EasyManua.ls Logo

ZyXEL Communications XGS-4526 User Manual

ZyXEL Communications XGS-4526
491 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
www.zyxel.com
www.zyxel.com
XGS-4526/4528F/4728F
Intelligent Layer 3+ Switch
Copyright © 2011
ZyXEL Communications Corporation
Firmware Version 4.00
Edition 1, 03/2011
Default Login Details
IP Address http://192.168.0.1
(Out-of-band
MGMT port)
http://192.168.1.1
(In-band ports)
User Name admin
Password 1234

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the ZyXEL Communications XGS-4526 and is the answer not in the manual?

ZyXEL Communications XGS-4526 Specifications

General IconGeneral
BrandZyXEL Communications
ModelXGS-4526
CategorySwitch
LanguageEnglish

Summary

About This User's Guide

Need More Help?

Information on how to get additional support and resources for the switch.

Document Conventions

Syntax Conventions

Explains the conventions used for text, keys, and screen names within the guide.

Safety Warnings

CHAPTER 1 Getting to Know Your Switch

1.1 Introduction

Provides an overview of the switch's features, capabilities, and management options.

1.2 Ways to Manage the Switch

Outlines the different methods available for managing and configuring the switch.

1.3 Good Habits for Managing the Switch

Offers best practices for secure and effective switch management to prevent issues.

CHAPTER 2 Hardware Installation and Connection

2.1 Freestanding Installation

Details the steps for placing the switch on a flat surface and attaching rubber feet for stability.

2.2 Mounting the Switch on a Rack

Provides instructions and precautions for securely installing the switch into a standard equipment rack.

CHAPTER 3 Hardware Overview

3.1 Front Panel Connections

Describes the ports and indicators located on the front panel of the switch for network connectivity.

3.1.3 Mini-GBIC Slots

Explains the function and installation of SFP transceivers for fiber-optic connections.

3.2 Rear Panel

Details the components and connectors found on the rear panel of the switch, including power and management ports.

3.2.5 Power Connector

Covers the procedures for connecting the switch to AC or DC power sources, including safety notes.

3.3 LEDs

Explains the meaning of various LEDs on the switch for status monitoring and troubleshooting.

CHAPTER 4 The Web Configurator

4.1 Introduction

Introduces the HTML-based web configurator for easy switch setup and management via a web browser.

4.2 System Login

Guides users on how to access the web configurator by entering the switch's IP address in a browser.

4.3 The Web Configurator Layout

Provides an overview of the web configurator's interface, including navigation components and quick links.

4.4 Saving Your Configuration

Explains how to save changes to run-time memory and non-volatile memory to preserve settings.

4.6 Resetting the Switch

Details the process for restoring the switch to its factory default settings if configurations are lost or forgotten.

4.7 Logging Out of the Web Configurator

Guides users on how to securely exit the web configurator session.

CHAPTER 5 Initial Setup Example

5.1 Overview

Lists the sequential configuration steps for setting up the switch in an example network environment.

5.1.1 Configuring an IP Interface

Explains how to configure an IP interface or routing domain on the layer-3 switch for network traffic routing.

5.1.2 Configuring DHCP Server Settings

Describes how to set up the switch to assign IP addresses and network information to DHCP clients.

5.1.3 Creating a VLAN

Explains how to create VLANs to partition the physical network into multiple logical networks for isolation.

5.1.4 Setting Port VID

Details how to use PVID to tag incoming untagged frames, directing them to the correct VLAN group.

5.1.5 Enabling RIP

Guides on enabling RIP to exchange routing information with other routers across different routing domains.

CHAPTER 6 Tutorials

Tutorials Overview

Introduces various practical examples of using the web configurator for switch setup and feature utilization.

6.2 How to Use DHCP Relay on the Switch

Explains how to configure the switch to forward DHCP client requests to a specific DHCP server.

6.3 How to Use PPPoE IA on the Switch

Details configuring PPPoE Intermediate Agent to pass subscriber information to a PPPoE server for authentication.

6.4 How to Use Error Disable and Recovery on the Switch

Describes how to configure ports to shut down or discard packets upon detecting errors, with automatic recovery options.

6.5 How to Set Up a Guest VLAN

Guides on creating a guest VLAN for unauthenticated users to access limited network resources, like the internet.

6.6 How to Do Port Isolation in a VLAN

Explains how to prevent communication between specific ports within a VLAN while allowing access to network resources.

6.7 How to Configure Routing Policy

Demonstrates how to configure policy routes to direct traffic based on criteria like DSCP values for special treatment.

CHAPTER 7 System Status and Port Statistics

7.1 Overview

Describes how the web configurator's home screen displays port statistics and links to detailed performance data.

7.2 Port Status Summary

Guides users on how to access the status screen to view port statistics and check link status, speed, and errors.

CHAPTER 8 Basic Setting

8.2 System Information

Details how to check firmware version, monitor switch temperature, fan speeds, and voltage in the System Info screen.

8.3 General Setup

Describes how to configure general settings like system name, location, contact person, and time settings.

8.6 IP Setup

Guides on configuring the default gateway, DNS server, and adding IP domains for switch management.

8.7 Port Setup

Explains how to configure individual switch port settings such as speed, duplex mode, and flow control.

CHAPTER 9 VLAN

9.1 Introduction to IEEE 802.1Q Tagged VLANs

Introduces IEEE 802.1Q VLANs, explaining tagged frames and VLAN ID for network segmentation.

9.5 Static VLAN

Explains how to use static VLANs to control frame forwarding based on VLAN tags or port membership.

9.6 Subnet Based VLANs

Allows grouping traffic into logical VLANs based on the source IP subnet, enabling priority assignment.

9.8 Protocol Based VLANs

Explains how to group traffic into logical VLANs based on the specified protocol, allowing priority assignment.

9.9 Configuring Protocol Based VLAN

Guides on configuring protocol-based VLANs to sort traffic by protocol type for prioritization.

CHAPTER 10 Static MAC Forward Setup

10.1 Overview

Introduces the configuration of forwarding rules based on MAC addresses of devices on the network.

10.2 Configuring Static MAC Forwarding

Explains how to manually enter static MAC addresses to control traffic forwarding and reduce broadcasting.

CHAPTER 11 Static Multicast Forward Setup

11.1 Static Multicast Forwarding Overview

Introduces static multicast forwarding, allowing frames to be sent to members without group joining.

11.2 Configuring Static Multicast Forwarding

Guides on configuring rules to forward specific multicast frames, like streaming or control frames, to designated ports.

CHAPTER 12 Filtering

12.1 Configure a Filtering Rule

Explains how to configure the switch to filter traffic based on source/destination MAC addresses and VLAN group IDs.

CHAPTER 13 Spanning Tree Protocol

13.1 STP/RSTP Overview

Introduces Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) for preventing network loops and providing backup links.

13.3 Spanning Tree Configuration

Guides on activating STP modes like RSTP, MRSTP, or MSTP on the switch.

13.4 Configure Rapid Spanning Tree Protocol

Details the configuration settings for RSTP, including bridge priority, hello time, and max age.

13.5 Rapid Spanning Tree Protocol Status

Explains how to view the status of RSTP configuration, including bridge ID, priorities, and port states.

13.9 Multiple Spanning Tree Protocol Status

Explains how to view the status of MSTP configurations, including CIST and MST region details.

CHAPTER 14 Bandwidth Control

14.1 Bandwidth Control Overview

Introduces bandwidth control, defining maximum allowable bandwidth for incoming and outgoing traffic flows on a port.

14.2 Bandwidth Control Setup

Guides on configuring bandwidth limits, including commit rate and peak rate, for ingress and egress traffic.

CHAPTER 15 Broadcast Storm Control

15.1 Broadcast Storm Control Setup

Explains how to limit broadcast, multicast, and DLF packets per second on ports to prevent network storms.

CHAPTER 16 Mirroring

16.1 Port Mirroring Setup

Details how to configure port mirroring to copy traffic flow to a monitor port for traffic analysis without interference.

CHAPTER 17 Link Aggregation

17.1 Link Aggregation Overview

Introduces link aggregation for logically grouping physical ports into a single higher-capacity link.

17.2 Dynamic Link Aggregation

Explains dynamic link aggregation using LACP according to IEEE 802.3ad standard for managing trunk groups.

17.3 Link Aggregation Status

Describes how to view the status of trunk groups, including group ID, enabled ports, and synchronized ports.

17.4 Link Aggregation Setting

Guides on configuring static link aggregation, including group ID, active status, and traffic distribution criteria.

17.5 Link Aggregation Control Protocol

Details how to enable LACP for dynamic link aggregation, including system priority and timeout settings.

17.6 Static Trunking Example

Provides a practical example of creating a static port trunk group for multiple ports.

CHAPTER 18 Port Authentication

18.1 Port Authentication Overview

Introduces port authentication methods like IEEE 802.1x and MAC authentication for validating client access based on external servers.

18.2 Port Authentication Configuration

Guides on activating port authentication methods and configuring RADIUS server settings.

18.2.1 Activate IEEE 802.1x Security

Details the steps to activate IEEE 802.1x security on the switch and individual ports for authentication.

18.2.2 Guest VLAN

Explains how to configure a guest VLAN for clients that fail 802.1x authentication, providing limited network access.

18.2.3 Activate MAC Authentication

Guides on activating MAC authentication, including prefix, password, and timeout settings for the RADIUS server.

CHAPTER 19 Port Security

19.1 About Port Security

Explains port security features that allow only authorized MAC addresses to pass through a port, enhancing network security.

19.2 Port Security Setup

Details how to enable port security, disable MAC address learning, and configure MAC freeze for enhanced security.

19.3 VLAN MAC Address Limit

Describes how to set MAC address learning limits on a per-port and per-VLAN basis to control device access.

CHAPTER 20 Classifier

20.1 About the Classifier and QoS

Introduces packet classifiers and Quality of Service (QoS) for prioritizing traffic and fine-tuning network performance.

20.2 Configuring the Classifier

Guides on defining classifiers to sort traffic into different flows based on specific criteria like source/destination addresses.

20.3 Viewing and Editing Classifier Configuration

Explains how to view and modify existing classifier configurations and manage rules.

20.4 Classifier Example

Provides a practical example of configuring a classifier to identify traffic based on MAC address and port.

CHAPTER 21 Policy Rule

21.1 Policy Rules Overview

Introduces policy rules that ensure traffic flows receive requested network treatment based on classifier criteria.

21.2 Configuring Policy Rules

Guides on configuring policy rules to define actions for classified traffic flows, overriding default routing behavior.

21.3 Viewing and Editing Policy Configuration

Explains how to view and modify configured policy rules and their associated classifiers.

21.4 Policy Example

Demonstrates configuring a policy to limit bandwidth and discard out-of-profile traffic based on a classifier.

CHAPTER 22 Queuing Method

22.1 Queuing Method Overview

Introduces queuing methods used to manage network congestion by prioritizing outgoing traffic flows.

22.2 Configuring Queuing

Guides on configuring queuing algorithms for outgoing traffic using SPQ, WFQ, or WRR methods.

CHAPTER 23 VLAN Stacking

23.1 VLAN Stacking Overview

Introduces VLAN stacking for distinguishing multiple customer VLANs by adding an outer VLAN tag for service provider management.

23.2 VLAN Stacking Port Roles

Defines the three VLAN stacking port roles: Normal, Access Port, and Tunnel Port, and their configurations.

23.4 Configuring VLAN Stacking

Guides on configuring VLAN stacking settings, including port roles and tagging options for service provider networks.

23.4.1 Port-based Q-in-Q

Explains Port-based Q-in-Q, allowing the switch to treat all frames on a port as same VLAN flows and add a common outer VLAN tag.

23.4.2 Selective Q-in-Q

Describes Selective Q-in-Q, allowing the switch to add different outer VLAN tags based on incoming inner VLAN tags on a port.

CHAPTER 24 Multicast

24.1 Multicast Overview

Introduces IP multicast for distributing data to specific groups of hosts, mentioning IGMP for group membership.

24.3 Multicast Setting

Guides on configuring multicast settings, including IGMP snooping, filtering, and MVR options.

24.4 IGMP Snooping VLAN

Details how to enable IGMP snooping on specific VLANs and configure DHCP relay option 82 information.

24.5 IGMP Filtering Profile

Explains how to create IGMP filtering profiles to specify multicast groups clients can join on a port.

24.7 General MVR Configuration

Guides on creating multicast VLANs and selecting receiver and source ports for MVR configuration.

24.8 MVR Group Configuration

Explains how to configure MVR IP multicast group addresses, including start and end IP addresses.

CHAPTER 25 AAA

25.1 Authentication, Authorization and Accounting (AAA)

Introduces AAA concepts: authentication, authorization, and accounting for user access and activity tracking on the switch.

25.2 AAA Screens

Guides on enabling AAA services by configuring server settings and authentication priorities.

25.2.1 RADIUS Server Setup

Details how to configure RADIUS server settings for authentication and accounting attributes utilized by the switch.

25.2.2 TACACS+ Server Setup

Provides instructions for configuring TACACS+ server settings for authentication and accounting services.

CHAPTER 26 IP Source Guard

26.1 IP Source Guard Overview

Introduces IP source guard, which filters unauthorized DHCP and ARP packets using a binding table with MAC, VLAN, IP, and port information.

26.3 IP Source Guard Static Binding

Guides on managing static bindings for DHCP snooping and ARP inspection, uniquely identified by MAC address and VLAN ID.

26.5 DHCP Snooping Configure

Details how to enable DHCP snooping on the switch, specify the default DHCP server's VLAN, and configure the snooping database.

26.7 ARP Inspection Configure

Covers enabling ARP inspection, configuring filter aging time, and setting global parameters for the ARP inspection log.

CHAPTER 27 Loop Guard

27.1 Loop Guard Overview

Introduces Loop Guard, a feature that shuts down ports detecting looped packets to prevent broadcast storms on network edges.

27.2 Loop Guard Setup

Guides on enabling Loop Guard, noting its incompatibility with STP/RSTP/MSTP on ports.

CHAPTER 28 VLAN Mapping

28.1 VLAN Mapping Overview

Explains VLAN mapping, allowing the switch to map packet VLAN IDs and priorities from private networks to service provider networks.

28.2 Enabling VLAN Mapping

Details the steps to enable the VLAN mapping feature on the switch, allowing translation of VLAN IDs.

28.3 Configuring VLAN Mapping

Guides on enabling and editing VLAN mapping rules, including port, VID, translated VID, and priority settings.

CHAPTER 29 Layer 2 Protocol Tunneling

29.1 Layer 2 Protocol Tunneling Overview

Introduces L2PT for tunneling layer-2 protocols like STP, CDP, and VTP across service provider networks using edge switches.

29.2 Configuring Layer 2 Protocol Tunneling

Provides instructions for configuring Layer 2 Protocol Tunneling, including destination MAC address and port settings for various protocols.

CHAPTER 30 sFlow

30.1 sFlow Overview

Introduces sFlow as a standard technology for monitoring switched networks by sampling traffic data and sending it to a collector.

30.2 sFlow Port Configuration

Guides on configuring sFlow agents on the switch, including sample rate, poll interval, and collector address settings.

CHAPTER 31 PPPoE

31.1 PPPoE Intermediate Agent Overview

Introduces PPPoE Intermediate Agent for adding subscriber line information to PPPoE discovery packets for client identification and authentication.

31.3 PPPoE Intermediate Agent

Details configuring the switch to provide subscriber information to PPPoE termination servers for client identification and authentication.

31.3.1 PPPoE IA Per-Port

Explains how to configure PPPoE IA settings on a per-port basis, specifying trusted/untrusted ports and adding extra information to discovery packets.

31.3.3 PPPoE IA for VLAN

Details how to enable PPPoE Intermediate Agent on a VLAN and append Circuit ID and Remote ID to discovery packets.

CHAPTER 32 Error Disable

32.1 CPU Protection Overview

Introduces CPU protection features to limit control packet rates, enhancing CPU efficiency and preventing DoS attacks.

32.2 Error-Disable Recovery Overview

Explains error-disable recovery, allowing ports to automatically re-enable or resume packet reception after an error condition is resolved.

32.4 CPU Protection Configuration

Details limiting control packet rates (ARP, BPDU, IGMP) on ports to protect CPU efficiency and prevent attacks.

32.5 Error-Disable Detect Configuration

Explains how to configure the switch to detect exceeded rate limits for control packets and take actions like disabling ports or dropping packets.

32.6 Error-Disable Recovery Configuration

Guides on configuring the switch to automatically undo actions after an error condition is resolved, specifying time intervals for recovery.

CHAPTER 33 Private VLAN

33.1 Private VLAN Overview

Introduces Private VLAN for port isolation within a VLAN, specifying promiscuous and isolated ports to control inter-port communication.

33.2 Configuring Private VLAN

Guides on configuring private VLAN rules, including setting active status, name, VLAN ID, and promiscuous ports.

CHAPTER 34 Static Route

34.1 Static Routing Overview

Explains the use of static routes to override default gateway routing for devices not reachable through the default path.

34.2 Configuring Static Routing

Details the process of creating static routes by specifying destination IP, subnet mask, gateway, and metric.

CHAPTER 35 Policy Routing

35.1 Policy Route Overview

Introduces policy routing, which overrides default routing behavior by forwarding packets based on defined policies and classifiers.

35.2 Configuring Policy Routing Profile

Guides on configuring policy routing profiles, which can consist of multiple policy routing rules for traffic management.

35.2.1 Policy Routing Rule Configuration

Explains how to configure a policy route rule, defining matching classifiers and actions to override default routing.

CHAPTER 36 RIP

36.1 RIP Overview

Introduces RIP (Routing Information Protocol) for exchanging routing information between routers, covering direction and version settings.

36.2 Configuring RIP

Guides on enabling RIP on the switch and configuring administrative distance for routes learned via RIP.

CHAPTER 37 OSPF

37.1 OSPF Overview

Introduces OSPF (Open Shortest Path First) as a link-state routing protocol for distributing routing information within an autonomous system.

37.3 OSPF Configuration

Details how to activate OSPF and set general configuration parameters like router ID and administrative distance.

37.4 Configure OSPF Areas

Explains how to configure OSPF areas, including authentication methods and stub area settings.

37.7 OSPF Virtual-Links

Explains how to configure and view virtual link settings for maintaining backbone connectivity between non-backbone areas.

CHAPTER 38 IGMP

38.1 IGMP Overview

Introduces IGMP for managing multicast group membership, covering versions and how IGMP works.

38.2 Port-based IGMP

Explains how the switch sends IGMP Query packets to ports and listens for IGMP Report packets to deliver multicast traffic efficiently.

38.3 Configuring IGMP

Guides on enabling IGMP on the switch, selecting IGMP versions, and configuring unknown multicast frame actions.

CHAPTER 39 DVMRP

39.1 DVMRP Overview

Introduces DVMRP (Distance Vector Multicast Routing Protocol) for routing multicast data within an autonomous system.

39.3 Configuring DVMRP

Guides on configuring DVMRP to act as a multicast router, including settings for active status and threshold.

CHAPTER 40 Differentiated Services

40.1 DiffServ Overview

Introduces DiffServ (Differentiated Services) for prioritizing traffic flows and marking packets with DSCP values for per-hop treatment.

40.2 Two Rate Three Color Marker Traffic Policing

Explains Two Rate Three Color Marker (TRTCM) traffic policing for limiting traffic rates based on CIR and PIR criteria.

40.3 Activating DiffServ

Guides on activating DiffServ to apply marking rules or IEEE 802.1p priority mapping on selected ports.

CHAPTER 41 DHCP

41.1 DHCP Overview

Introduces DHCP for obtaining TCP/IP configuration, allowing the switch to act as a server or relay agent.

41.2 DHCP Status

Guides on viewing DHCP status, including server mode, index, VLAN ID, and IP pool size.

41.4 DHCP Relay

Explains configuring DHCP relay for clients and servers not in the same broadcast domain, including relay agent information.

41.5 Configuring DHCP VLAN Settings

Details configuring DHCP settings on a per-VLAN basis, specifying server or relay functions and IP address pools.

CHAPTER 42 VRRP

42.1 VRRP Overview

Introduces VRRP for creating redundant backup gateways to ensure default gateway availability, preventing single points of failure.

42.3 VRRP Configuration

Details configuring VRRP parameters, including IP interface setup, advertisement interval, priority, and preempt mode.

42.4 VRRP Configuration Examples

Provides examples of configuring VRRP for one subnet and two subnets, setting up master and backup routers.

CHAPTER 43 ARP Learning

43.1 ARP Overview

Introduces ARP (Address Resolution Protocol) for mapping IP addresses to MAC addresses on a local area network.

43.2 Configuring ARP Learning

Guides on configuring ARP learning modes for ports, allowing the switch to update its ARP table with different ARP packet types.

CHAPTER 44 Load Sharing

44.1 Load Sharing Overview

Introduces load sharing and ECMP for forwarding packets through multiple routing paths of equal cost to balance traffic loads.

44.2 Configuring Load Sharing

Details configuring load sharing by selecting criteria like src-ip or src-dst-ip for determining routing paths using hash algorithms.

CHAPTER 45 Maintenance

45.1 The Maintenance Screen

Introduces the Maintenance screen for managing firmware upgrades, configuration files, and system reboot options.

45.2 Load Factory Default

Guides on resetting the switch to its factory default configuration settings, clearing all user-configured information.

45.4 Reboot System

Details how to restart the switch without physically turning off the power, allowing loading of saved configurations.

45.5 Firmware Upgrade

Provides instructions for downloading and uploading new firmware to the switch, emphasizing the importance of using the correct model firmware.

45.6 Restore a Configuration File

Guides on restoring a previously saved configuration file from a computer to the switch.

CHAPTER 46 Access Control

46.1 Access Control Overview

Describes how to control access to the switch via console, Telnet, SSH, FTP, Web, and SNMP sessions.

46.3 About SNMP

Introduces SNMP as a protocol for managing and monitoring network devices, explaining manager/agent components and MIBs.

46.4 Setting Up Login Accounts

Guides on configuring login accounts for administrators and non-administrators to access the switch via web configurator.

46.5 SSH Overview

Introduces SSH as a secure protocol combining authentication and encryption for remote management and file transfer.

46.8 Introduction to HTTPS

Explains HTTPS for secure web configurator access, relying on SSL for data encryption, authentication, and integrity.

46.10 Service Port Access Control

Allows deciding which services to access the switch with, including changing default ports and configuring trusted computers.

46.11 Remote Management

Guides on specifying trusted computer groups for accessing switch services via remote management.

CHAPTER 47 Diagnostic

47.1 Diagnostic

Explains how to use the Diagnostic screen to check system logs, ping IP addresses, and perform port tests.

CHAPTER 48 Syslog

48.1 Syslog Overview

Introduces the syslog protocol for sending event notification messages to syslog servers, covering message format, facility, and severity levels.

48.2 Syslog Setup

Guides on configuring syslog features to send logs to an external syslog server, including logging types and facilities.

48.3 Syslog Server Setup

Details how to configure a list of external syslog servers, specifying IP address, log level, and active status for sending logs.

CHAPTER 49 Cluster Management

49.1 Clustering Management Status Overview

Introduces cluster management for managing multiple switches through a single cluster manager switch.

49.2 Cluster Management Status

Guides on viewing the cluster management status, showing the cluster manager and member switches' status.

49.3 Clustering Management Configuration

Guides on configuring clustering management, setting up the cluster manager switch and identifying potential cluster members.

CHAPTER 50 MAC Table

50.1 MAC Table Overview

Introduces the MAC Table screen, showing how frames are forwarded/filtered and displaying learned MAC addresses (dynamic/static).

50.2 Viewing the MAC Table

Guides on viewing the MAC table to search specific MAC addresses and add dynamic entries to static tables.

CHAPTER 51 IP Table

51.1 IP Table Overview

Introduces the IP Table screen, showing how packets are forwarded/filtered and displaying learned IP addresses (dynamic/static).

51.2 Viewing the IP Table

Guides on viewing the IP table to search specific IP addresses and arrange data by IP, VLAN, or port.

CHAPTER 52 ARP Table

52.1 ARP Table Overview

Introduces the ARP Table for mapping IP addresses to MAC addresses and explaining how ARP works.

52.2 The ARP Table Screen

Guides on viewing the ARP table to map IP-to-MAC addresses and remove specific dynamic ARP entries.

CHAPTER 53 Routing Table

53.1 Overview

Explains that the routing table contains route information to reachable networks and is updated by RIP and other Ethernet devices.

53.2 Viewing the Routing Table Status

Guides on viewing routing table information, including destination, gateway, interface, metric, and type of route.

CHAPTER 54 Configure Clone

54.1 Configure Clone

Explains how to copy port settings from a source port to destination ports for efficient configuration management.

CHAPTER 55 Troubleshooting

55.1 Power, Hardware Connections, and LEDs

Provides troubleshooting steps for issues related to power, hardware connections, and LED indicators on the switch.

55.2 Switch Access and Login

Offers solutions for common access and login problems, including forgotten IP addresses and incorrect credentials.

55.3 Switch Configuration

Addresses issues where configuration settings are lost after restarting the switch, emphasizing the importance of saving configurations.

CHAPTER 56 Product Specifications

Hardware Specifications

Summarizes the physical and electrical specifications of the switch hardware, including dimensions, weight, power, and interfaces.

Firmware Specifications

Lists the key features and specifications of the switch firmware, such as supported protocols and configuration options.

Switching Specifications

Details the switching fabric performance, frame size, supported forwarding frames, and features like STP, QoS, and VLAN capabilities.

Standards Supported

Lists the various industry standards that the switch complies with, covering protocols for security, management, and networking.

APPENDIX A Common Services

Common Services Overview

Provides a table of common network services, their protocols, port numbers, and descriptions for reference.

APPENDIX B Legal Information

Copyright

States the copyright ownership and content usage restrictions for the publication.

Disclaimer

Outlines ZyXEL's liability regarding the use of its products and reserves the right to make product changes without notice.

ZyXEL Limited Warranty

Details the terms of the limited warranty for the product, including coverage, exclusions, and claims process.

Related product manuals