background image

DES-3010F/DES-3010FL/DES-3010G/DES-3016/DES-3018/DES-3026 Fast Ethernet Switch Manual 

 

161

SSH Authentication Mode and Algorithm Settings 

The SSH Authentication window allows the configuration of the desired types of SSH algorithms used for 
authentication encryption. There are three categories of algorithms listed and specific algorithms of each 
may be enabled or disabled by using their corresponding pull-down menus. All algorithms are enabled by 
default. To open the following window, click 

Security > SSH > SSH Authentication Mode and 

Algorithm Settings 
 

 

Figure 10- 27. SSH Server Authentication Mode and Algorithm Settings window 

 
The following algorithms may be set: 

Parameter                             Description 

Authentication Algorithm 

Password 

This field may be enabled or disabled to choose if the administrator wishes to use a 
locally configured password for authentication on the Switch. This field is 

Enabled 

by 

default. 

Public Key 

This field may be enabled or disabled to choose if the administrator wishes to use a 
publickey configuration set on a SSH server, for authentication. This field is 

Enabled 

by 

default. 

Host-based 

This field may be enabled or disabled to choose if the administrator wishes to use a host 
computer for authentication. This parameter is intended for Linux users requiring SSH 

Summary of Contents for DES-3010F

Page 1: ...DES 3010F DES 3010FL DES 3010G DES 3016 DES 3018 DES 3026 Managed 8 16 24 port 10 100Mbps N Way Fast Ethernet Switch Release 4 2 Manual ...

Page 2: ...forbidden Trademarks used in this text D Link and the D LINK logo are trademarks of D Link Computer Corporation Microsoft and Windows are registered trademarks of Microsoft Corporation Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products D Link Computer Corporation disclaims any proprietary interest in trademar...

Page 3: ...e You Connect to the Network 8 Installing the Switch without the Rack 9 Installing the Switch in a Rack 9 Mounting the Switch in a Standard 19 Rack 9 Power On 9 The Optional Modules 10 Connecting the Switch 12 Switch to End Node 12 Switch to Hub or Switch 13 DES 3010F FL G DES 3016 DES 3018 or DES 3026 as a Network Backbone 14 Introduction to Switch Management 15 Management Options 15 Web based Ma...

Page 4: ...35 Admin and User Privileges 36 Password Encryption 37 Cable Diagnostics 37 Port Mirroring 38 System Log Settings 39 SNTP Settings 41 Time Settings 41 Time Zone and DST 42 MAC Notification Settings 44 TFTP Services 45 Ping Test 45 SNMP Manager 46 SNMP Settings 46 SNMP Trap Settings 47 SNMP User Table 47 SNMP View Table 49 SNMP Group Table 50 SNMP Community Table 52 SNMP Host Table 53 SNMP Engine I...

Page 5: ...tings 78 The Implementation of DHCP Information Option 82 on the Switch 80 DHCP BOOTP Relay Interface Settings 80 DHCP Relay Option 60 Default Settings 81 DHCP Relay Option 60 Settings 82 DHCP Relay Option 61 Default Settings 83 DHCP Relay Option 61 Settings 83 L2 Features 85 VLANs 85 VLAN Description 85 Notes about VLANs on the Switch 85 IEEE 802 1Q VLANs 85 802 1Q VLAN Tags 86 Tagging and Untagg...

Page 6: ...S Output Scheduling 116 Priority Settings 117 TOS Priority Settings 118 DSCP Priority Settings 119 Port Mapping Priority Settings 120 MAC Priority Settings 121 CPU Interface Filtering 122 CPU Interface Filtering 122 CPU Interface Filtering State Settings 122 CPU Interface Filtering Table 122 Security 133 Traffic Control 133 Port Security 137 Port Lock Entries 139 802 1X 140 802 1X Port Based and M...

Page 7: ...60 SSH Authentication Mode and Algorithm Settings 161 SSH User Authentication Mode 163 Monitoring 165 CPU Utilization 165 Port Utilization 166 Packets 168 Received RX 168 UMB Cast RX 170 Transmitted TX 172 Packet Errors 174 Received RX 174 Transmitted TX 176 Packet Size 178 VLAN Status 180 MAC Address 181 Switch Log 182 Log Settings 183 IGMP Snooping Group 184 Browse Router Port 185 Browse ARP Tab...

Page 8: ...Logout 199 Appendix A 200 Appendix B 203 Cables and Connectors 203 Appendix C 204 System Log Entries 204 Appendix D 209 Cable Lengths 209 Glossary 210 Warranties and Registration 212 Tech Support 218 ...

Page 9: ...warding Filtering SMTP Service and DHCP BOOTP Relay Section 7 L2 Features A discussion of the layer 2 features of the Switch including Static VLAN Entry VLAN Trunk Settings Trunking IGMP Snooping Spanning Tree and Loopback Detection Section 8 CoS A detailed discussion regarding Port Bandwidth 802 1p Default Priority 802 1p User Priority CoS Scheduling Mechanism CoS Output Scheduling Priority Setti...

Page 10: ...ogram names and commands For example use the copy command Boldface Typewriter Font Indicates commands and responses to prompts that must be typed exactly as printed in the manual Initial capital letter Indicates a window name Names of keys on the keyboard have initial capitals For example Click Enter Italics Indicates a window name or a field Also can indicate a variables or parameter that is repl...

Page 11: ... into the openings of your system Doing so can cause fire or electric shock by shorting out interior components Use the product only with approved equipment Allow the product to cool before removing covers or touching internal components Operate the product only from the type of external power source indicated on the electrical ratings label If you are not sure of the type of power source required...

Page 12: ...ts in a rack Thus component refers to any system as well as to various peripherals or supporting hardware CAUTION Installing systems in a rack without the front and side stabilizers installed could cause the rack to tip over potentially resulting in bodily injury under certain circumstances Therefore always install the stabilizers before installing components in the rack After installing system co...

Page 13: ...arge Static electricity can harm delicate components inside your system To prevent static damage discharge static electricity from your body before you touch any of the electronic components such as the microprocessor You can do so by periodically touching an unpainted metal surface on the chassis You can also take the following steps to prevent damage from electrostatic discharge ESD 1 When unpac...

Page 14: ...ort Fast Ethernet switch Comprising 10 100Mbps switched unshielded twisted pair UTP and Auto MDI X MDI II convertible ports and each model having its own uplink port capability this Switch will be ideal for segmenting networks into smaller sub connected networks for optimum throughput capability of the most demanding multimedia and imaging applications available on the network without creating bot...

Page 15: ...s Ingress rate control Address table Supports up to 8K MAC addresses per device Port Trunking with flexible load distribution and fail over function IGMP Snooping support SNMP support SMTP support CPU Interface Filtering Port Mirroring support MIB support for RFC1213 MIB II RFC1493 Bridge RFC1757 RMON RFC1643 Ether like MIB RFC2233 Interface MIB RFC2358 Ether like MIB IF MIB Private MIB RFC2674 fo...

Page 16: ...deo conferencing complex imaging and similar data intensive applications Likewise since data transfers occur 10 times faster than Fast Ethernet servers outfitted with Gigabit Ethernet NIC s are able to perform 10 times the number of operations in the same amount of time In addition the phenomenal bandwidth delivered by Gigabit Ethernet is the most cost effective method to take advantage of today s...

Page 17: ...s Routers have also been used to segment local area networks but the cost of a router and the setup and maintenance required make routers relatively impractical Today s switches are an ideal solution to most kinds of local area network congestion problems NOTE For customers interested in D View D Link Corporation s proprietary SNMP management software go to the D Link Website www dlink com and dow...

Page 18: ... DES 3010G DES 3016 DES 3018 DES 3026 two optional module ports DES 3018 3026 only a gigabit 1000BASE T copper port DES 3010F FL G a 100BASE FX Ethernet port DES 3010F DES 3010FL only and a SFP Gigabit Ethernet port DES 3010G Also the front panel has a RS 232 communication port Figure 1 1 DES 3010F Front Panel Figure 1 2 DES 3010FL Front Panel Figure 1 3 DES 3010G Front Panel Figure 1 4 DES 3016 F...

Page 19: ...ady green to indicate a valid link A blinking LED indicates activity on the port Speed To the right of every Link Act LED lies the speed LED corresponding to every port Depending on the switch model these lights will assume different roles DES 3010F FL G A solid green LED indicates the port is transferring data at 100Mbps while a dark unlit LED will indicate a rate of 10Mbps Port 9 The LED of this...

Page 20: ...Figure 1 9 Rear Panel of the DES 3016 DES 3018 DES 3026 Side Panel Description Both panels of the Switch contain a heat vent used to dissipate heat Do not block these openings and leave at least 6 inches of space at the rear and sides of the Switch for proper ventilation Be reminded that without proper heat dissipation and air circulation system components might overheat which could lead to system...

Page 21: ...ou install the Switch may greatly affect its performance Please follow these guidelines for setting up the Switch Install the Switch on a sturdy level surface that can support the weight of the Switch Do not place heavy objects on the Switch The power outlet should be within 1 82 meters 6 feet of the Switch Visually inspect the power cord and see that it is fully secured to the AC power port Make ...

Page 22: ...Use the following diagrams to guide you Figure 2 2 Fasten mounting brackets to Switch Fasten the mounting brackets to the Switch using the screws provided With the brackets attached securely you can mount the Switch in a standard rack as shown in Figure 2 3 on the following page Mounting the Switch in a Standard 19 Rack Figure 2 3 Installing Switch in a rack Power On Plug one end of the AC power c...

Page 23: ... 3ab Comprehensive LEDs for Speed Link and Act ivity Supports auto negotiation in 10 100 1000M full duplex back pressure in half duplex and IEEE802 3x compliant flow control for full duplex Single Port SFP gigabit uplink module Compliant with IEEE802 3z Link and Act ivity LED Supports auto negotiation in full duplex and IEEE802 3x compliant flow control for full duplex Support for DEM 310GT DEM 31...

Page 24: ...ered with a faceplate that can be easily removed by loosening the screws and pulling off the plate Figure 2 8 Optional Module slots at the front of the DES 3018 Figure 2 9 Optional Module slot at the front of the DES 3026 Take the module and gently slide it in to the available slot at the front of the Switch until it reaches the back as shown in the following figure At the back of the slot is a pl...

Page 25: ... connections Switch to End Node End nodes include PCs outfitted with a 10 100 or 1000 Mbps RJ 45 Ethernet Network Interface Card NIC and most routers An end node can be connected to the Switch via a twisted pair UTP STP cable The end node should be connected to any of the 10 100BASE T ports of the Switch Figure 3 1 Switch connected to an end node The Link Act LEDs for each UTP port will light gree...

Page 26: ...or 5 UTP STP cable A 100BASE TX hub or switch can be connected to the Switch via a twisted pair Category 5 UTP STP cable A 1000BASE T switch can be connected to the Switch via a twisted pair Category 5e UTP STP cable A switch supporting a fiber optic uplink can be connected to the Switch s SFP ports via fiber optic cabling Figure 3 2 Switch connected to a port on a hub or switch using a straight o...

Page 27: ...figurations are endless but be sure that connections coming from the Switch are at a equal or slower speed than the ISP uplink to avoid bottlenecking The copper ports operate at a speed of 100Mbps or 10Mbps in full or half duplex mode The 100BASE FX ports can operate at 100Mbps in full duplex mode only Copper gigabit ports may operate in 1000Mbps in full duplex only SFP gigabit ports operate in 10...

Page 28: ...plorer version 5 0 SNMP Based Management You can manage the Switch with an SNMP compatible console program The Switch supports SNMP version 1 0 version 2 0c and version 3 0 The SNMP agent decodes the incoming SNMP messages and responds to requests with MIB objects stored in the database The SNMP agent updates the MIB objects to generate statistics and counters Command Line Console Interface throug...

Page 29: ...re information on setting up user accounts See the DES 3026 Command Line Interface Reference Manual on the documentation CD for a list of all commands and additional information on using the CLI 13 When you have completed your tasks exit the session with the logout command or close the emu lator program Make sure the terminal or PC you are using to make this connection is configured to match these...

Page 30: ...rogram in the Switch to refresh the console screen DES 3026 Fast Ethernet Switch Command Line Interface Firmware Build 4 20 B27 Copyright C 2007 D Link Corporation All rights reserved UserName Figure 4 2 Initial screen first time connecting to the Switch Press Enter in both the Username and Password fields You will be given access to the command prompt DES 3026 4 as shown below There is no initial...

Page 31: ...ew administrator level account are identical for the DES 3010F DES 3010FL DES 3010G DES 3016 and DES 3018 switch models DES 3026 4 create account admin newmanager Command create account admin newmanager Enter a case sensitive new password Enter the new password again for confirmation Success DES 3026 4 Figure 4 4 Creating a new Administrator level account NOTICE CLI configuration commands only mod...

Page 32: ...lowed to view read only information or receive traps using SNMP v 1 while assigning a higher level of security to another group granting read write privileges using SNMP v 3 Using SNMP v 3 individual users or groups of SNMP managers can be allowed to perform or be restricted from performing specific SNMP management functions The functions allowed or restricted are defined using the Object Identifi...

Page 33: ... Disabled TELNET Enabled TCP 23 WEB Enabled TCP 80 RMON Disabled CTRL C ESC q Quit SPACE n Next Page ENTER Next Entry a All Figure 4 5 show switch command The Switch s MAC address can also be found from the Web management program on the DES 3028 Web Management Tool The IP address for the Switch must be set before it can be managed with the Web based manager The Switch IP address can be automatical...

Page 34: ... of 255 0 0 0 The system message Success indicates that the command was executed successfully The Switch can now be configured and managed via Telnet and the CLI or via the Web based management Connecting Devices to the Switch After you assign IP addresses to the Switch you can connect devices to the Switch To connect a device to an SFP transceiver port Use your cabling requirements to select an a...

Page 35: ...ternet Explorer The browser acts as a universal access tool and can communicate directly with the Switch using the HTTP protocol The Web based management module and the Console program and Telnet are different ways to access the same internal switching software and configure it Thus all settings encountered in web based management are the same as those found in the console program Logging on to th...

Page 36: ...he Switch management features available in the web based manager are explained below Web based User Interface The user interface provides access to various Switch configuration and management screens allows you to view performance statistics and permits you to graphically monitor the system status Areas of the User Interface The figure below shows the user interface The user interface is divided i...

Page 37: ...he Switch s ports and expansion modules showing port activity duplex mode or flow control depending on the specified mode Various areas of the graphic can be selected for performing management functions including port configuration The user may also choose the device statistical refresh interval by using the pull down menu in this section Area 3 Presents switch information based on your selection ...

Page 38: ... IGMP Snooping Spanning Tree and Loopback Detection CoS Contains screens concerning configurations for Port Bandwidth 802 1p Default Priority 802 1p User Priority CoS Scheduling Mechanism CoS Output Scheduling Priority Settings TOS Priority Settings DSCP Priority Setttings Port Mapping Priority Settings and MAC Priority CPU Interface Filtering Contains screens concerning configurations for CPU Int...

Page 39: ...tration Device Information IP Address Port Configuration User Accounts Password Encryption Cable Diagnostics Port Mirroring System Log Settings SNTP Settings MAC Notification Settings TFTP Services Ping Test SNMP Manager IP MAC Binding Single IP Setting Forwarding and Filtering SMTP Service DHCP BOOTP Relay ...

Page 40: ...try into another network device s address table if necessary The user may also enter a System Name System Location and System Contact to aid in defining the Switch to the user s preference In addition this screen displays the status of functions on the Switch to quickly assess their current global status Three of these functions Spanning Tree Port Mirror and Single IP Management have a Detail sett...

Page 41: ...ter the IP address of the Default Gateway If you will manage the Switch from the subnet on which it is installed you can leave the default address 0 0 0 0 in this field 4 If no VLANs have been previously configured on the Switch you can use the default VLAN Name The default VLAN contains all of the Switch ports as members If VLANs have been previously configured on the Switch you will need to ente...

Page 42: ... field unchanged VLAN Name This allows the entry of a VLAN Name from which a management station will be allowed to manage the Switch using TCP IP in band via web manager or Telnet Management stations that are on VLANs other than the one entered here will not be able to manage the Switch in band unless their IP addresses are entered in the Security IP Management menu If VLANs have not yet been conf...

Page 43: ...over the console serial port as follows Starting at the command line prompt enter the commands config ipif System ipaddress xxx xxx xxx xxx yyy yyy yyy yyy Where the x s represent the IP address to be assigned to the IP interface named System and the y s represent the corresponding subnet mask Alternatively you can enter config ipif System ipaddress xxx xxx xxx xxx z Where the x s represent the IP...

Page 44: ...peed and includes windows for Port Settings Port Description and Port Error Disabled Port Settings Click Administration Port Configuration Port Settings to display the following window To configure switch ports Choose the port or sequential range of ports using the From To port pull down menus Use the remaining pull down menus to configure the parameters described below Figure 6 3 Port Configurati...

Page 45: ...ull_S Gigabit connections are only supported in full duplex connections and take on certain characteristics that are different from the other choices listed The 1000M Full_M master and 1000M Full_S slave parameters refer to connections running a 1000BASE T cable for connection between the Switch port and other device capable of a gigabit connection The master setting 1000M Full_M will allow the po...

Page 46: ... Administration Port Configuration Port Description the following window will be displayed Use the From and To pull down menu to choose a port or range of ports to describe and then enter a description of the port s Click Apply to set the descriptions in the Port Description Table Figure 6 4 Port Description Setting and Port Description Table To remove a description for a port select the port leav...

Page 47: ... information can be viewed in the preceding window Parameter Description Port Denotes the port on the Switch that has been disabled State Describes the current running state of the port in question whether enabled or disabled Connection Describes the current running state of the port in question This field will read err disabled when a port has been disabled due to connection errors Reason Describ...

Page 48: ...ssword in the Confirm New Password Choose the level of privilege Admin or User from the Access Right drop down menu To return to the User Account window click the hyperlinked Show All User Account Entries Figure 6 8 User Account Modify Table Modify or delete an existing user account in the User Account Modify Table To delete the user account click on the Delete button To change the password type i...

Page 49: ...eges Management Admin User Configuration Yes Read Only Network Monitoring Yes Read Only Community Strings and Trap Stations Yes Read Only Update Firmware and Configuration Files Yes No System Utilities Yes No Factory Reset Yes No User Account Management Add Update Delete User Accounts Yes No View User Accounts Yes No Figure 6 9 Admin and User Privileges After establishing a User Account with Admin...

Page 50: ...le Diagnostics This window is used to control the cable diagnostics and determine where and what kind of errors have occurred on the cable This function is primarily used for administrators to view tests on copper cables To view the cable diagnostics open Administration Cable Diagnostics which will display the following window Figure 6 11 Cable Diagnostics window To view the cable diagnostics for ...

Page 51: ...To configure a mirror port Select the Source Port from where you want to copy frames and the Target Port which receives the copies from the source port Select the Source Direction Ingress Egress or Both and change the Status drop down menu to Enabled Click Apply to let the changes take effect NOTE You cannot mirror a fast port onto a slower port For example if you try to mirror the traffic from a ...

Page 52: ... of the parameters in the following window Figure 6 14 Configure System Log Server Add The following parameters can be set Parameter Description Index 1 4 Syslog server settings index 1 4 Host IP The IP address of the Syslog server Severity This drop down menu allows you to select the level of messages that will be sent The options are Warning Informational and All Facility Some of the operating s...

Page 53: ... 1 local1 18 local use 2 local2 19 local use 3 local3 20 local use 4 local4 21 local use 5 local5 22 local use 6 local6 23 local use 7 local7 UDP Port 514 or 5000 65535 Enter the UDP port number used for sending Syslog messages The default is 514 Status Choose Enabled or Disabled to activate or deactivate To set the System Log Server configuration click Apply To delete an entry from the Current Sy...

Page 54: ...e source of the time settings viewed here SNTP Settings SNTP State Use this pull down menu to Enable or Disable SNTP SNTP Primary Server The IP address of the primary server the SNTP information will be taken from SNTP Secondary Server The IP address of the secondary server the SNTP information will be taken from SNTP Poll Interval in Seconds The interval in seconds between requests for updated SN...

Page 55: ...Zone and DST Figure 6 16 Time Zone and DST Settings page The following parameters can be set Parameter Description Time Zone and DST Daylight Saving Time State Use this pull down menu to enable DST Repeating Settings Repeating or DST Annual Settings Annual Selecting one of these will allow its corresponding field to be configured Daylight Saving Time Offset in Minutes Use this pull down menu to sp...

Page 56: ... Enter the week of the month the DST will end To Which Day Enter the day of the week that DST will end To Which Month Enter the month that DST will end To What Time HH MM Enter the time DST will end DST Annual Settings Using annual mode will enable DST seasonal time adjustment Annual mode requires that the DST beginning and ending date be specified concisely For example specify to begin DST on Apr...

Page 57: ...modified Parameter Description State Enable or disable MAC notification globally on the Switch Interval sec The time in seconds between notifications History Size The maximum number of entries listed in the history log used for notification Up to 500 entries can be specified Port Settings To change MAC notification settings for a port or group of ports on the Switch configure the following paramet...

Page 58: ...rver IP Address and the path of the filename in use and click Start to initiate the file transfer To view this window click Administration TFTP Services Figure 6 18 TFTP Services screen Ping Test Ping is a small program that sends ICMP Echo packets to the IP address you specify The destination node then responds to or echoes the packets sent from the Switch This is very useful to verify connectivi...

Page 59: ...ch user on that list can do as an SNMP manager The Switch allows groups of users to be listed and configured with a shared set of privileges The SNMP version may also be set for a listed group of SNMP managers Thus you may create a group of SNMP managers that are allowed to view read only information or receive traps using SNMPv1 while assigning a higher level of security to another group granting...

Page 60: ...MP User Table The SNMP User Table displays all of the currently configured SNMP Users on the Switch To view this window click Administration SNMP Manager SNMP User Table Figure 6 21 SNMP User Table To delete an existing SNMP User Table entry click the below the Delete heading corresponding to the entry you wish to delete To display the detailed entry for a given user click on the hyperlinked User ...

Page 61: ... Name Enter an alphanumeric string of up to 32 characters This is used to identify the SNMP user Group Name This name is used to specify the SNMP group created can request SNMP messages SNMP Encryption Click the encrypted check box to enable encryption for the SNMP protocol This feature is for users utilizing the SNMP V3 version The user may configure the encryption in the following two fields Aut...

Page 62: ...g SNMP View Table entry click the corresponding button in the Delete column To create a new entry click the Add button and a separate menu will appear Figure 6 25 SNMP View Table Configuration window Add The SNMP Group created with this table maps SNMP users identified in the SNMP User Table to the views created in the previous menu The following parameters can set Parameter Description View Name ...

Page 63: ...ck the Show All SNMP View Table Entries link SNMP Group Table An SNMP Group created with this table maps SNMP users identified in the SNMP User Table to the views created in the previous menu To view the SNMP Group Table click Administration SNMP Manager SNMP Group Table Figure 6 26 SNMP Group Table To delete an existing SNMP Group Table entry click the corresponding under the Delete heading To di...

Page 64: ...Pv1 Specifies that SNMP version 1 will be used SNMPv2 Specifies that SNMP version 2c will be used The SNMPv2 supports both centralized and distributed network management strategies It includes improvements in the Structure of Management Information SMI and adds some security features SNMPv3 Specifies that the SNMP version 3 will be used SNMPv3 provides secure access to devices through a combinatio...

Page 65: ...munity Table Figure 6 29 SNMP Community Table window The following parameters can set Parameter Description Community Name Type an alphanumeric string of up to 32 characters that is used to identify members of an SNMP community This string is used like a password to give remote SNMP managers access to MIB objects in the Switch s SNMP agent View Name Type an alphanumeric string of up to 32 characte...

Page 66: ...ow The following parameters can set Parameter Description Host IP Address Type the IP address of the remote management station that will serve as the SNMP host for the Switch SNMP Version V1 To specifies that SNMP version 1 will be used V2 To specify that SNMP version 2 will be used V3 NoAuth NoPriv To specify that the SNMP version 3 will be used with a NoAuth NoPriv security level V3 Auth NoPriv ...

Page 67: ...used for SNMP V3 implementations This is an alphanumeric string used to identify the SNMP engine on the Switch To display the Switch s SNMP Engine ID click Administration SNMP Manager SNMP Engine ID Figure 6 31 SNMP Engine ID Configuration window To change the Engine ID enter the new Engine ID in the space provided and click the Apply button ...

Page 68: ... creation of authorized users can be manually configured by CLI or Web The function is port based this means a user can enable or disable the function on the individual port IP MAC Port Binding IMPB The IP MAC Ports Settings menu is used to enable IP MAC binding on a per port basis Ports that are enabled will apply the IP MAC check to ingress packets for the port The IP MAC database used for the c...

Page 69: ...nding Ports are enabled use the IP MAC Binding menu to configure the IP MAC binding as applied to the enabled ports IP MAC Binding Table The IP MAC Binding Table can be used to create IP MAC binding entries Enter the IP and MAC addresses of the authorized users in the appropriate fields and click Add To use IP MAC binding to check on specific ...

Page 70: ...he Address Binding Trap Log Settings field will enable and disable the sending of trap log messages for IP MAC binding When enabled the Switch will send a trap log message to the SNMP agent and the Switch log when an ARP packet is received that doesn t match the IP MAC binding configuration set on the Switch To modify either the IP address or the MAC address of the binding entry make the desired c...

Page 71: ...shown below To view this table click Administration IP MAC Binding IP MAC Binding Blocked Figure 6 34 IP MAC Binding Blocked window To find an unauthorized device that has been blocked by the IP MAC binding restrictions enter the VLAN name and MAC Address in the appropriate fields and click Find To delete an entry click the next to the entry s MAC address To delete all the entries in the IP MAC Bi...

Page 72: ...Ns are configured the SIM group will only utilize the default VLAN on any switch SIM allows intermediate devices that do not support SIM This enables the user to manage switches that are more than one hop away from the CS The SIM group is a group of switches that are managed as a single entity SIM switches may take on three different roles 1 Commander Switch CS This is a switch that has been manua...

Page 73: ...fresh and the SIM Settings window will look like this Figure 6 36 SIM Settings window Enabled The following parameters can be set Parameters Description SIM State Use the pull down menu to either enable or disable the SIM state on the Switch Disabled will render all SIM functions on the Switch inoperable Role State Use the pull down menu to change the SIM role of the Switch The two choices are Can...

Page 74: ...The Topology window will be used to configure and manage the Switch within the SIM group and requires Java script to function properly on your computer The Java Runtime Environment on your server should initiate and lead you to the topology window as seen below Figure 6 37 Single IP Management window Tree View The Tree View window holds the following information under the Data tab Parameter Descri...

Page 75: ...tch Model Name Displays the full Model Name of the corresponding Switch To view the Topology Map click the View menu in the toolbar and then Topology which will produce the following screen The Topology View will refresh itself periodically 20 seconds by default Figure 6 38 Topology view This screen will display how the devices within the Single IP Management Group are connected to other groups an...

Page 76: ...w window the mouse plays an important role in configuration and in viewing device information Setting the mouse cursor over a specific device in the topology window tool tip will display the same information about a specific device as the Tree view does See the window below for an example Figure 6 39 Device Information Utilizing the Tool Tip Setting the mouse cursor over a line between two devices...

Page 77: ...DES 3010F DES 3010FL DES 3010G DES 3016 DES 3018 DES 3026 Fast Ethernet Switch Manual 64 Figure 6 40 Port Speed Utilizing the Tool Tip ...

Page 78: ... SIM group and the icon associated with it Group Icon Figure 6 41 Right Clicking a Group Icon The following options may appear for the user to configure Collapse to collapse the group that will be represented by a single icon Expand to expand the SIM group in detail Property to pop up a window to display the group information Figure 6 42 Property window Commander Switch Icon Figure 6 43 Right Clic...

Page 79: ...op up a window to display the group information Figure 6 44 Property window Member Switch Icon Figure 6 45 Right Clicking a Member icon The following options may appear for the user to configure Collapse to collapse the group that will be represented by a single icon Expand to expand the SIM group in detail Remove from group remove a member from a group Configure launch the web management to confi...

Page 80: ... group that will be represented by a single icon Expand to expand the SIM group in detail Add to group add a candidate to a group Clicking this option will reveal the following screen for the user to enter a password for authentication from the Candidate Switch before being added to the SIM group Click OK to enter the password or Cancel to exit the window Figure 6 48 Input password window Property...

Page 81: ...witch Remote Port No Displays the number of the physical port on the MS or CaS that the CS is connected to The CS will have no entry in this field Local Port No Displays the number of the physical port on the CS that the MS or CaS is connected to The CS will have no entry in this field Port Speed Displays the connection speed between the CS and the MS or CaS Click Close to close the Property windo...

Page 82: ...exit the window Figure 6 51 Input password window Remove from Group remove an MS from the group Device Configure will open the web manager for the specific device View Refresh update the views with the latest status Topology display the Topology view Help About Will display the SIM information including the current SIM version Figure 6 52 About window NOTE Upon this firmware release some functions...

Page 83: ...a TFTP server Member Switches will be listed in the table and will be specified by Port port on the CS where the MS resides MAC Address Model Name and Version To specify a certain Switch for upgrading configuration files click its corresponding radio button under the Port heading To update the configuration file enter the Server IP Address where the file resides and enter the Path Filename of the ...

Page 84: ...DES 3010F DES 3010FL DES 3010G DES 3016 DES 3018 DES 3026 Fast Ethernet Switch Manual 71 Figure 6 55 Upload Log File window ...

Page 85: ...en click Add Modify Parameter Description VLAN ID VID The VLAN ID number of the VLAN on which the above Unicast MAC address resides MAC Address The MAC address to which packets will be statically forwarded This must be a unicast MAC address Port Allows the selection of the port number on which the MAC address entered above resides Click Apply to implement the changes made Current entries can be fo...

Page 86: ...Table Add The following parameters can be set Parameter Description VID The VLAN ID of the VLAN to which the corresponding MAC address belongs Multicast MAC Address The MAC address of the static source of multicast packets This must be a multicast MAC address Port Settings Allows the selection of ports that will be members of the static multicast group The options are None No restrictions on the p...

Page 87: ...tered groups This default setting will forward all multicast streams Filter unregistered groups This setting will only forward multicasts to registered multicast groups Multicasts to unregistered groups are blocked To view this window click Administration Forwarding Filtering Multicast Filtering Mode Figure 6 59 Configure Multicast Filtering Mode Select the desired Multicast Filtering Mode setting...

Page 88: ...nt will receive e mails from the SMTP server regarding the Switch To configure this test mail the SMTP function must first be enabled by configuring the SMTP State in the SMTP Service Settings window and then by sending an email using the SMTP Service window All recipients configured for SMTP will receive a sample test message from the SMTP server ensuring the reliability of this function The Swit...

Page 89: ... on the Switch To open the following window click Administration SMTP Service SMTP Server Settings Figure 6 60 SMTP Service Settings and Mail Receiver Address Table window The following parameters can be set Parameter Description SMTP State Use the pull down menu to enable or disable the SMTP service on this device SMTP Server Address Enter the IP address of the SMTP server on a remote device This...

Page 90: ...onfigurations set and the reliability of the SMTP server To access the following window click Administration SMTP Service SMTP Service Figure 6 61 SMTP Mail Service The following parameters can be set Parameter Description Subject Enter the subject of the test e mail Content Enter the content of the test e mail Once your message is ready click Send to send this mail to all recipients configured on...

Page 91: ...s used to enable or disable the DHCP BOOTP Relay service on the Switch The default is Disabled BOOTP Relay Hops Count Limit 1 16 This field allows an entry between 1 and 16 to define the maximum number of router hops DHCP BOOTP messages can be forwarded across The default hop count is 4 BOOTP Relay Time Threshold 0 65535 Allows an entry between 0 and 65535 seconds and defines the maximum time limi...

Page 92: ... messages between DHCP servers and clients and the check and policy settings will have no effect DHCP Relay Agent Information Option 82 Check This field can be toggled between Enabled and Disabled using the pull down menu It is used to enable or disable the Switches ability to check the validity of the packet s option 82 field Enabled When the field is toggled to Enable the relay agent will check ...

Page 93: ...D g Port The incoming port number of DHCP client packet port number starts from 1 Remote ID sub option format 1 2 3 4 5 2 8 0 6 MAC address 1 byte 1 byte 1 byte 1 byte 6 bytes 1 Sub option type 2 Length 3 Remote ID type 4 Length 5 MAC address The Switch s system MAC address Figure 6 63 Circuit ID and Remote ID Sub option Format DHCP BOOTP Relay Interface Settings This window allows the user to set...

Page 94: ...Default Settings When there are no servers found that are suitable for the packet based on option 60 the relay servers will be determined by the default relay server setting To view this window click Administration DHCP BOOTP Relay DHCP Relay Option 60 Default Settings Figure 6 65 DHCP Relay Option 60 Default Settings window The following parameters may be configured or viewed Parameter Descriptio...

Page 95: ...IF will be used to determine the relay servers To view this window click Administration DHCP BOOTP Relay DHCP Relay Option 60 Settings Figure 6 66 DHCP Relay Option 60 Settings window To find an entry enter the String or IP address and click Search to view all entries click ViewAll to delete an entry click Delete To add a new entry click Add the following window will appear for the user to configu...

Page 96: ...ettings This window allows the user to view the DHCP Relay Option 61 Table To view this window click Administration DHCP BOOTP Relay DHCP Relay Option 61 Settings Figure 6 69 DHCP Relay Option 61 Settings window To delete an entry enter the appropriate information and click Delete to remove all entries click Clear All To add a new entry click Add the following screen will appear for the user to co...

Page 97: ...rs will be the union of these two sets of servers If the relay servers are determined based on option 60 or option 61 then per IPIF configured servers will be ignored If the relay servers are not determined either by option 60 or option 61 then per IPIF configured servers will be used to determine the relay servers Drop When drop is specified the packet with no matching rules found will be dropped...

Page 98: ...y identify end nodes and assign these nodes VLAN membership packets cannot cross VLANs without a network device performing a routing function between the VLANs The Switch supports IEEE 802 1Q VLANs The port untagging function can be used to remove the 802 1Q tag from packet headers to maintain compatibility with devices that are tag unaware The Switch s default is to assign all ports to a single 8...

Page 99: ...eld is equal to 0x8100 the packet carries the IEEE 802 1Q 802 1p tag The tag is contained in the following two octets and consists of 3 bits of user priority 1 bit of Canonical Format Identifier CFI used for encapsulating Token Ring packets so they can be carried across Ethernet backbones and 12 bits of VLAN ID VID The 3 bits of user priority are used by 802 1p The VID is the VLAN identifier and i...

Page 100: ...ns Ports with untagging enabled will strip the 802 1Q tag from all packets that flow into and out of those ports If the packet doesn t have an 802 1Q VLAN tag the port will not alter the packet Thus all packets received by and forwarded by an untagging port will have no 802 1Q VLAN information Remember that the PVID is only used internally within the Switch Untagging is used to send packets from a...

Page 101: ...emoved from the default Packets cannot cross VLANs If a member of one VLAN wants to connect to another VLAN the link must be through an external router NOTE If no VLANs are configured on the Switch then all packets will be forwarded to any destination port Packets with unknown source addresses will be flooded to all ports Broadcast and multicast packets will also be flooded to all ports An example...

Page 102: ...ng Modify button To create a new 802 1Q VLAN click the Add button in the 802 1Q Static VLANs menu A new menu will appear as shown below to configure the port settings and to assign a unique name and number to the new VLAN See the table below for a description of the parameters in the new menu Figure 7 5 802 1Q Static VLANs Add To return to the Current 802 1Q Static VLANs Entries window click the S...

Page 103: ...he new VLAN in the Add dialog box or for editing the VLAN name in the Modify dialog box Port Settings Allows an individual port to be specified as member of a VLAN Tag Specifies the port as either 802 1Q tagging or 802 1Q untagged Checking the box will desig nate the port as Tagged None Allows an individual port to be specified as a non VLAN member Egress Select this to specify the port as a stati...

Page 104: ... pipeline The Switch supports up to three port trunk groups with 2 to 8 ports in each group A potential bit rate of 8000 Mbps can be achieved Figure 7 7 Example of Port Trunk Group The Switch treats all ports in a trunk group as a single port Data transmitted to a specific host destination address will always be transmitted over the same port in a trunk group This allows packets in a data stream t...

Page 105: ... configurations must be identical Port locking port mirroring and 802 1X must not be enabled on the trunk group Further the aggregated links must all be of the same speed and should be configured as full duplex The Master Port of the group is to be configured by the user and all configuration options including the VLAN configuration that can be applied to the Master Port are applied to the entire ...

Page 106: ...eatures VLAN Trunk Settings Figure 7 8 VLAN Trunk Settings window The following parameters can be set Parameter Description VLAN Trunk Status Use the pull down menu to Enable or Disable the VLAN trunk global settings on the Switch If enabled the VLAN trunk ports shall be ale to forward all tagged frames with any VID From To Enter the port or range of ports you wish to configure for VLAN trunk port...

Page 107: ...ton to add a new trunk group and use the Port Trunking Configuration menu see example below to set up trunk groups To modify a port trunk group click the hyperlinked group number corresponding to the entry you wish to alter To delete a port trunk group click the corresponding under the Delete heading in the Current Trunking Group Entries table Figure 7 10 Link Aggregation Group Configuration windo...

Page 108: ... active and passive in processing and sending LACP Link Aggregation Control Protocol control frames To view the LACP Settings window click L2 Features Trunking LACP Port Settings Figure 7 11 LACP Settings window The following fields can be set Parameter Description From To A consecutive group of ports may be configured starting with the selected port Mode Active Active LACP ports are capable of pr...

Page 109: ...gated port group that is to add or subtract ports from the group at least one of the participating devices must designate LACP ports as active Both devices must support LACP Passive LACP ports that are designated as passive cannot initially send LACP control frames In order to allow the linked port group to negotiate adjustments and make changes dynamically one end of the connection must have acti...

Page 110: ...P Snooping link in the L2 Features folder When enabled for IGMP snooping the Switch can open or close a port to a specific Multicast group member based on IGMP messages sent from the device to the IGMP host or vice versa The Switch monitors IGMP messages and discontinues forwarding multicast packets when there are no longer hosts requesting that they continue Use the IGMP Snooping Group Entry Tabl...

Page 111: ...s kept in the forwarding table without receiving a membership report Default 260 Leave Timer 1 16711450 This specifies the maximum amount of time in seconds between the Switch receiving a leave group message from a host and the Switch issuing a group membership query If no response to the membership query is received before the Leave Timer expires the multicast forwarding entry for that host is de...

Page 112: ...ere all forwarded to the router port A router port will be dynamically configured when IGMP query packets RIPv2 multicast DVMRP multicast or PIM DM multicast packets are detected flowing into a port To view this window click L2 Features IGMP Snooping Static Router Ports Settings Figure 7 14 Static Router Ports Settings window The Static Router Ports Settings page shown above displays all of the cu...

Page 113: ...ch will then send the access request to the radius server to complete the authentication process To view this window click L2 Features IGMP Snooping IGMP Access Control Settings Figure 7 16 IGMP Access Control Settings The following parameters can be set Parameter Description From To Enter a port or group of ports that may be configured for IGMP Access Control settings Status This function is used...

Page 114: ... in the way ports transition to a forwarding state and in the way this transition relates to the role of the port forwarding or not forwarding in the topology RSTP combines the transition states disabled blocking and listening used in 802 1D and creates a single state Discarding In either case ports do not forward packets In the STP port transition states disabled blocking or listening or in the R...

Page 115: ...RSTP all ports operating in full duplex mode are considered to be P2P ports unless manually overridden through configuration 802 1D and 802 1w Compatibility RSTP can interoperate with legacy equipment and is capable of automatically adjusting BPDU packets to 802 1D format when necessary However any segment using 802 1D STP will not benefit from the rapid transition and rapid topology change detect...

Page 116: ...than the Max Age Otherwise a configuration error will occur Observe the following formulas when setting the above parameters Max Age 2 x Forward Delay 1 second Max Age 2 x Hello Time 1 second The following parameters can be set Parameter Description Spanning Tree Protocol Use the pull down menu to enable or disable STP globally on the Switch The default is Disabled ...

Page 117: ...rt on the Switch spends this time in the listening state while moving from the blocking state to the forwarding state Bridge Priority 0 61440 A Priority for the Switch can be set from 0 to 61440 This number is used in the voting process between Switches on the network to determine which Switch will be the root Switch A low number indicates a high priority and a high probability that this Switch wi...

Page 118: ...An STP Group will use the switch level parameters entered above with the addition of Port Priority and Port Cost An STP Group spanning tree works in the same way as the switch level spanning tree but the root bridge concept is replaced with a root port concept A root port is a port of the group that is elected based on port priority and port cost to be the connection to the network for the group R...

Page 119: ...rameter designates the port as an edge port Edge ports cannot create loops however an edge port can lose edge port status if a topology change creates a potential for a loop An edge port normally should not receive BPDU packets If a BPDU packet is received it automatically loses edge port status Choosing the false parameter indicates that the port does not have edge port status P2P Choosing the Tr...

Page 120: ...opback Detection function is used to identify loops occurring between the Switch and a device that is directly connected to it This process is accomplished by the use of a Configuration Testing Protocol CTP packet that is generated by the switch Users may set the dispatching time interval of the CTP packet and once a CTP packet has returned to the port from where it originated the Loopback Detecti...

Page 121: ...seconds The user may also enter a time of 0 which means that the port can only be recovered manually by the user This is done by going to the Port Configuration folder located in the Administration folder and manually enabling these ports using the Port Settings window From To Choose a port or group of ports that are to be enabled for the Loopback Detection function State Use the pull down menu to...

Page 122: ...termines the queue to which it will be assigned Priority tags are given values from 0 to 7 with 0 being assigned to the lowest priority data and 7 assigned to the highest The highest priority tag 7 is generally only used for data associated with video or audio applications which are sensitive to even slight delays or for data from specified end users whose data transmissions warrant special consid...

Page 123: ...witch Class 3 has the highest priority of the four priority classes of service on the Switch In order to implement CoS the user is required to instruct the Switch to examine the header of a packet to see if it has the proper identifying tag Then the user may forward these tagged packets to designated classes of service on the Switch where they will be emptied based on priority For example if a use...

Page 124: ...since any lower priority packets have been transmitted By default the Switch is configured to empty the buffer using strict priority NOTICE The default CoS scheduling arrangement is a strict priority schedule which means the switch will consider the highest class of service to have strict scheduling only while the other queues empty in a round robin method See the config scheduling_mechanism comma...

Page 125: ...rnet Switch Manual 112 Port Bandwidth The bandwidth control settings are used to place a ceiling on the transmitting and receiving data rates for any selected port To view this table click CoS Port Bandwidth Figure 8 2 Bandwidth Settings and Port Bandwidth Table window ...

Page 126: ...termine whether the bandwidth ceiling is applied to receiving transmitting or both receiving and transmitting packets No Limit This drop down menu allows you to specify that the selected port will have no bandwidth limit Enabled disables the limit Rate This field allows you to enter the data rate in Kbit s that will be the limit for the selected port The user may choose a rate between 64 and 10240...

Page 127: ...ority Figure 8 3 802 1p Default Priority and the 802 1p Default Priority window This page allows you to assign a default 802 1p priority to any given port on the Switch The priority tags are numbered from 0 the lowest priority to 7 the highest priority To implement a new default priority choose a port range by using the From and To pull down menus and then insert a priority value from 0 7 in the P...

Page 128: ...nism This drop down menu allows you to select between a Weight Fair and a Strict mechanism for emptying the priority classes To view this window click CoS CoS Scheduling Mechanism Figure 8 5 CoS Scheduling Mechanism and CoS Scheduling Mechanism Table window NOTICE The default CoS scheduling arrangement is a strict priority schedule for the highest class Class 3 which means the Switch will consider...

Page 129: ...ce is affected Changes in scheduling may result in unacceptable levels of packet loss or significant transmission delay If you choose to customize this setting it is important to monitor network performance especially during peak demand as bottlenecks can quickly develop if the CoS settings are not suitable To view this window click CoS CoS Output Scheduling Figure 8 6 CoS Output Scheduling Config...

Page 130: ... example if a port has been assigned a MAC priority the packet that has the CoS priority assigned to a MAC address will be sent to the CoS queue configured for that MAC address Once the configuration has been completed users may see the results in the Priority Settings Table seen here After configuring the port priorities users may adjust the individual CoS settings on the other windows located in...

Page 131: ...priorities MAC Base Choosing this option will assign ports to map CoS priorities to MAC addresses tos Choosing this option will assign ports to map CoS priorities to ToS priorities dscp Choosing this option will assign ports to map CoS priorities to DSCP priorities Click Apply to implement changes made TOS Priority Settings Use the TOS Priority Settings menu to configure ToS priority mapping for C...

Page 132: ...e Switch When a packet is received containing this DSCP tag it will be mapped to the CoS queue configured here These settings will only take effect if at least one of the priority settings per port is configured for DSCP Type the DSCP bit level and the Class ID priority from the pull down menu mapped to and click the Apply button The new mapping is displayed in the DSCP Priority Table below To vie...

Page 133: ...s been previously configured for the selected ports in the Priority Setting menu There are two Class of Service levels available To view this table click CoS Port Mapping Priority Settings Figure 8 10 Port Mapping Priority CoS Use the From To menu to select the ports being configured the selected ports must first be configured for port based priority in the Priority Setting menu Select the Class l...

Page 134: ...nformation 2 Once a destination MAC has been added to the FDB users must then configure the appropriate queue to be mapped to this destination MAC address using the following window 3 Once the previous parameters are set users should go to the Priority Settings window located in this folder and set the egress ports on the switch to MAC Priority These ports must only be set for MAC Priority and not...

Page 135: ...eating an access profile for the CPU is divided into two basic parts The first is to specify which part or parts of a frame the Switch will examine such as the MAC source address or the IP destination address The second part is entering the criteria the Switch will use to determine what to do with the frame The entire process is described below CPU Interface Filtering State Settings In the followi...

Page 136: ...le ID 1 3 Type in a unique identifier number for this profile set This value can be set from 1 3 Type Select profile based on Ethernet MAC Address IP address or packet content mask This will change the menu according to the requirements for the type of profile Select Ethernet to instruct the Switch to examine the layer 2 part of each packet header Select IP to instruct the Switch to examine the IP...

Page 137: ... Type Select profile based on Ethernet MAC Address IP address or Packet Content Mask This will change the menu according to the requirements for the type of profile Select Ethernet to instruct the Switch to examine the layer 2 part of each packet header Select IP to instruct the Switch to examine the IP address in each frame s header Select Packet Content Mask to specify a mask to hide the content...

Page 138: ...ecting TCP requires that you specify a source port mask and or a destination port mask The user may also identify which flag bits to filter Flag bits are parts of a packet that determine what to do with the packet The user may filter packets by filtering certain flag bits within the packets by checking the boxes corresponding to the flag bits of the TCP field The user may choose between urg urgent...

Page 139: ...equirements for the type of profile Select Ethernet to instruct the Switch to examine the layer 2 part of each packet header Select IP to instruct the Switch to examine the IP address in each frame s header Select Packet Content Mask to specify a mask to hide the content of the packet header Offset This field will instruct the Switch to mask the packet header beginning with the offset value specif...

Page 140: ...a previously created CPU access profile by clicking the corresponding Modify button of the entry to configure Ethernet IP and Packet Content Each entry will open a new and unique window as shown in the examples below Figure 9 7 CPU Interface Filtering Table Ethernet To create a new rule set for an access profile click the Add button A new window is displayed To remove a previously created rule cli...

Page 141: ...ontent Mask instructs the Switch to examine the packet header VLAN Name Allows the entry of a name for a previously configured VLAN Source MAC Source MAC Address Enter a MAC Address for the source MAC address Destination MAC Destination MAC Address Enter a MAC Address mask for the destination MAC address 802 1p Specifies that the access profile will apply only to packets with this 802 1p priority ...

Page 142: ...s Rule Configuration settings for IP Parameter Description Profile ID This is the identifier number for this profile set Mode Select Permit to specify that the packets that match the access profile are forwarded by the Switch according to any additional rule added see below Select Deny to specify that packets that match the access profile are not forwarded by the Switch and will be filtered Access...

Page 143: ...ess DSCP 0 63 Enter the DSCP bit for which to identify incoming packets The user may choose a DSCP bit between 0 63 Port The Access Rule may be configured on a per port basis by entering the port number of the Switch into this field Entering all will denote all ports on the Switch To view the settings of a previously correctly configured rule click in the Access Rule Table to view the following sc...

Page 144: ...ct Deny to specify that packets that match the access profile are not forwarded by the Switch and will be filtered Access ID Type in a unique identifier number for this access This value can be set from 1 5 Type Selected profile based on Ethernet MAC Address IP address or Packet Content Ethernet instructs the Switch to examine the layer 2 part of each packet header IP instructs the Switch to exami...

Page 145: ...o byte 63 value 64 79 Enter a value in hex form to mask the packet from byte 64 to byte 79 Port The Access Rule may be configured on a per port basis by entering the port number of the Switch into this field Entering all will denote all ports on the Switch To view the settings of a previously correctly configured rule click in the Access Rule Table to view the following screen Figure 9 15 CPU Inte...

Page 146: ...ackets and Broadcast packets continually flood the network as normal procedure At times this traffic may increase do to a malicious end station on the network or a malfunctioning device such as a faulty network card Thus switch throughput problems will arise and consequently affect the overall performance of the switch network To help rectify this packet storm the Switch will monitor and control t...

Page 147: ...overing the port The Count Down field may be disabled by entering a value of 0 zero If this field times out and the packet storm continues the port will be placed in a Shutdown Forever mode which will produce a warning message to be sent to the Trap Receiver Once in Shutdown Forever mode the user may recover the affected ports by using the Traffic Control Recover section of the previous window and...

Page 148: ...hardware Traffic Control mechanism which means the Switch s hardware will determine the Packet Storm based on the Threshold value stated and drop packets until the issue is resolved Shut Down Utilizes the Switch s software Traffic Control mechanism to determine the Packet Storm occurring Once detected the port will deny all incoming traffic to the port except STP BPDU packets which are essential i...

Page 149: ...or Link Aggregation Port Trunking NOTE Ports that are in the Shutdown Forever mode will be seen as Discarding in Spanning Tree windows and implementations though these ports will still be forwarding BPDUs to the Switch s CPU NOTE Ports that are in Shutdown Forever mode will be seen as link down in all windows and screens until the user recovers these ports ...

Page 150: ... the Admin State pull down menu to Enabled and clicking Apply Port Security is a security feature that prevents unauthorized computers with source MAC addresses unknown to the Switch prior to locking the port or ports from connecting to the Switch s locked ports and gaining access to the network To view the following window click Security Port Security Figure 10 2 Port Security Settings and Table ...

Page 151: ...s pull down menu allows you to select how the MAC address table locking will be implemented on the Switch for the selected group of ports The options are Permanent The locked addresses will not age out after the aging timer expires DeleteOnTimeout The locked addresses will age out after the aging timer expires DeleteOnReset The locked addresses will not age out until the Switch has been reset Clic...

Page 152: ...der the Delete heading of the corresponding MAC address to be deleted Click the Next button to view the next page of entries listed in this table This window displays the following information Parameter Description VID The VLAN ID of the entry in the forwarding database table that has been permanently learned by the Switch VLAN NAME The VLAN Name of the entry in the forwarding database table that ...

Page 153: ...on Protocol over LAN EAPOL packets between the Client and the Server The following figure represents a basic EAPOL packet Figure 10 4 The EAPOL Packet Utilizing this method unauthorized devices are restricted from connecting to a LAN through a port to which the user is connected EAPOL packets are the only traffic that can be transmitted through the specific port until authorization is granted The ...

Page 154: ...whether or not the Client is granted access to the LAN and or switches services Figure 10 6 The Authentication Server Authenticator The Authenticator the Switch is an intermediary between the Authentication Server and the Client The Authenticator server has two purposes when utilizing 802 1X The first purpose is to request certification information from the Client through EAPOL packets which is th...

Page 155: ... stations must be running software that is compliant with the 802 1X protocol For users running Windows XP that software is included within the operating system All other users are required to attain 802 1X client software from an outside source The Client will request access to the LAN and or Switch through EAPOL packets and in turn will respond to requests from the Switch Figure 10 8 The Client ...

Page 156: ... traffic is allowed to pass through the port The following figure displays a more detailed explanation of how the authentication process is completed between the three roles stated above Figure 10 9 The 802 1X Authentication Process The D Link implementation of 802 1X allows network administrators to choose between two types of Access Control used on the Switch which are 1 Port Based Access Contro...

Page 157: ...ed This is the Port Based Network Access Control Port Based Network Access Control 802 1X Client 802 1X Client 802 1X Client 802 1X Client 802 1X Client 802 1X Client 802 1X Client 802 1X Client 802 1X Client Network access controlled port Network access uncontrolled port RADIUS Server Ethernet Switch Figure 10 10 Example of Typical Port Based Configuration Once the connected device has successful...

Page 158: ...iguration In order to successfully make use of 802 1X in a shared media LAN segment it would be necessary to create logical Ports one for each attached device that required access to the LAN The Switch would regard the single physical Port connecting it to the shared media segment as consisting of a number of distinct logical Ports each logical Port being independently controlled from the point of...

Page 159: ...ator Settings To configure the 802 1X authenticator settings click Security 802 1X 802 1X Authenticator Settings Figure 10 12 802 1X Authenticator Settings window To configure the settings by port click on the hyperlinked port number under the Port heading which will display the following table to configure ...

Page 160: ...ceives normal traffic without 802 1X based authentication of the client If forceUnauthorized is selected the port will remain in the unauthorized state ignoring all attempts by the client to authenticate The Switch cannot provide authentication services to the client through the interface If Auto is selected it will enable 802 1X and cause the port to begin in the unauthorized state allowing only ...

Page 161: ...ximum number of times that the Switch will retransmit an EAP Request to the client before it times out of the authentication sessions The default setting is 2 ReAuthPeriod A constant that defines a nonzero number of seconds between periodic re authentication of the client The default setting is 3600 seconds ReAuth Determines whether regular re authentication will take place on this port The defaul...

Page 162: ...ity 802 1X Local Users This window will allow the user to set different 802 1X local users on the Switch Figure 10 14 802 1X Local User Table Configuration and 802 1X Local User Table window Enter a User Name Password and confirmation of that password Properly configured local users will be displayed in the 802 1X Local User Table in the same window ...

Page 163: ...ports by selecting Authenticator from the drop down menu under Capability Click Apply to let your change take effect Configure the following 802 1X capability settings Parameter Description From and To Ports being configured for 802 1X settings Capability Two role choices can be selected Authenticator A user must pass the authentication process to gain access to the network None The port will not ...

Page 164: ... VLANs These VLANs should have limited access rights and features separate from other VLANs on the network To implement 802 1X Guest VLANs the user must first create a VLAN on the network with limited rights and then enable it as an 802 1X guest VLAN Then the administrator must configure the guest accounts accessing the Switch to be placed in a Guest VLAN when trying to access the Switch Upon init...

Page 165: ...802 1X Guest VLAN Operation The user has three choices in configuring the Guest 802 1X VLAN which are Enabled Selecting this option will enable ports listed in the Port List below as part of the Guest VLAN Be sure that these ports are configured for this VLAN or users will be prompted with an error message Disabled Selecting this option will disable ports listed in the Port List below as part of t...

Page 166: ...ndow displays the following information Parameter Description From and To Select ports to be initialized Port A read only field indicating a port on the Switch MAC Address The MAC address of the Switch connected to the corresponding port if any Auth PAE State The Authenticator PAE State will display one of the following Initialize Disconnected Connecting Authenticating Authenticated Aborting Held ...

Page 167: ...ation click Apply NOTE The user must first globally enable 802 1X in the DES 3026 Web Management Tool window before reauthenticating ports Information in the Initialize Ports Table cannot be viewed before enabling 802 1X NOTE The uplink module ports DES 3010F FL G ports 9 10 DES 3018 ports 17 18 DES 3026 ports 25 26 do not support the 802 1X function Reauthenticate Port s for Port Based 802 1X Thi...

Page 168: ...lly enable 802 1X in the DES 3026 Web Management Tool window before reauthenticating ports Information in the Reauthenticate Ports Table cannot be viewed before enabling 802 1X NOTE The uplink module ports DES 3010F G ports 9 10 DES 3018 ports 17 18 DES 3026 ports 25 26 do not support the 802 1X function Reauthenticate Port s for MAC based 802 1X To reauthenticate ports for the MAC side of 802 1X ...

Page 169: ...sion Choose the desired RADIUS server to configure First Second or Third RADIUS Server Set the RADIUS server IP Authentic Port Set the RADIUS authentic server s UDP port The default port is 1812 Accounting Port Set the RADIUS account server s UDP port The default port is 1813 Timeout 1 255 secs This value determines timeout conditions of the RADIUS Server The default setting is 5 seconds Retransmi...

Page 170: ...ent to permit remote stations to manage the Switch If you choose to define one or more designated management stations only the chosen stations as defined by IP address and Subnet Mask will be allowed management privilege through the web manager or Telnet session To define a management station IP setting type in the IP address and click the Apply button Click Del All to remove all IP addresses conf...

Page 171: ... a single Switch in standalone mode or a group of ports on another switch in a switch stack This method of segmenting the flow of traffic is similar to using VLANs to limit traffic but is more restrictive It provides a method of directing traffic that does not increase the overhead of the Master switch CPU To view this window click Security Traffic Segmentation Figure 10 24 Current Traffic Segment...

Page 172: ...e network services over an insecure network It allows a secure login to remote host computers a safe method of executing commands on a remote end node and will provide secure encrypted and authenticated communication between two non trusted hosts SSH with its array of unmatched security features is an essential tool in today s networking environment It is a powerful guardian against numerous exist...

Page 173: ...onnection TimeOut 120 600 Allows the user to set the connection timeout The use may set a time between 120 and 600 seconds The default setting is 120 seconds Auth Fail 2 20 Allows the Administrator to set the maximum number of attempts that a user may try to log on to the SSH Server utilizing the SSH authentication After the maximum number of attempts has been exceeded the Switch will be disconnec...

Page 174: ...rithm Settings Figure 10 27 SSH Server Authentication Mode and Algorithm Settings window The following algorithms may be set Parameter Description Authentication Algorithm Password This field may be enabled or disabled to choose if the administrator wishes to use a locally configured password for authentication on the Switch This field is Enabled by default Public Key This field may be enabled or ...

Page 175: ...ryption algorithm with Cipher Block Chaining The default is Enabled Cast128 CBC Use the pull down to enable or disable the Cast128 encryption algorithm with Cipher Block Chaining The default is Enabled Twofish128 Use the pull down to enable or disable the twofish128 encryption algorithm The default is Enabled Twofish192 Use the pull down to enable or disable the twofish192 encryption algorithm The...

Page 176: ...count MUST be set in order to set the parameters for the SSH user To configure the parameters for a SSH user click on the hyperlinked User Name in the Current Accounts window which will reveal the following window to configure Figure 10 29 SSH User Configuration Once a User Account has been configured return to the SSH User Authentication window which now displays the newly created account as show...

Page 177: ... Enter an alphanumeric string of no more than 32 characters to identify the remote SSH user Host IP Enter the corresponding IP address of the SSH user Password This parameter should be chosen if the administrator wishes to use an administrator defined password for authentication Upon entry of this parameter the Switch will prompt the administrator for a password and then to re type the password fo...

Page 178: ...tatus MAC Address Switch Log Log Settings IGMP Snooping Group Browse Router Port Browse ARP Table Session Table Port Access Control CPU Utilization The CPU Utilization displays the percentage of the CPU being used expressed as an integer percentage and calculated as a simple average by time interval To view this window click Monitoring CPU Utilization Figure 11 1 CPU Utilization graph ...

Page 179: ...ere s stands for seconds The default value is one second Record Number 200 Select number of times the Switch will be polled between 20 and 200 The default value is 200 Show Hide Check whether or not to display CPU utilization for five seconds one minute or five minutes Port Utilization The Port Utilization page displays the percentage of the total available bandwidth being used on the port To view...

Page 180: ...cription Time Interval Select the desired setting between 1s and 60s where s stands for seconds The default value is one second Record Number Select number of times the Switch will be polled between 20 and 200 The default value is 200 Click Clear to refresh the graph Click Apply to implement changes made ...

Page 181: ... the graph of packets received on the Switch To select a port to view these statistics for use the Port pull down menu The user may also use the real time graphic of the Switch at the top of the web page by simply clicking on a port To view this window click Monitoring Packets Received RX Figure 11 3 Rx Packets Analysis window line graph for Bytes and Packets To view the Received Packets Table cli...

Page 182: ... on the port Packets Counts the number of packets received on the port Unicast Counts the total number of good packets that were received by a unicast address Multicast Counts the total number of good packets that were received by a multicast address Broadcast Counts the total number of good packets that were received by a broadcast address Show Hide Check whether to display Bytes and Packets Clea...

Page 183: ...ort to view these statistics for use the Port pull down menu The user may also use the real time graphic of the Switch at the top of the web page by simply clicking on a port To view this graph click Monitoring Packets UMB Cast RX Figure 11 5 Rx Packets Analysis window line graph for Unicast Multicast and Broadcast Packets To view the UMB Cast Table click the View Table link which will show the fo...

Page 184: ... The default value is 200 Unicast Counts the total number of good packets that were received by a unicast address Multicast Counts the total number of good packets that were received by a multicast address Broadcast Counts the total number of good packets that were received by a broadcast address Show Hide Check whether or not to display Multicast Broadcast and Unicast Packets Clear Clicking this ...

Page 185: ...To view statistics for a specific port use the Port pull down menu The user may also use the real time graphic at the top of the web page by simply clicking on a port To view this graph click Monitoring Packets Transmitted TX Figure 11 7 Tx Packets Analysis window line graph for Bytes and Packets To view the Transmitted TX Table click the link View Table which will show the following table ...

Page 186: ...y sent from the port Packets Counts the number of packets successfully sent on the port Unicast Counts the total number of good packets that were transmitted by a unicast address Multicast Counts the total number of good packets that were transmitted by a multicast address Broadcast Counts the total number of good packets that were transmitted by a broadcast address Show Hide Check whether or not ...

Page 187: ... The table displays the error packets received on the Switch To view statistics for a specific port select the port by using the Port pull down menu The user may also use the real time graphic of the Switch at the top of the web page by simply clicking on a port To view this window click Monitoring Packet Errors Received RX Figure 11 9 Rx Error Analysis window line graph To view the Received Error...

Page 188: ...twork occurrence OverSize Counts packets received that were longer than 1518 octets or if a VLAN frame is 1522 octets and less than the MAX_PKT_LEN Internally MAX_PKT_LEN is equal to 1522 Fragment The number of packets less than 64 bytes with either bad framing or an invalid CRC These are normally the result of collisions Jabber The number of packets with lengths more than the MAX_PKT_LEN bytes In...

Page 189: ...a specific port select the port by using the Port pull down menu The user may also use the real time graphic of the Switch at the top of the web page by simply clicking on a port To view this window click Monitoring Packet Errors Transmitted TX Figure 11 11 Tx Error Analysis window line graph To view the Transmitted Error Packets Table click the link View Table which will show the following table ...

Page 190: ...n a byte octet boundary LateColl Counts the number of times that a collision is detected later than 512 bit times into the transmission of a packet ExColl Excessive Collisions The number of packets for which transmission failed due to excessive collisions SingColl Single Collision Frames The number of successfully transmitted packets for which transmission is inhibited by more than one collision C...

Page 191: ...sed by size to be viewed as either a line graph or a table Two windows are offered To select a port to view these statistics for select the port by using the Port pull down menu The user may also use the real time graphic of the Switch at the top of the web page by simply clicking on a port To view this window click Monitoring Packet Size Figure 11 13 Rx Size Analysis window line graph ...

Page 192: ... number of packets including bad packets received that were between 128 and 255 octets in length inclusive excluding framing bits but including FCS octets 256 511 The total number of packets including bad packets received that were between 256 and 511 octets in length inclusive excluding framing bits but including FCS octets 512 1023 The total number of packets including bad packets received that ...

Page 193: ...for each of the Switch s ports to be viewed by VLAN This window displays the ports on the Switch that are currently Egress E or Tag T ports To view the following table click Monitoring VLAN Status Figure 11 15 VLAN Status window Enter the VLAN Name and or the VID and click Find the information will be displayed in the table below ...

Page 194: ... the port is a member MAC Address The MAC address entered into the address table Port The port to which the MAC address above corresponds Type Describes the method which the Switch discovered the MAC address The possible entries are Dynamic Self and Static Next Click this button to view the next page of the address table View All Entry Clicking this button will allow the user to view all entries o...

Page 195: ...n its own logs to designated SNMP trap receiving stations and to the PC connected to the console manager Clicking Clear will allow the user to clear the Switch History Log The information is described as follows Parameter Description Sequence A counter incremented whenever an entry to the Switch s history log is made The table displays the last entry highest sequence number first Time Displays the...

Page 196: ...down menu to select the desired method to save log files The user has three options on_demand Specifies that logs are saved when requested by the host receiving the log log_trigger Specifies that logs are saved when previously configured triggers require the log to be saved to the Syslog host Use the config syslog host command to determine what triggers are used time_interval Choose this option to...

Page 197: ...Snooping Group Table The user may search the IGMP Snooping Group Table by VID by entering it in the top left hand corner and clicking Search The following field can be viewed Parameter Description VLAN ID The VLAN ID of the multicast group Multicast Group The IP address of the multicast group MAC Address The MAC address of the multicast group Reports The total number of reports received for this g...

Page 198: ...ng Browse Router Port Figure 11 20 Browse Router Port window Browse ARP Table This window will show all current ARP entries on the Switch To clear the ARP Table click Clear All To view this table click Monitoring Browse ARP Table Figure 11 21 Browse ARP Table window Session Table The Session Table allows the user to view detailed information about the current configuration session of the Switch In...

Page 199: ...y in the DES 3026 Web Management Tool RADIUS Authentication This table contains information concerning the activity of the RADIUS authentication client on the client side of the RADIUS authentication protocol It has one row for each RADIUS authentication server that the client shares a secret with To view the RADIUS Authentication click Monitoring Port Access Control RADIUS Authentication Figure 1...

Page 200: ...Challenge and the Access Request that matched it from this RADIUS authentication server AccessRetrans The number of RADIUS Access Request packets retransmitted to this RADIUS authentication server PendingRequests The number of RADIUS Access Request packets destined for this server that have not yet timed out or received a response This variable is incremented when an Access Request is sent and dec...

Page 201: ...t may retry to the same server send to a different server or give up A retry to the same server is counted as a retransmit as well as a timeout A send to a different server is counted as an Accounting Request as well as a timeout Requests The number of RADIUS Accounting Request packets sent This does not include retransmissions Responses The number of RADIUS packets received on the accounting port...

Page 202: ...this server on the accounting port and dropped for some other reason Auth Diagnostics This table contains the diagnostic information regarding the operation of the Authenticator associated with each port An entry appears in this table for each port that supports the Authenticator function To view the Authenticator Diagnostics click Monitoring Port Access Control Auth Diagnostics Figure 11 25 Authe...

Page 203: ...entication request reAuthenticate TRUE EapStartsAuthenticating Counts the number of times that the state machine transitions from AUTHENTICATING to ABORTING as a result of an EAPOL Start message being received from the Supplicant EapLogOffAuthenticating Counts the number of times that the state machine transitions from AUTHENTICATING to ABORTING as a result of an EAPOL Logoff message being receive...

Page 204: ... receives an Accept message from the Authentication Server i e aSuccess becomes TRUE causing a transition from RESPONSE to SUCCESS Indicates that the Supplicant has successfully authenticated to the Authentication Server AuthFails Counts the number of times that the state machine receives a Reject message from the Authentication Server i e aFail becomes TRUE causing a transition from RESPONSE to F...

Page 205: ...Reauthentication Failure 5 AuthControlledPortControl set to ForceUnauthorized 6 Port re initialization 7 Port Administratively Disabled 8 Not Terminated Yet Octets Rx The number of octets received in user data frames on this port during the session Octets Tx The number of octets transmitted in user data frames on this port during the session ID A unique identifier for the session in the form of a ...

Page 206: ...ed by this Authenticator Frames Tx The number of EAPOL frames that have been transmitted by this Authenticator Rx Start The number of EAPOL Start frames that have been received by this Authenticator TxReqId The number of EAP Req Id frames that have been transmitted by this Authenticator RxLogOff The number of EAPOL Logoff frames that have been received by this Authenticator Tx Req The number of EA...

Page 207: ...Authenticator in which the frame type is not recognized Rx Error The number of EAPOL frames that have been received by this Authenticator in which the Packet Body Length field is invalid Last Version The protocol version number carried in the most recently received EAPOL frame Last Source The source MAC address carried in the most recently received EAPOL frame ...

Page 208: ...ES 3026 Fast Ethernet Switch Manual 195 Auth State The following section describes the 802 1X Status on the Switch To view the Authenticator State click Monitoring Port Access Control Auth State Figure 11 28 Authenticator State window Port based 802 1X ...

Page 209: ...nu at the top of the window and clicking OK The information on this window is described as follows Parameter Description MAC Address Displays the Authenticator MAC address Auth PAE State The Authenticator PAE State value can be Initialize Disconnected Connecting Authenticating Authenticated Aborting Held Force_Auth or Force_Unauth Backend State The Backend Authentication State can be Request Respo...

Page 210: ... configuration parameters to their factory defaults Figure 11 30 Factory Reset to Default Value window NOTE Only the Reset System option will enter the factory default parameters into the Switch s non volatile RAM and then restart the Switch All other options enter the factory defaults into the current configuration but do not save this configuration Reset System will return the Switch s configura...

Page 211: ...from the last time Save Changes was executed will be lost Click the Restart button to restart the Switch Save Changes The Switch has two levels of memory normal RAM and non volatile or NV RAM Some settings require you to restart the Switch before they will take effect Restarting the Switch erases all settings in RAM and reloads the stored settings from the NV RAM Thus it is necessary to save all s...

Page 212: ...010G DES 3016 DES 3018 DES 3026 Fast Ethernet Switch Manual 199 Logout The following window is used to logout of the Switch Clicking the Logout button will return the user to the main login page Figure 11 33 Reboot System window ...

Page 213: ...ion DES 3010FL 14 8W DES 3010F 15W DES 3010G 14 8W DES 3016 11W DES 3018 15 2W DES 3026 17W Operating Temperature 0 to 40 degrees Celsius Storage Temperature 40 to 70 degrees Celsius Humidity Operating 5 to 95 RH non condensing Storage 0 to 95 RH non condensing Dimensions DES 3010F FL 280 mm x 180 mm x 44 mm 1U 11 inch rack mount width DES 3016 DES 3018 3026 441 mm x 207mm x 44 mm 1U 19 inch rack ...

Page 214: ...Mbps n a 2000Mbps Network Cables 10BASE T 100BASE TX 2 pair UTP Cat 3 4 5 100 m EIA TIA 568 100 ohm STP 100 m 2 pair UTP Cat 5 100 m EIA TIA 568 100 ohm STP 100 m Number of Ports DES 3010F FL 8 x 10 100 Mbps NWay ports 1 x 1000BASE T Gigabit Port 1 x 100BASE FX Fiber Optic Port DES 3010G 8 x 10 100 Mbps NWay ports 1 x 1000BASE T Gigabit Port 1 x SFP Fiber Optic Port DES 3016 16 x 10 100 Mbps NWay ...

Page 215: ...ual 202 Performance Transmission Method Store and forward RAM Buffer 32M Bytes per device Filtering Address Table 8K MAC address per device Packet Filtering Forwarding Rate 14 880 pps per 10Mbps 148 809 pps per 100Mbps 1 488 100 pps per 1000Mbps MAC Address Learning Automatic update ...

Page 216: ...view these products for matching cable pin assignment The following diagrams and tables show the standard RJ 45 receptacle connector and their pin assignments Appendix 1 1 The standard RJ 45 port and connector RJ 45 Pin Assignments Contact MDI X Port MDI II Port 1 BI DB BI DA 2 BI DB BI DA 3 BI DA BI DB 4 BI DD BI DC 5 BI DD BI DC 6 BI DA BI DB 7 BI DC BI DD 8 BI DC BI DD Appendix 1 2 The standard...

Page 217: ...al by console and IP ipaddr MAC macaddr are XOR shown in log string which means if user login by console there will no IP and MAC information for logging V 15 up down load Firmware upgraded successfully Unit unitID Firmware upgraded by console successfully Username username IP ipaddr MAC macaddr Informational by console and IP ipaddr MAC macaddr are XOR shown in log string which means if user logi...

Page 218: ... if user login by console will no IP and MAC information for logging V 22 Log message upload was unsuccessful Log message upload by console was unsuccessful Username username IP ipaddr MAC macaddr Warning by console and IP ipaddr MAC macaddr are XOR shown in log string which means if user login by console will no IP and MAC information for logging V 23 Interface Port link up Port unitID portNum li...

Page 219: ...username IP ipaddr MAC macaddr Warning V 44 Logout through Telnet Logout through Telnet Username username IP ipaddr MAC macaddr Informational V 45 Telnet session timed out Telnet session timed out Username username IP ipaddr MAC macaddr Informational V 46 SNMP SNMP request received with invalid community string SNMP request received from ipAddress with invalid community string Informational 47 STP...

Page 220: ...unitID portNum Multicast storm has cleared Informational 154 Port shut down due to a packet storm Port unitID portNum is currently shut down due to a packet storm Warning 154 LBD CTP detect port loop Configuration Testing Protocol detects a loop in port unitID portNum Warning 166 802 1X VID assigned from radius server after radius client authenticated by radius server successfully This VID will as...

Page 221: ...o the port Radius server ipaddr assigned 802 1p deafult priority priority to port unitID portNum account username Informational This log will be generated when 802 1X authentication is successful and the 802 1p default priority is assigned from the RADIUS server 170 802 1X Authentication failure 802 1X Authentication failure for reason from Username username Port unitID portNum MAC macaddr Warning...

Page 222: ...ngths Standard Media Type Maximum Distance Mini GBIC 1000BASE LX Single mode fiber module 1000BASE SX Multi mode fiber module 1000BASE LHX Single mode fiber module 1000BASE ZX Single mode fiber module 10km 550m 40km 80km 1000BASE T Category 5e UTP Cable Category 5 UTP Cable 1000 Mbps 100m 100BASE TX Category 5 UTP Cable 100 Mbps 100m 10BASE T Category 3 UTP Cable 10 Mbps 100m ...

Page 223: ...d IEEE 802 3 standards in which devices transmit only after finding the data channel clear for some period of time When two devices transmit simultaneously a collision occurs and the colliding devices delay their retransmissions for a random amount of time data center switching The point of aggregation within a corporate network where a switch provides high performance access to server farms a hig...

Page 224: ...ational and enabled if the main paths fail stack A group of network devices that are integrated to form a single logical device standby port The port in a resilient link that will take over data transmission if the main port in the link fails switch A device which filters forwards and floods packets based on the packet s destination address The switch learns the addresses associated with each swit...

Page 225: ...livered If a material defect is incapable of correction or if D Link determines in its sole discretion that it is not practical to repair or replace the defective Hardware the price paid by the original purchaser for the defective Hardware will be refunded by D Link upon return to D Link of the defective Hardware All Hardware or part thereof that is replaced by D Link or for which the purchase pri...

Page 226: ...Link s reasonable handling and return shipping charges for any product that is not packaged and shipped in accordance with the foregoing requirements or that is determined by D Link not to be defective or non conforming What Is Not Covered This limited warranty provided by D Link does not cover Products that have been subjected to abuse accident alteration modification tampering negligence misuse ...

Page 227: ... to state Trademarks Copyright 2008 D Link Corporation Contents subject to change without prior notice D Link is a registered trademark of D Link Corporation D Link Systems Inc All other trademarks belong to their respective proprietors Copyright Statement No part of this publication may be reproduced in any form or by any means or used to make any derivative such as translation transformation or ...

Page 228: ...ty of Warranty The Limited Warranty provided hereunder for Hardware and Software portions of D Link s products will not be applied to and does not cover any refurbished product and any product purchased through the inventory clearance or liquidation sale or other sales in which D Link the sellers or the liquidators expressly disclaim their warranty obligation pertaining to the product and in that ...

Page 229: ...ns on how long an implied warranty lasts so the foregoing limitations and exclusions may not apply This Limited Warranty provides specific legal rights and you may also have other rights which vary from state to state Trademarks D Link is a registered trademark of D Link Systems Inc Other trademarks or registered trademarks are the property of their respective owners Copyright Statement No part of...

Page 230: ...Registration Register your D Link product online at http support dlink com register Product registration is entirely voluntary and failure to complete or return this form will not diminish your warranty rights ...

Page 231: ...tomers can contact D Link technical support through our website or by phone Tech Support for customers within the United States D Link Technical Support over the Telephone 877 354 6555 Monday to Friday 8 00am to 5 00pm PST D Link Technical Support over the Internet http support dlink com email support dlink com Tech Support for customers within Canada D Link Technical Support over the Telephone 1 ...

Page 232: ... BT 10ppm UK Pence per minute other carriers may vary Times Mon Fri 9 00am 6 00pm Sat 10 00am 2 00pm 1890 886 899 Ireland 0 05ppm peak 0 045ppm off peak Times Mon Fri 9 00am 6 00pm Sat 10 00am 2 00pm D Link UK Ireland Technical Support over the Internet http www dlink co uk ftp ftp dlink co uk ...

Page 233: ... Link D Link bietet kostenfreie technische Unterstützung für Kunden innerhalb Deutschlands Österreichs der Schweiz und Osteuropas Unsere Kunden können technische Unterstützung über unsere Website per E Mail oder telefonisch anfordern Telefon 49 1805 2787 0 14 pro Minute Web http www dlink de E Mail support dlink de ...

Page 234: ...ez contacter le service technique de D Link par notre site internet ou par téléphone Assistance technique D Link par téléphone 0 820 0803 03 0 12 min Hours Monday Friday 9h to 13h and 14h to 19h Saturday 9h to 13h and from 14h to 16h Assistance technique D Link sur internet Web http www dlink fr E mail support dlink fr ...

Page 235: ... sitio web de D Link D Link ofrece asistencia técnica gratuita para clientes residentes en España durante el periodo de garantía del producto Asistencia Técnica de D Link por teléfono 34 902 30 45 45 0 067 min Lunes a Viernes de 9 00 a 14 00 y de 15 00 a 18 00 Web http www dlink es E mail soporte dlink es ...

Page 236: ... Gli ultimi aggiornamenti e la documentazione sono disponibili sul sito D Link Supporto Tecnico dal lunedì al venerdì dalle ore 9 00 alle ore 19 00 con orario continuato Telefono 199400057 Web http www dlink it support ...

Page 237: ...ustomers within Benelux for the duration of the warranty period on this product Benelux customers can contact D Link technical support through our website or by phone Netherlands 0900 501 2007 0 15ppm anytime Web www dlink nl Belgium 070 66 06 40 0 175ppm peak 0 0875ppm off peak Web www dlink be Luxemburg 32 70 66 06 40 Web www dlink be ...

Page 238: ...ną pomoc techniczną klientom w Polsce w okresie gwarancyjnym produktu Klienci z Polski mogą się kontaktować z działem pomocy technicznej firmy D Link za pośrednictwem Internetu lub telefonicznie Telefoniczna pomoc techniczna firmy D Link 0 801 022 021 Pomoc techniczna firmy D Link świadczona przez Internet Web http www dlink pl E mail dlink fixit pl ...

Page 239: ...tuje svým zákazníkům bezplatnou technickou podporu Zákazníci mohou kontaktovat oddělení technické podpory přes webové stránky mailem nebo telefonicky Telefon 225 281 553 Land Line 1 78 CZK min Mobile 5 40 CZK min Telefonická podpora je v provozu PO PÁ od 09 00 do 17 00 Web http www dlink cz suppport E mail support dlink cz ...

Page 240: ...gatás Meghajtó programokat és frissítéseket a D Link Magyarország weblapjáról tölthet le Tel 06 1 461 3001 Fax 06 1 461 3004 Land Line 14 99 HUG min Mobile 49 99 HUF min Web http www dlink hu E mail support dlink hu ...

Page 241: ...s web sider D Link tilbyr sine kunder gratis teknisk support under produktets garantitid Kunder kan kontakte D Links teknisk support via våre hjemmesider eller på tlf D Link Teknisk telefon Support 800 10 610 Hverdager 08 00 20 00 D Link Teknisk Support over Internett Web http www dlink no ...

Page 242: ...er gratis teknisk support til kunder i Danmark i hele produktets garantiperiode Danske kunder kan kontakte D Link s tekniske support via vores hjemmeside eller telefonisk D Link teknisk support over telefonen Tlf 7026 9040 Åbningstider kl 08 00 20 00 D Link teknisk support på Internettet Web http www dlink dk ...

Page 243: ...ea asiakkaille Suomessa D Link tarjoaa teknistä tukea asiakkailleen Tuotteen takuun voimassaoloajan Tekninen tuki palvelee seuraavasti numerosta 0800 114 677 Arkisin klo 9 21 Internetin kautta Web http www dlink fi ...

Page 244: ...uppdateringar och annan användarinformation D Link tillhandahåller teknisk support till kunder i Sverige under hela garantitiden för denna produkt D Link Teknisk Support via telefon 0770 33 00 35 Vardagar 08 00 20 00 D Link Teknisk Support via Internet Web http www dlink se ...

Page 245: ...ção de utilizador no site de D Link Portugal http www dlink pt A D Link fornece suporte técnico gratuito para clientes no Portugal durante o período de vigência de garantia deste produto Assistência Técnica da D Link na Internet Web http www dlink pt E mail soporte dlink es ...

Page 246: ...ink Η D Link προσφέρει στους πελάτες της δωρεάν υποστήριξη στον Ελλαδικό χώρο Μπορείτε να επικοινωνείτε με το τμήμα τεχνικής υποστήριξης μέσω της ιστοσελίδας ή μέσω τηλεφώνου D Link Hellas Support Center Κεφαλληνίας 64 11251 Αθήνα Τηλ 210 86 11 114 Δευτέρα Παρασκευή 09 00 17 00 Φαξ 210 8611114 Web http www dlink gr support ...

Page 247: ...ehnička podrška Hvala vam na odabiru D Link proizvoda Za dodatne informacije podršku i upute za korištenje uređaja molimo vas da posjetite D Link internetsku stranicu na www dlink eu Web www dlink biz hr ...

Page 248: ...hnična podpora Zahvaljujemo se vam ker ste izbrali D Link proizvod Za vse nadaljnje informacije podporo ter navodila za uporabo prosimo obiščite D Link ovo spletno stran www dlink eu Web www dlink biz sl ...

Page 249: ...Suport tehnica Vă mulţumim pentru alegerea produselor D Link Pentru mai multe informaţii suport şi manuale ale produselor vă rugăm să vizitaţi site ul D Link www dlink eu Web www dlink ro ...

Page 250: ...p www dlink co in support productsupport aspx Indonesia Malaysia Singapore and Thailand Tel 62 21 5731610 Indonesia Tel 1800 882 880 Malaysia Tel 65 66229355 Singapore Tel 66 2 719 8978 9 Thailand Monday to Friday 9 00am to 6 00pm http www dlink com sg support e mail support dlink com sg Korea Tel 82 2 890 5496 Monday to Friday 9 00am to 6 00pm http www d link co kr e mail lee d link co kr New Zea...

Page 251: ...l support e mail support dlink co il Pakistan Tel 92 21 4548158 or 92 21 4548310 Sunday to Thursday 9 00am to 6 00pm http support dlink me com e mail support pk dlink me com South Africa and Sub Sahara Region Tel 27 12 665 2165 08600 DLINK for South Africa only Monday to Friday 8 30am to 9 00pm South Africa Time http www d link co za Turkey Tel 90 212 2895659 Monday to Friday 9 00am to 6 00pm http...

Page 252: ...Link D Link предоставляет бесплатную поддержку для клиентов в течение гарантийного срока Клиенты могут обратиться в группу технической поддержки D Link по телефону или через Интернет Техническая поддержка D Link 495 744 00 99 Техническая поддержка через Интернет http www dlink ru e mail support dlink ru ...

Page 253: ... Desk Colombia Teléfono 01800 9525465 Lunes a Viernes 07 00 am a 20 00 pm Soporte Técnico Help Desk Costa Rica Teléfono 0800 0521478 Lunes a Viernes 06 00 am a 19 00 pm Soporte Técnico Help Desk Ecuador Teléfono 1800 035465 Lunes a Viernes 07 00 am a 20 00 pm Soporte Técnico Help Desk El Salvador Teléfono 800 6335 Lunes a Viernes 06 00 am a 19 00 pm Soporte Técnico Help Desk Guatemala Teléfono 180...

Page 254: ...brasil com br A D Link fornece suporte técnico gratuito para clientes no Brasil durante o período de vigência da garantia deste produto Suporte Técnico para clientes no Brasil Telefone São Paulo 11 2185 9301 Segunda à sexta Das 8h30 às 18h30 Demais Regiões do Brasil 0800 70 24 104 E mail e mail suporte dlinkbrasil com br ...

Page 255: ...方式與 D Link台灣地區技術支援工程師聯絡 D Link 免付費技術諮詢專線 0800 002 615 服務時間 週一至週五 早上8 30到晚上9 00 不含周六 日及國定假日 網 站 http www dlink com tw 電子郵件 dssqa_service dlink com tw 如果您是台灣地區以外的用戶 請參考D Link網站全球各地 分公司的聯絡資訊以取得相關支援服務 產品保固期限 台灣區維修據點查詢 請參考以下網頁說 明 http www dlink com tw 產品維修 使用者可直接送至全省聯強直營維修站或請洽您的原購買經銷商 ...

Page 256: ...okumentasi pengguna dapat diperoleh pada situs web D Link Dukungan Teknis untuk pelanggan Dukungan Teknis D Link melalui telepon Tel 62 21 5731610 Dukungan Teknis D Link melalui Internet Email support dlink co id Website http support dlink co id ...

Page 257: ... 北京市东城区北三环东路36号 环球贸易中心B 座26F 02 05室 邮编 100013 技术支持中心电话 8008296688 028 66052968 技术支持中心传真 028 85176948 维修中心地址 北京市东城区北三环东路36号 环球贸易中心B座26F 02 05室 邮编 100013 维修中心电话 010 58257789 维修中心传真 010 58257790 网址 http www dlink com cn 办公时间 周一到周五 早09 00到晚18 00 ...

Page 258: ... Avenida Diagonal 593 95 9th floor 08014 Barcelona Spain TEL 34 93 409 07 70 FAX 34 93 491 07 95 URL www dlink es Sweden Gustavslundsvägen 151B S 167 51 Bromma Sweden TEL 46 0 8 564 619 00 FAX 46 0 8 564 619 01 URL www dlink se Switzerland Glatt Tower 2 OG Postfach CH 8301 Glattzentrum Switzerland TEL 41 0 1 832 11 00 FAX 41 0 1 832 11 01 URL www dlink ch Singapore 1 International Business Park 03...

Page 259: ..._____________ ____________________________________________________________________________________________________________________ ____________________________________________________________________________________________________________________ Answers to the following questions help us to support your product 1 Where and how will the product primarily be used Home Office Travel Company Busines...

Page 260: ...247 ...

Reviews: