Advantech EKI-9228G-8CMI User manual

Category
Software
Type
User manual

This manual is also suitable for

User Manual
EKI-9228G Series
16xRJ45 + 4xSFP + 8xCombo Port
Full Gigabit L2 Managed Switch
EKI-9228G Series User Manual ii
Copyright
The documentation and the software included with this product are copyrighted 2016
by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right
to make improvements in the products described in this manual at any time without
notice. No part of this manual may be reproduced, copied, translated or transmitted
in any form or by any means without the prior written permission of Advantech Co.,
Ltd. Information provided in this manual is intended to be accurate and reliable. How-
ever, Advantech Co., Ltd. assumes no responsibility for its use, nor for any infringe-
ments of the rights of third parties, which may result from its use.
Acknowledgements
Intel and Pentium are trademarks of Intel Corporation.
Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corp.
All other product names or trademarks are properties of their respective owners.
Product Warranty (5 years)
Advantech warrants to you, the original purchaser, that each of its products will be
free from defects in materials and workmanship for five years from the date of pur-
chase.
This warranty does not apply to any products which have been repaired or altered by
persons other than repair personnel authorized by Advantech, or which have been
subject to misuse, abuse, accident or improper installation. Advantech assumes no
liability under the terms of this warranty as a consequence of such events.
Because of Advantech’s high quality-control standards and rigorous testing, most of
our customers never need to use our repair service. If an Advantech product is defec-
tive, it will be repaired or replaced at no charge during the warranty period. For out of-
warranty repairs, you will be billed according to the cost of replacement materials,
service time and freight. Please consult your dealer for more details.
If you think you have a defective product, follow these steps:
1. Collect all the information about the problem encountered. (For example, CPU
speed, Advantech products used, other hardware and software used, etc.) Note
anything abnormal and list any on screen messages you get when the problem
occurs.
2. Call your dealer and describe the problem. Please have your manual, product,
and any helpful information readily available.
3. If your product is diagnosed as defective, obtain an RMA (return merchandize
authorization) number from your dealer. This allows us to process your return
more quickly.
4. Carefully pack the defective product, a fully-completed Repair and Replacement
Order Card and a photocopy proof of purchase date (such as your sales receipt)
in a shippable container. A product returned without proof of the purchase date
is not eligible for warranty service.
5. Write the RMA number visibly on the outside of the package and ship it prepaid
to your dealer.
Part No. XXXXXXXXXX Edition 1
Printed in Taiwan September 2016
iii EKI-9228G Series User Manual
Declaration of Conformity
CE
This product has passed the CE test for environmental specifications when shielded
cables are used for external wiring. We recommend the use of shielded cables. This
kind of cable is available from Advantech. Please contact your local supplier for
ordering information.
This product has passed the CE test for environmental specifications. Test conditions
for passing included the equipment being operated within an industrial enclosure. In
order to protect the product from being damaged by ESD (Electrostatic Discharge)
and EMI leakage, we strongly recommend the use of CE-compliant industrial enclo-
sure products.
FCC Class A
Note: This equipment has been tested and found to comply with the limits for a Class
A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can
radiate radio frequency energy and, if not installed and used in accordance with the
instruction manual, may cause harmful interference to radio communications. Opera-
tion of this equipment in a residential area is likely to cause harmful interference in
which case the user will be required to correct the interference at his own expense.
FCC Class B
Note: This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential installa-
tion. This equipment generates, uses and can radiate radio frequency energy and, if
not installed and used in accordance with the instructions, may cause harmful inter-
ference to radio communications. However, there is no guarantee that interference
will not occur in a particular installation. If this equipment does cause harmful interfer-
ence to radio or television reception, which can be determined by turning the equip-
ment off and on, the user is encouraged to try to correct the interference by one or
more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
FM
This equipment has passed the FM certification. According to the National Fire Pro-
tection Association, work sites are classified into different classes, divisions and
groups, based on hazard considerations. This equipment is compliant with the speci-
fications of Class I, Division 2, Groups A, B, C and D indoor hazards.
EKI-9228G Series User Manual iv
Technical Support and Assistance
1. Visit the Advantech web site at www.advantech.com/support where you can find
the latest information about the product.
2. Contact your distributor, sales representative, or Advantech's customer service
center for technical support if you need additional assistance. Please have the
following information ready before you call:
Product name and serial number
Description of your peripheral attachments
Description of your software (operating system, version, application software,
etc.)
A complete description of the problem
The exact wording of any error messages
Warnings, Cautions and Notes
Document Feedback
To assist us in making improvements to this manual, we would welcome comments
and constructive criticism. Please send all such - in writing to: support@advan-
tech.com
Packing List
Before setting up the system, check that the items listed below are included and in
good condition. If any item does not accord with the table, please contact your dealer
immediately.
1 x Full Managed Ethernet Switch
3 x Terminal Blocks
1 x Startup Manual
Warning! Warnings indicate conditions, which if not observed, can cause personal
injury!
Caution! Cautions are included to help you avoid damaging hardware or losing
data. e.g.
There is a danger of a new battery exploding if it is incorrectly installed.
Do not attempt to recharge, force open, or heat the battery. Replace the
battery only with the same or equivalent type recommended by the man-
ufacturer. Discard used batteries according to the manufacturer's
instructions.
Note! Notes provide optional additional information.
v EKI-9228G Series User Manual
Safety Instructions
1. Read these safety instructions carefully.
2. Keep this User Manual for later reference.
3. Disconnect this equipment from any AC outlet before cleaning. Use a damp
cloth. Do not use liquid or spray detergents for cleaning.
4. For plug-in equipment, the power outlet socket must be located near the equip-
ment and must be easily accessible.
5. Keep this equipment away from humidity.
6. Put this equipment on a reliable surface during installation. Dropping it or letting
it fall may cause damage.
7. The openings on the enclosure are for air convection. Protect the equipment
from overheating. DO NOT COVER THE OPENINGS.
8. Make sure the voltage of the power source is correct before connecting the
equipment to the power outlet.
9. Position the power cord so that people cannot step on it. Do not place anything
over the power cord.
10. All cautions and warnings on the equipment should be noted.
11. If the equipment is not used for a long time, disconnect it from the power source
to avoid damage by transient overvoltage.
12. Never pour any liquid into an opening. This may cause fire or electrical shock.
13. Never open the equipment. For safety reasons, the equipment should be
opened only by qualified service personnel.
14. If one of the following situations arises, get the equipment checked by service
personnel:
15. The power cord or plug is damaged.
16. Liquid has penetrated into the equipment.
17. The equipment has been exposed to moisture.
18. The equipment does not work well, or you cannot get it to work according to the
user's manual.
19. The equipment has been dropped and damaged.
20. The equipment has obvious signs of breakage.
21. DO NOT LEAVE THIS EQUIPMENT IN AN ENVIRONMENT WHERE THE
STORAGE TEMPERATURE MAY GO BELOW -20° C (-4° F) OR ABOVE 60° C
(140° F). THIS COULD DAMAGE THE EQUIPMENT. THE EQUIPMENT
SHOULD BE IN A CONTROLLED ENVIRONMENT.
22. CAUTION: DANGER OF EXPLOSION IF BATTERY IS INCORRECTLY
REPLACED. REPLACE ONLY WITH THE SAME OR EQUIVALENT TYPE
RECOMMENDED BY THE MANUFACTURER, DISCARD USED BATTERIES
ACCORDING TO THE MANUFACTURER'S INSTRUCTIONS.
23. The sound pressure level at the operator's position according to IEC 704-1:1982
is no more than 70 dB (A).
DISCLAIMER: This set of instructions is given according to IEC 704-1. Advantech
disclaims all responsibility for the accuracy of any statements contained herein.
EKI-9228G Series User Manual vi
Wichtige Sicherheishinweise
1. Bitte lesen sie Sich diese Hinweise sorgfältig durch.
2. Heben Sie diese Anleitung für den späteren Gebrauch auf.
3. Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie
Keine Flüssig-oder Aerosolreiniger. Am besten dient ein angefeuchtetes Tuch
zur Reinigung.
4. Die NetzanschluBsteckdose soll nahe dem Gerät angebracht und leicht zugän-
glich sein.
5. Das Gerät ist vor Feuchtigkeit zu schützen.
6. Bei der Aufstellung des Gerätes ist auf sicheren Stand zu achten. Ein Kippen
oder Fallen könnte Verletzungen hervorrufen.
7. Die Belüftungsöffnungen dienen zur Luftzirkulation die das Gerät vor überhit-
zung schützt. Sorgen Sie dafür, daB diese Öffnungen nicht abgedeckt werden.
8. Beachten Sie beim. AnschluB an das Stromnetz die AnschluBwerte.
9. Verlegen Sie die NetzanschluBleitung so, daB niemand darüber fallen kann. Es
sollte auch nichts auf der Leitung abgestellt werden.
10. Alle Hinweise und Warnungen die sich am Geräten befinden sind zu beachten.
11. Wird das Gerät über einen längeren Zeitraum nicht benutzt, sollten Sie es vom
Stromnetz trennen. Somit wird im Falle einer Überspannung eine Beschädigung
vermieden.
12. Durch die Lüftungsöffnungen dürfen niemals Gegenstände oder Flüssigkeiten in
das Gerät gelangen. Dies könnte einen Brand bzw. elektrischen Schlag aus-
lösen.
13. Öffnen Sie niemals das Gerät. Das Gerät darf aus Gründen der elektrischen
Sicherheit nur von authorisiertem Servicepersonal geöffnet werden.
14. Wenn folgende Situationen auftreten ist das Gerät vom Stromnetz zu trennen
und von einer qualifizierten Servicestelle zu überprüfen:
15. Netzkabel oder Netzstecker sind beschädigt.
16. Flüssigkeit ist in das Gerät eingedrungen.
17. Das Gerät war Feuchtigkeit ausgesetzt.
18. Wenn das Gerät nicht der Bedienungsanleitung entsprechend funktioniert oder
Sie mit Hilfe dieser Anleitung keine Verbesserung erzielen.
19. Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt.
20. Wenn das Gerät deutliche Anzeichen eines Defektes aufweist.
21. VOSICHT: Explisionsgefahr bei unsachgemaben Austausch der Batterie.Ersatz
nur durch densellben order einem vom Hersteller empfohlene-mahnlichen Typ.
Entsorgung gebrauchter Batterien navh Angaben des Herstellers.
22. ACHTUNG: Es besteht die Explosionsgefahr, falls die Batterie auf nicht fach-
männische Weise gewechselt wird. Verfangen Sie die Batterie nur gleicher oder
entsprechender Type, wie vom Hersteller empfohlen. Entsorgen Sie Batterien
nach Anweisung des Herstellers.
23. Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt
70dB(A) oder weiger.
Haftungsausschluss: Die Bedienungsanleitungen wurden entsprechend der IEC-
704-1 erstellt. Advantech lehnt jegliche Verantwortung für die Richtigkeit der in die-
sem Zusammenhang getätigten Aussagen ab.
vii EKI-9228G Series User Manual
Safety Precaution - Static Electricity
Follow these simple precautions to protect yourself from harm and the products from
damage.
To avoid electrical shock, always disconnect the power from your PC chassis
before you work on it. Don't touch any components on the CPU card or other
cards while the PC is on.
Disconnect power before making any configuration changes. The sudden rush
of power as you connect a jumper or install a card may damage sensitive elec-
tronic components.
EKI-9228G Series User Manual viii
Contents
Chapter 1 Product Overview ...............................1
1.1 Supported Models..................................................................................... 2
1.2 Specifications............................................................................................ 2
1.3 Hardware Views........................................................................................ 3
1.3.1 Front View..................................................................................... 3
Figure 1.1 Front View................................................................ 3
1.3.2 Rear View..................................................................................... 3
Figure 1.2 Front View................................................................ 3
Figure 1.3 System LED Panel................................................... 4
Chapter 2 Switch Installation ..............................5
2.1 Warnings................................................................................................... 6
2.2 Installation Guidelines............................................................................... 8
2.3 Environment and Enclosure Guidelines.................................................... 9
2.3.1 Connecting Hardware................................................................... 9
2.4 Verifying Switch Operation........................................................................ 9
2.5 Installing the Switch................................................................................ 10
2.5.1 Rack-Mounting............................................................................ 10
Figure 2.1 Installing the Rack Mount Brackets........................ 10
Figure 2.2 Installing the Switch................................................ 10
2.6 Installing and Removing SFP Modules................................................... 10
2.6.1 Installing SFP Modules............................................................... 11
Figure 2.3 Removing the Dust Plug from an SFP Slot............ 11
Figure 2.4 Installing an SFP Transceiver ................................ 11
Figure 2.5 Attaching a Fiber Optic Cable to a Transceiver...... 12
2.6.2 Removing SFP Modules............................................................. 12
Figure 2.6 Removing a Fiber Optic Cable to a Transceiver .... 12
Figure 2.7 Removing an SFP Transceiver .............................. 12
2.7 Connecting the Switch to Ethernet Ports................................................ 13
2.7.1 RJ45 Ethernet Cable Wiring....................................................... 13
Figure 2.8 Ethernet Plug & Connector Pin Position................. 13
2.8 Connecting the Switch to Console Port .................................................. 13
Figure 2.9 Serial Console Cable.............................................. 13
Figure 2.10 DB 9 Pin Position ................................................... 13
Figure 2.11 Pin Assignment ...................................................... 14
2.9 Power Supply Installation........................................................................ 14
2.9.1 Overview..................................................................................... 14
Figure 2.12 Power Wiring for EKI-9228G Series....................... 15
2.9.2 Considerations............................................................................ 15
2.9.3 Grounding the Device................................................................. 15
2.9.4 Wiring a Relay Contact............................................................... 16
Figure 2.13 Terminal Receptor: Relay Contact......................... 16
2.9.5 Wiring the Power Inputs.............................................................. 16
Figure 2.14 Terminal Receptor: Power Input Contacts ............. 17
Figure 2.15 Installing DC Wires in a Terminal Block................. 17
2.10 Reset Button........................................................................................... 17
Chapter 3 Configuration Utility .........................18
3.1 First Time Setup...................................................................................... 19
3.1.1 Overview..................................................................................... 19
3.1.2 Introduction................................................................................. 19
ix EKI-9228G Series User Manual
3.1.3 Administrative Interface Access..................................................19
3.1.4 Using the Graphical (Web) Interface...........................................20
3.1.5 Configuring the Switch for Network Access................................20
3.1.6 Configuring the Ethernet Ports....................................................21
3.2 Command Line Interface Configuration ..................................................21
3.2.1 Introduction to Command-Line Interface (CLI)............................21
3.2.2 Accessing the CLI.......................................................................22
3.3 Web Browser Configuration ....................................................................22
3.3.1 Preparing for Web Configuration ................................................22
3.3.2 System Login..............................................................................22
Chapter 4 Managing Switch ...............................23
4.1 Log In......................................................................................................24
Figure 4.1 Login Screen ..........................................................24
4.2 Recommended Practices........................................................................24
4.2.1 Changing Default Password .......................................................24
Figure 4.2 System > Users > Accounts...................................24
Figure 4.3 Changing a Default Password................................25
4.3 System ....................................................................................................25
4.3.1 AAA.............................................................................................25
Figure 4.4 System > AAA > Authentication List.......................25
Figure 4.5 System > AAA > Authentication List > Add ............27
Figure 4.6 System > AAA > Authentication Selection..............27
Figure 4.7 System > AAA > Accounting List............................28
Figure 4.8 System > AAA > Accounting List > Add .................29
Figure 4.9 System > AAA > Accounting Selection...................30
4.3.2 Advanced Configuration..............................................................30
Figure 4.10 System > Advanced Configuration > DHCP Server >
Global.....................................................................31
Figure 4.11 System > Advanced Configuration > DHCP Server >
Excluded Addresses...............................................31
Figure 4.12 System > Advanced Configuration > DHCP Server >
Excluded Addresses > Add....................................32
Figure 4.13 System > Advanced Configuration > DHCP Server >
Pool Summary........................................................32
Figure 4.14 System > Advanced Configuration > DHCP Server >
Pool Summary > Add .............................................33
Figure 4.15 System > Advanced Configuration > DHCP Server >
Pool Configuration..................................................35
Figure 4.16 System > Advanced Configuration > DHCP Server >
Pool Options...........................................................37
Figure 4.17 System > Advanced Configuration > DHCP Server >
Pool Options > Add Vendor Option ........................38
Figure 4.18 System > Advanced Configuration > DHCP Server >
Pool Options > Configure Vendor Option...............38
Figure 4.19 System > Advanced Configuration > DHCP Server >
Bindings..................................................................39
Figure 4.20 System > Advanced Configuration > DHCP Server >
Statistics.................................................................39
Figure 4.21 System > Advanced Configuration > DHCP Server >
Conflicts..................................................................41
Figure 4.22 System > Advanced Configuration > DNS >
Configuration..........................................................41
Figure 4.23 System > Advanced Configuration > DNS > IP
Mapping..................................................................42
Figure 4.24 System > Advanced Configuration > DNS > IP
Mapping > Add.......................................................43
Figure 4.25 System > Advanced Configuration > DNS > Source
EKI-9228G Series User Manual x
Interface Configuration........................................... 44
Figure 4.26 System > Advanced Configuration > Email Alerts >
Global..................................................................... 44
Figure 4.27 System > Advanced Configuration > Email Alerts >
Test ........................................................................ 45
Figure 4.28 System > Advanced Configuration > Email Alerts >
Server..................................................................... 45
Figure 4.29 System > Advanced Configuration > Email Alerts >
Server > Add .......................................................... 46
Figure 4.30 System > Advanced Configuration > Email Alerts >
Statistics................................................................. 46
Figure 4.31 System > Advanced Configuration > Email Alerts >
Subject ................................................................... 47
Figure 4.32 System > Advanced Configuration > Email Alerts >
Address.................................................................. 47
Figure 4.33 System > Advanced Configuration > Email Alerts >
Address > Add........................................................ 48
Figure 4.34 System > Advanced Configuration > ISDP > Global..
48
Figure 4.35 System > Advanced Configuration > ISDP > Cache
Table ...................................................................... 49
Figure 4.36 System > Advanced Configuration > ISDP > Interface
50
Figure 4.37 System > Advanced Configuration > ISDP > Statistics
50
Figure 4.38 System > Advanced Configuration > Link
Dependency > Group............................................. 51
Figure 4.39 System > Advanced Configuration > Link
Dependency > Group > Add................................... 52
Figure 4.40 System > Advanced Configuration > Protection >
Denial of Service.................................................... 53
Figure 4.41 System > Advanced Configuration > sFlow > Agent..
54
Figure 4.42 System > Advanced Configuration > sFlow > Receiver
55
Figure 4.43 System > Advanced Configuration > sFlow > Poller..
55
Figure 4.44 System > Advanced Configuration > sFlow > Poller >
Add......................................................................... 56
Figure 4.45 System > Advanced Configuration > sFlow > Sampler
57
Figure 4.46 System > Advanced Configuration > sFlow > Sampler
> Add...................................................................... 57
Figure 4.47 System > Advanced Configuration > sFlow > Source
Interface Configuration........................................... 58
Figure 4.48 System > Advanced Configuration > SNMP >
Community............................................................. 58
Figure 4.49 System > Advanced Configuration > SNMP >
Community > Add Community ............................... 59
Figure 4.50 System > Advanced Configuration > SNMP >
Community > Add Community Group .................... 60
Figure 4.51 System > Advanced Configuration > SNMP > Trap
Receiver v1/v2........................................................ 60
Figure 4.52 System > Advanced Configuration > SNMP > Trap
Receiver v1/v2 > Add............................................. 61
Figure 4.53 System > Advanced Configuration > SNMP > Trap
Receiver v3 ............................................................ 62
Figure 4.54 System > Advanced Configuration > SNMP > Trap
Receiver v3 > Add.................................................. 63
Figure 4.55 System > Advanced Configuration > SNMP >
xi EKI-9228G Series User Manual
Supported MIBs......................................................64
Figure 4.56 System > Advanced Configuration > SNMP > Access
Control Group.........................................................65
Figure 4.57 System > Advanced Configuration > SNMP > Access
Control Group > Add ..............................................66
Figure 4.58 System > Advanced Configuration > SNMP > User
Security Model........................................................67
Figure 4.59 System > Advanced Configuration > SNMP > User
Security Model > Add .............................................68
Figure 4.60 System > Advanced Configuration > SNMP > Source
Interface Configuration...........................................69
Figure 4.61 System > Advanced Configuration > SNMP > Server
Configuration..........................................................70
Figure 4.62 System > Advanced Configuration > SNTP > Global
Configuration..........................................................70
Figure 4.63 System > Advanced Configuration > SNTP > Global
Status .....................................................................71
Figure 4.64 System > Advanced Configuration > SNTP > Server
Configuration..........................................................72
Figure 4.65 System > Advanced Configuration > SNTP > Server
Configuration > Add................................................73
Figure 4.66 System > Advanced Configuration > SNTP > Server
Status .....................................................................74
Figure 4.67 System > Advanced Configuration > SNTP > Source
Interface Configuration...........................................75
Figure 4.68 System > Advanced Configuration > Time Ranges >
Configuration..........................................................75
Figure 4.69 System > Advanced Configuration > Time Ranges >
Configuration > Add................................................76
Figure 4.70 System > Advanced Configuration > Time Ranges >
Entry Configuration.................................................77
Figure 4.71 System > Advanced Configuration > Time Ranges >
Entry Configuration > Add Absolute.......................77
Figure 4.72 System > Advanced Configuration > Time Ranges >
Entry Configuration > Add Periodic ........................78
Figure 4.73 System > Advanced Configuration > Time Zone >
Summary................................................................79
Figure 4.74 System > Advanced Configuration > Time Zone >
Time Zone ..............................................................81
Figure 4.75 System > Advanced Configuration > Time Zone >
Summer Time.........................................................81
Figure 4.76 System > Advanced Configuration > Event Manager >
Alarm Status...........................................................83
Figure 4.77 System > Advanced Configuration > Event Manager >
Trap Log.................................................................83
Figure 4.78 System > Advanced Configuration > Event Manager >
Policy List ...............................................................84
Figure 4.79 System > Advanced Configuration > Event Manager >
Policy List > Add.....................................................85
Figure 4.80 System > Advanced Configuration > Event Manager >
Policy Selection......................................................86
Figure 4.81 System > Advanced Configuration > Event Manager >
Severity Configuration............................................86
4.3.3 Basic Configuration.....................................................................87
Figure 4.82 System > Basic Configuration > Switch..................87
4.3.4 Configuration Storage.................................................................88
Figure 4.83 System > Configuration Storage > Save................88
Figure 4.84 System > Configuration Storage > Reset...............88
Figure 4.85 System > Configuration Storage > Erase Startup ..88
Figure 4.86 System > Configuration Storage > Copy................89
EKI-9228G Series User Manual xii
4.3.5 Connectivity................................................................................ 89
Figure 4.87 System > Connectivity > IPv4 ................................ 90
Figure 4.88 System > Connectivity > IPv6 ................................ 91
Figure 4.89 System > Connectivity > IPv6 Neighbors............... 92
Figure 4.90 System > Connectivity > IPv6 Neighbors > Add .... 93
Figure 4.91 System > Connectivity > Service Port IPv4............ 93
Figure 4.92 System > Connectivity > Service Port IPv6............ 95
Figure 4.93 System > Connectivity > Service Port IPv6 Neighbors
96
Figure 4.94 System > Connectivity > Service Port IPv6 Neighbors
List > Add............................................................... 97
Figure 4.95 System > Connectivity > DHCP Client Options...... 97
4.3.6 Firmware..................................................................................... 97
Figure 4.96 System > Firmware > Status.................................. 98
Figure 4.97 System > Firmware > Configuration and Upgrade. 98
4.3.7 Logs............................................................................................ 99
Figure 4.98 System > Logs > Buffered Log............................... 99
Figure 4.99 System > Logs > Event Log................................. 100
Figure 4.100System > Logs > Persistent Log .......................... 101
Figure 4.101System > Logs > Hosts........................................ 102
Figure 4.102System > Logs > Hosts > Add.............................. 102
Figure 4.103System > Logs > Configuration............................ 103
Figure 4.104System > Logs > Source Interface Configuration. 104
Figure 4.105System > Logs > Statistics................................... 105
4.3.8 Management Access................................................................ 105
Figure 4.106System > Management Access > System............ 105
Figure 4.107System > Management Access > Telnet.............. 106
Figure 4.108System > Management Access > Serial .............. 107
Figure 4.109System > Management Access > CLI Banner ..... 108
Figure 4.110System > Management Access > HTTP.............. 108
Figure 4.111System > Management Access > HTTPS............ 109
Figure 4.112System > Management Access > SSH................ 110
4.3.9 Passwords................................................................................ 111
Figure 4.113System > Passwords > Line Password................ 111
Figure 4.114System > Passwords > Enable Password............ 112
Figure 4.115System > Passwords > Password Rules.............. 113
Figure 4.116System > Passwords > Last Password................ 114
Figure 4.117System > Passwords > Reset Passwords............ 114
4.3.10 Port........................................................................................... 115
Figure 4.118System > Port > Summary................................... 115
Figure 4.119System > Port > Description................................. 116
Figure 4.120System > Port > Cable Test................................. 117
Figure 4.121System > Port > Mirroring .................................... 118
Figure 4.122System > Port > Transceiver Brief ....................... 119
4.3.11 Statistics ................................................................................... 120
Figure 4.123System > Statistics > System > Switch................ 120
Figure 4.124System > Statistics > System > Port Summary.... 121
Figure 4.125System > Statistics > System > Port Detailed...... 122
Figure 4.126System > Statistics > System > Network DHCPv6 ....
123
Figure 4.127System > Statistics > Time Based > Group ......... 124
Figure 4.128System > Statistics > Time Based > Group > Add125
Figure 4.129System > Statistics > Time Based > Flow Based. 127
Figure 4.130System > Statistics > Time Based > Flow Based > Add
128
Figure 4.131System > Statistics > Time Based > Statistics..... 129
4.3.12 Status........................................................................................ 129
Figure 4.132System > Status > ARP Cache............................ 129
Figure 4.133System > Status > Resource Status .................... 130
Figure 4.134System > Status > Resource Configuration......... 131
xiii EKI-9228G Series User Manual
4.3.13 Summary...................................................................................131
Figure 4.135System > Summary > Dashboard ........................131
Figure 4.136System > Summary > Description........................133
Figure 4.137System > Summary > Inventory...........................133
Figure 4.138System > Summary > MAC Address Table..........134
4.3.14 Users.........................................................................................135
Figure 4.139System > Users > Accounts.................................135
Figure 4.140System > Users > Accounts > Add.......................136
Figure 4.141System > Users > Auth Server Users...................137
Figure 4.142System > Users > Auth Server Users > Add........137
Figure 4.143System > Users > Sessions .................................138
4.3.15 Utilities ......................................................................................138
Figure 4.144System > Utilities > System Reset .......................138
Figure 4.145System > Utilities > Ping.......................................139
Figure 4.146System > Utilities > Ping IPv6 ..............................140
Figure 4.147System > Utilities > TraceRoute...........................141
Figure 4.148System > Utilities > TraceRoute IPv6...................143
Figure 4.149System > Utilities > IP Address Conflict...............144
Figure 4.150System > Utilities > Transfer ................................145
4.4 Switching...............................................................................................148
4.4.1 Class of Service........................................................................148
Figure 4.151Switching > Class of Service > 802.1p.................149
4.4.2 DHCP Snooping........................................................................149
Figure 4.152Switching > DHCP Snooping > Base > Global.....149
Figure 4.153Switching > DHCP Snooping > Base > VLAN
Configuration........................................................150
Figure 4.154Switching > DHCP Snooping > Base > VLAN
Configuration > Add..............................................150
Figure 4.155Switching > DHCP Snooping > Base > Interface
Configuration........................................................151
Figure 4.156Switching > DHCP Snooping > Base > Static Bindings
152
Figure 4.157Switching > DHCP Snooping > Base > Static Bindings
> Add....................................................................152
Figure 4.158Switching > DHCP Snooping > Base > Dynamic
Bindings................................................................153
Figure 4.159Switching > DHCP Snooping > Base > Persistent154
Figure 4.160Switching > DHCP Snooping > Base > Statistics.154
Figure 4.161Switching > DHCP Snooping > L2 Relay > Global155
Figure 4.162Switching > DHCP Snooping > L2 Relay > Interface
Configuration........................................................155
Figure 4.163Switching > DHCP Snooping > L2 Relay > VLAN
Configuration........................................................156
Figure 4.164Switching > DHCP Snooping > L2 Relay > VLAN
Configuration > Add..............................................157
Figure 4.165Switching > DHCP Snooping > L2 Relay > Statistics.
158
4.4.3 IPv6 DHCP Snooping ...............................................................158
Figure 4.166Switching > IPv6 DHCP Snooping > Base > Global...
158
Figure 4.167Switching > IPv6 DHCP Snooping > Base > VLAN
Configuration........................................................159
Figure 4.168Switching > IPv6 DHCP Snooping > Base > VLAN
Configuration > Add..............................................160
Figure 4.169Switching > IPv6 DHCP Snooping > Base > Interface
Configuration........................................................160
Figure 4.170Switching > IPv6 DHCP Snooping > Base > Static
Bindings................................................................161
Figure 4.171Switching > IPv6 DHCP Snooping > Base > Static
Bindings > Add.....................................................162
EKI-9228G Series User Manual xiv
Figure 4.172Switching > IPv6 DHCP Snooping > Base > Dynamic
Bindings................................................................ 162
Figure 4.173Switching > IPv6 DHCP Snooping > Base > Persistent
163
Figure 4.174Switching > IPv6 DHCP Snooping > Base > Statistics
164
4.4.4 DVLAN...................................................................................... 164
Figure 4.175Switching > DVLAN > Configuration .................... 165
Figure 4.176Switching > DVLAN > Summary .......................... 165
Figure 4.177Switching > DVLAN > Interface Summary ........... 166
4.4.5 Dynamic ARP Inspection.......................................................... 166
Figure 4.178Switching > Dynamic ARP Inspection > Global.... 167
Figure 4.179Switching > Dynamic ARP Inspection > VLAN..... 167
Figure 4.180Switching > Dynamic ARP Inspection > VLAN > Add
168
Figure 4.181Switching > Dynamic ARP Inspection > Interface 169
Figure 4.182Switching > Dynamic ARP Inspection > ACL....... 170
Figure 4.183Switching > Dynamic ARP Inspection > ACL > Add
ACL ...................................................................... 170
Figure 4.184Switching > Dynamic ARP Inspection > ACL > Add
Rule...................................................................... 171
Figure 4.185Switching > Dynamic ARP Inspection > Statistics 171
4.4.6 Filters........................................................................................ 172
Figure 4.186Switching > Filters > MAC Filters......................... 172
Figure 4.187Switching > Filters > MAC Filters > Add............... 173
4.4.7 GARP........................................................................................ 174
Figure 4.188Switching > GARP > Switch................................. 174
Figure 4.189Switching > GARP > Port..................................... 175
4.4.8 IGMP Snooping ........................................................................ 176
Figure 4.190Switching > IGMP Snooping > Configuration....... 176
Figure 4.191Switching > IGMP Snooping > Interface Configuration
177
Figure 4.192Switching > IGMP Snooping > VLAN Status........ 178
Figure 4.193Switching > IGMP Snooping > VLAN Status > Add ...
179
Figure 4.194Switching > IGMP Snooping > Multicast Router
Configuration........................................................ 180
Figure 4.195Switching > IGMP Snooping > Multicast Router VLAN
Status................................................................... 180
Figure 4.196Switching > IGMP Snooping > Multicast Router VLAN
Configuration........................................................ 181
4.4.9 IGMP Snooping Querier ........................................................... 181
Figure 4.197Switching > IGMP Snooping Querier > Configuration
182
Figure 4.198Switching > IGMP Snooping Querier > VLAN
Configuration........................................................ 182
Figure 4.199Switching > IGMP Snooping Querier > VLAN
Configuration > Add ............................................. 183
Figure 4.200Switching > IGMP Snooping Querier > VLAN Status.
184
4.4.10 MLD Snooping.......................................................................... 184
Figure 4.201Switching > MLD Snooping > Configuration......... 185
Figure 4.202Switching > MLD Snooping > Interface Configuration
185
Figure 4.203Switching > MLD Snooping > Source Specific
Multicast............................................................... 186
Figure 4.204Switching > MLD Snooping > VLAN Status ......... 187
Figure 4.205Switching > MLD Snooping > VLAN Status > Add188
Figure 4.206Switching > MLD Snooping > Multicast Router
Configuration........................................................ 189
xv EKI-9228G Series User Manual
Figure 4.207Switching > MLD Snooping > Multicast Router VLAN
Status ...................................................................189
Figure 4.208Switching > MLD Snooping > Multicast Router VLAN
Status > Add.........................................................190
4.4.11 MLD Snooping Querier.............................................................190
Figure 4.209Switching > MLD Snooping Querier > Configuration..
191
Figure 4.210Switching > MLD Snooping Querier > VLAN
Configuration........................................................191
Figure 4.211Switching > MLD Snooping Querier > VLAN
Configuration > Add..............................................192
Figure 4.212Switching > MLD Snooping Querier > VLAN Status...
193
4.4.12 Multicast Forwarding Database ................................................194
Figure 4.213Switching > Multicast Forwarding Database >
Summary..............................................................194
Figure 4.214Switching > Multicast Forwarding Database > GMRP
195
Figure 4.215Switching > Multicast Forwarding Database > IGMP
Snooping ..............................................................196
Figure 4.216Switching > Multicast Forwarding Database > MLD
Snooping ..............................................................196
Figure 4.217Switching > Multicast Forwarding Database >
Statistics...............................................................197
4.4.13 MVR..........................................................................................197
Figure 4.218Switching > MVR > Global....................................197
Figure 4.219Switching > MVR > Group....................................198
Figure 4.220Switching > MVR > Group > Add .........................199
Figure 4.221Switching > MVR > Interface................................199
Figure 4.222Switching > MVR > Statistics................................200
4.4.14 LLDP.........................................................................................200
Figure 4.223Switching > LLDP > Global...................................201
Figure 4.224Switching > LLDP > Interface...............................201
Figure 4.225Switching > LLDP > Interface > Add ....................202
Figure 4.226Switching > LLDP > Local Devices.......................203
Figure 4.227Switching > LLDP > Remote Devices...................204
Figure 4.228Switching > LLDP > Statistics...............................205
4.4.15 LLDP-MED................................................................................206
Figure 4.229Switching > LLDP-MED > Global .........................206
Figure 4.230Switching > LLDP-MED > Interface......................207
Figure 4.231Switching > LLDP-MED > Interface > Add ...........208
Figure 4.232Switching > LLDP-MED > Local Devices .............208
Figure 4.233Switching > LLDP-MED > Remote Devices .........209
4.4.16 Port Channel.............................................................................209
Figure 4.234Switching > Port Channel > Summary..................210
Figure 4.235Switching > Port Channel > Statistics...................211
4.4.17 Port Security .............................................................................212
Figure 4.236Switching > Port Security > Global.......................212
Figure 4.237Switching > Port Security > Interface ...................213
Figure 4.238Switching > Port Security > Static MAC ...............214
Figure 4.239Switching > Port Security > Static MAC > Add.....215
Figure 4.240Switching > Port Security > Dynamic MAC ..........216
4.4.18 Protected Ports.........................................................................216
Figure 4.241Switching > Protected Ports > Configuration........216
Figure 4.242Switching > Protected Ports > Configuration > Add ...
217
4.4.19 Spanning Tree ..........................................................................217
Figure 4.243Switching > Spanning Tree > Switch....................218
Figure 4.244Switching > Spanning Tree > MST.......................219
Figure 4.245Switching > Spanning Tree > MST Port...............220
EKI-9228G Series User Manual xvi
Figure 4.246Switching > Spanning Tree > CST....................... 221
Figure 4.247Switching > Spanning Tree > CST Port ............... 222
Figure 4.248Switching > Spanning Tree > Statistics................ 224
4.4.20 VLAN ........................................................................................ 224
Figure 4.249Switching > VLAN > Status.................................. 225
Figure 4.250Switching > VLAN > Status > Add........................ 226
Figure 4.251Switching > VLAN > Port Configuration ............... 226
Figure 4.252Switching > VLAN > Port Summary ..................... 227
Figure 4.253Switching > VLAN > Switchport Summary........... 229
Figure 4.254Switching > VLAN > Internal Usage..................... 230
Figure 4.255Switching > VLAN > Reset................................... 230
Figure 4.256Switching > VLAN > Status.................................. 231
4.4.21 IP Subnet Based VLAN ............................................................ 231
Figure 4.257Switching > IP Subnet Based VLAN > Status...... 231
Figure 4.258Switching > IP Subnet Based VLAN > Status > Add..
232
4.4.22 MAC Based VLAN.................................................................... 232
Figure 4.259Switching > MAC Based VLAN > Status.............. 232
Figure 4.260Switching > MAC Based VLAN > Status > Add ... 233
4.4.23 Protocol Based VLAN............................................................... 233
Figure 4.261Switching > Protocol Based VLAN > Status......... 233
Figure 4.262Switching > Protocol Based VLAN > Status > Add ....
234
Figure 4.263Switching > Protocol Based VLAN > Configuration....
235
4.4.24 Private VLAN............................................................................ 236
Figure 4.264Switching > Private VLAN > Configuration........... 237
Figure 4.265Switching > Private VLAN > Configuration > Add
VLAN.................................................................... 237
Figure 4.266Switching > Private VLAN > Association.............. 238
Figure 4.267Switching > Private VLAN > Interface .................. 238
4.4.25 X-Ring Pro................................................................................ 240
Figure 4.268Switching > X-Ring Pro > Configuration............... 240
Figure 4.269Switching > X-Ring Pro > Configuration > Add .... 240
Figure 4.270Switching > X-Ring Pro > Status.......................... 241
4.5 Routing.................................................................................................. 242
4.5.1 ARP Table ................................................................................ 242
Figure 4.271Routing > ARP Table > Summary........................ 243
Figure 4.272Routing > ARP Table > Summary > Add ............. 244
Figure 4.273Routing > ARP Table > Configuration.................. 244
Figure 4.274Routing > ARP Table > Statistics......................... 245
4.5.2 IP .............................................................................................. 245
Figure 4.275Routing > IP > Configuration................................ 245
Figure 4.276Routing > IP > Interface Summary....................... 247
Figure 4.277Routing > IP > Interface Configuration................. 248
Figure 4.278Routing > IP > Statistics....................................... 250
4.5.3 Router....................................................................................... 252
Figure 4.279Routing > Router > Route Table .......................... 252
Figure 4.280Routing > Router > Configured Routes................ 253
Figure 4.281Routing > Router > Configured Routes > Add ..... 254
Figure 4.282Routing > Router > Summary............................... 255
4.6 Security................................................................................................. 256
4.6.1 Port Access Control.................................................................. 256
Figure 4.283Security > Port Access Control > Configuration... 256
Figure 4.284Security > Port Access Control > Port Summary . 257
Figure 4.285Security > Port Access Control > Port Configuration .
259
Figure 4.286Security > Port Access Control > Port Details...... 261
Figure 4.287Security > Port Access Control > Statistics.......... 263
Figure 4.288Security > Port Access Control > Client Summary264
xvii EKI-9228G Series User Manual
Figure 4.289Security > Port Access Control > Privileges Summary
264
Figure 4.290Security > Port Access Control > History Log
Summary..............................................................265
4.6.2 RADIUS ....................................................................................265
Figure 4.291Security > RADIUS > Configuration .....................266
Figure 4.292Security > RADIUS > Named Server....................266
Figure 4.293Security > RADIUS > Named Server > Add.........267
Figure 4.294Security > RADIUS > Statistics ............................268
Figure 4.295Security > RADIUS > Accounting Server .............269
Figure 4.296Security > RADIUS > Accounting Server > Add...269
Figure 4.297Security > RADIUS > Accounting Statistics..........270
Figure 4.298Security > RADIUS > Clear Statistics...................271
Figure 4.299Security > RADIUS > Source Interface Configuration
271
4.6.3 TACACS+ ................................................................................. 271
Figure 4.300Security > TACACS+ > Configuration ..................272
Figure 4.301Security > TACACS+ > Server Summary.............272
Figure 4.302Security > TACACS+ > Server Summary > Add..273
Figure 4.303Security > TACACS+ > Server Configuration.......273
Figure 4.304Security > TACACS+ > Source Interface
Configuration........................................................274
4.7 QoS.......................................................................................................274
4.7.1 Access Control Lists .................................................................274
Figure 4.305QoS > Access Control Lists > Summary..............275
Figure 4.306QoS > Access Control Lists > Summary > Add....276
Figure 4.307QoS > Access Control Lists > Configuration........277
Figure 4.308QoS > Access Control Lists > Configuration > Add
Rule......................................................................278
Figure 4.309QoS > Access Control Lists > Interfaces..............283
Figure 4.310QoS > Access Control Lists > Interfaces > Add ...284
Figure 4.311QoS > Access Control Lists > VLANs ..................285
Figure 4.312QoS > Access Control Lists > VLANs > Add........286
4.7.2 Class of Service........................................................................286
Figure 4.313QoS > Class of Service > IP DSCP......................287
Figure 4.314QoS > Class of Service > Interface......................287
Figure 4.315QoS > Class of Service > Queue .........................288
Figure 4.316QoS > Class of Service > Drop Precedence........289
4.7.3 Diffserv......................................................................................290
Figure 4.317QoS > Diffserv > Global........................................290
Figure 4.318QoS > Diffserv > Class Summary.........................291
Figure 4.319QoS > Diffserv > Class Summary > Add..............292
Figure 4.320QoS > Diffserv > Class Configuration...................292
Figure 4.321QoS > Diffserv > Class Configuration > Add Match
Criteria..................................................................293
Figure 4.322QoS > Diffserv > Policy Summary........................296
Figure 4.323QoS > Diffserv > Policy Summary > Add .............297
Figure 4.324QoS > Diffserv > Policy Configuration..................297
Figure 4.325QoS > Diffserv > Policy Configuration > Add Class ...
298
Figure 4.326QoS > Diffserv > Policy Configuration > Add Attribute
298
Figure 4.327QoS > Diffserv > Service Summary......................301
Figure 4.328QoS > Diffserv > Service Summary > Add...........302
Figure 4.329QoS > Diffserv > Service Statistics.......................302
Figure 4.330QoS > Diffserv > Policy Statistics.........................303
Chapter A Troubleshooting ..............................304
EKI-9228G Series User Manual xviii
A.1 Troubleshooting.................................................................................... 305
Chapter 1
1Product Overview
EKI-9228G Series User Manual 2
1.1 Supported Models
1.2 Specifications
EKI-9228G-8CMI EKI-9228G-8COI
Specifications Description
Interface I/O Port 16 x 10/100/1000BaseT(X), 8 x 1000Base-SX/
LX/LHX/XD/ZX/EZX, or 4 x 100/1000Base-X
SFP Port
Power Connector 3-pin removable screw terminal (power)
4-pin removable screw terminal (relay)
Physical Enclosure Aluminum extrusion
Protection Class IP30
Installation 1U 19" Rack mount
Dimensions
(W x H x D) 442 x 44 x 352 mm (17.4" x 1.73" x 13.85")
LED Display System LED SYS, Power 1, Power 2, CFG, ALM
Port LED Speed, Link, Activity
Environment Operating
Temperature -40 ~ 85°C (-40 ~ 185°F)
Storage
Temperature -40 ~ 85°C (-40 ~ 185°F)
Ambient Relative
Humidity 10 ~ 95% (non-condensing)
Switch Properties MAC Address 16K-entry
Power Power
Consumption EKI-9228G-8CMI:19.21 W @ 48V
EKI-9228G-8COI:19.24 W @ 110VAC
Power Input EKI-9228G-8CMI: 48VDC
EKI-9228G-8COI: 90~264AC/88~370VDC
Certifications Safety UL 61010
EMI CE FCC EN55022 Class A
EMS EN 61000-4-2
EN 61000-4-3
EN 61000-4-4
EN 61000-4-5
EN 61000-4-6
EN 61000-4-8
Shock IEC 61373 Cat 1 Class B
Freefall IEC 60068-2-32
Vibration IEC 60068-2-6
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324

Advantech EKI-9228G-8CMI User manual

Category
Software
Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI