EKI-7758F User Manual x
Figure A.4: DB 9-pin female connector ...................... 87
Appendix B Compatible SFP Modules ........... 90
Appendix C X-View ........................................... 92
Figure C.1: X-View interface ...................................... 92
Figure C.2: Items to the ‘Task’ menu bar .................... 92
Figure C.3: Two devices have been discovered .......... 93
Figure C.4: Discovery Filter setting window .............. 93
Figure C.5: Login interface ......................................... 94
Figure C.6: User Name/Password interface ................ 94
Figure C.7: Reboot function ........................................ 95
Figure C.8: Press Reboot button to restart the switch . 95
Figure C.9: Refresh for single function ....................... 96
Figure C.10: Refresh all the information ..................... 96
Figure C.11: Log displaying information .................... 97
C.1 System .............................................. 98
C.1.1 System Information ..................... 98
Figure C.12: System information ................................ 98
C.1.2 IP Configuration .......................... 98
Figure C.13: IP Configuration—DHCP ...................... 99
Figure C.14: IP Configuration—Auto range ............... 99
Figure C.15: IP Configuration—Manual ................... 100
C.1.3 DHCP Server ............................ 100
Figure C.16: DHCP Server interface ......................... 101
Figure C.17: DHCP Server – Client Entries .............. 101
Figure C.18: DHCP Server – Port and IP Binding .... 102
C.1.4 TFTP Transaction...................... 102
Figure C.19: TFTP Transaction – Upgrade 1 ............ 102
Figure C.20: TFTP Transaction – Upgrade 2 ............ 103
Figure C.21: TFTP Transaction –Restore 1 ............... 103
Figure C.22: TFTP Transaction – Restore 2 .............. 104
Figure C.23: TFTP Transaction – Backup 1 .............. 104
Figure C.24: TFTP Transaction – Backup 2 .............. 105
C.1.5 System Event Log ..................... 105
Figure C.25: Syslog Configuration ............................ 105
Figure C.26: Syslog Table ......................................... 106
Figure C.27: SMTP Configuration ............................ 106
Figure C.28: Event Configuration ............................. 107
C.1.6 Time (SNTP) ............................. 107
Figure C.29: Event Configuration ............................. 108
C.1.7 IP Security ................................. 108
Figure C.30: IP Security ............................................ 109
C.1.8 User Authentication ................... 109
Figure C.31: User Authentication .............................. 109
C.2 Port .................................................. 110
C.2.1 Port Statistics ............................ 110
Figure C.32: Port Statistics ........................................ 110
C.2.2 Port Control ............................... 110