Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Switch
ES-2024 - V3.80
ZyXEL Communications ES-2024 - V3.80 Manuals
Manuals and User Guides for ZyXEL Communications ES-2024 - V3.80. We have
1
ZyXEL Communications ES-2024 - V3.80 manual available for free PDF download: User Manual
ZyXEL Communications ES-2024 - V3.80 User Manual (268 pages)
Brand:
ZyXEL Communications
| Category:
Switch
| Size: 8.28 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
19
List of Tables
23
Introduction
27
PART I Introduction
27
Chapter 1 Getting to Know Your Switch
29
Introduction
29
Backbone Application
29
Figure 1 Backbone Application
29
Bridging Example
30
High Performance Switching Example
30
Figure 2 Bridging Application
30
IEEE 802.1Q VLAN Application Examples
31
Figure 3 High Performance Switched Workgroup Application
31
Figure 4 Shared Server Using VLAN Example
31
Ways to Manage the Switch
32
Good Habits for Managing the Switch
32
Chapter 2 Hardware Installation and Connection
33
Freestanding Installation
33
Figure 5 Attaching Rubber Feet
33
Mounting the Switch on a Rack
34
Rack-Mounted Installation Requirements
34
Attaching the Mounting Brackets to the Switch
34
Figure 6 Attaching the Mounting Brackets
34
Mounting the Switch on a Rack
35
Figure 7 Mounting the Switch on a Rack
35
Hardware Overview
37
Chapter 3 Hardware Overview
37
Front Panel Connection
37
Figure 8 Front Panel: ES-2024A
37
Figure 9 Front Panel: ES-2024PWR
37
Console Port
38
Ethernet Ports
38
Table 1 Front Panel
38
Figure 10 Transceiver Installation Example
39
Figure 11 Installed Transceiver
39
Mini-GBIC Slots
39
Rear Panel
40
Power Connector
40
Figure 12 Opening the Transceiver's Latch Example
40
Figure 13 Transceiver Removal Example
40
Figure 14 AC Rear Panel
40
Figure 15 DC Rear Panel
40
Leds
41
Table 2 Leds
41
Basic Configuration
43
Part II: Basic Configuration
43
Chapter 4 The Web Configurator
45
Introduction
45
System Login
45
The Status Screen
46
Figure 16 Web Configurator: Login
46
Figure 17 Web Configurator Home Screen (Status)
46
Table 3 Navigation Panel Sub-Links Overview
47
Table 4 Web Configurator Screen Sub-Links Details
48
Table 5 Navigation Panel Links
49
Change Your Password
50
Figure 18 Change Administrator Login Password
50
Saving Your Configuration
51
Switch Lockout
51
Resetting the Switch
51
Reload the Configuration File
52
Logging out of the Web Configurator
52
Figure 19 Resetting the Switch: Via the Console Port
52
Help
53
Figure 20 Web Configurator: Logout Screen
53
Chapter 5 Initial Setup Example
55
Overview
55
Creating a VLAN
55
Figure 21 Initial Setup Network Example: VLAN
55
Setting Port VID
56
Configuring Switch Management IP Address
57
Figure 22 Initial Setup Network Example: Port VID
57
Figure 23 Initial Setup Example: Management IP Address
57
Chapter 6 System Status and Port Statistics
59
Overview
59
Port Status Summary
59
Figure 24 Status
59
Table 6 Status
59
Status: Port Details
60
Figure 25 Status: Port Details
61
Table 7 Status > Port Details
61
Basic Setting
65
Chapter 7 Basic Setting
65
Overview
65
System Information
65
Figure 26 Basic Setting > System Info
66
Table 8 Basic Setting > System Info
66
General Setup
67
Figure 27 Basic Setting > General Setup
68
Table 9 Basic Setting > General Setup
68
Introduction to Vlans
69
Switch Setup Screen
70
Figure 28 Basic Setting > Switch Setup
70
Table 10 Basic Setting > Switch Setup
70
IP Setup
71
IP Interfaces
72
Figure 29 Basic Setting > IP Setup
72
Table 11 Basic Setting > IP Setup
72
Port Setup
74
Figure 30 Basic Setting > Port Setup
74
Table 12 Basic Setting > Port Setup
74
Advanced Setup
77
Part III: Advanced Setup
77
Vlan
79
Chapter 8 VLAN
79
Introduction to IEEE 802.1Q Tagged Vlans
79
Forwarding Tagged and Untagged Frames
79
Automatic VLAN Registration
80
Garp
80
Gvrp
80
Table 13 IEEE 802.1Q VLAN Terminology
80
Port VLAN Trunking
81
Select the VLAN Type
81
Static VLAN
81
Figure 31 Port VLAN Trunking
81
Figure 32 Switch Setup: Select VLAN Type
81
Figure 33 Advanced Application > VLAN: VLAN Status
82
Figure 34 Advanced Application > VLAN > VLAN Detail
82
Static VLAN Details
82
Static VLAN Status
82
Table 14 Advanced Application > VLAN: VLAN Status
82
Configure a Static VLAN
83
Figure 35 Advanced Application > VLAN > Static VLAN
83
Table 15 Advanced Application > VLAN > VLAN Detail
83
Configure VLAN Port Settings
84
Table 16 Advanced Application > VLAN > Static VLAN
84
Figure 36 Advanced Application > VLAN > VLAN Port Setting
85
Table 17 Advanced Application > VLAN > VLAN Port Setting
85
Port-Based VLAN Setup
86
Configure a Port-Based VLAN
86
Figure 37 Advanced Application > VLAN: Port Based VLAN Setup (All Connected)
87
Figure 38 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation)
88
Table 18 Advanced Application > VLAN: Port Based VLAN Setup
89
Chapter 9 Static MAC Forward Setup
91
Overview
91
Configuring Static MAC Forwarding
91
Figure 39 Advanced Application > Static MAC Forwarding
91
Table 19 Advanced Application > Static MAC Forwarding
92
Filtering
93
Chapter 10 Filtering
93
Configure a Filtering Rule
93
Figure 40 Advanced Application > Filtering
93
Table 20 Advanced Application > Filtering
93
Spanning Tree Protocol
95
Chapter 11 Spanning Tree Protocol
95
STP/RSTP Overview
95
STP Terminology
95
How STP Works
96
Table 21 STP Path Costs
96
STP Port States
97
Multiple STP
97
Table 22 STP Port States
97
Figure 41 STP/RSTP Network Example
98
Figure 42 MSTP Network Example
98
Spanning Tree Configuration Screen
99
Figure 43 Mstis in Different Regions
99
Figure 44 MSTP and Legacy RSTP Network Example
99
Configure Rapid Spanning Tree Protocol
100
Figure 45 Advanced Application > Spanning Tree Protocol
100
Figure 46 Advanced Application > Spanning Tree Protocol > RSTP
100
Table 23 Advanced Application > Spanning Tree Protocol > RSTP
100
Rapid Spanning Tree Protocol Status
102
Figure 47 Advanced Application > Spanning Tree Protocol > Status: RSTP
102
Table 24 Advanced Application > Spanning Tree Protocol > Status: RSTP
102
Configure Multiple Spanning Tree Protocol
103
Figure 48 Advanced Application > Spanning Tree Protocol > MSTP
103
Table 25 Advanced Application > Spanning Tree Protocol > MSTP
104
Multiple Spanning Tree Protocol Status
105
Figure 49 Advanced Application > Spanning Tree Protocol > Status: MSTP
106
Table 26 Advanced Application > Spanning Tree Protocol > Status: MSTP
106
Bandwidth Control
109
Chapter 12 Bandwidth Control
109
Bandwidth Control Setup
109
Figure 50 Advanced Application > Bandwidth Control
109
Table 27 Advanced Application > Bandwidth Control
109
Chapter 13 Broadcast Storm Control
111
Broadcast Storm Control Setup
111
Figure 51 Advanced Application > Broadcast Storm Control
111
Table 28 Advanced Application > Broadcast Storm Control
112
Mirroring
113
Chapter 14 Mirroring
113
Port Mirroring Setup
113
Figure 52 Advanced Application > Mirroring
113
Table 29 Advanced Application > Mirroring
114
Link Aggregation
115
Chapter 15 Link Aggregation
115
Link Aggregation Overview
115
Dynamic Link Aggregation
115
Link Aggregation ID
116
Link Aggregation Status
116
Figure 53 Advanced Application > Link Aggregation Status
116
Table 30 Link Aggregation ID: Local Switch
116
Table 31 Link Aggregation ID: Peer Switch
116
Table 32 Advanced Application > Link Aggregation Status
116
Link Aggregation Setting
117
Figure 54 Advanced Application > Link Aggregation > Link Aggregation Setting
117
Table 33 Advanced Application > Link Aggregation > Link Aggregation Setting
117
Link Aggregation Control Protocol
118
Figure 55 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP
118
Static Trunking Example
119
Table 34 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP
119
Figure 56 Trunking Example - Physical Connections
120
Figure 57 Trunking Example - Configuration Screen
120
Port Authentication
121
Chapter 16 Port Authentication
121
Port Authentication Overview
121
IEEE 802.1X Authentication
121
Port Authentication Configuration
122
Activate IEEE 802.1X Security
122
Figure 58 IEEE 802.1X Authentication Process
122
Figure 59 Advanced Application > Port Authentication
122
Figure 60 Advanced Application > Port Authentication > 802.1X
123
Table 35 Advanced Application > Port Authentication > 802.1X
123
Port Security
125
Chapter 17 Port Security
125
Port Security Overview
125
Port Security Setup
125
Figure 61 Advanced Application > Port Security
126
Table 36 Advanced Application > Port Security
126
Port Security Example
127
Figure 62 Port Security Example
127
Table 37 Port Security Example
128
Queuing Method
129
Chapter 18 Queuing Method
129
Queuing Method Overview
129
Strictly Priority Queuing
129
Weighted Round Robin Scheduling (WRR)
129
Table 38 Physical Queue Priority
129
Configuring Queuing
130
Figure 63 Advanced Application > Queuing Method
130
Table 39 Advanced Application > Queuing Method
130
Multicast
131
Chapter 19 Multicast
131
Multicast Overview
131
IP Multicast Addresses
131
IGMP Filtering
131
IGMP Snooping
131
IGMP Snooping and Vlans
132
Multicast Status
132
Multicast Setting
132
Figure 64 Advanced Application > Multicast
132
Table 40 Multicast Status
132
Figure 65 Advanced Application > Multicast > Multicast Setting
133
Table 41 Advanced Application > Multicast > Multicast Setting
133
IGMP Snooping VLAN
134
Figure 66 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
135
Table 42 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
135
IGMP Filtering Profile
136
Figure 67 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
136
Table 43 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
136
MVR Overview
137
Types of MVR Ports
137
Figure 68 MVR Network Example
137
MVR Modes
138
How MVR Works
138
General MVR Configuration
138
Figure 69 MVR Multicast Television Example
138
Figure 70 Advanced Application > Multicast > Multicast Setting > MVR
139
Table 44 Advanced Application > Multicast > Multicast Setting > MVR
139
MVR Group Configuration
140
MVR Configuration Example
141
Figure 71 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
141
Table 45 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
141
Figure 72 MVR Configuration Example
142
Figure 73 MVR Configuration Example
142
Figure 74 MVR Group Configuration Example
143
Figure 75 MVR Group Configuration Example
143
Chapter 20 Authentication & Accounting
145
Authentication, Authorization and Accounting
145
Local User Accounts
145
Figure 76 AAA Server
145
RADIUS and TACACS
146
Authentication and Accounting Screens
146
RADIUS Server Setup
146
Figure 77 Advanced Application > Auth and Acct
146
Table 46 RADIUS Vs. TACACS
146
Figure 78 Advanced Application > Auth and Acct > RADIUS Server Setup
147
Table 47 Advanced Application > Auth and Acct > RADIUS Server Setup
147
TACACS+ Server Setup
148
Figure 79 Advanced Application > Auth and Acct > TACACS+ Server Setup
149
Table 48 Advanced Application > Auth and Acct > TACACS+ Server Setup
149
Authentication and Accounting Setup
150
Figure 80 Advanced Application > Auth and Acct > Auth and Acct Setup
151
Table 49 Advanced Application > Auth and Acct > Auth and Acct Setup
151
Vendor Specific Attribute
153
Table 50 Supported Vsas
153
Supported RADIUS Attributes
154
Table 51 Supported Tunnel Protocol Attribute
154
Attributes Used for Accounting
155
Attributes Used for Authentication
155
Table 52 RADIUS Attributes - Exec Events Via Console
156
Table 53 RADIUS Attributes - Exec Events Via Telnet/Ssh
156
Table 54 RADIUS Attributes - Exec Events Via Console
156
IP Source Guard
159
Chapter 21 IP Source Guard
159
IP Source Guard Overview
159
ARP Inspection Overview
159
Figure 81 Example: Man-In-The-Middle Attack
159
IP Source Guard
161
IP Source Guard Static Binding
161
Figure 82 IP Source Guard
161
Table 55 IP Source Guard
161
Figure 83 IP Source Guard Static Binding
162
Table 56 IP Source Guard Static Binding
162
ARP Inspection Status
163
ARP Inspection Log Status
163
Figure 84 ARP Inspection Status
163
Table 57 ARP Inspection Status
163
ARP Inspection Configure
164
Figure 85 ARP Inspection Log Status
164
Table 58 ARP Inspection Log Status
164
Figure 86 ARP Inspection Configure
165
Table 59 ARP Inspection Configure
165
ARP Inspection Port Configure
166
Figure 87 ARP Inspection Port Configure
166
ARP Inspection VLAN Configure
167
Figure 88 ARP Inspection VLAN Configure
167
Table 60 ARP Inspection Port Configure
167
Table 61 ARP Inspection VLAN Configure
167
Loop Guard
169
Chapter 22 Loop Guard
169
Loop Guard Overview
169
Figure 89 Loop Guard Vs. STP
169
Figure 90 Switch in Loop State
170
Figure 91 Loop Guard - Probe Packet
170
Figure 92 Loop Guard - Network Loop
170
Loop Guard Setup
171
Figure 93 Advanced Application > Loop Guard
171
Table 62 Advanced Application > Loop Guard
171
IP Application
173
Part IV: IP Application
173
Static Route
175
Chapter 23 Static Route
175
Static Routing Overview
175
Configuring Static Routing
175
Figure 94 Static Routing Overview
175
Figure 95 IP Application > Static Routing
176
Table 63 IP Application > Static Routing
176
Chapter 24 Differentiated Services
179
Diffserv Overview
179
DSCP and Per-Hop Behavior
179
Figure 96 Diffserv: Differentiated Service Field
179
Diffserv Network Example
180
Activating Diffserv
180
Figure 97 Diffserv Network
180
DSCP-To-IEEE 802.1P Priority Settings
181
Figure 98 IP Application > Diffserv
181
Table 64 IP Application > Diffserv
181
Configuring DSCP Settings
182
Figure 99 IP Application > Diffserv > DSCP Setting
182
Table 65 Default DSCP-IEEE 802.1P Mapping
182
Table 66 IP Application > Diffserv > DSCP Setting
182
Dhcp
183
Chapter 25 DHCP
183
DHCP Overview
183
DHCP Modes
183
DHCP Configuration Options
183
DHCP Status
183
DHCP Relay
184
DHCP Relay Agent Information
184
Figure 100 IP Application > DHCP Status
184
Table 67 IP Application > DHCP Status
184
Table 68 Relay Agent Information
184
Configuring DHCP Global Relay
185
Global DHCP Relay Configuration Example
185
Figure 101 IP Application > DHCP > Global
185
Table 69 IP Application > DHCP > Global
185
Configuring DHCP VLAN Settings
186
Figure 102 Global DHCP Relay Network Example
186
Figure 103 DHCP Relay Configuration Example
186
Figure 104 IP Application > DHCP > VLAN
187
Table 70 IP Application > DHCP > VLAN
187
Example: DHCP Relay for Two Vlans
188
Figure 105 DHCP Relay for Two Vlans
188
Figure 106 DHCP Relay for Two Vlans Configuration Example
188
Management
189
Maintenance
191
Chapter 26 Maintenance
191
The Maintenance Screen
191
Figure 107 Management > Maintenance
191
Table 71 Management > Maintenance
191
Load Factory Default
192
Save Configuration
192
Figure 108 Load Factory Default: Start
192
Reboot System
193
Firmware Upgrade
193
Figure 109 Reboot System: Confirmation
193
Figure 110 Management > Maintenance > Firmware Upgrade
193
Restore a Configuration File
194
Backup a Configuration File
194
Figure 111 Management > Maintenance > Restore Configuration
194
Figure 112 Management > Maintenance > Backup Configuration
194
FTP Command Line
195
Filename Conventions
195
FTP Command Line Procedure
195
Table 72 Filename Conventions
195
GUI-Based FTP Clients
196
FTP Restrictions
196
Table 73 General Commands for GUI-Based FTP Clients
196
Access Control
197
Chapter 27 Access Control
197
Access Control Overview
197
The Access Control Main Screen
197
Figure 113 Management > Access Control
197
Table 74 Access Control Overview
197
About SNMP
198
Figure 114 SNMP Management Model
198
Table 75 SNMP Commands
198
SNMP Traps
199
SNMP V3 and Security
199
Supported Mibs
199
Table 76 SNMP System Traps
199
Table 77 SNMP Interface Traps
200
Table 78 AAA Traps
201
Table 79 SNMP IP Traps
201
Table 80 SNMP Switch Traps
201
Configuring SNMP
202
Figure 115 Management > Access Control > SNMP
202
Table 81 Management > Access Control > SNMP
203
Configuring SNMP Trap Group
204
Figure 116 Management > Access Control > SNMP > Trap Group
204
Setting up Login Accounts
205
Table 82 Management > Access Control > SNMP > Trap Group
205
Figure 117 Management > Access Control > Logins
206
Table 83 Management > Access Control > Logins
206
SSH Overview
207
How SSH Works
207
Figure 118 SSH Communication Example
207
Figure 119 How SSH Works
207
SSH Implementation on the Switch
208
Requirements for Using SSH
208
Introduction to HTTPS
208
HTTPS Example
209
Internet Explorer Warning Messages
209
Figure 120 HTTPS Implementation
209
Figure 121 Security Alert Dialog Box (Internet Explorer)
209
Netscape Navigator Warning Messages
210
The Main Screen
210
Figure 122 Security Certificate 1 (Netscape)
210
Figure 123 Security Certificate 2 (Netscape)
210
Service Port Access Control
211
Figure 124 Example: Lock Denoting a Secure Connection
211
Figure 125 Management > Access Control > Service Access Control
211
Remote Management
212
Figure 126 Management > Access Control > Remote Management
212
Table 84 Management > Access Control > Service Access Control
212
Table 85 Management > Access Control > Remote Management
212
Diagnostic
215
Chapter 28 Diagnostic
215
Figure 127 Management > Diagnostic
215
Table 86 Management > Diagnostic
215
Syslog
217
Chapter 29 Syslog
217
Syslog Overview
217
Syslog Setup
217
Table 87 Syslog Severity Levels
217
Syslog Server Setup
218
Figure 128 Management > Syslog
218
Table 88 Management > Syslog
218
Figure 129 Management > Syslog > Server Setup
219
Table 89 Management > Syslog > Server Setup
219
Cluster Management
221
Chapter 30 Cluster Management
221
Clustering Management Status Overview
221
Table 90 Zyxel Clustering Management Specifications
221
Cluster Management Status
222
Figure 130 Clustering Application Example
222
Figure 131 Management > Cluster Management
222
Cluster Member Switch Management
223
Figure 132 Cluster Management: Cluster Member Web Configurator Screen
223
Table 91 Management > Cluster Management
223
Clustering Management Configuration
224
Figure 133 Example: Uploading Firmware to a Cluster Member Switch
224
Table 92 FTP Upload to Cluster Member Example
224
Figure 134 Management > Clustering Management > Configuration
225
Table 93 Management > Clustering Management > Configuration
225
MAC Table
227
Chapter 31 MAC Table
227
MAC Table Overview
227
Figure 135 MAC Table Flowchart
227
Viewing the MAC Table
228
Figure 136 Management > MAC Table
228
Table 94 Management > MAC Table
228
ARP Table
229
Chapter 32 ARP Table
229
ARP Table Overview
229
How ARP Works
229
Viewing the ARP Table
229
Figure 137 Management > ARP Table
230
Table 95 Management > ARP Table
230
Configure Clone
231
Chapter 33 Configure Clone
231
Figure 138 Management > Configure Clone
231
Table 96 Management > Configure Clone
232
Appendices and Index
233
Part VI: Appendices and Index
233
Appendix A Product Specifications
235
Figure 139 DC Power Plug
235
Table 97 Hardware Specifications
235
Table 98 Feature Descriptions
236
Table 99 Firmware Specifications
238
Table 100 Standards Supported
240
Appendix B IP Addresses and Subnetting
243
Introduction to Ip Addresses
243
Figure 140 Network Number and Host ID
244
Table 101 IP Address Network Number and Host ID Example
244
Table 102 Subnet Masks
245
Table 103 Maximum Host Numbers
245
Table 104 Alternative Subnet Mask Notation
245
Figure 141 Subnetting Example: before Subnetting
246
Figure 142 Subnetting Example: after Subnetting
247
Table 105 Subnet 1
247
Table 106 Subnet 2
248
Table 107 Subnet 3
248
Table 108 Subnet 4
248
Table 109 Eight Subnets
248
Table 110 24-Bit Network Number Subnet Planning
249
Table 111 16-Bit Network Number Subnet Planning
249
Configuring Ip Addresses
250
Appendix C Legal Information
251
Zyxel Limited Warranty
252
Appendix D Customer Support
255
Index
261
Advertisement
Advertisement
Related Products
ZyXEL Communications ES-2024 Series
ZyXEL Communications ES-2024A
ZyXEL Communications ES-2024PWR
ZyXEL Communications ES-2108
ZyXEL Communications ES-2048
ZyXEL Communications ES-2108-G
ZyXEL Communications Dimension ES-2008
ZyXEL Communications ZyXEL Dimension ES-2108PWR
ZyXEL Communications ZyXEL Dimension ES-2108-F
ZyXEL Communications ZyXEL Dimension ES-2724
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL