Page 2
IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. Note: This guide is a reference for a series of products. Therefore some features or options in this guide may not be available in your product. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system.
Table of Contents Table of Contents Contents Overview ..........................3 Table of Contents ..........................5 Part I: User’s Guide ..................20 Chapter 1 Getting to Know Your Switch......................21 1.1 Introduction ............................21 1.1.1 Bridging Example ........................22 1.1.2 High Performance Switching Example ..................22 1.1.3 Gigabit Ethernet to the Desktop ....................23 1.1.4 IEEE 802.1Q VLAN Application Example ................23 1.1.5 IPv6 Support ..........................24 1.2 Ways to Manage the Switch ......................24...
Page 6
Table of Contents Chapter 4 The Web Configurator ........................37 4.1 Introduction ............................37 4.2 System Login ..........................37 4.3 The Web Configurator Layout ......................38 4.3.1 Change Your Password ......................42 4.4 Saving Your Configuration ........................43 4.5 Switch Lockout ..........................43 4.6 Resetting the Switch ........................44 4.6.1 Reload the Configuration File ....................44 4.7 Logging Out of the Web Configurator ....................45...
Page 8
Table of Contents 8.2 Configuring Static MAC Forwarding ...................124 Chapter 9 Static Multicast Forward Setup .......................127 9.1 Static Multicast Forwarding Overview .....................127 9.2 Configuring Static Multicast Forwarding ..................128 Chapter 10 Filtering..............................130 10.1 Configure a Filtering Rule ......................130 Chapter 11 Spanning Tree Protocol........................132 11.1 STP/RSTP Overview ........................132 11.1.1 STP Terminology .........................132 11.1.2 How STP Works ........................133...
Page 9
Table of Contents 14.1.2 Remote Port Mirroring ......................167 14.1.3 Source ..........................168 14.1.4 Destination ...........................170 14.1.5 Connected Port ........................171 Chapter 15 Link Aggregation ..........................175 15.1 Link Aggregation Overview ......................175 15.2 Dynamic Link Aggregation ......................175 15.2.1 Link Aggregation ID ......................176 15.3 Link Aggregation Status .......................176 15.4 Link Aggregation Setting ......................177 15.5 Link Aggregation Control Protocol .....................180...
H A PT ER Getting to Know Your Switch This chapter introduces the main features and applications of the Switch. 1.1 Introduction Your Switch is a layer 2+, Gigabit Ethernet (GbE) switch with two power slots for hot-swappable RPS300 or RPS600-HP power modules. The Switch provides four SFP or SFP+ slots for uplink. By integrating router functions, the Switch performs wire-speed layer-3 routing in addition to layer-2 switching.
Chapter 1 Getting to Know Your Switch 1.1.1 Bridging Example In this example the Switch connects different company departments (RD and Sales) to the corporate backbone. It can alleviate bandwidth contention and eliminate server and network bottlenecks. All users that need high bandwidth can connect to high-speed department servers via the Switch.
Chapter 1 Getting to Know Your Switch Figure 2 High Performance Switching 10 Gbps Trunk Branch 1.1.3 Gigabit Ethernet to the Desktop The Switch is an ideal solution for small networks which demand high bandwidth for a group of heavy traffic users. You can connect computers and servers directly to the Switch’s port or connect other switches to the Switch.
Chapter 1 Getting to Know Your Switch For more information on VLANs, refer to Chapter 7 on page 101. 1.1.4.1 Tag-based VLAN Example Ports in the same VLAN group share the same frame broadcast domain, thus increasing network performance by reducing broadcast traffic. VLAN groups can be modified at any time by adding, moving or changing ports without any re-cabling.
Chapter 1 Getting to Know Your Switch • Web Configurator. This is recommended for everyday management of the Switch using a (supported) web browser. See Chapter 4 on page • Command Line Interface. Line commands offer an alternative to the Web Configurator and may be necessary to configure advanced features.
H A PT ER Hardware Installation and Connection This chapter shows you how to install and connect the Switch. 2.1 Freestanding Installation Make sure the Switch is clean and dry. Set the Switch on a smooth, level surface strong enough to support the weight of the Switch and the connected cables.
Chapter 2 Hardware Installation and Connection 2.2 Mounting the Switch on a Rack This section lists the rack mounting requirements and precautions and describes the installation steps of how to mount the Switch in a 19-inch rack with the included rack mounting kit. Note: ZyXEL provides extensible rear mounting brackets (RM400) to install the Switch in a 21-inch, 23-inch or 24-inch rack.
Chapter 2 Hardware Installation and Connection Slide the rear bracket along the rail and set the bracket in place depending on the depth of the rack. The rear brackets can be used with a 19-inch rack. Rear Bracket Sliding Rail Front Bracket You may now mount the Switch on a rack.
Chapter 2 Hardware Installation and Connection Rear Front 2.6 Power Module Installation There is one power module installed in the first power slot of the Switch by default. See the Power Module Hardware Installation Guide for how to install a second power module or remove the power module.
H A PT ER Hardware Overview This chapter describes the front panel and rear panel of the Switch and shows you how to make the hardware connections. 3.1 Front Panel Connections The figure below shows the front panel of the Switch. Figure 6 Front Panel: GS3700 Series GS3700/XGS3700 Series User’s Guide...
Chapter 3 Hardware Overview Figure 7 Front Panel: XGS3700 Series The following table describes the ports. Table 2 Panel Connections CONNECTOR DESCRIPTION 24 or 48 10/ Connect these ports to a computer, a hub, an Ethernet switch or router. 100/1000Base-T RJ-45 Ethernet Ports 4 SFP or SFP+...
Chapter 3 Hardware Overview • Speed: Auto • Duplex: Auto • Flow control: Off • Dual Personality Interface: Fiber-optic module first 3.1.2 SFP/SFP+ Slots These are four slots for Small Form-Factor Pluggable (SFP) or SFP+ modules, such as an SFP/SFP+ transceiver.
Chapter 3 Hardware Overview Figure 9 Installed Transceiver 3.1.2.2 Transceiver Removal Use the following steps to remove a transceiver. Open the transceiver’s latch (latch styles vary). Figure 10 Opening the Transceiver’s Latch Example Pull the transceiver out of the slot. Figure 11 Transceiver Removal Example 3.1.3 Management Port The 100Base-T Ethernet MGMT (management) port is used for local management.
Chapter 3 Hardware Overview • No parity, 8 data bits, 1 stop bit • No flow control Connect the male 9-pin end of the RS-232 console cable to the console port of the Switch. Connect the female end to a serial port (COM1, COM2 or other COM port) of your computer. 3.2 Rear Panel The following figures show the rear panels of the Switch.
Chapter 3 Hardware Overview Disconnect the power cord from the power outlet. Disconnect the power cord from the AC power socket. 3.3 LEDs The following table describes the LEDs. Table 3 LEDs COLOR STATUS DESCRIPTION PWR1 Green The system is receiving power from the power module in the first (Power 1) power slot.
Page 36
Chapter 3 Hardware Overview Table 3 LEDs (continued) COLOR STATUS DESCRIPTION 1-24 or 1- Green Power is supplied to the PoE port. Power is not supplied to the PoE port. POE (Right) 1G SFP Slots 25-28 or Green Blinking The port is receiving or transmitting data at 1 Gbps. 49-52 The port has a successful 1 Gbps connection.
H A PT ER The Web Configurator This section introduces the configuration and functions of the web configurator. 4.1 Introduction The web configurator is an HTML-based management interface that allows easy Switch setup and management via Internet browser. Supported browsers at the time of writing are: •...
Chapter 4 The Web Configurator Figure 13 Web Configurator: Login Click OK to view the first web configurator screen. 4.3 The Web Configurator Layout The Status screen is the first screen that displays when you access the web configurator. This guide uses the XGS3700-48HP screens as an example.
Page 39
Chapter 4 The Web Configurator C - Click this link to save your configuration into the Switch’s nonvolatile memory. Nonvolatile memory is saved in the configuration file from which the Switch booted from and it stays the same even if the Switch’s power is turned off. See Section 47.6 on page 452 for information on saving your settings to a specific configuration file.
Page 40
Chapter 4 The Web Configurator The following table describes the links in the navigation panel. Table 5 Navigation Panel Links LINK DESCRIPTION Basic Settings System Info This link takes you to a screen that displays general system and hardware monitoring information.
Page 41
Chapter 4 The Web Configurator Table 5 Navigation Panel Links (continued) LINK DESCRIPTION Classifier This link takes you to screens where you can configure the Switch to group packets based on the specified criteria. Policy Rule This link takes you to a screen where you can configure the Switch to perform special treatment on the grouped packets.
Chapter 4 The Web Configurator Table 5 Navigation Panel Links (continued) LINK DESCRIPTION DiffServ This link takes you to screens where you can enable DiffServ, configure marking rules and set DSCP-to-IEEE802.1p mappings. DHCP This link takes you to screens where you can configure the DHCP settings. VRRP This link takes you to screens where you can configure redundant virtual router for your network.
Chapter 4 The Web Configurator Figure 15 Change Administrator Login Password 4.4 Saving Your Configuration When you are done modifying the settings in a screen, click Apply to save your changes back to the run-time memory. Settings in the run-time memory are lost when the Switch’s power is turned off.
Chapter 4 The Web Configurator Prevent all services from accessing the Switch. Change a service port number but forget it. Note: Be careful not to lock yourself and others out of the Switch. If you do lock yourself out, try using out-of-band management (via the management port) to configure the Switch.
Chapter 4 The Web Configurator Figure 16 Resetting the Switch: Via the Console Port Bootbase Version: V1.00 | 12/11/2012 13:49:40 RAM: Size = 524288 Kbytes DRAM POST: Testing: 524288K DRAM Test SUCCESS ! ZyNOS Version: V4.10(AAGF.5)b1 | 6/5/2014 20:10:8 Press any key to enter debug mode within 3 seconds........
H A PT ER ZON Utility, ZON Neighbor Management and Port Status 5.1 Overview This chapter describes the screens for System Status, ZON Utility, ZON Neighbor Management, Port Status and Port Details. 5.2 Status The Status screen displays when you log into the Switch or click Status at the top right corner of the web configurator.
Page 48
Chapter 5 ZON Utility, ZON Neighbor Management and Port Status The following table describes the fields in the above screen. Table 6 Status LABEL DESCRIPTION Device Information Device Type This field displays the model name of this Switch. System Name This field displays the name used to identify the Switch on any network.
Chapter 5 ZON Utility, ZON Neighbor Management and Port Status 5.3 ZyXEL One Network (ZON) Utility Screen ZON Utility is a program designed to help you deploy and manage a network more efficiently. It detects devices automatically and allows you to do basic settings on devices in the network without having to be near it.
Page 50
Chapter 5 ZON Utility, ZON Neighbor Management and Port Status Status > Neighbor Figure 20 The following table describes the fields in the above screen. Table 7 Status > Neighbor LABEL DESCRIPTION Local Port This shows the port of the Switch, on which the neighboring device is discovered. Desc.
Chapter 5 ZON Utility, ZON Neighbor Management and Port Status 5.5 Port Status This screen displays a port statistical summary with links to each port showing statistical details. To view the port statistics, click Status in all web configurator screens and then the Port Status link in the Quick Links section of the Status screen to display the Port Status screen as shown next.
Chapter 5 ZON Utility, ZON Neighbor Management and Port Status Table 8 Port Status LABEL DESCRIPTION Name This is the name you assigned to this port in the Basic Setting > Port Setup screen. Link This field displays the speed (such as 100M for 100 Mbps, 1000M for 1000 Mbps, or 10G for 10 Gbps) and the duplex (F for full duplex).
Page 53
Chapter 5 ZON Utility, ZON Neighbor Management and Port Status Figure 23 Port Status: Port Details The following table describes the labels in this screen. Table 9 Port Status: Port Details LABEL DESCRIPTION Port Info Port NO. This field displays the port number you are viewing. In stacking mode, the first number represents the slot and the second the port number.
Page 54
Chapter 5 ZON Utility, ZON Neighbor Management and Port Status Table 9 Port Status: Port Details (continued) LABEL DESCRIPTION RxPkts This field shows the number of received frames on this port Errors This field shows the number of received errors on this port. Tx KBs/s This field shows the transmission speed of data sent on this port in kilobytes per second.
Page 55
Chapter 5 ZON Utility, ZON Neighbor Management and Port Status Table 9 Port Status: Port Details (continued) LABEL DESCRIPTION 256 to 511 This field shows the number of packets (including bad packets) received that were between 256 and 511 octets in length. 512 to 1023 This field shows the number of packets (including bad packets) received that were between 512 and 1023 octets in length.
H A PT ER Basic Setting This chapter describes how to configure the Basic Setting screens. 6.1 System Information In the navigation panel, click Basic Setting > System Info to display the screen as shown. You can check the firmware version number and monitor the Switch temperature, fan speeds and voltage in this screen.
Page 57
Chapter 6 Basic Setting Figure 24 Basic Setting > System Info (Standalone Mode) GS3700/XGS3700 Series User’s Guide...
Page 58
Chapter 6 Basic Setting Figure 25 Basic Setting > System Info (Stacking Mode) The following table describes the labels in these screens. Table 10 Basic Setting > System Info (Standalone and Stacking Modes) LABEL DESCRIPTION System Name This field displays the descriptive name of the Switch for identification purposes. Product Model This field displays the product model of the Switch.
Chapter 6 Basic Setting Table 10 Basic Setting > System Info (Standalone and Stacking Modes) (continued) LABEL DESCRIPTION This field displays the minimum temperature measured at this sensor. Threshold This field displays the upper temperature limit at this sensor. Status This field displays Normal for temperatures below the threshold and Error for those above.
Page 60
Chapter 6 Basic Setting Figure 26 Basic Setting > System Info > Hardware Monitor (Stacking Mode) The following table describes the labels in this screen. Table 11 Basic Setting > System Info > Hardware Monitor (Stacking Mode) LABEL DESCRIPTION SLOT This number identifies the Switch in the stack.
Chapter 6 Basic Setting Table 11 Basic Setting > System Info > Hardware Monitor (Stacking Mode) (continued) LABEL DESCRIPTION Voltage (V) The power supply for each voltage has a sensor that is capable of detecting and reporting if the voltage falls out of the tolerance range. Current This is the current voltage reading.
Page 62
Chapter 6 Basic Setting Table 12 Basic Setting > General Setup (continued) LABEL DESCRIPTION Contact Person's Type the name of the person in charge of this Switch. You can use up to 32 printable Name ASCII characters; spaces are allowed. Use Time Server Type the time service protocol that your timeserver uses.
Chapter 6 Basic Setting Table 12 Basic Setting > General Setup (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Page 64
Chapter 6 Basic Setting Figure 28 Basic Setting > Switch Setup The following table describes the labels in this screen. Table 13 Basic Setting > Switch Setup LABEL DESCRIPTION VLAN Type Choose 802.1Q or Port Based. The VLAN Setup screen changes depending on whether (Standalone you choose 802.1Q VLAN type or Port Based VLAN type in this screen.
Chapter 6 Basic Setting Table 13 Basic Setting > Switch Setup (continued) LABEL DESCRIPTION Priority Queue Assignment IEEE 802.1p defines up to eight separate traffic types by inserting a tag into a MAC-layer frame that contains bits to define class of service. Frames without an explicit priority tag are given the default priority of the ingress port.
Chapter 6 Basic Setting You can configure up to 128 IP domains which are used to access and manage the Switch from the ports belonging to the pre-defined VLAN(s). Note: You must configure a VLAN first. Each VLAN can only have one management IP address.
Chapter 6 Basic Setting Figure 31 Basic Setting > IP Setup > IP Status Details: DHCP The following table describes the labels in this screen. Table 16 Basic Setting > IP Setup > IP Status Details: DHCP LABEL DESCRIPTION Type This shows whether ths IP address is dynamically assigned from a DHCP server or manually assigned (Static or DHCP).
Page 68
Chapter 6 Basic Setting Figure 32 Basic Setting > IP Setup > IP Configuration The following table describes the labels in this screen. Table 17 Basic Setting > IP Setup > IP Configuration LABEL DESCRIPTION Default Gateway Type the IP address of the default outgoing gateway in dotted decimal notation, for example 192.168.1.254.
Chapter 6 Basic Setting Table 17 Basic Setting > IP Setup > IP Configuration (continued) LABEL DESCRIPTION Default Enter the IP address of the default outgoing gateway in dotted decimal notation, for Gateway example, 192.168.0.254 Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Page 70
Chapter 6 Basic Setting Figure 33 Basic Setting > Port Setup (GS3700 Series) Figure 34 Basic Setting > Port Setup (XGS3700 Series: Standalone mode) GS3700/XGS3700 Series User’s Guide...
Page 71
Chapter 6 Basic Setting Figure 35 Basic Setting > Port Setup (XGS3700 Series: Stacking mode) The following table describes the labels in this screen. Table 18 Basic Setting > Port Setup LABEL DESCRIPTION Slot (Stacking This field appears only in stacking mode. Click the drop-down list to choose the slot number mode) of the Switch in a stack.
Chapter 6 Basic Setting Table 18 Basic Setting > Port Setup (continued) LABEL DESCRIPTION Speed/Duplex Select the speed and the duplex mode of the Ethernet connection on this port. The choices are Auto, 10M/Half Duplex, 10M/Full Duplex, 100M/Half Duplex and 100M/Full Duplex for a 100Base-T connection.
Page 73
Chapter 6 Basic Setting The Switch supports both the IEEE 802.3af Power over Ethernet (PoE) and IEEE 802.3at High Power over Ethernet (PoE) standards. The Switch is Power Sourcing Equipment (PSE) because it provides a source of power via its Ethernet ports, and each device that receives power through an Ethernet port is a Powered Device (PD).
Page 74
Chapter 6 Basic Setting Figure 38 Basic Setting > PoE Setup (Stacking mode) The following table describes the labels in this screen. Table 19 Basic Setting > PoE Setup LABEL DESCRIPTION PoE Status PoE Mode This field displays the power management mode used by the Switch, whether it is in Classification or Consumption mode.
Chapter 6 Basic Setting Table 19 Basic Setting > PoE Setup LABEL DESCRIPTION Class This shows the power classification of the PD. This is a number from 0 to 4, where each value represents a range of power (W) and current (mA) that the PD requires to function.
Chapter 6 Basic Setting The following table describes the labels in this screen. Table 20 Basic Setting > PoE Setup > PoE Time Range Status LABEL DESCRIPTION Port This is the number of the port on the Switch. Time Range This field displays the name of the schedule which is applied to the port.
Page 77
Chapter 6 Basic Setting Figure 41 Basic Setting > PoE Setup > PoE Setup (Stacking mode) The following table describes the labels in this screen. Table 21 Basic Setting > PoE Setup > PoE Setup LABEL DESCRIPTION PoE Mode Select the power management mode you want the Switch to use. •...
Page 78
Chapter 6 Basic Setting Table 21 Basic Setting > PoE Setup > PoE Setup (continued) LABEL DESCRIPTION PD Priority This field is not available for the SFP or SFP+ ports. When the total power requested by the PDs exceeds the total PoE power budget on the Switch, you can set the PD priority to allow the Switch to provide power to ports with higher priority.
Chapter 6 Basic Setting Note: The total power available varies by Switch. Use the show pwr command to see the total power available for your Switch. The number of ports that can be powered by PoE is the (total power available) / (maximum power available per port). In Consumption mode the power available per port is from 1 to 33 watts.
Chapter 6 Basic Setting Table 22 Basic Setting > Interface Setup (continued) LABEL DESCRIPTION Index This field displays the index number of an entry. Interface Type This field displays the type of interface. Interface ID This field displays the identification number of the interface. Interface This field displays the interface’s descriptive name which is generated automatically by the Switch.
Page 81
Chapter 6 Basic Setting Figure 44 Basic Setting > IPv6 Interface Status The following table describes the labels in this screen. Table 24 Basic Setting > IPv6 Interface Status LABEL DESCRIPTION IPv6 Active This field displays whether the IPv6 interface is activated or not. MTU Size This field displays the Maximum Transmission Unit (MTU) size for IPv6 packets on this interface.
Page 82
Chapter 6 Basic Setting Table 24 Basic Setting > IPv6 Interface Status (continued) LABEL DESCRIPTION Link Local This field displays the Switch’s link-local IP address and prefix generated by the interface. It Address also shows whether the IP address is preferred, which means it is a valid address and can be used as a sender or receiver address.
Chapter 6 Basic Setting 6.9.2 IPv6 Configuration Use this screen to configure IPv6 settings on the Switch. Click the IPv6 Configuration link in the Basic Setting > IPv6 screen. The following screen opens. Figure 45 Basic Setting > IPv6 > IPv6 Configuration The following table describes the labels in this screen.
Chapter 6 Basic Setting Figure 46 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Global Setup The following table describes the labels in this screen. Table 26 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Global Setup LABEL DESCRIPTION IPv6 Hop Limit Specify the maximum number of hops (from 1 to 255) in router advertisements.
Chapter 6 Basic Setting The following table describes the labels in this screen. Table 27 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Interface Setup LABEL DESCRIPTION Interface Select the IPv6 interface you want to configure. Active Select this option to enable the interface. Address Autoconfig Select this option to allow the interface to automatically generate a link-local address via stateless autoconfiguration.
Chapter 6 Basic Setting Table 28 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Link-Local Address Setup (continued) LABEL DESCRIPTION Default Gateway Set the default gateway IPv6 address for the interface. When an interface cannot find a routing information for a frame’s destination, it forwards the packet to the default gateway.
Chapter 6 Basic Setting Table 29 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Global Address Setup (continued) LABEL DESCRIPTION Index This is the interface index number. Click on an index number to change the settings. Interface This is the name of the IPv6 interface you created. IPv6 Global Address/ This field displays the IPv6 global address and prefix length for the interface.
Chapter 6 Basic Setting Table 30 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Neighbor Discovery Setup (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the nonvolatile memory when you are done configuring.
Chapter 6 Basic Setting The following table describes the labels in this screen. Table 31 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Router Discovery Setup LABEL DESCRIPTION Interface Select the IPv6 interface you want to configure. Flags Select the Managed Config Flag option to have the Switch set the “managed address configuration”...
Page 90
Chapter 6 Basic Setting Figure 52 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Prefix Setup The following table describes the labels in this screen. Table 32 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Prefix Setup LABEL DESCRIPTION Interface Select the IPv6 interface you want to configure.
Chapter 6 Basic Setting Table 32 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Prefix Setup (continued) LABEL DESCRIPTION Preferred Lifetime This field displays the preferred lifetime of an IPv6 address generated from the prefix. Delete Check the entry(ies) that you want to remove in the Delete column and then click Delete to remove the selected entry(ies) from the summary table.
Chapter 6 Basic Setting Table 33 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Neighbor Setup (continued) LABEL DESCRIPTION Cancel Click Cancel to begin configuring this screen afresh. Clear Click Clear to reset the fields to the factory defaults. Index This is the interface index number.
Chapter 6 Basic Setting Table 34 Basic Setting > IPv6 > IPv6 Configuration > DHCPv6 Client Setup (continued) LABEL DESCRIPTION Options Select DNS to have the Switch obtain DNS server IPv6 addresses and/or select Domain-List to have the Switch obtain a list of domain names from the DHCP server. Information Refresh Specify the time interval (from 600 to 4294967295 seconds) at which the Switch Minimum...
Chapter 6 Basic Setting Table 35 Switch Stacking MODELS WITH STACKING SUPPORT XGS3700-48 XGS3700-48HP Note: Up to 8 Switches per stack are allowed. You can manage each Switch in the stack from a master Switch using its web configurator or console.
Chapter 6 Basic Setting Figure 57 Basic Setting > Stacking Status The following table describes the labels in this screen. Table 36 Basic Setting > Stacking > Stacking Status LABEL DESCRIPTION Slot ‘Slot’ refers to a Switch in the the ‘virtual chassis’ stack. This field displays the slot ID of the stacked Switch.
Page 96
Chapter 6 Basic Setting Figure 58 Basic Setting > Stacking > Stacking Status > Slot number The following table describes the labels in this screen. Table 37 Basic Setting > Stacking > Stacking Status > Slot number LABEL DESCRIPTION Slot This field displays the slot ID of the Switch.
Chapter 6 Basic Setting 6.10.3 Stacking Configuration A supported Switch can change between stacking and standalone mode by selecting the Active check box in the Basic Setting > Stacking > Configuration screen. Note: When you change modes, all configurations except user accounts, but including running configuration, config01 and config02 will be erased and the Switch will reboot with a new config01.
Page 98
Chapter 6 Basic Setting After reboot completes, the master LED will turn on. Configure the Switch stacking priority to a high value, such as 63. Change a second Switch to stacking mode and wait for it to finish rebooting automatically. This master LED will also turn on.
Chapter 6 Basic Setting The following table describes the labels in this screen. Table 38 Basic Setting > Stacking > Configuration LABEL DESCRIPTION Active Select the Active check box to put the Switch in stacking mode. This will erase the running configuration, config01 and config02.
Page 100
Chapter 6 Basic Setting Table 39 Basic Setting > DNS (continued) LABEL DESCRIPTION Server Address Enter a domain name server IPv6/IPv4 address in order to be able to use a domain name instead of an IP address. Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the nonvolatile memory when you are done configuring.
H A PT ER VLAN The type of screen you see here depends on the VLAN Type you selected in the Switch Setup screen which is only available in standalone mode. The Switch does not support port-based VLANs in stacking mode. This chapter shows you how to configure 802.1Q tagged and port-based VLANs. 7.1 Introduction to IEEE 802.1Q Tagged VLANs A tagged VLAN uses an explicit tag (VLAN ID) in the MAC header to identify the VLAN membership of a frame across bridges - they are not confined to the switch on which they were created.
Chapter 7 VLAN 7.2 Automatic VLAN Registration GARP and GVRP are the protocols used to automatically register VLAN membership across switches. 7.2.1 GARP GARP (Generic Attribute Registration Protocol) allows network switches to register and de-register attribute values with other GARP participants within a bridged LAN. GARP is a protocol that provides a generic mechanism for protocols that serve a more specific application, for example, GVRP.
Chapter 7 VLAN 7.3 Port VLAN Trunking Enable VLAN Trunking on a port to allow frames belonging to unknown VLAN groups to pass through that port. This is useful if you want to set up VLAN groups on end devices without having to configure the same VLAN groups on intermediary devices.
Chapter 7 VLAN 7.5.1 VLAN Status Section 7.1 on page 101 for more information on 802.1Q VLAN. Click Advanced Application > VLAN from the navigation panel to display the VLAN Status screen as shown next. Figure 63 Advanced Application > VLAN: VLAN Status The following table describes the labels in this screen.
Chapter 7 VLAN 7.5.2 VLAN Details Use this screen to view detailed port settings and status of the VLAN group. See Section 7.1 on page 101 for more information on 802.1Q VLAN. Click on an index number in the VLAN Status screen to display VLAN details.
Chapter 7 VLAN Table 42 Advanced Application > VLAN > VLAN Detail (continued) LABEL DESCRIPTION Port List This shows the ports mapped to the private VLAN using the Advanced Application > Private VLAN or Advanced Application > VLAN > Static VLAN screen. Change Pages Click Previous or Next to show the previous/next screen if all status information cannot be seen in one screen.
Chapter 7 VLAN Figure 66 Advanced Application > VLAN > VLAN Configuration The following table describes the labels in the above screen. Table 44 Advanced Application > VLAN > VLAN Configuration LABEL DESCRIPTION Static VLAN Setup Click Click Here to configure the Static VLAN for the Switch. VLAN Port Setup Click Click Here to configure the VLAN Port for the Switch.
Page 108
Chapter 7 VLAN Figure 67 Advanced Application > VLAN > VLAN Configuration > Static VLAN Setup The following table describes the related labels in this screen. Table 45 Advanced Application > VLAN > VLAN Configuration > Static VLAN Setup LABEL DESCRIPTION ACTIVE Select this check box to activate the VLAN settings.
Chapter 7 VLAN Table 45 Advanced Application > VLAN > VLAN Configuration > Static VLAN Setup (continued) LABEL DESCRIPTION Port The port number identifies the port you are configuring. In stacking mode, the first number represents the slot and the second the port number. Settings in this row apply to all ports.
Chapter 7 VLAN The following table describes the labels in this screen. Table 46 Advanced Application > VLAN > VLAN Configuration > VLAN Port Setup: Standalone/ Stacking mode LABEL DESCRIPTION GVRP GVRP (GARP VLAN Registration Protocol) is a registration protocol that defines a way for switches to register necessary VLAN members on ports across the network.
Page 112
Chapter 7 VLAN subnet it came from. The untagged packets from the same IP subnet are then placed in the same subnet based VLAN. One advantage of using subnet based VLANs is that priority can be assigned to traffic from the same IP subnet. Note: Subnet based VLAN applies to un-tagged packets and is applicable only when you use IEEE 802.1Q tagged VLAN.
Page 113
Chapter 7 VLAN Figure 71 Advanced Application > VLAN > VLAN Configuration > Subnet Based VLAN Setup The following table describes the labels in this screen. Table 47 Advanced Application > VLAN > VLAN Configuration > Subnet Based VLAN Setup LABEL DESCRIPTION Active...
Chapter 7 VLAN Table 47 Advanced Application > VLAN > VLAN Configuration > Subnet Based VLAN Setup LABEL DESCRIPTION This field shows the IP address of the subnet for this subnet based VLAN. Mask-Bits This field shows the subnet mask in bit number format for this subnet based VLAN. This field shows the VLAN ID of the frames which belong to this subnet based VLAN.
Page 115
Chapter 7 VLAN Figure 73 Advanced Application > VLAN > VLAN Configuration > Protocol Based VLAN Setup The following table describes the labels in this screen. Table 48 Advanced Application > VLAN > VLAN Configuration > Protocol Based VLAN Setup LABEL DESCRIPTION Active...
Page 116
Chapter 7 VLAN Table 48 Advanced Application > VLAN > VLAN Configuration > Protocol Based VLAN Setup LABEL DESCRIPTION Priority This field shows the priority which is assigned to frames belonging to this protocol based VLAN. Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries.
Chapter 7 VLAN 7.8 Port-based VLAN Setup (Standalone Mode) Port-based VLANs are VLANs where the packet forwarding decision is based on the destination MAC address and its associated port. Port-based VLANs require allowed outgoing ports to be defined for each port. Therefore, if you wish to allow two subscriber ports to talk to each other, for example, between conference rooms in a hotel, you must define the egress (an egress port is an outgoing port, that is, a port through which a data packet leaves) for both ports.
Page 118
Chapter 7 VLAN Figure 75 Advanced Application > VLAN > Port Based VLAN Setup (All Connected) The following screen shows users on a port-based, port-isolated VLAN configuration. GS3700/XGS3700 Series User’s Guide...
Page 119
Chapter 7 VLAN Figure 76 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation) GS3700/XGS3700 Series User’s Guide...
Chapter 7 VLAN The following table describes the labels in this screen. Table 49 Advanced Application > VLAN: Port Based VLAN Setup LABEL DESCRIPTION Setting Wizard Choose All connected or Port isolation. All connected means all ports can communicate with each other, that is, there are no virtual LANs.
Page 121
Chapter 7 VLAN Figure 77 Advanced Application > VLAN > VLAN Configuration > Voice VLAN Setup The following table describes the fields in the above screen. Table 50 Advanced Application > VLAN > VLAN Configuration > Voice VLAN Setup LABEL DESCRIPTION Voice VLAN Global Setup Voice VLAN...
Chapter 7 VLAN Table 50 Advanced Application > VLAN > VLAN Configuration > Voice VLAN Setup LABEL DESCRIPTION Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries. Delete Click Delete to remove the selected entry from the summary table.
Page 123
Chapter 7 VLAN Table 51 Advanced Application > VLAN > VLAN Configuration > MAC-based VLAN Setup LABEL DESCRIPTION Priority Type a priority (0-7) for the MAC-based VLAN entry.The higher the numeric value you assign, the higher the priority for this MAC-based VLAN entry. Click Add to save the new MAC-based VLAN entry.
H A PT ER Static MAC Forward Setup Use these screens to configure static MAC address forwarding. 8.1 Overview This chapter discusses how to configure forwarding rules based on MAC addresses of devices on your network. 8.2 Configuring Static MAC Forwarding A static MAC address is an address that has been manually entered in the MAC address table.
Page 125
Chapter 8 Static MAC Forward Setup Figure 80 Advanced Application > Static MAC Forwarding (Stacking mode) The following table describes the labels in this screen. Table 52 Advanced Application > Static MAC Forwarding LABEL DESCRIPTION Active Select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by clearing this check box.
Page 126
Chapter 8 Static MAC Forward Setup Table 52 Advanced Application > Static MAC Forwarding (continued) LABEL DESCRIPTION Delete Click Delete to remove the selected entry from the summary table. Cancel Click Cancel to clear the check boxes. GS3700/XGS3700 Series User’s Guide...
H A PT ER Static Multicast Forward Setup Use these screens to configure static multicast address forwarding. 9.1 Static Multicast Forwarding Overview A multicast MAC address is the MAC address of a member of a multicast group. A static multicast address is a multicast MAC address that has been manually entered in the multicast table.
Chapter 9 Static Multicast Forward Setup Figure 83 Static Multicast Forwarding to Multiple Ports 9.2 Configuring Static Multicast Forwarding Use this screen to configure rules to forward specific multicast frames, such as streaming or control frames, to specific port(s). Click Advanced Application > Static Multicast Forwarding to display the configuration screen as shown.
Page 129
Chapter 9 Static Multicast Forward Setup Table 53 Advanced Application > Static Multicast Forwarding (continued) LABEL DESCRIPTION Port Enter the port(s) where frames with destination MAC address that matched the entry above are forwarded. You can enter multiple ports separated by (no space) comma (,) or hyphen for a range.
HAPTER Filtering This chapter discusses MAC address port filtering. 10.1 Configure a Filtering Rule Configure the Switch to filter traffic based on the traffic’s source, destination MAC addresses and/or VLAN group (ID). Click Advanced Application > Filtering in the navigation panel to display the screen as shown next.
Page 131
Chapter 10 Filtering Table 54 Advanced Application > FIltering (continued) LABEL DESCRIPTION Action Select Discard source to drop frames from the source MAC address (specified in the MAC field). The Switch can still send frames to the MAC address. Select Discard destination to drop frames to the destination MAC address (specified in the MAC address).
HAPTER Spanning Tree Protocol The Switch supports Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP) and Multiple Spanning Tree Protocol (MSTP) as defined in the following standards. • IEEE 802.1D Spanning Tree Protocol • IEEE 802.1w Rapid Spanning Tree Protocol •...
Chapter 11 Spanning Tree Protocol Table 55 STP Path Costs RECOMMENDED RECOMMENDED LINK SPEED ALLOWED RANGE VALUE RANGE Path Cost 1Gbps 3 to 10 1 to 65535 Path Cost 10Gbps 1 to 5 1 to 65535 On each bridge, the bridge communicates with the root through the root port. The root port is the port on this Switch with the lowest path cost to the root (the root path cost).
Chapter 11 Spanning Tree Protocol In the following example, there are two RSTP instances (MRSTP1 and MRSTP2) on switch A. Figure 86 MRSTP Network Example To set up MRSTP, activate MRSTP on the Switch and specify which port(s) belong to which spanning tree.
Page 135
Chapter 11 Spanning Tree Protocol Figure 87 STP/RSTP Network Example VLAN 1 VLAN 2 With MSTP, VLANs 1 and 2 are mapped to different spanning trees in the network. Thus traffic from the two VLANs travel on different paths. The following figure shows the network example using MSTP.
Chapter 11 Spanning Tree Protocol 11.1.5.3 MST Instance An MST Instance (MSTI) is a spanning tree instance. VLANs can be configured to run on a specific MSTI. Each created MSTI is identified by a unique number (known as an MST ID) known internally to a region.
Chapter 11 Spanning Tree Protocol Figure 91 Advanced Application > Spanning Tree Protocol (Standalone mode) Figure 92 Advanced Application > Spanning Tree Protocol (Stacking mode) This screen differs depending on which STP mode (RSTP, MRSTP or MSTP) you configure on the Switch.
Chapter 11 Spanning Tree Protocol The following table describes the labels in this screen. Table 57 Advanced Application > Spanning Tree Protocol > Configuration LABEL DESCRIPTION Spanning Tree You can activate one of the STP modes on the Switch. Mode Select Rapid Spanning Tree, Multiple Rapid Spanning Tree or Multiple Spanning Tree.
Page 139
Chapter 11 Spanning Tree Protocol Figure 95 Advanced Application > Spanning Tree Protocol > RSTP (Stacking mode) The following table describes the labels in this screen. Table 58 Advanced Application > Spanning Tree Protocol > RSTP LABEL DESCRIPTION Status Click Status to display the RSTP Status screen (see Figure 96 on page 141).
Page 140
Chapter 11 Spanning Tree Protocol Table 58 Advanced Application > Spanning Tree Protocol > RSTP (continued) LABEL DESCRIPTION Max Age This is the maximum time (in seconds) a switch can wait without receiving a BPDU before attempting to reconfigure. All switch ports (except for designated ports) should receive BPDUs at regular intervals.
Chapter 11 Spanning Tree Protocol 11.5 Rapid Spanning Tree Protocol Status Click Advanced Application > Spanning Tree Protocol in the navigation panel to display the status screen as shown next. See Section 11.1 on page 132 for more information on RSTP. Note: This screen is only available after you activate RSTP on the Switch.
Chapter 11 Spanning Tree Protocol Table 59 Advanced Application > Spanning Tree Protocol > Status: RSTP (continued) LABEL DESCRIPTION Port State This field displays the port state in STP. • Discarding - The port does not forward/process received frames or learn MAC addresses, but still listens for BPDUs.
Page 143
Chapter 11 Spanning Tree Protocol Figure 97 Advanced Application > Spanning Tree Protocol > MRSTP (Standalone mode) Figure 98 Advanced Application > Spanning Tree Protocol > MRSTP (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Page 144
Chapter 11 Spanning Tree Protocol The following table describes the labels in this screen. Table 60 Advanced Application > Spanning Tree Protocol > MRSTP LABEL DESCRIPTION Status Click Status to display the MRSTP Status screen (see Figure 99 on page 145).
Chapter 11 Spanning Tree Protocol Table 60 Advanced Application > Spanning Tree Protocol > MRSTP (continued) LABEL DESCRIPTION Root Guard Select this check box to enable root guard on this port in order to prevent the switch(es) (Standalone attached to the port from becoming the root bridge. mode) With root guard enabled, a port is blocked when the Switch receives a superior BPDU on it.
Page 146
Chapter 11 Spanning Tree Protocol The following table describes the labels in this screen. Table 61 Advanced Application > Spanning Tree Protocol > Status: MRSTP LABEL DESCRIPTION Configuration Click Configuration to specify which STP mode you want to activate. Click MRSTP to edit MRSTP settings on the Switch.
Chapter 11 Spanning Tree Protocol Table 61 Advanced Application > Spanning Tree Protocol > Status: MRSTP (continued) LABEL DESCRIPTION Designated Cost This field displays the path cost to the LAN segment to which the port is connected when the port is a designated port. Otherwise, it displays the path cost to the root bridge from the designated port for the LAN segament to which this port is connected.
Page 148
Chapter 11 Spanning Tree Protocol Figure 100 Advanced Application > Spanning Tree Protocol > MSTP (Standalone mode) GS3700/XGS3700 Series User’s Guide...
Page 149
Chapter 11 Spanning Tree Protocol Figure 101 Advanced Application > Spanning Tree Protocol > MSTP (Stacking mode) The following table describes the labels in this screen. Table 62 Advanced Application > Spanning Tree Protocol > MSTP LABEL DESCRIPTION Status Click Status to display the MSTP Status screen (see Figure 104 on page 154).
Page 150
Chapter 11 Spanning Tree Protocol Table 62 Advanced Application > Spanning Tree Protocol > MSTP (continued) LABEL DESCRIPTION MaxAge This is the maximum time (in seconds) a switch can wait without receiving a BPDU before attempting to reconfigure. All switch ports (except for designated ports) should receive BPDUs at regular intervals.
Chapter 11 Spanning Tree Protocol Table 62 Advanced Application > Spanning Tree Protocol > MSTP (continued) LABEL DESCRIPTION Active Select this check box to add this port to the MST instance. Priority Configure the priority for each port here. Priority decides which port should be disabled when more than one port forms a loop in the Switch.
Page 152
Chapter 11 Spanning Tree Protocol Figure 102 Advanced Application > Spanning Tree Protocol > MSTP > Port (Standalone mode) GS3700/XGS3700 Series User’s Guide...
Page 153
Chapter 11 Spanning Tree Protocol Figure 103 Advanced Application > Spanning Tree Protocol > MSTP > Port (Stacking mode) The following table describes the labels in this screen. Table 63 Advanced Application > Spanning Tree Protocol > MSTP > Port LABEL DESCRIPTION Slot (Stacking...
Chapter 11 Spanning Tree Protocol Table 63 Advanced Application > Spanning Tree Protocol > MSTP > Port (continued) LABEL DESCRIPTION Root Guard Select this check box to enable root guard on this port in order to prevent the switch(es) (Standalone attached to the port from becoming the root bridge.
Page 155
Chapter 11 Spanning Tree Protocol The following table describes the labels in this screen. Table 64 Advanced Application > Spanning Tree Protocol > Status: MSTP LABEL DESCRIPTION Configuration Click Configuration to specify which STP mode you want to activate. Click MSTP to edit MSTP settings on the Switch.
Page 156
Chapter 11 Spanning Tree Protocol Table 64 Advanced Application > Spanning Tree Protocol > Status: MSTP (continued) LABEL DESCRIPTION Port State This field displays the port state in STP. • Discarding - The port does not forward/process received frames or learn MAC addresses, but still listens for BPDUs.
HAPTER Bandwidth Control This chapter shows you how to cap the maximum bandwidth using the Bandwidth Control screen. 12.1 Bandwidth Control Overview Bandwidth control means defining a maximum allowable bandwidth for incoming and/or out-going traffic flows on a port. 12.1.1 CIR and PIR The Committed Information Rate (CIR) is the guaranteed bandwidth for the incoming traffic flow on a port.
Page 158
Chapter 12 Bandwidth Control Figure 105 Advanced Application > Bandwidth Control (Standalone mode) Figure 106 Advanced Application > Bandwidth Control (Stacking mode) The following table describes the related labels in this screen. Table 65 Advanced Application > Bandwidth Control LABEL DESCRIPTION Active Select this check box to enable bandwidth control on the Switch.
Page 159
Chapter 12 Bandwidth Control Table 65 Advanced Application > Bandwidth Control (continued) LABEL DESCRIPTION Port This field displays the port number. In stacking mode, the first box field is the slot ID and the (Standalone or second field is the port number. stacking mode) Settings in this row apply to all ports.
HAPTER Broadcast Storm Control This chapter introduces and shows you how to configure the broadcast storm control feature. 13.1 Broadcast Storm Control Setup Broadcast storm control limits the number of broadcast, multicast and destination lookup failure (DLF) packets the Switch receives per second on the ports. When the maximum number of allowable broadcast, multicast and/or DLF packets is reached per second, the subsequent packets are discarded.
Page 161
Chapter 13 Broadcast Storm Control Figure 108 Advanced Application > Broadcast Storm Control (Stacking mode) The following table describes the labels in this screen. Table 66 Advanced Application > Broadcast Storm Control LABEL DESCRIPTION Active Select this check box to enable traffic storm control on the Switch. Clear this check box to disable this feature.
HAPTER Mirroring This chapter discusses port mirroring setup screens. 14.1 Port Mirroring Port mirroring allows you to copy a traffic flow to a monitor port (the port you copy the traffic to) in order that you can examine the traffic from the monitor port without interference. The Switch supports both local port mirroring and remote port mirroring.
Page 163
Chapter 14 Mirroring Single-Destination RMirror If the mirrored traffic is forwarded to one single destination switch, you can disable the reflector port. The Switch adds RMirror VLAN tag and forwards mirrored traffic from the mirroring port to the connected port directly. Source Intermediate Destination...
Page 164
Chapter 14 Mirroring Port Rules in Port Mirroring The following table shows the rule for a port in remote port mirroring. For example, a port on the source device can be a mirroring port in both RMirror VLAN 1 and RMirror VLAN 2. But when the port is the source device’s mirroring port in RMirror VLAN 1, it cannot be the reflector port or monitor port in another RMirror VLAN.
Chapter 14 Mirroring 14.1.1 Local Port Mirroring Click Advanced Application > Mirroring in the navigation panel to display the Mirroring screen. Use this screen to select a monitor port and specify the traffic flow to be copied to the monitor port. Figure 109 Advanced Application >...
Page 166
Chapter 14 Mirroring Figure 110 Advanced Application > Mirroring (Stacking mode) The following table describes the labels in this screen. Table 69 Advanced Application > Mirroring LABEL DESCRIPTION Active Select this check box to activate port mirroring on the Switch. Clear this check box to disable the feature.
Chapter 14 Mirroring Table 69 Advanced Application > Mirroring (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Chapter 14 Mirroring 14.1.3 Source Use this screen to configure the reflector port and specify the traffic flow to be copied to the monitor port when the Switch is the source device in remote port mirroring. Click the Source link in the RMirror screen. The following screen opens. Figure 112 Advanced Application >...
Page 169
Chapter 14 Mirroring Figure 113 Advanced Application > Mirroring > RMirror > Source (Stacking mode) The following table describes the labels in this screen. Table 71 Advanced Application > Mirroring > RMirror > Source LABEL DESCRIPTION RMirror VLAN ID Select the RMirror VLAN over which the mirrored traffic is forwarded. Priority Enter the priority of the mirrored traffic.
Chapter 14 Mirroring Table 71 Advanced Application > Mirroring > RMirror > Source (continued) LABEL DESCRIPTION Settings in this row apply to all ports. Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
Chapter 14 Mirroring The following table describes the labels in this screen. Table 72 Advanced Application > Mirroring > RMirror > Destination LABEL DESCRIPTION RMirror VLAN ID Select the RMirror VLAN over which the mirrored traffic is forwarded. Monitor Port Specify the port to which you copy the traffic in order to examine it in more detail without interfering with the traffic flow on the original port(s).
Page 173
Chapter 14 Mirroring Figure 116 Advanced Application > Mirroring > RMirror > Connected Port (Stacking mode) The following table describes the labels in this screen. Table 73 Advanced Application > Mirroring > RMirror > Connected Port LABEL DESCRIPTION RMirror VLAN ID Select the RMirror VLAN over which the mirrored traffic is forwarded.
Page 174
Chapter 14 Mirroring Table 73 Advanced Application > Mirroring > RMirror > Connected Port (continued) LABEL DESCRIPTION Connected Port When the Switch is a source device in remote port mirroring, select this option to have the port help forward mirrored traffic to the connected port of the intermediate or destination device in the same RMirror VLAN.
HAPTER Link Aggregation This chapter shows you how to logically aggregate physical links to form one logical, higher- bandwidth link. 15.1 Link Aggregation Overview Link aggregation (trunking) is the grouping of physical ports into one logical higher-capacity link. You may want to trunk ports if for example, it is cheaper to use multiple lower-speed links than to under-utilize a high-speed, but more costly, single-port link.
Chapter 15 Link Aggregation Configure trunk groups or LACP before you connect the Ethernet switch to avoid causing network topology loops. 15.2.1 Link Aggregation ID LACP aggregation ID consists of the following information. Port Priority and Port Number are 0 as it is the aggregator ID for the trunk group, not the individual port.
Chapter 15 Link Aggregation The following table describes the labels in this screen. Table 76 Advanced Application > Link Aggregation Status LABEL DESCRIPTION Group ID This field displays the group ID to identify a trunk group, that is, one logical link containing multiple ports.
Page 178
Chapter 15 Link Aggregation Figure 118 Advanced Application > Link Aggregation > Link Aggregation Setting (Standalone mode) GS3700/XGS3700 Series User’s Guide...
Page 179
Chapter 15 Link Aggregation Figure 119 Advanced Application > Link Aggregation > Link Aggregation Setting (Stacking mode) The following table describes the labels in this screen. Table 77 Advanced Application > Link Aggregation > Link Aggregation Setting LABEL DESCRIPTION Link This is the only screen you need to configure to enable static link aggregation.
Chapter 15 Link Aggregation Table 77 Advanced Application > Link Aggregation > Link Aggregation Setting (continued) LABEL DESCRIPTION Active Select this option to activate a trunk group. Criteria Select the outgoing traffic distribution type. Packets from the same source and/or to the same destination are sent over the same link within the trunk.
Page 181
Chapter 15 Link Aggregation Figure 120 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP (Standalone mode) GS3700/XGS3700 Series User’s Guide...
Page 182
Chapter 15 Link Aggregation Figure 121 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP (Stacking mode) The following table describes the labels in this screen. Table 78 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP LABEL DESCRIPTION Link...
Chapter 15 Link Aggregation Table 78 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP (continued) LABEL DESCRIPTION Slot (Stacking This field appears only in stacking mode. Click the drop-down list to choose the slot number mode) of the Switch in a stack. Port This field displays the port number.
Page 184
Chapter 15 Link Aggregation Figure 123 Trunking Example - Configuration Screen EXAMPLE Your trunk group 1 (T1) configuration is now complete. GS3700/XGS3700 Series User’s Guide...
HAPTER Port Authentication This chapter describes the IEEE 802.1x and MAC authentication methods. 16.1 Port Authentication Overview Port authentication is a way to validate access to ports on the Switch to clients based on an external server (authentication server). The Switch supports the following methods for port authentication: IEEE 802.1x - An authentication server validates access to a port based on a username and password provided by the user.
Chapter 16 Port Authentication Figure 124 IEEE 802.1x Authentication Process New Connection Identity Request Login Credentials Authentication Request Access Challenge Challenge Request Challenge Response Access Request Authentication Reply Session Granted/Denied 16.1.2 MAC Authentication MAC authentication works in a very similar way to IEEE 802.1x authentication. The main difference is that the Switch does not prompt the client for login credentials.
Chapter 16 Port Authentication Figure 125 MAC Authentication Process New Connection Authentication Request Authentication Reply Session Granted/Denied 16.2 Port Authentication Configuration To enable port authentication, first activate the port authentication method(s) you want to use (both on the Switch and the port(s)), then configure the RADIUS server settings in the AAA > Radius Server Setup screen.
Page 188
Chapter 16 Port Authentication Figure 127 Advanced Application > Port Authentication > 802.1x (Standalone mode) Figure 128 Advanced Application > Port Authentication > 802.1x (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Chapter 16 Port Authentication The following table describes the labels in this screen. Table 79 Advanced Application > Port Authentication > 802.1x LABEL DESCRIPTION Active Select this check box to permit 802.1x authentication on the Switch. Note: You must first enable 802.1x authentication on the Switch before configuring it on each port.
Page 190
Chapter 16 Port Authentication Figure 129 Guest VLAN Example VLAN 100 VLAN 102 Internet Use this screen to enable and assign a guest VLAN to a port. In the Port Authentication > 802.1x screen click Guest Vlan to display the configuration screen as shown. Figure 130 Advanced Application >...
Page 191
Chapter 16 Port Authentication Figure 131 Advanced Application > Port Authentication > 802.1x > Guest VLAN (Stacking mode) The following table describes the labels in this screen. Table 80 Advanced Application > Port Authentication > 802.1x > Guest VLAN LABEL DESCRIPTION Slot (Stacking This field appears only in stacking mode.
Chapter 16 Port Authentication Table 80 Advanced Application > Port Authentication > 802.1x > Guest VLAN (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Page 193
Chapter 16 Port Authentication Figure 133 Advanced Application > Port Authentication > MAC Authentication (Stacking mode) The following table describes the labels in this screen. Table 81 Advanced Application > Port Authentication > MAC Authentication LABEL DESCRIPTION Active Select this check box to permit MAC authentication on the Switch. Note: You must first enable MAC authentication on the Switch before configuring it on each port.
Page 194
Chapter 16 Port Authentication Table 81 Advanced Application > Port Authentication > MAC Authentication (continued) LABEL DESCRIPTION Use this row to make the setting the same for all ports. Use this row first and then make adjustments on a port-by-port basis. Note: Changes in this row are copied to all the ports as soon as you make them.
HAPTER Port Security This chapter shows you how to set up port security. 17.1 About Port Security Port security allows only packets with dynamically learned MAC addresses and/or configured static MAC addresses to pass through a port on the Switch. The Switch can learn up to 32K MAC addresses in total with no limit on individual ports other than the sum cannot exceed 32K.
Page 196
Chapter 17 Port Security Figure 134 Advanced Application > Port Security (Standalone mode) Figure 135 Advanced Application > Port Security (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Chapter 17 Port Security The following table describes the labels in this screen. Table 82 Advanced Application > Port Security LABEL DESCRIPTION Port List Enter the number of the port(s) (separated by a comma) on which you want to enable port security and disable MAC address learning.
Page 198
Chapter 17 Port Security Figure 136 Advanced Application > Port Security > VLAN MAC Address Limit The following table describes the labels in this screen. Table 83 Advanced Application > Port Security > VLAN MAC Address Limit LABEL DESCRIPTION Active Select this option to activate this rule.
HAPTER Time Range This chapter shows you how to set up a time range for time-oriented features on the Switch. 18.1 About Time Range You can set a time range for time-oriented features such as Classifier ACL (Access Control List) rule which categorizes data packets into different network traffic flow.
Page 200
Chapter 18 Time Range The following table describes the labels in this screen. Table 84 Advanced Application > Time Range LABEL DESCRIPTION Name Type a name for this time range rule. Type Select a time range type. Absolute is a fixed time range that has a set start and end date. Periodic is recurrence of a time range.
HAPTER Classifier This chapter introduces and shows you how to configure the packet classifier on the Switch. 19.1 About the Classifier and QoS Quality of Service (QoS) refers to both a network's ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth.
Chapter 19 Classifier Figure 138 Advanced Application > Classifier > Classifier Status The following table describes the labels in this screen. Table 85 Advanced Application > Classifier > Classifier Status LABEL DESCRIPTION Index This field displays the index number of the Classifier rule. Active This field displays Yes when the rule is activated and No when it is deactivated.
Page 203
Chapter 19 Classifier Figure 139 Advanced Application > Classifier > Classifier Configuration The following table describes the labels in this screen. Table 86 Advanced Application > Classifier > Classifier Configuration LABEL DESCRIPTION Active Select this option to enable this rule. Name Enter a descriptive name for this rule for identifying purposes.
Page 204
Chapter 19 Classifier Table 86 Advanced Application > Classifier > Classifier Configuration (continued) LABEL DESCRIPTION Weight Enter a number between 0 and 65535 to specify the rule’s weight. When the match order is in manual mode in the Classifier Global Setting screen, a higher weight means a higher priority.
Page 205
Chapter 19 Classifier Table 86 Advanced Application > Classifier > Classifier Configuration (continued) LABEL DESCRIPTION MAC Address Select Any to apply the rule to all MAC addresses. To specify a source, select MAC/Mask to enter the source MAC address of the packet in valid MAC address format (six hexadecimal character pairs) and type the mask for the specified MAC address to determine which bits a packet’s MAC address should match.
Chapter 19 Classifier Table 86 Advanced Application > Classifier > Classifier Configuration (continued) LABEL DESCRIPTION Click this to create a new entry or to update an existing one. This saves your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Chapter 19 Classifier Table 88 Common Ethernet Types and Protocol Number ETHERNET TYPE PROTOCOL NUMBER X.25 Level 3 0805 XNS Compat 0807 Banyan Systems 0BAD BBN Simnet 5208 IBM SNA 80D5 AppleTalk AARP 80F3 Some of the most common IP ports are: Table 89 Common IP Ports PORT NUMBER PORT NAME...
Chapter 19 Classifier Table 90 Advanced Application > Classifier > Classifier Configuration > Classifier Global Setting LABEL DESCRIPTION Active Select this to allow the Switch to create a log when packets match a classifier rule during a defined time interval. Interval Select the length of the time period (in seconds) to count matched packets for a classifier rule.
Page 209
Chapter 19 Classifier Figure 142 Classifier: Example EXAMPLE After you have configured a classifier, you can configure a policy to define action(s) on the classified traffic flow. See Chapter 20 on page 210 for information on configuring a policy rule. GS3700/XGS3700 Series User’s Guide...
HAPTER Policy Rule This chapter shows you how to configure policy rules. 20.1 Policy Rules Overview A classifier distinguishes traffic into flows based on the configured criteria (refer to Chapter 19 on page 201 for more information). A policy rule ensures that a traffic flow gets the requested treatment in the network.
Page 211
Chapter 20 Policy Rule Click Advanced Application > Policy Rule in the navigation panel to display the screen as shown. Figure 143 Advanced Application > Policy Rule The following table describes the labels in this screen. Table 91 Advanced Application > Policy Rule LABEL DESCRIPTION Active...
Page 212
Chapter 20 Policy Rule Table 91 Advanced Application > Policy Rule (continued) LABEL DESCRIPTION Parameters Set the fields below for this policy. You only have to set the field(s) that is related to the action(s) you configure in the Action field. General Egress Port Type the number of an outgoing port.
Chapter 20 Policy Rule Table 91 Advanced Application > Policy Rule (continued) LABEL DESCRIPTION Metering Select Enable to activate bandwidth limitation on the traffic flow(s) then set the actions to be taken on out-of-profile packets. Out-of-profile Select the action(s) to be performed for out-of-profile traffic. action Select Drop the packet to discard the out-of-profile traffic.
Page 214
Chapter 20 Policy Rule Figure 144 Policy Example EXAMPLE GS3700/XGS3700 Series User’s Guide...
HAPTER Queuing Method This chapter introduces the queuing methods supported. 21.1 Queuing Method Overview Queuing is used to help solve performance degradation when there is network congestion. Use the Queuing Method screen to configure queuing algorithms for outgoing traffic. See also Priority Queue Assignment in Switch Setup and 802.1p Priority in Port Setup for related information.
Chapter 21 Queuing Method 21.1.3 Weighted Round Robin Scheduling (WRR) Round Robin Scheduling services queues on a rotating basis and is activated only when a port has more traffic than it can handle. A queue is given an amount of bandwidth irrespective of the incoming traffic on that port.
Page 217
Chapter 21 Queuing Method Figure 146 Advanced Application > Queuing Method (Stacking mode) The following table describes the labels in this screen. Table 92 Advanced Application > Queuing Method LABEL DESCRIPTION Slot This field appears only in stacking mode. Click the drop-down list to choose the slot number of (Stacking the Switch in a stack.
Page 218
Chapter 21 Queuing Method Table 92 Advanced Application > Queuing Method (continued) LABEL DESCRIPTION Hybrid- This field is applicable only when you select WFQ or WRR. Select a queue (Q0 to Q7) to have the Switch use SPQ to service the subsequent queue(s) after Lowest- and including the specified queue for the 1000Base-T, 1000Base-X and 10 Gigabit Ethernet Queue...
HAPTER VLAN Stacking This chapter shows you how to configure VLAN stacking on your Switch. See the chapter on VLANs for more background information on Virtual LAN 22.1 VLAN Stacking Overview A service provider can use VLAN stacking to allow it to distinguish multiple customers VLANs, even those with the same (customer-assigned) VLAN ID, within its network.
Chapter 22 VLAN Stacking Figure 147 VLAN Stacking Example 22.2 VLAN Stacking Port Roles Each port can have three VLAN stacking “roles”, Normal, Access Port and Tunnel Port (the latter is for Gigabit ports only). • Select Normal for “regular” (non-VLAN stacking) IEEE 802.1Q frame switching. •...
Chapter 22 VLAN Stacking Type is a standard Ethernet type code identifying the frame and indicates that whether the frame carries IEEE 802.1Q tag information. SP TPID (Service Provider Tag Protocol Identifier) is the service provider VLAN stacking tag type. Many vendors use 0x8100 or 0x9100. TPID (Tag Protocol Identifier) is the customer IEEE 802.1Q tag.
Chapter 22 VLAN Stacking The following table describes the labels in this screen. Table 96 Advanced Application > VLAN Stacking LABEL DESCRIPTION Active Select this checkbox to enable VLAN stacking on the Switch. Slot This field appears only in stacking mode. Click the drop-down list to choose the slot number of (Stacking the Switch in a stack.
Chapter 22 VLAN Stacking The following table describes the labels in this screen. Table 97 Advanced Application > VLAN Stacking > Port-based QinQ LABEL DESCRIPTION Slot This field appears only in stacking mode. Click the drop-down list to choose the slot number of (Stacking the Switch in a stack.
Page 226
Chapter 22 VLAN Stacking The following table describes the labels in this screen. Table 98 Advanced Application > VLAN Stacking > Selective QinQ LABEL DESCRIPTION Active Check this box to activate this rule. Name Enter a descriptive name (up to 32 printable ASCII characters) for identification purposes. Port The port number identifies the port you are configuring.
HAPTER Multicast This chapter shows you how to configure various multicast features. 23.1 Multicast Overview Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender to 1 recipient) or Broadcast (1 sender to everybody on the network). Multicast delivers IP packets to just a group of hosts on the network.
Chapter 23 Multicast 23.1.3 IGMP Snooping The Switch can passively snoop on IGMP packets transferred between IP multicast routers/switches and IP multicast hosts to learn the IP multicast group membership. It checks IGMP packets passing through it, picks out the group registration information, and configures multicasting accordingly. IGMP snooping allows the Switch to learn multicast groups without you having to manually configure them.
Chapter 23 Multicast one query from a router (X) or MLD Done or Report message from any upstream port, it will be broadcast to all connected upstream ports. Query Report Done 23.1.6 MLD Messages A multicast router or switch periodically sends general queries to MLD hosts to update the multicast forwarding table.
Chapter 23 Multicast The following table describes the labels in this screen. Table 99 Advanced Application > Multicast Setup LABEL DESCRIPTION IPv4 Multicast Click the link to open screens where you can configure IGMP snooping and IGMP filtering for IPv4. IPv6 Multicast Click the link to open screens where you can configure MLD snooping and MLD filtering for IPv6.
Page 232
Chapter 23 Multicast The following table describes the labels in this screen. Table 101 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping LABEL DESCRIPTION IGMP Snooping Use these settings to configure IGMP snooping. Active Select Active to enable IGMP Snooping to forward group multicast traffic only to ports that are members of that group.
Page 233
Chapter 23 Multicast Table 101 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping (continued) LABEL DESCRIPTION Normal Leave Enter an IGMP normal leave timeout value (from 200 to 6,348,800) in miliseconds. Select this option to have the Switch use this timeout to update the forwarding table for the port. In normal leave mode, when the Switch receives an IGMP leave message from a host on a port, it forwards the message to the multicast router.
Chapter 23 Multicast 23.3.2 IGMP Snooping VLAN Click Advanced Application > Multicast > IPv4 Multicast in the navigation panel. Click the IGMP Snooping link and then the IGMP Snooping VLAN link to display the screen as shown. See Section 23.1.4 on page 228 for more information on IGMP Snooping VLAN.
Chapter 23 Multicast Table 102 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping > IGMP Snooping VLAN (continued) LABEL DESCRIPTION Click this to create a new entry or to update an existing one. This saves your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Chapter 23 Multicast The following table describes the labels in this screen. Table 103 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping > IGMP Filtering Profile LABEL DESCRIPTION Profile Name Enter a descriptive name for the profile for identification purposes. To configure additional rule(s) for a profile that you have already added, enter the profile name and specify a different IP multicast address range.
Chapter 23 Multicast The following table describes the labels in this screen. Table 104 Advanced Application > Multicast > IPv6 Multicast LABEL DESCRIPTION Index This is the index number of the entry. This field displays the multicast VLAN ID. Port This field displays the port number that belongs to the multicast group.
Page 238
Chapter 23 Multicast Figure 161 Advanced Application > Multicast > IPv6 Multicast > MLD Snooping-proxy > VLAN The following table describes the labels in this screen. Table 106 Advanced Application > Multicast > IPv6 Multicast > MLD Snooping-proxy > VLAN LABEL DESCRIPTION Enter the ID number of the VLAN on which you want to enable MLD snooping-proxy and...
Chapter 23 Multicast Table 106 Advanced Application > Multicast > IPv6 Multicast > MLD Snooping-proxy > VLAN LABEL DESCRIPTION Last Member Enter the amount of time (in miliseconds) between the MLD group-specific queries sent Query Interval by an upstream port when an MLD Done message is received. This value should be exactly the same as what’s configured in the connected multicast router.
Page 240
Chapter 23 Multicast Figure 162 Advanced Application > Multicast > IPv6 Multicast > MLD Snooping-proxy > VLAN > Port Role Setting (Standalone mode) Figure 163 Advanced Application > Multicast > IPv6 Multicast > MLD Snooping-proxy > VLAN > Port Role Setting (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Chapter 23 Multicast The following table describes the labels in this screen. Table 107 Advanced Application > Multicast > IPv6 Multicast > MLD Snooping-proxy > VLAN > Port Role Setting LABEL DESCRIPTION MLD Snooping- Select the VLAN ID for which you want to configure a port’s MLD snooping-proxy settings. proxy VLAN ID Slot (Stacking This field appears only in stacking mode.
Chapter 23 Multicast The following table describes the labels in this screen. Table 108 Advanced Application > Multicast > IPv6 Multicast > MLD Snooping-proxy > Filtering LABEL DESCRIPTION Active Select this option to enable MLD filtering on the Switch. Slot (Stacking This field appears only in stacking mode.
Chapter 23 Multicast The following table describes the labels in this screen. Table 109 Advanced Application > Multicast > IPv6 Multicast > MLD Snooping-proxy > Filtering > Filtering Profile LABEL DESCRIPTION Profile Name Enter a descriptive name for the profile for identification purposes. To configure additional rule(s) for a profile that you have already added, enter the profile name and specify a different IP multicast address range.
Chapter 23 Multicast Figure 167 MVR Network Example VLAN 1 Multicast VLAN VLAN 2 VLAN 3 23.5.1 Types of MVR Ports In MVR, a source port is a port on the Switch that can send and receive multicast traffic in a multicast VLAN while a receiver port can only receive multicast traffic.
Chapter 23 Multicast Figure 168 MVR Multicast Television Example VLAN 1 Multicast VLAN 23.6 General MVR Configuration Use the MVR screen to create multicast VLANs and select the receiver port(s) and a source port for each multicast VLAN. Click Advanced Application > Multicast > MVR to display the screen as shown next.
Page 247
Chapter 23 Multicast Figure 170 Advanced Application > Multicast > MVR (Stacking mode) The following table describes the related labels in this screen. Table 110 Advanced Application > Multicast > MVR LABEL DESCRIPTION Active Select this check box to enable MVR to allow one single multicast VLAN to be shared among different subscriber VLANs on the network.
Chapter 23 Multicast Table 110 Advanced Application > Multicast > MVR (continued) LABEL DESCRIPTION Settings in this row apply to all ports. Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
Page 249
Chapter 23 Multicast Figure 171 Advanced Application > Multicast > MVR > Group Configuration The following table describes the labels in this screen. Table 111 Advanced Application > Multicast > MVR > Group Configuration LABEL DESCRIPTION Multicast VLAN Select a multicast VLAN ID (that you configured in the MVR screen) from the drop-down list box.
Chapter 23 Multicast Table 111 Advanced Application > Multicast > MVR > Group Configuration (continued) LABEL DESCRIPTION Delete Select the entry(ies) that you want to remove, then click the Delete button to remove the selected entry(ies) from the table. If you delete a multicast VLAN, all multicast groups in this VLAN will also be removed. Cancel Select Cancel to clear the checkbox(es) in the table.
Page 251
Chapter 23 Multicast Figure 173 MVR Configuration Example EXAMPLE To set the Switch to forward the multicast group traffic to the subscribers, configure multicast group settings in the Group Configuration screen. The following figure shows an example where two IPv4 multicast groups (News and Movie) are configured for the multicast VLAN 200. Figure 174 MVR Group Configuration Example EXAMPLE GS3700/XGS3700 Series User’s Guide...
Page 252
Chapter 23 Multicast Figure 175 MVR Group Configuration Example EXAMPLE GS3700/XGS3700 Series User’s Guide...
HAPTER This chapter describes how to configure authentication, authorization and accounting settings on the Switch. 24.1 Authentication, Authorization and Accounting (AAA) Authentication is the process of determining who a user is and validating access to the Switch. The Switch can authenticate users who try to log in based on user accounts configured on the Switch itself.
Chapter 24 AAA 24.1.2 RADIUS and TACACS+ RADIUS and TACACS+ are security protocols used to authenticate users by means of an external server instead of (or in addition to) an internal device user database that is limited to the memory capacity of the device.
Page 255
Chapter 24 AAA Figure 178 Advanced Application > AAA > RADIUS Server Setup The following table describes the labels in this screen. Table 113 Advanced Application > AAA > RADIUS Server Setup LABEL DESCRIPTION Authentication Use this section to configure your RADIUS authentication settings. Server Mode This field only applies if you configure multiple RADIUS servers.
Chapter 24 AAA Table 113 Advanced Application > AAA > RADIUS Server Setup (continued) LABEL DESCRIPTION IP Address Enter the IP address of an external RADIUS accounting server in dotted decimal notation. UDP Port The default port of a RADIUS accounting server for accounting is 1813. You need not change this value unless your network administrator instructs you to do so.
Chapter 24 AAA The following table describes the labels in this screen. Table 114 Advanced Application > AAA > TACACS+ Server Setup LABEL DESCRIPTION Authentication Use this section to configure your TACACS+ authentication settings. Server Mode This field is only valid if you configure multiple TACACS+ servers. Select index-priority and the Switch tries to authenticate with the first configured TACACS+ server, if the TACACS+ server does not respond then the Switch tries to authenticate with the second TACACS+ server.
Page 258
Chapter 24 AAA Figure 180 Advanced Application > AAA > AAA Setup The following table describes the labels in this screen. Table 115 Advanced Application > AAA > AAA Setup LABEL DESCRIPTION Authentication Use this section to specify the methods used to authenticate users accessing the Switch. Privilege Enable These fields specify which database the Switch should use (first, second and third) to authenticate access privilege level for administrator accounts (users for Switch...
Page 259
Chapter 24 AAA Table 115 Advanced Application > AAA > AAA Setup (continued) LABEL DESCRIPTION Login These fields specify which database the Switch should use (first, second and third) to authenticate administrator accounts (users for Switch management). Configure the local user accounts in the Access Control > Logins screen. The TACACS+ and RADIUS are external servers.
Chapter 24 AAA Table 115 Advanced Application > AAA > AAA Setup (continued) LABEL DESCRIPTION Mode The Switch supports two modes of recording login events. Select: • start-stop - to have the Switch send information to the accounting server when a user begins a session, during a user’s session (if it lasts past the Update Period), and when a user ends a session.
Chapter 24 AAA The following table describes the VSAs supported on the Switch. Note that these attributes only work when you enable authorization (see Section 24.2.3 on page 257). Table 116 Supported VSAs FUNCTION ATTRIBUTE Ingress Bandwidth Vendor-Id = 890 Assignment Vendor-Type = 1 ingress rate (Kbps in decimal format)
Chapter 24 AAA Refer to RFC 2865 for more information about RADIUS attributes used for authentication. Refer to RFC 2866 and RFC 2869 for RADIUS attributes used for accounting. This section lists the attributes used by authentication and accounting functions on the Switch. In cases where the attribute has a specific format associated with it, the format is specified.
Page 263
Chapter 24 AAA 24.3.2.1 Attributes Used for Accounting System Events NAS-IP-Address NAS-Identifier Acct-Status-Type Acct-Session-ID - The format of Acct-Session-Id is date+time+8-digit sequential number, for example, 2007041917210300000001. (date: 2007/04/19, time: 17:21:03, serial number: 00000001) Acct-Delay-Time 24.3.2.2 Attributes Used for Accounting Exec Events The attributes are listed in the following table along with the time that they are sent (the difference between Console and Telnet/SSH Exec events is that the Telnet/SSH events utilize the Calling- Station-Id attribute):...
Page 264
Chapter 24 AAA 24.3.2.3 Attributes Used for Accounting IEEE 802.1x Events The attributes are listed in the following table along with the time of the session they are sent: Table 120 RADIUS Attributes - Exec Events via Console ATTRIBUTE START INTERIM-UPDATE STOP User-Name...
HAPTER IP Source Guard 25.1 IP Source Guard Overview IP source guard uses a binding table to distinguish between authorized and unauthorized DHCP and ARP packets in your network. A binding contains these key attributes: • MAC address • VLAN ID •...
Chapter 25 IP Source Guard • Use the DHCP Snooping VLAN Configure screen (Section 25.6.2 on page 277) to enable DHCP snooping on each VLAN and to specify whether or not the Switch adds DHCP relay agent option 82 information to DHCP requests that the Switch relays to a DHCP server for each VLAN. •...
Chapter 25 IP Source Guard • DHCP snooping. Use this to filter unauthorized DHCP packets on the network and to build the binding table dynamically. • ARP inspection. Use this to filter unauthorized ARP packets on the network. If you want to use dynamic bindings to filter unauthorized ARP packets (typical implementation), you have to enable DHCP snooping before you enable ARP inspection.
Chapter 25 IP Source Guard Table 121 IP Source Guard (continued) LABEL DESCRIPTION IPv6 Source Guard Click the link to open a screen where you can apply the configured IPv6 source guard Port Setup policy to a port. (Standalone mode) IPv6 Snooping Policy Click the link to open a screen where you can set up DHCPv6 snooping policies for the Setup (Standalone...
Chapter 25 IP Source Guard 25.4 IPv4 Source Guard Static Binding Use this screen to manage static bindings for DHCP snooping and ARP inspection. Static bindings are uniquely identified by the MAC address and VLAN ID. Each MAC address and VLAN ID can only be in one static binding.
Page 270
Chapter 25 IP Source Guard The following table describes the labels in this screen. Table 123 IP Source Guard > IPv4 Source Guard Setup > Static Binding LABEL DESCRIPTION ARP Freeze ARP Freeze allows you to automatically create static bindings from the current ARP entries (either dynamically learned or static ARP entries) until the Switch’s binding table is full.
Chapter 25 IP Source Guard Table 123 IP Source Guard > IPv4 Source Guard Setup > Static Binding (continued) LABEL DESCRIPTION Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries. Delete Select the entry(ies) that you want to remove, then click the Delete button to remove the selected entry(ies) from the table.
Page 272
Chapter 25 IP Source Guard The following table describes the labels in this screen. Table 124 IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping LABEL DESCRIPTION Database Status This section displays the current settings for the DHCP snooping database. You can configure them in the DHCP Snooping Configure screen.
Chapter 25 IP Source Guard Table 124 IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping (continued) LABEL DESCRIPTION Failed writes This field displays the number of times the Switch was unable to update the bindings in the DHCP snooping database. Database detail First successful access This field displays the first time the Switch accessed the DHCP snooping database...
Page 274
Chapter 25 IP Source Guard Figure 187 IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping > Configure The following table describes the labels in this screen. Table 125 IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping > Configure LABEL DESCRIPTION Active...
Chapter 25 IP Source Guard Table 125 IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping > Configure (continued) LABEL DESCRIPTION Renew DHCP Enter the location of a DHCP snooping database, and click Renew if you want the Snooping URL Switch to load it.
Page 276
Chapter 25 IP Source Guard Figure 188 IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping > Configure> Port (Standalone mode) Figure 189 IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping > Configure> Port (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Chapter 25 IP Source Guard The following table describes the labels in this screen. Table 126 IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping > Configure > Port LABEL DESCRIPTION Slot (Stacking This field appears only in stacking mode. Click the drop-down list to choose the slot mode) number of the Switch in a stack.
Chapter 25 IP Source Guard The following table describes the labels in this screen. Table 127 IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping > Configure > VLAN LABEL DESCRIPTION Show VLAN Use this section to specify the VLANs you want to manage in the section below. Start VID Enter the lowest VLAN ID you want to manage in the section below.
Chapter 25 IP Source Guard The following table describes the labels in this screen. Table 128 IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping > Configure > VLAN > Port LABEL DESCRIPTION Enter the ID number of the VLAN you want to configure here. Port Enter the number of port(s) to which you want to apply the specified DHCP option 82 profile.
Chapter 25 IP Source Guard Figure 192 IP Source Guard > IPv4 Source Guard Setup > ARP Inspection Status The following table describes the labels in this screen. Table 129 IP Source Guard > IPv4 Source Guard Setup > ARP Inspection Status LABEL DESCRIPTION Total number of...
Chapter 25 IP Source Guard Figure 193 IP Source Guard > IPv4 Source Guard Setup > ARP Inspection > VLAN Status The following table describes the labels in this screen. Table 130 IP Source Guard > IPv4 Source Guard Setup > ARP Inspection > VLAN Status LABEL DESCRIPTION Show VLAN range...
Chapter 25 IP Source Guard The following table describes the labels in this screen. Table 131 IP Source Guard > IPv4 Source Guard Setup > ARP Inspection > Log Status LABEL DESCRIPTION Clearing log status table Click Apply to remove all the log messages that were generated by ARP packets and that have not been sent to the syslog server yet.
Page 283
Chapter 25 IP Source Guard Figure 195 IP Source Guard > IPv4 Source Guard Setup > ARP Inspection > Configure The following table describes the labels in this screen. Table 132 IP Source Guard > IPv4 Source Guard Setup > ARP Inspection > Configure LABEL DESCRIPTION Active...
Chapter 25 IP Source Guard Table 132 IP Source Guard > IPv4 Source Guard Setup > ARP Inspection > Configure (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Page 285
Chapter 25 IP Source Guard Figure 197 IP Source Guard > IPv4 Source Guard Setup > ARP Inspection > Configure > Port (Stacking mode) The following table describes the labels in this screen. Table 133 IP Source Guard > IPv4 Source Guard Setup > ARP Inspection > Configure > Port LABEL DESCRIPTION Slot (Stacking mode)
Chapter 25 IP Source Guard 25.8.2 ARP Inspection VLAN Configure Use this screen to enable ARP inspection on each VLAN and to specify when the Switch generates log messages for receiving ARP packets from each VLAN. To open this screen, click Advanced Application >...
Chapter 25 IP Source Guard 25.9 IPv6 Source Guard Overview The purpose of IPv6 source guard is to distinguish between authorized and unauthorized users by using a binding table that validates the source of IPv6 traffic. The binding table can be manually created or be learned through Dynamic Host Configuration Protocol version 6 snooping (DHCPv6 snooping).
Chapter 25 IP Source Guard The following table describes the labels in this screen. Table 135 Advanced Application > IP Source Guard > IPv6 Source Binding Status (Standalone mode) LABEL DESCRIPTION Clear Dynamic Specify how you want the Switch to remove dynamic IPv6 source binding entries when Source Binding you click Flush.
Page 289
Chapter 25 IP Source Guard Figure 200 Advanced Application > IP Source Guard > IPv6 Static Binding Setup (Standalone mode) The following table describes the labels in this screen. Table 136 Advanced Application > IP Source Guard > IPv6 Static Binding Setup (Standalone mode) LABEL DESCRIPTION IPv6 Static...
Chapter 25 IP Source Guard 25.12 IPv6 Source Guard Policy Setup Use this screen to have IPv6 source guard forward valid IPv6 addresses and/or IPv6 prefixes that are stored in the binding table and allow or block data traffic from all link-local addresses. To open this screen, click Advanced Application >...
Chapter 25 IP Source Guard Table 137 Advanced Application > IP Source Guard > IPv6 Source Guard Policy Setup (Standalone mode) LABEL DESCRIPTION Validate Prefix This field displays the Validate Prefix status for this IPv6 source guard policy. Link Local This field displays the Link Local traffic status for this IPv6 source guard policy.
Chapter 25 IP Source Guard Table 138 Advanced Application > IP Source Guard > IPv6 Source Guard Port Setup (Standalone mode) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Chapter 25 IP Source Guard Table 139 Advanced Application > IP Source Guard > IPv6 Snooping Policy Setup (Standalone mode) LABEL DESCRIPTION Clear Click this to clear the fields above. Index This field displays a sequential number for each IPv6 snooping policy. Name This field displays the descriptive name for identification purposes for this IPv6 source guard policy.
Chapter 25 IP Source Guard Table 140 Advanced Application > IP Source Guard > IPv6 Snooping VLAN Setup (Standalone mode) LABEL DESCRIPTION Delete Select an entry checkbox and click Delete to remove the specified entry. Cancel Click this to clear the Delete check boxes above. 25.16 IPv6 DHCP Trust Setup Use this screen to specify which ports are trusted for DHCPv6 snooping.
Chapter 25 IP Source Guard The following table describes the labels in this screen. Table 141 Advanced Application > IP Source Guard > IPv6 DHCP Trust Setup (Standalone mode) LABEL DESCRIPTION Active Select this to specify whether ports are trusted or untrusted ports for DHCP snooping. If you do not select this then IPv6 DHCP Trust is not used and all ports are automatically trusted.
Page 296
Chapter 25 IP Source Guard • The source MAC address and source IP address in the packet do not match any of the current bindings. • The packet is a RELEASE or DECLINE packet, and the source MAC address and source port do not match any of the current bindings.
Chapter 25 IP Source Guard You can configure this setting for each source VLAN. This setting is independent of the DHCP relay settings (Chapter 43 on page 413). 25.17.1.4 Configuring DHCP Snooping Follow these steps to configure DHCP snooping on the Switch. Enable DHCP snooping on the Switch.
Page 298
Chapter 25 IP Source Guard • They do not use the same space in memory that regular MAC address filters use. • They appear only in the ARP Inspection screens and commands, not in the MAC Address Filter screens and commands. 25.17.2.2 Trusted vs.
HAPTER Loop Guard This chapter shows you how to configure the Switch to guard against loops on the edge of your network. 26.1 Loop Guard Overview Loop guard allows you to configure the Switch to shut down a port if it detects that packets sent out on that port loop back to the Switch.
Page 300
Chapter 26 Loop Guard Figure 209 Switch in Loop State The loop guard feature checks to see if a loop guard enabled port is connected to a switch in loop state. This is accomplished by periodically sending a probe packet and seeing if the packet returns on the same port.
Chapter 26 Loop Guard 26.2 Loop Guard Setup Click Advanced Application > Loop Guard in the navigation panel to display the screen as shown. Note: The loop guard feature can not be enabled on the ports that have Spanning Tree Protocol (RSTP, MRSTP or MSTP) enabled.
Page 302
Chapter 26 Loop Guard The following table describes the labels in this screen. Table 142 Advanced Application > Loop Guard LABEL DESCRIPTION Active Select this option to enable loop guard on the Switch. The Switch generates syslog, internal log messages as well as SNMP traps when it shuts down a port via the loop guard feature.
HAPTER VLAN Mapping This chapter shows you how to configure VLAN mapping on the Switch. 27.1 VLAN Mapping Overview With VLAN mapping enabled, the Switch can map the VLAN ID and priority level of packets received from a private network to those used in the service provider’s network. The Switch checks incoming traffic from the switch ports (non-management ports) against the VLAN mapping table first, the MAC learning table and then the VLAN table before forwarding them through the Gigabit uplink port.
Page 304
Chapter 27 VLAN Mapping Figure 215 VLAN Mapping (Standalone mode) Figure 216 VLAN Mapping (Stacking mode) The following table describes the labels in this screen. Table 143 VLAN Mapping LABEL DESCRIPTION Active Select this option to enable VLAN mapping on the Switch. Slot (Stacking This field appears only in stacking mode.
Chapter 27 VLAN Mapping Table 143 VLAN Mapping (continued) LABEL DESCRIPTION Active Select this check box to enable the VLAN mapping feature on this port. Clear this check box to disable the VLAN mapping feature. Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Page 306
Chapter 27 VLAN Mapping The following table describes the labels in this screen. Table 144 VLAN Mapping Configuration LABEL DESCRIPTION Active Check this box to activate this rule. Name Enter a descriptive name (up to 32 printable ASCII characters) for identification purposes. Port Type a port to be included in this rule.
HAPTER Layer 2 Protocol Tunneling This chapter shows you how to configure layer-2 protocol tunneling on the Switch. 28.1 Layer 2 Protocol Tunneling Overview Layer-2 protocol tunneling (L2PT) is used on the service provider's edge devices. L2PT allows edge switches (1 and 2 in the following figure) to tunnel layer-2 STP (Spanning Tree Protocol), CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking Protocol) packets between customer switches (A, B and C in the following figure) connected through the service provider’s network.
Chapter 28 Layer 2 Protocol Tunneling Figure 220 L2PT Network Example Service Provider's Network 28.1.1 Layer-2 Protocol Tunneling Mode Each port can have two layer-2 protocol tunneling modes, Access and Tunnel. • The Access port is an ingress port on the service provider's edge device (1 or 2 in Figure 220 on page 308) and connected to a customer switch (A or B).
Page 310
Chapter 28 Layer 2 Protocol Tunneling The following table describes the labels in this screen. Table 145 Advanced Application > Layer 2 Protocol Tunneling LABEL DESCRIPTION Active Select this to enable layer-2 protocol tunneling on the Switch. Destination Specify an MAC address with which the Switch uses to encapsulate the layer-2 protocol MAC Address packets by replacing the destination MAC address in the packets.
Page 311
Chapter 28 Layer 2 Protocol Tunneling Table 145 Advanced Application > Layer 2 Protocol Tunneling (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
HAPTER sFlow This chapter shows you how to configure sFlow to have the Switch monitor traffic in a network and send information to an sFlow collector for analysis. 29.1 sFlow Overview sFlow (RFC 3176) is a standard technology for monitoring switched networks. An sFlow agent embedded on a switch or router gets sample data and packet statistics from traffic forwarded through its ports.
Chapter 29 sFlow The following table describes the labels in this screen. Table 146 Advanced Application > sFlow LABEL DESCRIPTION Active Select this to enable the sFlow agent on the Switch. Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Page 315
Chapter 29 sFlow Figure 226 Advanced Application > sFlow > Collector The following table describes the labels in this screen. Table 147 Advanced Application > sFlow > Collector LABEL DESCRIPTION Collector Enter the IP address of the sFlow collector. Address UDP Port Enter a UDP port number the Switch uses to send sFlow datagram to the collector.
HAPTER PPPoE This chapter describes how the Switch gives a PPPoE termination server additional information that the server can use to identify and authenticate a PPPoE client. 30.1 PPPoE Intermediate Agent Overview A PPPoE Intermediate Agent (PPPoE IA) is deployed between a PPPoE server and PPPoE clients. It helps the PPPoE server identify and authenticate clients by adding subscriber line specific information to PPPoE discovery packets from clients on a per-port or per-port-per-VLAN basis before forwarding them to the PPPoE server.
Chapter 30 PPPoE Table 150 PPPoE IA Remote ID Sub-option Format SubOpt Length Value 0x02 MAC Address or String (1 byte) (1 byte) (63 bytes) The 1 in the first field identifies this as an Agent Circuit ID sub-option and 2 identifies this as an Agent Remote ID sub-option.
Chapter 30 PPPoE Trusted ports are connected to PPPoE servers. • If a PADO (PPPoE Active Discovery Offer), PADS (PPPoE Active Discovery Session-confirmation), or PADT (PPPoE Active Discovery Terminate) packet is sent from a PPPoE server and received on a trusted port, the Switch forwards it to all other ports. •...
Page 319
Chapter 30 PPPoE Figure 228 Advanced Application > PPPoE > Intermediate Agent The following table describes the labels in this screen. Table 153 Advanced Application > PPPoE > Intermediate Agent LABEL DESCRIPTION Active Select this option to enable the PPPoE intermediate agent globally on the Switch. access-node- Enter up to 20 ASCII characters to identify the PPPoE intermediate agent.
Chapter 30 PPPoE 30.3.1 PPPoE IA Per-Port Use this screen to specify whether individual ports are trusted or untrusted ports and have the Switch add extra information to PPPoE discovery packets from PPPoE clients on a per-port basis. Note: The Switch will drop all PPPoE packets if you enable the PPPoE Intermediate Agent on the Switch and there are no trusted ports.
Page 321
Chapter 30 PPPoE Figure 230 Advanced Application > PPPoE > Intermediate Agent > Port (Stacking mode) The following table describes the labels in this screen. Table 154 Advanced Application > PPPoE > Intermediate Agent > Port LABEL DESCRIPTION Slot (Stacking This field appears only in stacking mode.
Chapter 30 PPPoE Table 154 Advanced Application > PPPoE > Intermediate Agent > Port (continued) LABEL DESCRIPTION Remote-id Enter a string of up to 63 ASCII characters that the Switch adds into the Agent Remote ID sub-option for PPPoE discovery packets received on this port. Spaces are allowed. If you do not specify a string here or in the Remote-id field for a VLAN on a port, the Switch automatically uses the PPPoE client’s MAC address.
Chapter 30 PPPoE The following table describes the labels in this screen. Table 155 Advanced Application > PPPoE > Intermediate Agent > Port > VLAN LABEL DESCRIPTION Show Port Enter a port number to show the PPPoE Intermediate Agent settings for the specified VLAN(s) on the port.
Page 324
Chapter 30 PPPoE Figure 233 Advanced Application > PPPoE > Intermediate Agent > VLAN The following table describes the labels in this screen. Table 156 Advanced Application > PPPoE > Intermediate Agent > VLAN LABEL DESCRIPTION Show VLAN Use this section to specify the VLANs you want to configure in the section below. Start VID Enter the lowest VLAN ID you want to configure in the section below.
HAPTER Error Disable 31.1 Error Disable Overview This chapter shows you how to configure the rate limit for control packets on a port, and set the Switch to take an action (such as to shut down a port or stop sending packets) on a port when the Switch detects a pre-configured error.
Chapter 31 Error Disable 31.2 The Error Disable Screen Use this screen to configure error disable related settings. Click Advanced Application > Errdisable in the navigation panel to open the following screen. Advanced Application > Errdisable Figure 234 The following table describes the labels in this screen. Table 157 Advanced Application >...
Chapter 31 Error Disable The following table describes the labels in this screen. Table 158 Advanced Application > Errdisable > Errdisable Status LABEL DESCRIPTION Inactive-reason mode reset Port List Enter the number of the port(s) (separated by a comma) on which you want to reset inactive-reason status.
Page 329
Chapter 31 Error Disable Note: After you configure this screen, make sure you also enable error detection for the specific control packets in the Advanced Application > Errdisable > Errdisable Detect screen. Figure 237 Advanced Application > Errdisable > CPU protection (Standalone mode) Figure 238 Advanced Application >...
Chapter 31 Error Disable The following table describes the labels in this screen. Table 159 Advanced Application > Errdisable > CPU protection LABEL DESCRIPTION Reason Select the type of control packet you want to configure here. Slot (Stacking This field appears only in stacking mode. Click the drop-down list to choose the slot mode) number of the Switch in a stack.
Chapter 31 Error Disable The following table describes the labels in this screen. Table 160 Advanced Application > Errdisable > Errdisable Detect LABEL DESCRIPTION Cause This field displays the types of control packet that may cause CPU overload. Use this row to make the setting the same for all entries. Use this row first and then make adjustments to each entry if necessary.
Page 332
Chapter 31 Error Disable Figure 241 Advanced Application > Errdisable > Errdisable Recovery (Stacking Mode) The following table describes the labels in this screen. Table 161 Advanced Application > Errdisable > Errdisable Recovery LABEL DESCRIPTION Active Select this option to turn on the error-disable recovery function on the Switch. Reason This field displays the supported features that allow the Switch to shut down a port or discard packets on a port according to the feature requirements and what action you...
HAPTER MAC Pinning This chapter shows you how to configure MAC pinning on the Switch. 32.1 MAC Pinning Overview When the Switch obtains a connected device’s MAC address, it adds an entry in the MAC address forwarding table and uses the table to determine how to forward frames. In addition to the source MAC address of a received frame, the Switch also learns the VLAN to which the device belongs and the port on which the frame is received.
Page 334
Chapter 32 MAC Pinning Figure 242 Advanced Application > MAC Pinning (Standalone mode) Figure 243 Advanced Application > MAC Pinning (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Page 335
Chapter 32 MAC Pinning The following table describes the labels in this screen. Table 162 Advanced Application > MAC Pinning LABEL DESCRIPTION Active Select this option to turn on the MAC pinning function on the Switch. Slot (Stacking This field appears only in stacking mode. Click the drop-down list to choose the slot number mode) of the Switch in a stack.
HAPTER Private VLAN 33.1 Private VLAN Overview Use private VLAN if you want you to block traffic between ports in the same VLAN. Community and Isolated VLANs are secondary private VLANs that must be associated with a Primary private VLAN. •...
Chapter 33 Private VLAN Tagged Private VLANs can span switches but trunking ports must be VLAN-trunking ports - see Advanced > VLAN > VLAN Port Setting. Table 164 Spanning PVLAN Graphic Key LABEL DESCRIPTION Uplink promiscuous port VLAN-trunking ports S1, S2 Switch 1, Switch 2 P-VLAN 100 Primary private VLAN with VLAN ID tag of 100...
Page 338
Chapter 33 Private VLAN Click Advanced Application > Private VLAN to display the following screen. Figure 244 Advanced Application > Private VLAN (Standalone mode) Figure 245 Advanced Application > Private VLAN (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Page 339
Chapter 33 Private VLAN The following table describes the labels in this screen. Table 165 Advanced Application > Private VLAN LABEL DESCRIPTION Slot (Stacking This field appears only in stacking mode. Click the drop-down list to choose the slot mode) number of the Switch in a stack.
HAPTER Green Ethernet This chapter shows you how to configure the Switch to reduce the power consumed by switch ports. 34.1 Green Ethernet Overview Green Ethernet reduces switch port power consumption in the following ways. • IEEE 802.3az Energy Efficient Ethernet (EEE) If EEE is enabled, both sides of a link support EEE and there is no traffic, the port enters Low Power Idle (LPI) mode.
Page 341
Chapter 34 Green Ethernet Figure 246 Advanced Application > Green Ethernet (Standalone mode) Figure 247 Advanced Application > Green Ethernet (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Page 342
Chapter 34 Green Ethernet The following table describes the labels in this screen. Table 166 Advanced Application > Green Ethernet LABEL DESCRIPTION Select this to activate Energy Efficient Ethernet globally. Auto Power Down Select this to activate Auto Power Down globally. Short Reach Select this to activate Short Reach globally.
HAPTER Link Layer Discovery Protocol (LLDP) 35.1 LLDP Overview The LLDP (Link Layer Discovery Protocol) is a layer 2 protocol. It allows a network device to advertise its identity and capabilities on the local network. It also allows the device to maintain and store information from adjacent devices which are directly connected to the network device.
Chapter 35 Link Layer Discovery Protocol (LLDP) Figure 248 LLDP Overview 35.2 LLDP-MED Overview LLDP-MED (Link Layer Discovery Protocol for Media Endpoint Devices) is an extension to the standard LLDP developed by the Telecommunications Industry Association (TIA) TR-41.4 subcommittee which defines the enhanced discovery capabilities, such as VoIP applications, to enable network administrators manage their network topology application more efficiently.
Chapter 35 Link Layer Discovery Protocol (LLDP) Figure 249 LLDP-MED Overview 35.3 LLDP Screens Click Advanced Application > LLDP in the navigation panel to display the screen as shown next. Figure 250 Advanced Application > LLDP The following table describes the labels in this screen. Table 167 Advanced Application >...
Chapter 35 Link Layer Discovery Protocol (LLDP) Table 167 Advanced Application > LLDP (continued) LABEL DESCRIPTION LLDP-MED LLDP-MED Click here to show a screen to configure LLDP-MED (Link Layer Discovery Protocol for Configuration Media Endpoint Devices) parameters. LLDP-MED Click here to show a screen to configure LLDP-MED (Link Layer Discovery Protocol for Network Policy Media Endpoint Devices) network policy parameters.
Page 347
Chapter 35 Link Layer Discovery Protocol (LLDP) Figure 252 Advanced Application > LLDP > LLDP Local Status (Stacking mode) The following table describes the labels in this screen. Table 168 Advanced Application > LLDP > LLDP Local Status LABEL DESCRIPTION Basic TLV Chassis ID TLV This displays the chassis ID of the local Switch, that is the Switch you’re configuring.
Chapter 35 Link Layer Discovery Protocol (LLDP) Table 168 Advanced Application > LLDP > LLDP Local Status LABEL DESCRIPTION Management The Management Address TLV identifies an address associated with the local LLDP agent Address TLV that may be used to reach higher layer entities to assist discovery by network management.
Page 349
Chapter 35 Link Layer Discovery Protocol (LLDP) Figure 253 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail (Basic TLV) GS3700/XGS3700 Series User’s Guide...
Page 350
Chapter 35 Link Layer Discovery Protocol (LLDP) Figure 254 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail (MED TLV) The following table describes the labels in this screen. Table 169 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail LABEL DESCRIPTION Basic TLV...
Page 351
Chapter 35 Link Layer Discovery Protocol (LLDP) Table 169 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail LABEL DESCRIPTION Port-Protocol This displays the IEEE 802.1 Port Protocol VLAN ID TLVs, which indicates whether the VLAN ID TLV VLAN is enabled and supported.
Chapter 35 Link Layer Discovery Protocol (LLDP) 35.5 LLDP Remote Status This screen displays a summary of LLDP status for each LLDP connection to a neighboring Switch. Click Advanced Application > LLDP > LLDP Remote Status to display the screen as shown next.
Page 353
Chapter 35 Link Layer Discovery Protocol (LLDP) Figure 257 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (Basic TLV) The following table describes the labels in Basic TLV part of the screen. Table 171 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (Basic TLV) LABEL DESCRIPTION...
Page 354
Chapter 35 Link Layer Discovery Protocol (LLDP) Table 171 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (Basic TLV) LABEL DESCRIPTION System Name This displays the system name of the remote device. System This displays the system description of the remote device. Description TLV System This displays whether the system capabilities are enabled and supported on the remote...
Page 355
Chapter 35 Link Layer Discovery Protocol (LLDP) The following table describes the labels in the Dot1 and Dot3 parts of the screen. Table 172 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (Dot1 and Dot3 TLV) LABEL DESCRIPTION Dot1 TLV...
Page 356
Chapter 35 Link Layer Discovery Protocol (LLDP) Figure 259 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (MED TLV) GS3700/XGS3700 Series User’s Guide...
Page 357
Chapter 35 Link Layer Discovery Protocol (LLDP) The following table describes the labels in the MED TLV part of the screen. Table 173 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (MED TLV) LABEL DESCRIPTION MED TLV LLDP Media Endpoint Discovery (MED) is an extension of LLDP that provides additional...
Chapter 35 Link Layer Discovery Protocol (LLDP) Table 173 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (MED TLV) (continued) LABEL DESCRIPTION Inventory TLV The majority of IP Phones lack support of management protocols such as SNMP, so LLDP- MED inventory TLVs are used to provide their inventory information to the Network Connectivity Devices such as the Switch.
Page 360
Chapter 35 Link Layer Discovery Protocol (LLDP) Figure 261 Advanced Application > LLDP > LLDP Configuration (Stacking mode) The following table describes the labels in this screen. Table 174 Advanced Application > LLDP > LLDP Configuration LABEL DESCRIPTION Active Select to enable LLDP on the Switch. It is enabled by default. Transmit Interval Enter how many seconds the Switch waits before sending LLDP packets.
Chapter 35 Link Layer Discovery Protocol (LLDP) Table 176 Advanced Application > LLDP > LLDP Configuration > Org-specific TLV Setting LABEL DESCRIPTION Port-Protocol Select the check box(es) to enable or disable the sending of IEEE 802.1 Port and Protocol VLAN ID VLAN ID TLVs on the port(s).
Chapter 35 Link Layer Discovery Protocol (LLDP) The following table describes the labels in this screen. Table 177 Advanced Application > LLDP > LLDP-MED Configuration LABEL DESCRIPTION Slot (Stacking This field appears only in stacking mode. Click the drop-down list to choose the slot mode) number of the Switch in a stack.
Page 367
Chapter 35 Link Layer Discovery Protocol (LLDP) Figure 269 Advanced Application > LLDP > LLDP-MED Network Policy (Stacking mode) The following table describes the labels in this screen. Table 178 Advanced Application > LLDP > LLDP-MED Network Policy LABEL DESCRIPTION Port Enter the port number to set up the LLDP-MED network policy.
Chapter 35 Link Layer Discovery Protocol (LLDP) Table 178 Advanced Application > LLDP > LLDP-MED Network Policy LABEL DESCRIPTION DSCP This field displays the DSCP value of the network policy. Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries.
Page 369
Chapter 35 Link Layer Discovery Protocol (LLDP) Figure 271 Advanced Application > LLDP > LLDP-MED Location (Stacking mode) The following table describes the labels in this screen. Table 179 Advanced Application > LLDP > LLDP-MED Location LABEL DESCRIPTION Port Enter the port number you want to set up the location within the LLDP-MED network.For Stacking mode the first field box is the Slot ID, the second field box is the port.
Page 370
Chapter 35 Link Layer Discovery Protocol (LLDP) Table 179 Advanced Application > LLDP > LLDP-MED Location LABEL DESCRIPTION Datum Select the appropriate geodetic datum used by GPS. • WGS84 • NAD83-NAVD88 • NAD83-MLLW Civic Address Enter the Civic Address by providing information such as Country, State, County, City, Street, Number, ZIP code and other additional information.
Page 371
Chapter 35 Link Layer Discovery Protocol (LLDP) Table 179 Advanced Application > LLDP > LLDP-MED Location LABEL DESCRIPTION Delete Check the locations that you want to remove, then click the Delete button. Cancel Click Cancel to clear the selected check boxes. GS3700/XGS3700 Series User’s Guide...
HAPTER Anti-Arpscan 36.1 Anti-Arpscan Overview Address Resolution Protocol (ARP), RFC 826, is a protocol used to convert a network-layer IP address to a link-layer MAC address. ARP scan is used to scan the network of a certain interface for alive hosts. It shows the IP address and MAC addresses of all hosts found. Hackers could use ARP scan to find targets in your network.
Chapter 36 Anti-Arpscan • Go to Basic Setting > Port Setup. Clear Active and click Apply. Then select Active and click Apply again. • Go to Application > Errdiable > Errdisable Recovery and set the interval for Anti- arpscan. After the interval expires, the closed port(s) will become active and start receiving packets again.
Chapter 36 Anti-Arpscan 36.3 Anti-Arpscan Host Status Use this screen to view blocked hosts and unblock ones connected to certain ports. To open this screen, click Advanced Application > Anti-Arpscan > Host Status. Figure 273 Advanced Application > Anti-Arpscan > Host Status The following table describes the fields in the above screen.
Chapter 36 Anti-Arpscan Figure 274 Advanced Application > Anti-Arpscan > Trust Host The following table describes the fields in the above screen. Table 182 Advanced Application > Anti-Arpscan > Trust Host LABEL DESCRIPTION Name Type a descriptive name of up to 32 printable ASCII characters to identify this host. Host IP Type the IP address of the host.
Page 376
Chapter 36 Anti-Arpscan Figure 275 Advanced Application > Anti-Arpscan > Configure The following table describes the fields in the above screen. Table 183 Advanced Application > Anti-Arpscan > Configure LABEL DESCRIPTION Active Select this to enable Anti-arpscan on the Switch. Port Threshold A port threshold is determined by the number of packets received per second on the port.
Page 377
Chapter 36 Anti-Arpscan Table 183 Advanced Application > Anti-Arpscan > Configure LABEL DESCRIPTION Trusted State Select Untrusted or Trusted for the associated port. Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
HAPTER BPDU Guard 37.1 BPDU Guard Overview A BPDU (Bridge Protocol Data Units) is a data frame that contains information about STP. STP- aware switches exchange BPDUs periodically. The BPDU guard feature allows you to prevent any new STP-aware switch from connecting to an existing network and causing STP topology changes in the network.
Chapter 37 BPDU Guard Figure 276 Advanced Application > BPDU Guard Staus The following table describes the fields in the above screen. Table 184 Advanced Application > BPDU Guard Staus LABEL DESCRIPTION BPDU guard globally This field displays whether BPDU guard is activated on the Switch. configuration Port This is the number of the port on the Switch.
Page 380
Chapter 37 BPDU Guard Figure 277 Advanced Application > BPDU Guard > BPDU Guard Configuration The following table describes the fields in the above screen. Table 185 Advanced Application > BPDU Guard > BPDU Guard Configuration LABEL DESCRIPTION Active Select this option to enable BPDU guard on the Switch. Port This field displays the Switch’s port number Use this row to make the setting the same for all ports.
HAPTER 38.1 OAM Overview Link layer Ethernet OAM (Operations, Administration and Maintenance) as described in IEEE 802.3ah is a link monitoring protocol. It utilizes OAM Protocol Data Units or OAM PDUs to transmit link status information between directly connected Ethernet devices. Both devices must support IEEE 802.3ah.
Page 382
Chapter 38 OAM Figure 278 Advanced Application > OAM Status (Standalone mode) Figure 279 Advanced Application > OAM Status (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Chapter 38 OAM The following table describes the fields in the above screen. Table 186 Advanced Application > OAM Status LABEL DESCRIPTION Slot (Stacking mode) This field appears only in stacking mode. Click the drop-down list to choose the slot number of the Switch in a stack.
Page 384
Chapter 38 OAM Figure 280 Advanced Application > OAM Status > OAM Details The following table describes the fields in the above screen. Table 187 Advanced Application > OAM Status > OAM Details LABEL DESCRIPTION Discovery This section displays OAM configuration details and operational status of the port on the Switch and/or the remote device.
Page 385
Chapter 38 OAM Table 187 Advanced Application > OAM Status > OAM Details LABEL DESCRIPTION Mode This field displays the OAM mode. The device in active mode (typically the service provider's device) controls the device in passive mode (typically the subscriber's device).
Page 386
Chapter 38 OAM Table 187 Advanced Application > OAM Status > OAM Details LABEL DESCRIPTION Discovery This field indicates the state in the OAM discovery process. OAM-enabled devices use state this process to detect each other and to exchange information about their OAM configuration and capabilities.
Chapter 38 OAM 38.3 OAM Configuration Use this screen to turn on Ethernet OAM on the Switch and port(s) and configure the related settings. In the OAM Status screen click Configuration to display the configuration screen as shown. Figure 281 Advanced Application > OAM > OAM Configuration (Standalone mode) GS3700/XGS3700 Series User’s Guide...
Page 388
Chapter 38 OAM Figure 282 Advanced Application > OAM > OAM Configuration (Stacking mode) The following table describes the fields in the above screen. Table 188 Advanced Application > OAM > OAM Configuration LABEL DESCRIPTION Active Select this option to enable Ethernet OAM on the Switch. Slot (Stacking mode) This field appears only in stacking mode.
Chapter 38 OAM Table 188 Advanced Application > OAM > OAM Configuration LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
HAPTER ZULD 39.1 ZULD Overview A unidirectional link is a connection where the link is up on both ends, but only one end can receive packets. This may happen if OAM was initially enabled but then disabled, there are misconfigured transmitting or receiving lines or the hardware is malfunctioning.
Chapter 39 ZULD • Ports advertise their unidirectional link detection capability using OAMPDUs, so all connected devices must support OAM as well as ZULD. You need to enable OAM on the Switch by going to Advanced Application > OAM > Configuration and selecting Active. OAM must be enabled on other connected devices too.
Page 392
Chapter 39 ZULD Figure 285 Advanced Application > ZULD Status The following table describes the fields in the above screen. Table 190 Advanced Application > ZULD Status LABEL DESCRIPTION ZULD is..This shows whether ZULD is enabled or disabled on the Switch. Port This field displays the port number of the Switch.
Chapter 39 ZULD Table 190 Advanced Application > ZULD Status LABEL DESCRIPTION Link State This field shows the following link states: • Linkdown: This is an initialization state, where the port is not yet up. • Probe: This indicates that ZULD is discovering the connected device on this link. •...
Page 394
Chapter 39 ZULD Figure 286 Advanced Application > ZULD > Configuration The following table describes the fields in the above screen. Table 191 Advanced Application > ZULD > Configuration LABEL DESCRIPTION Active Select this to enable ZULD on the Switch. Port Use port * to configure all ports to have the same settings.
Page 395
Chapter 39 ZULD Table 191 Advanced Application > ZULD > Configuration LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
HAPTER Static Route This chapter shows you how to configure static routes. 40.1 Static Routing Overview The Switch usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the Switch send data to devices not reachable through the default gateway, use static routes.
Chapter 40 Static Route Figure 288 IP Application > Static Routing 40.3 Configuring IPv4 Static Routing Click the link next to IPv4 Static Route in the IP Application > Static Routing screen to display the screen as shown. Figure 289 IP Application > Static Routing > IPv4 Static Route The following table describes the related labels you use to create a static route.
Chapter 40 Static Route Table 192 IP Application > Static Routing > IPv4 Static Route (continued) LABEL DESCRIPTION Click Add to insert a new static route to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Page 399
Chapter 40 Static Route The following table describes the related labels you use to create a static route. Table 193 IP Application > Static Routing > IPv6 Static Route LABEL DESCRIPTION Route Enter the IPv6 address of the final destination. Destination Prefix Length Enter the prefix length number of up to 64 for this destination.
HAPTER Policy Routing This chapter shows you how to configure policy routing rules. 41.1 Policy Route Overview Traditionally, routing is based on the destination address only and the Switch takes the shortest path to forward a packet. Policy routing provides a mechanism to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator.
Chapter 41 Policy Routing The following table describes the labels in this screen. Table 194 IP Application > Policy Routing LABEL DESCRIPTION Active This field allows you to activate/deactivate this policy routing profile and rules in the profile. Profile Name Enter a descriptive name (up to 32 printable ASCII characters) for identification purposes.
Page 402
Chapter 41 Policy Routing Figure 292 IP Application > Policy Routing > Rule Configuration The following table describes the labels in this screen. Table 195 IP Application > Policy Routing > Rule Configuration LABEL DESCRIPTION Profile Name This field displays the policy routing profile(s) you configure in the IP Application > Policy Routing screen.
Page 403
Chapter 41 Policy Routing Table 195 IP Application > Policy Routing > Rule Configuration (continued) LABEL DESCRIPTION This field displays the rule index number that you configure in the Sequence field. Click an index number to change the rule’s Statement. State This field displays permit when the rule action is activated and deny when is it deactivated.
HAPTER Differentiated Services This chapter shows you how to configure Differentiated Services (DiffServ) on the Switch. 42.1 DiffServ Overview Quality of Service (QoS) is used to prioritize source-to-destination traffic flows. All packets in the flow are given the same priority. You can use CoS (class of service) to give different priorities to different packet types.
Chapter 42 Differentiated Services various traffic policies to the traffic flows. For example, one traffic policy would be to give higher drop precedence to one traffic flow over others. In our example packets in the Bronze traffic flow are more likely to be dropped when congestion occurs than the packets in the Platinum traffic flow as they move across the DiffServ network.
Chapter 42 Differentiated Services 42.2.1 TRTCM - Color-blind Mode All packets are evaluated against the PIR. If a packet exceeds the PIR it is marked red. Otherwise it is evaluated against the CIR. If it exceeds the CIR then it is marked yellow. Finally, if it is below the CIR then it is marked green.
Page 407
Chapter 42 Differentiated Services Figure 297 IP Application > DiffServ (Standalone mode) Figure 298 IP Application > DiffServ (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Chapter 42 Differentiated Services The following table describes the labels in this screen. Table 196 IP Application > DiffServ LABEL DESCRIPTION Active Select this option to enable DiffServ on the Switch. Slot (Stacking This field appears only in stacking mode. Click the drop-down list to choose the slot number mode) of the Switch in a stack.
Page 409
Chapter 42 Differentiated Services Figure 299 IP Application > DiffServ > 2-rate 3 Color Marker (Standalone mode) Figure 300 IP Application > DiffServ > 2-rate 3 Color Marker (Stacking mode) GS3700/XGS3700 Series User’s Guide...
Chapter 42 Differentiated Services The following table describes the labels in this screen. Table 197 IP Application > DiffServ > 2-rate 3 Color Marker LABEL DESCRIPTION Active Select this to activate TRTCM (Two Rate Three Color Marker) on the Switch. The Switch evaluates and marks the packets based on the TRTCM settings.
Chapter 42 Differentiated Services Figure 301 IP Application > DiffServ > 2-rate 3 Color Marker > DSCP Profile The following table describes the labels in this screen. Table 198 IP Application > DiffServ > 2-rate 3 Color Marker > DSCP Profile LABEL DESCRIPTION Profile Name...
HAPTER DHCP This chapter shows you how to configure the DHCP feature. 43.1 DHCP Overview DHCP (Dynamic Host Configuration Protocol RFC 2131 and RFC 2132) allows individual computers to obtain TCP/IP configuration at start-up from a server. You can configure the Switch as a DHCP server or a DHCP relay agent.
Chapter 43 DHCP and create option 82 profiles. Click the link next to DHCPv6 to open screens where you can configure DHCPv6 settings. Figure 303 IP Application > DHCP 43.3 DHCPv4 Status Click IP Application > DHCP > DHCPv4 in the navigation panel. The DHCP Status screen displays.
Chapter 43 DHCP Figure 305 IP Application > DHCP > DHCPv4 > Server Status Detail The following table describes the labels in this screen. Table 202 IP Application > DHCP > DHCPv4 > Server Status Detail LABEL DESCRIPTION Start IP Address This field displays the starting IP address of the IP address pool configured for this DHCP server instance.
Chapter 43 DHCP The Switch can be configured as a global DHCP relay. This means that the Switch forwards all DHCP requests from all domains to the same DHCP server. You can also configure the Switch to relay DHCP information based on the VLAN membership of the DHCP clients. 43.4.1 DHCPv4 Relay Agent Information The Switch can add information about the source of client DHCP requests that it relays to a DHCP server by adding Relay Agent Information.
Page 417
Chapter 43 DHCP Figure 306 IP Application > DHCP > DHCPv4 > Option 82 Profile The following table describes the labels in this screen. Table 206 IP Application > DHCP > DHCPv4 > Option 82 Profile LABEL DESCRIPTION Name Enter a descriptive name for the profile for identification purposes. You can use up to 32 ASCII characters.
Chapter 43 DHCP Table 206 IP Application > DHCP > DHCPv4 > Option 82 Profile (continued) LABEL DESCRIPTION Profile Name This field displays the descriptive name of the profile. Click the name to change the settings. Circuit-ID Enable This field displays whether the Circuit ID sub-option is added to client DHCP requests. Field This field displays the information that is included in the Circuit ID sub-option.
Page 419
Chapter 43 DHCP Figure 308 IP Application > DHCP > DHCPv4 > Global > Port The following table describes the labels in this screen. Table 208 IP Application > DHCP > DHCPv4 > Global > Port LABEL DESCRIPTION Port Enter the number of port(s) to which you want to apply the specified DHCP option 82 profile.
Chapter 43 DHCP 43.4.5 Global DHCP Relay Configuration Example The follow figure shows a network example where the Switch is used to relay DHCP requests for the VLAN1 and VLAN2 domains. There is only one DHCP server that services the DHCP clients in both domains.
Page 421
Chapter 43 DHCP Figure 311 IP Application > DHCP > DHCPv4 > VLAN The following table describes the labels in this screen. Table 209 IP Application > DHCP > DHCPv4 > VLAN LABEL DESCRIPTION Enter the ID number of the VLAN to which these DHCP settings apply. DHCP Status Select whether the Switch should function as a DHCP Server or Relay for the specified VID.
Chapter 43 DHCP Table 209 IP Application > DHCP > DHCPv4 > VLAN (continued) LABEL DESCRIPTION Relay Use this section if you want to configure the Switch to function as a DHCP relay for this VLAN. Remote Enter the IP address of a DHCP server in dotted decimal notation. DHCP Server 1 ..
Chapter 43 DHCP The following table describes the labels in this screen. Table 210 IP Application > DHCP > DHCPv4 > VLAN > Port LABEL DESCRIPTION Enter the ID number of the VLAN you want to configure here. Port Enter the number of port(s) to which you want to apply the specified DHCP option 82 profile.
Chapter 43 DHCP Figure 313 DHCP Relay for Two VLANs DHCP:192.168.1.100 VLAN 1 VLAN 2 DHCP:172.16.10.100 For the example network, configure the VLAN Setting screen as shown. Figure 314 DHCP Relay for Two VLANs Configuration Example EXAMPLE 43.6 DHCPv6 Status Click IP Application >...
Chapter 43 DHCP Figure 315 IP Application > DHCP > DHCPv6 The following table describes the labels in this screen. Table 211 IP Application > DHCP > DHCPv6 LABEL DESCRIPTION Server Status This section displays configuration settings related to the Switch’s DHCP server mode. Index The Dynamic Host Configuration Protocol for IPv6 (DHCPv6, RFC 3315) is a server-client protocol that allows a DHCP server to assign and pass IPv6 network addresses, prefixes...
Chapter 43 DHCP The following table describes the labels in this screen. Table 212 IP Application > DHCP > DHCPv6 > Information LABEL DESCRIPTION Active Select this check box to enable the Switch to get DHCPv6 and DNS server settings. Enter the ID number of the VLAN to which the DHCPv6 server belongs here.
Page 427
Chapter 43 DHCP Figure 317 IP Application > DHCP > DHCPv6 > Prefix Delegation The following table describes the labels in this screen. Table 213 IP Application > DHCP > DHCPv6 > Prefix Delegation LABEL DESCRIPTION Client DUID Each DHCP client and server has a unique DHCP Unique IDentifier (DUID), which is used for identification when they are exchanging DHCPv6 messages.
Chapter 43 DHCP 43.9 DHCPv6 Relay A DHCPv6 relay agent is on the same network as the DHCPv6 clients and helps forward messages between the DHCPv6 server (that’s in another network) and the DHCPv6 clients. The DHCPv6 relay agent can add the remote identification (remote-ID) option and the interface-ID option to the Relay-Forward DHCPv6 messages.
Page 429
Chapter 43 DHCP Table 214 IP Application > DHCP > DHCPv6> DHCPv6 Relay (continued) LABEL DESCRIPTION Interface ID Select this option to have the Switch add the interface-ID option in the DHCPv6 requests from the clients in the specified VLAN before the Switch forwards them to a DHCPv6 server. Remote ID Enter a string of up to 64 printable characters to be carried in the remote-ID option.
HAPTER VRRP This chapter shows you how to configure and monitor the Virtual Router Redundancy Protocol (VRRP) on the Switch. 44.1 VRRP Overview Each host on a network is configured to send packets to a statically configured default gateway (this Switch). The default gateway can become a single point of failure. Virtual Router Redundancy Protocol (VRRP), defined in RFC 2338, allows you to create redundant backup gateways to ensure that the default gateway of a host is always available.
Chapter 44 VRRP 44.2 VRRP Status Click IP Application > VRRP in the navigation panel to display the VRRP Status screen as shown next. Figure 320 IP Application > VRRP Status The following table describes the labels in this screen. Table 215 IP Application >...
Page 432
Chapter 44 VRRP Click IP Application, VRRP and click the Configuration link to display the VRRP Configuration screen as shown next. Note: You can only configure VRRP on interfaces with unique VLAN IDs. Note: Routing domains with the same VLAN ID are not displayed in the table indicated. Figure 321 IP Application >...
Chapter 44 VRRP 44.3.2 VRRP Parameters This section describes the VRRP parameters. 44.3.2.1 Advertisement Interval The master router sends out Hello messages to let the other backup routers know that it is still up and running. The time interval between sending the Hello messages is the advertisement interval. By default, a Hello message is sent out every second.
Chapter 44 VRRP The following table describes the labels in this screen. Table 217 IP Application > VRRP Configuration: VRRP Parameters LABEL DESCRIPTION Active Select this option to enable this VRRP entry. Name Enter a descriptive name (up to 32 printable ASCII characters) for identification purposes.
Chapter 44 VRRP Table 218 IP Application > VRRP Configuration: Summary (continued) LABEL DESCRIPTION Name This field displays a descriptive name of an entry. Network This field displays the IP address and subnet mask of an interface. VRID This field displays the ID number of a virtual router. Primary VIP This field displays the IP address of the primary virtual router.
Chapter 44 VRRP Figure 325 VRRP Example 1: VRRP Parameter Settings on Switch A EXAMPLE Figure 326 VRRP Example 1: VRRP Parameter Settings on Switch B EXAMPLE After configuring and saving the VRRP configuration, the VRRP Status screens for both switches are shown next.
Page 437
Chapter 44 VRRP Figure 329 VRRP Configuration Example: Two Virtual Router Network 172.16.1.1 172.16.1.100 172.16.1.10 You need to configure the VRRP Configuration screen for virtual router VR2 on each switch, while keeping the VRRP configuration in example 1 for virtual router VR1 (refer to Section 44.4.2 on page 436).
Page 438
Chapter 44 VRRP Figure 332 VRRP Example 2: VRRP Status on Switch A EXAMPLE Figure 333 VRRP Example 2: VRRP Status on Switch B EXAMPLE GS3700/XGS3700 Series User’s Guide...
HAPTER Load Sharing 45.1 Load Sharing Overview The Switch learns the next-hop(s) using ARP and determines routing path(s) for a destination. The Switch supports Equal-Cost MultiPath (ECMP) to forward packets destined to the same device (A for example) through different routing paths (1, 2 and 3) of equal path cost. This allows you to balance or share traffic loads between multiple routing paths when the Switch is connected to more than one next-hop.
Page 440
Chapter 45 Load Sharing The following table describes the labels in this screen. Table 219 IP Application > Load Sharing LABEL DESCRIPTION Active Select this option to enable Equal-Cost MultiPath (ECMP) routing on the Switch. Criteria Select the criteria the Switch uses to determine the routing path for a packet. Select src-ip to have the Switch use a hash algorithm to convert a packet’s source IP address into a hash value which acts as an index to a route path.
HAPTER ARP Setup 46.1 ARP Overview Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network. An IP (version 4) address is 32 bits long.
Page 442
Chapter 46 ARP Setup ICMP reply from host B, it sends out an ARP request to get host A’s MAC address and updates the ARP table with host A’s ARP reply. The Switch then can forward host B’s ICMP reply to host A. ARP Request ARP Reply ICMP Request...
Chapter 46 ARP Setup Therefore in the following example, the Switch can learn host A’s MAC address from the ARP request sent by host A. The Switch then forwards host B’s ICMP reply to host A right after getting host B’s MAC address and ICMP reply. ARP Request ARP Reply ICMP Request...
Page 444
Chapter 46 ARP Setup Figure 336 IP Application > ARP Setup > ARP Learning The following table describes the labels in this screen. Table 220 IP Application > ARP Setup > ARP Learning LABEL DESCRIPTION Slot (Stacking This field appears only in stacking mode. Click the drop-down list to choose the slot number mode) of the Switch in a stack.
Chapter 46 ARP Setup 46.2.2 Static ARP Use this screen to create static ARP entries that will display in the Management > ARP Table screen and will not age out. Click the link next to Static ARP in the IP Application > ARP Setup screen to display the screen as shown.
Page 446
Chapter 46 ARP Setup Table 221 IP Application > ARP Setup > Static ARP (continued) LABEL DESCRIPTION Port This field displays the port to which the device connects. Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries.
HAPTER Maintenance This chapter explains how to configure the maintenance screens that let you maintain the firmware and configuration files. 47.1 The Maintenance Screen Use this screen to manage firmware and your configuration files. Click Management > Maintenance in the navigation panel to open the following screen. Management >...
Chapter 47 Maintenance Table 222 Management > Maintenance (continued) LABEL DESCRIPTION Reboot Click Config 1 to reboot the system and load Configuration 1 on the Switch. System Click Config 2 to reboot the system and load Configuration 2 on the Switch. Click Stacking Default to reboot the system and load stacking configurations on the Switch.
Page 449
Chapter 47 Maintenance Management > Maintenance > Firmware Upgrade (Stacking mode) Figure 340 The top of firmware upgrade screen shows which firmware version is currently running on the Switch. Type the path and file name of the firmware file you wish to upload to the Switch in the File Path text box or click Browse to locate it.
Chapter 47 Maintenance Table 223 Management > Maintenance> Firmware Upgrade (continued) LABEL DESCRIPTION Version The Switch has two firmware sets, Firmware 1 and Firmware 2, residing in flash. • Running shows the version number (and model code) and MM/DD/YYYY creation date of the firmware currently in use on the Switch (Firmware 1 or Firmware 2).
Chapter 47 Maintenance 47.4 Backup a Configuration File Backing up your Switch configurations allows you to create various “snapshots” of your device from which you may restore at a later date. Back up your current Switch configuration to a computer using the Backup Configuration screen. Figure 342 Management >...
Chapter 47 Maintenance In the web configurator, click the Save button in the top of the screen to make the changes take effect. If you want to access the Switch web configurator again, you may need to change the IP address of your computer to be in the same subnet as that of the default Switch IP address (192.168.1.1).
Chapter 47 Maintenance In the click the Stacking Default button to clear all Switch configuration information you configured and return to the stacking defaults. Click OK to reset all Switch configurations to the stacking defaults. Figure 345 Load Stacking Default: Start In the web configurator, click the Save button in the top of the screen to make the changes take effect.
Page 454
Chapter 47 Maintenance Figure 347 Management > Maintenance > Tech-Support You may need WordPad or similar software to see the log report correctly. The table below describes the fields in the above screen. Table 224 Management > Maintenance > Tech-Support LABEL DESCRIPTION Type a number ranging from 50 to 100 in the CPU threshold box, and type another...
Chapter 47 Maintenance Table 224 Management > Maintenance > Tech-Support LABEL DESCRIPTION Mbuf Click Download to see the Mbuf log report. The log includes Mbuf over threshold information. This log report is stored in flash memory. Click Download to see the Read Only Memory (ROM) log report. This report is stored in flash memory.
Chapter 47 Maintenance This is a sample FTP session saving the current configuration to a file called “config.cfg” on your computer. If your (T)FTP client does not allow you to have a destination filename different than the source, you will need to rename them as the Switch only recognizes “config”, “ras-0”, and “ras-1”. Be sure you keep unaltered copies of both files for later use.
Chapter 47 Maintenance 47.9.4 FTP Restrictions FTP will not work when: • FTP service is disabled in the Service Access Control screen. • The IP address(es) in the Remote Management screen does not match the client IP address. If it does not match, the Switch will disconnect the FTP session immediately. GS3700/XGS3700 Series User’s Guide...
HAPTER Access Control This chapter describes how to control access to the Switch. 48.1 Access Control Overview A console port and FTP are allowed one session each, Telnet and SSH share nine sessions, up to five Web sessions (five different usernames and passwords) and/or limitless SNMP access control sessions are allowed.
Chapter 48 Access Control Figure 348 Management > Access Control The following table describes the labels in this screen. Table 228 Management > Access Control LABEL DESCRIPTION SNMP Click this link to configure your SNMP settings. Logins Click this link to assign which users can access the Switch via web configurator at any one time.
Chapter 48 Access Control network management functions. It executes applications that control and monitor managed devices. The managed devices contain object variables/managed objects that define each piece of information to be collected about a Switch. Examples of variables include number of packets received, node port status and so on.
Chapter 48 Access Control 48.3.3 SNMP Traps The Switch sends traps to an SNMP manager when an event occurs. The following tables outline the SNMP traps by category. An OID (Object ID) that begins with “1.3.6.1.4.1.890.1.15” is defined in private MIBs. Otherwise, it is a standard MIB OID.
Page 462
Chapter 48 Access Control Table 230 SNMP System Traps (continued) OPTION OBJECT LABEL OBJECT ID DESCRIPTION errdisable zyErrdisableDetect 1.3.6.1.4.1.890.1.15.3.24.4.1 This trap is sent when an error is detected on a port, such as a loop occurs or the rate limit for specific control packets is exceeded.
Page 464
Chapter 48 Access Control Table 232 SNMP InterfaceTraps (continued) OPTION OBJECT LABEL OBJECT ID DESCRIPTION zuld zyZuldUnidirectionalDetected 1.3.6.1.4.1.890.1.15.3.110.3.1 This trap is sent when a unidirectional link is detected. zyZuldBidirectionalRecovered 1.3.6.1.4.1.890.1.15.3.110.3.2 This trap is sent when the port which is shut down by ZULD becomes active again.
Chapter 48 Access Control Table 235 SNMP Switch Traps OPTION OBJECT LABEL OBJECT ID DESCRIPTION STPNewRoot 1.3.6.1.2.1.17.0.1 This trap is sent when the STP root switch changes. zyMrstpNewRoot 1.3.6.1.4.1.890.1.15.3.52.3.1 This trap is sent when the MRSTP root switch changes. zyMstpNewRoot 1.3.6.1.4.1.890.1.15.3.53.3.1 This trap is sent when the MSTP root switch changes.
Chapter 48 Access Control The following table describes the labels in this screen. Table 236 Management > Access Control > SNMP LABEL DESCRIPTION General Setting Use this section to specify the SNMP version and community (password) values. Version Select the SNMP version for the Switch. The SNMP version on the Switch must match the version on the SNMP manager.
Chapter 48 Access Control Figure 351 Management > Access Control > SNMP > Trap Group The following table describes the labels in this screen. Table 237 Management > Access Control > SNMP > Trap Group LABEL DESCRIPTION Trap Destination Select one of your configured trap destination IP addresses. These are the IP addresses of the SNMP managers.
Page 468
Chapter 48 Access Control Figure 352 Management > Access Control > SNMP > Trap Group > Port (Standalone mode) Figure 353 Management > Access Control > SNMP > Trap Group > Port (Stacking mode) The following table describes the labels in this screen. Table 238 Management >...
Chapter 48 Access Control Table 238 Management > Access Control > SNMP > Trap Group > Port (continued) LABEL DESCRIPTION Port This field displays a port number. In stacking mode, the first number represents the slot and the second the port number. Settings in this row apply to all ports for the Switch represented by the slot ID (in stacking mode).
Page 470
Chapter 48 Access Control Table 239 Management > Access Control > SNMP > User (continued) LABEL DESCRIPTION Security Level Select whether you want to implement authentication and/or encryption for SNMP communication from this user. Choose: • noauth -to use the username as the password string to send to the SNMP manager. This is equivalent to the Get, Set and Trap Community in SNMP v2c.
Chapter 48 Access Control Table 239 Management > Access Control > SNMP > User (continued) LABEL DESCRIPTION Delete Click Delete to remove the selected entry from the summary table. Cancel Click Cancel to begin configuring this screen afresh. 48.4 Setting Up Login Accounts Up to five people (one administrator and four non-administrators) may access the Switch via web configurator at any one time.
Chapter 48 Access Control Table 240 Management > Access Control > Logins (continued) LABEL DESCRIPTION New Password Enter your new system password. Retype to Retype your new system password for confirmation confirm Edit Logins You may configure passwords for up to four users. These users have read-only access. You can give users higher privileges via the CLI.
Chapter 48 Access Control 48.6 How SSH works The following table summarizes how a secure connection is established between two remote hosts. Figure 357 How SSH Works Host Identification The SSH client sends a connection request to the SSH server. The server identifies itself with a host key.
Chapter 48 Access Control 48.7 SSH Implementation on the Switch Your Switch supports SSH version 2 using RSA authentication and three encryption methods (DES, 3DES and Blowfish). The SSH server is implemented on the Switch for remote management and file transfer on port 22.
Chapter 48 Access Control Note: If you disable HTTP in the Service Access Control screen, then the Switch blocks all HTTP connection attempts. 48.9 HTTPS Example If you haven’t changed the default HTTPS port on the Switch, then in your browser enter “https:// Switch IP Address/”...
Page 476
Chapter 48 Access Control Figure 360 Security Certificate Warning (Internet Explorer 7 or 8) After you log in, you will see the red address bar with the message Certificate Error. Click on Certificate Error next to the address bar and click View certificates. Figure 361 Certificate Error (Internet Explorer 7 or 8) EXAMPLE Click Install Certificate...
Chapter 48 Access Control Figure 362 Certificate (Internet Explorer 7 or 8) 48.9.2 Mozilla Firefox Warning Messages When you attempt to access the Switch HTTPS server, a This Connection is Untrusted screen may display. If that is the case, click I Understand the Risks and then the Add Exception... button.
Chapter 48 Access Control Confirm the HTTPS server URL matches. Click Confirm Security Exception to proceed to the web configurator login screen. Figure 364 Security Alert (Mozilla Firefox) EXAMPLE 48.9.3 The Main Screen After you accept the certificate and enter the login username and password, the Switch main screen appears.
Chapter 48 Access Control Figure 365 Example: Lock Denoting a Secure Connection EXAMPLE 48.10 Service Access Control Service Access Control allows you to decide what services you may use to access the Switch. You may also change the default service port and configure “trusted computer(s)” for each service in the Remote Management screen (discussed later).
Chapter 48 Access Control The following table describes the fields in this screen. Table 241 Management > Access Control > Service Access Control LABEL DESCRIPTION Services Services you may use to access the Switch are listed here. Active Select this option for the corresponding services that you want to allow to access the Switch. Service Port For Telnet, SSH, FTP, HTTP or HTTPS services, you may change the default service port by typing the new port number in the Service Port field.
Page 481
Chapter 48 Access Control The following table describes the labels in this screen. Table 242 Management > Access Control > Remote Management LABEL DESCRIPTION Entry This is the client set index number. A “client set” is a group of one or more “trusted computers”...
HAPTER Diagnostic This chapter explains the Diagnostic screen. You can use this screen to help you identify problems. 49.1 Diagnostic Click Management > Diagnostic in the navigation panel to open this screen. Use this screen to check system logs, ping IP addresses or perform port tests. Figure 368 Management >...
Page 483
Chapter 49 Diagnostic The following table describes the labels in this screen. Table 243 Management > Diagnostic LABEL DESCRIPTION Ping Test IPv4 Select this option if you want to ping an IPv4 address, and select which traffic flow (in- band or out-of-band) the Switch is to send ping frames. If you select in-band, the Switch sends the frames to all ports except the management port (labelled MGMT).
Page 484
Chapter 49 Diagnostic Table 243 Management > Diagnostic (continued) LABEL DESCRIPTION Pair status Ok: The physical connection between the wire-pair is okay. Open: There is no physical connection (an open circuit detected) between the wire-pair. Short: There is an short circuit detected between the wire-pair. Unknown: The Switch failed to run cable diagnostics on the cable connected this port.
HAPTER System Log 50.1 Overview A log message stores the information for viewing. 50.2 System Log Click Management > System Log in the navigation panel to open this screen. Use this screen to check current system logs. Note: When a log reaches the maximum number of log messages, new log messages automatically overwrite existing log messages, starting with the oldest existing log message first.
HAPTER Syslog Setup This chapter explains the syslog screens. 51.1 Syslog Overview The syslog protocol allows devices to send event notification messages across an IP network to syslog servers that collect the event messages. A syslog-enabled device can generate a syslog message and send it to a syslog server.
Page 487
Chapter 51 Syslog Setup Figure 370 Management > Syslog Setup The following table describes the labels in this screen. Table 245 Management > Syslog Setup LABEL DESCRIPTION Syslog Select Active to turn on syslog (system logging) and then configure the syslog setting Logging Type This column displays the names of the categories of logs that the device can generate.
Page 488
Chapter 51 Syslog Setup Table 245 Management > Syslog Setup LABEL DESCRIPTION Click Add to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
HAPTER Cluster Management This chapter introduces cluster management. 52.1 Clustering Management Status Overview Cluster Management allows you to manage switches through one Switch, called the cluster manager. The switches must be directly connected and be in the same VLAN group so as to be able to communicate with one another.
Chapter 52 Cluster Management Figure 371 Clustering Application Example 52.2 Cluster Management Status Click Management > Cluster Management in the navigation panel to display the following screen. Note: A cluster can only have one manager. Figure 372 Management > Cluster Management GS3700/XGS3700 Series User’s Guide...
Chapter 52 Cluster Management The following table describes the labels in this screen. Table 247 Management > Cluster Management LABEL DESCRIPTION Status This field displays the role of this Switch within the cluster. Manager Member (you see this if you access this screen in the cluster member switch directly and not via the cluster manager) None (neither a manager nor a member of a cluster) Manager...
Chapter 52 Cluster Management Figure 373 Cluster Management: Cluster Member Web Configurator Screen EXAMPLE EXAMPLE 52.2.1.1 Uploading Firmware to a Cluster Member Switch You can use FTP to upload firmware to a cluster member switch through the cluster manager switch as shown in the following example.
Chapter 52 Cluster Management The following table explains some of the FTP parameters. Table 248 FTP Upload to Cluster Member Example FTP PARAMETER DESCRIPTION Enter “admin”. User The web configurator password default is 1234. Password Enter this command to list the name of cluster member switch’s firmware and configuration file.
Page 494
Chapter 52 Cluster Management The following table describes the labels in this screen. Table 249 Management > Clustering Management > Configuration LABEL DESCRIPTION Clustering Manager Active Select Active to have this Switch become the cluster manager switch. A cluster can only have one manager.
HAPTER MAC Table This chapter introduces the MAC Table screen. 53.1 MAC Table Overview The MAC Table screen (a MAC table is also known as a filtering database) shows how frames are forwarded or filtered across the Switch’s ports. When a device (which may belong to a VLAN group) sends a packet which is forwarded to a port on the Switch, the MAC address of the device is shown on the Switch’s MAC Table.
Chapter 53 MAC Table 53.2 Viewing the MAC Table Click Management > MAC Table in the navigation panel to display the following screen. Use this screen to search specific MAC addresses. You can also directly add dynamic MAC address(es) into the static MAC forwarding table or MAC filtering table from the MAC table using this screen.
Page 497
Chapter 53 MAC Table Table 250 Management > MAC Table (continued) LABEL DESCRIPTION Cancel Click this to begin configuring the search criteria afresh. Index This is the incoming frame index number. MAC Address This is the MAC address of the device from which this incoming frame came. This is the VLAN group to which this frame belongs.
HAPTER IP Table This chapter introduces the IP table. 54.1 IP Table Overview The IP Table screen shows how packets are forwarded or filtered across the Switch’s ports. When a device (which may belong to a VLAN group) sends a packet which is forwarded to a port on the Switch, the IP address of the device is shown on the Switch’s IP Table.
Chapter 54 IP Table 54.2 Viewing the IP Table Click Management > IP Table in the navigation panel to display the following screen. Figure 379 Management > IP Table The following table describes the labels in this screen. Table 251 Management > IP Table LABEL DESCRIPTION Sort by...
HAPTER ARP Table This chapter introduces ARP Table. 55.1 ARP Table Overview Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network.
Page 501
Chapter 55 ARP Table Figure 380 Management > ARP Table The following table describes the labels in this screen. Table 252 Management > ARP Table LABEL DESCRIPTION Condition Specify how you want the Switch to remove ARP entries when you click Flush. Select All to remove all of the dynamic entries from the ARP table.
HAPTER Routing Table This chapter introduces the routing table. 56.1 Overview The routing table contains the route information to the network(s) that the Switch can reach. 56.2 Viewing the Routing Table Status Use this screen to view routing table information. Click Management > Routing Table in the navigation panel to display the screen as shown.
HAPTER Path MTU Table This chapter introduces the IPv6 Path MTU table. 57.1 Path MTU Overview The largest size (in bytes) of a packet that can be transferred over a data link is called the maximum transmission unit (MTU). The Switch uses Path MTU Discovery to discover Path MTU (PMTU), that is, the minimum link MTU of all the links in a path to the destination.
HAPTER Configure Clone This chapter shows you how you can copy the settings of one port onto other ports. 58.1 Configure Clone Cloning allows you to copy the basic and advanced settings from a source port to a destination port or ports.
Page 506
Chapter 58 Configure Clone Figure 384 Management > Configure Clone (Stacking) The following table describes the labels in this screen. Table 255 Management > Configure Clone LABEL DESCRIPTION Source/ In stacking mode, a port is defined by a slot ID representing the Switch in the stack and a Destination port number.
Page 507
Chapter 58 Configure Clone Table 255 Management > Configure Clone (continued) LABEL DESCRIPTION Advanced Select which port settings (configured in the Advanced Application menus) should be Application copied to the destination ports. Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
HAPTER IPv6 Neighbor Table This chapter introduces the IPv6 neighbor table. 59.1 IPv6 Neighbor Table Overview An IPv6 host is required to have a neighbor table. If there is an address to be resolved or verified, the Switch sends out a neighbor solicitation message. When the Switch receives a neighbor advertisement in response, it stores the neighbor’s link-layer address in the neighbor table.
Page 509
Chapter 59 IPv6 Neighbor Table Table 256 Management > IPv6 Neighbor Table (continued) LABEL DESCRIPTION Status This field displays whether the neighbor IPv6 interface is reachable. In IPv6, “reachable” means an IPv6 packet can be correctly forwarded to a neighbor node (host or router) and the neighbor can successfully receive and handle the packet.
HAPTER Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Switch Access and Login • Switch Configuration 60.1 Power, Hardware Connections, and LEDs The Switch does not turn on.
Chapter 60 Troubleshooting One of the LEDs does not behave as expected. Make sure you understand the normal behavior of the LED. See Section 3.3 on page Check the hardware connections. See Section 3.1 on page Inspect your cables for damage. Contact the vendor to replace any damaged cables. Turn the Switch off and on (in DC models or if the DC power supply is connected in AC/DC models).
Page 512
Chapter 60 Troubleshooting • If you changed the IP address, use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for forgot the IP address for the Switch. Check the hardware connections, and make sure the LEDs are behaving as expected. See Section 3.3 on page Make sure your Internet browser does not block pop-up windows and has JavaScripts and Java...
Chapter 60 Troubleshooting I cannot see some of Advanced Application submenus at the bottom of the navigation panel. The recommended screen resolution is 1024 by 768 pixels. Adjust the value in your computer and then you should see the rest of Advanced Application submenus at the bottom of the navigation panel.
PP EN D I X Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. •...
Page 515
Appendix A Common Services Table 257 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION HTTPS HTTPS is a secured http session often used in e- commerce. ICMP User-Defined Internet Control Message Protocol is often used for diagnostic or routing purposes. 4000 This is a popular Internet chat program.
Page 516
Appendix A Common Services Table 257 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SQL-NET 1521 Structured Query Language is an interface to access data on many different types of database systems, including mainframes, midrange systems, UNIX systems and network servers. TCP/UDP Secure Shell Remote Login Program.
PP EN D I X IPv6 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 10 addresses.
Appendix B IPv6 Global Address A global address uniquely identifies a device on the Internet. It is similar to a “public IP address” in IPv4. A global unicast address starts with a 2 or 3. Unspecified Address An unspecified address (0:0:0:0:0:0:0:0 or ::) is used as the source address when a device does not have its own address.
Page 519
Appendix B IPv6 Table 260 Reserved Multicast Address (continued) MULTICAST ADDRESS FF0A:0:0:0:0:0:0:0 FF0B:0:0:0:0:0:0:0 FF0C:0:0:0:0:0:0:0 FF0D:0:0:0:0:0:0:0 FF0E:0:0:0:0:0:0:0 FF0F:0:0:0:0:0:0:0 Subnet Masking Both an IPv6 address and IPv6 subnet mask compose of 128-bit binary digits, which are divided into eight 16-bit blocks and written in hexadecimal notation. Hexadecimal uses four bits for each character (1 ~ 10, A ~ F).
Appendix B IPv6 combines its interface ID and global and subnet information advertised from the router. This is a routable global IP address. DHCPv6 The Dynamic Host Configuration Protocol for IPv6 (DHCPv6, RFC 3315) is a server-client protocol that allows a DHCP server to assign and pass IPv6 network addresses, prefixes and other configuration information to DHCP clients.
Page 521
Appendix B IPv6 such as the system name. The interface-ID option provides slot number, port information and the VLAN ID to the DHCPv6 server. The remote-ID option (if any) is stripped from the Relay-Reply messages before the relay agent sends the packets to the clients. The DHCP server copies the interface-ID option from the Relay-Forward message into the Relay-Reply message and sends it to the relay agent.
Page 522
Appendix B IPv6 determine whether the destination address is on-link and can be reached directly without passing through a router. If the address is onlink, the address is considered as the next hop. Otherwise, the Switch determines the next-hop from the default router list or routing table. Once the next hop IP address is known, the Switch looks into the neighbor cache to get the link-layer address and sends the packet when the neighbor is reachable.
Page 523
Appendix B IPv6 Example - Enabling IPv6 on Windows XP/2003/Vista By default, Windows XP and Windows 2003 support IPv6. This example shows you how to use the ipv6 install command on Windows XP/2003 to enable IPv6. This also displays how to use the ipconfig command to see auto-generated IP addresses.
Page 524
Appendix B IPv6 Click Start and then OK. Now your computer can obtain an IPv6 address from a DHCPv6 server. Example - Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default. DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer.
Page 525
Appendix B IPv6 Click Close to exit the Local Area Connection Status screen. Select Start > All Programs > Accessories > Command Prompt. Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address (2001:b021:2d::1000) obtained from a DHCP server. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection:...
• Brief description of the problem and the steps you took to solve it. Corporate Headquarters (Worldwide) Taiwan • ZyXEL Communications Corporation • http://www.zyxel.com Asia China • ZyXEL Communications (Shanghai) Corp. ZyXEL Communications (Beijing) Corp. ZyXEL Communications (Tianjin) Corp. • http://www.zyxel.cn India • ZyXEL Technology India Pvt Ltd • http://www.zyxel.in Kazakhstan •...
Page 529
• http://www.zyxel.pl Romania • ZyXEL Romania • http://www.zyxel.com/ro/ro Russia • ZyXEL Russia • http://www.zyxel.ru Slovakia • ZyXEL Communications Czech s.r.o. organizacna zlozka • http://www.zyxel.sk Spain • ZyXEL Communications ES Ltd • http://www.zyxel.es Sweden • ZyXEL Communications GS3700/XGS3700 Series User’s Guide...
Page 530
Appendix C Customer Support • http://www.zyxel.se Switzerland • Studerus AG • http://www.zyxel.ch/ Turkey • ZyXEL Turkey A.S. • http://www.zyxel.com.tr • ZyXEL Communications UK Ltd. • http://www.zyxel.co.uk Ukraine • ZyXEL Ukraine • http://www.ua.zyxel.com Latin America Argentina • ZyXEL Communication Corporation • http://www.zyxel.com/ec/es/ Brazil •...
Page 531
Appendix C Customer Support • http://www.zyxel.com/me/en/ North America • ZyXEL Communications, Inc. - North America Headquarters • http://www.zyxel.com/us/en/ Oceania Australia • ZyXEL Communications Corporation • http://www.zyxel.com/au/en/ Africa South Africa • Nology (Pty) Ltd. • http://www.zyxel.co.za GS3700/XGS3700 Series User’s Guide...
Page 532
Appendix C Customer Support GS3700/XGS3700 Series User’s Guide...
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
Page 534
Appendix D Legal Information List of National Codes COUNTRY ISO 3166 2 LETTER CODE COUNTRY ISO 3166 2 LETTER CODE Austria Liechtenstein Belgium Lithuania Bulgaria Luxembourg Croatia Malta Cyprus Netherlands Czech Republic Norway Denmark Poland Estonia Portugal Finland Romania France Serbia Germany Slovakia...
Page 535
Appendix D Legal Information Environment Statment European Union - Disposal and Recycling Information WEEE Directive The symbol below means that according to local regulations your product and/or its battery shall be disposed of separately from domestic waste. If this product is end of life, take it to a recycling station designated by local authorities. At the time of disposal, the separate collection of your product and/or its battery will help save natural resources and ensure that the environment is sustainable development.
Page 536
Appendix D Legal Information Environmental Product Declaration GS3700/XGS3700 Series User’s Guide...
North American products. Trademarks ZyNOS (ZyXEL Network Operating System) and ZON (ZyXEL One Network)are registered trademarks of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Page 538
Appendix D Legal Information Open Source Licenses This product contains in part some free software distributed under GPL license terms and/or GPL like licenses. Open source licenses are provided with the firmware package. You can download the latest firmware at www.zyxel.com. To obtain the source code covered under those Licenses, please contact support@zyxel.com.tw to get it.
Index Index ARP scan Numbers authentication and RADIUS 802.1P priority setup 802.3az authorization privilege levels setup automatic VLAN registration access control limitations login account remote management back up, configuration file service port SNMP basic settings accounting binding setup binding table address learning, MAC building 112, 114...
Page 540
Index and QoS editing 206, 207 example daylight saving time overview default gateway setup 201, 205, 206, 207 default IP address viewing 206, 207 DHCP cloning a port See port cloning client IP pool cluster management configuration options and switch passwords modes cluster manager 489, 494...
Page 541
Index DUID 25, 455 file transfer procedure dynamic link aggregation restrictions over WAN GARP egress port GARP (Generic Attribute Registration Protocol) Energy Efficient Ethernet GARP terminology error disable detect 326, 330 GARP timer 64, 102 error disable recovery general setup configuration overview getting help...
Page 542
Index IGMP filtering profile profiles 231, 237, 238, 241, 242 L2PT IGMP leave timeout access port fast mormal configuration IGMP snooping encapsulation LACP MAC address IGMP throttling mode ingress port overview Installation PAgP Rack-mounting point to point installation freestanding tunnel port precautions UDLD Installing the Fan Module...
Page 543
Index loop guard Memory Buffer how it works MGMT port port shut down probe packet and SNMP loop guard, vs STP supported MIBs MIB (Management Information Base) mini GBIC ports connection speed connector type transceiver installation MAC (Media Access Control) transceiver removal MAC address 58, 441, 500...
Page 544
Index Multiple Spanning Tree Protocol policy routing benefits Multiple Spanning Tree Protocol, See MSTP. cost savings Multiple STP load sharing Multiple STP, see MSTP overview policy-based routing configuration Port Aggregation Protocol, see PAgP group configuration port authentication network example and RADIUS MVR (Multicast VLAN Registration) IEEE802.1x 187, 192, 256...
Page 545
Index trusted ports trusted computers untrusted ports remote port mirroring 162, 167 priority level Removing the Fan Module priority, queue assignment resetting 44, 451, 452, 453 product registration to factory default settings 451, 452, 453 protocol based VLAN restoring configuration 44, 450 and IEEE 802.1Q tagging RFC 3164...
Page 546
Index protocol operations Hello Time 139, 141, 144, 146 security how it works setup Max Age 140, 141, 144, 146 traps path cost 132, 140, 145 users port priority 140, 145 version 3 and security port state versions supported root port status SNMP traps 141, 145, 154...
Page 547
Index traps acceptable frame type destination automatic registration TRTCM ingress filtering and bandwidth control introduction and DiffServ number of VLANs color-aware mode port number color-blind mode port settings setup port-based VLAN trunk group port-based, all connected trunking port-based, isolation example port-based, wizard trusted ports static VLAN...
Page 548
Index master router network example 430, 435 parameters preempt mode 433, 434 priority 433, 434 status uplink gateway uplink status Virtual Router Virtual Router ID VRID warranty note web configurator 25, 37 getting help layout login logout navigation panel weight, queuing Weighted Round Robin Scheduling (WRR) WFQ (Weighted Fair Queuing) WRR (Weighted Round Robin Scheduling...
Need help?
Do you have a question about the xg3700 series and is the answer not in the manual?
Questions and answers