ZyXEL Communications ES-3148 User Manual

Page 1
ES-3148 Series
Intelligent Layer 2+ Switch

User’s Guide

Version 3.80 8/2007 Edition 1
IP Address http://192.168.1.1
User Name admin
Password 1234
www.zyxel.com
Page 2
Page 3

About This User's Guide

About This User's Guide
Intended Audience
This manual is intended for people who want to configure the Switch using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology.
Related Documentation
• Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary
information.
• Command Reference Guide The Command Reference Guide explains how to use the Command-Line Interface (CLI)
and CLI commands to configure the Switch.
" It is recommended you use the web configurator to configure the Switch.
• Supporting Disk Refer to the included CD for support documents.
• ZyXEL Web Site Please refer to www.zyxel.com
certifications.
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
for additional support documentation and product
ES-3148 User’s Guide
3
Page 4

Document Conventions

Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The ES-3148 may be referred to as the “Switch”, the “device”, the “system” or the “product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key. “Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example, Maintenance > Log > Log Setting means you first click Maintenance in the navigation panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
ES-3148 User’s Guide
Page 5
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The Switch icon is not an exact representation of your device.
Switch Computer Notebook computer
Server DSLAM Firewall
Telephone Switch Router
ES-3148 User’s Guide
5
Page 6

Safety Warnings

Safety Warnings
1 For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
• If the power adaptor or cord is damaged, remove it from the device and the power source.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning.
• Caution: Risk of explosion if battery (on the motherboard) is replaced by an incorrect type. Dispose of used batteries according to the instructions. Dispose them at the applicable collection point for the recycling of electrical and electronic equipment. For detailed information about recycling of this product, please contact your local city office, your household waste disposal service or the store where you purchased the product.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
6
This product is recyclable. Dispose of it properly.
ES-3148 User’s Guide
Page 7
Safety Warnings
ES-3148 User’s Guide
7
Page 8
Safety Warnings
8
ES-3148 User’s Guide
Page 9

Contents Overview

Contents Overview
Introduction ............................................................................................................................31
Introducing the Switch ............................................................................................................... 33
Hardware .................................................................................................................................37
Hardware Installation and Connection ....................................................................................... 39
Hardware Overview ................................................................................................................... 43
Web Configurator ...................................................................................................................49
The Web Configurator ............................................................................................................... 51
Initial Setup Example ................................................................................................................. 63
System Status and Port Statistics ..............................................................................................67
Basic Setting ............................................................................................................................. 73
VLAN ......................................................................................................................................... 85
Static MAC Forward Setup ...................................................................................................... 103
Filtering .................................................................................................................................... 105
Spanning Tree Protocol ........................................................................................................... 107
Bandwidth Control ................................................................................................................... 125
Broadcast Storm Control ......................................................................................................... 127
Mirroring .................................................................................................................................. 129
Link Aggregation ...................................................................................................................... 131
Port Authentication .................................................................................................................. 139
Port Security ............................................................................................................................ 145
Classifier .................................................................................................................................. 149
Policy Rule ............................................................................................................................... 155
Queuing Method ...................................................................................................................... 161
VLAN Stacking ......................................................................................................................... 165
Multicast .................................................................................................................................. 171
Authentication & Accounting ....................................................................................................185
IP Source Guard ...................................................................................................................... 199
Loop Guard .............................................................................................................................. 219
Static Routing .......................................................................................................................... 223
Differentiated Services ............................................................................................................. 225
DHCP ...................................................................................................................................... 233
Maintenance ............................................................................................................................ 239
Access Control ........................................................................................................................ 245
Diagnostic ................................................................................................................................ 263
Syslog ...................................................................................................................................... 265
ES-3148 User’s Guide
9
Page 10
Contents Overview
Cluster Management ............................................................................................................... 269
MAC Table ............................................................................................................................... 275
ARP Table ................................................................................................................................ 277
Configure Clone ....................................................................................................................... 279
Troubleshooting and Specifications ..................................................................................281
Troubleshooting ....................................................................................................................... 283
Product Specifications ............................................................................................................. 287
Appendices and Index ......................................................................................................... 293
10
ES-3148 User’s Guide
Page 11

Table of Contents

Table of Contents
About This User's Guide ..........................................................................................................3
Document Conventions............................................................................................................4
Safety Warnings........................................................................................................................6
Contents Overview ...................................................................................................................9
Table of Contents....................................................................................................................11
List of Figures .........................................................................................................................21
List of Tables...........................................................................................................................27
Part I: Introduction................................................................................. 31
Chapter 1
Introducing the Switch ...........................................................................................................33
1.1 Overview .............................................................................................................................. 33
1.1.1 Backbone Application ................................................................................................. 33
1.1.2 Bridging Example ....................................................................................................... 34
1.1.3 High-performance Switched Example ........................................................................ 34
1.1.4 IEEE 802.1Q VLAN Application Examples ................................................................ 35
1.2 Ways to Manage the Switch ................................................................................................ 36
1.3 Good Habits for Managing the Switch ................................................................................. 36
Part II: Hardware .................................................................................... 37
Chapter 2
Hardware Installation and Connection .................................................................................39
2.1 Freestanding Installation ..................................................................................................... 39
2.2 Mounting the Switch on a Rack .......................................................................................... 40
2.2.1 Rack-mounted Installation Requirements .................................................................. 40
2.2.2 Attaching the Mounting Brackets to the Switch .......................................................... 40
2.2.3 Mounting the Switch on a Rack .................................................................................. 41
Chapter 3
Hardware Overview.................................................................................................................43
ES-3148 User’s Guide
11
Page 12
Table of Contents
3.1 Panel Connections ............................................................................................................. 43
3.1.1 Ethernet Ports ............................................................................................................ 43
3.1.2 Mini-GBIC Slots .........................................................................................................44
3.2 Rear Panel ........................................................................................................................... 45
3.2.1 Console Port ............................................................................................................. 46
3.2.2 External Backup Power Supply Connector ................................................................ 46
3.2.3 Power Connector ....................................................................................................... 47
3.3 LEDs ................................................................................................................................ 47
Part III: Web Configurator ..................................................................... 49
Chapter 4
The Web Configurator ............................................................................................................51
4.1 Introduction .......................................................................................................................... 51
4.2 System Login .................................................................................................................... 51
4.3 The Status Screen .......................................................................................................... 52
4.3.1 Change Your Password .......................................................................................... 58
4.4 Saving Your Configuration ................................................................................................... 58
4.5 Switch Lockout .................................................................................................................. 59
4.6 Resetting the Switch ......................................................................................................... 59
4.6.1 Reload the Configuration File .................................................................................... 59
4.7 Logging Out of the Web Configurator ................................................................................. 60
4.8 Help .................................................................................................................................... 61
Chapter 5
Initial Setup Example..............................................................................................................63
5.1 Overview .............................................................................................................................. 63
5.1.1 Creating a VLAN ........................................................................................................ 63
5.1.2 Setting Port VID .........................................................................................................64
5.2 Configuring Switch Management IP Address ...................................................................... 65
Chapter 6
System Status and Port Statistics......................................................................................... 67
6.1 Overview .............................................................................................................................. 67
6.2 Port Status Summary ...................................................................................................... 67
6.2.1 Status: Port Details ................................................................................................68
Chapter 7
Basic Setting ..........................................................................................................................73
7.1 Overview .............................................................................................................................. 73
7.2 System Information ........................................................................................................... 73
12
ES-3148 User’s Guide
Page 13
Table of Contents
7.3 General Setup ................................................................................................................. 75
7.4 Introduction to VLANs ......................................................................................................... 77
7.5 Switch Setup Screen ........................................................................................................ 77
7.6 IP Setup ............................................................................................................................ 79
7.6.1 IP Interfaces ............................................................................................................... 79
7.7 Port Setup ........................................................................................................................... 82
Chapter 8
VLAN ........................................................................................................................................85
8.1 Introduction to IEEE 802.1Q Tagged VLANs .................................................................. 85
8.1.1 Forwarding Tagged and Untagged Frames ................................................................ 85
8.2 Automatic VLAN Registration ............................................................................................. 86
8.2.1 GARP ......................................................................................................................... 86
8.2.2 GVRP ......................................................................................................................... 86
8.3 Port VLAN Trunking ............................................................................................................ 87
8.4 Select the VLAN Type ........................................................................................................ 87
8.5 Static VLAN ......................................................................................................................... 87
8.5.1 Static VLAN Status .................................................................................................... 88
8.5.2 Static VLAN Details ................................................................................................... 88
8.5.3 Configure a Static VLAN ........................................................................................ 89
8.5.4 Configure VLAN Port Settings ................................................................................ 90
8.6 Subnet Based VLANs ......................................................................................................... 92
8.7 Configuring Subnet Based VLAN ...................................................................................... 93
8.8 Protocol Based VLANs ....................................................................................................... 94
8.9 Configuring Protocol Based VLAN .................................................................................... 95
8.10 Create an IP-based VLAN Example .................................................................................. 97
8.11 Port-based VLAN Setup ................................................................................................98
8.11.1 Configure a Port-based VLAN ................................................................................. 98
Chapter 9
Static MAC Forward Setup...................................................................................................103
9.1 Overview ............................................................................................................................ 103
9.2 Configuring Static MAC Forwarding ............................................................................. 103
Chapter 10
Filtering..................................................................................................................................105
10.1 Configure a Filtering Rule .............................................................................................105
Chapter 11
Spanning Tree Protocol........................................................................................................107
11.1 STP/RSTP Overview ..................................................................................................... 107
11.1.1 STP Terminology ................................................................................................... 107
11.1.2 How STP Works .................................................................................................... 108
ES-3148 User’s Guide
13
Page 14
Table of Contents
11.1.3 STP Port States ..................................................................................................... 109
11.1.4 Multiple RSTP ...................................................................................................... 109
11.1.5 Multiple STP ............................................................................................................110
11.2 Spanning Tree Protocol Status Screen .............................................................................112
11.3 Spanning Tree Configuration ...........................................................................................113
11.4 Configure Rapid Spanning Tree Protocol ......................................................................114
11.5 Rapid Spanning Tree Protocol Status .........................................................................115
11.6 Configure Multiple Rapid Spanning Tree Protocol .........................................................117
11.7 Multiple Rapid Spanning Tree Protocol Status ............................................................118
11.8 Configure Multiple Spanning Tree Protocol .................................................................. 120
11.9 Multiple Spanning Tree Protocol Status ..................................................................... 122
Chapter 12
Bandwidth Control................................................................................................................125
12.1 Bandwidth Control Overview ......................................................................................... 125
12.1.1 CIR and PIR ........................................................................................................... 125
12.2 Bandwidth Control Setup ................................................................................................. 125
Chapter 13
Broadcast Storm Control .....................................................................................................127
13.1 Broadcast Storm Control Setup ...................................................................................... 127
Chapter 14
Mirroring ................................................................................................................................129
14.1 Port Mirroring Setup ....................................................................................................... 129
Chapter 15
Link Aggregation ..................................................................................................................131
15.1 Link Aggregation Overview ............................................................................................. 131
15.2 Dynamic Link Aggregation .............................................................................................. 131
15.2.1 Link Aggregation ID ............................................................................................... 132
15.3 Link Aggregation Status ..................................................................................................132
15.4 Link Aggregation Setting ................................................................................................ 133
15.5 Link Aggregation Control Protocol ................................................................................ 134
15.6 Static Trunking Example .................................................................................................. 136
Chapter 16
Port Authentication...............................................................................................................139
14
16.1 Port Authentication Overview ......................................................................................... 139
16.1.1 IEEE 802.1x Authentication ................................................................................... 139
16.1.2 MAC Authentication ............................................................................................... 140
16.2 Port Authentication Configuration .................................................................................... 141
16.2.1 Activate IEEE 802.1x Security ........................................................................... 141
ES-3148 User’s Guide
Page 15
Table of Contents
16.2.2 Activate MAC Authentication ................................................................................. 142
Chapter 17
Port Security..........................................................................................................................145
17.1 About Port Security ......................................................................................................... 145
17.2 Port Security Setup .......................................................................................................... 145
Chapter 18
Classifier................................................................................................................................149
18.1 About the Classifier and QoS .......................................................................................... 149
18.2 Configuring the Classifier ...............................................................................................149
18.3 Viewing and Editing Classifier Configuration ................................................................... 152
18.4 Classifier Example ........................................................................................................... 153
Chapter 19
Policy Rule.............................................................................................................................155
19.1 Policy Rules Overview ....................................................................................................155
19.1.1 DiffServ .................................................................................................................. 155
19.1.2 DSCP and Per-Hop Behavior ................................................................................. 155
19.2 Configuring Policy Rules ................................................................................................. 156
19.3 Viewing and Editing Policy Configuration ........................................................................ 158
19.4 Policy Example ................................................................................................................ 159
Chapter 20
Queuing Method....................................................................................................................161
20.1 Queuing Method Overview ............................................................................................. 161
20.1.1 Strictly Priority ........................................................................................................ 161
20.1.2 Weighted Fair Queuing .......................................................................................... 161
20.1.3 Weighted Round Robin Scheduling (WRR) ........................................................... 162
20.2 Configuring Queuing ........................................................................................................ 162
Chapter 21
VLAN Stacking ......................................................................................................................165
21.1 VLAN Stacking Overview ................................................................................................ 165
21.1.1 VLAN Stacking Example ........................................................................................ 165
21.2 VLAN Stacking Port Roles ............................................................................................... 166
21.3 VLAN Tag Format ............................................................................................................ 167
21.3.1 Frame Format ........................................................................................................ 167
21.4 Configuring VLAN Stacking ............................................................................................. 168
Chapter 22
Multicast ................................................................................................................................171
22.1 Multicast Overview ......................................................................................................... 171
ES-3148 User’s Guide
15
Page 16
Table of Contents
22.1.1 IP Multicast Addresses ........................................................................................... 171
22.1.2 IGMP Filtering ........................................................................................................ 171
22.1.3 IGMP Snooping ..................................................................................................... 171
22.1.4 IGMP Snooping and VLANs ................................................................................... 172
22.2 Multicast Status .............................................................................................................. 172
22.3 Multicast Setting ............................................................................................................. 172
22.4 IGMP Snooping VLAN .................................................................................................... 174
22.5 IGMP Filtering Profile ..................................................................................................... 176
22.6 MVR Overview ................................................................................................................ 177
22.6.1 Types of MVR Ports ............................................................................................... 177
22.6.2 MVR Modes ........................................................................................................... 178
22.6.3 How MVR Works .................................................................................................... 178
22.7 General MVR Configuration ............................................................................................ 178
22.8 MVR Group Configuration .............................................................................................. 180
22.8.1 MVR Configuration Example .................................................................................. 181
Chapter 23
Authentication & Accounting ..............................................................................................185
23.1 Authentication, Authorization and Accounting ................................................................ 185
23.1.1 Local User Accounts .............................................................................................. 185
23.1.2 RADIUS and TACACS+ ........................................................................................ 186
23.2 Authentication and Accounting Screens .......................................................................... 186
23.2.1 RADIUS Server Setup ........................................................................................ 186
23.2.2 TACACS+ Server Setup ..................................................................................... 188
23.2.3 Authentication and Accounting Setup ................................................................ 190
23.2.4 Vendor Specific Attribute ........................................................................................ 193
23.3 Supported RADIUS Attributes ......................................................................................... 194
23.3.1 Attributes Used for Authentication .......................................................................... 195
23.3.2 Attributes Used for Accounting ............................................................................... 195
Chapter 24
IP Source Guard....................................................................................................................199
24.1 IP Source Guard Overview .............................................................................................. 199
24.1.1 DHCP Snooping Overview ..................................................................................... 199
24.1.2 ARP Inspection Overview ...................................................................................... 201
24.2 IP Source Guard .............................................................................................................. 203
24.3 IP Source Guard Static Binding ....................................................................................... 203
24.4 DHCP Snooping .............................................................................................................. 205
24.5 DHCP Snooping Configure .............................................................................................. 208
24.5.1 DHCP Snooping Port Configure ............................................................................. 209
24.5.2 DHCP Snooping VLAN Configure ...........................................................................211
24.6 ARP Inspection Status .....................................................................................................212
24.6.1 ARP Inspection VLAN Status ................................................................................. 212
16
ES-3148 User’s Guide
Page 17
Table of Contents
24.6.2 ARP Inspection Log Status .................................................................................... 213
24.7 ARP Inspection Configure ............................................................................................... 215
24.7.1 ARP Inspection Port Configure .............................................................................. 216
24.7.2 ARP Inspection VLAN Configure ........................................................................... 217
Chapter 25
Loop Guard............................................................................................................................219
25.1 Loop Guard Overview ..................................................................................................... 219
25.2 Loop Guard Setup ........................................................................................................... 221
Chapter 26
Static Routing........................................................................................................................223
26.1 Configuring Static Routing ............................................................................................. 223
Chapter 27
Differentiated Services.........................................................................................................225
27.1 DiffServ Overview ........................................................................................................... 225
27.1.1 DSCP and Per-Hop Behavior ................................................................................ 225
27.1.2 DiffServ Network Example .................................................................................... 226
27.2 Two Rate Three Color Marker Traffic Policing ................................................................. 226
27.2.1 TRTCM - Color-blind Mode .................................................................................... 227
27.2.2 TRTCM - Color-aware Mode .................................................................................. 227
27.3 Activating DiffServ .......................................................................................................... 228
27.3.1 Configuring 2-Rate 3 Color Marker Settings ......................................................... 228
27.4 DSCP-to-IEEE 802.1p Priority Settings ...................................................................... 230
27.4.1 Configuring DSCP Settings .................................................................................... 230
Chapter 28
DHCP......................................................................................................................................233
28.1 DHCP Overview ............................................................................................................. 233
28.1.1 DHCP Modes ........................................................................................................ 233
28.1.2 DHCP Configuration Options ................................................................................. 233
28.2 DHCP Status ................................................................................................................... 233
28.3 DHCP Relay ................................................................................................................... 234
28.3.1 DHCP Relay Agent Information ............................................................................. 234
28.3.2 Configuring DHCP Global Relay ............................................................................ 235
28.3.3 Global DHCP Relay Configuration Example .......................................................... 236
28.4 Configuring DHCP VLAN Settings ................................................................................ 236
28.4.1 Example: DHCP Relay for Two VLANs .................................................................. 238
Chapter 29
Maintenance ..........................................................................................................................239
29.1 The Maintenance Screen ............................................................................................... 239
ES-3148 User’s Guide
17
Page 18
Table of Contents
29.2 Load Factory Default ...................................................................................................... 240
29.3 Save Configuration .......................................................................................................... 240
29.4 Reboot System ................................................................................................................ 241
29.5 Firmware Upgrade ........................................................................................................ 241
29.6 Restore a Configuration File ......................................................................................... 242
29.7 Backup a Configuration File ......................................................................................... 242
29.8 FTP Command Line ........................................................................................................ 243
29.8.1 Filename Conventions .......................................................................................... 243
29.8.2 FTP Command Line Procedure ............................................................................ 243
29.8.3 GUI-based FTP Clients .......................................................................................... 244
29.8.4 FTP Restrictions .................................................................................................... 244
Chapter 30
Access Control......................................................................................................................245
30.1 Access Control Overview ............................................................................................ 245
30.2 The Access Control Main Screen .................................................................................... 245
30.3 About SNMP .................................................................................................................. 246
30.3.1 SNMP v3 and Security ........................................................................................... 247
30.3.2 Supported MIBs ................................................................................................... 247
30.3.3 SNMP Traps .......................................................................................................... 247
30.3.4 Configuring SNMP .............................................................................................. 250
30.3.5 Configuring SNMP Trap Group ........................................................................... 252
30.3.6 Setting Up Login Accounts ................................................................................. 253
30.4 SSH Overview ................................................................................................................. 255
30.5 How SSH works ............................................................................................................... 255
30.6 SSH Implementation on the Switch ................................................................................. 256
30.6.1 Requirements for Using SSH ................................................................................. 256
30.7 Introduction to HTTPS .....................................................................................................256
30.8 HTTPS Example .............................................................................................................. 257
30.8.1 Internet Explorer Warning Messages ..................................................................... 257
30.8.2 Netscape Navigator Warning Messages ................................................................ 258
30.8.3 The Main Screen .................................................................................................... 258
30.9 Service Port Access Control ......................................................................................... 259
30.10 Remote Management ............................................................................................... 260
Chapter 31
Diagnostic..............................................................................................................................263
31.1 Diagnostic ....................................................................................................................... 263
Chapter 32
Syslog ....................................................................................................................................265
32.1 Syslog Overview .............................................................................................................. 265
32.2 Syslog Setup .................................................................................................................. 265
18
ES-3148 User’s Guide
Page 19
Table of Contents
32.3 Syslog Server Setup ....................................................................................................... 266
Chapter 33
Cluster Management.............................................................................................................269
33.1 Clustering Management Status Overview ...................................................................... 269
33.2 Cluster Management Status ........................................................................................... 270
33.2.1 Cluster Member Switch Management ................................................................... 271
33.3 Clustering Management Configuration .......................................................................... 272
Chapter 34
MAC Table..............................................................................................................................275
34.1 MAC Table Overview ...................................................................................................... 275
34.2 Viewing the MAC Table ................................................................................................... 276
Chapter 35
ARP Table ..............................................................................................................................277
35.1 ARP Table Overview .......................................................................................................277
35.1.1 How ARP Works .................................................................................................... 277
35.2 Viewing the ARP Table ................................................................................................... 277
Chapter 36
Configure Clone....................................................................................................................279
36.1 Configure Clone .............................................................................................................. 279
Part IV: Troubleshooting and Specifications..................................... 281
Chapter 37
Troubleshooting....................................................................................................................283
37.1 Power, Hardware Connections, and LEDs ...................................................................... 283
37.2 Switch Access and Login ................................................................................................. 284
Chapter 38
Product Specifications.........................................................................................................287
38.1 General Switch Specifications ......................................................................................... 287
38.2 Cable Pin Assignments ................................................................................................... 290
Part V: Appendices and Index ............................................................ 293
Appendix A Setting up Your Computer’s IP Address............................................................295
Appendix B Pop-up Windows, JavaScripts and Java Permissions ......................................317
ES-3148 User’s Guide
19
Page 20
Table of Contents
Appendix C IP Addresses and Subnetting ...........................................................................325
Appendix D Common Services ............................................................................................335
Appendix E Importing Certificates ........................................................................................339
Appendix F Legal Information ..............................................................................................345
Appendix G Customer Support ............................................................................................349
Index.......................................................................................................................................355
20
ES-3148 User’s Guide
Page 21

List of Figures

List of Figures
Figure 1 Backbone Application .............................................................................................................. 33
Figure 2 Bridging Application .................................................................................................................. 34
Figure 3 High-performance Switched Application .................................................................................. 34
Figure 4 Tag-based VLAN Application .................................................................................................... 35
Figure 5 Shared Server Using VLAN Example ....................................................................................... 36
Figure 6 Attaching Rubber Feet ............................................................................................................ 39
Figure 7 Attaching the Mounting Brackets .............................................................................................. 40
Figure 8 Mounting the Switch on a Rack ............................................................................................... 41
Figure 9 Front Panel .............................................................................................................................. 43
Figure 10 Transceiver Installation Example ........................................................................................... 45
Figure 11 Installed Transceiver .............................................................................................................. 45
Figure 12 Opening the Transceiver’s Latch Example ............................................................................ 45
Figure 13 Transceiver Removal Example .............................................................................................. 45
Figure 14 Rear Panel ............................................................................................................................ 46
Figure 15 Web Configurator: Login ....................................................................................................... 52
Figure 16 Web Configurator Home Screen (Status) .............................................................................. 52
Figure 17 Change Administrator Login Password .................................................................................58
Figure 18 Resetting the Switch: Via the Console Port ........................................................................... 60
Figure 19 Web Configurator: Logout Screen ......................................................................................... 60
Figure 20 Initial Setup Network Example: VLAN .................................................................................... 63
Figure 21 Initial Setup Network Example: Port VID ................................................................................ 64
Figure 22 Initial Setup Example: Management IP Address .................................................................... 65
Figure 23 Status .................................................................................................................................... 67
Figure 24 Status: Port Details ................................................................................................................. 69
Figure 25 Basic Setting > System Info .................................................................................................. 74
Figure 26 Basic Setting > General Setup .............................................................................................. 75
Figure 27 Basic Setting > Switch Setup ................................................................................................ 78
Figure 28 Basic Setting > IP Setup ......................................................................................................... 80
Figure 29 Basic Setting > Port Setup .................................................................................................... 82
Figure 30 Port VLAN Trunking ............................................................................................................... 87
Figure 31 Switch Setup: Select VLAN Type .......................................................................................... 87
Figure 32 Advanced Application > VLAN: VLAN Status ......................................................................... 88
Figure 33 Advanced Application > VLAN > VLAN Detail ........................................................................ 88
Figure 34 Advanced Application > VLAN > Static VLAN ...................................................................... 89
Figure 35 Advanced Application > VLAN > VLAN Port Setting ............................................................. 91
Figure 36 Subnet Based VLAN Application Example ............................................................................ 92
Figure 37 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................ 93
Figure 38 Protocol Based VLAN Application Example .......................................................................... 95
ES-3148 User’s Guide
21
Page 22
List of Figures
Figure 39 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN ...................... 96
Figure 40 Protocol Based VLAN Configuration Example ...................................................................... 97
Figure 41 Advanced Application > VLAN: Port Based VLAN Setup (All Connected) ............................ 99
Figure 42 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation) ........................... 100
Figure 43 Advanced Application > Static MAC Forwarding ................................................................. 103
Figure 44 Advanced Application > Filtering ......................................................................................... 105
Figure 45 MRSTP Network Example ................................................................................................... 109
Figure 46 STP/RSTP Network Example ...............................................................................................110
Figure 47 MSTP Network Example .......................................................................................................111
Figure 48 MSTIs in Different Regions ..................................................................................................112
Figure 49 MSTP and Legacy RSTP Network Example ........................................................................112
Figure 50 Advanced Application > Spanning Tree Protocol .................................................................113
Figure 51 Advanced Application > Spanning Tree Protocol > Configuration ........................................113
Figure 52 Advanced Application > Spanning Tree Protocol > RSTP ....................................................114
Figure 53 Advanced Application > Spanning Tree Protocol > Status: RSTP ........................................116
Figure 54 Advanced Application > Spanning Tree Protocol > MRSTP .................................................117
Figure 55 Advanced Application > Spanning Tree Protocol > Status: MRSTP .....................................119
Figure 56 Advanced Application > Spanning Tree Protocol > MSTP .................................................. 120
Figure 57 Advanced Application > Spanning Tree Protocol > Status: MSTP ...................................... 123
Figure 58 Advanced Application > Bandwidth Control ........................................................................ 126
Figure 59 Advanced Application > Broadcast Storm Control .............................................................. 127
Figure 60 Advanced Application > Mirroring ........................................................................................ 129
Figure 61 Advanced Application > Link Aggregation Status ................................................................ 132
Figure 62 Advanced Application > Link Aggregation > Link Aggregation Setting ............................... 133
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................. 135
Figure 64 Trunking Example - Physical Connections ........................................................................... 136
Figure 65 Trunking Example - Configuration Screen ............................................................................ 137
Figure 66 IEEE 802.1x Authentication Process ................................................................................... 140
Figure 67 MAC Authentication Process ............................................................................................... 140
Figure 68 Advanced Application > Port Authentication ....................................................................... 141
Figure 69 Advanced Application > Port Authentication > 802.1x ........................................................ 141
Figure 70 Advanced Application > Port Authentication > MAC Authentication ................................... 143
Figure 71 Advanced Application > Port Security ................................................................................. 146
Figure 72 Advanced Application > Classifier ....................................................................................... 150
Figure 73 Advanced Application > Classifier: Summary Table ............................................................ 152
Figure 74 Classifier: Example .............................................................................................................. 154
Figure 75 Advanced Application > Policy Rule .................................................................................... 156
Figure 76 Advanced Application > Policy Rule: Summary Table ......................................................... 158
Figure 77 Policy Example .................................................................................................................... 159
Figure 78 Advanced Application > Queuing Method ........................................................................... 162
Figure 79 VLAN Stacking Example ..................................................................................................... 166
Figure 80 Advanced Application > VLAN Stacking .............................................................................. 168
Figure 81 Advanced Application > Multicast ........................................................................................ 172
22
ES-3148 User’s Guide
Page 23
List of Figures
Figure 82 Advanced Application > Multicast > Multicast Setting ......................................................... 173
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................. 175
Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ................... 176
Figure 85 MVR Network Example ....................................................................................................... 177
Figure 86 MVR Multicast Television Example ..................................................................................... 178
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR ............................................. 179
Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 181
Figure 89 MVR Configuration Example ............................................................................................... 182
Figure 90 MVR Configuration Example ............................................................................................... 182
Figure 91 MVR Group Configuration Example ................................................................................... 183
Figure 92 MVR Group Configuration Example .................................................................................... 183
Figure 93 AAA Server .......................................................................................................................... 185
Figure 94 Advanced Application > Auth and Acct ............................................................................... 186
Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................ 187
Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup ..................................... 189
Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup .......................................... 191
Figure 98 DHCP Snooping Database File Format ............................................................................... 200
Figure 99 Example: Man-in-the-middle Attack ..................................................................................... 201
Figure 100 Advanced Application > IP Source Guard .......................................................................... 203
Figure 101 Advanced Application > IP Source Guard > Static Binding ................................................ 204
Figure 102 Advanced Application > IP Source Guard > DHCP Snooping ........................................... 205
Figure 103 Advanced Application > IP Source Guard > DHCP Snooping > Configure ........................ 208
Figure 104 Advanced Application > IP Source Guard > DHCP Snooping > Configure > Port ............. 210
Figure 105 Advanced Application > IP Source Guard > DHCP Snooping > Configure > VLAN ...........211
Figure 106 Advanced Application > IP Source Guard > ARP Inspection ............................................. 212
Figure 107 Advanced Application > IP Source Guard > ARP Inspection > VLAN Status ..................... 213
Figure 108 Advanced Application > IP Source Guard > ARP Inspection > Log Status ........................ 214
Figure 109 Advanced Application > IP Source Guard > ARP Inspection > Configure ......................... 215
Figure 110 Advanced Application > IP Source Guard > ARP Inspection > Configure > Port ............... 216
Figure 111 Advanced Application > IP Source Guard > ARP Inspection > Configure > VLAN ............ 217
Figure 112 Loop Guard vs STP ............................................................................................................ 219
Figure 113 Switch in Loop State ........................................................................................................... 220
Figure 114 Loop Guard - Probe Packet ................................................................................................ 220
Figure 115 Loop Guard - Network Loop ............................................................................................... 220
Figure 116 Advanced Application > Loop Guard .................................................................................. 221
Figure 117 IP Application > Static Routing .......................................................................................... 223
Figure 118 DiffServ: Differentiated Service Field .................................................................................. 225
Figure 119 DiffServ Network ................................................................................................................ 226
Figure 120 TRTCM - Color-blind Mode ............................................................................................... 227
Figure 121 TRTCM - Color-aware Mode ............................................................................................. 227
Figure 122 IP Application > DiffServ .................................................................................................... 228
Figure 123 IP Application > DiffServ > 2-rate 3 Color Marker ............................................................. 229
Figure 124 IP Application > DiffServ > DSCP Setting ......................................................................... 230
ES-3148 User’s Guide
23
Page 24
List of Figures
Figure 125 IP Application > DHCP Status ........................................................................................... 234
Figure 126 IP Application > DHCP > Global ........................................................................................ 235
Figure 127 Global DHCP Relay Network Example ............................................................................. 236
Figure 128 DHCP Relay Configuration Example ................................................................................. 236
Figure 129 IP Application > DHCP > VLAN ....................................................................................... 237
Figure 130 DHCP Relay for Two VLANs ............................................................................................. 238
Figure 131 DHCP Relay for Two VLANs Configuration Example ........................................................ 238
Figure 132 Management > Maintenance ............................................................................................. 239
Figure 133 Load Factory Default: Start ................................................................................................ 240
Figure 134 Reboot System: Confirmation ........................................................................................... 241
Figure 135 Management > Maintenance > Firmware Upgrade ........................................................... 241
Figure 136 Management > Maintenance > Restore Configuration ...................................................... 242
Figure 137 Management > Maintenance > Backup Configuration ...................................................... 242
Figure 138 Management > Access Control ......................................................................................... 245
Figure 139 SNMP Management Model .............................................................................................. 246
Figure 140 Management > Access Control > SNMP ........................................................................... 251
Figure 141 Management > Access Control > SNMP > Trap Group .................................................... 253
Figure 142 Management > Access Control > Logins .......................................................................... 254
Figure 143 SSH Communication Example ...........................................................................................255
Figure 144 How SSH Works ................................................................................................................. 255
Figure 145 HTTPS Implementation ...................................................................................................... 257
Figure 146 Security Alert Dialog Box (Internet Explorer) ...................................................................... 257
Figure 147 Security Certificate 1 (Netscape) ........................................................................................ 258
Figure 148 Security Certificate 2 (Netscape) ........................................................................................ 258
Figure 149 Example: Lock Denoting a Secure Connection .................................................................. 259
Figure 150 Management > Access Control > Service Access Control ................................................. 259
Figure 151 Management > Access Control > Remote Management .................................................. 260
Figure 152 Management > Diagnostic ................................................................................................. 263
Figure 153 Management > Syslog ....................................................................................................... 266
Figure 154 Management > Syslog > Server Setup ............................................................................. 267
Figure 155 Clustering Application Example ......................................................................................... 270
Figure 156 Management > Cluster Management ................................................................................ 270
Figure 157 Cluster Management: Cluster Member Web Configurator Screen .................................... 271
Figure 158 Example: Uploading Firmware to a Cluster Member Switch ............................................. 272
Figure 159 Management > Clustering Management > Configuration .................................................. 273
Figure 160 MAC Table Flowchart ........................................................................................................ 275
Figure 161 Management > MAC Table ................................................................................................ 276
Figure 162 Management > ARP Table ................................................................................................ 278
Figure 163 Management > Configure Clone .......................................................................................279
Figure 164 Console/Dial Backup Port Pin Layout ............................................................................... 291
Figure 165 WIndows 95/98/Me: Network: Configuration ...................................................................... 296
Figure 166 Windows 95/98/Me: TCP/IP Properties: IP Address .......................................................... 297
Figure 167 Windows 95/98/Me: TCP/IP Properties: DNS Configuration .............................................. 298
24
ES-3148 User’s Guide
Page 25
List of Figures
Figure 168 Windows XP: Start Menu .................................................................................................... 299
Figure 169 Windows XP: Control Panel ............................................................................................... 299
Figure 170 Windows XP: Control Panel: Network Connections: Properties ......................................... 300
Figure 171 Windows XP: Local Area Connection Properties ............................................................... 300
Figure 172 Windows XP: Internet Protocol (TCP/IP) Properties .......................................................... 301
Figure 173 Windows XP: Advanced TCP/IP Properties ....................................................................... 302
Figure 174 Windows XP: Internet Protocol (TCP/IP) Properties .......................................................... 303
Figure 175 Windows Vista: Start Menu ................................................................................................. 304
Figure 176 Windows Vista: Control Panel ............................................................................................ 304
Figure 177 Windows Vista: Network And Internet ................................................................................ 304
Figure 178 Windows Vista: Network and Sharing Center ..................................................................... 304
Figure 179 Windows Vista: Network and Sharing Center ..................................................................... 305
Figure 180 Windows Vista: Local Area Connection Properties ............................................................ 305
Figure 181 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties ................................... 306
Figure 182 Windows Vista: Advanced TCP/IP Properties .................................................................... 307
Figure 183 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties ................................... 308
Figure 184 Macintosh OS 8/9: Apple Menu .......................................................................................... 309
Figure 185 Macintosh OS 8/9: TCP/IP ................................................................................................. 309
Figure 186 Macintosh OS X: Apple Menu ............................................................................................ 310
Figure 187 Macintosh OS X: Network ...................................................................................................311
Figure 188 Red Hat 9.0: KDE: Network Configuration: Devices ......................................................... 312
Figure 189 Red Hat 9.0: KDE: Ethernet Device: General .................................................................. 312
Figure 190 Red Hat 9.0: KDE: Network Configuration: DNS ............................................................... 313
Figure 191 Red Hat 9.0: KDE: Network Configuration: Activate ........................................................ 313
Figure 192 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 ............................................... 314
Figure 193 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 ................................................... 314
Figure 194 Red Hat 9.0: DNS Settings in resolv.conf ........................................................................ 314
Figure 195 Red Hat 9.0: Restart Ethernet Card ................................................................................. 314
Figure 196 Red Hat 9.0: Checking TCP/IP Properties ....................................................................... 315
Figure 197 Pop-up Blocker ................................................................................................................... 317
Figure 198 Internet Options: Privacy .................................................................................................... 318
Figure 199 Internet Options: Privacy .................................................................................................... 319
Figure 200 Pop-up Blocker Settings ..................................................................................................... 319
Figure 201 Internet Options: Security ................................................................................................... 320
Figure 202 Security Settings - Java Scripting ....................................................................................... 321
Figure 203 Security Settings - Java ...................................................................................................... 321
Figure 204 Java (Sun) .......................................................................................................................... 322
Figure 205 Mozilla Firefox: Tools > Options ......................................................................................... 323
Figure 206 Mozilla Firefox Content Security ......................................................................................... 323
Figure 207 Network Number and Host ID ............................................................................................ 326
Figure 208 Subnetting Example: Before Subnetting ............................................................................ 328
Figure 209 Subnetting Example: After Subnetting ............................................................................... 329
Figure 210 Conflicting Computer IP Addresses Example .................................................................... 333
ES-3148 User’s Guide
25
Page 26
List of Figures
Figure 211 Conflicting Computer IP Addresses Example ..................................................................... 333
Figure 212 Conflicting Computer and Router IP Addresses Example .................................................. 334
Figure 213 Security Certificate ............................................................................................................. 339
Figure 214 Login Screen ...................................................................................................................... 340
Figure 215 Certificate General Information before Import .................................................................... 340
Figure 216 Certificate Import Wizard 1 ................................................................................................. 341
Figure 217 Certificate Import Wizard 2 ................................................................................................. 341
Figure 218 Certificate Import Wizard 3 ................................................................................................. 342
Figure 219 Root Certificate Store ......................................................................................................... 342
Figure 220 Certificate General Information after Import ....................................................................... 343
26
ES-3148 User’s Guide
Page 27

List of Tables

List of Tables
Table 1 Front Panel ............................................................................................................................... 43
Table 2 Rear Panel ................................................................................................................................ 46
Table 3 LEDs ......................................................................................................................................... 47
Table 4 Navigation Panel Sub-links Overview ....................................................................................... 53
Table 5 Web Configurator Screen Sub-links Details .............................................................................. 55
Table 6 Navigation Panel Links ............................................................................................................. 56
Table 7 Status ........................................................................................................................................ 67
Table 8 Status > Port Details ................................................................................................................. 69
Table 9 Basic Setting > System Info ...................................................................................................... 74
Table 10 Basic Setting > General Setup ................................................................................................ 76
Table 11 Basic Setting > Switch Setup .................................................................................................. 78
Table 12 Basic Setting > IP Setup ......................................................................................................... 80
Table 13 Basic Setting > Port Setup ...................................................................................................... 82
Table 14 IEEE 802.1Q VLAN Terminology ............................................................................................ 86
Table 15 Advanced Application > VLAN: VLAN Status .......................................................................... 88
Table 16 Advanced Application > VLAN > VLAN Detail ........................................................................ 89
Table 17 Advanced Application > VLAN > Static VLAN ......................................................................... 90
Table 18 Advanced Application > VLAN > VLAN Port Setting ............................................................... 91
Table 19 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN Setup ............... 93
Table 20 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN Setup ............. 96
Table 21 Advanced Application > VLAN: Port Based VLAN Setup ..................................................... 101
Table 22 Advanced Application > Static MAC Forwarding ................................................................... 104
Table 23 Advanced Application > FIltering .......................................................................................... 105
Table 24 STP Path Costs .................................................................................................................... 108
Table 25 STP Port States .................................................................................................................... 109
Table 26 Advanced Application > Spanning Tree Protocol > Configuration .........................................113
Table 27 Advanced Application > Spanning Tree Protocol > RSTP .....................................................114
Table 28 Advanced Application > Spanning Tree Protocol > Status: RSTP .........................................116
Table 29 Advanced Application > Spanning Tree Protocol > MRSTP ..................................................117
Table 30 Advanced Application > Spanning Tree Protocol > Status: MRSTP ......................................119
Table 31 Advanced Application > Spanning Tree Protocol > MSTP .................................................... 121
Table 32 Advanced Application > Spanning Tree Protocol > Status: MSTP ........................................ 123
Table 33 Advanced Application > Bandwidth Control .......................................................................... 126
Table 34 Advanced Application > Broadcast Storm Control ................................................................ 128
Table 35 Advanced Application > Mirroring ......................................................................................... 130
Table 36 Link Aggregation ID: Local Switch ........................................................................................ 132
Table 37 Link Aggregation ID: Peer Switch ......................................................................................... 132
Table 38 Advanced Application > Link Aggregation Status ................................................................. 132
ES-3148 User’s Guide
27
Page 28
List of Tables
Table 39 Advanced Application > Link Aggregation > Link Aggregation Setting ................................. 134
Table 40 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................... 135
Table 41 Advanced Application > Port Authentication > 802.1x .......................................................... 142
Table 42 Advanced Application > Port Authentication > MAC Authentication ..................................... 143
Table 43 Advanced Application > Port Security ................................................................................... 146
Table 44 Advanced Application > Classifier ......................................................................................... 150
Table 45 Classifier: Summary Table .................................................................................................... 152
Table 46 Common Ethernet Types and Protocol Number ................................................................... 152
Table 47 Common IP Protocol Types and Protocol Numbers ............................................................. 153
Table 48 Common TCP and UDP Port Numbers ................................................................................ 153
Table 49 Advanced Application > Policy Rule ..................................................................................... 157
Table 50 Policy: Summary Table ......................................................................................................... 158
Table 51 Advanced Application > Queuing Method ............................................................................. 163
Table 52 VLAN Tag Format ................................................................................................................. 167
Table 53 Single and Double Tagged 802.11Q Frame Format ............................................................. 167
Table 54 802.1Q Frame ....................................................................................................................... 167
Table 55 Advanced Application > VLAN Stacking ............................................................................... 168
Table 56 Multicast Status ..................................................................................................................... 172
Table 57 Advanced Application > Multicast > Multicast Setting ........................................................... 173
Table 58 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................... 175
Table 59 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile .................... 176
Table 60 Advanced Application > Multicast > Multicast Setting > MVR ............................................... 179
Table 61 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 181
Table 62 RADIUS vs TACACS+ .......................................................................................................... 186
Table 63 Advanced Application > Auth and Acct > RADIUS Server Setup ......................................... 187
Table 64 Advanced Application > Auth and Acct > TACACS+ Server Setup ...................................... 189
Table 65 Advanced Application > Auth and Acct > Auth and Acct Setup ............................................ 191
Table 66 Supported VSAs ................................................................................................................... 193
Table 67 Supported Tunnel Protocol Attribute ..................................................................................... 194
Table 68 RADIUS Attributes - Exec Events via Console ..................................................................... 196
Table 69 RADIUS Attributes - Exec Events via Telnet/SSH ................................................................ 196
Table 70 RADIUS Attributes - Exec Events via Console ..................................................................... 196
Table 71 Advanced Application > IP Source Guard ............................................................................. 203
Table 72 Advanced Application > IP Source Guard > Static Binding ................................................... 204
Table 73 Advanced Application > IP Source Guard > DHCP Snooping .............................................. 206
Table 74 Advanced Application > IP Source Guard > DHCP Snooping > Configure .......................... 208
Table 75 Advanced Application > IP Source Guard > DHCP Snooping > Configure > Port ................ 210
Table 76 Advanced Application > IP Source Guard > DHCP Snooping > Configure > VLAN ..............211
Table 77 Advanced Application > IP Source Guard > ARP Inspection ................................................ 212
Table 78 Advanced Application > IP Source Guard > ARP Inspection > VLAN Status ....................... 213
Table 79 Advanced Application > IP Source Guard > ARP Inspection > Log Status ........................... 214
Table 80 Advanced Application > IP Source Guard > ARP Inspection > Configure ............................ 215
Table 81 Advanced Application > IP Source Guard > ARP Inspection > Configure > Port ................. 217
28
ES-3148 User’s Guide
Page 29
List of Tables
Table 82 Advanced Application > IP Source Guard > ARP Inspection > Configure > VLAN .............. 218
Table 83 Advanced Application > Loop Guard ....................................................................................221
Table 84 IP Application > Static Routing .............................................................................................. 223
Table 85 IP Application > DiffServ ....................................................................................................... 228
Table 86 IP Application > DiffServ > 2-rate 3 Color Marker ................................................................. 229
Table 87 Default DSCP-IEEE 802.1p Mapping ................................................................................... 230
Table 88 IP Application > DiffServ > DSCP Setting .............................................................................231
Table 89 IP Application > DHCP Status ............................................................................................... 234
Table 90 Relay Agent Information ....................................................................................................... 235
Table 91 IP Application > DHCP > Global ........................................................................................... 235
Table 92 IP Application > DHCP > VLAN ............................................................................................ 237
Table 93 Management > Maintenance ................................................................................................ 239
Table 94 Filename Conventions .......................................................................................................... 243
Table 95 General Commands for GUI-based FTP Clients .................................................................. 244
Table 96 Access Control Overview ...................................................................................................... 245
Table 97 SNMP Commands ................................................................................................................ 246
Table 98 SNMP System Traps ............................................................................................................. 247
Table 99 SNMP Interface Traps ........................................................................................................... 248
Table 100 AAA Traps ........................................................................................................................... 249
Table 101 SNMP IP Traps ................................................................................................................... 249
Table 102 SNMP Switch Traps ............................................................................................................ 250
Table 103 Management > Access Control > SNMP ............................................................................ 251
Table 104 Management > Access Control > SNMP > Trap Group ...................................................... 253
Table 105 Management > Access Control > Logins ............................................................................ 254
Table 106 Management > Access Control > Service Access Control ................................................. 260
Table 107 Management > Access Control > Remote Management .................................................... 260
Table 108 Management > Diagnostic .................................................................................................. 263
Table 109 Syslog Severity Levels ........................................................................................................ 265
Table 110 Management > Syslog ........................................................................................................ 266
Table 111 Management > Syslog > Server Setup ................................................................................ 267
Table 112 ZyXEL Clustering Management Specifications ................................................................... 269
Table 113 Management > Cluster Management .................................................................................. 271
Table 114 FTP Upload to Cluster Member Example ........................................................................... 272
Table 115 Management > Clustering Management > Configuration ................................................... 273
Table 116 Management > MAC Table .................................................................................................. 276
Table 117 Management > ARP Table .................................................................................................. 278
Table 118 Management > Configure Clone ......................................................................................... 280
Table 119 Hardware and Environmental Specifications ....................................................................... 287
Table 120 Feature Specifications ......................................................................................................... 288
Table 121 Standards Supported .......................................................................................................... 289
Table 122 Console/Dial Backup Port Pin Assignments ....................................................................... 291
Table 123 Ethernet Cable Pin Assignments ........................................................................................ 291
Table 124 IP Address Network Number and Host ID Example ........................................................... 326
ES-3148 User’s Guide
29
Page 30
List of Tables
Table 125 Subnet Masks ..................................................................................................................... 327
Table 126 Maximum Host Numbers .................................................................................................... 327
Table 127 Alternative Subnet Mask Notation ....................................................................................... 327
Table 128 Subnet 1 .............................................................................................................................. 329
Table 129 Subnet 2 .............................................................................................................................. 330
Table 130 Subnet 3 .............................................................................................................................. 330
Table 131 Subnet 4 .............................................................................................................................. 330
Table 132 Eight Subnets ...................................................................................................................... 330
Table 133 24-bit Network Number Subnet Planning ............................................................................ 331
Table 134 16-bit Network Number Subnet Planning ............................................................................ 331
Table 135 Commonly Used Services ................................................................................................... 335
30
ES-3148 User’s Guide
Page 31
PART I

Introduction

Introducing the Switch (33)
31
Page 32
32
Page 33
CHAPTER 1

Introducing the Switch

This chapter introduces the main applications and features of the Switch. It also introduces the ways you can manage the Switch.
See Chapter 38 on page 287 for a complete list of features that are common to all of the models.

1.1 Overview

This section shows a few examples of using the Switch in various network environments.

1.1.1 Backbone Application

The Switch is an ideal solution for small networks where rapid growth can be expected in the near future. The Switch can be used standalone for a group of heavy-traffic users. You can connect computers directly to the Switch’s port or connect other switches to the Switch.
In this example, all computers share high-speed applications on the server. To expand the network, simply add more networking devices such as switches, routers, computers, print servers, etc.
Figure 1 Backbone Application
ES-3148 User’s Guide
33
Page 34
Chapter 1 Introducing the Switch

1.1.2 Bridging Example

The Switch can connect different company departments (RD and Sales) to the corporate backbone. It can alleviate bandwidth contention and eliminate server and network bottlenecks. All users that need high bandwidth can connect to high-speed department servers via the Switch. You can provide a super-fast uplink connection by using a Gigabit Ethernet/mini­GBIC port on the Switch. Moreover, the Switch eases supervision and maintenance by allowing network managers to centralize multiple servers at a single location.
Figure 2 Bridging Application

1.1.3 High-performance Switched Example

The Switch is ideal for connecting two networks that need high bandwidth. Switching to higher-speed LANs such as ATM (Asynchronous Transmission Mode) is not feasible for most people due to the expense of replacing all existing Ethernet cables and adapter cards, restructuring your network, and complex maintenance. The Switch can provide the same bandwidth as ATM at much lower cost while still being able to use existing adapters and switches. Moreover, the current LAN structure can be retained as all ports can freely communicate with each other.
In the following example, two Switches use trunking to connect two networks.
Figure 3 High-performance Switched Application
34
ES-3148 User’s Guide
Page 35

1.1.4 IEEE 802.1Q VLAN Application Examples

This section shows a workgroup and a shared server example using 802.1Q tagged VLANs.
A VLAN (Virtual Local Area Network) allows a physical network to be partitioned into multiple logical networks. Stations on a logical network belong to one group. A station can belong to more than one group. With VLAN, a station cannot directly talk to or hear from stations that are not in the same group(s) unless such traffic first goes through a router.
For more information on VLANs, refer to Chapter 8 on page 85.
1.1.4.1 Tag-based VLAN Example
Ports in the same VLAN group share the same frame-broadcast domain and thus increase network performance through reduced broadcast traffic. VLAN groups can be modified at any time by adding, moving or changing ports without any re-cabling.
Figure 4 Tag-based VLAN Application
Chapter 1 Introducing the Switch
1.1.4.2 VLAN Shared Server Example
Shared resources such as a server can be used by all ports in the same VLAN as the server, as shown in the following example. In this example, only ports that need access to the server need belong to VLAN 1. Ports can belong to other VLAN groups too.
ES-3148 User’s Guide
35
Page 36
Chapter 1 Introducing the Switch
Figure 5 Shared Server Using VLAN Example

1.2 Ways to Manage the Switch

Use any of the following methods to manage the Switch.
• Web Configurator. This is recommended for everyday management of the Switch using a (supported) web browser. See Chapter 4 on page 51.
• Command Line Interface. Line commands offer an alternative to the Web Configurator and may be necessary to configure advanced features. See the CLI Reference Guide.
• FTP. Use File Transfer Protocol for firmware upgrades and configuration backup/restore. See Section 29.8 on page 243.
• SNMP. The device can be monitored and/or managed by an SNMP manager. See Section
30.3 on page 246.

1.3 Good Habits for Managing the Switch

Do the following things regularly to make the Switch more secure and to manage the Switch more effectively.
• Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters.
• Write down the password and put it in a safe place.
• Back up the configuration (and make sure you know how to restore it). Restoring an earlier working configuration may be useful if the device becomes unstable or even crashes. If you forget your password, you will have to reset the Switch to its factory default settings. If you backed up an earlier configuration file, you would not have to totally re-configure the Switch. You could simply restore your last configuration.
36
ES-3148 User’s Guide
Page 37
PART II

Hardware

Hardware Installation and Connection (39)
Hardware Overview (43)
37
Page 38
38
Page 39
CHAPTER 2
Hardware Installation and
Connection
This chapter shows you how to install and connect the Switch.

2.1 Freestanding Installation

1 Make sure the Switch is clean and dry. 2 Set the Switch on a smooth, level surface strong enough to support the weight of the
Switch and the connected cables. Make sure there is a power outlet nearby.
3 Make sure there is enough clearance around the Switch to allow air circulation and the
attachment of cables and the power cord.
4 Remove the adhesive backing from the rubber feet. 5 Attach the rubber feet to each corner on the bottom of the Switch. These rubber feet help
protect the Switch from shock or vibration and ensure space between devices when stacking.
Figure 6 Attaching Rubber Feet
ES-3148 User’s Guide
39
Page 40
Chapter 2 Hardware Installation and Connection
" Do NOT block the ventilation holes. Leave space between devices when
stacking. For proper ventilation, allow at least 4 inches (10 cm) of clearance at the front and 3.4 inches (8 cm) at the back of the Switch. This is especially important for enclosed rack installations.

2.2 Mounting the Switch on a Rack

This section lists the rack mounting requirements and precautions and describes the installation steps.

2.2.1 Rack-mounted Installation Requirements

• Two mounting brackets.
• Eight M3 flat head screws and a #2 Phillips screwdriver.
• Four M5 flat head screws and a #2 Phillips screwdriver.
" Failure to use the proper screws may damage the unit.
2.2.1.1 Precautions
• Make sure the rack will safely support the combined weight of all the equipment it contains.
• Make sure the position of the Switch does not make the rack unstable or top-heavy. Take all necessary precautions to anchor the rack securely before installing the unit.

2.2.2 Attaching the Mounting Brackets to the Switch

1 Position a mounting bracket on one side of the Switch, lining up the four screw holes on
the bracket with the screw holes on the side of the Switch.
Figure 7 Attaching the Mounting Brackets
40
ES-3148 User’s Guide
Page 41
2 Using a #2 Phillips screwdriver, install the M3 flat head screws through the mounting
bracket holes into the Switch.
3 Repeat steps 1 and 2 to install the second mounting bracket on the other side of the
Switch.
4 You may now mount the Switch on a rack. Proceed to the next section.

2.2.3 Mounting the Switch on a Rack

1 Position a mounting bracket (that is already attached to the switch) on one side of the
rack, lining up the two screw holes on the bracket with the screw holes on the side of the rack.
Figure 8 Mounting the Switch on a Rack
Chapter 2 Hardware Installation and Connection
2 Using a #2 Phillips screwdriver, install the M5 flat head screws through the mounting
bracket holes into the rack.
3 Repeat steps 1 and 2 to attach the second mounting bracket on the other side of the rack.
ES-3148 User’s Guide
41
Page 42
Chapter 2 Hardware Installation and Connection
42
ES-3148 User’s Guide
Page 43
CHAPTER 3

Hardware Overview

This chapter describes the front panel and rear panel of the Switch and shows you how to make the hardware connections.

3.1 Panel Connections

The figure below shows the front panel of the Switch.
Figure 9 Front Panel
The following table describes the ports on the panels.
Table 1 Front Panel
CONNECTOR DESCRIPTION
48 10/100 Mbps RJ-45 Ethernet Ports
Two Dual Personality Interfaces
2 100/1000 Mbps RJ­45 Ports
2 Mini­GBIC Slots

3.1.1 Ethernet Ports

The Switch has 48 10/100Mbps auto-negotiating, auto-crossover Ethernet ports. In 10/ 100Mbps Fast Ethernet, the speed can be 10Mbps or 100Mbps and the duplex mode can be half duplex or full duplex.
10/100 Mbps Ethernet Ports
RJ-45 Gigabit / Mini-GBIC Dual Personality Interfaces
Connect these ports to a computer, a hub, an Ethernet switch or router.
Each interface has one 1000 Base-T RJ-45 port and one Small Form-Factor Pluggable (SFP) slot (also called a mini-GBIC slot), with one port or transceiver active at a time.
Connect these ports to high-bandwidth backbone network Ethernet switches using 1000Base-T compatible Category 5/5e/6 copper cables.
Use mini-GBIC transceivers in these slots for fiber-optic connections to backbone Ethernet switches.
ES-3148 User’s Guide
43
Page 44
Chapter 3 Hardware Overview
There are two pairs of Gigabit Ethernet/mini-GBIC ports. The mini-GBIC ports have priority over the Gigabit ports. This means that if a mini-GBIC port and the corresponding Gigabit port are connected at the same time, the Gigabit port will be disabled. The speed of the Gigabit Ethernet/mini-GBIC ports can be 100Mbps or 1000Mbps and the duplex mode can be half duplex (at 100 Mbps) or full duplex.
An auto-negotiating port can detect and adjust to the optimum Ethernet speed and duplex mode (full duplex or half duplex) of the connected device.
An auto-crossover (auto-MDI/MDI-X) port automatically works with a straight-through or crossover Ethernet cable.
3.1.1.1 Default Ethernet Settings
The factory default negotiation settings for the Ethernet ports on the switch are:
• Speed: Auto
• Duplex: Auto
• Flow control: Off

3.1.2 Mini-GBIC Slots

These are slots for mini-GBIC (Gigabit Interface Converter) transceivers. A transceiver is a single unit that houses a transmitter and a receiver. The Switch does not come with transceivers. You must use transceivers that comply with the SFP Transceiver MultiSource Agreement (MSA). See the SFF committee’s INF-8074i specification Rev 1.0 for details.
There are two pairs of Gigabit Ethernet/mini-GBIC ports. The mini-GBIC ports have priority over the Gigabit ports. This means that if a mini-GBIC port and the corresponding Gigabit port are connected at the same time, the Gigabit port will be disabled.
You can change transceivers while the Switch is operating. You can use different transceivers to connect to Ethernet switches with different types of fiber-optic connectors.
• Type: SFP connection interface
• Connection speed: 1 Gigabit per second (Gbps)
" To avoid possible eye injury, do not look into an operating fiber-optic module’s
connectors.
3.1.2.1 Transceiver Installation
Use the following steps to install a mini GBIC transceiver (SFP module).
1 Insert the transceiver into the slot with the exposed section of PCB board facing down.
44
ES-3148 User’s Guide
Page 45
Chapter 3 Hardware Overview
Figure 10 Transceiver Installation Example
2 Press the transceiver firmly until it clicks into place. 3 The Switch automatically detects the installed transceiver. Check the LEDs to verify that
it is functioning properly.
Figure 11 Installed Transceiver
3.1.2.2 Transceiver Removal
Use the following steps to remove a mini GBIC transceiver (SFP module).
1 Open the transceiver’s latch (latch styles vary).
Figure 12 Opening the Transceiver’s Latch Example
2 Pull the transceiver out of the slot.
Figure 13 Transceiver Removal Example

3.2 Rear Panel

The following figure shows the rear panel of the Switch.
ES-3148 User’s Guide
45
Page 46
Chapter 3 Hardware Overview
Figure 14 Rear Panel
Console Port
Management Port
RJ-45 Gigabit Ports for Stacking
The following table describes the ports on the panels.
Table 2 Rear Panel
CONNECTOR DESCRIPTION
2 100/1000 Mbps RJ-45 Ports
Console Port Only connect this port if you want to configure the Switch using the command line
Management Port
External Backup Power Supply (BPS)
Power Receptacle
Connect these ports to high-bandwidth backbone network Ethernet switches or use them to daisy-chain other switches.
interface (CLI) via the console port. See Section 3.2.1 on page 46.
Connect to a computer using an RJ-45 Ethernet cable for local configuration of the switch.
Connect this to an external BPS. See Section 3.2.2 on page 46.
Connect this to an appropriate power supply. See Section 3.2.3 on page 47.
External BPS
Power Receptacle

3.2.1 Console Port

For local management, you can use a computer with terminal emulation software configured to the following parameters:
• VT100 terminal emulation
• 9600 bps
• No parity, 8 data bits, 1 stop bit
• No flow control
Connect the male 9-pin end of the console cable to the console port of the Switch. Connect the female end to a serial port (COM1, COM2 or other COM port) of your computer.

3.2.2 External Backup Power Supply Connector

The Switch supports external backup power supply (BPS).
46
ES-3148 User’s Guide
Page 47
The backup power supply constantly monitors the status of the internal power supply. The backup power supply automatically provides power to the Switch in the event of a power failure. Once the Switch receives power from the backup power supply, it will not automatically switch back to using the internal power supply even when the power is resumed.

3.2.3 Power Connector

Make sure you are using the correct power source as shown on the panel.
To connect the power to the Switch, insert the female end of power cord to the power receptacle on the rear panel. Connect the other end of the supplied power cord to the power source. Make sure that no objects obstruct the airflow of the fans.

3.3 LEDs

The following table describes the LEDs on the Switch.
Table 3 LEDs
LED COLOR STATUS DESCRIPTION
BPS Green Blinking The system is receiving power from the backup power supply.
PWR Green On The system is turned on.
SYS Green Blinking The system is rebooting and performing self-diagnostic tests.
ALM Red On There is a hardware failure.
10/100 Mbps Ethernet Port
LNK/ACT Green Blinking The system is transmitting/receiving to/from a 10 Mbps Ethernet
Amber Blinking The system is transmitting/receiving to/from a 100 Mbps Ethernet
Dual Personality Interface
LNK/ACT Green Blinking The system is transmitting/receiving to/from a 10 Mbps or a 1000
Amber Blinking The system is transmitting/receiving to/from a 100 Mbps Ethernet
Chapter 3 Hardware Overview
On The backup power supply is connected and active.
Off The backup power supply is not ready or not active.
Off The system is off.
On The system is on and functioning properly.
Off The power is off or the system is not ready/malfunctioning.
Off The system is functioning normally.
network.
On The link to a 10 Mbps Ethernet network is up.
network.
On The link to a 100 Mbps Ethernet network is up.
Off The link to an Ethernet network is down or not connected.
Mbps Ethernet network.
On The link to a 10 Mbps or a 1000 Mbps Ethernet network is up.
network.
On The link to a 100 Mbps Ethernet network is up.
Off The link to an Ethernet network is down or not connected.
ES-3148 User’s Guide
47
Page 48
Chapter 3 Hardware Overview
Table 3 LEDs (continued)
LED COLOR STATUS DESCRIPTION
LNK Green On The port has a successful connection.
ACT Green Blinking The port is receiving or transmitting data.
Gigabit Port
LNK/ACT Green Blinking The system is transmitting/receiving to/from a 10 Mbps or a 1000
Amber Blinking The system is transmitting/receiving to/from a 100 Mbps Ethernet
FDX Amber On The port is negotiating in full-duplex mode.
MGMT
10 Green Blinking The system is transmitting/receiving to/from an Ethernet device.
100 Amber Blinking The system is transmitting/receiving to/from an Ethernet device.
Off No Ethernet device is connected to this port.
Mbps Ethernet network.
On The link to a 10 Mbps or a 1000 Mbps Ethernet network is up.
network.
On The link to a 100 Mbps Ethernet network is up.
Off The link to an Ethernet network is down.
Off The port is negotiating in half-duplex mode and no collisions are
occurring.
On The port is connected at 10 Mbps.
Off The port is not connected at 10 Mbps or to an Ethernet device.
On The port is connected at 100 Mbps.
Off The port is not connected at 100 Mbps or to an Ethernet device.
48
ES-3148 User’s Guide
Page 49
PART III

Web Configurator

The Web Configurator (51)
Initial Setup Example (63)
System Status and Port Statistics (67)
Basic Setting (73)
VLAN (85)
Static MAC Forward Setup (103)
Filtering (105)
Spanning Tree Protocol (107)
Bandwidth Control (125)
Broadcast Storm Control (127)
Mirroring (129)
Link Aggregation (131)
Port Authentication (139)
Port Security (145)
Classifier (149)
Policy Rule (155)
Queuing Method (161)
VLAN Stacking (165)
Multicast (171)
Authentication & Accounting (185)
IP Source Guard (199)
Loop Guard (219)
Static Routing (223)
49
Page 50
Differentiated Services (225)
DHCP (233)
Maintenance (239)
Access Control (245)
Diagnostic (263)
Syslog (265)
Cluster Management (269)
MAC Table (275)
ARP Table (277)
Configure Clone (279)
50
Page 51
CHAPTER 4

The Web Configurator

This section introduces the configuration and functions of the web configurator.

4.1 Introduction

The web configurator is an HTML-based management interface that allows easy Switch setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions. The recommended screen resolution is 1024 by 768 pixels.
In order to use the web configurator you need to allow:
• Web browser pop-up windows from your device. Web pop-up blocking is enabled by default in Windows XP SP (Service Pack) 2.
• JavaScript (enabled by default).
• Java permissions (enabled by default).

4.2 System Login

1 Start your web browser. 2 Type “http://” and the IP address of the Switch (for example, the default is 192.168.1.1)
in the Location or Address field. Press [ENTER].
3 The login screen appears. The default username is admin and associated default
password is 1234. The date and time display as shown if you have not configured a time server nor manually entered a time and date in the General Setup screen.
ES-3148 User’s Guide
51
Page 52
Chapter 4 The Web Configurator
Figure 15 Web Configurator: Login
4 Click OK to view the first web configurator screen.

4.3 The Status Screen

The Status screen is the first screen that displays when you access the web configurator.
The following figure shows the navigating components of a web configurator screen.
Figure 16 Web Configurator Home Screen (Status)
B
C
DE
A
A - Click the menu items to open submenu links, and then click on a submenu link to open the screen in the main window.
52
B, C, D, E - These are quick links which allow you to perform certain tasks no matter which screen you are currently working in.
ES-3148 User’s Guide
Page 53
B - Click this link to save your configuration into the Switch’s nonvolatile memory. Nonvolatile memory is saved in the configuration file from which the Switch booted from and it stays the same even if the Switch’s power is turned off. See Section 29.3 on page 240 for information on saving your settings to a specific configuration file.
C - Click this link to go to the status page of the Switch.
D - Click this link to logout of the web configurator.
E - Click this link to display web help pages. The help pages provide descriptions for all of the
configuration screens.
In the navigation panel, click a main link to reveal a list of submenu links.
Table 4 Navigation Panel Sub-links Overview
BASIC SETTING
ADVANCED APPLICATION
Chapter 4 The Web Configurator
IP APPLICATION MANAGEMENT
ES-3148 User’s Guide
53
Page 54
Chapter 4 The Web Configurator
The following table lists the various web configurator screens within the sub-links.
54
ES-3148 User’s Guide
Page 55
Table 5 Web Configurator Screen Sub-links Details
BASIC SETTING
System Info General Setup Switch Setup IP Setup Port Setup
ADVANCED APPLICATION
VLAN Status
VLAN Detail VLAN Port Setting Subnet Based
VLAN Protocol Based VLAN Static VLAN
Static MAC Forwarding Filtering Spanning Tree Protocol
Status
Spanning Tree Configuration
Rapid Spanning Tree Protocol Multiple Rapid Spanning Tree Protocol
Multiple Spanning Tree Protocol
Bandwidth Control Broadcast Storm
Control Mirroring Link Aggregation Status
Link Aggregation Setting
Link Aggregation Control Protocol
Port Authentication
802.1x MAC Authentication
Port Security Classifier Policy Rule Queuing Method VLAN Stacking Multicast Status
Multicast Setting IGMP Snooping
VLAN IGMP Filtering Profile MVR Group Configuration
IP APPLICATION MANAGEMENT
Static Routing DiffServ
DHCP Status
Chapter 4 The Web Configurator
2-rate 3 Color Marker
DSCP Setting
DHCP Relay VLAN Setting
Maintenance
Firmware Upgrade Restore
Configuration Backup
Configuration
Access Control
SNMP Trap Group Logins Service Access
Control Remote
Management
Diagnostic Syslog Setup
Syslog Server
Setup Cluster Management Status
Clustering
Management
Configuration MAC Table
ARP Table Configure Clone
ES-3148 User’s Guide
55
Page 56
Chapter 4 The Web Configurator
Table 5 Web Configurator Screen Sub-links Details (continued)
BASIC SETTING
ADVANCED APPLICATION
Authentication and Accounting
RADIUS Server Setup
TACACS+ Ser ver Setup Auth and Acct Setup
IP Source Guard
IP Source Guard Static Binding DHCP Snooping
DHCP Snooping Configure
DHCP Snooping Port Configure DHCP Snooping VLAN Configure
ARP Inspection Status
ARP Inspection VLAN Status ARP Inspection Log Status
ARP Inspection Configure
ARP Inspection Port Configure ARP Inspection VLAN Configure
Loopguard
IP APPLICATION MANAGEMENT
The following table describes the links in the navigation panel.
Table 6 Navigation Panel Links
LINK DESCRIPTION
Basic Setting
System Info This link takes you to a screen that displays general system and hardware
monitoring information.
General Setup This link takes you to a screen where you can configure general identification
information about the Switch.
Switch Setup This link takes you to a screen where you can set up global Switch parameters
IP Setup This link takes you to a screen where you can configure the management IP
Port Setup This link takes you to screens where you can configure settings for individual
Advanced Application
VLAN This link takes you to screens where you can configure port-based or 802.1Q
Static MAC Forwarding
such as VLAN type, MAC address learning, GARP and priority queues.
address, subnet mask (necessary for Switch management) and DNS (domain name server).
Switch ports.
VLAN (depending on what you configured in the Switch Setup menu). You can also configure a protocol based VLAN or a subnet based VLAN in these screens.
This link takes you to screens where you can configure static MAC addresses for a port. These static MAC addresses do not age out.
56
ES-3148 User’s Guide
Page 57
Chapter 4 The Web Configurator
Table 6 Navigation Panel Links (continued)
LINK DESCRIPTION
Filtering This link takes you to a screen to set up filtering rules.
Spanning Tree Protocol
Bandwidth Control
Broadcast Storm Control
Mirroring This link takes you to screens where you can copy traffic from one port or ports to
Link Aggregation This link takes you to a screen where you can logically aggregate physical links to
Port Authentication
Port Security This link takes you to a screen where you can activate MAC address learning and
Classifier This link takes you to a screen where you can configure the Switch to group
Policy Rule This link takes you to a screen where you can configure the Switch to perform
Queuing Method This link takes you to a screen where you can configure queuing with associated
VLAN Stacking This link takes you to a screen where you can configure VLAN stacking.
Multicast This link takes you to a screen where you can configure various multicast features
Auth and Acct This link takes you to a screen where you can configure authentication and
IP Source Guard This link takes you to a screen where you can configure filtering of unauthorized
Loop Guard This link takes you to a screen where you can configure protection against network
IP Application
Static Route This link takes you to screens where you can configure static routes. A static route
DiffServ This link takes you to screens where you can enable DiffServ, configure marking
DHCP This link takes you to a screen where you can configure the DHCP settings.
Management
Maintenance This link takes you to screens where you can perform firmware and configuration
Access Control This link takes you to screens where you can change the system login password
Diagnostic This link takes you to screens where you can view system logs and test port(s).
This link takes you to screens where you can configure the RSTP/MRSTP/MSTP to prevent network loops.
This link takes you to screens where you can cap the maximum bandwidth allowed from specified source(s) to specified destination(s).
This link takes you to a screen to set up broadcast filters.
another port in order that you can examine the traffic from the first port without interference
form one logical, higher-bandwidth link.
This link takes you to a screen where you can configure IEEE 802.1x port authentication as well as MAC authentication for clients communicating via the Switch.
set the maximum number of MAC addresses to learn on a port.
packets based on the specified criteria.
special treatment on the grouped packets.
queue weights for each port.
and create multicast VLANs.
accounting services via external servers. The external servers can be either RADIUS (Remote Authentication Dial-In User Service) or TACACS+ (Terminal Access Controller Access-Control System Plus).
DHCP and ARP packets in your network.
loops that occur on the edge of your network.
defines how the Switch should forward traffic by configuring the TCP/IP parameters manually.
rules and set DSCP-to-IEEE802.1p mappings.
file maintenance as well as reboot the system.
and configure SNMP and remote management.
ES-3148 User’s Guide
57
Page 58
Chapter 4 The Web Configurator
Table 6 Navigation Panel Links (continued)
LINK DESCRIPTION
Syslog This link takes you to screens where you can setup system logs and a system log
server.
Cluster Management
MAC Table This link takes you to a screen where you can view the MAC addresses (and types)
ARP Table This link takes you to a screen where you can view the MAC addresses – IP
Configure Clone This link takes you to a screen where you can copy attributes of one port to other
This link takes you to a screen where you can configure clustering management and view its status.
of devices attached to what ports and VLAN IDs.
address resolution table.
ports.

4.3.1 Change Your Password

After you log in for the first time, it is recommended you change the default administrator password. Click Management > Access Control > Logins to display the next screen.
Figure 17 Change Administrator Login Password

4.4 Saving Your Configuration

When you are done modifying the settings in a screen, click Apply to save your changes back to the run-time memory. Settings in the run-time memory are lost when the Switch’s power is turned off.
Click the Save link in the upper right hand corner of the web configurator to save your configuration to nonvolatile memory. Nonvolatile memory refers to the Switch’s storage that remains even if the Switch’s power is turned off.
58
ES-3148 User’s Guide
Page 59
Chapter 4 The Web Configurator
" Use the Save link when you are done with a configuration session.

4.5 Switch Lockout

You could block yourself (and all others) from using in-band-management (managing through the data ports) if you do one of the following:
1 Delete the management VLAN (default is VLAN 1). 2 Delete all port-based VLANs with the CPU port as a member. The “CPU port” is the
management port of the Switch.
3 Filter all traffic to the CPU port. 4 Disable all ports. 5 Misconfigure the text configuration file. 6 Forget the password and/or IP address. 7 Prevent all services from accessing the Switch. 8 Change a service port number but forget it.
" Be careful not to lock yourself and others out of the Switch. If you do lock
yourself out, try using out-of-band management (via the management port) to configure the Switch.

4.6 Resetting the Switch

If you lock yourself (and others) from the Switch or forget the administrator password, you will need to reload the factory-default configuration file.

4.6.1 Reload the Configuration File

Uploading the factory-default configuration file replaces the current configuration file with the factory-default configuration file. This means that you will lose all previous configurations and the speed of the console port will be reset to the default of 9600bps with 8 data bit, no parity, one stop bit and flow control set to none. The password will also be reset to “1234” and the IP address to 192.168.1.1.
To upload the configuration file, do the following:
1 Connect to the console port using a computer with terminal emulation software. See
Section 3.2.1 on page 46 for details.
2 Disconnect and reconnect the Switch’s power to begin a session. When you reconnect
the Switch’s power, you will see the initial screen.
ES-3148 User’s Guide
59
Page 60
Chapter 4 The Web Configurator
3 When you see the message “Press any key to enter Debug Mode within 3
seconds ...
4 Type
atlc after the “Enter Debug Mode” message.
5 Wait for the “
upload on your terminal.
6 After a configuration file upload, type
Figure 18 Resetting the Switch: Via the Console Port
Bootbase Version: V0.6 | 03/06/2006 09:21:13 RAM:Size = 32 Mbytes DRAM POST: Testing: 32768K OK DRAM Test SUCCESS ! FLASH: Intel 32M
ZyNOS Version: 3.70(AID.0)b0 | 4/28/2006 17:27:36
Press any key to enter debug mode within 3 seconds.
.................................
Enter Debug Mode
” press any key to enter debug mode.
Starting XMODEM upload” message before activating XMODEM
atgo to restart the Switch.
Switch> atlc
Starting XMODEM upload (CRC mode)....
CCCCCCCCCCCCCCCC Total 262144 bytes received. Erasing..
................................................................
OK Switch> atgo
The Switch is now reinitialized with a default configuration file including the default password of “1234”.

4.7 Logging Out of the Web Configurator

Click Logout in a screen to exit the web configurator. You have to log in with your password again after you log out. This is recommended after you finish a management session for security reasons.
Figure 19 Web Configurator: Logout Screen
60
ES-3148 User’s Guide
Page 61

4.8 Help

The web configurator’s online help has descriptions of individual screens and some supplementary information.
Click the Help link from a web configurator screen to view an online help description of that screen.
Chapter 4 The Web Configurator
ES-3148 User’s Guide
61
Page 62
Chapter 4 The Web Configurator
62
ES-3148 User’s Guide
Page 63
CHAPTER 5

Initial Setup Example

This chapter shows how to set up the Switch for an example network.

5.1 Overview

The following lists the configuration steps for the initial setup:
• Create a VLAN
• Set port VLAN ID
• Configure the Switch IP management address

5.1.1 Creating a VLAN

VLANs confine broadcast frames to the VLAN group in which the port(s) belongs. You can do this with port-based VLAN or tagged static VLAN with fixed port members. In this example, you want to configure port 1 as a member of VLAN 2.
Figure 20 Initial Setup Network Example: VLAN
mple
a
x
e
1 Click Advanced Application > VLAN > Static VLAN.
mple
xa
e
ES-3148 User’s Guide
63
Page 64
Chapter 5 Initial Setup Example
2 In the Static VLAN screen, select
ACTIVE, enter a descriptive
name in the Name field, and enter 2 in the VLAN Group ID field for the VLAN2 network.
e
l
examp
" The VLAN Group ID field in this screen and the VID field in the IP Setup
screen refer to the same VLAN ID.
3 Since the VLAN2 network is connected to port 1 on the Switch, select Fixed to
configure port 1 to be a permanent member of the VLAN only.
4 To ensure that VLAN-unaware devices (such as computers and hubs) can receive frames
properly, clear the TX Tagging check box to set the Switch to remove VLAN tags before sending.
5 Click Add to save the settings to the run-time memory. Settings in the run-time memory
are lost when the Switch’s power is turned off.

5.1.2 Setting Port VID

Use PVID to add a tag to incoming untagged frames received on that port so that the frames are forwarded to the VLAN group that the tag defines. In the example network, configure 2 as the port VID on port 1 so that any untagged frames received on that port get sent to VLAN 2.
Figure 21 Initial Setup Network Example: Port VID
64
ES-3148 User’s Guide
Page 65
Chapter 5 Initial Setup Example
1 Click Advanced Application >
VLAN > VLAN Port Setting.
2 Enter 2 in the PVID field for port
1, and click Apply to save your changes back to the run-time memory. Settings in the run-time memory are lost when the Switch’s power is turned off.
e
l
p
m
a
x

5.2 Configuring Switch Management IP Address

The default management IP address of the Switch is 192.168.1.1. You can configure another IP address in a different subnet for management purposes. The following figure shows an example.
Figure 22 Initial Setup Example: Management IP Address
e
1 Connect your computer to any Ethernet port on the Switch. Make sure your computer is
in the same subnet as the Switch.
2 Open your web browser and enter 192.168.1.1 (the default IP address) in the address bar
to access the web configurator. See Section 4.2 on page 51 for more information.
ES-3148 User’s Guide
65
Page 66
Chapter 5 Initial Setup Example
3 Click Basic Setting > IP Setup. 4 Configure the related fields in the
IP Setup screen. For the VLAN2 network, enter
192.168.2.1 as the IP address and
255.255.255.0 as the subnet mask.
5 In the VID field, enter the ID of
the VLAN group to which you want this management IP address to belong. This is the same as the VLAN ID you configure in the Static VLAN screen.
6 Select the Manageable check box
to allow the Switch to be managed from the ports belonging to VLAN2 using this specified IP address.
7 Repeat this process for VLAN1, if necessary.
Click Add to save your changes back to the run-time memory. Settings in the run-time memory are lost when the Switch’s power is turned off.
e
xa
mp
e
l
66
ES-3148 User’s Guide
Page 67
CHAPTER 6
System Status and Port
Statistics
This chapter describes the system status (web configurator home page) and port details screens.

6.1 Overview

The home screen of the web configurator displays a port statistical summary with links to each port showing statistical details.

6.2 Port Status Summary

To view the port statistics, click Status in all web configurator screens to display the Status screen as shown next.
Figure 23 Status
The following table describes the labels in this screen.
Table 7 Status
LABEL DESCRIPTION
Port This identifies the Ethernet port. Click a port number to display the Port Details
Name This is the name you assigned to this port in the Basic Setting > Port Setup screen.
Link This field displays the speed (either 10M for 10Mbps, 100M for 100Mbps or 1000M
screen (refer to Figure 24 on page 69).
for 1000Mbps) and the duplex (F for full duplex or H for half). It also shows the cable type (Copper or Fiber) for the combo ports.
ES-3148 User’s Guide
67
Page 68
Chapter 6 System Status and Port Statistics
Table 7 Status (continued)
LABEL DESCRIPTION
State If STP (Spanning Tree Protocol) is enabled, this field displays the STP state of the
port (see Section 11.1.3 on page 109 for more information). If STP is disabled, this field displays FORWARDING if the link is up, otherwise, it
displays STOP.
LACP This fields displays whether LACP (Link Aggregation Control Protocol) has been
enabled on the port.
TxPkts This field shows the number of transmitted frames on this port.
RxPkts This field shows the number of received frames on this port.
Errors This field shows the number of received errors on this port.
Tx KB/s This field shows the number of kilobytes per second transmitted on this port.
Rx KB/s This field shows the number of kilobytes per second received on this port.
Up Time This field shows the total amount of time in hours, minutes and seconds the port has
been up.
Clear Counter Enter a port number and then click Clear Counter to erase the recorded statistical
information for that port, or select Any to clear statistics for all ports.
6.2.1 Status: Port Details
Click a number in the Port column in the Status screen to display individual port statistics. Use this screen to check status and detailed performance data about an individual port on the Switch.
68
ES-3148 User’s Guide
Page 69
Figure 24 Status: Port Details
Chapter 6 System Status and Port Statistics
The following table describes the labels in this screen.
Table 8 Status > Port Details
LABEL DESCRIPTION
Port Info
Port NO. This field displays the port number you are viewing.
Name This field displays the name of the port.
Link This field displays the speed (either 10M for 10Mbps, 100M for 100Mbps or 1000M for
1000Mbps) and the duplex (F for full duplex or H for half duplex). It also shows the cable type (Copper or Fiber).
Status If STP (Spanning Tree Protocol) is enabled, this field displays the STP state of the port
(see Section 11.1.3 on page 109 for more information). If STP is disabled, this field displays FORWARDING if the link is up, otherwise, it
displays STOP.
LACP This field shows if LACP is enabled on this port or not.
TxPkts This field shows the number of transmitted frames on this port
RxPkts This field shows the number of received frames on this port
Errors This field shows the number of received errors on this port.
Tx KB/s This field shows the number kilobytes per second transmitted on this port.
Rx KB/s This field shows the number of kilobytes per second received on this port.
ES-3148 User’s Guide
69
Page 70
Chapter 6 System Status and Port Statistics
Table 8 Status > Port Details (continued)
LABEL DESCRIPTION
Up Time This field shows the total amount of time the connection has been up.
Tx Packet The following fields display detailed information about packets transmitted.
TX Packets
Multicast This field shows the number of good multicast packets transmitted.
Broadcast This field shows the number of good broadcast packets transmitted.
Pause This field shows the number of 802.3x Pause packets transmitted.
Tagged This field shows the number of packets with VLAN tags transmitted.
Rx Packet The following fields display detailed information about packets received.
RX Packets
Multicast This field shows the number of good multicast packets received.
Broadcast This field shows the number of good broadcast packets received.
Pause This field shows the number of 802.3x Pause packets received.
Control This field shows the number of control packets received (including those with CRC
TX Collision The following fields display information on collisions while transmitting.
Single This is a count of successfully transmitted packets for which transmission is inhibited
Multiple This is a count of successfully transmitted packets for which transmission was
Excessive This is a count of packets for which transmission failed due to excessive collisions.
Late This is the number of times a late collision is detected, that is, after 512 bits of the
Error Packet The following fields display detailed information about packets received that were in
RX CRC This field shows the number of packets received with CRC (Cyclic Redundant Check)
Length This field shows the number of packets received with a length that was out of range.
Runt This field shows the number of packets received that were too short (shorter than 64
Distribution
64 This field shows the number of packets (including bad packets) received that were 64
65 to 127 This field shows the number of packets (including bad packets) received that were
128 to 255 This field shows the number of packets (including bad packets) received that were
256 to 511 This field shows the number of packets (including bad packets) received that were
512 to 1023
This field shows the number of good packets (unicast, multicast and broadcast) transmitted.
This field shows the number of good packets (unicast, multicast and broadcast) received.
error) but it does not include the 802.3x Pause packets.
by exactly one collision.
inhibited by more than one collision.
Excessive collision is defined as the number of maximum collisions before the retransmission count is reset.
packets have already been transmitted.
error.
error(s).
octets), including the ones with CRC errors.
octets in length.
between 65 and 127 octets in length.
between 128 and 255 octets in length.
between 256 and 511 octets in length.
This field shows the number of packets (including bad packets) received that were between 512 and 1023 octets in length.
70
ES-3148 User’s Guide
Page 71
Chapter 6 System Status and Port Statistics
Table 8 Status > Port Details (continued)
LABEL DESCRIPTION
1024 to 1518
Giant This field shows the number of packets dropped because they were bigger than the
This field shows the number of packets (including bad packets) received that were between 1024 and 1518 octets in length.
maximum frame size.
ES-3148 User’s Guide
71
Page 72
Chapter 6 System Status and Port Statistics
72
ES-3148 User’s Guide
Page 73
CHAPTER 7

Basic Setting

This chapter describes how to configure the System Info, General Setup, Switch Setup, IP Setup and Port Setup screens.

7.1 Overview

The System Info screen displays general Switch information (such as firmware version number) and hardware polling information (such as fan speeds). The General Setup screen allows you to configure general Switch identification information. The General Setup screen also allows you to set the system time manually or get the current time and date from an external server when you turn on your Switch. The real time is then displayed in the Switch logs. The Switch Setup screen allows you to set up and configure global Switch features. The IP Setup screen allows you to configure a Switch IP address, subnet mask(s) and DNS (domain name server) for management purposes.

7.2 System Information

In the navigation panel, click Basic Setting > System Info to display the screen as shown. You can check the firmware version number and monitor the Switch temperature, fan speeds and voltage in this screen.
ES-3148 User’s Guide
73
Page 74
Chapter 7 Basic Setting
Figure 25 Basic Setting > System Info
The following table describes the labels in this screen.
Table 9 Basic Setting > System Info
LABEL DESCRIPTION
System Name This field displays the descriptive name of the Switch for identification purposes.
ZyNOS F/W Ver si on
Ethernet Address
Hardware Monitor
Temperature Unit
Temperature MAC, CPU and PHY refer to the location of the temperature sensors on the Switch’s
Current This shows the current temperature at this sensor.
MAX This field displays the maximum temperature measured at this sensor.
MIN This field displays the minimum temperature measured at this sensor.
Threshold This field displays the upper temperature limit at this sensor.
Status This field displays Normal for temperatures below the threshold and Error for those
FAN Speed (RPM)
This field displays the version number of the Switch 's current firmware including the date created.
This field refers to the Ethernet MAC (Media Access Control) address of the Switch.
The Switch has temperature sensors that are capable of detecting and reporting if the temperature rises above the threshold. You may choose the temperature unit (Centigrade or Fahrenheit) in this field.
printed circuit board.
above.
A properly functioning fan is an essential component (along with a sufficiently ventilated, cool operating environment) in order for the device to stay within the temperature threshold. Each fan has a sensor that is capable of detecting and reporting if the fan speed falls below the threshold shown.
74
ES-3148 User’s Guide
Page 75
Chapter 7 Basic Setting
Table 9 Basic Setting > System Info (continued)
LABEL DESCRIPTION
Current This field displays this fan's current speed in Revolutions Per Minute (RPM).
MAX This field displays this fan's maximum speed measured in Revolutions Per Minute
MIN This field displays this fan's minimum speed measured in Revolutions Per Minute
Threshold This field displays the minimum speed at which a normal fan should work.
Status Normal indicates that this fan is functioning above the minimum speed. Error
Voltage(V) The power supply for each voltage has a sensor that is capable of detecting and
Current This is the current voltage reading.
MAX This field displays the maximum voltage measured at this point.
MIN This field displays the minimum voltage measured at this point.
Threshold This field displays the percentage tolerance of the voltage with which the Switch still
Status Normal indicates that the voltage is within an acceptable operating range at this
(RPM).
(RPM). "<41" is displayed for speeds too small to measure (under 2000 RPM).
indicates that this fan is functioning below the minimum speed.
reporting if the voltage falls out of the tolerance range.
works.
point; otherwise Error is displayed.

7.3 General Setup

Use this screen to configure general settings such as the system name and time. Click Basic Setting and General Setup in the navigation panel to display the screen as shown.
Figure 26 Basic Setting > General Setup
ES-3148 User’s Guide
75
Page 76
Chapter 7 Basic Setting
The following table describes the labels in this screen.
Table 10 Basic Setting > General Setup
LABEL DESCRIPTION
System Name Choose a descriptive name for identification purposes. This name consists of up to
Location Enter the geographic location of your Switch. You can use up to 32 printable ASCII
Contact Person's Name
Use Time Server when Bootup
Time Server IP Address
Current Time This field displays the time you open this menu (or refresh the menu).
New Time (hh:min:ss)
Current Date This field displays the date you open this menu.
New Date (yyyy­mm-dd)
Time Zone Select the time difference between UTC (Universal Time Coordinated, formerly
Daylight Saving Time
Start Date Configure the day and time when Daylight Saving Time starts if you selected
64 printable characters; spaces are allowed.
characters; spaces are allowed.
Enter the name of the person in charge of this Switch. You can use up to 32 printable ASCII characters; spaces are allowed.
Enter the time service protocol that your timeserver uses. Not all time servers support all protocols, so you may have to use trial and error to find a protocol that works. The main differences between them are the time format.
When you select the Daytime (RFC 867) format, the Switch displays the day, month, year and time with no time zone adjustment. When you use this format it is recommended that you use a Daytime timeserver within your geographical time zone.
Time (RFC-868) format displays a 4-byte integer giving the total number of seconds since 1970/1/1 at 0:0:0.
NTP (RFC-1305) is similar to Time (RFC-868). None is the default value. Enter the time manually. Each time you turn on the
Switch, the time and date will be reset to 1970-1-1 0:0.
Enter the IP address of your timeserver. The Switch searches for the timeserver for up to 60 seconds. If you select a timeserver that is unreachable, then this screen will appear locked for 60 seconds. Please wait.
Enter the new time in hour, minute and second format. The new time then appears in the Current Time field after you click Apply.
Enter the new date in year, month and day format. The new date then appears in the Current Date field after you click Apply.
known as GMT, Greenwich Mean Time) and your time zone from the drop-down list box.
Daylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening.
Select this option if you use Daylight Saving Time.
Daylight Saving Time. The time is displayed in the 24 hour format. Here are a couple of examples:
Daylight Saving Time starts in most parts of the United States on the second Sunday of March. Each time zone in the United States starts using Daylight Saving Time at 2 A.M. local time. So in the United States you would select Second, Sunday, March and 2:00.
Daylight Saving Time starts in the European Union on the last Sunday of March. All of the time zones in the European Union start using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select Last, Sunday, March and the last field depends on your time zone. In Germany for instance, you would select 2:00 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1).
76
ES-3148 User’s Guide
Page 77
Chapter 7 Basic Setting
Table 10 Basic Setting > General Setup (continued)
LABEL DESCRIPTION
End Date Configure the day and time when Daylight Saving Time ends if you selected
Daylight Saving Time. The time field uses the 24 hour format. Here are a couple of examples:
Daylight Saving Time ends in the United States on the first Sunday of November. Each time zone in the United States stops using Daylight Saving Time at 2 A.M. local time. So in the United States you would select First, Sunday, November and 2:00.
Daylight Saving Time ends in the European Union on the last Sunday of October. All of the time zones in the European Union stop using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select Last, Sunday, October and the last field depends on your time zone. In Germany for instance, you would select 2:00 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1).
Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch
Cancel Click Cancel to begin configuring this screen afresh.
loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.

7.4 Introduction to VLANs

A VLAN (Virtual Local Area Network) allows a physical network to be partitioned into multiple logical networks. Devices on a logical network belong to one group. A device can belong to more than one group. With VLAN, a device cannot directly talk to or hear from devices that are not in the same group(s); the traffic must first go through a router.
In MTU (Multi-Tenant Unit) applications, VLAN is vital in providing isolation and security among the subscribers. When properly configured, VLAN prevents one subscriber from accessing the network resources of another on the same LAN, thus a user will not see the printers and hard disks of another user in the same building.
VLAN also increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain. In traditional switched environments, all broadcast packets go to each and every individual port. With VLAN, all broadcasts are confined to a specific broadcast domain.
" VLAN is unidirectional; it only governs outgoing traffic.
See Chapter 8 on page 85 for information on port-based and 802.1Q tagged VLANs.

7.5 Switch Setup Screen

Click Basic Setting and then Switch Setup in the navigation panel to display the screen as shown. The VLAN setup screens change depending on whether you choose 802.1Q or Port Based in the VLAN Type field in this screen. Refer to the chapter on VLAN.
ES-3148 User’s Guide
77
Page 78
Chapter 7 Basic Setting
Figure 27 Basic Setting > Switch Setup
The following table describes the labels in this screen.
Tabl e 11 Basic Setting > Switch Setup
LABEL DESCRIPTION
VLAN Type Choose 802.1Q or Port Based. The VLAN Setup screen changes depending on
Bridge Control Protocol Transparency
MAC Address Learning
Aging Time Enter a time from 10 to 3000 seconds. This is how long all dynamically learned MAC
GARP Timer: Switches join VLANs by making a declaration. A declaration is made by issuing a Join message using GARP. Declarations are withdrawn by issuing a Leave message. A Leave All message terminates all registrations. GARP timers set declaration timeout values. See the chapter on VLAN setup for more background information.
Join Timer Join Timer sets the duration of the Join Period timer for GVRP in milliseconds. Each
Leave Timer Leave Time sets the duration of the Leave Period timer for GVRP in milliseconds.
Leave All Timer Leave All Timer sets the duration of the Leave All Period timer for GVRP in
whether you choose 802.1Q VLAN type or Port Based VLAN type in this screen. See Chapter 8 on page 85 for more information.
Select Active to allow the Switch to handle bridging control protocols (STP for example). You also need to define how to treat a BPDU in the Port Setup screen.
MAC address learning reduces outgoing traffic broadcasts. For MAC address learning to occur on a port, the port must be active.
addresses remain in the MAC address table before they age out (and must be relearned).
port has a Join Period timer. The allowed Join Time range is between 100 and 65535 milliseconds; the default is 200 milliseconds. See the chapter on VLAN setup for more background information.
Each port has a single Leave Period timer. Leave Time must be two times larger than Join Timer; the default is 600 milliseconds.
milliseconds. Each port has a single Leave All Period timer. Leave All Timer must be larger than Leave Timer.
78
ES-3148 User’s Guide
Page 79
Chapter 7 Basic Setting
Tabl e 11 Basic Setting > Switch Setup (continued)
LABEL DESCRIPTION
Priority Queue Assignment IEEE 802.1p defines up to eight separate traffic types by inserting a tag into a MAC-layer frame that
contains bits to define class of service. Frames without an explicit priority tag are given the default priority of the ingress port. Use the next two fields to configure the priority level-to-physical queue mapping.
The Switch has eight physical queues that you can map to the 8 priority levels. On the Switch, traffic assigned to higher index queues gets through faster while traffic in lower index queues is dropped if the network is congested.
Priority Level (The following descriptions are based on the traffic types defined in the IEEE 802.1d standard (which incorporates the 802.1p).
Level 7 Typically used for network control traffic such as router configuration messages.
Level 6 Typically used for voice traffic that is especially sensitive to jitter (jitter is the
variations in delay).
Level 5 Typically used for video that consumes high bandwidth and is sensitive to jitter.
Level 4 Typically used for controlled load, latency-sensitive traffic such as SNA (Systems
Network Architecture) transactions.
Level 3 Typically used for “excellent effort” or better than best effort and would include
Level 2 This is for “spare bandwidth”.
Level 1 This is typically used for non-critical “background” traffic such as bulk transfers that
Level 0 Typically used for best-effort traffic.
Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch
Cancel Click Cancel to begin configuring this screen afresh.
important business traffic that can tolerate some delay.
are allowed but that should not affect other applications and users.
loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.

7.6 IP Setup

Use the IP Setup screen to configure the default gateway device, the default domain name server and add IP domains.

7.6.1 IP Interfaces

The Switch needs an IP address for it to be managed over the network. The factory default IP address is 192.168.1.1. The subnet mask specifies the network number portion of an IP address. The factory default subnet mask is 255.255.255.0.
You can configure multiple IP addresses which are used to access and manage the switch from the ports belonging to the pre-defined VLAN(s).
" You must configure the VLAN first.
ES-3148 User’s Guide
79
Page 80
Chapter 7 Basic Setting
Figure 28 Basic Setting > IP Setup
The following table describes the labels in this screen.
Table 12 Basic Setting > IP Setup
LABEL DESCRIPTION
Domain Name Server
Default Management
In-band Management IP Address
DHCP Client Select this option if you have a DHCP server that can assign the Switch an IP address,
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. Enter a domain name server IP address in order to be able to use a domain name instead of an IP address.
Specify which traffic flow (In-Band or Out-of-band) the Switch is to send packets originating from itself (such as SNMP traps) or packets with unknown source.
Select Out-of-band to have the Switch send the packets to the out-of-band management port. This means that device(s) connected to the other port(s) do not receive these packets.
Select In-Band to have the Switch send the packets to all ports except the out-of-band management port to which connected device(s) do not receive these packets.
subnet mask, a default gateway IP address and a domain name server IP address automatically.
80
ES-3148 User’s Guide
Page 81
Chapter 7 Basic Setting
Table 12 Basic Setting > IP Setup (continued)
LABEL DESCRIPTION
Static IP Address
IP Address Enter the IP address of your Switch in dotted decimal notation for example 192.168.1.1.
IP Subnet Mask
Default Gateway
VID Enter the VLAN identification number associated with the Switch IP address. VID is the
Out-of-band Management IP Address
IP Address Enter the IP address of your Switch in dotted decimal notation for example 192.168.0.1.
IP Subnet Mask
Default Gateway
Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses
Cancel Click Cancel to reset the fields.
In-band IP Addresses
IP Address Enter the IP address for managing the Switch by the members of the VLAN specified in
IP Subnet Mask
VID Type the VLAN group identification number.
Default Gateway
Manageable Select this option to allow the Switch to be managed using this specified IP address.
Add Click Add to save the new rule to the Switch’s run-time memory. It then displays in the
Cancel Click Cancel to reset the fields.
Index This field displays the index number of an entry. Click an index number to edit the rule.
IP Address This field displays the IP address.
IP Subnet Mask
VID This field displays the VLAN identification number of the network.
Default Gateway
Select this option if you don’t have a DHCP server or if you wish to assign static IP address information to the Switch. You need to fill in the following fields when you select this option.
Enter the IP subnet mask of your Switch in dotted decimal notation for example
255.255.255.0.
Enter the IP address of the default outgoing gateway in dotted decimal notation, for example 192.168.1.254.
VLAN ID of the CPU and is used for management only. The default is "1". All ports, by default, are fixed members of this "management VLAN" in order to manage the device from any port. If a port is not a member of this VLAN, then users on that port cannot access the device. To access the Switch make sure the port that you are connected to is a member of Management VLAN.
If you change this IP address, make sure the computer connected to this management port is in the same subnet before accessing the Switch.
Enter the IP subnet mask of your Switch in dotted decimal notation for example
255.255.255.0.
Enter the IP address of the default outgoing gateway in dotted decimal notation, for example 192.168.0.254.
these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
You can create up to 64 IP addresses which are used to access and manage the Switch from the ports belonging to the pre-defined VLAN(s). You must configure a VLAN first.
the VID field below.
Enter the IP subnet mask in dotted decimal notation.
Enter the IP address of the default outgoing gateway in dotted decimal notation.
summary table at the bottom of the screen.
This field displays the subnet mask.
This field displays the IP address of the default outgoing gateway.
ES-3148 User’s Guide
81
Page 82
Chapter 7 Basic Setting
Table 12 Basic Setting > IP Setup (continued)
LABEL DESCRIPTION
Manageable This field displays whether the Switch can be managed using the specified IP address.
Delete Click Delete to remove the selected entry from the summary table.
Cancel Click Cancel to clear the Delete check boxes.

7.7 Port Setup

Use this screen to configure Switch port settings. Click Basic Setting > Port Setup in the navigation panel to display the configuration screen.
Figure 29 Basic Setting > Port Setup
The following table describes the labels in this screen.
Table 13 Basic Setting > Port Setup
LABEL DESCRIPTION
Port This is the port index number.
* Settings in this row apply to all ports.
Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
Note: Changes in this row are copied to all the ports as soon as you
make them.
Active Select this check box to enable a port. The factory default for all ports is enabled. A
port must be enabled for data transmission to occur.
Name Enter a descriptive name that identifies this port. You can enter up to 64 alpha-
numerical characters.
Note: Due to space limitation, the port name may be truncated in
some web configurator screens.
Type This field displays 10/100M for an Ethernet/Fast Ethernet connection and 10/100/
1000M for Gigabit connections.
82
ES-3148 User’s Guide
Page 83
Chapter 7 Basic Setting
Table 13 Basic Setting > Port Setup (continued)
LABEL DESCRIPTION
Speed/Duplex Select the speed and the duplex mode of the Ethernet connection on this port.
Choices are Auto, 10M/Half Duplex, 10M/Full Duplex, 100M/Half Duplex, 100M/ Full Duplex and 1000M/Full Duplex (for Gigabit ports only).
Selecting Auto (auto-negotiation) allows one port to negotiate with a peer port automatically to obtain the connection speed and duplex mode that both ends support. When auto-negotiation is turned on, a port on the Switch negotiates with the peer automatically to determine the connection speed and duplex mode. If the peer port does not support auto-negotiation or turns off this feature, the Switch determines the connection speed by detecting the signal on the cable and using half duplex mode. When the Switch’s auto-negotiation is turned off, a port uses the pre­configured speed and duplex mode when making a connection, thus requiring you to make sure that the settings of the peer port are the same in order to connect.
Flow Control A concentration of traffic on a port decreases port bandwidth and overflows buffer
802.1p Priority This priority value is added to incoming frames without a (802.1p) priority queue tag.
BPDU Control Configure the way to treat BPDUs received on this port. You must activate bridging
Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses
Cancel Click Cancel to begin configuring this screen afresh.
memory causing packet discards and frame losses. Flow Control is used to regulate transmission of signals to match the bandwidth of the receiving port.
The Switch uses IEEE 802.3x flow control in full duplex mode and backpressure flow control in half duplex mode.
IEEE 802.3x flow control is used in full duplex mode to send a pause signal to the sending port, causing it to temporarily stop sending signals when the receiving port memory buffers fill.
Back Pressure flow control is typically used in half duplex mode to send a "collision" signal to the sending port (mimicking a state of packet collision) causing the sending port to temporarily stop sending signals and resend later. Select Flow Control to enable it.
See Priority Queue Assignment in Table 11 on page 78 for more information.
control protocol transparency in the Switch Setup screen first. Select Peer to process any BPDU (Bridge Protocol Data Units) received on this port. Select Tunn el to forward BPDUs received on this port. Select Discard to drop any BPDU received on this port. Select Network to process a BPDU with no VLAN tag and forward a tagged BPDU.
these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
ES-3148 User’s Guide
83
Page 84
Chapter 7 Basic Setting
84
ES-3148 User’s Guide
Page 85
CHAPTER 8

VLAN

The type of screen you see here depends on the VLAN Type you selected in the Switch Setup screen. This chapter shows you how to configure 802.1Q tagged and port-based VLANs.

8.1 Introduction to IEEE 802.1Q Tagged VLANs

A tagged VLAN uses an explicit tag (VLAN ID) in the MAC header to identify the VLAN membership of a frame across bridges - they are not confined to the switch on which they were created. The VLANs can be created statically by hand or dynamically through GVRP. The VLAN ID associates a frame with a specific VLAN and provides the information that switches need to process the frame across the network. A tagged frame is four bytes longer than an untagged frame and contains two bytes of TPID (Tag Protocol Identifier, residing within the type/length field of the Ethernet frame) and two bytes of TCI (Tag Control Information, starts after the source address field of the Ethernet frame).
The CFI (Canonical Format Indicator) is a single-bit flag, always set to zero for Ethernet switches. If a frame received at an Ethernet port has a CFI set to 1, then that frame should not be forwarded as it is to an untagged port. The remaining twelve bits define the VLAN ID, giving a possible maximum number of 4,096 VLANs. Note that user priority and VLAN ID are independent of each other. A frame with VID (VLAN Identifier) of null (0) is called a priority frame, meaning that only the priority level is significant and the default VID of the ingress port is given as the VID of the frame. Of the 4096 possible VIDs, a VID of 0 is used to identify priority frames and value 4095 (FFF) is reserved, so the maximum possible VLAN configurations are 4,094.
TPID 2 Bytes
User Priority 3 Bits
CFI 1 Bit
VLAN ID 12 bits

8.1.1 Forwarding Tagged and Untagged Frames

Each port on the Switch is capable of passing tagged or untagged frames. To forward a frame from an 802.1Q VLAN-aware switch to an 802.1Q VLAN-unaware switch, the Switch first decides where to forward the frame and then strips off the VLAN tag. To forward a frame from an 802.1Q VLAN-unaware switch to an 802.1Q VLAN-aware switch, the Switch first decides where to forward the frame, and then inserts a VLAN tag reflecting the ingress port's default VID. The default PVID is VLAN 1 for all ports, but this can be changed.
A broadcast frame (or a multicast frame for a multicast group that is known by the system) is duplicated only on ports that are members of the VID (except the ingress port itself), thus confining the broadcast to a specific domain.
ES-3148 User’s Guide
85
Page 86
Chapter 8 VLAN

8.2 Automatic VLAN Registration

GARP and GVRP are the protocols used to automatically register VLAN membership across switches.

8.2.1 GARP

GARP (Generic Attribute Registration Protocol) allows network switches to register and de­register attribute values with other GARP participants within a bridged LAN. GARP is a protocol that provides a generic mechanism for protocols that serve a more specific application, for example, GVRP.
8.2.1.1 GARP Timers
Switches join VLANs by making a declaration. A declaration is made by issuing a Join message using GARP. Declarations are withdrawn by issuing a Leave message. A Leave All message terminates all registrations. GARP timers set declaration timeout values.

8.2.2 GVRP

GVRP (GARP VLAN Registration Protocol) is a registration protocol that defines a way for switches to register necessary VLAN members on ports across the network. Enable this function to permit VLAN groups beyond the local Switch.
Please refer to the following table for common IEEE 802.1Q VLAN terminology.
Table 14 IEEE 802.1Q VLAN Terminology
VLAN PARAMETER TERM DESCRIPTION
VLAN Type Permanent VLAN This is a static VLAN created manually.
Dynamic VLAN This is a VLAN configured by a GVRP registration/
deregistration process.
VLAN Administrative Control
VLAN Tag Control Tagged Ports belonging to the specified VLAN tag all outgoing
VLAN Port Port VID This is the VLAN ID assigned to untagged frames that
Registration Fixed Fixed registration ports are permanent VLAN members.
Registration Forbidden
Normal Registration Ports dynamically join a VLAN using GVRP.
Untagged Ports belonging to the specified VLAN don't tag all
Acceptable Frame Type
Ingress filtering If set, the Switch discards incoming frames for VLANs
Ports with registration forbidden are forbidden to join the specified VLAN.
frames transmitted.
outgoing frames transmitted.
this port received.
You may choose to accept both tagged and untagged incoming frames, just tagged incoming frames or just untagged incoming frames on a port.
that do not have this port as a member
86
ES-3148 User’s Guide
Page 87

8.3 Port VLAN Trunking

Enable VLAN Trunking on a port to allow frames belonging to unknown VLAN groups to pass through that port. This is useful if you want to set up VLAN groups on end devices without having to configure the same VLAN groups on intermediary devices.
Refer to the following figure. Suppose you want to create VLAN groups 1 and 2 (V1 and V2) on devices A and B. Without VLAN Trunking, you must configure VLAN groups 1 and 2 on all intermediary switches C, D and E; otherwise they will drop frames with unknown VLAN group tags. However, with VLAN Trunking enabled on a port(s) in each intermediary switch you only need to create VLAN groups in the end devices (A and B). C, D and E automatically allow frames with VLAN group tags 1 and 2 (VLAN groups that are unknown to those switches) to pass through their VLAN trunking port(s).
Figure 30 Port VLAN Trunking
Chapter 8 VLAN

8.4 Select the VLAN Type

Select a VLAN type in the Basic Setting > Switch Setup screen.
Figure 31 Switch Setup: Select VLAN Type

8.5 Static VLAN

Use a static VLAN to decide whether an incoming frame on a port should be
• sent to a VLAN group as normal depending on its VLAN tag.
• sent to a group whether it has a VLAN tag or not.
• blocked from a VLAN group regardless of its VLAN tag.
You can also tag all outgoing frames (that were previously untagged) from a port with the specified VID.
ES-3148 User’s Guide
87
Page 88
Chapter 8 VLAN
8.5.1 Static VLAN Status
See Section 8.1 on page 85 for more information on Static VLAN. Click Advanced Application > VLAN from the navigation panel to display the VLAN Status screen as shown
next.
Figure 32 Advanced Application > VLAN: VLAN Status
The following table describes the labels in this screen.
Table 15 Advanced Application > VLAN: VLAN Status
LABEL DESCRIPTION
The Number of VLAN
Index This is the VLAN index number. Click on an index number to view more VLAN
VID This is the VLAN identification number that was configured in the Static VLAN
Elapsed Time This field shows how long it has been since a normal VLAN was registered or a
Status This field shows how this VLAN was added to the Switch; dynamic - using GVRP,
Change Pages Click Previous or Next to show the previous/next screen if all status information
This is the number of VLANs configured on the Switch.
details.
screen.
static VLAN was set up.
static - added as a permanent entry or other - added in another way such as via Multicast VLAN Registration (MVR).
cannot be seen in one screen.
8.5.2 Static VLAN Details
Use this screen to view detailed port settings and status of the VLAN group. See Section 8.1
on page 85 for more information on static VLAN. Click on an index number in the VLAN
Status screen to display VLAN details.
Figure 33 Advanced Application > VLAN > VLAN Detail
88
ES-3148 User’s Guide
Page 89
The following table describes the labels in this screen.
Table 16 Advanced Application > VLAN > VLAN Detail
LABEL DESCRIPTION
VLAN Status Click this to go to the VLAN Status screen.
VID This is the VLAN identification number that was configured in the Static VLAN
screen.
Port Number This column displays the ports that are participating in a VLAN. A tagged port is
marked as T, an untagged port is marked as U and ports not participating in a VLAN are marked as “–“.
Elapsed Time This field shows how long it has been since a normal VLAN was registered or a
static VLAN was set up.
Status This field shows how this VLAN was added to the Switch; dynamic - using GVRP,
static - added as a permanent entry or other - added in another way such as via Multicast VLAN Registration (MVR).
8.5.3 Configure a Static VLAN
Use this screen to configure and view 802.1Q VLAN parameters for the Switch. See Section
8.1 on page 85 for more information on static VLAN. To configure a static VLAN, click
Static VLAN in the VLAN Status screen to display the screen as shown next.
Chapter 8 VLAN
Figure 34 Advanced Application > VLAN > Static VLAN
ES-3148 User’s Guide
89
Page 90
Chapter 8 VLAN
The following table describes the related labels in this screen.
Table 17 Advanced Application > VLAN > Static VLAN
LABEL DESCRIPTION
ACTIVE Select this check box to activate the VLAN settings.
Name Enter a descriptive name for the VLAN group for identification purposes. This name
VLAN Group ID Enter the VLAN ID for this static entry; the valid range is between 1 and 4094.
Port The port number identifies the port you are configuring.
* Settings in this row apply to all ports.
Control Select Normal for the port to dynamically join this VLAN group using GVRP. This is
Tagging Select TX Tagging if you want the port to tag all outgoing frames transmitted with
Add Click Add to save your changes to the Switch’s run-time memory. The Switch loses
Cancel Click Cancel to begin configuring this screen afresh.
Clear Click Clear to start configuring the screen again.
VID This field displays the ID number of the VLAN group. Click the number to edit the
Active This field indicates whether the VLAN settings are enabled (Yes) or disabled (No).
Name This field displays the descriptive name for this VLAN group.
Delete Click Delete to remove the selected entry from the summary table.
Cancel Click Cancel to clear the Delete check boxes.
consists of up to 64 printable characters; spaces are allowed.
Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
Note: Changes in this row are copied to all the ports as soon as you
make them.
the default selection. Select Fixed for the port to be a permanent member of this VLAN group. Select Forbidden if you want to prohibit the port from joining this VLAN group.
this VLAN Group ID.
these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
VLAN settings.
8.5.4 Configure VLAN Port Settings
Use the VLAN Port Setting screen to configure the static VLAN (IEEE 802.1Q) settings on a port. See Section 8.1 on page 85 for more information on static VLAN. Click the VLAN Port Setting link in the VLAN Status screen.
90
ES-3148 User’s Guide
Page 91
Chapter 8 VLAN
Figure 35 Advanced Application > VLAN > VLAN Port Setting
The following table describes the labels in this screen.
Table 18 Advanced Application > VLAN > VLAN Port Setting
LABEL DESCRIPTION
GVRP GVRP (GARP VLAN Registration Protocol) is a registration protocol that defines a
way for switches to register necessary VLAN members on ports across the network.
Select this check box to permit VLAN groups beyond the local Switch.
Port Isolation Port Isolation allows each port to communicate only with the CPU management
port and the Gigabit uplink ports but not communicate with each other. This option is the most limiting but also the most secure.
Port This field displays the port number.
* Settings in this row apply to all ports.
Use this row only if you want to make some settings the same for all ports. Use this row first to set the common settings and then make adjustments on a port-by-port basis.
Ingress Check If this check box is selected for a port, the Switch discards incoming frames for
PVID Enter a number between 1and 4094 as the port VLAN ID.
GVRP Select this check box to allow GVRP on this port.
Acceptable Frame Type
VLAN Trunking Enable VLAN Trunking on ports connected to other switches or routers (but not
ES-3148 User’s Guide
Note: Changes in this row are copied to all the ports as soon as you
make them.
VLANs that do not include this port in its member set. Clear this check box to disable ingress filtering.
Specify the type of frames allowed on a port. Choices are All and Tag On ly. Select All from the drop-down list box to accept all untagged or tagged frames on
this port. This is the default setting. Select Tag Only to accept only tagged frames on this port. All untagged frames
will be dropped. Select Untag Only to accept only untagged frames on this port. All tagged frames
will be dropped.
ports directly connected to end users) to allow frames belonging to unknown VLAN groups to pass through the Switch.
91
Page 92
Chapter 8 VLAN
Table 18 Advanced Application > VLAN > VLAN Port Setting (continued)
LABEL DESCRIPTION
Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch
loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Cancel Click Cancel to begin configuring this screen afresh.

8.6 Subnet Based VLANs

Subnet based VLANs allow you to group traffic into logical VLANs based on the source IP subnet you specify. When a frame is received on a port, the Switch checks if a tag is added already and the IP subnet it came from. The untagged packets from the same IP subnet are then placed in the same subnet based VLAN. One advantage of using subnet based VLANs is that priority can be assigned to traffic from the same IP subnet.
For example, an ISP (Internet Services Provider) may divide different types of services it provides to customers into different IP subnets. Traffic for voice services is designated for IP subnet 172.16.1.0/24, video for 192.168.1.0/24 and data for 10.1.1.0/24. The Switch can then be configured to group incoming traffic based on the source IP subnet of incoming frames.
You configure a subnet based VLAN with priority 6 and VID of 100 for traffic received from IP subnet 172.16.1.0/24 (voice services). You also have a subnet based VLAN with priority 5 and VID of 200 for traffic received from IP subnet 192.168.1.0/24 (video services). Lastly, you configure VLAN with priority 3 and VID of 300 for traffic received from IP subnet
10.1.1.0/24 (data services). All untagged incoming frames will be classified based on their source IP subnet and prioritized accordingly. That is video services receive the highest priority and data the lowest.
Figure 36 Subnet Based VLAN Application Example
Tagged Frames
Internet
Untagged Frames
172.16.1.0/24 VID = 100
192.168.1.0/24 VID = 200
10.1.1.0/24 VID = 300
92
ES-3148 User’s Guide
Page 93
Chapter 8 VLAN

8.7 Configuring Subnet Based VLAN

Click Subnet Based VLAN in the VLAN Port Setting screen to display the configuration screen as shown.
" Subnet based VLAN applies to un-tagged packets and is applicable only when
you use IEEE 802.1Q tagged VLAN.
Figure 37 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN
The following table describes the labels in this screen.
Table 19 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN Setup
LABEL DESCRIPTION
Active Check this box to activate this subnet based VLANs on the Switch.
DHCP-Vlan Override
Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses
ES-3148 User’s Guide
When DHCP snooping is enabled DHCP clients can renew their IP address through the DHCP VLAN or via another DHCP server on the subnet based VLAN.
Select this to force the DHCP clients in this IP subnet to obtain their IP addresses through the DHCP VLAN.
these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
93
Page 94
Chapter 8 VLAN
Table 19 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN Setup
LABEL DESCRIPTION
Active Check this box to activate the IP subnet VLAN you are creating or editing.
Name Enter up to 32 alpha numeric characters to identify this subnet based VLAN.
IP Enter the IP address of the subnet for which you want to configure this subnet based
Mask-Bits Enter the bit number of the subnet mask. To find the bit number, convert the subnet
Source Port Enter the port to which this subnet based VLAN is bound.
VID Enter the ID of a VLAN with which the untagged frames from the IP subnet specified in
Priority Select the priority level that the Switch assigns to frames belonging to this VLAN.
Add Click Add to save your changes to the Switch’s run-time memory. The Switch loses
Cancel Click Cancel to begin configuring this screen afresh.
Index This is the index number identifying this subnet based VLAN. Click on any of these
Active This field shows whether the subnet based VLAN is active or not.
Name This field shows the name the subnet based VLAN.
IP This field shows the IP address of the subnet for this subnet based VLAN.
Mask-Bits This field shows the subnet mask in bit number format for this subnet based VLAN.
Source Port This field shows the port to which this subnet based VLAN is bound.
VID This field shows the VLAN ID of the frames which belong to this subnet based VLAN.
Priority This field shows the priority which is assigned to frames belonging to this subnet
Delete Click this to delete the subnet based VLANs which you marked for deletion.
Cancel Click Cancel to begin configuring this screen afresh.
VLAN.
mask to binary format and add all the 1’s together. Take “255.255.255.0” for example. 255 converts to eight 1s in binary. There are three 255s, so add three eights together and you get the bit number (24).
this subnet based VLAN are tagged. This must be an existing VLAN which you defined in the Advanced Applications, VLAN screens.
these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
numbers to edit an existing subnet based VLAN.
based VLAN.

8.8 Protocol Based VLANs

Protocol based VLANs allow you to group traffic into logical VLANs based on the protocol you specify. When an upstream frame is received on a port (configured for a protocol based VLAN), the Switch checks if a tag is added already and its protocol. The untagged packets of the same protocol are then placed in the same protocol based VLAN. One advantage of using protocol based VLANs is that priority can be assigned to traffic of the same protocol.
" Protocol based VLAN applies to un-tagged packets and is applicable only
when you use IEEE 802.1Q tagged VLAN.
94
ES-3148 User’s Guide
Page 95
Chapter 8 VLAN
For example, port 1, 2, 3 and 4 belong to static VLAN 100, and port 4, 5, 6, 7 belong to static VLAN 120. You configure a protocol based VLAN A with priority 3 for ARP traffic received on port 1, 2 and 3. You also have a protocol based VLAN B with priority 2 for Apple Talk traffic received on port 6 and 7. All upstream ARP traffic from port 1, 2 and 3 will be grouped together, and all upstream Apple Talk traffic from port 6 and 7 will be in another group and have higher priority than ARP traffic, when they go through the uplink port to a backbone switch C.
Figure 38 Protocol Based VLAN Application Example

8.9 Configuring Protocol Based VLAN

Click Protocol Based VLAN in the VLAN Port Setting screen to display the configuration screen as shown.
" Protocol-based VLAN applies to un-tagged packets and is applicable only
when you use IEEE 802.1Q tagged VLAN.
ES-3148 User’s Guide
95
Page 96
Chapter 8 VLAN
Figure 39 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN
The following table describes the labels in this screen.
Tabl e 20 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN Setup
LABEL DESCRIPTION
Active Check this box to activate this protocol based VLAN.
Port Type a port to be included in this protocol based VLAN.
Name Enter up to 32 alpha numeric characters to identify this protocol based VLAN.
Ethernet-type Use the drop down list box to select a predefined protocol to be included in this
This port must belong to a static VLAN in order to participate in a protocol based VLAN. See Chapter 8 on page 85 for more details on setting up VLANs.
protocol based VLAN or select Others and type the protocol number in hexadecimal notation. For example the IP protocol in hexadecimal notation is 0800, and Novell IPX protocol is 8137.
96
Note: Protocols in the hexadecimal number range of 0x0000 to 0x05ff
are not allowed to be used for protocol based VLANs.
VID Enter the ID of a VLAN to which the port belongs. This must be an existing VLAN
which you defined in the Advanced Applications, VLAN screens.
Priority Select the priority level that the Switch will assign to frames belonging to this VLAN.
Add Click Add to save your changes to the Switch’s run-time memory. The Switch loses
these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Cancel Click Cancel to begin configuring this screen afresh.
Index This is the index number identifying this protocol based VLAN. Click on any of these
numbers to edit an existing protocol based VLAN.
Active This field shows whether the protocol based VLAN is active or not.
Port This field shows which port belongs to this protocol based VLAN.
Name This field shows the name the protocol based VLAN.
Ethernet Type This field shows which Ethernet protocol is part of this protocol based VLAN.
ES-3148 User’s Guide
Page 97
Table 20 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN Setup
LABEL DESCRIPTION
VID This field shows the VLAN ID of the port.
Priority This field shows the priority which is assigned to frames belonging to this protocol
based VLAN.
Delete Click this to delete the protocol based VLANs which you marked for deletion.
Cancel Click Cancel to begin configuring this screen afresh.

8.10 Create an IP-based VLAN Example

This example shows you how to create an IP VLAN which includes ports 1, 4 and 8. Follow these steps:
1 Activate this protocol based VLAN. 2 Type the port number you want to include in this protocol based VLAN. Type 1. 3 Give this protocol-based VLAN a descriptive name. Type IP-VLAN. 4 Select the protocol. Leave the default value IP. 5 Type the VLAN ID of an existing VLAN. In our example we already created a static
VLAN with an ID of 5. Type 5.
6 Leave the priority set to 0 and click Add.
Chapter 8 VLAN
Figure 40 Protocol Based VLAN Configuration Example
e
l
mp
xa
e
To add more ports to this protocol based VLAN.
1 Click the index number of the protocol based VLAN entry. Click 1 2 Change the value in the Port field to the next port you want to add. 3 Click Add.
ES-3148 User’s Guide
97
Page 98
Chapter 8 VLAN

8.11 Port-based VLAN Setup

Port-based VLANs are VLANs where the packet forwarding decision is based on the destination MAC address and its associated port.
Port-based VLANs require allowed outgoing ports to be defined for each port. Therefore, if you wish to allow two subscriber ports to talk to each other, for example, between conference rooms in a hotel, you must define the egress (an egress port is an outgoing port, that is, a port through which a data packet leaves) for both ports.
Port-based VLANs are specific only to the Switch on which they were created.
" When you activate port-based VLAN, the Switch uses a default VLAN ID of 1.
You cannot change it.
" In screens (such as IP Setup and Filtering) that require a VID, you must enter
1 as the VID.
The port-based VLAN setup screen is shown next. The CPU management port forms a VLAN with all Ethernet ports.

8.11.1 Configure a Port-based VLAN

Select Port Based as the VLAN Type in the Switch Setup screen and then click VLAN from the navigation panel to display the next screen.
98
ES-3148 User’s Guide
Page 99
Chapter 8 VLAN
Figure 41 Advanced Application > VLAN: Port Based VLAN Setup (All Connected)
ES-3148 User’s Guide
99
Page 100
Chapter 8 VLAN
Figure 42 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation)
100
ES-3148 User’s Guide
Loading...