Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Switch
ES-3124PWR/ES-3148
ZyXEL Communications ES-3124PWR/ES-3148 Manuals
Manuals and User Guides for ZyXEL Communications ES-3124PWR/ES-3148. We have
1
ZyXEL Communications ES-3124PWR/ES-3148 manual available for free PDF download: User Manual
ZyXEL Communications ES-3124PWR/ES-3148 User Manual (362 pages)
ES-3148 Series Intelligent Layer 2+ Switch
Brand:
ZyXEL Communications
| Category:
Switch
| Size: 14.4 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
21
List of Tables
27
Introduction
31
PART I Introduction
31
Chapter 1 Introducing the Switch
33
Overview
33
Backbone Application
33
Figure 1 Backbone Application
33
Bridging Example
34
High-Performance Switched Example
34
Figure 2 Bridging Application
34
Figure 3 High-Performance Switched Application
34
IEEE 802.1Q VLAN Application Examples
35
Figure 4 Tag-Based VLAN Application
35
Ways to Manage the Switch
36
Good Habits for Managing the Switch
36
Figure 5 Shared Server Using VLAN Example
36
Hardware
37
Part II: Hardware
37
Chapter 2 Hardware Installation and Connection
39
Freestanding Installation
39
Figure 6 Attaching Rubber Feet
39
Mounting the Switch on a Rack
40
Rack-Mounted Installation Requirements
40
Attaching the Mounting Brackets to the Switch
40
Figure 7 Attaching the Mounting Brackets
40
Mounting the Switch on a Rack
41
Figure 8 Mounting the Switch on a Rack
41
Hardware Overview
43
Chapter 3 Hardware Overview
43
Panel Connections
43
Ethernet Ports
43
Figure 9 Front Panel
43
Table 1 Front Panel
43
Mini-GBIC Slots
44
Rear Panel
45
Figure 10 Transceiver Installation Example
45
Figure 11 Installed Transceiver
45
Figure 12 Opening the Transceiver's Latch Example
45
Figure 13 Transceiver Removal Example
45
Console Port
46
External Backup Power Supply Connector
46
Figure 14 Rear Panel
46
Table 2 Rear Panel
46
Power Connector
47
Leds
47
Table 3 Leds
47
Web Configurator
49
Part III: Web Configurator
49
Chapter 4 The Web Configurator
51
Introduction
51
System Login
51
The Status Screen
52
Figure 15 Web Configurator: Login
52
Figure 16 Web Configurator Home Screen (Status)
52
Table 4 Navigation Panel Sub-Links Overview
53
Table 5 Web Configurator Screen Sub-Links Details
55
Table 6 Navigation Panel Links
56
Change Your Password
58
Saving Your Configuration
58
Figure 17 Change Administrator Login Password
58
Switch Lockout
59
Resetting the Switch
59
Reload the Configuration File
59
Logging out of the Web Configurator
60
Figure 18 Resetting the Switch: Via the Console Port
60
Figure 19 Web Configurator: Logout Screen
60
Help
61
Chapter 5 Initial Setup Example
63
Overview
63
Creating a VLAN
63
Figure 20 Initial Setup Network Example: VLAN
63
Setting Port VID
64
Figure 21 Initial Setup Network Example: Port VID
64
Configuring Switch Management IP Address
65
Figure 22 Initial Setup Example: Management IP Address
65
Chapter 6 System Status and Port Statistics
67
Overview
67
Port Status Summary
67
Figure 23 Status
67
Table 7 Status
67
Status: Port Details
68
Figure 24 Status: Port Details
69
Table 8 Status > Port Details
69
Basic Setting
73
Chapter 7 Basic Setting
73
Overview
73
System Information
73
Figure 25 Basic Setting > System Info
74
Table 9 Basic Setting > System Info
74
General Setup
75
Figure 26 Basic Setting > General Setup
75
Table 10 Basic Setting > General Setup
76
Introduction to Vlans
77
Switch Setup Screen
77
Figure 27 Basic Setting > Switch Setup
78
Table 11 Basic Setting > Switch Setup
78
IP Setup
79
IP Interfaces
79
Figure 28 Basic Setting > IP Setup
80
Table 12 Basic Setting > IP Setup
80
Port Setup
82
Figure 29 Basic Setting > Port Setup
82
Table 13 Basic Setting > Port Setup
82
Vlan
85
Chapter 8 VLAN
85
Introduction to IEEE 802.1Q Tagged Vlans
85
Forwarding Tagged and Untagged Frames
85
Automatic VLAN Registration
86
Garp
86
Gvrp
86
Table 14 IEEE 802.1Q VLAN Terminology
86
Port VLAN Trunking
87
Select the VLAN Type
87
Static VLAN
87
Figure 30 Port VLAN Trunking
87
Figure 31 Switch Setup: Select VLAN Type
87
Figure 32 Advanced Application > VLAN: VLAN Status
88
Figure 33 Advanced Application > VLAN > VLAN Detail
88
Static VLAN Details
88
Static VLAN Status
88
Table 15 Advanced Application > VLAN: VLAN Status
88
Configure a Static VLAN
89
Figure 34 Advanced Application > VLAN > Static VLAN
89
Table 16 Advanced Application > VLAN > VLAN Detail
89
Configure VLAN Port Settings
90
Table 17 Advanced Application > VLAN > Static VLAN
90
Figure 35 Advanced Application > VLAN > VLAN Port Setting
91
Table 18 Advanced Application > VLAN > VLAN Port Setting
91
Subnet Based Vlans
92
Figure 36 Subnet Based VLAN Application Example
92
Configuring Subnet Based VLAN
93
Figure 37 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN
93
Table 19 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN Setup
93
Protocol Based Vlans
94
Configuring Protocol Based VLAN
95
Figure 38 Protocol Based VLAN Application Example
95
Figure 39 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN
96
Table 20 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN Setup
96
Create an IP-Based VLAN Example
97
Figure 40 Protocol Based VLAN Configuration Example
97
Port-Based VLAN Setup
98
Configure a Port-Based VLAN
98
Figure 41 Advanced Application > VLAN: Port Based VLAN Setup (All Connected)
99
Figure 42 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation)
100
Table 21 Advanced Application > VLAN: Port Based VLAN Setup
101
Chapter 9 Static MAC Forward Setup
103
Overview
103
Configuring Static MAC Forwarding
103
Figure 43 Advanced Application > Static MAC Forwarding
103
Table 22 Advanced Application > Static MAC Forwarding
104
Filtering
105
Chapter 10 Filtering
105
Configure a Filtering Rule
105
Figure 44 Advanced Application > Filtering
105
Table 23 Advanced Application > Filtering
105
Chapter 11 Spanning Tree Protocol
107
STP/RSTP Overview
107
STP Terminology
107
How STP Works
108
Table 24 STP Path Costs
108
STP Port States
109
Multiple RSTP
109
Figure 45 MRSTP Network Example
109
Table 25 STP Port States
109
Multiple STP
110
Figure 46 STP/RSTP Network Example
110
Figure 47 MSTP Network Example
111
Spanning Tree Protocol Status Screen
112
Figure 48 Mstis in Different Regions
112
Figure 49 MSTP and Legacy RSTP Network Example
112
Spanning Tree Configuration
113
Figure 50 Advanced Application > Spanning Tree Protocol
113
Figure 51 Advanced Application > Spanning Tree Protocol > Configuration
113
Table 26 Advanced Application > Spanning Tree Protocol > Configuration
113
Configure Rapid Spanning Tree Protocol
114
Figure 52 Advanced Application > Spanning Tree Protocol > RSTP
114
Table 27 Advanced Application > Spanning Tree Protocol > RSTP
114
Rapid Spanning Tree Protocol Status
115
Figure 53 Advanced Application > Spanning Tree Protocol > Status: RSTP
116
Table 28 Advanced Application > Spanning Tree Protocol > Status: RSTP
116
Configure Multiple Rapid Spanning Tree Protocol
117
Figure 54 Advanced Application > Spanning Tree Protocol > MRSTP
117
Table 29 Advanced Application > Spanning Tree Protocol > MRSTP
117
Multiple Rapid Spanning Tree Protocol Status
118
Figure 55 Advanced Application > Spanning Tree Protocol > Status: MRSTP
119
Table 30 Advanced Application > Spanning Tree Protocol > Status: MRSTP
119
Configure Multiple Spanning Tree Protocol
120
Figure 56 Advanced Application > Spanning Tree Protocol > MSTP
120
Table 31 Advanced Application > Spanning Tree Protocol > MSTP
121
Multiple Spanning Tree Protocol Status
122
Figure 57 Advanced Application > Spanning Tree Protocol > Status: MSTP
123
Table 32 Advanced Application > Spanning Tree Protocol > Status: MSTP
123
Bandwidth Control
125
Chapter 12 Bandwidth Control
125
Bandwidth Control Overview
125
CIR and PIR
125
Bandwidth Control Setup
125
Figure 58 Advanced Application > Bandwidth Control
126
Table 33 Advanced Application > Bandwidth Control
126
Chapter 13 Broadcast Storm Control
127
Broadcast Storm Control Setup
127
Figure 59 Advanced Application > Broadcast Storm Control
127
Table 34 Advanced Application > Broadcast Storm Control
128
Mirroring
129
Chapter 14 Mirroring
129
Port Mirroring Setup
129
Figure 60 Advanced Application > Mirroring
129
Table 35 Advanced Application > Mirroring
130
Link Aggregation
131
Chapter 15 Link Aggregation
131
Link Aggregation Overview
131
Dynamic Link Aggregation
131
Link Aggregation ID
132
Link Aggregation Status
132
Figure 61 Advanced Application > Link Aggregation Status
132
Table 36 Link Aggregation ID: Local Switch
132
Table 37 Link Aggregation ID: Peer Switch
132
Table 38 Advanced Application > Link Aggregation Status
132
Link Aggregation Setting
133
Figure 62 Advanced Application > Link Aggregation > Link Aggregation Setting
133
Link Aggregation Control Protocol
134
Table 39 Advanced Application > Link Aggregation > Link Aggregation Setting
134
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP
135
Table 40 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP
135
Static Trunking Example
136
Figure 64 Trunking Example - Physical Connections
136
Figure 65 Trunking Example - Configuration Screen
137
Port Authentication
139
Chapter 16 Port Authentication
139
Port Authentication Overview
139
IEEE 802.1X Authentication
139
MAC Authentication
140
Figure 66 IEEE 802.1X Authentication Process
140
Figure 67 MAC Authentication Process
140
Port Authentication Configuration
141
Activate IEEE 802.1X Security
141
Figure 68 Advanced Application > Port Authentication
141
Figure 69 Advanced Application > Port Authentication > 802.1X
141
Activate MAC Authentication
142
Table 41 Advanced Application > Port Authentication > 802.1X
142
Figure 70 Advanced Application > Port Authentication > MAC Authentication
143
Table 42 Advanced Application > Port Authentication > MAC Authentication
143
Port Security
145
Chapter 17 Port Security
145
About Port Security
145
Port Security Setup
145
Figure 71 Advanced Application > Port Security
146
Table 43 Advanced Application > Port Security
146
Classifier
149
Chapter 18 Classifier
149
About the Classifier and Qos
149
Configuring the Classifier
149
Figure 72 Advanced Application > Classifier
150
Table 44 Advanced Application > Classifier
150
Viewing and Editing Classifier Configuration
152
Figure 73 Advanced Application > Classifier: Summary Table
152
Table 45 Classifier: Summary Table
152
Table 46 Common Ethernet Types and Protocol Number
152
Classifier Example
153
Table 47 Common IP Protocol Types and Protocol Numbers
153
Table 48 Common TCP and UDP Port Numbers
153
Figure 74 Classifier: Example
154
Policy Rule
155
Chapter 19 Policy Rule
155
Policy Rules Overview
155
Diffserv
155
DSCP and Per-Hop Behavior
155
Configuring Policy Rules
156
Figure 75 Advanced Application > Policy Rule
156
Table 49 Advanced Application > Policy Rule
157
Viewing and Editing Policy Configuration
158
Figure 76 Advanced Application > Policy Rule: Summary Table
158
Table 50 Policy: Summary Table
158
Policy Example
159
Figure 77 Policy Example
159
Queuing Method
161
Chapter 20 Queuing Method
161
Queuing Method Overview
161
Strictly Priority
161
Weighted Fair Queuing
161
Weighted Round Robin Scheduling (WRR)
162
Configuring Queuing
162
Figure 78 Advanced Application > Queuing Method
162
Table 51 Advanced Application > Queuing Method
163
VLAN Stacking
165
Chapter 21 VLAN Stacking
165
VLAN Stacking Overview
165
VLAN Stacking Example
165
VLAN Stacking Port Roles
166
Figure 79 VLAN Stacking Example
166
VLAN Tag Format
167
Frame Format
167
Table 52 VLAN Tag Format
167
Table 53 Single and Double Tagged 802.11Q Frame Format
167
Table 54 802.1Q Frame
167
Configuring VLAN Stacking
168
Figure 80 Advanced Application > VLAN Stacking
168
Table 55 Advanced Application > VLAN Stacking
168
Multicast
171
Chapter 22 Multicast
171
Multicast Overview
171
IP Multicast Addresses
171
IGMP Filtering
171
IGMP Snooping
171
IGMP Snooping and Vlans
172
Multicast Status
172
Multicast Setting
172
Figure 81 Advanced Application > Multicast
172
Table 56 Multicast Status
172
Figure 82 Advanced Application > Multicast > Multicast Setting
173
Table 57 Advanced Application > Multicast > Multicast Setting
173
IGMP Snooping VLAN
174
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
175
Table 58 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
175
IGMP Filtering Profile
176
Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
176
Table 59 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
176
MVR Overview
177
Types of MVR Ports
177
Figure 85 MVR Network Example
177
MVR Modes
178
How MVR Works
178
General MVR Configuration
178
Figure 86 MVR Multicast Television Example
178
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR
179
Table 60 Advanced Application > Multicast > Multicast Setting > MVR
179
MVR Group Configuration
180
MVR Configuration Example
181
Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
181
Table 61 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
181
Figure 89 MVR Configuration Example
182
Figure 90 MVR Configuration Example
182
Figure 91 MVR Group Configuration Example
183
Figure 92 MVR Group Configuration Example
183
Chapter 23 Authentication & Accounting
185
Authentication, Authorization and Accounting
185
Local User Accounts
185
Figure 93 AAA Server
185
RADIUS and TACACS
186
Authentication and Accounting Screens
186
RADIUS Server Setup
186
Figure 94 Advanced Application > Auth and Acct
186
Table 62 RADIUS Vs TACACS
186
Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup
187
Table 63 Advanced Application > Auth and Acct > RADIUS Server Setup
187
TACACS+ Server Setup
188
Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup
189
Table 64 Advanced Application > Auth and Acct > TACACS+ Server Setup
189
Authentication and Accounting Setup
190
Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup
191
Table 65 Advanced Application > Auth and Acct > Auth and Acct Setup
191
Vendor Specific Attribute
193
Table 66 Supported Vsas
193
Supported RADIUS Attributes
194
Table 67 Supported Tunnel Protocol Attribute
194
Attributes Used for Accounting
195
Attributes Used for Authentication
195
Table 68 RADIUS Attributes - Exec Events Via Console
196
Table 69 RADIUS Attributes - Exec Events Via Telnet/Ssh
196
Table 70 RADIUS Attributes - Exec Events Via Console
196
IP Source Guard
199
Chapter 24 IP Source Guard
199
IP Source Guard Overview
199
DHCP Snooping Overview
199
Figure 98 DHCP Snooping Database File Format
200
ARP Inspection Overview
201
Figure 99 Example: Man-In-The-Middle Attack
201
IP Source Guard
203
IP Source Guard Static Binding
203
Figure 100 Advanced Application > IP Source Guard
203
Table 71 Advanced Application > IP Source Guard
203
Figure 101 Advanced Application > IP Source Guard > Static Binding
204
Table 72 Advanced Application > IP Source Guard > Static Binding
204
DHCP Snooping
205
Figure 102 Advanced Application > IP Source Guard > DHCP Snooping
205
Table 73 Advanced Application > IP Source Guard > DHCP Snooping
206
DHCP Snooping Configure
208
Figure 103 Advanced Application > IP Source Guard > DHCP Snooping > Configure
208
Table 74 Advanced Application > IP Source Guard > DHCP Snooping > Configure
208
DHCP Snooping Port Configure
209
Figure 104 Advanced Application > IP Source Guard > DHCP Snooping > Configure > Port
210
Table 75 Advanced Application > IP Source Guard > DHCP Snooping > Configure > Port
210
DHCP Snooping VLAN Configure
211
Figure 105 Advanced Application > IP Source Guard > DHCP Snooping > Configure > VLAN
211
Table 76 Advanced Application > IP Source Guard > DHCP Snooping > Configure > VLAN
211
ARP Inspection Status
212
ARP Inspection VLAN Status
212
Figure 106 Advanced Application > IP Source Guard > ARP Inspection
212
Table 77 Advanced Application > IP Source Guard > ARP Inspection
212
ARP Inspection Log Status
213
Figure 107 Advanced Application > IP Source Guard > ARP Inspection > VLAN Status
213
Table 78 Advanced Application > IP Source Guard > ARP Inspection > VLAN Status
213
Figure 108 Advanced Application > IP Source Guard > ARP Inspection > Log Status
214
Table 79 Advanced Application > IP Source Guard > ARP Inspection > Log Status
214
ARP Inspection Configure
215
Figure 109 Advanced Application > IP Source Guard > ARP Inspection > Configure
215
Table 80 Advanced Application > IP Source Guard > ARP Inspection > Configure
215
ARP Inspection Port Configure
216
Figure 110 Advanced Application > IP Source Guard > ARP Inspection > Configure > Port
216
ARP Inspection VLAN Configure
217
Figure 111 Advanced Application > IP Source Guard > ARP Inspection > Configure > VLAN
217
Table 81 Advanced Application > IP Source Guard > ARP Inspection > Configure > Port
217
Table 82 Advanced Application > IP Source Guard > ARP Inspection > Configure > VLAN
218
Loop Guard
219
Chapter 25 Loop Guard
219
Loop Guard Overview
219
Figure 112 Loop Guard Vs STP
219
Figure 113 Switch in Loop State
220
Figure 114 Loop Guard - Probe Packet
220
Figure 115 Loop Guard - Network Loop
220
Loop Guard Setup
221
Figure 116 Advanced Application > Loop Guard
221
Table 83 Advanced Application > Loop Guard
221
Static Routing
223
Chapter 26 Static Routing
223
Configuring Static Routing
223
Figure 117 IP Application > Static Routing
223
Table 84 IP Application > Static Routing
223
Chapter 27 Differentiated Services
225
Diffserv Overview
225
DSCP and Per-Hop Behavior
225
Figure 118 Diffserv: Differentiated Service Field
225
Diffserv Network Example
226
Two Rate Three Color Marker Traffic Policing
226
Figure 119 Diffserv Network
226
Figure 120 TRTCM - Color-Blind Mode
227
Figure 121 TRTCM - Color-Aware Mode
227
TRTCM - Color-Aware Mode
227
TRTCM - Color-Blind Mode
227
Activating Diffserv
228
Configuring 2-Rate 3 Color Marker Settings
228
Figure 122 IP Application > Diffserv
228
Table 85 IP Application > Diffserv
228
Figure 123 IP Application > Diffserv > 2-Rate 3 Color Marker
229
Table 86 IP Application > Diffserv > 2-Rate 3 Color Marker
229
DSCP-To-IEEE 802.1P Priority Settings
230
Configuring DSCP Settings
230
Figure 124 IP Application > Diffserv > DSCP Setting
230
Table 87 Default DSCP-IEEE 802.1P Mapping
230
Table 88 IP Application > Diffserv > DSCP Setting
231
Dhcp
233
Chapter 28 DHCP
233
DHCP Overview
233
DHCP Modes
233
DHCP Configuration Options
233
DHCP Status
233
DHCP Relay
234
DHCP Relay Agent Information
234
Figure 125 IP Application > DHCP Status
234
Table 89 IP Application > DHCP Status
234
Configuring DHCP Global Relay
235
Figure 126 IP Application > DHCP > Global
235
Table 90 Relay Agent Information
235
Table 91 IP Application > DHCP > Global
235
Global DHCP Relay Configuration Example
236
Configuring DHCP VLAN Settings
236
Figure 127 Global DHCP Relay Network Example
236
Figure 128 DHCP Relay Configuration Example
236
Figure 129 IP Application > DHCP > VLAN
237
Table 92 IP Application > DHCP > VLAN
237
Example: DHCP Relay for Two Vlans
238
Figure 130 DHCP Relay for Two Vlans
238
Figure 131 DHCP Relay for Two Vlans Configuration Example
238
Maintenance
239
Chapter 29 Maintenance
239
The Maintenance Screen
239
Figure 132 Management > Maintenance
239
Table 93 Management > Maintenance
239
Load Factory Default
240
Save Configuration
240
Figure 133 Load Factory Default: Start
240
Reboot System
241
Firmware Upgrade
241
Figure 134 Reboot System: Confirmation
241
Figure 135 Management > Maintenance > Firmware Upgrade
241
Restore a Configuration File
242
Backup a Configuration File
242
Figure 136 Management > Maintenance > Restore Configuration
242
Figure 137 Management > Maintenance > Backup Configuration
242
FTP Command Line
243
Filename Conventions
243
FTP Command Line Procedure
243
Table 94 Filename Conventions
243
GUI-Based FTP Clients
244
FTP Restrictions
244
Table 95 General Commands for GUI-Based FTP Clients
244
Access Control
245
Chapter 30 Access Control
245
Access Control Overview
245
The Access Control Main Screen
245
Figure 138 Management > Access Control
245
Table 96 Access Control Overview
245
About SNMP
246
Figure 139 SNMP Management Model
246
Table 97 SNMP Commands
246
SNMP Traps
247
SNMP V3 and Security
247
Supported Mibs
247
Table 98 SNMP System Traps
247
Table 99 SNMP Interface Traps
248
Table 100 AAA Traps
249
Table 101 SNMP IP Traps
249
Configuring SNMP
250
Table 102 SNMP Switch Traps
250
Figure 140 Management > Access Control > SNMP
251
Table 103 Management > Access Control > SNMP
251
Configuring SNMP Trap Group
252
Figure 141 Management > Access Control > SNMP > Trap Group
253
Setting up Login Accounts
253
Table 104 Management > Access Control > SNMP > Trap Group
253
Figure 142 Management > Access Control > Logins
254
Table 105 Management > Access Control > Logins
254
SSH Overview
255
How SSH Works
255
Figure 143 SSH Communication Example
255
Figure 144 How SSH Works
255
SSH Implementation on the Switch
256
Requirements for Using SSH
256
Introduction to HTTPS
256
HTTPS Example
257
Internet Explorer Warning Messages
257
Figure 145 HTTPS Implementation
257
Figure 146 Security Alert Dialog Box (Internet Explorer)
257
Netscape Navigator Warning Messages
258
The Main Screen
258
Figure 147 Security Certificate 1 (Netscape)
258
Figure 148 Security Certificate 2 (Netscape)
258
Service Port Access Control
259
Figure 149 Example: Lock Denoting a Secure Connection
259
Figure 150 Management > Access Control > Service Access Control
259
Remote Management
260
Figure 151 Management > Access Control > Remote Management
260
Table 106 Management > Access Control > Service Access Control
260
Table 107 Management > Access Control > Remote Management
260
Diagnostic
263
Chapter 31 Diagnostic
263
Figure 152 Management > Diagnostic
263
Table 108 Management > Diagnostic
263
Syslog
265
Chapter 32 Syslog
265
Syslog Overview
265
Syslog Setup
265
Table 109 Syslog Severity Levels
265
Syslog Server Setup
266
Figure 153 Management > Syslog
266
Table 110 Management > Syslog
266
Figure 154 Management > Syslog > Server Setup
267
Table 111 Management > Syslog > Server Setup
267
Cluster Management
269
Chapter 33 Cluster Management
269
Clustering Management Status Overview
269
Table 112 Zyxel Clustering Management Specifications
269
Cluster Management Status
270
Figure 155 Clustering Application Example
270
Figure 156 Management > Cluster Management
270
Cluster Member Switch Management
271
Figure 157 Cluster Management: Cluster Member Web Configurator Screen
271
Table 113 Management > Cluster Management
271
Clustering Management Configuration
272
Figure 158 Example: Uploading Firmware to a Cluster Member Switch
272
Table 114 FTP Upload to Cluster Member Example
272
Figure 159 Management > Clustering Management > Configuration
273
Table 115 Management > Clustering Management > Configuration
273
MAC Table
275
Chapter 34 MAC Table
275
MAC Table Overview
275
Figure 160 MAC Table Flowchart
275
Viewing the MAC Table
276
Figure 161 Management > MAC Table
276
Table 116 Management > MAC Table
276
ARP Table
277
Chapter 35 ARP Table
277
ARP Table Overview
277
How ARP Works
277
Viewing the ARP Table
277
Figure 162 Management > ARP Table
278
Table 117 Management > ARP Table
278
Configure Clone
279
Chapter 36 Configure Clone
279
Figure 163 Management > Configure Clone
279
Table 118 Management > Configure Clone
280
Troubleshooting and Specifications
281
Part IV: Troubleshooting and Specifications
281
Chapter 37 Troubleshooting
283
Power, Hardware Connections, and Leds
283
Switch Access and Login
284
Chapter 38 Product Specifications
287
General Switch Specifications
287
Table 119 Hardware and Environmental Specifications
287
Table 120 Feature Specifications
288
Table 121 Standards Supported
289
Cable Pin Assignments
291
Figure 164 Console/Dial Backup Port Pin Layout
291
Table 122 Console/Dial Backup Port Pin Assignments
291
Table 123 Ethernet Cable Pin Assignments
291
Appendices and Index
293
Part V: Appendices and Index
293
Appendix A Setting up Your Computer's IP Address
295
Figure 165 Windows 95/98/Me: Network: Configuration
296
Figure 166 Windows 95/98/Me: TCP/IP Properties: IP Address
297
Figure 167 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
298
Figure 168 Windows XP: Start Menu
299
Figure 169 Windows XP: Control Panel
299
Figure 170 Windows XP: Control Panel: Network Connections: Properties
300
Figure 171 Windows XP: Local Area Connection Properties
300
Figure 172 Windows XP: Internet Protocol (TCP/IP) Properties
301
Figure 173 Windows XP: Advanced TCP/IP Properties
302
Figure 174 Windows XP: Internet Protocol (TCP/IP) Properties
303
Figure 175 Windows Vista: Start Menu
304
Figure 176 Windows Vista: Control Panel
304
Figure 177 Windows Vista: Network and Internet
304
Figure 178 Windows Vista: Network and Sharing Center
304
Figure 179 Windows Vista: Network and Sharing Center
305
Figure 180 Windows Vista: Local Area Connection Properties
305
Figure 181 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
306
Figure 182 Windows Vista: Advanced TCP/IP Properties
307
Figure 183 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
308
Figure 184 Macintosh os 8/9: Apple Menu
309
Figure 185 Macintosh os 8/9: TCP/IP
309
Figure 186 Macintosh os X: Apple Menu
310
Figure 187 Macintosh os X: Network
311
Figure 188 Red hat 9.0: KDE: Network Configuration: Devices
312
Figure 189 Red hat 9.0: KDE: Ethernet Device: General
312
Figure 190 Red hat 9.0: KDE: Network Configuration: DNS
313
Figure 191 Red hat 9.0: KDE: Network Configuration: Activate
313
Figure 192 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
314
Figure 193 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
314
Figure 194 Red hat 9.0: DNS Settings in Resolv.conf
314
Figure 195 Red hat 9.0: Restart Ethernet Card
314
Figure 196 Red hat 9.0: Checking TCP/IP Properties
315
Appendix B Pop-Up Windows, Javascripts and Java Permissions
317
Figure 197 Pop-Up Blocker
317
Figure 198 Internet Options: Privacy
318
Figure 199 Internet Options: Privacy
319
Figure 200 Pop-Up Blocker Settings
319
Figure 201 Internet Options: Security
320
Figure 202 Security Settings - Java Scripting
321
Figure 203 Security Settings - Java
321
Figure 204 Java (Sun)
322
Figure 205 Mozilla Firefox: Tools > Options
323
Figure 206 Mozilla Firefox Content Security
323
Appendix C IP Addresses and Subnetting
325
Introduction to Ip Addresses
325
Figure 207 Network Number and Host ID
326
Table 124 IP Address Network Number and Host ID Example
326
Table 125 Subnet Masks
327
Table 126 Maximum Host Numbers
327
Table 127 Alternative Subnet Mask Notation
327
Figure 208 Subnetting Example: before Subnetting
328
Figure 209 Subnetting Example: after Subnetting
329
Table 128 Subnet 1
329
Table 129 Subnet 2
330
Table 130 Subnet 3
330
Table 131 Subnet 4
330
Table 132 Eight Subnets
330
Table 133 24-Bit Network Number Subnet Planning
331
Table 134 16-Bit Network Number Subnet Planning
331
Configuring Ip Addresses
332
Figure 210 Conflicting Computer IP Addresses Example
333
Figure 211 Conflicting Computer IP Addresses Example
333
Figure 212 Conflicting Computer and Router IP Addresses Example
334
Appendix D Common Services
335
Table 135 Commonly Used Services
335
Appendix E Importing Certificates
339
Figure 213 Security Certificate
339
Figure 214 Login Screen
340
Figure 215 Certificate General Information before Import
340
Figure 216 Certificate Import Wizard 1
341
Figure 217 Certificate Import Wizard 2
341
Figure 218 Certificate Import Wizard 3
342
Figure 219 Root Certificate Store
342
Figure 220 Certificate General Information after Import
343
Appendix F Legal Information
345
Appendix G Customer Support
349
Index
355
Advertisement
Advertisement
Related Products
ZyXEL Communications Dimension ES-3124PWR
ZyXEL Communications ES-3124PWR - V3.60
ZyXEL Communications ES-315
ZyXEL Communications Dimension ES-3124
ZyXEL Communications ES-3124F
ZyXEL Communications Dimension ES-3148
ZyXEL Communications ES-3124 - V3.80
ZyXEL Communications ES-315-F - QUICK GUIDE V3.70
ZyXEL Communications ZyXEL Dimension ES-3124-4F
ZyXEL Communications ES-315 - V3.70
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL