ZyXEL Communications XGS1930-38 User Manual

ZyXEL Communications XGS1930-38 User Manual

24/48-port gbe smart manager switch xgs1930 series
Table of Contents

Advertisement

User's Guide
XGS1930 Series
24/48-port GbE Smart Managed Switch
Default Login Details
LAN IP Address
User Name
Password
Copyright © 2018 Zyxel Communications Corporation
http://DHCP-assigned
IP or 192.168.1.1
admin
1234
Version 4.50 Edition 2, 05/2018

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications XGS1930-38

  • Page 1 User’s Guide XGS1930 Series 24/48-port GbE Smart Managed Switch Default Login Details Version 4.50 Edition 2, 05/2018 LAN IP Address http://DHCP-assigned IP or 192.168.1.1 User Name admin Password 1234 Copyright © 2018 Zyxel Communications Corporation...
  • Page 2: Related Documentation

    IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. This is a User’s Guide for a series of products. Not all products support all firmware features. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system.
  • Page 3: Table Of Contents

    Contents Overview Contents Overview User’s Guide ............................17 Getting to Know Your Switch ......................18 Hardware Installation and Connection ..................... 25 Hardware Panels ..........................28 Technical Reference ........................35 The Web Configurator ......................... 36 Initial Setup Example ..........................55 DHCP Relay Tutorial ..........................59 Status and ZON .............................
  • Page 4 Contents Overview Access Control ............................ 288 Diagnostic ............................308 System Log ............................311 Syslog Setup ............................312 Cluster Management ......................... 315 MAC Table ............................321 IP Table ..............................324 ARP Table ............................326 Routing Table ............................328 Path MTU Table ........................... 329 Configure Clone ..........................
  • Page 5: Table Of Contents

    Table of Contents Table of Contents Contents Overview ..........................3 Table of Contents ..........................5 Part I: User’s Guide..................17 Chapter 1 Getting to Know Your Switch ......................18 1.1 Introduction ............................. 18 1.1.1 Management Mode ......................18 1.1.2 Mode Changing ........................19 1.1.3 ZON Utility ..........................
  • Page 6 Table of Contents 3.2.2 Power Connector ......................... 32 3.3 LEDs ..............................32 Part II: Technical Reference................35 Chapter 4 The Web Configurator........................36 4.1 Overview ............................36 4.2 System Login ........................... 36 4.3 Wizard .............................. 40 4.4 The Status Screen .......................... 48 4.4.1 Change Your Password .......................
  • Page 7 Table of Contents 7.2 Status ..............................64 7.3 Zyxel One Network (ZON) Utility ....................66 7.3.1 Requirements ......................... 67 7.3.2 Run the ZON Utility ......................... 67 7.4 ZON Neighbor Management Screen ..................71 Chapter 8 Basic Setting ............................73 8.1 Overview ............................73 8.1.1 What You Can Do .........................
  • Page 8 Table of Contents 9.2 VLAN Status ..........................109 9.2.1 VLAN Details ........................110 9.3 VLAN Configuration ........................110 9.4 Configure a Static VLAN ......................111 9.5 Configure VLAN Port Settings ....................113 9.6 Voice VLAN Setup ........................115 9.7 Port-Based VLAN Setup ......................117 9.7.1 Configure a Port-Based VLAN ...................
  • Page 9 Table of Contents 13.8.3 MST Instance ........................144 13.8.4 Common and Internal Spanning Tree (CIST) ..............145 Chapter 14 Bandwidth Control ...........................146 14.1 Bandwidth Control Overview ....................146 14.1.1 What You Can Do ......................146 14.2 Bandwidth Control Setup ......................146 Chapter 15 Broadcast Storm Control .........................148 15.1 Broadcast Storm Control Overview ..................
  • Page 10 Table of Contents Chapter 19 Port Security............................169 19.1 Port Security Overview ......................169 19.1.1 What You Can Do ......................169 19.2 Port Security Setup ........................169 Chapter 20 Time Range............................172 20.1 Time Range Overview ....................... 172 20.1.1 What You Can Do ......................172 20.2 Configuring Time Range ......................
  • Page 11 Table of Contents 24.3 IPv4 Multicast Status ........................191 24.3.1 IGMP Snooping ......................... 192 24.3.2 IGMP Snooping VLAN ...................... 194 24.3.3 IGMP Filtering Profile ......................196 Chapter 25 AAA ..............................198 25.1 AAA Overview ........................... 198 25.1.1 What You Can Do ......................198 25.1.2 What You Need to Know ....................
  • Page 12 Table of Contents Chapter 29 Error Disable............................223 29.1 Error Disable Overview ......................223 29.1.1 CPU Protection Overview ....................223 29.1.2 Error-Disable Recovery Overview ..................223 29.1.3 What You Can Do ......................223 29.2 Error Disable Screen ........................224 29.3 Error-Disable Status ........................224 29.4 CPU Protection Configuration ....................
  • Page 13 Table of Contents 33.1 DHCP Overview .......................... 259 33.1.1 What You Can Do ......................259 33.1.2 What You Need to Know ....................259 33.2 DHCP Configuration ........................260 33.3 DHCPv4 Status ........................... 260 33.4 DHCPv4 Relay ..........................261 33.4.1 DHCPv4 Relay Agent Information ................... 261 33.4.2 DHCPv4 Option 82 Profile ....................
  • Page 14 Table of Contents 35.10.3 FTP Command Line Procedure ..................286 35.10.4 GUI-based FTP Clients ..................... 287 35.10.5 FTP Restrictions ........................ 287 Chapter 36 Access Control..........................288 36.1 Access Control Overview ......................288 36.1.1 What You Can Do ......................288 36.2 The Access Control Main Screen ....................288 36.3 Configuring SNMP ........................
  • Page 15 Table of Contents 40.3 Clustering Management Configuration ................317 40.4 Technical Reference ........................319 40.4.1 Cluster Member Switch Management ................319 Chapter 41 MAC Table ............................321 41.1 MAC Table Overview ........................ 321 41.1.1 What You Can Do ......................321 41.1.2 What You Need to Know ....................321 41.2 Viewing the MAC Table ......................
  • Page 16 Table of Contents Chapter 48 Port Status ............................335 48.1 Port Status ............................ 335 48.1.1 Port Details ........................336 48.1.2 Port Utilization ......................... 339 Chapter 49 Troubleshooting..........................341 49.1 Power, Hardware Connections, and LEDs ................341 49.2 Switch Access and Login ......................342 49.3 Switch Configuration ........................
  • Page 17: User's Guide

    User’s Guide...
  • Page 18: Getting To Know Your Switch

    H A P T E R Getting to Know Your Switch 1.1 Introduction This chapter introduces the main features and applications of the Switch. The XGS1930 Series consists of the following models: • XGS1930-28 • XGS1930-28HP • XGS1930-52 • XGS1930-52HP Referring to PoE model(s) in this User's Guide only applies to XGS1930-28HP and XGS1930-52HP.
  • Page 19: Mode Changing

    Chapter 1 Getting to Know Your Switch Nebula Cloud Management In this mode, you can manage and monitor the Switch through the Zyxel Nebula cloud-based network management system. Note that you need to configure the Switch via the NCC (Nebula Control Center) when the Switch is in this mode.
  • Page 20: Zon Utility

    Chapter 1 Getting to Know Your Switch Register the Switch by entering its MAC address and serial number or its QR code. The serial number and MAC address can be found in the Status screen or the device back label on the Switch. You can also find the QR code on the device back label.
  • Page 21: Applications

    Chapter 1 Getting to Know Your Switch The following table describes the PoE features of the Switch by model. Table 3 Models and PoE Features SWITCH MODEL POE FEATURES XGS1930-28HP IEEE 802.3af PoE IEEE 802.3 at High Power over Ethernet (PoE) XGS1930-52HP Power management mode - Classification Power management mode - Consumption...
  • Page 22: High Performance Switching Example

    Chapter 1 Getting to Know Your Switch Moreover, the Switch eases supervision and maintenance by allowing network managers to centralize multiple servers at a single location. Figure 2 Bridging Application 1.2.3 High Performance Switching Example The Switch is ideal for connecting two networks that need high bandwidth. In the following example, use trunking to connect these two networks.
  • Page 23: Ways To Manage The Switch

    Chapter 1 Getting to Know Your Switch 1.2.4.1 Tag-based VLAN Example Ports in the same VLAN group share the same frame broadcast domain thus increase network performance through reduced broadcast traffic. VLAN groups can be modified at any time by adding, moving or changing ports without any re-cabling.
  • Page 24 Chapter 1 Getting to Know Your Switch • Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters. • Write down the password and put it in a safe place. •...
  • Page 25: Hardware Installation And Connection

    H A P T E R Hardware Installation and Connection 2.1 Installation Scenarios This chapter shows you how to install and connect the Switch. The Switch can be placed on a desktop or rack-mounted on a standard EIA rack. Use the rubber feet in a desktop installation and the brackets in a rack-mounted installation.
  • Page 26: Mounting The Switch On A Rack

    Chapter 2 Hardware Installation and Connection Note: Do NOT block the ventilation holes. Leave space between devices when stacking. Note: Do NOT store things on the Switch, and allow clearance next to the ventilation holes to prevent your Switch from overheating. This is especially crucial when your Switch doesn’t have fan modules.
  • Page 27: Mounting The Switch On A Rack

    Chapter 2 Hardware Installation and Connection Using a #2 Philips screwdriver, install the M3 flat head screws through the mounting bracket holes into the Switch. Repeat steps to install the second mounting bracket on the other side of the Switch. You may now mount the Switch on a rack.
  • Page 28: Hardware Panels

    H A P T E R Hardware Panels This chapter describes the front panel and rear panel of the Switch and shows you how to make the hardware connections. 3.1 Front Panel The following figures show the front panels of the Switch. Figure 8 Front Panel: XGS1930-28 Figure 9 Front Panel: XGS1930-28HP Figure 10 Front Panel: XGS1930-52...
  • Page 29: Poe (Xgs1930-28Hp & Xgs1930-52Hp)

    Chapter 3 Hardware Panels port uses the pre-configured speed and duplex mode when making a connection, thus requiring you to make sure that the settings of the peer Ethernet port are the same in order to connect. 3.1.1.1 Default Ethernet Negotiation Settings The factory default negotiation settings for the Gigabit ports on the Switch are: •...
  • Page 30: Transceiver Removal

    Chapter 3 Hardware Panels Press the transceiver firmly until it clicks into place. The Switch automatically detects the installed transceiver. Check the LEDs to verify that it is functioning properly. Close the transceiver’s latch (latch styles vary). Connect the fiber optic cables to the transceiver. Figure 12 Transceiver Installation Example Figure 13 Connecting the Fiber Optic Cables 3.1.3.2 Transceiver Removal...
  • Page 31: Rear Panel

    Chapter 3 Hardware Panels Figure 16 Transceiver Removal Example 3.2 Rear Panel The following figures show the rear panels of the Switch. Figure 17 Rear Panel: XGS1930-28 Figure 18 Rear Panel: XGS1930-28HP Figure 19 Rear Panel: XGS1930-52 Figure 20 Rear Panel: XGS1930-52HP 3.2.1 Grounding Grounding is a safety measure to have unused electricity return to the ground.
  • Page 32: Power Connector

    Chapter 3 Hardware Panels Warning! Connect the ground cable before you connect any other cables or wiring. Figure 21 Grounding 3.2.2 Power Connector Note: Make sure you are using the correct power source as shown on the panel. To connect power to the Switch, insert the female end of the power cord to the AC power receptacle on the rear panel.
  • Page 33 Chapter 3 Hardware Panels Table 4 LED Descriptions (continued) COLOR STATUS DESCRIPTION CLOUD Green The Switch is managed by the NCC (Nebula Control Center). Blinking The Switch is connected to the NCC, but not registered. Amber The Switch is in Nebula cloud management mode. It was trying to connect to the NCC, but failed.
  • Page 34 Chapter 3 Hardware Panels Table 4 LED Descriptions (continued) COLOR STATUS DESCRIPTION LNK/ACT Green The port has a successful 1000 Mbps connection. Blinking The port is transmitting or receiving data at 1000 Mbps. 25-28 (XGS1930- 28 & XGS1930- Blue The port has a successful 10 Gbps connection. 28HP) Blinking The port is transmitting or receiving data at 10 Gbps.
  • Page 35: Technical Reference

    Technical Reference...
  • Page 36: The Web Configurator

    H A P T E R The Web Configurator 4.1 Overview This section introduces the configuration and functions of the web configurator. The web configurator is an HTML-based management interface that allows easy Switch setup and management via Internet browser. Use Internet Explorer 9.0 and later versions, Mozilla Firefox 21 and later versions, Safari 6.0 and later versions or Google Chrome 26.0 and later versions.
  • Page 37 Chapter 4 The Web Configurator Figure 22 Web Configurator: Login Click Login to view the first web configurator screen. Click the Visit button to open the Zyxel Nebula Control Center (NCC) login page in a new tab or window. The NCC is a cloud-based network management system that allows you to remotely manage and monitor the Switch in Nebula cloud management mode (see Section 1.1.1 on page 18).
  • Page 38 Chapter 4 The Web Configurator Figure 23 Web Configurator: Wizard If you didn’t change the default administrator password and/or SNMP community values, a warning screen displays each time you log into the web configurator. Click Password / SNMP to open a screen where you can change the administrator and SNMP passwords simultaneously.
  • Page 39 Chapter 4 The Web Configurator Figure 25 Web Configurator: Password Change the default administrator and/or SNMP passwords, and then click Apply to save your changes. Table 5 Web Configurator: Password/SNMP LABEL DESCRIPTION Administrator This is the default administrator account with the “admin” user name. You cannot change the default administrator user name.
  • Page 40: Wizard

    Chapter 4 The Web Configurator 4.3 Wizard Wizard displays Basic, Protection, VLAN, and QoS. Basic In Basic, you can set up IP/DNS, set up your password, SNMP community, link aggregation, and view finished results. In order to set up your IP/DNS, please do the following. Click Wizard > Basic > Step 1 IP to access this screen.
  • Page 41 Chapter 4 The Web Configurator Table 6 Wizard > Basic > Step 1 IP LABEL DESCRIPTION DNS Server DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. Enter a domain name server IP address in order to be able to use a domain name instead of an IP address.
  • Page 42 Chapter 4 The Web Configurator Table 7 Wizard > Basic > Step 2 Password LABEL DESCRIPTION Get Community Enter the Get Community string, which is the password for the incoming Get- and GetNextrequests from the management station. The Get Community string is only used by SNMP managers using SNMP version 2c or lower. Set Community Enter the Set Community string, which is the password for the incoming Set- requests from the management station.
  • Page 43 Chapter 4 The Web Configurator Table 8 Wizard > Basic > Step 3 Link Aggregation LABEL DESCRIPTION Next Click Next to show the next screen. Cancel Click Cancel to exit this screen without saving. After clicking Next, the Summary screen appears. Figure 29 Wizard >...
  • Page 44 Table 9 Wizard > Basic > Step 4 Summary LABEL DESCRIPTION Set Community This field displays the Set Community string. Trap Community This field displays the Trap Community string. Link Aggregation Group This field displays the group number. Type This field displays Static or LACP of this group. Member This field displays the members of this group.
  • Page 45 Chapter 4 The Web Configurator After clicking Next, the Broadcast Storm Control screen appears. Figure 31 Wizard > Protection > Step 2 Broadcast Storm Control Each field is described in the following table. Table 11 Wizard > Protection > Step 2 Broadcast Storm Control LABEL DESCRIPTION Broadcast Storm Control...
  • Page 46 Chapter 4 The Web Configurator Figure 32 Wizard > Protection > Step 3 Summary Each field is described in the following table. Table 12 Wizard > Protection > Step 3 Summary LABEL DESCRIPTION Summary Loop Guard If the loop guard feature is enabled on a port, the Switch will prevent loops on this port. Broadcast Storm If the broadcast storm control feature is enabled on a port, the number of broadcast Control...
  • Page 47 Chapter 4 The Web Configurator Figure 33 Wizard > VLAN > VLAN Setting Each field is described in the following table. Table 13 Wizard > VLAN > VLAN Setting LABEL DESCRIPTION VLAN Setting Default VLAN 1 / Select ports and use the right arrow to add them as the untagged ports to a VLAN group. Access Untagged port VLAN member port...
  • Page 48: The Status Screen

