ZyXEL Communications XS1930-12F User Manual

ZyXEL Communications XS1930-12F User Manual

10/12-port multi-gigabit/sfp+ smart managed l2 switch 12-port multi-gigabit smart managed poe switch
Table of Contents

Advertisement

Quick Links

User's Guide
XS1930 Series
10/12-port Multi-Gigabit/SFP+ Smart Managed L2 Switch
12-port Multi-Gigabit Smart Managed L2 PoE Switch
Default Login Details
Management IP
Address
User Name
Password
Copyright © 2021 Zyxel and/or its affiliates. All Rights Reserved.
http://DHCP-assigned IP
or
192.168.1.1
admin
1234
Version 4.70 Edition 1, 09/2021

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications XS1930-12F

  • Page 1 User’s Guide XS1930 Series 10/12-port Multi-Gigabit/SFP+ Smart Managed L2 Switch 12-port Multi-Gigabit Smart Managed L2 PoE Switch Default Login Details Version 4.70 Edition 1, 09/2021 Management IP http://DHCP-assigned IP Address 192.168.1.1 User Name admin Password 1234 Copyright © 2021 Zyxel and/or its affiliates. All Rights Reserved.
  • Page 2 IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. This is a User’s Guide for a series of products. Not all products support all firmware features. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system.
  • Page 3: Document Conventions

    Document Conventions Warnings and Notes These are how warnings and notes are shown in this guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 4: Table Of Contents

    Contents Overview Contents Overview User’s Guide ............................19 Getting to Know Your Switch ......................20 Hardware Installation and Connection ..................... 29 Hardware Panels ..........................33 Technical Reference ........................43 Web Configurator ..........................44 Initial Setup Example ..........................68 Tutorials ..............................73 Status ..............................78 Basic Setting ............................
  • Page 5 Contents Overview ARP Setup ............................289 Maintenance ............................294 Access Control ............................ 307 Diagnostic ............................329 System Log ............................332 Syslog Setup ............................333 Cluster Management ......................... 336 MAC Table ............................342 IP Table ..............................345 ARP Table ............................347 Routing Table ............................
  • Page 6: Table Of Contents

    Table of Contents Table of Contents Document Conventions ........................3 Contents Overview ..........................4 Table of Contents ..........................6 Part I: User’s Guide..................19 Chapter 1 Getting to Know Your Switch ......................20 1.1 Introduction ............................. 20 1.1.1 Multi-Gigabit .......................... 20 1.1.2 Management Modes ......................21 1.1.3 Mode Changing ........................
  • Page 7 Table of Contents 3.1 Front Panel Connections ....................... 33 3.1.1 Gigabit Ethernet Ports ......................34 3.1.2 PoE (XS1930-12HP) ......................... 34 3.1.3 SFP Slots ..........................35 3.2 Rear Panel ............................37 3.2.1 Grounding ..........................37 3.2.2 AC Power Connection ......................39 3.3 LEDs ..............................
  • Page 8 Table of Contents Chapter 6 Tutorials ...............................73 6.1 Overview ............................73 6.2 How to Use DHCPv4 Relay on the Switch ..................73 6.2.1 DHCP Relay Tutorial Introduction ..................73 6.2.2 Create a VLAN ........................73 6.2.3 Configure DHCPv4 Relay ..................... 76 6.2.4 Troubleshooting ........................
  • Page 9 Table of Contents 8.10.8 IPv6 Neighbor Discovery Setup ..................111 8.10.9 IPv6 Router Discovery Setup .................... 112 8.10.10 IPv6 Prefix Setup ......................113 8.10.11 IPv6 Neighbor Setup ....................... 114 8.10.12 DHCPv6 Client Setup ...................... 116 8.11 Cloud Management ........................117 8.11.1 Nebula Center Control Discovery ...................
  • Page 10 Table of Contents Chapter 13 Spanning Tree Protocol ........................140 13.1 Spanning Tree Protocol Overview .................... 140 13.1.1 What You Can Do ......................140 13.1.2 What You Need to Know ....................140 13.2 Spanning Tree Protocol Status ....................142 13.3 Spanning Tree Configuration ....................143 13.4 Rapid Spanning Tree Protocol Status ..................
  • Page 11 Table of Contents 17.4 Technical Reference ........................167 17.4.1 Static Trunking Example ....................167 Chapter 18 Port Authentication ..........................169 18.1 Port Authentication Overview ....................169 18.1.1 What You Can Do ......................169 18.1.2 What You Need to Know ....................170 18.1.3 MAC Authentication ......................
  • Page 12 Table of Contents Chapter 23 Queuing Method..........................194 23.1 Queuing Method Overview ...................... 194 23.1.1 What You Can Do ......................194 23.1.2 What You Need to Know ....................194 23.2 Configuring Queuing ......................... 195 Chapter 24 Multicast............................197 24.1 Multicast Overview ........................197 24.1.1 What You Can Do ......................
  • Page 13 Table of Contents Chapter 27 Loop Guard ............................224 27.1 Loop Guard Overview ....................... 224 27.1.1 What You Can Do ......................224 27.1.2 What You Need to Know ....................224 27.2 Loop Guard Setup ........................226 Chapter 28 Layer 2 Protocol Tunneling ......................227 28.1 Layer 2 Protocol Tunneling Overview ..................
  • Page 14 Table of Contents Chapter 32 Link Layer Discovery Protocol (LLDP) .....................248 32.1 LLDP Overview ..........................248 32.2 LLDP-MED Overview ........................249 32.3 LLDP Settings ..........................250 32.4 LLDP Local Status ........................251 32.4.1 LLDP Local Port Status Detail ................... 252 32.5 LLDP Remote Status ........................
  • Page 15 Table of Contents 35.4.6 DHCPv4 VLAN Setting ....................... 283 35.4.7 Configure DHCPv4 VLAN Port ..................285 35.4.8 Example: DHCP Relay for Two VLANs ................286 35.5 DHCPv6 Relay ..........................287 Chapter 36 ARP Setup............................289 36.1 ARP Overview ..........................289 36.1.1 What You Can Do ......................289 36.1.2 What You Need to Know ....................
  • Page 16 Table of Contents 38.3 Configure SNMP .......................... 308 38.3.1 Configure SNMP Trap Group ................... 309 38.3.2 Enable or Disable Sending of SNMP Traps on a Port ............. 310 38.3.3 Configure SNMP User ......................311 38.4 Set Up Login Accounts ....................... 313 38.5 Service Access Control ......................
  • Page 17 Table of Contents 43.1.2 What You Need to Know ....................342 43.2 Viewing the MAC Table ......................343 Chapter 44 IP Table..............................345 44.1 IP Table Overview ........................345 44.2 Viewing the IP Table ........................346 Chapter 45 ARP Table ............................347 45.1 Overview .............................
  • Page 18 Table of Contents 50.2.3 DDMI Details ........................361 50.2.4 Port Utilization ........................363 Part III: Troubleshooting and Appendices ..........364 Chapter 51 Troubleshooting..........................365 51.1 Power, Hardware Connections, and LEDs ................365 51.2 Switch Access and Login ......................366 51.3 Switch Configuration ........................368 Appendix A Customer Support .....................
  • Page 19: User's Guide

    User’s Guide...
  • Page 20: Getting To Know Your Switch

    The XS1930 Series consists of the following models: • XS1930-10 • XS1930-12HP • XS1930-12F References to PoE model in this User's Guide only apply to XS1930-12HP. The Switch is a smart managed switch supporting Multi-Gigabit ports. The Switch provides SFP+ slots for uplink.
  • Page 21: Management Modes

    Chapter 1 Getting to Know Your Switch Multi-Gigabit (IEEE 802.3bz) solves these problems by additionally supporting 2.5 Gigabit and 5 Gigabit Ethernet connections over Cat 5e and higher Ethernet cables. Multi-Gigabit ports are also backward compatible with 100 Mbps and 1 Gigabit ports. Figure 1 Multi-Gigabit Application See the following table for the cables required and distance limitation to attain the corresponding speed.
  • Page 22: Mode Changing

    Chapter 1 Getting to Know Your Switch Nebula Cloud Management To have Nebula manage the Switch, you must first register it at the Nebula web portal at https:// nebula.zyxel.com, and ensure that Nebula Control Center Discovery is enabled in Basic Setting > Cloud Management >...
  • Page 23: Zon Utility

    Chapter 1 Getting to Know Your Switch Select a site and scan the Switch's QR code to add it to the site. You can find the QR code: • On a label on the Switch or • On its box or •...
  • Page 24: Example Applications

    Chapter 1 Getting to Know Your Switch Table 3 XS1930 Series Model and PoE Features (continued) PoE FEATURES XS1930-12HP Power Management Mode Consumption mode (default) / Classification mode PoE Power Budget 375 W Table 4 PoE Standards PoE FEATURES PoE+ PoE++ IEEE Standard IEEE 802.3af...
  • Page 25: Backbone Example Application

    Chapter 1 Getting to Know Your Switch Figure 2 PoE Example Application 1.2.2 Backbone Example Application The Switch is an ideal solution for small networks where rapid growth can be expected in the near future. The Switch can be used standalone for a group of heavy traffic users. You can connect computers and servers directly to the Switch’s port or connect other switches to the Switch.
  • Page 26: Bridging Or Fiber Uplink Example Application

    Chapter 1 Getting to Know Your Switch 1.2.3 Bridging or Fiber Uplink Example Application In this example, the Switch connects different company departments (RD and Sales) to the corporate backbone. It can alleviate bandwidth contention and eliminate server and network bottlenecks. All users that need high bandwidth can connect to high-speed department servers through the Switch.
  • Page 27: Ieee 802.1Q Vlan Application Examples

    Chapter 1 Getting to Know Your Switch Figure 5 High Performance Switched Workgroup Application 1.2.5 IEEE 802.1Q VLAN Application Examples A VLAN (Virtual Local Area Network) allows a physical network to be partitioned into multiple logical networks. Stations on a logical network belong to one or more groups. With VLAN, a station cannot directly talk to or hear from stations that are not in the same groups unless such traffic first goes through a router.
  • Page 28: Good Habits For Managing The Switch

    Chapter 1 Getting to Know Your Switch • Web Configurator. This is recommended for everyday management of the Switch using a (supported) web browser. See Chapter 4 on page • FTP. Use File Transfer Protocol for firmware upgrades and configuration backup or restore. See Section 37.8.1 on page 304.
  • Page 29: Hardware Installation And Connection

    H A P T E R Hardware Installation and Connection 2.1 Installation Scenarios This chapter shows you how to install and connect the Switch. The Switch can be: • Placed on a desktop. • Rack-mounted on a standard EIA rack. 2.2 Safety Precautions Please observe the following before using the Switch: •...
  • Page 30: Mounting The Switch On A Rack

    Chapter 2 Hardware Installation and Connection Attach the rubber feet to each corner on the bottom of the Switch. These rubber feet help protect the Switch from shock or vibration and ensure space between devices when stacking. Figure 7 Attaching Rubber Feet Set the Switch on a smooth, level surface strong enough to support the weight of the Switch and the connected cables.
  • Page 31: Attaching The Mounting Brackets To The Switch

    Chapter 2 Hardware Installation and Connection 2.4.3 Attaching the Mounting Brackets to the Switch Position a mounting bracket on one side of the Switch, lining up the four screw holes on the bracket with the screw holes on the side of the Switch. Figure 8 Attaching the Mounting Brackets Using a #2 Philips screwdriver, install the M3 flat head screws through the mounting bracket holes into the Switch.
  • Page 32 Chapter 2 Hardware Installation and Connection the rack. Note: Make sure you tighten all the four screws to prevent the Switch from getting slanted. Repeat steps to attach the second mounting bracket on the other side of the rack. XS1930 Series User’s Guide...
  • Page 33: Hardware Panels

    3.1 Front Panel Connections The following figures show the front panels of the Switch. Figure 10 Front Panel: XS1930-10 Figure 11 Front Panel: XS1930-12HP Figure 12 Front Panel: XS1930-12F The following table describes the ports. Table 5 Front Panel Connections CONNECTOR DESCRIPTION 100M, 1G, 2.5G, 5G,...
  • Page 34: Gigabit Ethernet Ports

    Chapter 3 Hardware Panels Table 5 Front Panel Connections (continued) CONNECTOR DESCRIPTION Reset Press the RESET button to reboot the Switch without turning the power off. See Section 3.3 on page 40 for more information about the LED behavior. Restore Press the RESTORE button for 3 to 6 seconds to have the Switch automatically reboot and restore the last-saved custom default file.
  • Page 35: Sfp Slots

    3.1.3 SFP Slots The transceiver slots are for Small Form-Factor Pluggable (SFP), SFP+ transceivers or DAC (Direct Attach Copper) cables. The SFP+ (SFP Plus) and the DAC cable are enhanced versions of the SFP and support data rates of up to 10G. A transceiver is a single unit that houses a transmitter and a receiver. Use a transceiver or a DAC cable to connect a fiber cable to the Switch.
  • Page 36 Chapter 3 Hardware Panels Figure 13 Latch in the Lock Position Figure 14 Transceiver Installation Example Figure 15 Connecting the Fiber Cables 3.1.3.2 Transceiver Removal Use the following steps to remove an SFP transceiver. Attach an ESD preventive wrist strap to your wrist and to a bare metal surface on the chassis. Remove the fiber cables from the transceiver.
  • Page 37: Rear Panel

    The following figures show the rear panels of the Switch. The rear panels contain: Figure 19 Rear Panel: XS1930-10 Figure 20 Rear Panel: XS1930-12HP Figure 21 Rear Panel: XS1930-12F 3.2.1 Grounding Grounding is a safety measure to direct excess electric charge to the ground. It prevents damage to the Switch, and protects you from electrocution.
  • Page 38 Chapter 3 Hardware Panels conduit for protecting electric wiring) that is 15 cm apart, or as specified by your country’s electrical regulations. Any device that is located outdoors and connected to this product must be properly grounded and surge protected. To the extent permissible by your country’s applicable law, failure to follow these guidelines could result in damage to your Switch which may not be covered by its warranty.
  • Page 39: Ac Power Connection

    Chapter 3 Hardware Panels Figure 24 Connecting to the Building’s Main Grounding Electrode If you are uncertain that suitable grounding is available, contact the appropriate electrical inspection authority or an electrician. This device must be grounded. Do this before you make other connections.
  • Page 40: Leds

    Chapter 3 Hardware Panels 3.3 LEDs After you connect the power to the Switch, view the LEDs to ensure proper functioning of the Switch and as an aid in troubleshooting. Table 6 LED Descriptions COLOR STATUS DESCRIPTION Green The Switch is receiving power from the power source. Blinking The Switch is returning to the custom default configuration settings.
  • Page 41 Chapter 3 Hardware Panels Table 6 LED Descriptions (continued) COLOR STATUS DESCRIPTION LNK/ACT Blue The link to a 10G Ethernet network is up. Blinking The Switch is transmitting/receiving to/from a 10G Ethernet 1 – 8 (XS1930-10) network. 9 – 10 (XS1930- Purple The link to a 5G Ethernet network is up.
  • Page 42 Chapter 3 Hardware Panels Table 6 LED Descriptions (continued) COLOR STATUS DESCRIPTION LNK/ACT Green The port has a successful 1000M connection. Blinking The port is transmitting or receiving data at 1000M. 9 – 10 (XS1930- Blue The port has a successful 10G connection. 11 –...
  • Page 43: Technical Reference

    Technical Reference...
  • Page 44: Web Configurator

    H A P T E R Web Configurator 4.1 Overview This section introduces the configuration and functions of the Web Configurator. The Web Configurator is an HTML-based management interface that allows easy system setup and management through Internet browser. Use a browser that supports HTML5, such as Microsoft Edge, Internet Explorer 11, Mozilla Firefox, or Google Chrome.
  • Page 45 Chapter 4 Web Configurator Figure 25 Web Configurator: Login Click Login to log into the Web Configurator to manage the Switch directly. The default user name is admin and associated default password is 1234. The Setup Wizard screen will appear. You can use the Setup Wizard screen to configure the Switch’s IP, login password, SNMP community, link aggregation, and view a summary of the settings.
  • Page 46 Chapter 4 Web Configurator Figure 26 Web Configurator: Wizard If you did not change the default administrator password and/or SNMP community values, a warning screen displays each time you log into the Web Configurator and select Standard Mode. Click Password / SNMP to open a screen where you can change the administrator password and SNMP community string simultaneously.
  • Page 47 Chapter 4 Web Configurator Figure 28 Web Configurator: Password Change the default administrator and/or SNMP passwords, and then click Apply to save your changes. Table 7 Web Configurator: Password/SNMP LABEL DESCRIPTION Administrator This is the default administrator account with the “admin” user name. You cannot change the default administrator user name.
  • Page 48: Zyxel One Network (Zon) Utility

    Chapter 4 Web Configurator 4.3 Zyxel One Network (ZON) Utility ZON Utility is a program designed to help you deploy and manage a network more efficiently. It detects devices automatically and allows you to do basic settings on devices in the network without having to be near it.
  • Page 49 Chapter 4 Web Configurator Figure 29 Supported Devices and Versions If you want to check the supported models and firmware versions later, you can click the Show information about ZON icon in the upper right of the screen. Then select the Supported model and firmware version link.
  • Page 50 Chapter 4 Web Configurator Select a network adapter to which your supported devices are connected. Figure 31 Network Adapter Click the Go button for the ZON Utility to discover all supported devices in your network. Figure 32 Discovery The ZON Utility screen shows the devices discovered. Figure 33 ZON Utility Screen Select a device and then use the icons to perform actions.
  • Page 51 Chapter 4 Web Configurator Figure 34 Password Prompt The following table describes the icons numbered from left to right in the ZON Utility screen. Table 8 ZON Utility Icons ICON DESCRIPTION 1 IP Configuration Change the selected device’s IP address. 2 Renew IP Address Update a DHCP-assigned dynamic IP address.
  • Page 52: Wizard

    Chapter 4 Web Configurator Table 9 ZON Utility Fields (continued) LABEL DESCRIPTION IP Address This field displays the IP address of an internal interface on the discovered device that first received a ZDP discovery request from the ZON Utility. System Name This field displays the system name of the discovered device.
  • Page 53 Chapter 4 Web Configurator Figure 35 Wizard > Basic > Step 1 IP Each field is described in the following table. Table 10 Wizard > Basic > Step 1 IP LABEL DESCRIPTION Host Name This field displays a host name. IP Interface Select DHCP Client if the Switch is connected to a router with the DHCP server enabled.
  • Page 54 Chapter 4 Web Configurator Figure 36 Wizard > Basic > Step 2 Password Each field is described in the following table. Table 11 Wizard > Basic > Step 2 Password LABEL DESCRIPTION Administrator's Password Current password Type the existing system password (1234 is the default password when shipped). New password Enter your new system password.
  • Page 55 Chapter 4 Web Configurator Table 11 Wizard > Basic > Step 2 Password (continued) LABEL DESCRIPTION Trap Community Enter the Trap Community string, which is the password sent with each trap to the SNMP manager. The Trap Community string is only used by SNMP managers using SNMP version 2c or lower. Previous Click Previous to show the previous screen.
  • Page 56 Chapter 4 Web Configurator Figure 38 Wizard > Basic > Step 4 Summary Each field is described in the following table. Table 13 Wizard > Basic > Step 4 Summary LABEL DESCRIPTION Setup IP Host Name This field displays a host name. IP Interface This field displays whether the WAN interface is using a DHCP IP address or a static IP address.
  • Page 57: Protection

    Chapter 4 Web Configurator Table 13 Wizard > Basic > Step 4 Summary (continued) LABEL DESCRIPTION Type This field displays Static or LACP of this group. Member This field displays the members of this group. Previous Click Previous to show the previous screen. Finish Review the information and click Finish to create the task.
  • Page 58 Chapter 4 Web Configurator After clicking Next, the Broadcast Storm Control screen appears. Figure 40 Wizard > Protection > Step 2 Broadcast Storm Control Each field is described in the following table. Table 15 Wizard > Protection > Step 2 Broadcast Storm Control LABEL DESCRIPTION Broadcast Storm Control...
  • Page 59: Vlan

    Chapter 4 Web Configurator Figure 41 Wizard > Protection > Step 3 Summary Each field is described in the following table. Table 16 Wizard > Protection > Step 3 Summary LABEL DESCRIPTION Summary Loop Guard If the loop guard feature is enabled on a port, the Switch will prevent loops on this port. Broadcast Storm If the broadcast storm control feature is enabled on a port, the number of broadcast Control...
  • Page 60: Qos

    Chapter 4 Web Configurator Figure 42 Wizard > VLAN > VLAN Setting Each field is described in the following table. Table 17 Wizard > VLAN > VLAN Setting LABEL DESCRIPTION VLAN Setting Default VLAN 1 / After you create a VLAN and select the VLAN ID from the drop-down list box, select ports Access Untagged and use the right arrow to add them as the untagged ports to a VLAN group.
  • Page 61: Web Configurator Layout

    Chapter 4 Web Configurator Figure 43 Wizard > QoS > QoS Setting Each field is described in the following table. Table 18 Wizard > QoS > QoS Setting LABEL DESCRIPTION QoS Setting Select all ports Select all ports to apply settings on all ports. You can select a port by clicking it.
  • Page 62 Chapter 4 Web Configurator The following figure shows the navigating components of a Web Configurator screen. Figure 44 Web Configurator Home Screen (Status) Click the menu items to open sub-menu links, and then click on a sub-menu link to open the screen –...
  • Page 63 Chapter 4 Web Configurator Click this link to go to the Neighbor screen where you can see and manage neighbor devices – learned by the Switch. In the navigation panel, click a main link to reveal a list of sub-menu links. Table 19 Navigation Panel Sub-links Overview BASIC SETTING ADVANCED APPLICATION...
  • Page 64 Chapter 4 Web Configurator Table 20 Navigation Panel Links (continued) LINK DESCRIPTION Cloud This screen displays a link to a screen where you can enable or disable the Nebula Control Management Center Discovery feature. If it is enabled, you can have the Switch search for the NCC (Nebula Control Center).
  • Page 65: Change Your Password

    Chapter 4 Web Configurator Table 20 Navigation Panel Links (continued) LINK DESCRIPTION Errdisable This link takes you to screens where you can view errdisable status and configure errdisable settings in CPU protection, errdisable detect, and errdisable recovery. Green Ethernet This link takes you to a screen where you can configure green Ethernet settings in EEE, auto power down, and short reach for each port.
  • Page 66: Save Your Configuration

    Chapter 4 Web Configurator Figure 45 Change Administrator Login Password 4.6 Save Your Configuration When you are done modifying the settings in a screen, click Apply to save your changes back to the run-time memory. Settings in the run-time memory are lost when the Switch’s power is turned off. Click the Save link in the upper right of the Web Configurator to save your configuration to non-volatile memory.
  • Page 67: Reset The Switch

    Chapter 4 Web Configurator You forgot to log out of the Switch from a computer before logging in again on another computer. Note: Be careful not to lock yourself and others out of the Switch. 4.8 Reset the Switch If you lock yourself (and others) from the Switch or forget the administrator password, you will need to reload the factory-default configuration file or reset the Switch back to the factory defaults.
  • Page 68: Initial Setup Example

    H A P T E R Initial Setup Example 5.1 Overview This chapter shows how to set up the Switch for an example network. The following lists the configuration steps for the initial setup: • Create a VLAN • Set Port VID •...
  • Page 69 Chapter 5 Initial Setup Example In the Static VLAN screen, select ACTIVE, enter a descriptive name in the Name field and enter 2 in the VLAN Group ID field for the VLAN2 network. Use the default VLAN type, Normal, in the VLAN Type field. Note: The VLAN Group ID field in this screen and the VID field in the IP Setup screen refer to the same VLAN ID.
  • Page 70: Set Port Vid

    Chapter 5 Initial Setup Example 5.1.2 Set Port VID Use PVID to add a tag to incoming untagged frames received on that port so that the frames are forwarded to the VLAN group that the tag defines. In the example network, configure 2 as the port VID on port 1 so that any untagged frames received on that port get sent to VLAN 2.
  • Page 71 Chapter 5 Initial Setup Example Figure 49 Initial Setup Example: Management IP Address Connect your computer to any Ethernet port on the Switch. Make sure your computer is in the same subnet as the Switch. Open your web browser and enter 192.168.1.1 (the default IP address) in the address bar to access the Web Configurator.
  • Page 72 In the VID field, enter the ID of the VLAN group to which you want this management IP address to belong. This is the same as the VLAN ID you configure in the Static VLAN screen. Click Add to save your changes back to the run-time memory. Settings in the run-time memory are lost when the Switch’s power is turned off.
  • Page 73: Tutorials

    Chapter 6 Tutorials H A P T E R Tutorials 6.1 Overview This chapter provides some examples of using the Web Configurator to set up and use the Switch. The tutorials include: • How to Use DHCPv4 Relay on the Switch 6.2 How to Use DHCPv4 Relay on the Switch This tutorial describes how to configure your Switch to forward DHCP client requests to a specific DHCP server.
  • Page 74 Chapter 6 Tutorials Go to Basic Setting > Switch Setup and set the VLAN type to 802.1Q. Click Apply to save the settings to the run-time memory. Figure 51 Tutorial: Set VLAN Type to 802.1Q Click Advanced Application > VLAN > VLAN Configuration > Static VLAN Setup. In the Static VLAN screen, select ACTIVE, enter a descriptive name (VLAN 102 for example) in the Name field and enter 102 in the VLAN Group ID field.
  • Page 75 Chapter 6 Tutorials Figure 52 Tutorial: Create a Static VLAN Click the VLAN Configuration link in the Static VLAN Setup screen and then the VLAN Port Setup link in the VLAN Configuration screen. Figure 53 Tutorial: Click the VLAN Port Setting Link Enter 102 in the PVID field for port 2 to add a tag to incoming untagged frames received on that port so that the frames are forwarded to the VLAN group that the tag defines.
  • Page 76: Configure Dhcpv4 Relay

    Chapter 6 Tutorials Figure 54 Tutorial: Add Tag for Frames Received on Port 2 11 Click the Save link in the upper right of the Web Configurator to save your configuration permanently. 6.2.3 Configure DHCPv4 Relay Follow the steps below to enable DHCP relay on the Switch and allow the Switch to add relay agent information (such as the VLAN ID) to DHCP requests.
  • Page 77 Chapter 6 Tutorials Client A is connected to the Switch’s port 2 in VLAN 102. You configured the correct VLAN ID, port number and system name for DHCP relay on both the DHCP server and the Switch. You clicked the Save link on the Switch to have your settings take effect. XS1930 Series User’s Guide...
  • Page 78: Status

    Chapter 7 Status H A P T E R Status 7.1 Overview This chapter describes the screens for System Status and Neighbor Details. 7.1.1 What You Can Do • Use the Status screen (Section 7.2 on page 78) to see the Switch’s general device information, system status, and IP addresses.
  • Page 79 Figure 56 Status The following table describes the labels in this screen. Table 21 Status LABEL DESCRIPTION Device Information Device Type This field displays the model name of this Switch. System Name This field displays the name used to identify the Switch on any network. Boot Version This field displays the version number and date of the boot module that is currently on the Switch.
  • Page 80: Neighbor Screen

    Chapter 7 Status Table 21 Status (continued) LABEL DESCRIPTION Cloud Control This field displays the registration and connection status between the Switch and the NCC Status (Nebula Control Center). In Standalone mode, the status will display Disconnected or Unregistered. In cloud mode the status will display Connected or Disconnected.
  • Page 81 Chapter 7 Status Figure 57 Status > Neighbor The following table describes the fields in the above screen. Table 22 Status > Neighbor LABEL DESCRIPTION Port This shows the port of the Switch, on which the neighboring device is discovered. Port Name This shows the port description of the Switch.
  • Page 82: Neighbor Detail

    Chapter 7 Status 7.2.2 Neighbor Detail Use this screen to view detailed information about the neighboring devices. Device information is displayed in gray when the neighboring device is currently offline. Up to 10 neighboring device records per Ethernet port can be retained in this screen even when the devices are offline.
  • Page 83 Chapter 7 Status Table 23 Status > Neighbor > Neighbor Detail (continued) LABEL DESCRIPTION System Name This shows the system name of the neighbor device. Model This shows the model name of the neighbor device. This field will show “–” for devices that do not support the ZON utility.
  • Page 84: Basic Setting

    Chapter 8 Basic Setting H A P T E R Basic Setting 8.1 Overview This chapter describes how to configure the System Info, General Setup, Switch Setup, IP Setup, Port Setup, PoE Setup, Interface Setup, IPv6, and Cloud Management screens. 8.1.1 What You Can Do •...
  • Page 85 Figure 59 Basic Setting > System Info The following table describes the labels in this screen. Table 24 Basic Setting > System Info LABEL DESCRIPTION System Name This field displays the descriptive name of the Switch for identification purposes. Product Model This field displays the product model of the Switch.
  • Page 86: General Setup

    Chapter 8 Basic Setting Table 24 Basic Setting > System Info (continued) LABEL DESCRIPTION This field displays the maximum temperature measured at this sensor. This field displays the minimum temperature measured at this sensor. Threshold This field displays the upper temperature limit at this sensor. Status This field displays Normal for temperatures below the threshold and Error for those above.
  • Page 87 Chapter 8 Basic Setting Figure 60 Basic Setting > General Setup The following table describes the labels in this screen. Table 25 Basic Setting > General Setup LABEL DESCRIPTION System Name Choose a descriptive name for identification purposes. This name consists of up to 64 printable characters;...
  • Page 88: Introduction To Vlans

    Chapter 8 Basic Setting Table 25 Basic Setting > General Setup (continued) LABEL DESCRIPTION Time Zone Select the time difference between UTC (Universal Time Coordinated, formerly known as GMT, Greenwich Mean Time) and your time zone from the drop-down list box. Daylight Saving Daylight saving is a period from late spring to early fall when many countries set their clocks Time...
  • Page 89: Switch Setup

    Chapter 8 Basic Setting 8.5 Switch Setup Click Basic Setting > Switch Setup in the navigation panel to display the screen as shown. The VLAN setup screens change depending on whether you choose 802.1Q or Port Based in the VLAN Type field in this screen.
  • Page 90: Ip Setup

    Chapter 8 Basic Setting Table 26 Basic Setting > Switch Setup (continued) LABEL DESCRIPTION Priority Queue Assignment IEEE 802.1p defines up to eight separate traffic types by inserting a tag into a MAC-layer frame that contains bits to define class of service. Frames without an explicit priority tag are given the default priority of the ingress port. Use the next fields to configure the priority level-to-physical queue mapping.
  • Page 91: Ip Status

    Chapter 8 Basic Setting 8.6.1 IP Status Figure 62 Basic Setting > IP Status The following table describes the labels in this screen. Table 27 Basic Setting > IP Status LABEL DESCRIPTION IP Status Domain Name This field displays the IP address of the DNS server. Server Source This field displays whether the DNS server address is configured manually (Static) or obtained...
  • Page 92: Ip Configuration

    Chapter 8 Basic Setting The following table describes the labels in this screen. Table 28 Basic Setting > IP Setup > IP Status Details: Static LABEL DESCRIPTION Type This shows the IP address is manually assigned (Static). This is the VLAN identification number to which an IP routing domain belongs. IP Address This is the IP address of your Switch in dotted decimal notation for example 192.168.1.1.
  • Page 93 Chapter 8 Basic Setting Figure 65 Basic Setting > IP Setup > IP Configuration The following table describes the labels in this screen. Table 30 Basic Setting > IP Setup > IP Configuration LABEL DESCRIPTION Default Type the IP address of the default outgoing gateway in dotted decimal notation, for example Gateway 192.168.1.254.
  • Page 94: Network Proxy Configuration

    Chapter 8 Basic Setting Table 30 Basic Setting > IP Setup > IP Configuration (continued) LABEL DESCRIPTION Cancel Click Cancel to reset the fields to your previous configuration. Index This field displays the index number of an entry. IP Address This field displays the IP address of the Switch in the IP domain.
  • Page 95: Port Setup

    Chapter 8 Basic Setting The following table describes the labels in this screen. Table 31 Basic Setting > IP Setup > IP Configuration > Network Proxy Configuration LABEL DESCRIPTION Active Select this option to enable communication between the Switch and NCC through a proxy server.
  • Page 96 Chapter 8 Basic Setting The following table describes the labels in this screen. Table 32 Basic Setting > Port Setup LABEL DESCRIPTION Port This is the port index number. Settings in this row apply to all ports. Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
  • Page 97: Poe Status

    Chapter 8 Basic Setting 8.8 PoE Status Note: The following screens are available for the PoE model only. The PoE models supports the IEEE 802.3bt High Power over Ethernet (PoE) standard. A powered device (PD) is a device such as an access point or a switch, that supports PoE (Power over Ethernet) so that it can receive power from another device through an Ethernet port.
  • Page 98 Chapter 8 Basic Setting The following table describes the labels in this screen. Table 33 Basic Setting > PoE Status LABEL DESCRIPTION PoE Mode This field displays the power management mode used by the Switch, whether it is in Classification or Consumption mode. Total Power (W) This field displays the total power the Switch can provide to the connected PoE-enabled devices on the PoE ports.
  • Page 99: Poe Time Range Setup

    Chapter 8 Basic Setting Table 33 Basic Setting > PoE Status (continued) LABEL DESCRIPTION Max Power (W) This field displays the maximum amount of power the PD could use from the Switch on this port. Time-Range This field shows whether or not the port currently receives power from the Switch according to its State schedule.
  • Page 100: Poe Setup

    Chapter 8 Basic Setting Table 34 Basic Setting > PoE Setup > PoE Time Range Setup (continued) LABEL DESCRIPTION Port This field displays the index number of the port. Click a port number to change the schedule settings. Time Range This field displays the name of the schedule which is applied to the port.
  • Page 101 Chapter 8 Basic Setting The following table describes the labels in this screen. Table 35 Basic Setting > PoE Setup LABEL DESCRIPTION PoE Mode Select the power management mode you want the Switch to use. • Classification – Select this if you want the Switch to reserve the maximum power for each PD according to the PD’s power class and priority level.
  • Page 102 Chapter 8 Basic Setting Table 35 Basic Setting > PoE Setup (continued) LABEL DESCRIPTION Power-Up Set how the Switch provides power to a connected PD at power-up. 802.3af – the Switch follows the IEEE 802.3af Power over Ethernet standard to supply power to the connected PDs during power-up.
  • Page 103: Interface Setup

    Chapter 8 Basic Setting Table 35 Basic Setting > PoE Setup (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 104: Ipv6

    Chapter 8 Basic Setting Table 36 Basic Setting > Interface Setup (continued) LABEL DESCRIPTION Interface This field displays the interface’s descriptive name which is generated automatically by the Switch. The name is from a combination of the interface type and ID number. Select an entry’s check box to select a specific entry.
  • Page 105 Chapter 8 Basic Setting Figure 75 Basic Setting > IPv6 > IPv6 Interface Status The following table describes the labels in this screen. Table 38 Basic Setting > IPv6 > IPv6 Interface Status LABEL DESCRIPTION IPv6 Active This field displays whether the IPv6 interface is activated or not. MTU Size This field displays the Maximum Transmission Unit (MTU) size for IPv6 packets on this interface.
  • Page 106: Ipv6 Configuration

    Chapter 8 Basic Setting Table 38 Basic Setting > IPv6 > IPv6 Interface Status (continued) LABEL DESCRIPTION ND DAD Active This field displays whether Neighbor Discovery (ND) Duplicate Address Detection (DAD) is enabled on the interface. Number of This field displays the number of consecutive neighbor solicitations the Switch sends for this DAD Attempts interface.
  • Page 107: Ipv6 Global Setup

    Chapter 8 Basic Setting Figure 76 Basic Setting > IPv6 > IPv6 Configuration The following table describes the labels in this screen. Table 39 Basic Setting > IPv6 > IPv6 Configuration LABEL DESCRIPTION IPv6 Global Setup Click the link to go to a screen where you can configure the global IPv6 settings on the Switch.
  • Page 108: Ipv6 Interface Setup

    Chapter 8 Basic Setting The following table describes the labels in this screen. Table 40 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Global Setup LABEL DESCRIPTION IPv6 Hop Limit Specify the maximum number of hops (from 1 to 255) in router advertisements. This is the maximum number of hops on which an IPv6 packet is allowed to transmit before it is discarded by an IPv6 router, which is similar to the TTL field in IPv4.
  • Page 109: Ipv6 Link-Local Address Setup

    Chapter 8 Basic Setting 8.10.6 IPv6 Link-Local Address Setup A link-local address uniquely identifies a device on the local network (the LAN). It is similar to a “private IP address” in IPv4. You can have the same link-local address on multiple interfaces on a device. A link- local unicast address has a predefined prefix of fe80::/10.
  • Page 110 Chapter 8 Basic Setting Figure 80 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Global Address Setup The following table describes the labels in this screen. Table 43 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Global Address Setup LABEL DESCRIPTION Domain Name...
  • Page 111: Ipv6 Neighbor Discovery Setup

    Chapter 8 Basic Setting Table 43 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Global Address Setup (continued) LABEL DESCRIPTION Delete Check the entries that you want to remove and then click Delete to remove the selected entries from the summary table. Cancel Click Cancel to clear the check boxes.
  • Page 112: Ipv6 Router Discovery Setup

    Chapter 8 Basic Setting Table 44 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Neighbor Discovery Setup (continued) LABEL DESCRIPTION NS Interval This field displays the time interval (in milliseconds) at which neighbor solicitations are re-sent for this interface. Reachable This field displays how long (in milliseconds) a neighbor is considered reachable for this interface.
  • Page 113: Ipv6 Prefix Setup

    Chapter 8 Basic Setting Table 45 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Router Discovery Setup (continued) LABEL DESCRIPTION Lifetime Specify how long (from 0 to 9000 seconds) the router in router advertisements can be used as a default router for this interface. Suppress Select this option to set the Switch to not send router advertisements and responses to router solicitations on this interface.
  • Page 114: Ipv6 Neighbor Setup

    Chapter 8 Basic Setting The following table describes the labels in this screen. Table 46 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Prefix Setup LABEL DESCRIPTION Interface Select the IPv6 interface you want to configure. Prefix Set the IPv6 prefix that the Switch includes in router advertisements for this interface. Prefix Length Set the prefix length that the Switch includes in router advertisements for this interface.
  • Page 115 Chapter 8 Basic Setting Figure 84 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Neighbor Setup The following table describes the labels in this screen. Table 47 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Neighbor Setup LABEL DESCRIPTION Interface Type Select the type of IPv6 interface for which you want to configure.
  • Page 116: Dhcpv6 Client Setup

    Chapter 8 Basic Setting 8.10.12 DHCPv6 Client Setup Use this screen to configure the Switch’s DHCP settings when it is acting as a DHCPv6 client. Click the link next to DHCPv6 Client Setup in the IPv6 Configuration screen to display the screen as shown next. Figure 85 Basic Setting >...
  • Page 117: Cloud Management

    Chapter 8 Basic Setting 8.11 Cloud Management The Zyxel Nebula Control Center (NCC) is a cloud-based network management system that allows you to remotely manage and monitor Zyxel Nebula APs, Ethernet switches and security gateways. The Switch is managed and provisioned automatically by the NCC (Nebula Control Center) when: •...
  • Page 118: Nebula Switch Registration

    Chapter 8 Basic Setting 8.11.2 Nebula Switch Registration Click Basic Setting > Cloud Management > Nebula Switch Registration to display this screen. Figure 88 Basic Setting > Cloud Management > Nebula Switch Registration This screen has a QR code containing the Switch’s serial number and MAC address for handy NCC registration of the Switch using the Nebula Mobile app.
  • Page 119: Vlan

    H A P T E R VLAN 9.1 Overview This chapter shows you how to configure 802.1Q tagged and port-based VLANs. The type of screen you see here depends on the VLAN Type you selected in the Switch Setup screen. 9.1.1 What You Can Do •...
  • Page 120 Chapter 9 VLAN an untagged port. The remaining twelve bits define the VLAN ID, giving a possible maximum number of 4096 VLANs. Note that user priority and VLAN ID are independent of each other. A frame with VID (VLAN Identifier) of null (0) is called a priority frame, meaning that only the priority level is significant and the default VID of the ingress port is given as the VID of the frame.
  • Page 121 Chapter 9 VLAN Please refer to the following table for common IEEE 802.1Q VLAN terminology. Table 49 IEEE 802.1Q VLAN Terminology VLAN PARAMETER TERM DESCRIPTION VLAN Type Permanent VLAN This is a static VLAN created manually. Dynamic VLAN This is a VLAN configured by a GVRP registration or de-registration process.
  • Page 122: Vlan Status

    Chapter 9 VLAN Voice VLAN If the packet matches a VLAN rule that has a higher priority, for example, an entry with weight 250 in the vendor ID to VLAN mapping table, the Switch assigns the corresponding VLAN ID to the packet and stops checking the subsequent VLAN rules.
  • Page 123: Vlan Details

    Chapter 9 VLAN Figure 91 Advanced Application > VLAN: VLAN Status The following table describes the labels in this screen. Table 50 Advanced Application > VLAN: VLAN Status LABEL DESCRIPTION VLAN Search by Enter (an) existing VLAN ID numbers (use a comma (,) to separate individual VLANs or a dash (–) to indicate a range of VLANs.
  • Page 124: Vlan Configuration

    Chapter 9 VLAN Figure 92 Advanced Application > VLAN > VLAN Detail The following table describes the labels in this screen. Table 51 Advanced Application > VLAN > VLAN Detail LABEL DESCRIPTION VLAN Status Click this to go to the VLAN Status screen. This is the VLAN identification number that was configured in the corresponding VLAN configuration screen.
  • Page 125: Configure A Static Vlan

    Chapter 9 VLAN 9.5 Configure a Static VLAN Use this screen to configure a static VLAN for the Switch. Click the Static VLAN Setup link in the VLAN Configuration screen to display the screen as shown next. Figure 94 Advanced Application > VLAN > VLAN Configuration > Static VLAN Setup The following table describes the related labels in this screen.
  • Page 126: Configure Vlan Port Settings

    Chapter 9 VLAN Table 53 Advanced Application > VLAN > VLAN Configuration > Static VLAN Setup (continued) LABEL DESCRIPTION Click Add to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 127: Voice Vlan

    Chapter 9 VLAN The following table describes the labels in this screen. Table 54 Advanced Application > VLAN > VLAN Configuration > VLAN Port Setup LABEL DESCRIPTION GVRP GVRP (GARP VLAN Registration Protocol) is a registration protocol that defines a way for switches to register necessary VLAN members on ports across the network.
  • Page 128 Chapter 9 VLAN • a tagged voice packet when the incoming port and VLAN tag belongs to a voice VLAN. It then checks the source packet’s MAC address against an OUI list. If a match is found, the packet is considered as a voice packet.
  • Page 129: Vendor Id Based Vlan

    Chapter 9 VLAN Table 55 Advanced Application > VLAN > VLAN Configuration > Voice VLAN Setup (continued) LABEL DESCRIPTION OUI mask Enter the mask for the specified IP phone manufacturer’s OUI MAC address to determine which bits a packet’s MAC address should match. Enter “f”...
  • Page 130 Chapter 9 VLAN Figure 97 Advanced Application > VLAN > VLAN Configuration > Vendor ID Based VLAN Setup The following table describes the fields in the above screen. Table 56 Advanced Application > VLAN > VLAN Configuration > Vendor ID Based VLAN Setup LABEL DESCRIPTION Name...
  • Page 131: Port-Based Vlan Setup

    Chapter 9 VLAN 9.9 Port-Based VLAN Setup Port-based VLANs are VLANs where the packet forwarding decision is based on the destination MAC address and its associated port. Port-based VLANs require allowed outgoing ports to be defined for each port. Therefore, if you wish to allow two subscriber ports to talk to each other, for example, between conference rooms in a hotel, you must define the egress (an egress port is an outgoing port, that is, a port through which a data packet leaves) for both ports.
  • Page 132 Chapter 9 VLAN Figure 99 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation) The following table describes the labels in this screen. Table 57 Advanced Application > VLAN: Port Based VLAN Setup LABEL DESCRIPTION Setting Wizard Choose All connected or Port isolation. All connected means all ports can communicate with each other, that is, there are no virtual LANs.
  • Page 133: Static Mac Forwarding

    H A P T E R Static MAC Forwarding 10.1 Overview This chapter discusses how to configure forwarding rules based on MAC addresses of devices on your network. Use these screens to configure static MAC address forwarding. 10.1.1 What You Can Do Use the Static MAC Forwarding screen (Section 10.2 on page 133) to assign static MAC addresses for a...
  • Page 134 Chapter 10 Static MAC Forwarding The following table describes the labels in this screen. Table 58 Advanced Application > Static MAC Forwarding LABEL DESCRIPTION Active Select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by clearing this check box.
  • Page 135: Static Multicast Forwarding

    Chapter 11 Static Multicast Forwarding H A P T E R Static Multicast Forwarding 11.1 Overview This chapter discusses how to configure forwarding rules based on multicast MAC addresses of devices on your network. Use these screens to configure static multicast address forwarding. 11.1.1 What You Can Do Use the Static Multicast Forwarding screen (Section 11.2 on page...
  • Page 136: Configure Static Multicast Forwarding

    Chapter 11 Static Multicast Forwarding Figure 102 Static Multicast Forwarding to a Single Port Figure 103 Static Multicast Forwarding to Multiple Ports 11.2 Configure Static Multicast Forwarding Use this screen to configure rules to forward specific multicast frames, such as streaming or control frames, to specific ports.
  • Page 137 Chapter 11 Static Multicast Forwarding The following table describes the labels in this screen. Table 59 Advanced Application > Static Multicast Forwarding LABEL DESCRIPTION Active Select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by clearing this check box.
  • Page 138: Filtering

    Chapter 12 Filtering H A P T E R Filtering 12.1 Filtering Overview This chapter discusses MAC address port filtering. Filtering means sifting traffic going through the Switch based on the source and/or destination MAC addresses and VLAN group (ID). 12.1.1 What You Can Do Use the Filtering screen (Section 12.2 on page...
  • Page 139 Chapter 12 Filtering The following table describes the related labels in this screen. Table 60 Advanced Application > Filtering LABEL DESCRIPTION Active Make sure to select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by de-selecting this check box. Name Type a descriptive name (up to 32 printable ASCII characters) for this rule.
  • Page 140: Spanning Tree Protocol

    Chapter 13 Spanning Tree Protocol H A P T E R Spanning Tree Protocol 13.1 Spanning Tree Protocol Overview The Switch supports Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP) and Multiple Spanning Tree Protocol (MSTP) as defined in the following standards. •...
  • Page 141 Chapter 13 Spanning Tree Protocol learned addresses from the filtering database. In RSTP, the port states are Discarding, Learning, and Forwarding. Note: In this user’s guide, “STP” refers to both STP and RSTP. STP Terminology The root bridge is the base of the spanning tree. Path cost is the cost of transmitting a frame onto a LAN through that port.
  • Page 142: Spanning Tree Protocol Status

    Chapter 13 Spanning Tree Protocol blocking state to forwarding state so as to eliminate transient loops. Table 62 STP Port States PORT STATE DESCRIPTION Disabled STP is disabled (default). Blocking Only configuration and management BPDUs are received and processed. Listening All BPDUs are received and processed.
  • Page 143: Spanning Tree Configuration

    Chapter 13 Spanning Tree Protocol Configuration to activate one of the STP standards on the Switch. 13.3 Spanning Tree Configuration Use the Spanning Tree Configuration screen to activate one of the STP modes on the Switch. Click Configuration in the Advanced Application > Spanning Tree Protocol. Figure 107 Advanced Application >...
  • Page 144 Chapter 13 Spanning Tree Protocol The following table describes the labels in this screen. Table 64 Advanced Application > Spanning Tree Protocol LABEL DESCRIPTION Bridge Root refers to the base of the spanning tree (the root bridge). Our Bridge is this Switch. This Switch may also be the root bridge.
  • Page 145: Configure Rapid Spanning Tree Protocol

    Chapter 13 Spanning Tree Protocol 13.5 Configure Rapid Spanning Tree Protocol Use this screen to configure RSTP settings, see Section 13.1 on page 140 for more information on RSTP. Click RSTP in the Advanced Application > Spanning Tree Protocol screen. Figure 109 Advanced Application >...
  • Page 146: Configure Multiple Spanning Tree Protocol

    Chapter 13 Spanning Tree Protocol Table 65 Advanced Application > Spanning Tree Protocol > RSTP (continued) LABEL DESCRIPTION Forwarding Delay This is the maximum time (in seconds) the Switch will wait before changing states. This delay is required because every Switch must receive information about topology changes before it starts to forward frames.
  • Page 147 Chapter 13 Spanning Tree Protocol Figure 110 Advanced Application > Spanning Tree Protocol > MSTP The following table describes the labels in this screen. Table 66 Advanced Application > Spanning Tree Protocol > MSTP LABEL DESCRIPTION Status Click Status to display the MSTP Status screen. Port Click Port to display the MSTP Port screen.
  • Page 148 Chapter 13 Spanning Tree Protocol Table 66 Advanced Application > Spanning Tree Protocol > MSTP (continued) LABEL DESCRIPTION MaxAge This is the maximum time (in seconds) a switch can wait without receiving a BPDU before attempting to reconfigure. All switch ports (except for designated ports) should receive BPDUs at regular intervals.
  • Page 149: Multiple Spanning Tree Protocol Port Configuration

    Chapter 13 Spanning Tree Protocol Table 66 Advanced Application > Spanning Tree Protocol > MSTP (continued) LABEL DESCRIPTION Path Cost Path cost is the cost of transmitting a frame on to a LAN through that port. It is recommended to assign this value according to the speed of the bridge. The slower the media, the higher the cost.
  • Page 150: Multiple Spanning Tree Protocol Status

    Chapter 13 Spanning Tree Protocol Table 67 Advanced Application > Spanning Tree Protocol > MSTP > Port (continued) LABEL DESCRIPTION Settings in this row apply to all ports. Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
  • Page 151 Chapter 13 Spanning Tree Protocol Figure 112 Advanced Application > Spanning Tree Protocol > Status: MSTP The following table describes the labels in this screen. Table 68 Advanced Application > Spanning Tree Protocol LABEL DESCRIPTION Configuration Click Configuration to specify which STP mode you want to activate. Click MSTP to edit MSTP settings on the Switch.
  • Page 152 Chapter 13 Spanning Tree Protocol Table 68 Advanced Application > Spanning Tree Protocol (continued) LABEL DESCRIPTION Configuration A configuration digest is generated from the VLAN-MSTI mapping information. Digest This field displays the 16-octet signature that is included in an MSTP BPDU. This field displays the digest when MSTP is activated on the system.
  • Page 153: Technical Reference

    Chapter 13 Spanning Tree Protocol 13.8 Technical Reference This section provides technical background information on the topics discussed in this chapter. 13.8.1 MSTP Network Example The following figure shows a network example where two VLANs are configured on the two switches. If the switches are using STP or RSTP, the link for VLAN 2 will be blocked as STP and RSTP allow only one link in the network and block the redundant link.
  • Page 154: Mst Instance

    Chapter 13 Spanning Tree Protocol • VLAN-to-MST Instance mapping 13.8.3 MST Instance An MST Instance (MSTI) is a spanning tree instance. VLANs can be configured to run on a specific MSTI. Each created MSTI is identified by a unique number (known as an MST ID) known internally to a region. Therefore an MSTI does not span across MST regions.
  • Page 155 Chapter 13 Spanning Tree Protocol Figure 116 MSTP and Legacy RSTP Network Example XS1930 Series User’s Guide...
  • Page 156: Bandwidth Control

    H A P T E R Bandwidth Control 14.1 Bandwidth Control Overview This chapter shows you how you can cap the maximum bandwidth using the Bandwidth Control screen. Bandwidth control means defining a maximum allowable bandwidth for incoming and/or out-going traffic flows on a port.
  • Page 157 Chapter 14 Bandwidth Control The following table describes the related labels in this screen. Table 69 Advanced Application > Bandwidth Control LABEL DESCRIPTION Active Select this check box to enable bandwidth control on the Switch. Port This field displays the port number. Settings in this row apply to all ports.
  • Page 158: Broadcast Storm Control

    Chapter 15 Broadcast Storm Control H A P T E R Broadcast Storm Control 15.1 Broadcast Storm Control Overview This chapter introduces and shows you how to configure the broadcast storm control feature. Broadcast storm control limits the number of broadcast, multicast and destination lookup failure (DLF) packets the Switch receives per second on the ports.
  • Page 159 Chapter 15 Broadcast Storm Control The following table describes the labels in this screen. Table 70 Advanced Application > Broadcast Storm Control LABEL DESCRIPTION Active Select this check box to enable traffic storm control on the Switch. Clear this check box to disable this feature.
  • Page 160: Mirroring

    Chapter 16 Mirroring H A P T E R Mirroring 16.1 Mirroring Overview This chapter discusses port mirroring setup screens. Port mirroring allows you to copy a traffic flow to a monitor port (the port you copy the traffic to) in order that you can examine the traffic from the monitor port without interference.
  • Page 161 Chapter 16 Mirroring The following table describes the labels in this screen. Table 71 Advanced Application > Mirroring LABEL DESCRIPTION Active Select this check box to activate port mirroring on the Switch. Clear this check box to disable the feature. Monitor The monitor port is the port you copy the traffic to in order to examine it in more detail without Port...
  • Page 162: Link Aggregation

    Chapter 17 Link Aggregation H A P T E R Link Aggregation 17.1 Link Aggregation Overview This chapter shows you how to logically aggregate physical links to form one logical, higher-bandwidth link. Link aggregation (trunking) is the grouping of physical ports into one logical higher-capacity link. You may want to trunk ports if for example, it is cheaper to use multiple lower-speed links than to under-utilize a high-speed, but more costly, single-port link.
  • Page 163: Link Aggregation Status

    Chapter 17 Link Aggregation operational port fails, then one of the “standby” ports become operational without user intervention. Please note that: • You must connect all ports point-to-point to the same Ethernet switch and configure the ports for LACP trunking. •...
  • Page 164: Link Aggregation Setting

    Chapter 17 Link Aggregation The following table describes the labels in this screen. Table 74 Advanced Application > Link Aggregation Status LABEL DESCRIPTION Group ID This field displays the group ID to identify a trunk group, that is, one logical link containing multiple ports.
  • Page 165 Chapter 17 Link Aggregation Figure 121 Advanced Application > Link Aggregation > Link Aggregation Setting The following table describes the labels in this screen. Table 75 Advanced Application > Link Aggregation > Link Aggregation Setting LABEL DESCRIPTION Link This is the only screen you need to configure to enable static link aggregation. Aggregation Setting Group ID...
  • Page 166: Link Aggregation Control Protocol

    Chapter 17 Link Aggregation Table 75 Advanced Application > Link Aggregation > Link Aggregation Setting (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 167: Technical Reference

    Chapter 17 Link Aggregation Table 76 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP (continued) LABEL DESCRIPTION System Priority LACP system priority is a number between 1 and 65535. The switch with the lowest system priority (and lowest port number if system priority is the same) becomes the LACP “server”. The LACP “server”...
  • Page 168 Chapter 17 Link Aggregation Configure static trunking Click Advanced Application > Link Aggregation > Link Aggregation Setting. In – this screen activate trunk group T1, select the traffic distribution algorithm used by this group and select the ports that should belong to this group as shown in the figure below. Click Apply when you are done. Figure 124 Trunking Example –...
  • Page 169: Port Authentication

    Chapter 18 Port Authentication H A P T E R Port Authentication 18.1 Port Authentication Overview This chapter describes the IEEE 802.1x, MAC, and Guest VLAN authentication methods. Port authentication is a way to validate access to ports on the Switch to clients based on an external authentication server.
  • Page 170: What You Need To Know

    Chapter 18 Port Authentication 18.1.2 What You Need to Know IEEE 802.1x Authentication The following figure illustrates how a client connecting to a IEEE 802.1x authentication enabled port goes through a validation process. The Switch prompts the client for login information in the form of a user name and password after the client responds to its identity request.
  • Page 171: Port Authentication Configuration

    Chapter 18 Port Authentication Figure 126 MAC Authentication Process 18.2 Port Authentication Configuration To enable port authentication, first activate the port authentication methods (both on the Switch and the ports), then configure the RADIUS server settings in the AAA > RADIUS Server Setup screen. Click Advanced Application >...
  • Page 172 Chapter 18 Port Authentication Figure 128 Advanced Application > Port Authentication > 802.1x The following table describes the labels in this screen. Table 77 Advanced Application > Port Authentication > 802.1x LABEL DESCRIPTION Active Select this check box to permit 802.1x authentication on the Switch. Note: You must first enable 802.1x authentication on the Switch before configuring it on each port.
  • Page 173: Activate Mac Authentication

    Chapter 18 Port Authentication Table 77 Advanced Application > Port Authentication > 802.1x (continued) LABEL DESCRIPTION Reauth Specify if a subscriber has to periodically re-enter his or her user name and password to stay connected to the port. Reauth-period Specify the length of time required to pass before a client has to re-enter his or her user name secs and password to stay connected to the port.
  • Page 174: Guest Vlan

    Chapter 18 Port Authentication The following table describes the labels in this screen. Table 78 Advanced Application > Port Authentication > MAC Authentication LABEL DESCRIPTION Active Select this check box to permit MAC authentication on the Switch. Note: You must first enable MAC authentication on the Switch before configuring it on each port.
  • Page 175 Chapter 18 Port Authentication such as the Internet. The access granted to the Guest VLAN depends on how the network administrator configures switches or routers with the guest network feature. Figure 130 Guest VLAN Example Use this screen to enable and assign a guest VLAN to a port. In the Port Authentication screen click Guest Vlan to display the configuration screen as shown.
  • Page 176 Chapter 18 Port Authentication Table 79 Advanced Application > Port Authentication > Guest VLAN (continued) LABEL DESCRIPTION Guest Vlan A guest VLAN is a pre-configured VLAN on the Switch that allows non-authenticated users to access limited network resources through the Switch. You must also enable IEEE 802.1x authentication on the Switch and the associated ports.
  • Page 177: Port Security

    H A P T E R Port Security This chapter shows you how to set up port security. 19.1 About Port Security Port security allows only packets with dynamically learned MAC addresses and/or configured static MAC addresses to pass through a port on the Switch. The Switch can learn up to 32K MAC addresses in total with no limit on individual ports other than the sum cannot exceed 32K.
  • Page 178 Chapter 19 Port Security The following table describes the labels in this screen. Table 80 Advanced Application > Port Security LABEL DESCRIPTION Active Select this option to enable port security on the Switch. Port This field displays the port number. Settings in this row apply to all ports.
  • Page 179: Time Range

    Chapter 20 Time Range H A P T E R Time Range 20.1 Time Range Overview You can set up one-time and recurring schedules for time-oriented features, such as PoE and classifier. The UAG supports one-time and recurring schedules. One-time schedules are effective only once, while recurring schedules usually repeat.
  • Page 180 Chapter 20 Time Range The following table describes the labels in this screen. Table 81 Advanced Application > Time Range LABEL DESCRIPTION Name Enter a descriptive name for this rule for identifying purposes. Type Select Absolute to create a one-time schedule. One-time schedules begin on a specific start date and time and end on a specific stop date and time.
  • Page 181: Classifier

    Chapter 21 Classifier H A P T E R Classifier 21.1 Classifier Overview This chapter introduces and shows you how to configure the packet classifier on the Switch. It also discusses Quality of Service (QoS) and classifier concepts as employed by the Switch. 21.1.1 What You Can Do •...
  • Page 182: Classifier Configuration

    Chapter 21 Classifier the rules. Click Advanced Application > Classifier in the navigation panel to display the configuration screen as shown. Figure 134 Advanced Application > Classifier > Classifier Status The following table describes the labels in this screen. Table 82 Advanced Application > Classifier > Classifier Status LABEL DESCRIPTION Index...
  • Page 183 Chapter 21 Classifier Figure 135 Advanced Application > Classifier > Classifier Configuration XS1930 Series User’s Guide...
  • Page 184 Chapter 21 Classifier The following table describes the labels in this screen. Table 83 Advanced Application > Classifier > Classifier Configuration LABEL DESCRIPTION Active Select this option to enable this rule. Name Enter a descriptive name for this rule for identifying purposes. Weight Enter a number between 0 and 65535 to specify the rule’s weight.
  • Page 185 Chapter 21 Classifier Table 83 Advanced Application > Classifier > Classifier Configuration (continued) LABEL DESCRIPTION Select Any to apply the rule to all MAC addresses. Address To specify a destination, select MAC/Mask to enter the destination MAC address of the packet in valid MAC address format (six hexadecimal character pairs) and type the mask for the specified MAC address to determine which bits a packet’s MAC address should match.
  • Page 186: Viewing And Editing Classifier Configuration Summary

    Chapter 21 Classifier Table 83 Advanced Application > Classifier > Classifier Configuration (continued) LABEL DESCRIPTION Socket Note: You must select either UDP or TCP in the IP Protocol field before you configure the Number socket numbers. Select Any to apply the rule to all TCP/UDP protocol port numbers or select the second option and enter a TCP/UDP protocol port number.
  • Page 187: Classifier Global Setting Configuration

    Chapter 21 Classifier The following table shows some other common Ethernet types and the corresponding protocol number. Table 85 Common Ethernet Types and Protocol Numbers ETHERNET TYPE PROTOCOL NUMBER IP ETHII 0800 X.75 Internet 0801 NBS Internet 0802 ECMA Internet 0803 Chaosnet 0804...
  • Page 188: Classifier Example

    Chapter 21 Classifier Figure 137 Advanced Application > Classifier > Classifier Configuration > Classifier Global Setting The following table describes the labels in this screen. Table 88 Advanced Application > Classifier > Classifier Configuration > Classifier Global Setting LABEL DESCRIPTION Match Select manual to have classifier rules applied according to the weight of each rule you configured in Order...
  • Page 189 Chapter 21 Classifier Figure 138 Classifier: Example EXAMPLE After you have configured a classifier, you can configure a policy (in the Policy screen) to define actions on the classified traffic flow. XS1930 Series User’s Guide...
  • Page 190: Policy Rule

    Chapter 22 Policy Rule H A P T E R Policy Rule 22.1 Policy Rules Overview This chapter shows you how to configure policy rules. A classifier distinguishes traffic into flows based on the configured criteria (refer to Chapter 21 on page for more information).
  • Page 191 Chapter 22 Policy Rule Figure 139 Advanced Application > Policy Rule The following table describes the labels in this screen. Table 89 Advanced Application > Policy Rule LABEL DESCRIPTION Active Select this option to enable the policy. Name Enter a descriptive name for identification purposes. Classifier(s) This field displays the active classifiers you configure in the Classifier screen.
  • Page 192 Chapter 22 Policy Rule Table 89 Advanced Application > Policy Rule (continued) LABEL DESCRIPTION Action Specify the actions the Switch takes on the associated classified traffic flow. Note: You can specify only one action (pair) in a policy rule. To have the Switch take multiple actions on the same traffic flow, you need to define multiple classifiers with the same criteria and apply different policy rules.
  • Page 193: Policy Example

    Chapter 22 Policy Rule 22.3 Policy Example The figure below shows an example Policy screen where you configure a policy to limit bandwidth and discard out-of-profile traffic on a traffic flow classified using the Example classifier (refer to Section 21.5 on page 188).
  • Page 194: Queuing Method

    H A P T E R Queuing Method 23.1 Queuing Method Overview This chapter introduces the queuing methods supported. Queuing is used to help solve performance degradation when there is network congestion. Use the Queuing Method screen to configure queuing algorithms for outgoing traffic. See also Priority Queue Assignment in Switch Setup and 802.1p Priority in Port Setup for related information.
  • Page 195: Configuring Queuing

    Chapter 23 Queuing Method Weighted Round Robin Scheduling (WRR) uses the same algorithm as round robin scheduling, but services queues based on their priority and queue weight (the number you configure in the queue Weight field) rather than a fixed amount of bandwidth. WRR is activated only when a port has more traffic than it can handle.
  • Page 196 Chapter 23 Queuing Method The following table describes the labels in this screen. Table 90 Advanced Application > Queuing Method LABEL DESCRIPTION Port This label shows the port you are configuring. Settings in this row apply to all ports. Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
  • Page 197: Multicast

    Chapter 24 Multicast H A P T E R Multicast 24.1 Multicast Overview This chapter shows you how to configure various multicast features. Traditionally, IP packets are transmitted in one of either two ways Unicast (one sender to one recipient) –...
  • Page 198: Multicast Setup

    Chapter 24 Multicast IP multicast hosts to learn the IP multicast group membership. It checks IGMP packets passing through it, picks out the group registration information, and configures multicasting accordingly. IGMP snooping allows the Switch to learn multicast groups without you having to manually configure them. The Switch forwards multicast traffic destined for multicast groups (that it has learned from IGMP snooping or that you have manually configured) to ports that are members of that group.
  • Page 199: Igmp Snooping

    Chapter 24 Multicast The following table describes the labels in this screen. Table 92 Advanced Application > Multicast > IPv4 Multicast LABEL DESCRIPTION Index This is the index number of the entry. This field displays the multicast VLAN ID. Port This field displays the port number that belongs to the multicast group.
  • Page 200 Chapter 24 Multicast Table 93 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping (continued) LABEL DESCRIPTION Querier Select this option to allow the Switch to send IGMP General Query messages to the VLANs with the multicast hosts attached. Querier Version IGMP snooping query works only when both host and Switch support the same IGMP version.
  • Page 201 Chapter 24 Multicast Table 93 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping (continued) LABEL DESCRIPTION Settings in this row apply to all ports. Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
  • Page 202: Igmp Snooping Vlan

    Chapter 24 Multicast Table 93 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 203: Igmp Filtering Profile

    Chapter 24 Multicast Table 94 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping > IGMP Snooping VLAN LABEL DESCRIPTION Click this to create a new entry or to update an existing one. This saves your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 204 Chapter 24 Multicast The following table describes the labels in this screen. Table 95 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping > IGMP Filtering Profile LABEL DESCRIPTION Profile Name Enter a descriptive name for the profile for identification purposes. To configure additional rules for a profile that you have already added, enter the profile name and specify a different IP multicast address range.
  • Page 205: Aaa

    H A P T E R 25.1 Authentication, Authorization and Accounting (AAA) This chapter describes how to configure authentication, authorization and accounting settings on the Switch. The external servers that perform authentication, authorization and accounting functions are known as AAA servers. The Switch supports RADIUS (Remote Authentication Dial-In User Service) as the external authentication, authorization, and accounting server.
  • Page 206: Aaa Screens

    Chapter 25 AAA Local User Accounts By storing user profiles locally on the Switch, your Switch is able to authenticate and authorize users without interacting with a network AAA server. However, there is a limit on the number of users you may authenticate in this way.
  • Page 207 Chapter 25 AAA Figure 149 Advanced Application > AAA > RADIUS Server Setup The following table describes the labels in this screen. Table 96 Advanced Application > AAA > RADIUS Server Setup LABEL DESCRIPTION Authentication Use this section to configure your RADIUS authentication settings. Server Mode This field is only valid if you configure multiple RADIUS servers.
  • Page 208: Aaa Setup

    Chapter 25 AAA Table 96 Advanced Application > AAA > RADIUS Server Setup (continued) LABEL DESCRIPTION Shared Secret Specify a password (up to 32 alphanumeric characters except [ ? ], [ | ], [ ' ], [ " ] or [ , ]) as the key to be shared between the external RADIUS server and the Switch.
  • Page 209 Chapter 25 AAA Figure 150 Advanced Application > AAA > AAA Setup The following table describes the labels in this screen. Table 97 Advanced Application > AAA > AAA Setup LABEL DESCRIPTION Authentication Use this section to specify the methods used to authenticate users accessing the Switch. Login These fields specify which database the Switch should use (first and second) to authenticate administrator accounts (users for Switch management).
  • Page 210: Technical Reference

    Chapter 25 AAA Table 97 Advanced Application > AAA > AAA Setup (continued) LABEL DESCRIPTION Type The Switch supports the following types of events to be sent to the accounting servers: • System – Configure the Switch to send information when the following system events occur: system boots up, system shuts down, system accounting is enabled, system accounting is disabled.
  • Page 211 Chapter 25 AAA Note: Refer to the documentation that comes with your RADIUS server on how to configure VSAs for users authenticating through the RADIUS server. The following table describes the VSAs supported on the Switch. Table 98 Supported VSAs FUNCTION ATTRIBUTE Ingress Bandwidth...
  • Page 212: Supported Radius Attributes

    Chapter 25 AAA 25.5.2 Supported RADIUS Attributes Remote Authentication Dial-In User Service (RADIUS) attributes are data used to define specific authentication elements in a user profile, which is stored on the RADIUS server. This section lists the RADIUS attributes supported by the Switch. Refer to RFC 2865 for more information about RADIUS attributes used for authentication.
  • Page 213: Dhcp Snooping

    Chapter 26 DHCP Snooping H A P T E R DHCP Snooping 26.1 DHCP Snooping Overview With DHCP snooping, the Switch can block a DHCP server on a snooped VLAN that comes from an untrusted port in your network. 26.1.1 What You Can Do •...
  • Page 214 Chapter 26 DHCP Snooping Figure 151 Advanced Application > DHCP Snooping The following table describes the labels in this screen. Table 100 Advanced Application > DHCP Snooping LABEL DESCRIPTION Database Status This section displays the current settings for the DHCP snooping database. You can configure them in the DHCP Snooping Configure screen.
  • Page 215 Chapter 26 DHCP Snooping Table 100 Advanced Application > DHCP Snooping (continued) LABEL DESCRIPTION Abort timer This field displays how long (in seconds) the Switch waits to update the DHCP snooping database after the current bindings change. This section displays information about the current update and the next update of the DHCP snooping database.
  • Page 216: Dhcp Snooping Configure

    Chapter 26 DHCP Snooping Table 100 Advanced Application > DHCP Snooping (continued) LABEL DESCRIPTION Binding collisions This field displays the number of bindings the Switch ignored because the Switch already had a binding with the same MAC address and VLAN ID. Invalid interfaces This field displays the number of bindings the Switch ignored because the port number was a trusted interface or does not exist anymore.
  • Page 217 Chapter 26 DHCP Snooping Figure 152 Advanced Application > DHCP Snooping > Configure The following table describes the labels in this screen. Table 101 Advanced Application > DHCP Snooping > Configure LABEL DESCRIPTION Active Select this to enable DHCP snooping on the Switch. You still have to enable DHCP snooping on specific VLAN and specify trusted ports.
  • Page 218: Dhcp Snooping Port Configure

    Chapter 26 DHCP Snooping Table 101 Advanced Application > DHCP Snooping > Configure (continued) LABEL DESCRIPTION Renew DHCP Enter the location of a DHCP snooping database, and click Renew if you want the Snooping URL Switch to load it. You can use this to load dynamic bindings from a different DHCP snooping database than the one specified in Agent URL.
  • Page 219: Dhcp Snooping Vlan Configure

    The following table describes the labels in this screen. Table 102 Advanced Application > DHCP Snooping > Configure > Port LABEL DESCRIPTION Port This field displays the port number. If you configure the * port, the settings are applied to all of the ports.
  • Page 220: Dhcp Snooping Vlan Port Configure

    Chapter 26 DHCP Snooping The following table describes the labels in this screen. Table 103 Advanced Application > DHCP Snooping > Configure > VLAN LABEL DESCRIPTION VLAN Search by VID Specify the VLANs you want to manage in the section below. Use a comma (,) to separate individual VLANs or a dash (–) to indicates a range of VLANs.
  • Page 221: Technical Reference

    The following table describes the labels in this screen. Table 104 Advanced Application > DHCP Snooping > Configure > VLAN > Port LABEL DESCRIPTION Enter the ID number of the VLAN you want to configure here. Port Enter the number of ports to which you want to apply the specified DHCP option 82 profile. You can enter multiple ports separated by (no space) comma (,) or hyphen (–).
  • Page 222 Chapter 26 DHCP Snooping Note: If DHCP is enabled and there are no trusted ports, DHCP requests will not succeed. Untrusted ports are connected to subscribers. The Switch discards DHCP packets from untrusted ports in the following situations: • The packet is a DHCP server packet (for example, OFFER, ACK, or NACK). •...
  • Page 223 Chapter 26 DHCP Snooping When the DHCP server responds, the Switch removes the information in the Agent Information field before forwarding the response to the original source. You can configure this setting for each source VLAN. This setting is independent of the DHCP relay settings.
  • Page 224: Loop Guard

    H A P T E R Loop Guard 27.1 Loop Guard Overview This chapter shows you how to configure the Switch to guard against loops on the edge of your network. Loop guard allows you to configure the Switch to shut down a port if it detects that packets sent out on that port loop back to the Switch.
  • Page 225 Chapter 27 Loop Guard and reach switch B, they are sent back to port N on A as they are rebroadcast from B. Figure 158 Switch in Loop State The loop guard feature checks to see if a loop guard enabled port is connected to a Switch in loop state.
  • Page 226: Loop Guard Setup

    Chapter 27 Loop Guard 27.2 Loop Guard Setup Click Advanced Application > Loop Guard in the navigation panel to display the screen as shown. Note: The loop guard feature cannot be enabled on the ports that have Spanning Tree Protocol (RSTP or MSTP) enabled. Figure 161 Advanced Application >...
  • Page 227: Layer 2 Protocol Tunneling

    Chapter 28 Layer 2 Protocol Tunneling H A P T E R Layer 2 Protocol Tunneling 28.1 Layer 2 Protocol Tunneling Overview This chapter shows you how to configure layer 2 protocol tunneling on the Switch. 28.1.1 What You Can Do Use the Layer 2 Protocol Tunnel screen (Section 28.1 on page 227) to enable layer 2 protocol tunneling...
  • Page 228: Configuring Layer 2 Protocol Tunneling

    Chapter 28 Layer 2 Protocol Tunneling spanning tree, even though switch A is not directly connected to switches B, C and D. Topology change information can be propagated throughout the service provider’s network. To emulate a point-to-point topology between two customer switches at different sites, such as A and B, you can enable protocol tunneling on edge switches 1 and 2 for PAgP (Port Aggregation Protocol), LACP or UDLD (Uni-Directional Link Detection).
  • Page 229 Chapter 28 Layer 2 Protocol Tunneling Figure 164 Advanced Application > Layer 2 Protocol Tunneling The following table describes the labels in this screen. Table 106 Advanced Application > Layer 2 Protocol Tunneling LABEL DESCRIPTION Active Select this to enable layer 2 protocol tunneling on the Switch. Destination Specify a MAC address with which the Switch uses to encapsulate the layer 2 protocol packets MAC Address...
  • Page 230 Chapter 28 Layer 2 Protocol Tunneling Table 106 Advanced Application > Layer 2 Protocol Tunneling (continued) LABEL DESCRIPTION Point to Point The Switch supports PAgP (Port Aggregation Protocol), LACP (Link Aggregation Control Protocol) and UDLD (UniDirectional Link Detection) tunneling for a point-to-point topology. Both PAgP and UDLD are Cisco’s proprietary data link layer protocols.
  • Page 231: Pppoe

    Chapter 29 PPPoE H A P T E R PPPoE 29.1 PPPoE Intermediate Agent Overview This chapter describes how the Switch gives a PPPoE termination server additional information that the server can use to identify and authenticate a PPPoE client. A PPPoE Intermediate Agent (PPPoE IA) is deployed between a PPPoE server and PPPoE clients.
  • Page 232 Chapter 29 PPPoE This tag is defined in RFC 2516 and has the following format for this feature. Table 107 PPPoE Intermediate Agent Vendor-specific Tag Format Tag_Type Tag_Len Value (0x0105) The Tag_Type is 0x0105 for vendor-specific tags, as defined in RFC 2516. The Tag_Len indicates the length of Value, i1 and i2.
  • Page 233: Pppoe

    Chapter 29 PPPoE WT-101 Default Circuit ID Syntax If you do not configure a Circuit ID string for a specific VLAN on a port or for a specific port, and disable the flexible Circuit ID syntax in the PPPoE > Intermediate Agent screen, the Switch automatically generates a Circuit ID string according to the default Circuit ID syntax which is defined in the DSL Forum Working Text (WT)-101.
  • Page 234: Pppoe Intermediate Agent

    Chapter 29 PPPoE 29.3 PPPoE Intermediate Agent Use this screen to configure the Switch to give a PPPoE termination server additional subscriber information that the server can use to identify and authenticate a PPPoE client. Click Advanced Application > PPPoE > Intermediate Agent in the navigation panel to display the screen as shown.
  • Page 235: Pppoe Ia Per-Port

    Chapter 29 PPPoE Table 112 Advanced Application > PPPoE > Intermediate Agent (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 236: Pppoe Ia Per-Port Per-Vlan

    Chapter 29 PPPoE Table 113 Advanced Application > PPPoE > Intermediate Agent > Port (continued) LABEL DESCRIPTION Server Trusted Select whether this port is a trusted port (Trusted) or an untrusted port (Untrusted). State Trusted ports are uplink ports connected to PPPoE servers. If a PADO (PPPoE Active Discovery Offer), PADS (PPPoE Active Discovery Session-confirmation), or PADT (PPPoE Active Discovery Terminate) packet is sent from a PPPoE server and received on a trusted port, the Switch forwards it to all other ports.
  • Page 237: Pppoe Ia For Vlan

    Chapter 29 PPPoE The following table describes the labels in this screen. Table 114 Advanced Application > PPPoE > Intermediate Agent > Port > VLAN LABEL DESCRIPTION Show Port Enter a port number to show the PPPoE Intermediate Agent settings for the specified VLANs on the port.
  • Page 238 Chapter 29 PPPoE The following table describes the labels in this screen. Table 115 Advanced Application > PPPoE > Intermediate Agent > VLAN LABEL DESCRIPTION Show VLAN Use this section to specify the VLANs you want to configure in the section below. Start VID Enter the lowest VLAN ID you want to configure in the section below.
  • Page 239: Error-Disable

    H A P T E R Error-Disable 30.1 Error-Disable Overview This chapter shows you how to configure the rate limit for control packets on a port, and set the Switch to take an action (such as to shut down a port or stop sending packets) on a port when the Switch detects a pre-configured error.
  • Page 240: Error-Disable Settings

    Chapter 30 Error-Disable 30.2 Error-Disable Settings Use this screen to go to the screens where you can configure error disable related settings. Click Advanced Application > Errdisable in the navigation panel to open the following screen. Figure 170 Advanced Application > Errdisable The following table describes the labels in this screen.
  • Page 241 Chapter 30 Error-Disable Figure 171 Advanced Application > Errdisable > Errdisable Status The following table describes the labels in this screen. Table 117 Advanced Application > Errdisable > Errdisable Status LABEL DESCRIPTION Inactive-reason mode reset Port List Enter the number of the ports (separated by a comma) on which you want to reset inactive- reason status.
  • Page 242: Cpu Protection Configuration

    Chapter 30 Error-Disable Table 117 Advanced Application > Errdisable > Errdisable Status (continued) LABEL DESCRIPTION Mode This field shows the action that the Switch takes for the cause. • inactive-port – The Switch disables the port. • inactive-reason – The Switch drops all the specified control packets (such as BPDU) on the port.
  • Page 243: Error-Disable Detect Configuration

    Chapter 30 Error-Disable The following table describes the labels in this screen. Table 118 Advanced Application > Errdisable > CPU protection LABEL DESCRIPTION Reason Select the type of control packet you want to configure here. Port This field displays the port number. Use this row to make the setting the same for all ports.
  • Page 244: Error-Disable Recovery Configuration

    Chapter 30 Error-Disable Table 119 Advanced Application > Errdisable > Errdisable Detect (continued) LABEL DESCRIPTION Mode Select the action that the Switch takes when the number of control packets exceed the rate limit on a port, set in the Advanced Application > Errdisable > CPU protection screen. •...
  • Page 245 Chapter 30 Error-Disable Table 120 Advanced Application > Errdisable > Errdisable Recovery (continued) LABEL DESCRIPTION Interval Enter the number of seconds (from 30 to 2592000) for the time interval. Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 246: Green Ethernet

    Chapter 31 Green Ethernet H A P T E R Green Ethernet This chapter shows you how to configure the Switch to reduce the power consumed by switch ports. 31.1 Green Ethernet Overview Green Ethernet reduces switch port power consumption in the following ways. IEEE 802.3az Energy Efficient Ethernet (EEE) If EEE is enabled, both sides of a link support EEE and there is no traffic, the port enters Low Power Idle (LPI) mode.
  • Page 247 Chapter 31 Green Ethernet Figure 175 Advanced Application > Green Ethernet The following table describes the labels in this screen. Table 121 Advanced Application > Green Ethernet LABEL DESCRIPTION Select this to activate Energy Efficient Ethernet globally. Auto Power Select this to activate Auto Power Down globally. Down Short Reach Select this to activate Short Reach globally.
  • Page 248: Link Layer Discovery Protocol (Lldp)

    Chapter 32 Link Layer Discovery Protocol (LLDP) H A P T E R Link Layer Discovery Protocol (LLDP) 32.1 LLDP Overview The LLDP (Link Layer Discovery Protocol) is a layer 2 protocol. It allows a network device to advertise its identity and capabilities on the local network.
  • Page 249: Lldp-Med Overview

    Chapter 32 Link Layer Discovery Protocol (LLDP) The next figure demonstrates that the network devices Switches and Routers (S and R) transmit and receive device information through LLDPDU and the network manager can query the information using Simple Network Management Protocol (SNMP). Figure 176 LLDP Overview 32.2 LLDP-MED Overview LLDP-MED (Link Layer Discovery Protocol for Media Endpoint Devices) is an extension to the standard...
  • Page 250: Lldp Settings

    Chapter 32 Link Layer Discovery Protocol (LLDP) Figure 177 LLDP-MED Overview 32.3 LLDP Settings Click Advanced Application > LLDP in the navigation panel to display the screen as shown next. Figure 178 Advanced Application > LLDP The following table describes the labels in this screen. Table 122 Advanced Application >...
  • Page 251: Lldp Local Status

    Chapter 32 Link Layer Discovery Protocol (LLDP) Table 122 Advanced Application > LLDP (continued) LABEL DESCRIPTION LLDP-MED LLDP-MED Click here to show a screen to configure LLDP-MED (Link Layer Discovery Protocol for Media Configuration Endpoint Devices) parameters. LLDP-MED Click here to show a screen to configure LLDP-MED (Link Layer Discovery Protocol for Media Network Policy Endpoint Devices) network policy parameters.
  • Page 252: Lldp Local Port Status Detail

    Chapter 32 Link Layer Discovery Protocol (LLDP) The following table describes the labels in this screen. Table 123 Advanced Application > LLDP > LLDP Local Status LABEL DESCRIPTION Basic TLV Chassis ID TLV This displays the chassis ID of the local Switch, that is the Switch you are configuring. The chassis ID is identified by the chassis ID subtype.
  • Page 253 Figure 180 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail XS1930 Series User’s Guide...
  • Page 254 Chapter 32 Link Layer Discovery Protocol (LLDP) The following table describes the labels in this screen. Table 124 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail LABEL DESCRIPTION Local Port This displays the number of the Switch’s port. Basic TLV These are the Basic TLV flags Port ID TLV...
  • Page 255: Lldp Remote Status

    Table 124 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail (continued) LABEL DESCRIPTION Network Policy This displays a network policy for the specified application. • Voice • Voice-Signaling • Guest-Voice • Guest-Voice-Signaling • Softphone-Voice •...
  • Page 256: Lldp Remote Port Status Detail

    Chapter 32 Link Layer Discovery Protocol (LLDP) 32.5.1 LLDP Remote Port Status Detail This screen displays detailed LLDP status of the remote device connected to the Switch. Click Advanced Application > LLDP > LLDP Remote Status (Click Here) and then click an index number, for example 1, in the Index column in the LLDP Remote Status screen to display the screen as shown next.
  • Page 257 Chapter 32 Link Layer Discovery Protocol (LLDP) Table 126 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (Basic TLV) (continued) LABEL DESCRIPTION System Name This displays the system name of the remote device. System This displays the system description of the remote device.
  • Page 258 Chapter 32 Link Layer Discovery Protocol (LLDP) Figure 183 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (Dot1 and Dot3 TLV) The following table describes the labels in the Dot1 and Dot3 parts of the screen. Table 127 Advanced Application >...
  • Page 259 Table 127 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (Dot1 and Dot3 TLV) (continued) LABEL DESCRIPTION Vlan Name TLV This shows the VLAN ID and name for remote device port. • VLAN ID •...
  • Page 260 Chapter 32 Link Layer Discovery Protocol (LLDP) Figure 184 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (MED TLV) XS1930 Series User’s Guide...
  • Page 261 The following table describes the labels in the MED TLV part of the screen. Table 128 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (MED TLV) LABEL DESCRIPTION MED TLV LLDP Media Endpoint Discovery (MED) is an extension of LLDP that provides additional capabilities to support media endpoint devices.
  • Page 262: Lldp Configuration

    Chapter 32 Link Layer Discovery Protocol (LLDP) 32.6 LLDP Configuration Use this screen to configure global LLDP settings on the Switch. Click Advanced Application > LLDP > LLDP Configuration (Click Here) to display the screen as shown next. Figure 185 Advanced Application > LLDP > LLDP Configuration The following table describes the labels in this screen.
  • Page 263: Lldp Configuration Basic Tlv Setting

    Chapter 32 Link Layer Discovery Protocol (LLDP) Table 129 Advanced Application > LLDP > LLDP Configuration (continued) LABEL DESCRIPTION Admin Status Select whether LLDP transmission and/or reception is allowed on this port. • Disable – not allowed • Tx-Only – transmit only •...
  • Page 264: Lldp Configuration Org-Specific Tlv Setting

    Chapter 32 Link Layer Discovery Protocol (LLDP) Table 130 Advanced Application > LLDP > LLDP Configuration > Basic TLV Setting (continued) LABEL DESCRIPTION System Name Select the check boxes to enable or to disable the sending of System Name TLVs on the ports.
  • Page 265: Lldp-Med Configuration

    Chapter 32 Link Layer Discovery Protocol (LLDP) 32.7 LLDP-MED Configuration Click Advanced Application > LLDP > LLDP-MED Configuration to display the screen as shown next. Figure 188 Advanced Application > LLDP > LLDP-MED Configuration The following table describes the labels in this screen. Table 132 Advanced Application >...
  • Page 266 Chapter 32 Link Layer Discovery Protocol (LLDP) Figure 189 Advanced Application > LLDP > LLDP-MED Network Policy The following table describes the labels in this screen. Table 133 Advanced Application > LLDP > LLDP-MED Network Policy LABEL DESCRIPTION Port Enter the port number to set up the LLDP-MED network policy. Application Type Select the type of application used in the network policy.
  • Page 267: Lldp-Med Location

    Table 133 Advanced Application > LLDP > LLDP-MED Network Policy (continued) LABEL DESCRIPTION Delete Check the rules that you want to remove, then click the Delete button. Cancel Click Cancel to clear the selected check boxes. 32.9 LLDP-MED Location Click Advanced Application > LLDP > LLDP-MED Location (Click Here) to display the screen as shown next.
  • Page 268 Chapter 32 Link Layer Discovery Protocol (LLDP) Table 134 Advanced Application > LLDP > LLDP-MED Location (continued) LABEL DESCRIPTION Longitude Enter the longitude information. The value should be from 0º to 180º. The negative value represents the West. • west •...
  • Page 269 Chapter 32 Link Layer Discovery Protocol (LLDP) Table 134 Advanced Application > LLDP > LLDP-MED Location (continued) LABEL DESCRIPTION Civic Address This field displays the Civic Address for the remote device using information such as Country, State, County, City, Street, Number, ZIP code and additional information. ELIN Number This field shows the Emergency Location Identification Number (ELIN), which is used to identify endpoint devices when they issue emergency call services.
  • Page 270: Hardware Monitor

    Chapter 33 Hardware Monitor H A P T E R Hardware Monitor 33.1 Overview The Switch supports DDMI (Digital Diagnostics Monitoring Interface) that allows real-time monitoring of the SFP transceiver’s operating temperature. See Section 50.2.2 on page 361 for more details on DDMI. An SFP transceiver in full processing mode might reach the High Temperature (C) Warning Threshold (see Management >...
  • Page 271 Chapter 33 Hardware Monitor Table 135 Advanced Application > Hardware Monitor (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 272: Static Route

    H A P T E R Static Route 34.1 Static Routing Overview This chapter shows you how to configure static routes. The Switch usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the Switch send data to devices not reachable through the default gateway, use static routes.
  • Page 273: Static Routing

    Chapter 34 Static Route 34.2 Static Routing Click IP Application > Static Routing in the navigation panel to display the screen as shown. Click the link next to IPv4 Static Route to open a screen where you can create IPv4 static routing rules. Click the link next to IPv6 Static Route to open a screen where you can create IPv6 static routing rules.
  • Page 274: Ipv6 Static Route

    Chapter 34 Static Route Table 136 IP Application > Static Routing > IPv4 Static Route (continued) LABEL DESCRIPTION Metric The metric represents the “cost” of transmission for routing purposes. IP routing uses hop count as the measurement of cost, with a minimum of 1 for directly connected networks. Enter a number that approximates the cost for this link.
  • Page 275 Chapter 34 Static Route The following table describes the related labels you use to create a static route. Table 137 IP Application > Static Routing > IPv6 Static Route LABEL DESCRIPTION Route Enter the IPv6 address of the final destination. Destination Prefix Length Enter the prefix length number of up to 64 for this destination.
  • Page 276: Dhcp

    H A P T E R DHCP 35.1 DHCP Overview This chapter shows you how to configure the DHCP feature. DHCP (Dynamic Host Configuration Protocol RFC 2131 and RFC 2132) allows individual computers to obtain TCP/IP configuration at start-up from a server. If you configure the Switch as a DHCP relay agent, then the Switch forwards DHCP requests to DHCP server on your network.
  • Page 277: Dhcp Configuration

    Chapter 35 DHCP • VLAN The Switch is configured on a VLAN by VLAN basis. The Switch can be configured to relay – DHCP requests to different DHCP servers for clients in different VLAN. 35.2 DHCP Configuration Click IP Application > DHCP in the navigation panel to display the screen as shown. Click the link next to DHCPv4 to open screens where you can enable and configure DHCPv4 relay settings and create option 82 profiles.
  • Page 278: Dhcpv4 Relay

    Chapter 35 DHCP 35.4 DHCPv4 Relay Configure DHCP relay on the Switch if the DHCP clients and the DHCP server are not in the same broadcast domain. During the initial IP address leasing, the Switch helps to relay network information (such as the IP address and subnet mask) between a DHCP client and a DHCP server.
  • Page 279: Dhcpv4 Option 82 Profile

    Chapter 35 DHCP 35.4.1.2 Sub-Option Format There are two types of sub-option: “Agent Circuit ID Sub-option” and “Agent Remote ID Sub-option”. They have the following formats. Table 141 DHCP Relay Agent Circuit ID Sub-option Format SubOpt Code Length Value Slot ID, Port ID, VLAN ID, System Name or String (1 byte) (1 byte) Table 142 DHCP Relay Agent Remote ID Sub-option Format...
  • Page 280: Configuring Dhcpv4 Global Relay

    Chapter 35 DHCP Table 143 IP Application > DHCP > DHCPv4 > Option 82 Profile (continued) LABEL DESCRIPTION slot-port Select this option to have the Switch add the number of port that the DHCP client is connected vlan Select this option to have the Switch add the ID of VLAN which the port belongs to. hostname This is the system name you configure in the Basic Setting >...
  • Page 281: Configure Dhcpv4 Global Relay Port

    Chapter 35 DHCP Figure 199 IP Application > DHCP > DHCPv4 > Global The following table describes the labels in this screen. Table 144 IP Application > DHCP > DHCPv4 > Global LABEL DESCRIPTION Active Select this check box to enable DHCPv4 relay. Remote DHCP Enter the IP address of a DHCPv4 server in dotted decimal notation.
  • Page 282: Global Dhcp Relay Configuration Example

    Chapter 35 DHCP The following table describes the labels in this screen. Table 145 IP Application > DHCP > DHCPv4 > Global > Port LABEL DESCRIPTION Port Enter the number of ports to which you want to apply the specified DHCP option 82 profile. You can enter multiple ports separated by (no space) comma (,) or hyphen (–).
  • Page 283: Dhcpv4 Vlan Setting

    Chapter 35 DHCP Figure 201 Global DHCP Relay Network Example Configure the DHCP Relay screen as shown. Make sure you select a DHCP option 82 profile (default1 in this example) to set the Switch to send additional information (such as the VLAN ID) together with the DHCP requests to the DHCP server.
  • Page 284 Chapter 35 DHCP Figure 203 IP Application > DHCP > DHCPv4 > VLAN The following table describes the labels in this screen. Table 146 IP Application > DHCP > DHCPv4 > VLAN LABEL DESCRIPTION Enter the ID number of the VLAN to which these DHCP settings apply. Relay Use this section if you want to configure the Switch to function as a DHCP relay for this VLAN.
  • Page 285: Configure Dhcpv4 Vlan Port

    Chapter 35 DHCP Table 146 IP Application > DHCP > DHCPv4 > VLAN (continued) LABEL DESCRIPTION Delete Select the configuration entries you want to remove and click Delete to remove them. Cancel Click Cancel to clear the check boxes. 35.4.7 Configure DHCPv4 VLAN Port Use this screen to apply a different DHCP option 82 profile to certain ports in a VLAN.
  • Page 286: Example: Dhcp Relay For Two Vlans

    Chapter 35 DHCP Table 147 IP Application > DHCP > DHCPv4 > VLAN > Port (continued) LABEL DESCRIPTION Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries. Delete Select the entries that you want to remove, then click the Delete button to remove the selected entries from the table.
  • Page 287: Dhcpv6 Relay

    Chapter 35 DHCP 35.5 DHCPv6 Relay A DHCPv6 relay agent is on the same network as the DHCPv6 clients and helps forward messages between the DHCPv6 server and clients. When a client cannot use its link-local address and a well- known multicast address to locate a DHCPv6 server on its network, it then needs a DHCPv6 relay agent to send a message to a DHCPv6 server that is not attached to the same network.
  • Page 288 Table 148 IP Application > DHCP > DHCPv6 Relay (continued) LABEL DESCRIPTION This field displays the VLAN ID number. Click the VLAN ID to change the settings. Helper Address This field displays the IPv6 address of the remote DHCPv6 server for this VLAN. Interface ID This field displays whether the interface-ID option is added to DHCPv6 requests from clients in this VLAN.
  • Page 289: Arp Setup

    Chapter 36 ARP Setup H A P T E R ARP Setup 36.1 ARP Overview Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network.
  • Page 290 Chapter 36 ARP Setup ARP-Reply The Switch in ARP-Reply learning mode updates the ARP table only with the ARP replies to the ARP requests sent by the Switch. This can help prevent ARP spoofing. In the following example, the Switch does not have IP address and MAC address mapping information for hosts A and B in its ARP table, and host A wants to ping host B.
  • Page 291: Arp Setup

    Chapter 36 ARP Setup ARP-Request When the Switch is in ARP-Request learning mode, it updates the ARP table with both ARP replies, gratuitous ARP requests and ARP requests. Therefore in the following example, the Switch can learn host A’s MAC address from the ARP request sent by host A.
  • Page 292: Static Arp

    Chapter 36 ARP Setup Figure 209 IP Application > ARP Setup > ARP Learning The following table describes the labels in this screen. Table 149 IP Application > ARP Setup > ARP Learning LABEL DESCRIPTION Port This field displays the port number. Settings in this row apply to all ports.
  • Page 293 Chapter 36 ARP Setup Figure 210 IP Application > ARP Setup > Static ARP The following table describes the related labels in this screen. Table 150 IP Application > ARP Setup > Static ARP LABEL DESCRIPTION Active Select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by clearing this check box.
  • Page 294: Maintenance

    H A P T E R Maintenance 37.1 Overview This chapter explains how to configure the screens that let you maintain the firmware and configuration files. 37.1.1 What You Can Do • Use the Maintenance screen (Section 37.2 on page 294) to manage firmware and your configuration files.
  • Page 295 Chapter 37 Maintenance Figure 211 Management > Maintenance The following table describes the labels in this screen. Table 151 Management > Maintenance LABEL DESCRIPTION Firmware Click Click Here to go to the Firmware Upgrade screen. Upgrade Restore Click Click Here to go to the Restore Configuration screen. Configuration Backup Click Click Here to go to the Backup Configuration screen.
  • Page 296: Erase Running-Configuration

    Chapter 37 Maintenance 37.2.1 Erase Running-Configuration Follow the steps below to remove the running configuration on the Switch. Unlike when you reset the Switch to the factory defaults, the user name, password, system logs, memory logs, baud rate and SSH service are not removed.
  • Page 297: Factory Default

    Chapter 37 Maintenance Click Config 2 and follow steps 1 to 2 to reboot and load configuration two on the Switch. Click Factory Default and follow steps 1 to 2 to reboot and load Zyxel factory default configuration settings on the Switch. Click Custom Default and follow steps 1 to 2 to reboot and load a customized default file on the Switch.
  • Page 298: Firmware Upgrade

    Chapter 37 Maintenance 37.3 Firmware Upgrade Use the following screen to upgrade your Switch to the latest firmware. The Switch supports dual firmware images, Firmware 1 and Firmware 2. Use this screen to specify which image is updated when firmware is uploaded using the Web Configurator and to specify which image is loaded when the Switch starts up.
  • Page 299: Restore Configuration

    Chapter 37 Maintenance After the process is complete, see the System Info screen to verify your current firmware version number. Table 152 Management > Maintenance > Firmware Upgrade LABEL DESCRIPTION Name This is the name of the Switch that you are configuring. Version The Switch has 2 firmware sets, Firmware 1 and Firmware 2, residing in flash.
  • Page 300: Backup Configuration

    Chapter 37 Maintenance 37.5 Backup Configuration Backing up your Switch configurations allows you to create various “snap shots” of your device from which you may restore at a later date. Back up your current Switch configuration to a computer using the Backup Configuration screen. Figure 217 Management >...
  • Page 301 Chapter 37 Maintenance Figure 218 Management > Maintenance > Tech-Support You may need WordPad or similar software to see the log report correctly. The table below describes the fields in the above screen. Table 153 Management > Maintenance > Tech-Support LABEL DESCRIPTION Type a number ranging from 50 to 100 in the CPU threshold box, and type another...
  • Page 302: Tech-Support Download

    Chapter 37 Maintenance Table 153 Management > Maintenance > Tech-Support (continued) LABEL DESCRIPTION Click Download to see the Read Only Memory (ROM) log report. This report is stored in flash memory. Click Download to see the layer-3 Switch log report. The log only applies to the layer-3 Switch models.
  • Page 303: Https Certificates

    Chapter 37 Maintenance The following table describes the labels in this screen. Table 154 Management > Maintenance > Certificates LABEL DESCRIPTION File Path Click Choose File or Browse to find the certificate file you want to upload. Password Enter the certificate file’s password that was created when the PKCS #12 file was exported. The password consists of up to 32 ASCII characters.
  • Page 304: Technical Reference

    Figure 221 Management > Maintenance > Certificates > HTTPS 37.8 Technical Reference This section provides technical background information on the topics discussed in this chapter. 37.8.1 FTP Command Line This section shows some examples of uploading to or downloading files from the Switch using FTP commands.
  • Page 305: Ftp Command Line Procedure

    Chapter 37 Maintenance and has a “bin” filename extension. Table 155 Filename Conventions FILE TYPE INTERNAL NAME EXTERNAL NAME DESCRIPTION Configuration File config *.cfg This is the configuration filename on the Switch. Uploading the config file replaces the specified configuration file system, including your Switch configurations, system-related data (including the default password), the error log and the trace log.
  • Page 306: Gui-Based Ftp Clients

    Chapter 37 Maintenance 37.8.4 GUI-based FTP Clients The following table describes some of the commands that you may see in GUI-based FTP clients. Table 156 General Commands for GUI-based FTP Clients COMMAND DESCRIPTION Host Address Enter the address of the host server. Login Type Anonymous.
  • Page 307: Access Control

    Chapter 38 Access Control H A P T E R Access Control 38.1 Access Control Overview This chapter describes how to control access to the Switch. FTP is allowed one session each, Telnet and SSH share nine sessions, up to five web sessions (five different user names and passwords) and/or limitless SNMP access control sessions are allowed.
  • Page 308: Configure Snmp

    Chapter 38 Access Control Figure 222 Management > Access Control The following table describes the labels in this screen. Table 158 Management > Access Control LABEL DESCRIPTION SNMP Click this link to configure your SNMP settings. Logins Click this link to assign which users can access the Switch through Web Configurator at any one time.
  • Page 309: Configure Snmp Trap Group

    Chapter 38 Access Control The following table describes the labels in this screen. Table 159 Management > Access Control > SNMP LABEL DESCRIPTION General Setting Use this section to specify the SNMP version and community (password) values. Version Select the SNMP version for the Switch. The SNMP version on the Switch must match the version on the SNMP manager.
  • Page 310: Enable Or Disable Sending Of Snmp Traps On A Port

    Chapter 38 Access Control The following table describes the labels in this screen. Table 160 Management > Access Control > SNMP > Trap Group LABEL DESCRIPTION Trap Destination IP Select one of your configured trap destination IP addresses. These are the IP addresses of the SNMP managers.
  • Page 311: Configure Snmp User

    Chapter 38 Access Control Table 161 Management > Access Control > SNMP > Trap Group > Port (continued) LABEL DESCRIPTION Settings in this row apply to all ports. Use this row only if you want to make some of the settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
  • Page 312 Chapter 38 Access Control Table 162 Management > Access Control > SNMP > User (continued) LABEL DESCRIPTION Security Level Select whether you want to implement authentication and/or encryption for SNMP communication from this user. Choose: • noauth – to use the user name as the password string to send to the SNMP manager. This is equivalent to the Get, Set and Trap Community in SNMP v2c.
  • Page 313: Set Up Login Accounts

    Chapter 38 Access Control Table 162 Management > Access Control > SNMP > User (continued) LABEL DESCRIPTION Delete Click Delete to remove the selected entry from the summary table. Cancel Click Cancel to begin configuring this screen afresh. 38.4 Set Up Login Accounts Up to five people (one administrator and four non-administrators) may access the Switch through Web Configurator at any one time.
  • Page 314: Service Access Control

    Chapter 38 Access Control Table 163 Management > Access Control > Logins (continued) LABEL DESCRIPTION Edit Logins You may configure passwords for up to four users. These users can have read-only access. User Name Set a user name (up to 32 ASCII characters long). Password Enter your new system password.
  • Page 315: Remote Management

    Chapter 38 Access Control The following table describes the fields in this screen. Table 164 Management > Access Control > Service Access Control LABEL DESCRIPTION Services Services you may use to access the Switch are listed here. Active Select this option for the corresponding services that you want to allow to access the Switch. Service Port For Telnet, SSH, FTP, HTTP or HTTPS services, you may change the default service port by typing the new port number in the Service Port field.
  • Page 316: Account Security

    Chapter 38 Access Control Figure 229 Management > Access Control > Remote Management The following table describes the labels in this screen. Table 165 Management > Access Control > Remote Management LABEL DESCRIPTION Entry This is the client set index number. A “client set” is a group of one or more “trusted computers” from which an administrator may use a service to manage the Switch.
  • Page 317 Chapter 38 Access Control Password Encryption encrypts all passwords in the configuration file. However, if you want to show some passwords as plain text in the configuration file, select them as below. Note: Be careful who can access configuration files with plain text passwords! •...
  • Page 318: Technical Reference

    Chapter 38 Access Control Table 166 Management > Access Control > Account Security (continued) LABEL DESCRIPTION Display Select which specific information to display in plain text, in the saved configuration file. • Authentication • Authorization • Server User Select which user account information to display in plain text, in the saved configuration file. •...
  • Page 319 Chapter 38 Access Control The managed devices contain object variables or managed objects that define each piece of information to be collected about a Switch. Examples of variables include number of packets received, node port status, and so on. A Management Information Base (MIB) is a collection of managed objects. SNMP allows a manager and agents to communicate for the purpose of accessing these objects.
  • Page 320 Chapter 38 Access Control Table 168 SNMP System Traps (continued) OPTION OBJECT LABEL OBJECT ID DESCRIPTION pethPsePortOnOffNotification 1.3.6.1.2.1.105.0.1 This trap is sent when the PoE port delivers power or delivers no power to a PD. (For PoE models pethMainPowerUsageOnNo 1.3.6.1.2.1.105.0.2 This trap is sent when the usage power is only) tification...
  • Page 321: Ssh Overview

    Chapter 38 Access Control 38.8.2 SSH Overview Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication between two hosts over an unsecured network. Figure 232 SSH Communication Example 38.8.2.1 How SSH Works The following table summarizes how a secure connection is established between two remote hosts.
  • Page 322: Introduction To Https

    Chapter 38 Access Control Encryption Method Once the identification is verified, both the client and server must agree on the type of encryption method to use. Authentication and Data Transmission After the identification is verified and data encryption activated, a secure tunnel is established between the client and the server.
  • Page 323 Chapter 38 Access Control Figure 234 HTTPS Implementation Note: If you disable HTTP in the Service Access Control screen, then the Switch blocks all HTTP connection attempts. 38.8.3.1 HTTPS Example If you have not changed the default HTTPS port on the Switch, then in your browser enter “https://Switch IP Address/”...
  • Page 324 Chapter 38 Access Control Figure 236 Security Certificate Warning (Internet Explorer 11) After you log in, you will see the red address bar with the message Certificate Error. Click on Certificate Error next to the address bar and click View certificates. Figure 237 Certificate Error (Internet Explorer 11) EXAMPLE Click Install Certificate...
  • Page 325 Chapter 38 Access Control Figure 238 Certificate (Internet Explorer 11) EXAMPLE Mozilla Firefox Warning Messages When you attempt to access the Switch HTTPS server, a Your connection is not secure screen may display. If that is the case, click I Understand the Risks and then the Add Exception... button. Figure 239 Security Alert (Mozilla Firefox) XS1930 Series User’s Guide...
  • Page 326: Google Chrome Warning Messages

    Chapter 38 Access Control Confirm the HTTPS server URL matches. Click Confirm Security Exception to proceed to the Web Configurator login screen. Figure 240 Security Alert (Mozilla Firefox) EXAMPLE 38.8.4 Google Chrome Warning Messages When you attempt to access the Switch HTTPS server, a Your connection is not private screen may display.
  • Page 327 Chapter 38 Access Control Figure 241 Security Alert (Google Chrome 58.0.3029.110) 38.8.4.1 Main Settings After you accept the certificate and enter the login user name and password, the Switch main screen appears. The lock displayed in the bottom right of the browser status bar or next to the website address denotes a secure connection.
  • Page 328 Figure 242 Example: Lock Denoting a Secure Connection EXAMPLE XS1930 Series User’s Guide...
  • Page 329: Diagnostic

    Chapter 39 Diagnostic H A P T E R Diagnostic 39.1 Overview This chapter explains the Diagnostic screen. You can use this screen to help you identify problems. 39.2 Diagnostic Click Management > Diagnostic in the navigation panel to open this screen. Use this screen to ping IP addresses, run a traceroute, perform port tests or show the Switch’s location between devices.
  • Page 330 Chapter 39 Diagnostic The following table describes the labels in this screen. Table 173 Management > Diagnostic LABEL DESCRIPTION Ping Test IPv4 Select this option if you want to ping an IPv4 address. Otherwise, select – to send ping requests to all VLANs on the Switch. IPv6 Select this option if you want to ping an IPv6 address.
  • Page 331 Table 173 Management > Diagnostic (continued) LABEL DESCRIPTION Cable length This displays the total length of the Ethernet cable that is connected to the port when the Pair status is Ok and the Switch chipset supports this feature. This shows N/A if the Pair status is Open or Short. Check the Distance to fault. This shows Unsupported if the Switch chipset does not support to show the cable length.
  • Page 332: System Log

    Chapter 40 System Log H A P T E R System Log 40.1 Overview A log message stores the information for viewing. 40.2 System Log Click Management > System Log in the navigation panel to open this screen. Use this screen to check current system logs.
  • Page 333: Syslog Setup

    H A P T E R Syslog Setup 41.1 Syslog Overview This chapter explains the syslog screens. The syslog protocol allows devices to send event notification messages across an IP network to syslog servers that collect the event messages. A syslog-enabled device can generate a syslog message and send it to a syslog server.
  • Page 334 Chapter 41 Syslog Setup Figure 245 Management > Syslog Setup The following table describes the labels in this screen. Table 175 Management > Syslog Setup LABEL DESCRIPTION Syslog Select Active to turn on syslog (system logging) and then configure the syslog setting. Logging Type This column displays the names of the categories of logs that the device can generate.
  • Page 335 Chapter 41 Syslog Setup Table 175 Management > Syslog Setup (continued) LABEL DESCRIPTION Click Add to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 336: Cluster Management

    H A P T E R Cluster Management 42.1 Cluster Management Overview This chapter introduces cluster management. Cluster Management allows you to manage switches through one Switch, called the cluster manager. The switches must be directly connected and be in the same VLAN group so as to be able to communicate with one another.
  • Page 337: Cluster Management Status

    Chapter 42 Cluster Management • Use the Clustering Management Configuration screen (Section 42.3 on page 338) to configure clustering management. 42.2 Cluster Management Status Use this screen to view the role of the Switch within the cluster and to access a cluster member Switch’s Web Configurator.
  • Page 338: Clustering Management Configuration

    Chapter 42 Cluster Management 42.3 Clustering Management Configuration Use this screen to configure clustering management. Click Management > Cluster Management > Configuration to display the next screen. Figure 248 Management > Cluster Management > Configuration The following table describes the labels in this screen. Table 178 Management >...
  • Page 339: Technical Reference

    Chapter 42 Cluster Management Table 178 Management > Cluster Management > Configuration (continued) LABEL DESCRIPTION List A list of suitable candidates found by auto-discovery is shown here. The switches must be directly connected. Directly connected switches that are set to be cluster managers will not be visible in the Clustering Candidate list.
  • Page 340 Chapter 42 Cluster Management Figure 249 Cluster Management: Cluster Member Web Configurator Screen example 42.4.1.1 Uploading Firmware to a Cluster Member Switch You can use FTP to upload firmware to a cluster member switch through the cluster manager switch as shown in the following example.
  • Page 341 Chapter 42 Cluster Management Figure 250 Example: Uploading Firmware to a Cluster Member Switch C:\>ftp 192.168.1.1 Connected to 192.168.1.1. 220 Switch FTP version 1.0 ready at Thu Jan 1 00:58:46 1970 User (192.168.0.1:(none)): admin 331 Enter PASS command Password: 230 Logged in ftp>...
  • Page 342: Mac Table

    H A P T E R MAC Table 43.1 MAC Table Overview This chapter introduces the MAC Table screen. The MAC Table screen (a MAC table is also known as a filtering database) shows how frames are forwarded or filtered across the Switch’s ports. It shows what device MAC address, belonging to what VLAN group (if any) is forwarded to which ports and whether the MAC address is dynamic (learned by the Switch) or static (manually entered in the Static MAC Forwarding screen).
  • Page 343: Viewing The Mac Table

    Chapter 43 MAC Table Figure 251 MAC Table Flowchart 43.2 Viewing the MAC Table Use this screen to search specific MAC addresses. You can also directly add dynamic MAC addresses into the static MAC forwarding table or MAC filtering table from the MAC table using this screen. Click Management >...
  • Page 344 Chapter 43 MAC Table The following table describes the labels in this screen. Table 180 Management > MAC Table LABEL DESCRIPTION Condition Select one of the buttons and click Search to only display the data which matches the criteria you specified. Select All to display any entry in the MAC table of the Switch.
  • Page 345: Ip Table

    H A P T E R IP Table This chapter introduces the IP table. 44.1 IP Table Overview The IP Table screen shows how packets are forwarded or filtered across the Switch’s ports. When a device (which may belong to a VLAN group) sends a packet which is forwarded to a port on the Switch, the IP address of the device is shown on the Switch’s IP Table.
  • Page 346: Viewing The Ip Table

    Chapter 44 IP Table 44.2 Viewing the IP Table Click Management > IP Table in the navigation panel to display the following screen. Figure 254 Management > IP Table The following table describes the labels in this screen. Table 181 Management > IP Table LABEL DESCRIPTION Sort by...
  • Page 347: Arp Table

    H A P T E R ARP Table 45.1 Overview This chapter introduces ARP Table. Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network.
  • Page 348 Figure 255 Management > ARP Table The following table describes the labels in this screen. Table 182 Management > ARP Table LABEL DESCRIPTION Condition Specify how you want the Switch to remove ARP entries when you click Flush. Select All to remove all of the dynamic entries from the ARP table. Select IP Address and enter an IP address to remove the dynamic entries learned with the specified IP address.
  • Page 349: Routing Table

    Chapter 46 Routing Table H A P T E R Routing Table This chapter introduces the routing table. 46.1 Routing Table Overview The routing table contains the route information to the networks that the Switch can reach. 46.2 The Routing Table Main Screen Click Management >...
  • Page 350: Ipv6 Routing Table

    The following table describes the labels in this screen. Table 183 Management > Routing Table > IPv4 Routing Table LABEL DESCRIPTION Index This field displays the index number. Destination This field displays the destination IP routing domain. Gateway This field displays the IP address of the gateway device. Interface This field displays the IP address of the IPv4 Interface.
  • Page 351: Path Mtu Table

    Chapter 47 Path MTU Table H A P T E R Path MTU Table 47.1 Path MTU Overview This chapter introduces the IPv6 Path MTU table. The largest size (in bytes) of a packet that can be transferred over a data link is called the maximum transmission unit (MTU).
  • Page 352: Configure Clone

    Chapter 48 Configure Clone H A P T E R Configure Clone 48.1 Overview This chapter shows you how you can copy the settings of one port onto other ports. 48.2 Configure Clone Cloning allows you to copy the basic and advanced settings from a source port to a destination port or ports.
  • Page 353 Chapter 48 Configure Clone Figure 260 Management > Configure Clone The following table describes the labels in this screen. Table 186 Management > Configure Clone LABEL DESCRIPTION Source/ Enter the source port under the Source label. This port’s attributes are copied. Destination Enter the destination port or ports under the Destination label.
  • Page 354 Chapter 48 Configure Clone Table 186 Management > Configure Clone (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 355: Ipv6 Neighbor Table

    Chapter 49 IPv6 Neighbor Table H A P T E R IPv6 Neighbor Table 49.1 IPv6 Neighbor Table Overview This chapter introduces the IPv6 neighbor table. An IPv6 host is required to have a neighbor table. If there is an address to be resolved or verified, the Switch sends out a neighbor solicitation message.
  • Page 356 Chapter 49 IPv6 Neighbor Table The following table describes the labels in this screen. Table 187 Management > IPv6 Neighbor Table LABEL DESCRIPTION Sort by Select this to display and arrange the data according to IPv6 address (Address), MAC address (MAC) or IPv6 interface (Interface).
  • Page 357: Port Status

    H A P T E R Port Status 50.1 Overview This chapter introduces the port status screens. 50.2 Port Status This screen displays a port statistical summary with links to each port showing statistical details. To view the port statistics, click Status in all Web Configurator screens and then the Port Status link in the Quick Links section of the Status screen to display the Port Status screen as shown next.
  • Page 358: Port Details

    Chapter 50 Port Status Table 188 Management > Port Status (continued) LABEL DESCRIPTION For PoE models only. This field displays whether or not a powered device (PD) is allowed to receive power from the Switch on this port. LACP This fields displays whether LACP (Link Aggregation Control Protocol) has been enabled on the port.
  • Page 359 Chapter 50 Port Status Figure 263 Management > Port Status > Port Details The following table describes the labels in this screen. Table 189 Management > Port Status > Port Details LABEL DESCRIPTION Port Info Port NO. This field displays the port number you are viewing. Name This field displays the name of the port.
  • Page 360 Chapter 50 Port Status Table 189 Management > Port Status > Port Details (continued) LABEL DESCRIPTION This field shows the percentage of actual transmitted frames on this port as a percentage of the Utilization% Link speed. Rx kB/s This field shows the number of kilobytes per second received on this port. This field shows the percentage of actual received frames on this port as a percentage of the Link Utilization% speed.
  • Page 361: Ddmi

    Chapter 50 Port Status Table 189 Management > Port Status > Port Details (continued) LABEL DESCRIPTION 1024 to This field shows the number of packets (including bad packets) received that were between 1024 1518 and 1518 octets in length. Giant This field shows the number of packets (including bad packets) received that were between 1519 octets and the maximum frame size.
  • Page 362 Chapter 50 Port Status Figure 265 Management > Port Status > DDMI > DDMI Details The following table describes the labels in this screen. Table 191 Management > Port Status > DDMI > DDMI Details LABEL DESCRIPTION Transceiver Information Port No This identifies the SFP port.
  • Page 363: Port Utilization

    Chapter 50 Port Status Table 191 Management > Port Status > DDMI > DDMI Details (continued) LABEL DESCRIPTION Current This displays the current status for each monitored DDMI parameter. High Alarm This displays the high value alarm threshold for each monitored DDMI parameter. An alarm Threshold signal is reported to the Switch if the monitored DDMI parameter reaches this value.
  • Page 364: Troubleshooting And Appendices

    Troubleshooting and Appendices...
  • Page 365: Troubleshooting

    H A P T E R Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Switch Access and Login • Switch Configuration 51.1 Power, Hardware Connections, and LEDs The Switch does not turn on.
  • Page 366: Switch Access And Login

    Chapter 51 Troubleshooting 51.2 Switch Access and Login I forgot the IP address for the Switch. The default IP address is http://DHCP-assigned IP (when connecting to a DHCP server) or 192.168.1.1. Use the NCC (Nebula Control Center) or the ZON utility to find the IP address. The Switch must be registered and added to a site in Nebula in order for it to be managed using Nebula.
  • Page 367 Chapter 51 Troubleshooting If the problem continues, contact the vendor, or try the advanced suggestion. Advanced Suggestion • Try to access the Switch using another service, such as Telnet. If you can access the Switch, check the remote management settings to find out why the Switch does not respond to HTTP. I can see the Login screen, but I cannot log in to the Switch.
  • Page 368: Switch Configuration

    Chapter 51 Troubleshooting 51.3 Switch Configuration I lost my configuration settings after I restart the Switch. Make sure you save your configuration into the Switch’s non-volatile memory each time you make changes. Click Save at the top right of the Web Configurator to save the configuration permanently.
  • Page 369: Appendix A Customer Support

    • Brief description of the problem and the steps you took to solve it. Corporate Headquarters (Worldwide) Taiwan • Zyxel Communications Corporation • https://www.zyxel.com Asia China • Zyxel Communications (Shanghai) Corp. Zyxel Communications (Beijing) Corp. Zyxel Communications (Tianjin) Corp. • https://www.zyxel.com/cn/zh/ India • Zyxel Technology India Pvt Ltd. • https://www.zyxel.com/in/en/ Kazakhstan •...
  • Page 370 • http://www.zyxel.com.sg Taiwan • Zyxel Communications Corporation • https://www.zyxel.com/tw/zh/ Thailand • Zyxel Thailand Co., Ltd. • https://www.zyxel.com/th/th/ Vietnam • Zyxel Communications Corporation-Vietnam Office • https://www.zyxel.com/vn/vi Europe Belarus • Zyxel BY • https://www.zyxel.by Bulgaria • Zyxel България XS1930 Series User’s Guide...
  • Page 371 Appendix A Customer Support • https://www.zyxel.com/bg/bg/ Czech Republic • Zyxel Communications Czech s.r.o • https://www.zyxel.com/cz/cs/ Denmark • Zyxel Communications A/S • https://www.zyxel.com/dk/da/ Finland • Zyxel Communications • https://www.zyxel.com/fi/fi/ France • Zyxel France • https://www.zyxel.fr Germany • Zyxel Deutschland GmbH • https://www.zyxel.com/de/de/ Hungary •...
  • Page 372 Appendix A Customer Support Romania • Zyxel Romania • https://www.zyxel.com/ro/ro Russia • Zyxel Russia • https://www.zyxel.com/ru/ru/ Slovakia • Zyxel Communications Czech s.r.o. organizacna zlozka • https://www.zyxel.com/sk/sk/ Spain • Zyxel Communications ES Ltd. • https://www.zyxel.com/es/es/ Sweden • Zyxel Communications • https://www.zyxel.com/se/sv/ Switzerland •...
  • Page 373 Ecuador • Zyxel Communications Corporation • https://www.zyxel.com/co/es/ South America • Zyxel Communications Corporation • https://www.zyxel.com/co/es/ Middle East Israel • Zyxel Communications Corporation • http://il.zyxel.com/ North America • Zyxel Communications, Inc. – North America Headquarters • https://www.zyxel.com/us/en/ XS1930 Series User’s Guide...
  • Page 374: Appendix B Common Services

    P P E N D I X Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type or code numbers and services, visit the IANA (Internet Assigned Number Authority) web site.
  • Page 375 Appendix B Common Services Table 193 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION HTTPS HTTPS is a secured http session often used in e- commerce. ICMP User-Defined Internet Control Message Protocol is often used for diagnostic or routing purposes. 4000 This is a popular Internet chat program.
  • Page 376 Appendix B Common Services Table 193 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SQL-NET 1521 Structured Query Language is an interface to access data on many different types of database systems, including mainframes, midrange systems, UNIX systems and network servers.
  • Page 377: Appendix C Ipv6

    P P E N D I X IPv6 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 10 IP addresses.
  • Page 378 Appendix C IPv6 Unspecified Address An unspecified address (0:0:0:0:0:0:0:0 or ::) is used as the source address when a device does not have its own address. It is similar to “0.0.0.0” in IPv4. Loopback Address A loopback address (0:0:0:0:0:0:0:1 or ::1) allows a host to send packets to itself. It is similar to “127.0.0.1” in IPv4.
  • Page 379 Appendix C IPv6 Subnet Masking Both an IPv6 address and IPv6 subnet mask compose of 128-bit binary digits, which are divided into eight 16-bit blocks and written in hexadecimal notation. Hexadecimal uses 4 bits for each character (1 – 10, A – F). Each block’s 16 bits are then represented by 4 hexadecimal characters. For example, FFFF:FFFF:FFFF:FFFF:FC00:0000:0000:0000.
  • Page 380 Appendix C IPv6 client may send a Renew or Rebind message at the client's discretion. Renew Renew Renew Rebind to S1 to S1 to S1 to S2 Renew Renew Renew Rebind to S1 to S1 to S1 to S2 DHCP Relay Agent A DHCP relay agent is on the same network as the DHCP clients and helps forward messages between the DHCP server and clients.
  • Page 381 Appendix C IPv6 forward packets. • Router advertisement: A response to a router solicitation or a periodical multicast advertisement from a router to advertise its presence and other parameters. IPv6 Cache An IPv6 host is required to have a neighbor cache, destination cache, prefix list and default router list. The Switch maintains and updates its IPv6 caches constantly using the information from response messages.
  • Page 382 Appendix C IPv6 Example – Enabling IPv6 on Windows XP/2003/Vista By default, Windows XP and Windows 2003 support IPv6. This example shows you how to use the ipv6 install command on Windows XP or 2003 to enable IPv6. This also displays how to use the ipconfig command to see auto-generated IP addresses.
  • Page 383 Appendix C IPv6 Click Start and then OK. Now your computer can obtain an IPv6 address from a DHCPv6 server. Example – Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default. DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer.
  • Page 384 Appendix C IPv6 Click Close to exit the Local Area Connection Status screen. Select Start > All Programs > Accessories > Command Prompt. Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address (2001:b021:2d::1000) obtained from a DHCP server. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection:...
  • Page 385 Appendix C IPv6 Select the Internet Protocol Version 6 (TCP/IPv6) check box to enable it. Click OK to save the changes for the selected network adapter. Click OK to exit the selected network adapter Properties screen. Example – Enabling DHCPv6 on Windows 10 Windows 10 supports DHCPv6 by default.
  • Page 386: Appendix D Legal Information

    Regulatory Notice and Statement United States of America The following information applies if you use the product within USA area. US Importer: Zyxel Communications, Inc, 1130 North Miller Street Anaheim, CA92806-2001, https://www.zyxel.com/us/en/ Federal Communications Commission (FCC) EMC Statement • This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference.
  • Page 387 Appendix D Legal Information List of National Codes COUNTRY ISO 3166 2 LETTER CODE COUNTRY ISO 3166 2 LETTER CODE Austria Liechtenstein Belgium Lithuania Bulgaria Luxembourg Croatia Malta Cyprus Netherlands Czech Republic Norway Denmark Poland Estonia Portugal Finland Romania France Serbia Germany Slovakia...
  • Page 388 Appendix D Legal Information • PRODUCT COMPLIES WITH 21 CFR 1040.10 AND 1040.11. • PRODUIT CONFORME SELON 21 CFR 1040.10 ET 1040.11. Important Safety Instructions Warning! Energy Hazard. Remove all metal jewelry, watches, and so on from your hands and wrists before serving this device.
  • Page 389 Appendix D Legal Information 台灣 以下訊息僅適用於產品銷售至台灣地區 • 這是甲類的資訊產品,在居住的環境中使用時,可能會造成射頻干擾,在這種情況下,使用者會被要求採取某些適當的對策。」 安全警告 – 為了您的安全,請先閱讀以下警告及指示 : • 請勿將此產品接近水、火焰或放置在高溫的環境。 • 避免設備接觸 – 任何液體 - 切勿讓設備接觸水、雨水、高濕度、污水腐蝕性的液體或其他水份。 – 灰塵及污物 - 切勿接觸灰塵、污物、沙土、食物或其他不合適的材料。 • 雷雨天氣時,不要安裝,使用或維修此設備。有遭受電擊的風險。 • 切勿重摔或撞擊設備,並勿使用不正確的電源變壓器。 • 若接上不正確的電源變壓器會有爆炸的風險。 • 請勿隨意更換產品內的電池。 • 如果更換不正確之電池型式,會有爆炸的風險,請依製造商說明書處理使用過之電池。 • 請將廢電池丟棄在適當的電器或電子設備回收處。 • 請勿將設備解體。 • 請勿阻礙設備的散熱孔,空氣對流不足將會造成設備損害。 •...
  • Page 390 Appendix D Legal Information Explanation of the Symbols SYMBOL EXPLANATION Alternating current (AC): AC is an electric current in which the flow of electric charge periodically reverses direction. Direct current (DC): DC if the unidirectional flow or movement of electric charge carriers. Earth;...
  • Page 391: Index

    Index Index Numbers fiber uplink IEEE 802.1Q VLAN 10 Gigabit port switched workgroup requirement for maximum performance 802.1P priority how it works learning mode overview setup ARP (Address Resolution Protocol) ARP Learning screen accounting ARP Setup screen authentication ARP Table screen authorization ARP-Reply external server...
  • Page 392 Index basic setup tutorial cluster member firmware upgrade network example Basic TLV Setting screen setup BPDUs specification Bridge Protocol Data Units (BPDUs) status broadcast storm control switch models Wizard Web Configurator Cluster Management Configuration screen cluster manager Common and Internal Spanning Tree, see CIST cable type configuration bandwidth capacity...
  • Page 393 Index modes Relay Agent Information format dual firmware images setup dust plug DHCP Option 82 Profile screen Dynamic Host Configuration Protocol for IPv6 DHCP relay (DHCPv6) configure dynamic link aggregation tutorial DHCP relay agent DHCP relay option 82 DHCP Relay screen 281, 283 DHCP screen egress port...
  • Page 394 Index command example filename convention, configuration file names hardware installation filtering hardware monitor rules Hardware Monitor screen filtering database, MAC table hardware overview Filtering screen hello time firmware hops upgrade 298, 340 HTTPS ZyNOS certificates Firmware Upgrade screen implementation flow control public keys, private keys back pressure HTTPS Certificates screen...
  • Page 395 Index desktop status freestanding IPv6 Interface Setup screen rack-mounting IPv6 Interface Status screen transceiver IPv6 Link-Local Address Setup screen installation scenarios IPv6 Neighbor Setup screen Interface Setup screen IPv6 Neighbor Table screen Internet Protocol version 6, see IPv6 IPv6 screen IPv6 static route configuration configuration...
  • Page 396 Index traffic distribution type trunk group link aggregation (trunking) MAC (Media Access Control) example MAC address 85, 347 Link Aggregation Control Protocol (LACP) maximum number per port Link Aggregation screen MAC address learning 89, 178 Wizard specify limit Link Layer Discovery Protocol MAC table LLDP display criteria...
  • Page 397 Index mirroring ports Nebula Switch Registration screen models Nebula web portal XS1930 Neighbor Detail screen monitor port Neighbor Discovery Protocol (NDP) mounting brackets Neighbor screen attaching network applications MST Instance, see MSTI network management system (NMS) MST region NTP (RFC-1305) MSTI MSTP bridge ID...
  • Page 398 Index PoE Status screen all connected configure PoE Time Range Setup screen port isolation PoE type settings wizard policy ports and classifier diagnostics and DiffServ mirroring configuration speed/duplex example standby overview power rules maximum per port port voltage maximum power power connections setup voltage range...
  • Page 399 Index queuing method 194, 196 safety precautions using the Switch safety warnings save configuration 66, 296 rack-mounting installation requirements Save link precautions schedule RADIUS one-time 206, 307 advantages recurring setup type Rapid Spanning Tree Protocol (RSTP) Secure Shell, see SSH rear panel service access control service port...
  • Page 400 Index subnet masking encryption methods Switch how it works DHCP client implementation fanless-type usage precaution SSH (Secure Shell) fan-type usage precaution SSL (Secure Socket Layer) switch lockout standby ports Switch reset static MAC address Switch Setup screen static MAC forwarding Switch’s QR code Static MAC Forwarding screen syslog...
  • Page 401 Index Trap Group screen and IGMP snooping automatic registration traps creation 68, 73 destination troubleshooting ingress filtering trunk group introduction 88, 119 Trunk Tagged port number of VLANs trunking port number trusted ports port settings DHCP snooping port-based PPPoE IA port-based VLAN port-based, isolation tutorial...
  • Page 402 Index getting help home home screen login logout navigating components navigation panel online help usage prerequisite weight Windows OS version check WRR (Weighted Round Robin Scheduling) ZON Utility compatible OS fields description icon description installation requirements introduction minimum hardware requirements network adapter select password prompt supported firmware version...

This manual is also suitable for:

Xs1930-12hpXs1930 seriesXs1930-10

Table of Contents