background image

DXS-3326GSR Gigabit Layer 3 Switch 

 

Figure 3- 6. Stacking LEDs at the front of the DXS-3326GSR 

The Switch can be stacked in a star or ring topology, as previously mentioned. For a star architecture, only one of the two 
Gigabit stacking ports will be in use. This port will be connected to the master switch of the switch stack and will act as a 
slave switch of the stack. The administrator may use either of the two available stacking ports to achieve this arcitecture. 
See the following diagram for an example of stacking in a star architecture.  

 

Figure 3- 7. Stacking in a Star Architecture 

17 

Summary of Contents for DXS-3326GSR - xStack Switch - Stackable

Page 1: ...D Link DXS 3326GSR Managed 24 port Gigabit and 4 1000Base T Combo Ports Layer 3 Stackable Ethernet Switch Manual...

Page 2: ...D Link Computer Corporation is strictly forbidden Trademarks used in this text D Link and the D LINK logo are trademarks of D Link Computer Corporation Microsoft and Windows are registered trademarks...

Page 3: ...4 Front Panel Components 5 LED Indicators 5 Rear Panel Description 6 Side Panel Description 6 Installation 8 Package Contents 8 Before You Connect to the Network 8 Installing the Switch Without the R...

Page 4: ...b Manager 29 Web based User Interface 30 Web Pages 31 Configuration 32 Switch Information 33 IP Address 34 Box Information 35 Advanced Settings 36 Port Configuration 38 Port Description 40 Port Mirror...

Page 5: ...e 95 Port Access Entity 109 Configure Authenticator 111 Local users 114 PAE System Control 114 RADIUS Server 120 Layer 3 IP Networking 121 L3 Global Advanced Settings 122 IP Interfaces Table 122 MD5 K...

Page 6: ...IP 171 User Accounts 172 Access Authentication Control 173 Policy and Parameters 174 Application Authentication Settings 175 Authentication Server Group 175 Authentication Server Host 177 Login Metho...

Page 7: ...l 222 Authenticator State 222 Authenticator Statistics 225 Authenticator Session Statistics 226 Authenticator Diagnostics 227 RADIUS Authentication 229 RADIUS Accounting 230 Layer 3 Feature 232 Browse...

Page 8: ...4 Reset 245 Reboot Device 246 Logout 247 Single IP Management 248 SIM Settings 249 Topology 250 Firmware Upgrade 259 Configuration File Backup Restore 260 Appendix A 261 Technical Specifications 261 A...

Page 9: ...the Spanning Tree Section 7 Layer 3 IP Networking A discussion about Layer 3 IP Networking features including RIP OSPF DHCP BOOTP Relay DNS Relay VRRP IP Multicast Routing Protocol and PIM DM Section...

Page 10: ...oldface Typewriter Font Indicates commands and responses to prompts that must be typed exactly as printed in the manual Initial capital letter Indicates a window name Names of keys on the keyboard hav...

Page 11: ...provider Do not push any objects into the openings of your system Doing so can cause fire or electric shock by shorting out interior components Use the product only with approved equipment Allow the p...

Page 12: ...er to the rack installation documentation accompanying the system and the rack for specific caution statements and procedures Systems are considered to be components in a rack Thus component refers to...

Page 13: ...l exist if the safety ground cable is omitted or disconnected Protecting Against Electrostatic Discharge Static electricity can harm delicate components inside your system To prevent static damage dis...

Page 14: ...a tenfold increase in theoretical throughput over 100Mbps Fast Ethernet and a one hundred fold increase over 10Mbps Ethernet Since it is compatible with all 10Mbps and 100Mbps Ethernet environments G...

Page 15: ...ion problems Switch Description The DXS 3326GSR is a manageable Gigabit stackable switch designed to uplink network backbones servers workstations and internetwork systems The DXS 3326GSR is equipped...

Page 16: ...tering at full wire speed up to 128Gbps Full and half duplex for all gigabit ports Full duplex allows the switch port to simultaneously transmit and receive data It only works with connections to full...

Page 17: ...Switch to add an optional 2 port 10 gigabit XFP module for uplionking using fibre optic cabling RS 232 DCE Diagnostic port console port for setting up and managing the Switch via a connection to a con...

Page 18: ...g the Stack ID number as well as 24 SFP ports four 1000BASE T gigabit Ethernet ports and a RS 232 DCE console port for Switch management DXS 3326GSR Figure 1 2 Front Panel View of the DXS 3326GSR as s...

Page 19: ...the two 10 gigabit stacking ports at the rear of the Switch These LEDs are marked 1 and 2 and will light solid green to denote activity on the port while a blinking light will indicate a valid link St...

Page 20: ...DXS 3326GSR Gigabit Layer 3 Switch Figure 1 5 Side Panels 7...

Page 21: ...nd Getting Started Guide This Manual If any item is found missing or damaged please contact your local D Link reseller for replacement Before You Connect to the Network The site where you install the...

Page 22: ...op or shelf the rubber feet included with the Switch should first be attached Attach these cushioning feet on the bottom at each corner of the device Allow enough ventilation space between the Switch...

Page 23: ...transmit information at a rate of 10 gigabits a second These two ports are compliant with standard IEEE 802 3ae support full duplex transmissions only and can be used with XFP MSA compliant transceiv...

Page 24: ...he module Gently but firmly push in on the module to secure it to the Switch The module should fit snugly into the corresponding receptors Figure 2 6 Inserting the optional module into the DXS 3326GSR...

Page 25: ...igabit Layer 3 Switch Figure 2 8 The DXS 3326GSR with the DPS 500 Redundant External Power Supply Figure 2 9 The DXS 3326GSR with the DPS 900 chassis RPS NOTE See the DPS 500 documentation for more in...

Page 26: ...DXS 3326GSR Gigabit Layer 3 Switch CAUTION Do not use the Switch with any redundant power system other than the DPS 500 13...

Page 27: ...our 1000BASE T ports of the Switch Figure 3 1 Switch connected to an end node The Link Act LEDs for each UTP port will light green or amber when the link is valid A blinking LED indicates packet activ...

Page 28: ...24 SFP ports and the four combo 1000BASE T ports are ideal for uplinking to a network backbone server or server farm The copper ports operate at a speed of 1000 100 or 10Mbps in full or half duplex m...

Page 29: ...k Figure 3 5 SIO 1 and SIO 2 Stacking ports at the rear of the DXS 3326GSR These two stacking ports named SIO 1 and SIO 2 can be used with other stacking switches for a scalable stacking solution of u...

Page 30: ...e only one of the two Gigabit stacking ports will be in use This port will be connected to the master switch of the switch stack and will act as a slave switch of the stack The administrator may use e...

Page 31: ...ing a Ring or Star Toplogy The Switches listed in the table below can all be stacked but there is a limitation as to the number of Switches that can be included in a given stack This limitation arises...

Page 32: ...s calculations but we must remember that there is a maximum limitation of 12 switches so the actual maximum number of DXS 3326GSR switches that can be stacked together in the ring topology is twelve R...

Page 33: ...eight DGS 3326GSRs 1 DGS 3324SRs Token Cost 2 two DXS 3350SRs Token Cost 4 and three DXS 3326GSRs Token Cost 2 This gives a total Token Cost for the stack of 1 2 8 2 2 4 3 2 32 Although the Token Cos...

Page 34: ...hree DXS 3350SRs one with module Our switch count would equal 6 1 and our token cost would equal 22 2 2 4 14 22 32 Success From these examples we can see that there is a myriad of combinations possibl...

Page 35: ...anage the Switch with an SNMP compatible console program The Switch supports SNMP version 1 0 version 2 0 and version 3 0 The SNMP agent decodes the incoming SNMP messages and responds to requests wit...

Page 36: ...here is no default user name and password for the Switch User names and passwords must first be created by the administrator If you have previously set up user accounts log in and continue to configur...

Page 37: ...access the Switch are case sensitive therefore S is not the same as s When you first connect to the Switch you will be presented with the first login screen shown above NOTE Press Ctrl R to refresh th...

Page 38: ...ords for future reference To create an administrator level account for the Switch do the following At the CLI login prompt enter create account admin followed by the user name and press the Enter key...

Page 39: ...shed using community strings which function like passwords The remote user SNMP application and the Switch SNMP must use the same community string SNMP packets from any station that has not been authe...

Page 40: ...your networking address scheme The Switch is also assigned a unique MAC address by the factory This MAC address cannot be changed and can be found by entering the command show switch into the command...

Page 41: ...executed successfully The Switch can now be configured and managed via Telnet and the CLI or via the Web based management Connecting Devices to the Switch After you assign IP addresses to the Switch y...

Page 42: ...he Switch using the HTTP protocol The Web based management module and the Console program and Telnet are different ways to access the same internal switching software and configure it Thus all setting...

Page 43: ...itor the system status Areas of the User Interface The figure below shows the user interface The user interface is divided into three distinct areas as described in the table Area 2 Area 3 Area 1 Figu...

Page 44: ...figuration for L3 Global Advanced Settings IP Interface Table MD5 Key Table Configuration Route Redistribution Settings Static Default Route Route Preference Setting Static ARP Settings RIP OSPF DHCP...

Page 45: ...l Settings MAC Notification Port Settings IGMP Snooping IGMP Snooping Settings Static Router Port Settings Spanning Tree STP Bridge Global Settings MST Configuration Table MSTI Port Settings STP Insta...

Page 46: ...swords for management access privileges as well as how to save the changes and restart the Switch Click the Switch Information link in the Configuration folder Figure 6 1 Switch Information Basic Sett...

Page 47: ...reviously configured on the Switch you can use the default VLAN Name The default VLAN contains all of the Switch ports as members If VLANs have been previously configured on the Switch you will need t...

Page 48: ...tation that can connect to the Switch can access the Switch until a management VLAN is specified or Management Station IP Addresses are assigned Click Apply to let your changes take effect Setting the...

Page 49: ...choose the model name of the Master switch in a stack to be the main configuring switch of that stack Priority Displays the priority ID of the Switch The lower the number the higher the priority The b...

Page 50: ...ain in the forwarding table without being accessed that is how long a learned MAC Address is allowed to remain idle To change this type in a different value representing the MAC address age out time i...

Page 51: ...is defined by this definition Choose MAC Source MAC Destination MAC Src Dest IP Source IP Destination or IP Src Dest See the Link Aggregation section of this manual Switch 802 1x The user may enable...

Page 52: ...bed below Parameter Description State Enabled Toggle the State field to either enable or disable a given port or group of ports Speed Duplex Auto Toggle the Speed Duplex field to either select the spe...

Page 53: ...the other side of the connection must be set for 1000M Full_S Any other configuration will result in a link down status for both ports Flow Control Displays the flow control scheme used for the vario...

Page 54: ...Port Description Table Port Mirroring The Switch allows you to copy frames transmitted and received on a port and redirect the copies to another port You can attach a monitoring device to the mirrore...

Page 55: ...Mbps port onto a 10 Mbps port this can cause throughput problems The port you are copying frames from should always support an equal or lower speed than the port to which you are sending the copies Al...

Page 56: ...traffic segmentation and 802 1p default priority configurations must be identical Port locking port mirroring and 802 1X must not be enabled on the trunk group Further the aggregated links must all b...

Page 57: ...gregation Group Entries table Figure 6 10 Link Aggregation Group Configuration window The user changeable parameters are as follows Parameter Description Group ID Select an ID number for the group Typ...

Page 58: ...port to allow transmission of broadcasts and unknown unicasts After setting the previous parameters click Apply to allow your changes to be implemented Successfully created trunk groups will be shown...

Page 59: ...ters Parameter Description Unit Choose the desired Unit From To A consecutive group of ports may be configured starting with the selected port Mode Active Active LACP ports are capable of processing a...

Page 60: ...ive MAC Notification MAC Notification is used to monitor MAC addresses learned and entered into the forwarding database MAC Notification Global Settings To globally set MAC notification on the Switch...

Page 61: ...DXS 3326GSR Gigabit Layer 3 Switch Figure 6 13 MAC Notification Port Settings window The following parameters may be set 48...

Page 62: ...IGMP Snooping it must first be enabled for the entire Switch see Advanced Settings You may then fine tune the settings for each VLAN using the IGMP Snooping link in the Configuration folder When enabl...

Page 63: ...GMP response report The Max Response Time field allows an entry between 1 and 25 seconds Default 10 Robustness Value 1 255 Adjust this variable according to expected packet loss If packet loss on the...

Page 64: ...coming from the router to be propagated through the network as well as allowing multicast messages IGMP coming from the network to be propagated to the router A router port has the following behavior...

Page 65: ...1d STP 802 1w RSTP and 802 1s MSTP 802 1s MSTP Multiple Spanning Tree Protocol or MSTP is a standard defined by the IEEE community that allows multiple VLANs to be mapped to a single spanning tree in...

Page 66: ...ersion compatible with the IEEE 802 1d STP RSTP can operate with legacy equipment implementing IEEE 802 1d however the advantages of using RSTP will be lost The IEEE 802 1w Rapid Spanning Tree Protoco...

Page 67: ...ely without going through the listening and learning states An edge port loses its status if it receives a BPDU packet immediately becoming a normal spanning tree port P2P Port A P2P port is also capa...

Page 68: ...rt each Hello Time This field will only appear here when STP or RSTP is selected for the STP Version For MSTP the Hello Time must be set on a port per port basis See the MST Port Settings section for...

Page 69: ...the Max Age Otherwise a configuration error will occur Observe the following formulas when setting the above parameters Max Age 2 x Forward Delay 1 second Max Age 2 x Hello Time 1 second MST Configura...

Page 70: ...dow The user may configure the following parameters to create a MSTI in the Switch Parameter Description MSTI ID Enter a number between 1 and 15 to set a new MSTI on the Switch Type Create is selected...

Page 71: ...choices Add VID Select this parameter to add VIDs to the MSTI ID in conjunction with the VID List parameter Remove VID Select this parameter to remove VIDs from the MSTI ID in conjunction with the VI...

Page 72: ...lected within a STP instance The default setting is 0 auto There are two options 0 auto Selecting this parameter for the internalCost will set quickest route automatically and optimally for an interfa...

Page 73: ...y to implement changes made To make changes to entries on the STP Instance Table window click Modify Figure 6 26 Instance ID Settings window The following information is displayed Parameter Descriptio...

Page 74: ...ettings window In addition to setting Spanning Tree parameters for use on the switch level the Switch allows for the configuration of groups of ports each port group of which will have its own spannin...

Page 75: ...nctioning The user may choose a time between 1 and 10 seconds The default is 2 seconds This field is only operable when the Switch is enabled for MSTP Migration Yes Setting this parameter as yes will...

Page 76: ...click Add Modify Parameter Description VLAN ID VID The VLAN ID number of the VLAN on which the above Unicast MAC address resides MAC Address The MAC address to which packets will be statically forwar...

Page 77: ...icast MAC Address The MAC address of the static source of multicast packets This must be a multicast MAC address Port Settings Allows the selection of ports that will be members of the static multicas...

Page 78: ...rate at which the queues are emptied of packets The ratio used for clearing the queues is 4 1 This means that the highest priority queue Queue 1 will clear 4 packets for every 1 packet cleared from Qu...

Page 79: ...deliver packets between stations that are members of the VLAN Any port can be configured as either tagging or untagging The untagging feature of IEEE 802 1Q VLANs allows VLANs to work with legacy swi...

Page 80: ...be carried across Ethernet backbones and 12 bits of VLAN ID VID The 3 bits of user priority are used by 802 1p The VID is the VLAN identifier and is used by the 802 1Q standard Because the VID is 12 b...

Page 81: ...e as many VIDs as the Switch has memory in its VLAN table to store them Because some devices on a network may be tag unaware a decision must be made at each port on a tag aware device before packets a...

Page 82: ...cted to a port are members of the VLAN s the port belongs to whether there is a single computer directly connected to a switch or an entire department On port based VLANs NICs do not need to be able t...

Page 83: ...to discover the type of protocol associated with it After assessing the protocol the Switch will forward the packets to all ports within the protocol assigned VLAN This feature will benefit the admin...

Page 84: ...802 1Q VLAN click the corresponding button under the Delete heading To create a new 802 1Q VLAN click the Add button in the window above A new window will appear as shown below to configure the port...

Page 85: ...r will instruct the switch to forward packets to this VLAN if the tag in the packet header is concurrent with this protocol This packet header information is defined by Novell NetWare 802 3 IPX Intern...

Page 86: ...he user only need enter the final four integers of the hexidecimal format to define the packet ID hex 0x0 0xffff This field is only operable if userDefined is selected in the Protocol ID field Encap S...

Page 87: ...gs window The following fields can be set Parameter Description Unit Choose the desired unit From To These two fields allow you to specify the range of ports that will be included in the Port based VL...

Page 88: ...LAN when created in the 802 1Q Port Settings table The Switch s default is to assign all ports to the default VLAN with a VID of 1 The PVID is used by the port to tag outgoing untagged packets and to...

Page 89: ...ort has a counter that tracks the number of broadcast packets received per second The counter is cleared once per second If the broadcast multicast or unknown unicast storm control is enabled the port...

Page 90: ...e in the same window Click Apply to implement changes made Port Security A given port s or a range of ports dynamic MAC address learning can be locked such that the current source MAC addresses entere...

Page 91: ...d unit From To A consecutive group of ports may be configured starting with the selected port Admin State This pull down menu allows you to enable or disable Port Security locked MAC address table for...

Page 92: ...t after the aging timer expires DeleteOnTimeout The locked addresses will age out after the aging timer expires DeleteOnReset The locked addresses will not age out until the Switch has been reset Clic...

Page 93: ...under the Delete heading of the corresponding MAC address to be deleted Click the Next button to view the next page of entries listed in this table This window displays the following information Para...

Page 94: ...vice and benefits of using 802 1p priority queuing Advantages of QoS QoS is an implementation of the IEEE 802 1p standard that allows network administrators a method of reserving bandwidth for importa...

Page 95: ...Q0 queue Priority 2 is assigned to the Switch s Q1 queue Priority 3 is assigned to the Switch s Q3 queue Priority 4 is assigned to the Switch s Q4 queue Priority 5 is assigned to the Switch s Q5 queu...

Page 96: ...isplayed Parameter Description Unit Choose the desired unit From To A consecutive group of ports may be configured starting with the selected port Type This drop down menu allows you to select between...

Page 97: ...nism has the following parameters Parameter Description Strict The highest queue is the first to process traffic That is the highest queue will finish before other queues empty Weight fair Use the wei...

Page 98: ...priority queues listed in the window above Priority queues that have a 0 in the Max Packet field will forward packets with strict priority scheduling The remaining queues that do not have a 0 in thei...

Page 99: ...figuration window Combination Queue Example 802 1p Default Priority The Switch allows the assignment of a default 802 1p priority to each port on the Switch In the Configuration folder open the QoS fo...

Page 100: ...the Switch The priority queues are numbered from 0 the lowest priority to 7 the highest priority Click Apply to implement your settings 802 1p User Priority The DXS 3326GSR allows the assignment of a...

Page 101: ...used to limit traffic flow from a single port to a group of ports on either a single switch in standalone mode or a group of ports on another switch in a switch stack Single IP This method of segmenti...

Page 102: ...be allowed to forward packets to other ports on that switch The user may set the following parameters Parameter Description Unit Choose the desired unit you wish to see the current traffic segmentati...

Page 103: ...Port drop down menu allows you to select a port from that switch This is the port that will be transmitting packets The Unit drop down menu under the Setup Forwarding ports heading allows you to sele...

Page 104: ...ty values Processes and daemons that have not been explicitly assigned a Facility may use any of the local use facilities or they may use the user level Facility Those Facilities that have been design...

Page 105: ...r Disabled to activate or deactivate To set the System Log Server configuration click Apply To delete an entry from the Current System Log Servers window click the corresponding under the Delete headi...

Page 106: ...ource Displays the time source for the system Current Time SNTP Settings SNTP State Use this pull down menu to Enable or Disable SNTP SNTP Primary Server This is the IP address of the primary server t...

Page 107: ...s and seconds if you would like to update the system clock Time in HH MM SS Click Apply to implement your changes Time Zone and DST The following are windows used to configure time zones and Daylight...

Page 108: ...nter the week of the month the DST will end To Day of Week Enter the day of the week that DST will end To Month Enter the month that DST will end To time in HH MM Enter the time DST will end DST Annua...

Page 109: ...e window To add an entry to the Access Profile Table window click the Add button This will open the Access Profile Configuration window as shown below There are three Access Profile Configuration wind...

Page 110: ...er a MAC address mask for the source MAC address Destination MAC Destination MAC Mask Enter a MAC address mask for the destination MAC address 802 1p Selecting this option instructs the Switch to exam...

Page 111: ...hange the window according to the requirements for the type of profile Select Ethernet to instruct the Switch to examine the layer 2 part of each packet header Select IP to instruct the Switch to exam...

Page 112: ...ts to filter Flag bits are parts of a packet that determine what to do with the packet The user may filter packets by filtering certain flag bits within the packets by checking the boxes corresponding...

Page 113: ...fields are used to configure the Packet Content Mask Parameter Description Profile ID 1 8 Type in a unique identifier number for this profile set This value can be set from 1 to 8 Type Select profile...

Page 114: ...8 63 Enter a value in hex form to mask the packet from byte 48 to byte 63 value 64 79 Enter a value in hex form to mask the packet from byte 64 to byte 79 Port The user may set the Access Profile Tabl...

Page 115: ...s the Switch to examine the IP address in each frame s header Packet Content Mask instructs the Switch to examine the packet header Priority 0 7 This parameter is specified if you want to re write the...

Page 116: ...lue in the space provided which will instruct the Switch to examine the DiffServ Code part of each packet header and use this as the or part of the criterion for forwarding The user may choose a value...

Page 117: ...cription Profile ID This is the identifier number for this profile set Mode Select Permit to specify that the packets that match the access profile are forwarded by the Switch according to any additio...

Page 118: ...to its original value before being forwarded by the Switch For more information on priority queues CoS queues and mapping for 802 1p see the QoS section of this manual Replace DSCP 0 63 Select this op...

Page 119: ...Packet Content Mask open the Access Profile Table window and click Modify for a Packet Content Mask entry This will open the following window Figure 6 63 Access Rule Table Packet Content Mask window T...

Page 120: ...le for the Packet Content Mask adjust the following parameters and click Apply Parameter Description Profile ID This is the identifier number for this profile set Mode Select Permit to specify that th...

Page 121: ...red in the Priority field which meets the criteria specified previously in this window before forwarding it on to the CoS queue mapped previously by the user Otherwise a packet will have its incoming...

Page 122: ...in such infrastructures has no more than two devices attached to it one of which is a Bridge Port The Bridge Port detects events that indicate the attachment of an active device at the remote end of...

Page 123: ...e the connected device has successfully been authenticated the Port then becomes Authorized and all subsequent traffic on the Port is not subject to access control restriction until an event occurs th...

Page 124: ...d be necessary to create logical Ports one for each attached device that required access to the LAN The Switch would regard the single physical Port connecting it to the shared media segment as consis...

Page 125: ...Layer 3 Switch Figure 6 68 first 802 1X Authenticator Settings window To configure the settings by port click on the hyperlinked port number under the Port heading which will display the following tab...

Page 126: ...and cause the port to transition to the authorized state without any authentication exchange required This means the port transmits and receives normal traffic without 802 1X based authentication of...

Page 127: ...ing is 2 ReAuthPeriod 3600 A constant that defines a nonzero number of seconds between periodic reauthentication of the client The default settijng is 3600 seconds ReAuth Disabled Determines whether r...

Page 128: ...6 71 802 1x Capability Settings window To set up the Switch s 802 1x port based authentication select which unit and ports are to be configured in the Unit and From To fields Next enable the ports by...

Page 129: ...e choices can be selected Authenticator A user must pass the authentication process to gain access to the network None The port is not controlled by the 802 1x functions Initialize Ports Existing 802...

Page 130: ...DXS 3326GSR Gigabit Layer 3 Switch Figure 6 72 Initialize Port Port Based window 117...

Page 131: ...uthenticating Authenticated Aborting Held ForceAuth ForceUnauth and N A Backend State The Backend Authentication State will display one of the following Request Response Success Fail Timeout Idle Init...

Page 132: ...er of the reauthenticated port MAC Address Displays the physical address of the Switch where the port resides Auth State The Authenticator State will display one of the following Initialize Disconnect...

Page 133: ...Figure 6 76 Authentic RADIUS Server Setting window This window displays the following information Parameter Description Succession First Choose the desired RADIUS server to configure First Second or T...

Page 134: ...OSPF OSPF Global Settings OSPF Area ID Setting OSPF Interface Settings OSPF Virtual Interface Settings OSPF Area Aggregation Settings OSPF Host Route Settings DHCP BOOTP Relay DHCP BOOTP Global Settin...

Page 135: ...disable the Protocol Independent Multicast Dense Mode PIM DM function by using the pull down menu RIP State The user may globally enable or disable the Routing Information Protocol RIP function by us...

Page 136: ...P Address VLAN Name VID Network Number IP Address System default 1 10 32 0 0 10 32 0 1 Engineer 2 10 64 0 0 10 64 0 1 Marketing 3 10 96 0 0 10 96 0 1 Finance 4 10 128 0 0 10 128 0 1 Sales 5 10 160 0 0...

Page 137: ...k the Show All IP Interface Entries hyperlink Use the Save Settings window from the Maintenance folder to enter the changes into NV RAM The following fields can be set Parameter Description Interface...

Page 138: ...re an MD5 Key click the MD5 Key Table Configuration link to open the following window Figure 7 5 MD5 Key Setting window The following fields can be set Parameter Description Key ID 1 255 A number from...

Page 139: ...indow will redistribute routing information between the OSPF and RIP routing protocols to all routers on the network that are running OSPF or RIP To access the Route Redistribution Settings window go...

Page 140: ...et Mask of the IP address entered into the table Gateway The corresponding Gateway of the IP address entered into the table Hops Represents the metric value of the IP interface entered into the table...

Page 141: ...ence is a way for routers to select the best path when there are two or more different routes to the same destination from two different routing protocols The majority of routing protocols are not com...

Page 142: ...ne that is less than the lowest value Static 60 or the user could change the other route values to more than 100 The user should be aware of three points before configuring the route preference 1 No t...

Page 143: ...r routing packets The default value is 80 Static 1 999 Enter a value between 1 and 999 to set the route preference for Static route The lower the value the higher the chance the specified protocol wil...

Page 144: ...ndow to configure Figure 7 11 Static ARP Table Add a New Entry window The following fields can be set Parameter Description IP Address The IP address of the ARP entry MAC Address The MAC address of th...

Page 145: ...eachable RIP can also be slow to converge to remove inconsistent unreachable or looped routes from the routing table because RIP messages propagate relatively slowly through a network Slow convergence...

Page 146: ...P version 2 can be used to propagate variable length subnet addresses or CIDR classless addresses RIP version 2 also adds an explicit next hop entry which speeds convergence and helps prevent the form...

Page 147: ...Name showing in the field above TX Mode Disabled Toggle among Disabled v1 Only v1 Compatible and v2 Only This entry specifies which version of the RIP protocol will be used to transmit RIP packets Dis...

Page 148: ...hm s steps When OSPF is started or when a change in the routing information changes the router generates a link state advertisement This advertisement is a specially formatted packet that contains inf...

Page 149: ...0 0 10 10 5 5 10 10 Figure 7 16 Constructing a Shortest Path Tree The diagram above shows the network from the viewpoint of Router A Router A can reach 192 213 11 0 through Router B with a cost of 10...

Page 150: ...state updates and the calculation of the shortest path tree are limited to the area that the router is connected to Routers that have connections to more than one area are called Border Routers BR The...

Page 151: ...d Authentication A password or key can be configured on a per area basis Routers in the same area that participate in the routing domain must be configured with the same key This method is possibly vu...

Page 152: ...d for link state database updates Designated Router Election The election of the DR and BDR is accomplished using the Hello protocol The router with the highest OSPF priority on a given multi access s...

Page 153: ...SPF packet is preceded by a common 24 byte header This header contains the information necessary for a receiving router to determine if the packet should be accepted for further processing The format...

Page 154: ...val These parameters are included in hello packets so that differences can inhibit the forming of neighbor relationships A detailed explanation of the receive processing for Hello packets so that diff...

Page 155: ...base Multiple packets may be used to describe the database For this purpose a poll response procedure is used One of the routers is designated to be master the other a slave The master seconds Databas...

Page 156: ...e Link State Request packet itself The router may receive even more recent instances in response The format of the Link State Request packet is shown below Version No Packet Length Router ID Area ID A...

Page 157: ...packets Multiple link state advertisements can be acknowledged in a single Link State Acknowledgment packet Depending on the state of the sending interface and the source of the advertisements being...

Page 158: ...nk state advertisements begin with a common 20 byte header This header contains enough information to uniquely identify the advertisements Link State Type Link State ID and Advertising Router Multiple...

Page 159: ...eld Length The length in bytes of the link state advertisement This includes the 20 byte link state advertisement header Router Links Advertisements Router links advertisements are type 1 link state a...

Page 160: ...n of the router link One of the following Type Description Point to point connection to another router Connection to a transit network Connection to a stub network Virtual link Link ID Identifies the...

Page 161: ...inks advertisement The format of the Network Links Advertisement is shown below Link State Age Options Link State ID Advertising Router Link State Sequence Number Link State Checksum Length Network Li...

Page 162: ...for TOS 0 Field Description Network Mask For Type 3 link state advertisements this indicates the destination network s IP address mask For example when advertising the location of a class A network th...

Page 163: ...Forwarding Address Data traffic for the advertised destination will be forwarded to this address If the Forwarding Address is set to 0 0 0 0 data traffic will be forwarded instead to the advertisement...

Page 164: ...Ds and to designate these areas as either Normal or Stub Normal OSPF areas allow Link State Database LSDB advertisements of routes to networks that are external to the area Stub areas do not allow the...

Page 165: ...Displays whether or not the selected Area will allow Summary Link State Advertisements Summary LSAs to be imported into the area from other areas Stub Default Cost Displays the default cost for the ro...

Page 166: ...ws the entry of an OSPF Area ID configured above Router Priority 0 255 Allows the entry of a number between 0 and 255 representing the OSPF priority of the selected area If a Router Priority of 0 is s...

Page 167: ...only field describing the Designated Router state of the IP interface This field many read DR if the interface is the designated router or Backup DR if the interface is the Backup Designated Router Th...

Page 168: ...d Authorization Key should have identical settings for all routers on the same network Dead Interval 1 65535 Specify the length of time between receiving Hello packets from a neighbor router before th...

Page 169: ...ears To change an existing configuration click on the hyperlinked Area ID for the set you want to change The window to modify an existing configuration is the same as the one used to add a new configu...

Page 170: ...ing an existing configuration you will be unable to change the Host Address To change an existing configuration click on the hyperlinked Host Address in the list for the configuration you want to chan...

Page 171: ...Switch The default is Disabled BOOTP HOPS Count Limit 1 16 4 This field allows an entry between 1 and 16 to define the maximum number of router hops BOOTP messages can be forwarded across The default...

Page 172: ...n The domain name system can be used by contacting the name servers one at a time or by asking the domain name system to do the complete name translation The client makes a query containing the name t...

Page 173: ...This determines if a DNS cache will be enabled on the Switch DNS Static Table Status Disabled This field can be toggled using the pull down menu between Disabled and Enabled This determines if the sta...

Page 174: ...alive regardless of the point of failure To configure VRRP for virtual routers on the Switch an IP interface must be present on the system and it must be a part of a VLAN VRRP IP interfaces may be ass...

Page 175: ...sage digest algorithm has been selected to compare VRRP packets received by a virtual router for authentication VRID Displays the virtual router ID set by the user This will uniquely identify the VRRP...

Page 176: ...th having the backup router s priority set higher than the masters priority will set the backup router as the Master router A False entry will disable the backup router from becoming the Master router...

Page 177: ...ng information Parameter Description Interface Name An IP interface name that has been enabled for VRRP This entry must have been previously set in the IP Interface Settings table Authentication type...

Page 178: ...itical IP Displays the status of the Critical IP address May be enabled or disabled Advertisement Interval Displays the time interval in seconds that VRRP messages are sent out to the network Preempt...

Page 179: ...can be varied by entering a value in the Max Response Time field The Robustness Variable field allows IGMP to be tuned for sub networks that are expected to lose a lot of packets A high value max 255...

Page 180: ...uting Information Protocol RIP but is extended for multicast delivery DVMRP builds a routing table to calculate shortest paths back to the source of a multicast message and defines route cost it is si...

Page 181: ...e DVMRP route cost is a relative number that represents the real cost of using this route in the construction of a multicast delivery tree It is similar to but not defined as the hop count in RIP The...

Page 182: ...l Settings window Use the pull down menu choose Enabled and click Apply to set the PIM DM function on the Switch PIM DM Interface Settings To view the first PIM DM Interface Settings window open the I...

Page 183: ...his interval also determines the time interval the router uses to automatically remove prune information from a branch of a multicast delivery tree and begin to flood multicast messages to all branche...

Page 184: ...e Sockets Layer SSL Download Certificate Configuration Secure Shell SSH SSH Configuration SSH Algorithm SSH User Authentication The following section will aid the user in configuring security function...

Page 185: ...user privileges To view existing User Accounts open the Security Management folder and click on the User Accounts link This will open the User Account Management window as shown below Figure 8 2 User...

Page 186: ...access to the Switch using the TACACS XTACACS TACACS RADIUS protocols When a user logs in to the Switch or tries to access the administrator level privilege he or she is prompted for a password If TAC...

Page 187: ...may set up six different authentication techniques per user defined method list TACACS XTACACS TACACS RADIUS local none for authentication These techniques will be listed in an order preferable and de...

Page 188: ...on the Switch The user may configure the Login Method List and Enable Method List for authentication for users utilizing the Console Command Line Interface application the Telnet application SSH and...

Page 189: ...a Server Host to Server Group xtacacs window To add an Authentication Server Host to the list enter its IP address in the IP Address field choose the protocol associated with the IP address of the Au...

Page 190: ...th Authentication Policy enabled the Switch will send authentication packets to a remote TACACS XTACACS TACACS RADIUS server host on a remote host The TACACS XTACACS TACACS RADIUS server host will the...

Page 191: ...erver host but remember that TACACS XTACACS TACACS are separate entities and are not compatible with each other Login Method Lists This command will configure a user defined or default Login Method Li...

Page 192: ...entry desired to be deleted To modify a Login Method List click on its hyperlinked Method List Name To configure a new Method List click the Add button Both actions will result in the same window to c...

Page 193: ...ethods on the Switch Once a user acquires normal user level privileges on the Switch he or she must be authenticated by a method on the Switch to gain administrator privileges on the Switch which is d...

Page 194: ...ter a method list name defined by the user of up to 15 characters Method 1 2 3 4 The user may add one or a combination of up to four of the following authentication methods to this method list local_e...

Page 195: ...ew Local Enabled Password Enter the new password that you wish to set on the Switch to authenticate users attempting to access Administrator Level privileges on the Switch The user may set a password...

Page 196: ...hm to be used This switch utilizes the Rivest Shamir Adleman RSA public key algorithm and the Digital Signature Algorithm DSA specified here as the DHE DSS Diffie Hellman DHE public key algorithm This...

Page 197: ...record used for authenticating devices on the network It contains information on the owner keys for authentication and digital signatures Both the server and the client must have consistent certificat...

Page 198: ...a key exchange Specifying a longer timeout will allow the SSL session to reuse the master key on future connections with that particular host therefore speeding up the negotiation process The default...

Page 199: ...col for secure communication between a remote PC the SSH client and the Switch the SSH server are as follows 1 Create a user account with admin level access using the User Accounts window in the Secur...

Page 200: ...SSH Server utilizing the SSH authentication After the maximum number of attempts has been exceeded the Switch will be disconnected and the user must reconnect to the Switch to attempt another login T...

Page 201: ...ed by default Public Key This field may be enabled or disabled to choose if the administrator wishes to use a publickey configuration set on a SSH server for authentication This field is Enabled by de...

Page 202: ...l down to enable or disable the twofish128 encryption algorithm The default is Enabled Twofish192 Use the pull down to enable or disable the twofish192 encryption algorithm The default is Enabled Twof...

Page 203: ...trator wishes to use a remote SSH server for authentication purposes Choosing this parameter requires the user to input the following information to identify the SSH user Host Name Enter an alphanumer...

Page 204: ...et the SSH User Authentication parameters on the Switch a User Account must be previously configured For more information on configuring local User Accounts on the Switch see the User Accounts section...

Page 205: ...ated are ignored dropped The default community strings for the Switch used for SNMP v 1 and v 2 management access are public Allows authorized management stations to retrieve MIB objects private Allow...

Page 206: ...agement Protocol SNMP versions 1 2c and 3 The administrator can specify the SNMP version used to monitor and control the Switch The three versions of SNMP vary in the level of security provided betwee...

Page 207: ...the CBC DES DES 56 standard To return to the SNMP User Table window click the Show All SNMP User Table Entries link To add a new entry to the SNMP User Table window click on the Add button on the SNM...

Page 208: ...to enter a password between 8 and 16 alphanumeric characters Encrypted Checking the corresponding box will enable encryption for SNMP V3 and is only oper able in SNMP V3 mode To implement changes made...

Page 209: ...manager View Type Select Included to include this object in the list of objects that an SNMP manager can access Select Excluded to exclude this object from the list of objects that an SNMP manager ca...

Page 210: ...The following parameters can set Parameter Description Group Name Type an alphanumeric string of up to 32 characters This is used to identify the new SNMP group of SNMP users Read View Name This name...

Page 211: ...p Table window click the Show All SNMP Group Table Entries link SNMP Community Table Use this table to create an SNMP community string to define the relationship between the SNMP manager and an agent...

Page 212: ...e heading corresponding to the entry you wish to delete SNMP Host Table Use the SNMP Host Table to set up SNMP trap recipients Open the SNMP Manager folder and click on the SNMP Host Table link This w...

Page 213: ...meric string used to identify the SNMP engine on the Switch Figure 9 12 SNMP Engine ID Configuration window V3 NoAuth NoPriv To specify that the SNMP version 3 will be used with a NoAuth NoPriv securi...

Page 214: ...P Snooping Group IGMP Snooping Forward Browse Router Port Port Access Control Authenticator State Authenticator Statistics Authenticator Session Statistics Authenticator Diagnostics RADIUS Authenticat...

Page 215: ...displays the percentage of the total available bandwidth being used on the port To view the port utilization open the Monitoring folder and then the Port Utilization link Figure 10 1 Utilization windo...

Page 216: ...s an integer percentage and calculated as a simple average by time interval To view this window open the Monitoring folder and click the CPU Utilization link Figure 10 2 CPU Utilization window Click A...

Page 217: ...Six windows are offered Received RX Click the Received RX link in the Packets folder of the Monitoring menu to view the following graph of packets received on the Switch Figure 10 3 Rx Packets Analys...

Page 218: ...ond Record Number Select number of times the Switch will be polled between 20 and 200 The default value is 200 Bytes Counts the number of bytes received on the port Packets Counts the number of packet...

Page 219: ...elect a port to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use t...

Page 220: ...cond Record Number Select number of times the Switch will be polled between 20 and 200 The default value is 200 Unicast Counts the total number of good packets that were received by a unicast address...

Page 221: ...or first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and...

Page 222: ...s The default value is one second Record Number Select number of times the Switch will be polled between 20 and 200 The default value is 200 Bytes Counts the number of bytes successfully sent from the...

Page 223: ...eived RX Click the Received RX link in the Errors folder of the Monitoring menu to view the following graph of error packets received on the Switch To select a port to view these statistics for first...

Page 224: ...s that did not end on a byte octet boundary Under Size The number of packets detected that are less than the minimum permitted packets size of 64 bytes and have a good CRC Undersize packets usually in...

Page 225: ...than a line graph View Line Chart Clicking this button instructs the Switch to display a line graph rather than a table Transmitted TX Click the Transmitted TX link in the Errors folder of the Monito...

Page 226: ...of packets for which the first transmission attempt on a particular interface was delayed because the medium was busy LateColl Counts the number of times that a collision is detected later than 512 b...

Page 227: ...ble Two windows are offered To select a port to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull d...

Page 228: ...kets received that were 64 octets in length excluding framing bits but including FCS octets 65 127 The total number of packets including bad packets received that were between 65 and 127 octets in len...

Page 229: ...rder in the stack see Box Information in the Configuration folder The number of switches in the switch stack up to 12 total are displayed in the upper right hand corner of your web browser The icons a...

Page 230: ...Box ID of the Switch currently in use Current State Displays the current stacking state of the Switch which may be MASTER or SLAVE Box Count Displays the number of switches in the switch stack Device...

Page 231: ...an association between a MAC address and a port number it makes an entry into its forwarding table These entries are then used to forward packets through the Switch To view the MAC Address forwarding...

Page 232: ...MAC address was learned from Port The port that the MAC address above corresponds to Type How the Switch discovered the MAC address The possible entries are Dynamic Self and Static Next Click this bu...

Page 233: ...history log is made The table displays the last entry highest sequence number first Time Displays the time in days hours and minutes since the Switch was last restarted Log Text Displays text describ...

Page 234: ...rt Member These are the ports where the IGMP packets were snooped are displayed NOTE To configure IGMP snooping for the DXS 3326GSR go to the Configuration folder and select IGMP Configuration and oth...

Page 235: ...onfigured by a user using the console or Web based management interfaces is displayed as a static router port designated by S A router port that is dynamically configured by the Switch is designated b...

Page 236: ...DXS 3326GSR Gigabit Layer 3 Switch Figure 10 2 Authenticator State Port Based 802 1x window 2 223...

Page 237: ...ndow and click Apply A polling interval between 1 and 60 seconds can be set using the drop down menu at the top of the window and clicking OK The information on this window is described as follows Par...

Page 238: ...Unit ID by using the pull down menu in the top left hand corner The user may also select the desired time interval to update the statistics between 1s and 60s where s stands for seconds The default v...

Page 239: ...Statistics This table contains the session statistics objects for the Authenticator PAE associated with each port An entry appears in this table for each port that supports the Authenticator function...

Page 240: ...There are eight possible reasons for termination 1 Supplicant Logoff 2 Port Failure 3 Supplicant Restart 4 Reauthentication Failure 5 AuthControlledPortControl set to ForceUnauthorized 6 Port re initi...

Page 241: ...ackend Authentication state machine indicating authentication failure authFail TRUE Auth Reauth Counts the number of times that the state machine transitions from AUTHENTICATING to ABORTING as a resul...

Page 242: ...tes that the Supplicant has successfully authenticated to the Authentication Server Bac Auth Fail Counts the number of times that the state machine receives a Reject message from the Authentication Se...

Page 243: ...d as malformed access responses BadAuthenticators The number of RADIUS Access Response packets containing invalid authenticators or Signature attributes received from this server PendingRequests The n...

Page 244: ...d the Accounting Request that matched it from this RADIUS accounting server Requests The number of RADIUS Accounting Request packets sent This does not include retransmissions Retransmissions The numb...

Page 245: ...dropped for some other reason Note To configure 802 1x features for the DXS 3326GSR go to the Configuration folder and select Port Access Entity Configuration and other information concerning 802 1x m...

Page 246: ...ndow may be found in the Monitoring menu in the Layer 3 Feature folder This window shows the current IP routing table of the Switch To find a specific IP route enter an IP address into the Destination...

Page 247: ...rface Name or an IP address and click Find To clear the ARP Table click Clear All Figure 10 31 ARP Table window Browse IP Multicast Forwarding Table The IP Multicast Forwarding Table window may be fou...

Page 248: ...ion offers windows regarding OSPF Open Shortest Path First information on the Switch including the OSPF LSDB Table OSPF Neighbor Table and the OSPF Virtual Neighbor Table To view these tables open the...

Page 249: ...ticast Group and NSSA Not So Stubby Area Adv Router ID Displays the Advertising Router s ID Link State ID This field identifies the portion of the Internet environment that is being described by the a...

Page 250: ...e area s Area Border Router Figure 10 3 OSPF Virtual Neighbor Table window 6 DVMRP Monitor This menu allows the DVMRP Distance Vector Multicast Routing Protocol to be monitored for each IP interface d...

Page 251: ...fic source to a specific multicast group address This table is found in the Monitoring menu under DVMRP Monitoring with the heading Browse DVMRP Routing Next Hop Table To search this table enter eithe...

Page 252: ...ure 10 4 PIM Neighbor Table window 0 To search this table enter either an Interface Name or Neighbor Address into the respective field and click the Find button PIM neighbors of that entry will appear...

Page 253: ...TP server switch settings can be saved to the TFTP server and a history log can be uploaded from the Switch to the TFTP server Download Firmware To update the Switch s firmware open the TFTP Services...

Page 254: ...load Configuration File To download a configuration file from a TFTP server click on the TFTP Service folder in the Maintenance folder and then the Download Configuration File link Figure 11 2 Downloa...

Page 255: ...t firmware images stored on the Switch To access the following window click Maintenance Multiple Image Services Firmware Information Figure 11 5 Firmware Information window This window holds the follo...

Page 256: ...information Parameter Description Image Select the firmware image to be configured using the pull down menu The Switch allows two firmware images to be stored in the Switch s memory Active This field...

Page 257: ...he settings will be immediately applied to the switching software in RAM and will immediately take effect Some settings though require you to restart the Switch before they will take effect Restarting...

Page 258: ...option you choose in the Save Settings window Figure 11 9 Save Settings window only save configuration Figure 11 1 Save Settings window only save log 0 Figure 11 1 Save Settings window save configurat...

Page 259: ...the factory 2 Figure 11 1 Factory Reset to Default Value window Reboot Device The following window is used to restart the Switch Figure 11 1 Restart System window 3 Clicking the Yes click box will in...

Page 260: ...DXS 3326GSR Gigabit Layer 3 Switch Logout Use the Logout page to logout of the Switch s Web based management agent by clicking on the Log Out button Figure 11 14 Logout Web Setups window 247...

Page 261: ...Switch CaS which is a Switch that has a physical link to the SIM group but has not been recognized by the CS as a member of the SIM group A SIM group can only have one Commander Switch CS All switches...

Page 262: ...he Switch to be a MS The CS will then serve as the in band entry point for access to the MS The CS s IP address will become the path to all MS s of the group and the CS s Administrator s password and...

Page 263: ...erval in seconds that the Switch will send out discovery packets Returning information to a Commander Switch will include information about other switches connected to it Ex MS CaS The user may set th...

Page 264: ...six digits of the MAC Address to identify it Local Port Displays the number of the physical port on the CS that the MS or CaS is connected to The CS will have no entry in this field Speed Displays th...

Page 265: ...thin the Single IP Management Group are connected to other groups and devices Possible icons in this screen are as follows Icon Description Group Layer 2 commander switch Layer 3 commander switch Comm...

Page 266: ...viewing device information Setting the mouse cursor over a specific device in the topology window tool tip will display the same information about a specific device as the Tree view does See the wind...

Page 267: ...pending on the role of the Switch in the SIM group and the icon associated with it Group Icon Figure 12 8 Right Clicking a Group Icon The following options may appear for the user to configure Collaps...

Page 268: ...Figure 12 1 Right clicking a Commander Icon 0 The following options may appear for the user to configure Collapse To collapse the group that will be represented by a single icon Expand To expand the...

Page 269: ...wing options may appear for the user to configure Collapse To collapse the group that will be represented by a single icon Expand To expand the SIM group in detail Remove from group Remove a member fr...

Page 270: ...ed by a single icon Expand To expand the SIM group in detail Add to group Add a candidate to a group Clicking this option will reveal the following screen for the user to enter a password for authenti...

Page 271: ...the number of the physical port on the MS or CaS that the CS is connected to The CS will have no entry in this field Local Port No Displays the number of the physical port on the CS that the MS or CaS...

Page 272: ...including the current SIM version NOTE Upon this firmware release some functions of the SIM can only be configured through the Command Line Interface See the DXS 3326GSR Command Line Interface Refere...

Page 273: ...the CS where the MS resides MAC Address Model Name and Version Figure 12 2 Configuration File Backup Restore window 0 To specify a certain Switch for upgrading configuration files click its correspond...

Page 274: ...m x 45 mm Weight 5 5 kg EMC FCC Part 15 Class A IECES 003 Class Canada EN55022 Class A EN55024 Safety CSA International General Standards IEEE 802 3u 100BASE TX Fast Ethernet IEEE 802 3ab 1000BASE T G...

Page 275: ...odule 40km Single mode fiber module 80km SFP Transceiver for 1000BASE LX Single mode fiber module 10km Number of Ports 24 Mini GBIC Ports 4 1000BASE T Combo ports Performance Transmission Method Store...

Page 276: ...ing diagrams and tables show the standard RJ 45 receptacle connector and their pin assignments Appendix B 1 The standard RJ 45 port and connector RJ 45 Pin Assignments Contact MDI X Port MDI II Port 1...

Page 277: ...mum Distance Mini GBIC 1000BASE LX Single mode fiber module 1000BASE SX Multi mode fiber module 1000BASE LHX Single mode fiber module 1000BASE ZX Single mode fiber module 10km 550m 40km 80km 1000BASE...

Page 278: ...n the link can self detect its optimum operating setup backbone The part of a network used as the primary path for transporting traffic between network segments bandwidth Information capacity measured...

Page 279: ...wire connectors for IEEE 802 3 10BASE T networks RMON Remote Monitoring A subset of SNMP MIB II that allows monitoring and management capabilities by addressing up to ten different groups of informati...

Page 280: ...application program on another device VLAN Virtual LAN A group of location and topology independent devices that communicate as if they are on a common physical LAN VLT Virtual LAN Trunk A Switch to...

Page 281: ...1 Giffnock Avenue Republic of South Africa 78330 Fontenay le Fleury North Ryde NSW 2113 TEL 27 12 665 2165 France Australia FAX 27 12 665 2186 TEL 33 1 30238688 TEL 61 2 8899 1800 URL www d link co z...

Page 282: ...be to replace the non conforming Software or defective media with software that substantially conforms to D Link s functional specifications for the Software or to refund at D Link s sole discretion E...

Page 283: ...OR COMPUTER PROGRAMS TO WHICH D LINK S PRODUCT IS CONNECTED WITH LOSS OF INFORMATION OR DATA CONTAINED IN STORED ON OR INTEGRATED WITH ANY PRODUCT RETURNED TO D LINK FOR WARRANTY SERVICE RESULTING FR...

Page 284: ...For detailed warranty outside the United States please contact corresponding local D Link office Register online your D Link product at http support dlink com register...

Page 285: ...the following questions help us to support your product 1 Where and how will the product primarily be used Home Office Travel Company Business Home Business Personal Use 2 How many employees work at i...

Page 286: ......

Reviews: