In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/ GS-1524/GS-1548 User’s Guide...
Page 4
About This User's Guide web/contact_us.php for contact information. Please have the following information ready when you contact an office. • Product model and serial number. • Warranty Information. • Date that you received your device. • Brief description of the problem and the steps you took to solve it. GS-1524/GS-1548 User’s Guide...
Syntax Conventions • The GS-1524 / GS-1548 may be referred to as the “Switch”, the “device”, or the “system” in this User’s Guide. • Product labels, screen names, field labels and field choices are all in bold font.
Page 6
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The Switch icon is not an exact representation of your device. The Switch Server Telephone Computer Notebook computer DSLAM Firewall Switch Router GS-1524/GS-1548 User’s Guide...
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
Introduction and Hardware Overview ... 17 Getting to Know Your Switch ... 19 Hardware Installation and Connection ... 23 Hardware Overview ... 27 Basic & Advanced Settings ... 33 The Web Configurator ... 35 System ... 43 Port Settings ... 49 System and Port Statistics ...
2.1 Freestanding Installation ... 23 2.2 Mounting the Switch on a Rack ... 24 2.2.1 Rack-mounted Installation Requirements ... 24 2.2.2 Attaching the Mounting Brackets to the Switch ... 24 2.2.3 Mounting the Switch on a Rack ... 25 Chapter 3 Hardware Overview...
Page 12
4.3.2 The Navigation Panel ... 37 4.3.3 Change Your Password 4.4 Saving Your Configuration ... 39 4.5 Switch Lockout ... 40 4.6 Resetting the Switch 4.7 Logging Out of the Web Configurator ... 41 4.8 Help ... 41 Chapter 5 System ... 43 5.1 System Screen ...
Page 14
Table of Contents 14.1 Diagnostics Overview ... 87 Chapter 15 Auto Denial of Service (DoS) ... 89 15.1 About Denial of Service Attacks ... 89 15.1.1 DoS Attacks Summary ... 89 15.2 Global Auto DoS Attack Prevention ... 90 15.3 Advanced Auto DoS Attack Prevention ... 91 Chapter 16 Auto VoIP ...
Page 15
20.4 Adding ARP Table Entries Chapter 21 Troubleshooting... 141 21.1 Power, Hardware Connections, and LEDs ... 141 21.2 Switch Access and Login ... 142 Chapter 22 Product Specifications ... 145 22.1 General Switch Specifications ... 145 Part IV: Appendices and Index ... 151 GS-1524/GS-1548 User’s Guide...
Page 16
Table of Contents Appendix A IP Addresses and Subnetting ... 153 Appendix B Legal Information ... 163 Index... 167 GS-1524/GS-1548 User’s Guide...
The Switch is an ideal solution for small networks where rapid growth can be expected in the near future. The Switch can be used standalone for a group of heavy traffic users. You can connect computers and servers directly to the Switch’s port or connect other switches to the Switch.
(RD and Sales) to the corporate backbone. It can alleviate bandwidth contention and eliminate server and network bottlenecks. All users that need high bandwidth can connect to high-speed department servers via the Switch. You can provide a super-fast uplink connection by using a Gigabit Ethernet/mini-GBIC port on the Switch.
1.1.3 High Performance Switching Example The Switch is ideal for connecting two networks that need high bandwidth. In the following example, use trunking to connect these two networks. Switching to higher-speed LANs such as ATM (Asynchronous Transmission Mode) is not feasible for most people due to the expense of replacing all existing Ethernet cables and adapter cards, restructuring your network and complex maintenance.
Page 22
Shared resources such as a server can be used by all ports in the same VLAN as the server. In the following figure only ports that need access to the server need to be part of VLAN 1. Ports on the Switch can belong to other VLAN groups too. Figure 4 Shared Server Using VLAN Example...
2.1 Freestanding Installation Make sure the Switch is clean and dry. Set the Switch on a smooth, level surface strong enough to support the weight of the Switch and the connected cables. Make sure there is a power outlet nearby.
For proper ventilation, allow at least 4 inches (10 cm) of clearance at the front and 3.4 inches (8 cm) at the back of the Switch. This is especially important for enclosed rack installations. 2.2 Mounting the Switch on a Rack This section lists the rack mounting requirements and precautions and describes the installation steps.
You may now mount the Switch on a rack. Proceed to the next section. 2.2.3 Mounting the Switch on a Rack Position a mounting bracket (that is already attached to the Switch) on one side of the rack, lining up the two screw holes on the bracket with the screw holes on the side of the rack.
H A P T E R This chapter describes the front panel and rear panel of the Switch and shows you how to make the hardware connections. 3.1 Front Panel The figures below show the front panel of the Switch.
An auto-crossover (auto-MDI/MDI-X) port automatically works with a straight- through or crossover Ethernet cable. 3.1.1.1 Default Ethernet Settings The factory default negotiation settings for the Ethernet ports on the Switch are: • Speed: Auto • Duplex: Auto • Flow control: Off 3.1.2 Mini-GBIC Slots...
You can change transceivers while the Switch is operating. You can use different transceivers to connect to Ethernet switches with different types of fiber-optic connectors. • Type: SFP connection interface • Connection speed: 1 Gigabit per second (Gbps) Note: To avoid possible eye injury, do not look into an operating fiber-optic module’s connectors.
Note: When you use the RESET button all of your configuration settings will be lost. Use the default IP address (192.168.1.1) and user name (admin) and password (1234) to log back into the Switch. It may take up to 2 minutes for the Switch to restart when you reload the default configuration file.
Green Green 3.3 Rear Panel The following figures show the rear panels of the AC power input model Switch. The rear panel contains a receptacle for the power cord. The GS-1524’s rear panel also contains the RESET button. Figure 14 GS-1524 Rear Panel Figure 15 GS-1548 Rear Panel 3.3.1 Power Connector...
Make sure you are using the correct power source as shown on the panel. To connect the power to the Switch, insert the female end of the power cord into the power receptacle on the rear panel. Connect the other end of the supplied power cord to a 100~240V AC, 50/60 Hz power outlet capable of supplying at least 0.9A (G-1524) or 1.5A (GS-1548).
Basic & Advanced Settings The Web Configurator (35) System (43) Port Settings (49) System and Port Statistics (53) VLAN (57) Trunking (63) Mirroring (65) QoS (67) Port Rate Limit and Storm Control (77) Layer 2 (L2) Management (83) Cable Diagnostics (87) Auto Denial of Service (DoS) (89) Auto VoIP (93)
Note: This User’s Guide shows screens from the GS-1524, unless otherwise specified. 4.2 System Login Start your web browser. Type “http://” and the IP address of the Switch (for example, the default is 192.168.1.1) in the Location or Address field. Press [ENTER]. GS-1524/GS-1548 User’s Guide...
Chapter 4 The Web Configurator The login screen appears. The default username is admin and the associated default password is 1234. Figure 16 Web Configurator: Login Click Login to view the first web configurator screen. 4.3 The Status Screen The System screen is the first screen that displays when you access the web configurator.
A - The LED panel displays the port status. B - The navigation panel has links to screens that let you configure the Switch’s features. C - The function frame allows you to view and edit individual feature settings. D - Use the Help link to find out more information about the fields in the screen you are configuring.
Page 38
Use this screen to change the system login password Firmware Use this screen to perform firmware upgrades Restart/ Use this screen to reboot the Switch or to restore the default Reset configuration of the Switch. Port Use these screens to view the status and configure settings for individual ports on the Switch.
LINK DESCRIPTION Flash Logs Use this screen to configure logs which are saved to non-volatile memory. These logs can be seen even after the Switch is rebooted. SNMP Use these screens to configure SNMP management settings. Engine ID Use this screen to configure SNMP engine ID.
Switch back to the factory defaults. Use the RESET button to reset the Switch back to factory defaults. Press and hold the RESET button for one second. The Switch will reload its factory defaults.
4.7 Logging Out of the Web Configurator Click Logout in the navigation panel to exit the web configurator. You have to log in with your password again after you log out. This is recommended after you finish a management session for security reasons. Figure 20 Web Configurator: Logout Link 4.8 Help The web configurator’s online help has descriptions of individual screens and some...
Page 42
Chapter 4 The Web Configurator GS-1524/GS-1548 User’s Guide...
LABEL DESCRIPTION Device Name This read-only field displays the name of your Switch. Firmware This field displays the version number of the Switch 's current firmware. Version Click Upgrade to go to the firmware upgrade screen. See page Build Date This field displays the date of the currently installed firmware.
Click this link to create and save a backup configuration file. See settings 5.1.3 on page Restore Click this link to upload an existing configuration file to the Switch. See settings Section 5.1.4 on page 5.1.1 Configure IP Address Use the Configure IP Address screen to set up the IP address manually. The following screen appears when you click the existing IP address in the System >...
“0” to disable L2 table aging. Click Apply to save your configuration changes. 5.1.3 Backup Settings Backing up your Switch configurations allows you to create various “snap shots” of your device from which you may restore at a later date.
Chapter 5 System 5.1.4 Restore Settings Restore a previously saved configuration from your computer to the Switch using the Restore Settings screen. Figure 24 Restore Settings Type the path and file name of the configuration file you wish to restore in the Please select a saved configuration file text box or click Browse to display the Choose File screen from which you can locate it.
5.2 System: Change Password Use the Change Password screen to change the administrator username and password for the Switch. Click System > Password to view the screen as shown. Figure 26 System: Password The following table describes the labels in this screen.
Figure 27 Firmware Upgrade Type the path and file name of the firmware file you wish to upload to the Switch in the File Path text box or click Browse to locate it. After you have specified the file, click Upgrade.
This chapter describes how to view and configure the port settings on the Switch. 6.1 Port Status Use this screen to view Switch port settings. Click Port in the navigation panel to display the Port Status screen. Figure 29 Port Status The following table describes the labels in this screen.
Negotiate control settings with the peer port. If the peer port does not support auto- negotiation or turns off this feature, the Switch determines the connection speed by detecting the signal on the cable and using half duplex mode. Select Disable to configure the port settings manually. When the Switch’s...
Page 51
This priority value is added to incoming frames without a priority queue Priority tag. PVID Enter a number identifying an existing VLAN. The Switch tags the incoming untagged frames on that port so that the frames are forwarded to the VLAN group that the tag defines. Apply Click Apply to save your changes.
Page 52
Chapter 6 Port Settings GS-1524/GS-1548 User’s Guide...
7.2 Statistics Summary Click Statistics in the navigation panel to view the screen as shown. Use this screen to view the traffic counters for the Switch. Figure 31 Statistics GS-1524/GS-1548 User’s Guide...
Clear Click this to reset all counters to zero. Counters Refresh Click this to retrieve the current information from the Switch and update this screen. Port This identifies the Ethernet port. Click a port number to display the Port Details screen (refer to This field shows the number of transmitted frames on this port.
Page 55
The following table describes the labels in this screen. Table 11 Status: Port Details LABEL DESCRIPTION Refresh Click this to retrieve the current information from the Switch and update this screen. Port The following fields display detailed information about packets transmitted. Octets This field shows the number of octets transmitted.
Page 56
Chapter 7 System and Port Statistics Table 11 Status: Port Details (continued) LABEL TotalOctets TotalPkts 64 BytePkts 65-127 BytePkts 128-255 BytePkts 256-511 BytePkts 512-1023 BytePkts 1024-1518 BytePkts DESCRIPTION This is a count of all transmitted/received packets that which exceeded maximum size to receive frame length. This is a count of transmitted/received packets (including bad packets, all unicast, broadcast, multicast and MAC control packets).
A tagged VLAN uses an explicit tag (VLAN ID) in the MAC header to identify the VLAN membership of a frame across bridges - they are not confined to the switch on which they were created. The VLANs can be created statically by hand or dynamically through GVRP.
Chapter 8 VLAN VLAN-aware switch, the Switch first decides where to forward the frame, and then inserts a VLAN tag reflecting the ingress port's default VID. The default PVID is VLAN 1 for all ports, but this can be changed.
The following table describes the labels in this screen. Table 12 VLAN: VLAN Status LABEL DESCRIPTION VLAN ID Select which VLAN you want to configure or click Create New VLAN to go to the new VLAN configuration screen. VLAN Status This table shows you the existing VLANs and their configurations.
U - This indicates that this port is a member of the VLAN. When the packet leaves the member port, the VLAN tag is removed. Create Click Create to add this VLAN to the Switch. Cancel Click Cancel to return to the VLAN status screen without making any changes.
Page 61
DESCRIPTION VLAN ID Select which VLAN you want to configure. Click Remove This VLAN to remove this VLAN from the Switch. Note: VLAN 1 cannot be removed. Display All Click this button to go back to the VLAN status screen.
9.1.1 Distribution Criteria The Switch uses a traffic distribution algorithm to balance traffic between trunk members. The Switch allows you to specify what criterion it should use to calculate the most efficient distribution of traffic. The choices are Source MAC Address (SA), Destination MAC Address (DA) or both (SA + DA).
Chapter 9 Trunking 9.2 Trunk Setting Screen Use this screen to aggregate groups of physical ports into one higher capacity link. Click Trunk Groups in the navigation panel to display the Trunk Setting screen. Figure 36 Trunk Setting The following table describes the labels in this screen. Table 15 Trunking: Configuration LABEL DESCRIPTION...
H A P T E R This chapter discusses port mirroring. 10.1 Port Mirroring Settings Port mirroring allows you to copy traffic flow to a monitor port (the port you copy the traffic to) in order that you can examine the traffic from the mirrored port without interference.
Page 66
Chapter 10 Mirroring Table 16 Mirror Setting (continued) LABEL DESCRIPTION Mirror To The Mirror To (monitor) port is the port you copy the traffic to in order to examine it in more detail without interfering with the traffic flow on the original port(s).
H A P T E R This chapter introduces the quality of service (QoS) parameters you can configure on the Switch. 11.1 QoS Overview QoS is used to help solve performance degradation when there is network congestion. Use the QoS Setting screen to configure queuing algorithms for outgoing traffic.
You can configure the Switch to prioritize traffic even if the incoming packets are not marked with IEEE 802.1p priority tags or change the existing priority tags based on the criteria you select. The Switch allows you to choose one of the following methods for assigning priority to incoming packets on the Switch: Port Based QoS - Assign priority to packets based on the incoming port on the Switch.
11.3 Configuring QoS Use the QoS Setting screen to specify a queuing method and configure queue weights for the Switch. Click QoS in the navigation panel to view the following screen. Figure 38 QoS Setting The following table describes the labels in this screen.
Apply to save your settings to the Switch. 11.4 Advanced QoS Settings The following sections describe additional methods for setting priority for incoming packets on the ports. The Switch allows you to choose one of the following methods: for the queues, configure them with Weighted Round Robin selected first and then change the scheduling method to Strict Priority.
11.4.1 Port Based QoS You can configure the Switch to assign a IEEE 802.1p priority to packets based on the ingress (incoming) port of the packet. Select Port Based QoS in the QoS Enhancement Setting screen to view the following screen.
• Priority - Select the IEEE 802.1p priority you want to assign to the packets coming into the Switch on the port specified in the Port field. Click Change to view your changed settings. Note: The changes are not applied until you click Apply Change Port, This is a summary table of your port to IEEE 802.1p priority mappings.
You can configure the DSCP to IEEE 802.1p mapping to allow the Switch to prioritize all traffic based on the incoming DSCP value according to the DiffServ to IEEE 802.1p mapping table. 11.4.4 DSCP Based QoS Screen You can configure the Switch to assign a IEEE 802.1p priority to packets coming into the Switch with DSCPs assigned to them.
Settings 11.4.5 ToS Based QoS You can configure the Switch to assign a IEEE 802.1p priority to packets coming into the Switch with Type of Service (ToS) priority assigned to them. Select ToS Based QoS in the QoS Enhancement Setting screen to view the following screen.
Settings 11.4.6 IP Address Based QoS You can configure the Switch to assign a higher priority to packets coming into the Switch from specific IP addresses. Select IP Address Based QoS in the QoS Enhancement Setting screen to view the following screen.
Page 76
Mode Select IP Address Based QoS to give higher or lower priority to packets coming into the Switch from a specified source IP address. Add Entry Enter the IP address and the subnet mask of the source whose traffic you want to assign a priority to in the IP and MASK fields respectively.
H A P T E R Port Rate Limit and Storm This chapter shows you how you can manage bandwidth on each port and set up broadcast storm control settings using the Port Rate and Storm Control screens. 12.1 Port Rate Screen Rate control means defining a maximum allowable bandwidth for incoming and/or out-going traffic flows on a port.
Chapter 12 Port Rate Limit and Storm Control The following table describes the related labels in this screen. Table 22 Rate Limit and Storm Control LABEL DESCRIPTION Port This field displays the port number. Click on an individual port number to configure rate limits on that port.
Table 23 Rate Limit Configuration (continued) LABEL DESCRIPTION Tokens The Switch uses a “Token Bucket” algorithm to limit the outgoing rate on Added Per the ports and to limit the largest amount of packets that can leave the port Interval in any one instance.
Page 80
Chapter 12 Port Rate Limit and Storm Control Click Rate > Storm Control in the navigation panel to display the screen as shown next. Figure 46 Broadcast Storm Control GS-1524/GS-1548 User’s Guide...
Page 81
Storm Control Select the number of packets (of the type specified in the Storm Control Rate Type field) per second the Switch can receive per second. Apply Click Apply to save your changes. GS-1524/GS-1548 User’s Guide...
Page 82
Chapter 12 Port Rate Limit and Storm Control GS-1524/GS-1548 User’s Guide...
H A P T E R Layer 2 (L2) Management Use these screens to add, delete and view entries in the Layer 2 (L2) address table. 13.1 Configuring L2 Management Layer 2 (L2) management refers to management based on the Media Access Control (MAC) address of networking devices.
Chapter 13 Layer 2 (L2) Management Table 25 L2 Management (continued) LABEL DESCRIPTION Item This is the index number of the static MAC address entry. Source MAC This field displays the MAC address of a manually entered MAC address entry. This field displays the VID of a manually entered MAC address entry.
HOST if its the entry for the Switch itself. Type This field displays whether this entry was entered manually into the L2 address table - static or whether it was learned by the Switch - dynamic. Previous Use these navigation links to browse all L2 learned entries.
14.1 Diagnostics Overview The cable diagnostics function works with systems using CAT-5 twisted-pair cables. The Switch can perform basic cable diagnostics. Click Cable Diagnostic in the navigation panel to view the screen as shown. Figure 50 Cable Diagnostic The following table describes the labels in this screen.
Page 88
This field displays the whether the twisted pair has a good connection - Ok, or it displays the type of fault the Switch has detected: Open, Short or Short-between-pair. It also displays the length of total twisted pair length or the distance to the detected fault depending whether the cable tested Ok or a fault was found.
The Switch has features which automatically detect and thwart currently known DoS attacks. 15.1.1 DoS Attacks Summary The following table summarizes the types of attacks the Switch can prevent. Table 29 DoS Attack Summary ATTACK...
15.2 Global Auto DoS Attack Prevention Use the Global Auto DoS Attack Prevention screen to configure DoS attack prevention settings for the Switch. Click Auto DoS in the navigation panel to open the following screen. Figure 51 Global Auto DoS Attack Prevention The following table describes the labels in this screen.
For Ping and SYN/SYN-ACK Flooding attacks you can specify thresholds for triggering the dropping of packets by the Switch. Select: • 64 kbps - the Switch will drop packets when the rate of incoming Ping or SYN/SYN-ACK packets reaches this limit. •...
Page 92
Chapter 15 Auto Denial of Service (DoS) GS-1524/GS-1548 User’s Guide...
H A P T E R This chapter shows you how to give higher priority to Voice over Internet Protocol (VoIP) packets over other data packets as they pass through the Switch. 16.1 About Auto VoIP Voice over Internet Protocol (VoIP) allows telephone calls to be made over a data network like the Internet.
16.2 Auto VoIP Settings Use the Auto VoIP Settings to enable automatic assignment of high priority to VoIP packets passing through the Switch. Click Auto VoIP in the navigation panel to view the following screen. Figure 53 Auto VoIP Settings The following table describes the labels in this screen.
17.1 Event Logging Overview You can configure the Switch to save specific events in different log targets: RAM - This log is saved into the Switch’s volatile memory. The logs are cleared when the Switch is rebooted. Flash - This log is saved into the switch’s non-volatile memory. You can view the logs even after the switch is rebooted.
Add Server Click this to configure a new syslog server. Logging Click the RAM or Flash link to view the logs stored on the Switch. Target Use the columns on the right to select the types of system events each logging target should record.
The log facility allows you to send logs to different files in the syslog server. Refer to the documentation of your syslog server for more details. Click Add to save this entry to the Switch and return to the Logging screen.
Page 100
Index This field indicates the index number of the log. This number doesn’t change even if some logs are deleted from the Switch due to memory limits. The index number increments by one for each recorded event. The largest number represents the most recent log event.
Page 101
Service features you set up and the category SYSTEM records events which deal with the overall operation of the Switch. Time This field specifies the time when the Switch recorded the log event. The Switch resets its internal clock when it is restarted. Message This field displays an explanation for the log entry.
Chapter 17 Event Logging 17.5 Searching RAM and Flash Logs Use these screens to search RAM and Flash logs based on level and category. Click the Search link in the Logs - RAM or Logs - Flash screen to view the screen as shown.
• Error - to search system failures, such as events which will cause the Switch to malfunction and events such as invalid user input in the web configurator. • Warning - to search non critical errors on the Switch. The Switch will continue to function when warnings are recorded.
Page 104
Index This field indicates the index number of the log. This number doesn’t change even if some logs are deleted from the Switch due to memory limits. The index number increments by one for each recorded event. The largest number represents the most recent log event.
TCP/IP-based devices. SNMP is used to exchange management information between the network management system (NMS) and a network element (NE). A manager station can manage and monitor the Switch through the network via SNMP version one (SNMPv1), SNMP version 2c or SNMP version 3.
Used by the agent to inform the manager of some events. 18.1.1 Supported MIBs MIBs let administrators collect statistics and monitor status and performance. The Switch supports the following MIBs: • RFC 1213 SNMP MIB II • MIB II - System •...
18.1.2 SNMP Traps The Switch sends traps to an SNMP manager when an event occurs. SNMP traps supported are outlined in the following table. Table 39 SNMP Traps OBJECT LABEL OBJECT ID SNMPv1/SNMPv2 Trap/Inform Requests: authenticationFailure 1.3.6.1.6.3.1.1.5.5 RFC2819 Traps 1.3.6.1.2.1.16.3.1.1 (alarmEntry) 18.1.3 SNMP v3 and Authentication...
DESCRIPTION Engine ID Select this radio button and enter a unique Engine ID for the Switch. The format is limited to hexadecimal characters (0~9 and a~f) and the maximum length is 27 octets (each octet is made up of a pair of hexadecimal characters).
Write - select Enabled to allow this group to create or edit MIBs. Create Click this to add this SNMP group to the Switch. Note: A maximum of ten groups can be created on the Switch. Cancel Click this to go back to the main SNMP Group screen without saving your changes.
Group Name Edit the name for this SNMP group. SNMP Version Specify the SNMP version this group uses to manage the Switch. Authenticatio This field is only editable if you select SNMPv3 in the SNMP Version field. Select Enabled to force SNMP v3 groups to authenticate with the Switch or select Disabled to deactivate authentication for the SNMP v3 groups.
Page 111
Switch. Use the SNMP User screen to create SNMP users and associate them to SNMP groups. Click SNMP > User to view the screen as shown. Figure 64 SNMP User The following table describes the labels in this screen. Table 44 SNMP User...
MD5 and configure the Key field to force this user to authenticate with the Switch. Enter the MD5 key this user must use to authenticate with the Switch. You can use 1-8 printable ASCII characters. Spaces are allowed but trailing spaces are truncated.
Group Name Select the SNMP group this user should belong to. SNMP Version Specify the SNMP version this group uses to manage the Switch. Auth Type Authentication can only be configured for SNMP v3. Select None to allow this user to manage the Switch without authentication or select MD5 and configure the New Key field to force this user to authenticate with the Switch.
Chapter 18 SNMP 18.4 SNMP Community SNMP communities act like passwords and are used to define the security parameters of SNMP clients in an SNMP v1 and SNMP v2c environments. The default SNMP community is “public” for both SNMP v1 and SNMP v2c before SNMP v3 is enabled.
Group Name Select the SNMP group you want to belong to this community. Create Click this to add this SNMP community to the Switch. Cancel Click this to go back to the main SNMP Community screen without saving your changes.
Click this to save your settings to the Switch. 18.5 SNMP Notification SNMP supports a notification mechanism to alert SNMP managers when events occur. There are two types of notification mechanisms supported by the Switch. • SNMP Notification - SNMP traps are sent to external SNMP management stations.
Notification Switch will send a trap (notification). Apply Click this to save your settings to the Switch. 18.6 SNMP Trap Station SNMP traps are used to send out SNMP notifications of urgent or normal events in the system to external management stations. Use the SNMP Trap Station screen GS-1524/GS-1548 User’s Guide...
Page 118
Chapter 18 SNMP to enable the sending of SNMP traps to a remote SNMP management station(s). Click SNMP > Trap Station to view the screen as shown. Figure 71 SNMP Trap Station The following table describes the labels in this screen. Table 51 SNMP Trap Station LABEL DESCRIPTION...
Community Specify the community string used with this remote trap station. String Create Click this to add this SNMP user to the Switch. Cancel Click this to go back to the main SNMP Group screen without saving your changes. 18.6.2 SNMP Trap Station: Modify...
Page 120
Remote IP Enter the IP address of the remote trap station in dotted decimal Address notation. Community Specify the community string used with this remote trap station. String Apply Click this to save your settings to the Switch. GS-1524/GS-1548 User’s Guide...
• Group 3 (Alarm) • Group 9 (Event) The Switch’s implementation is therefore referred to as RMON-Lite. The following sections describe how to configure the RMON-Lite settings on the Switch. Refer to RFC 2819 for more information on RMON MIBs. GS-1524/GS-1548 User’s Guide...
Click this to update all the fields in the RMON-Lite Statistics: Overview screen. Data Source This field displays the ports on the Switch. Click on the port number to configure the settings for that port. Owner This field displays the entry creator. It displays monitor if the entry was created by the Switch itself.
19.3 RMON-Lite Statistics: Port Use this screen to enable statistics gathering and view the statistics for individual ports. Click on a port number in the RMON Statistics: Overview screen to view the screen as shown. Figure 75 RMON Statistics: Port The following table describes the labels in this screen.
Chapter 19 RMON-Lite Table 55 RMON Statistics: Port (continued) LABEL StatsMulticastPkts StatsCRCAlignErrors StatsUndersizePkts StatsOversizePkts StatsFragments StatsJabbers StatsCollisions StatsPkts64Octets StatsPkts65to127Octets StatsPkts128to255Octets StatsPkts256to511Octets StatsPkts512to1023Octet StatsPkts1024to1518Octe Statistics Overview 19.4 RMON-Lite History MIB RMON-Lite History MIB configuration is divided into two parts: [2] History Control and [2] History Statistics.
Overview screen. Index This field displays the configuration index number. Data Source This is the port of the Switch polled for data. Bucket This field displays the number of data samplings the network manager Requested requests the probe to store.
DESCRIPTION Owner This field displays the entry creator. It displays “monitor” if the entry was created by the Switch itself. Status This field displays Enabled if historical polling is activated on the port. It displays Disabled if historical polling is not activated on the port.
This field displays the configuration index number. Click on the index Control Index number to view the details for this entry. Data Source This is the port of the Switch polled for data. Bucket This field displays the number of data samplings the probe allows to Granted store.
Chapter 19 RMON-Lite 19.4.4 RMON History Statistics: Control Use the RMON History Statistics: Control screen to view the details of each polling sample collected for the history control index entries you configured. Click on an individual History Control Index entry in the RMON History Statistics: Overview screen to view the screen as shown.
Table 59 RMON History Statistics: Control (continued) LABEL DESCRIPTION Undersize This field displays the number of packets (including bad packets) received Packets in this polling sample that were between 0 and 64 octets in length. Oversize This field displays the number of untagged packets (including bad Packets packets) received in this polling sample that were greater than 1518 octets in length.
Chapter 19 RMON-Lite The following table describes the labels in this screen. Table 60 RMON Alarm: Overview LABEL DESCRIPTION RMON MIB Use this drop down list box to select the MIB table you want to view. Table: Click Apply to refresh the screen to the selected MIB table view. Refresh Click this to update all the fields in the RMON Alarm: Overview screen.
Page 131
Note: The RMON Alarm: Modify screen contains the same fields as the RMON Alarm: Create New Alarm screen in the following figure. Figure 81 RMON Alarm: Create New Alarm The following table describes the labels in this screen. Table 61 RMON Alarm: Create New Alarm LABEL DESCRIPTION RMON MIB...
Community This field displays the community or SNMP trap. Last Time This field indicates the value of system up time on the Switch when this Sent event was last generated. It appears in the following format “XXD: XXH: XXM: XXS”, where “XX” stands for a number and “D” stands for days, “H”...
19.6.1 RMON Event: Create New Event Use the RMON Event: Create and the RMON Event: Modify screens to configure RMON events. Click Create new Event in the RMON Event: Overview screen to view the screen as shown. You can also click an event index number in the RMON Event: Overview screen to edit an existing event configuration.
19.7 RMON Event Log: Overview Use the RMON Event Log: Overview screen to view the event log entries generated on the Switch. All the entries in this table are generated by the RMON- Lite probe when the event value meets the risingEventThreshold or fallingEventThreshold assigned in the RMON Alarm screens.
LABEL DESCRIPTION Last Time This field indicates the value of system up time on the Switch when this Sent event was last generated. It appears in the following format “XXD: XXH: XXM: XXS”, where “XX” stands for a number and “D” stands for days, “H”...
The ARP table is populated with MAC and corresponding IP address mappings in two different ways. • DHCP Snooping - The Switch listens to traffic from a DHCP server on a trusted port and learns IP-to-MAC address bindings by parsing DHCP ACK packets.
Table 66 ARP Table LABEL DESCRIPTION Enable Select or deselect this to activate or deactivate Dynamic ARP on the Switch. Dynamic Note: You must activate dynamic ARP first if you want to add static Aging Time Specify how long (in hours) the Switch remembers the learned ARP table entries.
This is the MAC address of the device connected to the Switch with the Address corresponding IP address below. IP Address This is the learned IP address of a device connected to a Switch port with corresponding MAC address above. VLAN This is the VLAN number of the device connected to the Switch.
Table 68 ARP Table LABEL DESCRIPTION Enter the MAC address in 6 pair hexadecimal format of the network device Address you want to be allowed to communicate via the Switch. An example entry (XX-XX-XX- of a MAC address is “0a-b1-c2-d3-e4-f5”. XX-XX-XX) IP Address Enter the corresponding IP address (in dotted decimal notation, ex 192.168.1.5) of the network device you want to be allowed to...
Make sure you are using the power adaptor or cord included with the Switch. Make sure the power adaptor or cord is connected to the Switch and plugged in to an appropriate power source. Make sure the power source is turned on.
Make sure your Internet browser does not block pop-up windows and has JavaScripts and Java enabled. Make sure your computer is in the same subnet as the Switch. (If you know that there are routers between your computer and the Switch, skip this step.) I forgot the IP address for the Switch.
Page 143
Reset the device to its factory defaults, and try to access the Switch with the default IP address. See If the problem continues, contact the vendor, or try one of the advanced suggestions. Advanced Suggestions Try to access the Switch using another service, such as Telnet. If you can access the Switch, check the remote management settings to find out why the Switch does not respond to HTTP.
H A P T E R Product Specifications This chapter gives details about your Switch’s hardware and firmware features. 22.1 General Switch Specifications The following tables list the product specifications. Table 69 Physical and Environmental Specifications LEDs Per Switch: PWR...
Page 146
Chapter 22 Product Specifications Table 70 General Product Specifications Interface Layer 2 Bridging Features Switching GS-1524: 20 1000BASE-T RJ-45 Gigabit Ethernet ports GS-1548: 44 1000BASE-T RJ-45 Gigabit Ethernet ports 4 Dual-personality interfaces, each consisting of one 1000BASE-T RJ- 45 Gigabit Ethernet port and one Mini-GBIC (Small Form-Factor Pluggable (SFP) slot.
Page 147
Table 70 General Product Specifications (continued) Layer 2 VLAN Tag-based (IEEE 802.1Q) VLAN Features Number of VLAN: 4K, 256 static maximum Port Supports static port trunking Aggregation Six groups (up to 8 ports each) Port All ports support port mirroring mirroring Rate control Supports rate limiting from 64 Kbps to 1 Gbps on a port by port basis...
Page 148
Use the web configurator to easily configure the rich range of features on the Switch. Download new firmware (when available) from the ZyXEL web site and use the web configurator to put it on the Switch. Note: Only upload firmware for your specific model! Make a copy of the Switch’s configuration and put it back on...
Page 149
Use this feature to inspect the Ethernet cables connected to the Switch for shorts, open faults or shorts-between-pairs. The Switch allows you to specify what information should be logged and where it should be stored. It supports internal logging as well as external logging via a syslog server.
P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
Appendix A IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 89 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Page 155
Table 73 Subnet Mask Example Network Number Host ID By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1”...
Page 156
Appendix A IP Addresses and Subnetting As these two IP addresses cannot be used for individual hosts, calculate the maximum number of possible hosts in a network as follows: Table 75 Maximum Host Numbers SUBNET MASK 8 bits 255.0.0.0 16 bits 255.255.0.0 24 bits 255.255.255.0...
Page 157
Appendix A IP Addresses and Subnetting In this example, the company network address is 192.168.1.0. The first three octets of the address (192.168.1) are the network number, and the remaining octet is the host ID, allowing a maximum of 2 –...
Page 158
Appendix A IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 91 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of –...
Page 159
Each subnet contains 6 host ID bits, giving 2 host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 77 Subnet 1 IP/SUBNET MASK IP Address (Decimal) IP Address (Binary) Subnet Mask (Binary) Subnet Address: 192.168.1.0 Broadcast Address:...
Page 160
Appendix A IP Addresses and Subnetting Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet. Table 81 Eight Subnets SUBNET SUBNET ADDRESS...
You must also enable Network Address Translation (NAT) on the Switch. Once you have decided on the network number, pick an IP address for your Switch that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network is using that IP address.
Page 162
Appendix A IP Addresses and Subnetting Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks: •...
Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice.
Page 164
This device has been tested and found to comply with the limits for a Class A digital switch, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment.
(at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
Page 166
Appendix B Legal Information GS-1524/GS-1548 User’s Guide...
Page 167
adding VLANs Address Resolution Logic (ARL) table Address Resolution Protocol (ARP) alternative subnet mask notation applications backbone bridging IEEE 802.1Q VLAN switched workgroup ARL (Address Resolution Logic) table how it works viewing 138, 139, 140 ARP (Address Resolution Protocol) auto DoS prevention configuration auto VoIP configuration...
Page 168
Index firmware upgrade firmware version flow control back pressure IEEE802.3x forwarding based on MAC front panel general features getting help hardware installation mounting hardware overview help, web configurator IANA ingress mirror installation freestanding precautions rack-mounting Internet Assigned Numbers Authority See IANA introduction IP address IP address setup...
Page 169
network management network management system (NMS) open, cable fault password port details port mirroring 65, 146, 147 port security overview port settings 49, 50 port statistics ports mirroring speed/duplex power connector power supply specifications prioritizing VoIP traffic product registration product specification PVID PVID (Priority Frame) 146, 147...
Page 170
36, 43 LED panel login logout navigation weight of the switch weight, queuing Weighted Round Robin scheduling (WRR) WRR (Weighted Round Robin) scheduling 36, 37 GS-1524/GS-1548 User’s Guide...
Need help?
Do you have a question about the Dimension GS-1548 and is the answer not in the manual?
Questions and answers