ZyXEL Communications AES-100 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of ZyXEL Communications AES-100, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of ZyXEL Communications AES-100 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of ZyXEL Communications AES-100. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of ZyXEL Communications AES-100 should contain:
- informations concerning technical data of ZyXEL Communications AES-100
- name of the manufacturer and a year of construction of the ZyXEL Communications AES-100 item
- rules of operation, control and maintenance of the ZyXEL Communications AES-100 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of ZyXEL Communications AES-100 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of ZyXEL Communications AES-100, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the ZyXEL Communications service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of ZyXEL Communications AES-100.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the ZyXEL Communications AES-100 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    AES-100 ADSL-Ethernet Switch May 2002 User’s Guide[...]

  • Page 2

    AES-100 User ’s Guide ii Copyright Copyright Copyright © 2002 by ZyXEL Communications Corporation. The contents of this publication may not be repro duced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemi[...]

  • Page 3

    AES-100 User ’s Guide ZyXEL Limited W arranty iii ZyXEL Limited W arranty ZyXEL warrants to the original end user (purchase r) that this product is free from any defects in materials o r workmanship for a period of up to two (2 ) years from t he date of purchase. During the warranty period, and u pon proof of purchase, should the prod uct have in[...]

  • Page 4

    AES-100 User ’s Guide iv Interference Statements and W arnings Interference Statements and Warnings FCC Interference Statement: This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference. (2) This device must accept any inte rference received, includ[...]

  • Page 5

    AES-100 User ’s Guide Customer Support v Customer Support If you have questions about your ZyXEL product or desire assistance, contact ZyXEL Communications Corporation offices worldwide, in one of the following ways: Contacting Customer Support When you contact your customer support represen tative, have the following information ready: ♦ Produ[...]

  • Page 6

    AES-100 User ’s Guide vi T able of Contents T able of Contents Copyright...................................................................................................................... ................................................................. ii ZyXEL Limite d Warranty ................................................................[...]

  • Page 7

    AES-100 User ’s Guide T able of Contents vii 5.1 ADSL Standards .............................................................................................................. .............................. 5-1 5.2 Profiles.................................................................................................................... .........[...]

  • Page 8

    AES-100 User ’s Guide viii T able of Contents Chapter 14 Tr oubleshootin g ...................................................................................................... .......................................... 14-1 14.1 ADSL LED(s) .........................................................................................................[...]

  • Page 9

    AES-100 User ’s Guide List of Figures ix List of Figures Figure 1-1 MTU Applica tion ..................................................................................................... ................................................. 1-3 Figure 1-2 ISP Applica tion................................................................................[...]

  • Page 10

    AES-100 User ’s Guide x List of T ables List of T ables T able 2-1 Front Panel Ports of an ADS L Ne twork Module .......................................................................... .............................. 2-2 T able 2-2 AES-100 Networ k Module LED Descriptions..........................................................................[...]

  • Page 11

    AES-100 User ’s Guide Preface xi Preface Congratulations on your purchase of the AES-100 ADSL-Ethernet Switch. This preface introduces you to the AES-100 and discusses the or ganization and conventions of this user’s guide. It also provides information on other related documentation. About the AES-100 The AES-100 is an ADSL (Asymmetrical Digita[...]

  • Page 12

    [...]

  • Page 13

    AES-100 User ’s Guide Getting to Know the AES-100 1-1 Chapter 1 Getting to Know the AES-100 This chapter describes the key features , benefits and applications of your AES-100. The AES-100 is an ADSL (Asymmetrical Digital Subscriber Line) to Ethernet switch. It aggregates traffic from up to 16 ADSL lines to Ethernet. ADSL allows the coexistence o[...]

  • Page 14

    AES-100 User ’s Guide 1-2 Getting to Know the AES-100 IEEE 802.1Q T agged VLAN Your AES-100 uses the IEEE 802.1Q Tagged VLAN (Virtual Local Area Network) which allows your device to deliver tagged/untagged packets to and from its ports. The AES-100 s upports up to 255 VLANs and the maximum VLAN ID 4094. IEEE 802.1p Priority IEEE 802.1p Priority g[...]

  • Page 15

    AES-100 User ’s Guide Getting to Know the AES-100 1-3 1.2 Benefits 1.2.1 MTU Application The following diagram depicts a typical application of th e AES-100 is in a large residential building, or multiple tenant unit (MTU), that leverages the existing phone line wiring to provide Internet access to all tenants. A tenant connects a computer to the[...]

  • Page 16

    AES-100 User ’s Guide 1-4 Getting to Know the AES-100 1.2.2 ISP Application The AES-100 can also be used by an Internet Service Provider (ISP) as an IP DSLAM. The AES-100 terminates all of the ADSL ATM circuits and converts the traffic to IP p ackets. All IP traffic goes directly to the ISP’s internal Ethernet network, before being routed to th[...]

  • Page 17

    AES-100 User ’s Guide Getting to Know the AES-100 1-5 Dimensions • In mm: 440 (W) x 320 (L) x 66 (H) Weight • 6.84 kg (two network modules loaded) Power Consumption • 80 watts maximum • 100 - 240 VAC, 50/60 Hz Operating Environment • Temperature: 0 - 50°C; Humidity: 5% - 95% Storage Environment • Temperature: -30 - 60°C; Humidity: 2[...]

  • Page 18

    [...]

  • Page 19

    AES-100 User ’s Guide Hardware Overview 2-1 Chapter 2 Hardware Overview This chapter gives a brief introduction to the AES-100 hardware. 2.1 Unpacking the AES-100 Before installing, check to see that all the com ponents of the AES-100 are included in the package. 2.2 Additional Installation Requirements In addition to the contents of the package,[...]

  • Page 20

    AES-100 User ’s Guide 2-2 Hardware Overview Figure 2-1 AES-100 Front Panel 2.3.1 Front Panel Ports The following table describes the ports on the front panel of an AES-100 network module. Table 2-1 Front Panel Ports of an ADSL Network Module PORTS DESCRIPTION LAN The LAN port is a 10/100 Mbps auto-se nsing Ethernet port for connection to a router[...]

  • Page 21

    AES-100 User ’s Guide Hardware Overview 2-3 2.5 ADSL Port Connections The line from the user carries both the ADSL and the voi ce signals. For each line, the AES-100 has a built-in splitter that separates the high frequency ADSL signal from the voice band signal and feeds the ADSL signal to the AES-100, while the voice band signal is diverted to [...]

  • Page 22

    AES-100 User ’s Guide 2-4 Hardware Overview Connect the female end of the power cord to the power receptacle on the rear panel of your AES-100 (just to the right of the warning sticker) as seen next. Connect the othe r end of the cord to a power outlet. Make sure that no objects obstruct the airflow of the fans (located on the side of the unit). [...]

  • Page 23

    AES-100 User ’s Guide Factory Default Settings 3-1 This section describes the factory default settings of the AES-100. 3.1 IP Parameters • IP address = 192.168.1.1 • Subnet mask = 255.255.255.0 • Default gateway = 192.168.1.254 3.2 Console Port • Baud rate = 9600 bps • Data bits = 8 • Parity = none • Stop bit = 1 • Flow control = [...]

  • Page 24

    AES-100 User ’s Guide 3-2 Factory Default Settings • Maximum Downstream Rate: 8160 Kbps for G.dmt, 1536 Kb ps for G.Lite • Operational Mode: auto 3.6 Ethernet Port The factory default settings for the Ethernet port of the AES-100 are: - Auto-negotiation: ON - Speed used with auto-negotiation OFF: 100Mbps - Duplex mode used with auto-negotiati[...]

  • Page 25

    AES-100 User ’s Guide System Commands 4-1 Chapter 4 System Commands This section describes basic configuration and system-related commands. 4.1 Command Line Interface (CI) The AES-100 uses text command lines as the user interface for software configuration. Before discussing the details of configuration, the rul es of the commands are listed next[...]

  • Page 26

    AES-100 User ’s Guide 4-2 System Commands 192.168.1.1 adsl> To get back to the top level prompt from a subsystem, use the home comma nd . The remainder of this user’s guide describes CI Commands th at are helpful for configuring net work modules. 4.3.1 Help Facility The system includes a help facility to provide you with online assistance. ?[...]

  • Page 27

    AES-100 User ’s Guide System Commands 4-3 192.168.1.1> restart This command instructs the system to perform a warm start, that is, restarting the system without turning the power off and on. 4.4.4 Passwd Command Syntax: 192.168.1.1> passwd This command changes the management password. The manage ment password is used for authentication at c[...]

  • Page 28

    AES-100 User ’s Guide 4-4 System Commands 192.168.1.1 sys> set contact [<name>] This command allows you to set the name of the cont act person for your AES-100. The previous setting will be cleared if the command is entered with the name omitted. 4.5.4 Set Location Command Syntax: 192.168.1.1 sys> set location [<name>] This comm[...]

  • Page 29

    AES-100 User ’s Guide System Commands 4-5 192.168.1.1 sys> secured host add <host IP> where <host IP> = IP address of a secured host. This command adds the IP address of a secure d host. You may add up to ten IP addresses. 4.6.3 Secured Host Delete Command Syntax: 192.168.1.1 sys> secured host delete <host IP> where <ho[...]

  • Page 30

    AES-100 User ’s Guide 4-6 System Commands This command sets the syslog facility for the UNIX system. 4.7.3 Syslog Server Command Syntax: 192.168.1.1 sys> syslog server <server IP> where <server IP> = IP address of syslog server. This command sets the UNIX syslog server IP address. If <server IP>=0.0.0.0 (default), then logs w[...]

  • Page 31

    AES-100 User ’s Guide System Commands 4-7 4.8.3 Saving and V iewing a Previous Error Log You may save and view a previous error log after warm restarting the AES-100 (refer to Figure 4-1 ). Figure 4-1 Example: Procedure to Save and View a Previous Error Log 192.168.1.1> sys 192.168.1.1 sys> errlog display 0 Thu Jan 01 00:00:12 SNMPR WARN Co[...]

  • Page 32

    [...]

  • Page 33

    AES-100 User ’s Guide ADSL Configuration 5-1 Chapter 5 ADSL Configuration The ADSL (Asymmetrical Digital Subscriber Line) subsystem allows you to configure and monitor the ADSL ports. 5.1 ADSL Standards The AES-100 supports both the G.lite and the G.dmt standard s. G.lite is intended to minim ize the cost for the consumer market. Table 5-1 Maximu[...]

  • Page 34

    AES-100 User ’s Guide 5-2 ADSL Configuration Note that when you configure an ADSL port, the upstream ra te must be less than or equal to the downstream rate. Note also that the list port command displays the configured parameters of the ADSL port, while the show port command displays the actual rates. 5.4 Default Settings The default profile alwa[...]

  • Page 35

    AES-100 User ’s Guide ADSL Configuration 5-3 5.5 ADSL Commands 5.5.1 Config Save Command Syntax: 192.168.1.1 adsl> config save The config save command saves the ADSL configuration into nonvolatile memory. 5.5.2 Disable Port Command Syntax: 192.168.1.1 adsl> disable port <port number> where <port number> = port number, from 1 to [...]

  • Page 36

    AES-100 User ’s Guide 5-4 ADSL Configuration 192.168.1.1 adsl> enable ports The enable ports command forcibly enables all ADSL ports. The factory default of all ports is disabled. A po rt must be enabled before data transmission can occ ur. An enabled but disconnected ADSL po rt generates more heat than an op erating port. To minimize heat gen[...]

  • Page 37

    AES-100 User ’s Guide ADSL Configuration 5-5 Current Operating Modes: Data Mode: ATM Service Type in operation: G.DMT Number of Channels (Down/up stream): 1/1 Downstream Framing Structure : 3 Active down/up stream rate option : 1/1 TRELLIS operation mode is : ON Current Connection detail: Down/up stream interleaved Delay : 4/ 4 ms Downstream Pari[...]

  • Page 38

    AES-100 User ’s Guide 5-6 ADSL Configuration nsec-ds/nsec-us : 2060/2060 n-eb-ds/n-eb-us : 0/0 n-bbe-ds/n-bbe-us : 0/0 n-es-ds/n-es-us : 0/0 n-ses-ds/n-ses-us : 0/0 non-ses-blks-ds/non-ses-blks-us : 120878/120878 n-uas-ds/n-uas-us : 0/0 fe_loss_seconds/ne_loss_seconds : 0/0 fe_fec_seconds/ne_fec_seconds : 0/0 fast_trains : 0 fast_trains_fail : 0 [...]

  • Page 39

    AES-100 User ’s Guide ADSL Configuration 5-7 5.5.10 List Port Command Syntax: 192.168.1.1 adsl> list port <port number> where <port number> = port number, from 1 to 8 The list port command shows the configured maximum upstream /downstream rates, the mode (or standard), and enable/disable state of an individual ADSL port. 5.5.11 Lis[...]

  • Page 40

    AES-100 User ’s Guide 5-8 ADSL Configuration Even though you can specify arbitrary numbers in the set profile com mand, the actual rate is always a multiple of 32 Kbps. If you enter a rate that is not a multiple of 32 Kbps, the actual rate will be the next lower m ultiple of 32Kbps. For instance, if you specify 60 Kbps for a port, th e actual rat[...]

  • Page 41

    AES-100 User ’s Guide ADSL Configuration 5-9 192.168.1.1 adsl> show profile <name> where <name> = a profile name The show profile command displays the settings of an ADSL profile. An example is shown next. 192.168.1.1 adsl> show profile debug #Entry type : adslLineConfProfileEntry ConfProfileName : debug AtucConfTargetSnrMgn : 6[...]

  • Page 42

    AES-100 User ’s Guide 5-10 ADSL Configuration The mode parameter specifies the standa rd that this port is allowed. When set to auto, the AES-100 follows whatever mode is set on the other end of the line. When the mode is set to auto and the negotiated mode is G.lite, if the configured ra tes exceed those allowed by G.lite, the actual rates are g[...]

  • Page 43

    AES-100 User ’s Guide ADSL Configuration 5-1 1 5.5.21 Set PVC Command Syntax: 192.168.1.1 adsl> set pvc <port number> <multiplexing mode> <tx vpi> <tx vci> [<rx vpi> <rx vci>] where <port number> = port number, from 1 to 8. <multiplexing mode> = either “llc” or “vc" <tx vpi> = th[...]

  • Page 44

    AES-100 User ’s Guide 5-12 ADSL Configuration 5.5.24 Show PVCs command Syntax: 192.168.1.1 adsl> show pvcs The show pvcs command allows you to display the PVC parameters of all ADSL ports.[...]

  • Page 45

    AES-100 User ’s Guide 10/100M Fast Ethernet Port Commands 6-1 Chapter 6 10/100M Fast Ethernet Port Commands The Ethernet subsystem allows you to configure and m onitor the 10/100M fast Ethernet port. 6.1 10/100M Auto-Sensing Ethernet The AES-100 supports 10/100Mbps auto-sensing Ethernet. There are two factors related to the connection of two Ethe[...]

  • Page 46

    AES-100 User ’s Guide 6-2 10/100M Fast Ethernet Port Commands <speed> = 10 or 100 This command sets the connection speed used when auto-negotiation is turned off. 10 stands for 1 0Mbps and 100 stands for 100Mbps. 6.2.4 Status Command Syntax: 192.168.1.1 ethernet> status This command shows the current status of the Ethernet port.[...]

  • Page 47

    AES-100 User ’s Guide Bridge Commands 7-1 Chapter 7 Bridge Commands This chapter discusses the bridge subsystem . It allows you to configure and monitor the bridging, configure MAC filters, port-based VLANs and tagged frame functions of the AES-100. The AES-100 supports IEEE 802.1D transparent bridging; but not the static filtering feature or spa[...]

  • Page 48

    AES-100 User ’s Guide 7-2 Bridge Commands 7.3 MACfilter Commands Use MACfilter commands to filter incoming packets based on MAC (Media Access Control) address(es) that you specify. If you do not use this command, your AES-100 will not filter packets. MACfilter commands are listed next. You may specify up to five MAC addresses per port. 7.3.1 MACf[...]

  • Page 49

    AES-100 User ’s Guide Bridge Commands 7-3 7.3.5 Macfilter Delete Command Syntax: 192.168.1.1 bridge> macfilter delete <port> <mac> where <port> = a bridge port number. <mac> = the source MAC address in "00:a0:c5:12:34:56" form at. This command removes a configured source MAC address from a port specified by yo[...]

  • Page 50

    AES-100 User ’s Guide 7-4 Bridge Commands 0 1 2 3 4 5 239.255.255.250 224.000.001.022 235.001.001.006 229.055.150.208 224.000.001.060 235.209.237.084 7f-ff-fa 00-01-16 01-01-06 37-96-d0 00-01-3c 51-ed-54 1, 2 1, 3, 4 1, 2, 5, 7,8 1, 9 1, 3, 5, 6 1, 4, 6, 9 Total 6 entries. IGMP version 2 Query Received 343 Max Response Time 100 * 1/10 seconds Que[...]

  • Page 51

    AES-100 User ’s Guide Bridge Commands 7-5 This command flushes out the filtering datab ase of the specified bridge port. If the <port> field is omitted, this command will flush out the filte ring databases of all ports. 7.4.6 Info Command Syntax: 192.168.1.1 bridge> info This command shows the software number of the bridge implem entatio[...]

  • Page 52

    AES-100 User ’s Guide 7-6 Bridge Commands Figure 7-1 Default VLAN Settings 7.5.1 Portfilter Command Syntax: 192.168.1.1 bridge> portfilter <source port> [all|<dest ports>] where <source port> = an incoming bridge port num ber. all = all bridge ports are allowed outgoing ports. <dest ports> = the outgoing bridge ports. S[...]

  • Page 53

    AES-100 User ’s Guide Bridge Commands 7-7 This exa m ple sets the allowed outgoi n g br i dge po r ts of port 2 (ADSL port 1) to port 1 (Ethernet p o rt) and port 3 (ADSL port 2). The allowed outgoing bridge ports of port 3 (ADSL port 2) are set to port 1 (Ethernet port) and port 2 (ADSL por t 1 ). This w a y ADSL ports 2 a n d 3 can communicate [...]

  • Page 54

    AES-100 User ’s Guide 7-8 Bridge Commands Figure 7-3 Example of Modified VLAN Port 3 The following figure illustrates that port 1 (the Ethernet port) is linked to ports 2 (ADSL port 1) and 3 (ADSL port 2). Ports 2 (ADSL port1) and 3 (ADSL port 2) are also linked to each other. Or, in other words, the following figure is a result of the following [...]

  • Page 55

    AES-100 User ’s Guide Bridge Commands 7-9 This command lets you allocate IEEE 802.1Q identification numbers (tags) on a port-by-port basis. The command 192.168.1.1 bridge> pvid displays the default port identification of all ADSL Networking Module ports. The IEEE 802.1Q standard uses an explic it tag in the header to specify the VLAN ID (VID) [...]

  • Page 56

    [...]

  • Page 57

    AES-100 User ’s Guide IEEE 802.1Q T agged VLAN Commands 8-1 Chapter 8 IEEE 802.1Q T agged VLAN Commands This chapter generally describes the IEEE 802.1Q Tagged VLAN and associated CI Commands. 8.1 Introduction The IEEE 802.1Q Tagged VLAN allows your ADSL Networki ng Module to deliver tagge d/untagged frames to and from its ports. The standard giv[...]

  • Page 58

    AES-100 User ’s Guide 8-2 IEEE 802.1QT agged VLAN Commands 8.4.2 Dynamic Entries (DVLAN T able) Dynamic entries are learned by the bridge and cannot be cr eated or updated by management. The bridge learns this information by observing what port, source address and VLAN ID (or VID) is associated with a frame. Entries are added and deleted using GA[...]

  • Page 59

    AES-100 User ’s Guide IEEE 802.1Q T agged VLAN Commands 8-3 Figure 8-1 Example: PVID Command Display 8.5.4 SVLAN CPU Command Syntax: 192.168.1.1 vlan1q> svlan cpu [<vid>] where <vid> = VLAN ID. Valid parameter range = [1 – 4094]. This command registers your CPU as a port member of the static VLAN with < vid >. To displa y t[...]

  • Page 60

    AES-100 User ’s Guide 8-4 IEEE 802.1QT agged VLAN Commands 8.5.6 SVLAN Setentry Command Syntax: 192.168.1.1 vlan1q> svlan setentry <vid> <port#> <ad_control> <tag_control> where <vid> = VLAN ID. Valid parameter range = [1 – 4094]. <port#> = bridge port number. Valid parameter range = [1 – 9]. <ad_cont[...]

  • Page 61

    AES-100 User ’s Guide IEEE 802.1Q T agged VLAN Commands 8-5 Forwarding Process Example The switch uses the SVLAN in making frame-forwarding decisions. First the switch checks the MAC address in a fra mes header against the MAC filtering database. Next the switch checks the VLAN ID (VID) of tagged fra mes or assigns temporary VIDs to untagged fram[...]

  • Page 62

    AES-100 User ’s Guide 8-6 IEEE 802.1QT agged VLAN Commands The switch sees that port #s 2, 3, 4, 6, 8 and 9 (ADSL ports 1, 2, 3, 5, 7 and 9) are all set to “fixed” and “untag” which means the SVLAN allows the frame to be sent to those ports without a tag. Port # 5 is “forbidden” so the frame is not forwarded to adsl port # 4. Port # 7[...]

  • Page 63

    AES-100 User ’s Guide IEEE 802.1Q T agged VLAN Commands 8-7 8.5.9 DVLAN List Command Syntax: 192.168.1.1 vlan1q> dvlan list This command displays the dynamic VLAN registration tabl e. The following figure is an example of what is displayed when you use this command. Figure 8-6 Example: DVLAN List Command Display In the figure above, “ || ”[...]

  • Page 64

    AES-100 User ’s Guide 8-8 IEEE 802.1QT agged VLAN Commands Figure 8-8 Example: VLAN List Command Display In the figure above “ O " denotes “egr ess port”, “ V ” denotes “tagged” and “ X ” denot es “ untagg ed”. vid 01 02 03 04 05 06 07 08 09 ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- 1O O O O VXXXXXXXX 2OO XXXXXX[...]

  • Page 65

    AES-100 User ’s Guide IEEE 802.1p Priority Commands 9-1 Chapter 9 IEEE 802.1p Priority Commands This chapter explains IEEE 802.1p Priority CI Commands. 9.1 Introduction IEEE 802.1p Priority CI Commands provide priority re generation f or ports. IEEE 802.1p defines up to eight priorities (0-7) by inserting a tag into a MAC-layer frame that contain[...]

  • Page 66

    AES-100 User ’s Guide 9-2 IEEE 802.1p Priority Commands This command sets the mapping of incoming user priority to a regenerated user priority for an ingress port. To display the regeneration table, simply use the Regen Port command without parameters, as shown next. 192.168.1.1 vlan1q> regen port[...]

  • Page 67

    AES-100 User ’s Guide IP Commands 10-1 Chapter 10 IP Commands This chapter shows you how to configure the IP (Internet Protocol) param eters. The IP host implementation in the AES-100 allows you to manage it over the network. More often than not, you have more than one AES-100 for a particular installation. Before you start configuring the AES-10[...]

  • Page 68

    AES-100 User ’s Guide 10-2 IP Commands For example, if you want the AES-100 to have 172.21 .100.1 as the IP address, 255.255.255.0 for the subnet mask and 172.21.100.254 for t he default gateway, you may use the following command sequence: 192.168.1.1> ip 192.168.1.1 ip> device delete ether 192.168.1.1 ip> device add ether ether //bridge[...]

  • Page 69

    AES-100 User ’s Guide IP Commands 10-3 192.168.1.1> ping <host> [<ttl> [<size>]] where host = the IP address of the target. ttl = Time to Live (optional). This parameter limits the num ber of hops (routers) that the echo request can travel before it reaches the target. size = The parameter specifies the size of the payload, t[...]

  • Page 70

    [...]

  • Page 71

    AES-100 User ’s Guide Remote Management 11 - 1 Chapter 11 Remote Management This chapter shows you how to manage the AES-100 remotely. More often than not, you will have the AES-100 located remotely making its remote management features very useful. 11.1 Management by T elnet After you have set up the IP parameters and connected the AES-100 to th[...]

  • Page 72

    AES-100 User ’s Guide 11 - 2 Remote Management An agent is a management software module that resid es in a managed device (the AES-100). An agent translates the local management information from the managed devi ce into a form compatible with SNMP. The manager is the station through which network administrators perform network management function[...]

  • Page 73

    AES-100 User ’s Guide Remote Management 11 - 3 This command allows read-only or read-write access. If the IP address is specified, access is allowed for the manager station with that address only. 11.3.2 SNMP Access Delete Command Syntax: 192.168.1.1 snmp> access delete <community> [<IP addr>] This command revokes SNMP access by th[...]

  • Page 74

    AES-100 User ’s Guide 11 - 4 Remote Management ♦ overheatOver Trap (defined in ZYXEL-MIB) : This trap is sent periodically when the AD SL Networking Module is no longer overheated. 11.4.2 T rap Add Command Syntax: 192.168.1.1 snmp> trap add <community> <IP addr> [<port>] where <community> = The password used by the AD[...]

  • Page 75

    AES-100 User ’s Guide Configuration Backup/Restore 12-1 Chapter 12 Configuration Backup/Restore This chapter describes the process for backing up your user settings (configuration) from the ADSL Networking Module onto your computer and how to restore them to the ADSL Networking Module. The ADSL Networking Module uses FTP for configuration backup/[...]

  • Page 76

    AES-100 User ’s Guide 12-2 Configuration Backup/Restore Do not turn off the ADSL Net working Module during the restore process, as it may corrupt the firmware and make your ADSL Net working Module unusable. Step 1. Connect to the ADSL Networking Module with your favorite FTP client. The comm and is generally C:> ftp <ADSL Networking Module[...]

  • Page 77

    AES-100 User ’s Guide Firmware Upload and Recovery 13-1 Chapter 13 Firmware Upload and Recovery ZyXEL periodically releases new firmware for the ADSL Networking Module for bug fixes and enhancements. Please check the web site at www.zyxel.com every now and then for the latest firmware release. The ADSL Networking Module uses FTP to upload firmwa [...]

  • Page 78

    AES-100 User ’s Guide 13-2 Firmware Upload and Recovery 3. Enter the management password (1234 by default). For example, Password: 1234 230 Logged in 4. Transfer the firmware file to the ADSL Networking Module. For example, ftp> put 201AS0b1.img image where 201AS0b1.img = The firmware file that you want to upload. image = The internal firmware[...]

  • Page 79

    AES-100 User ’s Guide Firmware Upload and Recovery 13-3 Figure 13-1 BOOTP/TFTP Server 5. The Input Box window will pop up as shown next. Type the MAC address of the ADSL Networking Module and then click OK . You can find the MAC address of the ADSL Networking Module on its boot console. Figure 13-2 Input MAC 6. Type the host IP address (the IP ad[...]

  • Page 80

    AES-100 User ’s Guide 13-4 Firmware Upload and Recovery Figure 13-3 Database Edit Dialog 7. Select Normal Bootp to enable normal BOOTP/TFTP functions. Figure 13-4 Enable BOOTP/TFTP 8. Restart the ADSL Networking Module and press any key within three seconds to get the following screen. Figure 13-5 Enter Debug Mode 9. Press any key at the “ Pres[...]

  • Page 81

    AES-100 User ’s Guide Firmware Upload and Recovery 13-5 11. Wait for the firmware upload to finish. 12. Use the following command sequence on the ADSL Networking Module to write new firmware to flas h memor y. 192.168.1.1> flashfs 192.168.1.1 flashfs> wipe 192.168.1.1 flashfs> update 13. Wait for the update to complete and then restart t[...]

  • Page 82

    [...]

  • Page 83

    AES-100 User ’s Guide T roubleshooting 14-1 Chapter 14 T roubleshooting This chapter covers potential problems and possible remedies. After each problem description, some steps are provided to help you to diagnose and to solve the problem. 14.1 ADSL LED(s) An ADSL LED is not on. Table 14-1 Troubleshooting the ADSL LED(s) STEPS CORRECTIVE ACTION 1[...]

  • Page 84

    AES-100 User ’s Guide 14-2 T roubleshooting 14.3 ADSL LED(s) turn On and Of f An ADSL LED turns on and off intermittently. Table 14-3 Troubleshooting a Non-Constant ADSL LED STEPS CORRECTIVE ACTION 1 Unplug the phone wire coming from the USER port of the AES-100 and connect t he user’s ADSL modem or router directly to the USER port of the AES-1[...]

  • Page 85

    AES-100 User ’s Guide T roubleshooting 14-3 14.6 Password I forgot the password to my AES-100. Table 14-6 Troubleshooting the Password OPTIONS CORRECTIVE ACTION 1 Send a screen shot of your AES-100’s MA C address to your local distributor. 2 Refer to the BOOTP/TFTP Firmware Update section to update your firm ware. All settings will return to de[...]

  • Page 86

    AES-100 User ’s Guide 14-4 T roubleshooting 14.9 T elnet I can not telnet into the AES-100. Table 14-9 Troubleshooting Telnet STEPS CORRECTIVE ACTION 1 Make sure that a telnet session is not already ope rating. The AES-100 will only ac cept one telnet session at a time. 2 Ping the AES-100 from your computer. If you are able to ping the AES-100 bu[...]

  • Page 87

    AES-100 User ’s Guide Index A Index 1 10/100M Auto-Sensing Ethernet............................ 6-1 A AC INPUT ............................................................. 2-4 Access Delete Command ..................................... 11-3 Access Flush Command ....................................... 11-3 Access List Command ....................[...]

  • Page 88

    AES-100 User ’s Guide B Index FCC .......................................................................... iv FCC Rules ................................................................ iv Federal Communications Commission (FCC) Interference Statement .......................................... iv Filter Command ..................................[...]

  • Page 89

    AES-100 User ’s Guide Index C Enable ................................................................. 7-2 Filter ................................................................... 7-2 Status .................................................................. 7-2 Management ........................................................... 1-2 Managemen[...]

  • Page 90

    AES-100 User ’s Guide D Index Splitters Integrated Splitters .............................................. 1-1 Statistics Command .............................................. 10-3 Status Command............................................. 6-2, 7-1 Storage Environment .............................................. 1-5 Supported Traps .........[...]