About This User's Guide Intended Audience This manual is intended for people who want to configure the switch using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away.
Syntax Conventions • The ES-1552 may be referred to as the “ES-1552”, the “switch”, the “device”, or the “system” in this User’s Guide. • Product labels, screen names, field labels and field choices are all in bold font.
Page 5
Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The switch icon is not an exact representation of your device. switch Server Telephone ES-1552 User’s Guide Computer Notebook computer DSLAM Firewall Switch Router Document Conventions...
Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. •...
Introduction and Hardware Overview ... 25 Getting to Know Your Switch ... 27 Hardware Installation and Connection ... 31 Hardware Overview ... 35 Basic & Advanced Settings ... 41 The Web Configurator ... 43 System ... 49 Port Settings ... 55 System and Port Statistics ...
2.1 Freestanding Installation ... 31 2.2 Mounting the Switch on a Rack ... 32 2.2.1 Rack-mounted Installation Requirements ... 32 2.2.2 Attaching the Mounting Brackets to the Switch ... 32 2.2.3 Mounting the Switch on a Rack ... 33 Chapter 3 Hardware Overview...
Page 12
4.3.2 The Navigation Panel ... 45 4.3.3 Change Your Password 4.4 Saving Your Configuration ... 47 4.5 Switch Lockout ... 47 4.6 Resetting the Switch 4.7 Logging Out of the Web Configurator ... 47 4.8 Help ... 48 Chapter 5 System ... 49 5.1 System Screen ...
Page 14
Table of Contents 13.1 Configuring L2 Management 13.1.1 Add a Static MAC Address Entry 13.2 Viewing the L2 Address Table Chapter 14 Cable Diagnostics... 87 14.1 Diagnostics Overview ... 87 Chapter 15 Auto Denial of Service (DoS) ... 89 15.1 About Denial of Service Attacks ... 89 15.1.1 DoS Attacks Summary ...
Page 16
Table of Contents Part IV: Appendices and Index ... 147 Appendix A Product Specifications... 149 Appendix B IP Addresses and Subnetting ... 153 Appendix C Legal Information ... 161 Appendix D Customer Support... 165 Index... 169 ES-1552 User’s Guide...
Appendix A on page 149 1.1.1 Backbone Application The switch is an ideal solution for small networks where rapid growth can be expected in the near future. The switch can be used standalone for a group of heavy traffic users. You can connect computers and servers directly to the switch’s port or connect other switches to the...
Sales) to the corporate backbone. It can alleviate bandwidth contention and eliminate server and network bottlenecks. All users that need high bandwidth can connect to high-speed department servers via the switch. You can provide a super-fast uplink connection by using a Gigabit Ethernet/mini-GBIC port on the switch.
VLAN 1. Ports can belong to other VLAN groups too. Figure 4 Shared Server Using VLAN Example ES-1552 User’s Guide Chapter 1 Getting to Know Your Switch Chapter 8 on page...
Page 30
Chapter 1 Getting to Know Your Switch ES-1552 User’s Guide...
4 Remove the adhesive backing from the rubber feet. 5 Attach the rubber feet to each corner on the bottom of the switch. These rubber feet help protect the switch from shock or vibration and ensure space between devices when stacking.
2.2.2 Attaching the Mounting Brackets to the Switch 1 Position a mounting bracket on one side of the switch, lining up the four screw holes on the bracket with the screw holes on the side of the switch.
2.2.3 Mounting the Switch on a Rack 1 Position a mounting bracket (that is already attached to the switch) on one side of the rack, lining up the two screw holes on the bracket with the screw holes on the side of the rack.
H A P T E R This chapter describes the front panel and rear panel of the switch and shows you how to make the hardware connections. 3.1 Panel Connections and the RESET Button The figure below shows the front panel of the switch.
There are two mini-GBIC (Gigabit Interface Converter) slots for mini-GBIC transceivers. A transceiver is a single unit that houses a transmitter and a receiver. The switch does not come with transceivers. You must use transceivers that comply with the SFP Transceiver MultiSource Agreement (MSA).
Figure 12 Transceiver Removal Example 3.2 The RESET Button The switch allows you to reset the switch to its factory default configuration via the RESET button. Press the RESET button for one second and release. The switch automatically reboots and reloads its factory default configuration file.
When you use the RESET button all of your configuration settings will be lost. Use the default IP address (192.168.1.1) and user name (admin) and password (1234) to log back into the switch. It may take up to 2 minutes for the switch to restart when you reload the default configuration file.
Page 39
Table 2 LEDs (continued) COLOR 100/1000 Green Amber Green GBIC Slots Green Green ES-1552 User’s Guide STATUS DESCRIPTION The link to a 1000 Mbps Ethernet network is up. The link to a 100 Mbps Ethernet network is up. The link to a 10 Mbps Ethernet network is up. Or the link to an Ethernet network is down.
Basic & Advanced Settings The Web Configurator (43) System (49) Port Settings (55) (59) VLAN (63) Trunking (67) Mirroring (69) QoS (71) Port Rate Limit and Storm Control (79) Layer 2 (L2) Management (83) Cable Diagnostics (87) Auto Denial of Service (DoS) (89) Auto VoIP (93)
4.2 System Login 1 Start your web browser. 2 Type “http://” and the IP address of the switch (for example, the default is 192.168.1.1) in the Location or Address field. Press [ENTER]. 3 The login screen appears. The default username is admin and associated default password is 1234.
Figure 15 Web Configurator Home Screen (System) A - The LED panel displays the port status. B - The navigation panel has links to screens that let you configure the switch features. C - The function frame allows you to view and edit individual feature settings.
Use this screen to change the system login password Firmware Use this screen to perform firmware upgrades Restart/ Use this screen to reboot the switch or to restore the default configuration of the Reset switch. Port Use these screens to view the status and configure settings for individual ports on the switch.
Logging Use these screens to configure log settings and view system logs. Settings Use this screen to configure which events the switch should log. RAM Logs Use this screen to configure logs which are saved to volatile memory. These logs are cleared when the switch is rebooted.
Use the RESET button on the front panel of the switch to reset the switch back to factory defaults. Press and hold the RESET button for one second. The switch will reload its factory defaults.
Chapter 4 The Web Configurator Figure 18 Web Configurator: Logout Link 4.8 Help The web configurator’s online help has descriptions of individual screens and some supplementary information. Click the Help link from a web configurator screen to view an online help description of that screen.
DESCRIPTION Device Name This read-only field displays the name of your switch. Firmware This field displays the version number of the switch 's current firmware. Click Version Upgrade to go to the firmware upgrade screen. See Build Date This field displays the date of the currently installed firmware.
DESCRIPTION Backup settings Click this link to create and save a backup configuration file. See page Restore Click this link to upload an existing configuration file to the switch. See settings on page 5.1.1 Configure IP Address Use the Configure IP Address screen to set up the IP address manually. The following screen appears when you click the existing IP address in the System >...
Select the Enable L2 Table Aging checkbox and enter the amount of time in seconds (up to 1048575) that the switch remembers MAC address entries. Select “0” to disable L2 table aging. Click Apply to save your configuration changes. 5.1.3 Backup Settings Backing up your switch configurations allows you to create various “snap shots”...
5.2 System: Change Password Use the Change Password screen to change the administrator username and password for the switch. Click System > Password to view the screen as shown. Figure 24 System: Password The following table describes the labels in this screen.
Figure 25 Firmware Upgrade Type the path and file name of the firmware file you wish to upload to the switch in the File Path text box or click Browse to locate it. After you have specified the file, click Upgrade.
This chapter describes how to view and configure the port settings on the switch. 6.1 Port Status Use this screen to view switch port settings. Click System > Port in the navigation panel to display the Port Status screen. Figure 27 Port Status ES-1552 User’s Guide...
Auto Negotiate Select Enable and the port will negotiate the speed, duplex mode and flow control settings with the peer port. If the peer port does not support auto-negotiation or turns off this feature, the switch determines the connection speed by detecting the signal on the cable and using half duplex mode.
Page 57
Flow Control is used to regulate transmission of signals to match the bandwidth of the receiving port. The switch uses IEEE802.3x flow control in full duplex mode and backpressure flow control in half duplex mode.
Page 58
Chapter 6 Port Settings ES-1552 User’s Guide...
The following table describes the labels in this screen. Table 10 Statistics LABEL DESCRIPTION Clear Counters Click this to reset all counters to zero. Refresh Click this to retrieve the current information from the switch and update this screen. ES-1552 User’s Guide...
UnicastPkts Figure 30 on page 60). DESCRIPTION Click this to retrieve the current information from the switch and update this screen. This field displays the port number you are viewing. This field shows the number of octets transmitted. This field shows the number unicast packets transmitted.
Page 61
Table 11 Status: Port Details (continued) LABEL DESCRIPTION NonUnicastPkts This field shows the number of nonunicast packets transmitted. Discards This field shows the number discarded (dropped) packets. Errors This field shows the number of packets for which transmission failed because of excessive collision.
Page 62
Chapter 7 System and Port Statistics Table 11 Status: Port Details (continued) LABEL 512-1023 BytePkts 1024-1518 BytePkts DESCRIPTION This field shows the number of packets (including bad packets) received that were between 512 and 1023 octets in length. This field shows the number of packets (including bad packets) received that were between 1024 and 1522 octets in length.
A tagged VLAN uses an explicit tag (VLAN ID) in the MAC header to identify the VLAN membership of a frame across bridges - they are not confined to the switch on which they were created. The VLANs can be created statically by hand or dynamically through GVRP. The VLAN ID associates a frame with a specific VLAN and provides the information that switches need to process the frame across the network.
Chapter 8 VLAN 8.2 Static VLAN Use a IEEE 802.1Q VLAN to decide whether an incoming frame on a port should be • sent to a VLAN group as normal depending on its VLAN tag. • sent to a group whether it has a VLAN tag or not. You can also tag all outgoing frames (that were previously untagged) from a port with the specified VID.
U - This indicates that this port is a member of the VLAN. When the packet leaves the member port, the VLAN tag is removed. Create Click Create to add this VLAN to the switch. Cancel Click Cancel to return to the VLAN status screen without making any changes.
DESCRIPTION VLAN ID Select which VLAN you want to configure. Click Remove This VLAN to remove this VLAN from the switch. Note: VLAN 1 cannot be removed. Display All Click this button to go back to the VLAN status screen.
The switch uses a traffic distribution algorithm to balance traffic between trunk members. The switch allows you to specify what criteria it should use to calculate the most efficient distribution of traffic. The choices are Source MAC Address (SA), Destination MAC Address (DA) or both (SA + DA).
Click this to delete the port from the trunk group you selected in the Trunk id field. Trunk 1 ... This summary table lists all the trunks. Trunk Group Member column indicates which Trunk 6 ports are members of the trunk group. Apply Click Apply to save your changes to the switch. ES-1552 User’s Guide...
The Mirror To (monitor) port is the port you copy the traffic to in order to examine it in more detail without interfering with the traffic flow on the original port(s). Select the monitor port. Apply Click Apply to save your changes to the switch. ES-1552 User’s Guide Mirroring...
Strict priority scheduling services the remaining queues using WRR. As traffic comes into the switch, traffic on the highest priority queue, Queue 3 is transmitted first. Only when that queue empties, traffic on the lower priority queues is transmitted using WRR scheduling.
The switch allows you to choose one of the following methods for assigning priority to incoming packets on the switch: Port Based QoS - Assign priority to packets based on the incoming port on the switch. See Section 11.4.1 on page DSCP Based QoS - Assign priority to packets based on their Differentiated Services Code Points (DSCPs).
Click Apply to save your changes to the switch. 11.3.1 Change Number of Queues Use the Change Number of Queues screen to edit the number of queues on the switch. Click Change in the QoS Setting screen to view the following screen.
11.4.1 Port Based QoS You can configure the switch to assign a IEEE 802.1p priority to packets based on the ingress (incoming) port of the packet. Select Port Based QoS in the QoS Enhancement Setting screen to view the following screen.
IP header. The DS field contains a 2-bit unused field and a 6-bit DSCP field which can define up to 64 service levels. You can configure the DSCP to IEEE 802.1p mapping to allow the switch to prioritize all traffic based on the incoming DSCP value according to the DiffServ to IEEE 802.1p mapping table.
Settings 11.4.5 ToS Based QoS You can configure the switch to assign a IEEE 802.1p priority to packets coming into the switch with Type of Service (ToS) priority assigned to them. Select ToS Based QoS in the QoS Enhancement Setting screen to view the following screen.
Settings 11.4.6 IP Address Based QoS You can configure the switch to assign a higher priority to packets coming into the switch from specific IP addresses. Select IP Address Based QoS in the QoS Enhancement Setting screen to view the following screen.
MASK, you click the Change button in this screen. Click DELETE in the Delete column to Priority, remove this IP address based QoS entry from the switch. Delete Apply Click this when you have reviewed the changes you want to make and you want to save Change them to the switch’s memory.
H A P T E R Port Rate Limit and Storm This chapter shows you how you can manage bandwidth on each port and set up broadcast storm control settings using the Port Rate and Storm Control screens. 12.1 Port Rate Screen Rate control means defining a maximum allowable bandwidth for incoming and/or out-going traffic flows on a port.
Chapter 12 Port Rate Limit and Storm Control The following table describes the related labels in this screen. Table 22 Rate Limit and Storm Control LABEL DESCRIPTION Port This field displays the port number. Click on an individual port number to configure rate limits on that port.
Table 23 Rate Limit Configuration (continued) LABEL DESCRIPTION Tokens The switch uses a “Token Bucket” algorithm to limit the outgoing rate on the ports and Added Per to limit the largest amount of packets that can leave the port in any one instance. Interval In this algorithm each “token”...
Storm Control Select the number of packets (of the type specified in the Storm Control Type Rate field) per second the switch can receive per second. Apply Click Apply to save your changes to the switch. ES-1552 User’s Guide...
H A P T E R Layer 2 (L2) Management Use these screens to add, delete and view entries in the Layer 2 (L2) address table. 13.1 Configuring L2 Management Layer 2 (L2) management refers to management based on the Media Access Control (MAC) address of networking devices.
Chapter 13 Layer 2 (L2) Management Table 25 L2 Management (continued) LABEL DESCRIPTION Port This field displays the port number of a manually entered MAC address entry. Delete Click DELETE to remove this manually entered MAC address entry from the MAC address table.
Type This field displays whether this entry was entered manually into the L2 address table - static or whether it was learned by the switch - dynamic. Previous Use these navigation links to browse all L2 learned entries.
This chapter explains the Cable Diagnostics screen. 14.1 Diagnostics Overview The cable diagnostics function works with systems using CAT-5 twisted-pair cables. The switch can perform basic cable diagnostics. Click Cable Diagnostic in the navigation panel to view the screen as shown. Figure 48 Cable Diagnostic The following table describes the labels in this screen.
15.1 About Denial of Service Attacks Denial of Service (DoS) attacks try to disable a device or network so users no longer have access to network resources. The switch has features which automatically detect and thwart currently known DoS attacks.
15.2 Global Auto DoS Attack Prevention Use the Global Auto DoS Attack Prevention screen to configure DoS attack prevention settings for the switch. Click Auto DoS in the navigation panel to open the following screen. Figure 49 Global Auto DoS Attack Prevention The following table describes the labels in this screen.
For Ping and SYN/SYN-ACK Flooding attacks you can specify thresholds for triggering the dropping of packets by the switch. Select: • 64 kbps - the switch will drop packets when the rate of incoming Ping or SYN/ SYN-ACK packets reaches this limit. •...
Page 92
Chapter 15 Auto Denial of Service (DoS) ES-1552 User’s Guide...
VoIP phones. 16.2 Auto VoIP Settings Use the Auto VoIP Settings to enable automatic assignment of high priority to VoIP packets passing through the switch. Click Auto VoIP in the navigation panel to view the following screen. ES-1552 User’s Guide...
Select Disable if you don’t want to give higher priority to VoIP traffic or select IP Phone to give the highest priority to SIP, MGCP and SCCP packets passing through the switch. Apply Click Apply to save your changes to the switch. ES-1552 User’s Guide...
Flash - This log is saved into the switch’s non-volatile memory. You can view the logs even after the switch is rebooted. Due to the space limitations on the switch the oldest log entries are overwritten as new events are recorded.
The log facility allows you to send logs to different files in the syslog server. Refer to the documentation of your syslog server for more details. Click Add to save this entry to the switch and return to the Logging screen. Error - to record system failures, such as events which will cause the switch to malfunction and events such as invalid user input in the web configurator.
This field indicates the index number of the log. This number doesn’t change even if some logs are deleted from the switch due to memory limits. The index number increments by one for each recorded event. The largest number represents the most recent log event.
Logs - RAM or Logs - Flash screen to view the screen as shown. Error - to record system failures, such as events which will cause the switch to malfunction and events such as invalid user input in the web configurator.
This field displays the severity level of the log event. The possible severity levels are, Error, Warning, Info and Debug. Error - to search system failures, such as events which will cause the switch to malfunction and events such as invalid user input in the web configurator.
Page 103
SYSTEM records events which deal with the overall operation of the switch. Time This field specifies the time when the switch recorded the log event. The switch resets its internal clock when it is restarted to 2006/5/1 00:00:00. Message This field displays an explanation for the log entry.
An SNMP managed network consists of two main components: agents and a manager. An agent is a management software module that resides in a managed switch (the switch). An agent translates the local management information from the managed switch into a form compatible with SNMP.
• Group 2 (History) • Group 3 (Alarm) • Group 9 (Event) 18.1.2 SNMP Traps The switch sends traps to an SNMP manager when an event occurs. SNMP traps supported are outlined in the following table. Table 39 SNMP Traps OBJECT LABEL...
DESCRIPTION Engine ID Select this radio button and enter a unique Engine ID for the switch. The format is limited to hexadecimal characters (0~9 and a~f) and the maximum length is 27 octets (each octet is made up of a pair of hexadecimal characters).
Group Name This field displays the name of the SNMP group. SNMP Version This field indicates which SNMP version this group uses to manage the switch. Authentication This field indicates whether authentication is required for members of this group. Authentication can only be configured for SNMP v3.
This field is only editable if you select SNMPv3 in the SNMP Version field. Select Enabled to force SNMP v3 groups to authenticate with the switch or select Disabled to deactivate authentication for the SNMP v3 groups. For SNMP v1 and SNMP v2c authentication is always disabled.
An SNMP user is an SNMP manager. SNMP managers must use the proper SNMP user and group credentials to gain access to and manage agents such as the switch. Use the SNMP User screen to create SNMP users and associate them to SNMP groups. Click SNMP > User to view the screen as shown.
MD5 and configure the Key field to force this user to authenticate with the switch. Enter the MD5 key this user must use to authenticate with the switch. You can use 1- 8 printable ASCII characters. Spaces are allowed but trailing spaces are truncated.
Auth Type Authentication can only be configured for SNMP v3. Select None to allow this user to manage the switch without authentication or select MD5 and configure the New Key field to force this user to authenticate with the switch.
Group Name Select the SNMP group you want to belong to this community. Create Click this to add this SNMP community to the switch. Cancel Click this to go back to the main SNMP Community screen without saving your changes.
DESCRIPTION Community ID This field indicates which community you are modifying. Click on Remove This Community to delete this user configuration from the switch. Click on Display All Community to view the main SNMP Community screen. Community An SNMP community string is a text string that acts as a password. It is used to...
Enable Select this to enable logging of failed authentication attempts. If an SNMP manager Authentication uses an unmatched community string to access an agent, the switch will send a trap Notification (notification). Apply Click this to save your settings to the switch.
Chapter 18 SNMP Figure 69 SNMP Trap Station The following table describes the labels in this screen. Table 51 SNMP Trap Station LABEL DESCRIPTION Trap Station ID Select the SNMP trap station you want to edit. Create New Click this to configure a new SNMP Trap Station. Trap Station Trap Station ID This field indicates the trap station number.
Specify the community string used with this remote trap station. String Create Click this to add this SNMP user to the switch. Cancel Click this to go back to the main SNMP Group screen without saving your changes. 18.6.2 SNMP Trap Station: Modify...
• Group 9 (Event) The switch’s implementation is therefore referred to as RMON-Lite. The following sections describe how to configure the RMON-Lite settings on the switch. Refer to RFC 2819 for more information on RMON MIBs. 19.2 RMON Statistics: Overview Click RMON-Lite in the navigation panel to open the RMON Statistics: Overview screen.
Refresh Click this to update all the fields in the RMON-Lite Statistics: Overview screen. Data Source This field displays the ports on the switch. Click on the port number to configure the settings for that port. Owner This field displays the entry creator. It displays monitor if the entry was created by the switch itself.
19.3 RMON-Lite Statistics: Port Use this screen to enable statistics gathering and view the statistics for individual ports. Click on a port number in the RMON Statistics: Overview screen to view the screen as shown. Figure 73 RMON Statistics: Port The following table describes the labels in this screen.
Chapter 19 RMON-Lite Table 55 RMON Statistics: Port (continued) LABEL StatsOversizePkts StatsFragments StatsJabbers StatsCollisions StatsPkts64Octets StatsPkts65to127Octets StatsPkts128to255Octets StatsPkts256to511Octets StatsPkts512to1023Octets StatsPkts1024to1518Octets Statistics Overview 19.4 RMON-Lite History MIB RMON-Lite History MIB configuration is divided into two parts: [2] History Control and [2] History Statistics.
Click this to update all the fields in the RMON History Control: Overview screen. Index This field displays the configuration index number. Data Source This is the port of the switch polled for data. Bucket This field displays the number of data samplings the network manager requests the Requested probe to store.
64 printable characters. Spaces are not allowed. Status Select Enable/Disable to activate or deactivate statistical sampling on the port. Apply Click this to save the settings on the switch. History Control Click this to go back to the RMON History Control: Overview screen. Overview 19.4.3 RMON History Statistics: Overview...
This field displays the configuration index number. Click on the index number to view Index the details for this entry. Data Source This is the port of the switch polled for data. Bucket Granted This field displays the number of data samplings the probe allows to store. Interval This field displays the time between data samplings in seconds.
Chapter 19 RMON-Lite Figure 77 RMON History Statistics: Control The following table describes the labels in this screen. Table 59 RMON History Statistics: Control LABEL DESCRIPTION RMON MIB Use this drop down list box to select the MIB table you want to view. Click Apply to Table: refresh the screen to the selected MIB table view.
Table 59 RMON History Statistics: Control (continued) LABEL DESCRIPTION Utilization (%) This field displays the utilization as a percentage of maximum utilization allowed on the port in this polling sample. History Click this to go back to the RMON History Statistics: Overview screen. Statistics Overview 19.5 RMON Alarm: Overview...
Chapter 19 RMON-Lite Table 60 RMON Alarm: Overview (continued) LABEL DESCRIPTION RisingThreshol This field displays the rising threshold value set up for this alarm. FallingThreshol This field displays the falling threshold value set up for this alarm. Rising Event This field indicates the index number of the event entry which corresponds to the Index time when the alarm threshold was crossed.
19.6 RMON Event: Overview Use the RMON Event: Overview screen to view and delete event entries configured on the switch. Select [9] Event from the RMON MIB Table: drop down listbox in the RMON-Lite screen to view the screen as shown.
This field displays the community or SNMP trap. Last Time Sent This field indicates the value of system up time on the switch when this event was last generated. It appears in the following format “XXD: XXH: XXM: XXS”, where “XX”...
Use the RMON Event Log: Overview screen to view the event log entries generated on the switch. All the entries in this table are generated by the RMON-Lite probe when the event value meets the risingEventThreshold or fallingEventThreshold assigned in the RMON Alarm screens.
Log and Trap. Last Time Sent This field indicates the value of system up time on the switch when this event was last generated. It appears in the following format “XXD: XXH: XXM: XXS”, where “XX” stands for a number and “D” stands for days, “H” for hours, “M” for minutes and “S”...
The following table describes the labels in this screen. Table 65 RMON Event Log: Event LABEL DESCRIPTION RMON MIB Use this drop down list box to select the MIB table you want to view. Click Apply to Table: refresh the screen to the selected MIB table view. Refresh Click this to update all the fields in the RMON Event Log: Event Index screen.
The ARP table is populated with MAC and corresponding IP address mappings in two different ways. • DHCP Snooping - The switch listens to traffic from a DHCP server on a trusted port and learns IP-to-MAC address bindings by parsing DHCP ACK packets.
Note: You must activate dynamic ARP first if you want to add static Aging Time Specify how long (in hours) the switch remembers the learned ARP table entries. Specify “0” to have the switch remember the ARP table entries for an unlimited time period. Trusted ports Packets arriving on trusted ports bypass all Dynamic ARP validation checks, and those arriving on untrusted ports undergo the validation process.
Item This is the ARP table entry number. MAC Address This is the MAC address of the device connected to the switch with the corresponding IP address below. IP Address This is the learned IP address of a device connected to a switch port with corresponding MAC address above.
DESCRIPTION MAC Address Enter the MAC address in 6 pair hexadecimal format of the network device you want to (XX-XX-XX- be allowed to communicate via the switch. An example entry of a MAC address is “0a- XX-XX-XX) b1-c2-d3-e4-f5”. IP Address Enter the corresponding IP address (in dotted decimal notation, ex 192.168.1.5) of the...
If you have changed the password configurator. and have now forgotten it, you will need to reset the switch to its factory defaults. Press the RESET button on the front panel of the switch for one second and the switch automatically reloads its default configuration file.
Chapter 21 Troubleshooting Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. 21.2.1.1 Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device. Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or allow pop-up blocking and create an exception for your device’s IP address.
Figure 88 Internet Options 3 Click Apply to save this setting. 21.2.1.1.2 Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settings…to open the Pop-up Blocker Settings screen.
Chapter 21 Troubleshooting Figure 89 Internet Options 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.1.1. 4 Click Add to move the IP address to the list of Allowed sites. Figure 90 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen.
6 Click Apply to save this setting. 21.2.1.2 JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 91 Internet Options 2 Click the Custom Level...
Chapter 21 Troubleshooting Figure 92 Security Settings - Java Scripting 21.2.1.3 Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window.
21.2.1.3.1 JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window. Figure 94 Java (Sun) ES-1552 User’s Guide Chapter 21 Troubleshooting...
Appendices and Index This part contains the following chapters. • Product Specifications (149) • IP Addresses and Subnetting (151) • Legal Information (161) • Customer Support (165) • Index (169)
Use the web configurator to easily configure the rich range of features on the switch. Download new firmware (when available) from the ZyXEL web site and use the web configurator to put it on the switch. Note: Only upload firmware for your specific model! Make a copy of the switch’s configuration and put it back on the switch...
DESCRIPTION Dynamic ARP allows you to filter incoming traffic based on the MAC to IP address mapping. The switch can be configured to only allow trusted devices to communicate via its ports. Remote Network Monitoring Management (RMON) allows you to gather information about the switch’s performance, view statistics and create...
RFC1398 MIB - Ether-like RFC2819 Four groups of RMON (history, statistics, alarms and events) Table 74 Physical and Environmental Specifications LEDs Main switch: PWR Per Gigabit port: ACT, 100/1000 Per mini-GBIC port: LNK, ACT Per 100 Mbps Ethernet port: LNK/ACT Dimension Standard 19”...
Page 152
Appendix A Product Specifications ES-1552 User’s Guide...
P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
Appendix B IP Addresses and Subnetting Figure 95 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation).
Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 76 Subnet Masks BINARY OCTET 8-bit mask 11111111 16-bit mask 11111111 24-bit mask 11111111...
Appendix B IP Addresses and Subnetting Table 78 Alternative Subnet Mask Notation (continued) SUBNET MASK 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252 Subnetting You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons.
Figure 97 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address).
Table 83 Eight Subnets (continued) SUBNET SUBNET ADDRESS Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 84 24-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS The following table is a summary for subnet planning on a network with a 16-bit network number.
You must also enable Network Address Translation (NAT) on the switch. Once you have decided on the network number, pick an IP address for your switch that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network is using that IP address.
Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
3 Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During...
Page 163
Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Page 164
Appendix C Legal Information ES-1552 User’s Guide...
adding VLANs Address Resolution Logic (ARL) table Address Resolution Protocol (ARP) allowing pop-up windows alternative subnet mask notation applications backbone bridging IEEE 802.1Q VLAN switched workgroup ARL (Address Resolution Logic) table how it works viewing 135, 137 ARP (Address Resolution Protocol) auto DoS prevention configuration auto VoIP...
Page 170
Index Flash logs flow control back pressure IEEE802.3x forwarding based on MAC front panel general features getting help hardware installation mounting hardware overview help, web configurator IANA ingress mirror installation freestanding precautions rack-mounting Internet setting up your browser Internet Assigned Numbers AuthoritySee IANA introduction IP address IP address setup...
Page 171
network management network management system (NMS) open, cable fault password pop-up Windows, allowing port details port mirroring 69, 150 port security overview port settings 55, 56 port statistics ports mirroring speed/duplex power connector power supply specifications prioritizing VoIP traffic product registration product specification PVID PVID (Priority Frame)
Page 172
44, 49 LED panel login logout navigation 44, 45 weight of the switch weight, queuing Weighted Round Robin scheduling (WRR) WRR (Weighted Round Robin) scheduling ES-1552 User’s Guide...
Need help?
Do you have a question about the Dimension ES-1552 and is the answer not in the manual?
Questions and answers