ZyXEL Communications MES3500-24F manuals
Computer Equipment > Network Router
When we buy new device such as ZyXEL Communications MES3500-24F we often through away most of the documentation but the warranty.
Very often issues with ZyXEL Communications MES3500-24F begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Network Router ZyXEL Communications MES3500-24F is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Network Router on our side using links below.
ZyXEL Communications MES3500-24F Manual
349 pages 8.3 Mb
1 Default Login Details3 About This User's Guide4 Document Conventions5 Safety Warnings7 Contents Overview9 Table of ContentsPart I: User’s Guide Chapter 10 The Web Configurator11 Basic Setting12 Configuring Static MAC ForwardingConfigure Multiple Rapid Spanning Tree Protocol Multiple Rapid Spanning Tree Protocol Status 13.8.1 Multiple Spanning Tree Protocol Port Configuration Multiple Spanning Tree Protocol Status 13 MirroringLink Aggregation Port Authentication Port Security Classifier Policy Rule 14 22.1.1 Strictly Priority Queuing22.1.2 Weighted Fair Queuing 22.1.3 Weighted Round Robin Scheduling (WRR) 23.1.1 VLAN Stacking Example 23.3.1 Frame Format 23.4.1 Port-based Q-in-Q 23.4.2 Selective Q-in-Q 24.1.1 IP Multicast Addresses 24.1.2 IGMP Filtering 24.1.3 IGMP Snooping 24.1.4 IGMP Snooping and VLANs 24.4 IGMP Snooping VLAN 24.6 MVR Overview 24.6.1 Types of MVR Ports 24.6.2 MVR Modes 24.6.3 How MVR Works 24.8.1 MVR Configuration Example 15 25.1.1 Local User Accounts25.1.2 RADIUS and TACACS+ 25.2.1 RADIUS Server Setup 25.2.2 TACACS+ Server Setup 25.2.3 AAA Setup 25.2.4 Vendor Specific Attribute 25.2.5 Tunnel Protocol Attribute 25.3.1 Attributes Used for Authentication 25.3.2 Attributes Used for Accounting 26.1.1 DHCP Snooping Overview 26.1.2 ARP Inspection Overview 26.4 DHCP Snooping 26.5.1 DHCP Snooping Port Configure 26.5.2 DHCP Snooping VLAN Configure 26.6.1 ARP Inspection VLAN Status 26.6.2 ARP Inspection Log Status 26.7.1 ARP Inspection Port Configure 26.7.2 ARP Inspection VLAN Configure 28.1.1 VLAN Mapping Example 16 29.1.1 Layer-2Protocol Tunneling Mode17 35.1.1 DSCP and Per-HopBehavior35.1.2 DiffServ Network Example 35.2.1 TRTCM-Color-blindMode 35.2.2 TRTCM-Color-awareMode 35.3.1 Configuring 2-Rate3 Color Marker Settings 35.3.2 Configuring DSCP Profiles 35.4.1 Configuring DSCP Settings 36.1 DHCP Overview 36.1.1 DHCP Modes 36.1.2 DHCP Configuration Options 36.3 DHCP Relay 36.3.1 DHCP Relay Agent Information 36.3.2 Configuring DHCP Global Relay 36.3.3 Global DHCP Relay Configuration Example 36.4.1 Example: DHCP Relay for Two VLANs 37.8 FTP Command Line 37.8.1 Filename Conventions 37.8.2 FTP Command Line Procedure 37.8.3 GUI-basedFTP Clients 37.8.4 FTP Restrictions 18 38.3.5 Configuring SNMP Trap Group19 ARP TableAppendix A Common Services 23 Getting to Know Your Switch27 Hardware Installation and Connection2.1 Installation Scenarios 2.2Desktop Installation Procedure 2.3Mounting the Switch on a Rack 30 Hardware Overview3.1 Front Panel31 3.1.1 Console Port32 3.1.2 Ethernet Ports3.1.3 Transceiver Slots•Type: SFP connection interface •Connection speed: 1 Gigabit per second (Gbps) or 1 Megabit per second (Mbps) 33 3.1.3.1Transceiver InstallationUse the following steps to install a mini-GBICtransceiver (SFP module) 2Press the transceiver firmly until it clicks into place 4Close the transceiver’s latch (latch styles vary) Figure Figure 12 Connecting the Fiber Optic Cables 3.1.3.2Transceiver RemovalUse the following steps to remove a mini-GBICtransceiver (SFP module) 1Remove the fiber optic cables from the transceiver 2Open the transceiver’s latch (latch styles vary) 34 3.1.4Power Connector35 3.1.5Signal Slot36 Door OpenSpring Sensor Clip Connector Signal Input Pins Output Pins 37 3.2 LEDs39 The Web Configurator4.1 Introduction 4.2System Login 40 4.3The Web Configurator Layout41 BASIC SETTINGADVANCED IP APPLICATION MANAGEMENT APPLICATION 42 The following table describes the links in the navigation panelTable 4 Navigation Panel Links LINK Basic Settings System Info This link takes you to a screen that displays general system and hardware monitoring information General Setup This link takes you to a screen where you can configure general identification information and time settings for the Switch Switch Setup such as VLAN type, MAC address learning, GARP and priority queues IP Setup This link takes you to a screen where you can configure the management IP address, subnet mask (necessary for Switch management) and DNS (domain name server) Port Setup priority settings for individual Switch ports Advanced Application VLAN This link takes you to screens where you can configure port-basedor 802.1Q Static MAC Forwarding port. These static MAC addresses do not age out Static Multicast This link takes you to a screen where you can configure static multicast MAC addresses for port(s). These static multicast MAC addresses do not age out Filtering This link takes you to a screen to set up filtering rules Spanning Tree Protocol prevent network loops Bandwidth This link takes you to screens where you can cap the maximum bandwidth Control allowed on a port Broadcast Storm This link takes you to a screen to set up broadcast filters Mirroring interference Link Aggregation form one logical, higher-bandwidthlink Port This link takes you to a screen where you can configure IEEE 802.1x port Authentication Switch Port Security set the maximum number of MAC addresses to learn on a port Classifier This link takes you to a screen where you can configure the Switch to group packets based on the specified criteria Policy Rule special treatment on the grouped packets Queuing Method queue weights for each port VLAN Stacking This link takes you to screens where you can activate and configure VLAN stacking Multicast IGMP snooping and create multicast VLANs 43 Chapter 4 The Web ConfiguratorTable 4 Navigation Panel Links (continued) AAA This link takes you to a screen where you can configure authentication (Terminal Access Controller Access-ControlSystem Plus) IP Source Guard DHCP and ARP packets in your network Loop Guard This link takes you to a screen where you can configure protection against network loops that occur on the edge of your network VLAN Mapping the Switch Layer 2 Protocol Tunneling Tunneling) settings on the Switch sFlow This link takes you to screens where you can configure sFlow settings on the PPPoE use to identify and authenticate a PPPoE client Errdisable disable recovery Private VLAN This link takes you to a screen where you can block traffic between ports in a VLAN on the Switch IP Application Static Routing This link takes you to a screen where you can configure static routes. A static route defines how the Switch should forward traffic by configuring the TCP/IP parameters manually DiffServ rules and set DSCP-to-IEEE802.1pmappings DHCP This link takes you to screens where you can configure the DHCP settings Management Maintenance file maintenance as well as reboot the system Access Control and configure SNMP and remote management Diagnostic This link takes you to screens where you can view system logs and can test port(s) Syslog server Cluster and view its status MAC Table ARP Table resolution table Configure Clone This link takes you to a screen where you can copy attributes of one port to (an)other port(s) 4.3.1 Change Your Password 44 4.4 Saving Your Configuration4.5 Switch Lockout 45 4.6Resetting the Switch4.6.1 Reload the Configuration File 46 4.7 Logging Out of the Web Configurator4.8 Help 49 Initial Setup Example53 Tutorials81 System Status and Port Statistics7.1 Overview 7.2 Port Status Summary82 Chapter 7 System Status and Port StatisticsThe following table describes the labels in this screen Table 7 Status screen (refer to Figure 27 on page 83) Name This is the name you assigned to this port in the Basic Setting > Port Setup screen Link This field displays the speed (either 10M for 10Mbps, 100M for 100Mbps or 1000M for 1000Mbps) and the duplex (F for full duplex or H for half). It also shows the cable type (Copper or Fiber) for the combo ports This field displays Down if the port is not connected to any device State port (see Section 13.1 on page 122 for more information) displays STOP LACP enabled on the port TxPkts This field shows the number of transmitted frames on this port RxPkts This field shows the number of received frames on this port Errors This field shows the number of received errors on this port Tx KB/s This field shows the number of kilobytes per second transmitted on this port Rx KB/s This field shows the number of kilobytes per second received on this port Up Time has been up Clear Counter information for that port, or select Any to clear statistics for all ports 83 7.2.1 Status: Port Details84 Table 8 Status: Port Details (continued)Status Section 13.1 on page 122 for more information) STOP This field shows if LACP is enabled on this port or not This field shows the number of transmitted frames on this port This field shows the number of received frames on this port This field shows the number kilobytes per second transmitted on this port This field shows the total amount of time the connection has been up Tx Packet The following fields display detailed information about packets transmitted Unicast This field shows the number of good unicast packets transmitted This field shows the number of good multicast packets transmitted Broadcast This field shows the number of good broadcast packets transmitted Pause This field shows the number of 802.3x Pause packets transmitted Rx Packet The following fields display detailed information about packets received This field shows the number of good unicast packets received This field shows the number of good multicast packets received This field shows the number of good broadcast packets received This field shows the number of 802.3x Pause packets received TX Collision The following fields display information on collisions while transmitting Single exactly one collision Multiple more than one collision Excessive reset Late have already been transmitted Error Packet RX CRC Length Runt including the ones with CRC errors Distribution in length 65 and 127 octets in length 85 Chapter 7 System Status and Port Statistics128 and 255 octets in length 256 and 511 octets in length 512 and 1023 octets in length 1024 and 1518 octets in length Giant 1519 octets and the maximum frame size 86 Basic Setting8.1 Overview 8.2 System Information87 Table 9 Basic Setting > System InfoSystem Name Product Model This field displays the model number of the Switch ZyNOS F/W Version created Ethernet Address Hardware Monitor Temperature Unit Fahrenheit) in this field BOARD PHY printed circuit board Current This shows the current temperature at this sensor MAX This field displays the maximum temperature measured at this sensor MIN This field displays the minimum temperature measured at this sensor Threshold This field displays the upper temperature limit at this sensor Voltage(V) the voltage falls out of the tolerance range This is the current voltage reading This field displays the maximum voltage measured at this point This field displays the minimum voltage measured at this point Normal otherwise Error is displayed 88 8.3 General Setup89 8.4 Introduction to VLANs91 8.5 Switch Setup92 Table 11 Basic Setting > Switch Setup (continued)Aging Time relearned) Join Leave Leave All Join Timer 65535 milliseconds; the default is 200 milliseconds. See the chapter on VLAN setup for more background information Leave Timer than Join Timer; the default is 600 milliseconds Leave All Timer Leave All Timer sets the duration of the Leave All Period timer for GVRP in be larger than Leave Timer Priority Queue Assignment Level variations in delay) Network Architecture) transactions important business traffic that can tolerate some delay This is for “spare bandwidth” that are allowed but that should not affect other applications and users Typically used for best-efforttraffic are done configuring Click Cancel to reset the fields 93 8.6 IP Setup8.6.1 Management IP Addresses94 Table 12 Basic Setting > IP SetupDomain Name use a domain name instead of an IP address Default Management IP Address DHCP Client subnet mask, a default gateway IP address and a domain name server IP address automatically Static IP Address select this option IP Address Enter the IP address of your Switch in dotted decimal notation for example IP Subnet Mask Enter the IP subnet mask of your Switch in dotted decimal notation for example Default Gateway example VID a member of Management VLAN configuring Click Cancel to begin configuring the fields again Management IP Addresses the VID field below Enter the IP subnet mask in dotted decimal notation Type the VLAN group identification number non-volatilememory when you are done configuring Click Cancel to reset the fields to your previous configuration Index This field displays the IP address This field displays the subnet mask This field displays the ID number of the VLAN group This field displays the IP address of the default gateway 95 8.7 Port Setup96 Table 13 Basic Setting > Port Setup (continued)Speed/Duplex 1000M/Full Duplex (Gigabit connections only) the same in order to connect Flow Control signals to match the bandwidth of the receiving port half duplex mode fill Flow Control 802.1p Priority Priority Queue Assignment in Table 11 on page 91 for more information Table 11 on page for more information save your changes to the non-volatilememory when you are done configuring 97 VLAN114 Static MAC Forward Setup10.1 Overview 10.2 Configuring Static MAC Forwarding115 Chapter 10 Static MAC Forward SetupTable 22 Advanced Application > Static MAC Forwarding deleting it by clearing this check box rule Note: Static MAC addresses do not age out Enter the VLAN identification number forwarded changes to the non-volatilememory when you are done configuring Click Clear to reset the fields to the factory defaults Click an index number to modify a static MAC address rule for a port (No). You may temporarily deactivate a rule without deleting it address-forwardingrule number to which the MAC address belongs 116 Static Multicast Forward Setup120 Filtering12.1 Configure a Filtering Rule121 Chapter 12 FilteringAdvanced Application > FIltering (continued) MAC Click Clear to clear the fields to the factory defaults which the MAC address belongs This field displays the VLAN group identification number button Click Cancel to clear the selected checkbox(es) in the Delete column 122 Spanning Tree Protocol141 Bandwidth Control144 Broadcast Storm Control15.1 Broadcast Storm Control Setup 146 Mirroring16.1 Port Mirroring Setup147 Chapter 16 MirroringAdvanced Application > Mirroring (continued) set the common settings and then make adjustments on a port-by-portbasis Mirrored Select this option to mirror the traffic on a port Direction Egress (outgoing), Ingress (incoming) and Both 148 Link Aggregation156 Port Authentication164 Port Security19.1 About Port Security 19.2 Port Security Setup165 Chapter 19 Port SecurityTable 46 Advanced Application > Port Security Port List MAC freeze display in the Static MAC Forwarding screen MAC freeze the Address Learning check boxes only for the ports specified in the Port list Select this option to enable port security on the Switch matching MAC address(es) are dropped this port on a port, the port itself must be active with address learning enabled Limited Number disabled 166 Classifier20.1 About the Classifier and QoS 20.2Configuring the Classifier167 Chapter 20 ClassifierAdvanced Application > Classifier Figure 82 Advanced Application > Classifier Table 47 Advanced Application > Classifier Select this option to enable this rule Enter a descriptive name for this rule for identifying purposes Layer Specify the fields below to configure a layer-2classifier VLAN ID in the field provided priority level in the field provided Other value. Refer to Table 49 on page 169 for information Source Select Any to apply the rule to all MAC addresses (six hexadecimal character pairs) 168 20.3 Viewing and Editing Classifier Configuration170 20.4 Classifier Example171 Policy Rule21.1 Policy Rules Overview21.1.1 DiffServ 21.1.2 DSCP and Per-HopBehavior 21.2 Configuring Policy Rules172 Chapter 21 Policy RuleAdvanced Applications > Policy Rule Figure 85 Advanced Application > Policy Rule Table 51 Advanced Application > Policy Rule Select this option to enable the policy Enter a descriptive name for identification purposes Classifier(s) press [SHIFT] and select the choices at the same time Parameters Action 173 Table 51 Advanced Application > Policy Rule (continued)General Egress Port Type the number of an outgoing port Specify a priority level Specify a DSCP (DiffServ Code Point) number between 0 and TOS Specify the type of service (TOS) priority level Rate Limit You can configure the desired bandwidth available to a traffic flow Select No change to forward the packets Select Discard the packet to drop the packets frames that were marked to be dropped before Select No change to keep the priority setting of the frames the packets in the designated queue TOS field. Then put the packets in the designated queue Diffserv Select No change to keep the TOS and/or DSCP fields in the packets TOS field you configure in the DSCP field Send the packet to the egress port Select Enable to activate bandwidth limitation on the traffic flow(s) memory when you are done configuring 174 21.3 Viewing and Editing Policy Configuration175 21.4 Policy Example176 Queuing Method22.1 Queuing Method Overview22.1.1 Strictly Priority Queuing 22.1.2 Weighted Fair Queuing 22.1.3 Weighted Round Robin Scheduling (WRR) 177 22.2 Configuring Queuing178 Table 53 Advanced Application > Queuing MethodThis label shows the port you are configuring Robin) get more guaranteed bandwidth than queues with smaller weights more service than queues with smaller weights Weight WFQ WRR Q0-Q7 different traffic queues according to their weights Hybrid This field is applicable only when you select WFQ or WRR SPQ Lowest Queue Q5, Q6 and Q7 using SPQ Select None to always use WFQ or WRR 179 VLAN Stacking186 Multicast24.1 Multicast Overview24.1.1 IP Multicast Addresses 24.1.2 IGMP Filtering 24.1.3 IGMP Snooping 24.1.4 IGMP Snooping and VLANs 187 24.2 Multicast Status188 24.3 Multicast Setting189 Chapter 24 MulticastTable 61 Advanced Application > Multicast > Multicast Setting (continued) Unknown Multicast Frame Reserved The layer-2multicast MAC addresses used by Cisco layer-2protocols 01:00:0C:CC:CC:CC and 01:00:0C:CC:CC:CD, are also included in this group Immed. Leave IGMP version 2 leave message is received on this port Select this option if there is only one host connected to this port Normal Leave port port should remain in the specific multicast group from a host Fast Leave the Switch sends out an IGMP Group-SpecificQuery (GSQ) message to determine This helps speed up the leave process Group Limited Max Group Num dropped on this port 190 Throttlingnumber of the IGMP groups a port can join is reached Deny multicast forwarding table entry is aged out IGMP report(s) received on this port Profile Default to prohibit the port from joining any multicast group IGMP Filtering Profile screen IGMP Querier server). The Switch forwards IGMP join or leave packets to an IGMP query port IGMP query packets when you connect an IGMP multicast server to the port forward IGMP join or leave packets to this port 191 24.4 IGMP Snooping VLAN192 24.5 IGMP Filtering Profile193 24.6 MVR Overview195 24.7 General MVR Configuration196 Figure 99 Advanced Application > Multicast > Multicast Setting > MVRTable 64 Advanced Application > Multicast > Multicast Setting > MVR among different subscriber VLANs on the network Multicast VLAN Enter the VLAN ID (1 to 4094) of the multicast VLAN control packets (belonging to this multicast VLAN) Specify the MVR mode on the Switch. Choices are Dynamic and Compatible Select Compatible to set the Switch not to send IGMP reports This field displays the port number on the Switch 197 24.8 MVR Group Configuration201 AAA25.1 Authentication, Authorization and Accounting (AAA)25.1.1 Local User Accounts 25.1.2 RADIUS and TACACS+ 202 25.2 AAA Screens25.2.1 RADIUS Server Setup203 RADIUS Server SetupFigure 107 Advanced Application > AAA > RADIUS Server Setup Table 67 Advanced Application > AAA > RADIUS Server Setup Use this section to configure your RADIUS authentication settings This field only applies if you configure multiple RADIUS servers second RADIUS server requests to response from the RADIUS server index-priority RADIUS server for 15 seconds and then tries the second RADIUS server This is a read-onlynumber representing a RADIUS server entry Enter the IP address of an external RADIUS server in dotted decimal notation UDP Port value unless your network administrator instructs you to do so 204 Table 67 Advanced Application > AAA > RADIUS Server Setup (continued)Shared Secret be the same on the external RADIUS server and the Switch entry is deleted when you click Apply Accounting Use this section to configure your RADIUS accounting server settings response from the RADIUS accounting server This is a read-onlynumber representing a RADIUS accounting server entry this value unless your network administrator instructs you to do so Switch. This entry is deleted when you click Apply 205 25.2.2 TACACS+ Server Setup207 25.2.3 AAA Setup208 Table 69 Advanced Application > AAA > AAA Setup (continued)Login authenticate administrator accounts (users for Switch management) up the corresponding database correctly first Method 2 and Method 3 fields and Control > Logins screen radius RADIUS Server TACACS+ Server Authorization Use this section to configure authorization settings on the Switch Set whether the Switch provides the following services to a user different access privilege level assigned via the external server Dot1x assigned via the external server Select this to activate authorization for a specified event types events RADIUS is the only method for IEEE 802.1x authorization Use this section to configure accounting settings on the Switch Update Period accounting is disabled out via the console port, telnet or SSH session privilege level and higher are executed on the Switch Select this to activate accounting for a specified event types servers at the same time accounting server then it tries the second accounting server 209 25.2.4 Vendor Specific Attribute25.2.5 Tunnel Protocol Attribute 210 25.3 Supported RADIUS Attributes214 IP Source Guard26.1 IP Source Guard Overview26.1.1 DHCP Snooping Overview 215 26.1.1.2DHCP Snooping Database216 26.1.2ARP Inspection Overview•It pretends to be computer A and responds to computer B •It pretends to be computer B and sends a message to computer A 217 26.1.2.1 ARP Inspection and MAC Address FiltersChapter 12 on page •They are stored only in volatile memory •They do not use the same space in memory that regular MAC address filters use They appear only in the ARP Inspection MAC Address Filter 26.1.2.2Trusted vs. Untrusted PortsThe Switch does not discard ARP packets on trusted ports for any reason The Switch discards ARP packets on untrusted ports in the following situations: •The rate at which ARP packets arrive is too high 26.1.2.3Syslog 26.1.2.4 Configuring ARP InspectionFollow these steps to configure ARP inspection on the Switch 1Configure DHCP snooping. See Section 26.1.1.4 on page 2Enable ARP inspection on each VLAN 218 26.2 IP Source Guard26.3 IP Source Guard Static Binding219 Advanced Application > IP Source Guard > Static BindingFigure 113 IP Source Guard Static Binding Table 76 IP Source Guard Static Binding Enter the source MAC address in the binding Enter the IP address assigned to the MAC address in the binding Enter the source VLAN ID in the binding Any Click this to create the specified static binding or to update an existing one applicable, to clear the fields above Click this to clear the fields above This field displays how long the binding is valid Select this, and click Delete to remove the specified entry Click this to clear the Delete check boxes above 220 26.4 DHCP Snooping221 Chapter 26 IP Source GuardTable 77 DHCP Snooping (continued) Write delay timer update in the DHCP snooping database before it gives up Abort timer This field displays how long (in seconds) the Switch waits to update the DHCP snooping database after the current bindings change DHCP snooping database Agent running database none: The Switch is not accessing the DHCP snooping database write: The Switch is updating the DHCP snooping database Delay timer expiry current update before it gives up. It displays Not Running if the Switch is not updating the DHCP snooping database right now Abort timer expiry This field displays when (in seconds) the Switch is going to update the DHCP changed since the last update snooping database Last succeeded time This field displays the last time the Switch updated the DHCP snooping database successfully Last failed time unsuccessfully Last failed reason This field displays the reason the Switch updated the DHCP snooping database successfully or unsuccessfully read or updated the DHCP snooping database Total attempts This field displays the number of times the Switch has tried to access the DHCP snooping database for any reason Startup failures Successful transfers bindings in the DHCP snooping database successfully Failed transfers or update the bindings in the DHCP snooping database Successful reads This field displays the number of times the Switch read bindings from the DHCP snooping database successfully Failed reads the DHCP snooping database Successful writes Failed writes in the DHCP snooping database Database detail any reason 222 26.5 DHCP Snooping Configure226 26.6 ARP Inspection Status229 26.7 ARP Inspection Configure230 26.7.1 ARP Inspection Port Configure231 open this screen, clickFigure 122 ARP Inspection Port Configure Table 85 ARP Inspection Port Configure Trusted State The Switch does not discard ARP packets on trusted ports for any reason The Switch discards ARP packets on untrusted ports in the following situations: which ARP packets can arrive on untrusted ports Limit Rate and Burst Interval settings have no effect on trusted ports this limit Burst interval (seconds) second interval Enter the length (1-15seconds) of the burst interval 232 26.7.2 ARP Inspection VLAN Configure233 Loop Guard237 VLAN Mapping241 Layer 2 Protocol Tunneling245 sFlow249 PPPoE31.1 PPPoE Intermediate Agent Overview 251 31.2The PPPoE Screen31.3 PPPoE Intermediate Agent252 Figure 139 Advanced Application > PPPoE > Intermediate AgentTable 98 Advanced Application > PPPoE > Intermediate Agent access-node identifier spaces are also allowed. The default is the Switch’s host name circuit-id over this Per-Port Per-VLANscreen (specified in the option field) to PADI or PADR packets from PPPoE clients identifier field field identifier string 53 ASCII characters. Spaces are allowed option into the PADI and PADR packets for the slot value forward slash (/) or space 253 31.3.1 PPPoE IA Per-Port254 31.3.2 PPPoE IA Per-Port Per-VLAN255 Intermediate Agent > PortTable 100 Advanced Application > PPPoE > Intermediate Agent > Port > VLAN Show Port VLAN(s) on the port Enter the lowest VLAN ID you want to configure in the section below Enter the highest VLAN ID you want to configure in the section below Click Apply to display the specified range of VLANs in the section below This field displays the port number specified above the * VLAN, the settings are applied to all VLANs adjustments on a VLAN-by-VLANbasis Note: Changes in this row are copied to all the VLANs as soon as you make them sub-optionfor this VLAN on the specified port. Spaces are allowed The Circuit ID you configure here has the highest priority automatically uses the PPPoE client’s MAC address The Remote ID you configure here has the highest priority 256 31.3.3 PPPoE IA for VLAN 257 Error Disable262 Private VLAN265 Static Route268 Differentiated Services276 DHCP283 Maintenance290 Access Control312 Diagnostic313 Syslog316 Cluster Management41.1 Cluster Management Status Overview 317 41.2 Cluster Management Status320 41.3 Clustering Management Configuration321 Chapter 41 Cluster ManagementTable 138 Management > Cluster Management > Configuration (continued) list. This field is ignored if the Clustering Manager is using Port-based VLAN The following fields relate to the switches that are potential cluster members Candidate List Clustering Candidate VLAN group will not be visible in the Clustering Candidate list Status screen and a warning icon ( ) appears in the member summary list below select them. Then enter their common web configurator password Refresh Click Refresh to perform auto-discoveryagain to list potential cluster members This is the index number of a cluster member switch This is the cluster member switch’s model name Remove from the cluster 322 MAC Table42.1 MAC Table Overview 323 42.2 Viewing the MAC Table324 Table 139 Management > MAC Table (continued)Select Dynamic to MAC forwarding and click the Transfer button to change all They also display in the Static MAC Forwarding screen Filtering Discard source Click Cancel to change the fields back to their last saved values This is the incoming frame index number This is the MAC address of the device from which this incoming frame came This is the VLAN group to which this frame belongs This is the port where the above MAC address is forwarded This shows whether the MAC address is dynamic (learned by the Switch) or static (manually entered in the Static MAC Forwarding screen) 325 ARP Table327 Configure Clone44.1 Configure Clone328 Chapter 44 Configure CloneTable 141 Management > Configure Clone Source Source separated by a comma or a range of ports by using a dash Example: • 2, 4, 6 indicates that ports 2, 4 and 6 are the destination ports • 2-6 indicates that ports 2 through 6 are the destination ports Basic Setting the destination port(s) Advanced Application copied to the destination ports 329 Troubleshooting333 Common Services337 Legal Information
Also you can find more ZyXEL Communications manuals or manuals for other Computer Equipment.