ES-3148 Series
Intelligent Layer 2+ Switch
User’s Guide
Version 3.80
8/2007
Edition 1
DEFAULT LOGIN
IP Address http://192.168.1.1
User Name admin
Password 1234
www.zyxel.com
About This User's Guide
About This User's Guide
Intended Audience
This manual is intended for people who want to configure the Switch using the web
configurator. You should have at least a basic knowledge of TCP/IP networking concepts and
topology.
Related Documentation
• Web Configurator Online Help
Embedded web help for descriptions of individual screens and supplementary
information.
• Command Reference Guide
The Command Reference Guide explains how to use the Command-Line Interface (CLI)
and CLI commands to configure the Switch.
" It is recommended you use the web configurator to configure the Switch.
• Supporting Disk
Refer to the included CD for support documents.
• ZyXEL Web Site
Please refer to www.zyxel.com
certifications.
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for
improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team,
ZyXEL Communications Corp.,
6 Innovation Road II,
Science-Based Industrial Park,
Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
for additional support documentation and product
ES-3148 User’s Guide
3
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The ES-3148 may be referred to as the “Switch”, the “device”, the “system” or the
“product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key.
“Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example,
Maintenance > Log > Log Setting means you first click Maintenance in the navigation
panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For
example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000”
or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
ES-3148 User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The Switch icon is not an
exact representation of your device.
Switch Computer Notebook computer
Server DSLAM Firewall
Telephone Switch Router
ES-3148 User’s Guide
5
Safety Warnings
Safety Warnings
1 For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk
of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel should
service or disassemble this device. Please contact your vendor for further information.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right
supply voltage (for example, 110V AC in North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the
product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause
electrocution.
• If the power adaptor or cord is damaged, remove it from the device and the power source.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a
new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a
remote risk of electric shock from lightning.
• Caution: Risk of explosion if battery (on the motherboard) is replaced by an incorrect
type. Dispose of used batteries according to the instructions. Dispose them at the
applicable collection point for the recycling of electrical and electronic equipment. For
detailed information about recycling of this product, please contact your local city office,
your household waste disposal service or the store where you purchased the product.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
6
This product is recyclable. Dispose of it properly.
ES-3148 User’s Guide
Safety Warnings
ES-3148 User’s Guide
7
Safety Warnings
8
ES-3148 User’s Guide
Contents Overview
Contents Overview
Introduction ............................................................................................................................31
Introducing the Switch ............................................................................................................... 33
Hardware .................................................................................................................................37
Hardware Installation and Connection ....................................................................................... 39
Hardware Overview ................................................................................................................... 43
Web Configurator ...................................................................................................................49
The Web Configurator ............................................................................................................... 51
Initial Setup Example ................................................................................................................. 63
System Status and Port Statistics ..............................................................................................67
Basic Setting ............................................................................................................................. 73
VLAN ......................................................................................................................................... 85
Static MAC Forward Setup ...................................................................................................... 103
Filtering .................................................................................................................................... 105
Spanning Tree Protocol ........................................................................................................... 107
Bandwidth Control ................................................................................................................... 125
Broadcast Storm Control ......................................................................................................... 127
Mirroring .................................................................................................................................. 129
Link Aggregation ...................................................................................................................... 131
Port Authentication .................................................................................................................. 139
Port Security ............................................................................................................................ 145
Classifier .................................................................................................................................. 149
Policy Rule ............................................................................................................................... 155
Queuing Method ...................................................................................................................... 161
VLAN Stacking ......................................................................................................................... 165
Multicast .................................................................................................................................. 171
Authentication & Accounting ....................................................................................................185
IP Source Guard ...................................................................................................................... 199
Loop Guard .............................................................................................................................. 219
Static Routing .......................................................................................................................... 223
Differentiated Services ............................................................................................................. 225
DHCP ...................................................................................................................................... 233
Maintenance ............................................................................................................................ 239
Access Control ........................................................................................................................ 245
Diagnostic ................................................................................................................................ 263
Syslog ...................................................................................................................................... 265
ES-3148 User’s Guide
9
Contents Overview
Cluster Management ............................................................................................................... 269
MAC Table ............................................................................................................................... 275
ARP Table ................................................................................................................................ 277
Configure Clone ....................................................................................................................... 279
Troubleshooting and Specifications ..................................................................................281
Troubleshooting ....................................................................................................................... 283
Product Specifications ............................................................................................................. 287
Appendices and Index ......................................................................................................... 293
10
ES-3148 User’s Guide
Table of Contents
Table of Contents
About This User's Guide ..........................................................................................................3
Document Conventions............................................................................................................4
Safety Warnings........................................................................................................................6
Contents Overview ...................................................................................................................9
Table of Contents....................................................................................................................11
List of Figures .........................................................................................................................21
List of Tables...........................................................................................................................27
Part I: Introduction................................................................................. 31
Chapter 1
Introducing the Switch ...........................................................................................................33
1.1 Overview .............................................................................................................................. 33
1.1.1 Backbone Application ................................................................................................. 33
1.1.2 Bridging Example ....................................................................................................... 34
1.1.3 High-performance Switched Example ........................................................................ 34
1.1.4 IEEE 802.1Q VLAN Application Examples ................................................................ 35
1.2 Ways to Manage the Switch ................................................................................................ 36
1.3 Good Habits for Managing the Switch ................................................................................. 36
Part II: Hardware .................................................................................... 37
Chapter 2
Hardware Installation and Connection .................................................................................39
2.1 Freestanding Installation ..................................................................................................... 39
2.2 Mounting the Switch on a Rack .......................................................................................... 40
2.2.1 Rack-mounted Installation Requirements .................................................................. 40
2.2.2 Attaching the Mounting Brackets to the Switch .......................................................... 40
2.2.3 Mounting the Switch on a Rack .................................................................................. 41
Chapter 3
Hardware Overview.................................................................................................................43
ES-3148 User’s Guide
11
Table of Contents
3.1 Panel Connections ............................................................................................................. 43
3.1.1 Ethernet Ports ............................................................................................................ 43
3.1.2 Mini-GBIC Slots .........................................................................................................44
3.2 Rear Panel ........................................................................................................................... 45
3.2.1 Console Port ............................................................................................................. 46
3.2.2 External Backup Power Supply Connector ................................................................ 46
3.2.3 Power Connector ....................................................................................................... 47
3.3 LEDs ................................................................................................................................ 47
Part III: Web Configurator ..................................................................... 49
Chapter 4
The Web Configurator ............................................................................................................51
4.1 Introduction .......................................................................................................................... 51
4.2 System Login .................................................................................................................... 51
4.3 The Status Screen .......................................................................................................... 52
4.3.1 Change Your Password .......................................................................................... 58
4.4 Saving Your Configuration ................................................................................................... 58
4.5 Switch Lockout .................................................................................................................. 59
4.6 Resetting the Switch ......................................................................................................... 59
4.6.1 Reload the Configuration File .................................................................................... 59
4.7 Logging Out of the Web Configurator ................................................................................. 60
4.8 Help .................................................................................................................................... 61
Chapter 5
Initial Setup Example..............................................................................................................63
5.1 Overview .............................................................................................................................. 63
5.1.1 Creating a VLAN ........................................................................................................ 63
5.1.2 Setting Port VID .........................................................................................................64
5.2 Configuring Switch Management IP Address ...................................................................... 65
Chapter 6
System Status and Port Statistics......................................................................................... 67
6.1 Overview .............................................................................................................................. 67
6.2 Port Status Summary ...................................................................................................... 67
6.2.1 Status: Port Details ................................................................................................68
Chapter 7
Basic Setting ..........................................................................................................................73
7.1 Overview .............................................................................................................................. 73
7.2 System Information ........................................................................................................... 73
12
ES-3148 User’s Guide
Table of Contents
7.3 General Setup ................................................................................................................. 75
7.4 Introduction to VLANs ......................................................................................................... 77
7.5 Switch Setup Screen ........................................................................................................ 77
7.6 IP Setup ............................................................................................................................ 79
7.6.1 IP Interfaces ............................................................................................................... 79
7.7 Port Setup ........................................................................................................................... 82
Chapter 8
VLAN ........................................................................................................................................85
8.1 Introduction to IEEE 802.1Q Tagged VLANs .................................................................. 85
8.1.1 Forwarding Tagged and Untagged Frames ................................................................ 85
8.2 Automatic VLAN Registration ............................................................................................. 86
8.2.1 GARP ......................................................................................................................... 86
8.2.2 GVRP ......................................................................................................................... 86
8.3 Port VLAN Trunking ............................................................................................................ 87
8.4 Select the VLAN Type ........................................................................................................ 87
8.5 Static VLAN ......................................................................................................................... 87
8.5.1 Static VLAN Status .................................................................................................... 88
8.5.2 Static VLAN Details ................................................................................................... 88
8.5.3 Configure a Static VLAN ........................................................................................ 89
8.5.4 Configure VLAN Port Settings ................................................................................ 90
8.6 Subnet Based VLANs ......................................................................................................... 92
8.7 Configuring Subnet Based VLAN ...................................................................................... 93
8.8 Protocol Based VLANs ....................................................................................................... 94
8.9 Configuring Protocol Based VLAN .................................................................................... 95
8.10 Create an IP-based VLAN Example .................................................................................. 97
8.11 Port-based VLAN Setup ................................................................................................98
8.11.1 Configure a Port-based VLAN ................................................................................. 98
Chapter 9
Static MAC Forward Setup...................................................................................................103
9.1 Overview ............................................................................................................................ 103
9.2 Configuring Static MAC Forwarding ............................................................................. 103
Chapter 10
Filtering..................................................................................................................................105
10.1 Configure a Filtering Rule .............................................................................................105
Chapter 11
Spanning Tree Protocol........................................................................................................107
11.1 STP/RSTP Overview ..................................................................................................... 107
11.1.1 STP Terminology ................................................................................................... 107
11.1.2 How STP Works .................................................................................................... 108
ES-3148 User’s Guide
13
Table of Contents
11.1.3 STP Port States ..................................................................................................... 109
11.1.4 Multiple RSTP ...................................................................................................... 109
11.1.5 Multiple STP ............................................................................................................110
11.2 Spanning Tree Protocol Status Screen .............................................................................112
11.3 Spanning Tree Configuration ...........................................................................................113
11.4 Configure Rapid Spanning Tree Protocol ......................................................................114
11.5 Rapid Spanning Tree Protocol Status .........................................................................115
11.6 Configure Multiple Rapid Spanning Tree Protocol .........................................................117
11.7 Multiple Rapid Spanning Tree Protocol Status ............................................................118
11.8 Configure Multiple Spanning Tree Protocol .................................................................. 120
11.9 Multiple Spanning Tree Protocol Status ..................................................................... 122
Chapter 12
Bandwidth Control................................................................................................................125
12.1 Bandwidth Control Overview ......................................................................................... 125
12.1.1 CIR and PIR ........................................................................................................... 125
12.2 Bandwidth Control Setup ................................................................................................. 125
Chapter 13
Broadcast Storm Control .....................................................................................................127
13.1 Broadcast Storm Control Setup ...................................................................................... 127
Chapter 14
Mirroring ................................................................................................................................129
14.1 Port Mirroring Setup ....................................................................................................... 129
Chapter 15
Link Aggregation ..................................................................................................................131
15.1 Link Aggregation Overview ............................................................................................. 131
15.2 Dynamic Link Aggregation .............................................................................................. 131
15.2.1 Link Aggregation ID ............................................................................................... 132
15.3 Link Aggregation Status ..................................................................................................132
15.4 Link Aggregation Setting ................................................................................................ 133
15.5 Link Aggregation Control Protocol ................................................................................ 134
15.6 Static Trunking Example .................................................................................................. 136
Chapter 16
Port Authentication...............................................................................................................139
14
16.1 Port Authentication Overview ......................................................................................... 139
16.1.1 IEEE 802.1x Authentication ................................................................................... 139
16.1.2 MAC Authentication ............................................................................................... 140
16.2 Port Authentication Configuration .................................................................................... 141
16.2.1 Activate IEEE 802.1x Security ........................................................................... 141
ES-3148 User’s Guide
Table of Contents
16.2.2 Activate MAC Authentication ................................................................................. 142
Chapter 17
Port Security..........................................................................................................................145
17.1 About Port Security ......................................................................................................... 145
17.2 Port Security Setup .......................................................................................................... 145
Chapter 18
Classifier................................................................................................................................149
18.1 About the Classifier and QoS .......................................................................................... 149
18.2 Configuring the Classifier ...............................................................................................149
18.3 Viewing and Editing Classifier Configuration ................................................................... 152
18.4 Classifier Example ........................................................................................................... 153
Chapter 19
Policy Rule.............................................................................................................................155
19.1 Policy Rules Overview ....................................................................................................155
19.1.1 DiffServ .................................................................................................................. 155
19.1.2 DSCP and Per-Hop Behavior ................................................................................. 155
19.2 Configuring Policy Rules ................................................................................................. 156
19.3 Viewing and Editing Policy Configuration ........................................................................ 158
19.4 Policy Example ................................................................................................................ 159
Chapter 20
Queuing Method....................................................................................................................161
20.1 Queuing Method Overview ............................................................................................. 161
20.1.1 Strictly Priority ........................................................................................................ 161
20.1.2 Weighted Fair Queuing .......................................................................................... 161
20.1.3 Weighted Round Robin Scheduling (WRR) ........................................................... 162
20.2 Configuring Queuing ........................................................................................................ 162
Chapter 21
VLAN Stacking ......................................................................................................................165
21.1 VLAN Stacking Overview ................................................................................................ 165
21.1.1 VLAN Stacking Example ........................................................................................ 165
21.2 VLAN Stacking Port Roles ............................................................................................... 166
21.3 VLAN Tag Format ............................................................................................................ 167
21.3.1 Frame Format ........................................................................................................ 167
21.4 Configuring VLAN Stacking ............................................................................................. 168
Chapter 22
Multicast ................................................................................................................................171
22.1 Multicast Overview ......................................................................................................... 171
ES-3148 User’s Guide
15
Table of Contents
22.1.1 IP Multicast Addresses ........................................................................................... 171
22.1.2 IGMP Filtering ........................................................................................................ 171
22.1.3 IGMP Snooping ..................................................................................................... 171
22.1.4 IGMP Snooping and VLANs ................................................................................... 172
22.2 Multicast Status .............................................................................................................. 172
22.3 Multicast Setting ............................................................................................................. 172
22.4 IGMP Snooping VLAN .................................................................................................... 174
22.5 IGMP Filtering Profile ..................................................................................................... 176
22.6 MVR Overview ................................................................................................................ 177
22.6.1 Types of MVR Ports ............................................................................................... 177
22.6.2 MVR Modes ........................................................................................................... 178
22.6.3 How MVR Works .................................................................................................... 178
22.7 General MVR Configuration ............................................................................................ 178
22.8 MVR Group Configuration .............................................................................................. 180
22.8.1 MVR Configuration Example .................................................................................. 181
Chapter 23
Authentication & Accounting ..............................................................................................185
23.1 Authentication, Authorization and Accounting ................................................................ 185
23.1.1 Local User Accounts .............................................................................................. 185
23.1.2 RADIUS and TACACS+ ........................................................................................ 186
23.2 Authentication and Accounting Screens .......................................................................... 186
23.2.1 RADIUS Server Setup ........................................................................................ 186
23.2.2 TACACS+ Server Setup ..................................................................................... 188
23.2.3 Authentication and Accounting Setup ................................................................ 190
23.2.4 Vendor Specific Attribute ........................................................................................ 193
23.3 Supported RADIUS Attributes ......................................................................................... 194
23.3.1 Attributes Used for Authentication .......................................................................... 195
23.3.2 Attributes Used for Accounting ............................................................................... 195
Chapter 24
IP Source Guard....................................................................................................................199
24.1 IP Source Guard Overview .............................................................................................. 199
24.1.1 DHCP Snooping Overview ..................................................................................... 199
24.1.2 ARP Inspection Overview ...................................................................................... 201
24.2 IP Source Guard .............................................................................................................. 203
24.3 IP Source Guard Static Binding ....................................................................................... 203
24.4 DHCP Snooping .............................................................................................................. 205
24.5 DHCP Snooping Configure .............................................................................................. 208
24.5.1 DHCP Snooping Port Configure ............................................................................. 209
24.5.2 DHCP Snooping VLAN Configure ...........................................................................211
24.6 ARP Inspection Status .....................................................................................................212
24.6.1 ARP Inspection VLAN Status ................................................................................. 212
16
ES-3148 User’s Guide
Table of Contents
24.6.2 ARP Inspection Log Status .................................................................................... 213
24.7 ARP Inspection Configure ............................................................................................... 215
24.7.1 ARP Inspection Port Configure .............................................................................. 216
24.7.2 ARP Inspection VLAN Configure ........................................................................... 217
Chapter 25
Loop Guard............................................................................................................................219
25.1 Loop Guard Overview ..................................................................................................... 219
25.2 Loop Guard Setup ........................................................................................................... 221
Chapter 26
Static Routing........................................................................................................................223
26.1 Configuring Static Routing ............................................................................................. 223
Chapter 27
Differentiated Services.........................................................................................................225
27.1 DiffServ Overview ........................................................................................................... 225
27.1.1 DSCP and Per-Hop Behavior ................................................................................ 225
27.1.2 DiffServ Network Example .................................................................................... 226
27.2 Two Rate Three Color Marker Traffic Policing ................................................................. 226
27.2.1 TRTCM - Color-blind Mode .................................................................................... 227
27.2.2 TRTCM - Color-aware Mode .................................................................................. 227
27.3 Activating DiffServ .......................................................................................................... 228
27.3.1 Configuring 2-Rate 3 Color Marker Settings ......................................................... 228
27.4 DSCP-to-IEEE 802.1p Priority Settings ...................................................................... 230
27.4.1 Configuring DSCP Settings .................................................................................... 230
Chapter 28
DHCP......................................................................................................................................233
28.1 DHCP Overview ............................................................................................................. 233
28.1.1 DHCP Modes ........................................................................................................ 233
28.1.2 DHCP Configuration Options ................................................................................. 233
28.2 DHCP Status ................................................................................................................... 233
28.3 DHCP Relay ................................................................................................................... 234
28.3.1 DHCP Relay Agent Information ............................................................................. 234
28.3.2 Configuring DHCP Global Relay ............................................................................ 235
28.3.3 Global DHCP Relay Configuration Example .......................................................... 236
28.4 Configuring DHCP VLAN Settings ................................................................................ 236
28.4.1 Example: DHCP Relay for Two VLANs .................................................................. 238
Chapter 29
Maintenance ..........................................................................................................................239
29.1 The Maintenance Screen ............................................................................................... 239
ES-3148 User’s Guide
17
Table of Contents
29.2 Load Factory Default ...................................................................................................... 240
29.3 Save Configuration .......................................................................................................... 240
29.4 Reboot System ................................................................................................................ 241
29.5 Firmware Upgrade ........................................................................................................ 241
29.6 Restore a Configuration File ......................................................................................... 242
29.7 Backup a Configuration File ......................................................................................... 242
29.8 FTP Command Line ........................................................................................................ 243
29.8.1 Filename Conventions .......................................................................................... 243
29.8.2 FTP Command Line Procedure ............................................................................ 243
29.8.3 GUI-based FTP Clients .......................................................................................... 244
29.8.4 FTP Restrictions .................................................................................................... 244
Chapter 30
Access Control......................................................................................................................245
30.1 Access Control Overview ............................................................................................ 245
30.2 The Access Control Main Screen .................................................................................... 245
30.3 About SNMP .................................................................................................................. 246
30.3.1 SNMP v3 and Security ........................................................................................... 247
30.3.2 Supported MIBs ................................................................................................... 247
30.3.3 SNMP Traps .......................................................................................................... 247
30.3.4 Configuring SNMP .............................................................................................. 250
30.3.5 Configuring SNMP Trap Group ........................................................................... 252
30.3.6 Setting Up Login Accounts ................................................................................. 253
30.4 SSH Overview ................................................................................................................. 255
30.5 How SSH works ............................................................................................................... 255
30.6 SSH Implementation on the Switch ................................................................................. 256
30.6.1 Requirements for Using SSH ................................................................................. 256
30.7 Introduction to HTTPS .....................................................................................................256
30.8 HTTPS Example .............................................................................................................. 257
30.8.1 Internet Explorer Warning Messages ..................................................................... 257
30.8.2 Netscape Navigator Warning Messages ................................................................ 258
30.8.3 The Main Screen .................................................................................................... 258
30.9 Service Port Access Control ......................................................................................... 259
30.10 Remote Management ............................................................................................... 260
Chapter 31
Diagnostic..............................................................................................................................263
31.1 Diagnostic ....................................................................................................................... 263
Chapter 32
Syslog ....................................................................................................................................265
32.1 Syslog Overview .............................................................................................................. 265
32.2 Syslog Setup .................................................................................................................. 265
18
ES-3148 User’s Guide
Table of Contents
32.3 Syslog Server Setup ....................................................................................................... 266
Chapter 33
Cluster Management.............................................................................................................269
33.1 Clustering Management Status Overview ...................................................................... 269
33.2 Cluster Management Status ........................................................................................... 270
33.2.1 Cluster Member Switch Management ................................................................... 271
33.3 Clustering Management Configuration .......................................................................... 272
Chapter 34
MAC Table..............................................................................................................................275
34.1 MAC Table Overview ...................................................................................................... 275
34.2 Viewing the MAC Table ................................................................................................... 276
Chapter 35
ARP Table ..............................................................................................................................277
35.1 ARP Table Overview .......................................................................................................277
35.1.1 How ARP Works .................................................................................................... 277
35.2 Viewing the ARP Table ................................................................................................... 277
Chapter 36
Configure Clone....................................................................................................................279
36.1 Configure Clone .............................................................................................................. 279
Part IV: Troubleshooting and Specifications..................................... 281
Chapter 37
Troubleshooting....................................................................................................................283
37.1 Power, Hardware Connections, and LEDs ...................................................................... 283
37.2 Switch Access and Login ................................................................................................. 284
Chapter 38
Product Specifications.........................................................................................................287
38.1 General Switch Specifications ......................................................................................... 287
38.2 Cable Pin Assignments ................................................................................................... 290
Part V: Appendices and Index ............................................................ 293
Appendix A Setting up Your Computer’s IP Address............................................................295
Appendix B Pop-up Windows, JavaScripts and Java Permissions ......................................317
ES-3148 User’s Guide
19
Table of Contents
Appendix C IP Addresses and Subnetting ...........................................................................325
Appendix D Common Services ............................................................................................335
Appendix E Importing Certificates ........................................................................................339
Appendix F Legal Information ..............................................................................................345
Appendix G Customer Support ............................................................................................349
Index.......................................................................................................................................355
20
ES-3148 User’s Guide
List of Figures
List of Figures
Figure 1 Backbone Application .............................................................................................................. 33
Figure 2 Bridging Application .................................................................................................................. 34
Figure 3 High-performance Switched Application .................................................................................. 34
Figure 4 Tag-based VLAN Application .................................................................................................... 35
Figure 5 Shared Server Using VLAN Example ....................................................................................... 36
Figure 6 Attaching Rubber Feet ............................................................................................................ 39
Figure 7 Attaching the Mounting Brackets .............................................................................................. 40
Figure 8 Mounting the Switch on a Rack ............................................................................................... 41
Figure 9 Front Panel .............................................................................................................................. 43
Figure 10 Transceiver Installation Example ........................................................................................... 45
Figure 11 Installed Transceiver .............................................................................................................. 45
Figure 12 Opening the Transceiver’s Latch Example ............................................................................ 45
Figure 13 Transceiver Removal Example .............................................................................................. 45
Figure 14 Rear Panel ............................................................................................................................ 46
Figure 15 Web Configurator: Login ....................................................................................................... 52
Figure 16 Web Configurator Home Screen (Status) .............................................................................. 52
Figure 17 Change Administrator Login Password .................................................................................58
Figure 18 Resetting the Switch: Via the Console Port ........................................................................... 60
Figure 19 Web Configurator: Logout Screen ......................................................................................... 60
Figure 20 Initial Setup Network Example: VLAN .................................................................................... 63
Figure 21 Initial Setup Network Example: Port VID ................................................................................ 64
Figure 22 Initial Setup Example: Management IP Address .................................................................... 65
Figure 23 Status .................................................................................................................................... 67
Figure 24 Status: Port Details ................................................................................................................. 69
Figure 25 Basic Setting > System Info .................................................................................................. 74
Figure 26 Basic Setting > General Setup .............................................................................................. 75
Figure 27 Basic Setting > Switch Setup ................................................................................................ 78
Figure 28 Basic Setting > IP Setup ......................................................................................................... 80
Figure 29 Basic Setting > Port Setup .................................................................................................... 82
Figure 30 Port VLAN Trunking ............................................................................................................... 87
Figure 31 Switch Setup: Select VLAN Type .......................................................................................... 87
Figure 32 Advanced Application > VLAN: VLAN Status ......................................................................... 88
Figure 33 Advanced Application > VLAN > VLAN Detail ........................................................................ 88
Figure 34 Advanced Application > VLAN > Static VLAN ...................................................................... 89
Figure 35 Advanced Application > VLAN > VLAN Port Setting ............................................................. 91
Figure 36 Subnet Based VLAN Application Example ............................................................................ 92
Figure 37 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................ 93
Figure 38 Protocol Based VLAN Application Example .......................................................................... 95
ES-3148 User’s Guide
21
List of Figures
Figure 39 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN ...................... 96
Figure 40 Protocol Based VLAN Configuration Example ...................................................................... 97
Figure 41 Advanced Application > VLAN: Port Based VLAN Setup (All Connected) ............................ 99
Figure 42 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation) ........................... 100
Figure 43 Advanced Application > Static MAC Forwarding ................................................................. 103
Figure 44 Advanced Application > Filtering ......................................................................................... 105
Figure 45 MRSTP Network Example ................................................................................................... 109
Figure 46 STP/RSTP Network Example ...............................................................................................110
Figure 47 MSTP Network Example .......................................................................................................111
Figure 48 MSTIs in Different Regions ..................................................................................................112
Figure 49 MSTP and Legacy RSTP Network Example ........................................................................112
Figure 50 Advanced Application > Spanning Tree Protocol .................................................................113
Figure 51 Advanced Application > Spanning Tree Protocol > Configuration ........................................113
Figure 52 Advanced Application > Spanning Tree Protocol > RSTP ....................................................114
Figure 53 Advanced Application > Spanning Tree Protocol > Status: RSTP ........................................116
Figure 54 Advanced Application > Spanning Tree Protocol > MRSTP .................................................117
Figure 55 Advanced Application > Spanning Tree Protocol > Status: MRSTP .....................................119
Figure 56 Advanced Application > Spanning Tree Protocol > MSTP .................................................. 120
Figure 57 Advanced Application > Spanning Tree Protocol > Status: MSTP ...................................... 123
Figure 58 Advanced Application > Bandwidth Control ........................................................................ 126
Figure 59 Advanced Application > Broadcast Storm Control .............................................................. 127
Figure 60 Advanced Application > Mirroring ........................................................................................ 129
Figure 61 Advanced Application > Link Aggregation Status ................................................................ 132
Figure 62 Advanced Application > Link Aggregation > Link Aggregation Setting ............................... 133
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................. 135
Figure 64 Trunking Example - Physical Connections ........................................................................... 136
Figure 65 Trunking Example - Configuration Screen ............................................................................ 137
Figure 66 IEEE 802.1x Authentication Process ................................................................................... 140
Figure 67 MAC Authentication Process ............................................................................................... 140
Figure 68 Advanced Application > Port Authentication ....................................................................... 141
Figure 69 Advanced Application > Port Authentication > 802.1x ........................................................ 141
Figure 70 Advanced Application > Port Authentication > MAC Authentication ................................... 143
Figure 71 Advanced Application > Port Security ................................................................................. 146
Figure 72 Advanced Application > Classifier ....................................................................................... 150
Figure 73 Advanced Application > Classifier: Summary Table ............................................................ 152
Figure 74 Classifier: Example .............................................................................................................. 154
Figure 75 Advanced Application > Policy Rule .................................................................................... 156
Figure 76 Advanced Application > Policy Rule: Summary Table ......................................................... 158
Figure 77 Policy Example .................................................................................................................... 159
Figure 78 Advanced Application > Queuing Method ........................................................................... 162
Figure 79 VLAN Stacking Example ..................................................................................................... 166
Figure 80 Advanced Application > VLAN Stacking .............................................................................. 168
Figure 81 Advanced Application > Multicast ........................................................................................ 172
22
ES-3148 User’s Guide
List of Figures
Figure 82 Advanced Application > Multicast > Multicast Setting ......................................................... 173
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................. 175
Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ................... 176
Figure 85 MVR Network Example ....................................................................................................... 177
Figure 86 MVR Multicast Television Example ..................................................................................... 178
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR ............................................. 179
Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 181
Figure 89 MVR Configuration Example ............................................................................................... 182
Figure 90 MVR Configuration Example ............................................................................................... 182
Figure 91 MVR Group Configuration Example ................................................................................... 183
Figure 92 MVR Group Configuration Example .................................................................................... 183
Figure 93 AAA Server .......................................................................................................................... 185
Figure 94 Advanced Application > Auth and Acct ............................................................................... 186
Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................ 187
Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup ..................................... 189
Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup .......................................... 191
Figure 98 DHCP Snooping Database File Format ............................................................................... 200
Figure 99 Example: Man-in-the-middle Attack ..................................................................................... 201
Figure 100 Advanced Application > IP Source Guard .......................................................................... 203
Figure 101 Advanced Application > IP Source Guard > Static Binding ................................................ 204
Figure 102 Advanced Application > IP Source Guard > DHCP Snooping ........................................... 205
Figure 103 Advanced Application > IP Source Guard > DHCP Snooping > Configure ........................ 208
Figure 104 Advanced Application > IP Source Guard > DHCP Snooping > Configure > Port ............. 210
Figure 105 Advanced Application > IP Source Guard > DHCP Snooping > Configure > VLAN ...........211
Figure 106 Advanced Application > IP Source Guard > ARP Inspection ............................................. 212
Figure 107 Advanced Application > IP Source Guard > ARP Inspection > VLAN Status ..................... 213
Figure 108 Advanced Application > IP Source Guard > ARP Inspection > Log Status ........................ 214
Figure 109 Advanced Application > IP Source Guard > ARP Inspection > Configure ......................... 215
Figure 110 Advanced Application > IP Source Guard > ARP Inspection > Configure > Port ............... 216
Figure 111 Advanced Application > IP Source Guard > ARP Inspection > Configure > VLAN ............ 217
Figure 112 Loop Guard vs STP ............................................................................................................ 219
Figure 113 Switch in Loop State ........................................................................................................... 220
Figure 114 Loop Guard - Probe Packet ................................................................................................ 220
Figure 115 Loop Guard - Network Loop ............................................................................................... 220
Figure 116 Advanced Application > Loop Guard .................................................................................. 221
Figure 117 IP Application > Static Routing .......................................................................................... 223
Figure 118 DiffServ: Differentiated Service Field .................................................................................. 225
Figure 119 DiffServ Network ................................................................................................................ 226
Figure 120 TRTCM - Color-blind Mode ............................................................................................... 227
Figure 121 TRTCM - Color-aware Mode ............................................................................................. 227
Figure 122 IP Application > DiffServ .................................................................................................... 228
Figure 123 IP Application > DiffServ > 2-rate 3 Color Marker ............................................................. 229
Figure 124 IP Application > DiffServ > DSCP Setting ......................................................................... 230
ES-3148 User’s Guide
23
List of Figures
Figure 125 IP Application > DHCP Status ........................................................................................... 234
Figure 126 IP Application > DHCP > Global ........................................................................................ 235
Figure 127 Global DHCP Relay Network Example ............................................................................. 236
Figure 128 DHCP Relay Configuration Example ................................................................................. 236
Figure 129 IP Application > DHCP > VLAN ....................................................................................... 237
Figure 130 DHCP Relay for Two VLANs ............................................................................................. 238
Figure 131 DHCP Relay for Two VLANs Configuration Example ........................................................ 238
Figure 132 Management > Maintenance ............................................................................................. 239
Figure 133 Load Factory Default: Start ................................................................................................ 240
Figure 134 Reboot System: Confirmation ........................................................................................... 241
Figure 135 Management > Maintenance > Firmware Upgrade ........................................................... 241
Figure 136 Management > Maintenance > Restore Configuration ...................................................... 242
Figure 137 Management > Maintenance > Backup Configuration ...................................................... 242
Figure 138 Management > Access Control ......................................................................................... 245
Figure 139 SNMP Management Model .............................................................................................. 246
Figure 140 Management > Access Control > SNMP ........................................................................... 251
Figure 141 Management > Access Control > SNMP > Trap Group .................................................... 253
Figure 142 Management > Access Control > Logins .......................................................................... 254
Figure 143 SSH Communication Example ...........................................................................................255
Figure 144 How SSH Works ................................................................................................................. 255
Figure 145 HTTPS Implementation ...................................................................................................... 257
Figure 146 Security Alert Dialog Box (Internet Explorer) ...................................................................... 257
Figure 147 Security Certificate 1 (Netscape) ........................................................................................ 258
Figure 148 Security Certificate 2 (Netscape) ........................................................................................ 258
Figure 149 Example: Lock Denoting a Secure Connection .................................................................. 259
Figure 150 Management > Access Control > Service Access Control ................................................. 259
Figure 151 Management > Access Control > Remote Management .................................................. 260
Figure 152 Management > Diagnostic ................................................................................................. 263
Figure 153 Management > Syslog ....................................................................................................... 266
Figure 154 Management > Syslog > Server Setup ............................................................................. 267
Figure 155 Clustering Application Example ......................................................................................... 270
Figure 156 Management > Cluster Management ................................................................................ 270
Figure 157 Cluster Management: Cluster Member Web Configurator Screen .................................... 271
Figure 158 Example: Uploading Firmware to a Cluster Member Switch ............................................. 272
Figure 159 Management > Clustering Management > Configuration .................................................. 273
Figure 160 MAC Table Flowchart ........................................................................................................ 275
Figure 161 Management > MAC Table ................................................................................................ 276
Figure 162 Management > ARP Table ................................................................................................ 278
Figure 163 Management > Configure Clone .......................................................................................279
Figure 164 Console/Dial Backup Port Pin Layout ............................................................................... 291
Figure 165 WIndows 95/98/Me: Network: Configuration ...................................................................... 296
Figure 166 Windows 95/98/Me: TCP/IP Properties: IP Address .......................................................... 297
Figure 167 Windows 95/98/Me: TCP/IP Properties: DNS Configuration .............................................. 298
24
ES-3148 User’s Guide
List of Figures
Figure 168 Windows XP: Start Menu .................................................................................................... 299
Figure 169 Windows XP: Control Panel ............................................................................................... 299
Figure 170 Windows XP: Control Panel: Network Connections: Properties ......................................... 300
Figure 171 Windows XP: Local Area Connection Properties ............................................................... 300
Figure 172 Windows XP: Internet Protocol (TCP/IP) Properties .......................................................... 301
Figure 173 Windows XP: Advanced TCP/IP Properties ....................................................................... 302
Figure 174 Windows XP: Internet Protocol (TCP/IP) Properties .......................................................... 303
Figure 175 Windows Vista: Start Menu ................................................................................................. 304
Figure 176 Windows Vista: Control Panel ............................................................................................ 304
Figure 177 Windows Vista: Network And Internet ................................................................................ 304
Figure 178 Windows Vista: Network and Sharing Center ..................................................................... 304
Figure 179 Windows Vista: Network and Sharing Center ..................................................................... 305
Figure 180 Windows Vista: Local Area Connection Properties ............................................................ 305
Figure 181 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties ................................... 306
Figure 182 Windows Vista: Advanced TCP/IP Properties .................................................................... 307
Figure 183 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties ................................... 308
Figure 184 Macintosh OS 8/9: Apple Menu .......................................................................................... 309
Figure 185 Macintosh OS 8/9: TCP/IP ................................................................................................. 309
Figure 186 Macintosh OS X: Apple Menu ............................................................................................ 310
Figure 187 Macintosh OS X: Network ...................................................................................................311
Figure 188 Red Hat 9.0: KDE: Network Configuration: Devices ......................................................... 312
Figure 189 Red Hat 9.0: KDE: Ethernet Device: General .................................................................. 312
Figure 190 Red Hat 9.0: KDE: Network Configuration: DNS ............................................................... 313
Figure 191 Red Hat 9.0: KDE: Network Configuration: Activate ........................................................ 313
Figure 192 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 ............................................... 314
Figure 193 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 ................................................... 314
Figure 194 Red Hat 9.0: DNS Settings in resolv.conf ........................................................................ 314
Figure 195 Red Hat 9.0: Restart Ethernet Card ................................................................................. 314
Figure 196 Red Hat 9.0: Checking TCP/IP Properties ....................................................................... 315
Figure 197 Pop-up Blocker ................................................................................................................... 317
Figure 198 Internet Options: Privacy .................................................................................................... 318
Figure 199 Internet Options: Privacy .................................................................................................... 319
Figure 200 Pop-up Blocker Settings ..................................................................................................... 319
Figure 201 Internet Options: Security ................................................................................................... 320
Figure 202 Security Settings - Java Scripting ....................................................................................... 321
Figure 203 Security Settings - Java ...................................................................................................... 321
Figure 204 Java (Sun) .......................................................................................................................... 322
Figure 205 Mozilla Firefox: Tools > Options ......................................................................................... 323
Figure 206 Mozilla Firefox Content Security ......................................................................................... 323
Figure 207 Network Number and Host ID ............................................................................................ 326
Figure 208 Subnetting Example: Before Subnetting ............................................................................ 328
Figure 209 Subnetting Example: After Subnetting ............................................................................... 329
Figure 210 Conflicting Computer IP Addresses Example .................................................................... 333
ES-3148 User’s Guide
25
List of Figures
Figure 211 Conflicting Computer IP Addresses Example ..................................................................... 333
Figure 212 Conflicting Computer and Router IP Addresses Example .................................................. 334
Figure 213 Security Certificate ............................................................................................................. 339
Figure 214 Login Screen ...................................................................................................................... 340
Figure 215 Certificate General Information before Import .................................................................... 340
Figure 216 Certificate Import Wizard 1 ................................................................................................. 341
Figure 217 Certificate Import Wizard 2 ................................................................................................. 341
Figure 218 Certificate Import Wizard 3 ................................................................................................. 342
Figure 219 Root Certificate Store ......................................................................................................... 342
Figure 220 Certificate General Information after Import ....................................................................... 343
26
ES-3148 User’s Guide
List of Tables
List of Tables
Table 1 Front Panel ............................................................................................................................... 43
Table 2 Rear Panel ................................................................................................................................ 46
Table 3 LEDs ......................................................................................................................................... 47
Table 4 Navigation Panel Sub-links Overview ....................................................................................... 53
Table 5 Web Configurator Screen Sub-links Details .............................................................................. 55
Table 6 Navigation Panel Links ............................................................................................................. 56
Table 7 Status ........................................................................................................................................ 67
Table 8 Status > Port Details ................................................................................................................. 69
Table 9 Basic Setting > System Info ...................................................................................................... 74
Table 10 Basic Setting > General Setup ................................................................................................ 76
Table 11 Basic Setting > Switch Setup .................................................................................................. 78
Table 12 Basic Setting > IP Setup ......................................................................................................... 80
Table 13 Basic Setting > Port Setup ...................................................................................................... 82
Table 14 IEEE 802.1Q VLAN Terminology ............................................................................................ 86
Table 15 Advanced Application > VLAN: VLAN Status .......................................................................... 88
Table 16 Advanced Application > VLAN > VLAN Detail ........................................................................ 89
Table 17 Advanced Application > VLAN > Static VLAN ......................................................................... 90
Table 18 Advanced Application > VLAN > VLAN Port Setting ............................................................... 91
Table 19 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN Setup ............... 93
Table 20 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN Setup ............. 96
Table 21 Advanced Application > VLAN: Port Based VLAN Setup ..................................................... 101
Table 22 Advanced Application > Static MAC Forwarding ................................................................... 104
Table 23 Advanced Application > FIltering .......................................................................................... 105
Table 24 STP Path Costs .................................................................................................................... 108
Table 25 STP Port States .................................................................................................................... 109
Table 26 Advanced Application > Spanning Tree Protocol > Configuration .........................................113
Table 27 Advanced Application > Spanning Tree Protocol > RSTP .....................................................114
Table 28 Advanced Application > Spanning Tree Protocol > Status: RSTP .........................................116
Table 29 Advanced Application > Spanning Tree Protocol > MRSTP ..................................................117
Table 30 Advanced Application > Spanning Tree Protocol > Status: MRSTP ......................................119
Table 31 Advanced Application > Spanning Tree Protocol > MSTP .................................................... 121
Table 32 Advanced Application > Spanning Tree Protocol > Status: MSTP ........................................ 123
Table 33 Advanced Application > Bandwidth Control .......................................................................... 126
Table 34 Advanced Application > Broadcast Storm Control ................................................................ 128
Table 35 Advanced Application > Mirroring ......................................................................................... 130
Table 36 Link Aggregation ID: Local Switch ........................................................................................ 132
Table 37 Link Aggregation ID: Peer Switch ......................................................................................... 132
Table 38 Advanced Application > Link Aggregation Status ................................................................. 132
ES-3148 User’s Guide
27
List of Tables
Table 39 Advanced Application > Link Aggregation > Link Aggregation Setting ................................. 134
Table 40 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................... 135
Table 41 Advanced Application > Port Authentication > 802.1x .......................................................... 142
Table 42 Advanced Application > Port Authentication > MAC Authentication ..................................... 143
Table 43 Advanced Application > Port Security ................................................................................... 146
Table 44 Advanced Application > Classifier ......................................................................................... 150
Table 45 Classifier: Summary Table .................................................................................................... 152
Table 46 Common Ethernet Types and Protocol Number ................................................................... 152
Table 47 Common IP Protocol Types and Protocol Numbers ............................................................. 153
Table 48 Common TCP and UDP Port Numbers ................................................................................ 153
Table 49 Advanced Application > Policy Rule ..................................................................................... 157
Table 50 Policy: Summary Table ......................................................................................................... 158
Table 51 Advanced Application > Queuing Method ............................................................................. 163
Table 52 VLAN Tag Format ................................................................................................................. 167
Table 53 Single and Double Tagged 802.11Q Frame Format ............................................................. 167
Table 54 802.1Q Frame ....................................................................................................................... 167
Table 55 Advanced Application > VLAN Stacking ............................................................................... 168
Table 56 Multicast Status ..................................................................................................................... 172
Table 57 Advanced Application > Multicast > Multicast Setting ........................................................... 173
Table 58 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................... 175
Table 59 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile .................... 176
Table 60 Advanced Application > Multicast > Multicast Setting > MVR ............................................... 179
Table 61 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 181
Table 62 RADIUS vs TACACS+ .......................................................................................................... 186
Table 63 Advanced Application > Auth and Acct > RADIUS Server Setup ......................................... 187
Table 64 Advanced Application > Auth and Acct > TACACS+ Server Setup ...................................... 189
Table 65 Advanced Application > Auth and Acct > Auth and Acct Setup ............................................ 191
Table 66 Supported VSAs ................................................................................................................... 193
Table 67 Supported Tunnel Protocol Attribute ..................................................................................... 194
Table 68 RADIUS Attributes - Exec Events via Console ..................................................................... 196
Table 69 RADIUS Attributes - Exec Events via Telnet/SSH ................................................................ 196
Table 70 RADIUS Attributes - Exec Events via Console ..................................................................... 196
Table 71 Advanced Application > IP Source Guard ............................................................................. 203
Table 72 Advanced Application > IP Source Guard > Static Binding ................................................... 204
Table 73 Advanced Application > IP Source Guard > DHCP Snooping .............................................. 206
Table 74 Advanced Application > IP Source Guard > DHCP Snooping > Configure .......................... 208
Table 75 Advanced Application > IP Source Guard > DHCP Snooping > Configure > Port ................ 210
Table 76 Advanced Application > IP Source Guard > DHCP Snooping > Configure > VLAN ..............211
Table 77 Advanced Application > IP Source Guard > ARP Inspection ................................................ 212
Table 78 Advanced Application > IP Source Guard > ARP Inspection > VLAN Status ....................... 213
Table 79 Advanced Application > IP Source Guard > ARP Inspection > Log Status ........................... 214
Table 80 Advanced Application > IP Source Guard > ARP Inspection > Configure ............................ 215
Table 81 Advanced Application > IP Source Guard > ARP Inspection > Configure > Port ................. 217
28
ES-3148 User’s Guide
List of Tables
Table 82 Advanced Application > IP Source Guard > ARP Inspection > Configure > VLAN .............. 218
Table 83 Advanced Application > Loop Guard ....................................................................................221
Table 84 IP Application > Static Routing .............................................................................................. 223
Table 85 IP Application > DiffServ ....................................................................................................... 228
Table 86 IP Application > DiffServ > 2-rate 3 Color Marker ................................................................. 229
Table 87 Default DSCP-IEEE 802.1p Mapping ................................................................................... 230
Table 88 IP Application > DiffServ > DSCP Setting .............................................................................231
Table 89 IP Application > DHCP Status ............................................................................................... 234
Table 90 Relay Agent Information ....................................................................................................... 235
Table 91 IP Application > DHCP > Global ........................................................................................... 235
Table 92 IP Application > DHCP > VLAN ............................................................................................ 237
Table 93 Management > Maintenance ................................................................................................ 239
Table 94 Filename Conventions .......................................................................................................... 243
Table 95 General Commands for GUI-based FTP Clients .................................................................. 244
Table 96 Access Control Overview ...................................................................................................... 245
Table 97 SNMP Commands ................................................................................................................ 246
Table 98 SNMP System Traps ............................................................................................................. 247
Table 99 SNMP Interface Traps ........................................................................................................... 248
Table 100 AAA Traps ........................................................................................................................... 249
Table 101 SNMP IP Traps ................................................................................................................... 249
Table 102 SNMP Switch Traps ............................................................................................................ 250
Table 103 Management > Access Control > SNMP ............................................................................ 251
Table 104 Management > Access Control > SNMP > Trap Group ...................................................... 253
Table 105 Management > Access Control > Logins ............................................................................ 254
Table 106 Management > Access Control > Service Access Control ................................................. 260
Table 107 Management > Access Control > Remote Management .................................................... 260
Table 108 Management > Diagnostic .................................................................................................. 263
Table 109 Syslog Severity Levels ........................................................................................................ 265
Table 110 Management > Syslog ........................................................................................................ 266
Table 111 Management > Syslog > Server Setup ................................................................................ 267
Table 112 ZyXEL Clustering Management Specifications ................................................................... 269
Table 113 Management > Cluster Management .................................................................................. 271
Table 114 FTP Upload to Cluster Member Example ........................................................................... 272
Table 115 Management > Clustering Management > Configuration ................................................... 273
Table 116 Management > MAC Table .................................................................................................. 276
Table 117 Management > ARP Table .................................................................................................. 278
Table 118 Management > Configure Clone ......................................................................................... 280
Table 119 Hardware and Environmental Specifications ....................................................................... 287
Table 120 Feature Specifications ......................................................................................................... 288
Table 121 Standards Supported .......................................................................................................... 289
Table 122 Console/Dial Backup Port Pin Assignments ....................................................................... 291
Table 123 Ethernet Cable Pin Assignments ........................................................................................ 291
Table 124 IP Address Network Number and Host ID Example ........................................................... 326
ES-3148 User’s Guide
29
List of Tables
Table 125 Subnet Masks ..................................................................................................................... 327
Table 126 Maximum Host Numbers .................................................................................................... 327
Table 127 Alternative Subnet Mask Notation ....................................................................................... 327
Table 128 Subnet 1 .............................................................................................................................. 329
Table 129 Subnet 2 .............................................................................................................................. 330
Table 130 Subnet 3 .............................................................................................................................. 330
Table 131 Subnet 4 .............................................................................................................................. 330
Table 132 Eight Subnets ...................................................................................................................... 330
Table 133 24-bit Network Number Subnet Planning ............................................................................ 331
Table 134 16-bit Network Number Subnet Planning ............................................................................ 331
Table 135 Commonly Used Services ................................................................................................... 335
30
ES-3148 User’s Guide