DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
13
Figure 3- 2. Connect the DGS-3200-16 to a port on a switch with straight or crossover cable
Figure 3- 3. An example of a typical DGS-3200-10 connection
Page 1: ...User Manual Product Model DGS 3200 Series Layer 2 Gigabit Ethernet Managed Switch Release 1 1...
Page 2: ...ctly forbidden Trademarks used in this text D Link and the D LINK logo are trademarks of D Link Computer Corporation Microsoft and Windows are registered trademarks of Microsoft Corporation Other trad...
Page 3: ...stic environment this product may cause radio interference in which case the user may be required to take adequate measures Warnung Dies ist ein Produkt der Klasse A Im Wohnbereich kann dieses Produkt...
Page 4: ...tion 7 Package Contents 7 Installation Guidelines 7 Installing the Switch without the Rack 8 Installing the Switch in a Rack 9 Mounting the Switch in a Standard 19 Rack 10 Power On 10 Power Failure 10...
Page 5: ...m Log Settings 38 System Log Host 38 System Severity Settings 39 DHCP BOOTP Relay 40 DHCP BOOTP Relay Global Settings 40 DHCP BOOTP Relay Interface Settings 43 DHCP Auto Configuration Settings 43 MAC...
Page 6: ...v Protocol VLAN Settings 81 MAC Based VLAN Settings 83 GVRP Settings 84 PVID Auto Assign Settings 85 Trunking 86 LACP Port Settings 88 Traffic Segmentation 89 IGMP Snooping 89 IGMP Snooping Settings 8...
Page 7: ...rt s 125 Authentic RADIUS Server 126 SSL Settings 127 SSH 129 SSH Configuration 129 SSH Authmode and Algorithm Settings 130 SSH User Authentication Mode 132 Access Authentication Control 133 Authentic...
Page 8: ...193 Authenticator State 193 Authenticator Statistics 195 Authenticator Session Statistics 197 Authenticator Diagnostics 199 RADIUS Authentication 201 RADIUS Account Client 202 Browse ARP Table 204 Bro...
Page 9: ...hnical Specifications 214 Appendix B Cables and Connectors 216 Appendix C Module Specs and Cable Lengths 217 Appendix D Switch Log Entries 218 Appendix E Mitigating ARP Spoofing Attacks Using Packet C...
Page 10: ...ges or prompts appearing on screen For example You have mail Bold font is also used to represent filenames program names and commands For example use the copy command Boldface Typewriter Font Indicate...
Page 11: ...nd Cautions A NOTE indicates important information that helps make better use of the device A NOTICE indicates either potential damage to hardware or loss of data and tells how to avoid the problem A...
Page 12: ...openings of the system Doing so can cause fire or electric shock by shorting out interior components Use the product only with approved equipment Allow the product to cool before removing covers or to...
Page 13: ...ic caution statements and procedures Systems are considered to be components in a rack Thus component refers to any system as well as to various peripherals or supporting hardware CAUTION Installing s...
Page 14: ...battery to explode Replace this battery only with the same or equivalent type recommended by the manufacturer Discard used batteries according to the manufacturers instructions Protecting Against Ele...
Page 15: ...may be used in uplinking various network devices to the Switch including PCs hubs and other switches to provide a gigabit Ethernet uplink in full duplex mode The SFP Small Form Factor Portable combo...
Page 16: ...pport High performance switching engine performs forwarding and filtering at full wire speed up to 20Gbps DGS 3200 10 32Gbps DGS 3200 16 Full and half duplex for all gigabit ports Full duplex allows t...
Page 17: ...ch management Provides parallel LED display for port status such as link act speed etc Web based GUI compatible with Internet Explorer 5 5 or later Netscape 8 0 or later and Firefox 2 0 or later Ports...
Page 18: ...l Figure 1 1 Front Panel View of DGS 3200 10 Figure 1 2 Front Panel View of DGS 3200 16 LED Indicators The Switch supports LED indicators for Power Console and Port LEDs Figure 1 3 LED Indicators for...
Page 19: ...the port at 10 or 100Mbps These LEDs will remain dark if there is no link activity on the port Combo SFP Ports LED indicators for the Combo ports are located above the ports and numbered 1 9 and 2 10...
Page 20: ...hese openings Leave at least 6 inches of space at the rear and sides of the Switch for proper ventilation Be reminded that without proper heat dissipation and air circulation system components might o...
Page 21: ...g up the Switch Install the Switch on a sturdy level surface that can support at least 6 6 lb 3 kg of weight Do not place heavy objects on the Switch The power outlet should be within 1 82 meters 6 fe...
Page 22: ...Switch if installing on a desktop or shelf Attach these cushioning feet on the bottom at each corner of the device Allow enough ventilation space between the Switch and any other objects in the vicin...
Page 23: ...dard 19 rack Use the following diagrams as a guide Figure 2 3 Fasten mounting brackets to the DGS 3200 10 Figure 2 4 Fasten mounting brackets to the DGS 3200 16 Fasten the mounting brackets to the Swi...
Page 24: ...n 1 Plug one end of the AC power cord into the power connector of the Switch and the other end into the local power source outlet 2 After powering on the Switch the LED indicators will momentarily bli...
Page 25: ...figure below for installing the SFP ports in the Switch In addition DEM 210 Single Mode 100BASE FX and DEM 211 Multi Mode 100BASE FX SFP transceivers are supported WDM transceivers supported include...
Page 26: ...each UTP port will light green or amber when the link is valid A blinking LED indicates packet activity on that port Switch to Switch There is a great deal of flexibility on how connections are made u...
Page 27: ...3200 Series Layer 2 Gigabit Ethernet Managed Switch 13 Figure 3 2 Connect the DGS 3200 16 to a port on a switch with straight or crossover cable Figure 3 3 An example of a typical DGS 3200 10 connect...
Page 28: ...DGS 3200 Series Layer 2 Gigabit Ethernet Managed Switch 14 Figure 3 4 An example of a typical DGS 3200 16 connection...
Page 29: ...d of 1000 100 or 10Mbps in full or half duplex mode The fiber optic ports can operate at both 100Mbps and 1000Mbps in full duplex mode Connections to the Gigabit Ethernet ports are made using a fiber...
Page 30: ...n configure the Switch monitor the LED panel and display statistics graphically using a web browser such as Netscape Navigator version 6 2 and higher or Microsoft Internet Explorer version 5 0 and hig...
Page 31: ...ack of the Switch The boot sequence appears in the terminal After the boot sequence completes the console login screen displays If the user has not logged into the command line interface CLI program p...
Page 32: ...e Figure 4 1 Boot up display in console screen Managing the Switch for the First Time The Switch supports user based security that can allow prevention of unauthorized users from accessing the Switch...
Page 33: ...name will give the user privileged access to the Switch s management software After the initial login define new passwords for both default user names to prevent unauthorized access to the Switch and...
Page 34: ...ager Command create account admin newmanager Enter a case sensitive new password Enter the new password again for confirmation Success DGS 3200 10 4 NOTICE CLI configuration commands only modify the r...
Page 35: ...rocess that is separated into two parts The first part is to maintain a list of users and their attributes that are allowed to act as SNMP managers The second part describes what each user on that lis...
Page 36: ...fore using the Web based manager The Switch IP address can be automatically set using BOOTP or DHCP protocols in which case the actual address assigned to the Switch must be known The IP address may b...
Page 37: ...Address In the above example the Switch was assigned an IP address of 10 24 22 100 with a subnet mask of 255 0 0 0 The system message Success indicates that the command was executed successfully The...
Page 38: ...rsal access tool and can communicate directly with the Switch using the HTTP protocol The Web based management module and the Console program and Telnet are different ways to access the same internal...
Page 39: ...ide the user interface as described in the table Figure 5 2 Main Web Manager window Area Function Area 1 Select the folder or window to display Open folders and click the hyperlinked window buttons an...
Page 40: ...Forwarding Multicast Forwarding and Multicast Filtering Mode QoS Contains the following main folders windows and related windows Bandwidth Control Traffic Control 802 1p Default Priority 802 1p User...
Page 41: ...w contains the main settings for all major functions for the Switch It appears automatically when you log on to the Switch To return to the Device Information window after viewing other windows click...
Page 42: ...onfigured are described below Parameter Description System Name Enter a system name for the Switch if so desired This name will identify it in the Switch network System Location Enter the location of...
Page 43: ...field specifies the baud rate for the serial port on the Switch There are four possible baud rates to choose from 9600 19200 38400 and 115200 For a connection to the Switch using the CLI interface the...
Page 44: ...tch The Switch will allow management access from stations with the same VID listed here NOTE The Switch s factory default IP address is 10 90 90 90 with a subnet mask of 255 0 0 0 and a default gatewa...
Page 45: ...Setting the Switch s IP Address using the Console Interface Each Switch must be assigned its own IP Address which is used for communication with an SNMP network manager or other TCP IP application fo...
Page 46: ...nterface Table entry click the corresponding Edit button The following window opens Figure 6 6 IPv6 Interface Settings Edit window After making the desired changes click the Apply button The following...
Page 47: ...IPv6 Neighbor Settings table entry enter the Interface Name select the desired State in the middle section of this window and then click the Find button To delete all the entries being displayed on t...
Page 48: ...bit connections 1000M Full_Master 1000M Full_Slave and 1000M Full Gigabit connections only support full duplex connections and take on certain characteristics that are different from the other choices...
Page 49: ...ion to view the following window Use the From Port and To Port pull down menu to choose a port or range of ports to describe Users may then enter a description for the chosen port s If configuring the...
Page 50: ...igure 6 12 Static ARP Settings window The following parameters may be configured or viewed Parameter Description ARP Aging Time 0 65535 The ARP entry age out time in seconds The default is 20 minutes...
Page 51: ...ilege Admin or User from the Access Right drop down menu Figure 6 14 User Accounts window modify Modify or delete an existing user account in the table at the bottom of the window To delete the user a...
Page 52: ...using the Save Log link in the Save folder or clicking the Save Log Now button on this window Log Trigger Users who choose this method will have log files saved to the Switch every time a log event o...
Page 53: ...uration folder click System Severity Settings to view the window displayed below Figure 6 17 System Severity Settings window The following parameters may be configured or viewed Parameter Description...
Page 54: ...P Relay Time Threshold 0 65535 Allows an entry between 0 and 65535 seconds and defines the maximum time limit for routing a DHCP BOOTP packet If a value of 0 is entered the Switch will not process the...
Page 55: ...82 field will be replaced if the option 82 field already exists in the packet received from the DHCP client Drop The packet will be dropped if the option 82 field already exists in the packet received...
Page 56: ...or a stackable switch the Module is the Unit ID g Port The incoming port number of DHCP client packet port number starts from 1 Remote ID sub option format 1 2 3 4 5 2 8 0 6 MAC address 1 byte 1 byte...
Page 57: ...ace Click Apply to include this Server IP DHCP Auto Configuration Settings This window is used to enable the DHCP auto configuration feature on the Switch When enabled the Switch is instructed to rece...
Page 58: ...t value representing the MAC address age out time in seconds The MAC Address Aging Time can be set to any value between 10 and 875 seconds The default setting is 300 seconds Click Apply to set the MAC...
Page 59: ...ough Telnet choose Disabled Port The TCP port number used for Telnet management of the Switch The well known TCP port for the Telnet protocol is 23 Click Apply to set the Telnet setting Password Encry...
Page 60: ...the Switch is restarted click the Set Boot button To remove the firmware from this window click the Delete button To access the following window click Configuration Firmware Information Figure 6 27 Fi...
Page 61: ...t Protocol SNMP W If the IP address has this letter attached to it it denotes a firmware upgrade through the web based management interface SSH If the IP address has this letter attached to it it deno...
Page 62: ...on Size States the size of the corresponding firmware in bytes Update Time States the specific time the firmware version was downloaded to the Switch From States the IP address of the origin of the fi...
Page 63: ...cess the following window click Configuration SMTP Settings Figure 6 29 SMTP Settings window The following parameters may be configured or viewed Parameter Description SMTP State Use the radio button...
Page 64: ...g the Target IP Address by clicking its radio button and entering a number between 1 and 255 Click Start to initiate the Ping program The following parameters may be configured or viewed Parameter Des...
Page 65: ...or are displayed Parameter Description Status SNTP State Use this radio button to enable or disable SNTP Current Time Displays the Current Time Time Source Displays the time source for the system SNT...
Page 66: ...our local DST offset 30 60 90 or 120 minutes Time Zone Offset From GMT In HH MM Use these pull down menus to specify your local time zone s offset from Greenwich Mean Time GMT DST Repeating Settings U...
Page 67: ...t DST will end on each year Click Apply to implement changes made to this window MAC Notification Settings MAC Notification is used to monitor MAC addresses learned and entered into the forwarding dat...
Page 68: ...window Figure 6 34 MAC Notification Port Settings window To change MAC notification settings for a port or group of ports on the Switch configure the following parameters Parameter Description From Po...
Page 69: ...at are allowed to view read only information or receive traps using SNMPv1 while assigning a higher level of security to another group granting read write privi leges using SNMPv3 Using SNMPv3 individ...
Page 70: ...36 SNMP View Table window To delete an existing SNMP View Table entry click the Delete button corresponding to the entry to delete To create a new entry enter the information above the table and then...
Page 71: ...e privileges to the Switch s SNMP agent Notify View Name Specify a SNMP group name for users that can receive SNMP trap messages generated by the Switch s SNMP agent Security Model SNMPv1 Specifies th...
Page 72: ...Password or Key Auth Protocol MD5 Specifies that the HMAC MD5 96 authentication level will be used This field is only operable when V3 is selected in the SNMP Version field and the Encryption field ha...
Page 73: ...e an alphanumeric string of up to 32 characters that is used to identify members of an SNMP community This string is used like a password to give remote SNMP managers access to MIB objects in the Swit...
Page 74: ...To specify that SNMP version 2c will be used V3 NoAuth NoPriv To specify that the SNMP version 3 will be used with a NoAuth NoPriv security level V3 Auth NoPriv To specify that the SNMP version 3 wil...
Page 75: ...ate To implement your new settings click Apply SNMP Engine ID The Engine ID is a unique identifier used for SNMP V3 implementations This is an alphanumeric string used to identify the SNMP engine on t...
Page 76: ...itch of the group Member Switch MS which is a switch that is recognized by the CS a member of a SIM group and a Candidate Switch CaS which is a Switch that has a physical link to the SIM group but has...
Page 77: ...eive a response packet from the MS which it will encode and send it back to the administrator When a CaS becomes a MS it automatically becomes a member of the first SNMP community include read write a...
Page 78: ...ll down menu to change the SIM role of the Switch The two choices are Candidate A Candidate Switch CaS is not the member of a SIM group but is connected to a Commander Switch This is the default setti...
Page 79: ...low Figure 6 48 Topology window The Topology window holds the following information on the Data tab Parameter Description Device Name This field will display the Device Name of the switches in the SIM...
Page 80: ...the View drop down menu in the toolbar and then click Topology which will open the following Topology Map This window will refresh itself periodically 20 seconds by default Figure 6 49 Topology View w...
Page 81: ...ation Setting the mouse cursor over a specific device in the topology window tool tip will display the same information about a specific device as the Tree view does See the window below for an exampl...
Page 82: ...ption Device Name This field will display the Device Name of the switches in the SIM group configured by the user If no Device Name is configured by the name it will be given the name default and tagg...
Page 83: ...igure 6 55 Right Clicking a Member icon The following options may appear for the user to configure Collapse To collapse the group that will be represented by a single icon Expand To expand the SIM gro...
Page 84: ...enus on the menu bar are as follows File Print Setup Will view the image to be printed Print Topology Will print the topology map Preference Will set display properties such as polling interval and th...
Page 85: ...file backup and restore to the Member Switch using a TFTP server Member Switches will be listed in the table and will be specified by Port port on the CS where the MS resides MAC Address Model Name an...
Page 86: ...e following section will aid the user in configuring security functions for the Switch The Switch includes various functions for VLAN Trunking IGMP Snooping MLD Snooping Spanning Tree and Forwarding F...
Page 87: ...ratio used for clearing the queues is 4 1 This means that the highest priority queue Queue 7 will clear 4 packets for every 1 packet cleared from Queue 0 Remember the priority queue settings on the Sw...
Page 88: ...configured as either tagging or untagging The untagging feature of IEEE 802 1Q VLANs allows VLANs to work with legacy switches that don t recognize VLAN tags in packet headers The tagging feature allo...
Page 89: ...94 unique VLANs can be identified The tag is inserted into the packet header making the entire packet longer by 4 octets All of the information originally contained in the packet is retained Figure 7...
Page 90: ...into the header of all packets that flow into and out of it If a packet has previously been tagged the port will not alter the packet thus keeping the VLAN information intact Other 802 1Q compliant d...
Page 91: ...pped by the Switch or delivered VLAN Segmentation Take for example a packet that is transmitted by a machine on Port 1 that is a member of VLAN 2 If the destination lies on another port found through...
Page 92: ...A new tab will appear as shown below to configure the port settings and to assign a unique name and number to the new VLAN See the table on the next page for a description of the parameters in the ne...
Page 93: ...b Advertisement Enabling this function will allow the Switch to send out GVRP packets to outside sources notifying that they may join the existing VLAN Port Shows all ports of the Switch for the confi...
Page 94: ...ollowing fields can be set Parameter Description VID List This field is used to specify the VID range Supported VIDs on the Switch range from ID number 1 to 4094 Use the drop down menu to specify whet...
Page 95: ...VLAN Protocol VLAN Group Settings Figure 7 9 Protocol VLAN Group Settings window The following fields can be set Parameter Description Group ID Select an ID number for the group between 1 and 21474836...
Page 96: ...accepted by the Switch that match this priority are forwarded to the CoS queue specified previously by the user Click the corresponding box if you want to set the 802 1p default priority of a packet t...
Page 97: ...es To view this window click L2 Features MAC Based VLAN Settings Figure 7 11 MAC Based VLAN Settings window The following fields can be set Parameter Description MAC Address Specify the MAC address to...
Page 98: ...g outgoing untagged packets and to make filtering decisions about incoming packets If the port is specified to accept only tagged frames as tagging and an untagged packet is forwarded to the port for...
Page 99: ...res folder click PVID Auto Assign Settings The window shown below allows you to enable or disable PVID Auto Assign Status The default setting is enabled Figure 7 13 PVID Auto Assign Settings window Cl...
Page 100: ...a data stream to arrive in the same order they were sent NOTE If any ports within the trunk group become disconnected packets intended for the disconnected port will be load shared among the other li...
Page 101: ...a single port that has a redundant link To configure port trunking click Trunking in the L2 Features folder to bring up the following window Figure 7 15 Trunking window To configure port trunk groups...
Page 102: ...ng with the selected port Mode Active Active LACP ports are capable of processing and sending LACP control frames This allows LACP compliant devices to negotiate the aggregated link so the group may b...
Page 103: ...he Switch s Traffic Segmentation table IGMP Snooping Internet Group Management Protocol IGMP snooping allows the Switch to recognize IGMP queries and reports sent between network stations or devices a...
Page 104: ...efault 260 State Select Enabled to implement IGMP Snooping This field is Disabled by default Click Apply to implement the new settings IP Multicast Profile Settings The IP Multicast Profile Settings w...
Page 105: ...r can configure the range of multicast ports that will be accepted by the source ports to be forwarded to the receiver ports To configure these settings click L2 Features IGMP Snooping Limited Multica...
Page 106: ...uery for IPv4 and labeled as 130 in the ICMPv6 packet header this message is sent by the router to ask if any link is requesting multicast data There are two types of MLD query messages emitted by the...
Page 107: ...ings Done Timer Specifies the maximum amount of time a router can remain in the Switch after receiving a done message from the group without receiving a node listener report The user may specify a tim...
Page 108: ...p down menu to select the Target Port to which frames will be copied which receives the copies from the source port 3 Select the Source Port Setting Direction Tx Egress Rx Ingress Both or None 4 Click...
Page 109: ...ect an ending port number State Use the drop down menu to toggle between Enabled and Disabled Click Apply to let the changes take effect Spanning Tree This Switch supports three versions of the Spanni...
Page 110: ...4 VLANs supported by the Switch for a given instance To utilize the MSTP function on the Switch three steps need to be taken 1 The Switch must be set to the MSTP setting found in the STP Bridge Global...
Page 111: ...is capable of a more rapid transition to a forwarding state it no longer relies on timer configurations RSTP compliant bridges are sensitive to feedback from other RSTP compliant bridge links Ports d...
Page 112: ...dge Global Settings window RSTP default Figure 7 27 STP Bridge Global Settings window MSTP Figure 7 28 STP Bridge Global Settings window STP Compatible See the table below for descriptions of the STP...
Page 113: ...and 40 seconds The default value is 20 seconds Bridge Hello Time 1 2 The Hello Time can be set from 1 to 2 seconds This is the interval between two transmissions of BPDU packets sent by the Root Brid...
Page 114: ...n to forward packets P2P Choosing the True parameter indicates a point to point P2P shared link P2P ports are similar to edge ports however they are restricted in that a P2P port must operate in full...
Page 115: ...d To view this window click L2 Features Spanning Tree MST Configuration Identification Figure 7 30 MST Configuration Identification window To modify an entry on the table at the bottom of the window c...
Page 116: ...dow To modify an entry on the table at the top of the window click the corresponding Edit button To view more information about an entry on the table at the top of the window click the corresponding V...
Page 117: ...select the Port number To modify the settings for a particular MSTI instance enter a value in the Instance ID field an Internal Path Cost and use the drop down menu to select a Priority The user may...
Page 118: ...Address The MAC address to which packets will be statically forwarded This must be a unicast MAC address Port Allows the selection of the port number on which the MAC address entered above resides Cl...
Page 119: ...35 Multicast Filtering Mode window Parameter Description VLAN Name The VLAN to which the specified filtering action applies Select the All option to apply the action to all VLANs on the Switch Filter...
Page 120: ...ed so excessive bandwidth can be saved The Switch has separate hardware queues on every physical port to which packets from various applications can be mapped to and in turn prioritized View the follo...
Page 121: ...ue Priority 7 is assigned to the Switch s Q7 queue For strict priority based scheduling any packets residing in the higher priority classes of service are transmitted first Multiple strict priority cl...
Page 122: ...twork or a malfunctioning device such as a faulty network card Thus switch throughput problems will arise and consequently affect the overall performance of the switch network To help rectify this pac...
Page 123: ...s Choosing this option obligates the user to configure the Time Interval setting as well which will provide packet count samplings from the Switch s chip to determine if a Packet Storm is occurring Co...
Page 124: ...sages when a Traffic Storm has been both detected and cleared by the Switch This function cannot be implemented in the hardware mode When Drop is chosen for the Action parameter Click Apply to impleme...
Page 125: ...rity To implement a new default priority first choose a port range by using the From Port and To Port pull down menus and then use the Priority drop down menu to select a value from 0 to 7 Click Apply...
Page 126: ...ers Parameter Description Strict The highest class of service is the first to process traffic That is the highest class of service will finish before other queues empty Weight Fair Use the weighted ro...
Page 127: ...rts too much memory it will enter the Exhausted mode When in this mode the Switch will drop all ARP and IP broadcast packets and packets from untrusted IP addresses for a calculated time interval Ever...
Page 128: ...e the Safeguard Engine will decrease the packet flow by half After returning to Normal mode the packet flow will be increased by 25 The switch will then return to its interval checking and dynamically...
Page 129: ...witch to minimize the IP and ARP traffic flow to the CPU by dynamically allotting an even bandwidth to all traffic flows Strict If selected this function will stop accepting all ARP packets not intend...
Page 130: ...p capability e g the ARP table size and storage size of the device For the DGS 3200 10 the maximum number of IP MAC Binding entries is 512 The creation of authorized users can be manually configured b...
Page 131: ...lds can be set or modified Parameter Description ACL Mode This field will enable and disable the ACL mode for IP MAC binding on the Switch without altering previously set configurations When Enabled t...
Page 132: ...er cannot modify delete or add ACL rules to these ACL mode access profile entries Any attempt to modify delete or add ACL rules will result in a configuration error NOTE When uploading configuration f...
Page 133: ...g parameters can be set Parameter Description Port Security Trap Log Settings Use the radio button to enable or disable Port Security Traps and Log Settings on the Switch From Port The beginning port...
Page 134: ...ick the Next button to view the next page of entries listed in this table Figure 9 8 Port Lock Entries window This window displays the following information Parameter Description VID The VLAN ID of th...
Page 135: ...802 1X software or incompatible devices such as computers running Windows 98 or older operating systems or the need for guests to gain access to the network without full authorization or local authent...
Page 136: ...eriod 0 65535 This allows the user to set the number of seconds that the Switch remains in the quiet state following a failed authentication exchange with the client The default setting is 60 seconds...
Page 137: ...e Switch then requests the identity of the client and begins relaying authentication messages between the client and the authentication server The default setting is Auto Capability This allows the 80...
Page 138: ...in the From Port and To Port fields Next the user must specify the MAC address to be initialized by entering it into the MAC Address field and ticking the corresponding check box To begin the initiali...
Page 139: ...the user must first enable 802 1X by MAC address in the 802 1X Settings window Click Security 802 1X Reauthenticate Port s to open the following window Figure 9 16 Reauthenticate Port s window for MA...
Page 140: ...his window displays the following information Parameter Description Index Choose the desired RADIUS server to configure 1 2 or 3 and select either IPv4 Address or IPv6 Address IP Address Set the RADIU...
Page 141: ...Switch to create a three layered encryption code for secure communication between the server and the host The user may implement any one or combination of the ciphersuites available yet different cip...
Page 142: ...RC4_128_MD5 This ciphersuite combines the RSA key exchange stream cipher RC4 encryption with 128 bit keys and the MD5 Hash Algorithm Use the radio buttons to enable or disable this ciphersuite This f...
Page 143: ...een a remote PC the SSH client and the Switch the SSH server are as follows 1 Create a user account with admin level access using the User Accounts window Configuration Port Configuration User Account...
Page 144: ...g is Never SSH Authmode and Algorithm Settings This window allows the configuration of the desired types of SSH algorithms used for authentication encryption There are three categories of algorithms l...
Page 145: ...e or disable the Cast128 encryption algorithm with Cipher Block Chaining The default is enabled Twofish128 Use the check box to enable or disable the twofish128 encryption algorithm The default is ena...
Page 146: ...he administrator wishes to use a remote SSH server for authentication purposes Choosing this parameter requires the user to input the following information to identify the SSH user Host Name Enter an...
Page 147: ...e Switch The server will not accept the username and password and the user is denied access to the Switch The server doesn t respond to the verification query At this point the Switch receives the tim...
Page 148: ...authentication attempts Command line interface users will have to wait 60 seconds before another authentication attempt Telnet and web users will be disconnected from the Switch The user may set the...
Page 149: ...lists The user may define the type of server group by protocol or by previously defined server group The Switch has three built in Authentication Server Groups that cannot be removed but can be modif...
Page 150: ...cation Server Hosts must be configured for their specific protocol on a remote centralized server before this function can work properly NOTE The three built in server groups can only have server host...
Page 151: ...or RADIUS servers only Specify an alphanumeric string up to 254 characters Port 1 65535 Enter a number between 1 and 65535 to define the virtual port number of the authentication protocol on a server...
Page 152: ...gured password set by the administrator To view the following window click Security Access Authentication Control Login Method Lists Figure 9 27 Login Method Lists window The Switch contains one Metho...
Page 153: ...ve the user an Admin privilege NOTE To set the Local Enable Password see the next section entitled Local Enable Password To view the following table click Security Access Authentication Control Enable...
Page 154: ...in the New Local Enabled field will result in a fail message Click Apply to implement changes made Enable Admin The Enable Admin window is for users who have logged on to the Switch on the normal user...
Page 155: ...ss the RADIUS server will return a notification stating that the MAC address has been accepted and is to be placed in the target VLAN If the Guest VLAN is enabled the MAC and port will be added to the...
Page 156: ...MAC Based Access Control Local Database Settings window RADIUS Use this method to utilize a remote RADIUS server as the authenticator for MAC Based Access Control Remember the MAC list must be previou...
Page 157: ...entication Web based Access Control Web Authentication also known as Web based Access Control is another port based access control method implemented similarily to the 802 1x port based access control...
Page 158: ...a DNS server to improve CPU performance and allow the processing of DNS UDP and HTTP packets 4 Certain functions exist on the Switch that will filter HTTP packets such as the Access Profile function...
Page 159: ...RADIUS server must have already been pre assigned by the administrator using the Authentic RADIUS Server window Security 802 1X Authentic RADIUS Server Logout Time 1 1440 Enter a Logout Time value in...
Page 160: ...to the stated web page If the client does not reach this web page yet does not receive a Fail Message the client will already be authenticated and therefore should refresh the current browser window...
Page 161: ...there is no port VLAN membership change by JWAC after a host passes authentication The RADIUS server will share the server configuration defined by the 802 1X command set To configure JWAC global sett...
Page 162: ...ge Enter a value between 0 and 10 seconds A value of 0 indicates no delay in the redirect Quarantine Server Configuration Error Timeout 5 300 This parameter is used to set the Quarantine Server Error...
Page 163: ...will remain in the authenticated state Enter a value between 0 and 1440 minutes A value of 0 indicates the authenticated host will never age out on the port MAC Authenticating Host 1 10 This parameter...
Page 164: ...ng fields and then click the Add button To clear the current JWAC user settings in the table at the bottom of the window click the Delete All button Parameter Description User Name Enter a username of...
Page 165: ...to do with the frame The entire process is described below in two parts To display the currently configured Access Profiles on the Switch open the ACL folder and click the Access Profile List link Thi...
Page 166: ...e IPv6 address in each frame s header Select Packet Content to instruct the Switch to examine the packet content in each frame s header Source MAC Mask Enter a MAC address mask for the source MAC addr...
Page 167: ...window according to the requirements for the type of profile Select Ethernet ACL to instruct the Switch to examine the layer 2 part of each packet header Select IPv4 ACL to instruct the Switch to exam...
Page 168: ...0x0 0xffff which you wish to filter dst port mask Specify a TCP port mask for the destination port in hex form hex 0x0 0xffff which you wish to filter flag bit The user may also identify which flag bi...
Page 169: ...frame s header Select Packet Content to instruct the Switch to examine the packet content in each frame s header IPv6 Class Ticking this check box will instruct the Switch to examine the class field o...
Page 170: ...rofile set This value can be set from 1 to 200 Select ACL Type Select profile based on Ethernet MAC Address IPv4 address IPv6 address or packet content This will change the window according to the req...
Page 171: ...fied content regardless of the protocol layer Click Apply to implement changes made To view the setting details for a created profile click the Show Details button for the corresponding entry on the A...
Page 172: ...roring must be enabled and a target port must be set Priority 0 7 Tick the corresponding check box if you want to re write the 802 1p default priority of a packet to the value entered in the Priority...
Page 173: ...he Access ID field of this window If not the user will be presented with an error message and the access rule will not be configured Ticking the All Ports check box will denote all ports on the Switch...
Page 174: ...ommand before forwarding it on to the specified CoS queue Otherwise a packet will have its incoming 802 1p user priority re written to its original value before being forwarded by the Switch For more...
Page 175: ...be configured Ticking the All Ports check box will denote all ports on the Switch To view the settings of a previously correctly configured rule click the corresponding Show Details button on the Acc...
Page 176: ...warding it on to the specified CoS queue Otherwise a packet will have its incoming 802 1p user priority re written to its original value before being forwarded by the Switch For more information on pr...
Page 177: ...ndow to view the following window Figure 10 18 Access Rule Detail Information window for IPv6 To establish the rule for a previously created Access Profile To configure the Access Rules for IPv4 open...
Page 178: ...ty field which meets the criteria specified previously in this command before forwarding it on to the specified CoS queue Otherwise a packet will have its incoming 802 1p user priority re written to i...
Page 179: ...Switch by enabling the user to create a list of access rules for packets destined for the Switch s CPU interface Employed similarly to the Access Profile feature previously mentioned CPU interface fil...
Page 180: ...ding Show Details button To add an entry to the CPU Acces Profile List click the Add ACL Profile button This will open the Add CPU ACL Profile window as shown below To remove all CPU Access Profile Li...
Page 181: ...each frame s header Select IPv6 to instruct the Switch to examine the IP address in each frame s header Select Packet Content Mask to specify a mask to hide the content of the packet header Source MAC...
Page 182: ...r Parameter Description Select Profile ID Use the drop down menu to select a unique identifier number for this profile set This value can be set from 1 to 5 Select ACL Type Select profile based on Eth...
Page 183: ...d The user may also identify which flag bits to filter Flag bits are parts of a packet that determine what to do with the packet The user may filter packets by filtering certain flag bits within the p...
Page 184: ...ach frame s header Select Packet Content Mask to specify a mask to hide the content of the packet header IPv6 Class Checking this field will instruct the Switch to examine the class field of the IPv6...
Page 185: ...ent filter Parameter Description Select Profile ID Use the drop down menu to select a unique identifier number for this profile set This value can be set from 1 to 5 Select ACL Type Select profile bas...
Page 186: ...from byte 64 to byte 79 Click Apply to set this entry in the Switch s memory To view the settings of a previously correctly created profile click the corresponding Show Details button on the CPU Acce...
Page 187: ...file are not forwarded by the Switch and will be filtered Ethernet Type 0 FFFF Enter the appropriate Ethernet Type information Time Range Name Tick the check box and enter the name of the Time Range s...
Page 188: ...100 Type in a unique identifier number for this access This value can be set from 1 to 100 Action Select Permit to specify that the packets that match the access profile are forwarded by the Switch ac...
Page 189: ...the Access Rules for IP open the CPU Access Profile List window and click Add View Rules for an IPv6 entry This will open the following window Figure 10 37 CPU Access Rule List window for IPv6 To remo...
Page 190: ...that has been previously configured in the Time Range Settings window This will set specific times when this access rule will be implemented on the Switch Ports Ticking the All Ports check box will de...
Page 191: ...ied Offset 0 15 Enter a value in hex form to mask the packet from the beginning of the packet to the 15th byte Offset 16 31 Enter a value in hex form to mask the packet from byte 16 to byte 31 Offset...
Page 192: ...lphanumeric characters that will be used to identify this time range on the Switch This range name will be used in the Access Profile table to identify the access profile and associated rule to be ena...
Page 193: ...Router Port Browse Session Table IGMP Snooping Group MLD Snooping Group JWAC Host Table MAC Address Table System Log MAC Based Access Control Authentication State CPU Utilization The CPU Utilization w...
Page 194: ...implement the configured settings The window will automatically refresh with new updated statistics Change the view parameters as follows Parameter Description Time Interval Select the desired settin...
Page 195: ...rt by using the Port pull down menu The user may also use the real time graphic of the Switch at the top of the web page by simply clicking on a port Change the view parameters as follows Parameter De...
Page 196: ...select the port by using the Port pull down menu The user may also use the real time graphic of the Switch at the top of the web page by simply clicking on a port To view the packet size windows open...
Page 197: ...tets in length inclusive excluding framing bits but including FCS octets 256 511 The total number of packets including bad packets received that were between 256 and 511 octets in length inclusive exc...
Page 198: ...onitoring Packets Received RX to view the following graph of packets received on the Switch To select a port to view these statistics for select the port by using the Port pull down menu The user may...
Page 199: ...ts the number of bytes received on the port Packets Counts the number of packets received on the port Unicast Counts the total number of good packets that were received by a unicast address Multicast...
Page 200: ...port by using the Port pull down menu The user may also use the real time graphic of the Switch at the top of the web page by simply clicking on a port Figure 11 7 UMB_cast RX window for Unicast Mult...
Page 201: ...adcast address Show Hide Check whether or not to display Multicast Broadcast and Unicast Packets Clear Clicking this button clears all statistics counters on this window View Table Clicking this butto...
Page 202: ...f bytes successfully sent on the port Packets Counts the number of packets successfully sent on the port Unicast Counts the total number of good packets that were transmitted by a unicast address Mult...
Page 203: ...ng Errors Received RX to view the following graph of error packets received on the Switch To select a port to view these statistics for select the port by using the Port pull down menu The user may al...
Page 204: ...s a nor mal network occurrence OverSize Counts valid packets received that were longer than 1518 octets and less than the MAX_PKT_LEN Internally MAX_PKT_LEN is equal to 1536 Fragment The number of pac...
Page 205: ...error packets received on the Switch To select a port to view these statistics for select the port by using the Port pull down menu The user may also use the real time graphic of the Switch at the to...
Page 206: ...et boundary LateColl Counts the number of times that a collision is detected later than 512 bit times into the transmission of a packet ExColl Excessive Collisions The number of packets for which tran...
Page 207: ...iew the Port Access Control windows open the Monitoring folder and click Port Access Control There are seven monitoring windows in this section Authenticator State The following section describes the...
Page 208: ...ption Auth PAE State The Authenticator PAE State value can be Initialize Disconnected Connecting Authenticating Authenticated Aborting Held Force_Auth Force_Unauth or N A N A Not Available indicates t...
Page 209: ...tatistics between 1s and 60s where s stands for seconds The default value is one second The following fields can be viewed Parameter Description Port The identification number assigned to the Port by...
Page 210: ...es other than Resp Id frames that have been received by this Authenticator Rx Invalid The number of EAPOL frames that have been received by this Authenticator in which the frame type is not recognized...
Page 211: ...11 18 Authenticator Session Statistics window The user may select the desired time interval to update the statistics between 1s and 60s where s stands for seconds The default value is one second The f...
Page 212: ...hentication Server is external to the Authenticator s System 2 Local Authentic Server The Authentication Server is located within the Authenticator s System Time The duration of the session in seconds...
Page 213: ...ed Parameter Description Port The identification number assigned to the Port by the System in which the Port resides Connect Enter Counts the number of times that the state machine transitions to the...
Page 214: ...number of times that the state machine sends an initial Access Request packet to the Authentication server i e executes sendRespToServer on entry to the RESPONSE state Indicates that the Authenticato...
Page 215: ...e as sysName in MIB II ServerIndex The identification number assigned to each RADIUS Authentication server that the client shares a secret with AuthServerAddress The conceptual table listing the RADIU...
Page 216: ...ansmit as well as a timeout A send to a different server is counted as a Request as well as a timeout UnknownTypes The number of RADIUS packets of unknown type which were received from this server on...
Page 217: ...RADIUS Accounting Response packets received from this server Malformed packets include packets with an invalid length Bad authenticators and unknown types are not included as malformed accounting res...
Page 218: ...tatic ARP table entries To clear the ARP Table click Clear All The view the Browse ARP Table window open the Monitoring folder and click Browse ARP Table Figure 11 22 Browse ARP Table window Browse VL...
Page 219: ...wse Router Port window open the Monitoring folder and click Browse Router Port Figure 11 24 Browse Router Port window Browse MLD Router Port This window displays which of the Switch s ports are curren...
Page 220: ...ets that pass through the Switch To view the IGMP Snooping Group window open the Monitoring folder and click IGMP Snooping Group Figure 11 27 IGMP Snooping Group window The user may search the IGMP Sn...
Page 221: ...he MLD Snooping Group window open the Monitoring folder and click MLD Snooping Group Figure 11 28 MLD Snooping Group window Parameter Description VID List VLAN Name The VID List or VLAN Name of the mu...
Page 222: ...the MAC address table are described below Parameter Description Port The port to which the MAC address below corresponds VLAN Name Enter a VLAN Name for the forwarding table to be browsed by MAC Addr...
Page 223: ...ing Clear will allow the user to clear the Switch History Log The information in the table is categorized as Parameter Description Type Choose the type of log to view There are two choices Regular Log...
Page 224: ...ude Save Configuration_ID_1 to save the configuration file indexed as Image file 1 To use this file for configuration it must be designated as the Boot configuration Save Configuration_ID_2 to save th...
Page 225: ...ion ID 2 to open the following window Figure 12 2 Save Configuration ID 2 window Save Log Open the Save drop down menu at the top of the Web manager and click Save Log to open the following window Fig...
Page 226: ...log file enter a Server IP address and file path name Select either IPv4 or IPv6 and then click Upload or Upload Attack Log Figure 12 6 Upload Log File window Reset The Reset function has several opt...
Page 227: ...ve 1 or 2 Click Download to initiate the file transfer Reboot System The following window is used to restart the Switch Figure 12 9 Reboot System window Clicking the Yes radio button will instruct the...
Page 228: ...es Ethernet Fast Ethernet Gigabit Ethernet Fiber Optic Half duplex Full duplex 10 Mbps 20Mbps 100Mbps 200Mbps 1000Mbps 2000Mbps SFP Mini GBIC Support IEEE 802 3z 1000BASE LX DEM 310GT transceiver IEEE...
Page 229: ...ensing Dimensions 280mm x 180mm x 43mm Weight DGS 3200 10 1 69kg DGS 3200 16 1 86kg EMI CE Class A FCC Class A VCCI Class A C Tick Report Safety UL CB Report Performance Transmission Method Store and...
Page 230: ...following diagrams and tables show the standard RJ 45 receptacle connector and their pin assignments Appendix B 1 The standard RJ 45 port and connector RJ 45 Pin Assignments Contact MDI X Port MDI II...
Page 231: ...T Category 5e UTP Cable Category 5 UTP Cable 1000 Mbps 100m 100BASE TX Category 5 UTP Cable 100 Mbps 100m 10BASE T Category 3 UTP Cable 10 Mbps 100m DEM 310GT 1000Base LX Single mode 10km DEM 311GT 10...
Page 232: ...rnal Power failed Unit unitID Internal Power failed Critical Internal Power is recovered Unit unitID Internal Power is recovered Critical Side Fan failed Unit unitID Side Fan failed Critical For DGS 3...
Page 233: ...ipaddr MAC macaddr are XOR shown in log string which means if user login by console will no IP and MAC information for logging Interface Port link up Port unitID portNum link up link state Informatio...
Page 234: ...addr Informational SNMP SNMP request received with invalid community string SNMP request received from ipAddress with invalid community string Informational STP Topology changed Topology changed Insta...
Page 235: ...ername username MAC macaddr Informational Login failed through Web authenticated by AAA local method Login failed failed through Web from userIP authenticated by AAA local method Username username MAC...
Page 236: ...macaddr Informational Successful login through SSH authenticated by AAA none method Successful login through SSH from userIP authenticated by AAA none method Username username MAC macaddr Information...
Page 237: ...ated by AAA server Successful login through Telnet from userIP authenticated by AAA server serverIP Username username MAC macaddr Informational Login failed through Telnet authenticated by AAA server...
Page 238: ...onsole authenticated by AAA none method Successful Enable Admin through Console authenticated by AAA none method Username username Informational Successful Enable Admin through Web authenticated by AA...
Page 239: ...gh Web from userIP due to AAA server timeout or improper configuration Username username MAC macaddr Warning Successful Enable Admin through Web SSL authenticated by AAA server Successful Enable Admin...
Page 240: ...otocol protocol connection failed Warning protocol is one of TACACS XTACACS TACACS RADIUS AAA server ACK error AAA server serverIP Protocol protocol response is wrong Warning protocol is one of TACACS...
Page 241: ...WAC host logout normally Username s IP s MAC s Port s Informational Logout forcibly JWAC host logout forcibly Username s IP s MAC s Port s Warning Age out JWAC host age out Username s IP s MAC s Port...
Page 242: ...evice port portNum stackable device Port unitID portNum 802 1p default priority assigned from RADIUS server after RADIUS client authenticated by RADIUS server successfully This 802 1p default priority...
Page 243: ...00 00 00 00 00 00 while PC B s IP address will be written into the Target Protocol Address shown in Table 1 Table 1 ARP Payload H W Type Protocol Type H W Address Length Protocol Address Length Opera...
Page 244: ...e frame of ARP request to the network all PCs will receive and examine the frame but only PC B will reply the query as the destination IP matched see Figure 3 Figure 3 When PC B replies to the ARP req...
Page 245: ...query the Destination Address in the Ethernet frame will be changed to PC A s MAC address The Source Address will be changed to PC B s MAC address see Table 4 Table 4 Ethernet frame format Destination...
Page 246: ...nodes within the network will immediately update their own ARP table in accordance with the sender s MAC and IP address The format of Gratuitous ARP is shown in the following table Table 5 Destinatio...
Page 247: ...a unique Package Content ACL For the reason that basic ACL can only filter ARP packets based on packet type VLAN ID Source and Destination MAC information there is a need for further inspections of AR...
Page 248: ...Offset Chunk4 Offset Chunk5 Offset Chunk6 Offset Chunk7 Offset Chunk8 Offset Chunk9 Offset Chunk10 Offset Chunk11 Offset Chunk12 Offset Chunk13 Offset Chunk14 Offset Chunk15 Byte 127 3 7 11 15 19 23 2...
Page 249: ...DGS 3200 Series Layer 2 Gigabit Ethernet Managed Switch 235...
Page 250: ...A message sent to all destination devices on the network broadcast storm Multiple simultaneous broadcasts that typically absorb available network bandwidth and can cause network failure console port T...
Page 251: ...connection SNMP Simple Network Management Protocol A protocol originally designed to be used in managing TCP IP internets SNMP is presently implemented on a wide range of computers and networking equi...
Page 252: ...ded that the Software is properly installed on approved hardware and operated as contemplated in its documentation D Link further warrants that during the Software Warranty Period the magnetic media o...
Page 253: ...Y TERRITORY WHERE A PRODUCT IS SOLD THE DURATION OF SUCH IMPLIED WARRANTY SHALL BE LIMITED TO NINETY 90 DAYS EXCEPT AS EXPRESSLY COVERED UNDER THE LIMITED WARRANTY PROVIDED HEREIN THE ENTIRE RISK AS T...
Page 254: ...ver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help For detailed warranty inf...
Page 255: ...s discretion may replace the defective Hardware or any part thereof with any reconditioned product that D Link reasonably determines is substantially equivalent or superior in all material respects to...
Page 256: ...Service Office and if requested provide written proof of purchase of the product such as a copy of the dated purchase invoice for the product before the warranty service is provided After an RMA numb...
Page 257: ...OR REFUND OF THE DEFECTIVE OR NON CONFORMING PRODUCT GOVERNING LAW This Limited Warranty shall be governed by the laws of the state of California Some states do not allow exclusion or limitation of i...
Page 258: ...his product U S and Canadian customers can contact D Link technical support through our website or by phone Tech Support for customers within the United States D Link Technical Support over the Teleph...
Page 259: ...you a speedy resolution for your problem D Link UK Ireland Technical Support over the Telephone United Kingdom 08456 12 0003 BT 3p per minute peak 1 5p per minute off peak 0 5p per minute weekends UK...
Page 260: ...dbuch finden Sie auf der Website von D Link D Link bietet kostenfreie technische Unterst tzung f r Kunden innerhalb Deutschlands sterreichs der Schweiz und Osteuropas Unsere Kunden k nnen technische U...
Page 261: ...le site web D Link Vous pouvez contacter le service technique de D Link par notre site internet ou par t l phone Assistance technique D Link par t l phone 0 820 0803 03 0 12 min Hours Monday Friday 9...
Page 262: ...documentaci n t cnica en el sitio web de D Link D Link ofrece asistencia t cnica gratuita para clientes residentes en Espa a durante el periodo de garant a del producto Asistencia T cnica de D Link p...
Page 263: ...upporto tecnico Gli ultimi aggiornamenti e la documentazione sono disponibili sul sito D Link Supporto Tecnico dal luned al venerd dalle ore 9 00 alle ore 19 00 con orario continuato Telefono 02 39607...
Page 264: ...free technical support for customers within Benelux for the duration of the warranty period on this product Benelux customers can contact D Link technical support through our website or by phone Neth...
Page 265: ...a bezp atn pomoc techniczn klientom w Polsce w okresie gwarancyjnym produktu Klienci z Polski mog si kontaktowa z dzia em pomocy technicznej firmy D Link za po rednictwem Internetu lub telefonicznie T...
Page 266: ...nce firmy D Link D Link poskytuje sv m z kazn k m bezplatnou technickou podporu Z kazn ci mohou kontaktovat odd len technick podpory p es webov str nky mailem nebo telefonicky Telefon 225 281 553 Lan...
Page 267: ...aged Switch 253 Technikai T mogat s Meghajt programokat s friss t seket a D Link Magyarorsz g weblapj r l t lthet le Tel 06 1 461 3001 Fax 06 1 461 3004 Land Line 14 99 HUG min Mobile 49 99 HUF min We...
Page 268: ...bruker dokumentasjon p D Links web sider D Link tilbyr sine kunder gratis teknisk support under produktets garantitid Kunder kan kontakte D Links teknisk support via v re hjemmesider eller p tlf D Lin...
Page 269: ...nk s hjemmeside D Link tilbyder gratis teknisk support til kunder i Danmark i hele produktets garantiperiode Danske kunder kan kontakte D Link s tekniske support via vores hjemmeside eller telefonisk...
Page 270: ...anaged Switch 256 Teknist tukea asiakkaille Suomessa D Link tarjoaa teknist tukea asiakkailleen Tuotteen takuun voimassaoloajan Tekninen tuki palvelee seuraavasti numerosta 0800 114 677 Arkisin klo 9...
Page 271: ...mer information om mjukvaru uppdateringar och annan anv ndarinformation D Link tillhandah ller teknisk support till kunder i Sverige under hela garantitiden f r denna produkt D Link Teknisk Support vi...
Page 272: ...a es de software e documenta o de utilizador no site de D Link Portugal http www dlink pt A D Link fornece suporte t cnico gratuito para clientes no Portugal durante o per odo de vig ncia de garantia...
Page 273: ...ayer 2 Gigabit Ethernet Managed Switch 259 software updates D Link D Link D Link Hellas Support Center 64 11251 210 86 11 114 09 00 17 00 210 8611114 Web http www dlink gr FTP ftp www dlink it E mail...
Page 274: ...Ethernet Managed Switch 260 Tehni ka podr ka Hvala vam na odabiru D Link proizvoda Za dodatne informacije podr ku i upute za kori tenje ure aja molimo vas da posjetite D Link internetsku stranicu na w...
Page 275: ...Ethernet Managed Switch 261 Tehni na podpora Zahvaljujemo se vam ker ste izbrali D Link proizvod Za vse nadaljnje informacije podporo ter navodila za uporabo prosimo obi ite D Link ovo spletno stran w...
Page 276: ...2 Gigabit Ethernet Managed Switch 262 Suport tehnica V mul umim pentru alegerea produselor D Link Pentru mai multe informa ii suport i manuale ale produselor v rug m s vizita i site ul D Link www dlin...
Page 277: ...o Friday 9 30AM to 7 00PM http www dlink co in support productsupport aspx Indonesia Malaysia Singapore and Thailand Tel 62 21 5731610 Indonesia Tel 1800 882 880 Malaysia Tel 65 66229355 Singapore Tel...
Page 278: ...to 5 00pm http www dlink co il support e mail support dlink co il Pakistan Tel 92 21 4548158 or 92 21 4548310 Sunday to Thursday 9 00am to 6 00pm http support dlink me com e mail support pk dlink me c...
Page 279: ...DGS 3200 Series Layer 2 Gigabit Ethernet Managed Switch 265 D Link D Link D Link D Link 495 744 00 99 http www dlink ru e mail support dlink ru...
Page 280: ...a 21 00 pm Soporte T cnico Help Desk Colombia Tel fono 01800 9525465 Lunes a Viernes 07 00 am a 20 00 pm Soporte T cnico Help Desk Ecuador Tel fono 1800 035465 Lunes a Viernes 07 00 am a 20 00 pm Sopo...
Page 281: ...te da D Link Brasil www dlinkbrasil com br A D Link fornece suporte t cnico gratuito para clientes no Brasil durante o per odo de vig ncia da garantia deste produto Suporte T cnico para clientes no Br...
Page 282: ...DGS 3200 Series Layer 2 Gigabit Ethernet Managed Switch 268 D Link D Link D Link 0800 002 615 8 30 9 00 http www dlink com tw dssqa_service dlink com tw D Link http www dlink com tw...
Page 283: ...Update perangkat lunak dan dokumentasi pengguna dapat diperoleh pada situs web D Link Dukungan Teknis untuk pelanggan Dukungan Teknis D Link melalui telepon Tel 62 21 5731610 Dukungan Teknis D Link m...
Page 284: ...3200 Series Layer 2 Gigabit Ethernet Managed Switch 270 D Link 36 B 26F 02 05 100013 8008296688 028 66052968 028 85176948 36 B 26F 02 05 100013 010 58257789 010 58257790 http www dlink com cn 09 00 18...
Page 285: ...International Offices...
Page 286: ...Business Personal Use 2 How many employees work at installation site 1 employee 2 9 10 49 50 99 100 499 500 999 1000 or more 3 What network protocol s does your organization use XNS IPX TCP IP DECnet...
Page 287: ......