ZyXEL Communications GS2210 manuals
Computer Equipment > Switch
When we buy new device such as ZyXEL Communications GS2210 we often through away most of the documentation but the warranty.
Very often issues with ZyXEL Communications GS2210 begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Switch ZyXEL Communications GS2210 is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Switch on our side using links below.
ZyXEL Communications GS2210 Manual
387 pages 9.35 Mb
1 GS2210 SeriesUser’s GuideDefault Login Details 2 IMPORTANTREAD CAREFULLY BEFORE USE KEEP THIS GUIDE FOR FUTURE REFERENCE Related DocumentationNote: It is recommended you use the Web Configurator to configure the Switch 3 Contents Overview5 Table of ContentsPart I: User’s Guide Chapter 6 The Web ConfiguratorBasic Setting 7 VLAN8 Rapid Spanning Tree Protocol StatusConfigure Multiple Rapid Spanning Tree Protocol Multiple Rapid Spanning Tree Protocol Status 13.10 Multiple Spanning Tree Protocol Status 13.11.4 Common and Internal Spanning Tree (CIST) 9 Link Aggregation Control Protocol10 20.2.1 Viewing and Editing Classifier Configuration21.1.1 What You Can Do 21.2.1 Viewing and Editing Policy Configuration 22.1.1 What You Can Do 22.1.2 What You Need to Know 23.1.1 What You Can Do 23.1.2 What You Need to Know 23.3.1 IGMP Snooping 23.4 IGMP Snooping VLAN 23.4.1 IGMP Filtering Profile 23.5.1 MLD Snooping-proxy 23.5.2 MLD Snooping-proxyVLAN 23.5.3 MLD Snooping-proxyVLAN Port Role Setting 23.5.4 MLD Snooping-proxyVLAN Filtering 23.5.5 MLD Snooping-proxyVLAN Filtering Profile 23.6.1 MVR Group Configuration 23.6.2 MVR Configuration Example 24.1.1 What You Can Do 11 24.1.2 What You Need to Know24.6.1 Vendor Specific Attribute 24.6.2 Supported RADIUS Attributes 24.6.3 Attributes Used for Authentication 25.1.1 What You Can Do 25.1.2 What You Need to Know 25.4 DHCP Snooping 25.5.1 DHCP Snooping Port Configure 25.5.2 DHCP Snooping VLAN Configure 25.5.3 DHCP Snooping VLAN Port Configure 25.9.1 ARP Inspection Port Configure 25.9.2 ARP Inspection VLAN Configure 25.10 Technical Reference 25.10.1 DHCP Snooping Overview 25.10.2 ARP Inspection Overview 26.1.1 What You Can Do 26.1.2 What You Need to Know 27.1.1 What You Can Do 12 27.1.2 What You Need to Know28.1.1 What You Can Do 28.1.2 What You Need to Know 28.2 The PPPoE Screen 28.3.1 PPPoE IA Per-Port 28.3.2 PPPoE IA Per-Port Per-VLAN 28.3.3 PPPoE IA for VLAN 29.1.1 What You Can Do 32.2 LLDP-MEDOverview 32.4.1 LLDP Local Port Status Detail 32.5.1 LLDP Remote Port Status Detail 13 32.6.1 LLDP Configuration Basic TLV Setting32.6.2 LLDP Configuration Basic Org-specificTLV Setting 33.1.1 What You Can Do 34.1.1 What You Can Do 34.1.2 What You Need to Know 34.3.1 Configuring DSCP Settings 35.1 DHCP Overview 35.1.1 What You Can Do 35.1.2 What You Need to Know 35.4 DHCPv4 Relay 35.4.1 DHCPv4 Relay Agent Information 35.4.2 DHCPv4 Option 82 Profile 35.4.3 Configuring DHCPv4 Global Relay 35.4.4 DHCPv4 Global Relay Port Configure 35.4.5 Global DHCP Relay Configuration Example 35.5.1 DHCPv4 VLAN Port Configure 35.5.2 Example: DHCP Relay for Two VLANs 35.6 DHCPv6 Relay 14 38.3.1 Configuring SNMP Trap Group38.3.2 Enabling/Disabling Sending of SNMP Traps on a Port 38.3.3 Configuring SNMP User 15 Cluster ManagementMAC Table ARP Table Path MTU Table 18 Getting to Know Your Switch23 Hardware Installation and Connection2.1 Installation Scenarios 2.2Desktop Installation Procedure 2.3Mounting the Switch on a Rack 26 Hardware Panels3.1 Front Panel3.1.1 Gigabit Ethernet Ports 27 3.1.2 Mini-GBICSlots4Close the transceiver’s latch (latch styles vary) Figure Figure 12 Connecting the Fiber Optic Cables 28 3.1.2.2Transceiver RemovalUse the following steps to remove a mini-GBICtransceiver (SFP module) 1Remove the fiber optic cables from the transceiver 2Open the transceiver’s latch (latch styles vary) 3Pull the transceiver out of the slot Figure 13 Removing the Fiber Optic Cables Figure 14 Opening the Transceiver’s Latch Example Figure 15 Transceiver Removal Example 3.1.3 LED Mode (only available for GS2210-48HP) 29 3.2 Rear Panel3.2.1 Console Port 3.2.2 Power Connector 30 3.3 LEDs32 The Web Configurator4.1 Overview 4.2System Login 33 4.3The Status ScreenB FC D E34 D - Click this link to logout of the web configuratorIn the navigation panel, click a main link to reveal a list of submenu links Table 4 Navigation Panel Sub-linksOverview BASIC SETTING ADVANCED APPLICATION IP APPLICATION MANAGEMENT The following table describes the links in the navigation panel Table 5 Navigation Panel Links LINK Basic Settings System Info This link takes you to a screen that displays general system information General Setup about the Switch Switch Setup VLAN type, GARP and priority queues IP Setup routing domains 35 Table 5 Navigation Panel Links (continued)Port Setup PoE Setup For PoE model(s) reserve and allocate power to certain PDs Interface Setup type and ID IPv6 Advanced Application VLAN This link takes you to screens where you can configure port-basedor 802.1Q VLAN protocol based VLAN or a subnet based VLAN in these screens Static MAC Forwarding These static MAC addresses do not age out Static Multicast port(s). These static multicast MAC addresses do not age out Filtering This link takes you to a screen to set up filtering rules Spanning Tree Protocol network loops Bandwidth Control Broadcast Storm This link takes you to a screen to set up broadcast filters Mirroring Link Aggregation logical, higher-bandwidthlink Authentication clients communicating via the Switch Port Security maximum number of MAC addresses to learn on a port Classifier on the specified criteria Policy Rule treatment on the grouped packets Queuing Method weights for each port Multicast snooping and create multicast VLANs AAA Control System Plus) IP Source Guard ARP packets in your network Loop Guard that occur on the edge of your network Layer 2 Protocol Tunneling settings on the Switch 36 4.3.1 Change Your Password37 4.4 Saving Your Configuration4.5 Switch Lockout 38 4.6Resetting the Switch4.6.1 Reload the Configuration File 4.7Logging Out of the Web Configurator 39 4.8 Help40 Initial Setup Example44 Tutorials52 ZON Utility, ZON Neighbor Management and Port Status7.1 Overview 7.2 ZyXEL One Network (ZON) Utility Screen 53 7.3 ZON Neighbor Management Screen54 Figure 41 Status > NeighborThe following table describes the fields in the above screen Table 7 Status > Neighbor LABEL Local This shows the port number of the local device in the network Name This shows the name of the local device in the network PoE Draw Remote Model Name field will show “-”for non-ZyXELdevices Sys. Name This shows the system name of the neighbor device in the remote network FW Version This field will show “-”for non-ZyXELdevices This show the port number of the neighbor device in the remote network Port Description will show “-”for non-ZyXELdevices 55 7.4 Port Status Summary56 7.4.1 Status: Port Details57 Figure 43 Status > Port DetailsTable 9 Status: Port Details Port Info Port NO This field displays the port number you are viewing This field displays the name of the port (Copper or Fiber) Status (Section 13.1 on page 114 for more information) This field shows if LACP is enabled on this port or not This field shows the number of transmitted frames on this port This field shows the number of received frames on this port 58 Table 9 Status: Port Details (continued)This field shows the total amount of time the connection has been up Tx Packet The following fields display detailed information about packets transmitted Unicast This field shows the number of good unicast packets transmitted This field shows the number of good multicast packets transmitted Broadcast This field shows the number of good broadcast packets transmitted Pause This field shows the number of 802.3x Pause packets transmitted Rx Packet The following fields display detailed information about packets received This field shows the number of good unicast packets received This field shows the number of good multicast packets received This field shows the number of good broadcast packets received This field shows the number of 802.3x Pause packets received TX Collision The following fields display information on collisions while transmitting Single exactly one collision Multiple more than one collision Excessive reset Late have already been transmitted Error Packet RX CRC Runt including the ones with CRC errors Distribution 59 1024 and 1518 octets in lengthGiant 1519 octets and the maximum frame size The maximum frame size varies depending on your switch model 60 Basic Setting8.1 Overview 8.2 System Information61 Chapter 8 Basic SettingFigure 44 Basic Setting > System Info (for PoE model(s) only) Table 10 Basic Setting > System Info System Name Product Model firmware upgrade or looking for other support information in the website ZyNOS F/W Version created Ethernet Address CPU Utilization Current (%) percentage of CPU utilization Memory Utilization the current percentage of memory utilization Hardware Monitor Temperature Unit Fahrenheit) in this field BOARD PHY printed circuit board Current This shows the current temperature at this sensor MAX This field displays the maximum temperature measured at this sensor MIN This field displays the minimum temperature measured at this sensor Threshold This field displays the upper temperature limit at this sensor 62 8.3 General Setup63 Table 11 Basic Setting > General Setupprintable characters; spaces are allowed Location characters; spaces are allowed Contact Person's ASCII characters; spaces are allowed Use Time Server when Bootup differences between them are the time format that you use a Daytime timeserver within your geographical time zone since 1970/1/1 at 0:0:0 NTP (RFC-1305) is similar to Time (RFC-868) is similar to time and date will be reset to 1970-1-10:0:0 Time Server IP locked for 60 seconds. Please wait Current Time This field displays the time you open this menu (or refresh the menu) New Time (hh:min:ss) Current Time field after you click Apply Current Date This field displays the date you open this menu New Date (yyyy mm-dd) Current Date field after you click Apply Time Zone GMT, Greenwich Mean Time) and your time zone from the drop-downlist box Daylight Saving Time Select this option if you use Daylight Saving Time Start Date 2:00 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1) 64 8.4 Introduction to VLANs8.5 Switch Setup Screen65 Figure 46 Basic Setting > Switch SetupTable 12 Basic Setting > Switch Setup VLAN Type Chapter 9 on page 86 for more information MAC Address Learning: MAC address learning reduces outgoing broadcast traffic Aging Time ARP Aging Time Join Leave Leave All Join Timer information Leave Timer the default is 600 milliseconds Leave All Timer Timer 66 8.6 IP Setup8.6.1 Management IP Addresses67 Figure 47 Basic Setting > IP SetupTable 13 Basic Setting > IP Setup Domain Name Server use a domain name instead of an IP address Default Management IP Address DHCP Client subnet mask, a default gateway IP address and a domain name server IP address automatically Static IP Address select this option IP Address Enter the IP address of your Switch in dotted decimal notation for example IP Subnet Mask Enter the IP subnet mask of your Switch in dotted decimal notation for example 68 8.7 Port Setup69 Figure 48 Basic Setting > Port SetupTable 14 Basic Setting > Port Setup This is the port index number Settings in this row apply to all ports to set the common settings and then make adjustments on a port-by-portbasis Note: Changes in this row are copied to all the ports as soon as you make them must be enabled for data transmission to occur characters screens Type This field displays the capacity that the port can support Speed/Duplex 1000M/Full Duplex (Gigabit connections only) the same in order to connect 70 8.8 PoE Status71 PoE SetupFigure 50 Basic Setting > PoE Status Table 15 Basic Setting > PoE Status PoE Status PoE Mode Classification or Consumption mode Total Power devices on the PoE ports Consuming Power (W) PoE-enableddevices Allocated Power (W) negotiating with the connected PoE device(s) (W) Remaining This field displays the amount of power the Switch can still provide for PoE PoE device, even if the PoE device needs less than 16W 8.8.1 on page • Disable - The PD connected to this port cannot get power supply • Enable - The PD connected to this port can receive power 72 8.8.1 PoE Setup73 8.9 Interface Setup74 8.10 IPv686 VLAN9.1 Overview 89 9.2 VLAN Status91 9.3 VLAN Configuration9.4 Configure a Static VLAN92 Figure 68 Advanced Application > VLAN > VLAN Configuration > Static VLAN SetupThe following table describes the related labels in this screen Table 32 Advanced Application > VLAN > VLAN Configuration > Static VLAN Setup ACTIVE Select this check box to activate the VLAN settings of up to 64 printable characters. Spaces are allowed VLAN Group ID Enter the VLAN ID for this static entry; the valid range is between 1 and The port number identifies the port you are configuring default selection Select Fixed for the port to be a permanent member of this VLAN group Select Forbidden if you want to prohibit the port from joining this VLAN group Tagging VLAN Group ID 93 9.5 Configure VLAN Port Settings94 9.6 Subnet Based VLANs97 9.7 Protocol Based VLANs9.7.1 Configuring Protocol Based VLAN98 Check this box to activate this protocol based VLANType a port to be included in this protocol based VLAN Chapter 9 on page 86 for more details on setting up VLANs Enter up to 32 alpha numeric characters to identify this protocol based VLAN Ethernet-type the IP protocol in hexadecimal notation is 0800, and Novell IPX protocol is used for protocol based VLANs defined in the Advanced Applications > VLAN screens defined in the to edit an existing protocol based VLAN This field shows whether the protocol based VLAN is active or not This field shows which port belongs to this protocol based VLAN This field shows the name the protocol based VLAN Ethernet Type This field shows which Ethernet protocol is part of this protocol based VLAN 99 9.8 Port-basedVLAN SetupFiltering 9.8.1 Configure a Port-basedVLAN 102 9.9 Voice VLAN103 Figure 76 Advanced Application > VLAN > VLAN Configuration > Voice VLAN SetupTable 37 Advanced Application > VLAN > VLAN Configuration > Voice VLAN Setup Voice VLAN Global Setup Voice VLAN Voice VLAN feature are done configuring Click Clear to reset the fields to default settings Voice VLAN OUI Setup OUI address manufacturer identifier, the last three bytes is a unique station ID OUI mask Type the IP Phone manufacturer's OUI mask address Description Siemens This field displays the index number of the Voice VLAN This field displays the OUI address of the Voice VLAN 104 9.10 MAC-basedVLAN105 9.11 Technical Reference9.11.1 Create an IP-basedVLAN Example 107 Static MAC Forward Setup10.1 Overview 10.2 Configuring Static MAC Forwarding108 Chapter 10 Static MAC Forward SetupTable 39 Advanced Application > Static MAC Forwarding deleting it by clearing this check box rule Note: Static MAC addresses do not age out Enter the VLAN identification number forwarded Click Cancel to reset the fields to their last saved values Click Clear to begin configuring this screen afresh Click an index number to modify a static MAC address rule for a port (No). You may temporarily deactivate a rule without deleting it address-forwardingrule to which the MAC address belongs 109 Static Multicast Forward Setup11.1 Static Multicast Forward Setup Overview11.1.1 What You Can Do 11.1.2 What You Need To Know 110 11.2 Configuring Static Multicast Forwarding111 Table 40 Advanced Application > Static Multicast Forwardingaddress forwarding rule. This is for identification only 00000001 is 01 and 00000011 is 03 in hexadecimal, so 01:00:5e:00:00:0A and 03:00:5e:00:00:27 are valid multicast MAC addresses VLAN, enter not (No). You may temporarily deactivate a rule without deleting it multicast MAC address will be forwarded specified multicast MAC address will be forwarded 112 Filtering12.1 Filtering Overview 12.2 Configure a Filtering Rule113 Chapter 12 FilteringTable 41 Advanced Application > Filtering without deleting it by deselecting this check box identification only Action field). The Switch can still send frames to the MAC address specified in the MAC field Click Clear to clear the fields to the factory defaults which the MAC address belongs This field displays the VLAN group identification number button Click Cancel to clear the selected checkbox(es) in the Delete column 114 Spanning Tree Protocol13.1 Spanning Tree Protocol Overview13.1.1What You Can Do 13.1.2What You Need to Know Chapter 13 Spanning Tree Protocol Note: In this user’s guide, “STP” refers to both STP and RSTP 115 STP TerminologyThe root bridge is the base of the spanning tree Table 42 STP Path Costs LINK SPEED RECOMMENDED VALUE RECOMMENDED RANGE ALLOWED RANGE How STP Works 116 STP Port StatesTable 43 STP Port States PORT STATE Disabled STP is disabled (default) Blocking Only configuration and management BPDUs are received and processed Listening All BPDUs are received and processed Note: The listening state does not exist in RSTP Learning process but not forwarded Multiple RSTPMRSTP MRSTP2 Note: Each port can belong to one STP tree only Figure 85 MRSTP Network Example Multiple STP 117 13.2Spanning Tree Protocol Status Screen13.3 Spanning Tree Configuration 118 13.4 Configure Rapid Spanning Tree Protocol119 Table 45 Advanced Application > Spanning Tree Protocol > RSTPClick Status to display the RSTP Status screen (see Figure 89 on page 120) Select this check box to activate RSTP. Clear this checkbox to disable RSTP Note: You must also activate Rapid Spanning Tree in the Advanced Application Note: You must also activate Spanning Tree Protocol > Configuration screen to enable RSTP on the Switch screen to enable RSTP on the Switch Bridge Priority the root switch. Select a value from the drop-downlist box and Forwarding Delay Hello Time This is the time interval in seconds between BPDU (Bridge Protocol Data Units) configuration message generations by the root switch. The allowed range is 1 to seconds Max Age allowed range is 6 to 40 seconds Forwarding Delay temporary data loops might result. The allowed range is 4 to 30 seconds As a general rule: Note: 2 * (Forward Delay - 1) >= Max Age >= 2 * (Hello Time + 1) Select this check box to activate RSTP on this port Edge is configured as an edge port or when its link status changes Unit (BPDU) Configure the priority for each port here between 0 and 255 and the default value is 120 13.5 Rapid Spanning Tree Protocol Status121 13.6 Configure Multiple Rapid Spanning Tree Protocol122 Table 47 Advanced Application > Spanning Tree Protocol > MRSTPClick Status to display the MRSTP Status screen (see Figure 89 on page 120) Tree This is a read only index number of the STP trees > Spanning Tree Protocol > Configuration screen to enable MRSTP on the screen to enable MRSTP on the Switch Select this check box to activate STP on this port Note: An edge port becomes a non-edgeport as soon as it receives a Bridge Protocol Data Unit (BPDU) 123 13.7 Multiple Rapid Spanning Tree Protocol Status124 13.8 Configure Multiple Spanning Tree Protocol125 Figure 92 Advanced Application > Spanning Tree Protocol > MSTPTable 49 Advanced Application > Spanning Tree Protocol > MSTP MSTP Port MSTP Status Spanning Tree Protocol > Configuration screen to enable MSTP on the Switch screen to enable MSTP on the Switch 126 Table 49 Advanced Application > Spanning Tree Protocol > MSTP (continued)MaxAge rule: Maximum hops discarded and the port information is aged Enter a descriptive name (up to 32 characters) of an MST region Revision Number number to belong to the same region Instance Use this section to configure MSTI (Multiple Spanning Tree Instance) settings supports instance numbers tree instance 53248, 57344 and 61440) VLAN Range remove from the VLAN range edit area in the End field Next click: • Add - to add this range of VLAN(s) to be mapped to the MST instance • Clear - to remove all VLAN(s) from being mapped to this MST instance Enabled VLAN(s) This field displays which VLAN(s) are mapped to this MST instance 127 13.9 Multiple Spanning Tree Port Configuration128 13.10 Multiple Spanning Tree Protocol Status130 13.11 Technical Reference133 Bandwidth Control14.1 Overview 14.2 Bandwidth Control Setup134 Chapter 14 Bandwidth ControlFigure 99 Advanced Application > Bandwidth Control Table 52 Advanced Application > Bandwidth Control Select this check box to enable bandwidth control on the Switch Select this check box to activate ingress rate limits on this port Ingress Rate flow on a port Note: Ingress rate bandwidth control applies to layer 2 traffic only Select this check box to activate egress rate limits on this port Egress Rate 135 Broadcast Storm Control15.1 Broadcast Storm Control Overview 15.2 Broadcast Storm Control Setup136 Chapter 15 Broadcast Storm ControlFigure 100 Advanced Application > Broadcast Storm Control Table 53 Advanced Application > Broadcast Storm Control disable this feature Broadcast (pkt Multicast (pkt/s) DLF (pkt/s) receives per second to save your changes to the non-volatilememory when you are done configuring 137 Mirroring16.1 Mirroring Overview 16.2 Port Mirroring Setup138 Chapter 16 MirroringTable 54 Advanced Application > Mirroring feature Monitor set the common settings and then make adjustments on a port-by-portbasis Mirrored Select this option to mirror the traffic on a port Direction Egress (outgoing), Ingress (incoming) and Both your changes to the non-volatilememory when you are done configuring 139 Link Aggregation147 Port Authentication18.1 Port Authentication Overview18.1.1What You Can Do 18.1.2What You Need to Know 148 18.2 Port Authentication Configuration18.3 Activate IEEE 802.1x Security149 Figure 109 Advanced Application > Port AuthenticationTable 60 Advanced Application > Port Authentication Select this check box to permit 802.1x authentication on the Switch port Select this to permit 802.1x authentication on this port. You must first allow authentication on the Switch before configuring it on each port Max-Req unresponsive ports to the Guest VLAN Reauth stay connected to the port Reauth-period secs username and password to stay connected to the port Quiet-period Tx-periodsecs identity request to the client Supp-Timeout request before sending another request 150 18.3.1 Guest VLANInternet151 Figure 111 Advanced Application > Port Authentication > 802.1x > Guest VLANTable 61 Advanced Application > Port Authentication > 802.1x > Guest VLAN This field displays a port number Changes in this row are copied to all the ports as soon as you make them Select this checkbox to enable the guest VLAN feature on this port services Guest Vlan guest VLAN Make sure this is a VLAN recognized in your network 152 Host-mode(using a hub) Select Multi-Secure to authenticate each user that connects to this port Multi-Secure Num Switch will authenticate on this port 153 Port Security19.1 Port Security Overview 19.2 Port Security Setup154 Chapter 19 Port SecurityFigure 112 Advanced Application > Port Security Table 62 Advanced Application > Port Security Port List MAC freeze display in the Static MAC Forwarding screen MAC freeze the Address Learning check boxes only for the ports specified in the Port list Select this option to enable port security on the Switch matching MAC address(es) are dropped this port on a port, the port itself must be active with address learning enabled 155 Table 62 Advanced Application > Port Security (continued)Limited Number of Learned MAC feature is disabled 156 Classifier20.1 Overview20.1.1 What You Can Do 20.1.2 What You Need to Know 20.2Configuring the Classifier157 Chapter 20 ClassifierFigure 113 Advanced Application > Classifier Table 63 Advanced Application > Classifier Select this option to enable this rule Enter a descriptive name for this rule for identifying purposes Layer Specify the fields below to configure a layer 2 classifier Other value. Refer to Table 65 on page 159 for information Source Select Any to apply the rule to all MAC addresses (six hexadecimal character pairs) ports (Any) format (six hexadecimal character pairs) Specify the fields below to configure a layer 3 classifier 158 20.2.1 Viewing and Editing Classifier Configuration 160 20.3 Classifier Example161 Policy Rule21.1 Policy Rules Overview 21.2 Configuring Policy Rules162 Chapter 21 Policy RuleFigure 116 Advanced Application > Policy Rule Table 68 Advanced Application > Policy Rule Select this option to enable the policy Enter a descriptive name for identification purposes Classifier(s) press [SHIFT] and select the choices at the same time Parameters Action General Specify a VLAN ID number Egress Port Type the number of an outgoing port Specify a priority level Rate Limit 163 Table 68 Advanced Application > Policy Rule (continued)Select No change to forward the packets Select Discard the packet to drop the packets Select No change to keep the priority setting of the frames value you set in the Priority field Send the packet to the egress port configure in the VLAN ID field Select Enable to activate bandwidth limitation on the traffic flow(s) memory when you are done configuring This field displays Yes when policy is activated and No when is it deactivated This field displays the name you have assigned to this policy This field displays the name(s) of the classifier to which this policy applies 21.2.1 Viewing and Editing Policy Configuration 164 21.3 Policy Example165 Queuing Method22.1 Queuing Method Overview22.1.1 What You Can Do 22.1.2 What You Need to Know 166 22.2 Configuring Queuing167 Table 69 Advanced Application > Queuing MethodThis label shows the port you are configuring Robin) lowest weights get more guaranteed bandwidth than queues with smaller weights more service than queues with smaller weights Weight different traffic queues according to their weights Hybrid This field is applicable only when you select WFQ or WRR SPQ Lowest Queue traffic on Q5, Q6 and Q7 using SPQ Select None to always use WFQ or WRR for the port 168 Multicast23.1 Multicast Overview 172 23.2 Multicast Setup23.3 IPv4 Multicast Status173 23.3.1 IGMP Snooping174 IGMP Filteringcan join ports that you want to allow to join multicast groups Unknown Multicast Frame Reserved The layer-2multicast MAC addresses used by Cisco layer-2protocols 01:00:0C:CC:CC:CC and 01:00:0C:CC:CC:CD, are also included in this group Immed. Leave IGMP version 2 leave message is received on this port Select this option if there is only one host connected to this port Normal Leave an IGMP Group-SpecificQuery (GSQ) message to determine whether other hosts hosts to update the forwarding table from a host Fast Leave This helps speed up the leave process Group Limited Max Group Num dropped on this port 175 23.4 IGMP Snooping VLAN176 autoVLANs automatically VLAN(s) that you specify below You must also enable IGMP snooping in the Multicast > IPv4 Multicast > IGMP Snooping screen first snooping Enter the descriptive name of the VLAN for identification purposes Enter the ID of a static VLAN; the valid range is between 1 and You cannot configure the same VLAN ID as in the MVR screen This saves your changes to the Switch’s run-timememory. The Switch loses these 177 23.4.1 IGMP Filtering Profile178 23.5 IPv6 Multicast Status186 23.6 General MVR Configuration187 Figure 133 Advanced Application > Multicast > Multicast Setup > MVRTable 80 Advanced Application > Multicast > Multicast Setting > MVR among different subscriber VLANs on the network Group Name Multicast VLAN ID Enter the VLAN ID (1 to 4094) of the multicast VLAN or MLD control packets (belonging to this multicast VLAN) Specify the MVR mode on the Switch. Choices are Dynamic and Compatible multicast VLAN Select Compatible to set the Switch not to send IGMP reports or MLD messages This field displays the port number on the Switch Source Port multicast traffic. All source ports must belong to a single multicast VLAN Receiver Port 188 23.6.1 MVR Group Configuration189 list boxRefer to Section on page 168 for more information on IP multicast addresses address for a multicast group MVLAN This field displays the starting IP address of the multicast group This field displays the ending IP address of the multicast group Delete button to remove the selected entry(ies) from the table Select Cancel to clear the checkbox(es) in the table 190 23.6.2 MVR Configuration Example191 EXAMPLEEXAMPLE 192 AAA24.1 AAA Overview24.1.1What You Can Do 24.1.2What You Need to Know 193 24.2 AAA Screens24.3 RADIUS Server Setup194 Figure 141 Advanced Application > AAA > RADIUS Server SetupTable 83 Advanced Application > AAA > RADIUS Server Setup Use this section to configure your RADIUS authentication settings This field is only valid if you configure multiple RADIUS servers RADIUS server, if the RADIUS server does not respond then the Switch tries to authenticate with the second RADIUS server requests to Timeout response from the RADIUS server first RADIUS server for 15 seconds and then tries the second RADIUS server This is a read-onlynumber representing a RADIUS server entry Enter the IP address of an external RADIUS server in dotted decimal notation UDP Port value unless your network administrator instructs you to do so Shared Secret must be the same on the external RADIUS server and the Switch 195 24.4 TACACS+ Server Setup196 Figure 142 Advanced Application > AAA > TACACS+ Server SetupTable 84 Advanced Application > AAA > TACACS+ Server Setup Use this section to configure your TACACS+ authentication settings This field is only valid if you configure multiple TACACS+ servers TACACS+ server, if the TACACS+ server does not respond then the Switch tries to authenticate with the second TACACS+ server Select round-robin to alternate between the TACACS+ servers that it sends authentication requests to response from the TACACS+ server first TACACS+ server for 15 seconds and then tries the second TACACS+ server This is a read-onlynumber representing a TACACS+ server entry Enter the IP address of an external TACACS+ server in dotted decimal notation TCP Port key must be the same on the external TACACS+ server and the Switch 197 24.5 AAA Setup198 Figure 143 Advanced Application > AAA > AAA SetupTable 85 Advanced Application > AAA > AAA Setup Privilege Enable management) specify them in Method 2 and Method 3 fields Select local to have the Switch check the access privilege configured for local servers 199 Table 85 Advanced Application > AAA > AAA Setup (continued)Login authenticate administrator accounts (users for Switch management) up the corresponding database correctly first Method 2 and Method 3 fields Control > Logins screen RADIUS server TACACS+ server Authorization Use this section to configure authorization settings on the Switch Set whether the Switch provides the following services to a user different access privilege level assigned via the external server Dot1x assigned via the external server Select this to activate authorization for a specified event types Console have different access privilege level assigned via the external server events RADIUS is the only method for IEEE 802.1x authorization Use this section to configure accounting settings on the Switch Update Period occur: system boots up, system shuts down, system accounting is enabled, system accounting is disabled out via the console port, telnet or SSH session privilege level and higher are executed on the Switch Select this to activate accounting for a specified event types servers at the same time accounting server then it tries the second accounting server 200 24.6 Technical Reference203 IP Source Guard25.1 Overview25.1.1What You Can Do 25.1.2What You Need to Know 204 25.2 IP Source Guard205 25.3 IP Source Guard Static Binding206 25.4 DHCP Snooping207 Figure 146 Advanced Application > IP Source Guard > DHCP SnoopingTable 90 Advanced Application > IP Source Guard > DHCP Snooping Database Status page Agent URL This field displays the location of the DHCP snooping database Write delay timer update in the DHCP snooping database before it gives up Abort timer This field displays how long (in seconds) the Switch waits to update the DHCP snooping database after the current bindings change the DHCP snooping database 208 Table 90 Advanced Application > IP Source Guard > DHCP Snooping (continued)Agent running database none: The Switch is not accessing the DHCP snooping database write: The Switch is updating the DHCP snooping database Delay timer expiry current update before it gives up. It displays Not Running if the Switch is not updating the DHCP snooping database right now Abort timer expiry This field displays when (in seconds) the Switch is going to update the DHCP changed since the last update snooping database Last succeeded time successfully Last failed time unsuccessfully Last failed reason This field displays the reason the Switch updated the DHCP snooping database successfully or unsuccessfully read or updated the DHCP snooping database Total attempts snooping database for any reason Startup failures This field displays the number of times the Switch could not create or read the for the DHCP snooping database Successful transfers the bindings in the DHCP snooping database successfully Failed transfers This field displays the number of times the Switch was unable to read bindings from or update the bindings in the DHCP snooping database Successful reads snooping database successfully Failed reads from the DHCP snooping database Successful writes This field displays the number of times the Switch updated the bindings in the DHCP snooping database successfully Failed writes This field displays the number of times the Switch was unable to update the bindings in the DHCP snooping database Database detail First successful access for any reason Last ignored bindings This section displays the number of times and the reasons the Switch ignored counters Reference Guide Binding collisions already had a binding with the same MAC address and VLAN ID Invalid interfaces This field displays the number of bindings the Switch ignored because the port number was a trusted interface or does not exist anymore 209 25.5 DHCP Snooping Configure210 Figure 147 Advanced Application > IP Source Guard > DHCP Snooping > ConfigureTable 91 Advanced Application > IP Source Guard > DHCP Snooping > Configure snooping on specific VLAN and specify trusted ports Note: If DHCP is enabled and there are no trusted ports, DHCP requests will not succeed DHCP Vlan on a specific VLAN Note: You have to enable DHCP snooping on the DHCP VLAN too You can enable Option82 in the DHCP Snooping VLAN Configure screen You can enable screen requests from different VLAN Database next update is scheduled to occur before the current update has finished until it completes the current one Enter the location of the DHCP snooping database. The location should be expressed like this: tftp://{domain name or IP address}/directory, if expressed like this: applicable/file name; for example, tftp://192.168.10.1/database.txt ; for example Timeout interval in the DHCP snooping database before it gives up 211 25.5.1 DHCP Snooping Port Configure212 25.5.2 DHCP Snooping VLAN Configure213 25.5.3 DHCP Snooping VLAN Port Configure214 25.6 ARP Inspection Status215 25.7 ARP Inspection VLAN Status216 25.8 ARP Inspection Log Status217 Figure 153 Advanced Application > IP Source Guard > ARP Inspection > Log StatusTable 97 Advanced Application > IP Source Guard > ARP Inspection > Log Status Clearing log status table that have not been sent to the syslog server yet Total number of logs number of dropped log messages This field displays a sequential number for each log message This field displays the source port of the ARP packet This field displays the source VLAN ID of the ARP packet Sender MAC This field displays the source MAC address of the ARP packet Sender IP This field displays the source IP address of the ARP packet Num Pkts in the ARP Inspection Configure screen. See Section 25.9 on page screen. See Section 25.9 on page This field displays the reason the log message was generated the same MAC address and VLAN ID MAC address and VLAN ID VLAN ID of the ARP packet. See Section 25.9.2 on page This field displays when the log message was generated 218 25.9 ARP Inspection Configure219 25.9.1 ARP Inspection Port Configure220 Trusted StateThe Switch does not discard ARP packets on trusted ports for any reason The Switch discards ARP packets on untrusted ports in the following situations: bindings rate at which ARP packets can arrive on untrusted ports Limit These settings have no effect on trusted ports Specify the maximum rate (1-2048packets per second) at which the Switch receives ARP packets from each port. The Switch discards any additional ARP packets. Enter 0 to disable this limit Burst interval The burst interval is the length of time over which the rate of ARP packets is (seconds) second interval. If the burst interval is 5 seconds, then the Switch accepts a maximum of 75 ARP packets in every five-secondinterval Enter the length (1-15seconds) of the burst interval 221 25.9.2 ARP Inspection VLAN Configure222 25.10 Technical Reference226 Loop Guard230 Layer 2 Protocol Tunneling27.1 Layer 2 Protocol Tunneling Overview27.1.1 What You Can Do 27.1.2 What You Need to Know 231 27.2Configuring Layer 2 Protocol Tunneling232 Figure 166 Advanced Application > Layer 2 Protocol TunnelingTable 102 Advanced Application > Layer 2 Protocol Tunneling Select this to enable layer 2 protocol tunneling on the Switch packets by replacing the destination MAC address in the packets you use a unicast MAC address, make sure the MAC address does not exist in the address table of a switch on the service provider’s network MAC address for encapsulation CDP other Cisco devices can be discovered through the service provider’s network STP up based on bridge information from all (local and remote) networks 233 Table 102 Advanced Application > Layer 2 Protocol Tunneling (continued)VTP Point to Point determine the link’s physical status and detect a unidirectional link PAGP and build a logical port aggregation and manages trunk groups UDLD monitor the physical status of a link Access service provider's network access port(s) only 234 PPPoE28.1 PPPoE Intermediate Agent Overview28.1.1What You Can Do 28.1.2What You Need to Know Chapter 28 PPPoE 235 28.1.2.2 Sub-OptionFormatTable 104 PPPoE IA Circuit ID Sub-optionFormat: User-definedString Table 105 PPPoE IA Remote ID Sub-optionFormat Flexible Circuit ID Syntax with Identifier String and Variables WT-101Default Circuit ID SyntaxPPPoE > Intermediate Agent 236 28.2The PPPoE Screen237 28.3 PPPoE Intermediate Agent238 28.3.1 PPPoE IA Per-Port239 28.3.2 PPPoE IA Per-Port Per-VLAN240 Figure 170 Advanced Application > PPPoE > Intermediate Agent > Port > VLANTable 110 Advanced Application > PPPoE > Intermediate Agent > Port > VLAN Show Port VLAN(s) on the port Enter the lowest VLAN ID you want to configure in the section below Enter the highest VLAN ID you want to configure in the section below Click Apply to display the specified range of VLANs in the section below This field displays the port number specified above the * VLAN, the settings are applied to all VLANs adjustments on a VLAN-by-VLANbasis Changes in this row are copied to all the VLANs as soon as you make them sub-optionfor this VLAN on the specified port. Spaces are allowed The Circuit ID you configure here has the highest priority automatically uses the PPPoE client’s MAC address The Remote ID you configure here has the highest priority 241 28.3.3 PPPoE IA for VLAN242 Error Disable247 Private VLAN30.1 Private VLAN Overview 30.2 Configuring Private VLAN248 Chapter 30 Private VLANFigure 178 Advanced Application > Private VLAN Table 116 Advanced Application > Private VLAN Check this box to enable private VLAN in a VLAN purposes Enter a VLAN ID from 1 to 4094. This is the VLAN to which this rule applies Promiscuous can only send and receive traffic from the port(s) you specify here This is the index number of the rule This shows whether this rule is activated or not This is the descriptive name for this rule This is the VLAN to which this rule is applied the Delete button 249 Green Ethernet31.1 Green Ethernet Overview 31.2 Configuring Green Ethernet250 Chapter 31 Green EthernetFigure 179 Advanced Application > Green Ethernet Advanced Application > Green Ethernet EEE Select this to activate Energy Efficient Ethernet globally Auto Power Select this to activate Auto Power Down globally Down Short Reach Select this to activate Short Reach globally adjustments to each port if necessary Select this to activate Energy Efficient Ethernet on this port Select this to activate Auto Power Down on this port Select this to activate Short Reach on this port 251 Link Layer Discovery Protocol (LLDP)32.1 LLDP Overview 252 32.2 LLDP-MEDOverview253 32.3 LLDP Screens254 32.4 LLDP Local Status255 32.4.1 LLDP Local Port Status Detail258 These are the Basic TLV flagsPort ID TLV The port ID TLV identifies the specific port that transmitted the LLDP frame • Port ID Subtype: This shows how the port is identified • Port ID: This is the ID of the port This displays the local port description Dot1 TLV Port VLAN ID This displays the VLAN ID sent by the IEEE 802.1 Port VLAN ID TLV Port-Protocol VLAN ID TLV VLAN is enabled and supported Dot3 TLV MAC PHY Status TLV negotiation during link initiation or manual override • AN Enabled - The current auto-negotiationstatus of the port • AN Advertised Capability - The auto-negotiationcapabilities of the port • Oper MAU Type - The current Medium Attachment Unit (MAU) type of the port identification of the aggregation • Aggregation Capability — The current aggregation capability of the port • Aggregation Status — The current aggregation status of the port • Aggregation Port ID — The aggregation ID of the current port Max Frame This displays the maximum supported frame size in octets Size TLV MED TLV capabilities to support media endpoint devices. MED enables advertisement and databases, and information for troubleshooting This field displays which LLDP-MEDTLV are capable to transmit on the Switch Device Type This is the LLDP-MEDdevice class. The Zyxel Switch device type is: Network Connectivity 259 32.5 LLDP Remote Status260 32.5.1 LLDP Remote Port Status Detail261 The following table describes the labels in Basic TLV part of the screenChassis ID TLV identified by the chassis ID subtype the port ID subtype Time To Live This displays the remote port description This displays the system description of the remote device device System Capabilities Supported System Capabilities Enabled This displays the following management address parameters of the remote device Management Address Subtype Management Address Interface Number Subtype Interface Number Object Identifier 262 This displays the VLAN ID of this port on the remote devicesent the LLDPDU • Port-ProtocolVLAN ID • Port-ProtocolVLAN ID Supported • Port-ProtocolVLAN ID Enabled Vlan Name TLV This shows the VLAN ID and name for remote device port VLAN Name 263 Identity TLVaccessible through its port Power Via MDI power support capabilities of the sending port on the remote device Port Class MDI Supported MDI Enabled Pair Controlable PSE Power Pairs Power Class 265 The following table describes the labels in the MED TLV part of the screenThis displays the MED capabilities the remote port supports • Extend Power via MDI PSE • Extend Power via MDI PD Inventory Management LLDP-MEDendpoint device classes: Endpoint Class This shows the location information of a caller by its: Coordinate-baseLCI - latitude and longitude coordinates of the Location 266 32.6 LLDP Configuration267 Figure 190 Advanced Application > LLDP > LLDP ConfigurationTable 124 Advanced Application > LLDP > LLDP Configuration Select to enable LLDP on the Switch. It is enabled by default Transmit Interval Enter how many seconds the Switch waits before sending LLDP packets Transmit Hold Transmit Delay value or status changes in the Switch MIB Reinitialize Delay Enter the number of seconds for LLDP to wait before initializing on a port This displays the port number with this LLDP configuration. * means all ports Admin Status Select whether LLDP transmission and/or reception is allowed on this port • Disable - not allowed • Tx-Only- transmit only • Rx-Only- receive only • Tx-Rx- transmit and receive Notification Select whether LLDP notification is enabled on this port 268 32.6.1 LLDP Configuration Basic TLV Setting269 32.6.2 LLDP Configuration Basic Org-specificTLV Setting270 32.7 LLDP-MEDConfiguration271 32.8 LLDP-MEDNetwork Policy272 32.9 LLDP-MEDLocation273 Figure 195 Advanced Application > LLDP > LLDP-MEDLocationTable 129 Advanced Application > LLDP > LLDP-MEDLocation The LLDP-MEDuses geographical coordinates and Civic Address to set the location Coordinates Street and other related information Latitude represents the South north south Longitude value represents the West west east 274 Altitudeor in floors meters floor Datum Select the appropriate geodetic datum used by GPS WGS84 NAD83-NAVD88 NAD83-MLLW Civic Address and all other fields are up to 32 characters Country County City Division Street Leading-Street-Direction Street-Suffix Trailing-Street-Suffix House-Number House-Number-Suffix Landmark Additional-Location Zip-Code Building Floor Room-Number Place-Type Postal-Community-Name Post-Office-Box Additional-Code ELIN Number is from 10 to 25 characters Click Add after finish entering the location information Click Cancel to begin entering the location information afresh or edit the location This lists the port number of the location configuration coordinates that includes longitude, latitude, altitude and datum form 10 to 25 characters 275 Click Cancel to clear the selected check boxes in the delete column276 Static Route33.1 Static Route Overview 277 33.2 Static Routing33.3 Configuring Static Routing278 Table 130 IP Application > Static Routing > IPv4 Static Route (continued)Gateway IP segment as your Switch Metric but it must be between 1 and 15. In practice, 2 or 3 is usually a good number Click Cancel to reset the above fields to your previous configuration This field displays the IP network address of the final destination Subnet Mask This field displays the subnet mask for this destination your Switch that will forward the packet to the destination This field displays the cost of transmission for routing purposes 279 Differentiated Services283 DHCP297 ARP Setup36.1 ARP Overview36.1.1 What You Can Do 36.1.2 What You Need to Know Chapter 36 ARP Setup ARP Request ARP Reply 298 Gratuitous-ARPARP-Request 299 36.2 ARP Setup36.2.1 ARP Learning300 Figure 216 IP Application > ARP Setup > ARP LearningTable 145 IP Application > ARP Setup > ARP Learning ARP Learning Select the ARP learning mode the Switch uses on the port ARP requests sent by the Switch a gratuitous ARP request ARP-Request gratuitous ARP requests and ARP requests 301 Maintenance37.1 Overview 37.2 The Maintenance Screen 303 37.3Firmware Upgrade304 Figure 220 Management > Maintenance > Firmware UpgradeFile Path Browse Rebooting Upgrade Table 147 Management > Maintenance > Firmware Upgrade This is the name of the Switch that you’re configuring flash • Running shows the version number (and model code) and MM/DD/YYYY Firmware 2). The firmware information is also displayed at System Information in Basic Settings creation date Current Boot Image Firmware 2) Config Boot Image boot image field above as well Choose to upload the new firmware to (Firmware) 1 or (Firmware) File Path in the File Path text box or click Browse to locate it after a reboot. To reboot, go to Management > Maintenance > Reboot System and click Config 1 or Config 2 (Config 1 and Config 2 are the and click are the configuration files you want the Switch to use when it restarts 305 37.4 Restore a Configuration File37.5 Backup a Configuration File 306 37.6 Tech-Support307 37.7 Technical Reference310 Access Control333 Diagnostic39.1 Overview 39.2 Diagnostic334 Chapter 39 DiagnosticTable 164 Management > Diagnostic System Log Click Display to display a log of events in the multi-linetext box Click Clear to empty the text box and reset the syslog entry Ping Test IPv4 band or out-of-band)the Switch is to send ping frames port (labelled MGMT) If you select out-of-band,the Switch sends the frames to the management port (labelled MGMT) send ping frames Click Ping to have the Switch ping the IP address (in the field to the left) Ethernet Port Test Enter a port number and click Port Test to perform an internal loopback test Cable Diagnostics Diagnose diagnose a port This is the number of the physical Ethernet port on the Switch Channel use and test two pairs, while a 1000BASE-Tport requires all four pairs This displays the descriptive name of the wire-pairin the cable Pair status Ok: The physical connection between the wire-pairis okay Short: There is an short circuit detected between the wire-pair Unsupported: The port is a fiber port or it is not active Cable length Pair status is Ok and the Switch chipset supports this feature This shows Unsupported if the Switch chipset does not support to show the cable length Distance to fault shorted This shows N/A if the Pair status is Ok Locator LED Blink Switch between several devices in a rack The default time interval is 30 minutes Click Stop to have the Switch terminate the blinking locater LED 335 Syslog40.1 Syslog Overview 40.2 Syslog Setup 336 40.3 Syslog Server Setup337 Figure 245 Management > Syslog > Syslog Server SetupTable 167 Management > Syslog > Syslog Server Setup (you can edit the entry later) Server Address Enter the IP address of the syslog server Log Level server. The lower the number, the more critical the logs are Click Clear to return the fields to the factory defaults device is not to send logs to the syslog server This field displays the IP address of the syslog server Select an entry’s Delete check box and click Delete to remove the entry 338 Cluster Management41.1 Cluster Management Overview 339 41.2 Cluster Management Status340 41.3 Clustering Management Configuration341 Table 170 Management > Cluster Management > ConfigurationClustering Manager ( ) appears in the member summary list below Type a name to identify the Clustering Manager. You may use up to 32 printable characters (spaces are allowed) Clustering The following fields relate to the switches that are potential cluster members Candidate List management VLAN group will not be visible in the Clustering Candidate list be managed from the Cluster Manager. Its Status is displayed as Error in the summary list below to select them. Then enter their common web configurator password Click Refresh to perform auto-discoveryagain to list potential cluster members This is the index number of a cluster member switch This is the cluster member switch’s model name Remove switch from the cluster 342 41.4 Technical Reference344 MAC Table42.1 MAC Table Overview42.1.1 What You Can Do 42.1.2 What You Need to Know 345 42.2 Viewing the MAC Table346 Table 172 Management > MAC Tablecriteria you specified Select All to display any entry in the MAC table of the Switch Select Static to display the MAC entries manually configured on the Switch the specified VLAN which are forwarded on the specified port Sort by Select MAC to display and arrange the data according to MAC address Select VID to display and arrange the data according to VLAN group Select PORT to display and arrange the data according to port number Select Dynamic to MAC forwarding and click the Transfer button to change all They also display in the Static MAC Forwarding screen Filtering Discard source This is the incoming frame index number This is the MAC address of the device from which this incoming frame came This is the VLAN group to which this frame belongs This is the port where the above MAC address is forwarded This shows whether the MAC address is dynamic (learned by the Switch) or static (manually entered in the Static MAC Forwarding screen) 347 ARP Table43.1 Overview43.1.1 What You Can Do 43.1.2 What You Need to Know 43.2 Viewing the ARP Table348 Chapter 43 ARP TableFigure 253 Management > ARP Table Table 173 Management > ARP Table Specify how you want the Switch to remove ARP entries when you click Flush Select All to remove all of the dynamic entries from the ARP table specified IP address Flush Click Flush to remove the ARP entries according to the condition you specified Click Cancel to return the fields to the factory defaults This is the ARP table entry number address below This is the MAC address of the device with the corresponding IP address above This field displays the VLAN to which the device belongs Switch’s management IP address Age(s) ages out and needs to be relearned. This shows 0 for a static entry 349 Path MTU Table44.1 Path MTU Overview 44.2 Viewing the Path MTU Table 350 Configure Clone45.1 Overview 45.2 Configure Clone351 Chapter 45 Configure CloneFigure 255 Management > Configure Clone Table 175 Management > Configure Clone Source Source separated by a comma or a range of ports by using a dash Example: 2, 4, 6 indicates that ports 2, 4 and 6 are the destination ports 2-6 indicates that ports 2 through 6 are the destination ports Basic Setting the destination port(s) Advanced Application copied to the destination ports 352 Management > Configure Clone (continued) 353 Neighbor Table46.1 IPv6 Neighbor Table Overview 46.2 Viewing the IPv6 Neighbor Table354 Chapter 46 Neighbor TableTable 176 Management > Neighbor Table (continued) are: received a response to the initial request.) unrequested response from the neighbor’s interface to give upper-layerprotocols a chance to determine reachability • invalid (IV): The neighbor address is with an invalid IPv6 address reason complete response options in this field are: • other (O): none of the following type • local (L): A Switch interface is using the address • static (S): The interface address is statically configured 355 Troubleshooting47.1Power, Hardware Connections, and LEDs 356 47.2Switch Access and Login357 Advanced SuggestionsI can see the Login screen, but I cannot log in to the Switch 3Disconnect and re-connectthe cord to the Switch Pop-upWindows, JavaScripts and Java Permissions •Web browser pop-upwindows from your device •JavaScripts (enabled by default) There is unauthorized access to my Switch via telnet, HTTP and SSH 358 47.3 Switch Configuration359 MenuManagement Maintenance Tech-Support 360 KoreaMalaysia Pakistan Philipines Singapore Thailand Vietnam Europe Austria 361 BelarusBelgium Bulgaria Czech Denmark Estonia Finland France Germany Hungary Latvia 362 LithuaniaNetherlands Norway Poland Romania Russia Slovakia Spain Sweden Switzerland 363 TurkeyUkraine Latin America Argentina Ecuador Middle East Egypt North America USA 364 OceaniaAustralia Africa South Africa365 User-DefinedPort(s Port(s) •If the Protocol is TCP, UDP, or TCP/UDP, this is the IP port number •If the Protocol is USER, this is the IP protocol number Table 177 Commonly Used Services NAME PROTOCOL PORT(S) 366 Appendix B Common ServicesTable 177 Commonly Used Services (continued) 368 OverviewIPv6 Addressing Prefix and Prefix Length Link-localAddress 369 Global AddressUnspecified Address Loopback Address Multicast AddressMULTICAST ADDRESS Table 180 Reserved Multicast Address (continued) 370 Subnet MaskingInterface ID EUI-64 Stateless Autoconfiguration 371 DHCPv6Identity Association DHCP Relay Agent 372 Prefix DelegationICMPv6 Neighbor Discovery Protocol (NDP)Neighbor solicitation: A request from a host to determine a neighbor’s Neighbor advertisement: A response from a node to announce its IPv6 Cache 373 Example - Enabling IPv6 on Windows XP/2003/VistaC:\>ipv6 install Installing Succeeded C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : IP Address . . . . . . . : Subnet Mask . . . . . . . : fe80::2d0:59ff:feb8:103c%4 Default Gateway ipconfig Example - Enabling DHCPv6 on Windows XP1Install Dibbler and select the DHCPv6 client option on your computer After the installation is complete, select Start All Programs Dibbler-DHCPv6 Client Install as service 3Select Start > Control Panel > Administrative Tools > Services 4Double click Dibbler - a DHCPv6 client 374 Example - Enabling IPv6 on Windows379 Numerics
Also you can find more ZyXEL Communications manuals or manuals for other Computer Equipment.