Series User Manual4
The following view applies to EKI-9516P-HV, EKI-9516P-LV, EKI-9516DP-HV and
1
3
4
67
9
8
2
5
EKI-9516DP-LV.
PoEDATAPoEDATAPoEDATA
1
2
3
4
5
4
6
3
7
2
1
8
Pair
Pin
+
1
DA
-
2
DA
+
DB
3
-
4
DB
+
DD
5
-
6
DD
-
7
DC
+
8
DC
EKI-9516P
1
5
6
4
3
5
4
Power
PWR2
Pin PWR
+
L1
1
/
V
-
2
L1/V
2
GND
3
+
4
L2/
V
-
5
L
2/V
6
NA
3
1
6
2
3
Console
ALM
PWR1
SYS
CFG
ALM
153
Pin
1
2
3
4
5
Pin
1
2
3
4
5
Pin
1
2
3
4
5
DATA
13
14
15
16
2
4
Signal
DN
VBUS
NC
DP
GND
Signal
TX
RX
DSR
GND
DTR
Pair
P1-N
P1-P
P2-N
P2-P
NA
9
10
11
12
5
6
7
8
Figure 1.2 Front View
No. ItemDescription
1USB portM12 5-pin (female) port for FW backup access.
2Ground terminalScr ew terminal used to ground chassis.
3Console portM12 5-pin (female) port to access the managed switch's soft-
ware.
4Power input portM23 connector 6-pin (male) DC power connector port.
5Alarm portM12 5-pin (female) port to attach monitoring wires.
6ETH port
EKI-9516P-HV and EKI-9516P-L V : 10/100/1000BaseT(X) x
4 (X-coding)
EKI-9516DP-HV and EKI-9516DP-LV: 10/100/
1000BaseT(X) x 4 (D-coding)
7ETH port
EKI-9516P-HV and EKI-9516P-L V : 10/100/1000BaseT(X) x
12 (X-coding)
EKI-9516DP-HV and EKI-9516DP-LV: 10/100/
1000BaseT(X) x 12 (D-coding)
8Mounting screw hole Screw holes (x6) used in the installation of a wall mounting plate
9System LED panelSee “System LED Panel” on page 8 for further details.
5EKI-9500 Series User Manual
The following view applies to EKI-9512 and EKI-9512D.
1
3
4
67
9
8
2
5
EKI-9512
5
6
4
1
3
4
2
3
5
Power
PWR2
Pin PWR
+
L1
1
/
V
-
2
L1/V
3
GND
+
4
L2/
V
-
5
L
2/V
6
NA
1
6
2
3
Console
PWR1
SYS
CFG
ALM
153
Pin
1
2
3
4
5
Pin
1
2
3
4
5
Pin
1
2
3
4
5
DATA
9
10
11
12
2
4
Signal
DN
VBUS
NC
DP
GND
Signal
TX
RX
DSR
GND
DTR
Pair
P1-N
P1-P
P2-N
P2-P
NA
5
6
7
8
ALM
DATADATA
1
2
3
4
5
4
6
3
7
2
1
8
Pair
Pin
+
1
DA
-
2
DA
+
DB
3
-
4
DB
+
DD
5
-
6
DD
-
7
DC
+
8
DC
Figure 1.3 Front View
No. ItemDescription
1USB portM12 5-pin (female) port for FW backup access.
2Ground terminalScrew terminal used to ground chassis.
3Console portM12 5-pin (female) port to access the managed switch's soft-
ware.
4Power input portM23 connector 6-pin (male) DC power connector port.
5Alarm portM12 5-pin (female) port to attach monitoring wires.
6ETH port
EKI-9512: 10/100/1000BaseT(X) x 4 (X-coding)
EKI-9512D: 10/100/1000BaseT(X) x 4 (D-coding)
7ETH port
EKI-9512: 10/100/1000BaseT(X) x 8 (X-coding)
EKI-9512D: 10/100/1000BaseT(X) x 8 (D-coding)
8Mounting screw hole Screw holes (x6) used in the installation of a wall mounting plate
9System LED panelSee “System LED Panel” on page 8 for further details.
EKI-9500 Series User Manual6
The following view applies to EKI-9512P-HV, EKI-9512P-LV, EKI-9512DP-HV and
1
3
4
67
9
8
2
5
EKI-9512DP-LV.
EKI-9512P
1
5
6
4
3
4
2
3
5
Power
PWR2
Pin PWR
+
L1
1
/
V
-
2
L1/V
GND
3
+
4
L2/
V
-
5
L
2/V
6
NA
1
6
2
3
Console
ALM
PWR1
SYS
CFG
ALM
153
Pin
1
2
3
4
5
Pin
1
2
3
4
5
Pin
1
2
3
4
5
DATA
9
10
11
12
2
4
Signal
DN
VBUS
NC
DP
GND
Signal
TX
RX
DSR
GND
DTR
Pair
P1-N
P1-P
P2-N
P2-P
NA
5
6
7
8
PoEDATAPoEDATA
1
2
3
4
5
4
6
3
7
2
1
8
Pair
Pin
+
1
DA
-
2
DA
+
DB
3
-
4
DB
+
DD
5
-
6
DD
-
7
DC
+
8
DC
Figure 1.4 Front View
No. ItemDescription
1USB portM12 5-pin (female) port for FW backup access.
2Ground terminalScr ew terminal used to ground chassis.
3Console portM12 5-pin (female) port to access the managed switch's soft-
ware.
4Power input portM23 connector 6-pin (male) DC power connector port.
5Alarm portM12 5-pin (female) port to attach monitoring wires.
6ETH port
EKI-9512P-HV and EKI-9512P-L V : 10/100/1000BaseT(X) x
4 (X-coding)
EKI-9512DP-HV and EKI-9512DP-LV: 10/100/
1000BaseT(X) x 4 (D-coding)
7ETH port
EKI-9512P-HV and EKI-9512P-L V : 10/100/1000BaseT(X) x
8 (X-coding)
EKI-9512DP-HV and EKI-9512DP-LV: 10/100/
1000BaseT(X) x 8 (D-coding)
8Mounting screw hole Screw holes (x6) used in the installation of a wall mounting plate
9System LED panelSee “System LED Panel” on page 8 for further details.
7EKI-9500 Series User Manual
1.3.1.1 System LED Panel
3
12
4566 76 76 7
PWR 2
No. LED NameLED ColorDescription
PWR2Green onPower is being supplied to power input PWR2.
1
PWR1Green onPower is being supplied to power input PWR1.
2
SYSGreen onEKI switch system is ready.
3
CFGYellow onTBD
4
ALMRed onDefined major policies are detected.
5
DATAGreen onLink 1G
6
PoE
7
(only available in
EKI-9516P-LV,
EKI-9516P-HV,
EKI-9512P-LV,
EKI-9512P-HV,
EKI-9516DP-LV,
EKI-9516DP-HV,
EKI-9512DP-LV
and
EKI-9512DP-HV)
DATADATAPoEDATA PoEDATA PoE
PWR 1
SYS
CFG
ALM
13
14
15
16
9
10
11
12
5
6
7
8
1
2
3
4
Figure 1.5 System LED Panel
OffPower is not being supplied to power input
PWR2.
OffPower is not being supplied to power input
PWR1.
Blink green (1Hz) EKI switch system is under initiating.
Blink green (3Hz) TBD
Blink green (5Hz) TBD
OffPower on processing in U-Boot mode.
Blink red (1Hz)Defined minor policies are detected.
Blink red (3Hz)TBD
Blink red (5Hz)TBD
OffPower off or system alarm is cleared or masked.
Blink greenACT 1G
Amber onLink 10/100MB
Blink amberACT 10/100MB
OffLink down
Green onProviding power over 15. 4 W.
Blink greenPr ov idin g po we r un d er 15. 4 W.
OffUser turns off PoE mode at corresponding Giga-
bit Ethernet port.
EKI-9500 Series User Manual8
Chapter2
2Switch Installation
2.1Installation Guidelines
The following guidelines are provided to optimize the device performance. Review
the guidelines before installing the device.
Make sure cabling is away from sources of electrical noise. Radios, power lines,
and fluorescent lighting fixtures can interference with the device performance.
Make sure the cabling is positioned away from equipment that can damage the
cables.
Operating environment is within the ranges listed range, see “S pecifications” on
page 1.
Relative humidity around the switch does not exceed 95 percent (noncondens-
ing).
Altitude at the installation site is not higher than 10,000 feet.
In 10/100 and 10/100/1000 fixed port devices, the cable length from the switch
to connected devices can not exceed 100 meters (328 feet).
Make sure airflow around the switch and respective vents is unrestricted. With-
out proper airflow the switch can overheat. To prevent performance degradation
and damage to the switch, make sure there is clearance at the top and bottom
and around the exhaust vents.
2.1.1Connecting Hardware
These instructions explain how to find a proper location for your Modbus Gateways,
and how to connect to the network, hook up the power cable, and conne ct to the EKI9500 Series.
2.2Verifying Switch Operation
Before installing the device in a rack or on a wall, power on the switch to verify that
the switch passes the power-on self-test (POST). To connect the cabling to the power
source see “Power Supply Installation” on page 12.
At startup (POST), the System LED blinks green, while the remaining LEDs are a
solid green. Once the switch passes POST self-test, the System LED turns green.
The other LEDs turn off and return to their operating status. If the switch fails POST,
the System LED switches to an amber state.
After a successful self-test, power down the switch and disconnect the po wer cabling.
The switch is now ready for installation at its final location.
2.3Installing the Switch
2.3.1Wall-Mounting
Note!When installing, make sure to allow for enough space to properly install
the cabling.
1.Locate the installation site and place the switch against the wall, making sure it
is the final installation location.
EKI-9500 Series User Manual10
2.Insert the screws into the wall sinks. Leave a 6 mm gap between the wall and
10 mm
4.0 mm
(Max: 4.3mm)
4.0 mm
P
in
D
N
Si
gn
a
l
V
B
US
NCD
P
G
N
D
12345
P
in
TX
Si
gna
l
R
X
D
S
R
G
N
D
D
TR
1
2
3
4
5
P
in
P
1
-
N
P
1
-
P
P
2
-
N
P
2
-
P
P
a
i
r
1
2
3
4
5
N
A
P
in
P
ai
r
1
2
3
4
5
6
7
8
D
A
-
D
A
+
D
B
-
D
B
+
D
D
-
D
C
-
D
C
+
D
D
+
2
1
5
3
4
P
i
n
P
WR
G
N
D
N
A
12
3
4
5
6
L
1
/
V
+L
1
/
V
-
L
2
/
V
+
L
2
/
V
-
1
2
5
4
6
3
C
o
n
s
o
le
A
L
M
PoE
D
ATA
PoED
ATA
PoE
D
A
TA
1
2
8
7
6
5
4
3
1
2
3
4
5
6
7
8
9
10
1112
13
14
15
16
DATA
PWR1
SYS
C
FG
ALM
PWR2
EKI-9516P
P
o
wer
the screw head to allow for wall mount plate insertion.
Figure 2.1 Securing Wall Mounting Screws
Note!Make sure the screws dimensions are suitable for use with the
device.
Do not completely tighten the screws into the wall. A final adjust-
ment may be needed before fully securing the device on the wall.
3.Align the device over the screws on the wall.
4.Install the device on the screws and slide it downward to lock in place, see the
following figure.
5.Once the device is installed on the wall, tighten the screws to secure t he device.
Figure 2.2 Switch Installation
11EKI-9500 Series User Manual
2.4Power Supply Installation
s
Single DC PowerRedundant DC Power
2.4.1Overview
Warning! Power down and disconnect the power cord before servicing or wiring
the switch.
Caution! Do not disconnect modules or cabling unless the power is first switched
off.
The device only supports the voltage outlined in the type plate. Do not
use any other power components except those specifically designated
for the switch device.
Caution! Disconnect the power cord before installation or cable wiring.
The switches can be powered by using the same DC source used to power other
devices. A DC voltage range of 24 to 110 VDC (PoE) must be applied between the
V1+ terminal and the V1- terminal (PW1), see the following illustrations. A Class 2
power supply is required to maintain a UL60950 panel listing. The chassis ground
screw terminal should be tied to the panel or chassis ground. A redundant power
configuration is supported through a secondary power supply unit to reduce network
down time as a result of power loss.
EKI-9500 Series support 24 to 110 VDC. Dual power inputs are supported and allow
you to connect a backup power source.
P2 P1
Chassis
GND
(pane)
One DC Supply
Figure 2.3 Power Wiring for EKI-9500 Series
2.4.2Considerations
Take into consideration the following guidelines before wiring the device:
The Terminal Block (CN1) is suitable for 12-24 AWG (3.31 - 0.205 mm
value 7 lb-in.
The cross sectional area of the earthing conductors shall be at least 3.31 mm
Calculate the maximum possible current for each power and common wire.
Make sure the power draw is within limits of local electrical code regulations.
For best practices, route wiring for power and devices on separate paths.
P2 P1
Dual DC Supplies
Chassi
GND
(pane)
2
). Torque
2
.
EKI-9500 Series User Manual12
Do not bundle together wiring with similar electrical characteristics.
Make sure to separate input and output wiring.
Label all wiring and cabling to the various devices for more effective manage-
ment and servicing.
Note!Routing communications and power wiring through the same conduit
may cause signal interference. To avoid interference and signal degradation, route power and communications wires through separate conduits.
2.4.3Grounding the Device
Caution! Do not disconnect modules or cabling unless the power is first switched
off.
The device only supports the voltage outlined in the type plate. Do not
use any other power components except those specifically designated
for the switch device.
Caution! Before connecting the device properly ground the device. Lack of a
proper grounding setup may result in a safety risk and could be hazardous.
Caution! Do not service equipment or cables during periods of lightning activity.
Caution! Do not service any components unless qualified and authorized to do
so.
Caution! Do not block air ventilation holes.
13EKI-9500 Series User Manual
Electromagnetic Interference (EMI) affects the transmission performan ce of a device.
Pin
DN
Signal
VBUS
NC
DP
GND
1
2
3
4
5
Pin
TX
Signal
RX
DSR
GND
DTR
1
2
3
4
5
Pin
P1-N
P1-P
P2-N
P2-P
Pair
1
2
3
4
5
NA
Pin
Pair
1
2
3
4
5
6
7
8
DA
-
DA
+
DB
-
DB
+
DD
-
DC
-
DC
+
DD
+
2
153
4
Pin PWR
GND
NA
1
2
3
4
5
6
L1/V
+
L1/V
-
L2/
V
+
L
2/V
-
1
2
5
4
6
3
Console
ALM
PoEDATAPoEDATA
1
2
8
7
6
5
4
3
1
2
3
4
5
6
7
8
9
10
11
12
DATA
PWR1
SYS
CFG
ALM
PWR2
EKI-9512P
1
2
3
6
3
5
4
Power
By properly grounding the device to earth ground through a drain wire, you can setup
the best possible noise immunity and emissions.
