background image

D-Link DGS-3224SR Layer 2 Gigabit Ethernet Switch

 

 

80

 

Figure 17-5. 802.1X Authenticator Settings 

This window allows you to set the following features: 

• 

From [

    

] To [    ]

 – Enter the port or ports to be set. 

• 

AdmDir [

both

– Sets the administrative-controlled direction to either 

in

 or 

both

. If 

in

 is selected, control is 

only exerted over incoming traffic through the port you selected in the first field. If 

both

 is selected, control 

is exerted over both incoming and outgoing traffic through the controlled port selected in the first field.

 

• 

PortControl [

auto

– This allows you to control the port authorization state. Select 

forceAuthorized

 to 

disable 802.1X and cause the port to transition to the authorized state without any authentication exchange 
required. This means the port transmits and receives normal traffic without 802.1X-based authentication of 
the client. If 

forceUnauthorized

 is selected, the port will remain in the unauthorized state, ignoring all 

attempts by the client to authenticate. The switch cannot provide authentication services to the client through 
the interface. The third option is 

auto

. This enables 802.1X and causes the port to begin in the unauthorized 

state, allowing only EAPOL frames to be sent and received through the port. The authentication process 
begins when the link state of the port transitions from down to up, or when an EAPOL-start frame is 
received. The switch then requests the identity of the client and begins relaying authentication messages 
between the client and the authentication server. 

 

• 

TxPeriod [

30 

– This sets the TxPeriod of time for the authenticator PAE state machine. This value 

determines the period an EAP Request/Identity packet is transmitted to the client. 

 

• 

QuietPeriod [

60 

– This allows you to set the number of seconds that the switch remains in the quiet state 

following a failed authentication exchange with the client.

 

• 

SuppTimeout [

30

 ] 

– This value determines timeout conditions in the exchanges between the Authenticator 

and the client.

 

• 

ServerTimeout [

30

 ] 

– This value determines timeout conditions in the exchanges between the 

Authenticator and the client.

 

• 

MaxReq [

2

 ] 

– The maximum number of times that the switch will retransmit an EAP Request packet to the 

client before it times out the authentication session.

 

• 

ReAuthPeriod [

3600

  ] 

– A constant that defines a nonzero number of seconds between periodic 

reauthentications of the client.

 

Summary of Contents for DGS-3224SR

Page 1: ...D Link DGS 3224SR High Density Stackable Gigabit Ethernet Switch User s Guide...

Page 2: ...is strictly forbidden Trademarks used in this text D Link the D LINK logo are trademarks of D Link Computer Corporation Microsoft and Windows are registered trademarks of Microsoft Corporation Other...

Page 3: ...nt Options 4 Installation 2 Package Contents 2 Installing the Switch in a Rack 4 Connecting Stacked Switch Groups 5 Configuring a Switch Group for Stacking 6 Connecting the Console Port 9 Password Pro...

Page 4: ...ng Tree 53 QoS Quality of Service 58 Traffic Control Broadcast Multicast Storm Control 58 Configuring Default Priority 59 Configuring 802 1p User Priority 60 802 1p User Priority 61 Traffic Segmentati...

Page 5: ...nitoring and Statistics 93 Port Utilization 93 Packets 94 Errors 97 Size 101 Maintenance 107 Technical Specifications 112 Glossary 114 WARRANTY FOR ALL COUNTRIES AND REGIONS EXCEPT USA 121 WARRANTY IN...

Page 6: ...ages or prompts appearing on your screen For example You have mail Bold font is also used to represent filenames program names and commands For example use the copy command Boldface Typewriter Font In...

Page 7: ...ot service any product except as explained in your system documentation Opening or removing covers that are marked with the triangular symbol with a lightning bolt may expose you to electrical shock C...

Page 8: ...cally rated to operate with the power available in your location Safety Instructions continued Use only approved power cable s If you have not been provided with a power cable for your system or for a...

Page 9: ...After installing system components in a rack never pull more than one component out of the rack on its slide assemblies at one time The weight of more than one extended component could cause the rack...

Page 10: ...a sensitive component first place it in an antistatic container or packaging 3 Handle all sensitive components in a static safe area If possible use antistatic floor pads and workbench pads and an ant...

Page 11: ...tion 1000BASE T SFP ports Ring or chain topology switch stacking configuration for up to 12 additional DES 3224SR switches 88 Gbps switching fabric capacity Supports 802 1D STP and 802 1w Rapid Spanni...

Page 12: ...proximately 2 seconds after the switch is powered on to indicate the ready state of the device Master Lights steady green when the Switch is configured as the Master Switch in a stack Console This ind...

Page 13: ...rd Plug the female connector of the provided power cord into this socket and the male side of the cord into a power outlet The switch automatically adjusts its power setting to any supply voltage in t...

Page 14: ...driven interface provides complete access to all switch management features For a full list of commands see the Command Line Reference which is included on the documentation CD SNMP Based Management Y...

Page 15: ...ction SNMP Settings IP Address Assignment Connecting Devices to the Switch Package Contents Before you begin installing the switch confirm that your package contains the following items One DGS 3224SR...

Page 16: ...k until you have properly configured all switches for switch stacking An improperly configured switch stack can cause a broadcast storm Installing the Switch Without the Rack 1 Install the switch on a...

Page 17: ...m racks Refer to the illustrations below 1 Use the supplied screws to attach a mounting bracket to each side of the switch 2 Align the holes in the mounting bracket with the holes in the rack 3 Insert...

Page 18: ...ts per Ring stack or 168 GbE ports per Star stack Switches are stacked together through a high speed stack cables that provide high speed of multiple Gigabit connections allowing the entire stack to p...

Page 19: ...llow the instructions below to configure the DGS 3224SR as the designated Master and then to configure the slave units To configure the DES 3224SR to function in a stacked group as a master do the fol...

Page 20: ...note that the Master LED is lit indicating that this Switch is the Master unit in the stack Gigabit Combo Ports In addition to the 24 10 100 1000 Mbps ports the Switch features four Mini GBIC Combo p...

Page 21: ...r System The switch supports an external redundant power system Figure 2 6 DPS 500 with DES 3224SR Figure 2 7 DPS 800 with DES 3224SR NOTE See the DPS 500 documentation for more information CAUTION Do...

Page 22: ...lect Terminal keys not Windows keys NOTICE When you use HyperTerminal with the Microsoft Windows 2000 operating system ensure that you have Windows 2000 Service Pack 2 or later installed Windows 2000...

Page 23: ...administrator account being created and press the Enter key 3 You will be prompted to enter the same password again to verify it Type the same password and press the Enter key 4 Successful creation of...

Page 24: ...s that is separated into two parts The first part is to maintain a list of users and their attributes that are allowed to act as SNMP managers The second part describes what each user on that list can...

Page 25: ...itch must be known The IP address may be set using the Command Line Interface CLI over the console serial port as follows 1 Starting at the command line prompt enter the commands config ipif System ip...

Page 26: ...to an SFP transceiver port 1 Use your cabling requirements to select an appropriate SFP transceiver type 2 Insert the SFP transceiver sold separately into the SFP transceiver slot 3 Use the appropriat...

Page 27: ...ommunicate directly with the Switch using the HTTP protocol The Web based management module and the Console program and Telnet are different ways to access the same internal switching software and con...

Page 28: ...s as described in the table Figure 3 2 Main Web Manager Screen Area Function 1 Presents a graphical near real time image of the front panel of the switch This area displays the switch s ports and expa...

Page 29: ...agement access traffic segmentation and 802 1x The Switch Information page is used to enter system contact and physical location information and lists basic information such as the switch s MAC addres...

Page 30: ...switch s MAC Address assigned by the factory and unchangeable In addition the Boot PROM and Firmware Version numbers are shown This information is helpful to keep track of PROM and Firmware updates an...

Page 31: ...witch s factory default IP address is 10 90 90 90 with a subnet mask of 255 0 0 0 and a default gateway of 0 0 0 0 To manually assign the switch s IP address subnet mask and default gateway address Se...

Page 32: ...gned for use by the network administrator The fields which require entries under this option are as follows Subnet Mask A Bitmask that determines the extent of the subnet that the Switch is on Should...

Page 33: ...t be set before it can be managed with the Web based manager The switch IP address can be automatically set using BOOTP or DHCP protocols in which case the actual address assigned to the switch must b...

Page 34: ...ure 3 6 User Accounts Management Table To add a new user click on the Add button To modify or delete an existing user click on the Modify button for that user Figure 3 7 Add User Accounts Modify Table...

Page 35: ...in and User Some menu selections available to users with Admin privileges may not be available to those with User privileges The following table summarizes the Admin and User privileges Management Adm...

Page 36: ...subnet mask default gateway log user account and stack information settings to the factory default settings Reset Config returns all configuration settings except the stack information settings to th...

Page 37: ...1 Restart System NOTE clicking Yes is equivalent to executing Save Changes and then restarting the switch Switch Information The first page displayed upon logging in presents the System Information me...

Page 38: ...ge a System Name System Location and the name and telephone number of the responsible administrator in the System Contact It is recommended that the person responsible for the maintenance of the netwo...

Page 39: ...e the IGMP Snooping page under the IGMP folder Multicast Router Only If this option is enabled and IGMP Snooping is also enabled the switch forwards all multicast traffic to a multicast enabled router...

Page 40: ...ck up to 12 total are displayed in the upper right hand corner of your web browser The icons are in the same order as their respective Unit numbers with the Unit 1 switch corresponding to the icon in...

Page 41: ...on the front panel under the STACK NO heading Alternatively the stacking order can be manually assigned using the console s Command Line Interface CLI You can use the show stack_information command to...

Page 42: ...fig box_priority current_box_id 1 12 priority 1 16 Where the highest priority is assigned to the lowest value i e 2 is a higher priority than 5 Note Box priority settings will take effect after the sw...

Page 43: ...D Link DGS 3224SR Layer 2 Gigabit Ethernet Switch 30...

Page 44: ...VLANs The 802 1Q Static VLANs menu lists all previously configured VLANs by VLAN ID and name To delete an existing 802 1Q VLAN click the corresponding Delete button To create a new 802 1Q VLAN click t...

Page 45: ...tagging or 802 1Q untagged Checking the box will designate the port as Tagged Egress Select this to specify the port as a static member of the VLAN Egress member ports are ports that will be transmit...

Page 46: ...r untagged packets received by the port For example if port 2 is assigned a PVID of 3 then all untagged packets received on port 2 will be assigned to VLAN 3 This number is generally the same as the V...

Page 47: ...liminate an entire VLAN click on the X button for the VLAN you wish to delete The user configurable settings are the same when you Add or Modify a VLAN Read the next section for a description of these...

Page 48: ...to edit an existing 802 1Q VLAN entry on the switch Figure 5 7 802 1Q Static VLANs Entry Settings Edit Screen The Static VLANs Edit screen presents the current configuration of the VLAN Use this scre...

Page 49: ...ANs in the Configuration folder then open GVRP Settings and select the Unit and range of ports to configure For the selected port or group of ports choose to enable or disable Ingress checking and est...

Page 50: ...Ns A VLAN is a collection of end nodes grouped by logic rather than physical location End nodes that frequently communicate with each other are assigned to the same VLAN regardless of where they are l...

Page 51: ...3 bits or user priority 1 bit of Canonical Format Identifier CFI used for encapsulating Token Ring packets so they can be carried across Ethernet backbones and 12 bits of VLAN ID VID The 3 bits of use...

Page 52: ...erned Tagged packets are forwarded according to the VID contained within the tag Tagged packets are also assigned a PVID but the PVID is not used to make packet forwarding decisions the VID is Tag awa...

Page 53: ...is a member of the 802 1Q VLAN the switch then determines if the destination port is a member of the 802 1Q VLAN If it is not the packet is dropped If the destination port is a member of the 802 1Q V...

Page 54: ...enu 2 Choose the port or sequential range of ports using the From To port pull down menus 3 Use the remaining pull down menus to configure the parameters described below Parameter Description State En...

Page 55: ...is sometimes done for reasons of security or efficiency See the section titled Forwarding and Filtering for information on entering MAC addresses into the forwarding table Port Mirroring Figure 6 2 Po...

Page 56: ...from a 100 Mbps port onto a 10 Mbps port this can cause throughput problems The port you are copying frames from should always support an equal or lower speed than the port to which you are sending th...

Page 57: ...port in the group becomes the configuration for all of the ports in the aggregation group Load balancing is automatically applied to the ports in the aggregated group and a link failure within the gro...

Page 58: ...o quickly isolate a bandwidth intensive network device or to have an absolute backup aggregation group that is not under automatic control Type This pull down menu allows you to select between Static...

Page 59: ...e Unicast MAC address resides MAC Address The MAC address to which packets will be statically forwarded This must be a unicast MAC address Allowed to Go to Unit Allows the designation of the module on...

Page 60: ...on MAC Address The MAC address of the static source of multicast packets This must be a multicast MAC address VID The VLAN ID of the VLAN the above MAC address belongs to Port Settings Allows the sele...

Page 61: ...D Link DGS 3224SR Layer 2 Gigabit Ethernet Switch 48...

Page 62: ...to a specific Multicast group member based on IGMP messages sent from the device to the IGMP host or vice versa The Switch monitors IGMP messages and discontinues forwarding multicast packets when the...

Page 63: ...Default 260 Leave Timer This specifies the maximum amount of time in seconds between the Switch receiving a leave group message from a host and the Switch issuing a group membership query If no respo...

Page 64: ...the Switch s static router port table To add or modify an entry click the Modify button This will open the Static Router Ports Settings page as shown below Figure 9 7 Static Router Ports Settings Scr...

Page 65: ...S 3224SR the user may configure a forbidden portlist whose members are not forced to become router ports To activate this feature please use the console CLI The CLI command will be Config router_ports...

Page 66: ...g used in 802 1d and creates a single state Discarding In either case ports do not forward packets in the STP port transition states disabled blocking or listening or in the RSTP port state discarding...

Page 67: ...RSTP can interoperate with legacy equipment and is capable of automatically adjusting BPDU packets to 802 1d format when necessary However any segment using 802 1 STP will not benefit from the rapid...

Page 68: ...any port on the Switch spends in the listening state while moving from the blocking state to the forwarding state Priority 0 61440 32768 A Priority for the switch can be set from 0 to 61440 This numbe...

Page 69: ...d above with the addition of Port Priority and Port Cost An STP Group spanning tree works in the same way as the switch level spanning tree but the root bridge concept is replaced with a root port con...

Page 70: ...802 1d STP status to 802 1w RSTP status RSTP can coexist with standard STP however the benefits of RSTP are not realized on a port where an 802 1d network connects to an 802 1w enabled network Migrat...

Page 71: ...ned for and if possible tested for efficiency When set up properly it QoS can allow efficient and timely delivery of data for video conferencing or IP telephony without causing unacceptable delays of...

Page 72: ...ified traffic control is switched on This is the number of Broadcast Multicast or DLF packets in Kbps received by the switch that will trigger the storm traffic control measures The Threshold value ca...

Page 73: ...uration QoS can be customized by changing the output scheduling used for the hardware queues in the Switch As with any changes to QoS implementation careful consideration should be given to how networ...

Page 74: ...r Priority The User Priority menu is used to map incoming packets with 802 1p priority tags to one of the 8 hardware queues used on the Switch Note Level 7 the highest level is reserved for internal c...

Page 75: ...p of ports on another switch in a switch stack This method of segmenting the flow of traffic is similar to using VLANs to limit traffic but is more restrictive It provides a method of directing traffi...

Page 76: ...button will enter the combination of transmitting port and allowed receiving ports into the switch s Traffic Segmentation table The Unit drop down menu at the top of the page allows you to select a s...

Page 77: ...h the selected port Type This drop down menu allows you to select between RX receive TX transmit and Both This setting will determine whether the bandwidth ceiling is applied to receiving transmitting...

Page 78: ...s Add The following parameters can be set Parameter Description Index Syslog server settings index 1 4 Server IP The IP address of the Syslog server Severity This drop down menu allows you to select t...

Page 79: ...syslog line printer subsystem 7 network news subsystem 8 UUCP subsystem 9 clock daemon 10 security authorization messages 11 FTP daemon 12 NTP subsystem 13 log audit 14 log alert 15 clock daemon 16 lo...

Page 80: ...e MAC addresses unknown to the switch prior to locking the port or ports from connecting to the switch s locked ports and gaining access to the network Figure 14 1 Port Security Settings The following...

Page 81: ...2 Gigabit Ethernet Switch 68 Mode This pull down menu allows you to select how the MAC address table locking will be implemented on the switch for the selected group of ports The options are DeleteOnR...

Page 82: ...ters can set or are displayed Parameter Description System Boot Time Displays the current system time Time Source Displays the time source for the system SNTP State Use this pull down menu to Enable o...

Page 83: ...u want to update the system clock Time in HH MM SS Enter the current time in hours minutes and seconds if you want to update the system clock Time Zone and DST Figure 15 2 Time Zone and DST Settings P...

Page 84: ...m Month Enter the month DST will start on From time in HH MM Enter the time of day that DST will start on To Which Day Should be be To Which Week Enter the week of the month the DST will end To Day of...

Page 85: ...ame The entire process is described below in two parts To display the currently configured Access Profiles on the switch open the Configuration folder and click on the Access Profile Table link This w...

Page 86: ...stination Mac Destination MAC Mask Enter a MAC address mask for the destination MAC address 802 1p Selecting this option instructs the switch to examine the 802 1p priority value of each packet header...

Page 87: ...ofile Select Ethernet to instruct the switch to examine the layer 2 part of each packet header Select IP to instruct the switch to examine the IP address in each frame s header Vlan Selecting this opt...

Page 88: ...rwarding criterion Selecting TCP requires that you specify a source port mask and or a destination port mask src port mask Specify a TCP port mask for the source port in hex form hex 0x0 0xffff dest p...

Page 89: ...avoid possible frequent disconnection from the switch s Web based management agent Go to the Security Management folder click on Security IP Figure 17 1 Security IP Management The following fields can...

Page 90: ...side of IEEE 802 1X Port Based Network Access Control Through this mechanism users have to be authorized before being able to access the network See the following figure Figure 17 2 Typical 802 1X Co...

Page 91: ...02 1X Configuration with User Authentication The user s information including account number password and configuration details such as IP address and billing information is stored in a centralized RA...

Page 92: ...EEE 802 1X Standards Configure Authenticator To display the current 802 1X Authenticator Settings on the switch open the Configuration folder and then the Port Access Entity folder and finally click o...

Page 93: ...on is auto This enables 802 1X and causes the port to begin in the unauthorized state allowing only EAPOL frames to be sent and received through the port The authentication process begins when the lin...

Page 94: ...down menu select Force Authorized Force Unauthorized or Auto Force Authorized forces the Authenticator of the port to become Authorized Force Unauthorized forces the port to become Unauthorized TxPeri...

Page 95: ...802 1X Authenticator Settings To set up the Switch s 802 1X port based authentication select which ports are to be configured in the From and To fields Next enable the ports by selecting Authenticato...

Page 96: ...r Authentic Port This is the UDP port on the Radius server that will be used to authenticate users The default is 1812 Accounting Port This is the UDP port on the Radius server that will be used to lo...

Page 97: ...etween the management station and the network device SNMP settings are configured using the menus located on the SNMP V3 folder of the web manager Workstations on the network that are allowed SNMP pri...

Page 98: ...zation protocol is in use MD5 Indicates that the HMAC MD5 96 authentication level will be used SHA Indicates that the HMAC SHA authentication protocol will be used Priv Protocol None Indicates that no...

Page 99: ...pecifies that the HMAC SHA authentication protocol will be used Priv Protocol None Specifies that no authorization protocol is in use DES Specifies that DES 56 bit encryption is in use based on the CB...

Page 100: ...dentify the new SNMP view being created Subtree OID Type the Object Identifier OID Subtree for the view The OID identifies an object tree MIB tree that will be included or excluded from access by an S...

Page 101: ...ding To display the current settings for an existing SNMP Group Table entry click the blue link for the entry under the Group Name heading Figure 18 7 SNMP Group Table Display To add a new entry to th...

Page 102: ...v2 Specifies that SNMP version 2c will be used The SNMP v2c supports both centralized and distributed network management strategies It includes improvements in the Structure of Management Information...

Page 103: ...Table Configuration The following parameters can set Parameter Description Community Name Type an alphanumeric string of up to 32 characters that is used to identify members of an SNMP community This...

Page 104: ...the switch s SNMP Group Table click the Add button in the upper left hand corner of the SNMP Host Table page This will open the SNMP Host Table Configuration page as shown below Figure 18 11 SNMP Hos...

Page 105: ...ring used to identify the SNMP engine on the switch To display the switch s SNMP Engine ID open the SNMP Manager folder and click on the SNMP Engine ID link This will open the SNMP Engine ID Configura...

Page 106: ...s may be viewed using a line graph or table format To view the port utilization click on the Monitoring folder and then the Port Utilization link Figure 19 1 Port Utilization Line Chart The following...

Page 107: ...The Update Interval field sets the interval at which the error statistics are updated The following fields can be set Parameter Description Unit Allows you to specify a switch in a switch stack using...

Page 108: ...op down menu The Update Interval field sets the interval at which the error statistics are updated The following field can be set Parameter Description Unit Allows you to specify a switch in a switch...

Page 109: ...field sets the interval at which the error statistics are updated The following field can be set Parameter Description Unit Allows you to specify a switch in a switch stack using that switch s Unit I...

Page 110: ...g field can be set or are displayed Parameter Description Unit Allows you to specify a switch in a switch stack using that switch s Unit ID 15 indicates a switch in standalone mode Port Allows you to...

Page 111: ...Collision Excessive Collisions The number of frames for which transmission failed due to excessive collisions SingColl Single Collision Single Collision Frames The number of successfully transmitted...

Page 112: ...ing that switch s Unit ID 15 indicates a switch in standalone mode Port Allows you to specify a port to monitor from the switch selected above Update Interval The time between updates received from th...

Page 113: ...ceived that were less than 64 octets in length excluding framing bits but including FCS octets and had either an FCS or an alignment error Jabber The total number of frames received that were longer t...

Page 114: ...field sets the interval at which the error statistics are updated The following fields can be set Parameter Description Unit Allows you to specify a switch in a switch stack using that switch s Unit...

Page 115: ...D Link DGS 3224SR Layer 2 Gigabit Ethernet Switch 102 Click View Table to see the same information in tabular form...

Page 116: ...te Interval field sets the interval at which the error statistics are updated The following fields can be set Parameter Description Unit Allows you to specify a switch in a switch stack using that swi...

Page 117: ...D Link DGS 3224SR Layer 2 Gigabit Ethernet Switch 104 Switch History Figure 19 8 Switch History...

Page 118: ...orresponding MAC address from IGMP packets that pass through the switch The number of IGMP reports that were snooped is also displayed in the Reports field Figure 19 9 IGMP Snooping Table The followin...

Page 119: ...tch s ports are currently configured as router ports A router port configured by a user using the console or Web based management interfaces is displayed as a static router port designated by S A rout...

Page 120: ...stack if you have installed the optional stacking module and have properly interconnected the switches 15 indicates a switch in standalone mode Enter the IP address of the TFTP server in the Server I...

Page 121: ...to initiate the file transfer Upload Log To upload the switch history log file to a TFTP server click on the Maintenance folder and then the TFTP Service folder and then the Upload Log link Figure 20...

Page 122: ...anges to NV RAM before rebooting the switch To retain any configuration changes permanently click on the Save Configuration button in the Save Changes page as shown below Figure 20 6 Save Changes Once...

Page 123: ...executed the switch will return to the last saved configuration when rebooted In addition the Reset System option is added to reset all configuration parameters to their factory defaults save these pa...

Page 124: ...D Link DGS 3224SR Layer 2 Gigabit Ethernet Switch 111 Logout Use the Logout page to logout of the switch s Web based management agent by clicking on the Log Out button Figure 20 9 Logout...

Page 125: ...IEEE 802 3 Nway auto negotiation Protocols CSMA CD Data Transfer Rates Ethernet Fast Ethernet Gigabit Ethernet Fiber Optic Half duplex Full duplex 10 Mbps 20Mbps 100Mbps 200Mbps 1000Mbps 2000Mbps IEC...

Page 126: ...non condensing Storage 0 to 95 RH non condensing Dimensions 441 mm x 207 mm x 44 mm 1U 19 inch rack mount width Weight 3 15 kg EMI FCC Part 15 IECES 003 Canada EN55022 EN50082 1 or EN55024 CE Class A...

Page 127: ...BOOTP The BOOTP protocol allows you to automatically map an IP address to a given MAC address each time a device is started In addition the protocol can assign the subnet mask and default gateway to a...

Page 128: ...Simple Network Management Protocol SNMP to contain attributes of their managed systems The Switch contains its own internal MIB multicast Single packets copied to a specific subset of network address...

Page 129: ...a user log in to another computer system and access a host as if the user were connected directly to the host TFTP Trivial File Transfer Protocol Allows you to transfer files such as software upgrade...

Page 130: ...Condes Santiago Chile TEL 56 2 232 3185 FAX 56 2 232 0923 URL www dlink com cl China D Link Beijing Level 5 Tower W1 The Tower Oriental Plaza No 1 East Chang An Ave Dong Cheng District Beijing 100738...

Page 131: ...link co jp E MAIL kida d link co jp Netherlands D Link Benelux Lichtenauerlaan 102 120 3062 ME Rotterdam Netherlands TEL 31 10 2045740 FAX 31 10 2045880 URL www d link benelux nl www dlink benelux be...

Page 132: ...support dlink me com U A E D Link Middle East FZCO P O Box18224 R 8 Warehouse UB 5 Jebel Ali Free Zone Dubai United Arab Emirates TEL Jebel Ali 971 4 883 4234 FAX Jebel Ali 971 4 883 4394 Dubai 971 4...

Page 133: ...120...

Page 134: ...ie beim Anschlu an das Stromnetz die Anschlu werte 9 Die Netzanschlu steckdose mu aus Gr nden der elektrischen Sicherheit einen Schutzleiterkontakt haben 10 Verlegen Sie die Netzanschlu leitung so da...

Page 135: ...N OF LAW STATUTORY OR OTHERWISE INCLUDING WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE D LINK NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT ANY OTHER LIABILITY...

Page 136: ...n RMA number is issued the defective product must be packaged securely in the original or other suitable shipping package to ensure that it will not be damaged in transit and the RMA number must be pr...

Page 137: ...D Link s applicable product documentation will be corrected WARRANTY INFORMATION FOR USA ONLY Subject to the terms and conditions set forth herein D Link Systems Inc D Link provides this Limited warr...

Page 138: ...cations for the Software or to refund at D Link s sole discretion Except as otherwise agreed by D Link in writing the replacement Software is provided only to the original licensee and is subject to t...

Page 139: ...ermined by D Link not to be defective or non conforming What Is Not Covered This limited warranty provided by D Link does not cover Products if in D Link s judgment have been subjected to abuse accide...

Page 140: ...CH OF THIS LIMITED WARRANTY EVEN IF D LINK HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES THE SOLE REMEDY FOR A BREACH OF THE FOREGOING LIMITED WARRANTY IS REPAIR REPLACEMENT OR REFUND OF THE DEF...

Reviews: