VES-1616F-3x Series VDSL Switch User’s Guide Version 3.60 5/2007 Edition 2 www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the Switch series VDSL switch using the web configurator or via commands. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Related Documentation • Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary information. • Supporting Disk Refer to the included CD for support documents.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. 1 " Warnings tell you about things that could harm you or your device. Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The VES-1616F-34 or VES-1616F-35 may be referred to as the “Switch”, the “device”, the “system” or the “switch” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The Switch icon is not an exact representation of your device.
Safety Warnings Safety Warnings 1 For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device.
Safety Warnings VES-1616F-3x Series User’s Guide 7
Safety Warnings 8 VES-1616F-3x Series User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 4 Safety Warnings........................................................................................................................ 6 Table of Contents........................................................
Table of Contents 3.1.5 Power Connector ....................................................................................................... 40 3.2 LEDs .................................................................................................................................. 40 Part II: Status and Basic ........................................................................ 43 Chapter 4 The Web Configurator ........................................................................................
Table of Contents 6.8.6 Rate Adaption ............................................................................................................ 76 6.8.7 RFI (Radio Frequency Interference) .......................................................................... 77 6.8.8 VDSL Profiles ............................................................................................................. 77 6.9 VDSL Profile Setup .......................................................................................
Table of Contents 10.2 STP Status ...................................................................................................................... 103 10.3 Configure STP ................................................................................................................ 104 Chapter 11 Bandwidth Control................................................................................................................ 107 11.1 Configuring Bandwidth Control ......................................
Table of Contents 17.1.2 Weighted Fair Scheduling (WFS) ........................................................................... 124 17.2 Configuring Queuing ........................................................................................................ 124 Chapter 18 Classifier................................................................................................................................ 127 18.1 Classifier Overview ..............................................................
Table of Contents Chapter 22 Differentiated Services ......................................................................................................... 157 22.1 DiffServ Overview ........................................................................................................... 157 22.1.1 DSCP and Per-Hop Behavior ................................................................................ 157 22.1.2 DiffServ Network Example ...............................................................
Table of Contents Chapter 26 Access Control...................................................................................................................... 179 26.1 Access Control Overview ................................................................................................ 179 26.2 The Access Control Main Screen .................................................................................... 179 26.3 About SNMP ..........................................................................
Table of Contents Chapter 31 ARP Table .............................................................................................................................. 205 31.1 ARP Table Overview ...................................................................................................... 205 31.1.1 How ARP Works .................................................................................................... 205 31.2 Viewing the ARP Table .........................................................
Table of Contents 33.2 show Commands ............................................................................................................. 243 33.2.1 show interface ....................................................................................................... 243 33.2.2 show ip ................................................................................................................... 244 33.2.3 show logging ............................................................................
Table of Contents 34.2.3 GVRP Timer ........................................................................................................... 261 34.2.4 Enable GVRP ......................................................................................................... 261 34.2.5 Disable GVRP ........................................................................................................ 261 34.3 Port VLAN Commands ..................................................................................
Contents Overview Contents Overview Introduction ............................................................................................................................ 29 Getting to Know Your Switch ..................................................................................................... 31 Hardware Installation ................................................................................................................. 35 Hardware Overview ............................................
Contents Overview Cluster Management ............................................................................................................... 197 MAC Table ............................................................................................................................... 203 ARP Table ................................................................................................................................ 205 Commands, Troubleshooting and Specifications ............................
List of Figures List of Figures Figure 1 MTU Application ..................................................................................................................... 32 Figure 2 Curbside Application ............................................................................................................... 32 Figure 3 Attaching the Mounting Brackets ............................................................................................. 36 Figure 4 Mounting the Switch on a Rack ...........
List of Figures Figure 39 Bandwidth Control ............................................................................................................... 108 Figure 40 Broadcast Storm Control ..................................................................................................... 109 Figure 41 Mirroring ...............................................................................................................................111 Figure 42 Link Aggregation Control Protocol Status ..........
List of Figures Figure 82 Backup Configuration .......................................................................................................... 175 Figure 83 Access Control .................................................................................................................... 180 Figure 84 SNMP Management Model ................................................................................................. 180 Figure 85 Access Control: SNMP ...........................................
List of Figures Figure 125 Conflicting Computer and Router IP Addresses Example ..................................................
List of Tables List of Tables Table 1 Front Panel ............................................................................................................................... 37 Table 2 LEDs ......................................................................................................................................... 40 Table 3 Navigation Panel Sub-links Overview .......................................................................................
List of Tables Table 39 Queuing Method ................................................................................................................... 125 Table 40 Classifier ............................................................................................................................... 128 Table 41 Common Ethernet Type Number .......................................................................................... 130 Table 42 Common Protocol Port Number ................................
List of Tables Table 82 interface port-channel Commands ........................................................................................ 233 Table 83 mvr Commands ..................................................................................................................... 236 Table 84 vdsl-alarmprofile Commands ................................................................................................ 237 Table 85 vdsl-profile Commands ...................................................
List of Tables 28 VES-1616F-3x Series User’s Guide
P ART I Introduction Getting to Know Your Switch (31) Hardware Installation (35) Hardware Overview (37) 29
CHAPTER 1 Getting to Know Your Switch This chapter introduces the main features and applications of the switch. 1.1 Introduction The VES-1616F-3x series switches are stand-alone layer-2 VDSL (Very High Speed Digital Subscriber Line) over POTS/ISDN switches. The series consist of the following models at the time of writing. • • • • VES-1616F-34 (VDSL1), VES-1616F-34 (VDSL2), VES-1616F-35 (VDSL1) and VES-1616F-35 (VDSL2).
Chapter 1 Getting to Know Your Switch Figure 1 MTU Application 1.2.2 Curbside Application You could place the Switch outdoors (in a street cabinet for example) in residential areas that are too far away from the ISP (Internet Service Provider) to receive DSL services. Residents only need to be within range of the Switch (not the ISP) to receive high-speed VDSL Internet access, and have enough bandwidth for data, voice, and video services.
Chapter 1 Getting to Know Your Switch • FTP. Use File Transfer Protocol for firmware upgrades and configuration backup/restore. See Chapter 25 on page 169. • SNMP. The device can be monitored and/or managed by an SNMP manager. See Chapter 26 on page 179. 1.4 Good Habits for Managing the Switch Do the following things regularly to make the Switch more secure and to manage the Switch more effectively. • Change the password.
Chapter 1 Getting to Know Your Switch 34 VES-1616F-3x Series User’s Guide
CHAPTER 2 Hardware Installation This chapter shows you how to install the switch. " Do NOT block the ventilation holes. Leave space between devices when stacking. For proper ventilation, allow at least 4 inches (10 cm) of clearance at the front and 3.4 inches (8 cm) at the back of the switch. This is especially important for enclosed rack installations. 2.1 Mounting the Switch on a Rack This section lists the rack mounting requirements and precautions and describes the installation steps. 2.1.
Chapter 2 Hardware Installation 2.1.2 Attaching the Mounting Brackets to the Switch 1 Position a mounting bracket on one side of the switch, lining up the four screw holes on the bracket with the screw holes on the side of the switch. Figure 3 Attaching the Mounting Brackets 2 Using a #2 Philips screwdriver, install the M3 flat head screws through the mounting bracket holes into the switch. 3 Repeat steps 1 and 2 to install the second mounting bracket on the other side of the switch.
CHAPTER 3 Hardware Overview This chapter describes the front panel and rear panel of the switch and shows you how to make the hardware connections. 3.1 Front Panel Connection The front panel contains switch LEDs and all the network ports and port connections. Figure 5 Front Panel The following table describes the port labels on the front panel. Table 1 Front Panel PORT DESCRIPTION POTS/ISDN LINE (Optional) This Telco-50 port connects to the central office or a PBX.
Chapter 3 Hardware Overview 3.1.2 Gigabit Ethernet Ports There are two pairs of Gigabit Ethernet/mini-GBIC ports. The mini-GBIC ports have priority over the Gigabit ports. This means that if a mini-GBIC port and the corresponding Gigabit port are connected at the same time, the Gigabit port will be disabled. The speed of the Gigabit Ethernet/mini-GBIC ports can be 100Mbps or 1000Mbps and the duplex mode can be half duplex (at 100 Mbps) or full duplex. The ports are auto-negotiating and auto-crossover.
Chapter 3 Hardware Overview Figure 6 Transceiver Installation Example 2 Press the transceiver firmly until it clicks into place. 3 The switch automatically detects the installed transceiver. Check the LEDs to verify that it is functioning properly. Figure 7 Installed Transceiver 3.1.3.2 Transceiver Removal Use the following steps to remove a mini GBIC transceiver (SFP module). 1 Open the transceiver’s latch (latch styles vary).
Chapter 3 Hardware Overview • • • • VT100 terminal emulation 9600 bps No parity, 8 data bits, 1 stop bit No flow control Connect the male 9-pin end of the console cable to the console port of the switch. Connect the female end to a serial port (COM1, COM2 or other COM port) of your computer. 3.1.5 Power Connector Make sure you are using the correct power source as shown on the panel. " Make sure that no objects obstruct the airflow of the fans. 3.2 LEDs The LEDs are located on the front panel.
Chapter 3 Hardware Overview Table 2 LEDs (continued) LED COLOR STATUS DESCRIPTION LNK Green On The port has a successful connection. Off No Ethernet device is connected to this port. Blinking The port is sending or receiving data. Off The port is not sending or receiving data. On The link to a 10 Mbps Ethernet network is up. Blinking The port is receiving or transmitting data at 10 Mbps. On The link to a 100 Mbps Ethernet network is up.
Chapter 3 Hardware Overview 42 VES-1616F-3x Series User’s Guide
P ART II Status and Basic The Web Configurator (45) System Status and Port Statistics (53) Basic Setting (63) 43
CHAPTER 4 The Web Configurator This section introduces the configuration and functions of the web configurator. 4.1 Introduction The web configurator is an HTML-based management interface that allows easy switch setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions. The recommended screen resolution is 1024 by 768 pixels. In order to use the web configurator you need to allow: • Web browser pop-up windows from your device.
Chapter 4 The Web Configurator 4 Click OK to view the first web configurator screen. 4.3 The Status Screen The Status screen is the first screen that displays when you access the web configurator. The following figure shows the navigating components of a web configurator screen. Figure 11 Web Configurator Home Screen (Status) In the navigation panel, click a main link to reveal a list of submenu links.
Chapter 4 The Web Configurator Table 3 Navigation Panel Sub-links Overview BASIC SETTING ADVANCED APPLICATION ROUTING PROTOCOL MANAGEMENT The following table lists the various web configurator screens within the sub-links VES-1616F-3x Series User’s Guide 47
Chapter 4 The Web Configurator .
Chapter 4 The Web Configurator Table 5 Navigation Panel Links (continued) LINK DESCRIPTION VDSL Alarm Profile Setup This link takes you to a screen where you can configure VDSL alarm profiles to apply to the VDSL lines. VDSL PSD Profile Setup This link takes you to a screen where you can configure VDSL PSD profiles to apply to the VDSL lines. Advanced Application VLAN This link takes you to screens where you can configure port-based or 802.
Chapter 4 The Web Configurator Table 5 Navigation Panel Links (continued) LINK DESCRIPTION Maintenance This link takes you to screens where you can perform firmware and configuration file maintenance as well as reboot the system. Access Control This link takes you to screens where you can change the system login password and configure SNMP and remote management. Diagnostic This link takes you to screens where you can view system logs and test port(s).
Chapter 4 The Web Configurator 2 Deleting all port-based VLANs with the CPU port as a member. The “CPU port” is the management port of the switch. 3 Incorrectly configuring the access control settings. This could also lock you out from performing out-of-band management (managing through the console port or management port). 4 Disabling all ports. 5 Assigning minimum bandwidth to the CPU port. If you limit bandwidth to the CPU port, you may find that the switch performs sluggishly or not at all.
Chapter 4 The Web Configurator Figure 13 Resetting the Switch: Via the Console Port Bootbase Version: V0.1 | 06/05/2006 18:30:17 RAM:Size = 32 Mbytes DRAM POST: Testing: 32768K OK DRAM Test SUCCESS ! FLASH: AMD 32M ZyNOS Version: V3.60(AIH.0)C0 | 01/25/2007 11:33:20 Press any key to enter debug mode within 3 seconds. ..................... Enter Debug Mode sysname> atlc Starting XMODEM upload (CRC mode).... CCCCCCCCCCCCCCCC Total 393216 bytes received. Erasing.. ..............................................
CHAPTER 5 System Status and Port Statistics This chapter describes the system status (web configurator home page) and port details screens. 5.1 Overview The home screen of the web configurator displays a port statistical summary with links to each port showing statistical details. 5.2 Port Status Summary To view the port statistics, click Status in all web configurator screens to display the Status screen as shown next.
Chapter 5 System Status and Port Statistics The following table describes the labels in this screen. Table 6 Status LABEL DESCRIPTION System up Time This field shows how long the system has been running since the last time it was started. The following fields are related to the VDSL ports. Port This identifies the VDSL port. Click a port number to display the VDSL Port Details screen. PayLoad Rate This field displays the upstream and downstream payload rates.
Chapter 5 System Status and Port Statistics Figure 16 Status: VDSL Summary 5.2.2 VDSL Port Details Click a number in the Port column in the Status screen to display individual port statistics. Use this screen to check status and detailed performance data about an individual port on the switch.
Chapter 5 System Status and Port Statistics The following table describes the labels in this screen. Table 7 Status: VDSL Port Details LABEL DESCRIPTION Port Info Number This field displays the port number. Name This field displays the descriptive name of a port. Link Type This field displays the type of the port. State This field displays the status of the port (Training, Idle or Showtime). Up Time This field shows the total amount of time the line has been up. Remote LAN Link 1 ..
Chapter 5 System Status and Port Statistics Table 7 Status: VDSL Port Details (continued) LABEL DESCRIPTION Payload Rate This field displays the upstream/downstream payload rate. SNR Margin This field displays the upstream/downstream SNR margin. Interleave Delay This field displays the upstream/downstream interleave delay. Transmit Power This field displays the upstream/downstream transmission power of the line. Attenuation This field displays the upstream/downstream attenuation.
Chapter 5 System Status and Port Statistics Table 7 Status: VDSL Port Details (continued) LABEL DESCRIPTION 128-255 This field shows the number of packets (including bad packets) transmitted that were between 128 and 255 octets in length. 256-511 This field shows the number of packets (including bad packets) transmitted that were between 256 and 511 octets in length. 512-1023 This field shows the number of packets (including bad packets) transmitted that were between 512 and 1023 octets in length.
Chapter 5 System Status and Port Statistics Table 7 Status: VDSL Port Details (continued) LABEL DESCRIPTION Poll Interval(s) The text box displays how often (in seconds) this screen refreshes. You may change the refresh interval by typing a new number in the text box and then clicking Set Interval. Stop Click Stop to stop port statistic polling. 5.2.3 Ethernet Port Details Click a number in the Port column in the Status screen to display the Ethernet port statistics.
Chapter 5 System Status and Port Statistics The following table describes the labels in this screen. Table 8 Status: Port Details LABEL DESCRIPTION Port Info Link This field displays the speed (either 10M for 10Mbps, 100M for 100Mbps or 1000M for 1000Mbps) and the duplex (F for full duplex or H for half duplex). It also shows the cable type (Copper or Fiber) for the combo ports. Status If STP (Spanning Tree Protocol) is enabled, this field displays the STP state of the port (see Section 10.1.
Chapter 5 System Status and Port Statistics Table 8 Status: Port Details (continued) LABEL DESCRIPTION Error Packet The following fields display detailed information about packets received that were in error. RX CRC This field shows the number of packets received with CRC (Cyclic Redundant Check) error(s). Length This field shows the number of packets received with a length that was out of range.
Chapter 5 System Status and Port Statistics 62 VES-1616F-3x Series User’s Guide
CHAPTER 6 Basic Setting This chapter describes how to configure the System Info, General Setup, Switch Setup, IP Setup and Port Setup screens. 6.1 Overview The System Info screen displays general switch information (such as firmware version number) and hardware polling information (such as fan speeds). The General Setup screen allows you to configure general switch identification information.
Chapter 6 Basic Setting Figure 19 System Info The following table describes the labels in this screen. Table 9 System Info LABEL DESCRIPTION System Name This field displays the descriptive name of the switch for identification purposes. OS F/W Version This field displays the version number of the switch 's current firmware including the date created. Modem Code F/W Version This field displays the version number of the switch 's current VDSL modem code version.
Chapter 6 Basic Setting Table 9 System Info (continued) LABEL DESCRIPTION Current This field displays this fan's current speed in Revolutions Per Minute (RPM). MAX This field displays this fan's maximum speed measured in Revolutions Per Minute (RPM). MIN This field displays this fan's minimum speed measured in Revolutions Per Minute (RPM). Threshold This field displays the minimum speed at which a normal fan should work.
Chapter 6 Basic Setting Figure 20 General Setup The following table describes the labels in this screen. Table 10 General Setup 66 LABEL DESCRIPTION System Name Choose a descriptive name for identification purposes. This name consists of up to 32 printable characters; spaces are not allowed. Location Enter the geographic location (up to 30 characters) of your switch. Contact Person's Name Enter the name (up to 30 characters) of the person in charge of this switch.
Chapter 6 Basic Setting Table 10 General Setup (continued) LABEL DESCRIPTION Use Time Server when Bootup Enter the time service protocol that a timeserver sends when you turn on the switch. Not all time servers support all protocols, so you may have to use trial and error to find a protocol that works. The main differences between them are the time format. When you select the Daytime (RFC 867) format, the switch displays the day, month, year and time with no time zone adjustment.
Chapter 6 Basic Setting " VLAN is unidirectional; it only governs outgoing traffic. See Chapter 7 on page 87 for information on port-based and IEEE 802.1Q tagged VLANs. 6.5 Switch Setup Screen Click Basic Setting and then Switch Setup in the navigation panel to display the screen as shown. The VLAN setup screens change depending on whether you choose 802.1Q or Port Based in the VLAN Type field in this screen. Refer to the chapter on VLAN.
Chapter 6 Basic Setting Table 11 Switch Setup (continued) LABEL DESCRIPTION GARP Timer: Switches join VLANs by making a declaration. A declaration is made by issuing a Join message using GARP. Declarations are withdrawn by issuing a Leave message. A Leave All message terminates all registrations. GARP timers set declaration timeout values. See the chapter on VLAN setup for more background information. Join Timer Join Timer sets the duration of the Join Period timer for GVRP in milliseconds.
Chapter 6 Basic Setting 6.6.1 Management IP Address The switch needs an IP address for it to be managed over the network. The factory default inband IP address is 192.168.1.1 and out-of-band management IP is 192.168.0.1. The subnet mask specifies the network number portion of an IP address. The factory default subnet mask is 255.255.255.0. You can configure up to 128 IP addresses which are used to access and manage the switch from the ports belonging to the pre-defined VLAN(s).
Chapter 6 Basic Setting The following table describes the labels in this screen. Table 12 IP Setup LABEL DESCRIPTION Domain Name Server Enter the IP address of the domain name server in dotted decimal notation, for example 192.168.1.20. Default Management Select which traffic flow (In-Band or Out-of-band) the switch is to use to send packets with an unknown source or that originated from the switch itself (such as SNMP traps).
Chapter 6 Basic Setting Table 12 IP Setup (continued) LABEL DESCRIPTION Manageable Select this option to allow device management using this IP address setting. Clear this option to set the switch to block management access using this IP address. Add Click Add to save the new rule to the switch. It then displays in the summary table at the bottom of the screen. Cancel Click Cancel to reset the fields to your previous configuration. Index This field displays the index number of the rule.
Chapter 6 Basic Setting Figure 23 Port Setup The following table describes the labels in this screen. Table 13 Port Setup LABEL DESCRIPTION Ports 1 .. 16 Port This is the port index number. Active Select this check box to enable a port. The factory default for all ports is enabled. A port must be enabled for data transmission to occur. Name Enter a descriptive name that identifies this port. You can enter up to 64 alphanumerical characters.
Chapter 6 Basic Setting Table 13 Port Setup (continued) LABEL DESCRIPTION Flow Control A concentration of traffic on a port decreases port bandwidth and overflows buffer memory causing packet discards and frame losses. Flow Control is used to regulate transmission of signals to match the bandwidth of the receiving port. The switch uses IEEE 802.3x flow control in full duplex mode and back pressure flow control in half duplex mode. IEEE 802.
Chapter 6 Basic Setting Table 13 Port Setup (continued) LABEL DESCRIPTION Flow Control A concentration of traffic on a port decreases port bandwidth and overflows buffer memory causing packet discards and frame losses. Flow Control is used to regulate transmission of signals to match the bandwidth of the receiving port. The switch uses IEEE802.3x flow control in full duplex mode and back pressure flow control in half duplex mode. IEEE802.
Chapter 6 Basic Setting 6.8.3 PSD PSD (Power Spectral Density) defines the distribution of a VDSL line’s power in the frequency domain. A PSD mask specifies the maximum allowable PSD for a line. 6.8.4 UPBO In a network with varying telephone wiring lengths, the PSD on each line is different. This causes crosstalk between the lines.
Chapter 6 Basic Setting 6.8.7 RFI (Radio Frequency Interference) RFI is induced noise on the lines by surrounding radio frequency electromagnetic radiation from sources such as AM and HAM radio stations. Since the VDSL uses a much larger frequency range that overlaps with other radio frequency systems, signals from VDSL lines and other radio systems interfere with each other. To avoid performance degradation due to RFI, set the switch to not transmit VDSL signals in the RFI band. 6.8.
Chapter 6 Basic Setting Figure 24 VDSL Profile Setup The following table describes the labels in this screen. Table 14 VDSL Profile Setup 78 LABEL DESCRIPTION Name Enter a descriptive name for identification purposes. Slow Channel Payload Rate Specifies the maximum/minimum slow channel data rate in bits/second. Enter a number between 104960 and 64. Fast Channel Payload Rate Specifies the maximum/minimum fast channel data rate in bits/second. Enter a number between 104960 and 64.
Chapter 6 Basic Setting Table 14 VDSL Profile Setup (continued) LABEL DESCRIPTION Rate Adaptive Rate adaption is the ability of a device to adjust from the configured transmission rate to the attainable transmission rate automatically depending on the line quality. The VDSL transmission rate then stays at the new rate or adjusts if line quality improves or deteriorates. Select a rate adaptive mode. Select Manual to disable transmission rate adjustment.
Chapter 6 Basic Setting Table 14 VDSL Profile Setup (continued) LABEL DESCRIPTION Compatible Mode Specify the starting band of the frequency range used by VDSL services. The end frequency band varies depending on the VDSL2 profile (frequency plan) (8a, 8b, 8c, 8d, 12a, 12b, 17a, or 30a) applied to the switch. This can avoid interference with other services (such as ISDN, ADSL or ADSL2 provided by other device) on the same bundle of lines.
Chapter 6 Basic Setting Figure 25 VDSL Alarm Profile Setup The following table describes the labels in this screen. Table 15 VDSL Alarm Profile Setup LABEL DESCRIPTION Name Enter a descriptive name for identification purposes. 15 Minute LOFs Threshold Enter the number of Loss Of Framing seconds (LOFs) that are permitted to occur within 15 minutes. 15 Minute LOSs Threshold Enter the number of Loss Of Signals seconds (LOSs) that are permitted to occur within 15 minutes.
Chapter 6 Basic Setting Table 15 VDSL Alarm Profile Setup (continued) LABEL DESCRIPTION SESs This field displays the number of Severely Errored Seconds (SESs) that are permitted to occur within 15 minutes. Init This field displays whether the initialization failure trap sending feature is enabled (On) or not (Off). Applied Ports You can apply a profile to a VDSL port in the Port Setup screen. This field displays the VDSL port number(s) to which this profile is applied.
Chapter 6 Basic Setting Figure 27 VDSL PSD Profile Setup The following table describes the labels in this screen. Table 16 VDSL PSD Profile Setup LABEL DESCRIPTION Profile Name Enter a descriptive name for identification purposes. This field is configurable only when you click the Add New Profile link. Add New Profile Click this link to add a new profile. Add Click Add to save the new profile to the Switch. It then displays in the summary table at the bottom of the screen.
Chapter 6 Basic Setting 84 VES-1616F-3x Series User’s Guide
P ART III Advanced VLAN (87) Static MAC Forward Setup (97) Filtering (99) Spanning Tree Protocol (101) Bandwidth Control (107) Broadcast Storm Control (109) Mirroring (111) Link Aggregation (113) Port Authentication (117) Port Security (121) Queuing Method (123) Classifier (127) Policy (133) VLAN Stacking (139) Multicast (145) Differentiated Services (157) 85
CHAPTER 7 VLAN The type of screen you see here depends on the VLAN Type you selected in the Switch Setup screen. This chapter shows you how to configure 802.1Q tagged and port-based VLANs. 7.1 Introduction to IEEE 802.1Q Tagged VLAN A tagged VLAN uses an explicit tag (VLAN ID) in the MAC header to identify the VLAN membership of a frame across bridges - they are not confined to the switch on which they were created. The VLANs can be created statically by hand or dynamically through GVRP.
Chapter 7 VLAN 7.2 Automatic VLAN Registration GARP and GVRP are the protocols used to automatically register VLAN membership across switches. 7.2.1 GARP GARP (Generic Attribute Registration Protocol) allows network switches to register and deregister attribute values with other GARP participants within a bridged LAN. GARP is a protocol that provides a generic mechanism for protocols that serve a more specific application, for example, GVRP. 7.2.1.1 GARP Timers Switches join VLANs by making a declaration.
Chapter 7 VLAN 7.3 Port VLAN Trunking Enable VLAN Trunking on a port to allow frames belonging to unknown VLAN groups to pass through that port. This is useful if you want to set up VLAN groups on end devices without having to configure the same VLAN groups on intermediary devices. Refer to the following figure. Suppose you want to create VLAN groups 1 and 2 (V1 and V2) on devices A and B.
Chapter 7 VLAN 7.5.1 Static VLAN Status Click Advanced Application > VLAN from the navigation panel to display the VLAN Status screen as shown next. Use this screen to view the current static VLAN group(s) you have configured. Refer to Section 7.1 on page 87 for background information. Figure 30 VLAN > VLAN Status The following table describes the labels in this screen. Table 18 VLAN > VLAN Status 90 LABEL DESCRIPTION The Number of VLAN This is the number of VLANs configured on the switch.
Chapter 7 VLAN 7.5.2 Configure a Static VLAN To configure a static VLAN, click Static VLAN in the VLAN Status screen to display the screen as shown next. Use a static VLAN to decide whether an incoming frame on a port should be • sent to a VLAN group as normal depends on its VLAN tag. • sent to a group whether it has a VLAN tag or not. • blocked from a VLAN group regardless of its VLAN tag. You can also tag all outgoing frames (that were previously untagged) from a port with the specified VID.
Chapter 7 VLAN Table 19 VLAN > Static VLAN (continued) LABEL DESCRIPTION Cancel Click Cancel to reset the fields. Clear Click Clear to start configuring the screen again. VID This field displays the ID number of the VLAN group. Click the number to edit the VLAN settings. Active This field indicates whether the VLAN settings are enabled (Yes) or disabled (No). Name This field displays the descriptive name for this VLAN group.
Chapter 7 VLAN Table 20 VLAN > VLAN Port Setting (continued) label description GVRP Select this check box to allow GVRP on this port. Acceptable Frame Type Specify the type of frames allowed on a port. Choices are All, Tag Only and Untag Only. Select All to accept all untagged or tagged frames on this port. This is the default setting. Select Tag Only to accept only tagged frames on this port. All untagged frames will be dropped. Select Untag Only to accept only untagged frames on this port.
Chapter 7 VLAN Figure 33 Port Based VLAN Setup (All Connected) 94 VES-1616F-3x Series User’s Guide
Chapter 7 VLAN Figure 34 Port Based VLAN Setup (Port Isolation) The following table describes the labels in this screen. Table 21 Port Based VLAN Setup LABEL DESCRIPTION Setting Wizard Choose All connected or Port isolation. All connected means all ports can communicate with each other, that is, there are no virtual LANs. All incoming and outgoing ports are selected. This option is the most flexible but also the least secure.
Chapter 7 VLAN Table 21 Port Based VLAN Setup (continued) 96 LABEL DESCRIPTION Apply Click Apply to save the changes. Cancel Click Cancel to start configuring the screen again.
CHAPTER 8 Static MAC Forward Setup Use these screens to configure static MAC address forwarding. 8.1 Static MAC Forwarding Overview A static MAC address is an address that has been manually entered in the MAC address learning table. Static MAC addresses do not age out. When you set up static MAC address rules, you are setting static MAC addresses for a port. This may reduce the need for broadcasting. 8.
Chapter 8 Static MAC Forward Setup Table 22 Static MAC Forwarding (continued) LABEL DESCRIPTION MAC Address Enter the MAC address in valid MAC address format, that is, six hexadecimal character pairs. Note: Static MAC addresses do not age out. 98 VID Enter the VLAN identification number. Port Select a port where the MAC address entered in the previous field will be automatically forwarded. Add After you set the fields above, click Add to insert a new rule.
CHAPTER 9 Filtering This chapter discusses static IP and MAC address port filtering. 9.1 Filtering Overview Filtering means sifting traffic going through the switch based on the source and/or destination MAC addresses and VLAN group (ID). 9.2 Configure a Filtering Rule Click Advanced Application > Filtering in the navigation panel to display the screen as shown next. Scroll down to the bottom of the screen to view the summary table for the settings.
Chapter 9 Filtering Table 23 FIltering (continued) 100 LABEL DESCRIPTION Action Select Discard source to drop frame from the source MAC address (specified in the MAC field). The switch can still send frames to the MAC address. Select Discard destination to drop frames to the destination MAC address (specified in the MAC field). The switch can still receive frames originating from the MAC address.
CHAPTER 10 Spanning Tree Protocol This chapter introduces the Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP). 10.1 STP/RSTP Overview (R)STP detects and breaks network loops and provides backup links between switches, bridges or routers. It allows a switch to interact with other (R)STP -compliant switches in your network to ensure that only one path exists between any two stations on the network. The switch uses IEEE 802.
Chapter 10 Spanning Tree Protocol Table 24 STP Path Costs LINK SPEED RECOMMENDED VALUE RECOMMENDED RANGE ALLOWED RANGE Path Cost 100Mbps 19 10 to 60 1 to 65535 Path Cost 1Gbps 4 3 to 10 1 to 65535 Path Cost 10Gbps 2 1 to 5 1 to 65535 On each bridge, the root port is the port through which this bridge communicates with the root. It is the port on this switch with the lowest path cost to the root (the root path cost).
Chapter 10 Spanning Tree Protocol 10.2 STP Status Click Advanced Application > Spanning Tree Protocol in the navigation panel to display the screen. View current STP status on the switch in this screen. Refer to Section 10.1 on page 101 for background information. Figure 37 Spanning Tree Protocol Status The following table describes the labels in this screen. Table 26 Spanning Tree Protocol Status LABEL DESCRIPTION Spanning Tree Protocol This field displays Running if STP is activated.
Chapter 10 Spanning Tree Protocol Table 26 Spanning Tree Protocol Status (continued) LABEL DESCRIPTION Topology Changed Times This is the number of times the spanning tree has been reconfigured. Time Since Last Change This is the time since the spanning tree was last reconfigured. Poll Interval(s) The text box displays how often (in seconds) this screen refreshes. You may change the refresh interval by typing a new number in the text box and then clicking Set Interval.
Chapter 10 Spanning Tree Protocol Table 27 Spanning Tree Protocol > Configuration (continued) LABEL DESCRIPTION Max Age This is the maximum time (in seconds) a switch can wait without receiving a BPDU before attempting to reconfigure. All switch ports (except for designated ports) should receive BPDUs at regular intervals. Any port that ages out STP information (provided in the last BPDU) becomes the designated port for the attached LAN.
Chapter 10 Spanning Tree Protocol 106 VES-1616F-3x Series User’s Guide
CHAPTER 11 Bandwidth Control This chapter shows you how you can cap the maximum bandwidth allowed on the ports using the Bandwidth Control screen. 11.1 Configuring Bandwidth Control Bandwidth control means defining a maximum allowable bandwidth for incoming and/or outgoing traffic on a port. 11.1.1 CIR and PIR The Committed Information Rate (CIR) is the guaranteed bandwidth for the incoming traffic flow on a port.
Chapter 11 Bandwidth Control Figure 39 Bandwidth Control The following table describes the related labels in this screen. Table 28 Bandwidth Control LABEL DESCRIPTION Active Select this check box to enable bandwidth control on the switch. Port This field displays the port number. Active Make sure to select this check box to activate your rule. You may temporarily deactivate a rule without deleting it by deselecting this check box.
CHAPTER 12 Broadcast Storm Control This chapter introduces and shows you how to configure the broadcast storm control feature. 12.1 Broadcast Storm Control Overview Broadcast storm control limits the number of broadcast, multicast and destination lookup failure (DLF) packets the switch receives per second on the ports. When the maximum number of allowable broadcast, multicast and/or DLF packets is reached per second, the subsequent packets are discarded.
Chapter 12 Broadcast Storm Control Table 29 Broadcast Storm Control (continued) 110 LABEL DESCRIPTION Broadcast (pkt/s) Select this option and specify how many broadcast packets the port receives per second. Multicast (pkt/s) Select this option and specify how many multicast packets the port receives per second. DLF (pkt/s) Select this option and specify how many destination lookup failure (DLF) packets the port receives per second. Apply Click Apply to save your changes back to the switch.
CHAPTER 13 Mirroring This chapter shows you how to configure mirroring on the switch. 13.1 Mirroring Overview Port mirroring allows you to copy a traffic flow to a monitor port (the port you copy the traffic to) in order that you can examine the traffic from the monitor port without interference. 13.2 Port Mirroring Configuration Click Advanced Application > Mirroring in the navigation panel to display the configuration screen.
Chapter 13 Mirroring The following table describes the related labels in this screen. Table 30 Mirroring 112 LABEL DESCRIPTION Active Clear this check box to deactivate port mirroring on the switch. Monitor Port The monitor port is the port you copy the traffic to in order to examine it in more detail without interfering with the traffic flow on the original port(s). Select this port from this drop-down list box. Port This field displays the port number.
CHAPTER 14 Link Aggregation This chapter shows you how to logically aggregate physical links to form one logical, higherbandwidth link. 14.1 Link Aggregation Overview Link aggregation (trunking) is the grouping of physical ports into one logical higher-capacity link. You may want to trunk ports if for example, it is cheaper to use multiple lower-speed links than to under-utilize a high-speed, but more costly, single-port link. However, the more ports you aggregate then the fewer available ports you have.
Chapter 14 Link Aggregation 14.1.2 Link Aggregation ID LACP aggregation ID consists of the following information1: Table 31 Link Aggregation ID: Local Switch SYSTEM PRIORITY MAC ADDRESS KEY PORT PRIORITY PORT NUMBER 0000 0000 00 0000 00-00-00-00-00 Table 32 Link Aggregation ID: Peer Switch SYSTEM PRIORITY MAC ADDRESS KEY PORT PRIORITY PORT NUMBER 0000 0000 00 0000 00-00-00-00-00 14.2 Link Aggregation Status Click Advanced Application > Link Aggregation in the navigation panel.
Chapter 14 Link Aggregation Table 33 Link Aggregation Control Protocol Status (continued) LABEL DESCRIPTION Poll Interval(s) The text box displays how often (in seconds) this screen refreshes. You may change the refresh interval by typing a new number in the text box and then clicking Set Interval. Stop Click Stop to halt statistic polling. 14.3 Link Aggregation Setup Click Configuration in the Link Aggregation Control Protocol Status screen to display the screen shown next. See Section 14.
Chapter 14 Link Aggregation Table 34 Link Aggregation Control Protocol > Configuration (continued) 116 LABEL DESCRIPTION LACP Timeout Timeout is the time interval between the individual port exchanges of LACP packets in order to check that the peer port in the trunk group is still up. If a port does not respond after three tries, then it is deemed to be “down” and is removed from the trunk.
CHAPTER 15 Port Authentication This chapter describes the 802.1x authentication method and RADIUS server connection setup. 15.1 Port Authentication Overview IEEE 802.1x is an extended authentication protocol2 that allows support of RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for centralized user profile and accounting management on a network RADIUS server. 15.1.
Chapter 15 Port Authentication Figure 45 Port Authentication 15.2.1 Activate IEEE 802.1x Security From the Port Authentication screen, display the configuration screen as shown. See Section 15.1 on page 117 for background information. Figure 46 Port Authentication > 802.1x The following table describes the labels in this screen. Table 35 Port Authentication > 802.1x LABEL DESCRIPTION Active Select this check box to permit 802.1x authentication on the switch. Note: You must first enable 802.
Chapter 15 Port Authentication 15.2.2 Configuring RADIUS Server Settings From the Port Authentication screen, click RADIUS to display the configuration screen as shown. Use this screen to configure RADIUS server settings. See Section 15.1 on page 117 for background information. Figure 47 Port Authentication > RADIUS The following table describes the labels in this screen.
Chapter 15 Port Authentication 120 VES-1616F-3x Series User’s Guide
CHAPTER 16 Port Security This chapter shows you how to set up port security. 16.1 Port Security Overview Port security allows only packets with dynamically learned MAC addresses and/or configured static MAC addresses to pass through a port on the switch. The switch can learn up to 16K MAC addresses in total with no limit on individual ports other than the sum cannot exceed 16K. For maximum port security, enable this feature, disable MAC address learning and configure static MAC address(es) for a port.
Chapter 16 Port Security The following table describes the labels in this screen. Table 37 Port Security 122 LABEL DESCRIPTION Active Select this check box to enable the port security feature on the switch. Port This field displays a port number. Active Select this check box to enable the port security feature on this port. The switch forwards packets whose MAC address(es) is in the MAC address table on this port. Packets with no matching MAC address(es) are dropped.
CHAPTER 17 Queuing Method This chapter introduces the queuing methods supported. 17.1 Queuing Method Overview Queuing is used to help solve performance degradation when there is network congestion. Use the Queuing Method screen to configure queuing algorithms for outgoing traffic. See also Priority Queue Assignment in Switch Setup and 802.1p Priority in Port Setup for related information.
Chapter 17 Queuing Method 17.1.2 Weighted Fair Scheduling (WFS) Weighted Fair Scheduling is used to guarantee each queue's minimum bandwidth based on their bandwidth weight (portion) (the number you configure in the Weight field) when there is traffic congestion. WFS is activated only when a port has more traffic than it can handle. Queues with larger weights get more guaranteed bandwidth than queues with smaller weights.
Chapter 17 Queuing Method The following table describes the labels in this screen. Table 39 Queuing Method LABEL DESCRIPTION Method Select Strictly Priority or Weighted Fair Scheduling. Strictly Priority services queues based on priority only. When the highest priority queue empties, traffic on the next highest-priority queue begins. Q7 has the highest priority and Q0 the lowest.
Chapter 17 Queuing Method 126 VES-1616F-3x Series User’s Guide
CHAPTER 18 Classifier This chapter introduces and shows you how to configure the packet classifier on the switch. 18.1 Classifier Overview Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth. Without QoS, all traffic data is equally likely to be dropped when the network is congested.
Chapter 18 Classifier Figure 50 Classifier The following table describes the related labels in this screen. Table 40 Classifier LABEL DESCRIPTION Active Select this option to enable this rule. Name Type a descriptive name (up to 32 printable ASCII characters) for this rule. This is for identification purpose only. Packet Format Specify the format of the packet. Choices are All, 802.3 tagged, 802.3 untagged, Ethernet II tagged and Ethernet II untagged. A value of 802.
Chapter 18 Classifier Table 40 Classifier (continued) LABEL DESCRIPTION Ethernet Type Select an Ethernet type or select Other and enter the Ethernet type number in hexadecimal value. Refer to Table 41 on page 130 for information. Select All if you don’t know. Source MAC Address Select Any to apply the rule to all MAC addresses. To specify a source, select MAC and type a MAC address in valid MAC address format (six hexadecimal character pairs). Port Select the port to which the rule should be applied.
Chapter 18 Classifier Table 40 Classifier (continued) LABEL DESCRIPTION Name This field displays the descriptive name for this rule. This is for identification purpose only. Rule This field displays a summary of the classifier rule’s settings. Delete Click Delete to remove the selected entry from the summary table. Cancel Click Cancel to clear the Delete check boxes. The following table shows some other common Ethernet types and the corresponding protocol number.
Chapter 18 Classifier Figure 51 Classifier Example VES-1616F-3x Series User’s Guide 131
Chapter 18 Classifier 132 VES-1616F-3x Series User’s Guide
CHAPTER 19 Policy This chapter shows you how to configure policy rules. 19.1 Policy Overview A classifier distinguishes traffic into flows based on the configured criteria (refer to Chapter 18 on page 127 for more information). A policy rule ensures that a traffic flow gets the requested treatment in the network. 19.1.
Chapter 19 Policy 19.2 Configuring a Policy " You must first configure a classifier in the Classifier screen. Refer to Chapter 18 on page 127 for more information. Click Advanced Application and then Policy Rule in the navigation panel to display the screen as shown.
Chapter 19 Policy Figure 52 Policy The following table describes the labels in this screen.
Chapter 19 Policy Table 43 Policy LABEL DESCRIPTION Active Select this option to enable the policy. Name Enter a descriptive name (up to 32 printable ASCII characters) for identification purposes. Classifier(s) This field displays the active classifier(s) you configure in the Classifier screen (refer to Chapter 18 on page 127). Select the classifier(s) to which this policy rule applies. To select more than one classifier, press [SHIFT] and select the choices at the same time.
Chapter 19 Policy Table 43 Policy (continued) LABEL DESCRIPTION Outgoing Select Send the packet to the mirror port to sent the packet to the mirror port. Select Send the packet to the egress port to send the packet to the egress port. Select Send the matching frames (broadcast or DLF, multicast, marked for dropping or to be sent to the CPU) to the egress port to send the broadcast, multicast, DLF, marked-to-drop or CPU frames to the egress port.
Chapter 19 Policy Figure 53 Policy Example 138 VES-1616F-3x Series User’s Guide
CHAPTER 20 VLAN Stacking This chapter shows you how to configure VLAN stacking on your switch. See the chapter on VLANs for more background information on Virtual LAN 20.1 VLAN Stacking Overview A service provider can use VLAN stacking to allow it to distinguish multiple customers VLANs, even those with the same (customer-assigned) VLAN ID, within its network. Use VLAN stacking to add an outer VLAN tag to the inner IEEE 802.1Q tagged frames that enter the network.
Chapter 20 VLAN Stacking Figure 54 VLAN Stacking Example 20.2 VLAN Stacking Port Roles Each port can have three VLAN stacking “roles”, Normal, Access Port and Tunnel Port (the latter is for Gigabit ports only). • Select Normal for “regular” (non-VLAN stacking) IEEE 802.1Q frame switching. • Select Access Port for ingress ports on the service provider's edge devices (1 and 2 in the VLAN stacking example figure). The incoming frame is treated as "untagged", so a second VLAN tag (outer VLAN tag) can be added.
Chapter 20 VLAN Stacking 20.3 VLAN Tag Format A VLAN tag (service provider VLAN stacking or customer IEEE 802.1Q) consists of the following three fields. Table 44 VLAN Tag Format Type Priority VID Type is a standard Ethernet type code identifying the frame and indicates that whether the frame carries IEEE 802.1Q tag information. SP TPID (Service Provider Tag Protocol Identifier) is the service provider VLAN stacking tag type. Many vendors use 0x8100 or 0x9100.
Chapter 20 VLAN Stacking Table 46 IEEE 802.1Q Frame (SP)TPID (Service Provider) Tag Protocol IDentifier Data Frame data VID FCS Frame Check Sequence VLAN ID 20.4 Configuring VLAN Stacking Click Advanced Application and then VLAN Stacking in the navigation panel to display the screen as shown. Figure 55 VLAN Stacking The following table describes the labels in this screen. Table 47 VLAN Stacking 142 LABEL DESCRIPTION Active Select this checkbox to enable VLAN stacking on the switch.
Chapter 20 VLAN Stacking Table 47 VLAN Stacking (continued) LABEL DESCRIPTION Priority Select a number from the drop-down list box to configure the priority level of the outer tag. "0" is the lowest priority level and "7" is the highest. Note: Configure the priority level of the inner IEEE 802.1Q tag in the Port Setup screen. Apply Click Apply to save your changes back to the switch. Cancel Click Cancel to begin configuring this screen afresh.
Chapter 20 VLAN Stacking 144 VES-1616F-3x Series User’s Guide
CHAPTER 21 Multicast This chapter shows you how to configure various multicast features. 21.1 Multicast Overview Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender to 1 recipient) or Broadcast (1 sender to everybody on the network). Multicast delivers IP packets to just a group of hosts on the network. IGMP (Internet Group Multicast Protocol) is a session-layer protocol used to establish membership in a multicast group - it is not used to carry user data.
Chapter 21 Multicast Without IGMP snooping, multicast traffic is treated in the same manner as broadcast traffic, you can configure the switch to forward or discard unknown multicast group traffic. With IGMP snooping, group multicast traffic is only forwarded to ports that are members of that group. IGMP snooping generates no additional network traffic, allowing you to significantly reduce multicast traffic passing through your switch. 21.
Chapter 21 Multicast Figure 57 Multicast The following table describes the labels in this screen. Table 49 Multicast LABEL DESCRIPTION IGMP Snooping Active Select Active to enable IGMP snooping to forward group multicast traffic only to ports that are members of that group Host Timeout Specify the time (from 1 to 16,716,450) in seconds that elapses before the switch removes an IGMP group membership entry if it does not receive report messages from the host.
Chapter 21 Multicast Table 49 Multicast (continued) LABEL DESCRIPTION IGMP Querier Mode This field is applicable on the Ethernet ports. The switch treats an IGMP query port as being connected to an IGMP multicast router (or server). The switch forwards IGMP join or leave packets to an IGMP query port. Select Auto to have the switch use the port as an IGMP query port if the port receives IGMP query packets. Select Fixed to have the switch always use the port as an IGMP query port.
Chapter 21 Multicast The following table describes the labels in this screen. Table 50 Multicast > IGMP Filtering Profile LABEL DESCRIPTION Profile Name Enter a descriptive name for the profile for identification purposes. To configure additional rule(s) for a profile that you have already added, enter the profile name and specify a different IP multicast address range.
Chapter 21 Multicast 21.5.1 Types of MVR Ports In MVR, a source port is a port on the switch that can send and receive multicast traffic in a multicast VLAN while a receiver port can only receive multicast traffic. Once configured, the switch maintains a forwarding table that matches the multicast stream to the associated multicast group. 21.5.2 MVR Modes You can set your switch to operate in either dynamic or compatible mode.
Chapter 21 Multicast 21.6 General MVR Configuration Use the MVR screen to create multicast VLANs and select the receiver port(s) and a source port for each multicast VLAN. Click Advanced Application and Multicast in the navigation panel. Click the Multicast Setting link and then the MVR link to display the screen as shown next. See Section 21.5 on page 149 for background information. " " You can create up to three multicast VLANs and up to 266 multicast rules on the switch.
Chapter 21 Multicast The following table describes the related labels in this screen. Table 51 MVR LABEL DESCRIPTION Active Select this check box to enable MVR to allow one single multicast VLAN to be shared among different subscriber VLANs on the network. Name Enter a descriptive name (up to 32 printable ASCII characters) for identification purposes. Multicast VLAN ID Enter the VLAN ID (1 to 4094) of the multicast VLAN. 802.
Chapter 21 Multicast Configure MVR IP multicast group address(es) in the Group Configuration screen. Click Group Configuration in the MVR screen. " A port can belong to more than one multicast VLAN. However, IP multicast group addresses in different multicast VLANs cannot overlap. Figure 62 MVR > Group Configuration The following table describes the labels in this screen.
Chapter 21 Multicast 21.7.1 MVR Configuration Example The following figure shows a network example where ports 1, 2 and 3 on the switch belong to VLAN 1. In addition, port 17 belongs to the multicast group with VID 200 to receive multicast traffic (the News and Movie channels) from the remote streaming media server, S. Computers A, B and C in VLAN are able to receive the traffic.
Chapter 21 Multicast Figure 65 MVR Group Configuration Example VES-1616F-3x Series User’s Guide 155
Chapter 21 Multicast 156 VES-1616F-3x Series User’s Guide
CHAPTER 22 Differentiated Services This chapter shows you how to configure Differentiated Services (DiffServ) on the switch. 22.1 DiffServ Overview Quality of Service (QoS) is used to prioritize source-to-destination traffic flows. All packets in the flow are given the same priority. You can use CoS (class of service) to give different priorities to different packet types.
Chapter 22 Differentiated Services Figure 67 DiffServ Network Example Switch A marks traffic flowing into the network based on the configured marking rules. Intermediary network devices 1 and 2 allocate network resources (such as bandwidth) by mapping the DSCP values and the associated policies. 22.2 Activating DiffServ Activate DiffServ to allow the switch to enable DiffServ and apply marking rules and IEEE802.1p priority mapping on the selected port(s).
Chapter 22 Differentiated Services 22.3 DSCP-to-IEEE802.1p Priority Setting You can configure the DSCP (DiffServ Code Point) to IEEE802.1p mapping to allow the switch to prioritize all traffic based on the incoming DSCP value according to the DiffServ-toIEEE802.1p mapping table. The following table shows the default DSCP-to-IEEE802.1P mapping. Table 54 Default DSCP-IEEE802.1p Mapping DSCP VALUE 0–7 8 – 15 16 – 23 24 – 31 32 – 39 40 – 47 48 – 55 56 – 63 IEEE802.1P 0 1 2 3 4 5 6 7 22.3.
Chapter 22 Differentiated Services 160 VES-1616F-3x Series User’s Guide
P ART IV Routing Protocol Static Route (163) DHCP Relay (165) 161
CHAPTER 23 Static Route This chapter shows you how to configure static routes. 23.1 Configuring Static Route Static routes tell the switch how to forward IP traffic when you configure the TCP/IP parameters manually. Click Routing Protocol > Static Routing in the navigation panel to display the screen as shown. Figure 70 Static Routing The following table describes the related labels you use to create a static route.
Chapter 23 Static Route Table 56 Static Routing (continued) 164 LABEL DESCRIPTION Metric The metric represents the “cost” of transmission for routing purposes. IP routing uses hop count as the measurement of cost, with a minimum of 1 for directly connected networks. Enter a number that approximates the cost for this link. The number need not be precise, but it must be between 1 and 15. In practice, 2 or 3 is usually a good number. Add Click Add to insert a new static route.
CHAPTER 24 DHCP Relay This chapter shows you how to configure the DHCP feature. 24.1 DHCP Overview DHCP (Dynamic Host Configuration Protocol RFC 2131 and RFC 2132) allows individual computers to obtain TCP/IP configuration at start-up from a server. You can configure the switch to relay client DHCP requests to a DHCP server and the server’s responses back to the clients. 24.1.1 DHCP Relay Agent Information The switch can add information to client DHCP requests that it relays to a DHCP server.
Chapter 24 DHCP Relay Figure 71 DHCP Relay The following table describes the labels in this screen. Table 57 DHCP Relay 166 LABEL DESCRIPTION Active Select this check box to enable DHCP relay settings. Remote DHCP Server 1.. 3 Enter the IP address(es) of the DHCP server(s). Relay Agent Information Select the Option 82 check box to have the switch add information (slot number, port number and VLAN ID) to client DHCP requests that it relays to a DHCP server.
P ART V Management Maintenance (169) Access Control (179) Diagnostic (191) Syslog (193) Cluster Management (197) MAC Table (203) ARP Table (205) 167
CHAPTER 25 Maintenance This chapter explains how to configure the maintenance screens that let you maintain the firmware and configuration files. 25.1 The Maintenance Screen The maintenance screens can allow you to upload new firmware (to the switch), manage configuration, reset to factory defaults and restart your switch. Click Management > Maintenance in the navigation panel to open the screen as shown next. Figure 72 Maintenance The following table describes the links in this screen.
Chapter 25 Maintenance Table 58 Maintenance (continued) LINK DESCRIPTION Load Factory Default Click this button to clear all user-entered configuration information and return the switch to its factory defaults. You may need to change the IP address of your computer to be in the same subnet as that of the default device IP address (192.168.1.1). Reboot System Click this button to restart the switch without turning the power off. This does not affect the switch's configuration. 25.
Chapter 25 Maintenance 2 Click OK to display the screen shown next. Figure 76 Reboot System: Start 3 Click OK again and then wait for the switch to restart. This takes up to two minutes. This does not affect the switch’s configuration. 25.4 Remote Device Upgrade The switch allows you to perform remote firmware upgrade on the connected CPE device(s). Click Management and Maintenance, then click the Click Here link next to Remote Device Upgrade to display the screen as shown next.
Chapter 25 Maintenance 2 In the Remote Device Upgrade screen, select the VDSL line(s) of the CPE device(s) to which you want to upgrade the firmware. You can select multiple CPE devices by holding down the [SHIFT] or [CTRL] key and clicking the mouse at the same time. 3 Type the path and file name of the firmware file you wish to upload to the switch in the File Path text box or click Browse to locate it. 4 After you have specified the file, click Upgrade. 25.
Chapter 25 Maintenance 1 Access the Remote Device Reset screen from the Maintenance screen. Figure 79 Maintenance: Remote Device Reset 2 Select the VDSL line(s) you want to reset in the list box. You can select multiple entries by holding down the [SHIFT] or [CTRL] key. 3 Click Reset to reset the selected VDSL line(s). " Resetting the VDSL lines does NOT restart the switch. 25.7 Firmware Upgrade " You can only upload the firmware of the same VDSL standard as your Switch.
Chapter 25 Maintenance From the Maintenance screen, display the Firmware Upgrade screen as shown next. " Firmware upgrade using the web configurator saves the new firmware to ras0. Figure 80 Firmware Upgrade Type the path and file name of the firmware file you wish to upload to the switch in the File Path text box or click Browse to locate it. After you have specified the file, click Upgrade.
Chapter 25 Maintenance Back up your current switch configuration to a computer using the Backup Configuration screen. Figure 82 Backup Configuration Follow the steps below to back up the current switch configuration to your computer in this screen. 1 Click Backup. 2 Click Save to display the Save As screen. 3 Choose a location to save the file on your computer from the Save in drop-down list box and type a descriptive name for it in the File name list box.
Chapter 25 Maintenance This is a sample FTP session saving the current configuration to a file called “config.cfg” on your computer. If your (T)FTP client does not allow you to have a destination filename different than the source, you will need to rename them as the switch only recognizes “config” and “ras”. Be sure you keep unaltered copies of both files for later use. " Be sure to upload the correct model firmware as uploading the wrong model firmware may damage your device. 25.10.
Chapter 25 Maintenance 25.10.4 FTP Restrictions FTP will not work when: • FTP service is disabled in the Access Control screen. • The IP address(es) in the Secured Client Set in the Remote Management screen does not match the client IP address. If it does not match, the switch will disconnect the Telnet session immediately.
Chapter 25 Maintenance 178 VES-1616F-3x Series User’s Guide
CHAPTER 26 Access Control This chapter describes how to control access to the switch. 26.1 Access Control Overview The console port and FTP are allowed one session each, Telnet and SSH share four sessions, up to five web management sessions (five different usernames and passwords) and/or limitless SNMP access control sessions are allowed. Table 61 Access Control Overview Number of concurrent sessions allowed Console Port SSH Telnet 1 SSH and Telnet share 4 sessions.
Chapter 26 Access Control Figure 83 Access Control 26.3 About SNMP Simple Network Management Protocol (SNMP) is an application layer protocol used to manage and monitor TCP/IP-based devices. SNMP is used to exchange management information between the network management system (NMS) and a network element (NE). A manager station can manage and monitor the switch through the network via SNMP version one (SNMPv1) and/or SNMP version 2c. The next figure illustrates an SNMP management operation.
Chapter 26 Access Control Table 62 SNMP Commands COMMAND DESCRIPTION Get Allows the manager to retrieve an object variable from the agent. GetNext Allows the manager to retrieve the next object variable from a table or list within an agent. In SNMPv1, when a manager wants to retrieve all elements of a table from an agent, it initiates a Get operation, followed by a series of GetNext operations. Set Allows the manager to set values for object variables within an agent.
Chapter 26 Access Control Table 63 SNMP Traps (continued) OBJECT LABEL OBJECT ID DESCRIPTION newRoot 1.3.6.1.2.1.17.0.1 This trap is sent when the STP root switch changes. topologyChange 1.3.6.1.2.1.17.0.2 This trap is sent when the STP topology changes. 26.3.3 Configuring SNMP From the Access Control screen, display the SNMP screen. You can click Access Control to go back to the Access Control screen. Figure 85 Access Control: SNMP The following table describes the labels in this screen.
Chapter 26 Access Control " It is highly recommended that you change the default administrator password (1234). • A non-administrator (username is something other than admin) is someone who can view but not configure switch settings. Click Access Control from the navigation panel and then click Logins from this screen. Figure 86 Access Control: Logins The following table describes the labels in this screen.
Chapter 26 Access Control 26.5 SSH Overview Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication between two hosts over an unsecured network. Figure 87 SSH Communication Example 26.6 How SSH works The following table summarizes how a secure connection is established between two remote hosts.
Chapter 26 Access Control Once the identification is verified, both the client and server must agree on the type of encryption method to use. 3 Authentication and Data Transmission After the identification is verified and data encryption activated, a secure tunnel is established between the client and the server. The client then sends its authentication information (user name and password) to the server to log in to the server. 26.
Chapter 26 Access Control Figure 89 SSH Login Example C:\>ssh2 admin@192.168.1.1 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the host key has just been changed. Please contact your system administrator.
Chapter 26 Access Control 2 HTTP connection requests from a web browser go to port 80 (by default) on the switch’s WS (web server). Figure 90 HTTPS Implementation " If you disable HTTP in the Service Access Control screen, then the switch blocks all HTTP connection attempts. 26.
Chapter 26 Access Control 26.9.2 Netscape Navigator Warning Messages When you attempt to access the switch HTTPS server, a Website Certified by an Unknown Authority screen pops up asking if you trust the server certificate. Click Examine Certificate if you want to verify that the certificate is from the switch. If Accept this certificate temporarily for this session is selected, then click OK to continue in Netscape.
Chapter 26 Access Control Figure 94 Example: Lock Denoting a Secure Connection 26.10 Service Access Control Service Access Control allows you to decide what services you may use to access the switch. You may also change the default service port and configure “trusted computer(s)” for each service in the Remote Management screen (discussed later). Click Access Control to go back to the main Access Control screen.
Chapter 26 Access Control Table 66 Access Control: Service Access Control (continued) LABEL DESCRIPTION Service Port For Telnet, SSH, FTP, HTTP or HTTPS services, you may change the default service port by typing the new port number in the Server Port field. If you change the default port number then you will have to let people (who wish to use the service) know the new port number for that service.
CHAPTER 27 Diagnostic This chapter explains the Diagnostic screen. 27.1 Diagnostic Click Management > Diagnostic in the navigation panel to open this screen. Use this screen to check system logs, reset the system or ping IP addresses. Figure 97 Diagnostic The following table describes the labels in this screen. Table 68 Diagnostic LABEL DESCRIPTION System Log Click Display to display a log of events in the multi-line text box. Click Clear to empty the text box and reset the syslog entry.
Chapter 27 Diagnostic 192 VES-1616F-3x Series User’s Guide
CHAPTER 28 Syslog This chapter explains the syslog screens. 28.1 Syslog Overview The syslog protocol allows devices to send event notification messages across an IP network to syslog servers that collect the event messages. A syslog-enabled device can generate a syslog message and send it to a syslog server. Syslog is defined in RFC 3164. The RFC defines the packet format, content and system log related information of syslog messages. Each syslog message has a facility and severity level.
Chapter 28 Syslog Figure 98 Syslog Setup The following table describes the labels in this screen. Table 70 Syslog LABEL DESCRIPTION Syslog Select Active to turn on syslog (system logging) and then configure the syslog setting Logging Type This column displays the names of the categories of logs that the device can generate. Active Select this option to set the device to generate logs for the corresponding category.
Chapter 28 Syslog Figure 99 Syslog Server Setup The following table describes the labels in this screen. Table 71 Syslog Server Setup LABEL DESCRIPTION Active Select this check box to have the device send logs to this syslog server. Clear the check box if you want to create a syslog server entry but not have the device send logs to it (you can edit the entry later). Server Address Enter the IP address of the syslog server.
Chapter 28 Syslog 196 VES-1616F-3x Series User’s Guide
CHAPTER 29 Cluster Management This chapter introduces cluster management. 29.1 Cluster Management Overview Cluster Management allows you to manage switches through one switch, called the cluster manager. The switches must be directly connected and be in the same VLAN group so as to be able to communicate with one another. Table 72 ZyXEL Clustering Management Specifications Maximum number of cluster members 24 Cluster Member Models Must be compatible with ZyXEL cluster management implementation.
Chapter 29 Cluster Management 29.2 Cluster Management Status Click Management > Cluster Management in the navigation panel to display the following screen. " A cluster can only have one manager. Figure 101 Cluster Management Status The following table describes the labels in this screen. Table 73 Cluster Management Status 198 LABEL DESCRIPTION Status This field displays the role of this switch within the cluster.
Chapter 29 Cluster Management 29.2.1 Cluster Member Switch Management Go to the Clustering Management Status screen of the cluster manager switch and then click on an Index hyperlink from the list of members to go to that cluster member switch's web configurator home page. This cluster member web configurator home page and the home page that you'd see if you accessed it directly are different. Figure 102 Cluster Management: Cluster Member Web Configurator Screen 29.2.1.
Chapter 29 Cluster Management The following table explains some of the FTP parameters. Table 74 FTP Upload to Cluster Member Example FTP PARAMETER DESCRIPTION User Enter “admin”. Password The web configurator password default is 1234. ls Enter this command to list the name of cluster member switch’s firmware and configuration file. 360AIH0.bin This is the name of the firmware file you want to upload to the cluster member switch.
Chapter 29 Cluster Management The following table describes the labels in this screen. Table 75 Clustering Management Configuration LABEL DESCRIPTION Clustering Manager Active Select Active to have this switch become the cluster manager switch. A cluster can only have one manager. Other (directly connected) switches that are set to be cluster managers will not be visible in the Clustering Candidates list.
Chapter 29 Cluster Management 202 VES-1616F-3x Series User’s Guide
CHAPTER 30 MAC Table This chapter introduces the MAC Table screen. 30.1 MAC Table Overview The MAC Table screen (a MAC table is also known as a filtering database) shows how frames are forwarded or filtered across the switch’s ports. It shows what device MAC address, belonging to what VLAN group (if any) is forwarded to which port(s) and whether the MAC address is dynamic (learned by the switch) or static (manually entered in the Static MAC Forwarding screen).
Chapter 30 MAC Table 30.2 Viewing the MAC Table Click Management > MAC Table in the navigation panel. " Click a button in the Sort by field to display the MAC address table entries. Figure 106 MAC Table The following table describes the labels in this screen. Table 76 MAC Table 204 LABEL DESCRIPTION Sort by Click one of the following buttons to display and arrange the data according to that button type. The information is then displayed in the summary table below.
CHAPTER 31 ARP Table This chapter introduces ARP table. 31.1 ARP Table Overview Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network. An IP (version 4) address is 32 bits long. In an Ethernet LAN, MAC addresses are 48 bits long. The ARP Table maintains an association between each MAC address and its corresponding IP address. 31.1.
Chapter 31 ARP Table Figure 107 ARP Table The following table describes the labels in this screen. Table 77 ARP Table 206 LABEL DESCRIPTION Index This is the ARP Table entry number. IP Address This is the learned IP address of a device connected to a switch port with corresponding MAC address below. MAC Address This is the MAC address of the device with corresponding IP address above.
P ART VII Commands, Troubleshooting and Specifications Introducing the Commands (209) Command Examples (243) IEEE 802.
CHAPTER 32 Introducing the Commands This chapter introduces the commands and gives a summary of commands available. 32.1 Overview In addition to the web configurator, you can use line commands to configure the switch. Use line commands for advanced switch diagnosis and troubleshooting. If you have problems with your switch, customer support may request that you issue some of these commands to assist them in troubleshooting.
Chapter 32 Introducing the Commands 32.2 Accessing the CLI You can use a direct console connection or Telnet to access the CLI on the switch. " The switch automatically logs you out of the management interface after five minutes of inactivity. If this happens to you, simply log back in again. 32.2.1 Multiple Login You can use a direct console connection or Telnet to access the command interpreter on the switch.
Chapter 32 Introducing the Commands 32.2.2.1 Initial Screen When you turn on your switch, it performs several internal tests as well as line initialization. You can view the initialization information using the console port. After the initialization, the login screen displays (refer to Section 32.3 on page 212). Copyright (c) 1994 - 2006 ZyXEL Communications Corp. initialize mgmt, ethernet address: 00:13:49:01:23:45 initialize switch, ethernet address: 00:13:49:01:23:46 Initializing switch unit 0...
Chapter 32 Introducing the Commands 32.2.4 SSH You can use an SSH client program to access the switch. The following figure shows an example using a text-based SSH client program. Refer to the documentation that comes with your SSH program for information on using it. C:\>ssh2 admin@192.168.0.
Chapter 32 Introducing the Commands • The optional fields in a command are enclosed in square brackets [], for instance, configure snmp-server [contact ] [location ] • • • • • • • means that the contact and location fields are optional. “Command” refers to a command used in the command line interface (CI command). The | symbol means “or”. The entry in the command lines refers to carriage return.
Chapter 32 Introducing the Commands sysname> ? enable exit help history logout ping show ssh traceroute sysname> Turn on privileged commands Exit from the EXEC Description of the interactive help system Show a list of previously run commands Exit from the EXEC Exec ping Show system information SSH client Exec traceroute 32.5.2 Detailed Command Information Enter help to display detailed sub command and parameters.
Chapter 32 Introducing the Commands 32.7 Account Privilege Levels You can use a command whose privilege level is equal to or less than that of your login account. For example, if your login account has a privilege level of 12, you can use all commands with privilege levels from 0 to 12. 0-privileged commands are available to all login accounts. 32.8 Command Modes There are three command modes: User, Enable and Configure.
Chapter 32 Introducing the Commands Table 78 Command Interpreter Mode Summary (continued) MODE .DESCRIPTION HOW TO LOGIN/ ACCESS PROMPT Config-interface This is a sub-mode of the config mode and allows you to configure port related settings. Type interface port-channel sysname(configinterface)# followed by a port number. For example, interface portchannel 10 to configure port 10 on the switch. Config-mvr This is a sub-mode of the config mode and allows you to configure multicast VLAN settings.
Chapter 32 Introducing the Commands 32.10 Saving Your Configuration After you set the switch settings with the configuration commands, use the write memory command to save the changes permanently. sysname# write memory " The write memory command is not available in User mode. You must save your changes after each CLI session. All unsaved configuration changes are lost once you restart the switch. 32.10.1 Logging Out In User or Enable mode, enter the exit or logout command to log out of the CLI.
Chapter 32 Introducing the Commands Table 79 Command Summary: User Mode (continued) COMMAND DESCRIPTION P hardware-monitor Displays current hardware monitor information with the 0 specified temperature unit (Celsius C or Fahrenheit F). hardware-version Displays whether the Switch is a VDSL1 (100100 or 10050) or VDSL2 device (5030). 0 ip Displays the IP settings. 0 system-information Displays general system information.
Chapter 32 Introducing the Commands Table 80 Command Summary: Enable Mode (continued) COMMAND DESCRIPTION P Disconnects the specified TCP session. 13 logout Exits Enable (or privileged) mode. 13 mac-flush Clears the MAC address table. 13 Removes all learned MAC address on the specified port(s). 13 arp Clears the ARP table. 13 Clears interface statistics. 13 logging Clears system logs.
Chapter 32 Introducing the Commands Table 80 Command Summary: Enable Mode (continued) COMMAND DESCRIPTION P Displays IGMP filtering profile settings. 13 igmp-snooping Displays global IGMP snooping settings. 13 interfaces Displays current interface status. 13 interfaces config Displays current interface configuration. 13 bandwidth-control Displays bandwidth control settings. 13 bstorm-control Displays broadcast storm control settings.
Chapter 32 Introducing the Commands Table 80 Command Summary: Enable Mode (continued) COMMAND DESCRIPTION P Displays the specified MVR group settings. 13 plt Displays Packet Loop Test (PLT). 13 policy Displays all policy related information. 13 Displays the specified policy related information. 13 Displays all port authentication settings. 13 Displays port authentication settings on the specified port(s). 13 Displays all port security settings.
Chapter 32 Introducing the Commands Table 80 Command Summary: Enable Mode (continued) COMMAND DESCRIPTION P Displays settings of the specified VDSL profile. 13 Displays a summary list of VDSL PSD profiles. 13 Displays settings of the specified VDSL PSD profile. 13 Displays the status of all VLANs. 13 Displays the status of the specified VLAN. 13 gvrp Displays GVRP settings. 13 port-isolation Displays VLAN-based port isolation settings.
Chapter 32 Introducing the Commands 32.11.3 General Configuration Mode The following table lists the commands in Configuration (or Config) mode. Table 81 Command Summary: Configuration Mode COMMAND DESCRIPTION P Changes the administrator password. 14 bandwidthcontrol Enables bandwidth control. 13 bcptransparency Enables Bridge Control Protocol (BCP) transparency. 13 <[packet-format <802.3untag|802.
Chapter 32 Introducing the Commands Table 81 Command Summary: Configuration Mode (continued) COMMAND DESCRIPTION P Sets the IP addresses of up to 3 DHCP servers. 13 information Specifies the agent information the device to add to DHCP requests. 13 option Sets the device to add DHCP relay agent information. 13 Enables DiffServ. 13 Sets the DSCP-to-IEEE 802.1q mappings. 13 Exits from the CLI. 13 Configures GARP time settings. 13 help Displays help information.
Chapter 32 Introducing the Commands Table 81 Command Summary: Configuration Mode (continued) COMMAND name-server DESCRIPTION P default-gateway Sets the default gateway’s IP address. 13 Sets the IP address of a domain name server. 13 Creates a static route. 13 Sets the metric of a static route or deactivates a static route. 13 Enables Link Aggregation Control Protocol (LACP). 13 Sets the priority of an active port using LACP.
Chapter 32 Introducing the Commands Table 81 Command Summary: Configuration Mode (continued) COMMAND DESCRIPTION P bcp-transparency Disables Bridge Control Protocol (BCP) transparency. 13 classifier Disables the classifier. Each classifier has one rule. If you disable a classifier you cannot use policy rule related information. 13 Enables a classifier. 13 Disables cluster management on the switch. 13 Removes the cluster member. 13 Disables DHCP relay.
Chapter 32 Introducing the Commands Table 81 Command Summary: Configuration Mode (continued) COMMAND DESCRIPTION P Removes the specified MAC forwarding entry, belonging to a VLAN group (if any) forwarded through an interface(s). 13 Enables the specified MAC address, belonging to a VLAN group (if any) forwarded through an interface(s). 13 mirror-port Disables port mirroring on the switch. 13 multi-login Disables multiple logins. 14 mvr Disable MVR on the switch.
Chapter 32 Introducing the Commands Table 81 Command Summary: Configuration Mode (continued) COMMAND snmp-server DESCRIPTION P ssh Disables SSH (Secure Shell) server access to the switch. 13 telnet Disables telnet access to the switch. 13 trap-destination Disables sending of SNMP traps to a station. 13 Disables (R)STP. 13 Disables (R)STP on the specified ports. 13 key Disables the secure shell server encryption key.
Chapter 32 Introducing the Commands Table 81 Command Summary: Configuration Mode (continued) COMMAND DESCRIPTION P physide <1|2> frequence <0 30000> Removes the specified breakpoint in a VDSL PSD profile. 13 vlan Deletes the static VLAN entry. 13 vlan1q gvrp Disables GVRP on the switch. 13 port-isolation Disables port isolation. 13 vlan-stacking Disables VLAN stacking. 13 wfq fe-spq Disables Strict Priority Queuing on the fast Ethernet (10/100Mbps) ports.
Chapter 32 Introducing the Commands Table 81 Command Summary: Configuration Mode (continued) COMMAND DESCRIPTION P reauthenticate Sets a subscriber to periodically re-enter his or her username and password to stay connected to a specified port. 13 reauth-period Specifies how often a client has to re-enter the username and password to stay connected to the specified port(s). 13 Enables port security on the switch. 13 Enables the port security feature on the specified port(s).
Chapter 32 Introducing the Commands Table 81 Command Summary: Configuration Mode (continued) COMMAND DESCRIPTION P https Allows HTTPS access on the specified service port. 13 icmp Allows ICMP access for services like Ping. 13 snmp Allows SNMP management. 13 ssh Allows SSH access on the specified service port. 13 telnet Allows Telnet access on the specified service port.
Chapter 32 Introducing the Commands Table 81 Command Summary: Configuration Mode (continued) COMMAND DESCRIPTION P Sets the log type. 13 Sets the log type and the file location on the syslog server. 13 Sets the time in hour, minute and second format. 13 date Sets the date in year, month and day format. 13 help Displays help information. 13 timezone <1200|...|1200> Selects the time difference between UTC (formerly known as GMT) and your time zone.
Chapter 32 Introducing the Commands Table 81 Command Summary: Configuration Mode (continued) COMMAND DESCRIPTION P vlan-stacking Enables VLAN stacking on the device. 13 Sets the service provider’s TP (Tagged Protocol) ID. 13 <802.1q|port-based> Specifies the VLAN type. 13 Sets the switch to use Weight Fair Queuing (WFQ) queuing. 13 Sets the switch to use WFQ to service all queues for the Ethernet port. 13 vlan-type wfq fe-spq 32.11.
Chapter 32 Introducing the Commands Table 82 interface port-channel Commands (continued) COMMAND DESCRIPTION P exit Exits from the interface port-channel command mode. 13 flow-control Enables interface flow control. Flow control regulates transmissions to match the bandwidth of the receiving port. 13 frame-type Choose to accept both tagged and untagged incoming frames or just tagged incoming frames on a port.
Chapter 32 Introducing the Commands Table 82 interface port-channel Commands (continued) COMMAND no protocolbased-vlan name VES-1616F-3x Series User’s Guide DESCRIPTION P bandwidth-limit Disables bandwidth limit on the port(s). 13 broadcast-limit Disables broadcast storm control limit on the port(s). 13 diffserv Disables DiffServ settings on the port(s). 13 dlf-limit Disables destination lookup failure (DLF) on the switch.
Chapter 32 Introducing the Commands Table 82 interface port-channel Commands (continued) COMMAND packet-format ethernet-type vlan priority <0-7> inactive pvid <1-4094> DESCRIPTION P Disables the protocol based VLAN. 13 The default PVID is VLAN 1 for all ports. Sets a PVID in the range 1 to 4094 for the specified interface. 13 qos priority <0-7> Sets the quality of service priority for an interface.
Chapter 32 Introducing the Commands Table 83 mvr Commands (continued) COMMAND DESCRIPTION P group start-address end-address Sets the multicast group range for the MVR. 13 inactive Disables MVR settings. 13 mode Sets the MVR mode. 13 name Sets the MVR name for identification purposes. 13 group Disables all MVR group settings. 13 group Disables the specified MVR group setting. 13 inactive Enables MVR.
Chapter 32 Introducing the Commands Table 84 vdsl-alarmprofile Commands (continued) COMMAND DESCRIPTION P 15minsLoss Sets the number of Lost of Signal (Los) errors allowed in any 15-minute period. An alarm is triggered if this number is exceeded. 13 15minsSESs Sets the number of Severely Errored Seconds(SES) errors allowed in any 15-minute period. An alarm is triggered if this number is exceeded. 13 exit Exits from this command mode.
Chapter 32 Introducing the Commands Table 85 vdsl-profile Commands (continued) COMMAND maxpower DESCRIPTION P ds <0..58> Specify the maximum aggregate power level for downstream transmission. 13 us <0..58> Specify the maximum aggregate power level for upstream transmission. 13 Sets the use of optional channel for the upstream or downstream traffic. 1: unused 2: upstream 13 maxdsfast <64..104960> Specifies the maximum downstream fast channel data rate in bits/second. 13 maxdsslow <64..
Chapter 32 Introducing the Commands Table 85 vdsl-profile Commands (continued) COMMAND rateratio snr targetslowburst DESCRIPTION P us <1|2> Sets a rate adaptive mode for the upstream traffic 1: Manual 2: AdaptAtInit 13 ds <0..100> Specify the downstream data rate allocated for the fast and slow channels. 0: slow channel 100: fast channel 13 us <0..100> Specify the upstream data rate allocated for the fast and slow channels. 0: slow channel 100: fast channel 13 dsmax <0..
Chapter 32 Introducing the Commands Table 86 vlan Commands (continued) COMMAND DESCRIPTION P manageable Allows the switch to be managed using this specified IP address. 13 defaultgateway Sets a default gateway IP address for this VLAN. 13 inband-default Sets a static in-band IP address and subnet mask. 13 inband-default dhcp-bootp Sets the dynamic in-band IP address.
Chapter 32 Introducing the Commands 242 VES-1616F-3x Series User’s Guide
CHAPTER 33 Command Examples This chapter describes some commands in more detail. 33.1 Overview These are commands that you may use frequently in maintaining your switch. 33.2 show Commands These are the commonly used show commands. 33.2.1 show interface Syntax: show interface [port-number] This command displays statistics of a port. The following example shows that port 2 is up and the related information. sysname# show interface 2 Port Info Port NO.
Chapter 33 Command Examples 33.2.2 show ip Syntax: show ip This command displays the IP related information (such as IP address and subnet mask) on all switch interfaces. The following figure shows the default interface settings. sysname> show ip Out-of-band Management IP Address = 192.168.0.1 Management IP Address IP[192.168.0.1], Netmask[255.255.255.0], VID[0] IP Interface IP[192.168.1.1], Netmask[255.255.255.0], VID[1] 33.2.3 show logging Syntax: show logging This command displays the system logs.
Chapter 33 Command Examples This command displays the MAC address(es) stored in the switch. The following example shows the MAC address table. sysname# show mac address-table all Port VLAN ID MAC Address 18 1 00:02:e3:30:43:34 18 1 00:04:80:9b:78:00 18 1 00:0d:60:8f:09:a1 18 1 00:0f:fe:1e:4a:e0 18 1 00:13:49:22:a3:3b 18 1 00:c0:9f:cd:cc:5f 18 1 00:c0:a8:fa:e9:27 sysname# Type Dynamic Dynamic Dynamic Dynamic Dynamic Dynamic Dynamic 33.2.
Chapter 33 Command Examples This command shows the general system information (such as the firmware version and system up time). An example is shown next. sysname# show system-information System Name System Contact System Location Ethernet Address ZyNOS F/W Version RomRasSize System up Time Bootbase Version ZyNOS CODE Product Model sysname# : : : : : : : : : : VES-1616F-35 00:13:49:00:00:02 V3.60(AIH.0)C0 | 01/25/2007 3364912 0:28:28 (29b44 ticks) V0.
Chapter 33 Command Examples This command displays a summary list of VDSL profiles or displays the settings of a VDSL profile. The following example shows the summary table. sysname# show vdsl-profile Name Payload Rate SNR Margin Applied Ports =========================================================================== DEFVAL 104M/104M 6/6 1-16 test 104M/104M 6/6 sysname# The following example shows the settings of the test VDSL profile.
Chapter 33 Command Examples where = The IP address of an Ethernet device. [in-band|out-ofband|vlan ] = Specifies the network interface or the VLAN ID to which the Ethernet device belongs. out-of-band refers the management port while in-band means the other ports on the switch. [ size <0-8024> ] = Specifies the packet size to send. [ -t ] = Sends Ping packets to the Ethernet device indefinitely. Click [CTRL]+ C to terminate the Ping process.
Chapter 33 Command Examples This command displays information about the route to an Ethernet device. The following example displays route information to an Ethernet device with an IP address of 192.168.1.100. sysname> traceroute 192.168.1.100 traceroute to 192.168.1.100, 30 hops max, 40 byte packet 1:192.168.1.100 (10 ms) (10 ms) (0 ms) traceroute done: 33.5 Enabling RSTP Syntax: snapping-tree [port-number] To enable RSTP on a port. Enter spanning-tree followed by the port number and press [ENTER].
Chapter 33 Command Examples where = The IP address of a TFTP server on which you want to store the backup configuration file. = Specifies the name of the configuration file. This command backs up the current configuration file on a TFTP server. The following example backs up the current configuration to a file (test.cfg) on the TFTP server (172.23.19.96). sysname# copy running-config tftp 172.23.19.96 test.cfg Backuping . (683)Bytes Done! sysname# 33.7.
Chapter 33 Command Examples 33.8 no Command Examples These are the commonly used command examples that belong to the no group of commands. 33.8.1 no mirror port Syntax: no mirror-port Disables port mirroring on the switch. An example is shown next. sysname(config)# no mirror-port 33.8.2 no https timeout Syntax: no https timeout Resets the https session timeout to default. An example is shown next. The session timeout is reset to 300 seconds. sysname(config)# no https timeout Cache timeout 300 33.8.
Chapter 33 Command Examples 33.8.4 no port-access-authenticator Syntax: no port-access-authenticator no port-access-authenticator reauthenticate no port-access-authenticator where = Disables port authentication on the switch. reauthenticate = Disables the re-authentication mechanism on the listed port(s). = Disables authentication on the listed ports. An example is shown next. • Disable authentication on the switch.
Chapter 33 Command Examples • Remove the remote host with IP address 172.165.1.9 and with an SSH-RSA encryption key from the list of known hosts. sysname(config)# no ssh key rsa1 sysname(config)# no ssh known-hosts 172.165.1.8 sysname(config)# no ssh known-hosts 172.165.1.9 ssh-rsa 33.9 interface Commands These are some commonly used commands that belong to the interface group of commands. 33.9.
Chapter 33 Command Examples An example is shown next. • Enable ports one, three, four and five for configuration. • Set the BPDU control to tunnel, to forward BPDUs received on ports one, three, four and five. sysname(config)# interface port-channel 1,3-5 sysname(config-interface)# bpdu-control tunnel sysname(config-interface)# 33.9.3 broadcast-limit Syntax: broadcast-limit broadcast-limit where Enables broadcast storm control limit on the switch.
Chapter 33 Command Examples • Set the incoming traffic bandwidth limit to 9Mbps. sysname(config)# interface sysname(config-interface)# sysname(config-interface)# sysname(config-interface)# port-channel 1 bandwidth-limit bandwidth-limit egress 7000 bandwidth-limit ingress 9000 33.9.5 mirror Syntax: mirror mirror dir where Enables port mirroring on the interface. = Enables port mirroring for incoming, outgoing or both incoming and outgoing traffic.
Chapter 33 Command Examples An example is shown next. • Enable the IEEE 802.1Q tagged VLAN command to configure tagged VLAN for the switch. • Enable ports one, three, four and five for configuration. • Enable GVRP on the interface. sysname(config)# vlan1q gvrp sysname(config)# interface port-channel 1,3-5 sysname(config-interface)# gvrp 33.9.7 ingress-check Syntax: ingress-check Enables the device to discard incoming frames for VLANs that are not included in a port member set. An example is shown next.
Chapter 33 Command Examples where Sets the outgoing traffic port list for a port-based VLAN. An example is shown next. • Enable port-based VLAN tagging on the switch. • Enable ports one, three, four and five for configuration. • Set the outgoing traffic ports as the CPU (0), seven (7), eight (8) and nine (9). sysname(config)# vlan-type port-based sysname(config)# interface port-channel 1,3-5 sysname(config-interface)# egress set 0,7-9 33.9.10 qos priority Syntax: qos priority <0 ..
Chapter 33 Command Examples 33.9.12 speed-duplex Syntax: speed-duplex where Sets the duplex mode (half or full) and speed (10, 100 or 1000 Mbps) of the connection on the port. Selecting auto (autonegotiation) makes one port able to negotiate with a peer automatically to obtain the connection speed and duplex mode that both ends support. An example is shown next.
CHAPTER 34 IEEE 802.1Q Tagged VLAN Commands This chapter describes the IEEE 802.1Q Tagged VLAN and associated commands. 34.1 Configuring Tagged VLAN Refer to Chapter 7 on page 87 for background information on VLANs. The following procedure shows you how to configure tagged VLAN. 1 Use the IEEE 802.1Q tagged VLAN commands to configure tagged VLAN for the switch. • Use the vlan command to configure or create a VLAN on the switch. The switch automatically enters the config-vlan mode.
Chapter 34 IEEE 802.1Q Tagged VLAN Commands Example: sysname(config)# vlan 3 sysname(config-vlan)# inactive 34.2 Global VLAN1Q Tagged VLAN Configuration Commands This section shows you how to configure and monitor the IEEE 802.1Q Tagged VLAN. 34.2.1 GARP Status Syntax: show garp This command shows the switch’s GARP timer settings, including the join, leave and leave all timers. An example is shown next.
Chapter 34 IEEE 802.1Q Tagged VLAN Commands This command sets the switch’s GARP timer settings, including the join, leave and leave all timers. Switches join VLANs by making a declaration. A declaration is made by issuing a Join message using GARP. Declarations are withdrawn by issuing a Leave message. A Leave All message terminates all registrations. GARP timers set declaration timeout values.
Chapter 34 IEEE 802.1Q Tagged VLAN Commands where = Specifies the VLAN number between 1 and 4094 This command sets the default VLAN ID on the port(s). The following example sets the default VID to 200 on ports 1 to 5. sysname(config)# interface port-channel 1-5 sysname(config-interface)# pvid 200 34.3.2 Set Acceptable Frame Type Syntax: frame-type where = Specifies all Ethernet frames (tagged and untagged) or only tagged Ethernet frames.
Chapter 34 IEEE 802.1Q Tagged VLAN Commands Syntax: vlan fixed forbidden name normal untagged no fixed no forbidden no untagged where = The VLAN ID [1 – 4094]. = A name to identify the SVLAN entry. = This is the switch port list. • Enter fixed to register the to the static VLAN table with .
Chapter 34 IEEE 802.1Q Tagged VLAN Commands 3 The switch ignores the port from which the frame came, because the switch does not send a frame to the port from which it came. The switch also does not forward frames to “forbidden” ports. 4 If after looking at the SVLAN, the switch does not have any ports to which it will send the frame, it won’t check the port filter. 34.4 Delete VLAN ID Syntax: no vlan where = The VLAN ID [1 – 4094].
Chapter 34 IEEE 802.1Q Tagged VLAN Commands An example is shown next. sysname# show vlan The Number of VLAN : Idx.
Chapter 34 IEEE 802.
CHAPTER 35 Troubleshooting This chapter covers potential problems and possible remedies. 35.1 Problems Starting Up the Switch Table 87 Troubleshooting the Start-Up of Your Switch PROBLEM CORRECTIVE ACTION None of the LEDs Check the power connection and make sure the power source is turned on. turn on when you turn on the switch. If the error persists, you may have a hardware problem. In this case, you should contact your vendor. 35.
Chapter 35 Troubleshooting 35.3 Problem with the VDSL Connection Table 89 Troubleshooting VDSL Connection PROBLEM CORRECTIVE ACTION The VDSL link is down. Make sure the VDSL port is activated. Check the port connection. Make sure the cable is faulty. The VDSL port may be faulty. Try connecting to a different VDSL port on the switch. The target transmission rate(s) may be too high. Set the switch to use a lower link transmission rate. The CPE device may be faulty.
Chapter 35 Troubleshooting Figure 108 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 109 Internet Options 3 Click Apply to save this setting. 35.3.1.1.
Chapter 35 Troubleshooting Figure 110 Internet Options 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.1.1. 4 Click Add to move the IP address to the list of Allowed sites.
Chapter 35 Troubleshooting 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. 35.3.1.2 JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 112 Internet Options 2 3 4 5 6 Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default).
Chapter 35 Troubleshooting Figure 113 Security Settings - Java Scripting 35.3.1.3 Java Permissions 1 2 3 4 5 From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. Click OK to close the window.
Chapter 35 Troubleshooting 35.3.1.3.1 JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 make sure that Use Java 2 for
Chapter 35 Troubleshooting 274 VES-1616F-3x Series User’s Guide
CHAPTER 36 Product Specifications These are the switch product specifications. Table 91 Product Specifications General Product Specifications Standards IEEE802.3 10BASE-T Ethernet (twisted-pair copper) IEEE802.3u 100BASE-TX Fast Ethernet (twisted-pair copper) ANSI/IEEE802.3 Auto-negotiation IEEE802.3x Flow Control IEEE802.1p Priority Queues IEEE802.1Q Tagged VLAN VDSL One Telco connector for16 VDSL or POTS/ISDN lines Duplex Method: DMT/FDD Band Plan: 998 Tone spacing: 4.3125 - 8.
Chapter 36 Product Specifications Table 91 Product Specifications (continued) Security Static MAC address forward MAC address learning: 10 per port Block unresolved address forwarding/Port security 802.
Chapter 36 Product Specifications Table 91 Product Specifications (continued) MIBs RFC1213 RFC1493 Bridge MIB RFC1643 Ethernet MIB RFC1757 RMON RFC1155 SMI RFC 2233 ifVHCPacketGroup RFC 2647 Bridge MIB extension (for 802.1Q) RFC 2925 PING-MIB and TRACEROUTE-MIB RFC 3728 VDSL line MIB Physical and Environmental Specifications Weight < 8kg Power Suplpy 100 - 240 V, 50/60 Hz AC Power Consumption 75 W (max.
Chapter 36 Product Specifications Table 92 CO Impedance Splitter Board Specifications (continued) COUNTRY POTS ISDN Netherlands 270Ω+ (750Ω//150nF) 135Ω (2B1Q) Norway 270Ω+ (750Ω//150nF) 135Ω (2B1Q) Russia 600Ω None (POTS only) Sweden 270Ω+ (750Ω//150nF) None (POTS only) Swiss 270Ω+ (750Ω//150nF) 135Ω (2B1Q) UK 320Ω + (1050Ω//230nF) None (POTS only) USA 900Ω None (POTS only) Hardware Telco-50 Connector Pin Assignments The following table and diagram show the pin assignments of the Te
Chapter 36 Product Specifications Table 93 Hardware Telco-50 Pin Assignments PIN24 NULL PIN49 P-PORT1 PIN24 NULL PIN49 P-PORT1 PIN25 NULL PIN50 NULL PIN25 NULL PIN50 NULL Figure 116 Hardware Telco-50 Pin Assignments This table lists the ports and matching pin numbers for the hardware Telco-50 connector.
Chapter 36 Product Specifications Table 94 Hardware Telco-50 Connector Port and Pin Numbers (continued) VDSL PORT NUMBER PIN NUMBER 14 4, 5 15 27, 28 16 1, 2 Telco-50 Cable Telco-50 Connector Pin Assignments Use Telco-50 cables to connect the VDSL LINE port to the user equipment (VDSL modem) and the POTS/ISDN LINE port to the central office switch or PBX (Private Branch Exchange). The following diagram shows the pin assignments that you need to have on the Telco-50 connectors on the Telco-50 cables.
Chapter 36 Product Specifications Console Cable Pin Assignments In a serial communications connection, generally a computer is DTE (Data Terminal Equipment) and a modem is DCE (Data Circuit-terminating Equipment). The Switch is DCE when you connect a computer to the console port. The following diagrams and chart show the pin assignments of the console cable. The pin layout for the DB-9 connector end of the cables is as follows.
Chapter 36 Product Specifications 282 VES-1616F-3x Series User’s Guide
P ART VIII Appendices and Index " The appendices provide general information. Some details may not apply to your Switch.
APPENDIX A IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix A IP Addresses and Subnetting Figure 120 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation). The term “subnet” is short for “subnetwork”. A subnet mask has 32 bits.
Appendix A IP Addresses and Subnetting Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 97 Subnet Masks BINARY DECIMAL 1ST OCTET 2ND OCTET 3RD OCTET 4TH OCTET 8-bit mask 11111111 00000000 00000000 00000000 255.0.0.0 16-bit mask 11111111 11111111 00000000 00000000 255.255.0.0 24-bit mask 11111111 11111111 11111111 00000000 255.255.255.
Appendix A IP Addresses and Subnetting Table 99 Alternative Subnet Mask Notation (continued) SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.192 /26 1100 0000 192 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.252 /30 1111 1100 252 Subnetting You can use subnetting to divide one network into multiple sub-networks.
Appendix A IP Addresses and Subnetting Figure 122 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.128 is its broadcast address.
Appendix A IP Addresses and Subnetting Table 101 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.64 Lowest Host ID: 192.168.1.65 Broadcast Address: 192.168.1.127 Highest Host ID: 192.168.1.126 Table 102 Subnet 3 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1.
Appendix A IP Addresses and Subnetting Table 104 Eight Subnets (continued) SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 105 24-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.255.
Appendix A IP Addresses and Subnetting Table 106 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
Appendix A IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
Appendix A IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
APPENDIX B Legal Information Copyright Copyright © 2007 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix B Legal Information FCC Warning This device has been tested and found to comply with the limits for a Class A digital switch, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This device generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
Appendix B Legal Information condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions. Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser.
Appendix B Legal Information 298 VES-1616F-3x Series User’s Guide
APPENDIX C Customer Support Please have the following information ready when you contact customer support. Required Information • • • • Product model and serial number. Warranty Information. Date that you received your device. Brief description of the problem and the steps you took to solve it. Corporate Headquarters (Worldwide) • • • • • • • Support E-mail: support@zyxel.com.tw Sales E-mail: sales@zyxel.com.tw Telephone: +886-3-578-3942 Fax: +886-3-578-2439 Web Site: www.zyxel.com, www.europe.zyxel.
Appendix C Customer Support Denmark • • • • • • Support E-mail: support@zyxel.dk Sales E-mail: sales@zyxel.dk Telephone: +45-39-55-07-00 Fax: +45-39-55-07-07 Web Site: www.zyxel.dk Regular Mail: ZyXEL Communications A/S, Columbusvej, 2860 Soeborg, Denmark Finland • • • • • • Support E-mail: support@zyxel.fi Sales E-mail: sales@zyxel.fi Telephone: +358-9-4780-8411 Fax: +358-9-4780 8448 Web Site: www.zyxel.
Appendix C Customer Support • • • • Telephone: +7-3272-590-698 Fax: +7-3272-590-689 Web Site: www.zyxel.kz Regular Mail: ZyXEL Kazakhstan, 43, Dostyk ave.,Office 414, Dostyk Business Centre, 050010, Almaty, Republic of Kazakhstan North America • • • • • • • Support E-mail: support@zyxel.com Sales E-mail: sales@zyxel.com Telephone: +1-800-255-4101, +1-714-632-0882 Fax: +1-714-632-0858 Web Site: www.us.zyxel.com FTP Site: ftp.us.zyxel.com Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St.
Appendix C Customer Support • Web Site: www.zyxel.es • Regular Mail: ZyXEL Communications, Arte, 21 5ª planta, 28033 Madrid, Spain Sweden • • • • • • Support E-mail: support@zyxel.se Sales E-mail: sales@zyxel.se Telephone: +46-31-744-7700 Fax: +46-31-744-7701 Web Site: www.zyxel.se Regular Mail: ZyXEL Communications A/S, Sjöporten 4, 41764 Göteborg, Sweden Ukraine • • • • • • Support E-mail: support@ua.zyxel.com Sales E-mail: sales@ua.zyxel.
Index Index Numerics 802.1P priority 74, 75 A Access control SNMP 180 access control login account 182 remote management 190 service 189 SNMP activate IEEE 802.
Index Configuration file 51 Restore 51 configuration restore 174 configure port authentication 118 configuring STP 104 connection test 191 Console port Settings 39 console port 210 initial screen 211 contact information 299 copyright 295 CoS 157 CPU management port 93 CRC (Cyclic Redundant Check) 61 create login account 182 customer support 299 D destination lookup failure See DLF device MAC address 63 DHCP 165 option 82 165 relay agent information 165 DHCP relay diagnostic 191 ping 191 system log 191 tes
Index GVRP GARP VLAN Registration Protocol See GVRP GVRP (GARP VLAN Registration Protocol) 255 gvrp disable 261 gvrp enable 261 gvrp status 261 H hardware connection 37 hardware installation 35 rack mount 35 hardware monitor 64 hop count 164 HTTP 130 HTTP over SSL See HTTPS HTTPS example 187 HyperText Transfer Protocol over Secure Socket Layer See HTTPS I IANA 292 IEEE 802.1p 69 IEEE 802.1Q 87 IEEE 802.1w RSTP IEEE 802.1x 117 Note 117 IEEE 802.
Index management interface CLI 210 managing the device good habits 33 using FTP. See FTP. using SNMP. See SNMP. using Telnet. See command interface. using the command interface. See command interface. using the web configurator. See web configurator.
Index PVID 87, 92 Q QoS 127, 157 Quality of Service See QoS queue weight Queuing 123 Queuing algorithm 123 queuing algorithm select 125 SPQ Queuing method 123 R rack mouting 35 requirement 35 Radio Frequency Interference See RFI RADIUS RADIUS server 117 Advantages 117 Network example 117 Settings 119 setup 119 shared secret 119 UDP port 119 Rapid Spanning Tree Protocol See RSTP rate adaption 76, 79 fixed rate 76 rate adaptive decrease mode 76 rate adaptive decrease mode 76 reauthentication 118 reboot sys
Index version supported 185 SSL Standards 275 standby port 113 stastic VLAN port setup 92 static MAC address 97, 121 Static MAC forwarding 97 static MAC forwarding 97 static route 163 destination IP address 163 metric 164 static VLAN acceptable frame type 93 Control 91 create 91 ingress check 92 port isolation 92 status 90 tagging 91 Status 46 LED 40 VLAN 90 status 53 Ethernet port detail 59 port 53 STP 103 VLAN port detail 55 STP 101 Bridge ID 103 bridge priority 104 designated bridge 102 forwarding delay
Index V VDSL port connection 37 VDSL port detail 55 ventilation 35 VID 90, 141 view log 191 Virtual Local Area Network See VLAN VLA stacking frame format 141 VLAN 67, 139 acceptable frame type 93 double-tagged frame 139 IEEE 802.
Index 310 VES-1616F-3x Series User’s Guide