background image

xStack DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch 

Authenticator Session Statistics 

This table contains the session statistics objects for the Authenticator PAE associated with each port. An entry appears in this table 
for each port that supports the Authenticator function. To view the 

Authenticator Session Statistics

, click 

Monitoring > Port 

Access Control > Authenticator Session Statistics

 

Figure 10- 24. Authenticator Session Statistics window 

The user can specify a switch in a switch stack using that switch’s Unit ID by using the pull-down menu in the top left hand 
corner. The user may also select the desired time interval to update the statistics, between 

1s 

and 

60s

, where “s” stands for 

seconds. The default value is one second. 

The following fields can be viewed: 

Parameter                 Description 

Port 

The identification number assigned to the Port by the System in which the Port resides. 

Octets Rx 

The number of octets received in user data frames on this port during the session. 

Octets Tx 

The number of octets transmitted in user data frames on this port during the session. 

Frames Rx 

The number of user data frames received on this port during the session. 

Frames Tx 

The number of user data frames transmitted on this port during the session. 

A unique identifier for the session, in the form of a printable ASCII string of at least three 
characters. 

Authentic Method  

The authentication method used to establish the session. Valid Authentic Methods include: 

 (1) Remote Authentic Server - The Authentication Server is external to the Authenticator’s 
System. 

 (2) Local Authentic Server - The Authentication Server is located within the Authenticator’s 
System. 

Time 

The duration of the session in seconds. 

ID 

237 

     

Summary of Contents for xStack DGS-3400 Series

Page 1: ...xStack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch User Manual Product Model TM DGS 3400 Series Layer 2 Gigabit EthernetManaged Switch Release 2 i...

Page 2: ...k Computer Corporation is strictly forbidden Trademarks used in this text D Link and the D LINK logo are trademarks of D Link Computer Corporation Microsoft and Windows are registered trademarks of Mi...

Page 3: ...n Guidelines 9 Installing the Switch without the Rack 10 Installing the Switch in a Rack 10 Mounting the Switch in a Standard 19 Rack 11 Power On 11 Power Failure 11 Installing the SFP ports 12 The Op...

Page 4: ...P Address 39 Setting the Switch s IP Address using the Console Interface 40 Interface Settings 41 IPv4 Interface Settings 41 IPv6 Interface Settings 42 Stacking 46 Stack Switch Swapping 47 Stacking Mo...

Page 5: ...SNMP Trap Settings 81 SNMP User Table 81 SNMP View Table 83 SNMP Group Table 84 SNMP Community Table 86 SNMP Host Table 87 SNMP Engine ID 88 IP MAC Port Binding 89 ACL Mode 89 IP MAC Binding Port 91...

Page 6: ...ACP Port Settings 128 IGMP Snooping 129 IGMP Snooping Settings 129 Router Port Settings 130 Limited Multicast Address Range 132 MLD Snooping 133 MLD Control Messages 133 MLD Snooping Settings 133 MLD...

Page 7: ...ns Using the Guest VLAN 185 Guest VLAN 186 Configure 802 1X Authenticator 187 802 1X User 189 Initializing Ports for Port Based 802 1X 190 Initializing Ports for MAC Based 802 1X 191 Reauthenticate Po...

Page 8: ...outer Port 232 VLAN Status 233 Port Access Control 234 Authenticator State 234 Authenticator Statistics 236 Authenticator Session Statistics 237 Authenticator Diagnostics 238 RADIUS Authentication 240...

Page 9: ...al Specifications 256 Appendix B 258 Cables and Connectors 258 Appendix C 259 Cable Lengths 259 Appendix D 260 Switch Log Entries 260 Glossary 272 Warranties Registration 274 Tech Support 282 Internat...

Page 10: ...ssages or prompts appearing on screen For example You have mail Bold font is also used to represent filenames program names and commands For example use the copy command Boldface Typewriter Font Indic...

Page 11: ...nd Cautions A NOTE indicates important information that helps make better use of the device A NOTICE indicates either potential damage to hardware or loss of data and tells how to avoid the problem A...

Page 12: ...penings of the system Doing so can cause fire or electric shock by shorting out interior components Use the product only with approved equipment Allow the product to cool before removing covers or tou...

Page 13: ...ecific caution statements and procedures Systems are considered to be components in a rack Thus component refers to any system as well as to various peripherals or supporting hardware CAUTION Installi...

Page 14: ...battery to explode Replace this battery only with the same or equivalent type recommended by the manufacturer Discard used batteries according to the manufacturers instructions Protecting Against Ele...

Page 15: ...on D Link s next generation xStack DGS 3400 Series switches are high port density stackable switches that combine the ultimate performance with fault tolerance security management functions with flexi...

Page 16: ...l Image Firmware Simple Network Time Protocol support MAC Notification support System and Port Utilization support System Log Support High performance switching engine performs forwarding and filterin...

Page 17: ...Ports Two slots open for single port 10GE XFP or 10GBASE CX4 modules One RS 232 DB 9 console port DGS 3426P Twenty four PoE Compliant 10 100 1000BASE T Gigabit ports Four Combo SFP Ports Two slots op...

Page 18: ...ront panel includes a seven segment LED indicating the Stack ID number A separate table below describes LED indicators in more detail DGS 3426P also includes a Mode Select button for changing the mode...

Page 19: ...The Switch supports LED indicators for Power Console RPS and Port LEDs including 10GE port LEDs for optional module inserts Figure 2 5 LED Indicators on DGS 3450 Figure 2 6 LED Indicators on DGS 3427...

Page 20: ...ng green light indicates activity on the port at 1000Mbps A steady orange light denotes a valid 10 or 100Mbps link on the port while a blinking orange light indicates activity on the port at 100Mbps T...

Page 21: ...module inserts Figure 2 11 Rear panel view of DGS 3427 DGS 3450 The rear panel of the DGS 3450 contains an AC power connector two empty slots for optional module inserts a redundant power supply conne...

Page 22: ...Leave at least 6 inches of space at the rear and sides of the Switch for proper ventilation Be reminded that without proper heat dissipation and air circulation system components might overheat which...

Page 23: ...nes Please follow these guidelines for setting up the Switch Install the Switch on a sturdy level surface that can support at least 6 6 lb 3 kg of weight Do not place heavy objects on the Switch The p...

Page 24: ...h ventilation space between the Switch and any other objects in the vicinity Figure 2 16 Prepare Switch for installation on a desktop or shelf Installing the Switch in a Rack The Switch can be mounted...

Page 25: ...AC power cord into the power connector of the Switch and the other end into the local power source outlet 2 After powering on the Switch the LED indicators will momentarily blink This blinking of the...

Page 26: ...g in order to uplink various other networking devices for a gigabit link that may span great distances These SFP ports support full duplex transmissions have auto negotiation and can be used with DEM...

Page 27: ...herefore has a transmit length limit up to 1 meter Compliant with the IEEE802 3ak standard this module uses a 4 laned copper connector for data transfer in full duplex mode within a stacking configura...

Page 28: ...ches the back as shown in the following figure Gently but firmly push in on the module to secure it to the Switch The module should fit snugly into the corresponding receptors Figure 2 22 Inserting th...

Page 29: ...edundant power system The diagrams below illustrate a proper RPS power connection to the Switch Please consult the documentation for information on power cabling and connectors and setup procedure Fig...

Page 30: ...Switch Series the DGS 3426P utilizes the DPS 600 as its External Redundant Power Supply The DPS 600 is the ONLY RPS to be used with the DGS 3426P NOTE See the DPS 500 or DPS 600 documentation for more...

Page 31: ...acket activity on that port Switch to Switch There is a great deal of flexibility on how connections are made using the appropriate cabling Connect a 10BASE T hub or switch to the Switch via a twisted...

Page 32: ...e copper ports operate at a speed of 1000 100 or 10Mbps in full or half duplex mode The fiber optic ports can operate at 1000Mbps in full duplex mode only Connections to the Gigabit Ethernet ports are...

Page 33: ...configure the Switch monitor the LED panel and display statistics graphically using a web browser such as Netscape Navigator version 6 2 and higher or Microsoft Internet Explorer version 5 0 2 SNMP Ba...

Page 34: ...000 Service Pack 2 or later is installed Windows 2000 Service Pack 2 allows use of arrow keys in HyperTerminal s VT100 emulation See www microsoft com for information on Windows 2000 service packs Aft...

Page 35: ...gure 4 1 Boot up display in console screen DGS 3427 Managing the Switch for the First Time The Switch supports user based security that can allow prevention of unauthorized users from accessing the Sw...

Page 36: ...predefined administrator level user name will give the user privileged access to the Switch s management software After the initial login define new passwords for both default user names to prevent un...

Page 37: ...nager Command create account admin newmanager Enter a case sensitive new password Enter the new password again for confirmation Success DGS 34xx 4 NOTICE CLI configuration commands only modify the run...

Page 38: ...uthentication process that is separated into two parts The first part is to maintain a list of users and their attributes that are allowed to act as SNMP managers The second part describes what each u...

Page 39: ...manager The Switch IP address can be automatically set using BOOTP or DHCP protocols in which case the actual address assigned to the Switch must be known The IP address may be set using the Command...

Page 40: ...t and the CLI or via the Web based management NOTE The DGS 3400 series of switches have the capability to be configured for an IP address of 0 0 0 0 or in essence have no IP address This function mayb...

Page 41: ...s tool and can communicate directly with the Switch using the HTTP protocol The Web based management module and the Console program and Telnet are different ways to access the same internal switching...

Page 42: ...in the web based manager are explained below Web based User Interface The user interface provides access to various Switch configuration and management screens allows the user to view performance stat...

Page 43: ...Relay DHCP Auto Configuration SNMP Manager IP MAC Port Binding PoE DGS 3426P only and Single IP Management Settings L2 Features Contains the following menu pages and sub directories VLAN Trunking IGMP...

Page 44: ...tacking Port Configuration User Accounts Port Mirroring System Log System Severity Settings SNTP Settings MAC Notification Settings TFTP Services Multiple Image Services Ping Test Safeguard Engine Sta...

Page 45: ...IGMP Snooping capability select Enabled IGMP snooping is Disabled by default Enabling IGMP snooping allows the user to specify use of a multicast router only see below To configure IGMP Snooping for i...

Page 46: ...lgorithm that the Switch uses to balance the load across the ports that make up the port trunk group is defined by this definition Choose MAC Source MAC Destination MAC Src Dest IP Source IP Destinati...

Page 47: ...the method of assigning an IP address to an interface has become cleaner and quicker Unicast and multicast addresses still exist but in a purer form and multicast addresses now have a scope field whi...

Page 48: ...an identical set of options In this way router can process these packets more efficiently once the flow class has been identified and the rest of the packet header no longer needs to be fully process...

Page 49: ...o split these packets into fragments in individual packets which will be rebuilt when it reaches its final destination Each of the packets that will be fragmented is given an Identification value by t...

Page 50: ...refixes to produce unique IPv6 addresses which will limit global routing table entries The MAC address of the device is used to produce this address in this form Global Routing Prefix Site Level Aggre...

Page 51: ...of the reachability of routers as well as if changes occur within link layer addresses of nodes on the network or identical unicast addresses are present on the local link The functionality of the Ne...

Page 52: ...es are considered as one interface on the Internet layer multiple unicast addresses may be alloted to multiple physical interfaces which would be beneficial for load sharing on these interfaces This i...

Page 53: ...te IP Address and Subnet Mask 3 If accessing the Switch from a different subnet from the one it is installed on enter the IP address of the Default Gateway If managing the Switch from the subnet on wh...

Page 54: ...sses are entered in the Security IP Management menu If VLANs have not yet been configured for the Switch the default VLAN contains all of the Switch s ports There are no entries in the Security IP Man...

Page 55: ...window will be displayed for the user to view Figure 6 3 IPv4 Interface Settings window To manually assign the Switch s IPv4 address and its related configurations click the Add button revealing the...

Page 56: ...with a subnet mask of 255 0 0 0 and a default gateway of 0 0 0 0 IPv6 Interface Settings The following window is used to setup IPv6 interfaces and addresses for the switch To access this window open t...

Page 57: ...ddress created automatically by the Switch based on the MAC Address of the Switch This is a site local address used only for local routing Global Unicast Address This field is the unicast address that...

Page 58: ...able or disable the switch as being capable of accepting solicitation from a neighbor and thus becoming an IPv6 neighbor Once enabled this Switch is now capable of producing Router Advertisement messa...

Page 59: ...onds and no more than 1800 seconds The user may configure a time between 4 and 1800 seconds with a default setting of 600 seconds RA Min Router AdvInterval Used to set the minimum interval time betwee...

Page 60: ...e chain then data transfer will obviously be affected Figure 6 9 Switches stacked in a Duplex Ring Figure 6 10 Switches stacked in a Duplex Chain Within each of these topologies each switch plays a ro...

Page 61: ...sfer of data between switches in the stack with a few minor provisions When switches are hot inserted into the running stack the new switch may take on the Backup Master or Slave role depending on con...

Page 62: ...gure stacking parameters associated with all switches in the xStack DGS 3400 Series The user may configure parameters such as box ID box priority and pre assigning model names to switches to be entere...

Page 63: ...erent from the other choices listed The 1000M Full_M master and 1000M Full_S slave parameters refer to connections running a 1000BASE T cable for connection between the Switch port and other device ca...

Page 64: ...nto the forwarding table The default setting is Enabled Medium Type If configuring the Combo ports this defines the type of transport medium to be used whether copper or fiber Click Apply to implement...

Page 65: ...w the following window First use the Unit pull down menu to choose the switch in the stack to be configured and then the From and To pull down menu to choose a port or range of ports to describe Users...

Page 66: ...re 6 17 User Accounts Add Add a new user by typing in a User Name and New Password and retype the same password in the Confirm New Password Choose the level of privilege Admin or User from the Access...

Page 67: ...ill be copied which receives the copies from the source port 2 Select the Source Direction Ingress Egress or Both and change the Status drop down menu to Enabled 3 Click Apply to let the changes take...

Page 68: ...ary master and the backup master will save and synchronize these mirroring configurations in their respecitve databases Therefore if the primary master is removed the backup master will still hold the...

Page 69: ...em Log Server In the Administration folder click System Log Settings System Log Host to view the window shown below Figure 6 20 System Log Host list The parameters configured for adding and editing Sy...

Page 70: ...sages generated internally by syslog line printer subsystem network news subsystem UUCP subsystem clock daemon security authorization messages FTP daemon NTP subsystem log audit log alert clock daemon...

Page 71: ...ration field The user may set a time between 1 and 65535 minutes The default setting is one minute On Demand Users who choose this method will only save log files when they manually tell the Switch to...

Page 72: ...scribed below Parameter Description System Severity Choose how the alerts are used from the drop down menu Select log to send the alert of the Severity Type configured to the Switch s log for analysis...

Page 73: ...ource Displays the time source for the system Current Time SNTP Settings SNTP State Use this pull down menu to Enabled or Disabled SNTP SNTP Primary Server The IP address of the primary server from wh...

Page 74: ...begin DST on Saturday during the second week of April and end DST on Sunday during the last week of October From Which Day Enter the week of the month that DST will start From Day of Week Enter the da...

Page 75: ...he Switch Interval sec The time in seconds between notifications History size The maximum number of entries listed in the history log used for notification Up to 500 entries can be specified Port Sett...

Page 76: ...Upload Log Enter the IP address of the TFTP server and the path and filename for the history log on the TFTP server Click Start to record the IP address of the TFTP server and to initiate the file tra...

Page 77: ...ze States the size of the corresponding firmware in bytes Update Time States the specific time the firmware version was downloaded to the Switch From States the IP address of the origin of the firmwar...

Page 78: ...memory and either can be configured to be the boot up firmware for the Switch The user may select a boot up firmware image for the Switch in the switch stack by using the Image pull down window to se...

Page 79: ...ng window is used to Ping an IPv4 address To locate this window open the Administration folder and click Ping Test IPv4 Ping Test Figure 6 31 Ping Test window The user may use Infinite times radio but...

Page 80: ...ic interface for a link local IPv6 address For Global IPv6 addresses this field may be omitted Repeat Times Enter the number of times desired to attempt to ping the IPv6 address configured in this win...

Page 81: ...many packets flooding the Switch it will stop accepting all ARP and IP broadcast packets and packets from untrusted IP addresses for double the time of the previous stop period This doubling of time f...

Page 82: ...uard Engine mechanism is enabled Once the CPU utilization reaches this percentage level the Switch will move into Safeguard Engine state based on the parameters provided in this window Falling Used to...

Page 83: ...tatic ARP Settings link Figure 6 35 Static ARP Settings window To add a new entry click the Add button revealing the following screen to configure Figure 6 36 Static ARP Settings Add window To modify...

Page 84: ...To view this window open the Administration folder and click IPv6 Neighbor IPv6 Neighbor Settings Figure 6 38 IPv6 Neighbor Settings window The following fields can be viewed Parameter Description Ne...

Page 85: ...ter the specific interface for a link local IPv6 address For Global IPv6 addresses this field may be omitted Neighbor IPv6 Address The IPv6 address of the neighbor entry Specify the address using the...

Page 86: ...is down If the primary route is lost the backup route will uplink and its status will become Active IPv4 Static Default Route Settings Entries into the Switch s forwarding table can be made using bot...

Page 87: ...P address above Backup State The user may choose between Primary and Backup If the Primary Static Default Route fails the Backup Route will support the entry Please take note that the Primary and Back...

Page 88: ...igure Figure 6 43 Static Default Route Settings Add menu Click to select the default option if this will be the default IPv6 route Choosing this option will allow the user to configure the default gat...

Page 89: ...nes the maximum time limit for routing a DHCP BOOTP packet If a value of 0 is entered the Switch will not process the value in the seconds field of the BOOTP or DHCP packet If a non zero value is ente...

Page 90: ...field can be toggled between Replace Drop and Keep by using the pull down menu It is used to set the Switches policy for handling packets when the DHCP Relay Agent Information Option 82 Check is set t...

Page 91: ...t 1 2 3 4 5 6 7 1 6 0 4 VLAN Module Port 1 byte 1 byte 1 byte 1 byte 2 bytes 1 byte 1 byte a Sub option type b Length c Circuit ID type d Length e VLAN the incoming VLAN ID of DHCP client packet f Mod...

Page 92: ...ce the user clicks the Add button under the Apply heading The user may add up to four server IPs per IP interface on the Switch Entries may be deleted by clicking it s corresponding To enable and conf...

Page 93: ...server must be up and running and hold the necessary configuration file stored in its base directory when the request is received from the Switch For more information about loading a configuration fil...

Page 94: ...llowed to view read only information or receive traps using SNMPv1 while assigning a higher level of security to another group granting read write privi leges using SNMPv3 Using SNMPv3 individual user...

Page 95: ...click Apply SNMP User Table The SNMP User Table displays all of the SNMP User s currently configured on the Switch In the SNMP Manager folder located in the Administration folder click on the SNMP Use...

Page 96: ...ers This is used to identify the SNMP user Group Name This name is used to specify the SNMP group created can request SNMP messages SNMP Version V1 Specifies that SNMP version 1 will be used V2 Specif...

Page 97: ...onfiguration window The SNMP Group created with this table maps SNMP users identified in the SNMP User Table to the views created in the previous window The following parameters can set Parameter Desc...

Page 98: ...ppear Figure 6 54 SNMP Group Table window To delete an existing SNMP Group Table entry click the corresponding under the Delete heading To display the current settings for an existing SNMP Group Table...

Page 99: ...ributed network management strategies It includes improvements in the Structure of Management Information SMI and adds some security features SNMPv3 Specifies that the SNMP version 3 will be used SNMP...

Page 100: ...open the following window Figure 6 57 SNMP Community Table Configuration window The following parameters can set Parameter Description Community Name Type an alphanumeric string of up to 32 characters...

Page 101: ...the SNMP Host Table Configuration window as shown below Figure 6 59 SNMP IPv4 Host Table Configuration window The following parameters can set Parameter Description Host IPv4 Address Type the IPv4 ad...

Page 102: ...ify that the SNMP version 3 will be used with an Auth Priv security level Community String or SNMP V3 User Name Type in the community string or SNMP V3 user name as appropriate To implement your new s...

Page 103: ...led in the IP MAC Binding Port window the Switch will create two entries in the Access Profile Table as shown below The entries may only be created if there are at least two Access Profile IDs availab...

Page 104: ...pping of settings combined with the ACL entry priority defined by profile ID For more information on ACL settings please see Configuring the Access Profile section mentioned previously in this chapter...

Page 105: ...Binding folder on the Administration Menu to open the IP MAC Binding Ports Setting window Select a port or a range of ports with the From and To fields Enable or disable the port with the State field...

Page 106: ...an only be automatically installed if the Access Profile table has two entries available of the possible 6 entries allowed ACL Binding Trap Log This field will enable and disable the sending of trap l...

Page 107: ...IP MAC Blocked folder on the Configuration menu to open the IP MAC Binding Blocked window Figure 6 68 IP MAC Binding Blocked window To find an unauthorized device that has been blocked by the IP MAC...

Page 108: ...e DGS 3426P click Administration PoE Configuration The PoE System window is used to assign a power limit and power disconnect method for the whole PoE system To configure the Power Limit for the PoE s...

Page 109: ...iority ports to power up Management Mode Use the pull down menu to set the Management Mode for PoE ports The user has two choices Power Limit Choose this option to shut down the port if the power limi...

Page 110: ...ange of ports from the pull down menus to be enabled or disabled for PoE State Use the pull down menu to enable or disable ports for PoE Priority Use the pull down menu to select the priority of the P...

Page 111: ...er Switch numbered 0 There is no limit to the number of SIM groups in the same IP subnet broadcast domain however a single switch can only belong to one group If multiple VLANs are configured the SIM...

Page 112: ...eft the SIM group either through a reboot or web malfunction This feature is accomplished through the use of Discover packets and Maintenance packets that previously set SIM members will emit after a...

Page 113: ...g the Web Interface All xStack DGS 3400 Series Switches are set as Candidate CaS switches as their factory default configuration and Single IP Management will be disabled To enable SIM for the Switch...

Page 114: ...ilizing the Discovery Interval The user may set the hold time from 100 to 255 seconds Click Apply to implement the settings changed After enabling the Switch to be a Commander Switch CS the Single IP...

Page 115: ...configured by the name it will be given the name default and tagged with the last six digits of the MAC Address to identify it Local Port Displays the number of the physical port on the CS that the M...

Page 116: ...ement Group connect to other groups and devices Possible icons in this screen are as follows Icon Description Group Layer 2 commander switch Layer 3 commander switch Commander switch of other group La...

Page 117: ...or over a specific device in the topology window tool tip will display the same information about a specific device as the Tree view does See the window below for an example Figure 6 75 Device Informa...

Page 118: ...ption Device Name This field will display the Device Name of the switches in the SIM group configured by the user If no Device Name is configured by the name it will be given the name default and tagg...

Page 119: ...igure 6 80 Right Clicking a Member icon The following options may appear for the user to configure Collapse to collapse the group that will be represented by a single icon Expand to expand the SIM gro...

Page 120: ...ve menus on the menu bar are as follows File Print Setup will view the image to be printed Print Topology will print the topology map Preference will set display properties such as polling interval an...

Page 121: ...backup and restore to the Member Switch using a TFTP server Member Switches will be listed in the table and will be specified by Port port on the CS where the MS resides MAC Address Model Name and Ve...

Page 122: ...g MLD Snooping Spanning Tree Forwarding and Filtering The following section will aid the user in configuring security functions for the Switch The Switch includes various functions for VLAN Trunking I...

Page 123: ...are emptied of packets The ratio used for clearing the queues is 4 1 This means that the highest priority queue Queue 7 will clear 4 packets for every 1 packet cleared from Queue 0 Remember the priori...

Page 124: ...tations that are members of the VLAN Any port can be configured as either tagging or untagging The untagging feature of IEEE 802 1Q VLANs allows VLANs to work with legacy switches that don t recognize...

Page 125: ...94 unique VLANs can be identified The tag is inserted into the packet header making the entire packet longer by 4 octets All of the information originally contained in the packet is retained Figure 7...

Page 126: ...into the header of all packets that flow into and out of it If a packet has previously been tagged the port will not alter the packet thus keeping the VLAN information intact Other 802 1Q compliant d...

Page 127: ...e dropped by the Switch and will not reach its destination If Port 10 is a member of VLAN 2 the packet will go through This selective forwarding feature based on VLAN criteria is how VLANs segment net...

Page 128: ...tch may cause discrepancies within the local network and failure to define the VLAN to which to forward packets Static VLAN Entry In the Layer 2 Features folder click VLAN Static VLAN Entries to open...

Page 129: ...y click the Modify button of the corresponding entry to modify A new menu will appear to configure the port settings and to assign a unique name and number to the new VLAN See the table below for a de...

Page 130: ...ent with this protocol This packet header information is defined by Novell NetWare 802 3 IPX Internet Packet Exchange IPX 802 2 Using this parameter will instruct the Switch to forward packets to this...

Page 131: ...ader The user may define an entry in the hexadecimal form ffff to define the packet identification The user only need enter the final four integers of the hexadecimal format to define the packet ID he...

Page 132: ...D The read only field in the 802 1Q Port Table shows the current PVID assignment for each port which may be manually assigned to a VLAN when created in the 802 1Q Port Settings table The Switch s defa...

Page 133: ...form to be encapsulated within the VLAN tag of the packet This identifies the packet as double tagged and segregates it from other VLANs on the network therefore creating a hierarchy of VLANs within a...

Page 134: ...es of at least 1522 bytes or more due to the addition of the SPVID tag 4 Access Ports must be an un tagged port of the service provider VLANs Uplink Ports must be a tagged port of the service provider...

Page 135: ...LAN Table Parameters shown in the previous window are explained below Parameter Description Double VLAN State Use the pull down menu to enable or disable the Double VLAN function on this Switch Enabli...

Page 136: ...be configured as uplink ports Access Ports These are the ports that are set as access ports on the Switch Access ports are for connecting Switch VLANs to customer VLANs Gigabit ports cannot be config...

Page 137: ...ID Will allow users to configure the Tagged Protocol ID of the Service Provider VLAN in hex form Port Type Allows the user to choose the type of port being utilized by the Service Provider VLAN The us...

Page 138: ...ies supports up to 32 port trunk groups with 2 to 8 ports in each group A potential bit rate of 8000 Mbps can be achieved Figure 7 14 Example of Port Trunk Group The Switch treats all ports in a trunk...

Page 139: ...Master Port of the group is to be configured by the user and all configuration options including the VLAN configuration that can be applied to the Master Port are applied to the entire link aggregatio...

Page 140: ...ack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch Figure 7 16 Link Aggregation Settings Add Figure 7 17 Link Aggregation Settings window Modify The user changeable parameters are as follows...

Page 141: ...a group Flooding Port A trunking group must designate one port to allow transmission of broadcasts multicasts and unknown unicasts Active Port Shows the port that is currently forwarding packets Type...

Page 142: ...s are capable of processing and sending LACP control frames This allows LACP compliant devices to negotiate the aggregated link so the group may be changed dynamically as needs require In order to uti...

Page 143: ...stration folder When enabled for IGMP snooping the Switch can open or close a port to a specific multicast group member based on IGMP messages sent from the device to the IGMP host or vice versa The S...

Page 144: ...issuing a group membership query If no response to the membership query is received before the Leave Timer expires the multicast forwarding entry for that host is deleted The default setting is 2 sec...

Page 145: ...ed VLAN Name This is the name of the VLAN where the multicast router is attached Member Ports Ports on the Switch that will have a multicast router attached to them There are three options for which t...

Page 146: ...ure the parameters described below Figure 7 23 Limited Multicast Address Range Click Apply to implement the new settings on the Switch Click Delete to remove the configured range from the settings Cli...

Page 147: ...ng multicast data There are two types of MLD query messages emitted by the router The General Query is used to advertise all multicast addresses that are ready to send multicast data to all listening...

Page 148: ...If a subnet is expected to be lossy the user may wish to increase this interval Last Listener Query Interval The maximum amount of time to be set between group specific query messages This interval m...

Page 149: ...rier devices present Calculated as robustness variable query interval 0 5 query response interval Last Listener Query Count The amount of group specific queries sent before the router assumes there ar...

Page 150: ...hat will have a multicast router attached to them There are three options for which to configure these ports None Click this option to not set these ports as router ports Static Click this option to d...

Page 151: ...dge Global Settings window and 4 A 4096 element table defined here as a VID List in the MST Configuration Identification window which will associate each of the possible 4096 VLANs supported by the Sw...

Page 152: ...introduces two new variables the edge port and the point to point P2P port Edge Port The edge port is a configurable designation used for a port that is directly connected to a segment where a loop ca...

Page 153: ...r 2 Features menu and click the STP Bridge Global Settings link Use the STP Status pull down selector to enable or disable STP globally and choose the STP method used with the STP Version menu Figure...

Page 154: ...value ages out and a BPDU has still not been received from the Root Bridge the Switch will start sending its own BPDU to all other switches for permission to become the Root Bridge If it turns out tha...

Page 155: ...to the device running MSTP This field can be set in the STP Bridge Global Settings window Revision Level This value along with the Configuration Name will identify the MSTP region configured on the S...

Page 156: ...h range from ID number 1 to 4094 This field is inoperable when configuring the CIST Click Apply to implement changes made To configure the parameters for a previously set MSTI click on its hyperlinked...

Page 157: ...cular MSTI Instance click on its hyperlinked MSTI ID which will reveal the following window Figure 7 36 MSTI Settings The user may configure the following parameters Parameter Description Instance ID...

Page 158: ...stance Status Displays the current status of the corresponding MSTI ID Instance Priority Displays the priority of the corresponding MSTI ID The lowest priority will be the root bridge Click Apply to i...

Page 159: ...n edge port Edge ports cannot create loops however an edge port can lose edge port status if a topology change creates a poten tial for a loop An edge port normally should not receive BPDU packets If...

Page 160: ...half duplex operation the p2p status changes to operate as if the p2p value were false The default setting for this parameter is true State This drop down menu allows you to enable or disable STP for...

Page 161: ...k Add to implement the changes made To delete an entry in the Static Unicast Forwarding Table click the corresponding under the Delete heading Multicast Forwarding The following figure and table descr...

Page 162: ...ast Forwarding Entries link to return to the Static Multicast Forwarding Settings window Multicast Filtering Mode Open the Forwarding Filtering folder and click on the Multicast Filtering Mode link to...

Page 163: ...e Default QoS Mapping on the Switch The picture above shows the default priority setting for the Switch Class 6 has the highest priority of the seven priority classes of service on the Switch In order...

Page 164: ...umber of packets sent from each priority queue depends upon the assigned weight For a configuration of 8 CoS queues A H with their respective weight value 8 1 the packets are sent in the following seq...

Page 165: ...starting with the selected port Type This drop down menu allows a selection between RX receive TX transmit and Both This setting will determine whether the bandwidth ceiling is applied to receiving tr...

Page 166: ...echanism to view the screen shown below Figure 7 46 QoS Scheduling Mechanism window The Scheduling Mechanism has the following parameters Parameter Description Strict The highest class of service is t...

Page 167: ...ngs are not suitable In the Configuration folder open the QoS folder and click QoS Output Scheduling to view the screen shown below Figure 7 47 QoS Output Scheduling Configuration window The following...

Page 168: ...ax Packet field this class of service will automatically begin forwarding packets until it is empty Once a priority class of service with a 0 in its Max Packet field is empty the remaining priority cl...

Page 169: ...7 49 802 1p Default Priority window This page allows the user to assign a default 802 1p priority to any given port on the Switch The priority tags are numbered from 0 the lowest priority to 7 the hi...

Page 170: ...o each of the 802 1p priorities In the Configuration folder open the QoS folder and click 802 1p User Priority to view the screen shown below Figure 7 50 802 1p User Priority window Once a priority ha...

Page 171: ...e user may adjust the following parameters to configure a time range on the Switch Parameter Description Range Name Enter a name of no more than 32 alphanumeric characters that will be used to identif...

Page 172: ...s Profile Configuration page as shown below There are three Access Profile Configuration pages one for Ethernet or MAC address based profile configuration one for IP address based profile configuratio...

Page 173: ...rame s header To view the settings for a created profile click its corresponding button in the Access Profile table revealing the following window Figure 8 4 Access Profile Entry Display for Ethernet...

Page 174: ...y a source port mask and or a destination port mask src port mask Specify a TCP port mask for the source port in hex form hex 0x0 0xffff which you wish to filter dst port mask Specify a TCP port mask...

Page 175: ...ne the class field of the IPv6 header This class field is a part of the packet header that is similar to the Type of Service ToS or Precedence bits field in IPv4 Flow Label Checking this field will in...

Page 176: ...ss profile are forwarded by the Switch according to any additional rule added see below Select Deny to specify that packets that do not match the access profile are not forwarded by the Switch and wil...

Page 177: ...combination of letters and numbers ranging from a f and from 0 9999 Port The Access Rule may be configured on a per port basis by entering the port number of the switch in the switch stack into this f...

Page 178: ...e Access Profile Table link opening the Access Profile Table Under the heading Access Rule clicking Modify will open the following window Figure 8 12 Access Rule Table window IP To create a new rule s...

Page 179: ...in the Switch which is used to determine the CoS queue to which packets are forwarded Once this field is specified packets accepted by the Switch that match this priority are forwarded to the CoS queu...

Page 180: ...ning and end of the port list range are separated by a dash For example 1 3 specifies switch number 1 port 3 2 4 specifies switch number 2 port 4 1 3 2 4 specifies all of the ports between switch 1 po...

Page 181: ...h which is used to determine the CoS queue to which packets are forwarded to Once this field is specified packets accepted by the Switch that match this priority are forwarded to the CoS queue specifi...

Page 182: ...ied The beginning and end of the port list range are separated by a dash For example 1 3 specifies switch number 1 port 3 2 4 specifies switch number 2 port 4 1 3 2 4 specifies all of the ports betwee...

Page 183: ...with the frame The entire process is described below CPU Interface Filtering State Settings In the following window the user may globally enable or disable the CPU Interface Filtering mechanism by usi...

Page 184: ...ntent of the packet header VLAN Selecting this option instructs the Switch to examine the VLAN identifier of each packet header and use this as the full or partial criterion for forwarding Source MAC...

Page 185: ...k Enter an IP address mask for the source IP address Destination IP Mask Enter an IP address mask for the destination IP address DSCP Selecting this option instructs the Switch to examine the DiffServ...

Page 186: ...hex 0x0 0xffff which you wish to filter Select UDP to use the UDP port number contained in an incoming packet as the forwarding criterion Selecting UDP requires that you specify a source port mask and...

Page 187: ...cket header Select IP to instruct the Switch to examine the IP address in each frame s header Select Packet Content Mask to specify a mask to hide the content of the packet header Offset This field wi...

Page 188: ...Table In this window the user may add a rule to a previously created CPU access profile by clicking the corresponding Modify button of the entry to configure Ethernet IP or Packet Content Each entry...

Page 189: ...yer 2 part of each packet header IP instructs the Switch to examine the IP address in each frame s header Packet Content Mask instructs the Switch to examine the packet header VLAN Name Allows the ent...

Page 190: ...e Display Ethernet The following window is the CPU Interface Filtering Rule Table for IP Figure 8 29 CPU Interface Filtering Rule Table IP To create a new rule set for an access profile click the Add...

Page 191: ...h frame s header Packet Content Mask instructs the Switch to examine the packet header VLAN Name Allows the entry of a name for a previously configured VLAN Source IP Source IP Address Enter an IP Add...

Page 192: ...rface Filtering Rule Table for Packet Content Figure 8 32 CPU Interface Filtering Rule Table Packet Content To remove a previously created rule select it and click the button To add a new Access Rule...

Page 193: ...s header Packet Content Mask instructs the Switch to examine the packet header Offset This field will instruct the Switch to mask the packet header beginning with the offset value specified value 0 1...

Page 194: ...an and monitor packets coming into the Switch by monitoring the Switch s chip counter This method is only viable for Broadcast and Multicast storms because the chip only has counters for these two typ...

Page 195: ...ed on the Threshold value stated and drop packets until the issue is resolved Shutdown Utilizes the Switch s software Traffic Control mechanism to determine the Packet Storm occurring Once detected th...

Page 196: ...are set for Link Aggregation Port Trunking NOTE Ports that are in the Shutdown Forever mode will be seen as Discarding in Spanning Tree windows and implementations though these ports will still be for...

Page 197: ...ified From To A consecutive group of ports may be configured starting with the selected port Admin State This pull down menu allows the user to enable or disable Port Security locked MAC address table...

Page 198: ...deleted Click the Next button to view the next page of entries listed in this table Figure 9 3 Port Lock Entries Table This window displays the following information Parameter Description VID The VLA...

Page 199: ...g to access the Switch Upon initial entry to the Switch the client wishing services on the Switch will need to be authenticated by a remote RADIUS Server or local authentication on the Switch to be pl...

Page 200: ...uring the Guest 802 1X VLAN which are Enable Ports Selecting this option will enable ports listed in the Port List below as part of the Guest VLAN Be sure that these ports are configured for this VLAN...

Page 201: ...lick Security 802 1X Configure 802 1X Authenticator Parameter The user may toggle between switches in the switch stack by using the Unit pull down menu Figure 9 6 Configure 802 1X Authenticator Parame...

Page 202: ...y the client to authenticate The Switch cannot provide authentication services to the client through the interface If Auto is selected it will enable 802 1X and cause the port to begin in the unauthor...

Page 203: ...applied on a per port basis Select Authenticator to apply the settings to the port When the setting is activated a user must pass the authentication process to gain access to the network Select None...

Page 204: ...ation Parameter Description Unit Choose the Switch ID number of the Switch in the switch stack to be modified From and To Select ports to be initialized Port A read only field indicating a port on the...

Page 205: ...Address field and checking the corresponding check box To begin the initialization click Apply NOTE The user must first globally enable 802 1X in the DGS 3400 Web Management Tool window before initia...

Page 206: ...orized or N A NOTE The user must first globally enable 802 1X in the DGS 3400 Web Management Tool window before initializing ports Information in the Initialize Ports Table cannot be viewed before ena...

Page 207: ...er and Current RADIUS Server Settings Table window This window displays the following information Parameter Description Choose the desired RADIUS server to configure First Second or Third Succession S...

Page 208: ...le this feature be sure to first enter the IP address of the station you are currently using Figure 9 14 Security IP menu for Trusted Host configuration To configure secure IP addresses for trusted ho...

Page 209: ...e Switch The server will not accept the username and password and the user is denied access to the Switch The server doesn t respond to the verification query At this point the Switch receives the tim...

Page 210: ...default setting is 30 seconds User Attempts 1 255 This command will configure the maximum number of times the Switch will accept authentication attempts Users failing to be authenticated after the se...

Page 211: ...window will allow users to set up Authentication Server Groups on the Switch A server group is a technique used to group TACACS XTACACS TACACS RADIUS server hosts into user defined categories for aut...

Page 212: ...arate entities and are not compatible with each other Authentication Server Host This window will set user defined Authentication Server Hosts for the TACACS XTACACS TACACS RADIUS security protocols o...

Page 213: ...define the virtual port number of the authentication protocol on a server host The default port number is 49 for TACACS XTACACS TACACS servers and 1813 for RADIUS servers but the user may set a uniqu...

Page 214: ...ocal account privilege configured on the Switch Successful login using any of these techniques will give the user a User privilege only If the user wishes to upgrade his or her status to the administr...

Page 215: ...r she must be authenticated by a method on the Switch to gain administrator privileges on the Switch which is defined by the Administrator A maximum of eight 8 Enable Method Lists can be implemented o...

Page 216: ...st be set by the user in the next section entitled Local Enable Password none Adding this parameter will require no authentication to access the Switch radius Adding this parameter will require the us...

Page 217: ...cal Enabled field will result in a fail message Click Apply to implement changes made Enable Admin The Enable Admin window is for users who have logged on to the Switch on the normal user level and wi...

Page 218: ...ure 9 29 Current Traffic Segmentation Table Click on the Setup button to open the Setup Forwarding ports menu as shown below Figure 9 30 Setup Forwarding Ports Configuring traffic segmentation on the...

Page 219: ...allows the user to choose a message digest function which will determine a Message Authentication Code This Message Authentication Code will be encrypted with a sent message to provide integrity and...

Page 220: ...me disabled To manage the Switch through the web based management while utilizing the SSL function the web browser must support SSL encryption and the header of the URL must begin with https Ex https...

Page 221: ...Enabled by default RSA EXPORT with RC4 40 MD5 This ciphersuite combines the RSA Export key exchange and stream cipher RC4 encryption with 40 bit keys Use the pull down menu to enable or disable this c...

Page 222: ...d using the SSH protocol 2 Configure the User Account to use a specified authorization method to identify users that are allowed to establish SSH connections with the Switch using the SSH User Authent...

Page 223: ...ing This field is used to set the time period that the Switch will change the security shell encryptions by using the pull down menu The available options are Never 10 min 30 min and 60 min The defaul...

Page 224: ...cryption algorithm with Cipher Block Chaining The default is Enabled AES256 CBC Use the pull down to enable or disable the Advanced Encryption Standard AES 256 encryption algorithm with Cipher Block C...

Page 225: ...rameters for the SSH user To configure the parameters for a SSH user click on the hyperlinked User Name in the Current Accounts window which will reveal the following window to configure NOTE To set t...

Page 226: ...use an administrator defined password for authentication Upon entry of this parameter the Switch will prompt the administrator for a password and then to re type the password for confirmation Public...

Page 227: ...Stacking Information Module Information CPU Utilization Port Utilization Packets Errors Packet Size Browse Router Port Browse MLD Router Port VLAN Status Port Access Control MAC Address Table IGMP Sn...

Page 228: ...ributes of the Switch including power sources and fans Figure 10 1 Device Status window The following fields may be viewed in this window Parameter Description ID Unit ID of the switch in the switch s...

Page 229: ...ow The Stacking Information window holds the following information Parameters Description Box ID Displays the Switch s order in the stack User Set Box ID can be assigned automatically Auto or can be a...

Page 230: ...of switches in the switch stack Module Information The Module Information display in the Monitoring menu shows information about any installed modules Figure 10 3 Module Information Module information...

Page 231: ...To view the CPU utilization by port use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a port Click Apply to implement the configured settings...

Page 232: ...st select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or swi...

Page 233: ...owing graph of packets received on the Switch To select a port to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by usi...

Page 234: ...kets Counts the number of packets received on the port Unicast Counts the total number of good packets that were received by a unicast address Multicast Counts the total number of good packets that we...

Page 235: ...view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time gr...

Page 236: ...ue is 200 Unicast Counts the total number of good packets that were received by a unicast address Multicast Counts the total number of good packets that were received by a multicast address Broadcast...

Page 237: ...t to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real tim...

Page 238: ...ort Packets Counts the number of packets successfully sent on the port Unicast Counts the total number of good packets that were transmitted by a unicast address Multicast Counts the total number of g...

Page 239: ...llowing graph of error packets received on the Switch To select a port to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the por...

Page 240: ...r than 1518 octets and less than the MAX_PKT_LEN Internally MAX_PKT_LEN is equal to 1536 Fragment The number of packets less than 64 bytes with either bad framing or an invalid CRC These are normally...

Page 241: ...ch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or switch stack at the t...

Page 242: ...that a collision is detected later than 512 bit times into the transmission of a packet ExColl Excessive Collisions The number of packets for which transmission failed due to excessive collisions Sing...

Page 243: ...tistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Sw...

Page 244: ...in length inclusive excluding framing bits but including FCS octets 256 511 The total number of packets including bad packets received that were between 256 and 511 octets in length inclusive excludin...

Page 245: ...rrently configured as router ports A router port configured by a user using the console or Web based management interfaces is displayed as a static router port designated by S A router port that is dy...

Page 246: ...tly configured as router ports in IPv6 A router port configured by a user using the console or Web based management interfaces is displayed as a static router port designated by S A router port that i...

Page 247: ...allows the VLAN status for each of the Switch s ports to be viewed by VLAN This window displays the ports on the Switch that are currently Egress E or Tag T ports To view the following table open the...

Page 248: ...To view the Port Access Control screens open the monitoring folder and click the Port Access Control folder There are six screens to monitor Authenticator State The following section describes the 80...

Page 249: ...his window is described as follows Parameter Description Auth PAE State The Authenticator PAE State value can be Initialize Disconnected Connecting Authenticating Authenticated Aborting Held Force_Aut...

Page 250: ...uthenticator Frames Tx The number of EAPOL frames that have been transmitted by this Authenticator Rx Start The number of EAPOL Start frames that have been received by this Authenticator The number of...

Page 251: ...lowing fields can be viewed Parameter Description Port The identification number assigned to the Port by the System in which the Port resides Octets Rx The number of octets received in user data frame...

Page 252: ...hat switch s Unit ID by using the pull down menu in the top left hand corner The user may also select the desired time interval to update the statistics between 1s and 60s where s stands for seconds T...

Page 253: ...number of times that the state machine sends an initial Access Request packet to the Authentication server i e executes sendRespToServer on entry to the RESPONSE state Indicates that the Authenticato...

Page 254: ...enge and the Access Request that matched it from this RADIUS authentication server AccessRequests The number of RADIUS Access Request packets sent to this server This does not include retransmissions...

Page 255: ...me in MIB II ServerIndex The identification number assigned to each RADIUS Accounting server that the client shares a secret with ServerAddress The conceptual table listing the RADIUS accounting serve...

Page 256: ...a different server or give up A retry to the same server is counted as a retransmit as well as a timeout A send to a different server is counted as an Accounting Request as well as a timeout ClientUn...

Page 257: ...ber MAC Address The MAC address entered into the address table Unit Port The unit and port to which the MAC address above corresponds Type Describes the method which the Switch discovered the MAC addr...

Page 258: ...ure 10 29 IGMP Snooping Group Table The user may search the IGMP Snooping Group Table by VID by entering it in the top left hand corner and clicking Search The following field can be viewed Parameter...

Page 259: ...rts field To view the IGMP Snooping Group Table click IGMP Snooping Group on the Monitoring menu Figure 10 30 MLD Snooping Group Table The following field can be viewed Parameter Description VLAN Name...

Page 260: ...er to clear the Switch History Log The information in the table is categorized as Parameter Description Type Choose the type of log to view There are two choices Regular Log Choose this option to view...

Page 261: ...Table window may be found in the Monitoring menu This window will show current ARP entries on the Switch To search a specific ARP entry enter an interface name into the Interface Name or an IP address...

Page 262: ...xStack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch Session Table This window displays the management sessions since the Switch was last rebooted Figure 10 33 Current Session Table 248...

Page 263: ...e found in the Monitoring menu The IP Forwarding Table is a read only screen where the user may view IP addresses discovered by the Switch To search a specific IP address enter it into the field label...

Page 264: ...uting Table window may be found in the Monitoring menu This screen shows the current IP routing table of the Switch To find a specific IP route enter an IP address into the IP Address field along with...

Page 265: ...ined while resetting all other configuration parameters to their factory defaults NOTE Only the Reset System option will enter the factory default parameters into the Switch s non volatile RAM and the...

Page 266: ...x will instruct the Switch to save the current configuration to non volatile RAM before restarting the Switch Clicking the No click box instructs the Switch not to save the current configuration befor...

Page 267: ...n RAM and will immediately take effect To retain any configuration changes permanently click on the Save button in the Save Changes menu The save options allow one alternative configuration image to b...

Page 268: ...e configuration file was downloaded to the Switch From States the origin of the firmware There are five ways configuration files may be uploaded to the Switch R If the IP address has this letter attac...

Page 269: ...on This field has three options for configuration Delete Select this option to delete the configuration file ID specified in the Configuration ID field above Boot_up Select this option to set the conf...

Page 270: ...n Control IEEE 802 3x Full duplex Flow Control IEEE 802 1u Fast Ethernet IEEE 802 3af Power over Ethernet Protocols CSMA CD Data Transfer Rates Ethernet Fast Ethernet Gigabit Ethernet Fiber Optic Half...

Page 271: ...5 95 non condensing Dimensions 441mm x 389mm x 44mm Weight DGS 3400 Series Switch DGS 3426 5 42 kg DGS 3426P 6 kg DGS 3427 5 51 kg DGS 3450 5 74 kg Module Inserts DEM 410CX 0 16 kg DEM 410X 0 18 kg EM...

Page 272: ...following diagrams and tables show the standard RJ 45 receptacle connector and their pin assignments Appendix 1 1 The standard RJ 45 port and connector RJ 45 Pin Assignments Contact MDI X Port MDI II...

Page 273: ...ia Type Mini GBIC 1000BASE LX Single mode fiber module 1000BASE SX Multi mode fiber module 1000BASE LHX Single mode fiber module 1000BASE ZX Single mode fiber module 10km 550m 2km 40km 80km Category 5...

Page 274: ...d MAC information for logging Configuration and log saved to flash Unit unitID Configuration and log saved to flash by console Username username IP ipaddr MAC macaddr Informational by console and IP i...

Page 275: ...sole was unsuccessful Username username IP ipaddr MAC macaddr Warning by console and IP ipaddr MAC macaddr are XOR shown in log string which means if user login by console will no IP and MAC informati...

Page 276: ...console Web Successful login through Web Successful login through Web Username username IP ipaddr MAC macaddr Informational Login failed through Web Login failed through Web Username username IP ipadd...

Page 277: ...Login failed through SSH Username username IP ipaddr MAC macaddr Warning Logout through SSH Logout through SSH Username username IP ipaddr MAC macaddr Informational SSH session timed out SSH session t...

Page 278: ...d Username username MAC macaddr Warning Successful login through SSH authenticated by AAA local method Successful login through SSH from userIP authenticated by AAA local method Username username MAC...

Page 279: ...er serverIP Username username MAC macaddr Login failed through Web authenticated by AAA server Login failed through Web from userIP authenticated by AAA server serverIP Username username MAC macaddr W...

Page 280: ...server timeout or improper configuration Username username MAC macaddr Warning Successful Enable Admin through Console authenticated by AAA local_enable method Successful Enable Admin through Console...

Page 281: ...Enable Admin failed through SSH from userIP authenticated by AAA local_enable method Username username MAC macaddr Successful Enable Admin through Console authenticated by AAA none method Successful E...

Page 282: ...eb authenticated by AAA server Enable Admin failed through Web from userIP authenticated by AAA server serverIP Username username MAC macaddr Warning Enable Admin failed through Web due to AAA server...

Page 283: ...ailed through SSH from userIP authenticated by AAA server serverIP Username username MAC macaddr Warning Enable Admin failed through SSH due to AAA server timeout or improper configuration Enable Admi...

Page 284: ...um packet Warning Invalid TTL packet received Interface string VRID id receives an invalid VRRP TTL packet Warning string is interface name Invalid length packet received Interface string VRID id rece...

Page 285: ...torm cleared Port unitID portNum Broadcast storm has cleared Informational Multicast storm occurrence Port unitID portNum Multicast storm is occurring Warning Multicast storm cleared Port unitID portN...

Page 286: ...ation devices on the network broadcast storm Multiple simultaneous broadcasts that typically absorb available network bandwidth and can cause network failure console port The port on the Switch accept...

Page 287: ...esigned to be used in managing TCP IP internets SNMP is presently implemented on a wide range of computers and networking equipment and may be used to manage many aspects of network and end station op...

Page 288: ...the original purchaser for the defective Hardware will be refunded by D Link upon return to D Link of the defective Hardware All Hardware or part thereof that is replaced by D Link or for which the pu...

Page 289: ...y way that is not contemplated in the documentation for the product or if the model or serial number has been altered tampered with defaced or removed Initial installation installation and removal of...

Page 290: ...ay be reproduced in any form or by any means or used to make any derivative such as translation transformation or adaptation without permission from D Link Corporation D Link Systems Inc as stipulated...

Page 291: ...or other sales in which D Link the sellers or the liquidators expressly disclaim their warranty obligation pertaining to the product and in that case the product is being sold As Is without any warran...

Page 292: ...D Link Systems Inc Other trademarks or registered trademarks are the property of their respective owners Copyright Statement No part of this publication or documentation accompanying this product may...

Page 293: ...egistration Register online your D Link product at http support dlink com register Product registration is entirely voluntary and failure to complete or return this form will not diminish your warrant...

Page 294: ...fetime hardware warranty Warranty beneficiary The warranty beneficiary is the original end user The original end user is defined as the person that purchases the product as the first owner Duration of...

Page 295: ...or by other circumstances of which D Link is not responsible Disclaimer of warranty Please note some countries do not allow the disclaimer of implied terms in contracts with consumers and the disclaim...

Page 296: ...day to Friday 8 00am to 8 00pm EST Saturday 9 00am to 1 00pm EST D Link Technical Support over the Internet http www dlink com au email support dlink com au Tech Support for customers within New Zeala...

Page 297: ...site Tech Support for customers within South Eastern Asia and Korea D Link South Eastern Asia and Korea Technical Support over the Telephone 65 6895 5355 Monday to Friday 9 00am to 12 30pm 2 00pm 6 00...

Page 298: ...customers within India D Link Technical Support over the Telephone 91 22 26526741 91 22 26526696 ext 161 to 167 Monday to Friday 9 30AM to 7 00PM D Link Technical Support over the Internet http ww dli...

Page 299: ...warranty period on this product Customers can contact D Link technical support through our web site or by phone Tech Support for customers within the Russia D Link Technical Support over the Telephone...

Page 300: ...ink Technical Support over the Telephone 972 9 9715701 Sunday to Thursday 9 00am to 5 00pm D Link Technical Support over the Internet http www dlink co il support e mail support dlink co il Tech Suppo...

Page 301: ...tomers within South Africa and Sub Sahara Region D Link South Africa and Sub Sahara Technical Support over the Telephone 27 12 665 2165 08600 DLINK For South Africa only Monday to Friday 8 30am to 9 0...

Page 302: ...dor 800 6137 Monday to Friday 06 00am to 19 00pm Guatemala 1800 300 0017 Monday to Friday 06 00am to 19 00pm Panama 00 800 052 54 65 Monday to Friday 07 00am to 20 00pm Peru 0800 00 968 Monday to Frid...

Page 303: ...D Link D Link D Link D Link 495 744 00 99 http www dlink ru email support dlink ru...

Page 304: ...co Help Desk Chile Tel fono 800 8 35465 Lunes a Viernes 08 00 am a 21 00 pm Soporte T cnico Help Desk Colombia Tel fono 01 800 952 54 65 Lunes a Viernes 07 00 am a 20 00 pm Soporte T cnico Help Desk E...

Page 305: ...brasil com br A D Link fornece suporte t cnico gratuito para clientes no Brasil durante o per odo de vig ncia da garantia deste produto Suporte T cnico para clientes no Brasil Telefone S o Paulo 11 21...

Page 306: ......

Page 307: ...upport through our website or by phone Tech Support for customers within the United States D Link Technical Support over the Telephone 888 843 6100 Hours of Operation 8 00AM to 6 00PM PST D Link Techn...

Page 308: ...n The United Kingdom Ireland D Link UK Ireland Technical Support over the Internet http www dlink co uk ftp ftp dlink co uk D Link UK Ireland Technical Support over the Telephone 08456 12 0003 United...

Page 309: ...port dlink de Telefon 49 1805 2787 0 12 Min aus dem Festnetz der Deutschen Telekom Telefonische technische Unterst tzung erhalten Sie Montags bis Freitags von 09 00 bis 17 30 Uhr Unterst tzung erhalte...

Page 310: ...Assistance technique D Link par t l phone 0820 0803 03 N INDIGO 0 12 TTC min Prix en France M tropolitaine au 3 mars 2005 Du lundi au samedi de 9h00 19h00 Assistance technique D Link sur internet htt...

Page 311: ...ink ofrece asistencia t cnica gratuita para clientes residentes en Espa a durante el periodo de garant a del producto Asistencia T cnica de D Link por tel fono 34 902 30 45 45 Lunes a Viernes de 9 00...

Page 312: ...ito D Link Supporto tecnico per i clienti residenti in Italia D Link Mediterraneo S r L Via N Bonnet 6 B 20154 Milano Supporto Tecnico dal luned al venerd dalle ore 9 00 alle ore 19 00 con orario cont...

Page 313: ...erlands D Link Technical Support over the Telephone 0900 501 2007 Monday to Friday 8 00 am to 10 00 pm D Link Technical Support over the Internet www dlink nl Tech Support for customers within Belgium...

Page 314: ...n pomoc techniczn klientom w Polsce w okresie gwarancyjnym produktu Klienci z Polski mog si kontaktowa z dzia em pomocy technicznej firmy D Link za po rednictwem Internetu lub telefonicznie Telefonicz...

Page 315: ...y D Link D Link poskytuje sv m z kazn k m bezplatnou technickou podporu Z kazn ci mohou kontaktovat odd len technick podpory p es webov str nky mailem nebo telefonicky Web http www dlink cz suppport E...

Page 316: ...t munkanapokon h tf t l cs t rt kig 9 00 16 00 r ig s p nteken 9 00 14 00 r ig k rhet a 1 461 3001 telefonsz mon vagy a support dlink hu emailc men Magyarorsz gi technikai t mogat s D Link Magyarorsz...

Page 317: ...ider D Link tilbyr sine kunder gratis teknisk support under produktets garantitid Kunder kan kontakte D Links teknisk support via v re hjemmesider eller p tlf Teknisk Support D Link Teknisk telefon Su...

Page 318: ...der gratis teknisk support til kunder i Danmark i hele produktets garantiperiode Danske kunder kan kontakte D Link s tekniske support via vores hjemmeside eller telefonisk D Link teknisk support over...

Page 319: ...a teknist tukea asiakkailleen Tuotteen takuun voimassaoloajan Tekninen tuki palvelee seuraavasti Arkisin klo 9 21 numerosta 0800 114 677 Internetin kautta Ajurit ja lis tietoja tuotteista http www dli...

Page 320: ...annan anv ndarinformation D Link tillhandah ller teknisk support till kunder i Sverige under hela garantitiden f r denna produkt Teknisk Support f r kunder i Sverige D Link Teknisk Support via telefon...

Page 321: ...te de D Link Portugal http www dlink pt A D Link fornece suporte t cnico gratuito para clientes no Portugal durante o per odo de vig ncia de garantia deste produto Suporte T cnico para clientes no Por...

Page 322: ...software updates D Link D Link D Link 210 86 11 114 210 86 53 172 09 00 17 00 e mail support dlink gr D Link Internet http www dlink gr ftp ftp dlink it...

Page 323: ......

Page 324: ...URL www dlink pl Hungary R70 Irodahaz 1 emelet Rakoczi ut 70 72 Budapest H 1074 Magyarorszag TEL 36 0 1 461 30 00 FAX 36 0 1 461 30 09 URL www dlink hu Singapore 1 International Business Park 03 12 T...

Page 325: ..._____________________________________________________________________ Answers to the following questions help us to support your product 1 Where and how will the product primarily be used Home Office...

Page 326: ......

Reviews: