Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Switch
GS-3012F/3012
ZyXEL Communications GS-3012F/3012 Manuals
Manuals and User Guides for ZyXEL Communications GS-3012F/3012. We have
1
ZyXEL Communications GS-3012F/3012 manual available for free PDF download: User Manual
ZyXEL Communications GS-3012F/3012 User Manual (314 pages)
Layer 2+ Gigabit Switch
Brand:
ZyXEL Communications
| Category:
Switch
| Size: 10.14 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
21
List of Tables
25
Introduction and Hardware
29
Part I: Introduction and Hardware
29
Chapter 1 Getting to Know Your Switch
31
Introduction
31
Backbone Application
31
Bridging Example
32
High Performance Switching Example
32
Figure 1 Backbone Application
32
Figure 2 Bridging Application
32
IEEE 802.1Q VLAN Application Examples
33
Figure 3 High Performance Switched Workgroup Application
33
Ways to Manage the Switch
34
Good Habits for Managing the Switch
34
Figure 4 Shared Server Using VLAN Example
34
Basic Configuration
35
Part II: Basic Configuration
35
Chapter 2 Hardware Installation and Connection
37
Installation Scenarios
37
Desktop Installation Procedure
37
Mounting the Switch on a Rack
38
Rack-Mounted Installation Requirements
38
Attaching the Mounting Brackets to the Switch
38
Figure 5 Attaching Rubber Feet
38
Mounting the Switch on a Rack
39
Figure 6 Attaching the Mounting Brackets
39
Figure 7 Mounting the Switch on a Rack
39
Hardware Overview
41
Chapter 3 Hardware Overview
41
Front Panel
41
Figure 8 Front Panel: GS-3012
41
Figure 9 Front Panel: GS-3012F
41
Console Port
42
Gigabit Ports
42
Table 1 Front Panel Connections
42
Mini-GBIC Slots
43
Figure 10 Transceiver Installation Example
44
Figure 11 Connecting the Fiber Optic Cables
44
Figure 12 Removing the Fiber Optic Cables
44
Figure 13 Opening the Transceiver's Latch Example
44
Management Port
45
Rear Panel
45
Power Connector
45
Figure 14 Transceiver Removal Example
45
Figure 15 Rear Panel: GS-3012 AC Power Model
45
Figure 16 Rear Panel: GS-3012 DC Power Model
45
Figure 17 Rear Panel: GS-3012F AC Power Model
45
Figure 18 Rear Panel: GS-3012F DC Power Model
45
Leds
46
Table 2 LED Descriptions
46
Configuring the Switch
47
Chapter 4 The Web Configurator
49
Introduction
49
System Login
49
The Status Screen
50
Figure 19 Web Configurator: Login
50
Figure 20 Web Configurator Home Screen (Status)
50
Table 3 Navigation Panel Sub-Links Overview
51
Table 4 Web Configurator Screen Sub-Links Details
52
Table 5 Navigation Panel Links
53
Change Your Password
54
Saving Your Configuration
55
Switch Lockout
55
Figure 21 Change Administrator Login Password
55
Resetting the Switch
56
Reload the Configuration File
56
Logging out of the Web Configurator
57
Help
57
Figure 22 Resetting the Switch: Via the Console Port
57
Figure 23 Web Configurator: Logout Screen
57
Chapter 5 Initial Setup Example
59
Overview
59
Creating a VLAN
59
Figure 24 Initial Setup Network Example: VLAN
59
Setting Port VID
60
Configuring Switch Management IP Address
61
Figure 25 Initial Setup Network Example: Port VID
61
Figure 26 Initial Setup Example: Management IP Address
61
Chapter 6 System Status and Port Statistics
63
Overview
63
Port Status Summary
63
Figure 27 Status
63
Table 6 Status
63
Status: Port Details
64
Figure 28 Status > Port Details
65
Table 7 Status: Port Details
65
Basic Setting
69
Chapter 7 Basic Setting
69
Overview
69
System Information
69
Figure 29 Basic Setting > System Info
70
Table 8 Basic Setting > System Info
70
General Setup
71
Figure 30 Basic Setting > General Setup
71
Table 9 Basic Setting > General Setup
72
Introduction to Vlans
73
Switch Setup Screen
73
Figure 31 Basic Setting > Switch Setup
74
Table 10 Basic Setting > Switch Setup
74
IP Setup
75
Management IP Addresses
75
Figure 32 Basic Setting > IP Setup
76
Table 11 Basic Setting > IP Setup
76
Port Setup
78
Figure 33 Basic Setting > Port Setup
78
Table 12 Basic Setting > Port Setup
78
Advanced
81
Part III: Advanced
81
Vlan
83
Chapter 8 VLAN
83
Introduction to IEEE 802.1Q Tagged Vlans
83
Forwarding Tagged and Untagged Frames
83
Automatic VLAN Registration
84
Garp
84
Gvrp
84
Table 13 IEEE 802.1Q VLAN Terminology
84
Port VLAN Trunking
85
Select the VLAN Type
85
Static VLAN
85
Figure 34 Port VLAN Trunking
85
Figure 35 Switch Setup > Select VLAN Type
85
Figure 36 Advanced Application > VLAN: VLAN Status
86
Figure 37 Advanced Application > VLAN > VLAN Detail
86
Static VLAN Status
86
Table 14 Advanced Application > VLAN: VLAN Status
86
VLAN Details
86
Configure a Static VLAN
87
Figure 38 Advanced Application > VLAN > Static VLAN
87
Table 15 Advanced Application > VLAN > VLAN Detail
87
Configure VLAN Port Settings
88
Table 16 Advanced Application > VLAN > Static VLAN
88
Figure 39 Advanced Application > VLAN > VLAN Port Setting
89
Table 17 Advanced Application > VLAN > VLAN Port Setting
89
Subnet Based Vlans
90
Figure 40 Subnet Based VLAN Application Example
90
Configuring Subnet Based VLAN
91
Figure 41 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN
91
Table 18 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN Setup
91
Port-Based VLAN Setup
92
Configure a Port-Based VLAN
93
Figure 42 Port Based VLAN Setup (All Connected)
93
Figure 43 Port Based VLAN Setup (Port Isolation)
94
Table 19 Port Based VLAN Setup
94
Chapter 9 Static MAC Forward Setup
95
Overview
95
Configuring Static MAC Forwarding
95
Figure 44 Advanced Application > Static MAC Forwarding
95
Table 20 Advanced Application > Static MAC Forwarding
96
Filtering
97
Chapter 10 Filtering
97
Configure a Filtering Rule
97
Figure 45 Advanced Application > Filtering
97
Table 21 Advanced Application > Filtering
97
Spanning Tree Protocol
99
Chapter 11 Spanning Tree Protocol
99
STP/RSTP Overview
99
STP Terminology
99
How STP Works
100
Table 22 STP Path Costs
100
STP Port States
101
Multiple RSTP
101
Figure 46 MRSTP Network Example
101
Table 23 STP Port States
101
Multiple STP
102
Figure 47 STP/RSTP Network Example
102
Figure 48 MSTP Network Example
103
Spanning Tree Protocol Status Screen
104
Figure 49 Mstis in Different Regions
104
Figure 50 MSTP and Legacy RSTP Network Example
104
Spanning Tree Configuration
105
Figure 51 Advanced Application > Spanning Tree Protocol
105
Figure 52 Advanced Application > Spanning Tree Protocol > Configuration
105
Table 24 Advanced Application > Spanning Tree Protocol > Configuration
105
Configure Rapid Spanning Tree Protocol
106
Figure 53 Advanced Application > Spanning Tree Protocol > RSTP
106
Table 25 Advanced Application > Spanning Tree Protocol > RSTP
106
Rapid Spanning Tree Protocol Status
107
Figure 54 Advanced Application > Spanning Tree Protocol > Status: RSTP
108
Table 26 Advanced Application > Spanning Tree Protocol > Status: RSTP
108
Configure Multiple Rapid Spanning Tree Protocol
109
Figure 55 Advanced Application > Spanning Tree Protocol > MRSTP
109
Table 27 Advanced Application > Spanning Tree Protocol > MRSTP
109
Multiple Rapid Spanning Tree Protocol Status
110
Configure Multiple Spanning Tree Protocol
111
Figure 56 Advanced Application > Spanning Tree Protocol > Status: MRSTP
111
Table 28 Advanced Application > Spanning Tree Protocol > Status: MRSTP
111
Figure 57 Advanced Application > Spanning Tree Protocol > MSTP
112
Table 29 Advanced Application > Spanning Tree Protocol > MSTP
113
Multiple Spanning Tree Protocol Status
114
Figure 58 Advanced Application > Spanning Tree Protocol > Status: MSTP
115
Table 30 Advanced Application > Spanning Tree Protocol > Status: MSTP
115
Bandwidth Control
117
Chapter 12 Bandwidth Control
117
Bandwidth Control Overview
117
CIR and PIR
117
Bandwidth Control Setup
117
Figure 59 Advanced Application > Bandwidth Control
118
Table 31 Advanced Application > Bandwidth Control
118
Chapter 13 Broadcast Storm Control
119
Broadcast Storm Control Setup
119
Figure 60 Advanced Application > Broadcast Storm Control
119
Table 32 Advanced Application > Broadcast Storm Control
120
Mirroring
121
Chapter 14 Mirroring
121
Port Mirroring Setup
121
Figure 61 Advanced Application > Mirroring
121
Table 33 Advanced Application > Mirroring
122
Link Aggregation
123
Chapter 15 Link Aggregation
123
Link Aggregation Overview
123
Dynamic Link Aggregation
123
Link Aggregation ID
124
Link Aggregation Status
124
Figure 62 Advanced Application > Link Aggregation Status
124
Table 34 Link Aggregation ID: Local Switch
124
Table 35 Link Aggregation ID: Peer Switch
124
Table 36 Advanced Application > Link Aggregation Status
124
Link Aggregation Setting
125
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting
125
Link Aggregation Control Protocol
126
Table 37 Advanced Application > Link Aggregation > Link Aggregation Setting
126
Figure 64 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP
127
Table 38 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP
127
Static Trunking Example
128
Figure 65 Trunking Example - Physical Connections
128
Figure 66 Trunking Example - Configuration Screen
129
Port Authentication
131
Chapter 16 Port Authentication
131
Port Authentication Overview
131
IEEE 802.1X Authentication
131
MAC Authentication
132
Figure 67 IEEE 802.1X Authentication Process
132
Figure 68 MAC Authentication Process
132
Port Authentication Configuration
133
Activate IEEE 802.1X Security
133
Figure 69 Advanced Application > Port Authentication
133
Figure 70 Advanced Application > Port Authentication > 802.1X
133
Activate MAC Authentication
134
Table 39 Advanced Application > Port Authentication > 802.1X
134
Figure 71 Advanced Application > Port Authentication > MAC Authentication
135
Table 40 Advanced Application > Port Authentication > MAC Authentication
135
Port Security
137
Chapter 17 Port Security
137
About Port Security
137
Port Security Setup
137
Figure 72 Advanced Application > Port Security
138
Table 41 Advanced Application > Port Security
138
Classifier
141
Chapter 18 Classifier
141
About the Classifier and Qos
141
Configuring the Classifier
141
Figure 73 Advanced Application > Classifier
142
Table 42 Advanced Application > Classifier
142
Viewing and Editing Classifier Configuration
144
Figure 74 Advanced Application > Classifier: Summary Table
144
Table 43 Classifier: Summary Table
144
Table 44 Common Ethernet Types and Protocol Numbers
144
Classifier Example
145
Table 45 Common IP Protocol Types and Protocol Numbers
145
Table 46 Common TCP and UDP Port Numbers
145
Figure 75 Classifier: Example
146
Policy Rule
147
Chapter 19 Policy Rule
147
Policy Rules Overview
147
Diffserv
147
DSCP and Per-Hop Behavior
147
Configuring Policy Rules
148
Figure 76 Advanced Application > Policy Rule
148
Table 47 Advanced Application > Policy Rule
149
Viewing and Editing Policy Configuration
150
Figure 77 Advanced Application > Policy Rule: Summary Table
150
Table 48 Advanced Application > Policy Rule: Summary Table
150
Policy Example
151
Figure 78 Policy Example
151
Queuing Method
153
Chapter 20 Queuing Method
153
Queuing Method Overview
153
Strictly Priority Queuing
153
Weighted Round Robin Scheduling (WRR)
153
Configuring Queuing
154
Figure 79 Advanced Application > Queuing Method
154
Table 49 Advanced Application > Queuing Method
154
Multicast
155
Chapter 21 Multicast
155
Multicast Overview
155
IP Multicast Addresses
155
IGMP Filtering
155
IGMP Snooping
155
IGMP Snooping and Vlans
156
Multicast Status
156
Multicast Setting
156
Figure 80 Advanced Application > Multicast
156
Table 50 Advanced Application > Multicast Status
156
Figure 81 Advanced Application > Multicast > Multicast Setting
157
Table 51 Advanced Application > Multicast > Multicast Setting
157
IGMP Snooping VLAN
158
Figure 82 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
159
Table 52 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
159
IGMP Filtering Profile
160
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
160
Table 53 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
160
MVR Overview
161
Types of MVR Ports
161
Figure 84 MVR Network Example
161
MVR Modes
162
How MVR Works
162
General MVR Configuration
162
Figure 85 MVR Multicast Television Example
162
Figure 86 Advanced Application > Multicast > Multicast Setting > MVR
163
Table 54 Advanced Application > Multicast > Multicast Setting > MVR
163
MVR Group Configuration
164
MVR Configuration Example
165
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
165
Table 55 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
165
Figure 88 MVR Configuration Example
166
Figure 89 MVR Configuration Example
166
Figure 90 MVR Group Configuration Example
166
Figure 91 MVR Group Configuration Example
167
Chapter 22 Authentication & Accounting
169
Authentication, Authorization and Accounting
169
Local User Accounts
169
Figure 92 AAA Server
169
RADIUS and TACACS
170
Authentication and Accounting Screens
170
RADIUS Server Setup
170
Figure 93 Advanced Application > Auth and Acct
170
Table 56 RADIUS Vs TACACS
170
Figure 94 Advanced Application > Auth and Acct > RADIUS Server Setup
171
Table 57 Advanced Application > Auth and Acct > RADIUS Server Setup
171
TACACS+ Server Setup
172
Figure 95 Advanced Application > Auth and Acct > TACACS+ Server Setup
173
Table 58 Advanced Application > Auth and Acct > TACACS+ Server Setup
173
Authentication and Accounting Setup
174
Figure 96 Advanced Application > Auth and Acct > Auth and Acct Setup
175
Table 59 Advanced Application > Auth and Acct > Auth and Acct Setup
175
Vendor Specific Attribute
177
Table 60 Supported Vsas
177
Supported RADIUS Attributes
178
Table 61 Supported Tunnel Protocol Attribute
178
Attributes Used for Accounting
179
Attributes Used for Authentication
179
Table 62 RADIUS Attributes - Exec Events Via Console
180
Table 63 RADIUS Attributes - Exec Events Via Telnet/Ssh
180
Table 64 RADIUS Attributes - Exec Events Via Console
180
IP Source Guard
183
Chapter 23 IP Source Guard
183
IP Source Guard Overview
183
DHCP Snooping Overview
183
Figure 97 DHCP Snooping Database File Format
184
ARP Inspection Overview
185
Figure 98 Example: Man-In-The-Middle Attack
185
IP Source Guard
187
IP Source Guard Static Binding
187
Figure 99 IP Source Guard
187
Table 65 IP Source Guard
187
Figure 100 IP Source Guard Static Binding
188
Table 66 IP Source Guard Static Binding
188
DHCP Snooping
189
Figure 101 DHCP Snooping
189
Table 67 DHCP Snooping
190
DHCP Snooping Configure
192
Figure 102 DHCP Snooping Configure
192
Table 68 DHCP Snooping Configure
192
DHCP Snooping Port Configure
193
Figure 103 DHCP Snooping Port Configure
194
Table 69 DHCP Snooping Port Configure
194
DHCP Snooping VLAN Configure
195
Figure 104 DHCP Snooping VLAN Configure
195
Table 70 DHCP Snooping VLAN Configure
195
ARP Inspection Status
196
ARP Inspection VLAN Status
196
Figure 105 ARP Inspection Status
196
Table 71 ARP Inspection Status
196
ARP Inspection Log Status
197
Figure 106 ARP Inspection VLAN Status
197
Table 72 ARP Inspection VLAN Status
197
Figure 107 ARP Inspection Log Status
198
Table 73 ARP Inspection Log Status
198
ARP Inspection Configure
199
Figure 108 ARP Inspection Configure
199
Table 74 ARP Inspection Configure
199
ARP Inspection Port Configure
200
Figure 109 ARP Inspection Port Configure
200
ARP Inspection VLAN Configure
201
Figure 110 ARP Inspection VLAN Configure
201
Table 75 ARP Inspection Port Configure
201
Table 76 ARP Inspection VLAN Configure
202
Loop Guard
203
Chapter 24 Loop Guard
203
Loop Guard Overview
203
Figure 111 Loop Guard Vs STP
203
Figure 112 Switch in Loop State
204
Figure 113 Loop Guard - Probe Packet
204
Figure 114 Loop Guard - Network Loop
204
Loop Guard Setup
205
Figure 115 Advanced Application > Loop Guard
205
Table 77 Advanced Application > Loop Guard
205
Chapter 25 Two Rate Three Color Marker
207
Diffserv Overview
207
DSCP and Per-Hop Behavior
207
Figure 116 Diffserv: Differentiated Service Field
207
Diffserv Network Example
208
Two Rate Three Color Marker Traffic Policing
208
Figure 117 Diffserv Network
208
Figure 118 Trtcm - Color-Blind Mode
209
Figure 119 Trtcm - Color-Aware Mode
209
Trtcm - Color-Aware Mode
209
Trtcm - Color-Blind Mode
209
Configuring Two Rate Three Color Marker Settings
210
Figure 120 Advanced Application > Trtcm
210
Table 78 Advanced Application > Trtcm
210
IP Application
213
Part IV: IP Application
213
Static Route
215
Chapter 26 Static Route
215
Static Routing Overview
215
Configuring Static Routing
215
Figure 121 Static Routing Overview
215
Figure 122 IP Application > Static Routing
216
Table 79 IP Application > Static Routing
216
Dhcp
219
Chapter 27 DHCP
219
DHCP Overview
219
DHCP Modes
219
DHCP Configuration Options
219
DHCP Status
219
DHCP Relay
220
DHCP Relay Agent Information
220
Figure 123 IP Application > DHCP Status
220
Table 80 IP Application > DHCP
220
Table 81 Relay Agent Information
220
Configuring DHCP Global Relay
221
Figure 124 IP Application > DHCP > Global
221
Table 82 IP Application > DHCP > Global
221
Global DHCP Relay Configuration Example
222
Configuring DHCP VLAN Settings
222
Figure 125 Global DHCP Relay Network Example
222
Figure 126 DHCP Relay Configuration Example
222
Figure 127 IP Application > DHCP > VLAN
223
Table 83 IP Application > DHCP > VLAN
223
Example: DHCP Relay for Two Vlans
224
Figure 128 DHCP Relay for Two Vlans
224
Figure 129 DHCP Relay for Two Vlans Configuration Example
224
Management
225
Part V: Management
225
Maintenance
227
Chapter 28 Maintenance
227
The Maintenance Screen
227
Figure 130 Management > Maintenance
227
Table 84 Management > Maintenance
227
Load Factory Default
228
Save Configuration
228
Figure 131 Load Factory Default: Start
228
Reboot System
229
Firmware Upgrade
229
Figure 132 Reboot System: Confirmation
229
Figure 133 Management > Maintenance > Firmware Upgrade
229
Restore a Configuration File
230
Backup a Configuration File
230
Figure 134 Management > Maintenance > Restore Configuration
230
Figure 135 Management > Maintenance > Backup Configuration
230
FTP Command Line
231
Filename Conventions
231
FTP Command Line Procedure
231
Table 85 Filename Conventions
231
GUI-Based FTP Clients
232
FTP Restrictions
232
Access Control
233
Chapter 29 Access Control
233
Access Control Overview
233
The Access Control Main Screen
233
Figure 136 Management > Access Control
233
Table 86 Access Control Overview
233
About SNMP
234
Figure 137 SNMP Management Model
234
Table 87 SNMP Commands
234
SNMP Traps
235
SNMP V3 and Security
235
Supported Mibs
235
Table 88 SNMP System Traps
235
Table 89 SNMP Interfacetraps
237
Table 90 AAA Traps
237
Table 91 SNMP IP Traps
238
Configuring SNMP
239
Table 92 SNMP Switch Traps
239
Figure 138 Management > Access Control > SNMP
240
Table 93 Management > Access Control > SNMP
240
Configuring SNMP Trap Group
241
Figure 139 Management > Access Control > SNMP > Trap Group
242
Setting up Login Accounts
242
Table 94 Management > Access Control > SNMP > Trap Group
242
Figure 140 Management > Access Control > Logins
243
Table 95 Management > Access Control > Logins
243
SSH Overview
244
How SSH Works
244
Figure 141 SSH Communication Example
244
Figure 142 How SSH Works
244
SSH Implementation on the Switch
245
Requirements for Using SSH
245
Introduction to HTTPS
245
HTTPS Example
246
Internet Explorer Warning Messages
246
Figure 143 HTTPS Implementation
246
Figure 144 Security Alert Dialog Box (Internet Explorer)
246
Netscape Navigator Warning Messages
247
The Main Screen
247
Figure 145 Security Certificate 1 (Netscape)
247
Figure 146 Security Certificate 2 (Netscape)
247
Service Port Access Control
248
Figure 147 Example: Lock Denoting a Secure Connection
248
Figure 148 Management > Access Control > Service Access Control
248
Remote Management
249
Figure 149 Management > Access Control > Remote Management
249
Table 96 Management > Access Control > Service Access Control
249
Table 97 Management > Access Control > Remote Management
249
Diagnostic
251
Chapter 30 Diagnostic
251
Figure 150 Management > Diagnostic
251
Table 98 Management > Diagnostic
251
Syslog
253
Chapter 31 Syslog
253
Syslog Overview
253
Syslog Setup
253
Table 99 Syslog Severity Levels
253
Syslog Server Setup
254
Figure 151 Management > Syslog
254
Table 100 Management > Syslog
254
Figure 152 Management > Syslog > Syslog Server Setup
255
Table 101 Management > Syslog > Syslog Server Setup
255
Cluster Management
257
Chapter 32 Cluster Management
257
Cluster Management Status Overview
257
Table 102 Zyxel Clustering Management Specifications
257
Cluster Management Status
258
Figure 153 Clustering Application Example
258
Figure 154 Management > Cluster Management: Status
258
Cluster Member Switch Management
259
Figure 155 Cluster Management: Cluster Member Web Configurator Screen
259
Table 103 Management > Cluster Management: Status
259
Clustering Management Configuration
260
Figure 156 Example: Uploading Firmware to a Cluster Member Switch
260
Table 104 FTP Upload to Cluster Member Example
260
Figure 157 Management > Cluster Management > Configuration
261
Table 105 Management > Cluster Management > Configuration
261
MAC Table
263
Chapter 33 MAC Table
263
MAC Table Overview
263
Figure 158 MAC Table Flowchart
263
Viewing the MAC Table
264
Figure 159 Management > MAC Table
264
Table 106 Management > MAC Table
264
ARP Table
265
Chapter 34 ARP Table
265
ARP Table Overview
265
How ARP Works
265
Viewing the ARP Table
265
Figure 160 Management > ARP Table
266
Table 107 Management > ARP Table
266
Configure Clone
267
Chapter 35 Configure Clone
267
Figure 161 Management > Configure Clone
267
Table 108 Management > Configure Clone
268
Troubleshooting & Product Specifications
269
Part VI: Troubleshooting & Product Specifications
269
Chapter 36 Troubleshooting
271
Power, Hardware Connections, and Leds
271
Switch Access and Login
272
Chapter 37
275
Product Specifications
275
Table 109 Hardware Specifications
275
Table 110 Firmware Specifications
276
Table 111 Feature Specifications
278
Table 112 Standards Supported
278
Appendices and Index
281
Part VII: Appendices and Index
281
Appendix A IP Addresses and Subnetting
283
Introduction to Ip Addresses
283
Figure 162 Network Number and Host ID
284
Table 113 IP Address Network Number and Host ID Example
284
Table 114 Subnet Masks
285
Table 115 Maximum Host Numbers
285
Table 116 Alternative Subnet Mask Notation
285
Figure 163 Subnetting Example: before Subnetting
286
Figure 164 Subnetting Example: after Subnetting
287
Table 117 Subnet 1
287
Table 118 Subnet 2
288
Table 119 Subnet 3
288
Table 120 Subnet 4
288
Table 121 Eight Subnets
288
Table 122 24-Bit Network Number Subnet Planning
289
Table 123 16-Bit Network Number Subnet Planning
289
Configuring Ip Addresses
290
Figure 165 Conflicting Computer IP Addresses Example
291
Figure 166 Conflicting Computer IP Addresses Example
291
Figure 167 Conflicting Computer and Router IP Addresses Example
292
Appendix B Common Services
293
Table 124 Commonly Used Services
293
Appendix C Legal Information
297
Appendix D Customer Support
301
Index
307
Advertisement
Advertisement
Related Products
ZyXEL Communications Dimension GS-3012
ZyXEL Communications Dimension GS-3012F
ZyXEL Communications GS3700 Series
ZyXEL Communications GS-2750
ZyXEL Communications ZyXEL Dimension GS-1016
ZyXEL Communications GS2210-48HP
ZyXel GS1900-24
ZyXel GS1900-48
ZyXEL Communications GS1300-18HP
ZyXEL Communications GS1920-24v2
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL