background image

 

©Copyright 2006. All rights reserved. 

 

 

 

 

 

 

 

 

 

 

 
     

  

 

  

User Manual

 

Product Model:

 

TM

DGS/DXS-3300 Series

 

Layer 3 Stackable Gigabit Ethernet Switch 
Release 4.4

 

Summary of Contents for DGS-3324SR

Page 1: ... Copyright 2006 All rights reserved User Manual ProductModel TM DGS DXS 3300Series Layer3StackableGigabitEthernetSwitch Release4 4 ...

Page 2: ...ermission of D Link Corporation is strictly forbidden Trademarks used in this text D Link and the D LINK logo are trademarks of D Link Corporation Microsoft and Windows are registered trademarks of Microsoft Corporation Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products D Link Computer Corporation disclaims a...

Page 3: ...n 2 Features 3 Ports 4 Installing the SFP ports 5 Front Panel Components 5 LED Indicators 6 Rear Panel Description 7 Side Panel Description 8 Installation 9 Package Contents 9 Before Connecting to the Network 9 Installing the Switch without the Rack 10 Installing the Switch in a Rack 10 Mounting the Switch in a Standard 19 Rack 11 Power On 11 Power Failure 11 The Optional Module 11 The Media Acces...

Page 4: ... Devices to the Switch 30 Introduction to Web based Switch Configuration 31 Introduction 31 Logging on to the Web Manager 31 Web based User Interface 33 Areas of the User Interface 33 Web Pages 34 Configuring the Switch 35 Switch Information 36 IP Address 37 Advanced Settings 40 Box Information 42 Port Configuration 43 Port Description 45 Port Mirroring 46 Link Aggregation 47 Understanding Port Tr...

Page 5: ...e xStack DGS DXS 3300 Series 72 IEEE 802 1Q VLANs 73 802 1Q VLAN Tags 74 Port VLAN ID 75 Tagging and Untagging 75 Ingress Filtering 75 Default VLANs 76 Port based VLANs 76 VLAN Segmentation 76 VLAN and Trunk Groups 77 Protocol VLANs 77 Static VLAN Entry 78 GVRP Settings 82 Traffic Control 84 Port Security 85 Port Lock Entries 86 QoS 87 The Advantages of QoS 87 Understanding QoS 88 Bandwidth Contro...

Page 6: ...ntrol 137 Configure Authenticator 138 802 1X User 140 PAE System Control 141 Port Capability 141 Initializing Ports for Port Based 802 1x 142 Initializing Ports for MAC Based 802 1x 143 Reauthenticate Port s for Port Based 802 1x 143 Reauthenticate Port s for MAC based 802 1x 144 RADIUS Server 145 Layer 3 IP Networking 146 Layer 3 Global Advanced Settings 146 IP Multinetting 147 IP Interface Setup...

Page 7: ...ace Configuration 202 DVMRP Global Settings 202 DVMRP Interface Settings 202 PIM Protocol 204 PIM SM 204 PIM DM Interface Configuration 205 PIM Global Settings 205 PIM Interface Settings 205 PIM Candidate BSR Settings 207 PIM Parameter Settings 208 PIM Candidate RP Global Settings 209 PIM Candidate RP Settings 209 PIM Register Checksum Settings 210 PIM Static RP Settings 211 Security Management 21...

Page 8: ...able 240 SNMP Community Table 242 SNMP Host Table 243 SNMP Engine ID 244 Monitoring 245 Port Utilization 246 CPU Utilization 247 Packets 248 Received RX 248 UMB Cast RX 250 Transmitted TX 252 Errors 254 Received RX 254 Transmitted TX 256 Size 258 Stacking Information 260 Module Information 262 Device Status 263 MAC Address 264 Switch History Log 266 IGMP Snooping Group 267 IGMP Snooping Forwarding...

Page 9: ...hbor Table 289 Browse DVMRP Routing Next Hop Table 289 PIM Monitoring 290 Browse PIM Neighbor Table 290 PIM IP MRoute Table 290 Browse PIM RP Set Table 291 Switch Maintenance 292 TFTP Services 292 Download Firmware 292 Download Configuration File 293 Download PROM 293 Upload Configuration 293 Upload Log 294 Multiple Image Services 295 Firmware Information 295 Config Firmware Image 296 CompactFlash...

Page 10: ...1 6 307 SIM Using the Web Interface 309 Topology 310 Tool Tips 312 Right Click 314 Group Icon 314 Commander Switch Icon 315 Member Switch Icon 315 Candidate Switch Icon 316 Menu Bar 318 Group 318 Device 318 View 318 Firmware Upgrade 319 Configuration File Backup Restore 319 Upload Log File 319 Appendix A 320 Appendix B 322 Cables and Connectors 322 Appendix C 323 System Log Entries 323 Appendix D ...

Page 11: ...ting up network configurations such as Quality of Service the Access Profile Table port mirroring and configuring the Spanning Tree Section 7 Management A discussion of the security features of the Switch including Security IP User Accounts and Access Authentication Control Section 8 SNMP Manager A detailed discussion regarding the Simple Network Monitoring Protocol including description of featur...

Page 12: ...mmands For example use the copy command Boldface Typewriter Font Indicates commands and responses to prompts that must be typed exactly as printed in the manual Initial capital letter Indicates a window name Names of keys on the keyboard have initial capitals For example Click Enter Italics Indicates a window name or a field Also can indicate a variables or parameter that is replaced with an appro...

Page 13: ...ate the product in a wet environment If the system gets wet see the appropriate section in the troubleshooting guide or contact your trained service provider Do not push any objects into the openings of the system Doing so can cause fire or electric shock by shorting out interior components Use the product only with approved equipment Allow the product to cool before removing covers or touching in...

Page 14: ...ducts with care ensure that all casters and or stabilizers are firmly connected to the system Avoid sudden stops and uneven surfaces General Precautions for Rack Mountable Products Observe the following precautions for rack stability and safety Also refer to the rack installation documentation accompanying the system and the rack for specific caution statements and procedures Systems are considere...

Page 15: ...ing cables are connected Completed power and safety ground wiring must be inspected by a qualified electrical inspector An energy hazard will exist if the safety ground cable is omitted or disconnected Protecting Against Electrostatic Discharge Static electricity can harm delicate components inside the system To prevent static damage discharge static electricity from your body before touching any ...

Page 16: ...mputing applications are fueling the need for high performance networks A number of high speed LAN technologies are proposed to provide greater bandwidth and improve client server response times Among them Fast Ethernet or 100BASE T provides a non disruptive smooth evolution from 10BASE T technology 100Mbps Fast Ethernet is a standard specified by the IEEE 802 3 LAN committee It is an extension of...

Page 17: ...orks but the cost of a router and the setup and maintenance required make routers relatively impractical Today s switches are an ideal solution to most kinds of local area network congestion problems Switch Description D Link s next generation xStack DGS DXS 3300 Series switches are high port density Layer 3 stackable switches that combine the ultimate performance with fault tolerance security man...

Page 18: ...ort System and Port Utilization support System Log Support High performance switching engine performs forwarding and filtering at full wire speed up to 128Gbps Full and half duplex for all gigabit ports Full duplex allows the switch port to simultaneously transmit and receive data It only works with connections to full duplex capable end stations and switches Connections to a hub must take place a...

Page 19: ... SFP Ports Six 10 Gigabit stacking ports One console port One CompactFlash slot DGS 3324SR Twenty four 10 100 1000BASE T Gigabit ports Four Combo SFP Ports Two 10 Gigabit stacking ports One console port DXS 3326GSR Four Combo 10 100 1000BASE T Gigabit ports Twenty four SFP Ports Two 10 Gigabit stacking ports One console port One open slot to add a 2 port 10 gigabit Uplink Module DXS 3350SR Forty e...

Page 20: ...alling the SFP ports in the Switch Figure 1 1 Inserting the fiber optic transceivers into the DGS 3324SRi Front Panel Components The front panel of the Switch consists of LED indicators for Power Master Console RPS SIO stacking and for Link Act for each port on the Switch The front panel may also include a seven segment LED not supported for the DGS 3324SRi indicating the Stack ID number as well a...

Page 21: ...t of band local console management through the RS 232 console port in the front of the Switch using a straight through serial cable This LED will light solid amber if the Power On Self Test has failed RPS This LED will light when the internal power has failed and the RPS has taken over the power supply to the Switch Otherwise it will remain dark Port LEDs One row of LEDs for each port is located a...

Page 22: ... a redundant power supply connector and a system fan Figure 1 9 Rear panel view of DXS 3326GSR DXS 3350SR The rear panel of the DXS 3350SR contains an AC power connector an optional module slot for uplinking a 2 port module two 10 gigabit stacking ports a redundant power supply connector a RS 232 DCE console port for Switch management and a system fan Figure 1 10 Rear panel view of DXS 3350SR The ...

Page 23: ...d that without proper heat dissipation and air circulation system components might overheat which could lead to system failure Figure 1 11 Side Panels DXS 3326GSR DXS 3350SR The right hand side panel of the Switch contains three system fans while the left hand panel includes two heat vents The system fans are used to dissipate heat The sides of the system also provide heat vents to serve the same ...

Page 24: ...ecting to the Network The site where the Switch is installed may greatly affect its performance Please follow these guidelines for setting up the Switch Install the Switch on a sturdy level surface that can support at least 6 6 lb 3 kg of weight Do not place heavy objects on the Switch The power outlet should be within 1 82 meters 6 feet of the Switch Visually inspect the power cord and see that i...

Page 25: ... ventilation space between the Switch and any other objects in the vicinity Figure 2 1 Prepare Switch for installation on a desktop or shelf Installing the Switch in a Rack The Switch can be mounted in a standard 19 rack Use the following diagrams as a guide Figure 2 2 Fasten mounting brackets to Switch Fasten the mounting brackets to the Switch using the screws provided With the brackets attached...

Page 26: ...ink module both sold separately Adding the DEM 420X optional module will allow the administrator to add a 2 port fiber optic uplink module which will transmit information at a rate of ten gigabits a second These two ports are compliant with standard IEEE 802 3ae support full duplex transmissions only and are to be used with XFP MSA compliant transceivers The DEM 420CX will too transfer information...

Page 27: ...ot at the rear of the DXS 3350SR Figure 2 5 Optional Module slot at the rear of the DXS 3326GSR After removing the faceplate remove the DEM 420X or DEM 420CX4 optional module from its box The front panel should resemble the drawing represented here Figure 2 6 Front Panel of the DEM 420X Figure 2 7 Front Panel of the DEM 420CX Take the module and gently slide it in to the available slot at the rear...

Page 28: ... a backup of the startup configuration file on the CompactFlash card of the control module and on a central server When saving the startup configuration file the Switch stores it in two places in the CompactFlash and the PC card of the primary control module When the Switch boots it will try to use the primary configuration file on the PC card and if for some reason the Switch cannot use the file ...

Page 29: ...itch supports an external redundant power system Figure 2 11 The DGS 3324SRi with the DPS 500 Redundant External Power Supply Figure 2 12 The DGS 3324SRi with the DPS 900 chassis RPS NOTE See the DPS 500 documentation for more information CAUTION Do not use the Switch with any redundant power system other than the DPS 500 ...

Page 30: ...oth MDI II and MDI X connections Switch to End Node End nodes include PCs outfitted with a 10 100 or 1000 Mbps RJ 45 Ethernet Network Interface Card NIC and most routers An end node can be connected to the Switch via a twisted pair UTP STP cable The end node should be connected to any of the 1000BASE T ports of the Switch Figure 3 1 Switch connected to an end node The Link Act LEDs for each UTP po...

Page 31: ... 5 UTP STP cable A 100BASE TX hub or switch can be connected to the Switch via a twisted pair Category 5 UTP STP cable A 1000BASE T switch can be connected to the Switch via a twisted pair Category 5e UTP STP cable A switch supporting a fiber optic uplink can be connected to the Switch s SFP ports via fiber optic cabling Figure 3 2 Switch connected to a port on a hub or switch using a straight or ...

Page 32: ... or server farm The copper ports operate at a speed of 1000 100 or 10Mbps in full or half duplex mode The fiber optic ports can operate at 1000Mbps in full duplex mode only Connections to the Gigabit Ethernet ports are made using a fiber optic cable or Category 5e copper cable depending on the type of port A valid connection is indicated when the Link LED is lit Figure 3 4 Uplink Connection to a s...

Page 33: ... with other stacking switches for a scalable stacking solution of up to 384 ports in a star or ring topology Each stacking port has corresponding LEDs at the front of the Switch labeled SIO and will light solid green whenever the port is in use The seven segment LED Stack ID to the left of the SIO LEDs not supported for the DGS 3324SRi on the front of the Switch will display the Stack ID number of...

Page 34: ...g architecture all SIO ports will be in use as shown in the following diagram Up to 12 xStack DGS DXS 3300 Series may be stacked together in the ring architecture switch stack though there are limitations on stacking which will be discussed in the following section Figure 3 9 Stacking in a Ring Architecture NOTICE Do not connect the stacked Switch group to the network until all Switches have been ...

Page 35: ...ber of switches in the stack is seven 6 slaves 1 master DGS 3324SRi In order to make the task of determining if a given set of Switches from the table below can be successfully stacked use the following formula Token Cost Number of Switches 32 Model Name Token Cost DGS 3324SRi 2 DGS 3324SR 2 4 DXS 3350SR 6 with 10G uplink 2 DXS 3326GSR 4 with 10G uplink Table 3 1 Switches and their corresponding t...

Page 36: ...e DXS 3326GSRs Token Cost 2 This gives a total Token Cost for the stack of 9 2 2 4 3 2 32 Although the Token Cost is less than 32 the number of switch boxes is 14 which exceeds the maximum number of 12 Thus only extra six DGS 3324SRs can be added to the ring stack For further examples we can Make a ring stack consisting of four DXS 3350SRs one with module three DGS 3324SRs and three DXS 3326GSRs n...

Page 37: ... DXS 3326GSRs no modules three DXS 3350SRs one with module Our switch count would equal 6 1 and our token cost would equal twenty two 2 2 4 14 22 32 Success From these examples we can see that there is a myriad of combinations possible for adding switches and modules to a given stack Yet keep in mind three very important points in configuring the stack 1 The total Token Cost of switches stacked mu...

Page 38: ...ole program The Switch supports SNMP version 1 0 version 2 0 and version 3 0 The SNMP agent decodes the incoming SNMP messages and responds to requests with MIB objects stored in the database The SNMP agent updates the MIB objects to generate statistics and counters Command Line Console Interface through the Serial Port The user can also connect a computer or terminal to the serial console port to...

Page 39: ...ormation on setting up user accounts See the xStack DGS DXS 3300 Series CLI Manual on the documentation CD for a list of all commands and additional information on using the CLI 13 When the commands have been completed exit the session with the logout command or close the emulator program Make sure the terminal or PC used to make this connection is configured to match these settings If problems oc...

Page 40: ...e same as s Upon initial connection to the Switch the login screen will be presented as shown below NOTE Press Ctrl R to refresh the screen This command can be used at any time to force the console program in the Switch to refresh the console screen Figure 4 2 Initial screen first time connecting to the Switch Press Enter in both the Username and Password fields Then access will be given to enter ...

Page 41: ...yer 3 Stackable Gigabit Ethernet Switch User Manual 26 Figure 4 3 Command Prompt NOTE The first user automatically gets Administrator level privileges It is recommended to create at least one Admin level user account for the Switch ...

Page 42: ...pe the password used for the administrator account being created and press the Enter key Once entered the Switch will again ask the user to enter the same password again to verify it Type the same password and press the Enter key A Success response by the Switch will verify the creation of the new administrator NOTE Passwords are case sensitive User names and passwords can be up to 15 characters i...

Page 43: ...histicated authentication process that is separated into two parts The first part is to maintain a list of users and their attributes that are allowed to act as SNMP managers The second part describes what each user on that list can do as an SNMP manager The Switch allows groups of users to be listed and configured with a shared set of privileges The SNMP version may also be set for a listed group...

Page 44: ... the Switch must be set before it can be managed with the Web based manager The Switch IP address can be automatically set using BOOTP or DHCP protocols in which case the actual address assigned to the Switch must be known The IP address may be set using the Command Line Interface CLI over the console serial port as follows Starting at the command line prompt enter the commands config ipif System ...

Page 45: ...elnet and the CLI or via the Web based management Connecting Devices to the Switch After assigning an IP addresses to the Switch devices can be connected to the Switch To connect a device to an SFP transceiver port Use the cabling requirements to select an appropriate SFP transceiver type Insert the SFP transceiver sold separately into the SFP transceiver slot Use the appropriate network cabling t...

Page 46: ...s as a universal access tool and can communicate directly with the Switch using the HTTP protocol The Web based management module and the Console program and Telnet are different ways to access the same internal switching software and configure it Thus all settings encountered in web based management are the same as those found in the console program Logging on to the Web Manager To begin managing...

Page 47: ...witch User Manual 32 Figure 5 2 Enter Network Password window Leave both the User Name field and the Password field blank and click OK This will open the Web based user interface The Switch management features available in the web based manager are explained below ...

Page 48: ...arious Switch configuration and management screens allows the user to view performance statistics and permits graphical monitoring of the system status Areas of the User Interface The figure below shows the user interface Three distinct areas divide the user interface as described in the table Figure 5 3 Main Web Manager Screen Area 1 Area 2 Area 3 ...

Page 49: ...ed Settings Port Configuration Port Description Port Mirroring Link Aggregation LACP Port Settings MAC Notification IGMP Snooping Spanning Tree Forwarding Filtering VLANs Traffic Control Port Security Port Lock Entries QoS System Log Host SNTP Settings Access Profile Table CPU Access Profile Table System Severity Settings Port Access Entity and Layer 3 IP Networking Security Management Contains sc...

Page 50: ...GMP Snooping Spanning Tree Forwarding Filtering VLANs Traffic Control Port Security Port Lock Entries QoS System Log Host SNTP Settings Access Profile Table CPU Access Profile Table System Severity Settings Port Access Entity Layer 3 IP Networking L3 Global Advanced Settings IP Interface Table MD5 Key Settings Route Redistribution Settings Static Default Route Settings Route Preference Settings St...

Page 51: ...n window shows the Switch s MAC Address assigned by the factory and unchangeable the Boot PROM Firmware Version and Hardware Version This information is helpful to keep track of PROM and firmware updates and to obtain the Switch s MAC address for entry into another network device s address table if necessary The user may also enter a System Name System Location and System Contact to aid in definin...

Page 52: ...fault VLAN Name The default VLAN contains all of the Switch ports as members If the Switch has previously configured VLANs the user will need to enter the VLAN ID of the VLAN that contains the port connected to the management station that will access the Switch The Switch will allow management access from stations with the same VID listed here NOTE The Switch s factory default IP address is 10 90 ...

Page 53: ...manager or Telnet Management stations that are on VLANs other than the one entered here will not be able to manage the Switch in band unless their IP addresses are entered in the Security IP Management menu If VLANs have not yet been configured for the Switch the default VLAN contains all of the Switch s ports There are no entries in the Security IP Management table by default so any management st...

Page 54: ...xStack DGS DXS 3300 Series Layer 3 Stackable Gigabit Ethernet Switch User Manual 39 ...

Page 55: ...ial Port Baud Rate This field specifies the baud rate for the serial port on the Switch This fields menu is set at 115200 and cannot be changed MAC Address Aging Time 10 1000000 This field specifies the length of time a learned MAC Address will remain in the forwarding table without being accessed that is how long a learned MAC Address is allowed to remain idle The default age out time for the Swi...

Page 56: ... information Switch 802 1x The Switch s 802 1x function may be enabled by port or by MAC Address the default is Disabled This field must be enabled to view and configure certain windows for 802 1x More information regarding 802 1x its functions and implementation can be found later in this section under the Port Access Entity folder Port Based 802 1x specifies that ports configured for 802 1x are ...

Page 57: ...n 1 and 12 to identify the switch in the switch stack Auto will automatically assign a box number to the switch in the switch stack Box Type The user may pre assign the model name of the switch in a stack by using the pull down menu The choices are DGS 3324SR DXS 3350SR DXS 3326GSR and BOX_NOTEXIST for the DGS 3324SRi master switch This menu may very between switches Priority Displays the priority...

Page 58: ...Configuration menu will display the following window for the user Figure 6 5 Port Configuration and The Port Information Table window To configure switch ports 1 Choose the port or sequential range of ports using the From To port pull down menus and the Unit ID of the Switch to be configured 2 Use the remaining pull down menus to configure the parameters described below Parameter Description State...

Page 59: ...d and physical layer type The master setting will also determine the master and slave relationship between the two connected physical layers This relationship is necessary for establishing the timing control between the two physical layers The timing control is set on a master physical layer by a local source The slave setting 1000M Full_S uses loop timing where the timing comes form a data stream...

Page 60: ...ports on the Switch To assign names to various ports click the Port Description on the Configuration menu Figure 6 6 Port Description Setting and Port Description Table Use the From and To pull down menu to choose a port or range of ports to describe and Unit to choose the Switch in the switch stack and then enter a description of the port s Click Apply to set the descriptions in the Port Descript...

Page 61: ...g window To configure a mirror port Select the Source Port from where to copy frames and the Target Port which receives the copies from the source port Select the Source Direction Ingress Egress or Both and change the Status drop down menu to Enabled Click Apply to let the changes take effect NOTE A fast port cannot be mirrored onto a slower port For example if the user tries to mirror the traffic...

Page 62: ... Trunk Groups Port trunk groups are used to combine a number of ports together to make a single high bandwidth data pipeline The xStack DGS DXS 3300 Series switches support up to 32 port trunk groups with 2 to 8 ports in each group A potential bit rate of 8000 Mbps can be achieved Figure 6 8 Example of Port Trunk Group ...

Page 63: ...ed and should be configured as full duplex The Master Port of the group is to be configured by the user and all configuration options including the VLAN configuration that can be applied to the Master Port are applied to the entire link aggregation group Load balancing is automatically applied to the ports in the aggregated group and a link failure within the group causes the network traffic to be...

Page 64: ...xStack DGS DXS 3300 Series Layer 3 Stackable Gigabit Ethernet Switch User Manual 49 Figure 6 10 Link Aggregation Group Configuration window Add ...

Page 65: ...s useful for diagnostics to quickly isolate a bandwidth intensive network device or to have an absolute backup aggregation group that is not under automatic control Master Port Choose the Master Port for the trunk group using the pull down menu Unit Choose the unit of the switch in the stack to be configured Member Ports Choose the members of a trunked group 2 to 8 ports can be assigned to an indi...

Page 66: ...to change an aggregated port group that is to add or subtract ports from the group at least one of the participating devices must designate LACP ports as active Both devices must support LACP Passive LACP ports that are designated as passive cannot initially send LACP control frames In order to allow the linked port group to negotiate adjustments and make changes dynamically one end of the connect...

Page 67: ...ent and New MAC Notification Global Settings window The following parameters may be modified Parameter Description State Enable or disable MAC notification globally on the Switch The default setting is Disabled Interval sec The user may set the time between 1 and 2 147 483 647 seconds between MAC notifications The default setting is 1 second History size The maximum number of entries listed in the...

Page 68: ... will display the following screen Figure 6 14 MAC Notification Port Settings and Port State Table The following parameters may be set Parameter Description Unit Choose the Switch ID number of the Switch in the switch stack to be modified From To Select a port or group of ports to enable for MAC notification using the pull down menus State Enable MAC Notification for the ports selected using the p...

Page 69: ...r IGMP snooping the Switch can open or close a port to a specific Multicast group member based on IGMP messages sent from the device to the IGMP host or vice versa The Switch monitors IGMP messages and discontinues forwarding multicast packets when there are no longer hosts requesting that they continue Use the IGMP Snooping Group Entry Table to view IGMP Snooping status To modify settings click t...

Page 70: ...eiving a membership report Default 260 Leave Timer This specifies the maximum amount of time in seconds between the Switch receiving a leave group message from a host and the Switch issuing a group membership query If no response to the membership query is received before the Leave Timer expires the multicast forwarding entry for that host is deleted Querier State Choose Enabled to enable transmit...

Page 71: ... IGMP query packets RIPv2 multicast DVMRP multicast or PIM DM multicast packets are detected flowing into a port Open the IGMP Snooping folder and the click on the Static Router Ports Settings link to open the Current Static Router Ports Entries page as shown below Figure 6 17 Static Router Ports Settings window The Static Router Ports Settings page shown above displays all of the current entries ...

Page 72: ...dow in the Configuration Name field 2 A configuration revision number named here as a Revision Level and found in the STP Bridge Global Settings window and 3 A 4096 element table defined here as a VID List in the MST Configuration Table window which will associate each of the possible 4096 VLANs supported by the Switch for a given instance To utilize the MSTP function on the Switch three steps nee...

Page 73: ...o stabilize before transitioning to a forwarding state In order to allow this rapid transition the protocol introduces two new variables the edge port and the point to point P2P port Edge Port The edge port is a configurable designation used for a port that is directly connected to a segment where a loop cannot be created An example would be a port connected directly to a single workstation Ports ...

Page 74: ...Global Settings To open the following window open the Spanning Tree folder in the Configuration menu and click the STP Bridge Global Settings link Figure 6 19 STP Bridge Global Settings STP compatible Figure 6 20 STP Bridge Global Settings RSTP default Figure 6 21 STP Bridge Global Settings MSTP ...

Page 75: ... with other devices on the bridged LAN If the value ages out and a BPDU has still not been received from the Root Bridge the Switch will start sending its own BPDU to all other switches for permission to become the Root Bridge If it turns out that your switch has the lowest Bridge Identifier it will become the Root Bridge The user may choose a time between 6 and 40 seconds The default value is 20 ...

Page 76: ...n Parameter Description Configuration Name A previously configured name set on the Switch to uniquely identify the MSTI Multiple Spanning Tree Instance If a configuration name is not set this field will show the MAC address to the device running MSTP Revision Level This value along with the Configuration Name will identify the MSTP region con figured on the Switch MSTI ID This field shows the MSTI...

Page 77: ... the CIST click on its hyperlinked MSTI ID number in the MST Configuration Identification window which will reveal the following window to configure Figure 6 24 Instance ID Settings window CIST modify The user may configure the following parameters to configure the CIST on the Switch Parameter Description MSTI ID The MSTI ID of the CIST is 0 and cannot be altered Type This field allows the user to...

Page 78: ...ID previously set by the user Type This field allows the user to choose a desired method for altering the MSTI settings The user has 2 choices Add VID Select this parameter to add VIDs to the MSTI ID in conjunction with the VID List parameter Remove VID Select this parameter to remove VIDs from the MSTI ID in conjunction with the VID List parameter VID List 1 4094 This field is used to specify the...

Page 79: ...r a particular MSTI Instance click on its hyperlinked MSTI ID which will reveal the following window Figure 6 27 MSTI Settings window Parameter Description Instance ID Displays the MSTI ID of the instance being configured An entry of 0 in this field denotes the CIST default MSTI Internal cost This parameter is set to represent the relative cost of forwarding packets to specified ports when an inte...

Page 80: ...tion set on the Switch Instance Status Displays the current status of the corresponding MSTI ID Instance Priority Displays the priority of the corresponding MSTI Instance Type The lowest priority will be the root bridge Priority Click the Modify button to change the priority of the MSTI This will open the Instance ID Settings window to configure The Type field in this window will be permanently se...

Page 81: ...ace is selected within a STP instance The default setting is 0 auto There are two options 0 auto Selecting this parameter for the internalCost will set quickest route automatically and optimally for an interface The default value is derived from the media speed of the interface value 1 2000000 Selecting this parameter with a value in the range of 1 2000000 will set the quickest route when a loop o...

Page 82: ...itch spends this time in the listening state while moving from the blocking state to the forwarding state Last Topology Change This field shows the time in seconds since the last spanning tree topology change Topology Changes Count This field displays the number of times that the spanning tree topology has changed since the original initial boot up of the Switch ...

Page 83: ...me of its own configuration settings An STP Group will use the switch level parameters entered above with the addition of Port Priority and Port Cost An STP Group spanning tree works in the same way as the switch level spanning tree but the root bridge concept is replaced with a root port concept A root port is a port of the group that is elected based on port priority and port cost to be the conn...

Page 84: ...le to migrate from 802 1d STP to 802 1w RSTP If the Switch is configured for MSTP the port is capable of migrating from 802 1d STP to 802 1s MSTP RSTP and MSTP can coexist with standard STP however the benefits of RSTP and MSTP are not realized on a port where an 802 1d network connects to an 802 1w or 802 1s enabled network Migration should be set as yes on ports connected to network stations or ...

Page 85: ...meter Description VLAN ID VID The VLAN ID number of the VLAN on which the above Unicast MAC address resides MAC Address The MAC address to which packets will be statically forwarded This must be a unicast MAC address Unit Choose the Switch ID number of the Switch in the switch stack to be modified Port Allows the selection of the port number on which the MAC address entered above resides Click App...

Page 86: ...ollowing parameters can be set Parameter Description Unit Choose the Switch ID number of the Switch in the switch stack to be modified VID The VLAN ID of the VLAN to which the corresponding MAC address belongs Multicast MAC Address The MAC address of the static source of multicast packets This must be a multicast MAC address Port Allows the selection of ports that will be members of the static mul...

Page 87: ...hted round robin system is employed on the Switch to determine the rate at which the queues are emptied of packets The ratio used for clearing the queues is 4 1 This means that the highest priority queue Queue 1 will clear 4 packets for every 1 packet cleared from Queue 0 Remember the priority queue settings on the Switch are for all ports and all devices connected to the Switch will be affected T...

Page 88: ...VLANs can also provide a level of security to your network IEEE 802 1Q VLANs will only deliver packets between stations that are members of the VLAN Any port can be configured as either tagging or untagging The untagging feature of IEEE 802 1Q VLANs allows VLANs to work with legacy switches that don t recognize VLAN tags in packet headers The tagging feature allows VLANs to span multiple 802 1Q co...

Page 89: ...n Ring packets so they can be carried across Ethernet backbones and 12 bits of VLAN ID VID The 3 bits of user priority are used by 802 1p The VID is the VLAN identifier and is used by the 802 1Q standard Because the VID is 12 bits long 4094 unique VLANs can be identified The tag is inserted into the packet header making the entire packet longer by 4 octets All of the information originally contain...

Page 90: ... only one PVID but can have as many VIDs as the Switch has memory in its VLAN table to store them Because some devices on a network may be tag unaware a decision must be made at each port on a tag aware device before packets are transmitted should the packet to be transmitted have a tag or not If the transmitting port is connected to a tag unaware device the packet should be untagged If the transm...

Page 91: ...s all devices connected to a port are members of the VLAN s the port belongs to whether there is a single computer directly connected to a switch or an entire department On port based VLANs NICs do not need to be able to identify 802 1Q tags in packet headers NICs send and receive normal Ethernet packets If the packet s destination lies on the same segment communications take place using normal Et...

Page 92: ...packets to all ports within the protocol assigned VLAN This feature will benefit the administrator by better balancing load sharing and enhancing traffic classification The Switch supports fifteen 15 pre defined protocols for configuration The user may also choose a protocol that is not one of the fifteen defined protocols by properly configuring the userDefined protocol VLAN The supported protoco...

Page 93: ...Q VLAN click the Add button in the 802 1Q Static VLANs menu A new menu will appear as shown below to configure the port settings and to assign a unique name and number to the new VLAN See the table below for a description of the parameters in the new menu Figure 6 39 802 1Q Static VLANs Add To return to the Current 802 1Q Static VLANs Entries window click the Show All Static VLAN Entries link To c...

Page 94: ...the VLAN name in the Modify dialog box Advertisement Enabling this function will allow the Switch to send out GVRP packets to outside sources notifying that they may join the existing VLAN Type Displays the type of protocol associated with this VLAN Protocol ID The following parameters allow for the creation of protocol based VLANs The Switch supports 15 pre configured protocol based VLANs plus on...

Page 95: ... defined by the Digital Equipment Corporation DEC Local Area Transport LAT protocol decOther Using this parameter will instruct the Switch to forward packets to this VLAN if the tag in the packet header is concurrent with this protocol This packet header information is defined by the Digital Equipment Corporation DEC Protocol sna802dot2 Using this parameter will instruct the Switch to forward pack...

Page 96: ...ket header After a match is found the Switch will forward the packet to this VLAN This field is only operable if userDefined is selected in the Protocol ID field Port Settings Allows an individual port to be specified as member of a VLAN Tag Specifies the port as either 802 1Q tagging or 802 1Q untagged Checking the box will designate the port as Tagged None Allows an individual port to be specifi...

Page 97: ...etermine whether the Switch will share its VLAN configuration information with other GARP VLAN Registration Protocol GVRP enabled switches In addition Ingress Checking can be used to limit traffic by filtering incoming packets whose PVID does not match the PVID of the port Results can be seen in the table under the configuration settings as seen below Figure 6 41 GVRP Settings and GVRP Table windo...

Page 98: ...gged Only which means only VLAN tagged frames will be accepted and Admit_All which means both tagged and untagged frames will be accepted Admit_All is enabled by default PVID The read only field in the GVRP Table shows the current PVID assignment for each port which may be manually assigned to a VLAN when created in the 802 1Q Port Settings table The Switch s default is to assign all ports to the ...

Page 99: ...nus The purpose of this window is to limit too many broadcast multicast or unknown unicast packets folding the network Each port has a counter that tracks the number of broadcast packets received per second and this counter is cleared once every second If the broadcast multicast or unknown unicast storm control is enabled the port will discard all broadcast multicast or unknown unicast packets rec...

Page 100: ...e Switch for the selected group of ports The options are Permanent The locked addresses will only age out after the Switch has been reset DeleteOnTimeout The locked addresses will age out after the aging timer expires DeleteOnReset The locked addresses will not age out until the Switch has been reset or rebooted Click Apply to implement changes made A given ports or a range of ports dynamic MAC ad...

Page 101: ...ned the MAC address Type The type of MAC address in the forwarding database table Only entries marked Secured_Permanent can be deleted Delete Click the in this field to delete the corresponding MAC address that was permanently learned by the Switch The Port Lock Entry Delete window is used to remove an entry from the port security entries learned by the Switch and entered into the forwarding datab...

Page 102: ...5 An Example of the Default QoS Mapping on the Switch The picture above shows the default priority setting for the Switch Class 6 has the highest priority of the seven priority classes of service on the Switch In order to implement QoS the user is required to instruct the Switch to examine the header of a packet to see if it has the proper identifying tag Then the user may forward these tagged pac...

Page 103: ... of packets sent from each priority queue depends upon the assigned weight For a configuration of 8 CoS queues A H with their respective weight value 8 1 the packets are sent in the following sequence A1 B1 C1 D1 E1 F1 G1 H1 A2 B2 C2 D2 E2 F2 G2 A3 B3 C3 D3 E3 F3 A4 B4 C4 D4 E4 A5 B5 C5 D5 A6 B6 C6 A7 B7 A8 A1 B1 C1 D1 E1 F1 G1 H1 For weighted round robin queuing if each CoS queue has the same wei...

Page 104: ...A consecutive group of ports may be configured starting with the selected port Type This drop down menu allows a selection between RX receive TX transmit and Both This setting will determine whether the bandwidth ceiling is applied to receiving transmitting or both receiving and transmitting packets No Limit This drop down menu allows the user to specify that the selected port will have no bandwid...

Page 105: ...nism to view the screen shown below Figure 6 47 QoS Scheduling Mechanism and QoS Scheduling Mechanism Table window The Scheduling Mechanism has the following parameters Parameter Description Strict The highest class of service is the first to process traffic That is the highest class of service will finish before other queues empty Weight fair Use the weighted round robin WRR algorithm to handle p...

Page 106: ... the QoS settings are not suitable In the Configuration folder open the QoS folder and click QoS Output Scheduling to view the screen shown below Figure 6 48 QoS Output Scheduling Configuration window The following values may be assigned to the QoS classes to set the scheduling Parameter Description Max Packets Specifies the maximum number of packets the above specified hardware priority class of ...

Page 107: ...th a 0 in its Max Packet field this class of service will automatically begin forwarding packets until it is empty Once a priority class of service with a 0 in its Max Packet field is empty the remaining priority classes of service will reset the weighted round robin WRR cycle of forwarding packets starting with the highest available priority class of service Priority classes of service with an eq...

Page 108: ...efault Priority and the 802 1p Default Priority for Unit 1 window This page allows the user to assign a default 802 1p priority to any given port on the Switch The priority tags are numbered from 0 the lowest priority to 7 the highest priority To implement a new default priority choose the Switch of the Switch stack to be configured by using the Unit pull down menu choose a port range by using the...

Page 109: ... to each of the eight levels of 802 1p priorities Click Apply to set changes made Traffic Segmentation Traffic segmentation is used to limit traffic flow from a single port to a group of ports on either a single Switch in standalone mode or a group of ports on another switch in a switch stack This method of segmenting the flow of traffic is similar to using VLANs to limit traffic but is more restr...

Page 110: ...ed in the first part Clicking the Apply button will enter the combination of transmitting port and allowed receiving ports into the Switch s Traffic Segmentation table The Unit drop down menu at the top of the page allows the user to select a switch from a switch stack using that switch s Unit ID The Port drop down menu allows the user to select a port from that switch This is the port that will b...

Page 111: ... Server Edit window The following parameters can be set Parameter Description Index Syslog server settings index 1 4 Server IP The IP address of the Syslog server Severity This drop down menu allows the user to select the level of messages that will be sent The options are Warning Informational and All Facility Some of the operating system daemons and processes have been assigned Facility values P...

Page 112: ...7 local7 UDP Port 514 or 6000 65535 Enter the UDP port number used for sending Syslog messages The default is 514 Status Choose Enabled or Disabled to activate or deactivate To set the System Log Server configuration click Apply To delete an entry from the Current System Log Server window click the corresponding under the Delete heading of the entry to delete To return to the Current System Log Se...

Page 113: ...g parameters can be set or are displayed Parameter Description Time Settings Current Time System Boot Time Displays the time when the Switch was initially started for this session Current Time Displays the current time Time Source Displays the source of the time settings viewed here SNTP Settings SNTP State Use this pull down menu to Enable or Disable SNTP SNTP Primary Server The IP address of the...

Page 114: ...e the system clock Day Enter the current day to update the system clock Time in HH MM SS Enter the current time in hours and minutes to update the system clock Click Apply to implement your changes Time Zone and DST The following are screens used to configure time zones and Daylight Savings time settings for SNTP Open the Configuration folder then the SNTP folder and click on the Time Zone and DST...

Page 115: ...ST will start From Day of Week Enter the day of the week that DST will start on From Month Enter the month DST will start on From Time in HH MM Enter the time of day that DST will start on To Which Day Enter the week of the month the DST will end To Day of Week Enter the day of the week that DST will end To Month Enter the month that DST will end To time in HH MM Enter the time DST will end DST An...

Page 116: ...erefore mirrored ports can not be cross box that is the ports cannot be set across switches in a switch stack Also the Port Mirroring function shares the mirror port with the ACL Mirror function Creating an access profile is divided into two basic parts The first is to specify which part or parts of a frame the Switch will examine such as the MAC source address or the IP destination address The se...

Page 117: ...e the IP address in each frame s header Select Packet Content Mask to specify a mask to hide the content of the packet header Select IPv6 to instruct the Switch to examine the IPv6 part of each packet header VLAN Selecting this option instructs the Switch to examine the VLAN identifier of each packet header and use this as the full or partial criterion for forwarding Source MAC Source MAC Mask Ent...

Page 118: ...k or IPv6 This will change the menu according to the requirements for the type of profile Select Ethernet to instruct the Switch to examine the layer 2 part of each packet header Select IP to instruct the Switch to examine the IP address in each frame s header Select Packet Content Mask to specify a mask to hide the content of the packet header Select IPv6 to instruct the Switch to examine the IPv...

Page 119: ...t number contained in an incoming packet as the forwarding criterion Selecting TCP requires specification that a source port mask and or a destination port mask The user may also identify which flag bits to filter Flag bits are parts of a packet that determine what to do with the packet The user may filter packets by filtering certain flag bits within the packets by checking the boxes correspondin...

Page 120: ...Description Profile ID 1 8 Type in a unique identifier number for this profile set This value can be set from 1 8 Type Select profile based on Ethernet MAC Address IP address packet content mask or IPv6 This will change the menu according to the requirements for the type of profile Select Ethernet to instruct the Switch to examine the layer 2 part of each packet header Select IP to instruct the Sw...

Page 121: ... 79 Click Apply to implement changes made The page shown below is the IPv6 configuration window Figure 6 62 Access Profile Configuration IPv6 window The following parameters can be set for IP Parameter Description Profile ID 1 8 Type in a unique identifier number for this profile set This value can be set from 1 8 Type Select profile based on Ethernet MAC Address IP address Packet Content Mask or ...

Page 122: ...address mask for the source IPv6 address by checking the corresponding box and entering the IP address mask Destination IPv6 Mask The user may specify an IP address mask for the destination IPv6 address by checking the corresponding box and entering the IP address mask Click Apply to implement changes made To establish the rule for a previously created Access Profile To configure the Access Rule f...

Page 123: ...arded to Once this field is specified packets accepted by the Switch that match this priority are forwarded to the CoS queue specified previously by the user Replace priority with Click the corresponding box to re write the 802 1p default priority of a packet to the value entered in the Priority field which meets the criteria specified previously in this command before forwarding it on to the spec...

Page 124: ...ecifies switch number 1 port 3 2 4 specifies switch number 2 port 4 1 3 2 4 specifies all of the ports between switch 1 port 3 and switch 2 port 4 in numerical order Entering all will denote all ports on the Switch To view the settings of a previously correctly configured rule click in the Access Rule Table to view the following screen Figure 6 65 Access Rule Display window Ethernet NOTE When usin...

Page 125: ...is field will instruct the Switch to automatically assign an Access ID for the rule being created Type Selected profile based on Ethernet MAC Address IP address Packet Content Mask or IPv6 Ethernet instructs the Switch to examine the layer 2 part of each packet header IP instructs the Switch to examine the IP address in each frame s header Packet Content Mask instructs the Switch to examine the pa...

Page 126: ... chosen in the Access Profile Table Port The Access Rule may be configured on a per port basis by entering the port number of the switch in the switch stack into this field When a range of ports is to be configured the Auto Assign check box MUST be clicked in the Access ID field of this window If not the user will be presented with an error message and the access rule will not be configured The po...

Page 127: ...n is enabled and a target mirror port is set Figure 6 69 Access Rule Table Packet Content Mask To remove a previously created rule select it and click the button To add a new Access Rule click the Add button Figure 6 70 Access Rule Configuration Packet Content Mask To set the Access Rule for the Packet Content Mask adjust the following parameters and click Apply ...

Page 128: ...is parameter is specified to re write the 802 1p default priority previously set in the Switch which is used to determine the CoS queue to which packets are forwarded to Once this field is specified packets accepted by the Switch that match this priority are forwarded to the CoS queue specified previously by the user Replace priority with Click the corresponding box if you want to re write the 802...

Page 129: ...hest port number of the range also separated by a colon are specified The beginning and end of the port list range are separated by a dash For example 1 3 specifies switch number 1 port 3 2 4 specifies switch number 2 port 4 1 3 2 4 specifies all of the ports between switch 1 port 3 and switch 2 port 4 in numerical order Entering all will denote all ports on the Switch To view the settings of a pr...

Page 130: ...at packets that match the access profile are not forwarded by the Switch and will be filtered Select Mirror to specify that packets that match the access profile are mirrored to a port defined in the Port Mirroring window Port Mirroring must be enabled and a target port must be set Remember Port Mirroring cannot cross box that is they cannot span across switches in a switch stack Access ID Type in...

Page 131: ...in hex form will instruct the Switch to examine the flow label field of the IPv6 header This flow label field is used by a source to label sequences of packets such as non default quality of service or real time service packets Source IPv6 Address The user may specify an IP address mask for the source IPv6 address by entering the IP address mask in hex form Destination IPv6 Address The user may sp...

Page 132: ...s Layer 3 Stackable Gigabit Ethernet Switch User Manual 117 Figure 6 74 Access Rule Display window IPv6 NOTE When using the ACL Mirror function ensure that the Port Mirroring function is enabled and a target mirror port is set ...

Page 133: ...ing an access profile for the CPU is divided into two basic parts The first is to specify which part or parts of a frame the Switch will examine such as the MAC source address or the IP destination address The second part is entering the criteria the Switch will use to determine what to do with the frame The following explanation describes the entire process CPU Access Profile Table The CPU Access...

Page 134: ...tent Mask to specify a mask to hide the content of the packet header IPv6 instructs the Switch to examine the IPv6 part of each packet header VLAN Selecting this option instructs the Switch to examine the VLAN identifier of each packet header and use this as the full or partial criterion for forwarding Source MAC Source MAC Mask Enter a MAC address mask for the source MAC address Destination MAC D...

Page 135: ...packet header IPv6 instructs the Switch to examine the IPv6 part of each packet header VLAN Selecting this option instructs the Switch to examine the VLAN part of each packet header and use this as the or part of the criterion for forwarding Source IP Mask Enter an IP address mask for the source IP address Destination IP Mask Enter an IP address mask for the destination IP address DSCP Selecting t...

Page 136: ...its within the packets by checking the boxes corresponding to the flag bits of the TCP field The user may choose between urg urgent ack acknowledgement psh push rst reset syn synchronize fin finish src port mask Specify a TCP port mask for the source port in hex form hex 0x0 0xffff to filter dest port mask Specify a TCP port mask for the destination port in hex form hex 0x0 0xffff to filter Select...

Page 137: ...lect Ethernet to instruct the Switch to examine the layer 2 part of each packet header Select IP to instruct the Switch to examine the IP address in each frame s header Select Packet Content Mask to specify a mask to hide the content of the packet header IPv6 instructs the Switch to examine the IPv6 part of each packet header Offset This field will instruct the Switch to mask the packet header beg...

Page 138: ...et header IPv6 instructs the Switch to examine the IPv6 part of each packet header Class Entering a value between 0 and 255 will instruct the Switch to examine the class field of the IPv6 header This class field is a part of the packet header that is similar to the Type of Service ToS or Precedence bits field of IPv4 Flowlabel Configuring this field in hex form will instruct the Switch to examine ...

Page 139: ...the corresponding Modify button of the entry to configure Ethernet IP Packet Content or IPv6 Each entry will open a new and unique window as shown in the examples below Figure 6 81 CPU Access Rule Table Ethernet To create a new rule set for an access profile click the Add button A new window is displayed To remove a previously created rule click the corresponding button The following window is use...

Page 140: ... to examine the packet header IPv6 instructs the Switch to examine the IPv6 part of each packet header VLAN Name Allows the entry of a name for a previously configured VLAN Source MAC Source MAC Address Enter a MAC Address for the source MAC address Destination MAC Destination MAC Address Enter a MAC Address mask for the destination MAC address 802 1p 0 7 Enter a value from 0 7 to specify that the...

Page 141: ...packets that match the access profile are forwarded by the Switch according to any additional rule added see below Select Deny to specify that packets that match the access profile are not forwarded by the Switch and will be filtered Access ID Type in a unique identifier number for this access This value can be set from 1 5 Type Selected profile based on Ethernet MAC Address IP address Packet Cont...

Page 142: ...red in the adjacent field Protocol This field allows the user to modify the protocol used to configure the Access Rule Table depending on which protocol the user has chosen in the Access Profile Table To view the settings of a previously correctly configured rule click in the CPU Access Rule Table to view the following screen Figure 6 86 CPU Access Rule Display IP The following window is the CPU A...

Page 143: ...to any additional rule added see below Select Deny to specify that packets that match the access profile are not forwarded by the Switch and will be filtered Access ID Type in a unique identifier number for this access This value can be set from 1 5 Type Selected profile based on Ethernet MAC Address IP address Packet Content or IPv6 Ethernet instructs the Switch to examine the layer 2 part of eac...

Page 144: ... value 16 31 Enter a value in hex form to mask the packet from byte 16 to byte 31 value 32 47 Enter a value in hex form to mask the packet from byte 32 to byte 47 value 48 63 Enter a value in hex form to mask the packet from byte 48 to byte 63 value 64 79 Enter a value in hex form to mask the packet from byte 64 to byte 79 To view the settings of a previously correctly configured rule click in the...

Page 145: ... for this profile set Mode Select Permit to specify that the packets that match the access profile are forwarded by the Switch according to any additional rule added see below Select Deny to specify that packets that match the access profile are not forwarded by the Switch and will be filtered Access ID Type in a unique identifier number for this access This value can be set from 1 5 Type Selected...

Page 146: ... field of the IPv6 header This flow label field is used by a source to label sequences of packets such as non default quality of service or real time service packets Source IPv6 Address The user may specify an IP address mask for the source IPv6 address by entering the IP address mask in hex form Destination IPv6 Address The user may specify an IP address mask for the destination IPv6 address by a...

Page 147: ... be discarded To configure the system severity levels open the following window by clicking Configuration System Severity Settings in the main menu Figure 6 93 System Severity Settings and Table window The user may set the following parameters to configure the System Severity Configurations will be displayed in the System Severity Table Parameter Description System Severity Choose one of the follo...

Page 148: ...ntication Protocol over LAN EAPOL packets between the Client and the Server The following figure represents a basic EAPOL packet Figure 6 94 The EAPOL Packet Utilizing this method unauthorized devices are restricted from connecting to a LAN through a port to which the user is connected EAPOL packets are the only traffic that can be transmitted through the specific port until authorization is grant...

Page 149: ...s services Figure 6 96 The Authentication Server Authenticator The Authenticator the Switch is an intermediary between the Authentication Server and the Client The Authenticator servers two purposes when utilizing 802 1x The first purpose is to request certification information from the Client through EAPOL packets which is the only information allowed to pass through the Authenticator before acce...

Page 150: ...uthentication is made This port is locked until the point when a Client with the correct username and password and MAC address if 802 1x is enabled by MAC address is granted access and therefore successfully unlocks the port Once unlocked normal traffic is allowed to pass through the port The following figure displays a more detailed explanation of how the authentication process is completed betwe...

Page 151: ... This is the Port Based Network Access Control Port Based Network Access Control 802 1X Client 802 1X Client 802 1X Client 802 1X Client 802 1X Client 802 1X Client 802 1X Client 802 1X Client 802 1X Client Network access controlled port Network access uncontrolled port RADIUS Server Ethernet Switch Figure 6 100 Example of Typical Port Based Configuration Once the connected device has successfully...

Page 152: ...ration In order to successfully make use of 802 1X in a shared media LAN segment it would be necessary to create logical Ports one for each attached device that required access to the LAN The Switch would regard the single physical Port connecting it to the shared media segment as consisting of a number of distinct logical Ports each logical Port being independently controlled from the point of vi...

Page 153: ...02 1x Authenti cator Parameter Figure 6 102 Configure 802 1X Authenticator Parameter window To view the 802 1X authenticator settings on a different switch in the switch stack use the Unit pull down menu to select that switch by its ID number in the switch stack To configure the settings by port click on the hyperlinked port number under the Port heading which will display the following table to c...

Page 154: ...lect forceAuthorized to disable 802 1X and cause the port to transition to the authorized state without any authentication exchange required This means the port transmits and receives normal traffic without 802 1X based authentication of the client If forceUnauthorized is selected the port will remain in the unauthorized state ignoring all attempts by the client to authenticate The Switch cannot p...

Page 155: ...of times that the Switch will retransmit an EAP Request to the client before it times out of the authentication sessions The default setting is 2 ReAuthPeriod A constant that defines a nonzero number of seconds between periodic reauthentication of the client The default setting is 3600 seconds ReAuth Determines whether regular reauthentication will take place on this port The default setting is Di...

Page 156: ... switch stack by using the Unit pull down menu and then select which ports are to be configured in the From and To fields Next enable the ports by selecting Authenticator from the drop down menu under Capability Click Apply to let your change take effect Configure the following 802 1x capability settings Parameter Description Unit Choose the Switch ID number of the Switch in the switch stack to be...

Page 157: ...lays the following information Parameter Description Unit Choose the Switch ID number of the Switch in the switch stack to be modified From and To Select ports to be initialized Port A read only field indicating a port on the Switch MAC Address The MAC address of the Switch connected to the corresponding port if any Auth PAE State The Authenticator PAE State will display one of the following Initi...

Page 158: ... MAC Address field and checking the corresponding check box To begin the initialization click Apply NOTE The user must first globally enable 802 1X in the Advanced Settings window in the Configuration folder before initializing ports Information in the Initialize Ports Table cannot be viewed before enabling 802 1X Reauthenticate Port s for Port Based 802 1x This window allows reauthentication of a...

Page 159: ...A NOTE The user must first globally enable 802 1X in the Advanced Settings window in the Configuration folder before reauthenticating ports Information in the Reauthenticate Ports Table cannot be viewed before enabling 802 1X Reauthenticate Port s for MAC based 802 1x To reauthenticate ports for the MAC side of 802 1x the user must first enable 802 1x by MAC address in the Advanced Settings window...

Page 160: ...S Server and Current RADIUS Server Settings Table window This window displays the following information Parameter Description Succession Choose the desired RADIUS server to configure First Second or Third RADIUS Server Set the RADIUS server IP Authentic Port Set the RADIUS authentic server s UDP port The default port is 1812 Accounting Port Set the RADIUS account server s UDP port The default port...

Page 161: ...ate The user may globally enable or disable the Distance Vector Multicast Routing Protocol DVMRP function by using the pull down menu PIM DM State The user may globally enable or disable the Protocol Independent Multicast Dense Mode PIM DM function by using the pull down menu RIP State The user may globally enable or disable the Routing Information Protocol RIP function by using the pull down menu...

Page 162: ... interfaces for a specified VLAN primary and secondary that set IP interface cannot be changed to another VLAN Application Limitation A multicast router cannot be connected to IP interfaces that are utilizing the IP Multinetting function NOTE Only the primary IP interface will support the BOOTP relay agent IP Multinetting is a valuable tool for network administrators requiring a multitude of IP ad...

Page 163: ... Finance 4 10 128 0 0 10 128 0 1 Sales 5 10 160 0 0 10 160 0 1 Backbone 6 10 192 0 0 10 192 0 1 Table 6 5 VLAN Example Assigned IP Interfaces The six IP interfaces each with an IP address listed in the table above and a subnet mask of 255 224 0 0 can be entered into the Setup IP Interface window To setup IP Interfaces on the Switch Go to the Configuration folder and click on the Layer 3 IP Network...

Page 164: ...amed System IP Address This field allows the entry of an IP address to be assigned to this IP interface Subnet Mask This field allows the entry of a subnet mask to be applied to this IP interface VLAN Name This field allows the entry of the VLAN Name for the VLAN the IP interface belongs to Secondary Use the pull down menu to set the IP interface as True or False True will set the interface as sec...

Page 165: ...sponding under the Delete heading Route Redistribution Settings Route redistribution allows routers on the network which are running different routing protocols to exchange routing information This is accomplished by comparing the routes stored in the various routers routing tables and assigning appropriate metrics This information is then exchanged among the various routers according to the indiv...

Page 166: ...on Settings and Table window The following parameters may be set or viewed Parameter Description Dst Protocol Allows for the selection of the protocol for the destination device Choose between RIP and OSPF Src Protocol Allows for the selection of the protocol for the source device Choose between RIP OSPF Static and Local Type Allows for the selection of one of six methods of calculating the metric...

Page 167: ... Mask of the IP address entered into the table Gateway The corresponding Gateway of the IP address entered into the table Metric Represents the metric value of the IP interface entered into the table This field may read a number between 1 65535 for an OSPF setting and 1 16 for a RIP setting Protocol Represents the protocol used for the Routing Table entry of the IP interface This field may read OS...

Page 168: ...o the IP address above Gateway IP Allows the entry of an IP address of a gateway for the IP address above Metric 1 65535 Allows the entry of a routing protocol metric representing the number of routers between the Switch and the IP address above Backup State The user may choose between Primary and Backup If the Primary Static Default Route fails the Backup Route will support the entry Please take ...

Page 169: ...iable path is Static due to the fact that its has the next lowest value To set a higher reliability for a route change its value to a number less than the value of a route preference that has a greater reliability value using the New Route Preference Settings window command For example if the user wishes to make RIP the most reliable route the user can change its value to one that is less than the...

Page 170: ...et the route preference for Static The lower the value the higher the chance the specified protocol will be chosen as the best path for routing packets The default value is 60 OSPF Inter 1 999 Enter a value between 1 and 999 to set the route preference for OSPF Inter The lower the value the higher the chance the specified protocol will be chosen as the best path for routing packets The default val...

Page 171: ... click on the Static ARP Settings link Figure 6 120 Static ARP Settings window To add a new entry click the Add button revealing the following screen to configure Figure 6 121 Static ARP Settings Add window To modify a current entry click the corresponding Modify button of the entry to be modified revealing the following screen to configure Figure 6 122 Static ARP Settings Edit window The followin...

Page 172: ...erred to as cost So learned routes are retained until a new route with a lower hop count is learned When learned routes are entered into the routing table a timer is started This timer is restarted every time this route is advertised If the route is not advertised for a period of time usually 180 seconds the route is removed from the routing table RIP does not have an explicit method to detect rou...

Page 173: ...is will determine how the address field is interpreted RIP specifies that the IP address 0 0 0 0 denotes a default route The distances measured in router hops are entered in the Distance to Source Network and Distance to Destination Network fields RIP 1 Route Interpretation RIP was designed to be used with classed address schemes and does not include an explicit subnet mask An extension to version...

Page 174: ...rs please see the next section RIP Global Settings RIP Global Settings To setup RIP for the IP interfaces configured on the Switch the user must first globally enable RIP and then configure RIP settings for the individual IP interfaces To globally enable RIP on the Switch open the Configuration folder to Layer 3 Networking and then open the RIP folder and click on the RIP Global Settings link to a...

Page 175: ...ace click on the hyperlinked Interface Name To view the next page of RIP Interface Settings click the Next button Figure 6 124 RIP Interface Settings window Click the hyperlinked name of the interface to set up for RIP which will give access to the following menu Figure 6 125 RIP Interface Settings Edit window Refer to the table below for a description of the available parameters for RIP interface...

Page 176: ...kets Authentication Toggle between Disabled and Enabled to specify that routers on the network should us the Password above to authenticate router table exchanges Password A password to be used to authenticate communication between routers on the network State Toggle between Disabled and Enabled to disable or enable this RIP interface on the switch Interface Metric A read only field that denotes t...

Page 177: ...change in the routing information changes the router generates a link state advertisement This advertisement is a specially formatted packet that contains information about all the link states on the router This link state advertisement is flooded to all router in the area Each router that receives the link state advertisement will store the advertisement and then forward a copy to other routers W...

Page 178: ... 0 0 192 213 11 0 222 211 10 0 0 10 10 5 5 10 10 Figure 6 127 Constructing a Shortest Path Tree The diagram above shows the network from the viewpoint of Router A Router A can reach 192 213 11 0 through Router B with a cost of 10 5 15 Router A can reach 222 211 10 0 through Router C with a cost of 10 10 20 Router A can also reach 222 211 10 0 through Router B and Router D with a cost of 10 5 10 25...

Page 179: ...ooded So the exchange of link state updates and the calculation of the shortest path tree are limited to the area that the router is connected to Routers that have connections to more than one area are called Border Routers BR The Border Routers have the responsibility of distributing necessary routing information and changes between areas Areas are specific to the router interface A router that h...

Page 180: ... is derived from the OSPF packet the key and the key ID This message digest a number is then appended to the packet The key is not exchanged over the wire and a non decreasing sequence number is included to prevent replay attacks Simple Password Authentication A password or key can be configured on a per area basis Routers in the same area that participate in the routing domain must be configured ...

Page 181: ... same stub area flag in their Hello packets in order to become neighbors Adjacencies Adjacent routers go beyond the simple Hello exchange and participate in the link state database exchange process OSPF elects one router as the Designated Router DR and a second router as the Backup Designated Router BDR on each multi access segment the BDR is a backup in case of a DR failure All other routers on t...

Page 182: ...cent Adjacent routers will have the same link state database Adjacencies on Point to Point Interfaces OSPF Routers that are linked using point to point interfaces such as serial links will always form adjacencies The concepts of DR and BDR are unnecessary OSPF Packet Formats All OSPF packet types begin with a standard 24 byte header and there are five packet types The header is described first and...

Page 183: ...mber Type The OSPF packet type The OSPF packet types are as follows Type Description Hello Database Description Link State Request Link State Update Link State Acknowledgment Packet Length The length of the packet in bytes This length includes the 24 byte header Router ID The Router ID of the packet s source Area ID A 32 bit number identifying the area that this packet belongs to All OSPF packets ...

Page 184: ...on Authentication Network Mask Hello Interval Options Router Priority Router Dead Interval Designated Router Backup Designated Router Neighbor Figure 6 130 Hello Packet Field Description Network Mask The network mask associated with this interface Options The optional capabilities supported by the router Hello Interval The number of seconds between this router s Hello packets Router Priority This ...

Page 185: ...hecksum Options DD Sequence No Reserved Reserved Link State Advertisement Header I MMS Figure 6 131 Database Description Packet Field Description Options The optional capabilities supported by the router I bit The Initial bit When set to 1 this packet is the first in the sequence of Database Description packets M bit The More bit When set to 1 this indicates that more Database Description packets ...

Page 186: ... State ID Advertising Router Figure 6 132 Link State Request Packet Each advertisement requested is specified by its Link State Type Link State ID and Advertising Router This uniquely identifies the advertisement but not its instance Link State Request packets are understood to be requests for the most recent instance Link State Update Packet Link State Update packets are OSPF packet type 4 These ...

Page 187: ...cation Type Authentication Authentication Checksum Link State Acknowledgment Packet 5 Link State Advertisement Header Figure 6 134 Link State Acknowledge Packet Each acknowledged link state advertisement is described by its link state advertisement header It contains all the information required to uniquely identify both the advertisement and the advertisement s current instance Link State Adverti...

Page 188: ...originated Options The optional capabilities supported by the described portion of the routing domain Link State Type The type of the link state advertisement Each link state type has a separate advertisement format The link state type are as follows Router Links Network Links Summary Link IP Network Summary Link ASBR AS External Link Link State ID This field identifies the portion of the internet...

Page 189: ...No Of TOS TOS 0 Metric TOS Metric TOS Metric Link ID Link Data 0 0 V B E Figure 6 136 Routers Links Advertisements In router links advertisements the Link State ID field is set to the router s OSPF Router ID The T bit is set in the advertisement s Option field if and only if the router is able to calculate a separate set of routes for each IP Type of Service TOS Router links advertisements are flo...

Page 190: ...pe Link ID Neighboring router s Router ID IP address of Designated Router IP network subnet number Neighboring router s Router ID Link Data Contents again depend on the link s Type field For connections to stub networks it specifies the network s IP address mask For unnumbered point to point connection it specifies the interface s MIB II ifIndex value For other link types it specifies the router s...

Page 191: ...field lists the IP interface address of the Designated Router The distance from the network to all attached routers is zero for all TOS This is why the TOS and metric fields need not be specified in the network links advertisement The format of the Network Links Advertisement is shown below Link State Age Options Link State ID Advertising Router Link State Sequence Number Link State Checksum Lengt...

Page 192: ...138 Summary Link Advertisements For stub area Type 3 summary link advertisements can also be used to describe a default route on a per area basis Default summary routes are used in stub area instead of flooding a complete set of external routes When describing a default summary route the advertisement s Link State ID is always set to the Default Destination 0 0 0 0 and the Network Mask is set to 0...

Page 193: ...tate ID Advertising Router Link State Sequence Number Link State Checksum Length Network Mask TOS Metric AS External Link Advertisements 5 Forwarding Address External Route Tag E Figure 6 139 AS External Link Advertisements Field Description Network Mask The IP address mask for the advertised destination E bit The type of external metric If the E bit is set the metric specified is a Type 2 externa...

Page 194: ...d be 10 53 13 189 but any unique 32 bit number will do If 0 0 0 0 is entered the highest IP address assigned to the Switch will become the OSPF Route ID Current Route ID Displays the OSPF Route ID currently in use by the Switch This Route ID is displayed as a convenience to the user when changing the Switch s OSPF Route ID State Allows OSPF to be enabled or disabled globally on the Switch without ...

Page 195: ...ed OSPF area ID will appear in the table Figure 6 142 OSPF Area Settings example window See the parameter descriptions below for information on the OSPF Area ID Settings The Area ID settings are as follows Parameter Description Area ID A 32 bit number in the form of an IP address xxx xxx xxx xxx that uniquely identifies the OSPF area in the OSPF domain Type This field can be toggled between Normal...

Page 196: ...erlinked name of the interface to see the configuration menu for that interface Figure 6 143 OSPF Interface Settings window Figure 6 144 OSPF Interface Settings Edit window Configure each IP interface individually using the OSPF Interface Settings Edit menu Click the Apply button when the user has entered the settings The new configuration appears listed in the OSPF Interface Settings table To ret...

Page 197: ... no authorization Simple uses a simple password to determine if the packets are from an authorized OSPF router When Simple is selected the Auth Key field allows the entry of an 8 character password that must be the same as a password configured on a neighbor OSPF router MD5 uses a cryptographic key entered in the MD5 Key Table Configuration menu When MD5 is selected the Auth Key ID field allows th...

Page 198: ...5 OSPF Virtual Link Settings The status of the virtual interface appears Up or Down in the Status column Figure 6 146 OSPF Virtual Link Settings Add Configure the following parameters to add or change an OSPF Virtual Interface Parameter Description Transit Area ID Allows the entry of an OSPF Area ID previously defined on the Switch that allows a remote area to communicate with the backbone area 0 ...

Page 199: ... MD5 key set in the MD5 Key settings menu Transmit Delay The number of seconds required to transmit a link state update over this virtual link Transit delay takes into account transmission and propagation delays This field is fixed at 1 second RetransInterval The number of seconds between link state advertisement retransmissions for adjacencies belonging to this virtual link This field is fixed at...

Page 200: ...on being removed Figure 6 147 OSPF Area Aggregation Settings table Use the menu below to change settings or add a new OSPF Area Aggregation setting Figure 6 148 OSPF Area Aggregation Settings Add window Specify the OSPF aggregation settings and click the Apply button to add or change the settings The new settings will appear listed in the OSPF Area Aggregation Configuration table To view the table...

Page 201: ...ost Address in the list for the configuration to change and proceed to change the metric or area ID To eliminate an existing configuration click the in the Delete column for the configuration being removed Figure 6 149 OSPF Host Route Settings table Use the menu below to set up OSPF host routes Figure 6 150 OSPF Host Route Settings Add window Specify the host route settings and click the Apply but...

Page 202: ...ck Configuration DHCP BOOTP Relay DHCP BOOTP Relay Global Settings Figure 6 151 DHCP BOOTP Relay Global Settings window The following fields can be set Parameter Description BOOTP Relay State This field can be toggled between Enabled and Disabled using the pull down menu It is used to enable or disable the BOOTP DHCP Relay service on the Switch The default is Disabled BOOTP Relay Hops Count Limit ...

Page 203: ...tings will be displayed in the BOOTP Relay Table at the bottom of the following window once the user clicks the Add button under the Apply heading The user may add up to four server IPs per IP interface on the Switch Entries may be deleted by clicking it s corresponding Figure 6 152 DHCP BOOTP Relay Interface Settings and DHCP BOOTP Relay Interface Table window The following parameters may be conf...

Page 204: ...he client makes a query containing the name the type of answer required and a code specifying whether the domain name system should do the entire name translation or simply return the address of the next DNS server if the server receiving the query cannot resolve the name When a DNS server receives a query it checks to see if the name is in its sub domain If it is the server translates the name an...

Page 205: ... DNSR Static Table State This field can be toggled using the pull down menu between Disabled and Enabled This determines if the static DNS table will be used or not Click Apply to implement changes made DNS Relay Static Settings To view the DNS Relay Static Settings click Configuration Layer 3 IP Networking DNS Relay DNS Relay Static Settings which will open the DNS Relay Static Settings window as...

Page 206: ...al router fails the election protocol will select a virtual router with the highest priority to be the Master router on the LAN This retains the link and the connection is kept alive regardless of the point of failure To configure VRRP for virtual routers on the Switch an IP interface must be present on the system and it must be a part of a VLAN VRRP IP interfaces may be assigned to every VLAN and...

Page 207: ...etwork Interface Name An IP interface name that has been enabled for VRRP This entry must have been previously set in the IP Interfaces table Virtual IP Address The IP address of the Virtual router configured on the Switch Master IP Address Displays the IP address of the Master router for the VRRP function Virtual Router State Displays the current state of the Virtual Router on the Switch Possible...

Page 208: ... router that owns the IP address associated with the virtual router and is therefore set automatically Advertisement Interval 1 255 Enter a time interval value in seconds for sending VRRP message packets This value must be consistent with all participating routers The default is 1 second Preempt Mode This entry will determine the behavior of backup routers within the VRRP group by controlling whet...

Page 209: ...as been selected to compare VRRP packets received by a virtual router Simple Text Password A Simple password has been selected to compare VRRP packets received by a virtual router for authentication IP Authentication Header An MD5 message digest algorithm has been selected to compare VRRP packets received by a virtual router for authentication VRID Displays the virtual router ID set by the user Th...

Page 210: ...ent out to the network Preempt Mode Displays the mode for determining the behavior of backup routers set on this VRRP interface True will denote that this will be the backup router if the routers priority is set higher than the master router False will disable the backup router from becoming the master router Virtual Router Up Time Displays the time in minutes since the virtual router has been ini...

Page 211: ...aring VRRP message packets received by a router If the two passwords are not exactly the same the packet will be dropped IP Selecting this parameter will require the user to set a MD5 message digest for authentication in comparing VRRP messages received by the router If the two values are inconsistent the packet will be dropped Authentication Data This field is only valid if the user selects Simpl...

Page 212: ...n check using IGMP to see if there is at least one member of a multicast group on a given subnetwork If there are no members on a subnetwork packets will not be forwarded to that subnetwork IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group IGMP version...

Page 213: ... the SSM or Source Specific Multicast In previous versions of IGMP the host would receive all packets sent to the multicast group Now a host will receive packets only from a specific source or sources This is done through the implementation of include and exclude filters used to accept or deny traffic from these specific sources In IGMP v2 Membership reports could contain only one multicast group ...

Page 214: ...ter mode is exclude traffic is being denied from at least one specific source yet other hosts may be accepting traffic from the multicast group If the group timer expires for the multicast group the filter mode is changed to include and other hosts can receive traffic from the source If no group report packet is received and the filter mode is include the Switch presumes that traffic from the sour...

Page 215: ...P Multicast Routing Protocol folder under Configuration and click Layer 3 IP Networking IGMP Interface Settings Each IP interface configured on the Switch is displayed in the below IGMP Interface Table dialog box To configure IGMP for a particular interface click the corresponding hyperlink for that IP interface This will open another IGMP Interface Configuration window Figure 6 163 IGMP Interface...

Page 216: ...interface IP Address Displays the IP address corresponding to the IP interface name above Version Enter the IGMP version 1 2 or 3 that will be used to interpret IGMP queries on the interface Query Interval Allows the entry of a value between 1 and 31744 seconds with a default of 125 seconds This specifies the length of time between sending IGMP queries Max Response Time Sets the maximum amount of ...

Page 217: ...ceived over the shortest path then the adjacent router enters the information into its tables and forwards the message If the message is not received on the shortest path back to the source the message is dropped Route cost is a relative number that is used by DVMRP to calculate which branches of a multicast delivery tree should be pruned The cost is relative to other costs assigned to other DVMRP...

Page 218: ... issuing poison route messages The default is 35 seconds Probe Interval 1 65535 This field allows an entry between 1 and 65 535 seconds and defines the interval between probes The default is 10 Metric 1 31 This field allows an entry between 1 and 31 and defines the route cost for the IP interface The DVMRP route cost is a relative number that represents the real cost of using this route in the con...

Page 219: ...n their database Discovering and Joining the Multicast Group Although Hello packets discover PIM SM routers these routers can only join or be pruned from a multicast group through the use of Join Prune Messages exchanged between the DR and RP Join Prune Messages are packets relayed between routers that effectively state which interfaces are or are not to be receiving multicast data These messages ...

Page 220: ...ontain multicast group members PIM DM has no explicit join messages It relies upon periodic flooding of multicast messages to all interfaces and then either waiting for a timer to expire the Join Prune Interval or for the downstream routers to transmit explicit prune messages indicating that there are no multicast members on their respective branches PIM DM then removes these branches prunes them ...

Page 221: ...eir priority as the Designated Router DR on the PIM enabled network The user may state an interval time between 1 18724 seconds with a default interval time of 30 seconds Join Prune Interval This field will set the interval time between the sending of Join Prune packets stating which multicast groups are to join the PIM enabled network and which are to be removed or pruned from that group The user...

Page 222: ...set Parameter Description Hash Mask Len Enter a hash mask length which will be used with the IP address of the candidate RP and the multicast group address to calculate the hash algorithm used by the router to determine which C RP on the PIM SM enabled network will be the RP The user may select a length between 0 32 with a default setting of 30 Bootstrap Period Enter a time period between 1 255 to...

Page 223: ...e SPT once a multicast packet has been received An entry of infinity will disable the last hop router from entering the SPT The default setting is 0 RP SPT Threshold This field is to be configured for the RP of the distribution tree When the amount of register packets per second reaches the configured threshold it will trigger the RP to switch to an SPT between the RP and the first hop router The ...

Page 224: ...50 seconds An entry of 0 will send out one advertisement that states to the BSR that it should be immediately removed from CRP status on the PIM SM network Priority Enter a priority value to determine which CRP will become the RP for the distribution tree This priority value will be included in the router s CRP advertisements A lower value means a higher priority yet if there is a tie for the high...

Page 225: ... Settings This window is used to set a first hop router to create checksums to be included with the data in Registered packets To view this window click Configuration Layer 3 IP Networking IP Multicast Routing Protocol PIM Protocol PIM Register Checksum Settings Figure 6 177 PIM Register Checksum Include Data RP List Settings window To configure the settings for this window click the Add button wh...

Page 226: ...ure the settings for this window and set this router as the Static RP click the Add button which will reveal the following window for the administrator to configure Figure 6 180 PIM Static RP Settings Add window The following fields can be set Parameter Description Group Address Enter the multicast group IP address to identify who is the RP This address must be a class D address Group Mask Enter t...

Page 227: ...curity IPs SSL and SSH all discussed in detail in the following section Security IP Go to the Security Management folder and click on the Security IP link the following screen will appear Figure 7 1 Security IP window Use the Security IP Management to permit remote stations to manage the Switch If choosing to define one or more designated management stations only the chosen stations as defined by ...

Page 228: ...an existing user click on the Modify button for that user Figure 7 3 User Accounts Add Table Add a new user by typing in a User Name and New Password and retype the same password in the Confirm New Password Choose the level of privilege Admin or User from the Access Right drop down menu Figure 7 4 User Account Modify Table Modify or delete an existing user account in the User Account Modify Table ...

Page 229: ...agement Admin User Configuration Yes Read only Network Monitoring Yes Read only Community Strings and Trap Stations Yes Read only Update Firmware and Configuration Files Yes No System Utilities Yes No Factory Reset Yes No User Account Management Add Update Delete User Accounts Yes No View User Accounts Yes No Table 7 1 Admin and User Privileges After establishing a User Account with Admin level pr...

Page 230: ...eges on the Switch The server will not accept the username and password and the user is denied access to the Switch The server doesn t respond to the verification query At this point the Switch receives the timeout from the server and then moves to the next method of verification configured in the method list The Switch has four built in Authentication Server Groups one for each of the TACACS XTAC...

Page 231: ...down menu to enable or disable the Authentication Policy on the Switch Response Timeout 0 255 This field will set the time the Switch will wait for a response of authentication from the user The user may set a time between 0 and 255 seconds The default set ting is 30 seconds User Attempts 1 255 This command will configure the maximum number of times the Switch will accept authentication attempts U...

Page 232: ...users utilizing the Console Command Line Interface application the Telnet application SSH and the Web HTTP application Login Method List Using the pull down menu configure an application for normal login on the user level utilizing a previously configured method list The user may use the default Method List or other Method List configured by the user See the Login Method Lists window in this secti...

Page 233: ...ng window click Security Management Access Authentication Control Authentication Server Group Figure 7 7 Authentication Server Group window This screen displays the Authentication Server Groups on the Switch The Switch has four built in Authentication Server Groups that cannot be removed but can be modified To modify a particular group click its hyperlinked Group Name which will then display the f...

Page 234: ...ible with each other Authentication Server Host This window will set user defined Authentication Server Hosts for the TACACS XTACACS TACACS RADIUS security protocols on the Switch When a user attempts to access the Switch with Authentication Policy enabled the Switch will send authentication packets to a remote TACACS XTACACS TACACS RADIUS server host on a remote host The TACACS XTACACS TACACS RAD...

Page 235: ...between 1 and 65535 to define the virtual port number of the authentication protocol on a server host The default port number is 49 for TACACS XTACACS TACACS servers and 1813 for RADIUS servers but the user may set a unique port number for higher security Timeout 1 255 Enter the time in seconds the Switch will wait for the server host to reply to an authentication request The default value is 5 se...

Page 236: ...When the local method is used the privilege level will be dependant on the local account privilege configured on the Switch Successful login using any of these techniques will give the user a User privilege only If the user wishes to upgrade his or her status to the administrator level the user must use the Enable Admin window in which the user must enter a previously configured password set by th...

Page 237: ...mote TACACS server xtacacs Adding this parameter will require the user to be authenticated using the XTACACS protocol from a remote XTACACS server tacacs Adding this parameter will require the user to be authenticated using the TACACS protocol from a remote TACACS server radius Adding this parameter will require the user to be authenticated using the RADIUS protocol from a remote RADIUS server ser...

Page 238: ...o the first TACACS host in the server group If no verification is found the Switch will send an authentication request to the second TACACS host in the server group and so on until the list is exhausted At that point the Switch will restart the same sequence with the following protocol listed XTACACS If no authentication takes place using the XTACACS list the Local Enable password set in the Switc...

Page 239: ...t by the user in the next section entitled Local Enable Password none Adding this parameter will require no authentication to access the Switch radius Adding this parameter will require the user to be authenticated using the RADIUS protocol from a remote RADIUS server tacacs Adding this parameter will require the user to be authenticated using the TACACS protocol from a remote TACACS server xtacac...

Page 240: ...sword Figure 7 18 Configure Local Enable Password window To set the Local Enable Password set the following parameters and click Apply Parameter Description Old Local Enable Password If a password was previously configured for this entry enter it here in order to change it to a new password New Local Enable Password Enter the new password on the Switch used to authenticate users attempting to acce...

Page 241: ...ble local account on the Switch or no authentication none Because XTACACS and TACACS do not support the enable function the user must create a special account on the server host which has the username enable and a password configured by the administrator that will support the enable function This function becomes inoperable when the authentication policy is disabled To view the following window cl...

Page 242: ...es and need to be consistent between client and host for optimal use CBC Block Ciphers CBC refers to Cipher Block Chaining which means that a portion of the previously encrypted block of encrypted text is used in the encryption of the current block The Switch supports the 3DES EDE encryption code defined by the Data Encryption Standard DES to create the encrypted text 3 Hash Algorithm This part of...

Page 243: ...d to download more depending on user circumstances To view the following window click Security Management Secure Socket Layer SSL Download Certificate Figure 7 21 Download Certificate window To download certificates set the following parameters and click Apply Parameter Description Certificate Type Enter the type of certificate to be downloaded This type refers to the server responsible for issuin...

Page 244: ...ll down menu to enable or disable the SSL status on the switch The default is Disabled Cache Timeout 60 86400 This field will set the time between a new key exchange between a client and a host using the SSL function A new SSL session is established every time the client and host go through a key exchange Specifying a longer timeout will allow the SSL session to reuse the master key on future conn...

Page 245: ...d using the command line interface For more information on SSL and its functions see the xStack DGS DXS 3300 Series CLI Manual located on the documentation CD of this product NOTE Enabling the SSL command will disable the web based switch management To log on to the Switch again the header of the URL must begin with https Entering anything else into the address field of the web browser will result...

Page 246: ...eating any other admin level User Account on the Switch including specifying a password This password is used to logon to the Switch once a secure communication path has been established using the SSH protocol 2 Configure the User Account to use a specified authorization method to identify users that are allowed to establish SSH connections with the Switch using the SSH User Authentication window ...

Page 247: ... The use may set a time between 120 and 600 seconds The default setting is 120 seconds Auth Fail 2 20 Allows the Administrator to set the maximum number of attempts that a user may try to log on to the SSH Server utilizing the SSH authentication After the maximum number of attempts has been exceeded the Switch will be disconnected and the user must reconnect to the Switch to attempt another login ...

Page 248: ...ault To open the following window click Security Management Secure Shell SSH SSH Authentication Mode and Algorithm Settings Figure 7 24 SSH Algorithms window The following algorithms may be set Parameter Description SSH Authentication Mode and Algorithm Settings Password This field may be enabled or disabled to choose if the administrator wishes to use a locally configured password for authenticat...

Page 249: ...haining The default is Enabled ARC4 Use the pull down to enable or disable the Arcfour encryption algorithm with Cipher Block Chaining The default is Enabled Cast128 CBC Use the pull down to enable or disable the Cast128 encryption algorithm with Cipher Block Chaining The default is Enabled Twofish128 Use the pull down to enable or disable the twofish128 encryption algorithm The default is Enabled...

Page 250: ...sen if the administrator wishes to use a remote SSH server for authentication purposes Choosing this parameter requires the user to input the following information to identify the SSH user Host Name Enter an alphanumeric string of no more than 32 characters to identify the remote SSH user Host IP Enter the corresponding IP address of the SSH user Password This parameter should be chosen if the adm...

Page 251: ...re sophisticated authentication process that is separated into two parts The first part is to maintain a list of users and their attributes that are allowed to act as SNMP managers The second part describes what each user on that list can do as an SNMP manager The Switch allows groups of users to be listed and configured with a shared set of privileges The SNMP version may also be set for a listed...

Page 252: ...he Switch can be restricted with the Management Station IP Address menu SNMP User Table The SNMP User Table displays all of the SNMP User s currently configured on the Switch In the SNMP Manager folder click on the SNMP User Table link This will open the SNMP User Table as shown below Figure 8 1 SNMP User Table To delete an existing SNMP User Table entry click the below the Delete heading correspo...

Page 253: ...used V2c Specifies that SNMP version 2 will be used V3 Specifies that SNMP version 3 will be used Auth Protocol MD5 Specifies that the HMAC MD5 96 authentication level will be used This field is only operable when V3 is selected in the SNMP Version field and the Encryption field has been checked This field will require the user to enter a password SHA Specifies that the HMAC SHA authentication pro...

Page 254: ...uration window The SNMP Group created with this table maps SNMP users identified in the SNMP User Table to the views created in the previous menu The following parameters can set Parameter Description View Name Type an alphanumeric string of up to 32 characters This is used to identify the new SNMP view being created Subtree OID Type the Object Identifier OID Subtree for the view The OID identifie...

Page 255: ...e following screen should appear Figure 8 6 SNMP Group Table To delete an existing SNMP Group Table entry click the corresponding under the Delete heading To display the current settings for an existing SNMP Group Table entry click the hyperlink for the entry under the Group Name Figure 8 7 SNMP Group Table Display View window To add a new entry to the Switch s SNMP Group Table click the Add butto...

Page 256: ...NMPv2 supports both centralized and distributed network management strategies It includes improvements in the Structure of Management Information SMI and adds some security features SNMPv3 Specifies that the SNMP version 3 will be used SNMPv3 provides secure access to devices through a combination of authentication and encrypting packets over the network Security Level The Security Level settings ...

Page 257: ...ll open the following screen Figure 8 9 SNMP Community Table window The following parameters can set Parameter Description Community Name Type an alphanumeric string of up to 32 characters that is used to identify members of an SNMP community This string is used like a password to give remote SNMP managers access to MIB objects in the Switch s SNMP agent View Name Type an alphanumeric string of up...

Page 258: ...ble Configuration page as shown below Figure 8 11 SNMP Host Table Configuration window The following parameters can set Parameter Description Host IP Address Type the IP address of the remote management station that will serve as the SNMP host for the Switch SNMP Version V1 To specify that SNMP version 1 will be used V2 To specify that SNMP version 2 will be used V3 NoAuth NoPriv To specify that t...

Page 259: ...lphanumeric string used to identify the SNMP engine on the Switch To display the Switch s SNMP Engine ID open the SNMP Manger folder and click on the SNMP Engine ID link This will open the SNMP Engine ID Configuration window as shown below Figure 8 12 SNMP Engine ID Configuration window To change the Engine ID type the new Engine ID in the space provided and click the Apply button ...

Page 260: ...ors Size Stacking Information Module Information Device Status MAC Address Switch History Log IGMP Snooping Group IGMP Snooping Forward Browse Router Port Port Access Control Layer 3 Feature Browse IP Address Table Browse Routing Table Browse ARP Table Browse IP Multicast Forwarding Table Browse IGMP Group Table OSPF Monitor DVMRP Monitor PIM Monitor ...

Page 261: ...witch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a port The following field can be set Parameter Description Time Interval Select the desired setting between 1s and 60s where s stands for seconds The defau...

Page 262: ...switch stack by using the Unit pull down menu To view the CPU utilization by port use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a port Click Apply to implement the configured settings The window will automatically refresh with new updated statistics The information is described as follows Parameter Description Time Interval 1s Select t...

Page 263: ...raph of packets received on the Switch To select a port to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a port Figure 9 3 Rx Packets Analysis window line gra...

Page 264: ... the port Packets Counts the number of packets received on the port Unicast Counts the total number of good packets that were received by a unicast address Multicast Counts the total number of good packets that were received by a multicast address Broadcast Counts the total number of good packets that were received by a broadcast address Show Hide Check whether to display Bytes and Packets Clear C...

Page 265: ...ese statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a port Figure 9 5 Rx Packets Analysis window line graph for Unicast Multicast and Broadcast Packets To view the UMB Cas...

Page 266: ...e default value is 200 Unicast Counts the total number of good packets that were received by a unicast address Multicast Counts the total number of good packets that were received by a multicast address Broadcast Counts the total number of good packets that were received by a broadcast address Show Hide Check whether or not to display Multicast Broadcast and Unicast Packets Clear Clicking this but...

Page 267: ...o view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a port Figure 9 7 Tx Packets Analysis window line graph for Bytes and Packets To view the Transmitted TX Table...

Page 268: ...ent from the port Packets Counts the number of packets successfully sent on the port Unicast Counts the total number of good packets that were transmitted by a unicast address Multicast Counts the total number of good packets that were transmitted by a multicast address Broadcast Counts the total number of good packets that were transmitted by a broadcast address Show Hide Check whether or not to ...

Page 269: ... to view the following graph of error packets received on the Switch To select a port to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a port Figure 9 9 Rx Er...

Page 270: ...k occurrence OverSize Counts packets received that were longer than 1518 octets or if a VLAN frame is 1522 octets and less than the MAX_PKT_LEN Internally MAX_PKT_LEN is equal to 1522 Fragment The number of packets less than 64 bytes with either bad framing or an invalid CRC These are normally the result of collisions Jabber The number of packets with lengths more than the MAX_PKT_LEN bytes Intern...

Page 271: ...ort to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a port Figure 7 28 Tx Error Analysis window line graph To view the Transmitted Error Packets Table click ...

Page 272: ... byte octet boundary LateColl Counts the number of times that a collision is detected later than 512 bit times into the transmission of a packet ExColl Excessive Collisions The number of packets for which transmission failed due to excessive collisions SingColl Single Collision Frames The number of successfully transmitted packets for which transmission is inhibited by more than one collision Coll...

Page 273: ...ew these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a port Figure 7 30 Rx Size Analysis window line graph To view the Packet Size Analysis Table click the link View T...

Page 274: ...nd 255 octets in length inclusive excluding framing bits but including FCS octets 256 511 The total number of packets including bad packets received that were between 256 and 511 octets in length inclusive excluding framing bits but including FCS octets 512 1023 The total number of packets including bad packets received that were between 512 and 1023 octets in length inclusive excluding framing bi...

Page 275: ...t the resulting switch stack is displayed under the Stack Information link To view the stacking information click on the Stacking Information link from the Monitoring folder Figure 9 10 Stacking Information window The Stacking Information window holds the following information Parameters Description Box ID Displays the Switch s order in the stack User Set Box ID can be assigned automatically Auto ...

Page 276: ...his may be different from the values shown in the illustrations H W Version Shows the hardware version in use for the Switch This may be different from the values shown in the illustration Topology Show the current topology employed using this Switch My Box ID Displays the Box ID of the Switch currently in use Current State Displays the current stacking state of the Switch which may be MASTER or S...

Page 277: ...hese switches if they are stacked with one of the switches that support the optional module To view the following window click Monitoring Module Information Figure 9 11 Module Information window This window holds the following information Parameter Description Box ID The ID number of the switch in the switch stack that has the uplink module Module Name The name of the optional module Currently swi...

Page 278: ...tch in the switch stack Internal Power A read only field denoting the current status of the internal power supply Active will suggest the mechanism is functioning correctly while Fail will show the mechanism is not functioning correctly External Power A read only field denoting the current status of the external power supply Active will suggest the mechanism is functioning correctly while Fail wil...

Page 279: ...s forwarding table to be viewed When the Switch learns an association between a MAC address and a port number it makes an entry into its forwarding table These entries are then used to forward packets through the Switch To view the MAC Address forwarding table from the Monitoring menu click the MAC Address link Figure 9 13 MAC Address Table ...

Page 280: ...the VLAN of which the port is a member MAC Address The MAC address entered into the address table Unit Refers to the Unit of the switch stack from which the MAC address was learned Port The port to which the MAC address above corresponds Type Describes the method which the Switch discovered the MAC address The possible entries are Dynamic Self and Static Next Click this button to view the next pag...

Page 281: ...ed to the console manager Click Next to go to the next page of the Switch History Log Clicking Clear will allow the user to clear the Switch History Log NOTE For detailed information regarding Log entries that will appear in this window please refer to Appendix C at the back of this manual The information is described as follows Parameter Description Sequence A counter incremented whenever an entr...

Page 282: ...le The user may search the IGMP Snooping Group Table by VLAN Name by entering it in the top left hand corner and clicking Search The following field can be viewed Parameter Description VLAN Name The VLAN Name of the multicast group Multicast Group The IP address of the multicast group MAC Address The MAC address of the multicast group Reports The total number of reports received for this group Por...

Page 283: ...click the IGMP Snooping Forwarding link Figure 9 16 IGMP Snooping Forwarding Table The user may search the IGMP Snooping Forwarding Table by VLAN Name using the top left hand corner Search The following field can be viewed Parameter Description VLAN Name The VLAN Name of the multicast group Source IP The Source IP address of the multicast group Multicast Group The IP address of the multicast group...

Page 284: ...ch of the Switch s ports are currently configured as router ports A router port configured by a user using the console or Web based management interfaces is displayed as a static router port designated by S A router port that is dynamically configured by the Switch is designated by D Figure 9 17 Browse Router Port window ...

Page 285: ...State Authenticator Statistics Authenticator Session Statistics and Authenticator Diagnostics windows in this section cannot be viewed on the xStack DGS DXS 3300 Switch Series unless 802 1x is enabled by port or by MAC address To enable 802 1x go to the Switch 802 1x entry in the Advanced Settings window under the Configuration menu Authenticator State The following section describes the 802 1X St...

Page 286: ... of the window and clicking OK The information on this window is described as follows Parameter Description Auth PAE State The Authenticator PAE State value can be Initialize Disconnected Connecting Authenticating Authenticated Aborting Held Force_Auth Force_Unauth or N A N A Not Available indicates that the port s authenticator capability is disabled Backend State The Backend Authentication State...

Page 287: ...cond The following fields can be viewed Parameter Description Port The identification number assigned to the Port by the System in which the Port resides Frames Rx The number of valid EAPOL frames that have been received by this Authenticator Frames Tx The number of EAPOL frames that have been transmitted by this Authenticator Rx Start The number of EAPOL Start frames that have been received by th...

Page 288: ...supports the Authenticator function To view the Authenticator Session Statistics click Monitoring Port Access Control Authenticator Session Statistics Figure 9 21 Authenticator Session Statistics window The user can specify a switch in a switch stack using that switch s Unit ID by using the pull down menu in the top left hand corner The user may also select the desired time interval to update the ...

Page 289: ...Server The Authentication Server is external to the Authenticator s System 2 Local Authentic Server The Authentication Server is located within the Authenticator s System Time The duration of the session in seconds Terminate Cause The reason for the session termination There are eight possible reasons for termination 1 Supplicant Logoff 2 Port Failure 3 Supplicant Restart 4 Reauthentication Failur...

Page 290: ...e from any other state Connect LogOff Counts the number of times that the state machine transitions from CONNECTING to DISCONNECTED as a result of receiving an EAPOL Logoff message Auth Enter Counts the number of times that the state machine transitions from CONNECTING to AUTHENTICATING as a result of an EAP Response Identity message being received from the Supplicant Auth Success Counts the numbe...

Page 291: ...s the number of times that the state machine receives an initial Access Challenge packet from the Authentication server i e aReq becomes TRUE causing exit from the RESPONSE state Indicates that the Authentication Server has communication with the Authenticator OtherReqToSupp Counts the number of times that the state machine sends an EAP Request packet other than an Identity Notification Failure or...

Page 292: ...tication client This is not necessarily the same as sysName in MIB II AuthServerAddr The conceptual table listing the RADIUS authentication servers with which the client shares a secret ServerPortNumber The UDP port the client is using to send requests to this server RoundTripTime The time interval in hundredths of a second between the most recent Access Reply Access Challenge and the Access Reque...

Page 293: ...erver on the authentication port and dropped for some other reason RADIUS Accounting This window shows managed objects used for managing RADIUS accounting clients and the current statistics associated with them It has one row for each RADIUS authentication server that the client shares a secret with To view the RADIUS Accounting click Monitoring Port Access Control RADIUS Accounting Figure 9 24 RA...

Page 294: ... which contained invalid authenticators received from this server PendingRequests The number of RADIUS Accounting Request packets sent to this server that have not yet timed out or received a response This variable is incremented when an Accounting Request is sent and decremented due to receipt of an Accounting Response a timeout or a retransmission Timeouts The number of accounting timeouts to th...

Page 295: ...eters have been previously described in Section 6 of this manual under Layer 3 IP Networking Browse IP Address Table The IP Address Table may be found in the Monitoring menu in the Layer 3 Feature folder The IP Address Table is a read only screen where the user may view IP addresses discovered by the Switch To search a specific IP address enter it into the field labeled IP Address at the top of th...

Page 296: ...P address into the Destination Address field along with a proper subnet mask into the Mask field and click Find Figure 9 26 Browse Routing Table window Browse ARP Table The ARP Table window may be found in the Monitoring menu in the Layer 3 Feature folder This window will show current ARP entries on the Switch To search a specific ARP entry enter an interface name into the Interface Name or an IP ...

Page 297: ...orwarding Table window may be found in the Monitoring menu in the Layer 3 Feature folder This window will show current IP multicasting information on the Switch To search a specific entry enter an multicast group IP address into the Multicast Group field or a Source IP address and click Find Figure 9 28 Browse IP Multicast Forwarding Table ...

Page 298: ...ow current IGMP group entries on the Switch To search a specific IGMP group entry enter an interface name into the Interface Name field or a Multicast Group IP address and click Find Figure 9 29 Browse IGMP Group Table To view the specific details for an entry click the corresponding icon revealing the following window Figure 7 32 IGMP Group Detail and Source List Table window This window holds th...

Page 299: ...l expire and the filter mode will change to include If a group report is received the timer will be updated and packets will continue to be denied include This state denotes that members are accepting packets from the SSM Specific Source Multicast Once in include mode source timers will start counting down until a group report is received which has information pertaining to the source If no group ...

Page 300: ...LSDB Table link The OSPF Link State Database Table displays the current link state database in use by the OSPF routing protocol on a per OSPF area basis Figure 9 30 Browse OSPF LSDB Table The user may search for a specific entry by entering the following information into the fields at the top of the screen To browse the OSPF LSDB Table the user must first select which browse method to use in the S...

Page 301: ... was discovered by the Switch All Router link RTRLink Network link NETLink Summary link Summary Autonomous System link ASSummary Autonomous System external link ASExternal MCGLink Multicast Group and NSSA Not So Stubby Area Adv Router ID Displays the Advertising Router s ID Link State ID This field identifies the portion of the Internet environment that is being described by the advertisement The ...

Page 302: ... 31 OSPF Neighbor Table To search for OSPF neighbors enter an IP address and click Find Valid OSPF neighbors will appear in the OSPF Neighbor Table below OSPF Virtual Neighbor This table can be found in the OSPF Monitoring folder by clicking on the Browse OSPF Virtual Neighbor Table link This table displays a list of Virtual OSPF Neighbors of the Switch The user may choose specifically search a vi...

Page 303: ... features in relation to the xStack DGS DXS 3300 Series can be found in Section 6 under IP Multicast Routing Protocol Browse DVMRP Routing Table Multicast routing information is gathered and stored by DVMRP in the DVMRP Routing Table which may be found in the Monitoring folder under Browse DVMRP Monitoring contains one row for each port in a DVMRP mode Each routing entry contains information about...

Page 304: ...r Table Browse DVMRP Routing Next Hop Table The DVMRP Routing Next Hop Table contains information regarding the next hop for forwarding multicast packets on outgoing interfaces Each entry in the DVMRP Routing Next Hop Table refers to the next hop of a specific source to a specific multicast group address This table is found in the Monitoring menu under DVMRP Monitoring with the heading Browse DVMR...

Page 305: ...ntains information regarding each of a router s PIM neighbors This screen may be found by clicking Monitoring PIM Monitor Browse PIM Neighbor Table To search this table enter either an Interface Name or Neighbor Address into the respective field and click the Find button PIM neighbors of that entry will appear in the PIM Neighbor Table below Figure 9 36 PIM Neighbor Table PIM IP MRoute Table The P...

Page 306: ...User Manual 291 Browse PIM RP Set Table The following window is used to assess information regarding the Rendezvous Point RP Set on the Switch This screen may be found by clicking Monitoring Layer 3 Feature PIM Monitor Browse PIM RP Set Table Figure 9 38 PIM RP Set Table ...

Page 307: ... module is installed and switches have been properly interconnected All indicates all switches in a switch stack will download the same firmware Enter the IP address of the TFTP server in the Server IP Address field Select the Image ID of the firmware Members of the xStack DGS DXS 3300 Switch Series can hold two firmware images in its memory Image ID 1 will always be the boot up firmware for the S...

Page 308: ...y for read only memory of the Switch It is recommended to have the latest PROM code set in the Switch for optimal use To download the PROM code to the Switch set the following parameters and click Start Figure 10 3 Download PROM window Parameter Description Server IP Address Enter the IP address of the TFTP server where the PROM code is being stored File Name Enter the path and the filename of the...

Page 309: ...e to a TFTP server open the TFTP Service folder in the Maintenance folder and then click the Upload Log link Figure 10 5 Upload Log window Enter the IP address of the TFTP server and the path and filename for the history log on the TFTP server Click Start to record the IP address of the TFTP server and to initiate the file transfer ...

Page 310: ...ber of the switch in the switch stack ID States the image ID number of the firmware in the Switch s memory The Switch can store 2 firmware images for use Image ID 1 will be the default boot up firmware for the Switch unless otherwise configured by the user Version States the firmware version Size States the size of the corresponding firmware in bytes Update Time States the specific time the firmwa...

Page 311: ...elect the firmware image to be configured using the pull down menu The Switch allows two firmware images to be stored in the Switch s memory Action This field has two options for configuration Delete Select this option to delete the firmware image specified in the Image field above Boot Select this option to set the firmware image specified above as the boot up firmware for the Switch This firmwar...

Page 312: ...ectly inserted the CF Card Button should protrude To eject the card from the slot press the CF Card button in and the CompactFlash card should pop out Figure 10 8 CompactFlash Card Installation CF Card Information The CF Card Information window allows the user to view information about the CompactFlash card located at the back of the Switch To view the following window click Maintenance CF Service...

Page 313: ...rd to the Switch Upon completion of the download the Switch will reboot and the user will have to re login to access the Web manager Figure 10 11 Download Firmware from CF Transfer window Download Configuration from CF To download a configuration file from the CompactFlash card first open the Download Configuration from CF window by clicking Maintenance CF Services Download Upload Download Configu...

Page 314: ...er may save a certain configuration setting of the Switch to the CompactFlash for future implementation Initially the user must save the current configuration file to the NV RAM on the Switch by going to the Save Changes window also in the Maintenance folder and click the Save Configuration button After the configuration has been saved the user should open the Upload Config to CF window by clickin...

Page 315: ...To save a Switch History Log to the CompactFlash memory first go to the Upload Log to CF window by clicking Maintenance CF Services Download Upload Upload Log to CF Figure 10 17 Upload Log to CF window Enter a path name chosen by the user into the File Name field in the window above and click Start to initiate the file transfer The following window should appear notifying the user of the current t...

Page 316: ... file system can be used for formatting Option Choose the type of formatting to be done fast denotes formatting just the file architecture of the storage media accessory full denotes a full format full_with_MBR Denotes that a full format will occur and all sectors of the card will be cleared including the Master Boot Record No information will remain on the storage media accessory after a full for...

Page 317: ...ory enter the full name and path into the space provided and click Apply Dir This window is used to view directories and files located on the CompactFlash card To view this window click Maintenance CF Services FS Command Dir Figure 10 23 Dir window To search for a specific file located on the CF card enter the full name and path of the file into the Path Name field and click Find Files found will ...

Page 318: ... button When clicked the settings will be immediately applied to the switching software in RAM and will immediately take effect Some settings though require restarting the Switch before taking effect Restarting the Switch erases all settings in RAM and reloads the stored settings from the NV RAM Thus it is necessary to save all setting changes to NV RAM before rebooting the switch To permanently r...

Page 319: ...nfiguration parameters to their factory defaults Figure 10 27 Factory Reset to Default Value window NOTE Only the Reset System option will enter the factory default parameters into the Switch s non volatile RAM and then restart the Switch All other options enter the factory defaults into the current configuration but do not save this configuration Reset System will return the Switch s configuratio...

Page 320: ...guration to non volatile RAM before restarting the Switch Clicking the No click box instructs the Switch not to save the current configuration before restarting the Switch All of the configuration information entered from the last time Save Changes was executed will be lost Click the Restart button to restart the Switch Logout Use the Logout page to logout of the Switch s Web based management agen...

Page 321: ... link to the SIM group but has not been recognized by the CS as a member of the SIM group A SIM group can only have one Commander Switch CS All switches in a particular SIM group must be in the same IP subnet broadcast domain Members of a SIM group cannot cross a router A SIM group accepts up to 32 switches numbered 0 31 including the Commander Switch numbered 0 Ports linking switches within the S...

Page 322: ...s to the MS The CS s IP address will become the path to all MS s of the group and the CS s Administrator s password and or authentication will control access to all MS s of the SIM group With SIM enabled the applications in the CS will redirect the packet instead of executing the packets The applications will decode the packet from the administrator modify some data then send it to the MS After ex...

Page 323: ...supports uploading multiple MS log files to a TFTP server 4 This SIM version now supports encryption and decryption of SIM packets for added security between SIM enabled switches within the same SIM group 5 The user may zoom in and zoom out when utilizing the topology window to get a better more defined view of the configurations 2 The topology map now includes new features for connections that ar...

Page 324: ...ndidate Switch CaS is not the member of a SIM group but is connected to a Commander Switch This is the default setting for the SIM role Commander Choosing this parameter will make the Switch a Commander Switch CS The user may join other switches to this Switch over Ethernet to be part of its SIM group Choosing this option will also enable the Switch to be configured for SIM Discovery Interval The ...

Page 325: ...ngle IP Management window Tree View The Tree View window holds the following information under the Data tab Parameter Description Device Name This field will display the Device Name of the switches in the SIM group configured by the user If no Device Name is configured by the name it will be given the name default and tagged with the last six digits of the MAC Address to identify it Local Port Dis...

Page 326: ...in the toolbar and then Topology which will produce the following screen The Topology View will refresh itself periodically 20 seconds by default Figure 11 5 Topology View This screen will display how the devices within the Single IP Management Group are connected to other groups and devices Possible icons in this screen are as follows Icon Description Group Layer 2 commander switch Layer 3 comman...

Page 327: ...mouse plays an important role in configuration and in viewing device information Setting the mouse cursor over a specific device in the topology window tool tip will display the same information about a specific device as the Tree view does See the window below for an example Figure 11 6 Device Information Utilizing the Tool Tip Setting the mouse cursor over a line between two devices will display...

Page 328: ...xStack DGS DXS 3300 Series Layer 3 Stackable Gigabit Ethernet Switch User Manual 313 Figure 11 7 Port Speed Utilizing the Tool Tip ...

Page 329: ...n the role of the Switch in the SIM group and the icon associated with it Group Icon Figure 11 8 Right Clicking a Group Icon The following options may appear for the user to configure Collapse to collapse the group that will be represented by a single icon Expand to expand the SIM group in detail Property to pop up a window to display the group information Figure 11 9 Property window ...

Page 330: ...collapse the group that will be represented by a single icon Expand to expand the SIM group in detail Property to pop up a window to display the group information Figure 11 11 Property window Member Switch Icon Figure 11 12 Right Clicking a Member icon The following options may appear for the user to configure Collapse to collapse the group that will be represented by a single icon Expand to expan...

Page 331: ...The following options may appear for the user to configure Collapse to collapse the group that will be represented by a single icon Expand to expand the SIM group in detail Add to group add a candidate to a group Clicking this option will reveal the following screen for the user to enter a password for authentication from the Candidate Switch before being added to the SIM group Click OK to enter t...

Page 332: ...he last six digits of the MAC Address to identify it Module Name Displays the full module name of the switch that was right clicked MAC Address Displays the MAC Address of the corresponding Switch Remote Port No Displays the number of the physical port on the MS or CaS that the CS is connected to The CS will have no entry in this field Local Port No Displays the number of the physical port on the ...

Page 333: ...on will reveal the following screen for the user to enter a password for authentication from the Candidate Switch before being added to the SIM group Click OK to enter the password or Cancel to exit the window Figure 11 18 Input password window Remove from Group remove an MS from the group Device Configure will open the web manager for the specific device View Refresh update the views with the lat...

Page 334: ... Switch to the Member Switch using a TFTP server Member Switches will be listed in the table and will be specified by Port port on the CS where the MS resides MAC Address Model Name and Version To specify a certain Switch for upgrading configuration files click its corresponding radio button under the Port heading To update the configuration file enter the Server IP Address where the file resides ...

Page 335: ...uto negotiation Protocols CSMA CD Data Transfer Rates Ethernet Fast Ethernet Gigabit Ethernet Fiber Optic Half duplex Full duplex 10 Mbps 20Mbps 100Mbps 200Mbps 1000Mbps 2000Mbps IEC 793 2 1992 Type A1a 50 125um multimode Type A1b 62 5 125um multimode Both types use LC optical connector Topology Star Ring Network Cables UTP Cat 5 for 100Mbps UTP Cat 3 4 5 for 10Mbps EIA TIA 568 100 ohm screened tw...

Page 336: ...SR DXS 3350SR 441 mm x 430 mm x 44 mm 1U 19 inch rack mount width Weight DGS 3324SR and DGS 3324SRi 3 15kg DXS 3326GSR 6 5kg DXS 3350SR 6 41kg EMI FCC Part 15 Class A ICES 003 Class Canada EN55022 Class A EN55024 Safety CSA International Performance Transmission Method Store and forward RAM Buffer DGS 3324SR DGS 3324SRi DXS 3326GSR 2 MB per device DXS 3350SR 4 MB per device Filtering Address Table...

Page 337: ...le pin assignment The following diagrams and tables show the standard RJ 45 receptacle connector and their pin assignments Appendix 1 1 The standard RJ 45 port and connector RJ 45 Pin Assignments Contact MDI X Port MDI II Port 1 RD receive TD transmit 2 RD receive TD transmit 3 TD transmit RD receive 4 Not used Not used 5 Not used Not used 6 TD transmit RD receive 7 Not used Not used 8 Not used No...

Page 338: ...Power is recovered Critical Redundant Power failed Redundant Power failed Critical Redundant Power is working Redundant Power is working Critical up down load Firmware upgraded successfully Firmware upgraded by console successfully Username username IP ipaddr MAC macaddr Informational by console and IP ipaddr MAC macaddr are XOR shown in log string which means if the user logs in through the conso...

Page 339: ...r MAC macaddr Warning by console and IP ipaddr MAC macaddr are XOR shown in log string which means if the user logs in through the console no IP or MAC address information will be included in the log Log message successfully uploaded Log message successfully uploaded by console Username username IP ipaddr MAC macaddr Informational by console and IP ipaddr MAC macaddr are XOR shown in log string wh...

Page 340: ... Username username IP ipaddr MAC macaddr Informational Login failed through Web Login failed through Web Username username IP ipaddr MAC macaddr Warning Logout through Web Logout through Web Username username IP ipaddr MAC macaddr Informational Successful login through SSL Successful login through Web SSL Username string IP ip MAC mac Informational Logout through SSL Logout through Web SSL Usernam...

Page 341: ...ol is disabled Spanning Tree Protocol is disabled Informational SSH Successful login through SSH Successful login through SSH Username username IP ipaddr MAC macaddr Informational Login failed through SSH Login failed through SSH Username username IP ipaddr MAC macaddr Warning Logout through SSH Logout through SSH Username username IP ipaddr MAC macaddr Informational SSH session timed out SSH sess...

Page 342: ...d by AAA local method Username username MAC macaddr Warning Successful login through Web SSL authenticated by AAA local method Successful login through Web SSL from userIP authenticated by AAA local method Username username MAC macaddr Informational Login failed through Web SSL authenticated by AAA local method Login failed through Web SSL from userIP authenticated by AAA local method Username use...

Page 343: ...cessful login through Web SSL from userIP authenticated by AAA none method Username username MAC macaddr Informational Successful login through Telnet authenticated by AAA none method Successful login through Telnet from userIP authenticated by AAA none method Username username MAC macaddr Informational Successful login through SSH authenticated by AAA none method Successful login through SSH from...

Page 344: ...timeout or improper configuration Login failed through Web from userIP due to AAA server timeout or improper configuration Username username MAC macaddr Warning Successful login through Web SSL authenticated by AAA server Successful login through Web SSL from userIP authenticated by AAA server serverIP Username username MAC macaddr Informational Login failed through Web SSL authenticated by AAA se...

Page 345: ...authenticated by AAA server Login failed through SSH from userIP authenticated by AAA server serverIP Username username MAC macaddr Warning Login failed through SSH due to AAA server timeout or improper configuration Login failed through SSH from userIP due to AAA server timeout or improper configuration Username username MAC macaddr Warning Successful Enable Admin through Console authenticated by...

Page 346: ...A local_enable method Username username MAC macaddr Warning Successful Enable Admin through Telnet authenticated by AAA local_enable method Successful Enable Admin through Telnet from userIP authenticated by AAA local_enable method Username username MAC macaddr Informational Enable Admin failed through Telnet authenticated by AAA local_enable method Enable Admin failed through Telnet from userIP a...

Page 347: ... Enable Admin through Telnet authenticated by AAA none method Successful Enable Admin through Telnet from userIP authenticated by AAA none method Username username MAC macaddr Informational Successful Enable Admin through SSH authenticated by AAA none method Successful Enable Admin through SSH from userIP authenticated by AAA none method Username username MAC macaddr Informational Successful Enabl...

Page 348: ...h Web SSL authenticated by AAA server Successful Enable Admin through Web SSL from userIP authenticated by AAA server serverIP Username username MAC macaddr Informational Enable Admin failed through Web SSL authenticated by AAA server Enable Admin failed through Web SSL from userIP authenticated by AAA server serverIP Username username MAC macaddr Warning Enable Admin failed through Web SSL due to...

Page 349: ...nticated by AAA server serverIP Username username MAC macaddr Warning Enable Admin failed through SSH due to AAA server timeout or improper configuration Enable Admin failed through SSH from userIP due to AAA server timeout or improper configuration Username username MAC macaddr Warning AAA server timed out AAA server serverIP Protocol protocol connection failed Warning protocol is one of TACACS X...

Page 350: ...dcast storm occurence Broadcast storm is occurring port id Warning Broadcast storm has cleared Broadcast storm has cleared port id Informational Multicast storm occurence Multicast storm is occurring port id Warning Multicast storm has cleared Multicast storm has cleared port id Informational Security Packet received containing a MAC address identical to the MAC address of the device s interface P...

Page 351: ...ths Standard Media Type Maximum Distance Mini GBIC 1000BASE LX Single mode fiber module 1000BASE SX Multi mode fiber module 1000BASE LHX Single mode fiber module 1000BASE ZX Single mode fiber module 10km 550m 40km 80km 1000BASE T Category 5e UTP Cable Category 5 UTP Cable 1000 Mbps 100m 100BASE TX Category 5 UTP Cable 100 Mbps 100m 10BASE T Category 3 UTP Cable 10 Mbps 100m ...

Page 352: ...me a device is started In addition the protocol can assign the subnet mask and default gateway to a device bridge A device that interconnects local or remote networks no matter what higher level protocols are involved Bridges form a single logical network centralizing network administration broadcast A message sent to all destination devices on the network broadcast storm Multiple simultaneous bro...

Page 353: ... port RJ 45 Standard 8 wire connectors for IEEE 802 3 10BASE T networks RMON Remote Monitoring A subset of SNMP MIB II that allows monitoring and management capabilities by addressing up to ten different groups of information RPS Redundant Power System A device that provides a backup source of power when connected to the Switch server farm A cluster of servers in a centralized location serving a l...

Page 354: ...ice to send a datagram to an application program on another device VLAN Virtual LAN A group of location and topology independent devices that communicate as if they are on a common physical LAN VLT Virtual LAN Trunk A Switch to Switch link which carries traffic for all the VLANs on each Switch VT100 A type of terminal that uses ASCII characters VT100 screens have a text based appearance ...

Page 355: ...estic environment this product may cause radio interference in which case the user may be required to take adequate measures Warnung Dies ist ein Produkt der Klasse A Im Wohnbereich kann dieses Produkt Funkstoerungen verursachen In diesem Fall kann vom Benutzer verlangt werden angemessene Massnahmen zu ergreifen Precaución Este es un producto de Clase A En un entorno doméstico puede causar interfe...

Page 356: ...l ninety 90 days after any replacement Software is delivered If a material non conformance is incapable of correction or if D Link determines in its sole discretion that it is not practical to replace the non conforming Software the price paid by the original licensee for the non conforming Software will be refunded by D Link provided that the non conforming Software and all copies thereof is firs...

Page 357: ...5 D Link Corporation Contents subject to change without prior notice D Link is a registered trademark of D Link Corporation D Link Systems Inc All other trademarks belong to their respective proprietors Copyright Statement No part of this publication may be reproduced in any form or by any means or used to make any derivative such as translation transformation or adaptation without permission from...

Page 358: ...of D Link s products will not be applied to and does not cover any refurbished product and any product purchased through the inventory clearance or liquidation sale or other sales in which D Link the sellers or the liquidators expressly disclaim their warranty obligation pertaining to the product and in that case the product is being sold As Is without any warranty whatsoever including without lim...

Page 359: ... so the foregoing limitations and exclusions may not apply This Limited Warranty provides specific legal rights and you may also have other rights which vary from state to state Trademarks D Link is a registered trademark of D Link Systems Inc Other trademarks or registered trademarks are the property of their respective owners Copyright Statement No part of this publication or documentation accom...

Page 360: ...5 Product Registration Register your D Link product online at 340Hhttp support dlink com register Product registration is entirely voluntary and failure to complete or return this f ill t di i i h t i ht ...

Page 361: ... Lifetime hardware warranty Warranty beneficiary The warranty beneficiary is the original end user The original end user is defined as the person that purchases the product as the first owner Duration of Limited Lifetime Warranty As long as the original end user continues to own or use the product with the following conditions fan and power supplies are limited to a five 5 year warranty only in th...

Page 362: ...es or by other circumstances of which D Link is not responsible Disclaimer of warranty Please note some countries do not allow the disclaimer of implied terms in contracts with consumers and the disclaimer below may not apply to you To the extend allowed by local law the above warranties are exclusive and no other warranty condition or other term whether written or oral is expressed or implied D L...

Page 363: ...Monday to Friday 8 00am to 8 00pm EST Saturday 9 00am to 1 00pm EST D Link Technical Support over the Internet http www dlink com au email support dlink com au Tech Support for customers within New Zealand D Link Technical Support over the Telephone 0800 900 900 Monday to Friday 8 30am to 8 30pm Saturday 9 00am to 5 00pm D Link Technical Support over the Internet http www dlink co nz email support...

Page 364: ...website Tech Support for customers within South Eastern Asia and Korea D Link South Eastern Asia and Korea Technical Support over the Telephone 65 6895 5355 Monday to Friday 9 00am to 12 30pm 2 00pm 6 00pm Singapore Time D Link Technical Support over the Internet email support dlink com sg ...

Page 365: ...or customers within India D Link Technical Support over the Telephone 91 22 26526741 91 22 26526696 ext 161 to 167 Monday to Friday 9 30AM to 7 00PM D Link Technical Support over the Internet http ww dlink co in http www dlink co in dlink drivers support asp ftp support dlink co in email techsupport dlink co in ...

Page 366: ... the duration of the warranty period on this product Customers can contact D Link technical support through our web site or by phone Tech Support for customers within the Russia D Link Technical Support over the Telephone 495 744 00 99 Monday to Friday 10 00am to 6 30pm D Link Technical Support over the Internet http www dlink ru email support dlink ru ...

Page 367: ...D Link Technical Support over the Telephone 972 9 9715701 Sunday to Thursday 9 00am to 5 00pm D Link Technical Support over the Internet http www dlink co il support e mail support dlink co il Tech Support for customers within Turkey D Link Technical Support over the Telephone 0090 312 473 40 55 Monday to Friday 9 00am to 6 00pm D Link Technical Support over the Internet http www dlink com tr e ma...

Page 368: ...customers within South Africa and Sub Sahara Region D Link South Africa and Sub Sahara Technical Support over the Telephone 27 12 665 2165 08600 DLINK For South Africa only Monday to Friday 8 30am to 9 00pm South Africa Time D Link Technical Support over the Internet http www d link co za email support d link co za ...

Page 369: ...alvador 800 6137 Monday to Friday 06 00am to 19 00pm Guatemala 1800 300 0017 Monday to Friday 06 00am to 19 00pm Panama 0800 560 0193 Monday to Friday 07 00am to 20 00pm Peru 0800 52049 Monday to Friday 07 00am to 20 00pm Venezuela 0800 100 3470 Monday to Friday 08 00am to 21 00pm D Link Technical Support over the Internet www dlinkla com www dlinklatinamerica com email support dlink cl Tech Suppo...

Page 370: ...D Link D Link предоставляет бесплатную поддержку для клиентов в течение гарантийного срока Клиенты могут обратиться в группу технической поддержки D Link по телефону или через Интернет Техническая поддержка D Link 495 744 00 99 Техническая поддержка через Интернет http www dlink ru email support dlink ru ...

Page 371: ... Help Desk Chile Teléfono 800 8 35465 Lunes a Viernes 08 00 am a 21 00 pm Soporte Técnico Help Desk Colombia Teléfono 01800 7001588 Lunes a Viernes 07 00 am a 20 00 pm Soporte Técnico Help Desk Ecuador Teléfono 1800 777 711 Lunes a Viernes 07 00 am a 20 00 pm Soporte Técnico Help Desk El Salvador Teléfono 800 6137 Lunes a Viernes 06 00 am a 19 00 pm Soporte Técnico Help Desk Guatemala Teléfono 180...

Page 372: ...inkbrasil com br A D Link fornece suporte técnico gratuito para clientes no Brasil durante o período de vigência da garantia deste produto Suporte Técnico para clientes no Brasil Telefone São Paulo 11 2185 9301 Segunda à sexta Das 8h30 às 18h30 Demais Regiões do Brasil 0800 70 24 104 E mail email suporte dlinkbrasil com br ...

Page 373: ...358 ...

Page 374: ...l support through our website or by phone Tech Support for customers within the United States D Link Technical Support over the Telephone 888 843 6100 Hours of Operation 8 00AM to 6 00PM PST D Link Technical Support over the Internet http support dlink com email support dlink com Tech Support for customers within Canada D Link Technical Support over the Telephone 800 361 5265 Monday to Friday 7 30...

Page 375: ...ers within The United Kingdom Ireland D Link UK Ireland Technical Support over the Internet http www dlink co uk ftp ftp dlink co uk D Link UK Ireland Technical Support over the Telephone 08456 12 0003 United Kingdom 1890 886 899 Ireland Lines Open 8 00am 10 00pm Mon Fri 10 00am 7 00pm Sat Sun For Customers within Canada D Link Canada Technical Support over the Telephone 1 800 361 5265 Canada Mon ...

Page 376: ... support dlink de Telefon 49 1805 2787 0 12 Min aus dem Festnetz der Deutschen Telekom Telefonische technische Unterstützung erhalten Sie Montags bis Freitags von 09 00 bis 17 30 Uhr Unterstützung erhalten Sie auch bei der Premiumhotline für D Link Produkte unter der Rufnummer 09001 475767 Montag bis Freitag von 6 22 Uhr und am Wochenende von 11 18 Uhr 1 75 Min aus dem Festnetz der Deutschen Telek...

Page 377: ...e Assistance technique D Link par téléphone 0820 0803 03 N INDIGO 0 12 TTC min Prix en France Métropolitaine au 3 mars 2005 Du lundi au samedi de 9h00 à 19h00 Assistance technique D Link sur internet http www dlink fr e mail support dlink fr Support technique destiné aux clients établis au Canada Assistance technique D Link par téléphone 800 361 5265 Lun Ven 7h30 à 21h00 HNE Assistance technique D...

Page 378: ... D Link ofrece asistencia técnica gratuita para clientes residentes en España durante el periodo de garantía del producto Asistencia Técnica de D Link por teléfono 34 902 30 45 45 Lunes a Viernes de 9 00 a 14 00 y de 15 00 a 18 00 Asistencia Técnica de D Link a través de Internet http www dlink es support e mail soporte dlink es ...

Page 379: ... sito D Link Supporto tecnico per i clienti residenti in Italia D Link Mediterraneo S r L Via N Bonnet 6 B 20154 Milano Supporto Tecnico dal lunedì al venerdì dalle ore 9 00 alle ore 19 00 con orario continuato Telefono 02 39607160 URL http www dlink it supporto html Email tech dlink it ...

Page 380: ...etherlands D Link Technical Support over the Telephone 0900 501 2007 Monday to Friday 9 00 am to 10 00 pm D Link Technical Support over the Internet www dlink nl Tech Support for customers within Belgium D Link Technical Support over the Telephone 070 66 06 40 Monday to Friday 9 00 am to 10 00 pm D Link Technical Support over the Internet www dlink be Tech Support for customers within Luxemburg D ...

Page 381: ...tną pomoc techniczną klientom w Polsce w okresie gwarancyjnym produktu Klienci z Polski mogą się kontaktować z działem pomocy technicznej firmy D Link za pośrednictwem Internetu lub telefonicznie Telefoniczna pomoc techniczna firmy D Link 48 12 25 44 000 Pomoc techniczna firmy D Link świadczona przez Internet URL http www dlink pl e mail dlink fixit pl ...

Page 382: ...irmy D Link D Link poskytuje svým zákazníkům bezplatnou technickou podporu Zákazníci mohou kontaktovat oddělení technické podpory přes webové stránky mailem nebo telefonicky Web http www dlink cz suppport E mail support dlink cz Telefon 224 247 503 Telefonická podpora je v provozu PO PÁ od 09 00 do 17 00 ...

Page 383: ...get munkanapokon hétfőtől csütörtökig 9 00 16 00 óráig és pénteken 9 00 14 00 óráig kérhet a 1 461 3001 telefonszámon vagy a support dlink hu emailcímen Magyarországi technikai támogatás D Link Magyarország 1074 Budapest Alsóerdősor u 6 R70 Irodaház 1 em Tel 06 1 461 3001 Fax 06 1 461 3004 email support dlink hu URL http www dlink hu ...

Page 384: ...b sider D Link tilbyr sine kunder gratis teknisk support under produktets garantitid Kunder kan kontakte D Links teknisk support via våre hjemmesider eller på tlf Teknisk Support D Link Teknisk telefon Support 800 10 610 Hverdager 08 00 20 00 D Link Teknisk Support over Internett http www dlink no ...

Page 385: ...ilbyder gratis teknisk support til kunder i Danmark i hele produktets garantiperiode Danske kunder kan kontakte D Link s tekniske support via vores hjemmeside eller telefonisk D Link teknisk support over telefonen Tlf 7026 9040 Hverdager kl 08 00 20 00 D Link teknisk support på Internettet http www dlink dk ...

Page 386: ...oaa teknistä tukea asiakkailleen Tuotteen takuun voimassaoloajan Tekninen tuki palvelee seuraavasti Arkisin klo 9 21 numerosta 0800 114 677 Internetin kautta Ajurit ja lisätietoja tuotteista http www dlink fi Sähköpostin kautta voit myös tehdä kyselyitä ...

Page 387: ...ch annan användarinformation D Link tillhandahåller teknisk support till kunder i Sverige under hela garantitiden för denna produkt Teknisk Support för kunder i Sverige D Link Teknisk Support via telefon 0770 33 00 35 Vardagar 08 00 20 00 D Link Teknisk Support via Internet http www dlink se ...

Page 388: ...no site de D Link Portugal http www dlink pt A D Link fornece suporte técnico gratuito para clientes no Portugal durante o período de vigência de garantia deste produto Suporte Técnico para clientes no Portugal Assistência Técnica Email soporte dlink es http www dlink pt support ftp ftp dlink es ...

Page 389: ...ς δωρεάν υποστήριξη στον Ελλαδικό χώρο Μπορείτε να επικοινωνείτε με το τμήμα τεχνικής υποστήριξης μέσω της ιστοσελίδας ή μέσω τηλεφώνου Για πελάτες εντός του Ελλαδικού χώρου Τηλεφωνική υποστήριξη D Link Τηλ 210 86 11 114 Φαξ 210 86 53 172 Δευτέρα Παρασκευή 09 00 17 00 e mail support dlink gr Τεχνική υποστήριξη D Link μέσω Internet http www dlink gr ftp ftp dlink it ...

Page 390: ...375 ...

Page 391: ...2 0 2 517 7111 FAX 32 0 2 517 6500 URL www dlink be Poland Budynek Aurum ul Walic w 11 PL 00 851 Warszawa Poland TEL 48 0 22 583 92 75 FAX 48 0 22 583 92 76 URL www dlink pl Hungary R k czi t 70 72 HU 1074 Budapest Hungary TEL 36 0 1 461 30 00 FAX 36 0 1 461 30 09 URL www dlink hu Singapore 1 International Business Park 03 12 The Synergy Singapore 609917 TEL 65 6774 6233 FAX 65 6774 6322 URL www d...

Page 392: ...___________ Answers to the following questions help us to support your product 1 Where and how will the product primarily be used Home Office Travel Company Business Home Business Personal Use 2 How many employees work at installation site 1 employee 2 9 10 49 50 99 100 499 500 999 1000 or more 3 What network protocol s does your organization use XNS IPX TCP IP DECnet Others_______________________...

Reviews: