Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Switch
GS-2750
ZyXEL Communications GS-2750 Manuals
Manuals and User Guides for ZyXEL Communications GS-2750. We have
2
ZyXEL Communications GS-2750 manuals available for free PDF download: User Manual, Specifications
ZyXEL Communications GS-2750 User Manual (336 pages)
Intelligent Layer 3+ Switch
Brand:
ZyXEL Communications
| Category:
Switch
| Size: 12.58 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
21
List of Tables
27
Introduction
31
PART I Introduction
31
Chapter 1 Getting to Know Your Switch
33
Introduction
33
Bridging Example
33
High Performance Switching Example
34
Figure 1 Bridging Application
34
Figure 2 High Performance Switching
34
Gigabit Ethernet to the Desktop
35
IEEE 802.1Q VLAN Application Example
35
Figure 3 Gigabit to the Desktop
35
Ways to Manage the Switch
36
Good Habits for Managing the Switch
36
Figure 4 Shared Server Using VLAN Example
36
Chapter 2 Hardware Installation and Connection
37
Freestanding Installation
37
Figure 5 Attaching Rubber Feet
37
Mounting the Switch on a Rack
38
Rack-Mounted Installation Requirements
38
Attaching the Mounting Brackets to the Switch
38
Figure 6 Attaching the Mounting Brackets
38
Mounting the Switch on a Rack
39
Figure 7 Mounting the Switch on a Rack
39
Hardware Overview
41
Chapter 3 Hardware Overview
41
Front Panel Connections
41
Figure 8 Front Panel
41
Table 1 Panel Connections
41
1000Base-T Ports
42
Dual Personality Interfaces
42
Mini-GBIC Slots
42
Figure 10 Installed Transceiver
43
Figure 11 Opening the Transceiver's Latch Example
43
Figure 9 Transceiver Installation Example
43
Rear Panel
44
Power Connector
44
Figure 12 Transceiver Removal Example
44
Figure 13 Rear Panel - AC Model
44
Table 2 Panel Connections
44
External Backup Power Supply Connector
45
Console Port
45
Leds
45
Table 3 Leds
45
Basic Configuration
47
Part II: Basic Configuration
47
Chapter 4 The Web Configurator
49
Introduction
49
System Login
49
The Status Screen
50
Figure 14 Web Configurator: Login
50
Figure 15 Web Configurator Home Screen (Status)
50
Table 4 Navigation Panel Sub-Links Overview
51
Table 5 Web Configurator Screen Sub-Links Details
52
Table 6 Navigation Panel Links
53
Change Your Password
54
Saving Your Configuration
55
Switch Lockout
55
Figure 16 Change Administrator Login Password
55
Resetting the Switch
56
Reload the Configuration File
56
Logging out of the Web Configurator
57
Help
57
Figure 17 Resetting the Switch: Via the Console Port
57
Figure 18 Web Configurator: Logout Screen
57
Chapter 5 Initial Setup Example
59
Overview
59
Configuring an IP Interface
59
Figure 19 Initial Setup Network Example: IP Interface
59
Configuring DHCP Server Settings
60
Creating a VLAN
61
Figure 20 Initial Setup Network Example: VLAN
61
Setting Port VID
62
Figure 21 Initial Setup Network Example: Port VID
62
Enabling RIP
63
Chapter 6 System Status and Port Statistics
65
Overview
65
Port Status Summary
65
Figure 22 Status
65
Status: Port Details
66
Table 7 Status
66
Figure 23 Status: Port Details
67
Table 8 Status > Port Details
67
Basic Setting
71
Chapter 7 Basic Setting
71
Overview
71
System Information
71
Figure 24 Basic Setting > System Info
72
Table 9 Basic Setting > System Info
72
General Setup
73
Figure 25 Basic Setting > General Setup
74
Table 10 Basic Setting > General Setup
74
Introduction to Vlans
75
Switch Setup Screen
76
Figure 26 Basic Setting > Switch Setup
76
Table 11 Basic Setting > Switch Setup
76
IP Setup
78
IP Interfaces
78
Figure 27 Basic Setting > IP Setup
78
Table 12 Basic Setting > IP Setup
79
Port Setup
80
Figure 28 Basic Setting > Port Setup
80
Table 13 Basic Setting > Port Setup
80
Advanced Setup
83
Part III: Advanced Setup
83
Vlan
85
Chapter 8 VLAN
85
Introduction to IEEE 802.1Q Tagged Vlans
85
Forwarding Tagged and Untagged Frames
85
Automatic VLAN Registration
86
Garp
86
Gvrp
86
Table 14 IEEE 802.1Q VLAN Terminology
86
Port VLAN Trunking
87
Select the VLAN Type
87
Static VLAN
87
Figure 29 Port VLAN Trunking
87
Figure 30 Switch Setup: Select VLAN Type
87
Figure 31 Advanced Application > VLAN: VLAN Status
88
Figure 32 Advanced Application > VLAN > VLAN Detail
88
Static VLAN Details
88
Static VLAN Status
88
Table 15 Advanced Application > VLAN: VLAN Status
88
Configure a Static VLAN
89
Figure 33 Advanced Application > VLAN > Static VLAN
89
Table 16 Advanced Application > VLAN > VLAN Detail
89
Configure VLAN Port Settings
90
Table 17 Advanced Application > VLAN > Static VLAN
90
Figure 34 Advanced Application > VLAN > VLAN Port Setting
91
Table 18 Advanced Application > VLAN > VLAN Port Setting
91
Subnet Based Vlans
92
Figure 35 Subnet Based VLAN Application Example
92
Configuring Subnet Based VLAN
93
Figure 36 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN
93
Table 19 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN
93
Protocol Based Vlans
94
Configuring Protocol Based VLAN
95
Figure 37 Protocol Based VLAN Application Example
95
Figure 38 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN
95
Create an IP-Based VLAN Example
96
Table 20 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN Setup
96
Port-Based VLAN Setup
97
Figure 39 Protocol Based VLAN Configuration Example
97
Configure a Port-Based VLAN
98
Figure 40 Advanced Application > VLAN > Port Based VLAN Setup (All Connected)
98
Figure 41 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation)
99
Table 21 Advanced Application > VLAN: Port Based VLAN Setup
100
Chapter 9 Static MAC Forward Setup
101
Overview
101
Configuring Static MAC Forwarding
101
Figure 42 Advanced Application > Static MAC Forwarding
101
Table 22 Advanced Application > Static MAC Forwarding
102
Filtering
103
Chapter 10 Filtering
103
Configure a Filtering Rule
103
Figure 43 Advanced Application > Filtering
103
Table 23 Advanced Application > Filtering
103
Chapter 11
105
Spanning Tree Protocol
105
STP/RSTP Overview
105
STP Terminology
105
How STP Works
106
STP Port States
106
Table 24 STP Path Costs
106
Table 25 STP Port States
106
Multiple STP
107
Figure 44 STP/RSTP Network Example
107
Figure 45 MSTP Network Example
108
Spanning Tree Protocol Status Screen
109
Figure 46 Mstis in Different Regions
109
Figure 47 MSTP and Legacy RSTP Network Example
109
Spanning Tree Configuration
110
Configure Rapid Spanning Tree Protocol
110
Figure 48 Advanced Application > Spanning Tree Protocol
110
Figure 49 Advanced Application > Spanning Tree Protocol > Configuration
110
Table 26 Advanced Application > Spanning Tree Protocol > Configuration
110
Figure 50 Advanced Application > Spanning Tree Protocol > RSTP
111
Table 27 Advanced Application > Spanning Tree Protocol > RSTP
111
Rapid Spanning Tree Protocol Status
113
Figure 51 Advanced Application > Spanning Tree Protocol > Status: RSTP
113
Table 28 Advanced Application > Spanning Tree Protocol > Status: RSTP
113
Configure Multiple Spanning Tree Protocol
114
Figure 52 Advanced Application > Spanning Tree Protocol > MSTP
115
Table 29 Advanced Application > Spanning Tree Protocol > MSTP
116
Multiple Spanning Tree Protocol Status
117
Figure 53 Advanced Application > Spanning Tree Protocol > Status: MSTP
118
Table 30 Advanced Application > Spanning Tree Protocol > Status: MSTP
118
Bandwidth Control
121
Chapter 12 Bandwidth Control
121
Bandwidth Control Overview
121
CIR and PIR
121
Bandwidth Control Setup
121
Figure 54 Advanced Application > Bandwidth Control
122
Table 31 Advanced Application > Bandwidth Control
122
Chapter 13 Broadcast Storm Control
123
Broadcast Storm Control Setup
123
Figure 55 Advanced Application > Broadcast Storm Control
123
Table 32 Advanced Application > Broadcast Storm Control
124
Mirroring
125
Chapter 14 Mirroring
125
Port Mirroring Setup
125
Figure 56 Advanced Application > Mirroring
125
Table 33 Advanced Application > Mirroring
126
Link Aggregation
127
Chapter 15 Link Aggregation
127
Link Aggregation Overview
127
Dynamic Link Aggregation
127
Link Aggregation ID
128
Link Aggregation Status
128
Figure 57 Advanced Application > Link Aggregation Status
128
Table 34 Link Aggregation ID: Local Switch
128
Table 35 Link Aggregation ID: Peer Switch
128
Table 36 Advanced Application > Link Aggregation Status
128
Link Aggregation Setting
129
Figure 58 Advanced Application > Link Aggregation > Link Aggregation Setting
129
Link Aggregation Control Protocol
130
Table 37 Advanced Application > Link Aggregation > Link Aggregation Setting
130
Figure 59 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP
131
Table 38 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP
131
Static Trunking Example
132
Figure 60 Trunking Example - Physical Connections
132
Figure 61 Trunking Example - Configuration Screen
133
Port Authentication
135
Chapter 16 Port Authentication
135
Port Authentication Overview
135
IEEE 802.1X Authentication
135
MAC Authentication
136
Figure 62 IEEE 802.1X Authentication Process
136
Figure 63 MAC Authentication Process
136
Port Authentication Configuration
137
Activate IEEE 802.1X Security
137
Figure 64 Advanced Application > Port Authentication
137
Figure 65 Advanced Application > Port Authentication > 802.1X
137
Activate MAC Authentication
138
Table 39 Advanced Application > Port Authentication > 802.1X
138
Figure 66 Advanced Application > Port Authentication > MAC Authentication
139
Table 40 Advanced Application > Port Authentication > MAC Authentication
139
Port Security
141
Chapter 17 Port Security
141
About Port Security
141
Port Security Setup
141
Figure 67 Advanced Application > Port Security
142
Table 41 Advanced Application > Port Security
142
Classifier
145
Chapter 18 Classifier
145
About the Classifier and Qos
145
Configuring the Classifier
145
Figure 68 Advanced Application > Classifier
146
Table 42 Advanced Application > Classifier
146
Viewing and Editing Classifier Configuration
148
Figure 69 Advanced Application > Classifier: Summary Table
148
Table 43 Classifier: Summary Table
148
Table 44 Common Ethernet Types and Protocol Number
148
Classifier Example
149
Table 45 Common IP Protocol Types and Protocol Numbers
149
Table 46 Common TCP and UDP Port Numbers
149
Figure 70 Classifier: Example
150
Policy Rule
151
Chapter 19 Policy Rule
151
Policy Rules Overview
151
Diffserv
151
DSCP and Per-Hop Behavior
151
Configuring Policy Rules
152
Figure 71 Advanced Application > Policy Rule
152
Table 47 Advanced Application > Policy Rule
153
Viewing and Editing Policy Configuration
154
Policy Example
154
Figure 72 Advanced Application > Policy Rule: Summary Table
154
Table 48 Policy: Summary Table
154
Figure 73 Policy Example
155
Queuing Method
157
Chapter 20 Queuing Method
157
Queuing Method Overview
157
Strictly Priority
157
Weighted Fair Queuing
157
Weighted Round Robin Scheduling (WRR)
158
Configuring Queuing
158
Figure 74 Advanced Application > Queuing Method
158
Table 49 Advanced Application > Queuing Method
159
VLAN Stacking
161
Chapter 21 VLAN Stacking
161
VLAN Stacking Overview
161
VLAN Stacking Example
161
VLAN Stacking Port Roles
162
Figure 75 VLAN Stacking Example
162
