• Supporting Disk Refer to the included CD for support documents. • ZyXEL Web Site Please refer to www.zyxel.com for additional support documentation and product certifications. User Guide Feedback Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
Page 5
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The Switch icon is not an exact representation of your device. The Switch Computer Notebook computer Server DSLAM Firewall Telephone Router ES-315/ES-315-F User’s Guide...
Safety Warnings Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. •...
Contents Overview Contents Overview Introduction and Hardware ....................21 Getting to Know Your Switch ..................... 23 Hardware Overview ........................27 Basic Configuration ....................... 31 The Web Configurator ....................... 33 Initial Setup Example ......................... 39 System Status and Port Statistics ....................43 Basic Setting ..........................
Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions......................4 Safety Warnings........................6 Contents Overview ........................9 Table of Contents........................11 List of Figures ......................... 17 List of Tables........................... 19 Part I: Introduction and Hardware ............21 Chapter 1 Getting to Know Your Switch....................
Page 12
Table of Contents 3.4 Saving Your Configuration ....................37 3.5 Switch Lockout ........................37 3.6 Resetting the Switch ......................38 3.7 Logging Out of the Web Configurator ................. 38 3.8 Help ........................... 38 Chapter 4 Initial Setup Example......................39 4.1 Overview ..........................39 4.1.1 Creating a VLAN ......................
Page 13
Table of Contents Chapter 8 Static MAC Forward Setup ..................... 63 8.1 Overview ..........................63 8.2 Configuring Static MAC Forwarding ................63 Chapter 9 Filtering............................ 65 9.1 Configure a Filtering Rule ....................65 Chapter 10 Broadcast Storm Control ....................... 67 10.1 Broadcast Storm Control Setup ..................
Page 14
Table of Contents Part IV: IP Application................85 Chapter 14 Static Route ..........................87 14.1 Static Routing Overview ....................87 14.2 Configuring Static Routing ....................87 Part V: Management................91 Chapter 15 Maintenance ..........................93 15.1 The Maintenance Screen ....................93 15.2 Load Factory Default ......................
Page 15
Table of Contents 16.8.3 The Main Screen ....................109 16.9 Service Port Access Control ..................109 16.10 Remote Management ....................110 Chapter 17 Diagnostic..........................113 17.1 Diagnostic ........................113 Chapter 18 Syslog ............................ 115 18.1 Syslog Overview .......................115 18.2 Syslog Setup ........................115 18.3 Syslog Server Setup ......................116 Chapter 19 MAC Table..........................
Page 16
Table of Contents Appendix B Common Services..................... 149 Appendix C Legal Information ....................153 Appendix D Customer Support..................... 157 Index............................163 ES-315/ES-315-F User’s Guide...
List of Figures List of Figures Figure 1 Internet Access through the Switch ..................23 Figure 2 Shared Server Using VLAN Example ..................24 Figure 3 Front Panel: ES-315 ........................ 27 Figure 4 Front Panel: ES-315-F ......................27 Figure 5 Rear Panel: ES-315 ........................ 28 Figure 6 Rear Panel: ES-315-F ......................
Page 18
List of Figures Figure 39 MVR Configuration Example ....................83 Figure 40 MVR Group Configuration Example ..................83 Figure 41 MVR Group Configuration Example ..................84 Figure 42 Static Routing Overview ......................87 Figure 43 Static Routing ........................88 Figure 44 Maintenance ......................... 93 Figure 45 Load Factory Default: Start ....................
H A P T E R Getting to Know Your Switch This chapter introduces the main features and applications of the Switch. 1.1 Introduction The ES-315 and ES-315-F are intelligent layer 2 Ethernet switches. • The ES-315 has four 10/100Mbps LAN ports and one 10/100Mbps WAN port. •...
Chapter 1 Getting to Know Your Switch 1.1.2.1 Tag-based VLAN Example Ports in the same VLAN group share the same frame broadcast domain, and thus increase network performance due to reduced broadcast traffic. VLAN groups can be modified at any time by adding, moving or changing ports without any re-cabling.
Page 25
Chapter 1 Getting to Know Your Switch • Back up the configuration (and make sure you know how to restore it). Restoring an earlier working configuration may be useful if the device becomes unstable or even crashes. If you forget your password, you will have to reset the Switch to its factory default settings.
Page 26
Chapter 1 Getting to Know Your Switch ES-315/ES-315-F User’s Guide...
H A P T E R Hardware Overview This section describes the front and rear panels of the switch. See your Quick Start Guide for information on making hardware connections. 2.1 LEDs The following figures show the front panels of the ES-315 and ES-315-F. Figure 3 Front Panel: ES-315 Figure 4 Front Panel: ES-315-F ES-315/ES-315-F User’s Guide...
Chapter 2 Hardware Overview The following table describes the Switch’s LEDs. Table 1 LED Descriptions STATUS DESCRIPTION PWR/ Green The Switch is receiving power. The Switch is not receiving power. The Switch is malfunctioning. The Switch is functioning normally, or is not receiving power. LAN1 ~ Steady The Switch has a successful Ethernet connection on the respective...
H A P T E R The Web Configurator This section introduces the configuration and functions of the web configurator. 3.1 Introduction The web configurator is an HTML-based management interface that allows easy Switch setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions.
Chapter 3 The Web Configurator Figure 8 Web Configurator: Login 4 Click OK to view the first web configurator screen. 3.3 The Status Screen The Status screen is the first screen that displays when you access the web configurator. The following figure shows the navigating components of a web configurator screen. Figure 9 Web Configurator Home Screen (Status) B C D E A - Click the menu items to open submenu links, and then click on a submenu link to open the...
Chapter 3 The Web Configurator E - Click this link to display web help pages. The help pages provide descriptions for all of the configuration screens. In the navigation panel, click a main link to reveal a list of submenu links. Table 2 Navigation Panel Sub-links Overview ADVANCED BASIC SETTING...
Chapter 3 The Web Configurator Table 4 Navigation Panel Links (continued) LINK DESCRIPTION Switch Setup This link takes you to a screen where you can set up priority queues. IP Setup This link takes you to a screen where you can configure the IP address, subnet mask (necessary for Switch management) and DNS (domain name server).
Chapter 3 The Web Configurator Figure 10 Change Administrator Login Password 3.4 Saving Your Configuration When you are done modifying the settings in a screen, click Apply to save your changes to the run-time memory. Settings in the run-time memory are lost when the Switch’s power is turned off.
Chapter 3 The Web Configurator Be careful not to lock yourself and others out of the Switch. If you do lock yourself out, you will have to reset the Switch. 3.6 Resetting the Switch If you lock yourself (and others) from the Switch or forget the administrator password, you will need to reset the Switch back to the factory defaults.
H A P T E R Initial Setup Example This chapter shows how to set up the Switch for an example network. 4.1 Overview The following lists the configuration steps for the initial setup: • Create a VLAN • Set port VLAN ID •...
Chapter 4 Initial Setup Example 1 Click Advanced Application and VLAN in the navigation panel and click the Static VLAN link. 2 In the Static VLAN screen, select ACTIVE, enter a descriptive name in the Name field and enter 2 in the VLAN Group ID field for the VLAN2 network.
Chapter 4 Initial Setup Example Figure 13 Initial Setup Network Example: Port VID 1 Click Advanced Applications and VLAN in the navigation panel. Then click the VLAN Port Setting link. 2 Enter 2 in the PVID field for port 1 and click Apply to save your changes back to the run- time memory.
Page 42
Chapter 4 Initial Setup Example 2 Open your web browser and enter 192.168.1.1 (the default IP address) in the address bar to access the web configurator. See Section 3.2 on page 33 for more information. 3 Click Basic Setting and IP Setup in the navigation panel.
H A P T E R System Status and Port Statistics This chapter describes the system status (web configurator home page) and port details screens. 5.1 Overview The home screen of the web configurator displays a port summary with links to each port showing statistical details.
Chapter 5 System Status and Port Statistics Table 5 Status (continued) LABEL DESCRIPTION State This field displays FORWARDING if the link is up, otherwise, it displays STOP. TxPkts This field shows the number of transmitted frames on this port. RxPkts This field shows the number of received frames on this port.
Chapter 5 System Status and Port Statistics The following table describes the labels in this screen. Table 6 Status: Port Details LABEL DESCRIPTION Port Info Port NO. This field displays the port number you are viewing. Name This field displays the name of the port. Link This field displays the speed (either 10M for 10Mbps or 100M for 100Mbps and the duplex (F for full duplex or H for half duplex).
Page 46
Chapter 5 System Status and Port Statistics Table 6 Status: Port Details (continued) LABEL DESCRIPTION Runt This field shows the number of packets received that were too short (shorter than 64 octets), including the ones with CRC errors. Distribution This field shows the number of packets (including bad packets) received that were 64 octets in length.
H A P T E R Basic Setting This chapter describes how to configure the System Info, General Setup, Switch Setup, IP Setup and Port Setup screens. 6.1 Overview The System Info screen displays general Switch information (such as firmware version number).
Chapter 6 Basic Setting 6.3 General Setup Use this screen to configure general settings such as the system name and time. Click Basic Setting > General Setup in the navigation panel to display the screen as shown. Figure 18 Basic Setting > General Setup The following table describes the labels in this screen.
Chapter 6 Basic Setting Table 8 Basic Setting > General Setup (continued) LABEL DESCRIPTION New Date (yyyy- Enter the new date in year, month and day format. The new date then appears in mm-dd) the Current Date field after you click Apply. Time Zone Select the time difference between UTC (Universal Time Coordinated, formerly known as GMT, Greenwich Mean Time) and your time zone from the drop-down list...
Chapter 6 Basic Setting Figure 19 Basic Setting > Switch Setup The following table describes the labels in this screen. Table 9 Basic Setting > Switch Setup LABEL DESCRIPTION Priority Queue Assignment IEEE 802.1p defines up to eight separate traffic types by inserting a tag into a MAC-layer frame that contains bits to define class of service.
Chapter 6 Basic Setting 6.6 IP Setup Use the IP Setup screen to configure the switch IP address, default gateway device, the default domain name server and the management VLAN ID. The default gateway specifies the IP address of the default gateway (next hop) for outgoing traffic. 6.6.1 Management IP Addresses The switch needs an IP address for it to be managed over the network.
Chapter 6 Basic Setting The following table describes the labels in this screen. Table 10 IP Setup LABEL DESCRIPTION Domain Name DNS (Domain Name System) is for mapping a domain name to its Server corresponding IP address and vice versa. Enter a domain name server IP address in order to be able to use a domain name instead of an IP address.
Chapter 6 Basic Setting Table 10 IP Setup (continued) LABEL DESCRIPTION Delete Check the management IP addresses that you want to remove in the Delete column, then click the Delete button. Cancel Click Cancel to clear the selected checkboxes in the Delete column. 6.7 Port Setup Use this screen to configure Switch port settings.
Page 54
Chapter 6 Basic Setting Table 11 Basic Setting > Port Setup (continued) LABEL DESCRIPTION Speed/Duplex Select the speed and the duplex mode of the Ethernet connection on this port. Choices are Auto, 10M/Half Duplex, 10M/Full Duplex, 100M/Half Duplex and 100M/Full Duplex. Selecting Auto (auto-negotiation) allows one port to negotiate with a peer port automatically to obtain the connection speed and duplex mode that both ends support.
H A P T E R VLAN This chapter shows you how to configure 802.1Q tagged VLANs. 7.1 Introduction to IEEE 802.1Q Tagged VLANs A tagged VLAN uses an explicit tag (VLAN ID) in the MAC header to identify the VLAN membership of a frame across bridges - they are not confined to the switch on which they were created.
Chapter 7 VLAN 7.2 Static VLAN Use a static VLAN to decide whether an incoming frame on a port should be • sent to a VLAN group as normal depending on its VLAN tag. • sent to a group whether it has a VLAN tag or not. •...
Chapter 7 VLAN Figure 23 Advanced Application > VLAN > VLAN Detail The following table describes the labels in this screen. Table 13 Advanced Application > VLAN > VLAN Detail LABEL DESCRIPTION VLAN Status Click this to go to the VLAN Status screen. This is the VLAN identification number that was configured in the Static VLAN screen.
Chapter 7 VLAN Figure 24 Advanced Application > VLAN > Static VLAN The following table describes the related labels in this screen. Table 14 Advanced Application > VLAN > Static VLAN LABEL DESCRIPTION ACTIVE Select this check box to activate the VLAN settings. Name Enter a descriptive name for the VLAN group for identification purposes.
Chapter 7 VLAN Table 14 Advanced Application > VLAN > Static VLAN (continued) LABEL DESCRIPTION This field displays the ID number of the VLAN group. Click the number to edit the VLAN settings. Active This field indicates whether the VLAN settings are enabled (Yes) or disabled (No). Name This field displays the descriptive name for this VLAN group.
Page 62
Chapter 7 VLAN Table 15 Advanced Application > VLAN > VLAN Port Setting (continued) LABEL DESCRIPTION Acceptable Specify the type of frames allowed on a port. Choices are All, Tag Only and Untag Frame Type Only. Select All from the drop-down list box to accept all untagged or tagged frames on this port.
H A P T E R Static MAC Forward Setup Use these screens to configure static MAC address forwarding. 8.1 Overview This chapter discusses how to configure forwarding rules based on MAC addresses of devices on your network. 8.2 Configuring Static MAC Forwarding A static MAC address is an address that has been manually entered in the MAC address table.
Page 64
Chapter 8 Static MAC Forward Setup Table 16 Advanced Application > Static MAC Forwarding (continued) LABEL DESCRIPTION MAC Address Enter the MAC address in valid MAC address format, that is, six hexadecimal character pairs. Note: Static MAC addresses do not age out. Enter the VLAN identification number.
H A P T E R Filtering This chapter discusses MAC address port filtering. 9.1 Configure a Filtering Rule Filtering means sifting traffic going through the Switch based on the source MAC address and VLAN group (ID). Click Advanced Application > Filtering in the navigation panel to display the screen as shown next.
Page 66
Chapter 9 Filtering Table 17 Advanced Application > FIltering (continued) LABEL DESCRIPTION Click Add to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
H A P T E R Broadcast Storm Control This chapter introduces and shows you how to configure the broadcast storm control feature. 10.1 Broadcast Storm Control Setup Broadcast storm control limits the number of broadcast packets the Switch receives per second on the ports.
Page 68
Chapter 10 Broadcast Storm Control Table 18 Advanced Application > Broadcast Storm Control (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
H A P T E R Bandwidth Control This chapter shows you how you can cap the maximum bandwidth using the Bandwidth Control screen. 11.1 Bandwidth Control Overview Bandwidth control means defining a maximum allowable bandwidth for incoming and/or out- going traffic flows on a port.
Page 70
Chapter 11 Bandwidth Control Table 19 Advanced Application > Bandwidth Control (continued) LABEL DESCRIPTION Settings in this row apply to all ports. Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
H A P T E R Queuing Method This chapter introduces the queuing methods supported. 12.1 Queuing Method Overview Queuing is used to help solve performance degradation when there is network congestion. Use the Queuing Method screen to configure queuing algorithms for outgoing traffic. See also Priority Queue Assignment in the Basic >...
Chapter 12 Queuing Method 12.2 Configuring Queuing Click Advanced Application > Queuing Method in the navigation panel. Figure 30 Queuing Method The following table describes the labels in this screen. Table 20 Queuing Method LABEL DESCRIPTION Port This label shows the port you are configuring. Method Select SPQ (Strict Priority Queuing) or WFQ (Weighted Fair Queueing).
H A P T E R Multicast This chapter shows you how to configure various multicast features. 13.1 Multicast Overview Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender to 1 recipient) or Broadcast (1 sender to everybody on the network). Multicast delivers IP packets to just a group of hosts on the network.
Chapter 13 Multicast The Switch forwards multicast traffic destined for multicast groups (that it has learned from IGMP snooping) to ports that are members of that group. IGMP snooping generates no additional network traffic, allowing you to significantly reduce multicast traffic passing through your Switch.
Chapter 13 Multicast Figure 32 Advanced Application > Multicast > Multicast Setting The following table describes the labels in this screen. Table 22 Advanced Application > Multicast > Multicast Setting LABEL DESCRIPTION IGMP Snooping Use these settings to configure IGMP Snooping. Active Select Active to enable IGMP Snooping to forward group multicast traffic only to ports that are members of that group.
Chapter 13 Multicast Table 22 Advanced Application > Multicast > Multicast Setting (continued) LABEL DESCRIPTION Immed. Leave Select this option to set the Switch to remove this port from the multicast tree when an IGMP version 2 leave message is received on this port. Select this option if there is only one host connected to this port.
Chapter 13 Multicast Figure 33 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile The following table describes the labels in this screen. Table 23 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile LABEL DESCRIPTION Profile Name Enter a descriptive name for the profile for identification purposes.
Chapter 13 Multicast MVR allows one single multicast VLAN to be shared among different subscriber VLANs on the network. While isolated in different subscriber VLANs, connected devices can subscribe to and unsubscribe from the multicast stream in the multicast VLAN. This improves bandwidth utilization with reduced multicast traffic in the subscriber VLANs and simplifies multicast group management.
Chapter 13 Multicast When the subscriber selects a television channel, computer A sends an IGMP report to the Switch to join the appropriate multicast group. If the IGMP report matches one of the configured MVR multicast group addresses on the Switch, an entry is created in the forwarding table on the Switch.
Chapter 13 Multicast Figure 36 Advanced Application > Multicast > Multicast Setting > MVR The following table describes the related labels in this screen. Table 24 Advanced Application > Multicast > Multicast Setting > MVR LABEL DESCRIPTION Active Select this check box to enable MVR to allow one single multicast VLAN to be shared among different subscriber VLANs on the network.
Chapter 13 Multicast Table 24 Advanced Application > Multicast > Multicast Setting > MVR (continued) LABEL DESCRIPTION None Select this option to set the port not to participate in MVR. No MVR multicast traffic is sent or received on this port. Tagging Select this checkbox if you want the port to tag the VLAN ID in all outgoing frames transmitted.
Chapter 13 Multicast The following table describes the labels in this screen. Table 25 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration LABEL DESCRIPTION Multicast Select a multicast VLAN ID (that you configured in the MVR screen) from the drop- VLAN ID down list box.
Chapter 13 Multicast Figure 39 MVR Configuration Example To set the Switch to forward the multicast group traffic to the subscribers, configure multicast group settings in the Group Configuration screen. The following figure shows an example where two multicast groups (News and Movie) are configured for the multicast VLAN 200. Figure 40 MVR Group Configuration Example ES-315/ES-315-F User’s Guide...
H A P T E R Static Route This chapter shows you how to configure static routes. 14.1 Static Routing Overview IP static routes are used by the Switch to ensure it can respond to management stations not reachable via the default gateway and to proactively send traffic, for example when sending SNMP traps or conducting IP connectivity tests using ping.
Chapter 14 Static Route Figure 43 Static Routing The following table describes the related labels you use to create a static route. Table 26 Static Routing LABEL DESCRIPTION Active This field allows you to activate/deactivate this static route. Name Enter a descriptive name (up to 32 printable ASCII characters) for identification purposes.
Page 89
Chapter 14 Static Route Table 26 Static Routing (continued) LABEL DESCRIPTION Gateway This field displays the IP address of the gateway. The gateway is an immediate Address neighbor of your Switch that will forward the packet to the destination. Metric This field displays the cost of transmission for routing purposes.
H A P T E R Maintenance This chapter explains how to configure the screens that let you maintain the firmware and configuration files. 15.1 The Maintenance Screen Use this screen to manage firmware and your configuration files. Click Management > Maintenance in the navigation panel to open the following screen.
Chapter 15 Maintenance 15.2 Load Factory Default Follow the steps below to reset the Switch back to the factory defaults. 1 In the Maintenance screen, click the Click Here button next to Load Factory Default to clear all Switch configuration information you configured and return to the factory defaults.
Chapter 15 Maintenance 2 Click OK again and then wait for the Switch to restart. This takes up to two minutes. This does not affect the Switch’s configuration. 15.5 Firmware Upgrade Make sure you have downloaded (and unzipped) the correct model firmware and version to your computer before uploading to the device.
Chapter 15 Maintenance Figure 49 Restore Configuration Type the path and file name of the configuration file you wish to restore in the File Path text box or click Browse to display the Choose File screen (below) from which you can locate it. After you have specified the file, click Restore.
Switch’s settings, they can be saved back to your computer under a filename of your choosing. ZyNOS (ZyXEL Network Operating System sometimes referred to as the “ras” file) is the system firmware and has a “bin” filename extension.
Chapter 15 Maintenance “config”. Likewise transfers the configuration file on the get config config.cfg Switch to your computer and renames it to “config.cfg”. See Table 28 on page 97 more information on filename conventions. 7 Enter to exit the ftp prompt. quit 15.8.3 GUI-based FTP Clients The following table describes some of the commands that you may see in GUI-based FTP...
H A P T E R Access Control This chapter describes how to control access to the Switch. 16.1 Access Control Overview A console port and FTP are allowed one session each, Telnet and SSH share nine sessions, up to five Web sessions (five different usernames and passwords) and/or limitless SNMP access control sessions are allowed.
Chapter 16 Access Control 16.3 About SNMP Simple Network Management Protocol (SNMP) is an application layer protocol used to manage and monitor TCP/IP-based devices. SNMP is used to exchange management information between the network management system (NMS) and a network element (NE). A manager station can manage and monitor the Switch through the network via SNMP version one (SNMPv1), SNMP version 2c or SNMP version 3.
Chapter 16 Access Control 16.3.1 Supported MIBs MIBs let administrators collect statistics and monitor status and performance. The Switch supports the following MIBs: • SNMP MIB II (RFC 1213) • RFC 1157 SNMP v1 • RFC 1493 Bridge MIBs • RFC 1643 Ethernet MIBs •...
Chapter 16 Access Control Table 32 SNMP InterfaceTraps OPTION OBJECT LABEL OBJECT ID DESCRIPTION linkup linkUp 1.3.6.1.6.3.1.1.5.4 This trap is sent when the Ethernet link is up. LinkDownEventClear ES-315: This trap is sent when the 1.3.6.1.4.1.890.1.5.8.41.27.2.2 Ethernet link is up. ES-315-F: 1.3.6.1.4.1.890.1.5.8.42.27.2.2 linkdown...
Chapter 16 Access Control Table 35 SNMP Switch Traps OPTION OBJECT LABEL OBJECT ID DESCRIPTION rmon RmonRisingAlarm 1.3.6.1.2.1.16.0.1 This trap is sent when a variable goes over the RMON "rising" threshold. RmonFallingAlarm 1.3.6.1.2.1.16.0.2 This trap is sent when the variable falls below the RMON "falling"...
Chapter 16 Access Control Table 36 Access Control: SNMP (continued) LABEL DESCRIPTION Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Chapter 16 Access Control The following table describes the labels in this screen. Table 37 Access Control: Logins LABEL DESCRIPTION Administrator This is the default administrator account with the “admin” user name. You cannot change the default administrator user name. Only the administrator has read/write access. Old Password Type the existing system password (1234 is the default password when shipped).
Chapter 16 Access Control Figure 56 How SSH Works 1 Host Identification The SSH client sends a connection request to the SSH server. The server identifies itself with a host key. The client encrypts a randomly generated session key with the host key and server key and sends the result back to the server.
Chapter 16 Access Control 16.7 Introduction to HTTPS HTTPS (HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a web protocol that encrypts and decrypts web pages. Secure Socket Layer (SSL) is an application- level protocol that enables secure transactions of data by ensuring confidentiality (an unauthorized party cannot read the transferred data), authentication (one party can identify the other party) and data integrity (you know if data has been changed).
Chapter 16 Access Control 16.8.1 Internet Explorer Warning Messages When you attempt to access the Switch HTTPS server, a Windows dialog box pops up asking if you trust the server certificate. Click View Certificate if you want to verify that the certificate is from the Switch.
Chapter 16 Access Control Figure 60 Security Certificate 2 (Netscape) 16.8.3 The Main Screen After you accept the certificate and enter the login username and password, the Switch main screen appears. The lock displayed in the bottom right of the browser status bar denotes a secure connection.
Chapter 16 Access Control Figure 62 Access Control: Service Access Control The following table describes the fields in this screen. Table 38 Access Control: Service Access Control LABEL DESCRIPTION Services Services you may use to access the Switch are listed here. Active Select this option for the corresponding services that you want to allow to access the Switch.
Chapter 16 Access Control Figure 63 Access Control: Remote Management The following table describes the labels in this screen. Table 39 Access Control: Remote Management LABEL DESCRIPTION Entry This is the client set index number. A “client set” is a group of one or more “trusted computers”...
Page 112
Chapter 16 Access Control ES-315/ES-315-F User’s Guide...
H A P T E R Diagnostic This chapter explains the Diagnostic screen. 17.1 Diagnostic Click Management > Diagnostic in the navigation panel to open this screen. Use this screen to check system logs, ping IP addresses or perform port tests. Figure 64 Diagnostic The following table describes the labels in this screen.
H A P T E R Syslog This chapter explains the syslog screens. 18.1 Syslog Overview The syslog protocol allows devices to send event notification messages across an IP network to syslog servers that collect the event messages. A syslog-enabled device can generate a syslog message and send it to a syslog server.
Chapter 18 Syslog Figure 65 Syslog The following table describes the labels in this screen. Table 42 Syslog LABEL DESCRIPTION Syslog Select Active to turn on syslog (system logging) and then configure the syslog setting Logging Type This column displays the names of the categories of logs that the device can generate.
Chapter 18 Syslog Figure 66 Syslog: Server Setup The following table describes the labels in this screen. Table 43 Syslog: Server Setup LABEL DESCRIPTION Active Select this check box to have the device send logs to this syslog server. Clear the check box if you want to create a syslog server entry but not have the device send logs to it (you can edit the entry later).
H A P T E R MAC Table This chapter introduces the MAC Table screen. 19.1 MAC Table Overview The MAC Table screen (a MAC table is also known as a filtering database) shows how frames are forwarded or filtered across the Switch’s ports. It shows what device MAC address, belonging to what VLAN group (if any) is forwarded to which port(s) and whether the MAC address is dynamic (learned by the Switch) or static (manually entered in the Static MAC Forwarding screen).
Chapter 19 MAC Table 19.2 Viewing the MAC Table Click Management > MAC Table in the navigation panel to display the following screen. Figure 68 MAC Table The following table describes the labels in this screen. Table 44 MAC Table LABEL DESCRIPTION Sort by...
H A P T E R ARP Table This chapter introduces the ARP Table. 20.1 ARP Table Overview Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network.
Chapter 20 ARP Table Figure 69 ARP Table The following table describes the labels in this screen. Table 45 ARP Table LABEL DESCRIPTION Index This is the ARP Table entry number. IP Address This is the learned IP address of a device connected to a Switch port with corresponding MAC address below.
H A P T E R Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Switch Access and Login 21.1 Power, Hardware Connections, and LEDs The Switch does not turn on.
Chapter 21 Troubleshooting 21.2 Switch Access and Login I forgot the IP address for the Switch. 1 The default IP address is 192.168.1.1. 2 If this does not work, you have to reset the device to its factory defaults. See Section 3.6 on page I forgot the username and/or password.
Page 129
Chapter 21 Troubleshooting 1 Make sure you have entered the user name and password correctly. The default user name is admin, and the default password is 1234. These fields are case-sensitive, so make sure [Caps Lock] is not on. 2 You may have exceeded the maximum number of concurrent Telnet sessions. Close other Telnet session(s) or try connecting again later.
H A P T E R Product Specifications 22.1 General Switch Specifications The following tables summarize the Switch’s hardware and firmware features. Table 46 Hardware Specifications SPECIFICATION DESCRIPTION Dimensions ES-315: 181.2mm x 126.7mm x 33.2mm ES-315-F: 194.0mm x 129.7mm x 25.9mm Weight ES-315: 277g ES-315-F: 325g...
The Switch can generate syslog messages and send it to a syslog server. Firmware Upgrade Download new firmware (when available) from the ZyXEL web site and use the web configurator, CLI or an FTP/TFTP tool to put it on the Switch.
Chapter 22 Product Specifications Table 48 Feature Specifications (continued) VLAN Tag-based (IEEE 802.1Q) VLAN Number of VLAN: 4 static maximum One management VLAN Bandwidth Supports rate limiting at 64K increment control Layer 3 IP Capability IPV4 support Features 5 Management IPs Routing Static Routing protocols...
Chapter 22 Product Specifications Table 49 Standards Supported (continued) STANDARD DESCRIPTION Safety UL 60950-1 CSA 60950-1 EN 60950-1 IEC 60950-1 FCC Part 15 (Class B) CE EMC (Class B) 22.2 Wall-mounting Instructions Complete the following steps to hang your Switch on a wall. Table 46 on page 131 for the size of screws to use and how far apart to place them.
Chapter 22 Product Specifications Figure 71 Wall-mounting Example: ES-315-F The following are dimensions of an M4 tap screw and masonry plug used for wall mounting. All measurements are in millimeters (mm). Masonry Plug ES-315/ES-315-F User’s Guide...
P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
Appendix A IP Addresses and Subnetting Figure 72 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation).
Appendix A IP Addresses and Subnetting Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 51 Subnet Masks BINARY DECIMAL 4TH OCTET OCTET...
Appendix A IP Addresses and Subnetting Table 53 Alternative Subnet Mask Notation (continued) ALTERNATIVE LAST OCTET LAST OCTET SUBNET MASK NOTATION (BINARY) (DECIMAL) 255.255.255.192 1100 0000 255.255.255.224 1110 0000 255.255.255.240 1111 0000 255.255.255.248 1111 1000 255.255.255.252 1111 1100 Subnetting You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons.
Appendix A IP Addresses and Subnetting Figure 74 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address).
Appendix A IP Addresses and Subnetting Table 58 Eight Subnets (continued) SUBNET LAST BROADCAST SUBNET FIRST ADDRESS ADDRESS ADDRESS ADDRESS Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 59 24-bit Network Number Subnet Planning NO.
Appendix A IP Addresses and Subnetting Table 60 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” NO. HOSTS PER SUBNET MASK NO. SUBNETS HOST BITS SUBNET 255.255.255.252 (/30) 16384 255.255.255.254 (/31) 32768 Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
Appendix A IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network.
Appendix A IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet.
7648 A popular videoconferencing solution from White Pines Software. 24032 TCP/UDP Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers. User-Defined The IPSEC ESP (Encapsulation Security (IPSEC_TUNNEL) Protocol) tunneling protocol uses this service. FINGER...
Page 150
Appendix B Common Services Table 61 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.323 1720 NetMeeting uses this protocol. HTTP Hyper Text Transfer Protocol - a client/ server protocol for the world wide web.
Page 151
Appendix B Common Services Table 61 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION RTELNET Remote Telnet. RTSP TCP/UDP The Real Time Streaming (media control) Protocol (RTSP) is a remote control for multimedia on the Internet. SFTP Simple File Transfer Protocol. SMTP Simple Mail Transfer Protocol is the message-exchange standard for the...
Page 152
Appendix B Common Services ES-315/ES-315-F User’s Guide...
Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Page 155
(at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
Page 156
Appendix C Legal Information ES-315/ES-315-F User’s Guide...
Index Index Numerics change running config configuration file backup 802.1P priority restore saving configuration, saving contact information copyright current date access control current time limitations customer support login account remote management service port SNMP Address Resolution Protocol (ARP) administrator password diagnostics alternative subnet mask notation Ethernet port test...
Page 164
Index upgrade IP address flow control IP interface back pressure IP setup IEEE802.3x IP subnet mask frames tagged untagged front panel file transfer procedure layer 2 features restrictions over WAN layer 3 features lockout login password login account general features Administrator general setup non-administrator...
Page 165
Index 802.1 priority and IGMP IP addresses reboot overview load configuration setup 74, 75 reboot system multicast group registration multicast VLAN product related documentation configuration group configuration remote management network example service trusted computers MVR (Multicast VLAN Registration) resetting 38, 94 to factory default settings restoring configuration 38, 95...
Page 166
VLAN ZyNOS (ZyXEL Network Operating System) temperature time current time zone Time (RFC-868) time server time service protocol format trademarks traps destination...
Need help?
Do you have a question about the ES-315 - V3.70 and is the answer not in the manual?
Questions and answers