GS1920 Series
Quick Start Guide
User’s Guide
Page
Contents Overview
Page
Table of Contents
Part I: User’s Guide
Chapter
The Web Configurator
Basic Setting
Page
Rapid Spanning Tree Protocol Status
Configure Multiple Rapid Spanning Tree Protocol
Multiple Rapid Spanning Tree Protocol Status
13.10 Multiple Spanning Tree Protocol Status
13.11.4 Common and Internal Spanning Tree (CIST)
Mirroring
Link Aggregation
Port Authentication
Port Security
Classifier
21.1.1 What You Can Do
21.2.1 Viewing and Editing Policy Configuration
22.1.1 What You Can Do
22.1.2 What You Need to Know
23.1.1 What You Can Do
Loop Guard
PPPoE
28.3.1 PPPoE IA Per-Port
28.3.2 PPPoE IA Per-Port Per-VLAN
28.3.3 PPPoE IA for VLAN
31.2 LLDP-MEDOverview
31.4.1 LLDP Local Port Status Detail
34.4.4 DHCPv4 Global Relay Port Configure
34.4.5 Global DHCP Relay Configuration Example
36.7.1 FTP Command Line
36.7.2 Filename Conventions
36.7.3 FTP Command Line Procedure
MAC Table
ARP Table
Path MTU Table
Appendix
Index
Page
Page
Getting to Know Your Switch
1.1 Introduction
Chapter 1 Getting to Know Your Switch
The following table describes the PoE features of the Switch by model
Table 2 Models and PoE Features
POE FEATURES
IEEE 802.3af PoE
Figure 2 Bridging Application
Figure 3 High Performance Switched Workgroup Application
For more information on VLANs, refer to Chapter 9 on page
1.2 Ways to Manage the Switch
1.3Good Habits for Managing the Switch
Page
Hardware Installation and Connection
2.1 Installation Scenarios
2.2Desktop Installation Procedure
2.3Mounting the Switch on a Rack
Page
Page
Hardware Panels
3.1 Front Panel
Chapter 3 Hardware Panels
•Speed: Auto
•Duplex: Auto
•Flow control: Off
•Link Aggregation: Disabled
2Press the transceiver firmly until it clicks into place
4Close the transceiver’s latch (latch styles vary)
Figure
Figure 12 Connecting the Fiber Optic Cables
Use the following steps to remove a mini-GBICtransceiver (SFP module)
3.2 Rear Panel
3.3 LEDs
3.4 Reset to Factory Defaults
Follow the steps below to reset the Switch back to factory defaults
Section 3.4.1 on page
The reset button is located at the side of the Switch as shown
Figure 20 Side Panel: GS1920-48
Figure 21 Side Panel: GS1920-24, GS1920-24HP, GS1920-48HP
Page
Page
The Web Configurator
4.1 Overview
4.2System Login
4.3The Status Screen
C - Click this link to go to the status page of the Switch
D - Click this link to logout of the web configurator
In the navigation panel, click a main link to reveal a list of submenu links
Table 4 Navigation Panel Sub-linksOverview
BASIC SETTING
Table 5 Navigation Panel Links (continued)
IP Setup
routing domains
Port Setup
PoE Setup
Chapter 4 The Web Configurator
Layer 2 Protocol
Tunneling
settings on the Switch
PPPoE
4.4 Saving Your Configuration
4.5 Switch Lockout
4.6Resetting the Switch
4.7 Logging Out of the Web Configurator
4.8 Help
Initial Setup Example
5.1 Overview
VLAN Group ID
VID
5.2Configuring Switch Management IP Address
3Click Basic Setting > IP Setup in the navigation panel
in the navigation panel
4Configure the related fields in the IP Setup screen
For the
VID
Tutorials
6.1 Overview
6.2How to Use DHCP Snooping on the Switch
Control
Tx Tagging
VLAN Port Setting
Page
6.3 How to Use DHCP Relay on the Switch
PVID=102
802.1Q
3Click Advanced Application > VLAN > Static VLAN
ACTIVE
VLAN Group ID
TX Tagging
VLAN Status
Enter 102 in the
and then the
link to open the
2Select the Active check box
Enter the DHCP server’s IP address (192.168.2.3 in this example) in the
Page
System Status and Port Status
7.1 Overview
7.2 Port Status Summary
Chapter 7 System Status and Port Status
The following table describes the labels in this screen
Table 7 Status
Status
LABEL
Figure 43 Status > Port Details
Table 8 Status: Port Details
Port Info
Port NO
This field displays the port number you are viewing
Table 8 Status: Port Details (continued)
This field shows the total amount of time the connection has been up
Tx Packet
The following fields display detailed information about packets transmitted
Packets
1024 and 1518 octets in length
Giant
1519 octets and the maximum frame size
The maximum frame size varies depending on your switch model
Basic Setting
8.1 Overview
8.2 System Information
Figure 44 Basic Setting > System Info (for PoE model(s) only)
Table 9 Basic Setting > System Info
System Name
Product Model
firmware upgrade or looking for other support information in the website
8.3 General Setup
Figure 45 Basic Setting > General Setup
Table 10 Basic Setting > General Setup
printable characters; spaces are allowed
Location
characters; spaces are allowed
8.4 Introduction to VLANs
8.5 Switch Setup Screen
8.6 IP Setup
Note: You must configure a VLAN first
Figure 47 Basic Setting > IP Setup
Table 12 Basic Setting > IP Setup
Domain Name
Server
8.7 Port Setup
Figure 48 Basic Setting > Port Setup
Table 13 Basic Setting > Port Setup
This is the port index number
Settings in this row apply to all ports
to set the common settings and then make adjustments on a port-by-portbasis
8.8 PoE Status
PoE Setup
Figure 50 Basic Setting > PoE Status
Table 14 Basic Setting > PoE Status
PoE Status
PoE Mode
Table 14 Basic Setting > PoE Status (continued)
Class
This shows the power classification of the PD
current (mA) that the PD requires to function. The ranges are as follows
• Class 0 - Default, 0.44 to
8.9 Interface Setup
8.10 IPv6
Figure 53 Basic Setting > IPv6
Table 17 Basic Setting > IPv6
more interface details
This is the name of the IPv6 interface you created
This field displays whether the IPv6 interface is activated or not
Figure 54 Basic Setting > IPv6 > IPv6 Interface Status
Table 18 Basic Setting > IPv6 > IPv6 Interface Status
IPv6 Active
MTU Size
interface
Table 18 Basic Setting > IPv6 > IPv6 Interface Status (continued)
Global Unicast
Address(es)
Joined Group
ND DAD
IPv6 Configuration
Figure 55 Basic Setting > IPv6 > IPv6 Configuration
Table 19 Basic Setting > IPv6 > IPv6 Configuration
IPv6 Global
Setup
Figure 56 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Global Setup
Table 20 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Global Setup
IPv6 Hop Limit
discarded by an IPv6 router, which is similar to the TTL field in IPv4
messages of up to the bucket size can be transmitted. 0 means no limit
Table 21 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Interface Setup
Select the IPv6 interface you want to configure
Select this option to enable the interface
stateless autoconfiguration
Link-Local
This is the static IPv6 link-localaddress for the interface
Local Address
IPv6 Default
This is the default gateway IPv6 address for the interface
IPv6 Global Address Setup
Address/Prefix
remove the selected entry(ies) from the summary table
IPv6 Neighbor Discovery Setup
autoconfiguration
this interface. Enter 0 to turn off DAD
IPv6 Neighbor Setup
Figure 61 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Neighbor Setup
Table 25 Basic Setting > IPv6 > IPv6 Configuration > IPv6 Neighbor Setup
Basic Setup > Interface Setup
Click this to create a new entry or to update an existing one
changes to the nonvolatile memory when you are done configuring
the interface
the interface
Figure 62 Basic Setting > IPv6 > IPv6 Configuration > DHCPv6 Client Setup
Table 26 Basic Setting > IPv6 > IPv6 Configuration > DHCPv6 Client Setup
for this interface
have it work well
Options
to have the Switch obtain a list of domain names from the DHCP server
VLAN
9.1 Overview
Chapter 9 VLAN
Please refer to the following table for common IEEE 802.1Q VLAN terminology
Table 27 IEEE 802.1Q VLAN Terminology
VLAN PARAMETER
TERM
VLAN Trunking
9.2 VLAN Status
9.3 Configure a Static VLAN
Figure 67 Advanced Application > VLAN > Static VLAN
The following table describes the related labels in this screen
Table 30 Advanced Application > VLAN > Static VLAN
ACTIVE
Select this check box to activate the VLAN settings
9.4 Configure VLAN Port Settings
9.5 Subnet Based VLANs
Figure 69 Subnet Based VLAN Application Example
Tagged Frames
Internet
Untagged
Frames
9.6 Protocol Based VLANs
Page
9.7 Port-basedVLAN Setup
Filtering
Page
9.8 Technical Reference
Page
Static MAC Forward Setup
10.1 Overview
10.2 Configuring Static MAC Forwarding
Chapter 10 Static MAC Forward Setup
Table 35 Advanced Application > Static MAC Forwarding
deleting it by clearing this check box
rule
MAC Address
Static Multicast Forward Setup
11.1 Static Multicast Forward Setup Overview
11.2 Configuring Static Multicast Forwarding
Table 36 Advanced Application > Static Multicast Forwarding
address forwarding rule. This is for identification only
00000001 is 01 and 00000011 is 03 in hexadecimal, so 01:00:5e:00:00:0A and
03:00:5e:00:00:27 are valid multicast MAC addresses
VLAN, enter
Filtering
12.1 Filtering Overview
12.2 Configure a Filtering Rule
Chapter 12 Filtering
Table 37 Advanced Application > Filtering
without deleting it by deselecting this check box
identification only
Action
Spanning Tree Protocol
13.1 Spanning Tree Protocol Overview
Note: In this user’s guide, “STP” refers to both STP and RSTP
The root bridge is the base of the spanning tree
Table 38 STP Path Costs
LINK SPEED
RECOMMENDED VALUE
Table 39 STP Port States
PORT STATE
Disabled
STP is disabled (default)
Blocking
13.2Spanning Tree Protocol Status Screen
13.3 Spanning Tree Configuration
13.4 Configure Rapid Spanning Tree Protocol
Table 41 Advanced Application > Spanning Tree Protocol > RSTP
Click Status to display the RSTP Status screen (see Figure 86 on page 114)
Select this check box to activate RSTP. Clear this checkbox to disable RSTP
Note: You must also activate Rapid Spanning Tree in the Advanced Application
Note: You must also activate
13.5 Rapid Spanning Tree Protocol Status
13.6 Configure Multiple Rapid Spanning Tree Protocol
Table 43 Advanced Application > Spanning Tree Protocol > MRSTP (continued)
> Spanning Tree Protocol > Configuration screen to enable MRSTP on the
screen to enable MRSTP on the
Switch
Select this check box to activate STP on this port
13.7 Multiple Rapid Spanning Tree Protocol Status
13.8 Configure Multiple Spanning Tree Protocol
Figure 89 Advanced Application > Spanning Tree Protocol > MSTP
Table 45 Advanced Application > Spanning Tree Protocol > MSTP
MSTP Port
MSTP Status
Spanning Tree Protocol > Configuration screen to enable MSTP on the Switch
Table 45 Advanced Application > Spanning Tree Protocol > MSTP (continued)
MaxAge
rule:
Maximum hops
discarded and the port information is aged
13.9 Multiple Spanning Tree Port Configuration
13.10 Multiple Spanning Tree Protocol Status
Figure 91 Advanced Application > Spanning Tree Protocol > Status: MSTP
Table 47 Advanced Application > Spanning Tree Protocol > Status: MSTP
MSTP settings on the Switch
CST
This section describes the Common Spanning Tree settings
13.11 Technical Reference
Figure 92 STP/RSTP Network Example
Figure 93 MSTP Network Example
•Name of the MST region
•Revision level as the unique number for the MST region
Page
Bandwidth Control
14.1 Overview
14.2 Bandwidth Control Setup
Chapter 14 Bandwidth Control
Table 48 Advanced Application > Bandwidth Control
Select this check box to enable bandwidth control on the Switch
Select this check box to activate ingress rate limits on this port
Ingress Rate
Broadcast Storm Control
15.1 Broadcast Storm Control Overview
15.2 Broadcast Storm Control Setup
Chapter 15 Broadcast Storm Control
Figure 97 Advanced Application > Broadcast Storm Control
Table 49 Advanced Application > Broadcast Storm Control
disable this feature
Broadcast (pkt
Mirroring
16.1 Mirroring Overview
16.2 Port Mirroring Setup
Chapter 16 Mirroring
Table 50 Advanced Application > Mirroring
feature
Monitor
set the common settings and then make adjustments on a port-by-portbasis
Link Aggregation
17.1 Overview
17.2 Link Aggregation Status
17.3 Link Aggregation Setting
Figure 100 Advanced Application > Link Aggregation > Link Aggregation Setting
Table 54 Advanced Application > Link Aggregation > Link Aggregation Setting
Aggregation
ports
Select this option to activate a trunk group
17.4 Link Aggregation Control Protocol
17.5 Technical Reference
Configure static trunking
Port Authentication
18.1 Port Authentication Overview
18.2 Port Authentication Configuration
18.3 Activate IEEE 802.1x Security
Figure 106 Advanced Application > Port Authentication
Table 56 Advanced Application > Port Authentication
Select this check box to permit 802.1x authentication on the Switch
port
Select this to permit 802.1x authentication on this port. You must first allow
Table 56 Advanced Application > Port Authentication > 802.1x (continued)
Figure 107 Guest VLAN Example
Port Authentication
Guest Vlan
Figure 108 Advanced Application > Port Authentication > 802.1x > Guest VLAN
Table 57 Advanced Application > Port Authentication > 802.1x > Guest VLAN
This field displays a port number
Changes in this row are copied to all the ports as soon as you make them
Select this checkbox to enable the guest VLAN feature on this port
Host-mode
(using a hub)
Select Multi-Secure to authenticate each user that connects to this port
Multi-Secure
Num
Port Security
19.1 Port Security Overview
19.2 Port Security Setup
Chapter 19 Port Security
Figure 109 Advanced Application > Port Security
Table 58 Advanced Application > Port Security
Port List
MAC freeze
Table 58 Advanced Application > Port Security (continued)
Limited Number
feature is disabled
Classifier
20.1 Overview
20.2Configuring the Classifier
Chapter 20 Classifier
Figure 110 Advanced Application > Classifier
Table 59 Advanced Application > Classifier
Select this option to enable this rule
Enter a descriptive name for this rule for identifying purposes
Chapter 20 Classifier
Table 59 Advanced Application > Classifier (continued)
to Table 62 on page 152 for more information
the packets that are sent to establish TCP connections
IPv6 Next
Figure 111 Advanced Application > Classifier: Summary Table
Table 60 Classifier: Summary Table
Table 61 Common Ethernet Types and Protocol Numbers
ETHERNET TYPE
PROTOCOL NUMBER
20.3 Classifier Example
Policy Rule
21.1 Policy Rules Overview
21.2 Configuring Policy Rules
Chapter 21 Policy Rule
Figure 113 Advanced Application > Policy Rule
Table 64 Advanced Application > Policy Rule
Select this option to enable the policy
Enter a descriptive name for identification purposes
Table 64 Advanced Application > Policy Rule (continued)
Select No change to forward the packets
Select Discard the packet to drop the packets
Select No change to keep the priority setting of the frames
value you set in the Priority field
21.3 Policy Example
Queuing Method
22.1 Queuing Method Overview
22.2 Configuring Queuing
Table 65 Advanced Application > Queuing Method
This label shows the port you are configuring
Robin)
lowest
weights get more guaranteed bandwidth than queues with smaller weights
Multicast
23.1 Multicast Overview
Chapter 23 Multicast
Figure 117 MVR Network Example
Multicast VLAN S
You can set your Switch to operate in either dynamic or compatible mode
23.2 Multicast Setup
23.3 IPv4 Multicast Status
Figure 121 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping
Table 68 Advanced Application > Multicast > IPv4 Multicast > IGMP Snooping
IGMP Snooping
Use these settings to configure IGMP snooping
that are members of that group
Immed. Leave
IGMP version 2 leave message is received on this port
Select this option if there is only one host connected to this port
Normal Leave
an IGMP Group-SpecificQuery (GSQ) message to determine whether other hosts
23.4 IGMP Snooping VLAN
auto
VLANs automatically
VLAN(s) that you specify below
You must also enable IGMP snooping in the Multicast > IPv4 Multicast > IGMP
Snooping screen first
Profile Name
Enter a descriptive name for the profile for identification purposes
name and specify a different IP multicast address range
to belong to the IGMP filter profile
End Address
23.5 General MVR Configuration
Chapter 23 Multicast
Table 71 Advanced Application > Multicast > Multicast Setting > MVR (continued)
Specify the MVR mode on the Switch. Choices are Dynamic and Compatible
multicast VLAN
Select Compatible to set the Switch not to send IGMP reports or MLD messages
list box
Refer to Section on page 161 for more information on IP multicast addresses
address for a multicast group
MVLAN
This field displays the starting IP address of the multicast group
EXAMPLE
EXAMPLE
EXAMPLE
AAA
24.1 AAA Overview
24.2 AAA Screens
24.3 RADIUS Server Setup
Figure 132 Advanced Application > AAA > RADIUS Server Setup
Table 74 Advanced Application > AAA > RADIUS Server Setup
Use this section to configure your RADIUS authentication settings
This field is only valid if you configure multiple RADIUS servers
RADIUS server, if the RADIUS server does not respond then the Switch tries to
24.4 TACACS+ Server Setup
Figure 133 Advanced Application > AAA > TACACS+ Server Setup
Table 75 Advanced Application > AAA > TACACS+ Server Setup
Use this section to configure your TACACS+ authentication settings
This field is only valid if you configure multiple TACACS+ servers
TACACS+ server, if the TACACS+ server does not respond then the Switch tries to
24.5 AAA Setup
Figure 134 Advanced Application > AAA > AAA Setup
Table 76 Advanced Application > AAA > AAA Setup
Login
authenticate administrator accounts (users for Switch management)
up the corresponding database correctly first
24.6 Technical Reference
•Assign account privilege levels for the authenticated user
The VSAs are composed of the following:
Vendor-ID
Vendor-Type
•Vendor-data:A value you want to assign to the setting
FUNCTIONATTRIBUTE
VLAN(13)
802(6)
$enab
Ethernet(15)
Page
IP Source Guard
25.1 Overview
25.2 IP Source Guard
25.3 IP Source Guard Static Binding
25.4 DHCP Snooping
Figure 137 Advanced Application > IP Source Guard > DHCP Snooping
Table 81 Advanced Application > IP Source Guard > DHCP Snooping
Database Status
Agent URL
This field displays the location of the DHCP snooping database
Table 81 Advanced Application > IP Source Guard > DHCP Snooping (continued)
Agent running
database
none: The Switch is not accessing the DHCP snooping database
write: The Switch is updating the DHCP snooping database
25.5 DHCP Snooping Configure
Figure 138 Advanced Application > IP Source Guard > DHCP Snooping > Configure
Table 82 Advanced Application > IP Source Guard > DHCP Snooping > Configure
snooping on specific VLAN and specify trusted ports
Note: If DHCP is enabled and there are no trusted ports, DHCP requests will not
succeed
Write delay interval
update is scheduled, additional changes in current bindings are automatically
included in the next update
Renew DHCP
Snooping URL
applied to all of the ports
Server Trusted state
Select whether this port is a trusted port (Trusted) or an untrusted port
(Untrusted)
arrive is too high
Show VLAN
Use this section to specify the VLANs you want to manage in the section below
Start VID
Enter the lowest VLAN ID you want to manage in the section below
End VID
25.6 ARP Inspection Status
25.7 ARP Inspection VLAN Status
25.8 ARP Inspection Log Status
Figure 144 Advanced Application > IP Source Guard > ARP Inspection > Log Status
Table 88 Advanced Application > IP Source Guard > ARP Inspection > Log Status
Clearing log status
table
that have not been sent to the syslog server yet
25.9 ARP Inspection Configure
Syslog rate
generated by ARP packets to the syslog server
examples:
sends 4 syslog messages every second
sends 5 syslog messages every 2 seconds
Trusted State
The Switch does not discard ARP packets on trusted ports for any reason
The Switch discards ARP packets on untrusted ports in the following situations:
bindings
rate at which ARP packets can arrive on untrusted ports
Advanced Application > IP Source Guard > ARP Inspection > Configure > VLAN
the VLAN
25.10 Technical Reference
Page
1Enable DHCP snooping on the Switch
2Enable DHCP snooping on each VLAN, and configure DHCP relay option
4Configure static bindings
Figure 149 Example: Man-in-the-middleAttack
•It pretends to be computer A and responds to computer B
Page
Loop Guard
26.1 Loop Guard Overview
Page
26.2 Loop Guard Setup
Table 92 Advanced Application > Loop Guard
Select this option to enable loop guard on the Switch
down a port via the loop guard feature
adjustments on a port-by-portbasis
Clear this check box to disable the loop guard feature
Layer 2 Protocol Tunneling
27.1 Layer 2 Protocol Tunneling Overview
27.2Configuring Layer 2 Protocol Tunneling
Figure 157 Advanced Application > Layer 2 Protocol Tunneling
Table 93 Advanced Application > Layer 2 Protocol Tunneling
Select this to enable layer 2 protocol tunneling on the Switch
packets by replacing the destination MAC address in the packets
you use a unicast MAC address, make sure the MAC address does not exist in the
Chapter 27 Layer 2 Protocol Tunneling
Table 93 Advanced Application > Layer 2 Protocol Tunneling (continued)
VTP
Point to Point
determine the link’s physical status and detect a unidirectional link
PPPoE
28.1 PPPoE Intermediate Agent Overview
Chapter 28 PPPoE
Table 94 PPPoE Intermediate Agent Vendor-specificTag Format
Table 95 PPPoE IA Circuit ID Sub-optionFormat: User-definedString
Table 96 PPPoE IA Remote ID Sub-optionFormat
PPPoE > Intermediate Agent
Table 98 PPPoE IA Circuit ID Sub-optionFormat: Defined in WT-101
Trusted ports are connected to PPPoE servers
If a PADO (PPPoE Active Discovery Offer), PADS (PPPoE Active Discovery
Untrusted ports are connected to subscribers
28.2 The PPPoE Screen
28.3 PPPoE Intermediate Agent
Table 99 Advanced Application > PPPoE > Intermediate Agent (continued)
circuit-id
over this
Per-Port Per-VLANscreen
(specified in the option field) to PADI or PADR packets from PPPoE clients
Figure 161 Advanced Application > PPPoE > Intermediate Agent > Port
Table 100 Advanced Application > PPPoE > Intermediate Agent > Port
Server Trusted
Untrusted
Trusted ports are uplink ports connected to PPPoE servers
Table 100 Advanced Application > PPPoE > Intermediate Agent > Port (continued)
Intermediate Agent > Port
Table 101 Advanced Application > PPPoE > Intermediate Agent > Port > VLAN
Show Port
VLAN(s) on the port
automatically uses the PPPoE client’s MAC address
The Remote ID you configure here has the highest priority
Figure 163 Advanced Application > PPPoE > Intermediate Agent > VLAN
Table 102 Advanced Application > PPPoE > Intermediate Agent > VLAN
Select this option to turn on the PPPoE Intermediate Agent on a VLAN
Table 102 Advanced Application > PPPoE > Intermediate Agent > VLAN (continued)
Error Disable
29.1 Error Disable Overview
29.2The Error Disable Screens Overview
29.3 Error-DisableStatus
Chapter 29 Error Disable
Figure 165 Advanced Application > Errdisable > Errdisable Status
Table 103 Advanced Application > Errdisable > Errdisable Status
Inactive-reason
mode reset
29.4 CPU Protection Configuration
29.5 Error-DisableDetect Configuration
29.6 Error-DisableRecovery Configuration
Table 106 Advanced Application > Errdisable > Errdisable Recovery
Select this option to turn on the error-disablerecovery function on the Switch
configure
adjustments to each entry if necessary
Timer Status
Green Ethernet
30.1 Green Ethernet Overview
30.2 Configuring Green Ethernet
Chapter 30 Green Ethernet
Figure 169 Advanced Application > Green Ethernet
Table 107 Advanced Application > Green Ethernet
EEE
Select this to activate Energy Efficient Ethernet globally
Link Layer Discovery Protocol (LLDP)
31.1 LLDP Overview
31.2 LLDP-MEDOverview
31.3 LLDP Screens
31.4 LLDP Local Status
Table 109 Advanced Application > LLDP > LLDP Local Status
Basic TLV
chassis ID is identified by the chassis ID subtype
by the chassis ID subtype
This shows the Host Name of the Switch
Page
Page
These are the Basic TLV flags
Port ID TLV
The port ID TLV identifies the specific port that transmitted the LLDP frame
• Port ID Subtype: This shows how the port is identified
• Port ID: This is the ID of the port
31.5 LLDP Remote Status
LLDP Remote Status
The following table describes the labels in Basic TLV part of the screen
Chassis ID TLV
identified by the chassis ID subtype
the port ID subtype
Time To Live
This displays the VLAN ID of this port on the remote device
sent the LLDP PDU
• Port-ProtocolVLAN ID
• Port-ProtocolVLAN ID Supported
• Port-ProtocolVLAN ID Enabled
Identity TLV
accessible through its port
Power Via MDI
power support capabilities of the sending port on the remote device
Port Class
Page
The following table describes the labels in the MED TLV part of the screen
This displays the MED capabilities the remote port supports
• Extend Power via MDI PSE
• Extend Power via MDI PD
Inventory Management
31.6 LLDP Configuration
Figure 180 Advanced Application > LLDP > LLDP Configuration
Table 115 Advanced Application > LLDP > LLDP Configuration
Select to enable LLDP on the Switch. It is disabled by default
Transmit Interval
Enter how many seconds the Switch waits before sending LLDP packets
Advanced Application
LLDP > LLDP Configuration (Click Here) > Basic TLV Setting
Figure 181 Advanced Application > LLDP > LLDP Configuration> Basic TLV Setting
Table 116 Advanced Application > LLDP > LLDP Configuration > Basic TLV Setting
all ports simultaenously
LLDP > LLDP Configuration (Click Here)
Org-specific
TLV Setting
Select to enable the sending of IEEE 802.1 Port VLAN ID TLVs on the port(s)
Note: For PoE models only. The Power Via MDI TLV allows network management to
31.7 LLDP-MEDConfiguration
31.8 LLDP-MEDNetwork Policy
31.9 LLDP-MEDLocation
Table 120 Advanced Application > LLDP > LLDP-MEDLocation
The LLPD-MEDuses geographical coordinates and Civic Address to set the location
Coordinates
other related information
Latitude
ELIN Number
is from 10 octets to 25 octets
Click Add after finish entering the location information
Click Cancel to begin entering the location information afresh
or edit the lcoation
Static Route
32.1 Static Route Overview
32.2 Static Routing
32.3 Configuring Static Routing
Chapter 32 Static Route
Figure 187 IP Application > Static Routing > IPv4 Static Route
Table 121 IP Application > Static Routing > IPv4 Static Route
This field allows you to activate/deactivate this static route
Destination IP
Chapter 32 Static Route
Table 121 IP Application > Static Routing > IPv4 Static Route (continued)
your Switch that will forward the packet to the destination
This field displays the cost of transmission for routing purposes
Differentiated Services
33.1 Differentiated Services Overview
P - Platinum
G - Gold
S - Silver
33.2 Activating DiffServ
33.3 DSCP-to-IEEE802.1p Priority Settings
DSCP Setting
Figure 191 IP Application > DiffServ > DSCP Setting
Table 124 IP Application > DiffServ > DSCP Setting
0 …
This is the DSCP classification identification number
DHCP
34.1 DHCP Overview
34.2 DHCP Configuration
34.3 DHCPv4 Status
34.4 DHCPv4 Relay
IP Application > DHCP > DHCPv4
Option 82 Profile
Figure 194 IP Application > DHCP > DHCPv4 > Option 82 Profile
Table 130 IP Application > DHCP > DHCPv4 > Option 82 Profile
ASCII characters. Spaces are allowed
Circuit-ID
to the relay agent (the Switch)
Table 130 IP Application > DHCP > DHCPv4 > Option 82 Profile (continued)
Field
Figure 195 IP Application > DHCP > DHCPv4 > Global
Table 131 IP Application > DHCP > DHCPv4 > Global
Select this check box to enable DHCPv4 relay
Remote DHCP
Enter the IP address of a DHCPv4 server in dotted decimal notation
Server 1
Table 132 IP Application > DHCP > DHCPv4 > Global > Port (continued)
clear the fields above
button to remove the selected entry(ies) from the table
VLAN1
Figure 197 Global DHCP Relay Network Example
34.5 Configuring DHCPv4 VLAN Settings
Figure 199 IP Application > DHCP > DHCPv4 > VLAN
Table 133 IP Application > DHCP > DHCPv4 > VLAN
Enter the ID number of the VLAN to which these DHCP settings apply
Enter the IP address of a DHCP server in dotted decimal notation
This field displays Relay for the DHCP mode
Table 133 IP Application > DHCP > DHCPv4 > VLAN (continued)
IP Application > DHCP > DHCPv4 > VLAN > Port
Figure 200 IP Application > DHCP > DHCPv4 > VLAN > Port
Table 134 IP Application > DHCP > DHCPv4 > VLAN > Port
specified in the profile to DHCP requests that it relays to a DHCP server
Chapter 34 DHCP
Table 134 IP Application > DHCP > DHCPv4 > VLAN > Port (continued)
Figure 201 DHCP Relay for Two VLANs
DHCP:192.168.1.100
DHCP:172.16.10.100
34.6 DHCPv6 Relay
Figure 203 IP Application > DHCP > DHCPv6
Table 135 IP Application > DHCP > DHCPv6
Helper Address
Enter the remote DHCPv6 server address for the specified VLAN
Remote ID
ARP Setup
35.1 ARP Overview
Chapter 35 ARP Setup
ARP Request
ARP Reply
ICMP Request
ICMP Reply
35.2 ARP Setup
Figure 205 IP Application > ARP Setup > ARP Learning
Table 136 IP Application > ARP Setup > ARP Learning
ARP Learning
Select the ARP learning mode the Switch uses on the port
ARP requests sent by the Switch
Maintenance
36.1 Overview
36.2 The Maintenance Screen
Chapter 36 Maintenance
Table 137 Management > Maintenance (continued)
Click Click Here to go to the Restore Configuration screen
Click Click Here to go to the Backup Configuration screen
Click Here
36.3Firmware Upgrade
36.4 Restore a Configuration File
36.5 Backup a Configuration File
36.6Tech-Support
to see the following screen
Figure 212 Management > Maintenance > Tech-Support
Table 139 Management > Maintenance > Tech-Support
CPU
Type a number ranging from 50 to 100 in the CPU threshold box, and type
36.7 Technical Reference
1Launch the FTP client on your computer
2Enter open, followed by a space and the IP address of your Switch
3Press [ENTER] when prompted for a username
4Enter your password as requested (the default is “1234”)
5Enter bin to set transfer mode to binary
Service Access Control
Remote Management
Access Control
37.1 Access Control Overview
37.2 The Access Control Main Screen
37.3 Configuring SNMP
Chapter 37 Access Control
Table 142 Management > Access Control > SNMP (continued)
Set Community
management station
Trap Community
Table 143 Management > Access Control > SNMP > Trap Group
Setting screen
Traps on page 304 for individual trap descriptions
categories)
SNMP > Trap Group
Table 144 Management > Access Control > SNMP > Trap Group > Port
Select the trap type you want to configure here
Select this check box to enable the trap type of SNMP traps on this port
Clear this check box to disable the sending of SNMP traps on this port
User
Table 145 Management > Access Control > SNMP > User (continued)
Security Level
Select whether you want to implement authentication and/or encryption for SNMP
communication from this user. Choose:
security level
37.4 Setting Up Login Accounts
37.5 Service Port Access Control
37.6 Remote Management
Figure 220 Management > Access Control > Remote Management
Table 148 Management > Access Control > Remote Management
Entry
computers” from which an administrator may use a service to manage the Switch
temporarily disable the set without deleting it
37.7 Technical Reference
OPTION
OBJECT LABEL
OBJECT ID
Table 150 SNMP System Traps (continued)
Internet Explorer
Security Alert
Yes
Internet Explorer 7 or
Continue to this website (not recommended)
Certificate Error
View certificates
Install Certificate
Figure 226 Certificate (Internet Explorer 7 or 8)
This Connection is Unstructed
I Understand the Risks
Add Exception
Figure 227 Security Alert (Mozilla Firefox)
Confirm Security Exception
Figure 228 Security Alert (Mozilla Firefox)
Internet Explorer
Internet Explorer
Diagnostic
38.1 Overview
38.2 Diagnostic
Table 151 Management > Diagnostic
System Log
Click Display to display a log of events in the multi-linetext box
Click Clear to empty the text box and reset the syslog entry
IP Ping
Syslog
39.1 Syslog Overview
39.2 Syslog Setup
39.3 Syslog Server Setup
Figure 232 Management > Syslog > Syslog Server Setup
Table 154 Management > Syslog > Syslog Server Setup
(you can edit the entry later)
Server Address
Enter the IP address of the syslog server
Cluster Management
40.1 Cluster Management Overview
40.2 Cluster Management Status
40.3 Clustering Management Configuration
Table 157 Management > Cluster Management > Configuration
Clustering Manager
( ) appears in the member summary list below
Type a name to identify the Clustering Manager. You may use up to 32 printable
characters (spaces are allowed)
40.4 Technical Reference
The following table explains some of the FTP parameters
Table 158 FTP Upload to Cluster Member Example
FTP PARAMETER
User
Enter “admin”
MAC Table
41.1 MAC Table Overview
41.2 Viewing the MAC Table
Table 159 Management > MAC Table
criteria you specified
Select All to display any entry in the MAC table of the Switch
Select Static to display the MAC entries manually configured on the Switch
the specified VLAN
ARP Table
42.1 Overview
42.2 Viewing the ARP Table
Figure 240 Management > ARP Table
Table 160 Management > ARP Table
Specify how you want the Switch to remove ARP entries when you click Flush
Select All to remove all of the dynamic entries from the ARP table
specified IP address
Path MTU Table
43.1 Path MTU Overview
43.2 Viewing the Path MTU Table
Configure Clone
44.1 Overview
44.2 Configure Clone
Figure 242 Management > Configure Clone
Table 162 Management > Configure Clone
Source
Source
separated by a comma or a range of ports by using a dash
Neighbor Table
45.1 IPv6 Neighbor Table Overview
45.2 Viewing the IPv6 Neighbor Table
Table 163 Management > Neighbor Table (continued)
configure or the MAC address of the neighboring device
are:
received a response to the initial request.)
unrequested response from the neighbor’s interface
Page
Page
Page
Page
Troubleshooting
46.1Power, Hardware Connections, and LEDs
46.2Switch Access and Login
Advanced Suggestions
I can see the Login screen, but I cannot log in to the Switch
2You may have exceeded the maximum number of concurrent sessions
3Disconnect and re-connectthe cord to the Switch
Pop-upWindows, JavaScripts and Java Permissions
46.3 Switch Configuration
Page
Page
Page
Page
Page
Page
User-Defined
Port(s
Port(s)
•If the Protocol is TCP, UDP, or TCP/UDP, this is the IP port number
•If the Protocol is USER, this is the IP protocol number
Table 164 Commonly Used Services (continued)
Appendix B Common Services
Page
MULTICAST ADDRESS
Table 167 Reserved Multicast Address (continued)
EUI-64
Page
Neighbor solicitation: A request from a host to determine a neighbor’s
Neighbor advertisement: A response from a node to announce its
C:\>ipv6 install
Installing
Succeeded
C:\>ipconfig
Windows IP Configuration
4Double click Dibbler - a DHCPv6 client
1Select Control Panel > Network and Sharing Center > Local Area Connection
2Select the Internet Protocol Version 6 (TCP/IPv6) checkbox to enable it
4Click Close to exit the Local Area Connection Status screen
5Select Start > All Programs > Accessories > Command Prompt
Copyright
Disclaimer
Trademarks
Certifications (Class A)
Federal Communications Commission (FCC) Interference Statement
Appendix D Legal Information
ZyXEL Limited Warranty
Note
Registration
Safety Warnings
Environmental Product Declaration
Page
cluster member firmware upgrade 320 network example
setup 318 specification 316 status 317 switch models 316 VID
Common and Internal Spanning Tree, See CIST 126 configuration
change running config 286 configuration file
backup 288 restore 287 saving
GVRP 86, 91
Page
Page
Page
STP 114
STP 108
Hello Time 113, 114, 116
Max Age 113, 114, 116