ZyXEL Communications GS1900 manuals
Computer Equipment > Switch
When we buy new device such as ZyXEL Communications GS1900 we often through away most of the documentation but the warranty.
Very often issues with ZyXEL Communications GS1900 begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Switch ZyXEL Communications GS1900 is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Switch on our side using links below.
ZyXEL Communications GS1900 Manual
227 pages 5.71 Mb
1 GS1900 SeriesUser’s Guide 3 Contents Overview4 Table of ContentsPart I: User’s Guide Chapter 5 Getting StartMonitor: Port 6 9.1 Overview9.2 MAC Table 10.1 Overview 10.2 Link Aggregation 11.1 Overview 11.2 Loop Guard 12.1 Overview 12.2 IGMP 13.1 Overview 13.2 Spanning Tree 7 Monitor: SecurityMonitor: Management Configuration: System 8 18.5.1 The Bandwidth Control Screen18.5.2 The Port Rate Edit Screen 18.6.1 The Port Screen 18.6.2 The Port Edit Screen 19.1 Overview 19.2 VLAN 19.3 Guest VLAN 19.4 Voice VLAN 20.1 Overview 20.2 MAC Table 9 Configuration: MulticastConfiguration: Spanning Tree 10 26.1 Overview26.2 LLDP 27.1 Overview 27.2 General 27.3 Trust Mode 28.1 Overview 11 Configuration: AAAConfiguration: Management 12 30.3.5 The Group Add/Modify Screen30.3.6 The User Screen 30.3.7 The User Add/Modify Screen 30.3.8 The Trap Screen 30.3.9 The Trap Destination Screen 30.3.10 The Trap Destination Add/Modify Screen 30.4 Error Disable 30.4.1 The Error Disabled Screen 30.5 HTTP/HTTPS 30.5.1 The HTTP Screen 30.5.2 The HTTPS Screen 30.6 Users 30.6.1 The Users Screen 30.6.2 The Users Add/Modify Screen 30.7 Remote Access Control 30.7.1 The Global Screen 30.7.2 The Profile Add/Modify Screen 31.1 Firmware Upgrade 31.1.1 Overview 31.1.2 Upgrade the firmware from a file on your computer 31.2 Firmware Management 31.2.1 Overview 31.2.2 Activate the Backup Image 31.3 Backup a Configuration File 31.3.1 Overview 31.3.2 Back up configuration or log files to a server 31.3.3 Back up configuration or log files to your computer 31.4 Restore a Configuration File 31.4.1 Overview 31.4.2 Restore the configuration from a file on a server 31.4.3 Restore the configuration from a file on your computer 31.5 Manage Configuration Files 31.5.1 Overview 31.6 Reset to Factory Defaults 31.6.1 Overview 31.6.2 Reset the Switch to Factory Defaults 31.7 Network Diagnostics 31.7.1 Port Test 31.7.2 IPv4 Ping Test 31.7.3 IPv6 Ping Test 13 Appendix16 Getting to Know Your Switch20 Hardware Installation and Connection24 Hardware Overview28 The Web Configurator36 Getting Start5.1 Overview 5.2 Getting Start37 Chapter 5 Getting StartTable 9 Getting Start (continued) Model Name This field displays the model name of this Switch Serial Number This field displays the serial number of this Switch MAC Address Range the second MAC address is assigned to the first radio, and so on Version running System Up Time turned on Current Date yyyy-mm-dd CPU Usage This field displays the Switch’s recent CPU usage Memory Usage This field displays the Switch’s recent memory usage Wizard displays start up, VLAN, QoS, and link aggregation Chapter 6 on page Chapter 27 on page Chapter 10 on page Getting Start > Start up > 1 Step 1 Set up IP/DNS Figure 20 Getting Start > Start up > 1 Step 1 Set up IP/DNS 38 Each field is described in the following tableTable 10 Getting Start > Start up > 1 Step 1 Set up IP/DNS Host Name This field displays a host name IP Address default IP address is Subnet Mask The subnet mask specifies the network number portion of an IP address The factory default subnet mask is Gateway example DNS use a domain name instead of an IP address NTP(Network Time Protocol) Next Click Next to show the next screen After clicking Next, the set up your username/password screen appears Figure 21 Getting Start > Start up > 2 Step 2 Set up username/password Table 11 Getting Start > Start up > 2 Step 2 Set up username/password Username The default username is admin and associated default password is Password Previous Click Previous to show the previous screen After clicking Next, the finish screen appears 39 Figure 22 Getting Start > Start up > 3 Step 3 FinishTable 12 Getting Start > Start up > 3 Step 3 Finish Finish Review the information and click Finish to create the task In VLAN, you can create VLAN, tag VLAN setting, and view finished results Getting Start > VLAN > 1 Step 1 Create VLAN 41 Table 14 Getting Start > VLAN > 2 Step 2 Tag VLAN SettingFigure 25 Getting Start > VLAN> 3 Step 3 Finish Table 15 Getting Start > VLAN > 3 Step 3 Finish In QoS, you can create QoS settings, and view finished results 42 Getting Start > QoS > 1 Step 1 QoS (QualityOfService)43 Getting Start > Link aggregation > 1 Step 1 Link aggregation44 Figure 28 Getting Start > Link aggregation > 1 Step 1 Link aggregationTable 18 Getting Start > Link aggregation > 1 Step 1 Link aggregation 45 Figure 29 Getting Start > Link aggregation > 2 Step 2 FinishTable 19 Getting Start > Link aggregation > 2 Step 2 Finish 48 Monitor: System6.1 Overview 6.2 IP49 Chapter 6 Monitor: SystemTable 20 Monitor > System > IP > IPv4 DHCP State (DHCP) This field displays IP address of the Switch in the IP domain This field displays the subnet mask of the Switch in the IP domain notation, for example DNS Server domain This field displays the management VLAN Monitor > System > IP > IPv6 Figure 31 Monitor > System > IP > IPv6 Table 21 Monitor > System > IP > IPv6 Auto This field displays auto configuration IPv6 Address IPv6 Gateway This field displays the IP address of the default outgoing gateway DHCPv6 Client 50 6.3 Information51 Monitor: Port58 Monitor: VLAN8.1 Overview 8.2 VLAN59 Chapter 8 Monitor: VLANFigure 40 Monitor > VLAN > VLAN > VLAN Table 29 Monitor > VLAN > VLAN > VLAN VLAN ID This is the VLAN identification number VLAN Name Displays a descriptive name for the VLAN for identification purposes VLAN Type Displays a type for the VLAN for identification purposes Monitor > VLAN > VLAN > Port Figure 41 Monitor > VLAN > VLAN > Port Table 30 Monitor > VLAN > VLAN > Port PVID This is the port VLAN identification number port so that the frames are forwarded to the VLAN group that the tag defines 60 Table 30 Monitor > VLAN > VLAN > Port (continued)Accept Frame This field displays the type that is accepted by the frame Only be dropped Ingress Filter member VLAN Trunks pass through the Switch Monitor > VLAN > VLAN > VLAN Port Figure 42 Monitor > VLAN > VLAN > VLAN Port Table 31 Monitor > VLAN > VLAN > VLAN Port 61 8.3 Guest VLAN62 8.4 Voice VLAN64 Monitor: MAC Table66 Monitor: Link Aggregation10.1 Overview 10.2 Link Aggregation 68 Monitor: Loop Guard71 Monitor: Multicast75 Monitor: Spanning Tree13.1 Overview 13.2 Spanning Tree76 Chapter 13 Monitor: Spanning TreeTable 41 Monitor > Spanning Tree > CIST Bridge Indentifier address Designate Root bridge refers to the base of the spanning tree Root Bridge External Root The cost of the path from this bridge to the cist Root Bridge Path Cost Regional Root Internal Root The cost of the path from this bridge to the internal Regional Root Bridge Designated root among the bridges connected to the LAN Root Port Remanining This field displays the number of remanining hops Hops Last Topology Change that generates the topology change Monitor > Spanning Tree > CIST Port Figure 59 Monitor > Spanning Tree > CIST Port 77 Table 42 Monitor > Spanning Tree > CIST PortThis field displays the identifier (in priority / port number) (Priority / Port Id) Operation media, the higher the cost Internal Path Cost Designate Root This field displays the external root cost Internal Root Cost This field displays the internal root cost Designated Bridge to the root among the bridges connected to the LAN Edge Port configured as an edge port or when its link status changes P2P MAC This field displays the state of the P2P MAC operation Port Role This field displays the state of the port role Port State This field displays the state of the port >MST to access this screen Figure 60 Monitor > Spanning Tree > MST 78 Table 43 Monitor > Spanning Tree > MSTMST ID This is the unique identifier for this MST Select a number from the drop-downmenu to display results spanning tree network Remanining Hops device that generates the topology change Monitor > Spanning Tree > MST Port Figure 61 Monitor > Spanning Tree > MST Port Table 44 Monitor > Spanning Tree > MST Port MSTI ID A VLAN can be mapped to a specific Multiple Spanning Tree Instance (MSTI). MSTI allows multiple VLANs to use the same spanning tree 79 Chapter 13 Monitor: Spanning TreeTable 44 Monitor > Spanning Tree > MST Port (continued) Indentifier (Priority / Port Id) Internal Path Cost(Operation) Note: In this user’s guide, “STP” refers to both STP and RSTP >STP Statistics to access this screen Figure 62 Monitor > Spanning Tree > STP Statistics 80 Table 45 Monitor > Spanning Tree > STP Statistics 81 Monitor: LLDP84 Monitor: Security15.1 Overview 15.2 Port Security85 Chapter 15 Monitor: SecurityTable 49 Monitor > Security > Port Security This field displays the status of global control information This field displays the status of port based control information Max MAC Entry Number entry number can be learned for individual ports Current Addr This field displays the number of the current addr Use this screen to view Switch 802.1x security settings Monitor > Security > 802.1X > Port Figure 67 Monitor > Security > 802.1x > Port Table 50 Monitor > Security > 802.1x > Port This field displays status of the port 86 Monitor > Security > 802.1X > Authenticated HostsFigure 68 Monitor > Security > 802.1x > Authenticated Hosts Table 51 Monitor > Security > 802.1x > Authenticated Hosts 87 Monitor: Management90 Configuration: System17.1 Overview 17.2 IP91 Chapter 17 Configuration: SystemTable 54 Configuration > System > IP > IPv4 IPv4 Address the properties Enter the IP address of the Switch in the IP domain Enter the subnet mask of the Switch in the IP domain for mapping a domain name to its corresponding IP address and vice versa is for mapping a domain name to its corresponding IP address and vice versa Enter the port number of the management VLAN Apply Click Apply to save the changes IPv6 Figure 72 Configuration > System > IP > IPv6 Table 55 Configuration > System > IP > IPv6 field displays the Switch’s DHCP settings when it is acting as a DHCPv6 client manually enter the properties 92 17.3 Time93 17.4 Information94 System InformationFigure 75 Configuration > System > System Information Table 58 Configuration > System > System Information 95 Configuration: Port18.1 Overview 18.2 Port96 Chapter 18 Configuration: PortTable 59 Configuration > Port > Port > Port properties of the port Displays the port index number 32 alpha-numericalcharacters screens Displays the port status as enabled or disabled Displays the link status as up or down 100M, and 1000M , and full, or half , or FlowCtrl State the receiving port Figure 77 Configuration > Port > Port > Edit 97 18.3 EEE98 18.4 PoE99 Figure 80 Configuration > Port > PoE > PoETable 63 Configuration > Port > PoE > PoE PoE Setting must be enabled for data transmission to occur Displays which ports can receive power from the Switch. You can set this in the Configuration > Port > PoE Edit screen screen Class This shows the power classification of the PD current (mA) that the PD requires to function. The ranges are as follows 100 Table 63 Configuration > Port > PoE > PoE (continued)PD Priority priority first Power (mW) Max Power (mW) Max Current (mA) Figure 81 Configuration > Port > PoE > PoE > Edit Table 64 Configuration > Port > PoE > PoE> Edit PD State cannot receive power from the Switch 101 Table 64 Configuration > Port > PoE > PoE> Edit (continued)This field is not available for the SFP or SFP+ ports priority Select Critical to give the PD connected to this port the highest priority priority ports are served high priority ports are served 102 18.5 Bandwidth Management103 Chapter 18 Configuration: PortIngress Rate Limit (Kbps) Egress Rate Table 66 Configuration > Port > Bandwidth Management > Bandwidth Control > Edit Ingress State Select Enable to activate ingress peak rate limits on the port(s) flow on a port Egress State Select Enable to activate egress peak rate limits on the port(s) Egress 104 18.6 Storm Control105 Figure 85 Configuration > Port > Storm Control > Port > EditTable 68 Configuration > Port > Storm Control > Port > Edit Displays the port list index number(s) Select Enable to activate traffic storm control on the port(s) Click the Enable checkbox to active the feature Enter the maximum number of broadcast packets the port can receive per second Enter the maximum number of multicast packets the port can receive per second Enter the maximum number of unicast packets the port can receive per second 106 Configuration: VLAN119 Configuration: MAC Table20.1 Overview 20.2 MAC Table 123 Configuration: Link Aggregation21.1 Overview 21.2 Link Aggregation124 Chapter 21 Configuration: Link AggregationFigure 105 Configuration > Link Aggregation > Global Table 87 Configuration > Link Aggregation > Global LACP State Select Enable to activate the link aggregation control protocol LACP System Priority the higher the priority level Load Balance Algorithm src-dst-IP src-dst-mac destination MAC addresses src-dst-ip packet’s source and destination IP addresses LAG Management Figure 106 Configuration > Link Aggregation > LAG Management 125 Table 88 Configuration > Link Aggregation > LAG ManagementClick Add to create a new LAG Management entry Displays the name of the link aggregation group This field displays how these ports were added to the trunk group. It displays: Static - if the ports are configured as static members of a trunk group LACP - if the ports are configured to join a trunk group via LACP Displays link status as either Link up or Link down Standby Member Use this screen to add a LAG. Click Figure 107 Configuration > Link Aggregation > LAG Management > Add 126 Table 89 Configuration > Link Aggregation > LAG Management > AddSelect the link aggregation group (LAG) Enter the name of this entry Select Static or LACP Select the member ports to be part of the LAG Figure 108 Configuration > Link Aggregation > LAG Port Table 90 Configuration > Link Aggregation > LAG Port Displays the LAG index value Displays the LAG name Port Type Displays the port type Displays the state as Enable/Disable Displays the speed value as Auto, Auto-10M, Auto-100M, Auto-1000M, Auto-10 Displays the speed value as 100M, 10M, 100M, or 1000M Displays the duplex value as Full, Half, or Auto Displays whether flow control is Enable/Disable Displays whether flow control is in use (Enable) or not (Disable) 128 Figure 110 Configuration > Link Aggregation > LACP PortTable 92 Configuration > Link Aggregation > LACP Port Displays the priority value Timer (sec) Displays the Timer value in seconds the trunk group as soon as possible Figure 111 Configuration > Link Aggregation > LACP Port > Edit 129 Table 93 Configuration > Link Aggregation > LACP Port > Edit 130 Configuration: Loop Guard22.1 Overview 22.2 Loop Guard131 Chapter 22 Configuration: Loop GuardTable 94 Configuration > Loop Guard (continued) Recovery Time detected (and the port action shuts down the port) Figure 113 Configuration > Loop Guard > Port Table 95 Configuration > Loop Guard > Port Click Edit to change the properties of the port Displays whether the port state is Enable or Disable Log Shutdown Port Shutdown and Log and 132 Chapter 22 Configuration: Loop GuardFigure 114 Configuration > Loop Guard > Port > Edit Table 96 Configuration > Loop Guard > Port > Edit 133 Configuration: Mirror23.1 Overview 23.2 Mirror134 Chapter 23 Configuration: MirrorTable 97 Configuration > Mirror Mirroring Monitor Port monitor port Specify the ports to mirror outgoing traffic Specify the ports to mirror incoming traffic 135 Configuration: Multicast24.1 Overview 24.2 IGMP136 Chapter 24 Configuration: MulticastTable 98 Configuration > Multicast > IGMP (continued) Snooping Select v2 or v3 depending on the snooping version you require Multicast Action are available: IGMP VLAN Configuration > Multicast > IGMP > VLAN Figure 117 Configuration > Multicast > IGMP > VLAN Table 99 Configuration > Multicast > IGMP > VLAN IGMP VLAN Click Edit to change the properties of the IGMP VLAN entry Displays the ID of a static VLAN; the valid range is between 1 and Display the status of the VLAN as enabled or disabled Router Ports Auto Learn disabled Displays the number of query retry times Interval (sec) router connected to the upstream port Max. Response for a response to an IGMP general query message Displays the number of queries by an upstream port when an IGMP Done message is received 137 Table 99 Configuration > Multicast > IGMP > VLAN (continued)Displays the switch current VLAN querier entry as Enable or Disable Displays the switch current VLAN querier entry version Configuration > Multicast > IGMP >VLAN > Edit to open this screen Figure 118 Configuration > Multicast > IGMP > VLAN > Edit Table 100 Configuration > Multicast > IGMP > VLAN > Modify IGMP Edit Enter the ID of a static VLAN; the valid range is between 1 and IGMP State Select the status of the VLAN to Enable or Disable the function VLANs automatically Enter the number of query retry times. The value can be between 1 and connected to the upstream port. The value can be between 30 and a response to an IGMP general query message 138 Table 100 Configuration > Multicast > IGMP > VLAN > Modify (continued)Enter the number of queries upstream port when an IGMP Done message is received IGMP Querier Select the IGMP querier status to Enable or Disable the function Select the IGMP Querier version to v2 or Figure 119 Configuration > Multicast > IGMP > Router Port Table 101 Configuration > Multicast > IGMP > Router Port Click Add to create a new Router Port entry Static Router Displays the ports that are defined as static router ports Ports Forbidden Displays the ports that are defined as forbidden router ports Router Port Configuration > Multicast > IGMP > Router Port Add/Modify 139 Figure 120 Configuration > Multicast > IGMP > Router Port > Add/ModifyTable 102 Configuration > Multicast > IGMP > Router Port > Add/Modify 140 IGMP Profile141 Table 104 Configuration > Multicast > IGMP > Profile > Add/Modify (continued)Enter the profile start group IP address Enter the profile end group IP address Select the action of the profile as to be Permit or Deny Throttling Configuration > Multicast > IGMP > Throttling Figure 123 Configuration > Multicast > IGMP > Throttling Table 105 Configuration > Multicast > IGMP > Throttling IGMP Port Throttling Max. Groups Displays the maximum number of groups Exceed Group Displays the action taken by the groups as Permit or Deny Number Action Filter Profile ID Displays the throttling filter profile ID 142 Figure 124 Configuration > Multicast > IGMP > Throttling > Add/EditTable 106 Configuration > Multicast > IGMP > Throttling > Add/Edit Replace 143 Configuration: Spanning Tree25.1 Overview 25.2 Spanning Tree144 Chapter 25 Configuration: Spanning TreeFigure 125 Configuration > Spanning Tree Table 107 Configuration > Spanning Tree Select to Enable or Disable the Spanning-Treefunction BPDU Forward Select Short or Long as a Path Cost method the media, the higher the cost - see Table 40 on page 112 for more information Enter the revision number of configuration. The number can be between 0 and Revision 145 Figure 126 Configuration > Spanning Tree > STP PortTable 108 Configuration > Spanning Tree > STP Port Displays the index number of the STP port Display the status of the STP port as enabled or disabled External Cost Displays the external path cost Displays the edge port status as Yes or No BPDU Filter Displays the BPDU filter status as Yes or No Displays the P2P MAC status as Yes or No STP Port Edit Configuration > Spanning Tree > STP Port > Edit 146 Figure 127 Configuration > Spanning Tree > STP Port > EditTable 109 Configuration > Spanning Tree > STP Port > Edit Enter the index number of the STP port(s) External Path Enter the external path cost. Enter 0 for Auto Cost (0=Auto) Select the state of the STP port as enabled or disabled Note: An edge port becomes a non-edgeport as soon as it receives a Bridge Protocol Data Unit (BPDU) Select Yes to activate BPDU filter or No to deactivate it Select Yes to activate P2P MAC or No to deactivate it Migrate Select Yes to activate Migrate or No to deactivate it Configuration > Spanning Tree > CIST 147 Figure 128 Configuration > Spanning Tree > CISTTable 110 Configuration > Spanning Tree > CIST CIST Instance Configure priority of CIST bridge ID Priority is part of bridge ID, used for CIST root bridge selection Max Hops Enter a maximum number of hops value. The value can be between 1 and Forward Delay might result. The allowed range is 4 to 30 seconds As a general rule: Note: 2 * (Forward Delay - 1) >= Max Age >= 2 * (Hello Time + 1) Max Age 6 to 40 seconds Tx Hold Count Enter a transmission hold count value. The value can be between 1 and Hello Time This is the time interval in seconds between BPDU (Bridge Protocol Data Units) configuration message generations by the root switch. The allowed range is 1 to seconds 148 CIST PortConfiguration > Spanning Tree > CIST Port Figure 129 Configuration > Spanning Tree > CIST Port Table 111 Configuration > Spanning Tree > CIST Port Displays the priority for each port here Cost Displays the internal path cost CIST Port Edit Configuration > Spanning Tree > CIST Port > Edit 149 Figure 130 Configuration > Spanning Tree > CIST Port > EditTable 112 Configuration > Spanning Tree > CIST Port > Edit STP CIST Port Configure the priority for each port here between 0 and 255 and the default value is Enter the internal path cost. Enter 0 or Auto Configuration > Spanning Tree > MST Figure 131 Configuration > Spanning Tree > MST Table 113 Configuration > Spanning Tree > MST MST Instance Click Add to create a new MST Instance entry MSTI Displays the Multiple Spanning Tree Instance(s) (MSTI) Display a list of MSTI VLANs 150 Table 113 Configuration > Spanning Tree > MST (continued)Figure 132 Configuration > Spanning Tree > MST > Add/Modify Table 114 Configuration > Spanning Tree > MST > Add/Modify MST Port Configuration > Spanning Tree > MST Port 151 Figure 133 Configuration > Spanning Tree > MST PortTable 115 Configuration > Spanning Tree > MST Port Select the MST port ID number from the dropdown list the properties of the MST ID Displays the index number of the MST port Displays the index value of the MSTI Displays the priority for each port MST Port Edit Configuration > Spanning Tree > MST Port > Edit 152 Figure 134 Configuration > Spanning Tree > MST Port > EditTable 116 Configuration > Spanning Tree > MST Port > Edit STP MST Port Displays the MST ID number Enter the index number of the MTP port(s) Enter the internal path cost. Enter 0 for Auto 153 Configuration: LLDP26.1 Overview 26.2 LLDP154 Table 117 Configuration > LLDP > Global (continued)Transmission Enter the transmission interval value the Tx Interval value. Valid values are restricted to 5 - 32768 seconds Hold Multiplier Enter the hold multiplier value Tx Interval seconds. Valid values are restricted to 2 - 10 times Reinitialization Enter the reinitialization delay value Delay a new LLDP initialization. Valid values are restricted to 1 - 10 seconds Transmit Delay Enter the transmission delay value 8192 seconds LLDP-MEDFast Enter the LLDP-MEDfast start repeat count value Start Repeat transmitted, when an LLDP frame with new information is received Configuration > LLDP > Port 155 Figure 136 Configuration > LLDP > PortTable 118 Configuration > LLDP > Port LLDP VLAN Displays the index number of the LLDP port Displays the mode of the LLDP port as Disable, Tx Only, Rx Only, or Tx & Rx Optional TLV Displays the TLV as one or more of the following options: Port Edit Configuration > LLDP > Port > Edit 156 Local InformationConfiguration > LLDP 157 Figure 138 Configuration > LLDP > Local InformationTable 120 Configuration > LLDP > Local Information Chassis ID System Name Displays the System Description 158 Table 120 Configuration > LLDP > Local Information (continued)Capabilities Capabilities Supported describes the neighbor unit's capabilities. The possible Supported capabilities are: Other Repeater WLAN Access Point Telephone DOCSIS cable device Station only Reserved the capability is followed by (-) Displays which capability is enabled Enable Displays the Port ID Subtype Coordinate Displays the location coordinate of the LLDP port(s) Civic Address Displays the location of the civic address(es) in hexadecimal ECS ELIN Emergency Call Service (e.g. E911 and others), such as defined by TIA or NENA emergency calling Configuration > LLDP > Local Information > Edit 159 Figure 139 Configuration > LLDP > Local Information > EditTable 121 Configuration > LLDP > Local Information > Edit 160 Table 121 Configuration > LLDP > Local Information > Edit (continued)Location Coordinates Latitude Latitude SHOULD be normalized to within 0-90degrees with a maximum of 4 digits North South equator Longitude prime meridian Altitude It is possible to select between two altitude types (floors or meters) Meters: represents ground level at the given latitude and longitude. Inside a building represents the floor level associated with ground level at the main entrance Map Datum The Map Datum is used for the coordinates given in these options: WGS84: (Geographical 3D) - World Geodesic System 1984, CRS Code 4327, Prime Meridian Name: Greenwich water (which would use Datum = NAD83/MLLW) NAD83/MLLW: North American Datum 1983, CRS Code 4269, Prime Meridian Name: pair is to be used when referencing locations on water/sea/ocean Location Civic Address • Country code: The two-letterISO 3166 country code in capital ASCII letters Example: DK, DE or US • State: National subdivisions (state, canton, region, province, prefecture) • County: County, parish, gun (Japan), district • City: City, township, shi (Japan) - Example: Copenhagen • City district: City division, borough, city district, ward, chou (Japan) • Block (Neighborhood): Neighborhood, block • Street: Street - Example: Poppelvej • Leading street direction: Leading street direction - Example: N • Trailing street suffix: Trailing street suffix - Example: SW • Street suffix: Street suffix - Example: Ave, Platz • House no.: House number - Example: • House no. suffix: House number suffix - Example: A, 1/2 • Landmark: Landmark or vanity address - Example: Columbia University • Additional location info: Additional location info - Example: South Wing • Name: Name (residence and office occupant) - Example: Flemming Jahn • Zip code: Postal/zip code - Example: • Building: Building (structure) - Example: Low Library • Apartment: Unit (Apartment, suite) - Example: Apt • Floor: Floor - Example: • Room no.: Room number - Example: 450F • Place type: Place type - Example: Office • Postal community name: Postal community name - Example: Leonia • P.O. Box: Post office box (P.O. BOX) - Example: 161 Chapter 26 Configuration: LLDPLocation ECS ELIN MED Network Policy Figure 140 Configuration > LLDP > MED Network Policy Table 122 Configuration > LLDP > MED Network Policy Network Policy Configuration Click Add to create a new Network Policy Configuration entry Click to create a new entry Displays index of network policy Application Application type Displays the VLAN ID (VID) for the port as defined in IEEE 802.1Q-2003 VLAN Tag Displays the VLAN Tag value as Tagged or Untagged L2 Priority Displays the L2 priority layer value DSCP Value Displays the DSCP Value Configuration > LLDP > MED Network Policy > Add/Edit 162 Figure 141 Configuration > LLDP > MED Network Policy > Add/EditTable 123 Configuration > LLDP > MED Network Policy > Edit Select the index of network policy application types are shown below Voice - for use by dedicated IP Telephony handsets and other similar appli ances supporting interactive voice services. These devices are typically deployed on a separate VLAN for ease of deployment and enhanced security by isolation from data applications Voice Signalling - for use in network topologies that require a different pol icy for the voice signalling than for the voice media Guest Voice - to support a separate limited feature-setvoice service for guest users and visitors with their own IP Telephony handsets and other sim ilar appliances supporting interactive voice services Guest Voice Signalling - for use in network topologies that require a differ ent policy for the guest voice signalling than for the guest voice media Softphone Voice - for use by softphone applications on typical data centric devices, such as PCs or laptops Video Conferencing - for use by dedicated Video Conferencing equipment and other similar appliances supporting real-timeinteractive video/audio ser vices Streaming Video - for use by broadcast or multicast based video content distribution and other similar applications supporting streaming video ser vices that require specific network policy treatment. Video applications rely ing on TCP with buffering would not be an intended use of this application type Video Signalling - for use in network topologies that require a separate pol icy for the video signalling than for the video media 163 Table 123 Configuration > LLDP > MED Network Policy > Edit (continued)VLAN. Select Tagged or Untagged tag header as defined by IEEE 802.1Q-2003 Tagged: The device is using the IEEE 802.1Q tagged frame format eight priority levels (0 through 7) through 63) Figure 142 Configuration > LLDP > MED Port Table 124 Configuration > LLDP > MED Port Displays the MED Port value Displays the state of the MED port as Enable or Disable Network Policy Displays the Network Policy value 164 Table 124 Configuration > LLDP > MED Port (continued)Location Displays the Location value Displays the PoE value Inventory Displays the Inventory value MED Port Edit Configuration > LLDP > MED Port >Edit to open this screen Figure 143 Configuration > LLDP > MED Port > Edit Table 125 Configuration > LLDP > MED Port > Edit Displays the Port List Select Enable to activate the MED Port feature MED Optional Select one or more of the MED Optional TLVs: TLVs PoE PSE to activate 165 Table 125 Configuration > LLDP > MED Port > Edit (continued) 166 Configuration: QoS27.1 Overview 27.2 General167 Chapter 27 Configuration: QoSTable 126 Configuration > QoS > General QoS Port Displays the QoS port list CoS Value Displays the CoS value, range: 0 Remark CoS Displays if this function is disabled or enabled Remark DSCP Remark IP Precedence Figure 145 Configuration > QoS > General > Port > Edit Table 127 Configuration > QoS > General > Port > Edit Displays the index number of the QoS port(s) Select the CoS Value from the dropdown list CoS Remark Select Enable to activate CoS Remark DSCP Remark Select Enable to activate DSCP Remark Select Enable to activate IP Precedence Remark Remark 168 QueueCos Mapping General > CoS Mapping 169 Figure 147 Configuration > QoS > General > CoS MappingTable 129 Configuration > QoS > General > CoS Mapping 170 DSCP MappingGeneral 171 IP Precedence MappingGeneral > IP Precedence Mapping Figure 149 Configuration > QoS > General > IP Precedence Mapping Table 131 Configuration > QoS > General > IP Precedence Mapping 172 27.3 Trust Mode175 Configuration: Security184 Configuration: AAA29.1 Overview 29.2 Auth Method 185 29.3 RADIUS186 Figure 166 Configuration > AAA > RADIUSTable 148 Configuration > AAA > RADIUS Server Click Add to create a new Server entry Displays the server name(s) as an IP address or a domain name Auth Port Displays the authentication port number(s) as a value between 0 and Key Displays the authentication key Time out Retries Displays the number of retries. The value can be between 1 and Displays the server priority as High or Low Usage Type Displays the server usage type as Login, 802.1X, or All Click to Edit modify the entry Click Delete to delete the entry Add/ Modify 187 29.4 TACACS+190 Configuration: Management30.1 Overview 30.2 Syslog191 Chapter 30 Configuration: ManagementFigure 171 Configuration > Management > Syslog > Local Table 153 Configuration > Management > Syslog > Local Click Add to create a new Local entry Displays the severity level of messages to be written to logs Figure 172 Configuration > Management > Syslog > Local > Add/Modify Table 154 Configuration > Management > Syslog > Local > Add/Modify Local Add 192 Table 154 Configuration > Management > Syslog > Local > Add/Modify (continued)Select the severity level of messages to be written to logs Figure 173 Configuration > Management > Syslog > Remote Table 155 Configuration > Management > Syslog > Remote Click Add to create a new Remote entry Server Info Facility Displays the facility designation of the remote entry 193 30.3 SNMP194 Figure 175 Configuration > Management > SNMPTable 157 Configuration > Management > SNMP Select the global SNMP setting to be enabled or disabled Figure 176 Configuration > Management > SNMP > Community Table 158 Configuration > Management > SNMP > Community Click Add to create a new SNMP Community entry Access Right Write 195 Figure 177 Configuration > Management > SNMP > Community > Add/ModifyTable 159 Configuration > Management > SNMP > Community > Add/Modify Figure 178 Configuration > Management > SNMP > Group Table 160 Configuration > Management > SNMP > Group SNMPv3 Group Click Add to create a new SNMPv3 Group entry 196 Table 160 Configuration > Management > SNMP > Group (continued)Group Name Security Model Security Level Figure 179 Configuration > Management > SNMP > Group > Add/Modify Table 161 Configuration > Management > SNMP > Group > Add/Modify SNMPv3 Group Edit 197 Table 161 Configuration > Management > SNMP > Group > Add/Modify (continued)Figure 180 Configuration > Management > SNMP > User Table 162 Configuration > Management > SNMP > User SNMP User Click Add to create a new SNMP user length is 1 to 30, and the allowed content is ASCII characters from 33 to Privilege Mode Displays the privilege mode that this entry belongs to Protocol protocols are: you must first ensure that the value is set correctly Encryption Displays the encryption protocol that this entry belongs to 198 Figure 181 Configuration > Management > SNMP > User > Add/ModifyTable 163 Configuration > Management > SNMP > User > Add/Modify Auth Protocol Auth Password string length is 8 to 32. The allowed content is ASCII characters from 33 to Priv password and the allowed content is ASCII characters from 33 to Trap 199 Figure 182 Configuration > Management > SNMP > TrapTable 164 Configuration > Management > SNMP > Trap SNMP Trap SNMP Authfailure Trap State SNMP LinkupDown Select the SNMP trap link-upand link-downmode operation. Possible modes are: SNMP Warm-Start Reboot using software or hardware button reboot SNMP Cold-Start Reboot though power off Trap Destination Figure 183 Configuration > Management > SNMP > Trap Destination 200 Table 165 Configuration > Management > SNMP > Trap DestinationSNMP Trap Host >SNMP > Trap Destination > Add/Modify to open this screen Figure 184 Configuration > Management > SNMP > Trap Destination > Add/Modify Table 166 Configuration > Management > SNMP > Trap Destination > Add/Modify 201 30.4 Error Disable202 30.5 HTTP/HTTPS203 30.6 Users205 30.7 Remote Access Control206 Table 172 Configuration > Management > Remote Access ControlSelect the global remote access setting to be enabled or disabled Click Add to create a new profile entry Displays the priority level of the entry. The value can be between 1 and Displays the action value. The values are Permit or Deny Source IP Display the source IP value Wildcard Mask Displays the source IP wildcard Display the port value Service 207 Management Access List AddEnter the priority level of the entry. The value can be between 1 and Select the action value. The values are Permit or Deny Source Select the source IP value. The options are ALL or IPv4/Wildcard IPv4/Wildcard Select and enter the IPv4/Wildcard source 208 Maintenance31.1 Firmware Upgrade 209 31.2 Firmware Management210 31.3Backup a Configuration File211 MaintenanceBackup Figure 194 Maintenance > Configuration > Backup The following table describes the labels under Backup Table 176 Maintenance > Configuration > Backup HTTP choose TFTP to upload the snapshot to a TFTP server To upload the backup to a TFTP server, enter the TFTP server IP address Content backup) or log files (flash or buffer) There are three different types of configuration files: Startup - this is the configuration used when the switch is booting up Running - this is the configuration when the switch is running new file Follow the steps below to backup configuration or log files to a TFTP server 3.In Content, choose any one file type Follow the steps below to backup configuration or log files to your computer 212 31.4Restore a Configuration File213 31.5Manage Configuration Files214 31.6 Reset to Factory Defaults31.7 Network Diagnostics215 Figure 197 Maintenance > Diagnostics > Port TestFollow the steps to perform the port test 1.In Port Test, select the port number from the Port drop-downlist 2.Click Test to start the port test The test results are displayed in Test Results PING > IPv4 Figure 198 Maintenance > Diagnostics > PING > IPv4 The following table describes the labels under Ping Test Table 179 Maintenance > Diagnostics > PING > IPv4 Enter the address of the target host server default is 1 second Size bytes 216 Follow the steps to perform a ping test1.In IP Address, enter the IPv4 address 2.In Count, enter the number of ping packets 3.In Interval, enter the time interval in seconds 4.In Size, enter the packet size in bytes 5.Click Apply to perform the ping test The test results are displayed in Results PING > IPv6 Figure 199 Maintenance > Diagnostics > PING > IPv6 The following table describes the labels in IPv6 Ping Test Table 180 Maintenance > Diagnostics > PING > IPv6 1.In IP Address, enter the IPv6 address 217 TraceFigure 200 Maintenance > Diagnostics > Trace The following table describes the labels in Trace Route Table 181 Maintenance > Diagnostics > Trace IP Addres range is 2 to 255 packets; the default is 30 hops Follow the steps to perform a trace route 2.In Hops, enter the number of hops 3.Click Apply to perform the test The test results are displayed in Result 218 31.8 Reboot219 Troubleshooting32.1Power, Hardware Connections, and LEDs 220 32.2Switch Access and Login221 •If you changed the IP address, use the new IP addressI forgot the IP address for the Switch Section on page Make sure your Internet browser does not block Advanced Suggestions I can see the Login screen, but I cannot log in to the Switch 3Disconnect and re-connectthe cord to the Switch Pop-upWindows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: •Web browser pop-upwindows from your device •JavaScripts (enabled by default) •Java permissions (enabled by default) 222 32.3 Switch Configuration223 Legal Information224 Appendix A Legal InformationNote Registration 225 domain name 49, 91, 92, 96, 97, 98, 99, 100, 103as DHCP servers 49, 91, 92, 96, 97, 98, 99, 100, 103 226 system name 36, 49, 91, 119, 120, 121
Also you can find more ZyXEL Communications manuals or manuals for other Computer Equipment.