Default Login Details
Page
About This User's Guide
Document Conventions
Safety Warnings
Page
Contents Overview
Page
Table of Contents
Part I: User’s Guide
Chapter
The Web Configurator
Basic Setting
Configuring Static MAC Forwarding
Configure Multiple Rapid Spanning Tree Protocol
Multiple Rapid Spanning Tree Protocol Status
13.8.1 Multiple Spanning Tree Protocol Port Configuration
Multiple Spanning Tree Protocol Status
Mirroring
Link Aggregation
Port Authentication
Port Security
Classifier
22.1.1 Strictly Priority Queuing
22.1.2 Weighted Fair Queuing
22.1.3 Weighted Round Robin Scheduling (WRR)
23.1.1 VLAN Stacking Example
23.3.1 Frame Format
25.1.1 Local User Accounts
25.1.2 RADIUS and TACACS+
25.2.1 RADIUS Server Setup
25.2.2 TACACS+ Server Setup
25.2.3 AAA Setup
29.1.1 Layer-2Protocol Tunneling Mode
35.1.1 DSCP and Per-HopBehavior
35.1.2 DiffServ Network Example
35.2.1 TRTCM-Color-blindMode
35.2.2 TRTCM-Color-awareMode
35.3.1 Configuring 2-Rate3 Color Marker Settings
38.3.5 Configuring SNMP Trap Group
ARP Table
Appendix
A Common Services
Page
Page
Page
Getting to Know Your Switch
1.1 Introduction
1.1.1 Backbone Application
1.1.2 Bridging Example
1.1.3 High Performance Switching Example
1.1.4 IEEE 802.1Q VLAN Application Examples
1.1.5 IPv6 Support
1.2 Ways to Manage the Switch
1.3Good Habits for Managing the Switch
Hardware Installation and Connection
2.1 Installation Scenarios
2.2Desktop Installation Procedure
2.3Mounting the Switch on a Rack
2.3.1Rack-mountedInstallation Requirements
2.3.2Attaching the Mounting Brackets to the Switch
2.3.3Mounting the Switch on a Rack
Hardware Overview
3.1 Front Panel
3.1.1 Console Port
3.1.2 Ethernet Ports
3.1.3 Transceiver Slots
•Type: SFP connection interface
•Connection speed: 1 Gigabit per second (Gbps) or 1 Megabit per second (Mbps)
3.1.3.1Transceiver Installation
Use the following steps to install a mini-GBICtransceiver (SFP module)
2Press the transceiver firmly until it clicks into place
4Close the transceiver’s latch (latch styles vary)
Figure
3.1.4Power Connector
3.1.5Signal Slot
Door Open
Spring
Sensor
Clip
Connector
3.2 LEDs
Table 2 LED Descriptions (continued)
The Web Configurator
4.1 Introduction
4.2System Login
4.3The Web Configurator Layout
BASIC SETTING
ADVANCED
IP APPLICATION
MANAGEMENT
APPLICATION
The following table describes the links in the navigation panel
Table 4 Navigation Panel Links
LINK
Basic Settings
System Info
Chapter 4 The Web Configurator
Table 4 Navigation Panel Links (continued)
AAA
This link takes you to a screen where you can configure authentication
(Terminal Access Controller Access-ControlSystem Plus)
4.4 Saving Your Configuration
4.5 Switch Lockout
4.6Resetting the Switch
4.6.1 Reload the Configuration File
4.7 Logging Out of the Web Configurator
4.8 Help
Page
Page
Initial Setup Example
5.1 Overview
5.1.1Creating a VLAN
VLAN Group ID
VID
5.1.2Setting Port VID
5.2 Configuring Switch
Management IP Address
1Connect your computer to the Switch’s port which is not in VLAN
Section 4.2 on page
3Click Basic Setting > IP Setup in the navigation panel
in the navigation panel
4Configure the related fields in the IP Setup screen
Tutorials
6.1How to Use DHCP Snooping on the Switch
Control
Tx Tagging
VLAN Port Setting
, activate and specify VLAN 100 as the DHCP VLAN as shown. Click
5 Click the Port link at the top right corner
6The DHCP Snooping Port Configure screen appears
screen appears
Server Trusted state
6.2 How to Use DHCP Relay on the Switch
6.2.1 DHCP Relay Tutorial Introduction
6.2.2 Creating a VLAN
3Click Advanced Application > VLAN > Static VLAN
VLAN Status
6.2.3Configuring DHCP Relay
6.2.4Troubleshooting
6.3How to Use PPPoE IA on the Switch
6.3.1 Configuring Switch A
Intermediate Agent
6.3.2 Configuring Switch B
Trusted
Page
6.4 How to Use Error Disable and Recovery on the Switch
Page
6.5 How to Set Up a Guest VLAN
6.5.1 Creating a Guest VLAN
Basic Setting > Switch Setup
PVID
6.5.2Enabling IEEE 802.1x Port Authentication
6.5.3 Enabling Guest VLAN
6.6How to Do Port Isolation in a VLAN
Internet
6.6.1 Creating a VLAN
Page
6.6.2Creating a Private VLAN Rule
Private VLAN
VLAN ID
Page
Page
Page
System Status and Port Statistics
7.1 Overview
7.2 Port Status Summary
Chapter 7 System Status and Port Statistics
The following table describes the labels in this screen
Table 7 Status
screen (refer to Figure 27 on page 83)
Name
7.2.1 Status: Port Details
Table 8 Status: Port Details (continued)
Status
Section 13.1 on page 122 for more information)
STOP
This field shows if LACP is enabled on this port or not
Chapter 7 System Status and Port Statistics
128 and 255 octets in length
256 and 511 octets in length
512 and 1023 octets in length
1024 and 1518 octets in length
Basic Setting
8.1 Overview
8.2 System Information
Table 9 Basic Setting > System Info
System Name
Product Model
This field displays the model number of the Switch
ZyNOS F/W
8.3 General Setup
8.4 Introduction to VLANs
8.4.1 Smart Isolation
8.5 Switch Setup
Table 11 Basic Setting > Switch Setup (continued)
Aging Time
relearned)
Join
Leave
8.6 IP Setup
8.6.1 Management IP Addresses
Table 12 Basic Setting > IP Setup
Domain Name
use a domain name instead of an IP address
Default Management IP Address
DHCP Client
8.7 Port Setup
Table 13 Basic Setting > Port Setup (continued)
Speed/Duplex
1000M/Full Duplex (Gigabit connections only)
the same in order to connect
Flow Control
VLAN
9.1 Introduction to IEEE 802.1Q Tagged VLANs
9.1.1 Forwarding Tagged and Untagged Frames
9.2 Automatic VLAN Registration
9.2.1 GARP
9.2.2 GVRP
9.3 Port VLAN Trunking
9.4 Select the VLAN Type
9.5 Static VLAN
9.5.1 VLAN Status
9.5.2 VLAN Details
9.5.3 Configure a Static VLAN
9.5.4 Configure VLAN Port Settings
9.6 Subnet Based VLANs
9.7 Configuring Subnet Based VLAN
Figure 40 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN
Check this box to activate this subnet based VLANs on the Switch
DHCP-Vlan
Override
the DHCP VLAN or via another DHCP server on the subnet based VLAN
9.8 Protocol Based VLANs
9.9 Configuring Protocol Based VLAN
9.10 Create an IP-basedVLAN Example
9.11Port-basedVLAN Setup
Filtering
9.11.1 Configure a Port-basedVLAN
Page
Table 21 Advanced Application > VLAN: Port Based VLAN Setup
Setting
Choose All connected or Port isolation
Choose
Wizard
Static MAC Forward Setup
10.1 Overview
10.2 Configuring Static MAC Forwarding
Chapter 10 Static MAC Forward Setup
Table 22 Advanced Application > Static MAC Forwarding
deleting it by clearing this check box
rule
Note: Static MAC addresses do not age out
Static Multicast Forward Setup
11.1 Static Multicast Forwarding Overview
11.2 Configuring Static Multicast Forwarding
to display the configuration screen as shown
Figure 50 Advanced Application > Static Multicast Forwarding
Table 23 Advanced Application > Static Multicast Forwarding
address forwarding rule. This is for identification only
00000001 is 01 and 00000011 is 03 in hexadecimal, so 01:00:5e:00:00:0A and
Table 23 Advanced Application > Static Multicast Forwarding (continued)
specified multicast MAC address will be forwarded
Filtering
12.1 Configure a Filtering Rule
Chapter 12 Filtering
Advanced Application > FIltering (continued)
MAC
Click Clear to clear the fields to the factory defaults
which the MAC address belongs
Spanning Tree Protocol
13.1 STP/RSTP Overview
13.1.1 STP Terminology
13.1.2 How STP Works
13.1.3 STP Port States
13.1.4 Multiple RSTP
13.1.5 Multiple STP
13.1.5.1 MSTP Network Example
Figure 53 STP/RSTP Network Example
13.1.5.2 MST Region
13.1.5.3MST Instance
13.1.5.4 Common and Internal Spanning Tree (CIST)
13.2 Spanning Tree Protocol Status Screen
13.3 Spanning Tree Configuration
13.4 Configure Rapid Spanning Tree Protocol
Table 28 Advanced Application > Spanning Tree Protocol > RSTP
Click Status to display the RSTP Status screen (see Figure 60 on page 130)
Select this check box to activate RSTP. Clear this checkbox to disable RSTP
Note: You must also activate Rapid Spanning Tree in the Advanced Application
Note: You must also activate
13.5 Rapid Spanning Tree Protocol Status
13.6 Configure Multiple Rapid Spanning Tree Protocol
Table 30 Advanced Application > Spanning Tree Protocol > MRSTP (continued)
> Spanning Tree Protocol > Configuration screen to enable MRSTP on the
screen to enable MRSTP on the
Switch
temporary data loops might result. The allowed range is 4 to 30 seconds
13.7 Multiple Rapid Spanning Tree Protocol Status
communicate with the root of the Spanning Tree
13.8 Configure Multiple Spanning Tree Protocol
Table 32 Advanced Application > Spanning Tree Protocol > MSTP
Click Status to display the MSTP Status screen (see Figure 65 on page 139)
on the Switch
Spanning Tree Protocol > Configuration screen to enable MSTP on the Switch
screen to enable MSTP on the Switch
Table 32 Advanced Application > Spanning Tree Protocol > MSTP (continued)
VLAN Range
remove from the VLAN range edit area in the End field
Next click:
• Add - to add this range of VLAN(s) to be mapped to the MST instance
13.8.1 Multiple Spanning Tree Protocol Port Configuration
13.9 Multiple Spanning Tree Protocol Status
This field displays the configuration name for this MST region
This field displays the revision number for this MST region
A configuration digest is generated from the VLAN-MSTImapping information
Digest
displays the digest when MSTP is activated on the system
Bandwidth Control
14.1 Bandwidth Control Overview
14.1.1 CIR and PIR
14.2 Bandwidth Control Setup
Chapter 14 Bandwidth Control
Table 35 Advanced Application > Bandwidth Control (continued)
Broadcast Storm Control
15.1 Broadcast Storm Control Setup
Chapter 15 Broadcast Storm Control
Table 36 Advanced Application > Broadcast Storm Control (continued)
Broadcast (pkt
Multicast (pkt/s)
DLF (pkt/s)
Mirroring
16.1 Port Mirroring Setup
Chapter 16 Mirroring
Advanced Application > Mirroring (continued)
set the common settings and then make adjustments on a port-by-portbasis
Mirrored
Select this option to mirror the traffic on a port
Link Aggregation
17.1 Link Aggregation Overview
17.2 Dynamic Link Aggregation
17.2.1 Link Aggregation ID
17.3 Link Aggregation Status
Table 40 Advanced Application > Link Aggregation Status (continued)
Aggregator ID
enabled for this group
Criteria
trunk
17.4 Link Aggregation Setting
Advanced Application > Link Aggregation > Link Aggregation Setting (continued)
address to make sure port trunking can work properly
Select src-mac to distribute traffic based on the packet’s source MAC address
destination MAC addresses
Select src-ip to distribute traffic based on the packet’s source IP address
17.5 Link Aggregation Control Protocol
17.6 Static Trunking Example
Configure static trunking
Port Authentication
18.1 Port Authentication Overview
18.1.1 IEEE 802.1x Authentication
18.1.2 MAC Authentication
18.2 Port Authentication Configuration
18.2.1 Activate IEEE 802.1x Security
18.2.2 Guest VLAN
Page
18.2.3 Activate MAC Authentication
Table 45 Advanced Application > Port Authentication > MAC Authentication
Select this check box to permit MAC authentication on the Switch
Name Prefix
authentication. You can enter up to 32 printable ASCII characters
RADIUS server
Port Security
19.1 About Port Security
19.2 Port Security Setup
Chapter 19 Port Security
Table 46 Advanced Application > Port Security
Port List
MAC freeze
display in the Static MAC Forwarding screen
Classifier
20.1 About the Classifier and QoS
20.2Configuring the Classifier
Chapter 20 Classifier
Advanced Application > Classifier
Figure 82 Advanced Application > Classifier
Table 47 Advanced Application > Classifier
Select this option to enable this rule
20.3 Viewing and Editing Classifier Configuration
Figure 83 Advanced Application > Classifier: Summary Table
Table 48 Classifier: Summary Table
Table 49 Common Ethernet Types and Protocol Number
ETHERNET TYPE
PROTOCOL NUMBER
20.4 Classifier Example
Policy Rule
21.1 Policy Rules Overview
21.1.1 DiffServ
21.1.2 DSCP and Per-HopBehavior
21.2 Configuring Policy Rules
Chapter 21 Policy Rule
Advanced Applications > Policy Rule
Figure 85 Advanced Application > Policy Rule
Table 51 Advanced Application > Policy Rule
Select this option to enable the policy
Table 51 Advanced Application > Policy Rule (continued)
General
Egress Port
Type the number of an outgoing port
Specify a priority level
21.3 Viewing and Editing Policy Configuration
21.4 Policy Example
Queuing Method
22.1 Queuing Method Overview
22.1.1 Strictly Priority Queuing
22.1.2 Weighted Fair Queuing
22.1.3 Weighted Round Robin Scheduling (WRR)
22.2 Configuring Queuing
Table 53 Advanced Application > Queuing Method
This label shows the port you are configuring
Robin)
get more guaranteed bandwidth than queues with smaller weights
more service than queues with smaller weights
VLAN Stacking
23.1 VLAN Stacking Overview
23.1.1 VLAN Stacking Example
23.2 VLAN Stacking Port Roles
Port
23.3 VLAN Tag Format
23.3.1 Frame Format
23.4 Configuring VLAN Stacking
23.4.1 Port-based Q-in-Q
23.4.2 Selective Q-in-Q
Table 59 Advanced Application > VLAN Stacking > Selective QinQ (continued)
This shows whether this rule is activated or not
This is the descriptive name for this rule
This is the port number to which this rule is applied
This is the customer VLAN ID in the incoming packets
Multicast
24.1 Multicast Overview
24.1.1 IP Multicast Addresses
24.1.2 IGMP Filtering
24.1.3 IGMP Snooping
24.2 Multicast Status
24.3 Multicast Setting
Chapter 24 Multicast
Table 61 Advanced Application > Multicast > Multicast Setting (continued)
Unknown
Multicast Frame
Reserved
Throttling
number of the IGMP groups a port can join is reached
Deny
multicast forwarding table entry is aged out
IGMP report(s) received on this port
24.4 IGMP Snooping VLAN
24.5 IGMP Filtering Profile
24.6 MVR Overview
24.6.1 Types of MVR Ports
24.6.2 MVR Modes
24.6.3 How MVR Works
24.7 General MVR Configuration
Figure 99 Advanced Application > Multicast > Multicast Setting > MVR
Table 64 Advanced Application > Multicast > Multicast Setting > MVR
among different subscriber VLANs on the network
Multicast VLAN
Enter the VLAN ID (1 to 4094) of the multicast VLAN
24.8 MVR Group Configuration
24.8.1 MVR Configuration Example
News
Movie
Multicast VID
Page
AAA
25.1 Authentication, Authorization and Accounting (AAA)
25.1.1 Local User Accounts
25.1.2 RADIUS and TACACS+
25.2 AAA Screens
25.2.1 RADIUS Server Setup
RADIUS Server Setup
Figure 107 Advanced Application > AAA > RADIUS Server Setup
Table 67 Advanced Application > AAA > RADIUS Server Setup
Use this section to configure your RADIUS authentication settings
This field only applies if you configure multiple RADIUS servers
Table 67 Advanced Application > AAA > RADIUS Server Setup (continued)
Shared Secret
be the same on the external RADIUS server and the Switch
entry is deleted when you click Apply
Accounting
25.2.2 TACACS+ Server Setup
Table 68 Advanced Application > AAA > TACACS+ Server Setup (continued)
TCP Port
must be the same on the external TACACS+ server and the Switch
Use this section to configure your TACACS+ accounting settings
This is a read-onlynumber representing a TACACS+ accounting server entry
25.2.3 AAA Setup
Table 69 Advanced Application > AAA > AAA Setup (continued)
Login
authenticate administrator accounts (users for Switch management)
up the corresponding database correctly first
Method 2 and Method 3 fields
25.2.4 Vendor Specific Attribute
25.2.5 Tunnel Protocol Attribute
25.3 Supported RADIUS Attributes
25.3.1 Attributes Used for Authentication
25.3.2Attributes Used for Accounting
25.3.2.1 Attributes Used for Accounting System Events
Acct-Status-Type
Acct-Session-ID
date+time+8-digit
sequential number
25.3.2.3 Attributes Used for Accounting IEEE 802.1x Events
Table 74 RADIUS Attributes - Exec Events via Console
IP Source Guard
26.1 IP Source Guard Overview
26.1.1 DHCP Snooping Overview
26.1.1.2DHCP Snooping Database
26.1.2ARP Inspection Overview
•It pretends to be computer A and responds to computer B
•It pretends to be computer B and sends a message to computer A
26.1.2.1 ARP Inspection and MAC Address Filters
Chapter 12 on page
•They are stored only in volatile memory
•They do not use the same space in memory that regular MAC address filters use
They appear only in the
26.2 IP Source Guard
26.3 IP Source Guard Static Binding
Advanced Application > IP Source Guard > Static Binding
Figure 113 IP Source Guard Static Binding
Table 76 IP Source Guard Static Binding
Enter the source MAC address in the binding
Enter the IP address assigned to the MAC address in the binding
26.4 DHCP Snooping
Chapter 26 IP Source Guard
Table 77 DHCP Snooping (continued)
Write delay timer
update in the DHCP snooping database before it gives up
Abort timer
26.5 DHCP Snooping Configure
Advanced Application > IP Source Guard > DHCP Snooping > Configure
Figure 115 DHCP Snooping Configure
Table 78 DHCP Snooping Configure
snooping on specific VLAN and specify trusted ports
no trusted ports
26.5.1 DHCP Snooping Port Configure
26.5.2 DHCP Snooping VLAN Configure
26.6 ARP Inspection Status
26.6.1 ARP Inspection VLAN Status
26.6.2 ARP Inspection Log Status
26.7 ARP Inspection Configure
26.7.1 ARP Inspection Port Configure
open this screen, click
Figure 122 ARP Inspection Port Configure
Table 85 ARP Inspection Port Configure
Trusted State
The Switch does not discard ARP packets on trusted ports for any reason
26.7.2 ARP Inspection VLAN Configure
Loop Guard
27.1 Loop Guard Overview
Page
27.2 Loop Guard Setup
Advanced Application > Loop Guard (continued)
VLAN Mapping
28.1 VLAN Mapping Overview
28.1.1 VLAN Mapping Example
28.2 Enabling VLAN Mapping
28.3 Configuring VLAN Mapping
Page
Layer 2 Protocol Tunneling
29.1 Layer 2 Protocol Tunneling Overview
29.1.1 Layer-2Protocol Tunneling Mode
29.2 Configuring Layer 2 Protocol Tunneling
Table 90 Advanced Application > Layer 2 Protocol Tunneling (continued)
STP
based on bridge information from all (local and remote) networks
VTP
Point to Point
sFlow
30.1 sFlow Overview
30.2 sFlow Port Configuration
30.2.1 sFlow Collector Configuration
Advanced Application > sFlow > Collector (continued)
PPPoE
31.1 PPPoE Intermediate Agent Overview
31.1.1 PPPoE Intermediate Agent Tag Format
31.1.2 Sub-OptionFormat
31.1.3 Port State
31.2The PPPoE Screen
31.3 PPPoE Intermediate Agent
Figure 139 Advanced Application > PPPoE > Intermediate Agent
Table 98 Advanced Application > PPPoE > Intermediate Agent
access-node
identifier
spaces are also allowed. The default is the Switch’s host name
31.3.1 PPPoE IA Per-Port
31.3.2 PPPoE IA Per-Port Per-VLAN
Intermediate Agent > Port
Table 100 Advanced Application > PPPoE > Intermediate Agent > Port > VLAN
Show Port
VLAN(s) on the port
Enter the lowest VLAN ID you want to configure in the section below
31.3.3 PPPoE IA for VLAN
Error Disable
32.1 CPU Protection Overview
32.2 Error-DisableRecovery Overview
32.3 The Error Disable Screen
32.4 CPU Protection Configuration
32.5 Error-DisableDetect Configuration
32.6 Error-DisableRecovery Configuration
Table 104 Advanced Application > Errdisable > Errdisable Recovery (continued)
Timer Status
this rule
Interval
Enter the number of seconds (from 30 to 2592000) for the time interval
Private VLAN
33.1 Private VLAN Overview
33.2 Configuring Private VLAN
Page
Static Route
34.1 Static Routing Overview
34.2 Configuring Static Routing
Table 106 IP Application > Static Routing (continued)
Differentiated Services
35.1 DiffServ Overview
35.1.1 DSCP and Per-HopBehavior
35.1.2 DiffServ Network Example
P - Platinum
35.2 Two Rate Three Color Marker Traffic Policing
35.2.1 TRTCM-Color-blindMode
35.2.2 TRTCM-Color-awareMode
35.3 Activating DiffServ
35.3.1 Configuring 2-Rate3 Color Marker Settings
Note: You cannot enable both TRTCM and Bandwidth Control at the same time
Figure 156 IP Application > DiffServ > 2-rate3 Color Marker
Table 108 IP Application > DiffServ > 2-rate3 Color Marker
and marks the packets based on the TRTCM settings
DiffServ
35.3.2 Configuring DSCP Profiles
35.4 DSCP-to-IEEE802.1p Priority Settings
35.4.1 Configuring DSCP Settings
Table 111 IP Application > DiffServ > DSCP Setting
0 …
This is the DSCP classification identification number
DHCP
36.1 DHCP Overview
36.1.1 DHCP Modes
36.1.2 DHCP Configuration Options
36.2DHCP Status
36.3DHCP Relay
36.3.1 DHCP Relay Agent Information
36.3.2 Configuring DHCP Global Relay
36.3.3 Global DHCP Relay Configuration Example
36.4 Configuring DHCP VLAN Settings
36.4.1 Example: DHCP Relay for Two VLANs
Page
Maintenance
37.1 The Maintenance Screen
37.2 Load Factory Default
37.3Save Configuration
37.4 Reboot System
37.5Firmware Upgrade
37.6 Restore a Configuration File
37.7 Backup a Configuration File
37.8 FTP Command Line
37.8.1 Filename Conventions
37.8.2 FTP Command Line Procedure
37.8.3GUI-basedFTP Clients
37.8.4 FTP Restrictions
Remote Management
Access Control
38.1 Access Control Overview
38.2 The Access Control Main Screen
38.3 About SNMP
38.3.1 SNMP v3 and Security
38.3.2 Supported MIBs
38.3.3SNMP Traps
Table 120 SNMP System Traps (continued)
Table 121 SNMP Interface Traps
SNMP Interface Traps (continued)
AAA Traps
Table 123 SNMP IP Traps
Table 124 SNMP Switch Traps
38.3.4 Configuring SNMP
38.3.5 Configuring SNMP Trap Group
38.3.6 Configuring SNMP User
38.4 Setting Up Login Accounts
Click Management > Access Control > Logins to view the screen as shown next
Figure 177 Management > Access Control > Logins
Table 128 Management > Access Control > Logins
LABELDESCRIPTION
38.5 SSH Overview
38.6 How SSH works
38.7 SSH Implementation on the Switch
38.7.1 Requirements for Using SSH
38.8 Introduction to HTTPS
HTTP
Service Access Control
38.9 HTTPS Example
38.9.1 Internet Explorer Warning Messages
38.9.1.2 Internet Explorer 7 or
Continue to this website (not recommended)
Certificate Error
View certificates
Install Certificate
38.9.2 Mozilla Firefox Warning Messages
38.9.3 The Main Screen
38.10 Service Port Access Control
38.11 Remote Management
Access Control
Figure 189 Management > Access Control > Remote Management
Table 130 Management > Access Control > Remote Management
Entry
computers” from which an administrator may use a service to manage the Switch
Diagnostic
39.1 Diagnostic
Syslog
40.1 Syslog Overview
40.2 Syslog Setup
40.3 Syslog Server Setup
Cluster Management
41.1 Cluster Management Status Overview
41.2 Cluster Management Status
41.2.1 Cluster Member Switch Management
The following table explains some of the FTP parameters
Table 137 FTP Upload to Cluster Member Example
FTP PARAMETER
User
Password
41.3 Clustering Management Configuration
Chapter 41 Cluster Management
Table 138 Management > Cluster Management > Configuration (continued)
list. This field is ignored if the Clustering Manager is using Port-based VLAN
The following fields relate to the switches that are potential cluster members
Candidate
MAC Table
42.1 MAC Table Overview
42.2 Viewing the MAC Table
Table 139 Management > MAC Table (continued)
Select Dynamic to MAC forwarding and click the Transfer button to change all
They also display in the Static MAC Forwarding screen
Filtering
Discard source
ARP Table
43.1 ARP Table Overview
43.1.1 How ARP Works
43.2 The ARP Table Screen
Configure Clone
44.1 Configure Clone
Chapter 44 Configure Clone
Table 141 Management > Configure Clone
Source
Source
separated by a comma or a range of ports by using a dash
Troubleshooting
45.1Power, Hardware Connections, and LEDs
45.2Switch Access and Login
I forgot the IP address for the Switch
Make sure your Internet browser does not block
Advanced Suggestions
I can see the Login screen, but I cannot log in to the Switch
3Disconnect and re-connectthe cord to the Switch
45.3 Switch Configuration
Common Services
Appendix A Common Services
Table 142 Commonly Used Services (continued)
Page
Page
Legal Information
CE Mark Warning:
Taiwanese BSMI (Bureau of Standards, Metrology and Inspection) A Warning:
Notices
Viewing Certifications
ZyXEL Limited Warranty
Note
Registration
ENGLISH
DEUTSCH
ESPAÑOL
FRANÇAIS
ITALIANO
Numbers
45
53
159, 162
92
GVRP 98, 103
Page
Page
Page
STP 130, 133
VID 97, 100, 101
100
99
179
180