Figure 2.4 Grounding Connection, Chassis Left Side View
By connecting the ground terminal by drain wire to earth ground the switch and chassis can be ground.
Note!Before applying power to the grounded switch, it is advisable to use a
volt meter to ensure there is no voltage difference between the power
supply’s negative output terminal and the grounding point on the switch.
2.4.4Wiring the Power Inputs
Caution! Do not disconnect modules or cabling unless the power is first switched
off.
The device only supports the voltage outlined in the type plate. Do not
use any other power components except those specifically designated
for the switch device.
Warning! Power down and disconnect the power cord before servicing or wiring
the switch.
To wire the power inputs:
Make sure the power cable is not connected to the switch or the power converter
EKI-9500 Series User Manual14
before proceeding.
1.Remove the protection cap from the power input.
1
2
1
2
5
4
6
3
2
Figure 2.5 Removing the Protection Cap
2.Secure the power cable to the power input.
Figure 2.6 Installing the Power Cable
The power input is now connected to the switch. The switch can be powered on.
2.4.4.1 Standard M23 6-Pin Male Pin Assignment
This section describes the proper connection of the 12, 24, -48, 110, 125 and
250VDC to the DC power connector on the switch. The DC inpu t connector is loca ted
on the left side of the front p anel. The po wer terminals are connected as shown in the
following figure. They are electrically floating inside the unit so that either may be
grounded by the user if desired. The chassis is earthened or ground (GND).
The mating connection to the switch is created through a RD24, female connector.
Simply align the keyed female connector to the male connector and twist the
threaded to secure.
1
Figure 2.7 Standard M23 6-Pin Male DC Power Input Connector
15EKI-9500 Series User Manual
PinDescription
1
2
8
7
6
5
4
3
1
2
3
4
L1/V+
1
L1/V-
2
GND
3
L2/V+
4
L2/V-
5
NA
6
2.5Connecting the Ethernet Media
2.5.1Connecting the 10/100/1000BaseT(X)
The managed Ethernet models have four Gigabit Ethernet ports (8-pin shielded M12
connector with X coding) or Fast Ethernet ports (4-pin shielded M12 connector with D
coding) circular connectors. The 10/100/1000BaseT(X) ports located on the switch's
front side are used to connect to Ethernet-enabled devices.
2.5.1.1 M12 X-Coding Connector Pin Assignment
Figure 2.8 10/100/1000BaseT(X) Pin Assignment
PinDescription
DA+
1
DA-
2
DB+
3
DB-
4
DD+
5
DD-
6
DC-
7
DC+
8
2.5.1.2 M12 D-Coding Connector Pin Assignment
Figure 2.9 10/100BaseT(X) Pin Assignment
PinDescription
TD+
1
RD+
EKI-9500 Series User Manual16
2
PinDescription
2
153
4
2
153
4
TD-
3
RD-
4
2.6Alarm Contact for Monitoring Internal Power
The Alarm Contacts feature, standard on EKI-9500 Series, provides one Form Normally Closed (NC) contact to which the user can attach one set of status monitoring
wires at the green terminal block.
The NC Alarm Contact is held closed when there is power on the mainboard inside of
the switch. This provides a “Hardware Alarm” (labeled H/W) because the NC contacts will open when internal power is lost, either from an external power down condition or by the failure of the power supply inside of the EKI-9500 Series.
2.6.0.1 Pin Assignment
Figure 2.10 Alarm Contact Pin Assignment
PinDescription
P1-N
1
P1-P
2
P2-N
3
P2-P
4
NA
5
2.7Connecting the Console Terminal
The console port, used to access the managed switch’s software, has an 8-pin M12
(male) port. A console cable with the mating M12 (female) port and both a DB-9 and /
or a USB connector is available for purchase from Advantech.
2.7.0.1 Pin Assignment
Figure 2.11 M12 Console Pin Assignment
PinDescription
TX
1
RX
2
DSR
3
GND
4
DTR
5
17EKI-9500 Series User Manual
2.8Connecting the USB Terminal
2.8.0.1 Pin Assignment
2
153
4
Figure 2.12 M12 Console Pin Assignment
PinDescription
DN
1
VBUS
2
NC
3
DP
4
GND
5
EKI-9500 Series User Manual18
Chapter3
3Configuration Utility
3.1First Time Setup
3.1.1Overview
The Industrial Ethernet Managed Switch is a configurable device that facilitates the
interconnection of Ethernet devices on an Ethernet network. This includes computers, operator interfaces, I/O, controllers, RTUs, PLCs, other switches/hubs or any
device that supports the standard IEEE 802.3 protocol.
This switch has all the capabilities of a store and forward Ethernet switch plus
advanced management features such as SNMP, RSTP and port mirroring. This manual details how to configure the various management parameters in this easy to use
switch.
3.1.2Introduction
To take full advantage of all the features and resources available from the switch, it
must be configured for your network.
The switch implements Rapid Spanning Tree Protocol (RSTP) and Simple Network
Management Protocol (SNMP) to provide most of the services offered by the switch.
Rapid Spanning Tree Protocol allows managed switches to communicate with each
other to ensure that there exists only one active route between each pair of network
nodes and provides automatic failover to the next available redundant route. A brief
explanation of how RSTP works is given in the Spanning Tree section.
The switch is capable of communicating with other SNMP capable devices on the
network to exchange management information. This statistical/derived information
from the network is saved in the Management Information Base (MIB) of the switch.
The MIB is divided into several different information storage groups. These groups
will be elaborated in detail in the Management and SNMP information section of this
document. The switch implements Internet Group Management Protocol (IGMP) to
optimize the flow of multicast traffic on your network.
The switch supports both port-based and tag-based Virtual LANs for flexible integration with VLAN-aware networks with support for VLAN-unaware devices.
3.1.3Administrative Interface Access
There are several administrative interfaces to the switch:
1.A graphical web interface accessible via the switch's built-in web server. Both
HTTP and secure HTTPS with SSL are supported.
Note!This is the recommended method for managing the switch.
2.A terminal interface via the RS232/USB port or over the network using telnet or
Secure Shell (SSH).
3.An SNMP interface can be used to read/write many settings.
4.Command Line Interface (CLI) can be used to read/write most settings. Initial
setup must be done using an Ethernet connection (recommended) or the serial
port.
EKI-9500 Series User Manual20
3.1.4Using the Graphical (Web) Interface
The graphical interface is provided via a web server in the switch and can be
accessed via a web browser such as Opera, Mozilla, or Internet Explorer.
Note!JavaScript must be supported and enabled in your browser for the
graphical interface to work correctly.
HTTP and HTTPS (secure HTTP) are supported for access to the web server. By
default, both protocols are enabled. Either or both may be disabled to secure the
switch. (See the Remote Access Security topic in this section.)
To access the graphical interface, enter a URL like HTTP://192.168.1.1 in your
browser's address bar. Replace “http” with “https” to use secure http and replace
“192.168.1.1” with your switch's IP address if you've changed it from the factory
default.
The web server in the switch uses a signed security certificate. When you access the
server via https, you may see a warning dialog indicating that the certificate was
signed by an unknown authority. This is expected and to avoid this message in the
future you can choose to install the certificate on your computer.
Note!This manual describes and depicts the web user interface in detail. The
terminal interface is not specifically shown but is basically the same.
3.1.5Configuring the Switch for Network Access
To control and monitor the switch via the network, it must be configured with basic
network settings, including an IP address and subnet mask. Refer to the quick start
guide in Section 1 for how to initially access your switch.
To configure the switch for network access, select [Add Menu Address Here] to reach
the System Settings menu. The settings in this menu control the switch's general network configuration.
DHCP Enabled/Disabled: The switch can automatically obtain an IP address
from a server using the Dynamic Host Configuration Protocol (DHCP). This can
speed up initial set up, as the network administrator does not have to find an
open IP address.
IP Address and subnet mask configuration: The IP address for the switch can
be changed to a user-defined address along with a customized subnet mask to
separate subnets.
Note!Advanced users can set the IP address to 0.0.0.0 to disable the use of
an IP address for additional security. However, any features requiring an
IP address (i.e., web interface, etc.) will no longer be available.
Default Gateway Selection: A Gateway Address is chosen to be the address of
a router that connects two different networks. This can be an IP address or a
Fully Qualified Domain Name (FQDN) such as “domainname.org”.
NTP Server: The IP address or domain name of an NTP (Network Time Proto-
col) server from which the switch may retrieve the current time at startup.
Please note that using a domain name requires that at least one domain name
server be configured.
21EKI-9500 Series User Manual
3.1.6Configuring the Ethernet Ports
The switch comes with default port settings that should allow you to connect to the
Ethernet Ports with out any necessary configuration. Should there be a need to
change the name of the ports, negotiation settings or flow control settings, you can
do this in the Port Configuration menu. Access this menu by selecting Setup from the
Main menu, and then selecting Main Settings.
Port Name: Each port in the managed switch can be identified with a custom
name. Specify a name for each port here.
Admin: Ports can be enabled or disabled in the managed switch. For ports that
are disabled, they are virtually non-existent (not visible in terms of switch operation or spanning tree algorithm). Choose to enable or disab le a port by selecting
Enabled or Disabled, respectively.
Negotiation: All copper ports and gigabit fiber ports in the managed switch are
capable of autonegotiation such that the fastest bandwidth is selected. Choose
to enable auto-negotiation or use fixed settings. 100Mbps Fiber ports are Fixed
speed only.
Speed/Duplex/Flow Control: The managed switch accepts three local area net-
work Ethernet Standards. The first standard, 10BASE-T, runs 10Mbps with
twisted pair Ethernet cable between network interfaces. The second local area
network standard is 100BASE-T, which runs at 100Mbps over the same twisted
pair Ethernet cable. Lastly, there is 100BASE-F, which enables fast Ethernet
(100Mbps) over fiber.
These options are available:
10h–10 Mbps, Half Duplex
10f –10 Mbps, Full Duplex
100h–100 Mbps, Half Duplex
100f –100 Mbps, Full Duplex
1000f–1000 Mbps, Full Duplex
On managed switches with gigabit combination ports, those ports with have two
rows, a standard row of check boxes and a row labeled “SFP” with radio buttons. The
SFP setting independently sets the speed at which a transceiver will operate if one is
plugged in. Otherwise, the switch will use the fixed Ethernet port and the corresponding settings for it.
Note!When 100f is selected for the SFP of a gigabit combination port, the cor-
responding fixed Ethernet jack will be disabled unless it is changed back
to 1000F.
3.2Command Line Interface Configuration
3.2.1Introduction to Command-Line Interface (CLI)
The command-line interface (CLI) is constructed with an eye toward automation of
CLI-based configuration. The interaction is modeled on that used in many Internet
protocols such as Telnet, FTP, and SMTP. After each command is entered and processed, the switch will issue a reply that consists of a numeric status code and a
human-readable explanation of the status.
The general format of commands is:
section parameter [value]
where:
– section is used to group parameters.
EKI-9500 Series User Manual22
– parameter will specify the p arameter within the section. For example, the n et-
work section will have parameters for DHCP, IP address, subnet mask, and
default gateway.
– value is the new value of the parameter. If value is omitted, the current value
is displayed.
Please note that new values will not take effect until explicitly committed.
Sections and parameter names are case sensitive (e.g., “Network” is not the same as
“network”).
Note!Any commands in the CLI Commands section of this chapter, with the
exception of the global commands, must be prefaced with the name of
the section they are in. For example, to change the IP address of the
switch, you would type:
network address <newIP>
3.2.2Accessing the CLI
To access the CLI interface, establish Ethernet or serial connectivity to the switch.
To connect by Ethernet, open a command prompt window and type:
telnet <switchip> (where <switchip> is the IP address of the switch)
At the login prompt, type “cli” for the username and “admin” for the password. The
switch will respond with “Managed switch configuration CLI ready”.
3.3Web Browser Configuration
The switch has an HTML based user interface embedded in the flash memory. The
interface offers an easy to use means to manage basic and advanced switch functions. The interface allows for local or remote switch configuration anywhere on the
network. The interface is designed for use with [Internet Explorer (6.0), Chrome,
Firefox].
3.3.1Preparing for Web Configuration
The interface requires the installation and connectio n of the switch to the existing network. A PC also connected to the network is required to connect to the switch and
access the interface through a web browser. Use this networking information:
Once the switch is installed and connected, power on the switch. The following information guides you through the logging in process.
1.Launch your web browser on the PC.
2.In the browser’s address bar, type the switch’s default IP address (192.168.1.1).
The login screen displays.
3.Enter the user default name and password (admin / admin).
4.Click OK on the login screen to log in.
The main interface displays.
23EKI-9500 Series User Manual
Chapter4
4Managing Switch
4.1Log In
To access the login window, connect the device to the network, see “Connecting the
Ethernet Media” on page 16. Once the switch is installed and connected, power on
the switch see the following procedures to log into your switch.
When the switch is first installed, the default network configuration is set to DHCP
enabled. You will need to make sure your network environment supports the switch
setup before connecting it to the network.
1.Launch your web browser on a computer.
2.In the browser’s address bar type in the switch’s default IP address
(192.168.1.1). The login screen displays.
3.Enter the default user name and password (admin/admin) to log into the man-
agement interface. You can change the default password after you have successfully logged in.
4.Click Login to enter the management interface.
Figure 4.1 Login Screen
4.2Recommended Practices
One of the easiest things to do to help increase the security posture of the network
infrastructure is to implement a policy and standard for secure management. This
practice is an easy way to maintain a healthy and secure network.
After you have performed the basic configurations on your switches, the following is a
recommendation which is considered best practice policy.
4.2.1Changing Default Password
In keeping with good management and security practices, it is recommended that
you change the default password as soon as the device is functioning and setup correctly. The following details the necessary steps to change the default password.
To change the password:
1.Navigate to System > Users > Accounts.
2.From the User Name menu, select the Admin (default) account and click Edit.
3.In the User Name field, enter admin for this account. It is not necessary to
change the user name, however, a change in the default settings improves the
switch's security.
Figure 4.2 System > Users > Accounts
25EKI-9500 Series User Manual
4.In the Password field, type in the new password. Re-type the same password in
the Confirm field.
5.Click Submit to change the current account settings.
After saving all the desired settings, perform a system save (Save Configuration).
The changes are saved.
4.3System
4.3.1AAA
Figure 4.3 Changing a Default Password
4.3.1.1 Authentication List
Use the Authentication List Configuration page to view and configure the authentication lists used for management access and port-based (IEEE 802.1X) access to the
system. An authentication list specifies which authentication method(s) to use to validate the credentials of a user who attempts to access the device. Several authentication lists are preconfigured on the system. These are default list s, and they cannot be
deleted.Additionally, the List Name and Access Type settings for the default lists cannot be changed.
To access this page, click System > AAA > Authentication List.
Figure 4.4 System > AAA > Authentication List
The following table describes the items in the previous figure.
ItemDescription
List NameThe name of the authentication list. This field can be configured only
when adding a new authentication list.
EKI-9500 Series User Manual26
ItemDescription
Access TypeThe way the user accesses the system. This field ca n be con fig ur ed
only when adding a new authentication list, and only the Login and
Enable access types can be selected. The access types are as follows:
Login: User EXEC-level management access to the command-
line interface (CLI) by using a console connection or a telnet or
SSH session. Access at this level has a limited number of CLI
commands available to view or configure the system.
Enable: Privileged EXEC-level management access to the CLI
by using a console connection or a telnet or SSH session. In
Privileged EXEC mode, read-write users have access to all CLI
commands.
HTTP: Management-level access to the web-based user inter-
face by using HTTP.
Dot1x: Port-based access to the network through a switch port
that is controlled by IEEE 802.1X.
Method OptionsThe method(s) used to authenticate a user who attempts to access
the management interface or net w ork. The possible methods are as
follows:
IAS: Uses the local Internal Authentication Server (IAS) data-
base for 802.1X port-based authentication.
Deny: Denies authentication.
Enable: Uses the locally configured Enable password to verify
the user's credentials.
Line: Uses the locally configured Line password to verify the
user's credentials.
Local: Uses the ID and password in the Local User database to
verify the user's credentials.
Radius: Sends the user's ID and password to the configured
Radius server to verify the user's credentials.
TACACS: Sends the user's ID and password to the configured
TACACS server to verify the user's credentials.
None: No authentication is used.
List TypeThe type of list, which is one of the following:
Default: The list is preconfigured on the system. This type of list
cannot be deleted, and only the Method Options are configurable.
Configured: The list has been added by a user.
Access LineThe access method(s) that use the list for authentication. The settings
for this field are configured on the Authentication Selection page.
RefreshClick Refresh to update the screen.
AddClick Add to add a new authentication list. See the following proce-
dure.
EditClick Edit to edit the selected entries.
27EKI-9500 Series User Manual
To add a new authentication list:
Click System > AAA > Authentication List > Add.
Figure 4.5 System > AAA > Authentication List > Add
The following table describes the items in the previous figure.
ItemDescription
Authentication Methods
Available MethodsThe authentication methods that can be used for the authentication
list. Not all authentication methods are available for all lists. To set the
authentication method, select the method in the Available Methods
field and click the right arrow to move it into the Selected Methods
field.
Selected MethodsThe authentication methods currently configured for the list. When
multiple methods are in this field, the order in which the meth od s ar e
listed is the order in which the methods will be used to authenticate a
user. If the user fails to be authenticated using the first method, the
device attempts to verify the user's credentials by using the next
method in the list. No authentication methods can be added after
None. To remove a method from this field, select it and click the left
arrow to return it to the Available Methods area.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
4.3.1.2 Authentication Selection
Use the Authentication List Selection page to associate an authentication list with
each CLI-based access method (Console, Telnet, and SSH). Each access method
has the following two authentication lists associated with it:
Login: The authentication list to use for User EXEC-level management access
to the CLI. Access at this level has a limited number of CLI commands available
to view or configure the system. The options available in this menu include the
default Login authentication lists as well as any user-configured Login lists.
Enable: The authentication list to use for Privileged EXEC-level management
access to the CLI. In Privileged EXEC mode, read-write users have access to all
CLI commands. The options available in this menu include the default Enable
authentication lists as well as any user-configured Enable lists.
To access this page, click System > AAA > Authentication Selection.
Figure 4.6 System > AAA > Authentication Selection
EKI-9500 Series User Manual28
The following table describes the items in the previous figure.
ItemDescription
Terminal
ConsoleThe Login authentication list and the Enable authentication list to
TelnetThe Login authentication list and the Enable authentication list to
SSHThe Login authentication list and the Enable authentication list to
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
4.3.1.3 Accounting List
Use the Accounting List Configuration page to view and configure the accounting lists
for users who access the command-line interface (CLI) to manage and monitor the
device. Accounting lists are used to record user activity on the device. The device is
preconfigured with accounting lists. These are default lists, and they cannot be
deleted. Additionally, the List Name and Accounting Type settings for the default lists
cannot be changed.
To access this page, click System > AAA > Accounting List.
apply to users who attempt to access the CLI by using a connection to
the console port.
apply to users who attempt to access the CLI by using a Telnet session.
apply to users who attempt to access the CLI by using a secure shell
(SSH) session.
Figure 4.7 System > AAA > Accounting List
The following table describes the items in the previous figure.
ItemDescription
Accounting TypeThe type of accounting list, which is one of the following:
Command: Each CLI command executed by the user , alon g with
the time the command was executed, is recorded and sent to an
external AAA server.
Exec: User login and logout times are recorded and sent to an
external AAA server.
List NameThe name of the accounting list. This fie ld can be conf igu red only
when adding a new accounting list.
Record TypeIndicates when to record and send information about the user activity:
Star tS top: Accounting notifica tions are sent at the beginning a nd
at the end of an exec session or a user-executed command.
User activity does not wait for the accounting notificat ion to be
recorded at the AAA server.
StopOnly: Accounting notifications are sent at the end of an
exec session or a user-executed command.
29EKI-9500 Series User Manual
ItemDescription
Method OptionsThe method(s) used to record user activity. The possible methods are
as follows:
TACACS+: Accounting notifications are sent to the configured
TACACS+ server.
Radius: Accounting notifications are sent to the configured
RADIUS server.
List TypeThe type of accounting list, which is one of the following:
Default: The list is preconfigured on the system. This type of list
cannot be deleted, and only the Method Options and Record
Type settings are configurable.
Configured: The list has been added by a user.
Access LineThe access method(s) that use the list for accounting user activity.
The settings for this field are configured on the Accounting Selection
page.
RefreshClick Refresh to update the screen.
AddClick Add to add a new accounting list.
EditClick Edit to edit the selected entries.
To add a new accounting list:
Click System > AAA > Accounting List > Add.
Figure 4.8 System > AAA > Accounting List > Add
The following table describes the items in the previous figure.
ItemDescription
Accounting Methods
Available MethodsThe accounting methods that can be used for the accounting list. To
set the accounting method, select the method in the Available Meth-
ods field and click the right arrow to move it into the Selected Method s
field.
Selected MethodsThe accounting methods curren tly configured for the list. When multi-
ple methods are in this field, the order in which the methods are listed
is the order in which the methods will be used. If the device is unable
to send accounting notifications by using the first method, the device
attempts to send notifications by using the second metho d. To remove
a method from this field, select it and click the left arrow to return it to
the Available Methods area.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
EKI-9500 Series User Manual30
4.3.1.4 Accounting Selection
Use the Accounting List Selection page to associate an accounting list with each
access method. For each access method, the following two accounting lists are associated:
Exec: The accounting list to record user login and logout times.
Commands: The accounting list to record which actions a user takes on the sys-
tem, such as page views or configuration changes. This list also records the
time when the action occurred. For Terminal access methods, this list records
the CLI commands a user executes and when each command is issued.
To access this page, click System > AAA > Accounting Selection.
Figure 4.9 System > AAA > Accounting Selection
The following table describes the items in the previous figure.
ItemDescription
TerminalThe access methods in this section are CLI-based.
Console: The Exec accounting list and the Commands account-
ing list to apply to users who access the CLI by using a connection to the console port.
Telnet: The Exec accounting list and the Commands accounting
list to apply to users who access the CLI by using a Telnet session.
SSH: The Exec accounting list and the Commands accounting
list to apply to users who access the CLI by using a secure shell
(SSH) session.
Hypertext Transfer
Protocol
The access methods in this section are through a web browser.
HTTP: The Exec accounting list and the Commands accounting
list to apply to users who access the web-based management
interface by using HTTP.
HTTPS: The Exec accounting list and the Commands account-
ing list to apply to users who access the web-based manage-
ment interface by using secure HTTP (HTTPS).
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
31EKI-9500 Series User Manual
4.3.2Advanced Configuration
4.3.2.1 DHCP Server
Global
Use the DHCP Server Global Configuration page to configure DHCP global parameters.
To access this page, click System > Advanced Configuration > DHCP Server >
Global.
Figure 4.10 System > Advanced Configuration > DHCP Server > Global
The following table describes the items in the previous figure.
ItemDescription
Admin ModeEnables or disables the DHCP server administrative mode. When
enabled, the device can be configured to automatically allocate TCP/
IP configurations for clients.
Conflict Logging
Mode
Bootp Automatic
Mode
Ping Packet CountThe number of packets the server sends to a pool address to check
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
Enables or disables the logging mode for IP address conflicts. When
enabled, the system stores information IP address conflicts that are
detected by the DHCP server.
Enables or disables the BOOTP automatic mode. When enabled, the
DHCP server supports the allocation of automatic addresses for
BOOTP clients. When disabled the DHCP server supports only static
addresses for BOOTP clients.
for duplication as part of a ping operation. If the server receives a
response to the ping, the address is considered to be in conflict and is
removed from the pool.
Excluded Addresses
Use the DHCP Server Excluded Addresses page to view and configure the IP
addresses the DHCP server should not assign to clients.
To access this page, click System > Advanced Configuration > DHCP Server >
Excluded Addresses.
Figure 4.11 System > Advanced Configuration > DHCP Server > Excluded
Addresses
EKI-9500 Series User Manual32
The following table describes the items in the previous figure.
ItemDescription
FromThe IP address to exclude. In a range of addresses, this value is the
lowest address to exclude.
ToThe highest address to exclude in a range of addresses. If the
excluded address is not part of a range, this field shows the same
value as the From field. When adding a single IP address to exclude,
you can enter the same address specified in the From field or leave
the field with the default value.
RefreshClick Refresh to update the screen.
AddClick Add to add a new excluded address.
RemoveClick Remove to remove the selected entries.
To add a new excluded address:
Click System > Advanced Configuration > DHCP Server > Excluded Addresses
> Add.
Figure 4.12 System > Advanced Configuration > DHCP Server > Excluded
Addresses > Add
The following table describes the items in the previous figure.
ItemDescription
FromThe IP address to exclude. In a range of addresses, this value is the
lowest address to exclude.
ToThe highest address to exclude in a range of addresses. If the
excluded address is not part of a range, this field shows the same
value as the From field. When adding a single IP address to exclude,
you can enter the same address specified in the From field or leave
the field with the default value.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
Pool Summary
Use the DHCP Server Pool Summary page to view the currently configured DHCP
server pools and to add and remove pools. A DHCP server pool is a set of network
configuration information available to DHCP clients that request the information.
To access this page, click System > Advanced Configuration > DHCP Server >
Pool Summary.
Figure 4.13 System > Advanced Configuration > DHCP Server > Pool Summary
33EKI-9500 Series User Manual
The following table describes the items in the previous figure.
ItemDescription
NameThe name that identifies the DHCP server pool.
TypeThe type of binding for the pool. The options are:
Manual: The DHCP server assigns a specific IP address to the
client based on the client's MAC address. This type is also
known as Static.
Dynamic: The DHCP server can assign the client any available
IP address within the pool. This type is also known as Automatic.
Undefined: The pool has been created by using the CLI, but the
pool information has not been configured .
NetworkFor a Manual pool, indicates the host IP address to assign the client.
For a Dynamic pool, indicates the network base address.
Lease TimeThe amount of time the information the DHCP server allocates is
valid.
RefreshClick Refresh to update the screen.
AddClick Add to add a new DHCP server pool.
RemoveClick Remove to remove the selected entries.
To add a new DHCP server pool:
Click System > Advanced Configuration > DHCP Server > Pool Summary > Add.
Figure 4.14 System > Advanced Configuration > DHCP Server > Pool Summary
> Add
The following table describes the items in the previous figure.
ItemDescription
NameThe name that identifies the DHCP server pool.
Type of BindingThe type of binding for the pool. The options are:
Manual
Dynamic
The binding type you select determines the fields that are available to
configure.
EKI-9500 Series User Manual34
ItemDescription
Network Base
Address
Network MaskThe subnet mask associated with the Network Base Address that sep-
Client NameThe system name of the client. The Client Name should not include
Hardware Address
Type
Hardware AddressThe MAC address of the client. The function is only available for Man-
Client IDThe value some DHCP clients send in the Client Identifier field of
Host IP AddressThe IP address to offer the client. The function is only available for
Host MaskThe subnet mask to offer the client. The function is only available for
Lease Expiration
Mode
The network portion of the IP address. A DHCP client can be offered
any available IP address within the defined network as long as it has
not been configured as an excluded address (for dynamic pools only).
arates the network bits from the host bits (for dynamic pools only).
the domain name. The function is only available for Manual pools.
The protocol type (Ethernet or IEEE 802) used by the client's hard-
ware platform. This value is used in response to requests from
BOOTP clients. The function is only available for Manual pools.
ual pools.
DHCP messages. This value is typically identical to the Hardware
Address value. In some systems, such as Microsoft DHCP clients, the
client identifier is required instead of the hardware address. If the client's DHCP request includes the client identifier, the Clie nt ID fiel d on
the DHCP server must contain the same value, and the Hardware
Address Type field must be set to the app ropriate value. Otherwise,
the DHCP server will not respond to the client's request. The function
is only available for Manual pools.
Manual pools.
Manual pools.
Indicates whether the information the server provides to the client
should expire.
Enable: Allows the lease to expire. If you select this option, you
can specify the amount of time the lease is valid in the Lease
Duration field.
Disable: Sets an infinite lease time. For Dynamic bindings, an
infinite lease time implies a lease period of 60 days. For a Manual binding, an infinite lease period never expires.
Lease DurationThe number of Days, Hours, and Minutes the lease is valid. This field
cannot be configured if the Lease Expiration Mode is disabled.
Default Router
Address
DNS Server Address The IP addresses of up to two DNS servers the client should use to
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
The IP address of the router to which the client should send traffic.
The default router should be in the same subnet as the client. To add
additional default routers, use the DHCP Server Pool Configuration
page.
resolve host names into IP addresses. To add additional DNS servers,
use the DHCP Server Pool Configuration page.
Pool Configuration
Use the DHCP Server Pool Configuration page to edit pool settings or to configure
additional settings for existing manual and dynamic pools. The additional settings on
this page are considered advanced parameters because they are not typically used
or configured. The fields that can be configured depend on the Type of Binding that is
selected. The fields that do not apply to the selected binding type are disabled.
35EKI-9500 Series User Manual
To access this page, click System > Advanced Configuration > DHCP Server >
Pool Configuration.
Figure 4.15 System > Advanced Configuration > DHCP Server > Pool
Configuration
The following table describes the items in the previous figure.
ItemDescription
Pool NameSelect the pool to configure. The menu includes all pools that have
been configured on the device.
Type of BindingThe type of binding for the pool. The options are:
Manual: The DHCP server assigns a specific IP address to the
client based on the client's MAC address. This type is also
known as Static.
Dynamic: The DHCP server can assign the client any available
IP address within the pool. This type is also known as Automatic.
Network Base
Address
Network MaskThe subnet mask associated with the Network Base Address that sep-
Client NameThe system name of the client. The Client Name should not include
Hardware Address
Type
Hardware AddressThe MAC address of the client (for manual pools only).
Client IDThe value some DHCP clients send in the Client Identifier field of
Host IP AddressThe IP address to offer the client (for manual pools only).
Host MaskFor manual bindings, this field specifies the subnet mask to be stati-
The network portion of the IP address. A DHCP client can be offered
any available IP address within the defined network as long as it has
not been configured as an excluded address (for dynamic pools only).
arates the network bits from the host bits (for dynamic pools only).
the domain name. This field is optional.
The protocol type (Ethernet or IEEE 802) used by the client's hard-
ware platform. This value is used in response to requests from
BOOTP clients (for manual pools only).
DHCP messages. This value is typically identical to the Hardware
Address value. In some systems, such as Microsoft DHCP clients, the
client identifier is required instead of the hardware address. If the cli-
ent's DHCP request includes the client identifier, the Client ID field on
the DHCP server must contain the same value, and the Hardware
Address Type field must be set to the appropriate value. Otherwise,
the DHCP server will not respond to the client's request (for manual
pools only).
cally assigned to a DHCP client. You can enter a value in Host Mask
or Prefix Length to specify the subnet mask, but do not enter a value
in both fields.
EKI-9500 Series User Manual36
ItemDescription
Lease ExpirationIndicates whether the information the server provides to the client
should expire.
Enable: Allows the lease to expire. If you select this option, you
can specify the amount of time the lease is valid in the Lease
Duration field.
Disable: Sets an infinite lease time. For Dynamic bindings, an
infinite lease time implies a lease period of 60 days. For a Manual binding, an infinite lease period never expires.
Lease DurationThe number of Days, Hours, and Minutes the lease is valid. This field
cannot be configured if the Lease Expiration is disabled.
Next Server Address The IP address of the next server the client should contact in th e boot
process. For example, the client might be required to contact a TFTP
server to download a new image file. To configure this field, click
button in the row . To reset the field to the default value, click the Reset
icon in the row.
To configure settings for one or mo re defau lt routers, DN S server s, or
NetBIOS servers that can be used by the client(s) in the pool, use the
buttons available in the appropriate table to perform the following
tasks:
To add an entry to the server list, click button and enter the
IP address of the server to add.
To edit the address of a configured server, click button asso-
ciated with the entry to edit and update the address.
To delete an entry from the list, click button associated with
the entry to remove.
To delete all entries from the list, click button in the heading
row.
Default RouterLists the IP address of each router to which the client(s) in the pool
should send traffic. The default router should be in the same subnet
as the client.
DNS ServerLists the IP address of each DNS server the client(s) in the pool can
contact to perform address resolution.
NetBIOS ServerLists the IP address of each NetBIOS Windows Internet Naming Ser-
vice (WINS) name server that is available for the selected pool.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
Pool Options
Use the DHCP Server Pool Options page to configure additional DHCP pool options,
including vendor-defined options. DHCP options are collections of data with type
codes that indicate how the options should be used. When a client broadcasts a
request for information, the request includes the option codes that correspond to the
information the client wants the DHCP server to supply.
37EKI-9500 Series User Manual
To access this page, click System > Advanced Configuration > DHCP Server >
Pool Options.
Figure 4.16 System > Advanced Configuration > DHCP Server > Pool Options
The following table describes the items in the previous figure.
ItemDescription
Pool NameSelect the pool to configure. The menu includes all pools that have
been configured on the device.
NetBIOS Node Type The method the client should use to resolve NetBIOS names to IP
addresses. To configure this field, click the Edit icon in the row. To
reset the field to the default value, click the Reset icon in the r ow. The
options are:
B-Node Broadcast: Broadcast only
P-Node Peer-to-Peer: NetBIOS name server only
M-Node Mixed: Broadcast, then NetBIOS name server
H-Node Hybrid: NetBIOS name server, then broadcast
Domain NameThe default domain name to configure for all clients in th e selected
pool.
Bootfile NameThe name of the default boot image that the client should attempt to
download from a specified boot server.
Option NameIdentifies whether the entry is a fixed option or a vendor-defined
option (Vendor).
Option CodeThe number that uniquely identifies the option.
Option TypeThe type of data to associate with the Option Code, which can be one
of the following:
ASCII
HEX
IP Address
Option ValueThe data associated with the Option Code. When adding or editing a
vendor option, the field(s) available for configuring the value depend
on the selected Option Typ e. If the value you configure contains char-
acters that are not allowed by the selected Option T ype , the configura-
tion cannot be applied.
RefreshClick Refresh to update the screen.
Add Vendor OptionClick Add Vendor Option to add a new vendor option.
EditClick Edit to edit the selected entries.
RemoveClick Remove to remove the selected entries.
EKI-9500 Series User Manual38
To add a new vendor option:
Click System > Advanced Configuration > DHCP Server > Pool Options > Add
Vendor Option.
Figure 4.17 System > Advanced Configuration > DHCP Server > Pool Options >
Add Vendor Option
The following table describes the items in the previous figure.
ItemDescription
Option CodeThe number that uniquely identifies the option.
Option TypeThe type of data to associate with the Option Code, which can be one
of the following:
ASCII
HEX
IP Address
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
To edit a new vendor option:
Click System > Advanced Configuration > DHCP Server > Pool Options > Con-
figure Vendor Option.
Figure 4.18 System > Advanced Configuration > DHCP Server > Pool Options >
Configure Vendor Option
The following table describes the items in the previous figure.
ItemDescription
Option CodeThe number that uniquely identifies the option.
Option TypeThe type of data to associate with the Option Code, which can be one
of the following:
ASCII
HEX
IP Address
39EKI-9500 Series User Manual
ItemDescription
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
Bindings
Use the DHCP Server Bindings page to view information about the IP address bindings in the DHCP server database.
To access this page, click System > Advanced Configuration > DHCP Server >
Bindings.
Figure 4.19 System > Advanced Configuration > DHCP Server > Bindings
The following table describes the items in the previous figure.
ItemDescription
IP AddressThe IP Address of the DHCP client.
Hardware AddressThe MAC address of the DHCP client.
Lease Time LeftThe amount of time left until the lease expires in days, hours, and min-
utes.
Pool Allocation Type The type of binding used:
Dynamic: The address was allocated dynamically from a pool
that includes a range of IP addresses.
Manual: A static IP address was assigned based on the MAC
address of the client.
Inactive: The pool is not in use.
RefreshClick Refresh to update the screen.
Clear EntriesClick Clear Entries to remove a selected entry.
Statistics
The DHCP Server Statistics page displays the DHCP server statistics for the device,
including information about the bindings and DHCP messages. The values on this
page indicate the various counts that have a ccumulated since th ey were last cleared.
To access this page, click System > Advanced Configuration > DHCP Server >
Statistics.
Figure 4.20 System > Advanced Configuration > DHCP Server > Statistics
EKI-9500 Series User Manual40
The following table describes the items in the previous figure.
ItemDescription
Automatic BindingsThe total number of IP addresses from all address pools with auto-
matic bindings that the DHCP server has assigned to DHCP clients.
Expired BindingsThe number of IP addresses that the DHCP server has assigned to
DHCP clients that have exceeded the configured lease time.
Malformed Messages
Messages Received
DHCPDISCOVERThe number of DHCP discovery messages the DHCP server has
DHCPREQUESTThe number of DHCP request messages the DHCP server has
DHCPDECLINEThe number of DHCP decline messages the DHCP server has
DHCPRELEASEThe number of DHCP release messages the DHCP server has
DHCPINFORMThe number of DHCP inform messages the DHCP server has
Messages Sent
DHCPOFFERThe number of DHCP offer messages the DHCP server has sent to
DHCP A CKThe number of DHCP acknowledgement messa ges the DHCP server
DHCPNAKThe number of negative DHCP acknowledgement messages the
RefreshClick Refresh to update the screen.
Clear CountersClick Clear Counters to reset all counters to zero.
The number of messages received from one or more DHCP clients
that were improperly formatted.
received. A DHCP client broadcasts this type of message to discover
available DHCP servers.
received. A DHCP client broadcasts this type of message in response
to a DHCP offer message it received from a DHCP server.
received from clients. A client sends a decline message if the DHCP
client detects that the IP address offered by the DHCP server is
already in use on the network. The server then marks the address as
unavailable.
received from clients. This type of message indicates that a client no
longer needs the assigned address.
received from clients. A client uses this type of message to obtain
DHCP options.
DHCP clients in response to DHCP discovery messages it has
received.
has sent to DHCP clients in response to DHCP request messages it
has received. The server sends this message after the cli ent has
accepted the offer from this particular server. The DHCP acknowledgement message includes information about the lease time and
any other configuration information that the DHCP client has
requested.
DHCP server has sent to DHCP clients. A server might send this type
of message if the client requests an IP address that is already in use
or if the server refuses to renew the lease.
Conflicts
Use the DHCP Server Conflicts Information page to view information on hosts that
have address conflicts; i.e., when the same IP address is assigned to two or more
devices on the network.
41EKI-9500 Series User Manual
To access this page, click System > Advanced Configuration > DHCP Server >
Conflicts.
Figure 4.21 System > Advanced Configuration > DHCP Server > Conflicts
The following table describes the items in the previous figure.
ItemDescription
IP AddressThe IP address that has been detected as a duplicate.
Detection MethodThe method used to detect the conflict, which is one of the following:
Gratuitous ARP: The DHCP client detected the conflict by
broadcasting an ARP request to the address specified in the
DHCP offer message sent by the server. If the client receives a
reply to the ARP request, it declines the offer and reports the
conflict.
Ping: The server detected the conflict by sending an ICMP echo
message (ping) to the IP address before offer ing it to the DHCP
client. If the server receives a response to the ping, the address
is considered to be in conflict and is removed from the pool.
Host Declined: The server received a DHCPDECLINE message
from the host. A DHCPDECLINE message indicates that the
host has discovered that the IP address is already in use on the
network.
Detection TimeThe time when the conflict was detected in days, hours, minutes and
seconds since the system was last reset (i.e., system up time).
RefreshClick Refresh to update the screen.
Clear EntriesClick Clear Entries to clear all of the address conflict entries.
4.3.2.2 DNS
You can use these pages to configure information about DNS servers the network
uses and how the switch/ router operates as a DNS client.
Global
Use the DNS Global Configuration page to configure global DNS settings and to view
DNS client status information.
To access this page, click System > Advanced Configuration > DNS > Configura-
tion.
Figure 4.22 System > Advanced Configuration > DNS > Configuration
EKI-9500 Series User Manual42
The following table describes the items in the previous figure.
ItemDescription
Admin ModeThe administrative mode of the DNS client.
Default Domain
Name
Retry NumberThe number of times the DNS client should attempt to send DNS que-
Response Timeout
(secs)
Domain ListThe list of domain names that have been added to the DNS client's
DNS ServerA unique IPv4 or IPv6 address used to identify a DNS server. The
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
The default domain name for the DNS client to use to complete
unqualified host names. Domain names are typically composed of a
series of labels concatenated with dots. After a default domain name
is configured, if you enter a host name and do not include the domain
name information, the default domain name is automatically
appended to the host name.
ries to a DNS server on the network.
The number of seconds the DNS client should wait for a response to a
DNS query.
domain list. If a DNS query that includes the default domain name is
not resolved, the DNS client attempts to use the domain names in this
list to extend the hostname into a fully-qualified domain name. The
DNS client uses the entries in the order that they appear in the list.
order in which you add servers determines the precedence of the
server. The DNS server that you add firs t has the hig hest precedence
and will be used before other DNS servers that you add.
IP Mapping
Use the DNS IP Mapping page to configure DNS host names for hosts on the network and to view dynamic DNS entries. The host names are associated with IPv4 or
IPv6 addresses on the network, which are statically assigned to particular hosts.
To access this page, click System > Advanced Configuration > DNS > IP Map-
ping.
Figure 4.23 System > Advanced Configuration > DNS > IP Mapping
The following table describes the items in the previous figure.
ItemDescription
Entry TypeType of DNS entry:
Static: An en try that has been manually configure d on the
device.
Dynamic: An entry that the device has learned by using a config-
ured DNS server to resolve a hostname.
Host NameThe name that identifies the system. For Static entries, specify the
Host Name after you click Add. A host name can contain up to 255
characters if it contains multiple levels in the domain hierarchy, but
each level (the portion preceding a period) can contain a maximum of
63 characters. If the host name you specify is a single level (does not
contain any periods), the maximum number of allowed characters is
63.
43EKI-9500 Series User Manual
ItemDescription
IP AddressThe IPv4 or IPv6 address associated with the configured Host Name.
For St atic entr ies, sp ecify th e IP Address after you click Add. You can
specify either an IPv4 or an IPv6 address.
Total TimeThe number of seconds that the entry will remain in the table. The
function is only available for Dynamic entries.
Elapsed TimeThe number of seconds that have passed since the entry was added
to the table. When the Elapsed T ime reaches the Total Time, the entry
times out and is removed from the table. The function is only available
for Dynamic entries.
Dynamic TypeThe type of address in the entry, for example IP or (less common)
X.121. The function is only available for Dynamic entries.
RefreshClick Refresh to update the screen.
AddClick Add to add a new DNS entry.
RemoveClick Remove to remove the selected entries.
To add a new DNS entry:
Click System > Advanced Configuration > DNS > IP Mapping > Add.
Figure 4.24 System > Advanced Configuration > DNS > IP Mapping > Add
The following table describes the items in the previous figure.
ItemDescription
Host NameThe name that identifies the system. For Static entries, specify the
Host Name after you click Add. A host name can contain up to 255
characters if it contains multiple levels in the domain hierarchy, but
each level (the portion preceding a period) can contain a maximum of
63 characters. If the host name you specify is a single level (does not
contain any periods), the maximum number of allowed characters is
63.
IP AddressThe IPv4 or IPv6 address associated with the configured Host Name.
For St atic entries, specify the IP Address after you click Add. You can
specify either an IPv4 or an IPv6 address.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
Source Interface Configuration
Use the DNS Source Interface Configuration page to specify the physical or logical
interface to use as the DNS client source interface. When an IP address is configured
on the source interface, this address is used for all DNS communications between
the local DNS client and the remote DNS server. The IP address of the designated
source interface is used in the IP header of DNS management protocol packets. This
allows security devices, such as firewalls, to identify all source packets coming from a
specific device.
EKI-9500 Series User Manual44
To access this page, click System > Advanced Configuration > DNS > Source
Interface Configuration.
Figure 4.25 System > Advanced Configuration > DNS > Source Interface
Configuration
The following table describes the items in the previous figure.
ItemDescription
TypeThe type of interface to use as the source interface:
None: The primary IP address of the originating (outbound)
interface is used as the source address.
Interface: The primary IP address of a physical port is used as
the source address.
VLAN: The primary IP address of a VLAN routing interface is
used as the source address.
InterfaceWhen the selected T ype is Interface, select the physic al port to use as
the source interface.
VLANWhen the selected T ype is VLAN, select the VLAN to use as the
source interface. The menu contains only the VLAN IDs for VLAN
routing interfaces.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
4.3.2.3 Email Alerts
With the Email alerting feature, log messages can be sent to one or more Email
addresses. You must configure information about the network Simple Mail Transport
Protocol SMTP) server for Email to be successfully sent from the switch.
The pages available from the Email Alerting folder allow you to configure information
about what type of log message are sent via Email and to what address(es) the me ssages are delivered by Email.
Global
Use the Email Alert Global Configuration page to configure the common settings for
log messages emailed by the switch.
To access this page, click System > Advanced Configuration > Email Alerts >
Global.
Figure 4.26 System > Advanced Configuration > Email Alerts > Global
The following table describes the items in the previous figure.
ItemDescription
Admin ModeSets the administrative mode of the feature.
From AddressSpecifies the email address of the sender (the switch).
Enable: The device can send email alerts to the configured
SMTP server.
Disable: The device will not send email alerts.
45EKI-9500 Series User Manual
ItemDescription
Log Duration
(Minutes)
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
Determines how frequently the non critical messages are sent to the
SMTP server.
Test
Use the Email Alert Test page to verify that the Email alert settings are configured
properly. After you specify the settings on this page and click Submit, the device will
use the configured SMTP server to send an Email to the configured Email addresses.
To access this page, click System > Advanced Configuration > Email Alerts >
Test.
Figure 4.27 System > Advanced Configuration > Email Alerts > Test
The following table describes the items in the previous figure.
ItemDescription
Test Message TypeSpecifies the type of message to test for email alert functionality.
Test Message BodySpecifies the text contained in the body of the email alert test mes-
sage.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
Server
Use the Email Alert Server Configuration page to configure information about up to
three SMTP (mail) servers on the network that can handle Email alerts sent from the
switch.
To access this page, click System > Advanced Configuration > Email Alerts >
Server.
Figure 4.28 System > Advanced Configuration > Email Alerts > Server
The following table describes the items in the previous figure.
ItemDescription
AddressShows the IPv4/IPv6 address or host name of the SMTP server that
handles email alerts that the device sends.
PortSpecifies the TCP port that email alerts are sent to on the SMTP
server.
SecuritySpecifies the type of authentication to use with the mail server, which
can be TLSv1 (SMTP over SSL) or None (no authentication is
required).
User NameIf the Security is TLSv1, this field specifies the user name required to
access the mail server.
EKI-9500 Series User Manual46
ItemDescription
PasswordIf the Security is TLSv1, this field specifies the password associated
with the configured user name for mail server access. When adding or
editing the server, you must retype the password to confirm that it is
entered correctly.
RefreshClick Refresh to update the screen.
Add
EditClick Edit to edit the selected entries.
RemoveClick Remove to remove the selected entries.
Click Add to add a new
Email server.
To add a new Email server:
Click System > Advanced Configuration > Email Alerts > Server > Add.
Figure 4.29 System > Advanced Configuration > Email Alerts > Server > Add
The following table describes the items in the previous figure.
ItemDescription
SecuritySpecifies the type of authentication to use with the mail server, which
can be TLSv1 (SMTP over SSL) or None (no authentication is
required).
Port
User NameIf the Security is TLSv1, this field specifies the user name required to
PasswordIf the Security is TLSv1, this field specifies the password associated
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
Specifies the TCP port that
server.
access the mail server.
with the configured user name for mail server access. When adding or
editing the server, you must retype the password to confirm that it is
entered correctly.
Email alerts are sent to on the SMTP
Statistics
Use the Email Alert Statistics page to view information about Email alerts sent from
the switch.
To access this page, click System > Advanced Configuration > Email Alerts > Sta-
The following table describes the items in the previous figure.
ItemDescription
Message TypeSelect the message type with the subject to edit.
Email SubjectSpecify the text to be displayed in the subject of the email alert mes-
sage for the selected message type.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
DeleteClick Delete to delete the selected message type.
CancelClick Cancel to restore default value.
Address
Use the Email Alert To Address Configuration page to configure the Email addresses
to which alert messages sent.
To access this page, click System > Advanced Configuration > Email Alerts >
The following table describes the items in the previous figure.
ItemDescription
Message TypeSpecifies whether to send urgent, non urgent, or both types of email
alert message to the associated address.
To AddressThe valid email address of an email alert recipient.
RefreshClick Refresh to update the screen.
AddClick Add to add a new email alert to address.
RemoveClick Remove to remove the selected entries.
EKI-9500 Series User Manual48
To add a new Email alert to address:
Click System > Advanced Configuration > Email Alerts > Address > Add.
The following table describes the items in the previous figure.
ItemDescription
To Address
Message Type
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
4.3.2.4 ISDP
The Industry Standard Discovery Protocol (ISDP) is a proprietary Layer 2 network
protocol which inter-operates with Cisco devices running the Cisco Discovery Protocol (CDP). ISDP is used to share information between neighboring devices. FASTPATH software participates in the CDP protocol and is able to both discover and be
discovered by other CDP supporting devices.
Global
Use the ISDP Global Configuration page to configure global settings for the Industry
Standard Discovery Protocol (ISDP) feature. ISDP is a proprietary Layer 2 network
protocol that interoperates with the Cisco Discovery Protocol (CDP). ISDP is used to
share information between neighboring devices (routers, bridges, access servers,
and switches).
To access this page, click System > Advanced Configuration > ISDP > Global.
The valid
Specifies whether to send urgent, non urgent, or both types of
alert message to the associated address.
Email address of an Email alert recipient.
Email
Figure 4.34 System > Advanced Configuration > ISDP > Global
The following table describes the items in the previous figure.
ItemDescription
ISDP ModeThe administrative mode of ISDP on the device. When the mode is
enabled, the device sends ISDP announcements out of each ISDPenabled network interface that has a link partner.
ISDP V2 ModeThe administrative mode of ISDP version 2 on the device. When the
mode is enabled, the device sends ISDPv2 announcements out of
each ISDP-enabled network interfac e th at has a link partner.
Message Interval
(Seconds)
The number of seconds to wait between ISDP packet transmissions.
49EKI-9500 Series User Manual
ItemDescription
Hold Time Interval
(Seconds)
Device IDThe identification information the device advertises to its neighbors in
Device ID Format
Capability
Device ID FormatThe current format of the device ID.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
The number of seconds the neighbor device should co nsider the in for-
mation it receives in an ISDP packet to be valid.
the ISDP packets.
The possible formats that the device can use for identification pur-
poses.
Cache Table
Use the ISDP Cache Table page to view information about other devices the switch
has discovered through the ISDP.
To access this page, click System > Advanced Configuration > ISDP > Cache
The following table describes the items in the previous figure.
ItemDescription
Device IDThe ID of the neighbor device as advertised in the ISDP message.
The ID could be a host name, serial number, product name, MAC
address, or some other type of information that identifies the neighbor
device.
InterfaceThe local interface that is connected to the neighbor. The ISDP mes-
sage was received on this interface.
IP AddressThe (first) network-layer address reported in the address TLV of the
most recently received ISDP message from the neighbor.
VersionThe firmware version running on the neighbor device, as advertised in
the ISDP message.
Hold TimeThe number of secon ds the info rmation received in an ISDP packet is
considered valid. The timer restarts each time a new ISDP packet is
received from the neighbor. If the value reaches 0, the device is con-
sidered to be disconnected, and the entry ages out.
CapabilityThe functional capabilities advertised by the neighbor. For example, a
neighbor might advertise itself as a switch, router, or host.
PlatformThe hardware platform information advertised by the neighbor. The
neighbor's ISDP packet might included information such as the name
of the manufacturer or product model.
Port IDThe port on the neighbor device from which the ISDP packet was
sent. This is the port that is directly connected to the loc al interf ace
identified in the Interface field.
Protocol VersionThe protocol version of the ISDP packet sent by the neighbor.
Last Time ChangedThe amount of time that has passed since the entry was last modified.
RefreshClick Refresh to update the screen.
ClearClick Clear to remove the selected entry.
EKI-9500 Series User Manual50
Interface
Use the ISDP Interface Configuration page to configure the ISDP settings for each
interface.
To access this page, click System > Advanced Configuration > ISDP > Interface.
Figure 4.36 System > Advanced Configuration > ISDP > Interface
The following table describes the items in the previous figure.
ItemDescription
InterfaceThe interface on which ISDP can be enabled or disabled. In the Edit
ISDP Mode window, this field identifies the interfaces that are being
configured.
ISDP ModeThe administrative mode of ISDP on the interface. When ISDP is
enabled globally and on an interface, the interface periodically sends
ISDP messages to its directly connected link partner.
RefreshClick Refresh to update the screen.
EditClick Edit to edit the selected entries.
Statistics
The ISDP Statistics page displays statistical information about the ISDP packets sent
and received by the device. The transmit statistics provide information about the
ISDP packets sent by all ISDP-enabled interfaces. The receive statistics provide
information about the ISDP packets received from neighbor devices connected to
ISDP-enabled interfaces.
To access this page, click System > Advanced Configuration > ISDP > Statistics.
Figure 4.37 System > Advanced Configuration > ISDP > Statistics
The following table describes the items in the previous figure.
ItemDescription
Packets ReceivedThe total number of ISDP packets received by the device.
Packets Transmitted The total number of ISDP packets transmitted by the device.
ISDPv1 Packets
Received
The total number of ISDP version 1 packets received by the device.
51EKI-9500 Series User Manual
ItemDescription
ISDPv1 Packets
Transmitted
ISDPv2 Packets
Received
ISDPv2 Packets
Transmitted
Bad HeaderThe total number of ISDP packets received with bad headers.
Checksum ErrorThe total number of ISDP packets received with checksum errors.
Transmission Failure The total number of ISDP packets that the device attempted to trans-
Invalid Format Packets Received
Table FullThe number of times a neighbor entry was not added to the ISDP
ISDP IP Address
Table Full
RefreshClick Refresh to update the screen.
ClearClick Clear to reset all statistic to zero.
4.3.2.5 Link Dependency
The link dependency feature provides the ability to enable or disable one or more
ports based on the link state of one or more different ports. With link dependency
enabled on a port, the link state of that port is dependent on the link state of another
port. For example, if port A is dependent on port B and the switch detects a link loss
on port B, the switch automatically brings down the link on port A. When the link is
restored to port B, the switch automatically restores the link to port A.
Group
Use the Link Dependency Group Status page to configure link dependency groups.
Link dependency allows the link status of one interface to be dependent on the link
status of another interface. Link state groups define the interface link dependency.
To access this page, click System > Advanced Configuration > Link Dependency
> Group.
The total number of ISDP version 1 p acket s transmitted b y the device.
The total number of ISDP version 2 packets received by the device.
The total number of ISDP version 2 p acket s transmitted b y the device.
mit but failed to do so.
The total number of ISDP packets received with an invalid ISDP
packet format.
cache table because the local database was full.
The number of times the IP address of a neighbor could not be added
to the neighbor entry because the IP address table was full.
Figure 4.38 System > Advanced Configuration > Link Dependency > Group
The following table describes the items in the previous figure.
ItemDescription
GroupThe unique link dependency group identifier.
Downstream Inter-
faces
Upstream Interfaces The set of interfaces that other interfaces are dependent on.
EKI-9500 Series User Manual52
The set of interfaces dependent on other interfaces.
ItemDescription
Link ActionThe action performed on downstream interfaces when the upstream
interfaces are down, which can be one of the following:
Up: Downstream interfaces are up when upstream interfaces
are down.
Down: Downstream interfaces go down when upstream inter-
faces are down.
StateThe group state, which can be one of the following:
Up: Link action is up and no upstream interfaces have their link
up, or link action is down and there are upstrea m inte rfaces tha t
have their link up.
Down: Link is down when the above conditions are not true.
RefreshClick Refresh to update the screen.
AddClick Add to add a new group.
EditClick Edit to edit the selected entries.
RemoveClick Remove to remove the selected entries.
DetailsClick Detail to open the Group Entry Details window.
To add a new group:
Click System > Advanced Configuration > Link Dependency > Group > Add.
Figure 4.39 System > Advanced Configuration > Link Dependency > Group >
Add
The following table describes the items in the previous figure.
ItemDescription
Available InterfacesThe interfaces that can be added to the group. An interface defined as
an upstream interface cannot be defined as a downstream interface in
the same link state group or in a differ ent group. Similarly, an interface
defined as a downstream interface cannot be defined as an upstream
interface. To move an interface between the Available Interfaces and
Downstream Interfaces or Upstream Interfaces fields, click the inter-
face (or CTRL + click to select multiple interfaces), and then click the
appropriate arrow to move the selected interfaces to the desired field.
53EKI-9500 Series User Manual
ItemDescription
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
4.3.2.6 Protection
Denial of Service
Use the Denial of Service (DoS) Configuration page to configure DoS control. FASTPATH SMB software provides support for classifying and blocking specific types of
DoS attacks. You can configure your system to monitor and block these types of
attacks:
To access this page, click System > Advanced Configuration > Protection >
Denial of Service.
Figure 4.40 System > Advanced Configuration > Protection > Denial of Service
The following table describes the items in the previous figure.
ItemDescription
TCP Settings
First FragmentEnable this option to allow the device to drop packets that have a TCP
header smaller than the value configured in the Min TCP Hdr Size
field.
TCP PortEnable this option to allow the device to drop packets that have the
TCP source port equal to the TCP destination port.
UDP PortEnable this option to allow the device to drop packets that have the
UDP source port equal to the UDP destination port.
SIP=DIPEnable this option to allow the device to drop packets that have a
source IP address equal to the destination IP address.
SMAC=DMACEnable this option to allow the device to drop packets that have a
source MAC address equal to the destination MAC address.
TCP FIN and URG
and PSH
TCP Flag and
Sequence
TCP SYNEnable this option to allow the device to drop packets that have TCP
TCP SYN and FINEnable this option to allow the device to drop packets that have TCP
Enable this option to allow the device to drop packets that have TCP
Flags FIN, URG, and PSH set and a TCP Sequence Number equal to
0.
Enable this option to allow the device to drop packets that have TCP
control flags set to 0 and the TCP sequence number set to 0.
Flags SYN set.
Flags SYN and FIN set.
EKI-9500 Series User Manual54
ItemDescription
TCP FragmentEnable this option to allow the device to drop packets that have a TCP
payload where the IP payload length minus the IP header size is less
than the minimum allowed TCP header size.
TCP OffsetEnable this option to allow the device to drop packets that have a TCP
header Offset set to 1.
Min TCP Hdr SizeThe minimum TCP header size allowed. If First Fragment DoS pre-
vention is enabled, the device will drop packets that have a TCP
header smaller than this configured value.
ICMP Settings
ICMPEnable this option to allow the device to dr op ICMP p ackets that have
a type set to ECHO_REQ (ping) and a payload size greater than the
ICMP payload size configured in the Max ICMPv4 Size field.
Max ICMPv4 SizeThe maximum allowed ICMPv4 packet size. If ICMP DoS prevention
is enabled, the device will drop ICMPv4 ping packets that have a size
greater then this configured maximum ICMPv4 packet size.
ICMPv6Enable this option to allow the device to drop ICMP packets that have
a type set to ECHO_REQ (ping) and a payload size greater than the
ICMP payload size configured in the Max ICMPv6 Size field.
Max ICMPv6 SizeThe maximum allowed IPv6 ICMP packet size. If ICMP DoS preven-
tion is enabled, the switch will drop IPv6 ICMP ping packets that have
a size greater than this configured maximum ICMPv6 packet size.
ICMP FragmentEnable this option to allow the device to drop fragmented ICMP pack-
ets.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
4.3.2.7 sFlow
Agent
The sFlow Agent Summary page shows information about the sFlow agent on the
device. sFlow is an industry standard technology for monitoring high-speed switched
and routed networks. The sFlow agent can monitor network traffic on each port and
generate sFlow data to send to a centralized sFlow receiver (also known as a collector).
To access this page, click System > Advanced Configuration > sFlow > Agent.
The following table describes the items in the previous figure.
ItemDescription
VersionIdentifies the version and implementation of the sF low agent. Th e ver -
Agent AddressThe IP address associated with the sFlow agent.
RefreshClick Refresh to update the screen.
Figure 4.41 System > Advanced Configuration > sFlow > Agent
sion string has the following structure: MIB Version; Organization;
Software Version.
Receiver
Use the sFlow Receiver Configuration page to view and to edit the sFlow receiver
settings. The sFlow receiver collects and analyzes information sent by the sFlow
55EKI-9500 Series User Manual
agent on the device. The sFlow agent can send packet sampling data to multiple
sFlow receivers on the network.
To access this page, click System > Advanced Configuration > sFlow > Receiver.
Figure 4.42 System > Advanced Configuration > sFlow > Receiver
The following table describes the items in the previous figure.
ItemDescription
IndexThe receiver for which data is displayed or configured.
Owner StringThe entity making use of this sFlow receiver table entry. If this field is
blank, the entry is currently unclaimed.
Time RemainingThe time (in seconds) remaining before the sampler is released and
stops sampling. A value of 0 essentiality means the receiver is not
configured. When configuring the sFlow receiver settings, you must
select the Timeout Mode option before you can configure a Timeout
Value.
Maximum Datagram
Size
AddressThe IP address of the sFlow receiver.
PortThe destination UDP port for sFlow datagrams.
Datagram VersionThe version of sFlow datagrams that the sFlow agent should send to
RefreshClick Refresh to update the screen.
EditClick Edit to edit the selected entries.
ClearClick Clear to clear the selected entry.
The maximum number of data bytes that can be sent in a single sample datagram. The receiver should also be set to this value to avoid
fragmentation of the sFlow datagrams.
the sFlow receiver.
Poller
Use the sFlow Poller Configuration page to add, remove, or edit a counter poller
instance on a port (data source). Configuring a poller inst ance allows the sFlow agent
to perform periodic counter sampling on a specified port and efficiently export counters to an sFlow receiver.
To access this page, click System > Advanced Configuration > sFlow > Poller.
Figure 4.43 System > Advanced Configuration > sFlow > Poller
The following table describes the items in the previous figure.
ItemDescription
Poller Data SourceThe sFlowDataSource for this sFlow poller . The sFlow agent su pports
physical ports as sFlow data sources.
EKI-9500 Series User Manual56
ItemDescription
Receiver IndexThe sFlowReceiver for this sFlow counter poller. The specified
Receiver Index must be associated with an active sFlow receiver. If a
receiver expires, all pollers associated with the receiver will also
expire.
Poller IntervalThe maximum nu m be r of seconds between successiv e samples of
the counters associated with this data source. A sampling inte rval of 0
disables counter sampling.
RefreshClick Refresh to update the screen.
AddClick Add to add a new poller data.
EditClick Edit to edit the selected entries.
RemoveClick Remove to remove the selected entries.
To add a new poller data:
Click System > Advanced Configuration > sFlow > Poller > Add.
The following table describes the items in the previous figure.
ItemDescription
Poller Data SourceThe sFlowDataSource for this sFlow poller. The sFlow agent supports
physical ports as sFlow data sources.
Receiver IndexThe sFlowReceiver for this sFlow counter poller. The specified
Receiver Index must be associated with an active sFlow receiver. If a
receiver expires, all pollers associated with the receiver will also
expire.
Poller Interval (Sec-
onds)
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
The maximum number of seconds between successive samples of
the counters associated with this data source. A sampling inte rval of 0
disables counter sampling.
Sampler
Use the sFlow Sampler Configuration page to add, remove, or edit an sFlow sampler
instance on a port (data source). Configuring a sampler instance allows the sFlow
agent to perform statistical packet-based sampling of switched or routed packet
flows. Packet flow sampling creates a steady, but random, stream of sFlow datagrams that are sent to the sFlow receiver.
57EKI-9500 Series User Manual
To access this page, click System > Advanced Configuration > sFlow > Sampler.
Figure 4.45 System > Advanced Configuration > sFlow > Sampler
The following table describes the items in the previous figure.
ItemDescription
Sampler Data Source The sFlowDataSource for this sFlow sampler. The sFlow agent sup-
ports physical ports as sFlow data sources.
Receiver IndexThe sFlowReceiver for this sFlow sampler. The specified Receiver
Index must be associated with an active sFlow receiver. If a receiver
expires, all samplers associated with the receiver will also expire.
Sampling RateThe statistical sampling rate for packet sampling from this source. A
sampling rate of 0 disables sampling.
Maximum Header
Size
RefreshClick Refresh to update the screen.
AddClick Add to add a new sampler data.
EditClick Edit to edit the selected entries.
RemoveClick Remove to remove the selected entries.
The maximum number of bytes that should be copied from a sampled
packet.
To add a new sampler data:
Click System > Advanced Configuration > sFlow > Sampler > Add.
The following table describes the items in the previous figure.
ItemDescription
Sampler Data Source The sFlowDataSource for this sFlow sampler. The sFlow agent sup-
ports physical ports as sFlow data sources.
Receiver IndexThe sFlowReceiver for this sFlow sampler. The specified Receiver
Index must be associated with an active sFlow receiver. If a receiver
expires, all samplers associated with the receiver will also expire.
Sampling RateThe statistical sampling rate for packet sampling from this source. A
sampling rate of 0 disables sampling.
Maximum Header
Size
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
The maximum number of bytes that should be copied from a sampled
packet.
EKI-9500 Series User Manual58
Source Interface Configuration
Use the sFlow Source Interface Configuration page to specify the physical or logical
interface to use as the sFlow client source interface. When an IP address is configured on the source interface, this address is used for all sFlow communications
between the local sFlow client and the remote sFlow server. The IP address of the
designated source interface is used in the IP header of sFlow management protocol
packets. This allows security devices, such as firewalls, to identify all source packets
coming from a specific device.
To access this page, click System > Advanced Configuration > sFlow > Source
The following table describes the items in the previous figure.
ItemDescription
TypeThe type of interface to use as the source interface:
None: The primary IP address of the originating (outbound)
interface is used as the source address.
Interface: The primary IP address of a physical port is used as
the source address.
VLAN: The primary IP address of a VLAN routing interface is
used as the source address.
InterfaceWhen the selected T ype is Interface, select the physic al port to use as
the source interface.
VLAN IDWhen the selected Type is VLAN, select the VLAN to use as the
source interface. The menu contains only the VLAN IDs for VLAN
routing interfaces.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
4.3.2.8 SNMP
Community
Access rights are managed by defining communities on the SNMPv1, 2 Community
page. When the community names are changed, access rights are also changed.
SNMP Communities are defined only for SNMP v1 and SNMP v2.
Use the SNMP Community Configuration page to enable SNMP and Authentication
notifications.
To access this page, click System > Advanced Configuration > SNMP > Commu-
nity.
Figure 4.48 System > Advanced Configuration > SNMP > Community
59EKI-9500 Series User Manual
The following table describes the items in the previous figure.
ItemDescription
Community NameCommunity name used in SNMPv1/v2 packets. This is configured in
the client and identifies the access the user may connect with.
Security NameIdentifies the secur ity en tr y that ass oc i at es co mm unit ies and Groups
for a specific access type.
Group NameIdentifies the group associated with this community entry.
IP AddressSpecifies the IP address that can connect with this community.
RefreshClick Refresh to update the screen.
Add CommunityClick Add Community to add a new SNMP community.
Add Community
Group
RemoveClick Remove to remove the selected entries.
Click Add Community Group to add a new SNMP community group.
To add a new SNMP community:
Click System > Advanced Configuration > SNMP > Community > Add Commu-
nity.
Figure 4.49 System > Advanced Configuration > SNMP > Community > Add
Community
The following table describes the items in the previous figure.
ItemDescription
Community NameCommunity name used in SNMPv1/v2 packets. This is configured in
the client and identifies the access the user may connect with.
Community AccessSpecifies the access control policy for the community.
Community ViewS pecifies the community view for the community. If the value is empty,
then no access is granted.
IP AddressSpecifies the IP address that can connect with this community.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
EKI-9500 Series User Manual60
To add a new SNMP community group:
Click System > Advanced Configuration > SNMP > Community > Add Commu-
nity Group.
Figure 4.50 System > Advanced Configuration > SNMP > Community > Add
Community Group
The following table describes the items in the previous figure.
ItemDescription
Community NameCommunity name used in SNMPv1/v2 packets. This is configured in
the client and identifies the access the user may connect with.
Group NameIdentifies the Group associated with this Community entry.
IP AddressSpecifies the IP address that can connect with this community.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
Trap Receiver v1/v2
Use the SNMP v1/v2 Trap Receivers page to configure settings for each SNMPv1 or
SNMPv2 management host that will receive notifications about traps generated by
the device. The SNMP management host is also known as the SNMP trap receiver.
To access this page, click System > Advanced Configuration > SNMP > Trap
The following table describes the items in the previous figure.
ItemDescription
Host IP AddressThe IP address of the SNMP management host that will receive traps
generated by the device.
Community NameThe name of the SNMP community that includes the SNMP manage-
ment host and the SNMP agent on the device.
Notify TypeThe type of SNMP notification to send the SNMP management host:
Inform: An SNMP message that notifies the host when a certain
event has occurred on the device. The message is acknowledged by the SNMP management host. This type of notification
is not available for SNMPv1.
Trap: An SNMP message that notifies the host when a certain
event has occurred on the device. The message is not acknowledged by the SNMP management host.
SNMP VersionThe version of SNMP to use, which is either SNMPv1 or SNMPv2.
61EKI-9500 Series User Manual
ItemDescription
Timeout ValueThe number of seconds to wait for an acknowledgment from the
SNMP management host before resending an inform message.
RetriesThe numbe r of times to resend an inform message that is not
acknowledged by the SNMP management host.
FilterThe name of the filter for the SNMP management host. The filter is
configured by using the CLI and defines which MIB objects to include
or exclude from the view. This field is optional.
UDP PortThe UDP port on the SNMP management host that will receive the
SNMP notifications. If no value is specified when configuring a
receiver, the default UDP port value is used.
RefreshClick Refresh to update the screen.
AddClick Add to add a new SNMP trap receiver.
RemoveClick Remove to remove the selected entries.
To add a new SNMP trap receiver:
Click System > Advanced Configuration > SNMP > Trap Receiver v1/v2 > Add.
Figure 4.52 System > Advanced Configuration > SNMP > T rap Re ceiver v1/v2 >
Add
The following table describes the items in the previous figure.
ItemDescription
Host IP AddressThe IP address of the SNMP management host that will receive traps
generated by the device.
Community NameThe name of the SNMP community that includes the SNMP manage-
ment host and the SNMP agent on the device.
Notify TypeThe type of SNMP notification to send the SNMP management host:
Inform: An SNMP message that notifies the host when a certain
event has occurred on the device. The message is acknowledged by the SNMP management host. This type of notification
is not available for SNMPv1.
Trap: An SNMP message that notifies the host when a certain
event has occurred on the device. The message is not acknowl-
edged by the SNMP management host.
SNMP VersionThe version of SNMP to use, which is either SNMPv1 or SNMPv2.
RetriesThe numbe r of times to resend an inform message that is not
acknowledged by the SNMP management host.
Timeout Value (Seconds)
The number of seconds to wait for an acknowledgment from the
SNMP management host before resending an inform message.
EKI-9500 Series User Manual62
ItemDescription
FilterThe name of the filter for the SNMP management host. The filter is
configured by using the CLI and defines which MIB objects to include
or exclude from the view. This field is optional.
UDP PortThe UDP port on the SNMP management host that will receive the
SNMP notifications. If no value is specified when configuring a
receiver, the default UDP port value is used.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
Trap Receiver v3
Use the SNMP v3 Trap Receivers page to configure settings for each SNMPv3 management host that will receive notifications about traps generated by the device. The
SNMP management host is also known as the SNMP trap receiver.
To access this page, click System > Advanced Configuration > SNMP > Trap
The following table describes the items in the previous figure.
ItemDescription
Host IP AddressThe IP address of the SNMP management host that will receive traps
generated by the device.
User NameThe name of the SNMP user that is authorized to receive the SNMP
notification.
Notify TypeThe type of SNMP notification to send the SNMP management host:
Trap: An SNMP message that notifies the host when a certain
event has occurred on the device. The message is not acknowledged by the SNMP management host.
Inform: An SNMP message that notifies the host when a certain
event has occurred on the device. The message is acknowledged by the SNMP management host.
Security LevelThe security level associated with the SNMP user, which is one of the
following:
No Auth No Priv: No authentication and no data encryption (no
security).
Auth No Priv: Authentication, but no data encryption. With this
security level, users send SNMP messages that use an MD5
key/password for authen tication, but not a DES key/password
for encryption.
Auth Priv: Authentication and data encryption. With this security
level, users send an MD5 key/password for authentication and a
DES key/password for encryption.
Timeout ValueThe numbe r of second s to wa it for an ack nowle dg m en t fr om the
SNMP receiver before resending an inform message.
RetriesThe number of times to resend an inform message that is not
acknowledged by the SNMP receiver.
FilterThe name of the filter for the SNMP management host. The filter is
configured by using the CLI and defines which MIB objects to include
or exclude from the view. This field is optional.
63EKI-9500 Series User Manual
ItemDescription
UDP PortThe UDP port on the SNMP management host that will receive the
SNMP notifications. If no value is specified when configuring a
receiver, the default UDP port value is used.
RefreshClick Refresh to update the screen.
AddClick Add to add a new SNMP trap receiver.
RemoveClick Remove to remove the selected entries.
To add a new SNMP trap receiver:
Click System > Advanced Configuration > SNMP > Trap Receiver v3 > Add.
The following table describes the items in the previous figure.
ItemDescription
Host IP AddressThe IP address of the SNMP management host that will receive traps
generated by the device.
User NameThe name of the SNMP user that is authorized to receive the SNMP
notification.
Notify TypeThe type of SNMP notification to send the SNMP management host:
Inform: An SNMP message that notifies the host when a certain
event has occurred on the device. The message is acknowledged by the SNMP management host.
Trap: An SNMP message that notifies the host when a certain
event has occurred on the device. The message is not acknowledged by the SNMP management host.
Security LevelThe security level ass ociat ed with the SNMP user, which is one of the
following:
No Auth No Priv: No authentication and no data encryption (no
security).
Auth No Priv: Authentication, but no data encryption. With this
security level, users send SNMP messages that use an MD5
key/password for authentication, but not a DES key/password
for encryption.
Auth Priv: Authentication and data encryption. With this security
level, users send an MD5 key/password for authentication and a
DES key/password for encryption.
RetriesThe numbe r of times to resend an inform message that is not
acknowledged by the SNMP receiver.
EKI-9500 Series User Manual64
ItemDescription
Timeout Value (Seconds)
FilterThe name of the filter for the SNMP management host. The filter is
UDP PortThe UDP port on the SNMP management host that will receive the
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
The number of seconds to wait for an acknowledgm en t fr om the
SNMP receiver before resending an inform message.
configured by using the CLI and defines which MIB objects to include
or exclude from the view. This field is optional.
SNMP notifications. If no value is specified when configuring a
receiver, the default UDP port value is used.
Supported MIBs
The SNMP Supported MIBs page lists the MIBs that the system currently supports.
To access this page, click System > Advanced Configuration > SNMP > Sup-
The following table describes the items in the previous figure.
ItemDescription
NameThe RFC number, if applicable, followed by the defined name of the
MIB.
DescriptionThe RFC title, or a brief description of the MIB.
RefreshClick Refresh to update the screen.
Access Control Group
Use the SNMP Access Control Group page to configure SNMP access control
groups. These SNMP groups allow network managers to assign different levels of
authorization and access rights to specific device features and their attributes. The
SNMP group can be referenced by the SNMP community to provide security and
context for agents receiving requests and initiating traps as well as for management
systems and their tasks. An SNMP agent will not respond to a request from a management system outside of its configured group, but an agent can be a member of
multiple groups at the same time to allow communication with SNMP managers from
different groups. Several default SNMP groups are preconfigured on the system.
65EKI-9500 Series User Manual
To access this page, click System > Advanced Configuration > SNMP > Access
Control Group.
Figure 4.56 System > Advanced Configuration > SNMP > Access Control Group
The following table describes the items in the previous figure.
ItemDescription
Group NameThe name that identifies the SNMP group.
Context NameThe SNMP context associated with the SNMP group and its views. A
user or a management application specifies the context name to get
the performance information from the MIB objects associated with that
context name. The Context EngineID identifies the SNMP entity that
should process the request (the physical router), and the Context
Name tells the agent in which context it should search for the ob jec ts
requested by the user or the management application.
SNMP VersionThe SNMP version associated with the group.
Security LevelThe security level associated with the group, which is one of the fol-
lowing:
No Auth No Priv: No authentication and no data encryption (no
security). This is the only Security Level available for SNMPv1
and SNMPv2 groups.
Auth No Priv: Authentication, but no data encryption. With this
security level, users send SNMP messages that use an MD5
key/password for authentication, but not a DES key/password
for encryption.
Auth Priv: Authentication and data encryption. With this security
level, users send an MD5 key/password for authentication and a
DES key/password for encryption.
ReadThe level of read access rights for the group. The menu includes the
available SNMP views. When adding a group, select the check box to
allow the field to be configured, then select the desired view that
restricts management access to viewing the contents of the agent.
WriteThe level of write access rights for the group. The menu includes the
available SNMP views. When adding a group, select the check box to
allow the field to be configured, then select the desired view that per-
mits management read-write access to the contents of the agent but
not to the community.
NotifyThe level of notify access rights for the group. The menu includes the
available SNMP views. When adding a group, select the check box to
allow the field to be configured, then select the desired view that per-
mits sending SNMP traps or informs.
RefreshClick Refresh to update the screen.
AddClick Add to add a new access control group.
RemoveClick Remove to remove the selected entries.
EKI-9500 Series User Manual66
To add a new access control group:
Click System > Advanced Configuration > SNMP > Access Control Group >
Add.
Figure 4.57 System > Advanced Configuration > SNMP > Access Control Group
> Add
The following table describes the items in the previous figure.
ItemDescription
Access Control Group
Group NameThe name that identifies the SNMP group.
SNMP VersionThe SNMP version associated with the group.
Security LevelThe security level associated with the group, which is one of the fol-
lowing:
No Auth No Priv: No authentication and no data encryption (no
security). This is the only Security Level available for SNMPv1
and SNMPv2 groups.
Auth No Priv: Authentication, but no data encryption. With this
security level, users send SNMP messages that use an MD5
key/password for authen tication, but not a DES key/password
for encryption.
Auth Priv: Authentication and data encryption. With this security
level, users send an MD5 key/password for authentication and a
DES key/password for encryption.
Context NameThe SNMP context associated with the SNMP group and its views. A
user or a management application specifies the context name to get
the performance information from the MIB object s associated with that
context name. The Context EngineID identifies the SNMP entity that
should process the request (the physical router), and the Context
Name tells the agent in which context it should search for the objects
requested by the user or the management application.
Group Access Rights
ReadThe level of read access rights for the group. The menu includes the
available SNMP views. When adding a group, select the check box to
allow the field to be configured, then select the desired view that
restricts management access to viewing the contents of the agent.
67EKI-9500 Series User Manual
ItemDescription
WriteThe level of write access rights for the group. The menu includes the
available SNMP views. When adding a group, select the check box to
allow the field to be configured, then select the desired view that permits management read-write access to the contents of the agent but
not to the community.
NotifyThe level of notify access rights for the group. The menu includes the
available SNMP views. When adding a group, select the check box to
allow the field to be configured, then select the desired view that per-
mits sending SNMP traps or informs.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
User Security Model
The SNMP User Security Model page provides the capability to configure the SNMP
V3 user accounts.
To access this page, click System > Advanced Configuration > SNMP > User
Security Model.
Figure 4.58 System > Advanced Configuration > SNMP > User Security Model
The following table describes the items in the previous figure.
ItemDescription
User NameSpecifies the name of the SNMP user being added for th e User-based
Security Model (USM). Each user name must be unique within the
SNMP agent user list. A user name cannot contain any leading or
embedded blanks.
Group NameA SNMP group is a group to which hosts running the SNMP service
belong. A group name parameter is simply the name of that group by
which SNMP communities are identified. The use of a group name
provides some security and context for agents receiving req uest s and
initiating traps and does the same for management systems and their
tasks. An SNMP agent won't respond to a request from a manage-
ment system outside its configured group, but an agent can be a
member of multiple groups at the same time. This allows for commu-
nications with SNMP managers from different groups.
Engine IDEach SNMPv3 agent has an engine ID that uniquely identifies the
agent in the device. If given this entry will be used only for packets
whose engine id is this. This field takes an hexadecimal string in the
form 0102030405.
AuthenticationSpecifies the authentication protocol to be used on authenticated
messages on behalf of the specified user.
SHA: SHA protocol will be used.
MD5: MD5 protocol will be used.
None: No authentication will be used for this user.
PrivacySpecifies the privacy protocol to be used on encrypted messages on
behalf of the specified user. This parameter is only valid if the Authen-
tication method parameter is not NONE.
DES: DES protocol will be used.
None: No privacy protocol will be used.
EKI-9500 Series User Manual68
ItemDescription
RefreshClick Refresh to update the screen.
AddClick Add to add a new SNMP user.
RemoveClick Remove to remove the selected entries.
To add a new SNMP user:
Click System > Advanced Configuration > SNMP > User Security Model > Add.
Figure 4.59 System > Advanced Configuration > SNMP > User Security Model >
Add
The following table describes the items in the previous figure.
ItemDescription
Engine ID TypeSpecifies the engine ID type to be used.
Local
Remote
Engine IDEach SNMPv3 agent has an engine ID that uniquely identifies the
agent in the device. If given this entry will be used only for packets
whose engine id is this. This field takes an hexadecimal string in the
form 0102030405.
User NameSpecifies the name of the SNMP user being added for the User-based
Security Model (USM). Each user name must be unique within the
SNMP agent user list. A user name cannot contain any leading or
embedded blanks.
Group NameA SNMP group is a group to which hosts running the SNMP service
belong. A group name parameter is simply the name of that group by
which SNMP communities are identified. The use of a group name
provides some security and context for agents receivin g request s and
initiating traps and does the same for management systems and thei r
tasks. An SNMP agent won't respond to a request from a management system outside its configured group, but an agent can be a
member of multiple groups at the same time. This allows for communications with SNMP managers from different groups.
Authentication
Method
Specifies the authentication protocol to be used on authenticated
messages on behalf of the specified user.
SHA: SHA protocol will be used.
MD5: MD5 protocol will be used.
None: No authentication will be used for this user.
PasswordSpecifies the password used to generate the key to be used in
authenticating messages on behalf of this user. This parame ter must
be specified if the Authentication method parameter is not NONE.
69EKI-9500 Series User Manual
ItemDescription
PrivacySpecifies the privacy protocol to be used on encrypted messages on
behalf of the specified user. This parameter is only valid if the Authen-
tication method parameter is not NONE.
DES: DES protocol will be used.
None: No privacy protocol will be used.
Authentication KeySpecifies the password used to generate the key to be used in
encrypting messages to and from this user. This parameter must be
specified if the Privacy parameter is not NONE.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
Source Interface Configuration
Use the SNMP Trap Source Interface Configuration page to specify the physical or
logical interface to use as the SNMP client source interface. When an IP address is
configured on the source interface, this address is used for all SNMP communications between the local SNMP client and the remote SNMP server. The IP address of
the designated source interface is used in the IP header of SNMP management protocol packets. This allows security devices, such as firewalls, to identify all source
packets coming from a specific device.
To access this page, click System > Advanced Configuration > SNMP > Source
The following table describes the items in the previous figure.
ItemDescription
TypeThe type of interface to use as the source interface:
None: The primary IP address of the originating (outbound)
interface is used as the source address.
Interface: The primary IP address of a physical port is used as
the source address.
VLAN: The primary IP address of a VLAN routing interface is
used as the source address.
InterfaceWhen the selected Type is Interface, select the physica l port to use as
the source interface.
VLAN IDWhen the selected Type is VLAN, select the VLAN to use as the
source interface. The menu contains only the VLAN IDs for VLAN
routing interfaces.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
Server Configuration
Use the SNMP Server Configuration page to view and modify the SNMP Server settings on the device. A user having sufficient privilege level may change the values
shown on this page.
EKI-9500 Series User Manual70
To access this page, click System > Advanced Configuration > SNMP > Server
Configuration.
Figure 4.61 System > Advanced Configuration > SNMP > Server Configuration
The following table describes the items in the previous figure.
ItemDescription
SNMP Server PortThe UDP port number on which the SNMP server listens for request s.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
4.3.2.9 SNTP
Global Configuration
Use the SNTP Global Configuration page to view and adjust SNTP parameters.
To access this page, click System > Advanced Configuration > SNTP > Global
Configuration.
Changing this value may cause existing SNMP transactions to cease
communicating with the device until the client applications are reconfigured to use the new port number.
Figure 4.62 System > Advanced Configuration > SNTP > Global Configuration
The following table describes the items in the previous figure.
ItemDescription
Client ModeSpecifies the mode of operation of SNTP Client. An SNTP client may
operate in one of the following modes:
Disable: SNTP is not operational. No SNTP requests are sent
from the client nor are any received SNTP messages processed.
Unicast: SNTP operates in a point-to-point fashion. A unicast cli-
ent sends a request to a designated serv er at its unicast addre ss
and expects a reply from which it can determine the time and,
optionally the round-trip delay and local clock offset relative to
the server.
Broadcast: SNTP operates in the same manner as multicast
mode but uses a local broadcast address instead of a multicast
address. The broadcast address has a single subnet scope
while a multicast address has Internet wide scope.
PortSpecifies the local UDP port to listen for responses/broadcasts.
Unicast Poll Interval
(Seconds)
Broadcast Poll Inter-
val (Seconds)
Specifies the interval, in seconds, between unicast poll requests
expressed as a power of two when configured in unicast mode.
Specifies the interval, in seconds, between broadcast poll requests
expressed as a power of two when configured in broadcast mode.
Broadcasts received prior to the expiry of this interval are discarded.
71EKI-9500 Series User Manual
ItemDescription
Unicast Poll Timeout
(Seconds)
Unicast Poll RetrySpecifies the number of times to retry a request to an SNTP server
Number of Servers
Configured
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
Specifies the timeout value, in seconds, to wait for an SNTP response
when configured in unicast mode.
after the first time-out before attempting to use the next configured
server when configured in unicast mode.
Specifies th e number of current valid unicast server e ntries configured
for this client.
Global Status
Use the SNTP Global Status page to view information about the system's SNTP client.
To access this page, click System > Advanced Configuration > SNTP > Global
Status.
Figure 4.63 System > Advanced Configuration > SNTP > Global Status
The following table describes the items in the previous figure.
ItemDescription
VersionSpecifies the SNTP version the client supports.
Supported ModeSpecifies the SNTP modes the client supports. A single client can
support multiple modes.
Last Update TimeSpecifies the local date and time (UTC) when the SNTP client last
updated the system clock.
Last Attempt TimeSpecifies the local date and time (UTC) of the last SNTP request or
receipt of an unsolicited message.
EKI-9500 Series User Manual72
ItemDescription
Last Attempt StatusSpecifies the status of the last SNTP request or unsolicited message
for both unicast and broadcast modes. If no message has been
received from a server, a status of Other is displayed. These values
are appropriate for all operational modes.
Other: None of the following values apply, or no message has
been received.
Success: The SNTP operation was successful, and the system
time was updated.
Request Timed Out: A directed SNTP request timed out without
receiving a response from the SNTP server.
Bad Date Encoded: The time provided by the SNTP se rver is not
valid.
Version Not Supported: The SNTP version supported by the
server is not compatible with the version supported by the client.
Server Unsynchronized: The SNTP server is not synchronized
with its peers. This is indicated via the leap indicator field on the
SNTP message.
Server Kiss Of Death: The SNTP server indicated that no further
queries were to be sent to this server . This is indicated by a stra-
tum field equal to 0 in a message received from a serv er.
Server IP AddressSpecifies the IP address or hostname of the server for the last
received valid packet. If no message has been received from any
server, an empty string is shown.
Address TypeSpecifies the address type (IP address or DNS hostname) of the
SNTP server for the last received valid packet.
Server StratumSpecifies the claimed stratum of the server for the last received valid
packet. Stratums define the accuracy of the reference clock. The
higher the stratum (where zero is the highest), the more accurate the
clock.
Reference Clock IDSpecifies the reference clock identifier of the server for the last
received valid packet.
Server ModeSpecifies the mode of the server for the last received valid packet.
Unicast Server Max
Entries
Unicast Server Cur-
rent Entries
Broadcast CountSpecifies the number of unsolicited broadcast SNTP messages that
RefreshClick Refresh to update the screen.
Specifies the maximum number of unicast server entries that can be
configured on this client.
Specifies the number o f current valid unicast server entries configure d
for this client.
have been received and processed by the SNTP client since the last
reboot.
Server Configuration
Use the SNTP Server Configuration page to view and modify information for adding
and modifying Simple Network Time Protocol SNTP servers.
To access this page, click System > Advanced Configuration > SNTP > Server
Configuration.
Figure 4.64 System > Advanced Configuration > SNTP > Server Configuration
73EKI-9500 Series User Manual
The following table describes the items in the previous figure.
ItemDescription
SNTP ServerThe address or host name of an SNTP server the device can use to
synchronize the system time.
TypeThe configured SNTP server address type, which can be IPv4, IPv6,
or DNS.
PortThe UDP port on the server to which SNTP requests are sent.
PriorityThe order in which to query the servers. The SNTP client on the
device continues sending SNTP requests to different servers until a
successful response is received or all servers are exhausted. A server
entry with a lower priority value is queried before one with a hi gher pri-
ority. If more than one server has the same priority, the SNTP client
contacts the servers in the order that they appear in the table.
VersionSpecifies the NTP version running on the server.
RefreshClick Refresh to update the screen.
AddClick Add to add a new SNTP server.
EditClick Edit to edit the selected entries.
RemoveClick Remove to remove the selected entries.
To add a new SNTP server:
Click System > Advanced Configuration > SNTP > Server Configuration > Add.
Figure 4.65 System > Advanced Configuration > SNTP > Server Configuration >
Add
The following table describes the items in the previous figure.
ItemDescription
Host Name or IP
Address
PortThe UDP port on the server to which SNTP requests are sent.
PriorityThe order in which to query the servers. The SNTP client on the
VersionSpecifies the NTP version running on the server.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
Specify the IPv4 addr ess, IPv6 address, or DNS-resolvable host
name of the SNTP server. Unicast SNTP requests will be sent to this
address. The address you enter is displayed in the SNTP Server field
on the main page. The address type is automatically detected.
device continues sending SNTP requests to different servers until a
successful response is received or all servers are exhausted. A server
entry with a lower priority value is queried before one with a hi gher pri-
ority. If more than one server has the same priority, the SNTP client
contacts the servers in the order that they appear in the table.
Server Status
EKI-9500 Series User Manual74
The SNTP Server Status page displays status information about the SNTP servers
configured on your switch.
To access this page, click System > Advanced Configuration > SNTP > Server
Status.
Figure 4.66 System > Advanced Configuration > SNTP > Server Status
The following table describes the items in the previous figure.
ItemDescription
AddressThe hostname or IP address for each SNTP server that has been con-
figured.
Last Update TimeThe local date and time (UTC) included in the response from this
server that was used to update the system clock.
Last Attempt TimeSpecifies the local date and time (UTC) tha t this SNTP server was last
queried.
Last Attempt StatusSpecifies the status of the last SNTP request to this server. If no
packet has been received from this server, a status of Other is displayed.
Other: None of the following values apply, or no message has
been received.
Success: The SNTP operation was successful, and the system
time was updated.
Request Timed Out: A directed SNTP request timed out without
receiving a response from the SNTP server.
Bad Date Encoded: The time provided by the SNTP se rver is not
valid.
Version Not Supported: The SNTP version supported by the
server is not compatible with the version supported by the client.
Server Unsynchronized: The SNTP server is not synchronized
with its peers. This is indicated via the leap indicator field on the
SNTP message.
Server Kiss Of Death: The SNTP server indicated that no further
queries were to be sent to this server . This is indicated by a stratum field equal to 0 in a message received from a serv er.
RequestsSpecifies the numbe r of SNTP requests made to this server since the
system was last reset.
Failed RequestsSpecifies the number of failed SNTP requests made to this server
since the system was last reset.
RefreshClick Refresh to update the screen.
Source Interface Configuration
Use the SNTP Source Interface Configuration page to specify the physical or logical
interface to use as the SNTP client source interface. When an IP address is configured on the source interface, this address is used for all SNTP communications
between the local SNTP client and the remote SNTP server. The IP address of the
designated source interface is used in the IP header of SNTP management protocol
packets. This allows security devices, such as firewalls, to identify all source packets
coming from a specific device.
75EKI-9500 Series User Manual
To access this page, click System > Advanced Configuration > SNTP > Source
The following table describes the items in the previous figure.
ItemDescription
TypeThe type of interface to use as the source interface:
None: The primary IP address of the originating (outbound)
interface is used as the source address.
Interface: The primary IP address of a physical port is used as
the source address.
VLAN: The primary IP address of a VLAN routing interface is
used as the source address.
InterfaceWhen the selected Type is Interface, select the physica l port to use as
the source interface.
VLAN IDWhen the selected Type is VLAN, select the VLAN to use as the
source interface. The menu contains only the VLAN IDs for VLAN
routing interfaces.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
CancelClick Cancel to restore default value.
4.3.2.10 Time Ranges
You can use these pages to configure time ranges to use in time-based access control list (ACL) rules. Time- based ACLs allow one or more rules within an ACL to be
based on a periodic or absolute time. Each ACL rule within an ACL except for the
implicit deny all rule can be configured to be active and operational only during a specific time period. The time range pages allow you to define specific times of the day
and week in order to implement time-based ACLs. The time range is identified by a
name and can then be referenced by an ACL rule defined with in an ACL.
Configuration
Use the Time Range Summary page to create a named time range. Each time range
can consist of one absolute time entry and/or one or more periodic time entries.
To access this page, click System > Advanced Configuration > Time Ranges >
Configuration.
Figure 4.68 System > Advanced Configuration > Time Ranges > Configuration
EKI-9500 Series User Manual76
The following table describes the items in the previous figure.
ItemDescription
Admin ModeEnables or disables the Time Range administrative mode. When
enabled, actions with subscribed components are performed for existing time range entries.
Time Range NameThe unique ID or name that identifies this time range. A time-based
ACL rule can reference the name configured in this field.
Time Range StatusShows whether the time range is Active or Inactive. A time range is
Inactive if the current day and time do not fall within any time range
entries configured for the time range.
Periodic Entry Count The number of periodic time range entries currently configured for the
time range.
Absolute EntryShows whether an absolute time entry is currently configured for the
time range.
SubmitClick Submit to save the values and update the screen.
RefreshClick Refresh to update the screen.
AddClick Add to add a new time range.
RemoveClick Remove to remove the selected entries.
To add a new authentication list:
Click System > Advanced Configuration > Time Ranges > Configuration > Add.
Figure 4.69 System > Advanced Configuration > Time Ranges > Configuration
> Add
The following table describes the items in the previous figure.
ItemDescription
Time Range NameThe unique ID or name that identifies this time range. A time-based
ACL rule can reference the name configured in this field.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
Entry Configuration
Use the Time Range Entry Summary page to configure entries in an existing time
range configuration. Each time range configuration can have multiple Periodic entries
but only one Absolute entry . A Periodic entry occu rs at the same time every day or on
one or more days of the week. An Absolute entry does not repeat. The start and end
times for entries are based on a 24-hour clock. For example, 6:00 PM is 18:00.
Note!The time range entries use the system time for the time periods in which
they take effect. Make sure you configure the SNTP server settings so
that the SNTP client on the switch can obtain the correct date and time
from the server.
77EKI-9500 Series User Manual
To access this page, click System > Advanced Configuration > Time Ranges >
Entry Configuration.
Figure 4.70 System > Advanced Configuration > Time Ranges > Entry
Configuration
The following table describes the items in the previous figure.
ItemDescription
Time Range NameClick the drop-down menu to select a time range.
Entry TypeThe type of time range entry, which is one of the following:
Absolute: Occurs once or has an undefined start or end period.
The duration of an Absolute entry can be hours, days, or even
years. Each time entry configuration can have only one Absolu te
entry.
Periodic: Recurring entry that takes place at fixed intervals. This
type of entry occurs at the same time on one or more days of the
week.
StartsFor an Absolute entry, indicates the time, day, month, and year that
the entry begins. If this field is blank, the Absolute entry became
active when it was configured. For a Periodic entry, indicates the time
and day(s) of the week that the entry begins.
EndsFor an Absolute entry, indicates the time, day, month, and year that
the entry ends. If this field is blank, the Absolute entry does not have a
defined end. For a Periodic entry, indicates the time and day(s) of the
week that the entry ends.
RefreshClick Refresh to update the screen.
Add AbsoluteClick Add Absolute to add a new absolute time range.
Add PeriodicClick Add Periodic to add a new periodic time range.
RemoveClick Remove to remove the selected entries.
To add a new absolute time range:
Click System > Advanced Configuration > Time Ranges > Entry Configuration >
Add Absolute.
Figure 4.71 System > Advanced Configuration > Time Ranges > Entry
Configuration > Add Absolute
EKI-9500 Series User Manual78
The following table describes the items in the previous figure.
ItemDescription
Time Range NameThe time range configuration that will include the Absolute time range
entry.
Start TimeSelect this option to configure values for the Start Date and the Start-
ing Time of Day. If this option is not selected, the entry becomes
active immediately.
Start DateClick the calendar icon to select the day, month, and year when this
entry becomes active. This field can be configured only if the Start
Time option is selected.
Starting Time of Day Specify the time of day that the entry becomes active by entering the
information in the field or by using the scroll bar in the Choose Ti me
window. Click Now to use the current time of day. Click Done to close
the Choose Time window. This field can be configured only if the St art
Time option is selected.
End TimeSelect this option to configure values for the End Date and the Ending
Time of Day. If this option is not selected, the entry does not have an
end time; after the configured Start Time begins, the entry will remain
active indefinitely.
End DateClick the calendar icon to select the day, month, and year when this
entry should no longer be active. This field can be configured only if
the End Time option is selected.
Ending Time of DaySpecify the time of day that the entry becomes ina ctive by entering the
information in the field or by using the scroll bar in the Choose Ti me
window. Click Now to use the curr ent time of day. Click Done to close
the Choose Time window. This field can be configured only if the End
Time option is selected.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
To add a new periodic time range:
Click System > Advanced Configuration > Time Ranges > Entry Configuration >
Add Periodic.
Figure 4.72 System > Advanced Configuration > Time Ranges > Entry
Configuration > Add Periodic
79EKI-9500 Series User Manual
The following table describes the items in the previous figure.
ItemDescription
Time Range NameThe time range configuration that will include the Periodic time range
entry.
Applicable DaysSelect the days on which the Periodic time range entry is active:
Daily: Every day of the week
Weekdays: Monday through Friday
Weekend: Saturday and Sunday
Days of Week: User-defined start days
Star t DaysIndicates on which days the time entry becomes active. If the selected
option in the Applicable Days field is Days of Week, select one or
more days on which the entry becomes active. To select multiple
days, hold the CTRL key and select each desired start day.
Starting Time of Day Specify the time of day that the entry becomes active by entering the
information in the field or by using the scroll bar in the Choose Time
window. Click Now to use the current time of day. Click Done to close
the Choose Time window.
End DaysIndicates on which days the time entry ends. If the selected option in
the Applicable Days field is Days of Week, select one or more days on
which the entry ends. To select multiple days, hold the CTRL key and
select each desired end day.
Ending Time of DaySpecify the time of day that th e entry becomes inactive by entering the
information in the field or by using the scroll bar in the Choose Time
window. Click Now to use the current time of day. Click Done to close
the Choose Time window.
SubmitClick Submit to save the values.
CancelClick Cancel to close the window.
4.3.2.11 Time Zone
Summary
The Time Zone Summary page displays information about the current system time,
the time zone, and the daylight saving time (also known as summer time) settings
configured on the device.
To access this page, click System > Advanced Configuration > Time Zone > Sum-
mary.
Figure 4.73 System > Advanced Configuration > Time Zone > Summary
EKI-9500 Series User Manual80
The following table describes the items in the previous figure.
ItemDescription
Current Time
TimeThe current time on the system clock. This time is used to provide
time stamps on log messages. Additionally, some CLI show com-
mands include the time in the command output.
ZoneThe acronym that represents the time zone.
DateThe current date on the system.
Time SourceThe time source from which the time update is taken:
SNTP: The time has been acquired from an SNTP server.
No Time Source: The time has either been manually configured
or not configured at all.
Time Zone
ZoneThe acronym that represents the time zone.
OffsetThe number of hours offset from Coordinated Universal Time (UTC),
which is also known as Greenwich Mean Time (GMT).
Summer Time
Summer TimeThe summer time mode on the system:
Disable: Summer time is not active, and the time does not shift
based on the time of year.
Recurring: Summer time occurs at the same time every year.
The start and end times and dates for the time shift must be
manually configured.
EU: The system clock uses the standard recurring summer time
settings used in countries in the European Union. When this
field is selected, the rest of the applicable fields on the page
except Offset and Zone are automatically populated and cannot
be edited.
USA: The system clock uses the standard recurring daylight
saving time settings used in the United S t ates. When this field is
selected, the rest of the applicable fields on the page except Offset and Zone are automatically populated and cannot be edited.
Non-Recurring: Summer time settings are in ef fect only between
the start date and end date of the specified year. When this
mode is selected, the summer time settings do not repeat o n a n
annual basis.
ZoneThe acronym that represents the time zone of the summer time.
OffsetThe number of hours offset from Coordinated Universal Time (UTC),
which is also known as Greenwich Mean Time (GMT).
StatusIndicates if summer time is currently active.
RefreshClick Refresh to update the screen.
Time Zone
Use the Time Zone Configuration page to manually configure the system clock settings. The SNTP client must be disabled to allow manual configuration of the system
time and date.
81EKI-9500 Series User Manual
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.