Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Switch
ES-3124 - V3.80
ZyXEL Communications ES-3124 - V3.80 Manuals
Manuals and User Guides for ZyXEL Communications ES-3124 - V3.80. We have
1
ZyXEL Communications ES-3124 - V3.80 manual available for free PDF download: User Manual
ZyXEL Communications ES-3124 - V3.80 User Manual (368 pages)
ES-3124 Series Intelligent Layer 2+ Switch
Brand:
ZyXEL Communications
| Category:
Switch
| Size: 14.78 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
21
List of Tables
27
Introduction
31
PART I Introduction
31
Chapter 1 Introducing the Switch
33
Overview
33
Backbone Application
33
Table 1 Model-Specific Features
33
Bridging Example
34
Figure 1 Backbone Application
34
Figure 2 Bridging Application
34
High-Performance Switched Example
35
IEEE 802.1Q VLAN Application Examples
35
Figure 3 High-Performance Switched Application
35
Ways to Manage the Switch
36
Figure 4 Tag-Based VLAN Application
36
Figure 5 Shared Server Using VLAN Example
36
Good Habits for Managing the Switch
37
Hardware
39
Part II: Hardware
39
Chapter 2 Hardware Installation and Connection
41
Freestanding Installation
41
Figure 6 Attaching Rubber Feet
41
Mounting the Switch on a Rack
42
Rack-Mounted Installation Requirements
42
Attaching the Mounting Brackets to the Switch
42
Figure 7 Attaching the Mounting Brackets
42
Mounting the Switch on a Rack
43
Figure 8 Mounting the Switch on a Rack
43
Hardware Overview
45
Chapter 3 Hardware Overview
45
Panel Connections
45
Figure 10 Front Panel: ES-3124-4F
45
Figure 9 Front Panel: ES-3124
45
Figure 11 Front Panel: ES-3124PWR
46
Figure 12 Front Panel: ES-3124F
46
Table 2 Panel Connections
46
Console Port
47
Ethernet Ports
47
Figure 13 Transceiver Installation Example
48
Transceiver Slots
48
Rear Panel
49
Figure 14 Installed Transceiver
49
Figure 15 Opening the Transceiver's Latch Example
49
Figure 16 Transceiver Removal Example
49
Figure 17 Rear Panel (AC Models)
49
External Backup Power Supply Connector
50
Power Connector
50
Leds
50
Figure 18 Rear Panel (DC Models)
50
Table 3 Leds
50
Web Configurator
53
Part III: Web Configurator
53
Chapter 4 The Web Configurator
55
Introduction
55
System Login
55
The Status Screen
56
Figure 19 Web Configurator: Login
56
Figure 20 Web Configurator Home Screen (Status)
56
Table 4 Navigation Panel Sub-Links Overview
57
Table 5 Web Configurator Screen Sub-Links Details
58
Table 6 Navigation Panel Links
59
Change Your Password
61
Saving Your Configuration
61
Figure 21 Change Administrator Login Password
61
Switch Lockout
62
Resetting the Switch
62
Reload the Configuration File
62
Logging out of the Web Configurator
63
Figure 22 Resetting the Switch: Via the Console Port
63
Figure 23 Web Configurator: Logout Screen
63
Help
64
Chapter 5 Initial Setup Example
65
Overview
65
Creating a VLAN
65
Figure 24 Initial Setup Network Example: VLAN
65
Setting Port VID
66
Figure 25 Initial Setup Network Example: Port VID
66
Configuring Switch Management IP Address
67
Figure 26 Initial Setup Example: Management IP Address
67
Chapter 6 System Status and Port Statistics
69
Overview
69
Port Status Summary
69
Figure 27 Status
69
Table 7 Status
69
Status: Port Details
70
Figure 28 Status: Port Details
71
Table 8 Status > Port Details
71
Basic Setting
75
Chapter 7 Basic Setting
75
Overview
75
System Information
75
Figure 29 Basic Setting > System Info
76
Table 9 Basic Setting > System Info
76
General Setup
77
Figure 30 Basic Setting > General Setup
78
Table 10 Basic Setting > General Setup
78
Introduction to Vlans
79
Switch Setup Screen
80
Figure 31 Basic Setting > Switch Setup
80
Table 11 Basic Setting > Switch Setup
80
IP Setup
82
IP Interfaces
82
Figure 32 Basic Setting > IP Setup
82
Table 12 Basic Setting > IP Setup
83
Port Setup
84
Figure 33 Basic Setting > Port Setup
84
Table 13 Basic Setting > Port Setup
85
Vlan
87
Chapter 8 VLAN
87
Introduction to IEEE 802.1Q Tagged Vlans
87
Forwarding Tagged and Untagged Frames
87
Automatic VLAN Registration
88
Garp
88
Gvrp
88
Table 14 IEEE 802.1Q VLAN Terminology
88
Port VLAN Trunking
89
Select the VLAN Type
89
Static VLAN
89
Figure 34 Port VLAN Trunking
89
Figure 35 Switch Setup: Select VLAN Type
89
Figure 36 Advanced Application > VLAN: VLAN Status
90
Figure 37 Advanced Application > VLAN > VLAN Detail
90
Static VLAN Details
90
Static VLAN Status
90
Table 15 Advanced Application > VLAN: VLAN Status
90
Configure a Static VLAN
91
Figure 38 Advanced Application > VLAN > Static VLAN
91
Table 16 Advanced Application > VLAN > VLAN Detail
91
Configure VLAN Port Settings
92
Table 17 Advanced Application > VLAN > Static VLAN
92
Figure 39 Advanced Application > VLAN > VLAN Port Setting
93
Table 18 Advanced Application > VLAN > VLAN Port Setting
93
Subnet Based Vlans
94
Figure 40 Subnet Based VLAN Application Example
94
Configuring Subnet Based VLAN
95
Figure 41 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN
95
Table 19 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN Setup
95
Protocol Based Vlans
96
Configuring Protocol Based VLAN
97
Figure 42 Protocol Based VLAN Application Example
97
Figure 43 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN
98
Table 20 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN Setup
98
Create an IP-Based VLAN Example
99
Figure 44 Protocol Based VLAN Configuration Example
99
Port-Based VLAN Setup
100
Configure a Port-Based VLAN
100
Figure 45 Advanced Application > VLAN: Port Based VLAN Setup (All Connected)
101
Figure 46 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation)
102
Table 21 Advanced Application > VLAN: Port Based VLAN Setup
103
Chapter 9 Static MAC Forward Setup
105
Overview
105
Configuring Static MAC Forwarding
105
Figure 47 Advanced Application > Static MAC Forwarding
105
Table 22 Advanced Application > Static MAC Forwarding
106
Filtering
107
Chapter 10 Filtering
107
Configure a Filtering Rule
107
Figure 48 Advanced Application > Filtering
107
Table 23 Advanced Application > Filtering
107
Chapter 11 Spanning Tree Protocol
109
STP/RSTP Overview
109
STP Terminology
109
How STP Works
110
Table 24 STP Path Costs
110
STP Port States
111
Multiple RSTP
111
Figure 49 MRSTP Network Example
111
Table 25 STP Port States
111
Multiple STP
112
Figure 50 STP/RSTP Network Example
112
Figure 51 MSTP Network Example
113
Spanning Tree Protocol Status Screen
114
Figure 52 Mstis in Different Regions
114
Figure 53 MSTP and Legacy RSTP Network Example
114
Spanning Tree Configuration
115
Figure 54 Advanced Application > Spanning Tree Protocol
115
Figure 55 Advanced Application > Spanning Tree Protocol > Configuration
115
Table 26 Advanced Application > Spanning Tree Protocol > Configuration
115
Configure Rapid Spanning Tree Protocol
116
Figure 56 Advanced Application > Spanning Tree Protocol > RSTP
116
Table 27 Advanced Application > Spanning Tree Protocol > RSTP
116
Rapid Spanning Tree Protocol Status
117
Figure 57 Advanced Application > Spanning Tree Protocol > Status: RSTP
118
Table 28 Advanced Application > Spanning Tree Protocol > Status: RSTP
118
Configure Multiple Rapid Spanning Tree Protocol
119
Figure 58 Advanced Application > Spanning Tree Protocol > MRSTP
119
Table 29 Advanced Application > Spanning Tree Protocol > MRSTP
119
Multiple Rapid Spanning Tree Protocol Status
120
Figure 59 Advanced Application > Spanning Tree Protocol > Status: MRSTP
121
Table 30 Advanced Application > Spanning Tree Protocol > Status: MRSTP
121
Configure Multiple Spanning Tree Protocol
122
Figure 60 Advanced Application > Spanning Tree Protocol > MSTP
122
Table 31 Advanced Application > Spanning Tree Protocol > MSTP
123
Multiple Spanning Tree Protocol Status
124
Figure 61 Advanced Application > Spanning Tree Protocol > Status: MSTP
125
Table 32 Advanced Application > Spanning Tree Protocol > Status: MSTP
125
Bandwidth Control
127
Chapter 12 Bandwidth Control
127
Bandwidth Control Overview
127
CIR and PIR
127
Bandwidth Control Setup
127
Figure 62 Advanced Application > Bandwidth Control
128
Table 33 Advanced Application > Bandwidth Control
128
Chapter 13 Broadcast Storm Control
129
Broadcast Storm Control Setup
129
Figure 63 Advanced Application > Broadcast Storm Control
129
Table 34 Advanced Application > Broadcast Storm Control
130
Mirroring
131
Chapter 14 Mirroring
131
Port Mirroring Setup
131
Figure 64 Advanced Application > Mirroring
131
Table 35 Advanced Application > Mirroring
132
Link Aggregation
133
Chapter 15 Link Aggregation
133
Link Aggregation Overview
133
Dynamic Link Aggregation
133
Link Aggregation ID
134
Link Aggregation Status
134
Figure 65 Advanced Application > Link Aggregation Status
134
Table 36 Link Aggregation ID: Local Switch
134
Table 37 Link Aggregation ID: Peer Switch
134
Table 38 Advanced Application > Link Aggregation Status
134
Link Aggregation Setting
135
Figure 66 Advanced Application > Link Aggregation > Link Aggregation Setting
135
Link Aggregation Control Protocol
136
Table 39 Advanced Application > Link Aggregation > Link Aggregation Setting
136
Figure 67 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP
137
Table 40 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP
137
Static Trunking Example
138
Figure 68 Trunking Example - Physical Connections
138
Figure 69 Trunking Example - Configuration Screen
139
Port Authentication
141
Chapter 16 Port Authentication
141
Port Authentication Overview
141
IEEE 802.1X Authentication
141
MAC Authentication
142
Figure 70 IEEE 802.1X Authentication Process
142
Figure 71 MAC Authentication Process
142
Port Authentication Configuration
143
Activate IEEE 802.1X Security
143
Figure 72 Advanced Application > Port Authentication
143
Figure 73 Advanced Application > Port Authentication > 802.1X
143
Activate MAC Authentication
144
Table 41 Advanced Application > Port Authentication > 802.1X
144
Figure 74 Advanced Application > Port Authentication > MAC Authentication
145
Table 42 Advanced Application > Port Authentication > MAC Authentication
145
Port Security
147
Chapter 17 Port Security
147
About Port Security
147
Port Security Setup
147
Figure 75 Advanced Application > Port Security
148
Table 43 Advanced Application > Port Security
148
Classifier
151
Chapter 18 Classifier
151
About the Classifier and Qos
151
Configuring the Classifier
151
Figure 76 Advanced Application > Classifier
152
Table 44 Advanced Application > Classifier
152
Viewing and Editing Classifier Configuration
154
Figure 77 Advanced Application > Classifier: Summary Table
154
Table 45 Classifier: Summary Table
154
Table 46 Common Ethernet Types and Protocol Number
154
Classifier Example
155
Table 47 Common IP Protocol Types and Protocol Numbers
155
Table 48 Common TCP and UDP Port Numbers
155
Figure 78 Classifier: Example
156
Policy Rule
157
Chapter 19 Policy Rule
157
Policy Rules Overview
157
Diffserv
157
DSCP and Per-Hop Behavior
157
Configuring Policy Rules
158
Figure 79 Advanced Application > Policy Rule
158
Table 49 Advanced Application > Policy Rule
159
Viewing and Editing Policy Configuration
160
Figure 80 Advanced Application > Policy Rule: Summary Table
160
Table 50 Policy: Summary Table
160
Policy Example
161
Figure 81 Policy Example
161
Queuing Method
163
Chapter 20 Queuing Method
163
Queuing Method Overview
163
Strictly Priority
163
Weighted Fair Queuing
163
Weighted Round Robin Scheduling (WRR)
164
Configuring Queuing
164
Figure 82 Advanced Application > Queuing Method
164
Table 51 Advanced Application > Queuing Method
165
VLAN Stacking
167
Chapter 21 VLAN Stacking
167
VLAN Stacking Overview
167
VLAN Stacking Example
167
VLAN Stacking Port Roles
168
Figure 83 VLAN Stacking Example
168
VLAN Tag Format
169
Frame Format
169
Table 52 VLAN Tag Format
169
Table 53 Single and Double Tagged 802.11Q Frame Format
169
Table 54 802.1Q Frame
169
Configuring VLAN Stacking
170
Figure 84 Advanced Application > VLAN Stacking
170
Table 55 Advanced Application > VLAN Stacking
170
Multicast
173
Chapter 22 Multicast
173
Multicast Overview
173
IP Multicast Addresses
173
IGMP Filtering
173
IGMP Snooping
173
IGMP Snooping and Vlans
174
Multicast Status
174
Multicast Setting
174
Figure 85 Advanced Application > Multicast
174
Table 56 Multicast Status
174
Figure 86 Advanced Application > Multicast > Multicast Setting
175
Table 57 Advanced Application > Multicast > Multicast Setting
175
IGMP Snooping VLAN
176
Figure 87 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
177
Table 58 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
177
IGMP Filtering Profile
178
Figure 88 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
178
Table 59 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
178
MVR Overview
179
Types of MVR Ports
179
Figure 89 MVR Network Example
179
MVR Modes
180
How MVR Works
180
General MVR Configuration
180
Figure 90 MVR Multicast Television Example
180
Figure 91 Advanced Application > Multicast > Multicast Setting > MVR
181
Table 60 Advanced Application > Multicast > Multicast Setting > MVR
181
MVR Group Configuration
182
MVR Configuration Example
183
Figure 92 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
183
Table 61 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
183
Figure 93 MVR Configuration Example
184
Figure 94 MVR Configuration Example
184
Figure 95 MVR Group Configuration Example
185
Figure 96 MVR Group Configuration Example
185
Chapter 23 Authentication & Accounting
187
Authentication, Authorization and Accounting
187
Local User Accounts
187
Figure 97 AAA Server
187
RADIUS and TACACS
188
Authentication and Accounting Screens
188
RADIUS Server Setup
188
Figure 98 Advanced Application > Auth and Acct
188
Table 62 RADIUS Vs TACACS
188
Figure 99 Advanced Application > Auth and Acct > RADIUS Server Setup
189
Table 63 Advanced Application > Auth and Acct > RADIUS Server Setup
189
TACACS+ Server Setup
190
Figure 100 Advanced Application > Auth and Acct > TACACS+ Server Setup
191
Table 64 Advanced Application > Auth and Acct > TACACS+ Server Setup
191
Authentication and Accounting Setup
192
Figure 101 Advanced Application > Auth and Acct > Auth and Acct Setup
193
Table 65 Advanced Application > Auth and Acct > Auth and Acct Setup
193
Vendor Specific Attribute
195
Table 66 Supported Vsas
195
Supported RADIUS Attributes
196
Table 67 Supported Tunnel Protocol Attribute
196
Attributes Used for Accounting
197
Attributes Used for Authentication
197
Table 68 RADIUS Attributes - Exec Events Via Console
198
Table 69 RADIUS Attributes - Exec Events Via Telnet/Ssh
198
Table 70 RADIUS Attributes - Exec Events Via Console
198
IP Source Guard
201
Chapter 24 IP Source Guard
201
IP Source Guard Overview
201
DHCP Snooping Overview
201
Figure 102 DHCP Snooping Database File Format
202
ARP Inspection Overview
203
Figure 103 Example: Man-In-The-Middle Attack
203
IP Source Guard
205
IP Source Guard Static Binding
205
Figure 104 Advanced Application > IP Source Guard
205
Table 71 Advanced Application > IP Source Guard
205
Figure 105 Advanced Application > IP Source Guard > Static Binding
206
Table 72 Advanced Application > IP Source Guard > Static Binding
206
DHCP Snooping
207
Figure 106 Advanced Application > IP Source Guard > DHCP Snooping
207
Table 73 Advanced Application > IP Source Guard > DHCP Snooping
208
DHCP Snooping Configure
210
Figure 107 Advanced Application > IP Source Guard > DHCP Snooping > Configure
210
Table 74 Advanced Application > IP Source Guard > DHCP Snooping > Configure
210
DHCP Snooping Port Configure
211
Figure 108 Advanced Application > IP Source Guard > DHCP Snooping > Configure > Port
212
Table 75 Advanced Application > IP Source Guard > DHCP Snooping > Configure > Port
212
DHCP Snooping VLAN Configure
213
Figure 109 Advanced Application > IP Source Guard > DHCP Snooping > Configure > VLAN
213
Table 76 Advanced Application > IP Source Guard > DHCP Snooping > Configure > VLAN
213
ARP Inspection Status
214
ARP Inspection VLAN Status
214
Figure 110 Advanced Application > IP Source Guard > ARP Inspection
214
Table 77 Advanced Application > IP Source Guard > ARP Inspection
214
ARP Inspection Log Status
215
Figure 111 ARP Inspection VLAN Status
215
Table 78 ARP Inspection VLAN Status
215
Figure 112 Advanced Application > IP Source Guard > ARP Inspection > Log Status
216
Table 79 Advanced Application > IP Source Guard > ARP Inspection > Log Status
216
ARP Inspection Configure
217
Figure 113 Advanced Application > IP Source Guard > ARP Inspection > Configure
217
Table 80 Advanced Application > IP Source Guard > ARP Inspection > Configure
217
ARP Inspection Port Configure
218
Figure 114 Advanced Application > IP Source Guard > ARP Inspection > Configure > Port
218
ARP Inspection VLAN Configure
219
Figure 115 Advanced Application > IP Source Guard > ARP Inspection > Configure > VLAN
219
Table 81 Advanced Application > IP Source Guard > ARP Inspection > Configure > Port
219
Table 82 Advanced Application > IP Source Guard > ARP Inspection > Configure > VLAN
220
Loop Guard
221
Chapter 25 Loop Guard
221
Loop Guard Overview
221
Figure 116 Loop Guard Vs STP
221
Figure 117 Switch in Loop State
222
Figure 118 Loop Guard - Probe Packet
222
Figure 119 Loop Guard - Network Loop
222
Loop Guard Setup
223
Figure 120 Advanced Application > Loop Guard
223
Table 83 Advanced Application > Loop Guard
223
Static Routing
225
Chapter 26 Static Routing
225
Configuring Static Routing
225
Figure 121 IP Application > Static Routing
225
Table 84 IP Application > Static Routing
225
Chapter 27 Differentiated Services
227
Diffserv Overview
227
DSCP and Per-Hop Behavior
227
Figure 122 Diffserv: Differentiated Service Field
227
Diffserv Network Example
228
Two Rate Three Color Marker Traffic Policing
228
Figure 123 Diffserv Network
228
Figure 124 TRTCM - Color-Blind Mode
229
Figure 125 TRTCM - Color-Aware Mode
229
TRTCM - Color-Aware Mode
229
TRTCM - Color-Blind Mode
229
Activating Diffserv
230
Configuring 2-Rate 3 Color Marker Settings
230
Figure 126 IP Application > Diffserv
230
Table 85 IP Application > Diffserv
230
Figure 127 IP Application > Diffserv > 2-Rate 3 Color Marker
231
Table 86 IP Application > Diffserv > 2-Rate 3 Color Marker
231
DSCP-To-IEEE 802.1P Priority Settings
232
Configuring DSCP Settings
232
Figure 128 IP Application > Diffserv > DSCP Setting
232
Table 87 Default DSCP-IEEE 802.1P Mapping
232
Table 88 IP Application > Diffserv > DSCP Setting
233
Dhcp
235
Chapter 28 DHCP
235
DHCP Overview
235
DHCP Modes
235
DHCP Configuration Options
235
DHCP Status
235
DHCP Relay
236
DHCP Relay Agent Information
236
Figure 129 IP Application > DHCP Status
236
Table 89 IP Application > DHCP Status
236
Configuring DHCP Global Relay
237
Figure 130 IP Application > DHCP > Global
237
Table 90 Relay Agent Information
237
Table 91 IP Application > DHCP > Global
237
Global DHCP Relay Configuration Example
238
Configuring DHCP VLAN Settings
238
Figure 131 Global DHCP Relay Network Example
238
Figure 132 DHCP Relay Configuration Example
238
Figure 133 IP Application > DHCP > VLAN
239
Table 92 IP Application > DHCP > VLAN
239
Example: DHCP Relay for Two Vlans
240
Figure 134 DHCP Relay for Two Vlans
240
Figure 135 DHCP Relay for Two Vlans Configuration Example
240
Maintenance
241
Chapter 29 Maintenance
241
The Maintenance Screen
241
Figure 136 Management > Maintenance
241
Table 93 Management > Maintenance
241
Load Factory Default
242
Save Configuration
242
Figure 137 Load Factory Default: Start
242
Reboot System
243
Firmware Upgrade
243
Figure 138 Reboot System: Confirmation
243
Figure 139 Management > Maintenance > Firmware Upgrade
243
Restore a Configuration File
244
Backup a Configuration File
244
Figure 140 Management > Maintenance > Restore Configuration
244
Figure 141 Management > Maintenance > Backup Configuration
244
FTP Command Line
245
Filename Conventions
245
FTP Command Line Procedure
245
Table 94 Filename Conventions
245
GUI-Based FTP Clients
246
FTP Restrictions
246
Table 95 General Commands for GUI-Based FTP Clients
246
Access Control
247
Chapter 30 Access Control
247
Access Control Overview
247
The Access Control Main Screen
247
Figure 142 Management > Access Control
247
Table 96 Access Control Overview
247
About SNMP
248
Figure 143 SNMP Management Model
248
Table 97 SNMP Commands
248
SNMP Traps
249
SNMP V3 and Security
249
Supported Mibs
249
Table 98 Object ID by Model
249
Table 99 SNMP System Traps
249
Table 100 SNMP Interface Traps
252
Table 101 AAA Traps
253
Table 102 SNMP IP Traps
254
Table 103 SNMP Switch Traps
254
Configuring SNMP
255
Figure 144 Management > Access Control > SNMP
255
Table 104 Management > Access Control > SNMP
256
Configuring SNMP Trap Group
257
Figure 145 Management > Access Control > SNMP > Trap Group
257
Setting up Login Accounts
258
Table 105 Management > Access Control > SNMP > Trap Group
258
Figure 146 Management > Access Control > Logins
259
Table 106 Management > Access Control > Logins
259
SSH Overview
260
How SSH Works
260
Figure 147 SSH Communication Example
260
Figure 148 How SSH Works
260
SSH Implementation on the Switch
261
Requirements for Using SSH
261
Introduction to HTTPS
261
HTTPS Example
262
Internet Explorer Warning Messages
262
Figure 149 HTTPS Implementation
262
Figure 150 Security Alert Dialog Box (Internet Explorer)
262
Netscape Navigator Warning Messages
263
The Main Screen
263
Figure 151 Security Certificate 1 (Netscape)
263
Figure 152 Security Certificate 2 (Netscape)
263
Service Port Access Control
264
Figure 153 Example: Lock Denoting a Secure Connection
264
Figure 154 Management > Access Control > Service Access Control
264
Remote Management
265
Figure 155 Management > Access Control > Remote Management
265
Table 107 Management > Access Control > Service Access Control
265
Table 108 Management > Access Control > Remote Management
265
Diagnostic
267
Chapter 31 Diagnostic
267
Figure 156 Management > Diagnostic
267
Table 109 Management > Diagnostic
267
Syslog
269
Chapter 32 Syslog
269
Syslog Overview
269
Syslog Setup
269
Table 110 Syslog Severity Levels
269
Syslog Server Setup
270
Figure 157 Management > Syslog
270
Table 111 Management > Syslog
270
Figure 158 Management > Syslog > Server Setup
271
Table 112 Management > Syslog > Server Setup
271
Cluster Management
273
Chapter 33 Cluster Management
273
Clustering Management Status Overview
273
Table 113 Zyxel Clustering Management Specifications
273
Cluster Management Status
274
Figure 159 Clustering Application Example
274
Figure 160 Management > Cluster Management
274
Cluster Member Switch Management
275
Figure 161 Cluster Management: Cluster Member Web Configurator Screen
275
Table 114 Management > Cluster Management
275
Clustering Management Configuration
276
Figure 162 Example: Uploading Firmware to a Cluster Member Switch
276
Table 115 FTP Upload to Cluster Member Example
276
Figure 163 Management > Clustering Management > Configuration
277
Table 116 Management > Clustering Management > Configuration
277
MAC Table
279
Chapter 34 MAC Table
279
MAC Table Overview
279
Figure 164 MAC Table Flowchart
279
Viewing the MAC Table
280
Figure 165 Management > MAC Table
280
Table 117 Management > MAC Table
280
ARP Table
281
Chapter 35 ARP Table
281
ARP Table Overview
281
How ARP Works
281
Viewing the ARP Table
281
Figure 166 Management > ARP Table
282
Table 118 Management > ARP Table
282
Configure Clone
283
Chapter 36 Configure Clone
283
Figure 167 Management > Configure Clone
283
Table 119 Management > Configure Clone
284
Troubleshooting and Specifications
285
Part IV: Troubleshooting and Specifications
285
Chapter 37 Troubleshooting
287
Power, Hardware Connections, and Leds
287
Switch Access and Login
288
Chapter 38 Product Specifications
291
General Switch Specifications
291
Table 120 Hardware and Environmental Specifications
291
Table 121 Feature Specifications
293
Table 122 Standards Supported
294
Cable Pin Assignments
296
Figure 168 Console/Dial Backup Port Pin Layout
296
Table 123 Console/Dial Backup Port Pin Assignments
296
Table 124 Ethernet Cable Pin Assignments
296
Appendices and Index
299
Part V: Appendices and Index
299
Appendix A Setting up Your Computer's IP Address
301
Figure 169 Windows 95/98/Me: Network: Configuration
302
Figure 170 Windows 95/98/Me: TCP/IP Properties: IP Address
303
Figure 171 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
304
Figure 172 Windows XP: Start Menu
305
Figure 173 Windows XP: Control Panel
305
Figure 174 Windows XP: Control Panel: Network Connections: Properties
306
Figure 175 Windows XP: Local Area Connection Properties
306
Figure 176 Windows XP: Internet Protocol (TCP/IP) Properties
307
Figure 177 Windows XP: Advanced TCP/IP Properties
308
Figure 178 Windows XP: Internet Protocol (TCP/IP) Properties
309
Figure 179 Windows Vista: Start Menu
310
Figure 180 Windows Vista: Control Panel
310
Figure 181 Windows Vista: Network and Internet
310
Figure 182 Windows Vista: Network and Sharing Center
310
Figure 183 Windows Vista: Network and Sharing Center
311
Figure 184 Windows Vista: Local Area Connection Properties
311
Figure 185 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
312
Figure 186 Windows Vista: Advanced TCP/IP Properties
313
Figure 187 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
314
Figure 188 Macintosh os 8/9: Apple Menu
315
Figure 189 Macintosh os 8/9: TCP/IP
315
Figure 190 Macintosh os X: Apple Menu
316
Figure 191 Macintosh os X: Network
317
Figure 192 Red hat 9.0: KDE: Network Configuration: Devices
318
Figure 193 Red hat 9.0: KDE: Ethernet Device: General
318
Figure 194 Red hat 9.0: KDE: Network Configuration: DNS
319
Figure 195 Red hat 9.0: KDE: Network Configuration: Activate
319
Using Configuration Files
319
Figure 196 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
320
Figure 197 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
320
Figure 198 Red hat 9.0: DNS Settings in Resolv.conf
320
Figure 199 Red hat 9.0: Restart Ethernet Card
320
Figure 200 Red hat 9.0: Checking TCP/IP Properties
321
Appendix B Pop-Up Windows, Javascripts and Java Permissions
323
Figure 201 Pop-Up Blocker
323
Figure 202 Internet Options: Privacy
324
Figure 203 Internet Options: Privacy
325
Figure 204 Pop-Up Blocker Settings
325
Figure 205 Internet Options: Security
326
Figure 206 Security Settings - Java Scripting
327
Figure 207 Security Settings - Java
327
Figure 208 Java (Sun)
328
Figure 209 Mozilla Firefox: Tools > Options
329
Figure 210 Mozilla Firefox Content Security
329
Appendix C IP Addresses and Subnetting
331
Introduction to Ip Addresses
331
Figure 211 Network Number and Host ID
332
Table 125 IP Address Network Number and Host ID Example
332
Table 126 Subnet Masks
333
Table 127 Maximum Host Numbers
333
Table 128 Alternative Subnet Mask Notation
333
Figure 212 Subnetting Example: before Subnetting
334
Figure 213 Subnetting Example: after Subnetting
335
Table 129 Subnet 1
335
Table 130 Subnet 2
336
Table 131 Subnet 3
336
Table 132 Subnet 4
336
Table 133 Eight Subnets
336
Table 134 24-Bit Network Number Subnet Planning
337
Table 135 16-Bit Network Number Subnet Planning
337
Configuring Ip Addresses
338
Figure 214 Conflicting Computer IP Addresses Example
339
Figure 215 Conflicting Computer IP Addresses Example
339
Figure 216 Conflicting Computer and Router IP Addresses Example
340
Appendix D Common Services
341
Table 136 Commonly Used Services
341
Appendix E Importing Certificates
345
Figure 217 Security Certificate
345
Figure 218 Login Screen
346
Figure 219 Certificate General Information before Import
346
Figure 220 Certificate Import Wizard 1
347
Figure 221 Certificate Import Wizard 2
347
Figure 222 Certificate Import Wizard 3
348
Figure 223 Root Certificate Store
348
Figure 224 Certificate General Information after Import
349
Appendix F Legal Information
351
Zyxel Limited Warranty
352
Appendix G Customer Support
355
Index
361
Advertisement
Advertisement
Related Products
ZyXEL Communications Dimension ES-3124
ZyXEL Communications ES-3124F
ZyXEL Communications Dimension ES-3124PWR
ZyXEL Communications ZyXEL Dimension ES-3124-4F
ZyXEL Communications ES-3124PWR - V3.60
ZyXEL Communications ES-3124PWR/ES-3148
ZyXEL Communications ES-315
ZyXEL Communications Dimension ES-3148
ZyXEL Communications ES-315-F - QUICK GUIDE V3.70
ZyXEL Communications ES-315 - V3.70
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL