Zyxel MES-3728 specifications

MES-3728
Layer 2+ Managed Ethernet Switch

User’s Guide

Version 3.80 2/2008 Edition 1
IP Address http://192.168.1.1
User Name admin
Password 1234
www.zyxel.com

About This User's Guide

About This User's Guide
Intended Audience
This manual is intended for people who want to configure the Switch using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology.
Related Documentation
• Command Line Interface (CLI) Reference Guide Line commands offer an alternative to the web configurator and in some cases are
necessary to configure advanced features.
• Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary
information.
" It is recommended you use the web configurator to configure the Switch.
• Supporting Disk Refer to the included CD for support documents.
• ZyXEL Web Site Please refer to www.zyxel.com
certifications.
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
for additional support documentation and product
MES-3728 User’s Guide
3

Document Conventions

Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The MES-3728 may be referred to as the “Switch”, the “device”, the “system” or the “product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key. “Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example, Maintenance > Log > Log Setting means you first click Maintenance in the navigation panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
MES-3728 User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The Switch icon is not an exact representation of your device.
The Switch Computer Notebook computer
Server DSLAM Firewall
Telephone Router
MES-3728 User’s Guide
5

Safety Warnings

Safety Warnings
1 For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
• Do not obstruct the device ventillation slots as insufficient airflow may harm your device.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
• Use ONLY power wires of the appropriate wire gauge (see Chapter 38 on page 299 for details) for your device. Connect it to a power supply of the correct voltage (see Chapter
38 on page 299 for details).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
• If the power adaptor or cord is damaged, remove it from the device and the power source.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
• Fuse Warning! Replace a fuse only with a fuse of the same type and rating.
• The length of exposed (bare) power wire should not exceed 7 mm.
6
This product is recyclable. Dispose of it properly.
MES-3728 User’s Guide
Safety Warnings
MES-3728 User’s Guide
7
Safety Warnings
8
MES-3728 User’s Guide

Contents Overview

Contents Overview
Introduction and Hardware ...................................................................................................31
Getting to Know Your Switch ..................................................................................................... 33
Hardware Installation and Connection ....................................................................................... 39
Hardware Overview ................................................................................................................... 43
Basic Configuration ...............................................................................................................53
The Web Configurator ............................................................................................................... 55
Initial Setup Example ................................................................................................................. 65
System Status and Port Statistics ..............................................................................................69
Basic Setting ............................................................................................................................. 75
Advanced ................................................................................................................................87
VLAN ......................................................................................................................................... 89
Static MAC Forward Setup ...................................................................................................... 107
Filtering .................................................................................................................................... 109
Spanning Tree Protocol ............................................................................................................111
Bandwidth Control ................................................................................................................... 129
Broadcast Storm Control ......................................................................................................... 131
Mirroring .................................................................................................................................. 133
Link Aggregation ...................................................................................................................... 135
Port Authentication .................................................................................................................. 143
Port Security ............................................................................................................................ 149
Classifier .................................................................................................................................. 153
Policy Rule .............................................................................................................................. 159
Queuing Method ...................................................................................................................... 165
VLAN Stacking ......................................................................................................................... 169
Multicast .................................................................................................................................. 175
Authentication & Accounting ....................................................................................................189
IP Source Guard ...................................................................................................................... 203
Loop Guard .............................................................................................................................. 223
IP Application ....................................................................................................................... 227
Static Route ............................................................................................................................. 229
Differentiated Services ............................................................................................................. 233
DHCP ...................................................................................................................................... 241
MES-3728 User’s Guide
9
Contents Overview
Management .........................................................................................................................249
Maintenance ............................................................................................................................ 251
Access Control ........................................................................................................................ 257
Diagnostic ................................................................................................................................ 275
Syslog ...................................................................................................................................... 277
Cluster Management ............................................................................................................... 281
MAC Table ............................................................................................................................... 287
ARP Table ................................................................................................................................ 289
Configure Clone ....................................................................................................................... 291
Troubleshooting & Product Specifications .......................................................................293
Troubleshooting ....................................................................................................................... 295
Product Specifications ............................................................................................................. 299
Appendices and Index ......................................................................................................... 305
10
MES-3728 User’s Guide

Table of Contents

Table of Contents
About This User's Guide ..........................................................................................................3
Document Conventions............................................................................................................4
Safety Warnings........................................................................................................................6
Contents Overview ...................................................................................................................9
Table of Contents....................................................................................................................11
List of Figures .........................................................................................................................21
List of Tables...........................................................................................................................27
Part I: Introduction and Hardware ........................................................ 31
Chapter 1
Getting to Know Your Switch.................................................................................................33
1.1 Introduction .......................................................................................................................... 33
1.1.1 Backbone Application ................................................................................................. 33
1.1.2 Bridging Example ....................................................................................................... 34
1.1.3 High Performance Switching Example ....................................................................... 34
1.1.4 IEEE 802.1Q VLAN Application Examples ................................................................ 35
1.1.5 Metro Ethernet ...........................................................................................................36
1.2 Ways to Manage the Switch ................................................................................................ 37
1.3 Good Habits for Managing the Switch ................................................................................. 37
Chapter 2
Hardware Installation and Connection .................................................................................39
2.1 Installation Scenarios .......................................................................................................... 39
2.2 Desktop Installation Procedure ........................................................................................... 39
2.3 Mounting the Switch on a Rack .......................................................................................... 40
2.3.1 Rack-mounted Installation Requirements .................................................................. 40
2.3.2 Attaching the Mounting Brackets to the Switch .......................................................... 40
2.3.3 Mounting the Switch on a Rack .................................................................................. 41
Chapter 3
Hardware Overview.................................................................................................................43
3.1 Front Panel ......................................................................................................................... 43
MES-3728 User’s Guide
11
Table of Contents
3.1.1 Console Port .............................................................................................................. 44
3.1.2 Gigabit Ethernet Ports ............................................................................................... 45
3.1.3 Mini-GBIC Slots ..........................................................................................................45
3.1.4 Management Port ....................................................................................................... 47
3.1.5 Power Connector ....................................................................................................... 47
3.1.6 ALARM Slot ................................................................................................................ 48
3.2 Rear Panel ........................................................................................................................... 50
3.2.1 External Backup Power Supply Connector ................................................................ 50
3.3 LEDs ................................................................................................................................... 50
Part II: Basic Configuration................................................................... 53
Chapter 4
The Web Configurator ............................................................................................................55
4.1 Introduction .......................................................................................................................... 55
4.2 System Login .................................................................................................................... 55
4.3 The Status Screen .......................................................................................................... 56
4.3.1 Change Your Password .......................................................................................... 61
4.4 Saving Your Configuration ................................................................................................... 61
4.5 Switch Lockout .................................................................................................................. 62
4.6 Resetting the Switch ......................................................................................................... 62
4.6.1 Reload the Configuration File .................................................................................... 62
4.7 Logging Out of the Web Configurator ................................................................................. 63
4.8 Help .................................................................................................................................... 63
Chapter 5
Initial Setup Example..............................................................................................................65
5.1 Overview .............................................................................................................................. 65
5.1.1 Creating a VLAN ........................................................................................................ 65
5.1.2 Setting Port VID .........................................................................................................66
5.2 Configuring Switch Management IP Address ...................................................................... 67
Chapter 6
System Status and Port Statistics......................................................................................... 69
6.1 Overview .............................................................................................................................. 69
6.2 Port Status Summary ...................................................................................................... 69
6.2.1 Status: Port Details ................................................................................................70
Chapter 7
Basic Setting ..........................................................................................................................75
7.1 Overview .............................................................................................................................. 75
12
MES-3728 User’s Guide
Table of Contents
7.2 System Information ........................................................................................................... 75
7.3 General Setup ................................................................................................................. 76
7.4 Introduction to VLANs ......................................................................................................... 78
7.5 Switch Setup Screen ........................................................................................................ 79
7.6 IP Setup .............................................................................................................................. 81
7.6.1 Management IP Addresses ........................................................................................ 81
7.7 Port Setup ........................................................................................................................... 83
Part III: Advanced................................................................................... 87
Chapter 8
VLAN ........................................................................................................................................89
8.1 Introduction to IEEE 802.1Q Tagged VLANs .................................................................. 89
8.1.1 Forwarding Tagged and Untagged Frames ................................................................ 89
8.2 Automatic VLAN Registration ............................................................................................. 90
8.2.1 GARP ......................................................................................................................... 90
8.2.2 GVRP ......................................................................................................................... 90
8.3 Port VLAN Trunking ............................................................................................................ 91
8.4 Select the VLAN Type ........................................................................................................ 91
8.5 Static VLAN ......................................................................................................................... 91
8.5.1 Static VLAN Status .................................................................................................... 92
8.5.2 VLAN Details ............................................................................................................. 92
8.5.3 Configure a Static VLAN ........................................................................................ 93
8.5.4 Configure VLAN Port Settings ................................................................................ 94
8.6 Subnet Based VLANs ......................................................................................................... 96
8.7 Configuring Subnet Based VLAN ...................................................................................... 97
8.8 Protocol Based VLANs ....................................................................................................... 98
8.9 Configuring Protocol Based VLAN .................................................................................... 99
8.10 Create an IP-based VLAN Example ................................................................................ 101
8.11 Port-based VLAN Setup .............................................................................................. 102
8.11.1 Configure a Port-based VLAN ............................................................................... 102
Chapter 9
Static MAC Forward Setup...................................................................................................107
9.1 Overview ............................................................................................................................ 107
9.2 Configuring Static MAC Forwarding ............................................................................. 107
Chapter 10
Filtering..................................................................................................................................109
10.1 Configure a Filtering Rule .............................................................................................109
MES-3728 User’s Guide
13
Table of Contents
Chapter 11
Spanning Tree Protocol........................................................................................................ 111
11.1 STP/RSTP Overview ....................................................................................................... 111
11.1.1 STP Terminology ....................................................................................................111
11.1.2 How STP Works .....................................................................................................112
11.1.3 STP Port States ......................................................................................................113
11.1.4 Multiple RSTP ........................................................................................................113
11.1.5 Multiple STP ............................................................................................................114
11.2 Spanning Tree Protocol Status Screen .............................................................................116
11.3 Spanning Tree Configuration ...........................................................................................117
11.4 Configure Rapid Spanning Tree Protocol ......................................................................118
11.5 Rapid Spanning Tree Protocol Status .........................................................................119
11.6 Configure Multiple Rapid Spanning Tree Protocol ........................................................ 121
11.7 Multiple Rapid Spanning Tree Protocol Status ........................................................... 122
11.8 Configure Multiple Spanning Tree Protocol .................................................................. 124
11.9 Multiple Spanning Tree Protocol Status ..................................................................... 126
Chapter 12
Bandwidth Control................................................................................................................129
12.1 Bandwidth Control Overview .......................................................................................... 129
12.1.1 CIR and PIR ........................................................................................................... 129
12.2 Bandwidth Control Setup ................................................................................................. 129
Chapter 13
Broadcast Storm Control .....................................................................................................131
13.1 Broadcast Storm Control Setup ...................................................................................... 131
Chapter 14
Mirroring ................................................................................................................................133
14.1 Port Mirroring Setup ....................................................................................................... 133
Chapter 15
Link Aggregation ..................................................................................................................135
15.1 Link Aggregation Overview ............................................................................................. 135
15.2 Dynamic Link Aggregation .............................................................................................. 135
15.2.1 Link Aggregation ID ............................................................................................... 136
15.3 Link Aggregation Status ..................................................................................................136
15.4 Link Aggregation Setting ................................................................................................ 137
15.5 Link Aggregation Control Protocol ................................................................................ 138
15.6 Static Trunking Example .................................................................................................. 140
Chapter 16
Port Authentication...............................................................................................................143
14
MES-3728 User’s Guide
Table of Contents
16.1 Port Authentication Overview ......................................................................................... 143
16.1.1 IEEE 802.1x Authentication ................................................................................... 143
16.1.2 MAC Authentication ............................................................................................... 144
16.2 Port Authentication Configuration .................................................................................... 145
16.2.1 Activate IEEE 802.1x Security ........................................................................... 145
16.2.2 Activate MAC Authentication ................................................................................. 146
Chapter 17
Port Security..........................................................................................................................149
17.1 About Port Security ......................................................................................................... 149
17.2 Port Security Setup .......................................................................................................... 149
Chapter 18
Classifier................................................................................................................................153
18.1 About the Classifier and QoS .......................................................................................... 153
18.2 Configuring the Classifier ...............................................................................................153
18.3 Viewing and Editing Classifier Configuration ................................................................... 156
18.4 Classifier Example ........................................................................................................... 157
Chapter 19
Policy Rule............................................................................................................................159
19.1 Policy Rules Overview ....................................................................................................159
19.1.1 DiffServ .................................................................................................................. 159
19.1.2 DSCP and Per-Hop Behavior ................................................................................. 159
19.2 Configuring Policy Rules ................................................................................................. 160
19.3 Viewing and Editing Policy Configuration ........................................................................ 162
19.4 Policy Example ................................................................................................................ 162
Chapter 20
Queuing Method....................................................................................................................165
20.1 Queuing Method Overview ............................................................................................. 165
20.1.1 Strictly Priority Queuing .......................................................................................... 165
20.1.2 Weighted Fair Queuing .......................................................................................... 165
20.1.3 Weighted Round Robin Scheduling (WRR) ........................................................... 166
20.2 Configuring Queuing ........................................................................................................ 166
Chapter 21
VLAN Stacking ......................................................................................................................169
21.1 VLAN Stacking Overview ................................................................................................ 169
21.1.1 VLAN Stacking Example ........................................................................................ 169
21.2 VLAN Stacking Port Roles ............................................................................................... 170
21.3 VLAN Tag Format ............................................................................................................ 171
21.3.1 Frame Format ........................................................................................................ 171
MES-3728 User’s Guide
15
Table of Contents
21.4 Configuring VLAN Stacking ............................................................................................. 172
Chapter 22
Multicast ................................................................................................................................175
22.1 Multicast Overview ......................................................................................................... 175
22.1.1 IP Multicast Addresses ........................................................................................... 175
22.1.2 IGMP Filtering ........................................................................................................ 175
22.1.3 IGMP Snooping ..................................................................................................... 175
22.1.4 IGMP Snooping and VLANs ................................................................................... 176
22.2 Multicast Status .............................................................................................................. 176
22.3 Multicast Setting ............................................................................................................. 176
22.4 IGMP Snooping VLAN .................................................................................................... 178
22.5 IGMP Filtering Profile ..................................................................................................... 180
22.6 MVR Overview ................................................................................................................ 181
22.6.1 Types of MVR Ports ............................................................................................... 181
22.6.2 MVR Modes ........................................................................................................... 182
22.6.3 How MVR Works .................................................................................................... 182
22.7 General MVR Configuration ............................................................................................ 182
22.8 MVR Group Configuration .............................................................................................. 184
22.8.1 MVR Configuration Example .................................................................................. 185
Chapter 23
Authentication & Accounting ..............................................................................................189
23.1 Authentication, Authorization and Accounting ................................................................ 189
23.1.1 Local User Accounts .............................................................................................. 189
23.1.2 RADIUS and TACACS+ ........................................................................................ 190
23.2 Authentication and Accounting Screens .......................................................................... 190
23.2.1 RADIUS Server Setup ........................................................................................ 190
23.2.2 TACACS+ Server Setup ..................................................................................... 192
23.2.3 Authentication and Accounting Setup ................................................................ 194
23.2.4 Vendor Specific Attribute ........................................................................................ 197
23.3 Supported RADIUS Attributes ......................................................................................... 198
23.3.1 Attributes Used for Authentication .......................................................................... 199
23.3.2 Attributes Used for Accounting ............................................................................... 199
Chapter 24
IP Source Guard....................................................................................................................203
24.1 IP Source Guard Overview .............................................................................................. 203
24.1.1 DHCP Snooping Overview ..................................................................................... 203
24.1.2 ARP Inspection Overview ...................................................................................... 205
24.2 IP Source Guard .............................................................................................................. 207
24.3 IP Source Guard Static Binding ....................................................................................... 207
24.4 DHCP Snooping .............................................................................................................. 209
16
MES-3728 User’s Guide
Table of Contents
24.5 DHCP Snooping Configure .............................................................................................. 212
24.5.1 DHCP Snooping Port Configure ............................................................................. 213
24.5.2 DHCP Snooping VLAN Configure .......................................................................... 215
24.6 ARP Inspection Status .....................................................................................................216
24.6.1 ARP Inspection VLAN Status ................................................................................. 216
24.6.2 ARP Inspection Log Status .................................................................................... 217
24.7 ARP Inspection Configure ............................................................................................... 219
24.7.1 ARP Inspection Port Configure .............................................................................. 220
24.7.2 ARP Inspection VLAN Configure ........................................................................... 221
Chapter 25
Loop Guard............................................................................................................................223
25.1 Loop Guard Overview ..................................................................................................... 223
25.2 Loop Guard Setup ........................................................................................................... 225
Part IV: IP Application.......................................................................... 227
Chapter 26
Static Route ........................................................................................................................... 229
26.1 Static Routing Overview .................................................................................................. 229
26.2 Configuring Static Routing ............................................................................................... 229
Chapter 27
Differentiated Services.........................................................................................................233
27.1 DiffServ Overview ........................................................................................................... 233
27.1.1 DSCP and Per-Hop Behavior ................................................................................ 233
27.1.2 DiffServ Network Example .................................................................................... 234
27.2 Two Rate Three Color Marker Traffic Policing ................................................................. 234
27.2.1 TRTCM-Color-blind Mode ...................................................................................... 235
27.2.2 TRTCM-Color-aware Mode .................................................................................... 235
27.3 Activating DiffServ .......................................................................................................... 236
27.3.1 Configuring 2-Rate 3 Color Marker Settings ......................................................... 236
27.4 DSCP-to-IEEE 802.1p Priority Settings ...................................................................... 238
27.4.1 Configuring DSCP Settings .................................................................................... 238
Chapter 28
DHCP......................................................................................................................................241
28.1 DHCP Overview ............................................................................................................. 241
28.1.1 DHCP Modes ........................................................................................................ 241
28.1.2 DHCP Configuration Options ................................................................................. 241
28.2 DHCP Status ................................................................................................................... 241
MES-3728 User’s Guide
17
Table of Contents
28.3 DHCP Relay ................................................................................................................... 242
28.3.1 DHCP Relay Agent Information ............................................................................. 242
28.3.2 Configuring DHCP Global Relay ............................................................................ 243
28.3.3 Global DHCP Relay Configuration Example .......................................................... 244
28.4 Configuring DHCP VLAN Settings ................................................................................ 245
28.4.1 Example: DHCP Relay for Two VLANs .................................................................. 246
Part V: Management............................................................................. 249
Chapter 29
Maintenance ..........................................................................................................................251
29.1 The Maintenance Screen .............................................................................................. 251
29.2 Load Factory Default ...................................................................................................... 252
29.3 Save Configuration .......................................................................................................... 252
29.4 Reboot System ................................................................................................................ 253
29.5 Firmware Upgrade ........................................................................................................ 253
29.6 Restore a Configuration File ......................................................................................... 254
29.7 Backup a Configuration File ......................................................................................... 254
29.8 FTP Command Line ........................................................................................................ 255
29.8.1 Filename Conventions .......................................................................................... 255
29.8.2 FTP Command Line Procedure ............................................................................ 256
29.8.3 GUI-based FTP Clients .......................................................................................... 256
29.8.4 FTP Restrictions .................................................................................................... 256
Chapter 30
Access Control......................................................................................................................257
30.1 Access Control Overview ............................................................................................ 257
30.2 The Access Control Main Screen .................................................................................... 257
30.3 About SNMP .................................................................................................................. 258
30.3.1 SNMP v3 and Security ........................................................................................... 259
30.3.2 Supported MIBs .................................................................................................... 259
30.3.3 SNMP Traps .......................................................................................................... 259
30.3.4 Configuring SNMP ................................................................................................ 262
30.3.5 Configuring SNMP Trap Group ........................................................................... 264
30.3.6 Setting Up Login Accounts ................................................................................. 265
30.4 SSH Overview ................................................................................................................. 267
30.5 How SSH works ............................................................................................................... 267
30.6 SSH Implementation on the Switch ................................................................................. 268
30.6.1 Requirements for Using SSH ................................................................................. 268
30.7 Introduction to HTTPS .....................................................................................................268
30.8 HTTPS Example .............................................................................................................. 269
18
MES-3728 User’s Guide
Table of Contents
30.8.1 Internet Explorer Warning Messages ..................................................................... 269
30.8.2 Netscape Navigator Warning Messages ................................................................ 270
30.8.3 The Main Screen .................................................................................................... 270
30.9 Service Port Access Control ......................................................................................... 271
30.10 Remote Management ............................................................................................... 272
Chapter 31
Diagnostic..............................................................................................................................275
31.1 Diagnostic ....................................................................................................................... 275
Chapter 32
Syslog ....................................................................................................................................277
32.1 Syslog Overview .............................................................................................................. 277
32.2 Syslog Setup .................................................................................................................. 277
32.3 Syslog Server Setup ....................................................................................................... 278
Chapter 33
Cluster Management.............................................................................................................281
33.1 Cluster Management Status Overview ........................................................................... 281
33.2 Cluster Management Status ........................................................................................... 282
33.2.1 Cluster Member Switch Management ................................................................... 283
33.3 Clustering Management Configuration .......................................................................... 284
Chapter 34
MAC Table..............................................................................................................................287
34.1 MAC Table Overview ...................................................................................................... 287
34.2 Viewing the MAC Table ................................................................................................... 288
Chapter 35
ARP Table ..............................................................................................................................289
35.1 ARP Table Overview .......................................................................................................289
35.1.1 How ARP Works .................................................................................................... 289
35.2 Viewing the ARP Table ................................................................................................... 289
Chapter 36
Configure Clone....................................................................................................................291
36.1 Configure Clone .............................................................................................................. 291
Part VI: Troubleshooting & Product Specifications.......................... 293
Chapter 37
Troubleshooting....................................................................................................................295
MES-3728 User’s Guide
19
Table of Contents
37.1 Power, Hardware Connections, and LEDs ...................................................................... 295
37.2 Switch Access and Login ................................................................................................. 296
Chapter 38
Product Specifications.........................................................................................................299
Part VII: Appendices and Index .......................................................... 305
Appendix A Changing a Fuse ..............................................................................................307
Appendix B Common Services............................................................................................. 309
Appendix C Legal Information ..............................................................................................313
Appendix D Customer Support............................................................................................. 317
Index.......................................................................................................................................323
20
MES-3728 User’s Guide

List of Figures

List of Figures
Figure 1 Backbone Application .............................................................................................................. 34
Figure 2 Bridging Application ................................................................................................................ 34
Figure 3 High Performance Switched Workgroup Application ............................................................... 35
Figure 4 Shared Server Using VLAN Example ...................................................................................... 36
Figure 5 Metro Ethernet .......................................................................................................................... 36
Figure 6 Attaching Rubber Feet ............................................................................................................. 40
Figure 7 Attaching the Mounting Brackets ............................................................................................. 41
Figure 8 Mounting the Switch on a Rack ............................................................................................... 41
Figure 9 Front Panel: AC/DC Model ....................................................................................................... 43
Figure 10 Front Panel: AC Model ........................................................................................................... 43
Figure 11 Front Panel: DC Model ........................................................................................................... 44
Figure 12 Transceiver Installation Example ........................................................................................... 46
Figure 13 Connecting the Fiber Optic Cables ....................................................................................... 46
Figure 14 Removing the Fiber Optic Cables ......................................................................................... 47
Figure 15 Opening the Transceiver’s Latch Example ............................................................................ 47
Figure 16 Transceiver Removal Example .............................................................................................. 47
Figure 17 Connecting Sensors to the ALARM connector ...................................................................... 48
Figure 18 Connecting a Sensor to the ALARM Slot .............................................................................. 49
Figure 19 Daisy-chaining an External Alarm Sensor to Other Switches of the Same Model ................. 49
Figure 20 Rear Panel ............................................................................................................................. 50
Figure 21 Web Configurator: Login ....................................................................................................... 56
Figure 22 Web Configurator Home Screen (Status) .............................................................................. 56
Figure 23 Change Administrator Login Password .................................................................................61
Figure 24 Resetting the Switch: Via the Console Port ........................................................................... 63
Figure 25 Web Configurator: Logout Screen ......................................................................................... 63
Figure 26 Initial Setup Network Example: VLAN ................................................................................... 65
Figure 27 Initial Setup Network Example: Port VID ............................................................................... 67
Figure 28 Initial Setup Example: Management IP Address ................................................................... 68
Figure 29 Status .................................................................................................................................... 69
Figure 30 Status > Port Details ............................................................................................................... 71
Figure 31 Basic Setting > System Info .................................................................................................. 75
Figure 32 Basic Setting > General Setup .............................................................................................. 77
Figure 33 Basic Setting > Switch Setup ................................................................................................ 79
Figure 34 Basic Setting > IP Setup ......................................................................................................... 81
Figure 35 Basic Setting > Port Setup .................................................................................................... 83
Figure 36 Port VLAN Trunking ............................................................................................................... 91
Figure 37 Switch Setup > Select VLAN Type ........................................................................................ 91
Figure 38 Advanced Application > VLAN: VLAN Status ......................................................................... 92
MES-3728 User’s Guide
21
List of Figures
Figure 39 Advanced Application > VLAN > VLAN Detail ........................................................................ 92
Figure 40 Advanced Application > VLAN > Static VLAN ...................................................................... 93
Figure 41 Advanced Application > VLAN > VLAN Port Setting ............................................................. 95
Figure 42 Subnet Based VLAN Application Example ............................................................................ 96
Figure 43 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................ 97
Figure 44 Protocol Based VLAN Application Example .......................................................................... 99
Figure 45 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN .................... 100
Figure 46 Protocol Based VLAN Configuration Example .................................................................... 101
Figure 47 Port Based VLAN Setup (All Connected) ............................................................................ 103
Figure 48 Port Based VLAN Setup (Port Isolation) ............................................................................. 104
Figure 49 Advanced Application > Static MAC Forwarding ................................................................. 107
Figure 50 Advanced Application > Filtering ......................................................................................... 109
Figure 51 MRSTP Network Example ....................................................................................................113
Figure 52 STP/RSTP Network Example ...............................................................................................114
Figure 53 MSTP Network Example .......................................................................................................115
Figure 54 MSTIs in Different Regions ..................................................................................................116
Figure 55 MSTP and Legacy RSTP Network Example ........................................................................116
Figure 56 Advanced Application > Spanning Tree Protocol .................................................................117
Figure 57 Advanced Application > Spanning Tree Protocol > Configuration ........................................117
Figure 58 Advanced Application > Spanning Tree Protocol > RSTP ....................................................118
Figure 59 Advanced Application > Spanning Tree Protocol > Status: RSTP ....................................... 120
Figure 60 Advanced Application > Spanning Tree Protocol > MRSTP ................................................ 121
Figure 61 Advanced Application > Spanning Tree Protocol > Status: MRSTP .................................... 123
Figure 62 Advanced Application > Spanning Tree Protocol > MSTP .................................................. 124
Figure 63 Advanced Application > Spanning Tree Protocol > Status: MSTP ...................................... 127
Figure 64 Advanced Application > Bandwidth Control ........................................................................ 130
Figure 65 Advanced Application > Broadcast Storm Control .............................................................. 131
Figure 66 Advanced Application > Mirroring ........................................................................................ 133
Figure 67 Advanced Application > Link Aggregation Status ................................................................ 136
Figure 68 Advanced Application > Link Aggregation > Link Aggregation Setting ............................... 137
Figure 69 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................. 139
Figure 70 Trunking Example - Physical Connections ........................................................................... 140
Figure 71 Trunking Example - Configuration Screen ............................................................................ 141
Figure 72 IEEE 802.1x Authentication Process ................................................................................... 144
Figure 73 MAC Authentication Process ............................................................................................... 144
Figure 74 Advanced Application > Port Authentication ....................................................................... 145
Figure 75 Advanced Application > Port Authentication > 802.1x ........................................................ 145
Figure 76 Advanced Application > Port Authentication > MAC Authentication ................................... 147
Figure 77 Advanced Application > Port Security ................................................................................. 150
Figure 78 Advanced Application > Classifier ....................................................................................... 154
Figure 79 Advanced Application > Classifier: Summary Table ............................................................ 156
Figure 80 Classifier: Example .............................................................................................................. 158
Figure 81 Advanced Application > Policy Rule .................................................................................... 160
22
MES-3728 User’s Guide
List of Figures
Figure 82 Advanced Application > Policy Rule: Summary Table ......................................................... 162
Figure 83 Policy Example .................................................................................................................... 163
Figure 84 Advanced Application > Queuing Method ........................................................................... 166
Figure 85 VLAN Stacking Example ..................................................................................................... 170
Figure 86 Advanced Application > VLAN Stacking .............................................................................. 172
Figure 87 Advanced Application > Multicast ........................................................................................ 176
Figure 88 Advanced Application > Multicast > Multicast Setting ......................................................... 177
Figure 89 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................. 179
Figure 90 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ................... 180
Figure 91 MVR Network Example ....................................................................................................... 181
Figure 92 MVR Multicast Television Example ..................................................................................... 182
Figure 93 Advanced Application > Multicast > Multicast Setting > MVR ............................................. 183
Figure 94 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 185
Figure 95 MVR Configuration Example ............................................................................................... 186
Figure 96 MVR Configuration Example ............................................................................................... 186
Figure 97 MVR Group Configuration Example .................................................................................... 186
Figure 98 MVR Group Configuration Example .................................................................................... 187
Figure 99 AAA Server .......................................................................................................................... 189
Figure 100 Advanced Application > Auth and Acct ............................................................................. 190
Figure 101 Advanced Application > Auth and Acct > RADIUS Server Setup ...................................... 191
Figure 102 Advanced Application > Auth and Acct > TACACS+ Server Setup ................................... 193
Figure 103 Advanced Application > Auth and Acct > Auth and Acct Setup ........................................ 195
Figure 104 DHCP Snooping Database File Format ............................................................................. 204
Figure 105 Example: Man-in-the-middle Attack ...................................................................................205
Figure 106 IP Source Guard ................................................................................................................. 207
Figure 107 IP Source Guard Static Binding .......................................................................................... 208
Figure 108 DHCP Snooping ................................................................................................................. 209
Figure 109 DHCP Snooping Configure ................................................................................................ 212
Figure 110 DHCP Snooping Port Configure ......................................................................................... 214
Figure 111 DHCP Snooping VLAN Configure ....................................................................................... 215
Figure 112 ARP Inspection Status ........................................................................................................ 216
Figure 113 ARP Inspection VLAN Status ............................................................................................. 217
Figure 114 ARP Inspection Log Status ................................................................................................. 218
Figure 115 ARP Inspection Configure .................................................................................................. 219
Figure 116 ARP Inspection Port Configure ........................................................................................... 220
Figure 117 ARP Inspection VLAN Configure ........................................................................................ 221
Figure 118 Loop Guard vs STP ............................................................................................................ 223
Figure 119 Switch in Loop State ........................................................................................................... 224
Figure 120 Loop Guard - Probe Packet ................................................................................................ 224
Figure 121 Loop Guard - Network Loop ............................................................................................... 224
Figure 122 Advanced Application > Loop Guard .................................................................................. 225
Figure 123 Static Routing Overview .................................................................................................... 229
Figure 124 IP Application > Static Routing .......................................................................................... 230
MES-3728 User’s Guide
23
List of Figures
Figure 125 DiffServ: Differentiated Service Field .................................................................................. 233
Figure 126 DiffServ Network ............................................................................................................... 234
Figure 127 TRTCM-Color-blind Mode ................................................................................................. 235
Figure 128 TRTCM-Color-aware Mode ............................................................................................... 235
Figure 129 IP Application > DiffServ .................................................................................................... 236
Figure 130 IP Application > DiffServ > 2-rate 3 Color Marker ............................................................. 237
Figure 131 IP Application > DiffServ > DSCP Setting ......................................................................... 238
Figure 132 IP Application > DHCP Status ........................................................................................... 242
Figure 133 IP Application > DHCP > Global ........................................................................................ 243
Figure 134 Global DHCP Relay Network Example ............................................................................. 244
Figure 135 DHCP Relay Configuration Example ................................................................................. 244
Figure 136 IP Application > DHCP > VLAN ....................................................................................... 245
Figure 137 DHCP Relay for Two VLANs ............................................................................................. 246
Figure 138 DHCP Relay for Two VLANs Configuration Example ........................................................ 247
Figure 139 Management > Maintenance ............................................................................................. 251
Figure 140 Load Factory Default: Start ................................................................................................ 252
Figure 141 Reboot System: Confirmation ........................................................................................... 253
Figure 142 Management > Maintenance > Firmware Upgrade ........................................................... 253
Figure 143 Management > Maintenance > Restore Configuration ...................................................... 254
Figure 144 Management > Maintenance > Backup Configuration ...................................................... 254
Figure 145 Management > Access Control ......................................................................................... 257
Figure 146 SNMP Management Model ............................................................................................... 258
Figure 147 Management > Access Control > SNMP ........................................................................... 263
Figure 148 Management > Access Control > SNMP > Trap Group .................................................... 265
Figure 149 Management > Access Control > Logins .......................................................................... 266
Figure 150 SSH Communication Example ...........................................................................................267
Figure 151 How SSH Works ................................................................................................................. 267
Figure 152 HTTPS Implementation ...................................................................................................... 269
Figure 153 Security Alert Dialog Box (Internet Explorer) ...................................................................... 269
Figure 154 Security Certificate 1 (Netscape) ........................................................................................ 270
Figure 155 Security Certificate 2 (Netscape) ........................................................................................ 270
Figure 156 Example: Lock Denoting a Secure Connection .................................................................. 271
Figure 157 Management > Access Control > Service Access Control ................................................. 271
Figure 158 Management > Access Control > Remote Management .................................................. 272
Figure 159 Management > Diagnostic ................................................................................................. 275
Figure 160 Management > Syslog ....................................................................................................... 278
Figure 161 Management > Syslog > Syslog Server Setup .................................................................. 279
Figure 162 Clustering Application Example ......................................................................................... 282
Figure 163 Management > Cluster Management: Status .................................................................... 282
Figure 164 Cluster Management: Cluster Member Web Configurator Screen .................................... 283
Figure 165 Example: Uploading Firmware to a Cluster Member Switch ............................................. 284
Figure 166 Management > Cluster Management > Configuration ...................................................... 285
Figure 167 MAC Table Flowchart ........................................................................................................ 287
24
MES-3728 User’s Guide
List of Figures
Figure 168 Management > MAC Table ................................................................................................ 288
Figure 169 Management > ARP Table ................................................................................................ 290
Figure 170 Management > Configure Clone .......................................................................................291
MES-3728 User’s Guide
25
List of Figures
26
MES-3728 User’s Guide

List of Tables

List of Tables
Table 1 Front Panel Connections .......................................................................................................... 44
Table 2 LED Descriptions ...................................................................................................................... 50
Table 3 Navigation Panel Sub-links Overview ....................................................................................... 57
Table 4 Web Configurator Screen Sub-links Details .............................................................................. 58
Table 5 Navigation Panel Links ............................................................................................................. 59
Table 6 Status ........................................................................................................................................ 69
Table 7 Status: Port Details ................................................................................................................... 71
Table 8 Basic Setting > System Info ...................................................................................................... 76
Table 9 Basic Setting > General Setup .................................................................................................. 77
Table 10 Basic Setting > Switch Setup .................................................................................................. 79
Table 11 Basic Setting > IP Setup ......................................................................................................... 82
Table 12 Basic Setting > Port Setup ...................................................................................................... 84
Table 13 IEEE 802.1Q VLAN Terminology ............................................................................................ 90
Table 14 Advanced Application > VLAN: VLAN Status .......................................................................... 92
Table 15 Advanced Application > VLAN > VLAN Detail ........................................................................ 93
Table 16 Advanced Application > VLAN > Static VLAN ......................................................................... 94
Table 17 Advanced Application > VLAN > VLAN Port Setting ............................................................... 95
Table 18 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN Setup ............... 97
Table 19 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN Setup ........... 100
Table 20 Port Based VLAN Setup ....................................................................................................... 105
Table 21 Advanced Application > Static MAC Forwarding ................................................................... 108
Table 22 Advanced Application > Filtering ........................................................................................... 109
Table 23 STP Path Costs .....................................................................................................................112
Table 24 STP Port States .....................................................................................................................113
Table 25 Advanced Application > Spanning Tree Protocol > Configuration .........................................117
Table 26 Advanced Application > Spanning Tree Protocol > RSTP .....................................................118
Table 27 Advanced Application > Spanning Tree Protocol > Status: RSTP ........................................ 120
Table 28 Advanced Application > Spanning Tree Protocol > MRSTP ................................................. 121
Table 29 Advanced Application > Spanning Tree Protocol > Status: MRSTP ..................................... 123
Table 30 Advanced Application > Spanning Tree Protocol > MSTP .................................................... 125
Table 31 Advanced Application > Spanning Tree Protocol > Status: MSTP ........................................ 127
Table 32 Advanced Application > Bandwidth Control .......................................................................... 130
Table 33 Advanced Application > Broadcast Storm Control ................................................................ 132
Table 34 Advanced Application > Mirroring ......................................................................................... 134
Table 35 Link Aggregation ID: Local Switch ........................................................................................ 136
Table 36 Link Aggregation ID: Peer Switch ......................................................................................... 136
Table 37 Advanced Application > Link Aggregation Status ................................................................. 136
Table 38 Advanced Application > Link Aggregation > Link Aggregation Setting ................................. 138
MES-3728 User’s Guide
27
List of Tables
Table 39 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................... 139
Table 40 Advanced Application > Port Authentication > 802.1x .......................................................... 146
Table 41 Advanced Application > Port Authentication > MAC Authentication ..................................... 147
Table 42 Advanced Application > Port Security ................................................................................... 150
Table 43 Advanced Application > Classifier ......................................................................................... 154
Table 44 Classifier: Summary Table .................................................................................................... 156
Table 45 Common Ethernet Types and Protocol Numbers ................................................................. 156
Table 46 Common IP Protocol Types and Protocol Numbers ............................................................. 157
Table 47 Common TCP and UDP Port Numbers ................................................................................ 157
Table 48 Advanced Application > Policy Rule ..................................................................................... 161
Table 49 Advanced Application > Policy Rule: Summary Table .......................................................... 162
Table 50 Advanced Application > Queuing Method ............................................................................. 167
Table 51 VLAN Tag Format ................................................................................................................. 171
Table 52 Single and Double Tagged 802.11Q Frame Format ............................................................. 171
Table 53 802.1Q Frame ....................................................................................................................... 171
Table 54 Advanced Application > VLAN Stacking ............................................................................... 172
Table 55 Advanced Application > Multicast Status ..............................................................................176
Table 56 Advanced Application > Multicast > Multicast Setting ........................................................... 177
Table 57 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................... 179
Table 58 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile .................... 180
Table 59 Advanced Application > Multicast > Multicast Setting > MVR ............................................... 183
Table 60 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 185
Table 61 RADIUS vs. TACACS+ ......................................................................................................... 190
Table 62 Advanced Application > Auth and Acct > RADIUS Server Setup ......................................... 191
Table 63 Advanced Application > Auth and Acct > TACACS+ Server Setup ...................................... 193
Table 64 Advanced Application > Auth and Acct > Auth and Acct Setup ............................................ 195
Table 65 Supported VSAs ................................................................................................................... 197
Table 66 Supported Tunnel Protocol Attribute ..................................................................................... 198
Table 67 RADIUS Attributes - Exec Events via Console ..................................................................... 200
Table 68 RADIUS Attributes - Exec Events via Telnet/SSH ................................................................ 200
Table 69 RADIUS Attributes-Exec Events via 802.1x .......................................................................... 200
Table 70 IP Source Guard ................................................................................................................... 207
Table 71 IP Source Guard Static Binding ............................................................................................ 208
Table 72 DHCP Snooping .................................................................................................................... 210
Table 73 DHCP Snooping Configure ................................................................................................... 212
Table 74 DHCP Snooping Port Configure ........................................................................................... 214
Table 75 DHCP Snooping VLAN Configure .........................................................................................215
Table 76 ARP Inspection Status .......................................................................................................... 216
Table 77 ARP Inspection VLAN Status ................................................................................................ 217
Table 78 ARP Inspection Log Status ................................................................................................... 218
Table 79 ARP Inspection Configure ..................................................................................................... 219
Table 80 ARP Inspection Port Configure ............................................................................................. 221
Table 81 ARP Inspection VLAN Configure .......................................................................................... 222
28
MES-3728 User’s Guide
List of Tables
Table 82 Advanced Application > Loop Guard ....................................................................................225
Table 83 IP Application > Static Routing .............................................................................................. 230
Table 84 IP Application > DiffServ ....................................................................................................... 236
Table 85 IP Application > DiffServ > 2-rate 3 Color Marker ................................................................. 237
Table 86 Default DSCP-IEEE 802.1p Mapping ................................................................................... 238
Table 87 IP Application > DiffServ > DSCP Setting .............................................................................239
Table 88 IP Application > DHCP .......................................................................................................... 242
Table 89 Relay Agent Information ....................................................................................................... 242
Table 90 IP Application > DHCP > Global ........................................................................................... 243
Table 91 IP Application > DHCP > VLAN ............................................................................................ 245
Table 92 Management > Maintenance ................................................................................................ 251
Table 93 Filename Conventions .......................................................................................................... 255
Table 94 Access Control Overview ...................................................................................................... 257
Table 95 SNMP Commands ................................................................................................................ 258
Table 96 SNMP System Traps ............................................................................................................. 259
Table 97 SNMP Interface Traps ........................................................................................................... 260
Table 98 AAA Traps ............................................................................................................................. 261
Table 99 SNMP IP Traps ..................................................................................................................... 261
Table 100 SNMP Switch Traps ............................................................................................................ 262
Table 101 Management > Access Control > SNMP ............................................................................ 263
Table 102 Management > Access Control > SNMP > Trap Group ...................................................... 265
Table 103 Management > Access Control > Logins ............................................................................ 266
Table 104 Management > Access Control > Service Access Control ................................................. 272
Table 105 Management > Access Control > Remote Management .................................................... 272
Table 106 Management > Diagnostic .................................................................................................. 275
Table 107 Syslog Severity Levels ........................................................................................................ 277
Table 108 Management > Syslog ........................................................................................................ 278
Table 109 Management > Syslog > Syslog Server Setup ................................................................... 279
Table 110 ZyXEL Clustering Management Specifications ................................................................... 281
Table 111 Management > Cluster Management: Status ...................................................................... 283
Table 112 FTP Upload to Cluster Member Example ........................................................................... 284
Table 113 Management > Cluster Management > Configuration ........................................................ 285
Table 114 Management > MAC Table .................................................................................................. 288
Table 115 Management > ARP Table .................................................................................................. 290
Table 116 Management > Configure Clone ......................................................................................... 292
Table 117 Hardware Specifications ...................................................................................................... 299
Table 118 Firmware Specifications ...................................................................................................... 300
Table 119 Feature Specifications ......................................................................................................... 302
Table 120 Standards Supported .......................................................................................................... 303
Table 121 Commonly Used Services ................................................................................................... 309
MES-3728 User’s Guide
29
List of Tables
30
MES-3728 User’s Guide
Loading...
+ 300 hidden pages