    Figure 34 Wizard > QoS > QoS Setting Each field is described in the following table. Table 14 Wizard > QoS > QoS Setting LABEL DESCRIPTION QoS Setting Select all ports Select all ports to apply settings on all ports. You can select a port by clicking it.
  • Page 49 Chapter 4 The Web Configurator Figure 35 Web Configurator Home Screen for PoE model(s) (Status) A - Click the menu items to open submenu links, and then click on a submenu link to open the screen in the main window. B, C, D, E, F, G, H - These are quick links which allow you to perform certain tasks no matter which screen you are currently working in.
  • Page 50 Chapter 4 The Web Configurator Table 15 Navigation Panel Sub-links Overview BASIC SETTING ADVANCED APPLICATION IP APPLICATION MANAGEMENT The following table describes the links in the navigation panel. Table 16 Navigation Panel Links LINK DESCRIPTION Basic Settings System Info This link takes you to a screen that displays general system information. General Setup This link takes you to a screen where you can configure general identification information about the Switch.
  • Page 51 Chapter 4 The Web Configurator Table 16 Navigation Panel Links (continued) LINK DESCRIPTION VLAN This link takes you to screens where you can configure port-based or 802.1Q VLAN (depending on what you configured in the Switch Setup menu). You can also configure a protocol based VLAN or a subnet based VLAN in these screens.
  • Page 52: Change Your Password

    Chapter 4 The Web Configurator Table 16 Navigation Panel Links (continued) LINK DESCRIPTION ARP Setup This link takes you to screens where you can configure the ARP learning settings for each port. Management Maintenance This link takes you to screens where you can perform firmware and configuration file maintenance as well as reboot the system.
  • Page 53: Saving Your Configuration

    Chapter 4 The Web Configurator 4.5 Saving Your Configuration When you are done modifying the settings in a screen, click Apply to save your changes back to the run-time memory. Settings in the run-time memory are lost when the Switch’s power is turned off. Click the Save link in the upper right hand corner of the web configurator to save your configuration to nonvolatile memory.
  • Page 54: Restore Custom Default

    Chapter 4 The Web Configurator 4.7.2 Restore Custom Default Press the RESTORE button for three to six seconds to have the Switch automatically reboot and restore the saved custom default file. See Section 3.3 on page 32 for more information about the LED behavior. 4.7.3 Reboot the Switch Press the RESET button to reboot the Switch without turning the power off.
  • Page 55: Initial Setup Example

    Chapter 5 Initial Setup Example H A P T E R Initial Setup Example 5.1 Overview This chapter shows how to set up the Switch for an example network. The following lists the configuration steps for the initial setup: • Create a VLAN •...
  • Page 56: Setting Port Vid

    In the Static VLAN screen, select ACTIVE, enter a descriptive name in the Name field, enter 2 in the VLAN Group ID field for the VLAN2 network, and use the default VLAN type, Normal, in the VLAN Type field. Note: The VLAN Group ID field in this screen and the VID field in the IP Setup screen refer to the same VLAN ID.
  • Page 57: Configuring Switch Management Ip Address

    Chapter 5 Initial Setup Example Figure 39 Initial Setup Network Example: Port VID Click Advanced Applications > VLAN > VLAN Configuration in the navigation panel. Then click the VLAN Port Setup link. Enter 2 in the PVID field for port 2 and click Apply to save your changes back to the run-time memory.
  • Page 58 Chapter 5 Initial Setup Example Figure 40 Initial Setup Example: Management IP Address Connect your computer to any Ethernet port on the Switch. Make sure your computer is in the same subnet as the Switch. Open your web browser and enter 192.168.1.1 (the default IP address) in the address bar to access the web configurator.
  • Page 59: Dhcp Relay Tutorial

    Chapter 6 DHCP Relay Tutorial H A P T E R DHCP Relay Tutorial 6.1 Overview This chapter provides some examples of using the web configurator to set up and use the Switch. The tutorials include: • How to Use DHCPv4 Relay on the Switch 6.2 How to Use DHCPv4 Relay on the Switch This tutorial describes how to configure your Switch to forward DHCP client requests to a specific DHCP server.
  • Page 60: Creating A Vlan

    Chapter 6 DHCP Relay Tutorial 6.2.2 Creating a VLAN Follow the steps below to configure port 2 as a member of VLAN 102. Access the web configurator through the Switch’s management port. Go to Basic Setting > Switch Setup and set the VLAN type to 802.1Q. Click Apply to save the settings to the run-time memory.
  • Page 61 Chapter 6 DHCP Relay Tutorial Figure 43 Tutorial: Create a Static VLAN Click the VLAN Configuration link in the Static VLAN Setup screen and then the VLAN Port Setup link in the VLAN Configuration screen. Figure 44 Tutorial: Click the VLAN Port Setting Link Enter 102 in the PVID field for port 2 to add a tag to incoming untagged frames received on that port so that the frames are forwarded to the VLAN group that the tag defines.
  • Page 62: Configuring Dhcpv4 Relay

    Chapter 6 DHCP Relay Tutorial Figure 45 Tutorial: Add Tag for Frames Received on Port 2 11 Click the Save link in the upper right corner of the web configurator to save your configuration permanently. 6.2.3 Configuring DHCPv4 Relay Follow the steps below to enable DHCP relay on the Switch and allow the Switch to add relay agent information (such as the VLAN ID) to DHCP requests.
  • Page 63: Troubleshooting

    Chapter 6 DHCP Relay Tutorial Figure 46 Tutorial: Set DHCP Server and Relay Information Click the Save link in the upper right corner of the web configurator to save your configuration permanently. The DHCP server can then assign a specific IP address based on the DHCP request. 6.2.4 Troubleshooting Check the client A’s IP address.
  • Page 64: Status And Zon

    Chapter 7 Status and ZON H A P T E R Status and ZON 7.1 Overview This chapter describes the screens for System Status, ZON Utility, ZON Neighbor Management, Port Status, and Port Details. 7.1.1 What You Can Do • Use the Status screen (Section 7.2 on page 64) to see the Switch’s general device information, system status, and IP addresses.
  • Page 65 Chapter 7 Status and ZON Figure 47 Status (for PoE model(s)) The following table describes the labels in this screen. Table 17 Status LABEL DESCRIPTION Device Information Device Type This field displays the model name of this Switch. System Name This field displays the name used to identify the Switch on any network.
  • Page 66: Zyxel One Network (Zon) Utility

    Chapter 7 Status and ZON Table 17 Status (continued) LABEL DESCRIPTION Cloud Mode This field displays whether the Nebula Control Center Discovery feature is enabled or not. See Section 8.12 on page 104 for more information. ON - The Switch is managed by the NCC (Nebula Control Center). OFF - The Switch is in standalone mode, and managed by the web configurator.
  • Page 67: Requirements

    Chapter 7 Status and ZON 7.3.1 Requirements Before installing the ZON Utility on your PC, please make sure it meets the requirements listed below. Operating System At the time of writing, the ZON Utility is compatible with: • Windows 7 (both 32-bit / 64-bit versions) •...
  • Page 68 Figure 48 Supported Devices and Versions If you want to check the supported models and firmware versions later, you can click the Show information about ZON icon in the upper right hand corner of the screen. Then select the Supported model and firmware version link.
  • Page 69 Chapter 7 Status and ZON Figure 50 Network Adapter Click the Go button for the ZON Utility to discover all supported devices in your network. Figure 51 Discovery The ZON Utility screen shows the devices discovered. Figure 52 ZON Utility Screen Select a device and then use the icons to perform actions.
  • Page 70 Chapter 7 Status and ZON Table 18 ZON Utility Icons ICON DESCRIPTION 3 Reboot Device Use this icon to restart the selected device(s). This may be useful when troubleshooting or upgrading new firmware. 4 Reset Configuration to If you forget your password or cannot access the Web Configurator, you can use this Default icon to reload the factory-default configuration file.
  • Page 71: Zon Neighbor Management Screen

    Chapter 7 Status and ZON 7.4 ZON Neighbor Management Screen The ZON neighbor management screen allows you to view and manage the Switch’s neighboring devices more conveniently. It uses Layer Link Discovery Protocol (LLDP) to discover all neighbor devices connected to the Switch including non-Zyxel devices. You can perform tasks on the neighboring devices like login, reboot (turn the power off and then back on again), and reset to factory default settings in the Neighbor Management screen.
  • Page 72 Chapter 7 Status and ZON Table 20 Status > Neighbor LABEL DESCRIPTION PWR Cycle Click the Cycle button to turn OFF the power of the neighbor device and turn it back ON again. A count down button (from 5 to 0) starts. Note: •...
  • Page 73: Basic Setting

    Chapter 8 Basic Setting H A P T E R Basic Setting 8.1 Overview This chapter describes how to configure the System Info, General Setup, Switch Setup, IP Setup, Port Setup, PoE, Interface Setup, IPv6, and Cloud Management screens. 8.1.1 What You Can Do •...
  • Page 74 Chapter 8 Basic Setting Figure 54 Basic Setting > System Info (for PoE model(s) only) The following table describes the labels in this screen. Table 21 Basic Setting > System Info LABEL DESCRIPTION System Name This field displays the descriptive name of the Switch for identification purposes. Product Model This field displays the product model of the Switch.
  • Page 75: General Setup

    Chapter 8 Basic Setting Table 21 Basic Setting > System Info (continued) LABEL DESCRIPTION Temperature BOARD, MAC and PHY refer to the location of the temperature sensors on the Switch printed circuit board. Current This shows the current temperature at this sensor. This field displays the maximum temperature measured at this sensor.
  • Page 76 Chapter 8 Basic Setting Figure 55 Basic Setting > General Setup The following table describes the labels in this screen. Table 22 Basic Setting > General Setup LABEL DESCRIPTION System Name Choose a descriptive name for identification purposes. This name consists of up to 64 printable characters;...
  • Page 77: Introduction To Vlans

    Chapter 8 Basic Setting Table 22 Basic Setting > General Setup (continued) LABEL DESCRIPTION Time Zone Select the time difference between UTC (Universal Time Coordinated, formerly known as GMT, Greenwich Mean Time) and your time zone from the drop-down list box. Daylight Saving Daylight saving is a period from late spring to early fall when many countries set their clocks Time...
  • Page 78: Switch Setup

    Chapter 8 Basic Setting Chapter 9 on page 106 for information on port-based and 802.1Q tagged VLANs. 8.5 Switch Setup Click Basic Setting > Switch Setup in the navigation panel to display the screen as shown. The VLAN setup screens change depending on whether you choose 802.1Q or Port Based in the VLAN Type field in this screen.
  • Page 79: Ip Setup

    Chapter 8 Basic Setting Table 23 Basic Setting > Switch Setup (continued) LABEL DESCRIPTION Leave Timer Leave Time sets the duration of the Leave Period timer for GVRP in milliseconds. Each port has a single Leave Period timer. Leave Time must be two times larger than Join Timer; the default is 600 milliseconds.
  • Page 80: Ip Status Details

    Chapter 8 Basic Setting Note: You must configure a VLAN first. Each VLAN can have multiple management IP addresses, and you can log into the Switch via different management IP addresses simultaneously. Figure 57 Basic Setting > IP Setup The following table describes the labels in this screen. Table 24 Basic Setting >...
  • Page 81: Ip Configuration

    Chapter 8 Basic Setting Figure 59 Basic Setting > IP Setup > IP Status Details: DHCP The following table describes the labels in this screen. Table 26 Basic Setting > IP Setup > IP Status Details: DHCP LABEL DESCRIPTION Type This shows whether this IP address is dynamically assigned from a DHCP server or manually assigned (Static or DHCP).
  • Page 82 Chapter 8 Basic Setting Figure 60 Basic Setting > IP Setup > IP Configuration The following table describes the labels in this screen. Table 27 Basic Setting > IP Setup > IP Configuration LABEL DESCRIPTION Default Type the IP address of the default outgoing gateway in dotted decimal notation, for example Gateway 192.168.1.254.
  • Page 83: Port Setup

    Chapter 8 Basic Setting Table 27 Basic Setting > IP Setup > IP Configuration (continued) LABEL DESCRIPTION Type This field displays the type of IP address status. Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries.
  • Page 84: Poe Setup

    Chapter 8 Basic Setting Table 28 Basic Setting > Port Setup (continued) LABEL DESCRIPTION Type This field displays the capacity that the port can support. Speed/Duplex Select the speed and the duplex mode of the Ethernet connection on this port. Choices are Auto-1000M, 10M/Half Duplex, 10M/Full Duplex, 100M/Half Duplex, 100M/Full Duplex and 1000M/ Full Duplex (Gigabit connections only).
  • Page 85 Chapter 8 Basic Setting In the figure below, the IP camera and IP phone get their power directly from the Switch. Aside from minimizing the need for cables and wires, PoE removes the hassle of trying to find a nearby electric outlet to power up devices.
  • Page 86: Poe Time Range Status

    Chapter 8 Basic Setting The following table describes the labels in this screen. Table 29 Basic Setting > PoE Setup LABEL DESCRIPTION PoE Status PoE Mode This field displays the power management mode used by the Switch, whether it is in Classification or Consumption mode.
  • Page 87: Poe Setup

    Chapter 8 Basic Setting Figure 64 Basic Setting > PoE Setup > PoE Time Range Status The following table describes the labels in this screen. Table 30 Basic Setting > PoE Setup > PoE Time Range Status LABEL DESCRIPTION Port This is the number of the port on the Switch.
  • Page 88 Chapter 8 Basic Setting Figure 65 Basic Setting > PoE Setup > PoE Setup The following table describes the labels in this screen. Table 31 Basic Setting > PoE Setup > PoE Setup LABEL DESCRIPTION PoE Mode Select the power management mode you want the Switch to use. •...
  • Page 89: Interface Setup

    Chapter 8 Basic Setting Table 31 Basic Setting > PoE Setup > PoE Setup (continued) LABEL DESCRIPTION PD Priority When the total power requested by the PDs exceeds the total PoE power budget on the Switch, you can set the PD priority to allow the Switch to provide power to ports with higher priority. Select Critical to give the highest PD priority on the port.
  • Page 90: Ipv6

    Chapter 8 Basic Setting Use this screen to set IPv6 interfaces on which you can configure an IPv6 address to access and manage the Switch. Click Basic Setting > Interface Setup in the navigation panel to display the configuration screen. Figure 66 Basic Setting >...
  • Page 91: Ipv6 Interface Status

    Chapter 8 Basic Setting Figure 67 Basic Setting > IPv6 The following table describes the labels in this screen. Table 33 Basic Setting > IPv6 LABEL DESCRIPTION Index This field displays the index number of an IPv6 interface. Click on an index number to view more interface details.
  • Page 92 Chapter 8 Basic Setting The following table describes the labels in this screen. Table 34 Basic Setting > IPv6 > IPv6 Interface Status LABEL DESCRIPTION IPv6 Active This field displays whether the IPv6 interface is activated or not. MTU Size This field displays the Maximum Transmission Unit (MTU) size for IPv6 packets on this interface.
  • Page 93: Ipv6 Configuration

    Chapter 8 Basic Setting Table 34 Basic Setting > IPv6 > IPv6 Interface Status (continued) LABEL DESCRIPTION Preferred This field displays how long (in seconds) that the global address remains preferred. Lifetime Valid This field displays how long (in seconds) that the global address is valid. Lifetime This field displays the DNS server address assigned by the DHCPv6 server.
  • Page 94: Ipv6 Global Setup

    Chapter 8 Basic Setting Table 35 Basic Setting > IPv6 > IPv6 Configuration (continued) LABEL DESCRIPTION IPv6 Router Click the link to go to a screen where you can configure the IPv6 router discovery settings. Discovery Setup IPv6 Prefix Click the link to go to a screen where you can configure the Switch’s IPv6 prefix list. Setup IPv6 Neighbor Click the link to go to a screen where you can create a static IPv6 neighbor entry in the Switch’s...
  • Page 95: Ipv6 Link-Local Address Setup

    Chapter 8 Basic Setting Figure 71 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Interface Setup The following table describes the labels in this screen. Table 37 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Interface Setup LABEL DESCRIPTION Interface Select the IPv6 interface you want to configure.
  • Page 96: Ipv6 Global Address Setup

    Chapter 8 Basic Setting The following table describes the labels in this screen. Table 38 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Link-Local Address Setup LABEL DESCRIPTION Interface Select the IPv6 interface you want to configure. Link-Local Manually configure a static IPv6 link-local address for the interface. Address Default Set the default gateway IPv6 address for the interface.
  • Page 97: Ipv6 Neighbor Discovery Setup

    Chapter 8 Basic Setting Table 39 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Global Address Setup (continued) LABEL DESCRIPTION Click Add to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the nonvolatile memory when you are done configuring.
  • Page 98: Ipv6 Router Discovery Setup

    Chapter 8 Basic Setting Table 40 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Neighbor Discovery Setup (continued) LABEL DESCRIPTION NS Interval Specify the time interval (from 1000 to 3600000 milliseconds) at which neighbor solicitations are re- sent for this interface. Reachable Specify how long (from 1000 to 3600000 milliseconds) a neighbor is considered reachable for this Time...
  • Page 99: Ipv6 Prefix Setup

    Chapter 8 Basic Setting The following table describes the labels in this screen. Table 41 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Router Discovery Setup LABEL DESCRIPTION Interface Select the IPv6 interface you want to configure. Flags Select the Managed Config Flag option to have the Switch set the “managed address configuration”...
  • Page 100 Chapter 8 Basic Setting Figure 76 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Prefix Setup The following table describes the labels in this screen. Table 42 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Prefix Setup LABEL DESCRIPTION Interface Select the IPv6 interface you want to configure.
  • Page 101: Ipv6 Neighbor Setup

    Chapter 8 Basic Setting Table 42 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Prefix Setup (continued) LABEL DESCRIPTION Delete Check the entry(ies) that you want to remove in the Delete column and then click Delete to remove the selected entry(ies) from the summary table. Cancel Click Cancel to clear the Delete check boxes.
  • Page 102: Dhcpv6 Client Setup

    Chapter 8 Basic Setting Table 43 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Neighbor Setup (continued) LABEL DESCRIPTION Interface This is the name of the IPv6 interface you created. Neighbor This field displays the IPv6 address of the neighboring device which can be reached through the Address interface This field displays the MAC address of the neighboring device which can be reached through the...
  • Page 103: Dns

    Chapter 8 Basic Setting Table 44 Basic Setting > IPv6 > IPv6 Configuration > DHCPv6 Client Setup LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the nonvolatile memory when you are done configuring.
  • Page 104: Cloud Management

    Chapter 8 Basic Setting Table 45 Basic Setting > DNS (continued) LABEL DESCRIPTION Domain Name Server Table Index This field displays priority of the DNS server address. Server Address This field displays the IP address of the DNS server. Source This field displays whether the DNS server address is configured manually (Static) or obtained automatically using DHCPv4/DHCPv6 (Dynamic).
  • Page 105 Chapter 8 Basic Setting Figure 80 Basic Setting > Cloud Management XGS1930 Series User’s Guide...
  • Page 106: Vlan

    H A P T E R VLAN 9.1 Overview This chapter shows you how to configure 802.1Q tagged and port-based VLANs. The type of screen you see here depends on the VLAN Type you selected in the Switch Setup screen. 9.1.1 What You Can Do •...
  • Page 107: Forwarding Tagged And Untagged Frames

    Chapter 9 VLAN used to identify priority frames and value 4095 (FFF) is reserved, so the maximum possible VLAN configurations are 4,094. TPID User Priority VLAN ID 2 Bytes 3 Bits 1 Bit 12 bits Forwarding Tagged and Untagged Frames Each port on the Switch is capable of passing tagged or untagged frames.
  • Page 108: Port Vlan Trunking

    Chapter 9 VLAN Table 46 IEEE 802.1Q VLAN Terminology (continued) VLAN PARAMETER TERM DESCRIPTION VLAN Administrative Registration Fixed Fixed registration ports are permanent VLAN members. Control Registration Ports with registration forbidden are forbidden to join the specified Forbidden VLAN. Normal Registration Ports dynamically join a VLAN using GVRP.
  • Page 109: Vlan Status

    Chapter 9 VLAN Static VLAN Use a static VLAN to decide whether an incoming frame on a port should be • sent to a VLAN group as normal depending on its VLAN tag. • sent to a group whether it has a VLAN tag or not. •...
  • Page 110: Vlan Details

    Chapter 9 VLAN Table 47 Advanced Application > VLAN: VLAN Status (continued) LABEL DESCRIPTION Elapsed Time This field shows how long it has been since a normal VLAN was registered or a static VLAN was set up. Status This field shows how this VLAN was added to the Switch. Dynamic: using GVRP Static: added as a permanent entry Voice: manually added as a Voice VLAN...
  • Page 111: Configure A Static Vlan

    Chapter 9 VLAN Figure 85 Advanced Application > VLAN > VLAN Configuration The following table describes the labels in the above screen. Table 49 Advanced Application > VLAN > VLAN Configuration LABEL DESCRIPTION Static VLAN Setup Click Click Here to configure the Static VLAN for the Switch. VLAN Port Setup Click Click Here to configure the VLAN Port for the Switch.
  • Page 112 Chapter 9 VLAN Figure 86 Advanced Application > VLAN > VLAN Configuration > Static VLAN Setup The following table describes the related labels in this screen. Table 50 Advanced Application > VLAN > VLAN Configuration > Static VLAN Setup LABEL DESCRIPTION ACTIVE Select this check box to activate the VLAN settings.
  • Page 113: Configure Vlan Port Settings

    Chapter 9 VLAN Table 50 Advanced Application > VLAN > VLAN Configuration > Static VLAN Setup (continued) LABEL DESCRIPTION Control Select Normal for the port to dynamically join this VLAN group using GVRP. This is the default selection. Select Fixed for the port to be a permanent member of this VLAN group. Select Forbidden if you want to prohibit the port from joining this VLAN group.
  • Page 114 Chapter 9 VLAN Figure 87 Advanced Application > VLAN > VLAN Configuration > VLAN Port Setup The following table describes the labels in this screen. Table 51 Advanced Application > VLAN > VLAN Configuration> VLAN Port Setup LABEL DESCRIPTION GVRP GVRP (GARP VLAN Registration Protocol) is a registration protocol that defines a way for switches to register necessary VLAN members on ports across the network.
  • Page 115: Voice Vlan Setup

    Chapter 9 VLAN Table 51 Advanced Application > VLAN > VLAN Configuration> VLAN Port Setup LABEL DESCRIPTION Acceptable Specify the type of frames allowed on a port. Choices are All, Tag Only and Untag Only. Frame Type Select All from the drop-down list box to accept all untagged or tagged frames on this port. This is the default setting.
  • Page 116 Chapter 9 VLAN Figure 88 Advanced Application > VLAN > VLAN Configuration > Voice VLAN Setup The following table describes the fields in the above screen. Table 52 Advanced Application > VLAN > VLAN Configuration > Voice VLAN Setup LABEL DESCRIPTION Voice VLAN Global Setup Voice VLAN...
  • Page 117: Port-Based Vlan Setup

    Chapter 9 VLAN Table 52 Advanced Application > VLAN > VLAN Configuration > Voice VLAN Setup LABEL DESCRIPTION Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries. Delete Click Delete to remove the selected entry from the summary table.
  • Page 118 Chapter 9 VLAN Figure 89 Advanced Application > VLAN: Port Based VLAN Setup (All Connected) XGS1930 Series User’s Guide...
  • Page 119 Chapter 9 VLAN Figure 90 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation) The following table describes the labels in this screen. Table 53 Advanced Application > VLAN: Port Based VLAN Setup label Description Setting Wizard Choose All connected or Port isolation. All connected means all ports can communicate with each other, that is, there are no virtual LANs.
  • Page 120 Chapter 9 VLAN Table 53 Advanced Application > VLAN: Port Based VLAN Setup (continued) label Description Outgoing These are the egress ports; an egress port is an outgoing port, that is, a port through which a data packet leaves. If you wish to allow two subscriber ports to talk to each other, you must define the egress port for both ports.
  • Page 121: Static Mac Forward Setup

    Chapter 10 Static MAC Forward Setup H A P T E R Static MAC Forward Setup 10.1 Overview This chapter discusses how to configure forwarding rules based on MAC addresses of devices on your network. Use these screens to configure static MAC address forwarding. 10.1.1 What You Can Do Use the Static MAC Forwarding screen (Section 10.2 on page...
  • Page 122 Chapter 10 Static MAC Forward Setup Figure 91 Advanced Application > Static MAC Forwarding The following table describes the labels in this screen. Table 54 Advanced Application > Static MAC Forwarding LABEL DESCRIPTION Active Select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by clearing this check box.
  • Page 123: Static Multicast Forwarding

    Chapter 11 Static Multicast Forwarding H A P T E R Static Multicast Forwarding 11.1 Static Multicast Forward Setup Overview This chapter discusses how to configure forwarding rules based on multicast MAC addresses of devices on your network. Use these screens to configure static multicast address forwarding. 11.1.1 What You Can Do Use the Static Multicast Forwarding screen (Section 11.2 on page...
  • Page 124: Configuring Static Multicast Forwarding

    Chapter 11 Static Multicast Forwarding Figure 93 Static Multicast Forwarding to A Single Port Figure 94 Static Multicast Forwarding to Multiple Ports 11.2 Configuring Static Multicast Forwarding Use this screen to configure rules to forward specific multicast frames, such as streaming or control frames, to specific port(s).
  • Page 125 Chapter 11 Static Multicast Forwarding Figure 95 Advanced Application > Static Multicast Forwarding The following table describes the labels in this screen. Table 55 Advanced Application > Static Multicast Forwarding LABEL DESCRIPTION Active Select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by clearing this check box.
  • Page 126 Chapter 11 Static Multicast Forwarding Table 55 Advanced Application > Static Multicast Forwarding (continued) LABEL DESCRIPTION Delete Click Delete to remove the selected entry from the summary table. Cancel Click Cancel to clear the check boxes. XGS1930 Series User’s Guide...
  • Page 127: Filtering

    Chapter 12 Filtering H A P T E R Filtering 12.1 Filtering Overview This chapter discusses MAC address port filtering. Filtering means sifting traffic going through the Switch based on the source and/or destination MAC addresses and VLAN group (ID). 12.1.1 What You Can Do Use the Filtering screen (Section 12.2 on page...
  • Page 128 Chapter 12 Filtering The following table describes the related labels in this screen. Table 56 Advanced Application > Filtering LABEL DESCRIPTION Active Make sure to select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by deselecting this check box. Name Type a descriptive name (up to 32 printable ASCII characters) for this rule.
  • Page 129: Spanning Tree Protocol

    Chapter 13 Spanning Tree Protocol H A P T E R Spanning Tree Protocol 13.1 Spanning Tree Protocol Overview The Switch supports Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP) and Multiple Spanning Tree Protocol (MSTP) as defined in the following standards. •...
  • Page 130: Stp Terminology

    Chapter 13 Spanning Tree Protocol learned addresses from the filtering database. In RSTP, the port states are Discarding, Learning, and Forwarding. Note: In this user’s guide, “STP” refers to both STP and RSTP. STP Terminology The root bridge is the base of the spanning tree. Path cost is the cost of transmitting a frame onto a LAN through that port.
  • Page 131: Spanning Tree Protocol Status Screen

    Chapter 13 Spanning Tree Protocol STP Port States STP assigns five port states to eliminate packet looping. A bridge port is not allowed to go directly from blocking state to forwarding state so as to eliminate transient loops. Table 58 STP Port States PORT STATE DESCRIPTION Disabled...
  • Page 132: Spanning Tree Configuration

    This screen differs depending on which STP mode (RSTP or MSTP) you configure on the Switch. This screen is described in detail in the section that follows the configuration section for each STP mode. Click Configuration to activate one of the STP standards on the Switch. 13.3 Spanning Tree Configuration Use the Spanning Tree Configuration screen to activate one of the STP modes on the Switch.
  • Page 133 Chapter 13 Spanning Tree Protocol Figure 99 Advanced Application > Spanning Tree Protocol > RSTP The following table describes the labels in this screen. Table 60 Advanced Application > Spanning Tree Protocol > RSTP LABEL DESCRIPTION Status Click Status to display the RSTP Status screen (see Figure 100 on page 135).
  • Page 134: Rapid Spanning Tree Protocol Status

    Chapter 13 Spanning Tree Protocol Table 60 Advanced Application > Spanning Tree Protocol > RSTP (continued) LABEL DESCRIPTION Max Age This is the maximum time (in seconds) the Switch can wait without receiving a BPDU before attempting to reconfigure. All Switch ports (except for designated ports) should receive BPDUs at regular intervals.
  • Page 135 Figure 100 Advanced Application > Spanning Tree Protocol > Status: RSTP The following table describes the labels in this screen. Table 61 Advanced Application > Spanning Tree Protocol > Status: RSTP LABEL DESCRIPTION Configuration Click Configuration to specify which STP mode you want to activate. Click RSTP to edit RSTP settings on the Switch.
  • Page 136: Configure Multiple Spanning Tree Protocol

    Chapter 13 Spanning Tree Protocol Table 61 Advanced Application > Spanning Tree Protocol > Status: RSTP (continued) LABEL DESCRIPTION Port Role This field displays the role of the port in STP. • Root - A forwarding port on a non-root bridge, which has the lowest path cost and is the best port from the non-root bridge to the root bridge.
  • Page 137 Chapter 13 Spanning Tree Protocol Figure 101 Advanced Application > Spanning Tree Protocol > MSTP XGS1930 Series User’s Guide...
  • Page 138 The following table describes the labels in this screen. Table 62 Advanced Application > Spanning Tree Protocol > MSTP LABEL DESCRIPTION Status Click Status to display the MSTP Status screen (see Figure 103 on page 141). Port Click Port to display the MSTP Port screen (see Figure 102 on page 140).
  • Page 139: Multiple Spanning Tree Protocol Port Configuration

    Chapter 13 Spanning Tree Protocol Table 62 Advanced Application > Spanning Tree Protocol > MSTP (continued) LABEL DESCRIPTION Settings in this row apply to all ports. Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
  • Page 140 Figure 102 Advanced Application > Spanning Tree Protocol > MSTP > Port The following table describes the labels in this screen. Table 63 Advanced Application > Spanning Tree Protocol > MSTP > Port LABEL DESCRIPTION MSTP Click MSTP to edit MSTP settings on the Switch. Port This field displays the port number.
  • Page 141: Multiple Spanning Tree Protocol Status

    Chapter 13 Spanning Tree Protocol 13.7 Multiple Spanning Tree Protocol Status Click Advanced Application > Spanning Tree Protocol in the navigation panel to display the status screen as shown next. See Multiple STP on page 131 for more information on MSTP. Note: This screen is only available after you activate MSTP on the Switch.
  • Page 142 Chapter 13 Spanning Tree Protocol Table 64 Advanced Application > Spanning Tree Protocol > Status: MSTP (continued) LABEL DESCRIPTION Forwarding Delay This is the time (in seconds) the root switch will wait before changing states (that is, listening to (second) learning to forwarding).
  • Page 143: Technical Reference

    Chapter 13 Spanning Tree Protocol Table 64 Advanced Application > Spanning Tree Protocol > Status: MSTP (continued) LABEL DESCRIPTION Designated Bridge This field displays the identifier of the designated bridge to which this port belongs when the port is a designated port. Otherwise, it displays the identifier of the designated bridge for the LAN segment to which this port is connected.
  • Page 144: Mst Region

    Chapter 13 Spanning Tree Protocol Figure 105 MSTP Network Example 13.8.2 MST Region An MST region is a logical grouping of multiple network devices that appears as a single device to the rest of the network. Each MSTP-enabled device can only belong to one MST region. When BPDUs enter an MST region, external path cost (of paths outside this region) is increased by one.
  • Page 145: Common And Internal Spanning Tree (Cist)

    Chapter 13 Spanning Tree Protocol 13.8.4 Common and Internal Spanning Tree (CIST) A CIST represents the connectivity of the entire network and it is equivalent to a spanning tree in an STP/ RSTP. The CIST is the default MST instance (MSTID 0). Any VLANs that are not members of an MST instance are members of the CIST.
  • Page 146: Bandwidth Control

    Chapter 14 Bandwidth Control H A P T E R Bandwidth Control 14.1 Bandwidth Control Overview This chapter shows you how you can cap the maximum bandwidth using the Bandwidth Control screen. Bandwidth control means defining a maximum allowable bandwidth for incoming and/or out-going traffic flows on a port.
  • Page 147 Chapter 14 Bandwidth Control Figure 108 Advanced Application > Bandwidth Control The following table describes the related labels in this screen. Table 65 Advanced Application > Bandwidth Control LABEL DESCRIPTION Active Select this check box to enable bandwidth control on the Switch. Port This field displays the port number.
  • Page 148: Broadcast Storm Control

    Chapter 15 Broadcast Storm Control H A P T E R Broadcast Storm Control 15.1 Broadcast Storm Control Overview This chapter introduces and shows you how to configure the broadcast storm control feature. Broadcast storm control limits the number of broadcast, multicast and destination lookup failure (DLF) packets the Switch receives per second on the ports.
  • Page 149 Chapter 15 Broadcast Storm Control Figure 109 Advanced Application > Broadcast Storm Control The following table describes the labels in this screen. Table 66 Advanced Application > Broadcast Storm Control LABEL DESCRIPTION Active Select this check box to enable traffic storm control on the Switch. Clear this check box to disable this feature.
  • Page 150: Mirroring

    Chapter 16 Mirroring H A P T E R Mirroring 16.1 Mirroring Overview This chapter discusses port mirroring setup screens. Port mirroring allows you to copy a traffic flow to a monitor port (the port you copy the traffic to) in order that you can examine the traffic from the monitor port without interference.
  • Page 151 Chapter 16 Mirroring Figure 110 Advanced Application > Mirroring The following table describes the labels in this screen. Table 67 Advanced Application > Mirroring LABEL DESCRIPTION Active Select this check box to activate port mirroring on the Switch. Clear this check box to disable the feature.
  • Page 152: Link Aggregation

    Chapter 17 Link Aggregation H A P T E R Link Aggregation 17.1 Link Aggregation Overview This chapter shows you how to logically aggregate physical links to form one logical, higher-bandwidth link. Link aggregation (trunking) is the grouping of physical ports into one logical higher-capacity link. You may want to trunk ports if for example, it is cheaper to use multiple lower-speed links than to under-utilize a high-speed, but more costly, single-port link.
  • Page 153: Link Aggregation Status

    Chapter 17 Link Aggregation operational port fails, then one of the “standby” ports become operational without user intervention. Please note that: • You must connect all ports point-to-point to the same Ethernet switch and configure the ports for LACP trunking. •...
  • Page 154 Chapter 17 Link Aggregation Figure 111 Advanced Application > Link Aggregation The following table describes the labels in this screen. Table 70 Advanced Application > Link Aggregation LABEL DESCRIPTION Group ID This field displays the group ID to identify a trunk group, that is, one logical link containing multiple ports.
  • Page 155: Link Aggregation Setting

    Chapter 17 Link Aggregation Table 70 Advanced Application > Link Aggregation LABEL DESCRIPTION Criteria This shows the outgoing traffic distribution algorithm used in this trunk group. Packets from the same source and/or to the same destination are sent over the same link within the trunk. src-mac means the Switch distributes traffic based on the packet’s source MAC address.
  • Page 156 Chapter 17 Link Aggregation Figure 112 Advanced Application > Link Aggregation > Link Aggregation Setting The following table describes the labels in this screen. Table 71 Advanced Application > Link Aggregation > Link Aggregation Setting LABEL DESCRIPTION Link This is the only screen you need to configure to enable static link aggregation. Aggregation Setting Group ID...
  • Page 157: Link Aggregation Control Protocol

    Chapter 17 Link Aggregation Table 71 Advanced Application > Link Aggregation > Link Aggregation Setting (continued) LABEL DESCRIPTION Criteria Select the outgoing traffic distribution type. Packets from the same source and/or to the same destination are sent over the same link within the trunk. By default, the Switch uses the src-dst-mac distribution type.
  • Page 158 Chapter 17 Link Aggregation Figure 113 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP XGS1930 Series User’s Guide...
  • Page 159: Technical Reference

    Chapter 17 Link Aggregation The following table describes the labels in this screen. Table 72 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP LABEL DESCRIPTION Link Note: Do not configure this screen unless you want to enable dynamic link Aggregation aggregation.
  • Page 160 Chapter 17 Link Aggregation Figure 114 Trunking Example - Physical Connections Configure static trunking - Click Advanced Application > Link Aggregation > Link Aggregation Setting. In this screen activate trunk group T1, select the traffic distribution algorithm used by this group and select the ports that should belong to this group as shown in the figure below.
  • Page 161: Port Authentication

    Chapter 18 Port Authentication H A P T E R Port Authentication 18.1 Port Authentication Overview This chapter describes the IEEE 802.1x and MAC authentication methods. Port authentication is a way to validate access to ports on the Switch to clients based on an external server (authentication server).
  • Page 162: Mac Authentication

    Chapter 18 Port Authentication Figure 116 IEEE 802.1x Authentication Process 18.1.3 MAC Authentication MAC authentication works in a very similar way to IEEE 802.1x authentication. The main difference is that the Switch does not prompt the client for login credentials. The login credentials are based on the source MAC address of the client connecting to a port on the Switch along with a password configured specifically for MAC authentication on the Switch.
  • Page 163: Port Authentication Configuration

    Chapter 18 Port Authentication 18.2 Port Authentication Configuration To enable port authentication, first activate the port authentication method(s) (both on the Switch and the port(s)), then configure the RADIUS server settings in the AAA > RADIUS Server Setup screen. Click Advanced Application > Port Authentication in the navigation panel to display the screen as shown.
  • Page 164: Guest Vlan

    Chapter 18 Port Authentication The following table describes the labels in this screen. Table 73 Advanced Application > Port Authentication > 802.1x LABEL DESCRIPTION Active Select this check box to permit 802.1x authentication on the Switch. Note: You must first enable 802.1x authentication on the Switch before configuring it on each port.
  • Page 165 Chapter 18 Port Authentication Figure 120 Guest VLAN Example Use this screen to enable and assign a guest VLAN to a port. In the Port Authentication > 802.1x screen click Guest Vlan to display the configuration screen as shown. Figure 121 Advanced Application > Port Authentication > 802.1x > Guest VLAN The following table describes the labels in this screen.
  • Page 166: Activate Mac Authentication

    Chapter 18 Port Authentication Table 74 Advanced Application > Port Authentication > 802.1x > Guest VLAN (continued) LABEL DESCRIPTION Active Select this checkbox to enable the guest VLAN feature on this port. Clients that fail authentication are placed in the guest VLAN and can receive limited services. Guest Vlan A guest VLAN is a pre-configured VLAN on the Switch that allows non-authenticated users to access limited network resources through the Switch.
  • Page 167 Chapter 18 Port Authentication Figure 122 Advanced Application > Port Authentication > MAC Authentication The following table describes the labels in this screen. Table 75 Advanced Application > Port Authentication > MAC Authentication LABEL DESCRIPTION Active Select this check box to permit MAC authentication on the Switch. Note: You must first enable MAC authentication on the Switch before configuring it on each port.
  • Page 168 Table 75 Advanced Application > Port Authentication > MAC Authentication (continued) LABEL DESCRIPTION Timeout Specify the amount of time before the Switch allows a client MAC address that fails authentication to try and authenticate again. Maximum time is 3000 seconds. When a client fails MAC authentication, its MAC address is learned by the MAC address table with a status of denied.
  • Page 169: Port Security

    Chapter 19 Port Security H A P T E R Port Security 19.1 Port Security Overview This chapter shows you how to set up port security. Port security allows only packets with dynamically learned MAC addresses and/or configured static MAC addresses to pass through a port on the Switch. The Switch can learn up to 16K MAC addresses in total with no limit on individual ports other than the sum cannot exceed 16K.
  • Page 170 Chapter 19 Port Security Figure 123 Advanced Application > Port Security The following table describes the labels in this screen. Table 76 Advanced Application > Port Security LABEL DESCRIPTION Port Security Active Select this option to enable port security on the Switch. Port This field displays the port number.
  • Page 171 Chapter 19 Port Security Table 76 Advanced Application > Port Security (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 172: Time Range

    H A P T E R Time Range 20.1 Time Range Overview You can set up one-time and recurring schedules for time-oriented features, such as PoE and classifier. The UAG supports one-time and recurring schedules. One-time schedules are effective only once, while recurring schedules usually repeat.
  • Page 173 Chapter 20 Time Range The following table describes the labels in this screen. Table 77 Advanced Application > Time Range LABEL DESCRIPTION Name Enter a descriptive name for this rule for identifying purposes. Type Select Absolute to create a one-time schedule. One-time schedules begin on a specific start date and time and end on a specific stop date and time.
  • Page 174: Classifier

    Chapter 21 Classifier H A P T E R Classifier 21.1 Classifier Overview This chapter introduces and shows you how to configure the packet classifier on the Switch. It also discusses Quality of Service (QoS) and classifier concepts as employed by the Switch. 21.1.1 What You Can Do •...
  • Page 175: Classifier Status

    Chapter 21 Classifier 21.2 Classifier Status Use this screen to view the classifiers configured on the Switch and how many times the traffic matches the rules. Click Advanced Application > Classifier in the navigation panel to display the configuration screen as shown.
  • Page 176 Figure 126 Advanced Application > Classifier > Classifier Configuration The following table describes the labels in this screen. Table 79 Advanced Application > Classifier > Classifier Configuration LABEL DESCRIPTION Active Select this option to enable this rule. Name Enter a descriptive name for this rule for identifying purposes. Weight Enter a number between 0 and 65535 to specify the rule’s weight.
  • Page 177 Chapter 21 Classifier Table 79 Advanced Application > Classifier > Classifier Configuration (continued) LABEL DESCRIPTION Select this option to have the Switch create a log message when the rule is applied and record the number of matched packets in a particular time interval. Note: Make sure you also enable logging in the Classifier Global Setting screen.
  • Page 178 Chapter 21 Classifier Table 79 Advanced Application > Classifier > Classifier Configuration (continued) LABEL DESCRIPTION DSCP Select Any to classify traffic from any DSCP or select the second option and specify a DSCP (DiffServ Code Point) number between 0 and 63 in the field provided. IPv4/IPv6 Preceden Select Any to classify traffic from any precedence or select the second option and specify an IP...
  • Page 179: Viewing And Editing Classifier Configuration Summary

    Chapter 21 Classifier 21.3.1 Viewing and Editing Classifier Configuration Summary To view a summary of the classifier configuration, scroll down to the summary table at the bottom of the Classifier screen. To change the settings of a rule, click a number in the Index field. Note: When two rules conflict with each other, a higher layer rule has priority over lower layer rule.
  • Page 180: Classifier Global Setting Configuration

    In the Internet Protocol there is a field, called “Protocol”, to identify the next level protocol. The following table shows some common protocol types and the corresponding protocol number. Refer to http:// www.iana.org/assignments/protocol-numbers for a complete list. Table 82 Common IP Protocol Types and Protocol Numbers PROTOCOL TYPE PROTOCOL NUMBER ICMP...
  • Page 181: Classifier Example

    Chapter 21 Classifier The following table describes the labels in this screen. Table 84 Advanced Application > Classifier > Classifier Configuration > Classifier Global Setting LABEL DESCRIPTION Match Select manual to have classifier rules applied according to the weight of each rule you configured in Order Advanced Application >...
  • Page 182 Chapter 21 Classifier Figure 129 Classifier: Example XGS1930 Series User’s Guide...
  • Page 183: Policy Rule

    Chapter 22 Policy Rule H A P T E R Policy Rule 22.1 Policy Rules Overview This chapter shows you how to configure policy rules. A classifier distinguishes traffic into flows based on the configured criteria (refer to Chapter 21 on page for more information).
  • Page 184 Chapter 22 Policy Rule Figure 130 Advanced Application > Policy Rule The following table describes the labels in this screen. Table 85 Advanced Application > Policy Rule LABEL DESCRIPTION Active Select this option to enable the policy. Name Enter a descriptive name for identification purposes. Classifier(s) This field displays the active classifier(s) you configure in the Classifier screen.
  • Page 185 Chapter 22 Policy Rule Table 85 Advanced Application > Policy Rule (continued) LABEL DESCRIPTION Action Specify the action(s) the Switch takes on the associated classified traffic flow. Note: You can specify only one action (pair) in a policy rule. To have the Switch take multiple actions on the same traffic flow, you need to define multiple classifiers with the same criteria and apply different policy rules.
  • Page 186: Policy Example

    Chapter 22 Policy Rule 22.3 Policy Example The figure below shows an example Policy screen where you configure a policy to limit bandwidth on a traffic flow classified using the Example classifier (refer to Section 21.5 on page 181). Figure 131 Policy Example XGS1930 Series User’s Guide...
  • Page 187: Queuing Method

    Chapter 23 Queuing Method H A P T E R Queuing Method 23.1 Queuing Method Overview This chapter introduces the queuing methods supported. Queuing is used to help solve performance degradation when there is network congestion. Use the Queuing Method screen to configure queuing algorithms for outgoing traffic. See also Priority Queue Assignment in Switch Setup and 802.1p Priority in Port Setup for related information.
  • Page 188: Configuring Queuing

    Chapter 23 Queuing Method amount of bandwidth, and then moves to the end of the list; and so on, depending on the number of queues being used. This works in a looping fashion until a queue is empty. Weighted Round Robin Scheduling (WRR) uses the same algorithm as round robin scheduling, but services queues based on their priority and queue weight (the number you configure in the queue Weight field) rather than a fixed amount of bandwidth.
  • Page 189 Chapter 23 Queuing Method The following table describes the labels in this screen. Table 86 Advanced Application > Queuing Method LABEL DESCRIPTION Port This label shows the port you are configuring. * means all ports. Settings in this row apply to all ports. Use this row only if you want to make some settings the same for all ports.
  • Page 190: Multicast

    Chapter 24 Multicast H A P T E R Multicast 24.1 Multicast Overview This chapter shows you how to configure various multicast features. Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender to 1 recipient) or Broadcast (1 sender to everybody on the network).
  • Page 191: Multicast Setup

    picks out the group registration information, and configures multicasting accordingly. IGMP snooping allows the Switch to learn multicast groups without you having to manually configure them. The Switch forwards multicast traffic destined for multicast groups (that it has learned from IGMP snooping or that you have manually configured) to ports that are members of that group.
  • Page 192: Igmp Snooping

    Chapter 24 Multicast The following table describes the labels in this screen. Table 88 Advanced Application > Multicast > IPv4 Multicast LABEL DESCRIPTION Index This is the index number of the entry. This field displays the multicast VLAN ID. Port This field displays the port number that belongs to the multicast group.
  • Page 193 Chapter 24 Multicast Table 89 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping (continued) (continued) LABEL DESCRIPTION Querier Select this option to allow the Switch to send IGMP General Query messages to the VLANs with the multicast hosts attached. Host Timeout Specify the time (from 1 to 16 711 450) in seconds that elapses before the Switch removes an IGMP group membership entry if it does not receive report messages from the port.
  • Page 194: Igmp Snooping Vlan

    Chapter 24 Multicast Table 89 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping (continued) (continued) LABEL DESCRIPTION Max Group Num. Enter the number of multicast groups this port is allowed to join. Once a port is registered in the specified number of multicast groups, any new IGMP join report frame(s) is dropped on this port.
  • Page 195 Chapter 24 Multicast Figure 136 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping > IGMP Snooping VLAN The following table describes the labels in this screen. Table 90 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping > IGMP Snooping VLAN LABEL DESCRIPTION Mode...
  • Page 196: Igmp Filtering Profile

    Chapter 24 Multicast Table 90 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping > IGMP Snooping VLAN (continued) LABEL DESCRIPTION Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries. Delete Check the entry(ies) that you want to remove, then click the Delete button.
  • Page 197 Chapter 24 Multicast Table 91 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping > IGMP Filtering Profile (continued) LABEL DESCRIPTION Click this to create a new entry. This saves your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 198: Aaa

    Chapter 25 AAA H A P T E R 25.1 AAA Overview This chapter describes how to configure authentication, authorization and accounting settings on the Switch. Authentication is the process of determining who a user is and validating access to the Switch. The Switch can authenticate users who try to log in based on user accounts configured on the Switch itself.
  • Page 199: What You Need To Know

    Chapter 25 AAA 25.1.2 What You Need to Know Authentication is the process of determining who a user is and validating access to the Switch. The Switch can authenticate users who try to log in based on user accounts configured on the Switch itself. The Switch can also use an external authentication server to authenticate a large number of users.
  • Page 200: Radius Server Setup

    Chapter 25 AAA Figure 139 Advanced Application > AAA 25.3 RADIUS Server Setup Use this screen to configure your RADIUS server settings. See RADIUS on page 199 for more information on RADIUS servers and Section 25.5.2 on page 205 for RADIUS attributes utilized by the authentication features on the Switch.
  • Page 201: Aaa Setup

    The following table describes the labels in this screen. Table 93 Advanced Application > AAA > RADIUS Server Setup LABEL DESCRIPTION Authentication Use this section to configure your RADIUS authentication settings. Server Mode This field is only valid if you configure multiple RADIUS servers. Select index-priority and the Switch tries to authenticate with the first configured RADIUS server, if the RADIUS server does not respond then the Switch tries to authenticate with the second RADIUS server.
  • Page 202 Chapter 25 AAA Figure 141 Advanced Application > AAA > AAA Setup The following table describes the labels in this screen. Table 94 Advanced Application > AAA > AAA Setup LABEL DESCRIPTION Authentication Use this section to specify the methods used to authenticate users accessing the Switch. Login These fields specify which database the Switch should use (first, second and third) to authenticate administrator accounts (users for Switch management).
  • Page 203: Technical Reference

    Chapter 25 AAA Table 94 Advanced Application > AAA > AAA Setup (continued) LABEL DESCRIPTION Method Select whether you want to use RADIUS for authorization of specific types of events. RADIUS is the only method for IEEE 802.1x authorization. Accounting Use this section to configure accounting settings on the Switch.
  • Page 204: Tunnel Protocol Attribute

    Chapter 25 AAA • Assign account privilege levels (See the CLI Reference Guide for more information on account privilege levels) for the authenticated user. The VSAs are composed of the following: • Vendor-ID: An identification number assigned to the company by the IANA (Internet Assigned Numbers Authority).
  • Page 205: Supported Radius Attributes

    values you need to configure. Note that the bolded values in the table are fixed values as defined in RFC 3580. Table 96 Supported Tunnel Protocol Attribute FUNCTION ATTRIBUTE VLAN Assignment Tunnel-Type = VLAN(13) Tunnel-Medium-Type = 802(6) Tunnel-Private-Group-ID = VLAN ID Note: You must also create a VLAN with the specified VID on the Switch.
  • Page 206 Chapter 25 AAA - This value is set to Ethernet(15) on the Switch. Calling-Station-Id Frame-MTU EAP-Message State Message-Authenticator XGS1930 Series User’s Guide...
  • Page 207: Loop Guard

    H A P T E R Loop Guard 26.1 Loop Guard Overview This chapter shows you how to configure the Switch to guard against loops on the edge of your network. Loop guard allows you to configure the Switch to shut down a port if it detects that packets sent out on that port loop back to the Switch.
  • Page 208 Chapter 26 Loop Guard The following figure shows port N on switch A connected to switch B. Switch B is in loop state. When broadcast or multicast packets leave port N and reach switch B, they are sent back to port N on A as they are rebroadcast from B.
  • Page 209: Loop Guard Setup

    Chapter 26 Loop Guard 26.2 Loop Guard Setup Click Advanced Application > Loop Guard in the navigation panel to display the screen as shown. Note: The loop guard feature can not be enabled on the ports that have Spanning Tree Protocol (RSTP or MSTP) enabled.
  • Page 210 Chapter 26 Loop Guard Table 97 Advanced Application > Loop Guard (continued) LABEL DESCRIPTION Active Select this check box to enable the loop guard feature on this port. The Switch sends probe packets from this port to check if the switch it is connected to is in loop state. If the switch that this port is connected is in loop state the Switch will shut down this port.
  • Page 211: Layer 2 Protocol Tunneling

    Chapter 27 Layer 2 Protocol Tunneling H A P T E R Layer 2 Protocol Tunneling 27.1 Layer 2 Protocol Tunneling Overview This chapter shows you how to configure layer 2 protocol tunneling on the Switch. 27.1.1 What You Can Do Use the Layer 2 Protocol Tunnel screen (Section 27.2 on page 212) to enable layer 2 protocol tunneling...
  • Page 212: Configuring Layer 2 Protocol Tunneling

    Chapter 27 Layer 2 Protocol Tunneling In the following example, if you enable L2PT for STP, you can have switches A, B, C and D in the same spanning tree, even though switch A is not directly connected to switches B, C and D. Topology change information can be propagated throughout the service provider’s network.
  • Page 213 Chapter 27 Layer 2 Protocol Tunneling Figure 149 Advanced Application > Layer 2 Protocol Tunneling The following table describes the labels in this screen. Table 98 Advanced Application > Layer 2 Protocol Tunneling LABEL DESCRIPTION Active Select this to enable layer 2 protocol tunneling on the Switch. Destination Specify a MAC address with which the Switch uses to encapsulate the layer 2 protocol packets MAC Address...
  • Page 214 Chapter 27 Layer 2 Protocol Tunneling Table 98 Advanced Application > Layer 2 Protocol Tunneling (continued) LABEL DESCRIPTION Select this option to have the Switch tunnel VTP (VLAN Trunking Protocol) packets so that all customer switches can use consistent VLAN configuration through the service provider’s network.
  • Page 215: Pppoe

    Chapter 28 PPPoE H A P T E R PPPoE 28.1 PPPoE Intermediate Agent Overview This chapter describes how the Switch gives a PPPoE termination server additional information that the server can use to identify and authenticate a PPPoE client. A PPPoE Intermediate Agent (PPPoE IA) is deployed between a PPPoE server and PPPoE clients.
  • Page 216 The Tag_Type is 0x0105 for vendor-specific tags, as defined in RFC 2516. The Tag_Len indicates the length of Value, i1 and i2. The Value is the 32-bit number 0x00000DE9, which stands for the “ADSL Forum” IANA entry. i1 and i2 are PPPoE intermediate agent sub-options, which contain additional information about the PPPoE client.
  • Page 217: Pppoe Screen

    Chapter 28 PPPoE Working Text (WT)-101. The default access node identifier is the host name of the PPPoE intermediate agent and the eth indicates “Ethernet”. Table 103 PPPoE IA Circuit ID Sub-option Format: Defined in WT-101 SubOpt Length Value 0x01 Access Space Space...
  • Page 218: Pppoe Intermediate Agent

    Chapter 28 PPPoE 28.3 PPPoE Intermediate Agent Use this screen to configure the Switch to give a PPPoE termination server additional subscriber information that the server can use to identify and authenticate a PPPoE client. Click Advanced Application > PPPoE > Intermediate Agent in the navigation panel to display the screen as shown.
  • Page 219: Pppoe Ia Per-Port

    Chapter 28 PPPoE Table 104 Advanced Application > PPPoE > Intermediate Agent (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 220: Pppoe Ia Per-Port Per-Vlan

    Chapter 28 PPPoE Table 105 Advanced Application > PPPoE > Intermediate Agent > Port (continued) LABEL DESCRIPTION Server Trusted Select whether this port is a trusted port (Trusted) or an untrusted port (Untrusted). State Trusted ports are uplink ports connected to PPPoE servers. If a PADO (PPPoE Active Discovery Offer), PADS (PPPoE Active Discovery Session-confirmation), or PADT (PPPoE Active Discovery Terminate) packet is sent from a PPPoE server and received on a trusted port, the Switch forwards it to all other ports.
  • Page 221: Pppoe Ia For Vlan

    The following table describes the labels in this screen. Table 106 Advanced Application > PPPoE > Intermediate Agent > Port > VLAN LABEL DESCRIPTION Show Port Enter a port number to show the PPPoE Intermediate Agent settings for the specified VLAN(s) on the port.
  • Page 222 Chapter 28 PPPoE The following table describes the labels in this screen. Table 107 Advanced Application > PPPoE > Intermediate Agent > VLAN LABEL DESCRIPTION Show VLAN Use this section to specify the VLANs you want to configure in the section below. Start VID Enter the lowest VLAN ID you want to configure in the section below.
  • Page 223: Error Disable

    Chapter 29 Error Disable H A P T E R Error Disable 29.1 Error Disable Overview This chapter shows you how to configure the rate limit for control packets on a port, and set the Switch to take an action (such as to shut down a port or stop sending packets) on a port when the Switch detects a pre-configured error.
  • Page 224: Error Disable Screen

    Chapter 29 Error Disable 29.2 Error Disable Screen Use this screen to go to the screens where you can configure error disable related settings. Click Advanced Application > Errdisable in the navigation panel to open the following screen. Figure 155 Advanced Application >...
  • Page 225 Figure 156 Advanced Application > Errdisable > Errdisable Status The following table describes the labels in this screen. Table 109 Advanced Application > Errdisable > Errdisable Status LABEL DESCRIPTION Inactive-reason mode reset Port List Enter the number of the port(s) (separated by a comma) on which you want to reset inactive- reason status.
  • Page 226: Cpu Protection Configuration

    Chapter 29 Error Disable Table 109 Advanced Application > Errdisable > Errdisable Status (continued) LABEL DESCRIPTION Rate This field displays how many control packets this port can receive or transmit per second. It can be adjusted in CPU Protection. 0 means no rate limit. Status This field displays the errdisable status •...
  • Page 227: Error-Disable Detect Configuration

    Chapter 29 Error Disable The following table describes the labels in this screen. Table 110 Advanced Application > Errdisable > CPU protection LABEL DESCRIPTION Reason Select the type of control packet you want to configure here. Port This field displays the port number. * means all ports. Use this row to make the setting the same for all ports.
  • Page 228: Error-Disable Recovery Configuration

    Chapter 29 Error Disable Table 111 Advanced Application > Errdisable > Errdisable Detect (continued) LABEL DESCRIPTION Mode Select the action that the Switch takes when the number of control packets exceed the rate limit on a port, set in the Advanced Application > Errdisable > CPU protection screen. •...
  • Page 229 Chapter 29 Error Disable Table 112 Advanced Application > Errdisable > Errdisable Recovery (continued) LABEL DESCRIPTION Interval Enter the number of seconds (from 30 to 2592000) for the time interval. Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 230: Green Ethernet

    Chapter 30 Green Ethernet H A P T E R Green Ethernet This chapter shows you how to configure the Switch to reduce the power consumed by switch ports. 30.1 Green Ethernet Overview Green Ethernet reduces switch port power consumption in the following ways. IEEE 802.3az Energy Efficient Ethernet (EEE) If EEE is enabled, both sides of a link support EEE and there is no traffic, the port enters Low Power Idle (LPI) mode.
  • Page 231 Chapter 30 Green Ethernet Figure 160 Advanced Application > Green Ethernet The following table describes the labels in this screen. Table 113 Advanced Application > Green Ethernet LABEL DESCRIPTION Select this to activate Energy Efficient Ethernet globally. Auto Power Select this to activate Auto Power Down globally. Down Short Reach Select this to activate Short Reach globally.
  • Page 232: Link Layer Discovery Protocol (Lldp)

    Chapter 31 Link Layer Discovery Protocol (LLDP) H A P T E R Link Layer Discovery Protocol (LLDP) 31.1 LLDP Overview The LLDP (Link Layer Discovery Protocol) is a layer 2 protocol. It allows a network device to advertise its identity and capabilities on the local network.
  • Page 233: Lldp-Med Overview

    Chapter 31 Link Layer Discovery Protocol (LLDP) The next figure demonstrates that the network devices Switches and Routers (S and R) transmit and receive device information via LLDPDU and the network manager can query the information using Simple Network Management Protocol (SNMP). Figure 161 LLDP Overview 31.2 LLDP-MED Overview LLDP-MED (Link Layer Discovery Protocol for Media Endpoint Devices) is an extension to the standard...
  • Page 234: Lldp Screens

    Chapter 31 Link Layer Discovery Protocol (LLDP) Figure 162 LLDP-MED Overview 31.3 LLDP Screens Click Advanced Application > LLDP in the navigation panel to display the screen as shown next. Figure 163 Advanced Application > LLDP The following table describes the labels in this screen. Table 114 Advanced Application >...
  • Page 235: Lldp Local Status

    Chapter 31 Link Layer Discovery Protocol (LLDP) Table 114 Advanced Application > LLDP (continued) LABEL DESCRIPTION LLDP-MED Click here to show a screen to configure LLDP-MED (Link Layer Discovery Protocol for Media Network Policy Endpoint Devices) network policy parameters. LLDP-MED Click here to show a screen to configure LLDP-MED (Link Layer Discovery Protocol for Media Location Endpoint Devices) location parameters.
  • Page 236: Lldp Local Port Status Detail

    Chapter 31 Link Layer Discovery Protocol (LLDP) The following table describes the labels in this screen. Table 115 Advanced Application > LLDP > LLDP Local Status LABEL DESCRIPTION Basic TLV Chassis ID TLV This displays the chassis ID of the local Switch, that is the Switch you’re configuring. The chassis ID is identified by the chassis ID subtype.
  • Page 237 Chapter 31 Link Layer Discovery Protocol (LLDP) Figure 165 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail (Basic TLV) Figure 166 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail (MED TLV) XGS1930 Series User’s Guide...
  • Page 238 Chapter 31 Link Layer Discovery Protocol (LLDP) The following table describes the labels in this screen. Table 116 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail LABEL DESCRIPTION Basic TLV These are the Basic TLV flags Port ID TLV The port ID TLV identifies the specific port that transmitted the LLDP frame.
  • Page 239: Lldp Remote Status

    Chapter 31 Link Layer Discovery Protocol (LLDP) Table 116 Advanced Application > LLDP > LLDP Local Status > LLDP Local Port Status Detail LABEL DESCRIPTION Network Policy This displays a network policy for the specified application. • Voice • Voice-Signaling •...
  • Page 240: Lldp Remote Port Status Detail

    Chapter 31 Link Layer Discovery Protocol (LLDP) 31.5.1 LLDP Remote Port Status Detail This screen displays detailed LLDP status of the remote device conencted to the Switch. Click Advanced Application > LLDP > LLDP Remote Status (Click Here) and then click an index number, for example 1, in the Index column in the LLDP Remote Status screen to display the screen as shown next.
  • Page 241 Chapter 31 Link Layer Discovery Protocol (LLDP) Table 118 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (Basic TLV) LABEL DESCRIPTION Time To Live TLV This displays the time-to-live (TTL) multiplier of LLDP frames. The device information on the neighboring devices ages out and is discarded when its corresponding TTL expires.
  • Page 242 Chapter 31 Link Layer Discovery Protocol (LLDP) Figure 169 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail> (Dot 1 and Dot3 TLV) The following table describes the labels in the Dot1 and Dot3 parts of the screen. Table 119 Advanced Application >...
  • Page 243 Chapter 31 Link Layer Discovery Protocol (LLDP) Table 119 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (Dot1 and Dot3 TLV) LABEL DESCRIPTION Vlan Name TLV This shows the VLAN ID and name for remote device port. •...
  • Page 244 Chapter 31 Link Layer Discovery Protocol (LLDP) Figure 170 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (MED TLV) XGS1930 Series User’s Guide...
  • Page 245 Chapter 31 Link Layer Discovery Protocol (LLDP) The following table describes the labels in the MED TLV part of the screen. Table 120 Advanced Application > LLDP > LLDP Remote Status > LLDP Remote Port Status Detail (MED TLV) LABEL DESCRIPTION MED TLV LLDP Media Endpoint Discovery (MED) is an extension of LLDP that provides additional...
  • Page 246: Lldp Configuration

    Chapter 31 Link Layer Discovery Protocol (LLDP) 31.6 LLDP Configuration Use this screen to configure global LLDP settings on the Switch. Click Advanced Application > LLDP > LLDP Configuration (Click Here) to display the screen as shown next. Figure 171 Advanced Application > LLDP > LLDP Configuration The following table describes the labels in this screen.
  • Page 247: Basic Tlv Setting

    Chapter 31 Link Layer Discovery Protocol (LLDP) Table 121 Advanced Application > LLDP > LLDP Configuration LABEL DESCRIPTION Use this row to make the setting the same for all ports. Use this row first and then make adjustments to each port if necessary. Changes in this row are copied to all the ports as soon as you make them.
  • Page 248: Org-Specific Tlv Setting

    Chapter 31 Link Layer Discovery Protocol (LLDP) The following table describes the labels in this screen. Table 122 Advanced Application > LLDP > LLDP Configuration > Basic TLV Setting LABEL DESCRIPTION Port This displays the Switch’s port number. * means all ports. Use this row to make the setting the same for all ports.
  • Page 249: Lldp-Med Configuration

    Chapter 31 Link Layer Discovery Protocol (LLDP) The following table describes the labels in this screen. Table 123 Advanced Application > LLDP > LLDP Configuration > Org-specific TLV Setting LABEL DESCRIPTION Port This displays the Switch’s port number. * means all ports. Use this row to make the setting the same for all ports.
  • Page 250: Lldp-Med Network Policy

    Chapter 31 Link Layer Discovery Protocol (LLDP) Figure 174 Advanced Application > LLDP > LLDP-MED Configuration The following table describes the labels in this screen. Table 124 Advanced Application > LLDP > LLDP-MED Configuration LABEL DESCRIPTION Port This displays the Switch’s port number. Select * to configure all ports simultaneously. Use this row to make the setting the same for all ports.
  • Page 251 Chapter 31 Link Layer Discovery Protocol (LLDP) Figure 175 Advanced Application > LLDP > LLDP-MED Network Policy The following table describes the labels in this screen. Table 125 Advanced Application > LLDP > LLDP-MED Network Policy LABEL DESCRIPTION Port Enter the port number to set up the LLDP-MED network policy. Application Type Select the type of application used in the network policy.
  • Page 252: Lldp-Med Location

    Chapter 31 Link Layer Discovery Protocol (LLDP) Table 125 Advanced Application > LLDP > LLDP-MED Network Policy LABEL DESCRIPTION Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries. Delete Check the rules that you want to remove, then click the Delete button.
  • Page 253 The following table describes the labels in this screen. Table 126 Advanced Application > LLDP > LLDP-MED Location LABEL DESCRIPTION Port Enter the port number you want to set up the location within the LLDP-MED network. Location The LLDP-MED uses geographical coordinates and Civic Address to set the location Coordinates information of the remote device.
  • Page 254 Chapter 31 Link Layer Discovery Protocol (LLDP) Table 126 Advanced Application > LLDP > LLDP-MED Location LABEL DESCRIPTION ELIN Number Enter a numerical digit string, corresponding to the ELIN identifier which is used during emergency call setup to a traditional CAMA or ISDN trunk-based PSAP. The valid length is from 10 to 25 characters.
  • Page 255: Static Route

    H A P T E R Static Route 32.1 Static Routing Overview This chapter shows you how to configure static routes. The Switch uses IP for communication with management computers, for example using HTTP, Telnet, SSH, or SNMP. Use IP static routes to have the Switch respond to remote management stations that are not reachable through the default gateway.
  • Page 256: Static Routing

    Chapter 32 Static Route 32.2 Static Routing Click IP Application > Static Routing in the navigation panel to display the screen as shown. Click the link next to IPv4 Static Route to open a screen where you can create IPv4 static routing rules. Click the link next to IPv6 Static Route to open a screen where you can create IPv6 static routing rules.
  • Page 257: Ipv6 Static Route

    Chapter 32 Static Route Table 127 IP Application > Static Routing > IPv4 Static Route (continued) LABEL DESCRIPTION Gateway IP Enter the IP address of the gateway. The gateway is an immediate neighbor of your Switch that Address will forward the packet to the destination. The gateway must be a router on the same segment as your Switch.
  • Page 258 Chapter 32 Static Route Figure 180 IP Application > Static Routing > IPv6 Static Route The following table describes the related labels you use to create a static route. Table 128 IP Application > Static Routing > IPv6 Static Route LABEL DESCRIPTION Route...
  • Page 259: Dhcp

    H A P T E R DHCP 33.1 DHCP Overview This chapter shows you how to configure the DHCP feature. DHCP (Dynamic Host Configuration Protocol RFC 2131 and RFC 2132) allows individual computers to obtain TCP/IP configuration at start-up from a server. If you configure the Switch as a DHCP relay agent, then the Switch forwards DHCP requests to DHCP server on your network.
  • Page 260: Dhcp Configuration

    Chapter 33 DHCP 33.2 DHCP Configuration Click IP Application > DHCP in the navigation panel to display the screen as shown. Click the link next to DHCPv4 to open screens where you can enable and configure DHCPv4 relay settings and create option 82 profiles.
  • Page 261: Dhcpv4 Relay

    Chapter 33 DHCP 33.4 DHCPv4 Relay Configure DHCP relay on the Switch if the DHCP clients and the DHCP server are not in the same broadcast domain. During the initial IP address leasing, the Switch helps to relay network information (such as the IP address and subnet mask) between a DHCP client and a DHCP server.
  • Page 262: Dhcpv4 Option 82 Profile

    Chapter 33 DHCP 33.4.1.2 Sub-Option Format There are two types of sub-option: “Agent Circuit ID Sub-option” and “Agent Remote ID Sub-option”. They have the following formats. Table 132 DHCP Relay Agent Circuit ID Sub-option Format SubOpt Code Length Value Slot ID, Port ID, VLAN ID, System Name or String (1 byte) (1 byte) Table 133 DHCP Relay Agent Remote ID Sub-option Format...
  • Page 263: Configuring Dhcpv4 Global Relay

    Chapter 33 DHCP The following table describes the labels in this screen. Table 134 IP Application > DHCP > DHCPv4 > Option 82 Profile LABEL DESCRIPTION Name Enter a descriptive name for the profile for identification purposes. You can use up to 32 ASCII characters.
  • Page 264: Dhcpv4 Global Relay Port Configure

    Figure 184 IP Application > DHCP > DHCPv4 > Global The following table describes the labels in this screen. Table 135 IP Application > DHCP > DHCPv4 > Global LABEL DESCRIPTION Active Select this check box to enable DHCPv4 relay. Remote DHCP Enter the IP address of a DHCPv4 server in dotted decimal notation.
  • Page 265: Global Dhcp Relay Configuration Example

    Chapter 33 DHCP The following table describes the labels in this screen. Table 136 IP Application > DHCP > DHCPv4 > Global > Port LABEL DESCRIPTION Port Enter the number of port(s) to which you want to apply the specified DHCP option 82 profile. You can enter multiple ports separated by (no space) comma (,) or hyphen (-).
  • Page 266: Configuring Dhcp Vlan Settings

    Chapter 33 DHCP Figure 186 Global DHCP Relay Network Example Configure the DHCP Relay screen as shown. Make sure you select a DHCP option 82 profile (default1 in this example) to set the Switch to send additional information (such as the VLAN ID) together with the DHCP requests to the DHCP server.
  • Page 267 Chapter 33 DHCP Figure 188 IP Application > DHCP > DHCPv4 > VLAN The following table describes the labels in this screen. Table 137 IP Application > DHCP > DHCPv4 > VLAN LABEL DESCRIPTION Enter the ID number of the VLAN to which these DHCP settings apply. Relay Use this section if you want to configure the Switch to function as a DHCP relay for this VLAN.
  • Page 268: Dhcpv4 Vlan Port Configure

    Chapter 33 DHCP Table 137 IP Application > DHCP > DHCPv4 > VLAN (continued) LABEL DESCRIPTION Select an entry’s check box to select a specific entry. Otherwise, select the check box in the table heading row to select all entries. Delete Select the configuration entries you want to remove and click Delete to remove them.
  • Page 269: Example: Dhcp Relay For Two Vlans

    Chapter 33 DHCP Table 138 IP Application > DHCP > DHCPv4 > VLAN > Port (continued) LABEL DESCRIPTION Port This field displays the port(s) to which the Switch applies the settings. Profile Name This field displays the DHCP option 82 profile that the Switch applies to the port(s) in this VLAN. Select an entry’s check box to select a specific entry.
  • Page 270: Dhcpv6 Relay

    Chapter 33 DHCP 33.5 DHCPv6 Relay A DHCPv6 relay agent is on the same network as the DHCPv6 clients and helps forward messages between the DHCPv6 server and clients. When a client cannot use its link-local address and a well- known multicast address to locate a DHCPv6 server on its network, it then needs a DHCPv6 relay agent to send a message to a DHCPv6 server that is not attached to the same network.
  • Page 271 Chapter 33 DHCP Table 139 IP Application > DHCP > DHCPv6 (continued) LABEL DESCRIPTION Clear Click Clear to reset the fields to the factory defaults. This field displays the VLAN ID number. Click the VLAN ID to change the settings. Helper Address This field displays the IPv6 address of the remote DHCPv6 server for this VLAN.
  • Page 272: Arp Setup

    Chapter 34 ARP Setup H A P T E R ARP Setup 34.1 ARP Overview Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network.
  • Page 273 Chapter 34 ARP Setup In the following example, the Switch does not have IP address and MAC address mapping information for hosts A and B in its ARP table, and host A wants to ping host B. Host A sends an ARP request to the Switch and then sends an ICMP request after getting the ARP reply from the Switch.
  • Page 274: Arp Setup

    Chapter 34 ARP Setup Therefore in the following example, the Switch can learn host A’s MAC address from the ARP request sent by host A. The Switch then forwards host B’s ICMP reply to host A right after getting host B’s MAC address and ICMP reply.
  • Page 275: Static Arp

    Chapter 34 ARP Setup Figure 194 IP Application > ARP Setup > ARP Learning The following table describes the labels in this screen. Table 140 IP Application > ARP Setup > ARP Learning LABEL DESCRIPTION Port This field displays the port number. Settings in this row apply to all ports.
  • Page 276 Figure 195 IP Application > ARP Setup > Static ARP The following table describes the related labels in this screen. Table 141 IP Application > ARP Setup > Static ARP LABEL DESCRIPTION Active Select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by clearing this check box.
  • Page 277: Maintenance

    H A P T E R Maintenance 35.1 Overview This chapter explains how to configure the screens that let you maintain the firmware and configuration files. 35.1.1 What You Can Do • Use the Maintenance screen (Section 35.2 on page 277) to erase running configuration, save a configuration file or restart the Switch.
  • Page 278: Erase Running-Configuration

    Chapter 35 Maintenance The following table describes the labels in this screen. Table 142 Management > Maintenance LABEL DESCRIPTION Current This field displays which configuration (Configuration 1 or Configuration 2) is currently operating on the Switch. Firmware Click Click Here to go to the Firmware Upgrade screen. Upgrade Restore Click Click Here to go to the Restore Configuration screen.
  • Page 279: Save Configuration

    Chapter 35 Maintenance Figure 197 Erase Running-Configuration: Confirmation In the web configurator, click the Save button in the top of the screen to make the changes take effect. If you want to access the Switch web configurator again, you may need to change the IP address of your computer to be in the same subnet as that of the default Switch IP address (192.168.1.1).
  • Page 280: Factory Default

    Chapter 35 Maintenance Click OK again and then wait for the Switch to restart. This takes up to two minutes. This does not affect the Switch’s configuration. Click Config 1 and follow steps 1 to 2 to reboot and load configuration one on the Switch. Click Config 2 and follow steps 1 to 2 to reboot and load configuration two on the Switch.
  • Page 281: Firmware Upgrade

    Chapter 35 Maintenance 35.6 Firmware Upgrade Use the following screen to upgrade your Switch to the latest firmware. The Switch supports dual firmware images, Firmware 1 and Firmware 2. Use this screen to specify which image is updated when firmware is uploaded using the web configurator and to specify which image is loaded when the Switch starts up.
  • Page 282: Restore Configuration

    Chapter 35 Maintenance After the firmware upgrade process is complete, see the System Info screen to verify your current firmware version number. Table 143 Management > Maintenance > Firmware Upgrade LABEL DESCRIPTION Name This is the name of the Switch that you’re configuring. Version The Switch has two firmware sets, Firmware 1 and Firmware 2, residing in flash.
  • Page 283: Backup Configuration

    Chapter 35 Maintenance 35.8 Backup Configuration Use this screen to save and store your current device settings. Backing up your Switch configurations allows you to create various “snap shots” of your device from which you may restore at a later date. Back up your current Switch configuration to a computer using the Backup Configuration screen.
  • Page 284 Chapter 35 Maintenance Figure 204 Management > Maintenance > Tech-Support You may need WordPad or similar software to see the log report correctly. The table below describes the fields in the above screen. Table 144 Management > Maintenance > Tech-Support LABEL DESCRIPTION Type a number ranging from 50 to 100 in the CPU threshold box, and type another...
  • Page 285: Tech-Support Download

    Chapter 35 Maintenance Table 144 Management > Maintenance > Tech-Support LABEL DESCRIPTION Memory Section Click Download to see the memory section log report. This log report is stored in flash memory. Mbuf Click Download to see the Mbuf log report. The log includes Mbuf over threshold information.
  • Page 286: Ftp Command Line Procedure

    Chapter 35 Maintenance ZyNOS (Zyxel Network Operating System sometimes referred to as the “ras” file) is the system firmware and has a “bin” filename extension. Table 145 Filename Conventions FILE TYPE INTERNAL NAME EXTERNAL NAME DESCRIPTION Configuration File config *.cfg This is the configuration filename on the Switch.
  • Page 287: Gui-Based Ftp Clients

    35.10.4 GUI-based FTP Clients The following table describes some of the commands that you may see in GUI-based FTP clients. General Commands for GUI-based FTP Clients COMMAND DESCRIPTION Host Address Enter the address of the host server. Login Type Anonymous. This is when a user I.D.
  • Page 288: Access Control

    Chapter 36 Access Control H A P T E R Access Control 36.1 Access Control Overview This chapter describes how to control access to the Switch. FTP is allowed one session. Telnet and SSH share nine sessions. Up to five Web sessions (five different user names and passwords) and/or limitless SNMP access control sessions are allowed.
  • Page 289: Configuring Snmp

    Chapter 36 Access Control Figure 206 Management > Access Control 36.3 Configuring SNMP Use this screen to configure your SNMP settings. Click Management > Access Control > SNMP to view the screen as shown. Figure 207 Management > Access Control > SNMP The following table describes the labels in this screen.
  • Page 290: Configuring Snmp Trap Group

    Chapter 36 Access Control Table 147 Management > Access Control > SNMP (continued) LABEL DESCRIPTION Set Community Enter the Set Community, which is the password for incoming Set- requests from the management station. The Set Community string is only used by SNMP managers using SNMP version 2c or lower. Trap Community Enter the Trap Community string, which is the password sent with each trap to the SNMP manager.
  • Page 291: Enabling/Disabling Sending Of Snmp Traps On A Port

    Chapter 36 Access Control Table 148 Management > Access Control > SNMP > Trap Group (continued) (continued) LABEL DESCRIPTION Options Select the individual SNMP traps that the Switch is to send to the SNMP station. See SNMP Traps on page 299 for individual trap descriptions.
  • Page 292: Configuring Snmp User

    Chapter 36 Access Control Table 149 Management > Access Control > SNMP > Trap Group > Port (continued) LABEL DESCRIPTION Settings in this row apply to all ports. Use this row only if you want to make some of the settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
  • Page 293 Chapter 36 Access Control Table 150 Management > Access Control > SNMP > User (continued) LABEL DESCRIPTION Security Level Select whether you want to implement authentication and/or encryption for SNMP communication from this user. Choose: • noauth -to use the username as the password string to send to the SNMP manager. This is equivalent to the Get, Set and Trap Community in SNMP v2c.
  • Page 294: Logins

    Chapter 36 Access Control 36.4 Logins Up to five people (one administrator and four non-administrators) may access the Switch via web configurator at any one time. • An administrator is someone who can both view and configure Switch changes. The username for the Administrator is always admin.
  • Page 295: Service Access Control

    Chapter 36 Access Control Table 151 Management > Access Control > Logins (continued) LABEL DESCRIPTION Password Enter your new system password. Retype to Retype your new system password for confirmation. confirm Privilege Type the privilege level for this user. At the time of writing, users may have a privilege level of 0, 3, 13, or 14 representing different configuration rights as shown below.
  • Page 296: Remote Management

    Chapter 36 Access Control The following table describes the fields in this screen. Table 152 Management > Access Control > Service Access Control LABEL DESCRIPTION Services Services you may use to access the Switch are listed here. Active Select this option for the corresponding services that you want to allow to access the Switch. Service Port For Telnet, SSH, FTP, HTTP or HTTPS services, you may change the default service port by typing the new port number in the Service Port field.
  • Page 297: Technical Reference

    Chapter 36 Access Control Figure 213 Management > Access Control > Remote Management The following table describes the labels in this screen. Table 153 Management > Access Control > Remote Management LABEL DESCRIPTION Entry This is the client set index number. A “client set” is a group of one or more “trusted computers” from which an administrator may use a service to manage the Switch.
  • Page 298: About Snmp

    Chapter 36 Access Control 36.7.1 About SNMP Simple Network Management Protocol (SNMP) is an application layer protocol used to manage and monitor TCP/IP-based devices. SNMP is used to exchange management information between the network management system (NMS) and a network element (NE). A manager station can manage and monitor the Switch through the network via SNMP version 1 (SNMPv1), SNMP version 2c or SNMP version 3.
  • Page 299: Supported Mibs

    Chapter 36 Access Control Security can be further enhanced by encrypting the SNMP messages sent from the managers. Encryption protects the contents of the SNMP messages. When the contents of the SNMP messages are encrypted, only the intended recipients can read them. Supported MIBs MIBs let administrators collect statistics and monitor status and performance.
  • Page 300 Chapter 36 Access Control Table 156 SNMP Interface Traps (continued) OPTION OBJECT LABEL OBJECT ID DESCRIPTION linkdown linkDown 1.3.6.1.6.3.1.1.5.3 This trap is sent when the Ethernet link is down. lldp lldpRemTablesChange 1.0.8802.1.1.2.0.0.1 The trap is sent when entries in the remote database have any updates.
  • Page 301: Ssh Overview

    Chapter 36 Access Control 36.7.2 SSH Overview Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication between two hosts over an unsecured network. Figure 215 SSH Communication Example 36.7.2.1 How SSH works The following table summarizes how a secure connection is established between two remote hosts.
  • Page 302: Introduction To Https

    Chapter 36 Access Control Host Identification The SSH client sends a connection request to the SSH server. The server identifies itself with a host key. The client encrypts a randomly generated session key with the host key and server key and sends the result back to the server.
  • Page 303: Https Example

    Chapter 36 Access Control Figure 217 HTTPS Implementation Note: If you disable HTTP in the Service Access Control screen, then the Switch blocks all HTTP connection attempts. 36.7.3.1 HTTPS Example If you haven’t changed the default HTTPS port on the Switch, then in your browser enter “https://Switch IP Address/”...
  • Page 304 Chapter 36 Access Control Figure 219 Security Certificate Warning (Internet Explorer 11) After you log in, you will see the red address bar with the message Certificate Error. Click on Certificate Error next to the address bar and click View certificates. Figure 220 Certificate Error (Internet Explorer 11) EXAMPLE Click Install Certificate...
  • Page 305: Mozilla Firefox Warning Messages

    Chapter 36 Access Control Figure 221 Certificate (Internet Explorer 11) EXAMPLE Mozilla Firefox Warning Messages When you attempt to access the Switch HTTPS server, a This Connection is Unstructed or Your connection is not secure screen may display. If that is the case, click I Understand the Risks or Advanced and then the Add Exception...
  • Page 306: Google Chrome Warning Messages

    Chapter 36 Access Control Figure 223 Security Alert (Mozilla Firefox 53.0) EXAMPLE 36.7.4 Google Chrome Warning Messages When you attempt to access the Switch HTTPS server, a Your connection is not private screen may display. If that is the case, click Advanced and then Proceed to x.x.x.x (unsafe) to proceed to the web configurator login screen.
  • Page 307: The Main Screen

    Chapter 36 Access Control Figure 224 Security Alert (Google Chrome 58.0.3029.110) 36.7.4.1 The Main Screen After you accept the certificate and enter the login username and password, the Switch main screen appears. The lock displayed in the bottom right of the browser status bar or next to the website address denotes a secure connection.
  • Page 308: Diagnostic

    Chapter 37 Diagnostic H A P T E R Diagnostic 37.1 Overview This chapter explains the Diagnostic screen. You can use this screen to help you identify problems. 37.2 Diagnostic Click Management > Diagnostic in the navigation panel to open this screen. Use this screen to ping IP addresses, run a traceroute, perform port tests or show the Switch’s location between devices.
  • Page 309 Chapter 37 Diagnostic The following table describes the labels in this screen. Table 160 Management > Diagnostic LABEL DESCRIPTION Ping Test IPv4 Select this option if you want to ping an IPv4 address. Select - to send ping requests to all VLANs on the Switch.
  • Page 310 Table 160 Management > Diagnostic (continued) LABEL DESCRIPTION Pair status Ok: The physical connection between the wire-pair is okay. Open: There is no physical connection (an open circuit detected) between the wire-pair. Short: There is an short circuit detected between the wire-pair. Unknown: The Switch failed to run cable diagnostics on the cable connected this port.
  • Page 311: System Log

    Chapter 38 System Log H A P T E R System Log 38.1 Overview A log message stores the information for viewing. 38.2 System Log Click Management > System Log in the navigation panel to open this screen. Use this screen to check current system logs.
  • Page 312: Syslog Setup

    Chapter 39 Syslog Setup H A P T E R Syslog Setup 39.1 Syslog Overview This chapter explains the syslog screens. The syslog protocol allows devices to send event notification messages across an IP network to syslog servers that collect the event messages. A syslog-enabled device can generate a syslog message and send it to a syslog server.
  • Page 313 Figure 228 Management > Syslog Setup The following table describes the labels in this screen. Table 162 Management > Syslog Setup LABEL DESCRIPTION Syslog Select Active to turn on syslog (system logging) and then configure the syslog setting Logging Type This column displays the names of the categories of logs that the device can generate.
  • Page 314 Table 162 Management > Syslog Setup LABEL DESCRIPTION Clear Click Clear to return the fields to the factory defaults. Index This is the index number of a syslog server entry. Click this number to edit the entry. Active This field displays Yes if the device is to send logs to the syslog server. No displays if the device is not to send logs to the syslog server.
  • Page 315: Cluster Management

    Chapter 40 Cluster Management H A P T E R Cluster Management 40.1 Cluster Management Overview This chapter introduces cluster management. Cluster Management allows you to manage switches through one Switch, called the cluster manager. The switches must be directly connected and be in the same VLAN group so as to be able to communicate with one another.
  • Page 316: What You Can Do

    Chapter 40 Cluster Management 40.1.1 What You Can Do • Use the Cluster Management screen (Section 40.2 on page 316) to view the role of the Switch within the cluster and to access a cluster member switch’s web configurator. • Use the Clustering Management Configuration screen (Section 40.1 on page 315) to configure clustering management.
  • Page 317: Clustering Management Configuration

    Table 164 Management > Cluster Management: Status (continued) LABEL DESCRIPTION Model This field displays the model name. Status This field displays: Online (the cluster member switch is accessible) Error (for example the cluster member switch password was changed or the switch was set as the manager and so left the member list, etc.) Offline (the switch is disconnected - Offline shows approximately 1.5 minutes after the link between cluster member and manager goes down)
  • Page 318 Chapter 40 Cluster Management The following table describes the labels in this screen. Table 165 Management > Cluster Management > Configuration LABEL DESCRIPTION Clustering Manager Active Select Active to have this Switch become the cluster manager switch. A cluster can only have one manager.
  • Page 319: Technical Reference

    Chapter 40 Cluster Management 40.4 Technical Reference This section provides technical background information on the topics discussed in this chapter. 40.4.1 Cluster Member Switch Management Go to the Clustering Management Status screen of the cluster manager switch and then select an Index hyperlink from the list of members to go to that cluster member switch's web configurator home page.
  • Page 320 Chapter 40 Cluster Management Figure 233 Example: Uploading Firmware to a Cluster Member Switch C:\>ftp 192.168.1.1 Connected to 192.168.1.1. 220 Switch FTP version 1.0 ready at Thu Jan 1 00:58:46 1970 User (192.168.0.1:(none)): admin 331 Enter PASS command Password: 230 Logged in ftp>...
  • Page 321: Mac Table

    Chapter 41 MAC Table H A P T E R MAC Table 41.1 MAC Table Overview This chapter introduces the MAC Table screen. The MAC Table screen (a MAC table is also known as a filtering database) shows how frames are forwarded or filtered across the Switch’s ports.
  • Page 322: Viewing The Mac Table

    Chapter 41 MAC Table Figure 234 MAC Table Flowchart 41.2 Viewing the MAC Table Use this screen to check whether the MAC address is dynamic or static. Click Management > MAC Table in the navigation panel to display the following screen. Figure 235 Management >...
  • Page 323 The following table describes the labels in this screen. Table 167 Management > MAC Table LABEL DESCRIPTION Condition Select one of the buttons and click Search to only display the data which matches the criteria you specified. Select All to display any entry in the MAC table of the Switch. Select Static to display the MAC entries manually configured on the Switch.
  • Page 324: Ip Table

    Chapter 42 IP Table H A P T E R IP Table 42.1 IP Table Overview The IP Table screen shows how packets are forwarded or filtered across the Switch’s ports. When a device (which may belong to a VLAN group) sends a packet which is forwarded to a port on the Switch, the IP address of the device is shown on the Switch’s IP Table.
  • Page 325: Viewing The Ip Table

    Chapter 42 IP Table 42.2 Viewing the IP Table Click Management > IP Table in the navigation panel to display the following screen. Figure 237 Management > IP Table The following table describes the labels in this screen. Table 168 Management > IP Table LABEL DESCRIPTION Sort by...
  • Page 326: Arp Table

    H A P T E R ARP Table 43.1 ARP Table Overview Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network.
  • Page 327 Chapter 43 ARP Table Figure 238 Management > ARP Table The following table describes the labels in this screen. Table 169 Management > ARP Table LABEL DESCRIPTION Condition Specify how you want the Switch to remove ARP entries when you click Flush. Select All to remove all of the dynamic entries from the ARP table.
  • Page 328: Routing Table

    H A P T E R Routing Table 44.1 Overview The routing table contains the route information to the network(s) that the Switch can reach. 44.2 Viewing the Routing Table Status Use this screen to view routing table information. Click Management > Routing Table in the navigation panel to display the screen as shown.
  • Page 329: Path Mtu Table

    Chapter 45 Path MTU Table H A P T E R Path MTU Table 45.1 Path MTU Overview This chapter introduces the IPv6 Path MTU table. The largest size (in bytes) of a packet that can be transferred over a data link is called the maximum transmission unit (MTU).
  • Page 330: Configure Clone

    Chapter 46 Configure Clone H A P T E R Configure Clone 46.1 Overview This chapter shows you how you can copy the settings of one port onto other ports. 46.2 Configure Clone Cloning allows you to copy the basic and advanced settings from a source port to a destination port or ports.
  • Page 331 Figure 241 Management > Configure Clone The following table describes the labels in this screen. Table 172 Management > Configure Clone LABEL DESCRIPTION Source/ Enter the destination port or ports under the Destination label. These are the ports which are going Destination to have the same attributes as the source port.
  • Page 332 Table 172 Management > Configure Clone (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
  • Page 333: Ipv6 Neighbor Table

    H A P T E R IPv6 Neighbor Table 47.1 IPv6 Neighbor Table Overview This chapter introduces the IPv6 neighbor table. An IPv6 host is required to have a neighbor table. If there is an address to be resolved or verified, the Switch sends out a neighbor solicitation message.
  • Page 334 Chapter 47 IPv6 Neighbor Table Table 173 Management > IPv6 Neighbor Table (continued) LABEL DESCRIPTION Status This field displays whether the neighbor IPv6 interface is reachable. In IPv6, “reachable” means an IPv6 packet can be correctly forwarded to a neighbor node (host or router) and the neighbor can successfully receive and handle the packet.
  • Page 335: Port Status

    H A P T E R Port Status This chapter introduces the port status screens. 48.1 Port Status This screen displays a port statistical summary with links to each port showing statistical details. To view the port statistics, click Status in all web configurator screens and then the Port Status link in the Quick Links section of the Status screen to display the Port Status screen as shown next.
  • Page 336: Port Details

    Chapter 48 Port Status Table 174 Port Status (continued) LABEL DESCRIPTION Link This field displays the speed (either 10M for 10Mbps, 100M for 100Mbps, 1000M for 1000Mbps, or 10G for 10 Gbps) and the duplex (F for full duplex or H for half). It also shows the cable type (Copper or Fiber) for the combo ports.
  • Page 337 Chapter 48 Port Status Figure 244 Port Status > Port Details The following table describes the labels in this screen. Table 175 Port Status: Port Details LABEL DESCRIPTION Port Info Port NO. This field displays the port number you are viewing. In stacking mode, the first number represents the slot and the second the port number.
  • Page 338 Chapter 48 Port Status Table 175 Port Status: Port Details (continued) LABEL DESCRIPTION RxPkts This field shows the number of received frames on this port Errors This field shows the number of received errors on this port. Tx kB/s This field shows the number of kilobytes per second transmitted on this port. This field shows the percentage of actual transmitted frames on this port as a percentage of the Utilization% Link speed.
  • Page 339: Port Utilization

    Chapter 48 Port Status Table 175 Port Status: Port Details (continued) LABEL DESCRIPTION 256-511 This field shows the number of packets (including bad packets) received that were between 256 and 511 octets in length. 512-1023 This field shows the number of packets (including bad packets) received that were between 512 and 1023 octets in length.
  • Page 340 Chapter 48 Port Status The following table describes the labels in this screen. Table 176 Port Status: Utilization LABEL DESCRIPTION Port This identifies the Ethernet port. In stacking mode, the first number represents the slot and the second the port number. Link This field displays the speed (either 10M for Mbps, 100M for 100 Mbps, 1000M for 1000 Mbps, or 10G for 10 Gbps) and the duplex (F for full duplex).
  • Page 341: Troubleshooting

    H A P T E R Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Switch Access and Login • Switch Configuration 49.1 Power, Hardware Connections, and LEDs The Switch does not turn on.
  • Page 342: Switch Access And Login

    Chapter 49 Troubleshooting 49.2 Switch Access and Login I forgot the IP address for the Switch. The default IP address is http://DHCP-assigned IP or 192.168.1.1. If this does not work, you have to reset the device to its factory defaults. See Section 4.7 on page I forgot the username and/or password.
  • Page 343: Switch Configuration

    Chapter 49 Troubleshooting I can see the Login screen, but I cannot log in to the Switch. Make sure you have entered the user name and password correctly. The default user name is admin, and the default password is 1234. These fields are case-sensitive, so make sure [Caps Lock] is not on. You may have exceeded the maximum number of concurrent Telnet sessions.
  • Page 344: Appendix A Customer Support

    • Brief description of the problem and the steps you took to solve it. Corporate Headquarters (Worldwide) Taiwan • Zyxel Communications Corporation • http://www.zyxel.com Asia China • Zyxel Communications (Shanghai) Corp. Zyxel Communications (Beijing) Corp. Zyxel Communications (Tianjin) Corp. • http://www.zyxel.cn India • Zyxel Technology India Pvt Ltd • http://www.zyxel.in Kazakhstan •...
  • Page 345 • Zyxel Singapore Pte Ltd. • http://www.zyxel.com.sg Taiwan • Zyxel Communications Corporation • http://www.zyxel.com/tw/zh/ Thailand • Zyxel Thailand Co., Ltd • http://www.zyxel.co.th Vietnam • Zyxel Communications Corporation-Vietnam Office • http://www.zyxel.com/vn/vi Europe Austria • Zyxel Deutschland GmbH • http://www.zyxel.de Belarus • Zyxel BY • http://www.zyxel.by...
  • Page 346 Appendix A Customer Support Belgium • Zyxel Communications B.V. • http://www.zyxel.com/be/nl/ • http://www.zyxel.com/be/fr/ Bulgaria • Zyxel България • http://www.zyxel.com/bg/bg/ Czech Republic • Zyxel Communications Czech s.r.o • http://www.zyxel.cz Denmark • Zyxel Communications A/S • http://www.zyxel.dk Estonia • Zyxel Estonia • http://www.zyxel.com/ee/et/ Finland •...
  • Page 347 • Zyxel Communications Poland • http://www.zyxel.pl Romania • Zyxel Romania • http://www.zyxel.com/ro/ro Russia • Zyxel Russia • http://www.zyxel.ru Slovakia • Zyxel Communications Czech s.r.o. organizacna zlozka • http://www.zyxel.sk Spain • Zyxel Communications ES Ltd • http://www.zyxel.es Sweden • Zyxel Communications • http://www.zyxel.se Switzerland •...
  • Page 348 Appendix A Customer Support • http://www.zyxel.ch/ Turkey • Zyxel Turkey A.S. • http://www.zyxel.com.tr • Zyxel Communications UK Ltd. • http://www.zyxel.co.uk Ukraine • Zyxel Ukraine • http://www.ua.zyxel.com Latin America Argentina • Zyxel Communication Corporation • http://www.zyxel.com/ec/es/ Brazil • Zyxel Communications Brasil Ltda.
  • Page 349: North America

    Appendix A Customer Support North America • Zyxel Communications, Inc. - North America Headquarters • http://www.zyxel.com/us/en/ Oceania Australia • Zyxel Communications Corporation • http://www.zyxel.com/au/en/ Africa South Africa • Nology (Pty) Ltd. • http://www.zyxel.co.za XGS1930 Series User’s Guide...
  • Page 350: Appendix B Common Services

    P P E N D I X Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. •...
  • Page 351 Appendix B Common Services Table 177 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION HTTPS HTTPS is a secured http session often used in e- commerce. ICMP User-Defined Internet Control Message Protocol is often used for diagnostic or routing purposes. 4000 This is a popular Internet chat program.
  • Page 352 Appendix B Common Services Table 177 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SQL-NET 1521 Structured Query Language is an interface to access data on many different types of database systems, including mainframes, midrange systems, UNIX systems and network servers.
  • Page 353: Appendix C Ipv6

    P P E N D I X IPv6 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 10 IP addresses.
  • Page 354: Loopback Address

    Appendix C IPv6 Unspecified Address An unspecified address (0:0:0:0:0:0:0:0 or ::) is used as the source address when a device does not have its own address. It is similar to “0.0.0.0” in IPv4. Loopback Address A loopback address (0:0:0:0:0:0:0:1 or ::1) allows a host to send packets to itself. It is similar to “127.0.0.1” in IPv4.
  • Page 355: Subnet Masking

    Appendix C IPv6 Subnet Masking Both an IPv6 address and IPv6 subnet mask compose of 128-bit binary digits, which are divided into eight 16-bit blocks and written in hexadecimal notation. Hexadecimal uses four bits for each character (1 ~ 10, A ~ F). Each block’s 16 bits are then represented by four hexadecimal characters. For example, FFFF:FFFF:FFFF:FFFF:FC00:0000:0000:0000.
  • Page 356: Dhcp Relay Agent

    Appendix C IPv6 Each DHCP client and server has a unique DHCP Unique IDentifier (DUID), which is used for identification when they are exchanging DHCPv6 messages. The DUID is generated from the MAC address, time, vendor assigned ID and/or the vendor's private enterprise number registered with the IANA. It should not change over time even after you reboot the device.
  • Page 357 Appendix C IPv6 ICMPv6 Internet Control Message Protocol for IPv6 (ICMPv6 or ICMP for IPv6) is defined in RFC 4443. ICMPv6 has a preceding Next Header value of 58, which is different from the value used to identify ICMP for IPv4. ICMPv6 is an integral part of IPv6.
  • Page 358 Appendix C IPv6 Example - Enabling IPv6 on Windows XP/2003/Vista By default, Windows XP and Windows 2003 support IPv6. This example shows you how to use the ipv6 install command on Windows XP/2003 to enable IPv6. This also displays how to use the ipconfig command to see auto-generated IP addresses.
  • Page 359 Appendix C IPv6 Click Start and then OK. Now your computer can obtain an IPv6 address from a DHCPv6 server. Example - Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default. DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer.
  • Page 360 Appendix C IPv6 Click Close to exit the Local Area Connection Status screen. Select Start > All Programs > Accessories > Command Prompt. Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address (2001:b021:2d::1000) obtained from a DHCP server. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection:...
  • Page 361: Appendix D Legal Information

    The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of Zyxel Communications Corporation. Published by Zyxel Communications Corporation. All rights reserved.
  • Page 362: Safety Warnings

    Appendix D Legal Information List of National Codes COUNTRY ISO 3166 2 LETTER CODE COUNTRY ISO 3166 2 LETTER CODE Austria Liechtenstein Belgium Lithuania Bulgaria Luxembourg Croatia Malta Cyprus Netherlands Czech Republic Norway Denmark Poland Estonia Portugal Finland Romania France Serbia Germany Slovakia...
  • Page 363 Appendix D Legal Information • PRODUIT CONFORME SELON 21 CFR 1040.10 ET 1040.11. (for products with mini-GBIC slots or laser products, such as fiber-optic transceiver and GPON products) Environment Statement European Union - Disposal and Recycling Information The symbol below means that according to local regulations your product and/or its battery shall be disposed of separately from domestic waste.
  • Page 364: Zyxel Limited Warranty

    North American products. Trademarks ZyNOS (Zyxel Network Operating System) and ZON (Zyxel One Network)are registered trademarks of Zyxel Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
  • Page 365: Index

    Index Index setup Numerics authentication, authorization and accounting Authentication, Authorization and Accounting, see 802.1P priority authorization setup auto-crossover automatic VLAN registration accounting authentication authorization external server RADIUS back up, configuration file TACACS+ bandwidth control AAA (Authentication, Authorization and Accounting) egress rate ingress rate access control setup...
  • Page 366 Index overview Relay Agent Information format setup setup 175, 179 status DHCPv4 viewing global relay cloning a port See port cloning global relay example Option 82 cluster management option 82 profiles and switch passwords Relay Agent Information cluster manager 315, 318 cluster member DHCPv4 relay 315, 318...
  • Page 367 Index command example filename convention, configuration configuration hardware installation file names hardware monitor filtering hardware overview rules hello time filtering database, MAC table high power firmware HTTPS upgrade 281, 319 certificates flow control implementation back pressure public keys, private keys IEEE802.3x HTTPS example forwarding...
  • Page 368 Index how it works LACP 152, 214 system priority IPv6 timeout addressing EUI-64 Layer 2 protocol tunneling, see L2PT global address LEDs interface ID link aggregation link-local address dynamic Neighbor Discovery Protocol ID information neighbor table setup ping traffic distribution algorithm prefix traffic distribution type prefix length...
  • Page 369 Index MAC (Media Access Control) hello time Max Age MAC address 138, 141 74, 326 maximum hops maximum number per port revision level MAC address learning 78, 170 status specify limit MAC table MTU (Multi-Tenant Unit) display criteria how it works multicast sorting criteria IGMP throttling...
  • Page 370 Index policy drop PPPoE packets and classifier port state and DiffServ sub-option format configuration tag format example trusted ports overview untrusted ports rules VLAN Port Aggregation Protocol, see PAgP PPPoE Intermediate Agent port authentication priority level guest VLAN priority queue assignment IEEE802.1x product registration MAC authentication...
  • Page 371 Index to factory default settings SPQ (Strict Priority Queuing) 278, 280 restoring configuration 53, 282 encryption methods RFC 3164 how it works Round Robin Scheduling implementation routing table SSH (Secure Shell) RSTP SSL (Secure Socket Layer) configuration standby ports status static MAC address rubber feet static MAC forwarding...
  • Page 372 Index protocol untrusted ports settings PPPoE IA setup user name severity levels default system information user profiles system reboot Vendor Specific Attribute, See VSA TACACS+ ventilation holes advantages 82, 109, 110 tagged VLAN number of possible VIDs Tech-Support priority frame log enhancement VID (VLAN Identifier) temperature indicator...
  • Page 373 Index warranty note web configurator getting help home login logout navigation panel weight, queuing Weighted Round Robin Scheduling (WRR) WRR (Weighted Round Robin Scheduling) ZON neighbor management ZON Utility ZyNOS (ZyXEL Network Operating System) ZyXEL Discovery Protocol XGS1930 Series User’s Guide...

This manual is also suitable for:

Xgs1930-38hpXgs1930-52Xgs1930-52hp

Table of Contents