background image

 

 
 
 
 
 
 
 
 

 

 
 
 
 
 
 

 
 

 
 

 
 
 

 
 
 
 
 
 
 

Suporte Técnico 

Voc

ê

 pode encontrar atualiza

çõ

es de software e documenta

çã

o de 

usu

á

rio no site da D-Link Brasil. 

 

A D-Link fornece suporte t

é

cnico gratuito para clientes no Brasil 

durante o per

í

odo de vig

ê

ncia da garantia deste produto. 

 

Suporte T

é

cnico para clientes no Brasil: 

 

Website para suporte: www.dlink.com.br/suporte 

e-mail: [email protected] 

 
 

Telefones para contato:  

Clientes de S

ã

o Paulo: 2755 6950 

Clientes das demais regi

õ

es: 0800 70 24 104 

Segunda 

à

 Sexta-feira, das 9:00h 

à

s 21:00h 

S

á

bado, das 9:00h 

à

s 15:00h 

 

 
 

 
 

Summary of Contents for DGS-3100-48

Page 1: ...D Link DGS 3100 SERIES GIGABIT STACKABLE MANAGED SWITCH User Manual V3 5 ...

Page 2: ...nd used in accordance with this user s guide may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense CE Mark Warning This is a Class A product In a domestic environment this product may cause radio interference in which case...

Page 3: ...the Stack Status 7 Locating Devices 7 Backing up and Restoring Configuration Files 8 Resetting the Device 9 Downloading the Firmware 10 Rebooting the System 12 View Add Update Delete User Accounts Using the Web System Components 13 User Level Support on the WEB 14 CONFIGURING BASIC CONFIGURATION 15 Viewing Device Information 16 Defining System Information 18 Defining IP Addresses 19 Managing Stack...

Page 4: ...ags 67 Port VLAN ID 68 Tagging and Untagging 68 Ingress Filtering 68 Default VLANs 69 VLAN and Trunk Groups 69 VLAN Status 69 Defining VLAN Properties 70 Defining Asymmetric VLAN 72 Configuring GVRP 74 Defining Trunking 76 Defining VLAN Trunking 78 Traffic Segmentation 80 Configuring LACP 81 Defining IGMP Snooping 82 Defining MLD Snooping 86 Configuring Port Mirroring 90 Configuring Spanning Tree ...

Page 5: ...X 135 Configuring MAC Authentication by using Guest VLAN 802 1X and Radius pages 140 Defining RADIUS Settings 143 Defining EAP Forwarding Settings 145 Configuring Secure Socket Layer Security 146 Configuring Secure Shell Security 148 Defining SSH Algorithm Settings 149 Defining Application Authentication Settings 151 Configuring Authentication Server Hosts 152 Defining Login Methods 153 Defining E...

Page 6: ... and Editing PoE System Information 183 DEFINING ACCESS PROFILE LISTS 184 ACL Configuration Wizard 185 Defining Access Profile Lists 187 Defining Access Rules Lists 200 Finding ACL Rules 203 Defining Time Ranges 206 CONNECTORS AND CABLES 210 Pin Connections for the 10 100 1000 Ethernet Interface 211 RJ 45 Ports Pinout 211 Pin Connections for the HDMI Connector 212 HDMI Ports Pinout 212 SYSLOG ERRO...

Page 7: ...This preface provides an overview to the guide and includes the following sections System Overview Viewing the Device Device Management Methods User Guide Overview Intended Audience Notes Notices and Cautions Safety Cautions General Precautions for Rack Mountable Products ...

Page 8: ...igabit Ethernet Switches enhance networks by providing a powerful switch that eliminates network bottlenecks enabling network administrators to fine tune network configurations The DGS 3100 series and the DGS 3100 24TG are perfect for departmental and enterprise connections and are ideal for backbone and server connections ...

Page 9: ... The DGS 3100 series also provides 4 Mini GBIC SFP combo ports which connect fiber optic media to switches servers or network backbone The DGS 3100 series provides an additional RS 232 port console port for managing the switch via a console terminal or PC with a Terminal Emulation Program Figure 1 DGS 3100 Series 48 Port Front Panel DGS 3100 24TG Front Panel The DGS 3100 24TG provides eight high p...

Page 10: ... graphically via a web browser including Netscape Navigator version 7 0 and higher Microsoft Internet Explorer version 5 0 and higher Mozilla Firefox version 2 0 and higher Apple Safari SNMP Based Management The system also supports SNMPv1 SNMPv2c and SNMPv3 The SNMP agent decodes the incoming SNMP messages and replies to requests with MIB objects stored in the database The SNMP agent updates the ...

Page 11: ...s managing stacking defining ports configuring SNMP management and defining the system time settings Section 3 Configuring L2 Features Provides information for enabling and configuring Jumbo frames VLANs Trunks LAGs Traffic Segmentation Multicast forwarding Spanning Tree and LLDP Section 4 Configuring Quality of Service Provides information for ability to implement QoS and priority queuing within ...

Page 12: ... vi Intended Audience The DGS 3100 series DGS 3100 24TG User Guide contains information for configuring and managing the DGS 3100 series DGS 3100 24TG Switches This guide is intended for network managers familiar with network management concepts and terminology ...

Page 13: ...E A NOTE indicates important information that helps you make better use of your device NOTICE A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem CAUTION A CAUTION indicates a potential for property damage personal injury or death vii ...

Page 14: ...ult your service provider or local power company To help avoid damaging your system be sure the voltage selection Switch if provided on the power supply is set to match the power available at your location 115 volts V 60 hertz Hz in most of North and South America and some Far Eastern countries such as South Korea and Taiwan 100 V 50 Hz in eastern Japan and 100 V 60 Hz in western Japan 230 V 50 Hz...

Page 15: ...he weight of more than one extended component could cause the rack to tip over and may result in serious injury Before working on the rack make sure that the stabilizers are secured to the rack extended to the floor and that the full weight of the rack rests on the floor Install front and side stabilizers on a single rack or front stabilizers for joined multiple racks before working on the rack Al...

Page 16: ...ed metal surface on the chassis You can also take the following steps to prevent damage from electrostatic discharge ESD 1 When unpacking a static sensitive component from its shipping carton do not remove the component from the antistatic packing material until you are ready to install the component in your system Just before unwrapping the antistatic packaging be sure to discharge static electri...

Page 17: ...g the device simply run the browser installed on the management station and point it to the IP address defined for the device For example http 123 123 123 123 Please note that the proxy for session connection should be turned off NOTE The Factory default IP address for the Switch is 10 90 90 90 1 ...

Page 18: ... replace corrupted files update or upgrade the system software It is recommended to set the Baud Rate to 38400 prior to downloading software therefore allowing the software download to be faster See Set Terminal Baud Rate To download software from the Startup menu 1 On the Startup menu press 1 The following prompt is displayed Downloading code using XMODEM 2 When using HyperTerminal click Transfer...

Page 19: ...access the stack menu 1 On the Startup menu press 3 The following prompt is displayed Stack menu 1 Show unit stack id 2 Set unit stack id 3 Back Enter your choice or press ESC to exit 2 To display the current unit stack ID list press 1 The following prompt is displayed Stack menu 1 Show unit stack id 2 Set unit stack id 3 Back Enter your choice or press ESC to exit Current working mode is stacking...

Page 20: ...pop up blockers are enabled edit add and device information messages may not open 2 Enter the device IP address in the address bar and press Enter The user interface provides access to various switch configuration and management windows allows you to view performance statistics and permits you to graphically monitor the system status The screen captures in this Guide represent the DGS 3100 48 48 p...

Page 21: ...iguration instructions Stacking Status View Located at the bottom left corner of the home page the stacking status view provides a graphic representation of the stacking links and ports status Table 0 1 Web Interface Views Figure 0 1 Device Information Page The following table describes the main 6 areas on the Device Information Page View Description 1 Tree View Select the folder or window to be d...

Page 22: ...specified mode Various areas of the graphic can be selected for performing management functions including port configuration 5 Device Application Buttons Provides access to the device logout and provides information about the Safe Guard mode currently enabled on the device 6 Stacking Status View Provides a graphic representation of the stacking links and ports status Table 0 2 Main Areas ...

Page 23: ...ng the Stack Status The Stacking Information Page provides specific information for stacked devices For more information regarding the stacking setup see Managing Stacking section Locating Devices The Device Locator Page enables locating system devices by activating LED locators To locate devices 1 Click Device Locator The Device Locator Page opens Figure 0 2 Device Locator Page 2 Click The LED lo...

Page 24: ...e current configuration files via the HTTP server Restore saved setting from file Restores the current configuration files via the HTTP server File Type Specifies the current configuration file type The possible field values are Startup Config and Running Config TFTP Indicates that the system files are backed up or restored via an TFTP server The possible field values are Server IP Specifies the T...

Page 25: ... files click To restore files click Resetting the Device The Factory Reset Page restores the factory defaults To restore the device to the factory default settings 1 Click Reset The Factory Reset Page opens Figure 0 4 Factory Reset Page 2 Click The factory default settings are restored once it completely reloaded and the device is updated 9 ...

Page 26: ...l be retained as hexadecimal value ACLs access rules priority did not work in firmware version 1 x x In firmware version 2 x x the priority is supported and it is not allowed two identical access rules priority from different access profiles If the user download configuration file from version 1 x x which including ACLs which has more than one rule it might not work and there will be an error mess...

Page 27: ...k or specific device TFTP Download Indicates that the Firmware file is downloaded via a TFTP server Unit Indicates if the Firmware file is downloaded to a specific stacking member or to All stacking members Server IP Address Specifies the TFTP Server IP Address from which files are downloaded File Indicates the Firmware file that is downloaded to the stack or specific device 2 Select HTTP or TFTP ...

Page 28: ...oted To reboot the system 1 Click System Reboot The System Reboot Page opens Figure 0 6 System Reboot Page The System Reboot Page contains the Select Unit to Reboot field The possible values are Value Description All Reboots all stacking members 01 06 Reboots the specific stack member 2 Define the Select Unit to Reboot field 3 Click The selected unit s is are rebooted 12 ...

Page 29: ...ckup Evokes backup Cancel Cancels settings Clear Clears selected settings and fields Clear All Clears all settings and fields Delete Deletes selected fields Delete VID Deletes VLAN Identification Download Starts downloading system files Edit Modifies configuration Information Factory Reset Resets the factory defaults Find Finds a table entry System Reboot Reboot the system Refresh Refreshes device...

Page 30: ...will have access as reader without possibility to change configuration to most of the web pages except the pages that controls the following functionality that will be blocked to user level Update Firmware Modify Delete startup configuration Factory Reset View Add Update Delete User Accounts If the User is trying to modify any configuration by pressing the Apply button the Access Denied page will ...

Page 31: ...guring system user accounts configuring and managing system logs defining the system time and configuring SNMP system management This section contains the following topics Viewing Device Information Defining System Information Defining IP Addresses Managing Stacking Defining Ports ARP Settings Configuring User Accounts Managing System Logs Configuring SNTP Configuring SNMP DHCP Auto Configuration ...

Page 32: ...y defined device name and type System Contact Displays the name of the contact person The field range is 0 31 characters System Name Displays the user defined system name The field range is 0 31 characters System Location Displays the location where the system is currently running The field range is 0 31 characters Firmware Version Displays the installed software version number Hardware Version Di...

Page 33: ...ut to viewing the SSL settings GVRP Setting Indicates if Group VLAN Registration Protocol is enabled Telnet Setting Indicates if Telnet is enabled Jumbo Frame Indicates if Jumbo Frames are enabled on the device and provides a shortcut to viewing the Jumbo Frames settings BPDU Forwarding Indicates if BPDU Forwarding is enabled on the device and provides a shortcut to viewing the BPDU Forwarding set...

Page 34: ...e Firmware Version Displays the stacking member s software version number Hardware Version Displays the stacking member s hardware version number System Contact Defines the name of the contact person The field range is 0 160 characters System Name Defines the user defined system name System Location Defines the location where the system is currently running The field range is 0 160 characters Logi...

Page 35: ...ge contains the following fields Field Description Static When selected the IP address is static and user defined in the IP Address field This is the default value DHCP When selected the IP address is retrieved from a DHCP server IP Address Defines the IP address This field is active if the IP address is static Subnet Mask Defines the address mask that manages sub netting on the network The defaul...

Page 36: ...and how they are allocated Stacking member start up process This section contains the following topics Allocating Unit IDs Assigning Unit IDs Allocating Unit IDs Switches are shipped from the factory without a Unit ID and in Auto Assign mode All switches must be assigned a Unit ID before switches can operate as stacking members More than one stacking member cannot receive the same Unit ID Unit IDs...

Page 37: ...r fails or disconnected If the Stack Master fails or disconnected the Backup Master takes over as the Stack Master The Stack Master stores an active configuration which copied on the Backup Master The active configuration copy is used if the Backup Master takes over for the Stack Master Only the configuration file is copied Any dynamically filled tables for example learnt address are not copied fr...

Page 38: ... the Backup Master has a Unit ID of 2 if a Backup Master was included in the stack If a Master Enabled stacking member a Unit ID of 1 or 2 is added to a stack and powered on the newly added switch invokes Master Election process The Master Election process occurs even though the stack has an elected master However the newly added switch loses in the election process lower up time and joins the sta...

Page 39: ...ng member is effectively shut down and does not participate in the stack Stacking members with a conflicting manually set ID are shut down as the Stack Master cannot override the system administrator s Unit ID assignment to resolve the conflict If there are more stacking members than the maximum number allowed in a stack and the incoming stacking members are already in Factory Default mode the Sta...

Page 40: ...rval the stack will become operational with one of the units selected as the Master of the stack The Master and Backup selection is known as Master Election Master Election takes place if there are one or more eligible candidates contending to be the Master unit The Master Unit is indicated by the green Master LED on the front panel The Master LED is located near the Unit ID LEDs If a serial conso...

Page 41: ...onal even if some unit IDs were manually configured while others are self assigned 5 Reboot the stacking members to ensure the Unit ID is permanent Stack Management Examples This section contains information for troubleshooting stacking and includes the following topics Replacing Failed Stacking Members in a Running Stack Replacing a Failed Stack Master Dividing Stacks Merging Stacks Stacking Cabl...

Page 42: ...The stack reverts to the stacking state it was running in before stacking member failed However sometimes the new stacking member is not identical to the failed stacking member The Stack Master applies the configuration as follows If a 24 port switch replaces a failed 48 port switch then the new stacking member s ports are configured according first 24 ports configuration of the failed stacking me...

Page 43: ...is divided either by a failed stacking link connected to two stacking members in the stack or by a failed stacking members in a chain topology which causes disconnection between two units in the stack In this case we should consider each sub group as an independent running stack configuration For each sub group we should consider three sub options Both the Stack Master and the Backup Master are pa...

Page 44: ...learning process Traffic can be halted for a short period until the stack is synchronized i e stacking member and port configuraiton is completed New stacking members are learnt by the Backup Master are notified to the system administrator using SYSLOG messages and SNMP traps The divided stack continues to operate normally the only difference is there are less stacking members than prior to the st...

Page 45: ... be two stacking members with the same Unit ID at the process end The Stacking Master that loses the Master election process is shut down if the Unit ID was manually allocated It is recommended that the administrator configure the switch to Auto Assign mode before reconnecting the switch to the stack When two stacks are combined all of the configuration information for one of the stacks is lost Af...

Page 46: ... Election processes determine the master out of one of two combined stacking groups When switches are added to a running stack the Unit ID Allocation and Duplicate ID Conflict Resolution process detects an error if too many switches are present in the stack and no changes are to stacking members that originally belonged to the group managed by the newly elected master The original switches retain ...

Page 47: ...1 Defines the member with the Unit ID 1 as the Stacking Master if unit ID 2 will be selected unit ID 1 will be reboot and ID 2 will become stack master Unit 2 Defines the member with the Unit ID 2 as the Stacking Master if unit ID 1 will be selected unit ID 2 will be reboot and ID 1 will become stack master Current Stack ID Displays the Stacking Member ID that the new Unit ID will replace after th...

Page 48: ...he following fields Field Description Unit Defines the stacking member or LAG for which the port settings are displayed From Port Defines the port number from which the port configuration will apply This field appears only if a unit number is selected in the Unit field From LAG Defines the LAG number from which the port configuration will apply This field appears only if LAG is selected in the Uni...

Page 49: ...1000M Full Indicates the interface is currently operating at 1000 Mbps and full duplex mode Auto Indicates the interface is automatically configured to the fastest network traffic the interface can manage Flow Control Defines the flow control scheme used for the various port configurations Interface configured for full duplex use 802 3x flow control half duplex interfaces use backpressure flow con...

Page 50: ... 6 Port Description Page The Port Description Page contains the following fields Field Description Unit Defines the stacking member for which the port settings are displayed From Port Defines the port number from which the port parameters are configured To Port Defines the port number to which the port parameters are configured Description Defines a user defined port description 2 Define the Unit ...

Page 51: ...ing Time 1 65535 Defines the amount of time in seconds that passes between ARP Table entry requests Following the ARP Entry Age period the entry is deleted from the table The range is 1 65535 The default value is 300 seconds IP Address Defines the station IP address associated with the MAC address MAC Address Defines the station MAC address associated in the ARP table with the IP address Static AR...

Page 52: ...le field values are Admin Assigns the user full administrative access through both the Web Interface and the CLI Operator Assigns the user operator level access which is similar to Admin access except that the operator cannot update the firmware startup configuration user accounts or restore factory reset User Assigns the user read only access through both the Web Interface and the CLI The Followi...

Page 53: ...r it again in the Confirm New Password field 5 Click The new user accounts passwords and access rights are defined and the device is updated To edit the User Accounts Page 1 Select a name on the User List 2 Click 3 Define the value 4 Click The new access rights are saved and device is updated To delete a User Accounts Page entry 1 Select an entry 2 Click The user account is deleted and the device ...

Page 54: ...ntains the following fields Field Description Index Defines syslog host index 1 out of 4 Severity Defines the minimum severity from which warning logs are sent to the server There are two levels warning high and informational low Warning The device is functioning but an operational problem has occurred Informational Provides device information through system logs All Sends system logs for all leve...

Page 55: ...DGS 3100 Series Gigabit Stackable Managed Switch User Manual To delete a log entry 1 Select the entry 2 Click The entry is deleted and the device is updated 39 ...

Page 56: ...Stratum Example Stratum 0 A real time clock such as a GPS system is used as the time source Stratum 1 A server that is directly linked to a Stratum 0 time source is used as the time source Stratum 1 time servers provide primary network time standards Stratum 2 The time source is distanced from the Stratum 1 server over a network path For example a Stratum 2 server receives the time over a network ...

Page 57: ...P server System Clock Indicates that the system time is set locally by the device Current Time Displays the current date and time SNTP Settings Section Field Description SNTP First Server Defines the IP address of primary SNTP server from which the system time is retrieved SNTP Second Server Defines the IP address of secondary SNTP server from which the system time is retrieved SNTP Poll Interval ...

Page 58: ...rch or after March 9 China China does not use daylight saving time Canada From the first Sunday in April until the last Sunday of October Daylight saving times are usually regulated by provincial and territorial governments Exceptions may exist in certain municipalities Cuba From the last Sunday of March to the last Sunday of October Cyprus From the last weekend of March until the last weekend of ...

Page 59: ...arch until the last weekend of October Romania From the last weekend of March until the last weekend of October Russia From the last weekend of March until the last weekend of October Serbia From the last weekend of March until the last weekend of October Slovak Republic From the last weekend of March until the last weekend of October South Africa South Africa does not use daylight saving time Spa...

Page 60: ...res defining begin and end times by specific date and hour Annual Enables setting annual DST This option requires defining begin and end times by the specific dates Daylight Saving Time Offset in Minutes Defines the local DST offset in minutes The default time is 60 minutes The possible field values are 30 Defines the local offset for 30 minutes 60 Defines the local offset for 60 minutes 90 Define...

Page 61: ...k of a month To Day of Week Defines the week day DST ends The field range is Sunday Saturday To Month Defines the month DST ends The field range is January December To time in HH MM Defines the time of day DST ends The field format is Hour Minutes based on the 24 hour clock Military Time For example 9 00PM is configured as 21 00 DST Annual Settings Section The Annual Mode enables setting a DST sea...

Page 62: ...y access strings SNMP v3 SNMP v3 applies access control and a new traps mechanism In addition User Security Model USM parameters are defined for SNMPv3 including Parameters Description Authentication Provides data integrity and data origin authentication Privacy Prevents message content disclosure Cipher Block Chaining CBC is used for encryption Either authentication is enabled on a SNMP message o...

Page 63: ...ew Table Page opens Figure 0 12 SNMP View Table Page The SNMP View Table Page contains the following fields Field Description View Name Defines the view name limited to 30 alphanumeric characters Subtree OID Defines the OID included in or excluded from the selected SNMP view View Type Defines whether the defined OID branch will be included in or excluded from the selected SNMP view 2 Define the Vi...

Page 64: ...p Table Page The SNMP Group Table Page contains the following fields Field Description Group Name Defines the user defined group name to which access control rules are applied limited to 30 alphanumeric characters Read View Name Defines a Read Only view The Read Only view management access is restricted to read only and changes cannot be made to the assigned SNMP view The possible values are Commu...

Page 65: ...el for the group Security Level Defines the security level attached to the group Security levels apply to SNMPv3 only The possible field values are NoAuthNoPriv Defines that neither the Authentication nor the Privacy security levels are assigned to the group AuthNoPriv Authenticates SNMP messages and ensures that the SNMP message s origin is authenticated AuthPriv Encrypts SNMP messages 2 Define t...

Page 66: ...cryption Defines the SNMPv3 user authentication method The possible field values are None No user authentication is used Password Provides user authentication via the HMAC SHA 96 authentication level password or HMAC MD5 96 password Key Provides user authentication via the HMAC MD5 algorithm or the HMAC SHA 96 authentication level Auth Protocol by Password Selects the authentication password type ...

Page 67: ...orithm key SHA Defines that users are authenticated via a HMAC SHA 96 authentication level key Key Defines the authentication key for authentication MD5 32 or 64 digits SHA 40 or 70 digits Confirm Key Confirms the authentication key for authentication 2 Define the User Name Group Name and SNMP V3 Encryption fields 3 Define the authentication password or authentication key 4 Click The SNMP authenti...

Page 68: ...e Defines advanced SNMP community name limited to 20 alphanumeric characters View Name Defines the group of MIB objects that a remote SNMP manager is allowed to access on the switch Access Rights Defines the access rights of the community The possible field values are Read Only Management access is restricted to read only and changes cannot be made to the community Read Write Management access is ...

Page 69: ...Host Table Page contains information for defining filters that determine whether traps are sent to specific host as well as the trap type sent To define the SNMP Host Table Page 1 Click Configuration SNMP Settings SNMP Host Table The SNMP Host Table Page opens Figure 0 16 SNMP Host Table Page 53 ...

Page 70: ...el will be sent SNMPV3 Auth NoPriv Indicates that the SNMP version 3 is assigned with an Auth NoPriv security level and traps of that level will be sent SNMPV3 Auth Priv Indicates that the SNMP version 3 is assigned with an Auth Priv security level and traps of that level will be sent Community String SNMPv3 User Name Defines the community string or assigned to the SNMP V3 user 2 Define the Host I...

Page 71: ...adecimal string Each byte in hexadecimal character strings is two hexadecimal digits Each byte can be separated by a period or a colon The Engine ID must be defined before SNMPv3 is enabled Select a default Engine ID that is comprised of an Enterprise number and the default MAC address Use Default When selected provides the device generated Engine ID The default Engine ID is based on the device MA...

Page 72: ...lds Field Description SNMP Traps Specifies whether the device can send SNMP notifications The possible field values are Enable Enables SNMP notifications This is the default value Disable Disables SNMP notifications SNMP Authentication Traps Specifies whether the device can send traps upon authentication failure notification Enable Enables the device to send authentication failure notifications Th...

Page 73: ... to the packets relayed to DHCP server Option 82 specifies the relaying switch s MAC address the port identifier and specifies the VLAN forwarding the packet To define DHCP Relay Server Information 1 Click Configuration DHCP Relay The DHCP Relay Page opens Figure 0 19 DHCP Relay Page The DHCP Relay Page contains the following fields Field Description DHCP Relay Status Specifies whether the DHCP is...

Page 74: ... on the network and the DHCP server s latest instruction file refers to it the device downloads the file as its new Running Configuration and also saves it as the Startup Configuration If Static IP is present in the configuration file it will be ignored To enable DHCP Auto Configuration 1 Click Configuration DHCP Auto Configuration The DHCP Auto Configuration Page opens Figure 0 20 DHCP Auto Confi...

Page 75: ...ual Image Services Config Firmware Image This feature includes two screens 59 onfig Firmware Image Firmware Information n its flash memory one is for bootup and the other one is for backup When a it will always be downloaded to the location of the non active image It means r the device or in case of a stacked formation The Firmware Information Page opens Firmware InformationC The device contains t...

Page 76: ...he active image at the next bootup Delete Deletes the selected image The image is deleted immediately Config Firmware Image nge each device s image file To change the reboot file Image Page The Config Firmware Image Page allows users to cha 1 Click Configuration Dual Image Services Config Firmware Image The Config Firmware opens Figure 0 22 Config Firmware Image Page The Config Firmware Image Page...

Page 77: ...DGS 3100 Series Gigabit Stackable Managed Switch User Manual 61 ...

Page 78: ... Telnet 1 Click Configuration Telnet Setting The Telnet Setting opens Figure 0 23 Telnet Setting Page The Telnet Setting contains the following fields Field Description Telnet Setting Defines the Telnet status on the device The possible values are Enabled Enables Telnet Disabled Disables Telnet 2 Select the Telnet Setting 3 Click The Telnet setting on the device is updated ...

Page 79: ...ng and configuring L2 Features This section contains the following topics Enabling Jumbo Frames Configuring VLANs Configuring GVRP Defining Trunking Traffic Segmentation Configuring LACP Defining IGMP Snooping Defining MLD Snooping Configuring Port Mirroring Configuring Spanning Tree Defining Forwarding and Filtering Configuring LLDP ...

Page 80: ...e Jumbo Frames on the device 1 Click L2 Features Jumbo Frame The Jumbo Frame Page opens Figure 0 1 Jumbo Frame Page The Jumbo Frame Page contains the following field Field Description Jumbo Frame Defines whether Jumbo Frames are enabled on the device The possible field values are Enabled Enables Jumbo Frames on the device Disabled Disables Jumbo Frames on the device This is the default value 2 Sel...

Page 81: ... is 8 1 This means that the highest priority queue Queue 3 clears eight packets for every one packet cleared from Queue 0 It is important that the priority queue settings on the switch are for all ports and all devices connected to the switch are affected The priority queuing system is especially beneficial for networks that employ priority tag assignment capable switches VLAN Description A Virtua...

Page 82: ... 802 1Q VLANs only deliver packets between stations that are members of the VLAN Any port can be configured as either tagged or untagged The untagging feature of IEEE 802 1Q VLANs allows VLANs to work with legacy switches that don t recognize VLAN tags in packet headers The tagging feature allows VLANs to span multiple 802 1Q compliant switches through a single physical connection and allows Spann...

Page 83: ...s so they can be carried across Ethernet backbones and 12 bits of VLAN ID VID The 3 bits of user priority are used by 802 1p The VID is the VLAN identifier and is used by the 802 1Q standard Because the VID is 12 bits long 4094 unique VLANs can be identified The tag is inserted into the packet header making the entire packet longer by 4 octets All of the information originally contained in the pac...

Page 84: ...ut it can have as many VIDs that the switch s memory storage capacity has in its VLAN table to store them As some devices on a network may be tag unaware a decision must be made at each port on a tag aware device before packets are transmitted Should the packet to be transmitted have a tag or not If the transmitting port is connected to a tag unaware device the packet should be untagged If the tra...

Page 85: ...resses are flooded to all ports Broadcast and multicast packets are also flooded to all ports An example is presented in this table VLAN Name VID Switch Ports System default 1 5 6 7 8 21 22 23 24 Engineering 2 9 10 11 12 Marketing 3 13 14 15 16 Finance 4 17 18 19 20 Sales 5 1 2 3 4 Table 0 1 VLAN Example Assigned Ports VLAN and Trunk Groups Trunk Groups LAGs can be added as member to a VLAN simila...

Page 86: ...ges is 1 32 characters Untag VLAN Ports Defines the interface is an untagged VLAN member Packets forwarded by the interface are untagged Tag VLAN Ports Defines the interface is a tagged member of a VLAN All packets forwarded by the interface are tagged The packets contain VLAN information Forbidden VLAN Ports Defines the interface VLAN membership even if GVRP indicates the port is to be added NOTE...

Page 87: ...e are tagged The packets contain VLAN information Forbidden Port Defines the interface VLAN membership even if GVRP indicates the port is to be added Not Member Indicates that the interface is not a member of the VLAN Port Select All Selects all ports and either untags tags excludes or removes the VLAN membership 3 Define the VID VLAN Name and port related fields 4 Select the Tagged Untagged and F...

Page 88: ...re 0 7 Asymmetric VLAN scenerio Port 1 connect to Server port 1 port 3 port 9 and port 17 are untagged ports PC3 PC4 are in the same VLAN 3 port 1 is a untagged member of VLAN 2 and VLAN 3 untagged member overlap Then the server can talk with VLAN 2 VLAN 3 PC3 and PC4 can talk to the server and to each other PC2 can talk to the Server VLAN 2 can t communicate with VLAN3 In this example port 1 need...

Page 89: ...whether Asymmetric VLAN is enabled on the device The possible field values are Enabled Enables Asymmetric VLAN on the device Disabled Disables Asymmetric VLAN on the device This is the default value 2 Select Enabled Disabled in the Asymmetric VLAN Status field 3 Select Enable in the DLF Filtering see Defining DLF Filtering The Asymmetric VLAN option is enabled and the device is updated 4 Click 73 ...

Page 90: ... operate successfully GARP VLAN Registration Protocol GVRP is specifically provided for automatic distribution of VLAN membership information between VLAN aware bridges GVRP allows VLAN aware bridges to automatically learn VLANs to bridge port mapping without requiring the individual configuration of each bridge and register VLAN membership To define GVRP on the device 1 Click L2 Features GVRP Set...

Page 91: ... Disabled Disables GVRP on the selected port This is the default value Ingress Defines whether Ingress filtering is enabled on the device The possible field values are Enabled Enables Ingress filtering on the device Ingress filtering compares an incoming VID tag packet with the PVID number assigned to the port If the PVIDs vary the port drops the packet This is the default value Disabled Disables ...

Page 92: ...eld Description Unit Defines the stacking member s Unit ID for which LAG parameters are displayed Group ID Displays the LAG number Type Defines the LAG type The possible field values are Static The LAG is static LACP is disabled on the LAG This is the default value LACP LACP is enabled on the device Ports Displays the ports which are included in the LAG 2 Select a stacking unit in the Unit field 3...

Page 93: ...vice or stack NOTE A port must belong to the default VLAN when the user is adding the port to a LAG After adding the port to the LAG the LAG itself can be joined to other VLAN When a port is added to a LAG the port s configuration is stopping to be active this configuration will return to be active only after the port will be removed from the LAG 77 ...

Page 94: ...The Uplink ports can not be added to a LAG The Port Lock option is disabled on both ports Port Mirroring is disabled on both ports The pass through functionality applies to all VLANs that were not created on the switch for example if only VLAN 1 is defined on the switch VLANs 2 4094 will pass traffic between the Uplink ports In the example below the user defined VLAN Trunking ports Uplinks are por...

Page 95: ...les VLAN Trunking Settings on the device This is the default value Unit Defines the stacking member s Unit ID for which VLAN Trunking parameters are displayed Uplink Ports Displays the Uplink ports which are included in the VLAN Trunking Ports Displays the ports which are included in VLAN Trunking 2 Enable VLAN Trunking 3 Select a stacking unit in the Unit field 4 Check the ports to be added to th...

Page 96: ... Description Source Ports The port s from which the traffic is forwarded by the forwarding port s Unit or LAG The stacking member s Unit ID and LAGs on which the source port is located Port The source port number Forwarding Ports The port s from which the traffic from the source port is transmitted Unit or LAG The stacking member s Unit ID and LAGs on which the forwarding port is located Port The ...

Page 97: ...Defines the stacking member s Unit ID for which LACP parameters are displayed From Port Defines the first port number that is displayed to which timeout and priority values are assigned To Port Defines the last port number that is displayed to which timeout and priority values are assigned Port Priority 1 65535 Displays the LACP priority value for the port The field range is 1 65535 Timeout Define...

Page 98: ...eatures IGMP Snooping The IGMP Snooping Page opens Figure 0 15 IGMP Snooping Page The IGMP Snooping Page contains the following fields Field Description IGMP Snooping Enables or disables IGMP Snooping Bridge Multicast Filtering must first be enabled in order to enable IGMP Snooping The possible field values are Enabled Enables IGMP Snooping on the device Disabled Disables IGMP Snooping on the devi...

Page 99: ... The possible field values are Enable Enables IGMP Snooping on the VLAN Disable Disables IGMP Snooping on the VLAN This is the default value Querier State Indicates if an IGMP Querier is enabled on the VLAN The possible field values are Enabled An IGMP Querier is enabled on the VLAN Disabled An IGMP Querier is disabled on the VLAN This is the default value Querier Version Indicates the IGMP Querie...

Page 100: ... from another station after requesting to leave the IGMP group prior to timing out If a Leave Timeout occurs the switch notifies the Multicast device to stop sending traffic The Leave Timeout value is either user defined or an immediate leave value The default timeout is 10 seconds The field range is 0 16711450 seconds Host Timeout Defines the time the host waits to receive a message before timing...

Page 101: ...sible field values are IGMPv2 and IGMPv3 Unit Defines the unit number Static Router Ports Defines the port numbers which can be added as static router ports Ports Indicates the units and allocated ports as static router ports Dynamic Router Ports Displays the port numbers which was learned as dynamic router ports Forbidden Router Ports Defines the ports to be added as forbidden router ports Ports ...

Page 102: ... facility allows a switch to determine the following Where on which ports stations interested in joining a specific multicast group are located Where on which ports multicast routers sending multicast frames are located This knowledge is used to exclude irrelevant ports ports for which no stations have registered to receive a specific multicast group from the forwarding set of an incoming multicas...

Page 103: ...ecifies the time interval in seconds after which a port is removed from a Multicast Group Ports are removed if a Multicast group MLD report was not received from a Multicast port within the defined Host Timeout period The possible field range is 60 16711450 seconds The default timeout is 260 seconds Router Timeout Specifies the time interval in seconds the Multicast router waits to receive a messa...

Page 104: ...ticast group The field range is 0 16711450 seconds The default timeout is 10 seconds Host Timeout 60 16711450 sec Defines the time interval in seconds after which a port is removed from a Multicast Group Ports are removed if a Multicast group MLD report was not received from a Multicast port within the defined Host Timeout period The possible field range is 60 16711450 seconds The default timeout ...

Page 105: ...r Ports Displays the port numbers in the selected unit learned as dynamic router ports Ports Displays the unit port numbers defined as dynamic router ports Forbidden Router Ports Defines the port numbers in the selected unit to be added as forbidden router ports Ports Displays the unit port numbers defined as forbidden router ports 3 Define the Done Timer Host Timeout Router Timeout State Static D...

Page 106: ...target port receives a copy of all traffic passing through a designated source port In order to activate Port Mirroring the target port must belong to the default VLAN 1 Click L2 Features Port Mirroring The Port Mirroring Page opens Figure 0 19 Port Mirroring Page The Port Mirroring Page contains the following fields Field Description Status Enables or disables target port setting The default is D...

Page 107: ...ansmitting ports None Defines that port mirroring is not applied to the ports 2 Define the Status Unit and Target fields to activate the Port Mirroring function 3 Click 4 Define the Unit Tx and Rx fields under Source Port Setting 5 Click to capture the configured Source Ports in order to display them in the Source Port Setting table 91 ...

Page 108: ...Version Description Classic STP Provides a single path between end stations preventing loops from occurring Rapid STP Detects and uses network topologies that provide faster convergence of the spanning tree without creating forwarding loops Multiple STP Provides various load balancing scenarios For example if port A is blocked in one STP instance the same port can be placed in Forwarding State in ...

Page 109: ...Click L2 Features Spanning Tree STP Bridge Global Settings The STP Bridge Global Settings Page opens Figure 0 20 STP Bridge Global Settings Page The STP Bridge Global Settings Page contains the following fields Field Description STP Status Enable or disables STP globally on the switch The default is Disabled STP Version Defines the desired version of STP to be implemented on the switch There are t...

Page 110: ...ot Bridge The default value is 2 Bridge Forward Delay 4 30 Defines the time any port on the switch is in the listening state while moving from the blocking state to learning state and then to the forwarding state The default value is 15 Max Hops 1 20 Specifies the total number of hops that occur before the BPDU is discarded Once the BPDU is discarded the port information is aged out The possible f...

Page 111: ...s redundant links within an STP Group It is advisable to define an STP Group to correspond to a VLAN group of ports 1 Click L2 Features Spanning Tree STP Port Settings The STP Port Settings Page opens Figure 0 21 STP Port Settings Page The STP Port Settings Page contains the following fields Field Description Unit Indicates the stacking member for which the STP port settings are displayed From Por...

Page 112: ...forwarding is enabled on the port if STP is disabled Global BPDU filtering functions according to the device wide setting see STP Bridge Global Settings Page P2P Indicates whether the P2P of selected port is enabled The possible field values are True Indicates a point to point P2P link P2P ports transition to a forwarding state rapidly thus benefiting from RSTP False Indicates that the port cannot...

Page 113: ...atures Spanning Tree MST Configuration Identification The MST Configuration Identification Page opens Figure 0 22 MST Configuration Identification Page The MST Configuration Identification Page contains the following fields Field Description Configuration Name A configured name set on the switch to uniquely identify the MSTI multiple spanning tree instance If a configuration name is not set this f...

Page 114: ...n the MSTI Config Information Page To define MSTP interface settings 1 Click L2 Features Spanning Tree MSTP Port Information The MSTI Config Information Page opens Figure 0 23 MSTI Config Information Page The MSTI Config Information Page contains the following fields Field Description Unit Defines the unit to find Port Defines the Port to find Instance ID Lists the MSTP instances configured on the...

Page 115: ...rt role assigned by the STP algorithm to provide to STP paths The possible field values are Enabled Enables the port for the specific instance Root Provides the lowest cost path to forward packets to the root device Designated Indicates the port or LAG through which the designated device is attached to the LAN Alternate Provides an alternate path to the root device from the root interface Backup P...

Page 116: ...ies 1 Click L2 Features Forward Filtering Unicast Forwarding The Unicast Forwarding Page opens Figure 0 24 Unicast Forwarding Page The Unicast Forwarding Page contains the following fields Field Description Aging Time Defines the aging time of a Unicast packet If the packet is not forwarded after this interval it is discarded Aging time is a global FDB database setting VID Defines the VLAN ID MAC ...

Page 117: ...roup in the Ports and LAGs tables Ports can be added either to existing groups or to new Multicast service groups The Multicast Forwarding Page permits new Multicast service groups to be created The Multicast Forwarding Page also assigns ports to a specific Multicast service address group 1 Click L2 Features Forward Filtering Multicast Forwarding The Multicast Forwarding Page opens Figure 0 25 Mul...

Page 118: ...dated 4 Click To restore the default settings 1 Click The default settings are restored 2 To edit a VID entry 3 Select the entry 4 Click 5 Define the fields The entry is deleted and the device is updated 6 Click To delete a VID entry 1 Select the entry 2 Click Defining Multicast Filtering The Multicast Filtering Mode Page displays the port filtering mode for unregistered Multicast groups Ports can...

Page 119: ...gistered Multicast groups This is the default mode 2 Define the Unit and Filtering Mode fields 3 Select either All or specify a port LAG range in the From Port From LAG and To Port To LAG fields 4 Click The Multicast filtering settings are applied to the ports LAGs and the device is updated Defining DLF Filtering The Destination Lookup Failure DLF filtering mode allows the user to define egress fi...

Page 120: ... port or LAG in a consecutive sequence of ports or LAGs All Specifies that the filtering mode applies to all ports or LAGs Filtering Mode Defines the DLF filtering mode for unregistered Multicast groups The possible field values are Filter DLF Packets Prevents DLF Packets flooding Forward DLF Packets Floods DLF packets within the network This is the default mode 2 Define the Unit and Filtering Mod...

Page 121: ...ets are sent in the packet Type Length Value TLV field LLDP devices must support chassis and port ID advertisement as well as system name system ID system description and system capability advertisements This section contains information for configuring LLDP parameters and includes the following topics Defining LLDP Global Settings Defining LLDP Port Settings Defining LLDP Basic TLV Settings Defin...

Page 122: ...TX Delay Defines the time delay in seconds between successive LLDP frame transmissions initiated by value or status changes The possible field values are 1 8192 seconds The default is 2 seconds LLDP Reinit Delay Defines the time interval in seconds before reinitializing an LLDP transmission after LLDP is disabled The possible field values are 1 10 seconds The default is 2 seconds 2 To configure LL...

Page 123: ...tus Specifies the LLDP transmission mode on the port The possible field values are TX Enables transmitting LLDP packets only RX Enables receiving LLDP packets only TX and RX Enables transmitting and receiving LLDP packets This is the default Disabled Disables LLDP on the port Subtype Defines the address subtype For example Always IPv4 Action Specifies whether the management address is advertised f...

Page 124: ...fines last port in a consecutive sequence of ports Port Description Specifies whether the Port Description TLV is enabled on the port The possible field values are Enabled Enables the Port Description TLV on the port Disabled Disables the Port Description TLV on the port System Name Specifies whether the System Name TLV is enabled on the port The possible field values are Enabled Enables the Syste...

Page 125: ... Setting The LLDP Dot3 TLVS Setting Page opens Figure 0 31 LLDP Dot3 TLVS Setting Page The LLDP Dot3 TLVS Setting Page contains the following fields Field Description Unit Indicates the stacking member for which the LLDP dot3 TLV port settings are defined From Port Defines the first port in a consecutive sequence of ports To Port Defines last port in a consecutive sequence of ports MAC PHY Configu...

Page 126: ...he LLDP Local Port Brief Page opens Figure 0 32 LLDP Local Port Brief Page The LLDP Local Port Brief Page contains the following fields Field Description Unit Indicates the stacking member for which the LLDP local port information is displayed Port Indicates the port number Port ID Subtype Displays the port ID subtype Port ID Displays the port ID Unit number Port number Port Description Displays t...

Page 127: ...LDP Local Port Normal Page is displayed Figure 0 33 LLDP Local Port Normal Page 3 To view the detailed MAC PHY Configuration Status for the port click Show Detail The LLDP Local Misc Detail Information Page is displayed Figure 0 34 LLDP Local Misc Detail Information Page 111 ...

Page 128: ...the Medium Attachment Unit MAU type The MAU performs physical layer functions including digital data conversion from the Ethernet interfaces collision detection and bit injection into the network For example 100BASE TX full duplex mode Viewing LLDP Remote Port Information The LLDP Remote Port Brief Page displays LLDP remote neighbor port information 1 Click L2 Features LLDP LLDP Remote Port Brief ...

Page 129: ...For example IPv4 address Port ID Displays the port ID Unit number Port number of the port transmitting the LLDP frame Port Description Displays the port description 2 Click The LLDP Remote Port Normal Page is displayed Figure 0 36 LLDP Remote Port Normal Page 3 To view the detailed Management Address information for the entry click Show Detail The LLDP Management Address Detail Information Page is...

Page 130: ...ld Description Port Indicates the port number Address Subtype Displays the managed address subtype For example MAC or IPv4 Address Displays the managed address Interface Subtype Displays the port subtype to return to the LLDP Remote Port Normal Page 4 Click 5 To view the detailed MAC PHY Configuration Status information for the entry click Show Detail The LLDP Remote Misc Detail Information Page i...

Page 131: ...etail Information Page to return the LLDP Remote Port Normal Page 6 Click 7 To view the detailed information for unknown TLVs for the entry click Show Detail The LLDP Remote Unknown TLVs Detailed Information Page is displayed Figure 0 39 LLDP Remote Unknown TLVs Detailed Information Page 115 ...

Page 132: ...TLVs Detailed Information Page contains the following fields Field Description Port Indicates the port number Entry Indicates the entry number Unknown TLV Type Indicates the unknown TLV type field Unknown TLV Information Bytes Displays the unknown TLV information bytes in hexadecimal format ...

Page 133: ... the network Circumstances can arise where it is advantageous to group two or more different tagged packets into the same queue Generally however it is recommended that the highest priority queue Queue 1 be reserved for the data packets with a priority value of 7 1 Classes not Queues should be used when explaining traffic handling techniques 2 The ratio is Class0 Class1 Class2 Class3 1 2 4 8 A Wei...

Page 134: ... let us say a user wishes to have a video conference between two remotely set computers The administrator can add priority tags to the video packets being sent out utilizing the Access Profile commands Then on the receiving end the administrator instructs the Switch to examine packets for this tag acquires the tagged packets and maps them to a class queue on the Switch Then in turn the administrat...

Page 135: ...ber of packets sent from each priority queue depends upon the assigned weight For weighted round robin queuing if each CoS queue has the same weight value then each CoS queue has an equal opportunity to send packets just like round robin queuing For weighted round robin queuing if the weight for a CoS is set to 0 then it will stop processing the packets from this CoS The other CoS queues that have...

Page 136: ...s bandwidth limitation is assigned to the port The field value options are Enabled Ensures no bandwidth limitations on the port This is the default value Disabled Enables ingress bandwidth limitations on the port When disabled user can enter a limit value in the RX Rate field RX Rate 3500 1000000 kbps Specifies the maximum ingress rate on the port The possible field range is 3500 1000000 Kbps TX N...

Page 137: ...DGS 3100 Series Gigabit Stackable Managed Switch User Manual 2 Define the Unit From Port To Port No Limit and Ingress Rate fields The bandwidth settings are defined and the device is updated 3 Click 121 ...

Page 138: ...contains the following fields Field Description Unit Defines the stacking member for which the storm control parameters are displayed From Port Defines from which port storm control is configureed To Port Defines to which port storm control is configured Storm Control Type Specifies the Broadcast mode currently enabled on the device The possible field values are Broadcast Storm Broadcast and Multi...

Page 139: ...ge The 802 1P Default Priority Page contains the following fields Field Description Unit Defines the stacking member for which the port packet priorities are displayed From Port Defines the starting port for which the port packet priorities are defined To Port Defines the ending port to which the port packet priorities are defined Priority Defines the priority assigned to the port The field range ...

Page 140: ...iority 4 5 is assigned to Q2 Priority 6 7 is assigned to Q3 This is the highest priority queue To map priority to queues 1 Click QoS 802 1p User Priority The 802 1P User Priority Page opens Figure 4 5 802 1P User Priority Page The 802 1P User Priority Page contains the following fields Field Description Priority Indicates the packet priority that is assigned to the queue Class ID Defines the class...

Page 141: ...ld values are Strict Specifies whether traffic scheduling is based strictly on the queue priority Traffic with the highest Class of Service is the first traffic That is the highest class of service will finish before other queues empty Round Robin Assigns WRR weights to queues This field is enabled only for queues in WRR queue mode If a queue is set to 0 weight the queue is not operational and is ...

Page 142: ... DSCP User Priority Page opens Figure 4 7 DSCP User Priority Page The DSCP User Priority Page contains the following fields Parameter Description DSCP In Displays the incoming packet s DSCP value Queue Specifies the traffic forwarding queue to which the DSCP priority is mapped Four traffic priority queues are supported Restore Defaults Restores the Switch factory defaults for mapping DSCP values t...

Page 143: ...les the utilization of existing ACL rules to perform traffic classification and the other to the ACL Configuration Wizard which enables network administrators to create new ACL traffic classification rules To define CoS QoS settings 1 Click QoS Multi Layer CoS Settings The Multi Layer CoS Setting Page opens Figure 4 8 Multi Layer CoS Setting Page The Multi Layer CoS Setting Page contains the follo...

Page 144: ...iguring device security including user accounts Configuring Safeguard Engine Configuring Trust Host Configuring Port Security Configuring Guest VLANs Configuring Port Authentication 802 1X Defining EAP Forwarding Settings Configuring Secure Socket Layer Security Configuring Secure Shell Security Defining Application Authentication Settings ...

Page 145: ...tains the following field Field Description Safeguard Engine Indicates if the safeguard engine is enabled on the device The possible field values are Enabled Enables the safeguard engine on the device This is the default value Disabled Disables the safeguard engine on the device Rising Threshold 20 100 Indicates the rising CPU Utilization thresholds enabling Safegard The possible field range is be...

Page 146: ...usted Host Page contains the following fields Field Description IP Address 1 30 Defines the management station IP address from which the device can be managed Network Mask 1 30 Defines the management station IP Subnet Mask from which the device can be managed Telnet If selected permits Telnet access to be used for management access to the device SNMP If selected permits SNMP access to be used for ...

Page 147: ...nual 2 Define the IP 1 30 Address fields and Subnet Mask to define the remote management stations The management stations are defined and the device is updated 3 Click 131 4 To remove a station from the Trusted Hosts list clear the IP Address field and click ...

Page 148: ... can provide various options Unauthorized packets arriving at a locked port are either Discarded with no trap Discarded with a trap Locked port security also enables storing a list of MAC addresses in the configuration file The MAC address list can be restored after the device has been reset To define port security 1 Click Security Port Security The Port Security Page opens Figure 5 3 Port Securit...

Page 149: ...eset Deletes the current dynamic MAC addresses associated with the port Learn up to the maximum addresses allowed on the port this number is also configurable Aging is disabled the addresses are deleted on reset Delete on Timeout Deletes the current dynamic MAC addresses associated with the port The port learns up to the maximum addresses allowed on the port Re learned MAC addresses and address ag...

Page 150: ...ns Figure 5 4 Guest VLAN Page The Guest VLAN Page contains the following fields Field Description VID Defines the VLAN ID on which the Guest VLAN is created VLAN Name Defines the user defined VLAN name assigned to the guest VLAN Unit Defines the stacking member for which the Guest VLAN parameters are displayed Port Defines the ports included in the Guest VLAN 2 Define the VLAN ID in the VID field ...

Page 151: ...h the Authentication Server and relays the information to the Client Supplicants Clients Specifies the host connected to the authenticated port requesting to access the system services Authentication Server Specifies the server that performs the authentication on behalf of the authenticator and indicates whether the supplicant is authorized to access system services The Authentication Server is a ...

Page 152: ...ield default is 30 seconds ServerTimeout 1 65535 sec Defines the amount of time that lapses before the device re sends a request to the authentication server The field value is specified in seconds The field default is 30 seconds MaxReq 1 10 times Displays the total amount of EAP requests sent If a response is not received after the defined period the authentication process is restarted The field ...

Page 153: ...r which the 802 1X parameters are defined To Port Indicates the last port for which the 802 1X parameters are defined Mode Indicates the 802 1X mode enabled on the device The possible field values are Port Base Enables 802 1X on ports This is the default value MAC Base Enables 802 1xon MAC addresses 2 Enable or disable the 802 1X status in the 802 1X field 3 Define the Mode field 4 In the 802 1X P...

Page 154: ...d default is 30 seconds ServerTimeout 1 65535 sec Defines the amount of time that lapses before the device re sends a request to the authentication server The field value is specified in seconds The field default is 30 seconds MaxReq 1 10 times Displays the total amount of EAP requests sent If a response is not received after the defined period the authentication process is restarted The field def...

Page 155: ...ters are defined To Port Indicates the last port for which the 802 1X parameters are defined Mode Indicates the 802 1X mode enabled on the device The possible field values are Port Base Enables 802 1X on ports This is the default value MAC Base Enables 802 1X on MAC addresses 2 Enable or disable the 802 1X status in the 802 1X field 3 Define the Mode field MAC Base for MAC Authentication 4 In the ...

Page 156: ... operatons required to configure MAC Authentication in DGS 3100 series 1 In order to configure a guest VLAN the user is required to create a VLAN first in the following example the user creates VLAN 100 via click L2 Features 802 1Q VLAN The 802 1Q VLAN page opens 2 Assign ports to the Guest VLAN via click Security Guest VLAN and according to the following example ...

Page 157: ...ure a Radius Server that will hold the MAC Authentication database This should be done via click Security 802 1X Authentic RADIUS Server page according to the example below 4 Click Security 802 1X 802 1X Setting page first 802 1x should be enabled globally and in the port level 802 1x Control should be configured as ForceAuthorized 141 ...

Page 158: ...802 1X Setting page will be configuration of the required ports as MAC Based authentication opposite to Port Based authentication 6 The last step on Security 802 1X 802 1X Setting page should be setting the port control to Auto this will complete the setting of MAC Authentication for the required ports ...

Page 159: ...Indicates the RADIUS parameters are defined for the first RADIUS server Second Indicates the RADIUS parameters are defined for the second RADIUS server Third Indicates the RADIUS parameters are defined for the third RADIUS server RADIUS Server Defines the RADIUS server IP addresses The field format is X X X X Authentic Port Identifies the authentication port The authentication port is used to veri...

Page 160: ...he authentication and encryption key in the Key field 7 Reenter the RADIUS Key in the Confirm Key field 8 Click To edit the Radius Server list click adjacent to the required listed server The upper fields display the current values which then can be edited To delete a radius server from the list click adjacent to the relative list entry The radius servers are defined and the device is updated ...

Page 161: ...urity 802 1X Forwarding EAP The Forwarding EAP Page opens Figure 0 7 Forwarding EAP Page The Forwarding EAP Page contains the following field Field Description Forwarding EAP Specifies whether forwarding of EAP packets is enabled on the device The possible field values are Enabled Enables forwarding of EAP packets Disabled Disables forwarding of EAP packets This is the default 2 Define the EAP pac...

Page 162: ...encrypt messages and need to be consistent between client and host for optimal use CBC Block Ciphers Cipher Block Chaining CBC links encrypted text blocks The Switch supports the 3DES EDE encryption code defined by the Data Encryption Standard DES to create the encrypted text Hash Algorithm This part of the ciphersuite allows the user to choose a message digest function which will determine a Mess...

Page 163: ...5 Combines the RSA key exchange stream cipher RC4 encryption with 128 bit keys and the MD5 Hash Algorithm RSA with 3DES EDE CBC SHA This ciphersuite combines the RSA key exchange CBC Block Cipher 3DES_EDE encryption and the SHA Hash Algorithm RSA EXPORT with RC4 40 MD5 This ciphersuite combines the RSA Export key exchange and stream cipher RC4 encryption with 40 bit keys Status Indicates if the se...

Page 164: ...s window in the Administration folder This is identical to creating any other admin level User Account on the Switch including specifying a password This password is used to logon to the Switch once a secure communication path has been established using the SSH protocol Configure the User Account to use a specified authorization method to identify users that are allowed to establish SSH connection...

Page 165: ...echanism utilizing the RSA encryption algorithm HMAC DSA Supports the Hash for Message Authentication Code HMAC Digital Signature Algorithm DSA encryption algorithm Data Integrity Algorithm Validates message authentication information transmitted between two parties which share the same key The following Data Integrity Algorithms are supported HMAC SHA Supports the Hash for Message Authentication ...

Page 166: ...ed on the device The possible field values are Enabled Enables Publickey SSH User Authentication on the device Disable Disables Publickey SSH User Authentication on the device Disable is the default value Public Key Algorithm Displays the currently enabled Public Key Algorithms Data Integrity Algorithm Displays the currently enabled Data Integrity Algorithms Encryption Algorithm Displays the curre...

Page 167: ... possible field values are Console Indicates that Authentication profiles are used to authenticate console users Telnet Indicates that Authentication profiles are used to authenticate Telnet users Secure Telnet SSH Indicates that Authentication profiles are used to authenticate Secure Shell SSH users SSH provides clients secure and encrypted remote connections to a device Login Method List Defines...

Page 168: ...uthenticate network users The possible field values are RADIUS Indicates that network users are authenticated via a RADIUS server TACACS Indicates that network users are authenticated via a TACACS server Key Defines the key used to authenticate network users The key may contain up to 128 characters Priority Defines the priority assigned to the server The field range is First Third where Third is t...

Page 169: ... authentication method is not available the next selected method is used For example if the selected authentication method is RADIUS Local and the RADIUS server is not available the user is authenticated locally To define the user only login method 1 Click Security Access Authentication Control Login Method Lists The Login Method Lists Page opens Figure 5 13 Login Method Lists Page The Login Metho...

Page 170: ... occurs at the device level The device checks the user name and password for authentication Method 4 Indicates the fourth method used to authenticate the network user The possible field values are RADIUS User authentication occurs at the RADIUS server TACACS The user authentication occurs at the TACACS server None No user authentication occurs Local User authentication occurs at the device level T...

Page 171: ...ed method is used For example if the selected authentication method is RADIUS Local and the RADIUS server is not available the user is authenticated locally To define authentication methods 1 Click Security Access Authentication Control Enable Method Lists The Enable Method Lists Page opens Figure 5 14 Enable Method Lists Page The Enable Method Lists Page contains the following fields Field Descri...

Page 172: ...ce level The device checks the user name and password for authentication Method 4 Indicates the fourth method used to authenticate the network user The possible field values are RADIUS User authentication occurs at the RADIUS server TACACS The user authentication occurs at the TACACS server None No user authentication occurs Local User authentication occurs at the device level The device checks th...

Page 173: ... Configure Local Enable Password Page contains the following fields Field Description Old Local Enable Password Provide the current network Enable password New Local Enable Password Defines the new network Enable password The field range is 1 15 characters Confirm Local Enable Password Confirms the new network Enable password 6 Enter the old local enable password In the Old Local Enable Password f...

Page 174: ...Preventio opens Figure 5 16 Arp Spoofing Prevention Page The Configure Local Enable Password Page contains the following fields Field Description IP Address Defines the IP address MAC address Defines the MAC address Unit Defines the stacking member s Unit ID Port Defines the ports Port Select All Select all ports 2 Enter the IP address in the IP Address field 3 Enter the MAC address in the MAC Add...

Page 175: ...topics Device Environment Viewing Stacking Information thenticated Session Statistics orts Static MAC Addresses Log Device Environment Viewing CPU Utilization Viewing Port Utilization Viewing Packet Size Information Viewing Received Packet Statistics Viewing RADIUS Au Viewing ARP Table Viewing MLD Router P Viewing Router Ports Viewing Session Table Viewing IGMP Group Information Viewing MLD Group ...

Page 176: ...ormation in the Tree View The Stacking Information Page opens Figure 6 1 Stacking Information Page The Stacking Information Page contains the following fields Field Description Master ID Displays the Stacking Master Unit ID number unit ID 1 or 2 Backup ID Displays the Backup Master Unit ID number unit ID 1 or 2 Box ID Displays the Unit ID numbers assigned to the stacking members Runtime version In...

Page 177: ...utilization by percentage Time Interval Defines the 1 60 second time intervals in which the usage samples are taken as follows 1 2 3 4 5 10 20 30 40 50 60 Record Number Defines the record number Show Hide Displays the CPU utilization information The possible fields are Utilization checked Utilization information is enabled This is the default value Utilization unchecked Utilization information is ...

Page 178: ... number Utilization Displays current CPU utilization by percentage Time Interval Defines the 1 60 second time intervals in which the usage samples are taken as follows 1 2 3 4 5 10 20 30 40 50 60 Record Number Defines the record number Show Hide Displays the CPU utilization information The possible fields are Utilization checked Utilization information is enabled This is the default value Utilizat...

Page 179: ...Port Defines the port number Packet Size Analysis Selected Port Number Displays current packet size for ports Time Interval Displays the time intervals at which the packet samples are taken The possible field values are 1s 5s 10s 15s 20s 30s 40s 50s and 60s Record Number Displays the packet size record number Show Hide Displays or hides packets size The following packet length ranges can be displa...

Page 180: ...ed Bytes Indicates the total number of bytes that were received on the port Packets Indicates the total number of packets that were received on the port Time Interval Indicates the time interval for which the received packets are displayed The possible field values are 1s 5s 10s 15s 20s 30s 40s 50s and 60s Record Number Indicates the transmitted record number Show Hide Displays the bytes packets r...

Page 181: ...Unicast packets received and transmitted through the device Multicast Indicates the number of Multicast packets received and transmitted through the device Broadcast Indicates the number of Broadcast packets received and transmitted through the device Time Interval Indicates the time interval for which the UMB_cast packets are displayed The possible field values are 1s 5s 10s 15s 20s 30s 40s 50s a...

Page 182: ...llowing fields Field Description Unit Indicates the stacking member ID for which the transmitted packets parameters are displayed Port Indicates the port for which the transmitted packets parameters are displayed Bytes Indicates the total number of bytes that were transmitted through the port Packets Indicates the total number of packets that were transmitted through the port Time Interval Indicat...

Page 183: ...Unit and Port fields 3 Click to load the defined parameters To clear the Unit and Port fields 1 Click The fields are cleared 2 Define the Time Interval and Record Number fields 3 Click The transmitted packet graph is updated 4 To view the graph as a table click View Table 167 ...

Page 184: ... Interval Indicates the how often the RADIUS authentication session information is updated The various time intervals are 15 30 60 no refresh Server Displays the RADIUS server IP address UDP Port Displays the UDP port through which the RADIUS session was initiated Timeouts Indicates the number of session timeouts that occurred during the authentication session Requests Indicates the amount of time...

Page 185: ...or which the ARP mappings are defined IP Address Defines the station IP address which is associated with the MAC address Total Entries Displays current ARP table entries detailing the user defined interface name IP address MAC address and type dynamic or static of each entry MAC Address Displays the MAC address associated with the IP address Type Indicates how the MAC was assigned The possible val...

Page 186: ...ge opens Figure 0 10 Browse MLD Router Port Page The Browse MLD Router Port Page contains the following fields Field Description VID Indicates the VLAN identification Unit Indicates the stacking member for which the router ports information is displaying Port Indicates the port for which the router port settings are displayed Ports have the following settings S Indicates a statically configured po...

Page 187: ...Figure 0 11 Browse Router Port Page The Browse Router Port Page contains the following fields Field Description VID Indicates the VLAN identification Unit Indicates the stacking member for which the router ports information is displaying Port Indicates the port for which the router port settings are displayed Ports have the following settings S Indicates a static port D Indicates a dynamic port F ...

Page 188: ...se Session Table The Browse Session Table Page opens Figure 6 12 Browse Session Table Page The Browse Session Table Page contains the following fields Field Description ID Displays the browse session table entry From Indicates the type of interface from which the system session was initiated User Privilege Indicates the user privileged assigned to the user who imitated the system session Name Disp...

Page 189: ...13 IGMP Snooping Group Page The IGMP Snooping Group Page contains the following fields Field Description VID Defines the VLAN ID for the IGMP Snooping Group VLAN Name Defines the VLAN name VLAN Name Displays the currently selected user defined VLAN name Multicast Group Displays the IP address assigned to the Multicast group MAC Address Displays the MAC address assigned to the Multicast group Port ...

Page 190: ...114 MLD Snooping Group Page The MLD Snooping Group Page contains the following fields Field Description VID Defines the VLAN ID for the MLD Snooping Group VLAN Name Defines the VLAN name VLAN Name Displays the currently selected user defined VLAN name Multicast Group Displays the IP address assigned to the Multicast group MAC Address Displays the MAC address assigned to the Multicast group Port Di...

Page 191: ...od is erased To prevent static MAC addresses from being deleted when the device is reset ensure that the port attached to the MAC address is locked 1 Click Monitoring MAC Address Table The MAC Address Table Page opens Figure 6 15 MAC Address Table Page The MAC Address Table Page contains the following fields Field Description Unit Displays the Stacking member Unit 1 for which the MAC address param...

Page 192: ...er Manual 176 4 Click To view all entries click To clear static entries click To clear dynamic entries click To clear all entries click The MAC Address Table updates and displays total entries To scroll down the table click To scroll up the table click ...

Page 193: ...gure 6 16 System Log Page The System Log Page contains the following fields Field Description ID Displays the system log table entry Time Displays the time in days hours and minutes the log was entered in the Switch History Log Table Log Description Displays a description event recorded in the System Log Page Severity The following are the available log severity levels Warning The lowest level of ...

Page 194: ...feiting network integrity To enable Green Ethernet 1 Click Monitoring Green Ethernet The Green Ethernet Page opens Figure 0 12 Green Ethernet Page The Green Ethernet Page contains the following fields Field Description Power Consumption Displays the device power consumption The power consumption is displayed in percentage as well as in Watts Cumulative Energy saved Displays the cumulative power co...

Page 195: ...ntains the following fields Field Description Unit Indicates the stacking member for which the device environment is displayed Side Fan Status Displays the side fan status The possible values are OK Indicates the fan is operating normally Fail Indicates the fan is not operating normally N A Indicates a fan is not installed on the device Temperature The current temperature of the device Each device...

Page 196: ...o power sources Power over Ethernet can be used with IP Phones Wireless Access Points IP Gateways Audio and video remote monitoring Powered Devices are devices which receive power from the DGS 3100 series device power supplies for example IP phones Powered Devices are connected to the DGS 3100 series device via Ethernet ports PoE is enabled only on the DGS 3100 24P and DGS 3100 48P devices This se...

Page 197: ...Disables PoE on the interface This is the default value Power Limit Indicates the maximum amount of power available to the interface The field value is displayed in Watts If the Power Limit checkbox is left unchecked the amount of power assigned is determined according to the class which is read from the powered device If checked the user can enter the Power Limit value thus overriding the value d...

Page 198: ...us The possible field values are Normal Indicates that the power supply unit is functioning Off Indicates that the power supply unit is not functioning Faulty Indicates that the power supply unit is functioning but an error has occurred For example a power overload or a short circuit 2 Define the Unit From Port To Port PoE Enable and Power Limit fields 3 Click The system PoE parameters are defined...

Page 199: ...enerated The possible field values are 50W Indicates 50 watts 100W Indicates 100 watts 170W Indicates 170 watts Disconnect Method Indicates the method by which the powered device is disconnected from the interface The possible values are Deny next port Indicates device disconnects by next port denial Deny Low priority port Indicates device disconnects by next low priority port System Power Status ...

Page 200: ...nied or subject to Quality of Service action For example a network administrator defines an ACL rule that states port number 20 can receive TCP packets however if a UDP packet is received the packet is dropped Access Profiles and Access Rules that are made of the filters determine traffic classifications This section cotains the following topics Defining Time Ranges ACL Configuration Wizard Defini...

Page 201: ...on will be on packets from this MAC address IPv4 Addresses Indicates ACL action will be on packets from this IPv4 source address To Defines the destination of accessible packets The possible values are Any Indicates ACL action will take placed for packets with any destination MAC Address Indicates ACL action will take place for packets to this MAC address only IPv4 Addresses Indicates ACL action w...

Page 202: ...if all other ACL criteria is met Change 1p Priority VPT CoS value is changed if all other ACL criteria is met Replace DSCP Reassigns a new DSCP value to the packet if all other ACL criteria are met Ports Defines ports to be configured An example of possible values is 1 1 1 4 6 and 2 6 Time Range Specifies whether the configured ACL is time based Range Name Selects the user defined time range name ...

Page 203: ...ia 1 Click ACL Access Profile List The ACL Profile List Page opens Figure 0 2 ACL Profile List Page The ACL Profile List Page contains the following fields Field Description Profile ID Displays the profile Identification number Profile Summary Displays the access rule To display an ACL s profile details click The ACL profile details are displayed below the ACL table To define or show an access rul...

Page 204: ...ck the Layer 2 header without the 802 1Q fields L3 ACL Defines the ACL profile Layer 3 protocols The possible fields are ICMP Specifies ICMP as the Layer 4 protocol the the access profile checks IGMP Specifies IGMP as the Layer 4 protocol the the access profile checks TCP Specifies TCP as the Layer 4 protocol the the access profile checks UDP Specifies UDP as the Layer 4 protocol the the access pr...

Page 205: ... Tagged is selected the page updates as follows Figure 0 4 ACL Profile L2 ACL Tagged Page To define L2 MAC Address ACL profile 1 Click the MAC Address button The ACL Profile L2 ACL Tagged MAC Address Page updates to show the following Figure 0 5 ACL Profile L2 ACL Tagged MAC Address Page 189 ...

Page 206: ...ate button Alternatively click The Generate Mask by range fields appear Enter a MAC address range into the Generate Mask by range fields and click The mask is generated 4 Click The ACL profile is added and the device is updated To define L2 802 1Q VLAN ACL profile 1 Click the 802 1Q VLAN button The ACL Profile L2 ACL Tagged VLAN Page updates to show the following Figure 0 6 ACL Profile L2 ACL Tagg...

Page 207: ...le L2 ACL Tagged Ether Type Page updates to show the following Figure 0 7 ACL Profile L2 ACL Tagged Ether Type Page 2 Click The ACL profile is added and the device is updated NOTE A combination of one or several filtering masks can be selected simultaneously The page updates with the relevant field s 191 ...

Page 208: ...ACL Untagged is selected the page updates as follows without the 802 1Q VLAN field Figure 0 8 ACL Profile L2 ACL Untagged Page Defining Level 3 ACL If L3 ACL ICMP is selected the page updates as follows Figure 0 9 Add ACL Profile L3 Page To define L3 IPv4 DSCP ACL profile ...

Page 209: ...file L3 ACL ICMP IPv4 DSCP Page updates to show the following Figure 0 10 ACL Profile L3 ACL ICMP IPv4 DSCP Page 2 Click The ACL profile is added and the device is updated To define L3 IPv4 Address ACL profile 1 Click the IPv4 Address button The ACL Profile L3 ACL ICMP IPv4 Address Page updates to show the following Figure 0 11 ACL Profile L3 ACL ICMP IPv4 Address Page 193 ...

Page 210: ...mask in the box adjacent to the Mask Generate button Alternatively click The Generate Mask by range fields appear Enter an IP address range into the Generate Mask by range fields and click The mask is generated 4 Click The ACL profile is added and the device is updated To define L3 ICMP ACL profile 1 Click the ICMP button The ACL Profile L3 ACL ICMP Page updates to show the following Figure 0 12 A...

Page 211: ...s checked for a match If L3 ACL IGMP is selected the page updates as follows Figure 0 13 ACL Profile L3 IGMP Page 1 Click the IGMP button The ACL Profile L3 IGMP Selected Page updates to show the following Figure 0 14 ACL Profile L3 IGMP Selected Page 2 Click The ACL profile is added and the device is updated 195 ...

Page 212: ...l 196 If L3 ACL TCP is selected the page updates as follows Figure 0 15 ACL Profile L3 TCP Page To define L3 TCP Port ACL profile 1 Click the TCP Port button The ACL Profile L3 TCP Port Page updates to show the following Figure 0 16 ACL Profile L3 TCP Port Page ...

Page 213: ...ask and or Destination Port Mask The Mask Generate button is active 3 Enter a port ID in the box adjacent to the Mask Generate button Alternatively click The Generate Mask by range fields appear Enter a port ID range into the Generate Mask by range fields and click The mask is generated 4 Click The ACL profile is added and the device is updated To define L3 TCP Flag ACL Profile This option defines...

Page 214: ...ected the page updates as follows Figure 0 18 ACL Profile L3 UDP Page 1 Click the UDP Port button The ACL Profile L3 UDP Port Page updates to show the following Figure 0 19 ACL Profile L3 UDP Port Page T L Profile L3 UDP P ins the following fields he AC ort Page conta Field Description ...

Page 215: ...ple to set 0 15 set mask of F 2 Select Source Port Mask and or Destination Port Mask The Mask 3 Enter a port ID in th he Mask Generate button Alternatively click Generate button is active e box adjacent to t The Generate Mask by ra fields appear nge po Enter a rt ID range into the Generate Mask by range fields and click The mask is generated 4 Click The ACL profile is added and the device is updat...

Page 216: ... Filters the packets by the Layer 4 protocol DSCP Filters the packets by the DiffServ Code Point DSCP value IP Precedence Filters the packets by the IP Precedence Action Indicates the action assigned to the packet matching the ACL conditions Packets are forwarded dropped or going through QoS action Click ACL Access Profile List The Access Profile List Page opens Figure 0 20 Access Profile List Pag...

Page 217: ...D Type Displays the profile type IP based Source IP Address Displays the source IP address TCP Flag Defines the indicated TCP flag that can be triggered Source Port Displays the TCP source port Ports Defines the ports or LAGs on which the access profile will work Action Defines the action to be taken The possible values are Permit Forwards packets if all other ACL criteria are met Deny Drops packe...

Page 218: ... access rule is time based Range Name Selects the user defined time range name to apply to the access rule 2 Define the Rule Detail fields 3 Click The rule is changed and the device is updated NOTE Each Access Profile must create rules with unuque Access IDs Access IDs canno overlap in two different Access Profiles ...

Page 219: ...the search Ports Indicates the ports or LAGs for which rules are sought Profile ID Indicates the Profile ID Access ID Indicates the ACL rule ID number Profile Type Indicates if the profile is IP or Ethernet Summary Displays the access rule Action Displays the action chosen for the profile 2 Define the Profile ID and Ports fields 3 Click The ACL rule is displayed To delete an ACL Profile entry 1 Se...

Page 220: ... subject to action Source MAC Address Matches the source MAC address to which packets will be subject to action Ether Type Defines the code type used Ports Indicates the ports or LAGs for which rules are sought Action Defines the action for the profile The possible fields are Permit Forwards packets if all other ACL criteria are met Deny Drops packets if all other ACL criteria is met Rate Limiting...

Page 221: ...DGS 3100 Series Gigabit Stackable Managed Switch User Manual 2 Define the Rule Detail fields 3 Click The rule is defined and the device is update 205 ...

Page 222: ...defined Start Time HH MM Specifies the time at which the time based ACL is enabled The field format is HH MM The possible field values are HH 00 23 hours in military format MM 00 59 minutes End Time HH MM Specifies the time at which the time based ACL is disabled The field format is HH MM The possible field values are HH 00 23 hours in military format MM 00 59 minutes Weekdays Specifies the weekda...

Page 223: ...ACL Configuration Wizard page the user can create simple ACLs in a simple way after setting a rule via this page the system will create an Access Profile and also an Access Rule and will bind it to a port LAG or a group of ports LAG Each operation via the Wizard can create either MAC based ACL or IP based ACL the user can t combine both types of ACLs in the same operation NOTE Access Profile can b...

Page 224: ...ist page create rules for both profiles and apply it on the same port s LAG s Now you have on the port s LAG s IP Based ACL and MAC Based ACL NOTE Adding rules to specific profile will have a unique Access ID in the range 1 240 When the user is adding a rule to different profiles he can t use the same Access ID for different rules ...

Page 225: ...s 31 40 this is another unique set of rules and the count of additional rules will be 2 Totally in the system we will use 6 rules out of the available 240 Example 2 Assume that Access IDs 1 2 3 4 are bound to ports 1 10 this is a unique set of rules and the count of rules in this case is 4 Assume that Access IDs 4 5 6 are bound to ports 11 20 this is another unique set of rules and the count of ad...

Page 226: ... about cable connections Stations are connected to the device ports through the physical interface ports on the front panel whereas devices are connected to create stacking by connecting the HDMI interface ports located on back panel The following pin connectors are described Pin Connections for the 10 100 1000 Ethernet Interface Pin Connections for the HDMI Connector ...

Page 227: ...ed with standard RJ 45 Ether straight or crossed cables The following figure illustrates the pin allocation Figure A 1 RJ 45 Pin Allocation RJ 45 Ports Pinout The following table describes the pin allocation of the RJ 45 and the console ports PIN SIGNAL NAME 1 TxRx 1 2 TxRx 1 3 TxRx 2 4 TxRx 2 5 TxRx 3 6 TxRx 3 7 TxRx 4 8 TxRx 4 Table 2 RJ 45 Pin Assignments 211 ...

Page 228: ...HDMI Pin Allocation HDMI Ports Pinout The following table describes the pin allocation of the HDMI connector PIN SIGNAL NAME PIN SIGNAL NAME 1 TMDS Data 2 11 TMDS Clock Shield 2 TMDS Data 2 Shield 12 TMDS Clock 3 TMDS Data 2 13 CEC 4 TMDS Data 1 14 No Connect 5 TMDS Data 1 Shield 15 DDC Clock 6 TMDS Data 1 16 DDC Data 7 TMDS Data 0 17 Ground 8 TMDS Data 0 Shield 18 5V Power 9 TMDS Data 0 19 Hot Pl...

Page 229: ...CRIPTION SYSLG6 4 0 Critical 1 s SYSLG8 16 10 Critical No memory 1 SYSLG8 16 11 Critical No memory 2 SYSLG8 16 16 Critical web No free connection at the moment wait one minute and retry Currently there is no free connection available Wait one minute and retry SYSLG8 16 17 Critical System No free memory No free memory available SYSLG8 16 18 Critical System No free UDP port The system must be restar...

Page 230: ...tical Up Download Illegal file type Illegal file type SYSLG8 16 9 Critical Up Download Duplication of file name A file name is duplicated SYSLG8 47 35 Critical IP Select master IP failed on ifIndex 1 j Selected master IP failed on the specified ifIndex SYSLG8 47 37 Critical IP Primary IP address could not be obtained Primary IP address could not be obtained SYSLG8 47 8 Critical Table is empty The ...

Page 231: ... invalid The Auto update process is aborted SYSLG1 0 61 Error AAA Can t restore factory defaults during auto update operation The system could not restore the factory defaults during the auto update operation SYSLG1 5 21 Error Stack Lost connection with unit 1 d reason 0x 2 x Unit will be rebooted Connection with the specified unit has been lost due to the specified reason The unit will be reboote...

Page 232: ...mming process failed because it is not valid any more SYSLG7 0 121 Error System Memory overflow There has been a memory overflow SYSLG7 0 130 Error FDB No free mac address There is no free MAC address SYSLG7 0 78 Error SNMP Port 1 j doesn t accept administrative parameter 2 s The specified administrative parameter is not accepted SYSLG7 0 79 Error Interface Port 1 j doesn t support 2 s parameter T...

Page 233: ... occurred during initialization The specified errors occurred during the initialization process SYSLG8 31 12 Error AAA Authentication failed for 1 s source 2 s SYSLG8 31 29 Error AAA Radius returned attribute error The RADIUS has found an erroneous attribute SYSLG8 31 30 Error SNMP Unknown variable Unknown code or status is encountered SYSLG8 31 31 Error AAA User name received empty string The use...

Page 234: ...an entry into Hash SYSLG8 5 162 Error System Cannot delete entry from Hash Cannot delete an entry from Hash SYSLG8 5 180 Error System GCLIP_mib2cli_analyze_ command Cannot insert entry to Hash Cannot insert an entry to Hash SYSLG8 5 181 Error SNMP Length is limited by 160 characters The field length is limited by 160 characters SYSLG8 56 3 Error Interface Failed to set default priority Failed to s...

Page 235: ...ocess encountered memory problems while extracting the specified file SYSLG8 75 21 Error 1 s SYSLG8 75 3 Error IP SVNZIP found CRC Error extracting file 1 s SVNZIP found a CRC error while extracting the specified file SYSLG8 75 33 Error Web PGPRCS Found no end tag between two tags No end tag encountered between two tags SYSLG8 75 4 Error IP Can t get hostname A hostname cannot be received SYSLG8 7...

Page 236: ... on port 2 d Could not open a socket on the specified port The socket will be opened on the second specified port SYSLG8 75 70 Error Web GOAHEADG Received HTTP header request exceeded allowed size Received an HTTP header request to exceeded allowed size SYSLG8 75 71 Error Web GOAHEADG Couldn t find web service struct entry Could not find a web service struct entry SYSLG8 75 72 Error Web GOAHEADG C...

Page 237: ... 3 d Size 4 d Unfreed block 5 s SYSLG8 86 29 Error SNMP Package 1 s Routine 2 d Location 3 d Error 4 s SYSLG8 86 3 Error SNMP Not enough space for instance id of variable 1 lu of trap 2 lu There is not enough space for the instance ID of the specified variable of the specified trap SYSLG8 86 7 Error SNMPCOMMG_StoreInit ialCommunityEntry no free community entry available No free community entry is ...

Page 238: ...e PSE power used by the specified unit is below the threshold SYSLG1 5 23 Information al Interface Unit 1 d was shutdown JUMBO frames not supported The specified unit is shutdown because Jumbo frames are not supported SYSLG1 5 24 Information al Stack Master switchover unit 1 d is now master The specified unit is now the Master unit SYSLG1 5 25 Information al Stack Backup master unit 1 d was remove...

Page 239: ...ate A new file can be downloaded from a TFTP server The message appears when this procedure starts SYSLG6 0 3 Information al Up Download Boot image download completed The Boot image download is completed successfully The system supports the boot image update A new file can be downloaded from a TFTP server The message appears when this procedure is completed successfully SYSLG6 1 1 Information al P...

Page 240: ... SYSLG7 5 68 Information al VLAN 1 j changed from Dynamic to Static A dynamically configured VLAN was deleted from the list of dynamic VLANs and was then added to the statically configured VLANs during a GVRP protocol operation SYSLG7 5 69 Information al VLAN 1 j changed from Static to Dynamic A statically configured VLAN was deleted from the list of static VLANs and was then added to the dynamica...

Page 241: ... NVRAM section only All data from all user sections can be deleted from NVRAM then NVRAM is set to default values SYSLG8 26 5 Information al NVRAM section 1 s is erased The system supports a few NVRAM users Each user can access its NVRAM section only A given user section can be erased from NVRAM SYSLG8 26 7 Information al System Initialization task is completed The system informs that tasks are cr...

Page 242: ...tion 5 s 4 y TERMINATED The Telnet SSH session may still be connected The CLI session for the specified user between the specified source and destination addresses is terminated The Telnet SSH session may still be connected SYSLG8 31 64 Information al AAA User CLI session for user 2 s over 1 s source 3 y destination 5 s 4 y ACCEPTED The CLI session for the specified user between the specified sour...

Page 243: ...stackable projects only See the relevant trap message as in the case when the specified stack member operating in the standalone mode issues it SYSLG8 63 6 Information al Stack UNIT ID 1 d Trap 2 s Valid for stackable projects only See the relevant trap message as in the case when the specified stack member operating in the standalone mode issues it SYSLG8 74 51 Information al Interface Interface ...

Page 244: ...Up Download Configuration Download has been completed The configuration file download process has been successfully completed SYSLG8 95 9 Information al Up Download Configuration Upload has been started The configuration file upload process has started SYSLG8 96 8 Information al Starting autogeneration of self signed certificate 1 u bits SYSLG8 96 9 Information al AAA Autogeneration of self signed...

Page 245: ...rmation al Stack Stack cable 1 s link 2 s on unit 3 d The specified stacking cable is connected to the specified unit SYSLG1 6 11 Information al PS 1 d status changed 2 s The system uses two power supply sources 1 and 2 The system can operate with one or both power supply units The power supply has changed SYSLG1 6 8 Information al System FAN 1 d status changed 2 s The specified fan status has cha...

Page 246: ...ation al 1x Port 1 j is Authorized The specified port is authorized SYSLG7 13 26 Information al 1x MAC 1 m is authorized on port 2 j The specified MAC is authorized on the specified port SYSLG7 15 0 Information al Security Port 1 s suspended by Loopback Detection The specified port is suspended by Loopback Detection SYSLG7 2 0 Information al Interface Port 1 j added to 2 j A physical port is added...

Page 247: ...located memory for key The system did not provide sufficient memory for the key SYSLG8 10 37 Information al bootup The device has been configured via BOOTP The device has been configured via BOOTP SYSLG8 10 38 Information al DHCP The device has been configured on interface 1 j IP 2 y mask 3 y DHCP server 4 y The device has been configured on the specified interface with the specified IP address an...

Page 248: ...Information al AAA User created successfully A new user is created in the current table of authenticated users SYSLG8 31 11 Information al AAA Authentication succeeded Authentication with the current method succeeded SYSLG8 31 3 Information al AAA Request for authentication The user authentication process is started SYSLG8 31 40 Information al AAA New 1 s connection for user 2 s source 5 s 3 y des...

Page 249: ... Attention port 1 j from which the bpdu was received is configured as Fast Port A received BPDU message indicates that the specified port is configured as the Fast port SYSLG8 49 11 Information al sshpClientId illegal connection id 1 d SYSLG8 49 14 Information al Security Closed SSH connection to 1 y SYSLG8 49 2 Information al SSH SSH log 1 s The string parameter describes the reason this message ...

Page 250: ...specified unit has failed SYSLG8 83 3 Information al Stack Synchronization with unit 1 d is finished successfully Synchronization with the specified unit has succeeded SYSLG8 83 4 Information al Stack Wrong source unit id 1 d message discarted The specified source unit ID is incorrect the message is discarded SYSLG8 84 0 Information al IP NTP Packet received from UDP The NTP packet is received fro...

Page 251: ...SYSLG8 89 2 Notice SNMP End conversion of old format CDB The conversion of old format CDB has finished SYSLG8 9 10 Notice Interface Type 1 u not supported The specified type is not supported SYSLG8 9 12 Notice Illegal chksum igmp_size 1 lu SYSLG7 14 0 Notice LLDP status 1 s SYSLG8 1 0 Notice Bad msg received from 1 y on intf 2 y SYSLG8 1 1 Notice Ignoring msg from 1 y on intf 2 y SYSLG8 105 1 Noti...

Page 252: ...ch requires authorization and which is disabled for multiple hosts SYSLG5 3 10 Warning Interface Sum of the committed BW on interface 1 d is more than port speed all the services applied to it will scaled down The sum of the committed BW on the specified interface d is more than port speed all the services applied to it will scaled down SYSLG5 3 12 Warning Security Service 1 d is partially active ...

Page 253: ...rate with one or both power supply units SYSLG7 0 161 Warning 1 s 2 s SYSLG7 0 2 Warning 1 s 2 s SYSLG7 0 3 Warning 1 s 2 s SYSLG7 0 4 Warning 1 s 2 s SYSLG7 0 5 Warning 1 s 2 s SYSLG7 0 6 Warning 1 s 2 s SYSLG7 0 7 Warning 1 s 2 s SYSLG7 0 8 Warning 1 s 2 s SYSLG7 0 9 Warning 1 s 2 s SYSLG7 10 8 Warning Security failed to allocate rules in Asic for ifIndex 1 d Failed to allocate ASIC rules in a s...

Page 254: ...e not on the same subnet Error in the BOOTP server configuration where the IP interface and default router are not on the same subnet SYSLG8 10 21 Warning bootup BOOTP msg indicates that IP interface and TFTP server are not on the same subnet Error in the BOOTP server configuration where the IP interface and TFTP server are not on the same subnet SYSLG8 10 22 Warning DHCP DHCP msg on interface 1 j...

Page 255: ...hange required A Privacy key change is required SYSLG8 10 34 Warning AAA Privacy Key change length 1 u does not fit privacy protocol The modified Privacy Key length does not fit the privacy protocol SYSLG8 10 35 Warning AAA Authentication password required An authentication key is received but not configured SYSLG8 10 36 Warning SSH Privacy password required A Privacy password change is required S...

Page 256: ...thentication method is unsupported SYSLG8 31 37 Warning AAA Unsupported arguments for adding received in authorization RESPONSE msg 1 s Received a message indicating the additional authentication argument is not supported SYSLG8 31 38 Warning AAA Unsupported arguments for replacement received in authorization RESPONSE msg 1 s Received a message indicating the replacement authentication argument is...

Page 257: ...cket received on interface 1 s 2 j from 3 y to 4 y protocol 5 d service 6 s A Management ACL drop packet is received on the specified interface SYSLG8 48 35 Warning STP 1 j STP status Blocking STP status is in Blocking mode SYSLG8 48 36 Warning STP 1 j STP status Forwarding STP status is in Forwarding mode SYSLG8 48 37 Warning STP 1 j of instance 2 d STP status Blocking For the specified instance ...

Page 258: ...MP router table is full SYSLG8 51 10 Warning FDB IGMP Snooping in version 3 received version 1 query msg Version 3 IGMP Snooping received a Version 1 query message SYSLG8 51 11 Warning FDB IGMP Snooping in version 3 received version 2 query msg Version 3 IGMP Snooping received a Version 2 query message SYSLG8 51 39 Warning FDB BIGMPP_indication warning Unknown value of frame type received for igmp...

Page 259: ...6 Warning SSH Packet RX on virtual interface 1 s area 2 s type 3 s 4 s Key IDs do not match keys are expired or some other key configuration problems SYSLG8 74 60 Warning SSH Packet RX on virtual interface 1 s area 2 s type 3 s 4 s Key IDs do not match keys are expired or some other key configuration problems SYSLG8 74 65 Warning AAA Packet TX from interface 1 s md5 auth key not found Md5 keys are...

Page 260: ...eived from the specified server SYSLG8 78 2 Warning AAA No TACACS server is configured cannot start authentication No TACACS server is configured so authentication cannot be performed SYSLG8 78 23 Warning AAA Connection to server 1 s is aborted Single Connection mode may not be supported by this server A connection attempt to a specified server is terminated Single connection mode is not supported...

Page 261: ... Access attempted by unauthorized NMS Access attempted by an unauthorized NMS SYSLG8 86 9 Warning Up Download Error encountered while downloading config 1 s An error occurred while downloading the specified configuration SYSLG8 89 8 Warning SNMP Overflow in CDB There is an overflow in CDB SYSLG8 89 9 Warning SNMP Overflow in startup CDB offset 1 lu file end 2 lu SYSLG8 9 11 Warning FDB Timer alloc...

Page 262: ... is authorize and multiple host disable A packet with a specified MAC address attempted to gain access through a port which requires authorization and which is disabled for multiple hosts SYSLG5 3 10 Warning Interface Sum of the committed BW on interface 1 d is more than port speed all the services applied to it will scaled down The sum of the committed BW on the specified interface d is more than...

Page 263: ...rning Power Power Supply 1 d is down The specified power supply is down The system uses two power supply sources 1 and 2 The system can operate with one or both power supply units SYSLG7 0 161 Warning 1 s 2 s SYSLG7 0 2 Warning 1 s 2 s SYSLG7 0 3 Warning 1 s 2 s SYSLG7 0 4 Warning 1 s 2 s SYSLG7 0 5 Warning 1 s 2 s SYSLG7 0 6 Warning 1 s 2 s SYSLG7 0 7 Warning 1 s 2 s SYSLG7 0 8 Warning 1 s 2 s SY...

Page 264: ...client received an illegal IP address in the DHCP message SYSLG8 10 20 Warning bootup BOOTP msg indicates that IP interface and default router are not on the same subnet Error in the BOOTP server configuration where the IP interface and default router are not on the same subnet SYSLG8 10 21 Warning bootup BOOTP msg indicates that IP interface and TFTP server are not on the same subnet Error in the...

Page 265: ... via BOOTP DHCP client not allowed A Privacy key change via BOOTP DHCP client not allowed SYSLG8 10 33 Warning SSH Privacy key change required A Privacy key change is required SYSLG8 10 34 Warning AAA Privacy Key change length 1 u does not fit privacy protocol The modified Privacy Key length does not fit the privacy protocol SYSLG8 10 35 Warning AAA Authentication password required An authenticati...

Page 266: ...ause of AAA low resources SYSLG8 31 36 Warning AAA Received unsupported authentication REPLY msg status 1 u server msg 2 s Received a message indicating that authentication method is unsupported SYSLG8 31 37 Warning AAA Unsupported arguments for adding received in authorization RESPONSE msg 1 s Received a message indicating the additional authentication argument is not supported SYSLG8 31 38 Warni...

Page 267: ...ration has failed SYSLG8 45 9 Warning Up Download The configuration file has failed to download The configuration file has failed to download SYSLG8 46 10 Warning Security Management ACL drop packet received on interface 1 s 2 j from 3 y to 4 y protocol 5 d service 6 s A Management ACL drop packet is received on the specified interface SYSLG8 48 35 Warning STP 1 j STP status Blocking STP status is...

Page 268: ... number of multicast entries is limited SYSLG8 51 0 Warning FDB IGMP group table overflow The IGMP group table is full SYSLG8 51 1 Warning FDB IGMP router table overflow The IGMP router table is full SYSLG8 51 10 Warning FDB IGMP Snooping in version 3 received version 1 query msg Version 3 IGMP Snooping received a Version 1 query message SYSLG8 51 11 Warning FDB IGMP Snooping in version 3 received...

Page 269: ...s the specified number of bytes SYSLG8 74 55 Warning Interface Packet RX on interface 1 s from 2 s type 3 s 4 s Packets corrupted and or network problems SYSLG8 74 56 Warning SSH Packet RX on virtual interface 1 s area 2 s type 3 s 4 s Key IDs do not match keys are expired or some other key configuration problems SYSLG8 74 60 Warning SSH Packet RX on virtual interface 1 s area 2 s type 3 s 4 s Key...

Page 270: ...specified TACACS server has failed SYSLG8 78 18 Warning IP Unexpected TCP msg was received from server 1 s Unexpected TCP message was received from the specified server SYSLG8 78 2 Warning AAA No TACACS server is configured cannot start authentication No TACACS server is configured so authentication cannot be performed SYSLG8 78 23 Warning AAA Connection to server 1 s is aborted Single Connection ...

Page 271: ...s full SYSLG8 86 0 Warning Up Download Configuration update of unit 1 lu failed Reason 2 s The specified unit configuration update failed SYSLG8 86 4 Warning SNMP Access attempted by unauthorized NMS Access attempted by an unauthorized NMS SYSLG8 86 9 Warning Up Download Error encountered while downloading config 1 s An error occurred while downloading the specified configuration SYSLG8 89 8 Warni...

Page 272: ... Configuration file upload has been aborted SYSLG8 95 1 Warning Up Download Configuration download has been aborted Configuration file download has been aborted SYSLG8 95 6 Warning 1 s SYSLG8 96 7 Warning Unknown certificate subject field SYSLG8 98 6 Warning System Bad OS status Bad OS status SYSLG8 98 7 Warning FDB Reached Maximum number of IGMP memberships The IGMP database is full No entry can ...

Page 273: ...le when there is a direct connection to the console port of the device It is necessary for the user needs to attach a terminal or PC with terminal emulation to the console port of the switch 2 Power on the switch After the boot image is loaded to 100 the Switch will allow 2 seconds for the user to press the hotkey Shift 6 to enter the Password Recovery Mode Once the Switch enters the Password Reco...

Page 274: ...ation pertaining to the product and in that case the product is being sold As Is without any warranty whatsoever including without limitation the Warranty as described herein notwithstanding anything stated herein to the contrary Submitting A Claim The customer shall return the product to the original purchase point based on its return policy In case the return policy period has expired and the pr...

Page 275: ...ms Inc Other trademarks or registered trademarks are the property of their respective owners Copyright Statement No part of this publication or documentation accompanying this product may be reproduced in any form or by any means or used to make any derivative such as translation transformation or adaptation without permission from D Link Corporation D Link Systems Inc as stipulated by the United ...

Page 276: ...Registration Register your D Link product online at http support dlink com register Product registration is entirely voluntary and failure to complete or return this form will not diminish your warranty rights ...

Page 277: ...e warranty period on this product U S and Canadian customers can contact D Link technical support through our website or by phone Tech Support for customers within the United States D Link Technical Support over the Telephone USA 877 DLINK 55 877 354 6555 D Link Technical Support over the Internet http support dlink com Tech Support for customers within Canada D Link Technical Support over the Tel...

Page 278: ...2 00pm 0 05ppm peak 0 045ppm off peak Times Internet http www dlink co uk ftp ftp dlink co uk Technische Unterstützung Deutschland Web http www dlink de Telefon 49 0 1805 2787 0 14 pro Minute Zeiten Mo Fr 09 00 17 30 Uhr Österreich Web http www dlink at Telefon 43 0 820 480084 0 116 pro Minute Zeiten Mo Fr 09 00 17 30 Uhr Schweiz Web http www dlink ch Telefon 41 0 848 331100 0 08 CHF pro Minute Ze...

Page 279: ...0 15ppm anytime Tech Support for customers within Belgium 070 66 06 40 www dlink be 0 175ppm peak 0 0875ppm off peak Tech Support for customers within Luxemburg 32 70 66 06 40 www dlink be Asistencia Técnica Asistencia Técnica Telefónica de D Link 34 902 30 45 45 0 067 min De Lunes a Viernes de 9 00 a 19 00 http www dlink es Supporto tecnico Supporto Tecnico dal lunedì al venerdì dalle ore 9 00 al...

Page 280: ... 17 00 Pevná linka 1 78 CZK min mobil 5 40 CZK min Technikai Támogatás Tel 06 1 461 3001 Fax 06 1 461 3004 Land Line 14 99 HUG min Mobile 49 99 HUF min email support dlink hu URL http www dlink hu Teknisk Support D Link Teknisk telefon Support 820 00 755 Hverdager 08 00 20 00 D Link Teknisk Support over Internett http www dlink no Teknisk Support D Link teknisk support over telefonen Tlf 9013 8899...

Page 281: ...εφαλληνίας 64 11251 Αθήνα Τηλ 210 86 11 114 Δευτέρα Παρασκευή 09 00 17 00 Φαξ 210 8611114 http www dlink gr support Assistência Técnica Assistência Técnica da D Link na Internet http www dlink pt e mail soporte dlink es Teknisk Support D Link Teknisk Support via telefon 0900 100 77 00 Vardagar 08 00 20 00 D Link Teknisk Support via Internet http www dlink se ...

Page 282: ...k biz hr Tehnična podpora Zahvaljujemo se vam ker ste izbrali D Link proizvod Za vse nadaljnje informacije podporo ter navodila za uporabo prosimo obiščite D Link ovo spletno stran www dlink eu www dlink biz sl Suport tehnic Vă mulţumim pentru alegerea produselor D Link Pentru mai multe informaţii suport şi manuale ale produselor vă rugăm să vizitaţi site ul D Link www dlink eu www dlink ro ...

Page 283: ...b www dlink co in E Mail helpdesk dlink co in Indonesia Malaysia Singapore and Thailand Tel 62 21 5731610 Indonesia Tel 1800 882 880 Malaysia Tel 65 6501 4200 Singapore Tel 66 2 719 8978 9 Thailand 24 7 for English Support only Web http www dlink com sg support E mail support dlink com sg Korea Tel 82 2 2028 1815 Monday to Friday 9 00am to 6 00pm Web http www d link co kr E mail arthur d link co k...

Page 284: ...92 21 4548158 92 21 4548310 Monday to Friday 10 00am to 6 00pm Web http support dlink me com E mail zkashif dlink me com South Africa and Sub Sahara Region Tel 27 12 665 2165 08600 DLINK for South Africa only Monday to Friday 8 30am to 9 00pm South Africa Time Web http www d link co za E mail support d link co za Turkey Tel 90 212 2895659 Monday to Friday 9 00am to 6 00pm Web http www dlink com tr...

Page 285: ...ink D Link предоставляет бесплатную поддержку для клиентов в течение гарантийного срока Клиенты могут обратиться в группу технической поддержки D Link по телефону или через Интернет Техническая поддержка D Link 7 495 744 00 99 Техническая поддержка через Интернет http www dlink ru e mail support dlink ru ...

Page 286: ...ombia 01800 9525465 Lunes a Viernes 06 00am a 19 00pm Costa Rica 0800 0521478 Lunes a Viernes 05 00am a 18 00pm Ecuador 1800 035465 Lunes a Viernes 06 00am a 19 00pm El Salvador 800 6335 Lunes a Viernes 05 00am a 18 00pm Guatemala 1800 8350255 Lunes a Viernes 05 00am a 18 00pm México 01800 1233201 Lunes a Viernes 06 00am a 19 00pm Panamá 011 008000525465 Lunes a Viernes 05 00am a 18 00pm Perú 0800...

Page 287: ...ra clientes no Brasil durante o período de vigência da garantia deste produto Suporte Técnico para clientes no Brasil Website para suporte www dlink com br suporte e mail suporte dlink com br Telefones para contato Clientes de São Paulo 2755 6950 Clientes das demais regiões 0800 70 24 104 Segunda à Sexta feira das 9 00h às 21 00h Sábado das 9 00h às 15 00h ...

Page 288: ...方式與D Link台灣 地區技術支援工程師聯絡 D Link 免付費技術諮詢專線 0800 002 615 服務時間 週一至週五 早上9 00到晚上9 00 不含周六 日及國定假日 網 站 http www dlink com tw 電子郵件 dssqa_service dlink com tw 如果您是台灣地區以外的用戶 請參考D Link網站全球各地 分公司的聯絡資訊以取得相關支援服務 產品保固期限 台灣區維修據點查詢 請參考以下網頁說明 http www dlink com tw 產品維修 使用者可直接送至全省聯強直營維修站或請洽您的原購買經銷商 ...

Page 289: ...okumentasi pengguna dapat diperoleh pada situs web D Link Dukungan Teknis untuk pelanggan Dukungan Teknis D Link melalui telepon Tel 62 21 5731610 Dukungan Teknis D Link melalui Internet Email support dlink co id Website http support dlink co id ...

Page 290: ...Technical Support この度は弊社製品をお買い上げいただき 誠にありがとうご ざいます 下記弊社 Web サイトからユーザ登録及び新製品登録を 行っていただくと ダウンロードサービスにて サポート情報 ファームウェア ユーザマニュアルを ダウンロードすることができます ディーリンクジャパン Web サイト URL http www dlink jp com ...

Page 291: ...技术支持 办公地址 北京市东城区北三环东路 36 号 环球贸易中心 B 座 26F 02 05 室 邮编 100013 技术支持中心电话 8008296688 028 66052968 技术支持中心传真 028 85176948 各地维修中心地址请登陆官方网站查询 网址 http www dlink com cn 办公时间 周一到周五 早09 00到晚18 00 ...

Page 292: ... site 1 employee 2 9 10 49 50 99 100 499 500 999 1000 or more 3 What network protocol s does your organization use XNS IPX TCP IP DECnet Others_____________________________ 4 What network operating system s does your organization use D Link LANsmart Novell NetWare NetWare Lite SCO Unix Xenix PC NFS 3Com 3 Open Cisco Network Banyan Vines DECnet Pathwork Windows NT Windows 98 Windows 2000 ME Windows...

Page 293: ......

Reviews: