EasyManua.ls Logo

ZyXEL Communications MGS-3712F User Manual

ZyXEL Communications MGS-3712F
382 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
www.zyxel.com
www.zyxel.com
MGS-3712/MGS-3712F
MetroGigabit Switch
Copyright © 2008
ZyXEL Communications Corporation
Firmware Version 3.90
Edition 1, 10/2008
Default Login Details
IP Address http://192.168.1.1
http://192.168.0.1
(Out-of-band
MGMT port)
User Name admin
Password 1234

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the ZyXEL Communications MGS-3712F and is the answer not in the manual?

ZyXEL Communications MGS-3712F Specifications

General IconGeneral
BrandZyXEL Communications
ModelMGS-3712F
CategorySwitch
LanguageEnglish

Summary

Safety Warnings

General Safety Precautions

Provides essential safety guidelines for using the switch, covering water, environment, handling, and electrical safety.

CHAPTER 4 Tutorials

4.1 How to Use DHCP Snooping on the Switch

Provides a step-by-step guide to configuring DHCP snooping on the switch for network security.

4.2 How to Use DHCP Relay on the Switch

Guides users on configuring the switch to forward DHCP client requests to a specific DHCP server.

PART II Basic Configuration

The Web Configurator

Introduces the HTML-based interface for switch setup and management using a web browser.

CHAPTER 5 The Web Configurator

5.1 Introduction

Introduces the web configurator as an HTML-based management interface for easy switch setup and management.

5.2 System Login

Details the procedure for accessing the switch's web configurator by entering its IP address in a web browser.

5.6 Resetting the Switch

Provides instructions on how to reset the switch to its factory defaults or reload a configuration file.

CHAPTER 6 Initial Setup Example

6.2 Configuring Switch Management IP Address

Details how to configure the switch's management IP address for network access and management purposes.

CHAPTER 8 Basic Setting

8.6 IP Setup

Guides on configuring the switch's IP address, default gateway, DNS server, and management VLAN ID.

8.7 Port Setup

Explains how to configure individual switch port settings, including speed, duplex, flow control, and BPDU control.

PART III Advanced

VLAN

Covers the configuration of 802.1Q tagged and port-based VLANs for network segmentation.

Spanning Tree Protocol

Covers the configuration and management of STP, RSTP, and MSTP to prevent network loops.

Link Aggregation

Explains how to logically aggregate physical links to form a single, higher-bandwidth link.

Port Authentication

Covers the configuration of IEEE 802.1x and MAC authentication methods for client access validation.

Port Security

Details how to set up port security to control access based on MAC addresses and limit learned MAC addresses per port.

VLAN Stacking

Explains VLAN stacking (Q-in-Q) for service providers to distinguish multiple customer VLANs with identical IDs.

AAA

Details the configuration of Authentication, Authorization, and Accounting settings using RADIUS and TACACS+ servers.

IP Source Guard

Explains how to use IP source guard to filter unauthorized DHCP and ARP packets, including DHCP snooping and ARP inspection.

Layer 2 Protocol Tunneling

Explains how to configure Layer 2 protocol tunneling (L2PT) for tunneling STP, CDP, and VTP packets across a service provider network.

CHAPTER 9 VLAN

9.1 Introduction to IEEE 802.1Q Tagged VLANs

Explains IEEE 802.1Q tagged VLANs, frame formats, and VLAN ID concepts for network segmentation.

9.5 Static VLAN

Details how to use static VLANs to decide frame forwarding based on VLAN tags or port membership.

9.7 Configuring Subnet Based VLAN

Details the steps to configure subnet-based VLANs, including priority and VLAN ID assignments.

9.9 Configuring Protocol Based VLAN

Guides on configuring protocol-based VLANs to manage traffic based on specific protocols for enhanced network control.

9.11 Port-based VLAN Setup

Explains port-based VLANs where packet forwarding is based on destination MAC address and associated port.

CHAPTER 10 Static MAC Forward Setup

10.2 Configuring Static MAC Forwarding

Details how to manually enter MAC addresses in the MAC address table to control port access and reduce broadcasting.

CHAPTER 11 Static Multicast Forward Setup

11.2 Configuring Static Multicast Forwarding

Guides on configuring rules to forward specific multicast frames, such as streaming or control frames, to designated ports.

CHAPTER 12 Filtering

12.1 Configure a Filtering Rule

Describes how to set up MAC address port filtering to sift traffic based on source and destination MAC addresses and VLAN group ID.

CHAPTER 13 Spanning Tree Protocol

13.1 STP/RSTP Overview

Explains how (R)STP detects and breaks network loops, providing backup links and ensuring single paths.

13.3 Spanning Tree Configuration

Guides on activating STP modes (RSTP, MRSTP, MSTP) on the switch through the configuration screen.

13.4 Configure Rapid Spanning Tree Protocol

Details the process of configuring RSTP settings on the switch for faster network convergence.

CHAPTER 14 Bandwidth Control

14.2 Bandwidth Control Setup

Guides on configuring bandwidth limits for ingress and egress traffic rates on switch ports.

CHAPTER 15 Broadcast Storm Control

15.1 Broadcast Storm Control Setup

Details how to limit broadcast, multicast, and DLF packets per second to prevent network disruptions.

CHAPTER 16 Mirroring

16.1 Port Mirroring Setup

Explains how to set up port mirroring to copy traffic to a monitor port for analysis without interference.

CHAPTER 17 Link Aggregation

17.1 Link Aggregation Overview

Introduces link aggregation (trunking) as grouping physical ports into a single logical link for higher capacity.

17.4 Link Aggregation Setting

Guides on configuring static link aggregation by selecting groups, criteria, and assigning ports.

17.6 Static Trunking Example

Provides a practical example of creating a static port trunk group for a range of ports.

CHAPTER 18 Port Authentication

18.1 Port Authentication Overview

Explains port authentication methods like IEEE 802.1x and MAC authentication using external RADIUS servers.

18.1.1 IEEE 802.1x Authentication

Details the process of client authentication via IEEE 802.1x, involving validation through a username and password.

18.1.2 MAC Authentication

Describes MAC authentication, which uses MAC addresses and configured passwords for client validation.

18.2 Port Authentication Configuration

Guides on enabling port authentication methods and configuring RADIUS server settings.

18.2.1 Activate IEEE 802.1x Security

Details the steps to activate IEEE 802.1x security on the switch and individual ports.

18.2.2 Activate MAC Authentication

Guides on activating MAC authentication on the switch and configuring its settings.

CHAPTER 19 Port Security

19.1 About Port Security

Explains port security's function to allow only authorized MAC addresses (dynamic or static) to pass through a port.

19.2 Port Security Setup

Details how to enable port security, manage learned MAC addresses, and freeze MAC addresses.

CHAPTER 20 Classifier

20.2 Configuring the Classifier

Guides on defining classifiers to sort traffic into flows based on criteria like source/destination addresses and ports.

CHAPTER 21 Policy Rule

21.2 Configuring Policy Rules

Guides on configuring policy rules to define actions for classified traffic, referencing classifier setup.

CHAPTER 22 Queuing Method

22.2 Configuring Queuing

Guides on configuring queuing methods (SPQ, WFQ, WRR) and assigning weights to ports for traffic management.

CHAPTER 23 VLAN Stacking

23.1 VLAN Stacking Overview

Explains VLAN stacking (Q-in-Q) for service providers to distinguish multiple customer VLANs with identical IDs.

23.4 Configuring VLAN Stacking

Guides on enabling and configuring VLAN stacking settings on the switch.

23.4.1 Port-based Q-in-Q

Explains port-based Q-in-Q, allowing the switch to apply the same outer VLAN tag to frames from the same port, regardless of inner VLAN IDs.

23.4.2 Selective Q-in-Q

Describes selective Q-in-Q, which allows adding different outer VLAN tags based on inner VLAN tags for incoming frames on a port.

CHAPTER 24 Multicast

24.1.3 IGMP Snooping

Explains IGMP snooping's ability to learn multicast group membership and forward traffic efficiently, reducing network load.

24.3 Multicast Setting

Guides on configuring IGMP snooping settings, including active mode, querier settings, and host timeouts.

24.4 IGMP Snooping VLAN

Details how to configure IGMP snooping for specific VLANs or in auto mode for automatic learning of multicast group membership.

24.7 General MVR Configuration

Guides on creating multicast VLANs and selecting receiver and source ports for each multicast VLAN using the MVR screen.

24.8 MVR Group Configuration

Details how to configure MVR IP multicast group addresses, including source and receiver ports, and tagging options.

CHAPTER 25 AAA

25.1 Authentication, Authorization and Accounting (AAA)

Explains the AAA processes: Authentication, Authorization, and Accounting for managing user access and activity on the switch.

25.1.2 RADIUS and TACACS+

Compares RADIUS and TACACS+ security protocols used for external user authentication and authorization.

25.2 AAA Screens

Introduces the AAA screens for enabling authentication, authorization, and accounting services.

25.2.1 RADIUS Server Setup

Guides on configuring RADIUS server settings for authentication and accounting purposes.

25.2.2 TACACS+ Server Setup

Details how to configure TACACS+ server settings for authentication and accounting services.

25.2.3 AAA Setup

Covers the configuration of authentication, authorization, and accounting settings on the switch, including method priorities.

CHAPTER 26 IP Source Guard

26.1 IP Source Guard Overview

Explains IP source guard's role in distinguishing authorized and unauthorized DHCP and ARP packets using a binding table.

26.1.1 DHCP Snooping Overview

Details DHCP snooping for filtering unauthorized DHCP packets and building a binding table dynamically.

26.1.1.4 Configuring DHCP Snooping

Guides on enabling DHCP snooping on the switch and configuring DHCP relay option 82.

26.1.2 ARP Inspection Overview

Explains ARP inspection for filtering unauthorized ARP packets to prevent man-in-the-middle attacks.

26.1.2.4 Configuring ARP Inspection

Provides steps to configure ARP inspection, including enabling DHCP snooping and trusted/untrusted ports.

26.2 IP Source Guard

Explains how IP source guard uses DHCP snooping and ARP inspection bindings to distinguish authorized and unauthorized packets.

26.3 IP Source Guard Static Binding

Guides on managing static bindings for DHCP snooping and ARP inspection, uniquely identified by MAC address and VLAN ID.

26.5 DHCP Snooping Configure

Details how to enable DHCP snooping on the switch and configure the DHCP snooping database.

26.5.1 DHCP Snooping Port Configure

Explains how to specify trusted or untrusted ports for DHCP snooping and set the maximum rate for DHCP packets.

26.5.2 DHCP Snooping VLAN Configure

Guides on enabling DHCP snooping on each VLAN and specifying whether to add DHCP relay agent option 82 information.

26.7 ARP Inspection Configure

Guides on enabling ARP inspection and configuring settings for ARP inspection logs, including filter aging time and buffer size.

26.7.1 ARP Inspection Port Configure

Explains how to specify trusted or untrusted ports for ARP inspection and set the maximum packet rate.

26.7.2 ARP Inspection VLAN Configure

Guides on enabling ARP inspection on each VLAN and specifying when log messages are generated for ARP packets.

CHAPTER 27 Loop Guard

27.2 Loop Guard Setup

Details how to enable the loop guard feature on the switch and its ports, noting it cannot be enabled with STP.

CHAPTER 28 VLAN Mapping

28.2 Enabling VLAN Mapping

Guides on enabling the VLAN mapping feature on the switch and its ports.

28.3 Configuring VLAN Mapping

Details how to configure VLAN mapping rules, including port, VID, translated VID, and priority settings.

CHAPTER 29 Layer 2 Protocol Tunneling

29.1 Layer 2 Protocol Tunneling Overview

Explains Layer 2 Protocol Tunneling (L2PT) for tunneling STP, CDP, and VTP packets across a service provider network.

29.2 Configuring Layer 2 Protocol Tunneling

Guides on configuring Layer 2 protocol tunneling, including destination MAC address and port settings.

PART IV IP Application

Static Route

Covers the configuration of static routes for enabling the switch to communicate with remote management stations.

Differentiated Services

Explains how Differentiated Services (DiffServ) fits into QoS strategy and configures traffic policing.

CHAPTER 30 Static Route

CHAPTER 31 Differentiated Services

CHAPTER 32 DHCP

CHAPTER 33 Maintenance

CHAPTER 34 Access Control

CHAPTER 37 Cluster Management

CHAPTER 40 Configure Clone

CHAPTER 41 Troubleshooting

Related product manuals