background image

Chapter 9 Port Settings

GS1510 Series User’s Guide

58

Back Pressure flow control is typically used in half duplex mode to send a 
"collision" signal to the sending port (mimicking a state of packet collision) 
causing the sending port to temporarily stop sending signals and resend later. 

Figure 33   

Port Settings

Summary of Contents for GS1510-16 -

Page 1: ...10 16 GS1510 24 16 port 24 port Managed Gigabit Ethernet Switch Copyright 2010 ZyXEL Communications Corporation Firmware Version 1 00 Edition 2 12 2010 Default Login Details IP Address http 192 168 1...

Page 2: ......

Page 3: ...elated Documentation Supporting Disc Refer to the included CD for support documents ZyXEL Web Site Please refer to www zyxel com for additional support documentation and product certifications Documen...

Page 4: ...questions about ZyXEL products Forum This contains discussions on ZyXEL products Learn from others who use ZyXEL products and share your experiences as well Customer Support In the event of problems t...

Page 5: ...key stroke is denoted by square brackets and uppercase text for example ENTER means the enter or return key on your keyboard Enter means for you to type one or more characters and then press the ENTER...

Page 6: ...uide 6 Icons Used in Figures Figures in this User s Guide may use the following generic icons The Switch icon is not an exact representation of your device Switch Computer Notebook computer Server DSL...

Page 7: ...step on them or stumble over them Always disconnect all cables from this device before servicing or disassembling Use ONLY an appropriate power adaptor or cord for your device Connect the power adapt...

Page 8: ...Safety Warnings GS1510 Series User s Guide 8...

Page 9: ...eneral Settings 47 MAC Management 51 Port Mirroring 55 Port Settings 57 Advanced Settings 61 VLAN 63 EEE 71 IGMP Snooping 73 Link Aggregation 77 Loop Guard 81 QoS 85 Storm Control 93 Spanning Tree Pro...

Page 10: ...Contents Overview GS1510 Series User s Guide 10...

Page 11: ...ce Switching Example 21 1 1 4 IEEE 802 1Q VLAN Application Examples 21 1 2 Good Habits for Managing the Switch 22 Chapter 2 Hardware Installation and Connection 23 2 1 Freestanding Installation 23 2 2...

Page 12: ...figuration 43 4 5 Switch Lockout 43 4 6 Resetting the Switch 43 4 7 Logging Out of the Web Configurator 44 Chapter 5 System 45 5 1 System Screen 45 Chapter 6 General Settings 47 6 1 What You Can Do 47...

Page 13: ...tion 64 10 5 VLAN Settings 67 10 6 Tag Settings 68 10 7 Port Settings 69 Chapter 11 EEE 71 11 1 Overview 71 11 1 1 EEE Screen 71 Chapter 12 IGMP Snooping 73 12 1 Overview 73 12 2 What You Can Do 73 12...

Page 14: ...Priority Queue Mapping 89 15 7 Queuing Method 90 Chapter 16 Storm Control 93 16 0 1 Broadcast Storm Control Setup 93 Chapter 17 Spanning Tree Protocol 95 17 1 Overview 95 17 2 What You Can DO 95 17 3...

Page 15: ...Global Settings 118 19 5 Port Settings 120 Chapter 20 Web Authentication 123 20 1 Overview 123 20 2 What You Can Do 123 20 3 What You Need to Know 123 20 3 1 User Authentication Experience 124 20 4 Co...

Page 16: ...23 2 User Account Screen 143 Part V Troubleshooting Product Specifications 145 Chapter 24 Troubleshooting 147 24 1 Power Hardware Connections and LEDs 147 24 2 Switch Access and Login 148 Chapter 25...

Page 17: ...17 PART I Introduction and Hardware Overview Getting to Know Your Switch 19 Hardware Installation and Connection 23 Hardware Overview 27...

Page 18: ...18...

Page 19: ...open slots With its built in Web Configurator managing and configuring the Switch is easy The Switch can operate in low power idle mode in compliance with IEEE 802 3az Energy Efficient Ethernet EEE Se...

Page 20: ...the Switch connects different company departments RD and Sales to the corporate backbone It can alleviate bandwidth contention and eliminate server and network bottlenecks All users that need high ba...

Page 21: ...re can be retained as all ports can freely communicate with each other Figure 3 High Performance Switched Workgroup Application 1 1 4 IEEE 802 1Q VLAN Application Examples A VLAN Virtual Local Area Ne...

Page 22: ...re and to manage the Switch more effectively Change the password Use a password that s not easy to guess and that consists of different types of characters such as numbers and letters Write down the p...

Page 23: ...weight of the Switch and the connected cables Make sure there is a power outlet nearby 3 Make sure there is enough clearance around the Switch to allow air circulation and the attachment of cables an...

Page 24: ...irements Two mounting brackets Eight M3 flat head screws and a 2 Philips screwdriver Four M5 flat head screws and a 2 Philips screwdriver Note Failure to use the proper screws may damage the unit 2 2...

Page 25: ...e Switch on a rack Proceed to the next section 2 2 3 Mounting the Switch on a Rack 1 Position a mounting bracket that is already attached to the Switch on one side of the rack lining up the two screw...

Page 26: ...Chapter 2 Hardware Installation and Connection GS1510 Series User s Guide 26...

Page 27: ...ont panel and rear panel of the Switch and shows you how to make the hardware connections 3 1 Front Panel The figures below show the front panel of the Switch Figure 8 GS1510 16 Front Panel Figure 9 G...

Page 28: ...et cable 3 1 1 1 Default Ethernet Settings The factory default negotiation settings for the Ethernet ports on the Switch are Speed Auto Duplex Auto Flow control Off 3 1 2 Mini GBIC Slots There are two...

Page 29: ...ber optic module s connectors 3 1 2 1 Transceiver Installation Use the following steps to install a mini GBIC transceiver SFP module 1 Insert the transceiver into the slot with the exposed section of...

Page 30: ...nd reloads its factory default configuration file The RESET button is on the front panel of the Switch Note When you use the RESET button all of your configuration settings will be lost Use the defaul...

Page 31: ...link to a 10 1000 Mbps Ethernet network is up Amber On The link to a 100 Mbps Ethernet network is up Blinking The port is transmitting receiving data Off The link to an Ethernet network is down FDX A...

Page 32: ...uide 32 To connect the power to the Switch insert the female end of the power cord into the power receptacle on the rear panel Connect the other end of the supplied power cord to a 100 240V AC 50 60 H...

Page 33: ...33 PART II Basic Settings The Web Configurator 35 System 45 General Settings 47 MAC Management 51 Port Mirroring 55 Port Settings 57...

Page 34: ...34...

Page 35: ...r pop up windows from your device Web pop up blocking is enabled by default in Windows XP SP Service Pack 2 JavaScript enabled by default Java permissions enabled by default Note This User s Guide sho...

Page 36: ...username is admin and the associated default password is 1234 Figure 16 Web Configurator Login 4 Click Login to view the first Web Configurator screen 4 3 1 Smart Mode The Smart mode screens enable y...

Page 37: ...ly to save the changes Figure 17 Web Configurator Smart Screen IP Setting 4 3 1 2 EEE Energy Efficient Ethernet Use this screen to reduce energy consumption over RJ 45 Ethernet Ports during idle perio...

Page 38: ...screen The Management User Account screen Section 23 2 on page 143 allows you to create more user accounts for web authentication Click Apply to save any changes Figure 19 Web Authentication Smart Sc...

Page 39: ...4 3 1 5 STP Spanning Tree Protocol Use this screen to activate the Spanning Tree Protocol STP feature which is used to prevent loops in the core of your network Click the STP tab to open the screen as...

Page 40: ...k to view more information about the device s vendor Use the Logout link to exit the Web Configurator Use the Smart button to go to the smart screens where you can quickly set up some main functions U...

Page 41: ...onfiguring Port VLAN ID PVID tag untag and acceptable frame settings EEE Use this screen to enable disable Energy Efficient Ethernet on each port IGMP Snooping Use this screen to configure multicast r...

Page 42: ...a username and password provided by the user Web Authentication Use this screen to configure settings that define when notifications are sent to an external management station Management Maintenance...

Page 43: ...d or IP address 4 Enable Dynamic ARP without entering the proper MAC to IP address binding 4 6 Resetting the Switch If you lock yourself and others from the Switch or forget the administrator password...

Page 44: ...the Web Configurator Click Logout on the top right corner of the screen to exit the Web Configurator You have to log in with your password again after you log out This is recommended after you finish...

Page 45: ...ystem Information in the navigation panel to view device specific information such as host name firmware version and so on Figure 25 System The following table describes the labels in this screen Tabl...

Page 46: ...e 47 Subnet Mask This field indicates the subnet mask of the Switch Default Gateway This field indicates the IP address of the default gateway MAC Address This field displays the MAC Media Access Cont...

Page 47: ...he Jumbo Frame screen Section 6 3 on page 48 to configure the jumbo frame size the Switch accepts Use the SNTP screen Section 6 4 on page 49 to configure the date and time of the Switch 6 2 System Use...

Page 48: ...e Switch to automatically get an IP address from a DHCP server Click Renew to have the Switch reget an IP address from the DHCP server Select Disable if you want to configure the Switch s IP address m...

Page 49: ...h Table 6 Basic Settings General Settings Jumbo Frame continued LABEL DESCRIPTION Table 7 Basic Settings General Settings SNTP LABEL DESCRIPTION Current Time and Date Current Time This field displays...

Page 50: ...ght Saving Time starts in the European Union on the last Sunday of March All of the time zones in the European Union start using Daylight Saving Time at the same moment 1 A M GMT or UTC So in the Euro...

Page 51: ...Switch or static manually entered 7 2 What You Can Do Use the Static MAC Settings screen Section 7 4 on page 52 to manually add a static MAC address to the table Use the MAC Table screen Section 7 5...

Page 52: ...t came in on then it filters the frame Figure 29 MAC Table Flowchart 7 4 Static MAC Settings A static Media Access Control MAC address is an address that has been manually entered in the MAC address t...

Page 53: ...uter or device Port Enter the port number to which the computer or device is connected Apply Click Apply to add the MAC address entry to the MAC address table Refresh Click Refresh to begin configurin...

Page 54: ...s entries on this screen Refresh Click this to update the information in the MAC table MAC Address This field displays a MAC address Type This field displays whether this entry was entered manually St...

Page 55: ...copy traffic flow to a monitor port the port you copy the traffic to in order that you can examine the traffic from the mirrored port without interference Click Basic Settings Port Mirroring to displa...

Page 56: ...gs the same for all ports Use this field first to set the common settings and then make adjustments on a port by port basis Source Port This field displays the number of a port Mirror Mode Select Ingr...

Page 57: ...Switch determines the connection speed by detecting the signal on the cable and using half duplex mode When the Switch s auto negotiation is turned off a port uses the pre configured speed and duplex...

Page 58: ...Back Pressure flow control is typically used in half duplex mode to send a collision signal to the sending port mimicking a state of packet collision causing the sending port to temporarily stop send...

Page 59: ...g resources for the port thus ensuring lossless operation across network switches Otherwise select Off to disable it Apply Click Apply to save the changes back to the Switch Refresh Click Refresh to b...

Page 60: ...Chapter 9 Port Settings GS1510 Series User s Guide 60...

Page 61: ...61 PART III Advanced Settings VLAN 63 EEE 71 IGMP Snooping 73 Link Aggregation 77 Loop Guard 81 QoS 85 Storm Control 93 Spanning Tree Protocol 95...

Page 62: ...62...

Page 63: ...port settings 10 3 What You Need to Know 10 3 1 Introduction to IEEE 802 1Q Tagged VLANs A tagged VLAN uses an explicit tag VLAN ID in the MAC header to identify the VLAN membership of a frame across...

Page 64: ...es Each port on the Switch is capable of passing tagged or untagged frames To forward a frame from an 802 1Q VLAN aware switch to an 802 1Q VLAN unaware switch the Switch first decides where to forwar...

Page 65: ...Chapter 10 VLAN GS1510 Series User s Guide 65 Click Advanced Settings VLAN Port Isolation to display the following screen Figure 34 Port Isolation...

Page 66: ...management port By default it forms a VLAN with all Ethernet ports If it does not form a VLAN with a particular port then the Switch cannot be managed from that port Select All Deselect All Click Sel...

Page 67: ...are allowed Member Port Enter the port numbers you want the Switch to assign to the VLAN as members You can designate multiple port numbers individually by using a comma and by range with a hyphen App...

Page 68: ...t tagging settings Tag Port Selecting a port which is a member of the selected VLAN ID will make it a tag port This means the port will tag all outgoing frames transmitted with the VLAN ID Select All...

Page 69: ...ct a PVID Port VLAN ID number from the drop down box Acceptable Frame Specify the type of frames allowed on a port Choices are All VLAN Untagged Only or VLAN Tagged Only Select All from the drop down...

Page 70: ...his field displays the port number PVID This field displays the Port VLAN ID number Acceptable Frame This field displays the type of frames allowed on the port This will either display All or Tag Only...

Page 71: ...version of this screen appears in Smart Mode See Section 4 3 1 2 on page 37 11 1 1 EEE Screen Click Advanced Settings EEE to view the screen as shown Figure 38 EEE The following table describes the la...

Page 72: ...1 EEE GS1510 Series User s Guide 72 Apply Click this to save any changes to the Switch Refresh Click this to reload the screen and reset any changes that were just made Table 16 EEE continued LABEL DE...

Page 73: ...r disable immediate leave on ports 12 3 What You Need to Know The Switch can passively snoop on IGMP packets transferred between IP multicast routers switches and IP multicast hosts to learn the IP mu...

Page 74: ...gure 39 IGMP Snooping The following table describes the labels in this screen Table 17 IGMP Snooping LABEL DESCRIPTION IGMP Snooping State Select Enable to activate IGMP Snooping to forward group mult...

Page 75: ...er IGMP snooping is globally enabled or disabled IGMP Snooping VLAN State This field displays VLANs on which the Switch is to perform IGMP snooping None displays if you have not enabled IGMP snooping...

Page 76: ...Chapter 12 IGMP Snooping GS1510 Series User s Guide 76...

Page 77: ...nto one logical higher capacity link You may want to trunk ports if for example it is cheaper to use multiple lower speed links than to under utilize a high speed but more costly single port link Howe...

Page 78: ...become operational without user intervention Please note that You must connect all ports point to point to the same Ethernet switch and configure the ports for LACP trunking LACP only works on full d...

Page 79: ...Enable to use this static trunk group Member Ports Select the ports to be added to the static trunk group Select All Click this to select all ports as members of the static trunk group Deselect All C...

Page 80: ...the LACP server The LACP server controls the operation of LACP setup Enter a number to set the priority of an active port using Link Aggregation Control Protocol LACP The smaller the number the higher...

Page 81: ...the edge of your network Figure 43 Loop Guard vs STP 14 2 What You Need to Know Loop guard is designed to handle loop problems on the edge of your network This can occur when a port is connected to a...

Page 82: ...enabled port is connected to a switch in loop state This is accomplished by periodically sending a probe packet and seeing if the packet returns on the same port If this is the case the Switch will sh...

Page 83: ...re MAC Address Enter the destination MAC address the probe packets will be sent to If the port receives these same packets the port will be shut down Port Select a port on which to configure loop guar...

Page 84: ...eries User s Guide 84 Loop Recovery This field displays if the loop recovery feature is enabled Recovery Time min This field displays the recovery time for the loop recovery feature Table 21 Loop Guar...

Page 85: ...en Section 15 4 on page 86 to specify IEEE 802 1p priority for each port Use the IP DiffServ DSCP screen Section 15 5 on page 87 to configure DSCP based QoS settings Use the Priority Queue Mapping scr...

Page 86: ...des any available bandwidth across the different traffic queues and returns to queues that have not yet emptied 15 3 2 QoS Enhancement You can configure the Switch to prioritize traffic even if the in...

Page 87: ...or the Table 22 Port Priority LABEL DESCRIPTION All Ports 802 1p priority Use this field to set a priority for all ports The value indicates packet priority and is added to the priority tag field of i...

Page 88: ...with DiffServ Code Points DSCPs indicating the level of service desired This allows the intermediary DiffServ compliant network devices to handle the packets differently depending on the code points w...

Page 89: ...P LABEL DESCRIPTION Mode Select Tag Over DSCP if you want to use 802 1p Priority in packets to prioritize traffic Select DSCP Over Tag if you want to use DSCP priority to prioritize traffic even if th...

Page 90: ...screen Figure 50 Queuing Method Table 24 Priority Queue Mapping LABEL DESCRIPTION Reset to default Click this button to reset the priority to queue mappings to the defaults Priority This field displa...

Page 91: ...hts get more service than queues with smaller weights Queue ID This field indicates which Queue 0 to 7 you are configuring Queue 0 has the lowest priority and Queue 7 the highest priority Weight Value...

Page 92: ...Chapter 15 QoS GS1510 Series User s Guide 92...

Page 93: ...t and unknown unicast also referred to as Destination Lookup Failure or DLF packets the Switch receives per second on the ports When the maximum number of allowable broadcast multicast and unknown uni...

Page 94: ...ond Bcast Mcast to specify a limit for the amount of broadcast and multicast packets received per second Mcast DLF to specify a limit for the amount of multicast and DLF packets received per second Bc...

Page 95: ...to enable and configure STP Use the STP Status screen Section 17 5 on page 98 to check the STP current status 17 3 What You Need to Know The Switch uses IEEE 802 1w RSTP Rapid Spanning Tree Protocol t...

Page 96: ...that are the designated ports for connected LANs and disables all other ports that participate in STP Network packets are therefore only forwarded between enabled ports eliminating any possible netwo...

Page 97: ...uired because every switch must receive information about topology changes before it starts to forward frames In addition each port needs time to listen for conflicting information that would make it...

Page 98: ...riority determines the root bridge which in turn determines the Root Hello Time Root Maximum Age and Root Forwarding Delay Pathcost Path cost is the cost of transmitting a frame on to a LAN through th...

Page 99: ...e BPDUs at regular intervals Any port that ages out STP information provided in the last BPDU becomes the designated port for the attached LAN If it is a root port a new root port is selected from amo...

Page 100: ...Chapter 17 Spanning Tree Protocol GS1510 Series User s Guide 100...

Page 101: ...101 PART IV Security and Management IP Source Guard 103 802 1x 117 Web Authentication 123 Maintenance 129 SNMP 135 User Account 143...

Page 102: ...102...

Page 103: ...filter unauthorized ARP packets on the network Use the Binding Table screens Section 18 7 on page 112 to manually enter static bindings and to convert dynamic bindings to static 18 3 What You Need To...

Page 104: ...for DHCP snooping This setting is independent of the trusted untrusted setting for ARP inspection Trusted ports are connected to DHCP servers or other switches The Switch learns dynamic bindings from...

Page 105: ...ish a connection with computer A Computer X is in the same broadcast domain as computer A and intercepts the ARP request for computer A Then computer X does the following things It pretends to be comp...

Page 106: ...the following situations The sender s information in the ARP packet does not match any of the current bindings The rate at which ARP packets arrive is too high 18 3 2 3 Syslog The Switch can send sys...

Page 107: ...CP Snooping LABEL DESCRIPTION State Select Enable to use DHCP snooping on the Switch You still have to enable DHCP snooping on specific VLANs and specify trusted ports Note The Switch will drop all DH...

Page 108: ...ss and source IP address in the packet do not match any of the current bindings The packet is a RELEASE or DECLINE packet and the source MAC address and source port do not match any of the current bin...

Page 109: ...DESCRIPTION Port Settings Port Select a port number 1 16 for GS1510 16 1 26 for GS1510 24 to modify its maximum host count Maximum Host Count Enter the maximum number of hosts 1 32 that are permitted...

Page 110: ...ection on the Switch VLAN State Enter the VLAN IDs you want the Switch to enable ARP Inspection for You can designate multiple VLANs individually by using a comma and by range with a hyphen Trusted Po...

Page 111: ...P Inspection Filter Table Figure 58 Filter Table Deselect All Click this to set all ports to untrusted Apply Click this to save any changes to the Switch Refresh Click this to reload the screen and re...

Page 112: ...ters Enter how long 1 10080 minutes the MAC address filter remains in the Switch after the Switch identifies an unauthorized ARP packet The Switch automatically deletes the MAC address filter afterwar...

Page 113: ...ng one Refresh Click this to reload the screen and reset any changes that were just made No This field displays a sequential number for each binding Click it to update an existing entry MAC Address Th...

Page 114: ...s screen Table 35 Binding Table LABEL DESCRIPTION Show Type Select All to display both dynamic and static binding entries Select Dynamic to display dynamic binding entries only Select Static to displa...

Page 115: ...from information provided manually by an administrator Dynamic This binding was learned by snooping DHCP packets Apply Click Apply and the Switch will convert any selected dynamic binding entries to...

Page 116: ...Chapter 18 IP Source Guard GS1510 Series User s Guide 116...

Page 117: ...thentication server to authenticate a large number of users This external method of authentication uses the RADIUS Remote Authentication Dial In User Service RFC 2138 2139 protocol to validate users S...

Page 118: ...RADIUS server The RADIUS server validates whether this client is allowed access to the port Figure 61 IEEE 802 1x Authentication Process 19 3 2 Local User Accounts By storing user profiles locally on...

Page 119: ...l server instead of an internal device user database that is limited to the memory capacity of the device In essence RADIUS allows you to validate an unlimited number of users from a central location...

Page 120: ...al Status State This field displays if 802 1x authentication is Enabled or Disabled Authentication Method This field displays if the authentication method is Local or RADIUS Primary Radius Server This...

Page 121: ...ave not passed authentication Max req Time Specify the amount of times the Switch will try to connect to the authentication server before determining the server is down The acceptable range for this f...

Page 122: ...rized forces the port to be unauthorized No packets can pass through the port Guest VLAN This field displays the Guest VLAN setting for hosts that have not passed authentication None or 1 Max req Time...

Page 123: ...d port accesses the Internet a customized web login page will display User accounts with User or Guest privileges can login past this screen and access the Internet 20 2 What You Can Do Use the Config...

Page 124: ...http 172 20 1 111 A domain with a full address example http news zyxel com article 100826 html 20 3 1 User Authentication Experience When the user attempts to access the Internet through a port which...

Page 125: ...disable the Web Authentication feature You can also use this screen to configure the authentication method Note Another version of this screen can be accessed in Smart Mode See Section 4 3 1 3 on page...

Page 126: ...erver will be used for all web authentication attempts IP Enter the IP address of an external RADIUS server in dotted decimal notation UDP Port Enter the UDP port of the RADIUS server The default port...

Page 127: ...d This will appear as the logo Title Enter a text title to display on the login page Title Color Enter the HTML code for the color of the Title or pick one from the swatch palette icon Title Size Sele...

Page 128: ...ode for the color of the Background or pick one from the swatch palette icon Apply Click this to save any changes Reset Click this to reset any changes that were made Preview Click this to update the...

Page 129: ...What You Can Do Use the Configuration screen Section 21 3 on page 130 to manage the configuration settings Use the Firmware screen Section 21 4 on page 132 to upgrade the firmware of the Switch Use th...

Page 130: ...urations allows you to create various snap shots of your device from which you may restore at a later date Follow the steps below to back up the current Switch configuration 1 Click Backup Figure 69 B...

Page 131: ...rom or cfg The following table describes the labels in this screen 21 3 3 Restore Factory Default Settings Follow the steps below to reset the Switch back to the factory defaults 1 In the Configuratio...

Page 132: ...as shown next Figure 73 Firmware Type the path and file name of the firmware file you wish to upload to the Switch in the File path text box or click Browse to locate it Click Upgrade to load the new...

Page 133: ...nerate a syslog message and send it to a syslog server Syslog is defined in RFC 3164 The RFC defines the packet format content and system log related information of syslog messages Each syslog message...

Page 134: ...r IP Enter the IP address of an external syslog server in dotted decimal notation Select Enable to use the external syslog server or Disable to not use it Apply Click this to save any changes Log Leve...

Page 135: ...Name screen Section 22 5 on page 138 to create SNMP communities Use the Trap Receiver screen Section 22 6 on page 140 to configure the sending of SNMP traps to remote SNMP management stations 22 3 Wh...

Page 136: ...out the device Examples of variables include number of packets received node port status and so on A Management Information Base MIB is a collection of managed objects SNMP allows a manager and agents...

Page 137: ...2 History Group 3 Alarm Group 9 Event 22 3 3 SNMP Traps The Switch sends traps to an SNMP manager when an event occurs SNMP traps supported are outlined in the following table 22 4 SNMP Settings Use...

Page 138: ...ts to them Click Management SNMP Community Name to view the screen as shown Table 44 SNMP Settings LABEL DESCRIPTION SNMP State Select Enable to activate SNMP on the Switch Select Disable to not use S...

Page 139: ...ransmitted between the SNMP manager and the SNMP agent Rights Select Read Only to allow the SNMP manager using this string to collect information from the Switch Select Read Write to allow the SNMP ma...

Page 140: ...This field displays the IP address of the remote SNMP management station after it has been modified by the subnet mask Subnet Mask This field displays the subnet mask for the IP address of the remote...

Page 141: ...is field displays the IP address of the remote trap station Version This field displays the version of Simple Network Management Protocol in use v1 or v2c Community String This field displays the comm...

Page 142: ...Chapter 22 SNMP GS1510 Series User s Guide 142...

Page 143: ...counts are used for IEEE 802 1x Authentication Chapter 19 on page 117 and Web Authentication Chapter 20 on page 123 23 2 User Account Screen Use this screen to configure the admin user and guest accou...

Page 144: ...fy an existing one Enter up to 15 alpha numeric characters spaces are allowed User Authority Select with which group the user associates Apply Click Apply to save the changes back to the Switch Refres...

Page 145: ...145 PART V Troubleshooting Product Specifications Troubleshooting 147 Product Specifications 151...

Page 146: ...146...

Page 147: ...ed with the Switch 2 Make sure the power adaptor or cord is connected to the Switch and plugged in to an appropriate power source Make sure the power source is turned on 3 Disconnect and re connect th...

Page 148: ...1 I cannot see or access the Login screen in the Web Configurator 1 Make sure you are using the correct IP address The default IP address is 192 168 1 1 If you changed the IP address use the new IP ad...

Page 149: ...ock is not on 2 You may have exceeded the maximum number of concurrent Telnet sessions Close other Telnet session s or try connecting again later Check that you have enabled logins for HTTP or telnet...

Page 150: ...Chapter 24 Troubleshooting GS1510 Series User s Guide 150...

Page 151: ...rt LNK ACT Dimensions Standard 19 rack mountable GS1510 16 GS1510 24 440 W x 170 D x 44 mm H Device Weight GS1510 16 2 3 Kg GS1510 24 2 4 Kg Temperature Operating 0 C 50 C 32 F 122 F Storage 40 C 70 C...

Page 152: ...atic MAC address forwarding by destination Broadcast storm control Static MAC address forwarding Switching Switching fabric GS1510 16 32Gbps non blocking GS1510 24 52Gbps non blocking Max Frame size 1...

Page 153: ...RE DESCRIPTION Default IP Address 192 168 1 1 Default Subnet Mask 255 255 255 0 24 bits Administrator User Name admin Default Password 1234 VLAN A VLAN Virtual Local Area Network allows a physical net...

Page 154: ...loops on the edge of your network IP Source Guard Use IP source guard to filter unauthorized DHCP and ARP packets in your network Authentication The Switch supports authentication services via RADIUS...

Page 155: ...MP MIB II RFC 1441 SNMPv2 Simple Network Management Protocol version 2 RFC 1493 Bridge MIBs RFC 1643 Ethernet MIBs RFC 1757 RMON RFC 1901 SNMPv2c Simple Network Management Protocol version 2c RFC 2131...

Page 156: ...Chapter 25 Product Specifications GS1510 Series User s Guide 156...

Page 157: ...157 PART VI Appendices and Index Device Auto Discovery 159 IP Addresses and Subnetting 165 Legal Information 175 Index 199...

Page 158: ...158...

Page 159: ...lt IP address has been changed and the device can not be located on the network this utility is even more useful if the Switch does not have a console port The program ZyXEL_device_discovery exe can b...

Page 160: ...ment and click Next 4 Choose the location in which to install the program files to The default location is C Program Files ZyXEL Device Discovery Click Next to continue the installation 5 Select the c...

Page 161: ...6 Select if you want to create an icon for the program on your desktop and click Next to continue the installation 7 Confirm the installation settings you have just configured and click Install to sta...

Page 162: ...GS1510 Series User s Guide 162 8 A progress bar will display as the software is being installed 9 After the installation has finished select whether to launch the utility now or later and click Finis...

Page 163: ...egin scanning for devices on the network you are currently connected to click the Search button You can also configure a more specific search by selecting to search only for devices with a specific mo...

Page 164: ...he device you are looking for double click anywhere within the row to launch the device s web configurator in your browser If there are too many devices on the network you can use the Filter drop down...

Page 165: ...er and the other part is the host ID In the same way that houses on a street share a common street name the hosts on a network share a common network number Similarly as each house has its own house n...

Page 166: ...ich bits are part of the host ID using a logical AND operation The term subnet is short for sub network A subnet mask has 32 bits If a bit in the subnet mask is a 1 then the corresponding bit in the I...

Page 167: ...mber determines the maximum number of possible hosts you can have on your network The larger the number of network number bits the smaller the number of remaining host ID bits An IP address with host...

Page 168: ...s some possible subnet masks using both notations Subnetting You can use subnetting to divide one network into multiple sub networks In the following example a network administrator creates two sub ne...

Page 169: ...ID allowing a maximum of 28 2 or 254 possible hosts The following figure shows the company network before subnetting Figure 85 Subnetting Example Before Subnetting You can borrow one of the host ID bi...

Page 170: ...255 128 is subnet A itself and 192 168 1 127 with mask 255 255 255 128 is its broadcast address Therefore the lowest IP address that can be assigned to an actual host for subnet A is 192 168 1 1 and...

Page 171: ...Binary 11000000 10101000 00000001 01000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 64 Lowest Host ID 192 168 1 65 Broadcast Address 192 168 1 127 Highest Host I...

Page 172: ...ht Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 25...

Page 173: ...ble Network Address Translation NAT on the Switch Once you have decided on the network number pick an IP address for your Switch that is easy to remember for instance 192 168 1 1 but make sure that no...

Page 174: ...168 0 0 192 168 255 255 You can obtain your IP address from the IANA from an ISP or it can be assigned from a private network If you belong to a small organization and your Internet access is through...

Page 175: ...ising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights nor the patent rights of others ZyXEL further reserves the r...

Page 176: ...vice in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense CE Mark Warning This is a class A product In a...

Page 177: ...with damaged by an act of God or subjected to abnormal working conditions Note Repair or replacement as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu o...

Page 178: ...Appendix C Legal Information GS1510 Series User s Guide 178...

Page 179: ...ISTED IN THE NOTICE OR APPENDIX BELOW ZYXEL MAY HAVE DISTRIBUTED TO YOU HARDWARE AND OR SOFTWARE OR MADE AVAILABLE FOR ELECTRONIC DOWNLOADS THESE FREE SOFTWARE PROGRAMS OF THRID PARTIES AND YOU ARE LI...

Page 180: ...enance technical or other support for the resultant modified Software You may not copy reverse engineer decompile reverse compile translate adapt or disassemble the Software or any part thereof nor sh...

Page 181: ...OR IN AN UNINTERUPTED FASHION OR THAT ANY DEFECTS OR ERRORS IN THE SOFTWARE WILL BE CORRECTED OR THAT THE SOFTWARE IS COMPATIBLE WITH ANY PARTICULAR PLATFORM SOME JURISDICTIONS DO NOT ALLOW THE WAIVE...

Page 182: ...e this License Agreement for any reason including but not limited to if ZyXEL finds that you have violated any of the terms of this License Agreement Upon notification of termination you agree to dest...

Page 183: ...achine readable copy of the complete corresponding source code for the version of the Programs that we distributed to you if we are in possession of such Notice Information herein is subject to change...

Page 184: ...ate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give th...

Page 185: ...arge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Program or any portion of...

Page 186: ...code to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribut...

Page 187: ...consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies directly or indirectly...

Page 188: ...romoting the sharing and reuse of software generally NO WARRANTY 11 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT...

Page 189: ...y of California All Rights Reserved Permission to use copy modify and distribute this software and its documentation for any purpose and without fee is hereby granted provided that the above copyright...

Page 190: ...s and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials...

Page 191: ...rm must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution The name of Cambridge Broad...

Page 192: ...laris are trademarks or registered trademarks of Sun Microsystems Inc in the U S and other countries Redistribution and use in source and binary forms with or without modification are permitted provid...

Page 193: ...NCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Part 5 Sparta Inc copyright notice BSD Copyright c 2003 2009 Spart...

Page 194: ...OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Part 6 Cisco BUPTNIC copyright notice BSD Copyright c 2004 Cisco Inc and Information Network Center of Beijing University of Posts an...

Page 195: ...OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Part 7...

Page 196: ...R CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBI...

Page 197: ...SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Part 9 ScienceLogic LLC copyright notice BSD Copyright c 2009 ScienceLogic LLC All rights reserved Redistribution and use in source and bina...

Page 198: ...TORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUS...

Page 199: ...agnostics 71 types of faults 71 certifications 175 notices 176 viewing 177 CFI Canonical Format Indicator 64 changing the password 42 Class of Service CoS 88 configuration change running config 132 co...

Page 200: ...bindings 104 L L2 management 52 LACP 78 system priority 80 layer 2 features 152 LEDs 30 link aggregation 77 dynamic 77 78 Link Aggregation Control Protocol LACP 78 Link Aggregation Control Protocol s...

Page 201: ...r 31 power supply specifications 151 product registration 177 product specification 152 PVID 64 PVID Priority Frame 64 Q QoS 152 QoS Quality of Service 85 Quality of Service see QoS 85 queue weight 86...

Page 202: ...h lockout 43 switch reset 43 switching 152 syntax conventions 5 syslog 106 protocol 133 severity levels 133 system control 153 system reboot 132 system status 45 T tagged VLAN 63 time current 49 time...

Page 203: ...Index GS1510 Series User s Guide 203 logout 44 navigation 36 37 39 40 weight of the switch 153 weight queuing 86 Weighted Round Robin scheduling WRR 86 WRR Weighted Round Robin scheduling 86...

Page 204: ...Index GS1510 Series User s Guide 204...

Reviews: