background image

 
 
2  Hardware Installation  

DES-1210 Series Switch Web UI Reference Guide

 

Then, use the screws provided with the equipment rack to mount the switch in the rack. 

 

Figure 2.3 – Mount the Switch in the rack or chassis 

 
Please be aware of following safety Instructions when installing: 
 
A) Elevated Operating Ambient - If installed in a closed or multi-unit rack assembly, the operating ambient 

temperature of the rack environment may be greater than room ambient. Therefore, consideration should be 

given to installing the equipment in an environment compatible with the maximum ambient temperature (Tma) 

specified by the manufacturer. 
 
B) Reduced Air Flow -  Installation of the equipment in a rack should be such that the amount of air flow 

required for safe operation of the equipment is not compromised. 
 
C) Mechanical Loading - Mounting of the equipment in the rack should be such that a hazardous condition is 

not achieved due to uneven mechanical loading. 
 
D) Circuit Overloading -  Consideration should be given to the connection of the equipment to the supply 

circuit and the effect that overloading of the circuits might have on overcurrent protection and supply wiring. 

Appropriate consideration of equipment nameplate ratings should be used when addressing this concern. 
 
E) Reliable Earthing -  Reliable earthing of  rack-mounted equipment should be maintained. Particular 

attention should be given to supply connections other than direct connections to the branch circuit (e.g. use 

of power strips)." 
 
 

Step 3 – Plugging in the AC Power Cord with Power Cord Clip 

To prevent accidental removal of the AC power cord, it is recommended to install the power cord clip 

together with the power cord. 
 
A) With the rough side facing down, insert the Tie Wrap into the hole below the power socket. 

Summary of Contents for DES-1210-08P

Page 1: ......

Page 2: ... or Shelf Installation 7 Rack Installation 7 Step 3 Plugging in the AC Power Cord with Power Cord Clip 8 Power Failure 11 3 Getting Started 12 Management Options 12 Using Web based Management 12 Supported Web Browsers 12 Connecting to the Switch 12 Login Web based Management 12 Smart Wizard 13 Web based Management 13 D Link Network Assistant DNA 13 4 Configuration 15 Smart Wizard Configuration 15 ...

Page 3: ...LAN Voice VLAN Global Settings 34 VLAN Voice VLAN Voice VLAN Port Setting 36 VLAN Voice VLAN Voice Device List 36 VLAN Auto Surveillance VLAN 36 L2 Functions Jumbo Frame 37 L2 Functions Port Mirroring 38 L2 Functions Loopback Detection 38 L2 Functions MAC Address Table Static MAC 39 L2 Functions MAC Address Table Dynamic Forwarding Table 40 L2 Functions Spanning Tree STP Global Settings 40 L2 Func...

Page 4: ...ng 62 Security Smart Binding White List 62 Security Smart Binding Black List 63 AAA RADIUS Server 63 AAA 802 1X 802 1X Global Settings 64 AAA 802 1X 802 1X Port Settings 64 AAA 802 1X 802 1X User 65 ACL ACL Wizard 66 ACL ACL Access List 73 ACL ACL Access Group 74 ACL ACL Hardware Resource Status 75 PoE PoE Global Settings DES 1210 08P 28P only 75 PoE PoE Port Settings DES 1210 08P 28P only 75 SNMP...

Page 5: ...A Ethernet Technology 90 Gigabit Ethernet Technology 90 Fast Ethernet Technology 90 Switching Technology 90 Appendix B Technical Specifications 91 Hardware Specifications 91 Key Components Performance 91 Port Functions 91 Physical Environment 91 Emission EMI Certifications 91 Safety Certifications 91 Features 91 L2 Features 91 VLAN 92 ACL 92 QoS Quality of Service 92 AAA 92 Security 92 OAM 92 Mana...

Page 6: ...ettings Terms Usage In this guide the term Switch first letter capitalized refers to the Smart Switch and switch first letter lower case refers to other Ethernet switches Some technologies refer to terms switch bridge and switching hubs interchangeably and both are commonly accepted for Ethernet switches A NOTE indicates important information that helps a better use of the device A CAUTION indicat...

Page 7: ...tches for a more efficient use of shared resources such as server or gateway devices Network Security D Link s innovative Safeguard Engine function protects the switches against traffic flooding caused by virus attacks Additional feature like 802 1X port based authentication provides access control of the network with external RADIUS servers ACL is a powerful tool to screen unwanted IP or MAC traf...

Page 8: ...he Link Act Speed LED flashes which indicates a network link through the corresponding port Blinking indicates that the Switch is either sending or receiving data to the port When a port has amber light indicates that port is running on 10M When it has a green light it is running on 100M NOTE The installation instructions clearly state that the ITE is to be connected only to PoE networks without r...

Page 9: ...er The power port is where to connect the AC power cord DES 1210 28P 24 Port 10 100Mbps PoE ports plus 2 1000Base T ports and 2 combo SFP 1000Base T ports Web Smart Switch Front Panel Figure 1 1 DES 1210 28P Front Panel Power LED The Power LED lights up when the Switch is connected to a power source Pwr Max The Pwr Max LED lights up when the Switch reaches the maximum power budget defined by the a...

Page 10: ...ower LED lights up when the Switch is connected to a power source Reset Press the reset button to reset the Switch back to the default settings All previous changes will be lost Port Link Act Speed LED 1 48 The Link Act Speed LED flashes which indicates a network link through the corresponding port Blinking indicates that the Switch is either sending or receiving data to the port When a port has a...

Page 11: ...1 Product Introduction DES 1210 Series Switch Web UI Reference Guide Class I 3 3Vdc Rear Panel Figure 1 4 DES 1210 52 Rear Panel Power Connect the supplied AC power cable to this port 6 ...

Page 12: ...tion For safe switch installation and operation it is recommended that you Visually inspect the power cord to see that it is secured fully to the AC power connector Make sure that there is proper heat dissipation and adequate ventilation around the switch Do not place heavy objects on the switch Desktop or Shelf Installation When installing the switch on a desktop or shelf the rubber feet included...

Page 13: ...promised C Mechanical Loading Mounting of the equipment in the rack should be such that a hazardous condition is not achieved due to uneven mechanical loading D Circuit Overloading Consideration should be given to the connection of the equipment to the supply circuit and the effect that overloading of the circuits might have on overcurrent protection and supply wiring Appropriate consideration of ...

Page 14: ...Figure2 1 Insert Tie Wrap to the Switch B Plug the AC power cord into the power socket of the Switch Figure 2 2 Connect the power cord to the Switch C Slide the Retainer through the Tie Wrap until the end of the cord Figure 2 3 Slide the Retainer through the Tie Wrap 9 9 ...

Page 15: ... the power cord and into the locker of the Retainer Figure 2 4 Circle around the power cord E Fasten the tie of the Retainer until the power cord is secured Figure 2 5 Secure the power cord F Users may now connect the AC power cord to an electrical outlet preferably one that is grounded and surge protected 10 ...

Page 16: ...S 1210 Series Switch Web UI Reference Guide Figure 2 6 Plugging the switch into an outlet Power Failure As a precaution the switch should be unplugged in case of power failure When power is resumed plug the switch back in 1 11 1 ...

Page 17: ...he Web based Management and the SmartConsole Utility Using Web based Management After a successful physical installation you can configure the Switch monitor the network status and display statistics using a web browser Supported Web Browsers The embedded Web based Management currently supports the following web browsers Web Browser via IE8 IE9 Firefox Chrome and Safari Connecting to the Switch Yo...

Page 18: ...ge is English Figure 3 3 Logon Dialog Box Smart Wizard After a successful login the Smart Wizard will guide you through essential settings of the D Link Web Smart Switch Please refer to Smart Wizard Configuration section for details Web based Management By clicking the Exit button in Smart Wizard you will enter the Web based Management interface Please refer to Chapter 4 Configuration for detailed...

Page 19: ...3 Getting Started DES 1210 Series Switch Web UI Reference Guide For detailed explanations of the DNA functions please refer to D Link Network Assistant DNA User Guide 14 ...

Page 20: ... Information access password and SNMP Select Static DHCP or BOOTP and enter the desired new IP Address select the Netmask and enter the Gateway address then click the Next button to enter the next Password setting page No need to enter IP Address Netmask and Gateway if DHCP and BOOTP are selected The Smart Wizard is for the quick setting in IPv4 environment For IPv6 network please go to System IPv...

Page 21: ... The default SNMP Setting is Disabled Click Enabled and then click Apply to make it effective 4 3 SNMP Setting in Smart Wizard NOTE Changing the system IP address will disconnect you from the current connection Please enter the correct IP address in the Web browser again and make sure your PC is in the same subnet with the switch See Login Web based Management for a detailed description 16 ...

Page 22: ...ike firmware and configuration management By choosing different functions in the Function Tree you can change all the settings in the Main Configuration Screen The main configuration screen will show the current status of your Switch by clicking the model name on top of the function tree At the upper right corner of the screen the username and current IP address will be displayed Under the usernam...

Page 23: ...the log file by using text editor e g Notepad Figure 4 8 Save Log Tool Bar Tool Menu The Tool Menu offers global function controls such as Reset Reset System Reboot Device Configuration Backup and Restore Firmware Backup and Upgrade Figure 4 9 Tool Menu Reset Provide a safe reset option for the Switch All configuration settings in non volatile RAM will be reset to factory default except for the IP...

Page 24: ...isk Click Browse to browse your inventories for a saved backup settings file Click Restore after selecting the backup settings file you want to restore TFTP TFTP Trivial File Transfer Protocol is a file transfer protocol that allows you to transfer files to a remote TFTP server Select IPv4 or IPv6 and specify TFTP Server IP Address and File Name for the configuration file you want to save to resto...

Page 25: ... to save to restore from Click Backup to save the firmware to the TFTP server Click Upgrade after selecting the firmware file you want to restore CAUTION Do not disconnect the PC or remove the power cord from device until upgrade complete Switch may crash if Firmware upgrade incompletely Tool Bar Smart Wizard By clicking the Smart Wizard button you can return to the Smart Wizard if you wish to mak...

Page 26: ...Guide Micro Site Function Tree All configuration options on the switch are accessed through the Setup menu on the left side of the screen Click on the setup item that you want to configure The following sections provide more detailed description of each feature and function 2 21 1 ...

Page 27: ...Control Click Setting to link to Security Storm Control Default is disabled DHCP Client Click Setting to link to System System Setting Default is disabled Jumbo Frame Click Setting to link to L2 Functions Jumbo Frame Default is disabled SNMP Status Click Setting to link to SNMP SNMP SNMP Global Setting Default is disabled 802 1X Status Click Setting to link to AAA 802 1X 802 1X Settings Default is...

Page 28: ...ss is 10 90 90 90 and subnet mask is 255 0 0 0 System Information By entering a System Name and System Location the device can more easily be recognized from other Web Smart devices on the LAN Login Timeout The Login Timeout controls the idle time out period for security purposes when there is no action for a specific time span in the Web based Management If the current session times out expires t...

Page 29: ...ings IP Interface Specify the IP interface which to be created Default Gateway The corresponding IPv6 address for the next hop Gateway address in IPv6 format Metric Represents the metric value of the IP interface entered into the table This field may read a number between 1 and 65535 Click Create to accept the changes made and click the Delete button to remove the entry System IPv6 Neighbor Settin...

Page 30: ...to change the login password of the device Figure 4 23 System Password To set the Password set the following parameters and click Apply Old Password If a password was previously configured for this entry enter it here in order to change it to a new password New Password Enter the new password that you wish to set on the Switch to authenticate users attempting to access Administrator Level privileg...

Page 31: ... to make sure the Tx Rx pairs match up properly When connecting the Switch to other networking devices a crossover cable must be used This switch provides configurable MDI MDIX function for users The switches can set as an MDI port in order to connect to other hubs or switches without an Ethernet crossover cable Auto MDI MDIX is designed on the switch to detect if the connection is backwards and a...

Page 32: ...t If a non zero value is entered the Switch will use that value along with the hop count to determine whether to forward a given BOOTP or DHCP packet DHCP Relay Agent Information Option 82 State This field can be toggled between Enabled and Disabled using the pull down menu It is used to enable or disable the DHCP Agent Information Option 82 on the Switch The default is Disabled Enabled When this ...

Page 33: ...e DHCP client DHCP Relay Agent Information Option 82 Remote ID This field can be toggled between Default and User Define NOTE If the Switch receives a packet that contains the option 82 field from a DHCP client and the information checking feature is enabled the switch drops the packet because it is invalid However in some instances you might configure a client with the option 82 field In this sit...

Page 34: ... Relay VID List Displays the list of VLANs on which DHCP Local Relay has been defined Click Apply to implement changes made System DHCPv6 Relay Settings The DHCPv6 Relay Settings page allows user to configure the DHCPv6 settings Figure 4 30 System DHCPv6 Relay Settings DHCPv6 Relay Status Specifies whether DHCPv6 Relay is enabled on the device Enabled Enables DHCPv6 Relay on the device Disabled Di...

Page 35: ...election are selected automatically The possible levels are Warning The lowest level of a device warning The device is functioning but an operational problem has occurred Informational Provides device information All Displays all levels of system logs Facility Specifies an application from which system logs are sent to the remote server Only one facility can be assigned to a single server If a sec...

Page 36: ...ct Port Standby The system changes to standby state and wait for a wake up event Each port on the system enters sleep state by schedule System Hibernation In this mode switches get most power saving figures since main chipsets both MAC and PHY are disabled for all ports and energy required to power the CPU is minimal State Specifies the power saving state to be Enabled or Disabled Time Profile 1 S...

Page 37: ...w below steps and check again 1 Upgrade drivers of your Ethernet adapter or LAN controller for the host PC 2 Disable EEE function on the switch port System D Link Discover Protocol Settings For the D Link Discovery Protocol DDP supported device this page is an option for you to disable DDP or configure the DDP packet report timer Figure 4 35 System D Link Discover Protocol Settings D Link Discover...

Page 38: ...the firewall Figure 4 36 VLAN 802 1Q VLAN Asymmetric VLAN Example 1 Enable Asymmetric VLAN Enable Asymmetric VLAN and click Apply button The overlapping VLAN cannot be configured unless this function is enabled Figure 4 37 VLAN 802 1Q VLAN 2 Configure the shared VLAN VLAN 1 and access VLANs VLAN 2 3 4 In this case the default VLAN is used as shared VLAN and the ports that are shared in the network...

Page 39: ...ss table will be reset to default VLAN 802 1Q Management VLAN The 802 1Q Management VLAN setting allows you to transfer the authority of the switch from the default VLAN to others created by users This allows managing the whole network more flexible By default the Management VLAN is disabled You can select any existing VLAN as the management VLAN when this function is enabled There can only be one...

Page 40: ...120 hours and default is 1 hour Click Apply to implement changes made Voice VLAN OUI Settings allows the user to configure the user defined voice traffic s OUI An Organizationally Unique Identifier OUI is the first three bytes of the MAC address This identifier uniquely identifies a vendor manufacturer or other organization There are some pre defined OUIs and when the user configures personal OUI ...

Page 41: ...Click Apply to implement changes made and Refresh to refresh the voice vlan table Note Voice VLAN has higher priority than any other features even QoS Therefore the voice traffic will be operated according to Voice VLAN setting and not impacted by QoS feature Note It is recommended setting the highest priority for Voice VLAN to guarantee the quality of VoIP traffic VLAN Voice VLAN Voice Device Lis...

Page 42: ...rveillance VLAN global settings User defined MAC Settings Component Type Auto Surveillance VLAN will automatically detect D Link Surveillance Devices by default There are another five surveillance components that could be configured to be auto detected by Auto Surveillance VLAN These five components are Video Management Server VMS VMS Client Remote viewer Video Encoder Network Storage and Other IP...

Page 43: ...t and forwards it to the Target Port Click all to include all ports into port mirroring TX RX transmit and receive mode Duplicate both the data transmitted from and data sent to the source port and forwards all the data to the assigned Target Port Click all to include all ports into port mirroring None Turns off the mirroring of the port Click all to remove all ports from mirroring L2 Functions Lo...

Page 44: ...ection Recover Time can be set at 0 seconds or 60 to 1000000 seconds Entering 0 will disable the Loop Detection Recover Time The default is 60 seconds Click Apply to implement changes made From Port The beginning of a consecutive group of ports may be configured starting with the selected port To Port The ending of a consecutive group of ports may be configured starting with the selected port Stat...

Page 45: ...k Apply associated with the identified address Figure 4 49 Security MAC Address Table Dynamic Forwarding Table L2 Functions Spanning Tree STP Global Settings The Switch implements two versions of the Spanning Tree Protocol the Rapid Spanning Tree Protocol RSTP as defined by the IEEE 802 1w specification and a version compatible with the IEEE 802 1D STP RSTP can operate with legacy equipment implem...

Page 46: ...erval between transmissions of configuration messages by the root device thus stating that the Switch is still functioning The default is 2 seconds Forward Delay 4 30 sec This sets the maximum amount of time that the root device will wait before changing states The default is 15 seconds Root Bridge Displays the MAC address of the Root Bridge Root Maximum Age Displays the Maximum Age of the Root Br...

Page 47: ...ecting the False parameter indicates that the port does not have edge port status Selecting the Auto parameter indicates that the port have edge port status or not have edge port status automatically Priority Specify the priority of each port Selectable range is from 0 to 240 and the default setting is 128 The lower the number the greater the probability the port will be chosen as a root port P2P ...

Page 48: ...ected port To Port The ending of a consecutive group of ports may be configured starting with the selected port Activity There are two different roles of LACP ports Active Active LACP ports are capable of processing and sending LACP control frames This allows LACP compliant devices to negotiate the aggregated link so the group may be changed dynamically as needs require In order to utilize the abi...

Page 49: ...nterval the number of IGMP messages can be increased or decreased larger values will cause IGMP Queries to be sent less often Default value is 125 seconds Router Timeout 60 600 sec This is the interval after which a learned router port entry will be purged For each router port learned a Router Port Purge Timer runs for Router Port Purge Interval This timer will be restarted whenever a Query contro...

Page 50: ... L2 Functions Multicast IGMP Multicast Entry Table Click Delete to remove a specified entry or click Delete All to remove all entries L2 Functions Multicast Multicast Forwarding The Multicast Forwarding page displays all of the entries made into the Switch s static multicast forwarding table To implement the Multicast Forwarding Settings input VID Multicast MAC Address and port settings then click...

Page 51: ...will be forwarded based on the register table in registered group but it will be flooded to all ports of the VLAN in unregistered group Filter Unregistered Groups The registered group will be forwarded based on the register table and the un register group will be filtered Click Apply to make the change effective L2 Functions SNTP Time Settings SNTP or Simple Network Time Protocol is used by the Sw...

Page 52: ...60 L2 Functions SNTP TimeZone Settings Daylight Saving Time State Use this drop down menu to enable or disable the DST Settings Daylight Saving Time Offset Use this drop down menu to specify the amount of time that will constitute your local DST offset 30 60 90 or 120 minutes Time Zone Offset from GMT HH MM Use these drop down menus to specify your local time zone s offset from Greenwich Mean Time...

Page 53: ...transmits successive LLDP advertisements due to changes in the LLDP MIB content The default value is 2 seconds Click Apply to implement changes made L2 Functions LLDP LLDP Port Settings The Basic LLDP Port Settings page displays LLDP port information and contains parameters for configuring LLDP port settings Figure 4 62 L2 Functions LLDP LLDP Port Settings From Port To Port A consecutive group of ...

Page 54: ...s the System Capabilities TLV on the port Define these parameter fields Click Apply to implement changes made and click Refresh to refresh the table information L2 Functions LLDP 802 1 Extension TLV This 802 1 Extension TLV page is used to configure the LLDP Port settings Figure 4 63 L2 Functions LLDP 802 1 Extension TLV From Port To Port A consecutive group of ports may be configured starting wit...

Page 55: ... enabled on the port The possible field values are Enabled Enables the link aggregation configured on the port Disabled Disables the link aggregation configured on the port Maximum Frame Size Specifies whether the Maximum Frame Size is enabled on the port The possible field values are Enabled Enables the Maximum Frame Size configured on the port Disabled Disables the Maximum Frame Size configured ...

Page 56: ...update and display the values required Subtype Displays the managed address subtype For example MAC or IPv4 Management Address Displays the IP address IF Type Displays the IF Type OID Displays the SNMP OID Advertising Ports Displays the advertising ports L2 Functions LLDP LLDP Local Port Table The LLDP Local Port Table page displays LLDP local port information Figure 4 67 L2 Functions LLDP LLDP Lo...

Page 57: ...1 L2 Functions LLDP LLDP Statistics The following information can be viewed LLDP Statistics System Displays the counters that refer to the whole switch Last Change Time Displays the time for when the last change entry was last deleted or added It is also displays the time elapsed since last change was detected Number of Table Insert Displays the number of new entries inserted since switch reboot N...

Page 58: ...Control page allows network managers to define the bandwidth settings for a specified port s transmitting and receiving data rates Figure 4 72 QoS Bandwidth Control From Port To Port A consecutive group of ports may be configured starting with the selected port Type This drop down menu allows you to select between RX receive TX transmit and Both This setting will determine whether the bandwidth ce...

Page 59: ... Thus with larger bandwidth less critical traffic is limited and therefore excessive bandwidth can be saved The following figure displays the status of Quality of Service priority levels of each port higher priority means the traffic from this port will be first handled by the switch For packets that are untagged the switch will assign the priority depending on your configuration Figure 4 73 QoS 8...

Page 60: ...obal default priority value by using From ToS To ToS Security Trusted Host Use Trusted Host function to manage the switch from a remote station You can enter up to ten designated management stations networks by defining the IPv4 Address Netmask or IPv6 Address Prefix as seen in the figure below The first thing after the function is enable is to add your local host IP address as a trusted host Othe...

Page 61: ...77 Security Port Security Security Traffic Segmentation This feature provides administrators to limit traffic flow from a single port to a group of ports on a single Switch This method of segmenting the flow of traffic is similar to using VLANs to limit traffic but is more restrictive Figure 4 78 Security Traffic Segmentation Click Apply to enable or disable this feature To configure traffic segme...

Page 62: ...attack an Ethernet network by allowing an attacker to sniff data frames on a LAN modifying the traffic or stopping the traffic known as a Denial of Service DoS attack The main idea of ARP spoofing is to send fake or spoofed ARP messages to an Ethernet network It associates the attacker s or random MAC address with the IP address of another node such as the default gateway Any traffic meant for tha...

Page 63: ... Security DHCP Server Screening Trusted DHCP Server IP Settings Select IPv4 or IPv6 and specify the IP address then click Apply to create Trusted DHCP Server Security SSL Settings Secure Sockets Layer SSL is a security feature that provides a secure communication path between a Web Management host and the Switch Web UI by using authentication digital signatures and encryption These security functi...

Page 64: ...d Click Apply to implement changes made Security SSH SSH Settings SSH is an abbreviation of Secure Shell which is a program allowing secure remote login and secure network services over an insecure network It allows a secure login to remote host computers a safe method of executing commands on a remote end node and will provide secure encrypted and authenticated communication between two non trust...

Page 65: ...Settings SSH Authentication Mode Settings Password Allows user to use a locally configured password for authentication on the Switch Public Key This parameter may be enabled if the administrator wishes to use a public key configuration set on a SSH server for authentication on the Switch Host Based This parameter may be enabled if the administrator wishes to use a host computer for authentication ...

Page 66: ...d in conjunction with the Host Based choice in the Auth Mode field Security Smart Binding Smart Binding Settings The primary purpose of Smart Binding is to restrict the access to a switch to a number of authorized users Authorized clients can access a switch s port by either checking the pair of IP MAC address with the pre configured database or if DHCP snooping has been enabled in which case the ...

Page 67: ... bind to the IP address set above Port Specify the switch ports for which to configure this IP MAC binding entry IP Address MAC Address Click Add to add a new entry Auto Scan Specifies to scan connected devices in a range of IP address IP Address From To Specifies the range of IP Address to scan all devices in the network Click Scan and the search results will be listed in below table Binding chec...

Page 68: ... you to facilitate centralized user administration as well as providing protection against a sniffing active hacker Figure 4 92 AAA RADIUS Server Index Choose the desired RADIUS server to configure 1 2 or 3 IP Address Select IPv4 or IPv6 and enter the IP address Authentication Port 1 65535 Set the RADIUS authentic server s UDP port The default port is 1812 Accounting Port 1 65535 Set the RADIUS ac...

Page 69: ...EAP packet from the RADIUS server also contains the authentication method to be used The client can reject the authentication method and request another depending on the configuration of the client software and the RADIUS server Depending on the authenticated results the port is either made available to the user or the user is denied access to the network Figure 4 93 AAA 802 1x Global Settings Aut...

Page 70: ...t The default setting is 3600 seconds Port Control This allows user to control the port authorization state Select ForceAuthorized to disable 802 1X and cause the port to transition to the authorized state without any authentication exchange required This means the port transmits and receives normal traffic without 802 1X based authentication of the client If ForceUnauthorized is selected the port...

Page 71: ...s The ACL Configuration Wizard will aid with the creation of access profiles and ACL Rules The ACL Wizard will create the access rule and profile automatically The maximum usable profiles are 50 and with 200 Rules in total for the switch To create a new access rule select Create and enter the Access List Name then click Next button Figure 4 96 ACL ACL Wizard Create Access List The steps of adding ...

Page 72: ...MAC mask e g FF FF FF FF FF FF Destination Select the destination MAC to be specified or Any Enter a destination MAC address and destination MAC mask e g FF FF FF FF FF FF If user selects the 802 1Q VLAN box then need to specify the dot1p and VLAN ID Dot1p 0 7 Specify the dot1p priority VLAN ID Selecting this option instructs the Switch to examine the 802 1p priority value of each packet header an...

Page 73: ... a source IP address and source IP mask For example to set 176 212 XX XX use mask 255 255 0 0 Destination Select the destination IP to be specified or Any relevant to the ACL rules Enter a destination IP address and destination IP mask For example to set 176 212 XX XX use mask 255 255 0 0 Protocol Check Protocol to configure the related settings Protocol Type Select the protocol type for IPv4 The ...

Page 74: ...ACL TCP Rule Select IPv4 ACL with TCP and click Next button The updates to show the follows Figure 4 101 Add Access Rule IPv4 TCP IPv4 Address Defines the range of source Ports relevant to the ACL rules Source Defines the range of source Ports relevant to the ACL rules For example to set 0 15 set mask of FFF0 Destination Defines the range of destination IP addresses relevant to the ACL rules For e...

Page 75: ...rce Defines the range of source Ports relevant to the ACL rules For example to set 0 15 set mask of FFF0 Destination Defines the range of destination IP addresses relevant to the ACL rules For example to set 0 15 set mask of FFF0 Click Next button then the ACL profile is added NOTE A combination of one or several filtering masks can be selected simultaneously The page updates with the relevant fie...

Page 76: ...For example to set 2002 0 0 0 0 0 b0d4 0 use mask 128 Destination IPv6 Address Defines the range of destination IP addresses relevant to the ACL rules For example to set 2002 0 0 0 0 0 bfd4 0 use mask 128 Action Specify the ACL forwarding action matching the rule criteria Permit forwards packets if all other ACL criteria are met Deny drops packets if all other ACL criteria is met Click Next button...

Page 77: ...ded To define the IPv6 ACL UDP profile Select IPv6 ACL with UDP of Protocol Type and click Next button The updates to show the follows Figure 4 105 Add Access Rule IPv6 UDP Source Port Specify the source port Source Port Mask Defines the range of source IP addresses relevant to the ACL rules For example to set 0 15 set mask of FFF0 Destination Port Specify the destination port Destination Port Mas...

Page 78: ...ccess List Name hyperlink and click Next button Figure 4 107 ACL ACL Wizard Update ACL List ACL ACL Access List The ACL Access List page provides information for configuring ACL Access manually Click Edit Rules button to modify the access profile or click Delete button to remove the ACL profile Figure 4 108 ACL ACL Access List To add a new profile click Add button The updates to show the follows 7...

Page 79: ...pply button To modify an existing rule please click on the Sequence No hyperlink Figure 4 110 ACL ACL Access List Update ACL Profile ACL ACL Access Group The ACL Access Group page allows user to configure the ACL access group settings Figure 4 111 ACL ACL Access Group Port Specify the ports to be added in the access list group MAC Access List Add the specified ports in the MAC access list group IP...

Page 80: ...a port once the threshold is reached The possible fields are Deny next port When the power budget is exceeded the next port attempting to power up is denied regardless of the port priority Deny low priority port The port with the lower priority will be shut down to allow the higher priority port to power up Click Apply to make the configurations take effects System Power Status Displays the system...

Page 81: ...wer current Power Voltage and Current is the power usage information of the connected PD please Refresh to renew the information Figure 4 114 PoE PoE Port Setting From Port To Port Specifies the PoE function of a port or ports State Select Enabled or Disabled to configure PoE function for designated port s Default is Enabled Time Range Select the PoE time profile configured from Time Based PoE Tim...

Page 82: ...riables managed objects is maintained by the SNMP agent and used to manage the device These objects are defined in a Management Information Base MIB which provides a standard presentation of the information controlled by the on board SNMP agent SNMP defines both the format of the MIB specifications and the protocol used to access this information over the network The default SNMP Global State is e...

Page 83: ...ociating to the users in SNMP User Table SNMPv3 can control MIB access policy security policy for a user group directly Figure 4 117 SNMP SNMP SNMP Group Group Name Specify the SNMP user group of up to 32 characters Read View Name Specify a SNMP group name for users that are allowed SNMP read privileges to the Switch s SNMP agent Write View Name Specify a SNMP group name for users that are allowed...

Page 84: ...ew up to 32 characters Subtree OID The Object Identifier OID Subtree for the view The OID identifies an object tree MIB tree that will be included or excluded from access by an SNMP manager OID Mask The mask of the Subtree OID 1 means this object number is concerned 0 means do not concerned For example 1 3 6 1 2 1 1 with mask 1 1 1 1 1 1 0 means 1 3 6 1 2 1 X View Type Specify the configured OID i...

Page 85: ...ue identifier used to identify the SNMPv3 engine on the Switch Figure 4 121 SNMP SNMP SNMP Engine ID Input the Engine ID then click Apply to apply the changes and click Default resets to default value SNMP RMON RMON Global Settings Users can enable and disable remote monitoring RMON status for the SNMP function on the Switch In addition RMON Rising and Falling Alarm Traps can be enabled and disabl...

Page 86: ...ets Requested 1 50 Specifies the number of buckets that the device saves Interval 1 3600 Indicates in seconds the time period that samplings are taken from the ports The field range is 1 3600 The default is 1800 seconds equal to 30 minutes Owner Displays the RMON station or user that requested the RMON information Click Add to make the configurations take effects SNMP RMON RMON Alarm The RMON Alar...

Page 87: ...possible field values are user defined RMON events Click Add to make the configurations take effects SNMP RMON RMON Event The RMON Event page contains fields for defining modifying and viewing RMON events statistics Figure 4 126 SNMP RMON RMON Event The RMON Events Page contains the following fields Index 1 65535 Displays the event Description Specifies the user defined event description Type Spec...

Page 88: ...The Cable Diagnostics is designed primarily for administrators and customer service representatives to examine of the copper cable quality It rapidly determines the type of cable errors occurred in the cable Select a port and then click the Test Now button to start the diagnosis Figure 4 129 Monitoring Cable Diagnostics Test Result The description of the cable diagnostic results OK means the cable...

Page 89: ...nostic test or the test result might be incorrect Monitoring System Log The System Log page provides information about system logs including information when the device was booted how the ports are operating when users logged in when sessions timed out as well as other system information Figure 4 130 Monitoring System Log ID Displays an incremented counter of the System Log entry The Maximum entri...

Page 90: ...DES 1210 28 DES 1210 28 login admin Password DES 1210 28 Figure 5 1 Command Prompt The user session is automatically terminated if idle for the login timeout period The default login timeout period is 5 minutes To change the login timeout session please refers to chapter 5 CLI Commands There are a number of helpful features included in the CLI Enter the command will display a list of commands DES ...

Page 91: ...rs Parameter Description firmware_toTFTP Upload the firmware on the Switch from a TFTP server cfg_toTFTP Specifies that the Switch s current settings will be uploaded to the TFTP server ipaddr ipv6addr The IPv4 or IPv6 address of the TFTP server path_filename The filename of the firmware or switch configuration file on the TFTP server You need to specify the DOS path if the file is not at the root...

Page 92: ...change to static will cause CLI disconnect Figure 5 3 The config ipif system command logout This command closes the current connection Syntax logout Example DES 1210 28 logout Figure 5 4 The logout command ping This command checks if another IP address is reachable on the network You can ping the IP address connected to through the managed VLAN VLAN 1 by default as long as there is a physical path...

Page 93: ...t IP address of the switch Syntax show ipif Example DES 1210 28 show ipif IP Setting Mode Static IP Address 10 90 90 90 Subnet Mask 255 0 0 0 Default Gateway 0 0 0 0 DES 1210 28 Figure 5 8 The show ipif command show switch The command displays the status of the switch Syntax show switch Example DES 1210 28 show switch System name System Contact System Location System up time 0 days 6 hrs 32 min 17...

Page 94: ...ry Syntax save Example DES 1210 28 save Building configuration OK DES 1210 28 Figure 5 11 The save command debug info This command displays the ARP table and MAC FDB of the Switch Syntax debug info Example DES 1210 28 debug info ARP table Address Hardware Address Type Interface Mapping 172 17 5 85 00 18 8b bf 75 30 ARPA vlanMgmt Dynamic 172 17 5 254 00 19 5b 14 3d c4 ARPA vlanMgmt Dynamic MAC tabl...

Page 95: ...te over unshielded twisted pair UTP cabling outfitting your network with a powerful 1000 Mbps capable backbone server connection which will create a flexible foundation for the next generation of network technology products Fast Ethernet Technology The growing importance of LANs and the increasing complexity of desktop computing applications are fueling the need for high performance networks A num...

Page 96: ... 28 28P 52 comply with the following standards IEEE 802 3z Supports Full Duplex operations SFP transceivers supported DEM 310GT 1000BASE LX 10km DEM 311GT 1000BASE SX 550m DEM 314GT 1000BASE LH 50km DEM 315GT 1000BASE ZX 80km DEM 312GT2 1000BASE SX 2km DEM 302S LX 1000Base LX Single mode 2km DEM 210 100BASE FX 15km DEM 211 100BASE FX 2km WDM Transceivers Supported DEM 330T 1000Base BX TX 1550 RX 1...

Page 97: ...e IPv4 and IPv6 address LLC mask DSCP Protocol type TCP UDP port number IPv6 Traffic Class QoS Quality of Service 802 1p priority DSCP priority queue mapping Up to 4 queues per port Supports Strict WRR mode in queue handling Bandwidth Control AAA 802 1X Supports IPv4 IPv6 RADIUS Server Supports Port based access Control Supports EAP OTP TLS TTLS and PEAP Supports MD5 authentication Supports 802 1X...

Page 98: ...ation of the equipment in a rack should be such that the amount of air flow required for safe operation of the equipment is not compromised C Mechanical Loading Mounting of the equipment in the rack should be such that a hazardous condition is not achieved due to uneven mechanical loading D Circuit Overloading Consideration should be given to the connection of the equipment to the supply circuit a...

Page 99: ......

Reviews: