Manuals / Brands / Computer Equipment / Network Router / ZyXEL Communications / Computer Equipment / Network Router

ZyXEL Communications MES3500-24, MES3500-24F manual 2

1 349
Download 349 pages, 8.3 Mb
Contents
Default Login Details Page About This User's Guide Document Conventions Safety Warnings Page Contents Overview Page Table of Contents Part I: User’s Guide Chapter The Web Configurator Basic Setting Configuring Static MAC Forwarding Configure Multiple Rapid Spanning Tree Protocol Multiple Rapid Spanning Tree Protocol Status 13.8.1 Multiple Spanning Tree Protocol Port Configuration Multiple Spanning Tree Protocol Status Mirroring Link Aggregation Port Authentication Port Security Classifier 22.1.1 Strictly Priority Queuing 22.1.2 Weighted Fair Queuing 22.1.3 Weighted Round Robin Scheduling (WRR) 23.1.1 VLAN Stacking Example 23.3.1 Frame Format 25.1.1 Local User Accounts 25.1.2 RADIUS and TACACS+ 25.2.1 RADIUS Server Setup 25.2.2 TACACS+ Server Setup 25.2.3 AAA Setup 29.1.1 Layer-2Protocol Tunneling Mode 35.1.1 DSCP and Per-HopBehavior 35.1.2 DiffServ Network Example 35.2.1 TRTCM-Color-blindMode 35.2.2 TRTCM-Color-awareMode 35.3.1 Configuring 2-Rate3 Color Marker Settings 38.3.5 Configuring SNMP Trap Group ARP Table Appendix A Common Services Page Page Page Getting to Know Your Switch 1.1 Introduction 1.1.1 Backbone Application 1.1.2 Bridging Example 1.1.3 High Performance Switching Example 1.1.4 IEEE 802.1Q VLAN Application Examples 1.1.5 IPv6 Support 1.2 Ways to Manage the Switch 1.3Good Habits for Managing the Switch Hardware Installation and Connection 2.1 Installation Scenarios 2.2Desktop Installation Procedure 2.3Mounting the Switch on a Rack 2.3.1Rack-mountedInstallation Requirements 2.3.2Attaching the Mounting Brackets to the Switch 2.3.3Mounting the Switch on a Rack Hardware Overview 3.1 Front Panel 3.1.1 Console Port 3.1.2 Ethernet Ports 3.1.3 Transceiver Slots •Type: SFP connection interface •Connection speed: 1 Gigabit per second (Gbps) or 1 Megabit per second (Mbps) 3.1.3.1Transceiver Installation Use the following steps to install a mini-GBICtransceiver (SFP module) 2Press the transceiver firmly until it clicks into place 4Close the transceiver’s latch (latch styles vary) Figure 3.1.4Power Connector 3.1.5Signal Slot Door Open Spring Sensor Clip Connector 3.2 LEDs Table 2 LED Descriptions (continued) The Web Configurator 4.1 Introduction 4.2System Login 4.3The Web Configurator Layout BASIC SETTING ADVANCED IP APPLICATION MANAGEMENT APPLICATION The following table describes the links in the navigation panel Table 4 Navigation Panel Links LINK Basic Settings System Info Chapter 4 The Web Configurator Table 4 Navigation Panel Links (continued) AAA This link takes you to a screen where you can configure authentication (Terminal Access Controller Access-ControlSystem Plus) 4.4 Saving Your Configuration 4.5 Switch Lockout 4.6Resetting the Switch 4.6.1 Reload the Configuration File 4.7 Logging Out of the Web Configurator 4.8 Help Page Page Initial Setup Example 5.1 Overview 5.1.1Creating a VLAN VLAN Group ID VID 5.1.2Setting Port VID 5.2 Configuring Switch Management IP Address 1Connect your computer to the Switch’s port which is not in VLAN Section 4.2 on page 3Click Basic Setting > IP Setup in the navigation panel in the navigation panel 4Configure the related fields in the IP Setup screen Tutorials 6.1How to Use DHCP Snooping on the Switch Control Tx Tagging VLAN Port Setting , activate and specify VLAN 100 as the DHCP VLAN as shown. Click 5 Click the Port link at the top right corner 6The DHCP Snooping Port Configure screen appears screen appears Server Trusted state 6.2 How to Use DHCP Relay on the Switch 6.2.1 DHCP Relay Tutorial Introduction 6.2.2 Creating a VLAN 3Click Advanced Application > VLAN > Static VLAN VLAN Status 6.2.3Configuring DHCP Relay 6.2.4Troubleshooting 6.3How to Use PPPoE IA on the Switch 6.3.1 Configuring Switch A Intermediate Agent 6.3.2 Configuring Switch B Trusted Page 6.4 How to Use Error Disable and Recovery on the Switch Page 6.5 How to Set Up a Guest VLAN 6.5.1 Creating a Guest VLAN Basic Setting > Switch Setup PVID 6.5.2Enabling IEEE 802.1x Port Authentication 6.5.3 Enabling Guest VLAN 6.6How to Do Port Isolation in a VLAN Internet 6.6.1 Creating a VLAN Page 6.6.2Creating a Private VLAN Rule Private VLAN VLAN ID Page Page Page System Status and Port Statistics 7.1 Overview 7.2 Port Status Summary Chapter 7 System Status and Port Statistics The following table describes the labels in this screen Table 7 Status screen (refer to Figure 27 on page 83) Name 7.2.1 Status: Port Details Table 8 Status: Port Details (continued) Status Section 13.1 on page 122 for more information) STOP This field shows if LACP is enabled on this port or not Chapter 7 System Status and Port Statistics 128 and 255 octets in length 256 and 511 octets in length 512 and 1023 octets in length 1024 and 1518 octets in length Basic Setting 8.1 Overview 8.2 System Information Table 9 Basic Setting > System Info System Name Product Model This field displays the model number of the Switch ZyNOS F/W 8.3 General Setup 8.4 Introduction to VLANs 8.4.1 Smart Isolation 8.5 Switch Setup Table 11 Basic Setting > Switch Setup (continued) Aging Time relearned) Join Leave 8.6 IP Setup 8.6.1 Management IP Addresses Table 12 Basic Setting > IP Setup Domain Name use a domain name instead of an IP address Default Management IP Address DHCP Client 8.7 Port Setup Table 13 Basic Setting > Port Setup (continued) Speed/Duplex 1000M/Full Duplex (Gigabit connections only) the same in order to connect Flow Control VLAN 9.1 Introduction to IEEE 802.1Q Tagged VLANs 9.1.1 Forwarding Tagged and Untagged Frames 9.2 Automatic VLAN Registration 9.2.1 GARP 9.2.2 GVRP 9.3 Port VLAN Trunking 9.4 Select the VLAN Type 9.5 Static VLAN 9.5.1 VLAN Status 9.5.2 VLAN Details 9.5.3 Configure a Static VLAN 9.5.4 Configure VLAN Port Settings 9.6 Subnet Based VLANs 9.7 Configuring Subnet Based VLAN Figure 40 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN Check this box to activate this subnet based VLANs on the Switch DHCP-Vlan Override the DHCP VLAN or via another DHCP server on the subnet based VLAN 9.8 Protocol Based VLANs 9.9 Configuring Protocol Based VLAN 9.10 Create an IP-basedVLAN Example 9.11Port-basedVLAN Setup Filtering 9.11.1 Configure a Port-basedVLAN Page Table 21 Advanced Application > VLAN: Port Based VLAN Setup Setting Choose All connected or Port isolation Choose Wizard Static MAC Forward Setup 10.1 Overview 10.2 Configuring Static MAC Forwarding Chapter 10 Static MAC Forward Setup Table 22 Advanced Application > Static MAC Forwarding deleting it by clearing this check box rule Note: Static MAC addresses do not age out Static Multicast Forward Setup 11.1 Static Multicast Forwarding Overview 11.2 Configuring Static Multicast Forwarding to display the configuration screen as shown Figure 50 Advanced Application > Static Multicast Forwarding Table 23 Advanced Application > Static Multicast Forwarding address forwarding rule. This is for identification only 00000001 is 01 and 00000011 is 03 in hexadecimal, so 01:00:5e:00:00:0A and Table 23 Advanced Application > Static Multicast Forwarding (continued) specified multicast MAC address will be forwarded Filtering 12.1 Configure a Filtering Rule Chapter 12 Filtering Advanced Application > FIltering (continued) MAC Click Clear to clear the fields to the factory defaults which the MAC address belongs Spanning Tree Protocol 13.1 STP/RSTP Overview 13.1.1 STP Terminology 13.1.2 How STP Works 13.1.3 STP Port States 13.1.4 Multiple RSTP 13.1.5 Multiple STP 13.1.5.1 MSTP Network Example Figure 53 STP/RSTP Network Example 13.1.5.2 MST Region 13.1.5.3MST Instance 13.1.5.4 Common and Internal Spanning Tree (CIST) 13.2 Spanning Tree Protocol Status Screen 13.3 Spanning Tree Configuration 13.4 Configure Rapid Spanning Tree Protocol Table 28 Advanced Application > Spanning Tree Protocol > RSTP Click Status to display the RSTP Status screen (see Figure 60 on page 130) Select this check box to activate RSTP. Clear this checkbox to disable RSTP Note: You must also activate Rapid Spanning Tree in the Advanced Application Note: You must also activate 13.5 Rapid Spanning Tree Protocol Status 13.6 Configure Multiple Rapid Spanning Tree Protocol Table 30 Advanced Application > Spanning Tree Protocol > MRSTP (continued) > Spanning Tree Protocol > Configuration screen to enable MRSTP on the screen to enable MRSTP on the Switch temporary data loops might result. The allowed range is 4 to 30 seconds 13.7 Multiple Rapid Spanning Tree Protocol Status communicate with the root of the Spanning Tree 13.8 Configure Multiple Spanning Tree Protocol Table 32 Advanced Application > Spanning Tree Protocol > MSTP Click Status to display the MSTP Status screen (see Figure 65 on page 139) on the Switch Spanning Tree Protocol > Configuration screen to enable MSTP on the Switch screen to enable MSTP on the Switch Table 32 Advanced Application > Spanning Tree Protocol > MSTP (continued) VLAN Range remove from the VLAN range edit area in the End field Next click: • Add - to add this range of VLAN(s) to be mapped to the MST instance 13.8.1 Multiple Spanning Tree Protocol Port Configuration 13.9 Multiple Spanning Tree Protocol Status This field displays the configuration name for this MST region This field displays the revision number for this MST region A configuration digest is generated from the VLAN-MSTImapping information Digest displays the digest when MSTP is activated on the system Bandwidth Control 14.1 Bandwidth Control Overview 14.1.1 CIR and PIR 14.2 Bandwidth Control Setup Chapter 14 Bandwidth Control Table 35 Advanced Application > Bandwidth Control (continued) Broadcast Storm Control 15.1 Broadcast Storm Control Setup Chapter 15 Broadcast Storm Control Table 36 Advanced Application > Broadcast Storm Control (continued) Broadcast (pkt Multicast (pkt/s) DLF (pkt/s) Mirroring 16.1 Port Mirroring Setup Chapter 16 Mirroring Advanced Application > Mirroring (continued) set the common settings and then make adjustments on a port-by-portbasis Mirrored Select this option to mirror the traffic on a port Link Aggregation 17.1 Link Aggregation Overview 17.2 Dynamic Link Aggregation 17.2.1 Link Aggregation ID 17.3 Link Aggregation Status Table 40 Advanced Application > Link Aggregation Status (continued) Aggregator ID enabled for this group Criteria trunk 17.4 Link Aggregation Setting Advanced Application > Link Aggregation > Link Aggregation Setting (continued) address to make sure port trunking can work properly Select src-mac to distribute traffic based on the packet’s source MAC address destination MAC addresses Select src-ip to distribute traffic based on the packet’s source IP address 17.5 Link Aggregation Control Protocol 17.6 Static Trunking Example Configure static trunking Port Authentication 18.1 Port Authentication Overview 18.1.1 IEEE 802.1x Authentication 18.1.2 MAC Authentication 18.2 Port Authentication Configuration 18.2.1 Activate IEEE 802.1x Security 18.2.2 Guest VLAN Page 18.2.3 Activate MAC Authentication Table 45 Advanced Application > Port Authentication > MAC Authentication Select this check box to permit MAC authentication on the Switch Name Prefix authentication. You can enter up to 32 printable ASCII characters RADIUS server Port Security 19.1 About Port Security 19.2 Port Security Setup Chapter 19 Port Security Table 46 Advanced Application > Port Security Port List MAC freeze display in the Static MAC Forwarding screen Classifier 20.1 About the Classifier and QoS 20.2Configuring the Classifier Chapter 20 Classifier Advanced Application > Classifier Figure 82 Advanced Application > Classifier Table 47 Advanced Application > Classifier Select this option to enable this rule 20.3 Viewing and Editing Classifier Configuration Figure 83 Advanced Application > Classifier: Summary Table Table 48 Classifier: Summary Table Table 49 Common Ethernet Types and Protocol Number ETHERNET TYPE PROTOCOL NUMBER 20.4 Classifier Example Policy Rule 21.1 Policy Rules Overview 21.1.1 DiffServ 21.1.2 DSCP and Per-HopBehavior 21.2 Configuring Policy Rules Chapter 21 Policy Rule Advanced Applications > Policy Rule Figure 85 Advanced Application > Policy Rule Table 51 Advanced Application > Policy Rule Select this option to enable the policy Table 51 Advanced Application > Policy Rule (continued) General Egress Port Type the number of an outgoing port Specify a priority level 21.3 Viewing and Editing Policy Configuration 21.4 Policy Example Queuing Method 22.1 Queuing Method Overview 22.1.1 Strictly Priority Queuing 22.1.2 Weighted Fair Queuing 22.1.3 Weighted Round Robin Scheduling (WRR) 22.2 Configuring Queuing Table 53 Advanced Application > Queuing Method This label shows the port you are configuring Robin) get more guaranteed bandwidth than queues with smaller weights more service than queues with smaller weights VLAN Stacking 23.1 VLAN Stacking Overview 23.1.1 VLAN Stacking Example 23.2 VLAN Stacking Port Roles Port 23.3 VLAN Tag Format 23.3.1 Frame Format 23.4 Configuring VLAN Stacking 23.4.1 Port-based Q-in-Q 23.4.2 Selective Q-in-Q Table 59 Advanced Application > VLAN Stacking > Selective QinQ (continued) This shows whether this rule is activated or not This is the descriptive name for this rule This is the port number to which this rule is applied This is the customer VLAN ID in the incoming packets Multicast 24.1 Multicast Overview 24.1.1 IP Multicast Addresses 24.1.2 IGMP Filtering 24.1.3 IGMP Snooping 24.2 Multicast Status 24.3 Multicast Setting Chapter 24 Multicast Table 61 Advanced Application > Multicast > Multicast Setting (continued) Unknown Multicast Frame Reserved Throttling number of the IGMP groups a port can join is reached Deny multicast forwarding table entry is aged out IGMP report(s) received on this port 24.4 IGMP Snooping VLAN 24.5 IGMP Filtering Profile 24.6 MVR Overview 24.6.1 Types of MVR Ports 24.6.2 MVR Modes 24.6.3 How MVR Works 24.7 General MVR Configuration Figure 99 Advanced Application > Multicast > Multicast Setting > MVR Table 64 Advanced Application > Multicast > Multicast Setting > MVR among different subscriber VLANs on the network Multicast VLAN Enter the VLAN ID (1 to 4094) of the multicast VLAN 24.8 MVR Group Configuration 24.8.1 MVR Configuration Example News Movie Multicast VID Page AAA 25.1 Authentication, Authorization and Accounting (AAA) 25.1.1 Local User Accounts 25.1.2 RADIUS and TACACS+ 25.2 AAA Screens 25.2.1 RADIUS Server Setup RADIUS Server Setup Figure 107 Advanced Application > AAA > RADIUS Server Setup Table 67 Advanced Application > AAA > RADIUS Server Setup Use this section to configure your RADIUS authentication settings This field only applies if you configure multiple RADIUS servers Table 67 Advanced Application > AAA > RADIUS Server Setup (continued) Shared Secret be the same on the external RADIUS server and the Switch entry is deleted when you click Apply Accounting 25.2.2 TACACS+ Server Setup Table 68 Advanced Application > AAA > TACACS+ Server Setup (continued) TCP Port must be the same on the external TACACS+ server and the Switch Use this section to configure your TACACS+ accounting settings This is a read-onlynumber representing a TACACS+ accounting server entry 25.2.3 AAA Setup Table 69 Advanced Application > AAA > AAA Setup (continued) Login authenticate administrator accounts (users for Switch management) up the corresponding database correctly first Method 2 and Method 3 fields 25.2.4 Vendor Specific Attribute 25.2.5 Tunnel Protocol Attribute 25.3 Supported RADIUS Attributes 25.3.1 Attributes Used for Authentication 25.3.2Attributes Used for Accounting 25.3.2.1 Attributes Used for Accounting System Events Acct-Status-Type Acct-Session-ID date+time+8-digit sequential number 25.3.2.3 Attributes Used for Accounting IEEE 802.1x Events Table 74 RADIUS Attributes - Exec Events via Console IP Source Guard 26.1 IP Source Guard Overview 26.1.1 DHCP Snooping Overview 26.1.1.2DHCP Snooping Database 26.1.2ARP Inspection Overview •It pretends to be computer A and responds to computer B •It pretends to be computer B and sends a message to computer A 26.1.2.1 ARP Inspection and MAC Address Filters Chapter 12 on page •They are stored only in volatile memory •They do not use the same space in memory that regular MAC address filters use They appear only in the 26.2 IP Source Guard 26.3 IP Source Guard Static Binding Advanced Application > IP Source Guard > Static Binding Figure 113 IP Source Guard Static Binding Table 76 IP Source Guard Static Binding Enter the source MAC address in the binding Enter the IP address assigned to the MAC address in the binding 26.4 DHCP Snooping Chapter 26 IP Source Guard Table 77 DHCP Snooping (continued) Write delay timer update in the DHCP snooping database before it gives up Abort timer 26.5 DHCP Snooping Configure Advanced Application > IP Source Guard > DHCP Snooping > Configure Figure 115 DHCP Snooping Configure Table 78 DHCP Snooping Configure snooping on specific VLAN and specify trusted ports no trusted ports 26.5.1 DHCP Snooping Port Configure 26.5.2 DHCP Snooping VLAN Configure 26.6 ARP Inspection Status 26.6.1 ARP Inspection VLAN Status 26.6.2 ARP Inspection Log Status 26.7 ARP Inspection Configure 26.7.1 ARP Inspection Port Configure open this screen, click Figure 122 ARP Inspection Port Configure Table 85 ARP Inspection Port Configure Trusted State The Switch does not discard ARP packets on trusted ports for any reason 26.7.2 ARP Inspection VLAN Configure Loop Guard 27.1 Loop Guard Overview Page 27.2 Loop Guard Setup Advanced Application > Loop Guard (continued) VLAN Mapping 28.1 VLAN Mapping Overview 28.1.1 VLAN Mapping Example 28.2 Enabling VLAN Mapping 28.3 Configuring VLAN Mapping Page Layer 2 Protocol Tunneling 29.1 Layer 2 Protocol Tunneling Overview 29.1.1 Layer-2Protocol Tunneling Mode 29.2 Configuring Layer 2 Protocol Tunneling Table 90 Advanced Application > Layer 2 Protocol Tunneling (continued) STP based on bridge information from all (local and remote) networks VTP Point to Point sFlow 30.1 sFlow Overview 30.2 sFlow Port Configuration 30.2.1 sFlow Collector Configuration Advanced Application > sFlow > Collector (continued) PPPoE 31.1 PPPoE Intermediate Agent Overview 31.1.1 PPPoE Intermediate Agent Tag Format 31.1.2 Sub-OptionFormat 31.1.3 Port State 31.2The PPPoE Screen 31.3 PPPoE Intermediate Agent Figure 139 Advanced Application > PPPoE > Intermediate Agent Table 98 Advanced Application > PPPoE > Intermediate Agent access-node identifier spaces are also allowed. The default is the Switch’s host name 31.3.1 PPPoE IA Per-Port 31.3.2 PPPoE IA Per-Port Per-VLAN Intermediate Agent > Port Table 100 Advanced Application > PPPoE > Intermediate Agent > Port > VLAN Show Port VLAN(s) on the port Enter the lowest VLAN ID you want to configure in the section below 31.3.3 PPPoE IA for VLAN Error Disable 32.1 CPU Protection Overview 32.2 Error-DisableRecovery Overview 32.3 The Error Disable Screen 32.4 CPU Protection Configuration 32.5 Error-DisableDetect Configuration 32.6 Error-DisableRecovery Configuration Table 104 Advanced Application > Errdisable > Errdisable Recovery (continued) Timer Status this rule Interval Enter the number of seconds (from 30 to 2592000) for the time interval Private VLAN 33.1 Private VLAN Overview 33.2 Configuring Private VLAN Page Static Route 34.1 Static Routing Overview 34.2 Configuring Static Routing Table 106 IP Application > Static Routing (continued) Differentiated Services 35.1 DiffServ Overview 35.1.1 DSCP and Per-HopBehavior 35.1.2 DiffServ Network Example P - Platinum 35.2 Two Rate Three Color Marker Traffic Policing 35.2.1 TRTCM-Color-blindMode 35.2.2 TRTCM-Color-awareMode 35.3 Activating DiffServ 35.3.1 Configuring 2-Rate3 Color Marker Settings Note: You cannot enable both TRTCM and Bandwidth Control at the same time Figure 156 IP Application > DiffServ > 2-rate3 Color Marker Table 108 IP Application > DiffServ > 2-rate3 Color Marker and marks the packets based on the TRTCM settings DiffServ 35.3.2 Configuring DSCP Profiles 35.4 DSCP-to-IEEE802.1p Priority Settings 35.4.1 Configuring DSCP Settings Table 111 IP Application > DiffServ > DSCP Setting 0 … This is the DSCP classification identification number DHCP 36.1 DHCP Overview 36.1.1 DHCP Modes 36.1.2 DHCP Configuration Options 36.2DHCP Status 36.3DHCP Relay 36.3.1 DHCP Relay Agent Information 36.3.2 Configuring DHCP Global Relay 36.3.3 Global DHCP Relay Configuration Example 36.4 Configuring DHCP VLAN Settings 36.4.1 Example: DHCP Relay for Two VLANs Page Maintenance 37.1 The Maintenance Screen 37.2 Load Factory Default 37.3Save Configuration 37.4 Reboot System 37.5Firmware Upgrade 37.6 Restore a Configuration File 37.7 Backup a Configuration File 37.8 FTP Command Line 37.8.1 Filename Conventions 37.8.2 FTP Command Line Procedure 37.8.3GUI-basedFTP Clients 37.8.4 FTP Restrictions Remote Management Access Control 38.1 Access Control Overview 38.2 The Access Control Main Screen 38.3 About SNMP 38.3.1 SNMP v3 and Security 38.3.2 Supported MIBs 38.3.3SNMP Traps Table 120 SNMP System Traps (continued) Table 121 SNMP Interface Traps SNMP Interface Traps (continued) AAA Traps Table 123 SNMP IP Traps Table 124 SNMP Switch Traps 38.3.4 Configuring SNMP 38.3.5 Configuring SNMP Trap Group 38.3.6 Configuring SNMP User 38.4 Setting Up Login Accounts Click Management > Access Control > Logins to view the screen as shown next Figure 177 Management > Access Control > Logins Table 128 Management > Access Control > Logins LABELDESCRIPTION 38.5 SSH Overview 38.6 How SSH works 38.7 SSH Implementation on the Switch 38.7.1 Requirements for Using SSH 38.8 Introduction to HTTPS HTTP Service Access Control 38.9 HTTPS Example 38.9.1 Internet Explorer Warning Messages 38.9.1.2 Internet Explorer 7 or Continue to this website (not recommended) Certificate Error View certificates Install Certificate 38.9.2 Mozilla Firefox Warning Messages 38.9.3 The Main Screen 38.10 Service Port Access Control 38.11 Remote Management Access Control Figure 189 Management > Access Control > Remote Management Table 130 Management > Access Control > Remote Management Entry computers” from which an administrator may use a service to manage the Switch Diagnostic 39.1 Diagnostic Syslog 40.1 Syslog Overview 40.2 Syslog Setup 40.3 Syslog Server Setup Cluster Management 41.1 Cluster Management Status Overview 41.2 Cluster Management Status 41.2.1 Cluster Member Switch Management The following table explains some of the FTP parameters Table 137 FTP Upload to Cluster Member Example FTP PARAMETER User Password 41.3 Clustering Management Configuration Chapter 41 Cluster Management Table 138 Management > Cluster Management > Configuration (continued) list. This field is ignored if the Clustering Manager is using Port-based VLAN The following fields relate to the switches that are potential cluster members Candidate MAC Table 42.1 MAC Table Overview 42.2 Viewing the MAC Table Table 139 Management > MAC Table (continued) Select Dynamic to MAC forwarding and click the Transfer button to change all They also display in the Static MAC Forwarding screen Filtering Discard source ARP Table 43.1 ARP Table Overview 43.1.1 How ARP Works 43.2 The ARP Table Screen Configure Clone 44.1 Configure Clone Chapter 44 Configure Clone Table 141 Management > Configure Clone Source Source separated by a comma or a range of ports by using a dash Troubleshooting 45.1Power, Hardware Connections, and LEDs 45.2Switch Access and Login I forgot the IP address for the Switch Make sure your Internet browser does not block Advanced Suggestions I can see the Login screen, but I cannot log in to the Switch 3Disconnect and re-connectthe cord to the Switch 45.3 Switch Configuration Common Services Appendix A Common Services Table 142 Commonly Used Services (continued) Page Page Legal Information CE Mark Warning: Taiwanese BSMI (Bureau of Standards, Metrology and Inspection) A Warning: Notices Viewing Certifications ZyXEL Limited Warranty Note Registration ENGLISH DEUTSCH ESPAÑOL FRANÇAIS ITALIANO Numbers 45 53 159, 162 92 GVRP 98, 103 Page Page Page STP 130, 133 VID 97, 100, 101 100 99 179 180