VLAN Tag Format
163
Frame Format
163
Table 50 VLAN Tag Format
163
Table 51 Single and Double Tagged 802.11Q Frame Format
163
Table 52 802.1Q Frame
163
Configuring VLAN Stacking
164
Figure 76 Advanced Application > VLAN Stacking
164
Table 53 Advanced Application > VLAN Stacking
164
Multicast
167
Chapter 22 Multicast
167
Multicast Overview
167
IP Multicast Addresses
167
IGMP Filtering
167
IGMP Snooping
167
IGMP Snooping and Vlans
168
Multicast Status
168
Multicast Setting
168
Figure 77 Advanced Application > Multicast
168
Table 54 Multicast Status
168
Figure 78 Advanced Application > Multicast > Multicast Setting
169
Table 55 Advanced Application > Multicast > Multicast Setting
169
IGMP Snooping VLAN
171
Figure 79 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
171
Table 56 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
171
IGMP Filtering Profile
172
Figure 80 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
172
MVR Overview
173
Table 57 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
173
Figure 81 MVR Network Example
174
How MVR Works
174
MVR Modes
174
Types of MVR Ports
174
General MVR Configuration
175
Figure 82 MVR Multicast Television Example
175
Figure 83 Advanced Application > Multicast > Multicast Setting > MVR
176
Table 58 Advanced Application > Multicast > Multicast Setting > MVR
176
MVR Group Configuration
177
MVR Configuration Example
178
Figure 84 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
178
Table 59 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
178
Figure 85 MVR Configuration Example
179
Figure 86 MVR Configuration Example
179
Figure 87 MVR Group Configuration Example
180
Figure 88 MVR Group Configuration Example
180
Chapter 23 Authentication & Accounting
181
Authentication, Authorization and Accounting
181
Local User Accounts
181
Figure 89 AAA Server
181
RADIUS and TACACS
182
Authentication and Accounting Screens
182
RADIUS Server Setup
182
Figure 90 Advanced Application > Auth and Acct
182
Table 60 RADIUS Vs TACACS
182
Figure 91 Advanced Application > Auth and Acct > RADIUS Server Setup
183
Table 61 Advanced Application > Auth and Acct > RADIUS Server Setup
183
TACACS+ Server Setup
184
Figure 92 Advanced Application > Auth and Acct > TACACS+ Server Setup
185
Table 62 Advanced Application > Auth and Acct > TACACS+ Server Setup
185
Authentication and Accounting Setup
186
Figure 93 Advanced Application > Auth and Acct > Auth and Acct Setup
187
Table 63 Advanced Application > Auth and Acct > Auth and Acct Setup
187
Vendor Specific Attribute
189
Table 64 Supported Vsas
189
Tunnel Protocol Attribute
190
Supported RADIUS Attributes
190
Table 65 Supported Tunnel Protocol Attribute
190
Attributes Used for Accounting
191
Attributes Used for Authentication
191
Table 66 RADIUS Attributes - Exec Events Via Console
192
Table 67 RADIUS Attributes - Exec Events Via Telnet/Ssh
192
Table 68 RADIUS Attributes - Exec Events Via Console
192
IP Source Guard
195
Chapter 24 IP Source Guard
195
IP Source Guard Overview
195
DHCP Snooping Overview
195
Figure 94 DHCP Snooping Database File Format
196
ARP Inspection Overview
197
Figure 95 Example: Man-In-The-Middle Attack
197
IP Source Guard
199
IP Source Guard Static Binding
199
Figure 96 IP Source Guard
199
Table 69 IP Source Guard
199
Figure 97 IP Source Guard Static Binding
200
Table 70 IP Source Guard Static Binding
200
DHCP Snooping
201
Figure 98 DHCP Snooping
201
Table 71 DHCP Snooping
202
DHCP Snooping Configure
204
Figure 99 DHCP Snooping Configure
204
Table 72 DHCP Snooping Configure
204
DHCP Snooping Port Configure
205
Figure 100 DHCP Snooping Port Configure
206
Table 73 DHCP Snooping Port Configure
206
DHCP Snooping VLAN Configure
207
Figure 101 DHCP Snooping VLAN Configure
207
Table 74 DHCP Snooping VLAN Configure
207
ARP Inspection Status
208
ARP Inspection VLAN Status
208
Figure 102 ARP Inspection Status
208
Table 75 ARP Inspection Status
208
ARP Inspection Log Status
209
Figure 103 ARP Inspection VLAN Status
209
Table 76 ARP Inspection VLAN Status
209
Figure 104 ARP Inspection Log Status
210
Table 77 ARP Inspection Log Status
210
ARP Inspection Configure
211
Figure 105 ARP Inspection Configure
211
Table 78 ARP Inspection Configure
211
ARP Inspection Port Configure
212
ARP Inspection VLAN Configure
213
Figure 106 ARP Inspection Port Configure
213
Table 79 ARP Inspection Port Configure
213
Figure 107 ARP Inspection VLAN Configure
214
Table 80 ARP Inspection VLAN Configure
214
Loop Guard
215
Chapter 25 Loop Guard
215
Loop Guard Overview
215
Figure 108 Loop Guard Vs STP
215
Figure 109 Switch in Loop State
216
Figure 110 Loop Guard - Probe Packet
216
Figure 111 Loop Guard - Network Loop
216
Loop Guard Setup
217
Figure 112 Advanced Application > Loop Guard
217
Table 81 Advanced Application > Loop Guard
217
IP Application
219
Part IV: IP Application
219
Static Routing
221
Chapter 26 Static Routing
221
Configuring Static Routing
221
Figure 113 IP Application > Static Routing
221
Table 82 IP Application > Static Routing
221
Rip
223
Chapter 27 RIP
223
RIP Overview
223
Configuring RIP
223
Figure 114 IP Application > RIP
224
Table 83 IP Application > RIP
224
Chapter 28 Differentiated Services
225
Diffserv Overview
225
DSCP and Per-Hop Behavior
225
Figure 115 Diffserv: Differentiated Service Field
225
Diffserv Network Example
226
Two Rate Three Color Marker Traffic Policing
226
Figure 116 Diffserv Network
226
Figure 117 TRTCM - Color-Blind Mode
227
Figure 118 TRTCM - Color-Aware Mode
227
TRTCM - Color-Aware Mode
227
TRTCM - Color-Blind Mode
227
Activating Diffserv
228
Configuring 2-Rate 3 Color Marker Settings
228
Figure 119 IP Application > Diffserv
228
Table 84 IP Application > Diffserv
228
Figure 120 IP Application > Diffserv > 2-Rate 3 Color Marker
229
Table 85 IP Application > Diffserv > 2-Rate 3 Color Marker
229
DSCP-To-IEEE 802.1P Priority Settings
230
Configuring DSCP Settings
230
Figure 121 IP Application > Diffserv > DSCP Setting
230
Table 86 Default DSCP-IEEE 802.1P Mapping
230
Table 87 IP Application > Diffserv > DSCP Setting
231
Dhcp
233
Chapter 29 DHCP
233
DHCP Overview
233
DHCP Modes
233
DHCP Configuration Options
233
DHCP Status
234
DHCP Server Status Detail
234
Figure 122 IP Application > DHCP Status
234
Table 88 IP Application > DHCP Status
234
DHCP Relay
235
Figure 123 IP Application > DHCP > DHCP Server Status Detail
235
Table 89 IP Application > DHCP Server Status Detail
235
Configuring DHCP Global Relay
236
DHCP Relay Agent Information
236
Figure 124 IP Application > DHCP > Global
236
Table 90 Relay Agent Information
236
Figure 125 Global DHCP Relay Network Example
237
Global DHCP Relay Configuration Example
237
Table 91 IP Application > DHCP > Global
237
Configuring DHCP VLAN Settings
238
Figure 126 DHCP Relay Configuration Example
238
Figure 127 IP Application > DHCP > VLAN
239
Table 92 IP Application > DHCP > VLAN
239
Example: DHCP Relay for Two Vlans
240
Figure 128 DHCP Relay for Two Vlans
241
Figure 129 DHCP Relay for Two Vlans Configuration Example
241
Vrrp
243
Chapter 30 VRRP
243
VRRP Overview
243
Figure 130 VRRP: Example 1
243
VRRP Status
244
VRRP Configuration
244
IP Interface Setup
244
Figure 131 IP Application > VRRP Status
244
Table 93 IP Application > VRRP Status
244
Figure 132 IP Application > VRRP Configuration > IP Interface
245
Table 94 IP Application > VRRP Configuration > IP Interface
245
VRRP Parameters
246
Configuring VRRP Parameters
246
Configuring VRRP Parameters
247
Figure 133 IP Application > VRRP Configuration > VRRP Parameters
247
Table 95 IP Application > VRRP Configuration > VRRP Parameters
247
VRRP Configuration Examples
248
One Subnet Network Example
248
Figure 134 VRRP Configuration: Summary
248
Figure 135 VRRP Configuration Example: One Virtual Router Network
248
Table 96 VRRP Configuring: VRRP Parameters
248
Two Subnets Example
249
Figure 136 VRRP Example 1: VRRP Parameter Settings on Switch a
249
Figure 137 VRRP Example 1: VRRP Parameter Settings on Switch B
249
Figure 138 VRRP Example 1: VRRP Status on Switch a
249
Figure 139 VRRP Example 1: VRRP Status on Switch B
249
Figure 140 VRRP Configuration Example: Two Virtual Router Network
250
Figure 141 VRRP Example 2: VRRP Parameter Settings for VR2 on Switch a
250
Figure 142 VRRP Example 2: VRRP Parameter Settings for VR2 on Switch B
250
Figure 143 VRRP Example 2: VRRP Status on Switch a
251
Figure 144 VRRP Example 2: VRRP Status on Switch B
251
Management
253
Part V: Management
253
Maintenance
255
Chapter 31 Maintenance
255
The Maintenance Screen
255
Figure 145 Management > Maintenance
255
Table 97 Management > Maintenance
255
Load Factory Default
256
Save Configuration
256
Figure 146 Load Factory Default: Start
256
Reboot System
257
Firmware Upgrade
257
Figure 147 Reboot System: Confirmation
257
Figure 148 Management > Maintenance > Firmware Upgrade
257
Restore a Configuration File
258
Backup a Configuration File
258
FTP Command Line
258
Figure 149 Management > Maintenance > Restore Configuration
258
Figure 150 Management > Maintenance > Backup Configuration
258
Filename Conventions
259
FTP Command Line Procedure
259
Table 98 Filename Conventions
259
FTP Restrictions
260
GUI-Based FTP Clients
260
Table 99 General Commands for GUI-Based FTP Clients
260
Access Control
261
Chapter 32 Access Control
261
Access Control Overview
261
The Access Control Main Screen
261
Figure 151 Management > Access Control
261
Table 100 Access Control Overview
261
About SNMP
262
Figure 152 SNMP Management Model
262
Table 101 SNMP Commands
262
SNMP Traps
263
SNMP V3 and Security
263
Supported Mibs
263
Table 102 SNMP System Traps
263
Table 103 SNMP Interfacetraps
264
Table 104 AAA Traps
265
Table 105 SNMP IP Traps
265
Configuring SNMP
266
Table 106 SNMP Switch Traps
266
Figure 153 Management > Access Control > SNMP
267
Table 107 Management > Access Control > SNMP
267
Configuring SNMP Trap Group
268
Figure 154 Management > Access Control > SNMP > Trap Group
269
Setting up Login Accounts
269
Table 108 Management > Access Control > SNMP > Trap Group
269
Figure 155 Management > Access Control > Logins
270
Table 109 Management > Access Control > Logins
270
SSH Overview
271
How SSH Works
271
Figure 156 SSH Communication Example
271
Figure 157 How SSH Works
271
SSH Implementation on the Switch
272
Requirements for Using SSH
272
Introduction to HTTPS
272
HTTPS Example
273
Internet Explorer Warning Messages
273
Figure 158 HTTPS Implementation
273
Figure 159 Security Alert Dialog Box (Internet Explorer)
273
Netscape Navigator Warning Messages
274
The Main Screen
274
Figure 160 Security Certificate 1 (Netscape)
274
Figure 161 Security Certificate 2 (Netscape)
274
Service Port Access Control
275
Figure 162 Example: Lock Denoting a Secure Connection
275
Figure 163 Management > Access Control > Service Access Control
275
Remote Management
276
Figure 164 Management > Access Control > Remote Management
276
Table 110 Management > Access Control > Service Access Control
276
Table 111 Management > Access Control > Remote Management
276
Diagnostic
279
Chapter 33 Diagnostic
279
Figure 165 Management > Diagnostic
279
Table 112 Management > Diagnostic
279
Syslog
281
Chapter 34 Syslog
281
Syslog Overview
281
Syslog Setup
281
Table 113 Syslog Severity Levels
281
Syslog Server Setup
282
Figure 166 Management > Syslog
282
Table 114 Management > Syslog
282
Figure 167 Management > Syslog > Server Setup
283
Table 115 Management > Syslog > Server Setup
283
Cluster Management
285
Chapter 35 Cluster Management
285
Clustering Management Status Overview
285
Table 116 Zyxel Clustering Management Specifications
285
Cluster Management Status
286
Figure 168 Clustering Application Example
286
Figure 169 Management > Cluster Management
286
Cluster Member Switch Management
287
Figure 170 Cluster Management: Cluster Member Web Configurator Screen
287
Table 117 Management > Cluster Management
287
Clustering Management Configuration
288
Figure 171 Example: Uploading Firmware to a Cluster Member Switch
288
Table 118 FTP Upload to Cluster Member Example
288
Figure 172 Management > Clustering Management > Configuration
289
Table 119 Management > Clustering Management > Configuration
289
MAC Table
291
Chapter 36 MAC Table
291
MAC Table Overview
291
Viewing the MAC Table
292
Figure 173 MAC Table Flowchart
292
Figure 174 Management > MAC Table
292
Table 120 Management > MAC Table
292
IP Table
293
Chapter 37 IP Table
293
IP Table Overview
293
Figure 175 IP Table Flowchart
293
Viewing the IP Table
294
Figure 176 Management > IP Table
294
Table 121 Management > IP Table
294
ARP Table
295
Chapter 38 ARP Table
295
ARP Table Overview
295
How ARP Works
295
Viewing the ARP Table
295
Figure 177 Management > ARP Table
296
Table 122 Management > ARP Table
296
Routing Table
297
Chapter 39 Routing Table
297
Overview
297
Viewing the Routing Table Status
297
Figure 178 Management > Routing Table
297
Table 123 Management > Routing Table
297
Configure Clone
299
Chapter 40 Configure Clone
299
Figure 179 Management > Configure Clone
299
Table 124 Management > Configure Clone
300
Product Specifications
301
Part VI: Product Specifications
301
Chapter 41
303
Product Specifications
303
Table 125 Hardware Specifications
303
Table 126 Firmware Specifications
304
Table 127 Switching Specifications
306
Table 128 Standards Supported
307
Appendices and Index
309
Part VII: Appendices and Index
309
Appendix A IP Addresses and Subnetting
311
Introduction to Ip Addresses
311
Figure 180 Network Number and Host ID
312
Table 129 IP Address Network Number and Host ID Example
312
Table 130 Subnet Masks
313
Table 131 Maximum Host Numbers
313
Table 132 Alternative Subnet Mask Notation
313
Figure 181 Subnetting Example: before Subnetting
314
Figure 182 Subnetting Example: after Subnetting
315
Table 133 Subnet 1
315
Table 134 Subnet 2
316
Table 135 Subnet 3
316
Table 136 Subnet 4
316
Table 137 Eight Subnets
316
Table 138 24-Bit Network Number Subnet Planning
317
Table 139 16-Bit Network Number Subnet Planning
317
Configuring Ip Addresses
318
Appendix B Legal Information
319
Zyxel Limited Warranty
320
Appendix C Customer Support
323
Index
329
Advertisement
ZyXEL Communications GS-2750 Specifications (2 pages)
48-port Managed L3 Gigabit Switch
Brand:
ZyXEL Communications
| Category:
Switch
| Size: 0.08 MB
Advertisement
Related Products
ZyXEL Communications Dimension GS-2024
ZyXEL Communications GS2200-24 Series
ZyXEL Communications GS2200-24P Series
ZyXEL Communications GS2200-48
ZyXEL Communications GS2200 Series
ZyXEL Communications GS2200-8HP
ZyXEL Communications GS2200-8
ZyXEL Communications GS2210-48
ZyXEL Communications GS2210 Series
ZyXEL Communications GS2210-24
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL