ZyXEL Communications GS-3012F, GS-3012 User Manual

GS-3012F/3012
Layer 2+ Gigabit Switch

User’s Guide

Version 3.80 7/2007 Edition 1
IP Address http://192.168.1.1
User Name admin
Password 1234
www.zyxel.com

About This User's Guide

About This User's Guide
Intended Audience
This manual is intended for people who want to configure the Switch using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology.
Related Documentation
• Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains
information on setting up your network and configuring for Internet access.
• Command Line Interface (CLI) Reference Guide Line commands offer an alternative to the web configurator and in some cases are
necessary to configure advanced features.
• Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary
information.
" It is recommended you use the web configurator to configure the Switch.
• Supporting Disk Refer to the included CD for support documents.
• ZyXEL Web Site Please refer to www.zyxel.com
certifications.
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
for additional support documentation and product
GS-3012/GS-3012F User’s Guide
3

Document Conventions

Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The GS-3012 and GS-3012F models may be referred to as the “Switch”, the “device”, the “system” or the “product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key. “Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example, Maintenance > Log > Log Setting means you first click Maintenance in the navigation panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
GS-3012/GS-3012F User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The Switch icon is not an exact representation of your device.
The Switch Computer Notebook computer
Server DSLAM Firewall
Telephone Router
GS-3012/GS-3012F User’s Guide
5

Safety Warnings

Safety Warnings
1 For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information.
• For continued protection against risk of fire replace only with same type and rating of fuse.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
• If the power adaptor or cord is damaged, remove it from the device and the power source.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• The length of exposed (bare) power wire should not exceed 7mm.
6
This product is recyclable. Dispose of it properly.
GS-3012/GS-3012F User’s Guide
Safety Warnings
GS-3012/GS-3012F User’s Guide
7
Safety Warnings
8
GS-3012/GS-3012F User’s Guide

Contents Overview

Contents Overview
Introduction and Hardware ...................................................................................................29
Getting to Know Your Switch ..................................................................................................... 31
Basic Configuration ...............................................................................................................35
Hardware Installation and Connection ....................................................................................... 37
Hardware Overview ................................................................................................................... 41
The Web Configurator ............................................................................................................... 49
Initial Setup Example ................................................................................................................. 59
System Status and Port Statistics ..............................................................................................63
Basic Setting ............................................................................................................................. 69
Advanced ................................................................................................................................81
VLAN ......................................................................................................................................... 83
Static MAC Forward Setup ........................................................................................................ 95
Filtering ...................................................................................................................................... 97
Spanning Tree Protocol ............................................................................................................. 99
Bandwidth Control ....................................................................................................................117
Broadcast Storm Control ..........................................................................................................119
Mirroring .................................................................................................................................. 121
Link Aggregation ...................................................................................................................... 123
Port Authentication .................................................................................................................. 131
Port Security ............................................................................................................................ 137
Classifier .................................................................................................................................. 141
Policy Rule .............................................................................................................................. 147
Queuing Method ...................................................................................................................... 153
Multicast .................................................................................................................................. 155
Authentication & Accounting ....................................................................................................169
IP Source Guard ...................................................................................................................... 183
Loop Guard .............................................................................................................................. 203
Two Rate Three Color Marker ................................................................................................. 207
IP Application ....................................................................................................................... 213
Static Route ............................................................................................................................. 215
DHCP ...................................................................................................................................... 219
Management .........................................................................................................................225
Maintenance ............................................................................................................................ 227
GS-3012/GS-3012F User’s Guide
9
Contents Overview
Access Control ........................................................................................................................ 233
Diagnostic ................................................................................................................................ 251
Syslog ...................................................................................................................................... 253
Cluster Management ............................................................................................................... 257
MAC Table ............................................................................................................................... 263
ARP Table ................................................................................................................................ 265
Configure Clone ....................................................................................................................... 267
Troubleshooting & Product Specifications .......................................................................269
Troubleshooting ....................................................................................................................... 271
Product Specifications ............................................................................................................. 275
Appendices and Index ........................................................................................................ 281
10
GS-3012/GS-3012F User’s Guide

Table of Contents

Table of Contents
About This User's Guide ..........................................................................................................3
Document Conventions............................................................................................................4
Safety Warnings........................................................................................................................6
Contents Overview ...................................................................................................................9
Table of Contents....................................................................................................................11
List of Figures .........................................................................................................................21
List of Tables...........................................................................................................................25
Part I: Introduction and Hardware ........................................................ 29
Chapter 1
Getting to Know Your Switch.................................................................................................31
1.1 Introduction .......................................................................................................................... 31
1.1.1 Backbone Application ................................................................................................. 31
1.1.2 Bridging Example ....................................................................................................... 32
1.1.3 High Performance Switching Example ....................................................................... 32
1.1.4 IEEE 802.1Q VLAN Application Examples ................................................................ 33
1.2 Ways to Manage the Switch ................................................................................................ 34
1.3 Good Habits for Managing the Switch ................................................................................. 34
Part II: Basic Configuration................................................................... 35
Chapter 2
Hardware Installation and Connection .................................................................................37
2.1 Installation Scenarios .......................................................................................................... 37
2.2 Desktop Installation Procedure ........................................................................................... 37
2.3 Mounting the Switch on a Rack .......................................................................................... 38
2.3.1 Rack-mounted Installation Requirements .................................................................. 38
2.3.2 Attaching the Mounting Brackets to the Switch .......................................................... 38
2.3.3 Mounting the Switch on a Rack .................................................................................. 39
GS-3012/GS-3012F User’s Guide
11
Table of Contents
Chapter 3
Hardware Overview.................................................................................................................41
3.1 Front Panel ......................................................................................................................... 41
3.1.1 Console Port .............................................................................................................. 42
3.1.2 Gigabit Ports ............................................................................................................. 42
3.1.3 Mini-GBIC Slots ..........................................................................................................43
3.1.4 Management Port ....................................................................................................... 45
3.2 Rear Panel ........................................................................................................................... 45
3.2.1 Power Connector ....................................................................................................... 45
3.3 LEDs ................................................................................................................................... 46
3.4 Configuring the Switch ......................................................................................................... 47
Chapter 4
The Web Configurator ............................................................................................................49
4.1 Introduction .......................................................................................................................... 49
4.2 System Login .................................................................................................................... 49
4.3 The Status Screen .......................................................................................................... 50
4.3.1 Change Your Password .......................................................................................... 54
4.4 Saving Your Configuration ................................................................................................... 55
4.5 Switch Lockout .................................................................................................................. 55
4.6 Resetting the Switch ......................................................................................................... 56
4.6.1 Reload the Configuration File ................................................................................... 56
4.7 Logging Out of the Web Configurator ................................................................................. 57
4.8 Help ................................................................................................................................... 57
Chapter 5
Initial Setup Example..............................................................................................................59
5.1 Overview .............................................................................................................................. 59
5.1.1 Creating a VLAN ........................................................................................................ 59
5.1.2 Setting Port VID .........................................................................................................60
5.2 Configuring Switch Management IP Address ...................................................................... 61
Chapter 6
System Status and Port Statistics......................................................................................... 63
6.1 Overview .............................................................................................................................. 63
6.2 Port Status Summary ...................................................................................................... 63
6.2.1 Status: Port Details ................................................................................................64
Chapter 7
Basic Setting ..........................................................................................................................69
7.1 Overview .............................................................................................................................. 69
7.2 System Information ........................................................................................................... 69
7.3 General Setup ................................................................................................................. 71
12
GS-3012/GS-3012F User’s Guide
Table of Contents
7.4 Introduction to VLANs ........................................................................................................ 73
7.5 Switch Setup Screen ........................................................................................................ 73
7.6 IP Setup .............................................................................................................................. 75
7.6.1 Management IP Addresses ........................................................................................ 75
7.7 Port Setup .......................................................................................................................... 78
Part III: Advanced................................................................................... 81
Chapter 8
VLAN ........................................................................................................................................83
8.1 Introduction to IEEE 802.1Q Tagged VLANs .................................................................. 83
8.1.1 Forwarding Tagged and Untagged Frames ................................................................ 83
8.2 Automatic VLAN Registration ............................................................................................ 84
8.2.1 GARP ......................................................................................................................... 84
8.2.2 GVRP ......................................................................................................................... 84
8.3 Port VLAN Trunking ........................................................................................................... 85
8.4 Select the VLAN Type ........................................................................................................ 85
8.5 Static VLAN ......................................................................................................................... 85
8.5.1 Static VLAN Status .................................................................................................... 86
8.5.2 VLAN Details ............................................................................................................. 86
8.5.3 Configure a Static VLAN ........................................................................................ 87
8.5.4 Configure VLAN Port Settings ................................................................................ 88
8.6 Subnet Based VLANs ......................................................................................................... 90
8.7 Configuring Subnet Based VLAN ...................................................................................... 91
8.8 Port-based VLAN Setup .................................................................................................92
8.8.1 Configure a Port-based VLAN ................................................................................... 93
Chapter 9
Static MAC Forward Setup.....................................................................................................95
9.1 Overview .............................................................................................................................. 95
9.2 Configuring Static MAC Forwarding ............................................................................... 95
Chapter 10
Filtering....................................................................................................................................97
10.1 Configure a Filtering Rule ............................................................................................... 97
Chapter 11
Spanning Tree Protocol..........................................................................................................99
11.1 STP/RSTP Overview .......................................................................................................99
11.1.1 STP Terminology ..................................................................................................... 99
11.1.2 How STP Works .................................................................................................... 100
GS-3012/GS-3012F User’s Guide
13
Table of Contents
11.1.3 STP Port States ..................................................................................................... 101
11.1.4 Multiple RSTP ...................................................................................................... 101
11.1.5 Multiple STP ........................................................................................................... 102
11.2 Spanning Tree Protocol Status Screen ............................................................................ 104
11.3 Spanning Tree Configuration .......................................................................................... 105
11.4 Configure Rapid Spanning Tree Protocol ..................................................................... 106
11.5 Rapid Spanning Tree Protocol Status ........................................................................ 107
11.6 Configure Multiple Rapid Spanning Tree Protocol ........................................................ 109
11.7 Multiple Rapid Spanning Tree Protocol Status ............................................................110
11.8 Configure Multiple Spanning Tree Protocol ...................................................................111
11.9 Multiple Spanning Tree Protocol Status ......................................................................114
Chapter 12
Bandwidth Control................................................................................................................ 117
12.1 Bandwidth Control Overview ..........................................................................................117
12.1.1 CIR and PIR ............................................................................................................117
12.2 Bandwidth Control Setup ..................................................................................................11 7
Chapter 13
Broadcast Storm Control ..................................................................................................... 119
13.1 Broadcast Storm Control Setup .......................................................................................119
Chapter 14
Mirroring ................................................................................................................................121
14.1 Port Mirroring Setup ....................................................................................................... 121
Chapter 15
Link Aggregation ..................................................................................................................123
15.1 Link Aggregation Overview ............................................................................................. 123
15.2 Dynamic Link Aggregation ............................................................................................. 123
15.2.1 Link Aggregation ID ............................................................................................... 124
15.3 Link Aggregation Status ..................................................................................................124
15.4 Link Aggregation Setting ............................................................................................... 125
15.5 Link Aggregation Control Protocol ................................................................................ 126
15.6 Static Trunking Example .................................................................................................. 128
Chapter 16
Port Authentication...............................................................................................................131
14
16.1 Port Authentication Overview ........................................................................................ 131
16.1.1 IEEE 802.1x Authentication ................................................................................... 131
16.1.2 MAC Authentication ............................................................................................... 132
16.2 Port Authentication Configuration .................................................................................... 133
16.2.1 Activate IEEE 802.1x Security ........................................................................... 133
GS-3012/GS-3012F User’s Guide
Table of Contents
16.2.2 Activate MAC Authentication ................................................................................. 134
Chapter 17
Port Security..........................................................................................................................137
17.1 About Port Security ......................................................................................................... 137
17.2 Port Security Setup .......................................................................................................... 137
Chapter 18
Classifier................................................................................................................................141
18.1 About the Classifier and QoS .......................................................................................... 141
18.2 Configuring the Classifier ...............................................................................................141
18.3 Viewing and Editing Classifier Configuration ................................................................... 144
18.4 Classifier Example ........................................................................................................... 145
Chapter 19
Policy Rule............................................................................................................................147
19.1 Policy Rules Overview ....................................................................................................147
19.1.1 DiffServ .................................................................................................................. 147
19.1.2 DSCP and Per-Hop Behavior ................................................................................. 147
19.2 Configuring Policy Rules ................................................................................................. 148
19.3 Viewing and Editing Policy Configuration ........................................................................ 150
19.4 Policy Example ................................................................................................................ 151
Chapter 20
Queuing Method....................................................................................................................153
20.1 Queuing Method Overview ............................................................................................. 153
20.1.1 Strictly Priority Queuing .......................................................................................... 153
20.1.2 Weighted Round Robin Scheduling (WRR) ........................................................... 153
20.2 Configuring Queuing ........................................................................................................ 154
Chapter 21
Multicast ................................................................................................................................155
21.1 Multicast Overview ......................................................................................................... 155
21.1.1 IP Multicast Addresses ........................................................................................... 155
21.1.2 IGMP Filtering ........................................................................................................ 155
21.1.3 IGMP Snooping ..................................................................................................... 155
21.1.4 IGMP Snooping and VLANs ................................................................................... 156
21.2 Multicast Status .............................................................................................................. 156
21.3 Multicast Setting ............................................................................................................. 156
21.4 IGMP Snooping VLAN .................................................................................................... 158
21.5 IGMP Filtering Profile ..................................................................................................... 160
21.6 MVR Overview ................................................................................................................ 161
21.6.1 Types of MVR Ports ............................................................................................... 161
GS-3012/GS-3012F User’s Guide
15
Table of Contents
21.6.2 MVR Modes ........................................................................................................... 162
21.6.3 How MVR Works .................................................................................................... 162
21.7 General MVR Configuration ............................................................................................ 162
21.8 MVR Group Configuration .............................................................................................. 164
21.8.1 MVR Configuration Example .................................................................................. 165
Chapter 22
Authentication & Accounting ..............................................................................................169
22.1 Authentication, Authorization and Accounting ............................................................... 169
22.1.1 Local User Accounts .............................................................................................. 169
22.1.2 RADIUS and TACACS+ ........................................................................................ 170
22.2 Authentication and Accounting Screens .......................................................................... 170
22.2.1 RADIUS Server Setup ........................................................................................ 170
22.2.2 TACACS+ Server Setup ..................................................................................... 172
22.2.3 Authentication and Accounting Setup ................................................................ 174
22.2.4 Vendor Specific Attribute ........................................................................................ 177
22.3 Supported RADIUS Attributes ......................................................................................... 178
22.3.1 Attributes Used for Authentication .......................................................................... 179
22.3.2 Attributes Used for Accounting ............................................................................... 179
Chapter 23
IP Source Guard....................................................................................................................183
23.1 IP Source Guard Overview .............................................................................................. 183
23.1.1 DHCP Snooping Overview ..................................................................................... 183
23.1.2 ARP Inspection Overview ...................................................................................... 185
23.2 IP Source Guard .............................................................................................................. 187
23.3 IP Source Guard Static Binding ....................................................................................... 187
23.4 DHCP Snooping .............................................................................................................. 189
23.5 DHCP Snooping Configure .............................................................................................. 192
23.5.1 DHCP Snooping Port Configure ............................................................................. 193
23.5.2 DHCP Snooping VLAN Configure .......................................................................... 195
23.6 ARP Inspection Status .....................................................................................................196
23.6.1 ARP Inspection VLAN Status ................................................................................. 196
23.6.2 ARP Inspection Log Status .................................................................................... 197
23.7 ARP Inspection Configure ............................................................................................... 199
23.7.1 ARP Inspection Port Configure .............................................................................. 200
23.7.2 ARP Inspection VLAN Configure ........................................................................... 201
Chapter 24
Loop Guard............................................................................................................................203
16
24.1 Loop Guard Overview ..................................................................................................... 203
24.2 Loop Guard Setup ........................................................................................................... 205
GS-3012/GS-3012F User’s Guide
Table of Contents
Chapter 25
Two Rate Three Color Marker ..............................................................................................207
25.1 DiffServ Overview ........................................................................................................... 207
25.1.1 DSCP and Per-Hop Behavior ................................................................................ 207
25.1.2 DiffServ Network Example .................................................................................... 208
25.2 Two Rate Three Color Marker Traffic Policing ................................................................ 208
25.2.1 trTCM - Color-blind Mode ....................................................................................... 209
25.2.2 trTCM - Color-aware Mode .................................................................................... 209
25.2.3 Configuring Two Rate Three Color Marker Settings .............................................. 210
Part IV: IP Application.......................................................................... 213
Chapter 26
Static Route ........................................................................................................................... 215
26.1 Static Routing Overview .................................................................................................. 215
26.2 Configuring Static Routing .............................................................................................. 215
Chapter 27
DHCP......................................................................................................................................219
27.1 DHCP Overview ............................................................................................................. 219
27.1.1 DHCP Modes ........................................................................................................ 219
27.1.2 DHCP Configuration Options ................................................................................. 219
27.2 DHCP Status ................................................................................................................... 219
27.3 DHCP Relay ................................................................................................................... 220
27.3.1 DHCP Relay Agent Information ............................................................................. 220
27.3.2 Configuring DHCP Global Relay ............................................................................ 221
27.3.3 Global DHCP Relay Configuration Example .......................................................... 222
27.4 Configuring DHCP VLAN Settings ................................................................................ 222
27.4.1 Example: DHCP Relay for Two VLANs .................................................................. 224
Part V: Management............................................................................. 225
Chapter 28
Maintenance ..........................................................................................................................227
28.1 The Maintenance Screen .............................................................................................. 227
28.2 Load Factory Default ...................................................................................................... 228
28.3 Save Configuration .......................................................................................................... 228
28.4 Reboot System ................................................................................................................ 229
28.5 Firmware Upgrade ........................................................................................................ 229
GS-3012/GS-3012F User’s Guide
17
Table of Contents
28.6 Restore a Configuration File ......................................................................................... 230
28.7 Backup a Configuration File ......................................................................................... 230
28.8 FTP Command Line ........................................................................................................ 231
28.8.1 Filename Conventions .......................................................................................... 231
28.8.2 FTP Command Line Procedure ............................................................................ 231
28.8.3 GUI-based FTP Clients .......................................................................................... 232
28.8.4 FTP Restrictions .................................................................................................... 232
Chapter 29
Access Control......................................................................................................................233
29.1 Access Control Overview ............................................................................................ 233
29.2 The Access Control Main Screen .................................................................................... 233
29.3 About SNMP .................................................................................................................. 234
29.3.1 SNMP v3 and Security ........................................................................................... 235
29.3.2 Supported MIBs ................................................................................................... 235
29.3.3 SNMP Traps .......................................................................................................... 235
29.3.4 Configuring SNMP ................................................................................................ 239
29.3.5 Configuring SNMP Trap Group ........................................................................... 241
29.3.6 Setting Up Login Accounts ................................................................................. 242
29.4 SSH Overview ................................................................................................................. 244
29.5 How SSH works ............................................................................................................... 244
29.6 SSH Implementation on the Switch ................................................................................. 245
29.6.1 Requirements for Using SSH ................................................................................. 245
29.7 Introduction to HTTPS .....................................................................................................245
29.8 HTTPS Example .............................................................................................................. 246
29.8.1 Internet Explorer Warning Messages ..................................................................... 246
29.8.2 Netscape Navigator Warning Messages ................................................................ 247
29.8.3 The Main Screen .................................................................................................... 247
29.9 Service Port Access Control ......................................................................................... 248
29.10 Remote Management ............................................................................................... 249
Chapter 30
Diagnostic..............................................................................................................................251
30.1 Diagnostic ....................................................................................................................... 251
Chapter 31
Syslog ....................................................................................................................................253
31.1 Syslog Overview .............................................................................................................. 253
31.2 Syslog Setup .................................................................................................................. 253
31.3 Syslog Server Setup ....................................................................................................... 254
Chapter 32
Cluster Management.............................................................................................................257
18
GS-3012/GS-3012F User’s Guide
Table of Contents
32.1 Cluster Management Status Overview ........................................................................... 257
32.2 Cluster Management Status ........................................................................................... 258
32.2.1 Cluster Member Switch Management ................................................................... 259
32.3 Clustering Management Configuration .......................................................................... 260
Chapter 33
MAC Table..............................................................................................................................263
33.1 MAC Table Overview ...................................................................................................... 263
33.2 Viewing the MAC Table ................................................................................................... 264
Chapter 34
ARP Table ..............................................................................................................................265
34.1 ARP Table Overview .......................................................................................................265
34.1.1 How ARP Works .................................................................................................... 265
34.2 Viewing the ARP Table ................................................................................................... 265
Chapter 35
Configure Clone....................................................................................................................267
35.1 Configure Clone .............................................................................................................. 267
Part VI: Troubleshooting & Product Specifications.......................... 269
Chapter 36
Troubleshooting....................................................................................................................271
36.1 Power, Hardware Connections, and LEDs ...................................................................... 271
36.2 Switch Access and Login ................................................................................................. 272
Chapter 37
Product Specifications.........................................................................................................275
Part VII: Appendices and Index ......................................................... 281
Appendix A IP Addresses and Subnetting ...........................................................................283
Appendix B Common Services............................................................................................. 293
Appendix C Legal Information ..............................................................................................297
Appendix D Customer Support............................................................................................. 301
Index.......................................................................................................................................307
GS-3012/GS-3012F User’s Guide
19
Table of Contents
20
GS-3012/GS-3012F User’s Guide

List of Figures

List of Figures
Figure 1 Backbone Application .............................................................................................................. 32
Figure 2 Bridging Application ................................................................................................................ 32
Figure 3 High Performance Switched Workgroup Application ............................................................... 33
Figure 4 Shared Server Using VLAN Example ...................................................................................... 34
Figure 5 Attaching Rubber Feet ........................................................................................................... 38
Figure 6 Attaching the Mounting Brackets ............................................................................................. 39
Figure 7 Mounting the Switch on a Rack .............................................................................................. 39
Figure 8 Front Panel: GS-3012 ............................................................................................................. 41
Figure 9 Front Panel: GS-3012F ........................................................................................................... 41
Figure 10 Transceiver Installation Example ........................................................................................... 44
Figure 11 Connecting the Fiber Optic Cables ........................................................................................ 44
Figure 12 Removing the Fiber Optic Cables ......................................................................................... 44
Figure 13 Opening the Transceiver’s Latch Example ............................................................................ 44
Figure 14 Transceiver Removal Example .............................................................................................. 45
Figure 15 Rear Panel: GS-3012 AC Power Model ................................................................................ 45
Figure 16 Rear Panel: GS-3012 DC Power Model ................................................................................ 45
Figure 17 Rear Panel: GS-3012F AC Power Model .............................................................................. 45
Figure 18 Rear Panel: GS-3012F DC Power Model .............................................................................. 45
Figure 19 Web Configurator: Login ....................................................................................................... 50
Figure 20 Web Configurator Home Screen (Status) .............................................................................. 50
Figure 21 Change Administrator Login Password .................................................................................55
Figure 22 Resetting the Switch: Via the Console Port ........................................................................... 57
Figure 23 Web Configurator: Logout Screen ......................................................................................... 57
Figure 24 Initial Setup Network Example: VLAN ................................................................................... 59
Figure 25 Initial Setup Network Example: Port VID ............................................................................... 61
Figure 26 Initial Setup Example: Management IP Address ................................................................... 61
Figure 27 Status .................................................................................................................................... 63
Figure 28 Status > Port Details .............................................................................................................. 65
Figure 29 Basic Setting > System Info .................................................................................................. 70
Figure 30 Basic Setting > General Setup .............................................................................................. 71
Figure 31 Basic Setting > Switch Setup ................................................................................................ 74
Figure 32 Basic Setting > IP Setup ......................................................................................................... 76
Figure 33 Basic Setting > Port Setup .................................................................................................... 78
Figure 34 Port VLAN Trunking ............................................................................................................... 85
Figure 35 Switch Setup > Select VLAN Type ........................................................................................ 85
Figure 36 Advanced Application > VLAN: VLAN Status ........................................................................ 86
Figure 37 Advanced Application > VLAN > VLAN Detail ........................................................................ 86
Figure 38 Advanced Application > VLAN > Static VLAN ...................................................................... 87
GS-3012/GS-3012F User’s Guide
21
List of Figures
Figure 39 Advanced Application > VLAN > VLAN Port Setting ............................................................. 89
Figure 40 Subnet Based VLAN Application Example ............................................................................ 90
Figure 41 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................ 91
Figure 42 Port Based VLAN Setup (All Connected) .............................................................................. 93
Figure 43 Port Based VLAN Setup (Port Isolation) ............................................................................... 94
Figure 44 Advanced Application > Static MAC Forwarding ................................................................... 95
Figure 45 Advanced Application > Filtering ........................................................................................... 97
Figure 46 MRSTP Network Example ................................................................................................... 101
Figure 47 STP/RSTP Network Example .............................................................................................. 102
Figure 48 MSTP Network Example ..................................................................................................... 103
Figure 49 MSTIs in Different Regions ................................................................................................. 104
Figure 50 MSTP and Legacy RSTP Network Example ....................................................................... 104
Figure 51 Advanced Application > Spanning Tree Protocol ................................................................ 105
Figure 52 Advanced Application > Spanning Tree Protocol > Configuration ....................................... 105
Figure 53 Advanced Application > Spanning Tree Protocol > RSTP ................................................... 106
Figure 54 Advanced Application > Spanning Tree Protocol > Status: RSTP ....................................... 108
Figure 55 Advanced Application > Spanning Tree Protocol > MRSTP ................................................ 109
Figure 56 Advanced Application > Spanning Tree Protocol > Status: MRSTP .....................................111
Figure 57 Advanced Application > Spanning Tree Protocol > MSTP ...................................................112
Figure 58 Advanced Application > Spanning Tree Protocol > Status: MSTP .......................................115
Figure 59 Advanced Application > Bandwidth Control .........................................................................118
Figure 60 Advanced Application > Broadcast Storm Control ...............................................................119
Figure 61 Advanced Application > Mirroring ........................................................................................ 121
Figure 62 Advanced Application > Link Aggregation Status ................................................................ 124
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting ............................... 125
Figure 64 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................. 127
Figure 65 Trunking Example - Physical Connections ........................................................................... 128
Figure 66 Trunking Example - Configuration Screen ............................................................................ 129
Figure 67 IEEE 802.1x Authentication Process .................................................................................. 132
Figure 68 MAC Authentication Process .............................................................................................. 132
Figure 69 Advanced Application > Port Authentication ....................................................................... 133
Figure 70 Advanced Application > Port Authentication > 802.1x ........................................................ 133
Figure 71 Advanced Application > Port Authentication > MAC Authentication ................................... 135
Figure 72 Advanced Application > Port Security ................................................................................. 138
Figure 73 Advanced Application > Classifier ....................................................................................... 142
Figure 74 Advanced Application > Classifier: Summary Table ............................................................ 144
Figure 75 Classifier: Example .............................................................................................................. 146
Figure 76 Advanced Application > Policy Rule ................................................................................... 148
Figure 77 Advanced Application > Policy Rule: Summary Table ......................................................... 150
Figure 78 Policy Example .................................................................................................................... 151
Figure 79 Advanced Application > Queuing Method ........................................................................... 154
Figure 80 Advanced Application > Multicast ........................................................................................ 156
Figure 81 Advanced Application > Multicast > Multicast Setting ......................................................... 157
22
GS-3012/GS-3012F User’s Guide
List of Figures
Figure 82 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................. 159
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ................... 160
Figure 84 MVR Network Example ....................................................................................................... 161
Figure 85 MVR Multicast Television Example ..................................................................................... 162
Figure 86 Advanced Application > Multicast > Multicast Setting > MVR ............................................. 163
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 165
Figure 88 MVR Configuration Example ............................................................................................... 166
Figure 89 MVR Configuration Example ............................................................................................... 166
Figure 90 MVR Group Configuration Example ................................................................................... 166
Figure 91 MVR Group Configuration Example .................................................................................... 167
Figure 92 AAA Server ......................................................................................................................... 169
Figure 93 Advanced Application > Auth and Acct ............................................................................... 170
Figure 94 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................ 171
Figure 95 Advanced Application > Auth and Acct > TACACS+ Server Setup ..................................... 173
Figure 96 Advanced Application > Auth and Acct > Auth and Acct Setup .......................................... 175
Figure 97 DHCP Snooping Database File Format ............................................................................... 184
Figure 98 Example: Man-in-the-middle Attack ..................................................................................... 185
Figure 99 IP Source Guard ................................................................................................................... 187
Figure 100 IP Source Guard Static Binding .......................................................................................... 188
Figure 101 DHCP Snooping ................................................................................................................. 189
Figure 102 DHCP Snooping Configure ................................................................................................ 192
Figure 103 DHCP Snooping Port Configure ......................................................................................... 194
Figure 104 DHCP Snooping VLAN Configure ...................................................................................... 195
Figure 105 ARP Inspection Status ........................................................................................................ 196
Figure 106 ARP Inspection VLAN Status ............................................................................................. 197
Figure 107 ARP Inspection Log Status ................................................................................................. 198
Figure 108 ARP Inspection Configure .................................................................................................. 199
Figure 109 ARP Inspection Port Configure .......................................................................................... 200
Figure 110 ARP Inspection VLAN Configure ........................................................................................ 201
Figure 111 Loop Guard vs STP ............................................................................................................ 203
Figure 112 Switch in Loop State ........................................................................................................... 204
Figure 113 Loop Guard - Probe Packet ................................................................................................ 204
Figure 114 Loop Guard - Network Loop ............................................................................................... 204
Figure 115 Advanced Application > Loop Guard .................................................................................. 205
Figure 116 DiffServ: Differentiated Service Field .................................................................................. 207
Figure 117 DiffServ Network ................................................................................................................ 208
Figure 118 trTCM - Color-blind Mode .................................................................................................. 209
Figure 119 trTCM - Color-aware Mode ................................................................................................ 209
Figure 120 Advanced Application > trTCM .......................................................................................... 210
Figure 121 Static Routing Overview .................................................................................................... 215
Figure 122 IP Application > Static Routing .......................................................................................... 216
Figure 123 IP Application > DHCP Status ........................................................................................... 220
Figure 124 IP Application > DHCP > Global ........................................................................................ 221
GS-3012/GS-3012F User’s Guide
23
List of Figures
Figure 125 Global DHCP Relay Network Example ............................................................................. 222
Figure 126 DHCP Relay Configuration Example ................................................................................. 222
Figure 127 IP Application > DHCP > VLAN ....................................................................................... 223
Figure 128 DHCP Relay for Two VLANs ............................................................................................. 224
Figure 129 DHCP Relay for Two VLANs Configuration Example ........................................................ 224
Figure 130 Management > Maintenance ............................................................................................. 227
Figure 131 Load Factory Default: Start ................................................................................................ 228
Figure 132 Reboot System: Confirmation ........................................................................................... 229
Figure 133 Management > Maintenance > Firmware Upgrade .......................................................... 229
Figure 134 Management > Maintenance > Restore Configuration ...................................................... 230
Figure 135 Management > Maintenance > Backup Configuration ...................................................... 230
Figure 136 Management > Access Control ......................................................................................... 233
Figure 137 SNMP Management Model .............................................................................................. 234
Figure 138 Management > Access Control > SNMP ........................................................................... 240
Figure 139 Management > Access Control > SNMP > Trap Group .................................................... 242
Figure 140 Management > Access Control > Logins .......................................................................... 243
Figure 141 SSH Communication Example ...........................................................................................244
Figure 142 How SSH Works ................................................................................................................. 244
Figure 143 HTTPS Implementation ...................................................................................................... 246
Figure 144 Security Alert Dialog Box (Internet Explorer) ...................................................................... 246
Figure 145 Security Certificate 1 (Netscape) ........................................................................................ 247
Figure 146 Security Certificate 2 (Netscape) ........................................................................................ 247
Figure 147 Example: Lock Denoting a Secure Connection .................................................................. 248
Figure 148 Management > Access Control > Service Access Control ................................................ 248
Figure 149 Management > Access Control > Remote Management .................................................. 249
Figure 150 Management > Diagnostic ................................................................................................. 251
Figure 151 Management > Syslog ....................................................................................................... 254
Figure 152 Management > Syslog > Syslog Server Setup .................................................................. 255
Figure 153 Clustering Application Example ......................................................................................... 258
Figure 154 Management > Cluster Management: Status .................................................................... 258
Figure 155 Cluster Management: Cluster Member Web Configurator Screen .................................... 259
Figure 156 Example: Uploading Firmware to a Cluster Member Switch ............................................. 260
Figure 157 Management > Cluster Management > Configuration ..................................................... 261
Figure 158 MAC Table Flowchart ........................................................................................................ 263
Figure 159 Management > MAC Table ................................................................................................ 264
Figure 160 Management > ARP Table ................................................................................................ 266
Figure 161 Management > Configure Clone .......................................................................................267
Figure 162 Network Number and Host ID ............................................................................................ 284
Figure 163 Subnetting Example: Before Subnetting ............................................................................ 286
Figure 164 Subnetting Example: After Subnetting ............................................................................... 287
Figure 165 Conflicting Computer IP Addresses Example .................................................................... 291
Figure 166 Conflicting Computer IP Addresses Example .................................................................... 291
Figure 167 Conflicting Computer and Router IP Addresses Example .................................................. 292
24
GS-3012/GS-3012F User’s Guide

List of Tables

List of Tables
Table 1 Front Panel Connections .......................................................................................................... 42
Table 2 LED Descriptions ...................................................................................................................... 46
Table 3 Navigation Panel Sub-links Overview ....................................................................................... 51
Table 4 Web Configurator Screen Sub-links Details .............................................................................. 52
Table 5 Navigation Panel Links ............................................................................................................. 53
Table 6 Status ........................................................................................................................................ 63
Table 7 Status: Port Details ................................................................................................................... 65
Table 8 Basic Setting > System Info ...................................................................................................... 70
Table 9 Basic Setting > General Setup .................................................................................................. 72
Table 10 Basic Setting > Switch Setup .................................................................................................. 74
Table 11 Basic Setting > IP Setup ......................................................................................................... 76
Table 12 Basic Setting > Port Setup ...................................................................................................... 78
Table 13 IEEE 802.1Q VLAN Terminology ............................................................................................ 84
Table 14 Advanced Application > VLAN: VLAN Status .......................................................................... 86
Table 15 Advanced Application > VLAN > VLAN Detail ........................................................................ 87
Table 16 Advanced Application > VLAN > Static VLAN ......................................................................... 88
Table 17 Advanced Application > VLAN > VLAN Port Setting ............................................................... 89
Table 18 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN Setup ............... 91
Table 19 Port Based VLAN Setup ......................................................................................................... 94
Table 20 Advanced Application > Static MAC Forwarding ..................................................................... 96
Table 21 Advanced Application > FIltering ............................................................................................ 97
Table 22 STP Path Costs .................................................................................................................... 100
Table 23 STP Port States .................................................................................................................... 101
Table 24 Advanced Application > Spanning Tree Protocol > Configuration ........................................ 105
Table 25 Advanced Application > Spanning Tree Protocol > RSTP .................................................... 106
Table 26 Advanced Application > Spanning Tree Protocol > Status: RSTP ........................................ 108
Table 27 Advanced Application > Spanning Tree Protocol > MRSTP ................................................. 109
Table 28 Advanced Application > Spanning Tree Protocol > Status: MRSTP ......................................111
Table 29 Advanced Application > Spanning Tree Protocol > MSTP .....................................................113
Table 30 Advanced Application > Spanning Tree Protocol > Status: MSTP .........................................115
Table 31 Advanced Application > Bandwidth Control ...........................................................................118
Table 32 Advanced Application > Broadcast Storm Control ................................................................ 120
Table 33 Advanced Application > Mirroring ......................................................................................... 122
Table 34 Link Aggregation ID: Local Switch ........................................................................................ 124
Table 35 Link Aggregation ID: Peer Switch ......................................................................................... 124
Table 36 Advanced Application > Link Aggregation Status ................................................................. 124
Table 37 Advanced Application > Link Aggregation > Link Aggregation Setting ................................. 126
Table 38 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................... 127
GS-3012/GS-3012F User’s Guide
25
List of Tables
Table 39 Advanced Application > Port Authentication > 802.1x .......................................................... 134
Table 40 Advanced Application > Port Authentication > MAC Authentication ..................................... 135
Table 41 Advanced Application > Port Security ................................................................................... 138
Table 42 Advanced Application > Classifier ......................................................................................... 142
Table 43 Classifier: Summary Table .................................................................................................... 144
Table 44 Common Ethernet Types and Protocol Numbers ................................................................. 144
Table 45 Common IP Protocol Types and Protocol Numbers ............................................................. 145
Table 46 Common TCP and UDP Port Numbers ................................................................................ 145
Table 47 Advanced Application > Policy Rule ..................................................................................... 149
Table 48 Advanced Application > Policy Rule: Summary Table .......................................................... 150
Table 49 Advanced Application > Queuing Method ............................................................................. 154
Table 50 Advanced Application > Multicast Status ..............................................................................156
Table 51 Advanced Application > Multicast > Multicast Setting ........................................................... 157
Table 52 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................... 159
Table 53 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile .................... 160
Table 54 Advanced Application > Multicast > Multicast Setting > MVR ............................................... 163
Table 55 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 165
Table 56 RADIUS vs TACACS+ .......................................................................................................... 170
Table 57 Advanced Application > Auth and Acct > RADIUS Server Setup ......................................... 171
Table 58 Advanced Application > Auth and Acct > TACACS+ Server Setup ...................................... 173
Table 59 Advanced Application > Auth and Acct > Auth and Acct Setup ............................................ 175
Table 60 Supported VSAs ................................................................................................................... 177
Table 61 Supported Tunnel Protocol Attribute ..................................................................................... 178
Table 62 RADIUS Attributes - Exec Events via Console ..................................................................... 180
Table 63 RADIUS Attributes - Exec Events via Telnet/SSH ................................................................ 180
Table 64 RADIUS Attributes - Exec Events via Console ..................................................................... 180
Table 65 IP Source Guard ................................................................................................................... 187
Table 66 IP Source Guard Static Binding ............................................................................................ 188
Table 67 DHCP Snooping .................................................................................................................... 190
Table 68 DHCP Snooping Configure ................................................................................................... 192
Table 69 DHCP Snooping Port Configure ........................................................................................... 194
Table 70 DHCP Snooping VLAN Configure .........................................................................................195
Table 71 ARP Inspection Status .......................................................................................................... 196
Table 72 ARP Inspection VLAN Status ................................................................................................ 197
Table 73 ARP Inspection Log Status ................................................................................................... 198
Table 74 ARP Inspection Configure ..................................................................................................... 199
Table 75 ARP Inspection Port Configure ............................................................................................. 201
Table 76 ARP Inspection VLAN Configure .......................................................................................... 202
Table 77 Advanced Application > Loop Guard ....................................................................................205
Table 78 Advanced Application > trTCM ............................................................................................. 210
Table 79 IP Application > Static Routing .............................................................................................. 216
Table 80 IP Application > DHCP .......................................................................................................... 220
Table 81 Relay Agent Information ....................................................................................................... 220
26
GS-3012/GS-3012F User’s Guide
List of Tables
Table 82 IP Application > DHCP > Global ........................................................................................... 221
Table 83 IP Application > DHCP > VLAN ............................................................................................ 223
Table 84 Management > Maintenance ................................................................................................ 227
Table 85 Filename Conventions .......................................................................................................... 231
Table 86 Access Control Overview ...................................................................................................... 233
Table 87 SNMP Commands ................................................................................................................ 234
Table 88 SNMP System Traps ............................................................................................................. 235
Table 89 SNMP InterfaceTraps ............................................................................................................ 237
Table 90 AAA Traps ............................................................................................................................. 237
Table 91 SNMP IP Traps ..................................................................................................................... 238
Table 92 SNMP Switch Traps .............................................................................................................. 239
Table 93 Management > Access Control > SNMP .............................................................................. 240
Table 94 Management > Access Control > SNMP > Trap Group ........................................................ 242
Table 95 Management > Access Control > Logins .............................................................................. 243
Table 96 Management > Access Control > Service Access Control ................................................... 249
Table 97 Management > Access Control > Remote Management ...................................................... 249
Table 98 Management > Diagnostic .................................................................................................... 251
Table 99 Syslog Severity Levels .......................................................................................................... 253
Table 100 Management > Syslog ........................................................................................................ 254
Table 101 Management > Syslog > Syslog Server Setup ................................................................... 255
Table 102 ZyXEL Clustering Management Specifications ................................................................... 257
Table 103 Management > Cluster Management: Status ...................................................................... 259
Table 104 FTP Upload to Cluster Member Example ........................................................................... 260
Table 105 Management > Cluster Management > Configuration ........................................................ 261
Table 106 Management > MAC Table ................................................................................................. 264
Table 107 Management > ARP Table .................................................................................................. 266
Table 108 Management > Configure Clone ......................................................................................... 268
Table 109 Hardware Specifications ..................................................................................................... 275
Table 110 Firmware Specifications ...................................................................................................... 276
Table 111 Feature Specifications ......................................................................................................... 278
Table 112 Standards Supported .......................................................................................................... 278
Table 113 IP Address Network Number and Host ID Example ............................................................ 284
Table 114 Subnet Masks ..................................................................................................................... 285
Table 115 Maximum Host Numbers ..................................................................................................... 285
Table 116 Alternative Subnet Mask Notation ....................................................................................... 285
Table 117 Subnet 1 .............................................................................................................................. 287
Table 118 Subnet 2 .............................................................................................................................. 288
Table 119 Subnet 3 .............................................................................................................................. 288
Table 120 Subnet 4 .............................................................................................................................. 288
Table 121 Eight Subnets ...................................................................................................................... 288
Table 122 24-bit Network Number Subnet Planning ............................................................................ 289
Table 123 16-bit Network Number Subnet Planning ............................................................................ 289
Table 124 Commonly Used Services ................................................................................................... 293
GS-3012/GS-3012F User’s Guide
27
List of Tables
28
GS-3012/GS-3012F User’s Guide
PART I
Introduction and
Hardware
Getting to Know Your Switch (31)
Hardware Installation and Connection (37)
Hardware Overview (41)
29
30
Loading...
+ 284 hidden pages