background image

 

D-Link ™ DES-3526/DES-3526DC 

 

Managed Layer 2 Ethernet Switch 

24-port 10/100Mbps and 2GE ports 

Release 3.5 

 
 
 
 

Manual 

 
 
 
 
 
 
 
  
 
 
 
 

Summary of Contents for DES-3526 - Switch - Stackable

Page 1: ...D Link DES 3526 DES 3526DC Managed Layer 2 Ethernet Switch 24 port 10 100Mbps and 2GE ports Release 3 5 Manual...

Page 2: ...ission of D Link Computer Corporation is strictly forbidden Trademarks used in this text D Link and the D LINK logo are trademarks of D Link Computer Corporation Microsoft and Windows are registered t...

Page 3: ...scription 5 Gigabit Combo Ports 7 Installation 8 Package Contents 8 Before You Connect to the Network 8 Installing the Switch Without the Rack 9 Installing the Switch in a Rack 9 Mounting the Switch i...

Page 4: ...irroring 33 Link Aggregation 34 LACP Port Setting 38 MAC Notification 39 MAC Notification Global Settings 39 MAC Notification Port Settings 40 IGMP 41 IGMP Snooping 41 Static Router Ports Entry 43 Spa...

Page 5: ...ontrol 101 MAC Based Network Access Control 103 Configure Authenticator 103 PAE System Control 106 RADIUS Server 110 IP MAC Binding 111 IP MAC Binding Port 112 IP MAC Binding Table 112 IP MAC Binding...

Page 6: ...ion 148 SNMP Host Table 149 SNMP Engine ID 150 Monitoring 151 Port Utilization 151 CPU Utilization 152 Packets 153 Received RX 153 UMB Cast RX 156 Transmitted TX 157 Errors 159 Received RX 159 Transmi...

Page 7: ...79 Reset 180 Reset System 180 Reset Config 180 Reboot Device 181 Logout 181 D Link Single IP Management 182 Single IP Management SIM Overview 182 SIM Using The Web Interface 183 Topology 184 Tool Tips...

Page 8: ...ing some of the basic functions of the Switch including accessing the Switch information using the Switch s utilities and setting up network configurations such as Quality of Service The Access Profil...

Page 9: ...the copy command Boldface Typewriter Font Indicates commands and responses to prompts that must be typed exactly as printed in the manual Initial capital letter Indicates a window name Names of keys...

Page 10: ...the system gets wet see the appropriate section in your troubleshooting guide or contact your trained service provider Do not push any objects into the openings of your system Doing so can cause fire...

Page 11: ...power from the system by unplugging all power cables from the power supplies Move products with care ensure that all casters and or stabilizers are firmly connected to the system Avoid sudden stops an...

Page 12: ...ble is omitted or disconnected Protecting Against Electrostatic Discharge Static electricity can harm delicate components inside your system To prevent static damage dis charge static electricity from...

Page 13: ...s well as significantly speed up the traffic between your sub networks Gigabit Ethernet enables fast optical fiber connections to support video conferencing complex imaging and similar data intensive...

Page 14: ...support Asymmetric VLAN support System and Port Utilization support System Log Support Support port based enable and disable Address table Supports up to 8K MAC addresses per device Supports a packet...

Page 15: ...DES 3526 DES 3526DC Fast Ethernet Layer 2 Switch 2 Efficient self learning and address recognition mechanism enables forwarding rate at wire speed...

Page 16: ...g a terminal emulation program NOTE For customers interested in D View D Link Corporation s proprietary SNMP management software go to the D Link Website www dlink com cn and download the software and...

Page 17: ...en the redundant power supply is present and in use Otherwise it will remain dark Port LEDs One row of LEDs for each port is located above the ports on the front panel The first LED is for the top por...

Page 18: ...take over all the power immediately and automatically Figure 1 5 Rear panel view of DES 3526DC The rear panel of the DC power version of the Switch includes an opening designed to accommodate the DC...

Page 19: ...DES 3526 DES 3526DC Fast Ethernet Layer 2 Switch 6...

Page 20: ...pper ports provided and Mini GBIC ports optional See the diagram below to view the two Mini GBIC port modules being plugged into the Switch Please note that although these two front panel modules can...

Page 21: ...up the Switch Install the Switch on a sturdy level surface that can support at least 6 6 lb 3 kg of weight Do not place heavy objects on the Switch The power outlet should be within 1 82 meters 6 feet...

Page 22: ...gh ventilation space between the Switch and any other objects in the vicinity Figure 2 1 Prepare Switch for installation on a desktop or shelf Installing the Switch in a Rack The Switch can be mounted...

Page 23: ...out of the rack on its slide assemblies at one time The weight of more than one extended component could cause the rack to tip over and may result in injury Figure 2 3 Installing Switch in a rack Pow...

Page 24: ...source Figure 2 4 Power connections attached to contacts on assembly 1 Firmly attach the DC power to the negative and positive contacts on the wiring assembly The negative pole connects to the 48V con...

Page 25: ...ode End nodes include PCs outfitted with a 10 100 or 1000 Mbps RJ 45 Ethernet Fast Ethernet Network Interface Card NIC and most routers An end node can be connected to the Switch via a twisted pair Ca...

Page 26: ...3 2 Switch connected to a normal non Uplink port on a hub or switch using a straight or crossover cable Connecting To Network Backbone or Server The two Mini GBIC combo ports are ideal for unlinking t...

Page 27: ...ically using a web browser such as Netscape Navigator version 6 2 and higher or Microsoft Internet Explorer version 5 0 SNMP Based Management You can manage the Switch with an SNMP compatible console...

Page 28: ...ce completes the console login screen displays 11 If you have not logged into the command line interface CLI program press the Enter key at the User name and password prompts There is no default user...

Page 29: ...then clicking the Settings tab This is where you will find the Emulation options If you still do not see anything try rebooting the Switch by disconnecting its power supply Once connected to the conso...

Page 30: ...the Switch you will be presented with the first login screen NOTE Press Ctrl R to refresh the screen This command can be used at any time to force the console program in the Switch to refresh the cons...

Page 31: ...administrator account being created and press the Enter key You will be prompted to enter the same password again to verify it Type the same password and press the Enter key Successful creation of the...

Page 32: ...witch used for SNMP v 1 and v 2 management access are public Allows authorized management stations to retrieve MIB objects private Allows authorized management stations to retrieve and modify MIB obje...

Page 33: ...P address to meet the specification of your networking address scheme The Switch is also assigned a unique MAC address by the factory This MAC address cannot be changed and can be found by entering th...

Page 34: ...igned an IP address of 10 41 44 254 with a subnet mask of 255 0 0 0 The system message Success indicates that the command was executed successfully The Switch can now be configured and managed via Tel...

Page 35: ...ctly with the Switch using the HTTP protocol The Web based management module and the Console program and Telnet are different ways to access the same internal switching software and configure it Thus...

Page 36: ...witch configuration and management screens allows you to view performance statistics and permits you to graphically monitor the system status Areas of the User Interface The figure below shows the use...

Page 37: ...urations for IP Address Switch Information Advanced Settings Port Configuration IGMP Spanning Tree Forwarding Filtering VLANs Port Bandwidth SNTP Settings Port Security QoS MAC Notification LACP Acces...

Page 38: ...ward Filtering VLANs Port Security QoS System Log Servers SNTP Settings Access Profile Table PAE Access Entity Layer 3 IP Networking Switch Information The subsections below describe how to change som...

Page 39: ...ion and System Contact to aid in defining the Switch to the user s prefer ence IP Address The IP Address may initially be set using the console interface prior to connecting to it through the Ethernet...

Page 40: ...ected to the management station that will access the Switch The Switch will allow management access from stations with the same VID listed here NOTE The Switch s factory default IP address is 10 90 90...

Page 41: ...h s ports There are no entries in the Security IP Management table by default so any management station that can connect to the Switch can access the Switch until a management VLAN is specified or Man...

Page 42: ...be assigned an IP address and subnet mask which can then be used to connect a management station to the Switch s Telnet or Web based management agent The system message Success indicates that the comm...

Page 43: ...h to connect to the web interface The well known TCP port for the Web interface is 80 Link Aggregation Algorithm The algorithm that the Switch uses to balance the load across the ports that make up th...

Page 44: ...n contains information for configuring various attributes and properties for individual physical ports including port speed and flow control Clicking on Port Configurations in the Con figuration menu...

Page 45: ...t settings with any option other than Auto Flow Control Displays the flow control scheme used for the various port configurations Ports configured for full duplex use 802 3x flow control half duplex p...

Page 46: ...the Port Description Table Port Mirroring The Switch allows you to copy frames transmitted and received on a port and redirect the copies to another port You can attach a monitoring device to the mirr...

Page 47: ...mirror the traffic from a 100 Mbps port onto a 10 Mbps port this can cause throughput problems The port you are copying frames from should always support an equal or lower speed than the port to whic...

Page 48: ...sequential port numbers except the two optional Gigabit ports which can only belong to a single link aggregation group All of the ports in the group must be members of the same VLAN and their STP sta...

Page 49: ...owing window Figure 6 8 Port Link Aggregation Group window To configure port trunk groups click the Add button to add a new trunk group and use the Link Aggregation Settings window see example below t...

Page 50: ...e the Master Port for the trunk group using the pull down menu Member Ports Choose the members of a trunked group Up to eight ports per group can be assigned to a group Flooding Port A trunking group...

Page 51: ...Setting window is used in conjunction with the Link Aggregation window to create port trunking groups on the Switch Using the following window the user may set which ports will be active and passive...

Page 52: ...port group to negotiate adjustments and make changes dynamically one end of the connection must have active LACP ports see above After setting the previous parameters click Apply to allow your change...

Page 53: ...Port Settings in the MAC Notification folder which will display the following window Figure 6 13 MAC Notification Port Settings window The following parameters may be set Parameter Description From To...

Page 54: ...the settings for each VLAN using the IGMP Snooping link in the Configuration folder When enabled for IGMP snooping the Switch can open or close a port to a specific multicast group member based on IGM...

Page 55: ...se Time This determines the maximum amount of time in seconds allowed before sending an IGMP response report The Max Response Time field allows an entry between 1 and 25 seconds Default 10 Robustness...

Page 56: ...ill allow multicast packets coming from the router to be propagated through the network as well as allowing multicast messages IGMP coming from the network to be propagated to the router A router port...

Page 57: ...gy is provided below followed by a description of how to set up 802 1d STP 802 1w RSTP and 802 1s MSTP 802 1s MSTP Multiple Spanning Tree Protocol or MSTP is a standard defined by the IEEE community t...

Page 58: ...ication and a version compatible with the IEEE 802 1d STP RSTP can operate with legacy equipment implementing IEEE 802 1d however the advantages of using RSTP will be lost The IEEE 802 1w Rapid Spanni...

Page 59: ...ate immediately without going through the listening and learning states An edge port loses its status if it receives a BPDU packet immediately becoming a normal spanning tree port P2P Port A P2P port...

Page 60: ...DES 3526 DES 3526DC Fast Ethernet Layer 2 Switch 47 figure 6 18 STP Bridge Global Settings window STP Figure 6 19 STP Bridge Global Settings window RSTP default...

Page 61: ...to set the Rapid Spanning Tree Protocol RSTP globally on the Switch MSTP Select this parameter to set the Multiple Spanning Tree Protocol MSTP globally on the Switch Hello Time 1 10 Sec 2 The Hello Ti...

Page 62: ...s the forwarding of STP BPDU packets from other network devices The default is Enabled Configuration Name Enter an alphanumeric string of up to 32 characters to uniquely identify the MSTP region on th...

Page 63: ...isplays the VLAN IDs associated with the specific MSTI Clicking the Add button will reveal the following window to configure Figure 6 22 Instance ID Settings window Add The user may configure the foll...

Page 64: ...he VID range from configured VLANs set on the Switch Supported VIDs on the Switch range from ID number 1 to 4094 This field is inoperable when configuring the CIST Priority 0 61440 Select a value betw...

Page 65: ...STI for forwarding packets The lower the value the higher the priority This entry must be divisible by 4094 and can only be utilized if the Type chosen is Set Priority Only Click Apply to implement ch...

Page 66: ...n interface The default value is derived from the media speed of the interface value 1 2000000 Selecting this parameter with a value in the range of 1 2000000 will set the quickest route when a loop o...

Page 67: ...quire some of its own configuration settings An STP Group will use the switch level parameters entered above with the addition of Port Priority and Port Cost An STP Group spanning tree works in the sa...

Page 68: ...to 802 1s MSTP RSTP and MSTP can coexist with standard STP however the benefits of RSTP and MSTP are not realized on a port where an 802 1d network connects to an 802 1w or 802 1s enabled network Mig...

Page 69: ...edit an entry define the following parameters and then click Add Modify Parameter Description VLAN ID VID The VLAN ID number of the VLAN on which the above Unicast MAC address resides MAC Address The...

Page 70: ...source of multicast packets This must be a multicast MAC address Port Settings Allows the selection of ports that will be members of the static multicast group and ports that are either forbidden from...

Page 71: ...menu allows you to select the action the Switch will take when it receives a multicast packet that is to be forwarded to one of the ports in the range specified above Forward All Groups This will inst...

Page 72: ...Queue 1 be reserved for data packets with a priority value of 7 Packets that have not been given any priority value are placed in Queue 0 and thus given the lowest priority for delivery A weighted ro...

Page 73: ...ng a VLAN will only be forwarded to the stations over IEEE 802 1Q enabled switches that are members of that VLAN and this includes broadcast multicast and unicast packets from unknown sources VLANs ca...

Page 74: ...tag The tag is contained in the following two octets and consists of 3 bits of user priority 1 bit of Canonical Format Identifier CFI used for encapsulating Token Ring packets so they can be carried a...

Page 75: ...e transmitted from one 802 1Q compliant network device to another with the VLAN information intact This allows 802 1Q VLANs to span network devices and indeed the entire network if all network devices...

Page 76: ...ng port is connected to a tag aware device the packet should be tagged Tagging and Untagging Every port on an 802 1Q compliant switch can be configured as tagging or untagging Ports with tagging enabl...

Page 77: ...14 15 16 Finance 4 17 18 19 20 Sales 5 1 2 3 4 Table 6 2 VLAN Example Assigned Ports Port based VLANs Port based VLANs limit traffic that flows into and out of switch ports Thus all devices connected...

Page 78: ...n you may configure VLAN settings If you wish to change the port trunk grouping with VLANs already in place you will not need to reconfigure the VLAN settings after changing the port trunk group setti...

Page 79: ...Static VLAN Entries link To change an existing 802 1Q VLAN entry click the Modify button of the corresponding entry you wish to modify A new menu will appear to configure the port settings and to ass...

Page 80: ...ll allow the Switch to send out GVRP packets to outside sources notifying that they may join the existing VLAN Port Settings Allows an individual port to be specified as member of a VLAN Tag Specifies...

Page 81: ...tocol GVRP enabled switches In addition Ingress Checking can be used to limit traffic by filtering incoming packets whose PVID does not match the PVID of the port Results can be seen in the table unde...

Page 82: ...the packet GVRP The Group VLAN Registration Protocol GVRP enables the port to dynamically become a member of a VLAN GVRP is Disabled by default Ingress This field can be toggled using the space bar b...

Page 83: ...ay be Enabled or Disabled for either group The Threshold value is the upper threshold at which the specified traffic control is switched on This is the number of Broadcast Multicast or DLF packets in...

Page 84: ...d ports Max Learning Addr 0 20 The number of MAC addresses that will be in the MAC address forwarding table for the selected switch and group of ports Lock Address Mode This pull down menu allows you...

Page 85: ...map to see how the DES 3526 implements 802 1P priority queuing Figure 6 42 Mapping QoS on the Switch The picture above shows the default priority setting for the Switch Class 3 has the highest priorit...

Page 86: ...are packets of lower priority transmitted For weighted round robin queuing the number of packets sent from each priority queue depends upon the assigned weight For a configuration of 8 CoS queues A H...

Page 87: ...nd Both This setting will determine whether the bandwidth ceiling is applied to receiving transmitting or both receiving and transmitting packets no_limit This drop down menu allows you to specify tha...

Page 88: ...ied hardware priority queue would be allowed to transmit before allowing the next lowest priority queue to transmit its packets A value between 0 and 255 can be specified Max Latency 0 255 Specifies t...

Page 89: ...given port on the Switch The pri ority queues are numbered from 0 the lowest priority to 7 the highest priority Click Apply to implement your settings 802 1p User Priority The DES 3526 allows the ass...

Page 90: ...n is used to limit traffic flow from a single port to a group of ports on either a single switch in standalone mode or a group of ports on another switch in a switch stack Single IP This method of seg...

Page 91: ...the ports on the Switch will be able to forward packets These ports will be allowed to receive packets from the port specified above Clicking the Apply button will enter the combination of transmittin...

Page 92: ...the log entry or trap message as defined by the Severity Name Select critical to send only critical events to the Switch s log or SNMP agent Choose warning to send critical and warning events to the...

Page 93: ...level of messages that will be sent The options are Warning Informational and All Facility Some of the operating system daemons and processes have been assigned Facility values Processes and daemons...

Page 94: ...local5 local use 6 local6 local use 7 local7 UDP Port 514 or 6000 65535 Type the UDP port number used for sending Syslog messages The default is 0 Status Choose Enabled or Disabled to activate or dea...

Page 95: ...the primary server the SNTP information will be taken from SNTP Secondary Server This is the IP address of the secondary server the SNTP information will be taken from SNTP Poll Interval in Seconds Th...

Page 96: ...indow Figure 6 52 Time Zone and DST Settings window The following parameters can be set Parameter Description Time Zone and DST Settings Daylight Saving Time State Use this pull down menu to enable or...

Page 97: ...ST beginning and ending date be specified concisely For example specify to begin DST on April 3 and end DST on October 14 From Month Enter the month DST will start on each year From Day Enter the day...

Page 98: ...he Access Profile Table click the Add button This will open the Access Profile Configuration window as shown below There are three Access Profile Configuration windows one for Ethernet or MAC address...

Page 99: ...ents for the type of profile Select Ethernet to instruct the Switch to examine the layer 2 part of each packet header Select IP to instruct the Switch to examine the IP address in each frame s header...

Page 100: ...occurs among configured access rules the profile ID establishes relative priority of the rules The value can be set from 1 to 255 however there is a limit to the total number of profiles that can be...

Page 101: ...value Select TCP to use the TCP port number contained in an incoming packet as the forwarding criterion Selecting TCP requires that you specify a source port mask and or a destination port mask The us...

Page 102: ...Profile ID 1 255 Type in a unique identifier number for this profile set This value can be set from 1 to 255 Type Select profile based on Ethernet MAC Address IP address or packet content mask This wi...

Page 103: ...48 63 Enter a value in hex form to mask the packet from byte 48 to byte 63 value 64 79 Enter a value in hex form to mask the packet from byte 64 to byte 79 Click Apply to implement changes made To est...

Page 104: ...instructs the Switch to examine the IP address in each frame s header Packet Content Mask instructs the Switch to examine the packet header Priority 0 7 This parameter is specified if you want to re w...

Page 105: ...ch to examine the DiffServ Code part of each packet header and use this as the or part of the criterion for forwarding The user may choose a value between 0 and 63 Protocol This field allows the user...

Page 106: ...thernet To set the Access Rule for Ethernet adjust the following parameters and click Apply Parameters Description Profile ID This is the identifier number for this profile set Mode Select Permit to s...

Page 107: ...specified CoS queue Otherwise a packet will have its incoming 802 1p user priority re written to its original value before being forwarded by the Switch For more information on priority queues CoS qu...

Page 108: ...ess Rule Table Figure 6 63 Access Rule Table window Packet Content Mask To remove a previously created rule select it and click the button Access rules are indexed using the Access ID number To locate...

Page 109: ...umber for this profile set Mode Select Permit to specify that the Switch according to any additional rule forwards the packets that match the access profile added see below Select Deny to specify that...

Page 110: ...ied CoS queue Otherwise a packet will have its incoming 802 1p user priority re written to its original value before being forwarded by the Switch For more information on priority queues CoS queues an...

Page 111: ...uthorizing and authenticating users to gain access to various wired or wireless devices on a specified Local Area Network by using a Client and Server based access control model This is accomplished b...

Page 112: ...Authenticator and Authentication Server in greater detail Authentication Server The Authentication Server is a remote device that is connected to the same network as the Client and Authenticator must...

Page 113: ...is granted to the Client The second purpose of the Authenticator is to verify the information gathered from the Client with the Authentication Server and to then relay that information back to the Cl...

Page 114: ...ked normal traffic is allowed to pass through the port The D Link implementation of 802 1x allows network administrators to choose between two types of Access Control used on the Switch which are 1 Po...

Page 115: ...connected Client has successfully been authenticated the Port then becomes Authorized and all subsequent traffic on the Port is not subject to access control restriction until an event occurs that cau...

Page 116: ...ent it would be necessary to create virtual Ports one for each attached device that required access to the LAN The Switch would regard the single physical Port connecting it to the shared media segmen...

Page 117: ...Ethernet Layer 2 Switch 104 Figure 6 73 802 1X Authenticator Settings window To configure the settings by port click on the hyperlinked port number under the Port heading which will display the follo...

Page 118: ...port to transition to the authorized state without any authentication exchange required This means the port transmits and receives normal traffic without 802 1X based authentication of the client If f...

Page 119: ...and the authentication server The default setting is 30 seconds MaxReq 2 The maximum number of times that the Switch will retransmit an EAP Request to the client before it times out of the authenticat...

Page 120: ...fect Configure the following 802 1x capability settings Parameter Description From and To Ports being configured for 802 1x settings Capability Two role choices can be selected Authenticator A user mu...

Page 121: ...llows you to initialize a port or group of ports The Initialize Port Table in the bottom half of the window displays the current status of the port s This window displays the following information Par...

Page 122: ...to open the following window Figure 6 77 Initialize Port s window MAC based 802 1x To initialize ports first choose the switch in the switch stack by using the Unit pull down menu then the range of p...

Page 123: ...ForceAuth ForceUnauth and N A BackendState The Backend State will display one of the following Request Response Success Fail Timeout Idle Initialize and N A OpenDir Operational Controlled Directions...

Page 124: ...key the same as that of the RADIUS server Confirm Key Confirm the shared key is the same as that of the RADIUS server Accounting Method This allows you to Add Modify or Delete the RADIUS Server IP MA...

Page 125: ...enu to open the IP MAC Binding Ports Setting window Select a port or a range of ports with the From and To fields Enable or disable the port with the State field Click Apply to save changes Figure 6 8...

Page 126: ...indow IP MAC Binding Blocked To view unauthorized devices that have been blocked by IP MAC binding restrictions open the IP MAC Binding Blocked window show below Click IP MAC Binding Blocked in the IP...

Page 127: ...ind To delete an entry click the delete button next to the entry s MAC address To delete all the entries in the IP MAC Binding Blocked Table click Delete All Limited IP Multicast Range Settings The Li...

Page 128: ...To port pull down menus 2 Use the remaining pull down menus to configure the parameters described below Parameter Description State Toggle the State field to either Enabled or Disabled a given port o...

Page 129: ...are defined a permanent entry is entered and is used to translate IP address to MAC addresses To open the Static ARP Table open the Configuration folder and then open the Layer 3 IP Networking folder...

Page 130: ...nu It is used to enable or disable the DHCP BOOTP Relay service on the Switch The default is Disabled Relay Hops Count Limit 1 16 This field allows an entry between 1 and 16 to define the maximum numb...

Page 131: ...servers the relay agent will drop invalid messages Disabled When the field is toggled to Disabled the relay agent will not check the validity of the packet s option 82 field DHCP Agent Information Opt...

Page 132: ...ength 5 MAC address The Switch s system MAC address Figure 6 87 Circuit ID and Remote ID Sub option Format DHCP BOOTP Relay Interface Settings The DHCP BOOTP Relay Interface Settings allow the user to...

Page 133: ...BOOTP Relay Interface Table window The following parameters may be configured or viewed Parameter Description Interface The IP interface on the Switch that will be connected directly to the Server Ser...

Page 134: ...Use the Security IP Management to permit remote stations to manage the Switch If you choose to define one or more designated management stations only the chosen stations as defined by IP address will...

Page 135: ...ount click on the Delete button To change the password type in the New Password and retype it in the Confirm New Password entry field The level of privilege Admin or User can be viewed in the Access R...

Page 136: ...es than TACACS This protocol also uses UDP to transmit packets TACACS Terminal Access Controller Access Control System plus Provides detailed access control for authentication for network devices TACA...

Page 137: ...granted normal user privileges on the Switch To gain access to administrator level privileges the user must access the Enable Admin window and then enter a password which was previously configured by...

Page 138: ...entication Settings Figure 7 6 Application s Authentication Settings window The following parameters can be set Parameter Description Application Lists the configuration applications on the Switch The...

Page 139: ...e 7 7 Authentication Server Group Settings window This screen displays the Authentication Server Groups on the Switch The Switch has three built in Authentication Server Groups that cannot be removed...

Page 140: ...e host The TACACS XTACACS TACACS RADIUS server host will then verify or deny the request and return the appropriate message to the Switch More than one authentication protocol can be run on the same p...

Page 141: ...ntication protocol can be run on the same physical server host but remember that TACACS XTACACS TACACS are separate entities and are not compatible with each other Login Method Lists This command will...

Page 142: ...ified To delete a Login Method List defined by the user click the X under the Delete heading corresponding to the entry desired to be deleted To modify a Login Method List click on its hyperlinked Met...

Page 143: ...th user level privileges to Administrator Admin level privileges using authentication methods on the Switch Once a user acquires normal user level privileges on the Switch he or she must be authentica...

Page 144: ...result in the same window to configure Figure 7 15 Enable Method List Edit window Figure 7 16 Enable Method List Add window To define an Enable Login Method List set the following parameters and clic...

Page 145: ...itch Local Enable Password This window will configure the locally enabled password for the Enable Admin command When a user chooses the local_enable method to promote user level privileges to administ...

Page 146: ...Access Authentication Control Enable Admin Figure 7 18 Enable Admin Screen When this window appears click the Enable Admin button revealing a dialog box for the user to enter authentication password u...

Page 147: ...three layered encryption code for secure communication between the server and the host The user may implement any one or combination of the ciphersuites available yet different ciphersuites will affe...

Page 148: ...icular ciphersuite disable the unwanted ciphersuites leaving the desired one for authentication When the SSL function has been enabled the web will become disabled To manage the Switch through the web...

Page 149: ...uters a safe method of executing commands on a remote end node and will provide secure encrypted and authenticated communication between two non trusted hosts SSH with its array of unmatched security...

Page 150: ...Switch The default setting is 8 Time Out 120 600 Allows the user to set the connection timeout The use may set a time between 120 and 600 seconds The default setting is 300 seconds Auth Fail 2 20 All...

Page 151: ...ithm 3DES CBC Use the pull down to enable or disable the Triple Data Encryption Standard encryption algorithm with Cipher Block Chaining The default is Enabled Blow fish CBC Use the pull down to enabl...

Page 152: ...enable or disable the HMAC Hash for Message Authentication Code mechanism utilizing the RSA encryption algorithm The default is Enabled HMAC DSA Use the pull down to enable or disable the HMAC Hash f...

Page 153: ...n if the administrator wishes to use a remote SSH server for authentication purposes Choosing this parameter requires the user to input the following information to identify the SSH user Host Name Ent...

Page 154: ...he level of security provided between the management station and the network device In SNMP v 1 and v 2 user authentication is accomplished using community strings which function like passwords The re...

Page 155: ...gement can be customized to suit the needs of the networks and the preferences of the network administrator Use the SNMP V3 menus to select the SNMP version used for specific tasks The DES 3526 suppor...

Page 156: ...SNMP version 3 is in use Auth Protocol None Indicates that no authorization protocol is in use MD5 Indicates that the HMAC MD5 96 authentication level will be used SHA Indicates that the HMAC SHA auth...

Page 157: ...ed This field will require the user to enter a password SHA Specifies that the HMAC SHA authentication protocol will be used This field is only operable when V3 is selected in the SNMP Version field a...

Page 158: ...Delete column corresponding to the entry you wish to delete To create a new entry click the Add button and a separate window will appear Figure 7 30 SNMP View Table Configuration window The SNMP Group...

Page 159: ...SNMP Group Table An SNMP Group created with this table maps SNMP users identified in the SNMP User Table to the views created in the previous menu To view the SNMP Group Table window open the SNMP Ma...

Page 160: ...e Configuration window The following parameters can set Parameter Description Group Name Type an alphanumeric string of up to 32 characters This is used to identify the new SNMP group of SNMP users Re...

Page 161: ...will be required and that packets sent between the Switch and a remote SNMP manger will be encrypted To implement your new settings click Apply To return to the SNMP Group Table click the Show All SN...

Page 162: ...the community string created can read from and write to the contents of the MIBs on the Switch To implement the new settings click Apply To delete an entry from the SNMP Community Table click the unde...

Page 163: ...t the SNMP version 3 will be used with an Auth Priv security level Community String or SNMP V3 User Name Type in the community string or SNMP V3 user name as appropriate To implement your new settings...

Page 164: ...s Switch History Log IGMP Snooping Group IGMP Snooping Forwarding VLAN Status Router Port Port Access Control Layer 3 Feature Port Utilization The Utilization window displays the percentage of the tot...

Page 165: ...e second Record Number Select number of times the Switch will be polled between 20 and 200 The default value is 200 Click Clear to refresh the graph Click Apply to set changes implemented CPU Utilizat...

Page 166: ...een 1s and 60s where s stands for seconds The default value is one second Record Number Select number of times the Switch will be polled between 20 and 200 The default value is 20 Utilization Check wh...

Page 167: ...ES 3526DC Fast Ethernet Layer 2 Switch 154 Figure 8 3 Rx Packets Analysis window line graph for Bytes and Packets To view the Received Packets Table click the link View Table which will show the follo...

Page 168: ...number of times the Switch will be polled between 20 and 200 The default value is 20 Bytes Counts the number of bytes received on the port Packets Counts the number of packets received on the port Sh...

Page 169: ...the Packets folder of the Monitoring menu to view the following graph of UMB cast packets received on the Switch Figure 8 5 Rx Packets Analysis window line graph for Unicast Multicast and Broadcast Pa...

Page 170: ...ast address Multicast Counts the total number of good packets that were received by a multicast address Broadcast Counts the total number of good packets that were received by a broadcast address Show...

Page 171: ...Analysis window line graph for Bytes and Packets To view the Transmitted TX Table click the link View Table which will show the following table Figure 8 8 Tx Packets Analysis window table for Bytes a...

Page 172: ...Bytes and Packets Clear Clicking this button clears all statistics counters on this window View Table Clicking this button instructs the Switch to display a table rather than a line graph View Line Ch...

Page 173: ...imum permitted packets size of 64 bytes and have a good CRC Undersize packets usually indicate collision fragments a normal network occurrence Over Size Counts packets received that were longer than 1...

Page 174: ...utton instructs the Switch to display a line graph rather than a table Transmitted TX Click the Transmitted TX link in the Error folder of the Monitoring menu to view the following graph of error pack...

Page 175: ...collision is detected later than 512 bit times into the transmission of a packet ExColl Excessive Collisions The number of packets for which transmission failed due to excessive collisions SingColl S...

Page 176: ...roups and classed by size to be viewed as either a line graph or a table Two windows are offered Figure 8 13 Rx Size Analysis window line graph To view the Packet Size Analysis Table click the link Vi...

Page 177: ...ts but including FCS octets 512 1023 The total number of packets including bad packets received that were between 512 and 1023 octets in length inclusive excluding framing bits but including FCS octet...

Page 178: ...fields can be viewed or set Parameter Description VLAN ID Enter a VLAN ID for the forwarding table to be browsed by MAC Address Enter a MAC address for the forwarding table to be browsed by Find Allow...

Page 179: ...c Next Click this button to view the next page of the address table View All Entry Clicking this button will allow the user to view all entries of the address table Delete All Entry Clicking this butt...

Page 180: ...ime in days hours and minutes since the Switch was last restarted Log Text Displays text describing the event that triggered the history log entry IGMP Snooping Group IGMP Snooping allows the Switch t...

Page 181: ...ooped are displayed NOTE To configure IGMP snooping for the DES 3526 go to the Configuration folder and select IGMP Configuration and other information concerning IGMP snooping may be found in Section...

Page 182: ...the Switch that are currently Egress or Tag ports To view the following table open the Monitoring folder and click the VLAN Status Link Figure 8 19 VLAN Status window Router Port This displays which...

Page 183: ...tistics of the Switch on a per port basis To view the Port Access Control windows open the monitoring folder and click the Port Access Control folder There are six windows to monitor Authenticator Sta...

Page 184: ...DES 3526 DES 3526DC Fast Ethernet Layer 2 Switch 171 Figure 8 21 Authenticator State window Port based 802 1x...

Page 185: ...and clicking OK The information on this window is described as follows Parameter Description Auth PAE State The Authenticator PAE State value can be Initialize Disconnected Connecting Authenticating A...

Page 186: ...e The ARP Table window may be found in the Monitoring menu in the Layer 3 Feature folder This window will show current ARP entries on the Switch To search a specific ARP entry enter an interface name...

Page 187: ...r Switch settings can be saved to the TFTP server and a history log can be uploaded from the Switch to the TFTP server Download Firmware From TFTP Server To update the Switch s firmware open the TFTP...

Page 188: ...following information Parameter Description ID The user defined Section ID of the firmware on the Switch Boot Status The firmware that is currently being run on the Switch will be identified in this...

Page 189: ...re 9 3 Upload Settings to TFTP Server window Enter the IP address of the TFTP server and the path and filename for the switch settings on the TFTP server Click Start to record the IP address of the TF...

Page 190: ...using the Config Firmware Image window Firmware Information The following screen allows the user to view information about current firmware images stored on the Switch To access the following screen c...

Page 191: ...y read Anonymous or Unknown for users that are not identified Config Firmware Image The Config Firmware Image window allows users to configure firmware images saved in the memory of the Switch To acce...

Page 192: ...Save Changes The DES 3526 has two levels of memory normal RAM and non volatile or NV RAM Configuration changes are made effective by clicking the Apply button When this is done the settings will be i...

Page 193: ...when it left the factory Reset gives the option of retaining the Switch s User Accounts and History Log while resetting all other configuration parameters to their factory defaults If the Switch is re...

Page 194: ...t the Switch All of the configuration information entered from the last time Save Changes was executed will be lost Click the Reboot button to restart the Switch Figure 9 13 Reboot window Logout Use t...

Page 195: ...Commander Switch CS which is the master switch of the group Member Switch MS which is a switch that is recognized by the CS a member of a SIM group and a Candidate Switch CaS which is a Switch that h...

Page 196: ...an be configured through the CS to become a MS After configuring one switch to operate as the CS of a SIM group additional DES 3526 switches may join the group either by an automatic method or by manu...

Page 197: ...n will also enable the Switch to be configured for SIM Discovery Interval The user may set the discovery protocol interval in seconds that the Switch will send out discovery packets Returning informat...

Page 198: ...ll display the Device Name of the switches in the SIM group configured by the user If no Device Name is configured by the name it will be given the name default and tagged with the last six digits of...

Page 199: ...ap click the View menu in the toolbar and then Topology which will produce the following window The Topology View will refresh itself periodically 20 seconds by default Figure 10 5 Topology view This...

Page 200: ...idate switch Layer 3 candidate switch Unknown device Non SIM devices Tool Tips In the Topology view window the mouse plays an important role in configuration and in viewing device information Setting...

Page 201: ...C Fast Ethernet Layer 2 Switch 188 Figure 10 6 Device Information Utilizing the Tool Tip Setting the mouse cursor over a line between two devices will display the connection speed between the two devi...

Page 202: ...unctions depending on the role of the Switch in the SIM group and the icon associated with it Group Icon Figure 10 8 Right Clicking a Group Icon The following options may appear for the user to config...

Page 203: ...Switch Icon Figure 10 10 Right Clicking a Commander Icon The following options may appear for the user to configure Collapse to collapse the group that will be represented by a single icon Expand to e...

Page 204: ...The following options may appear for the user to configure Collapse to collapse the group that will be represented by a single icon Expand to expand the SIM group in detail Remove from group remove a...

Page 205: ...resented by a single icon Expand to expand the SIM group in detail Add to group add a candidate to a group Clicking this option will reveal the following dialog box for the user to enter a password fo...

Page 206: ...isplays the number of the physical port on the MS or CaS that the CS is connected to The CS will have no entry in this field Local Port No Displays the number of the physical port on the CS that the M...

Page 207: ...atus Topology display the Topology view Help About Will display the SIM information including the current SIM version NOTE Upon this firmware release some functions of the SIM can only be configured t...

Page 208: ...Switch to the Member Switch Member Switches will be listed in the table and will be specified by Port port on the CS where the MS resides MAC Address Model Name and Version To specify a certain Switc...

Page 209: ...3 Nway auto negotiation Protocols CSMA CD Data Transfer Rates Ethernet Fast Ethernet Gigabit Ethernet Fiber Optic Half duplex Full duplex 10 Mbps 20Mbps 100Mbps 200Mbps n a 2000Mbps SFP Mini GBIC Supp...

Page 210: ...condensing Dimensions 441 mm 207 mm 44 mm 1U 19 inch rack mount width Weight DES 3526 2 56 kg DES 3526DC 2 5 kg EMI CE class A FCC Class A C Tick Safety CSA International Performance Transmission Met...

Page 211: ...nt The following diagrams and tables show the standard RJ 45 receptacle connector and their pin assignments Figure B 1 The standard RJ 45 port and connector RJ 45 Pin Assignments Contact MDI X Port MD...

Page 212: ...a Type Maximum Distance Mini GBIC 1000BASE LX Single mode fiber module 1000BASE SX Multi mode fiber module 1000BASE LHX Single mode fiber module 1000BASE ZX Single mode fiber module 10km 550m 40km 80k...

Page 213: ...speed of a line Also known as line speed between network segments BOOTP The BOOTP protocol allows you to automatically map an IP address to a given MAC address each time a device is started In additio...

Page 214: ...IB multicast Single packets copied to a specific subset of network addresses These addresses are specified in the destination address field of the packet protocol A set of rules for communication betw...

Page 215: ...signed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and...

Page 216: ...the magnetic media on which D Link delivers the Software will be free of physical defects D Link s sole obligation shall be to replace the non conforming Software or defective media with software that...

Page 217: ...STORED ON OR INTEGRATED WITH ANY PRODUCT RETURNED TO D LINK FOR WARRANTY SERVICE RESULTING FROM THE USE OF THE PRODUCT RELATING TO WARRANTY SERVICE OR ARISING OUT OF ANY BREACH OF THIS LIMITED WARRANT...

Page 218: ...pport at 1 877 453 5465 who will attempt to assist the customer in resolving any suspected defects with the product If the product is considered defective the customer must obtain a Return Material Au...

Page 219: ...ts are designed to provide reasonable protection against harmful interference in a commercial installation This equipment generates uses and can radiate radio frequency energy and if not installed and...

Page 220: ...egistration Register online your D Link product at http support dlink com register Product registration is entirely voluntary and failure to complete or return this form will not diminish your warrant...

Page 221: ...ns or attachments b negligence abuse or misuse including failure to operate the product in accordance with specifications or interface requirements c improper handling d failure of goods or services n...

Page 222: ...United Kingdom Telephone 44 020 8731 5555 Facsimile 44 020 8731 5511 www dlink co uk...

Page 223: ...onen oder den durch Schnittstellen gegebenen Vorgaben c fehlerhafter Bedienung d Versagen von Produkten oder Diensten die nicht von D LINK stammen oder nicht Gegenstand einer zum ma geblichen Zeitpunk...

Page 224: ...Edgware Road Colindale London NW9 5 AB Vereinigtes K nigreich Telefon 44 020 8731 5555 Fax 44 020 8731 5511 www dlink com...

Page 225: ...notamment une utilisation du produit non conforme ses sp cifications ou aux interfaces requises c d une mauvaise manipulation d d une panne de biens ou de services acquis aupr s d une soci t tierce n...

Page 226: ...Fax 44 020 8731 5511 www dlink co uk...

Page 227: ...de las especificaciones y de los requisitos de la interfaz en el funcionamiento del producto c manejo incorrecto d errores en art culos o servicios ajenos a D LINK o no sujetos a una garant a o un con...

Page 228: ...Tel fono 44 020 8731 5555 Fax 44 020 8731 5511 www dlink co uk...

Page 229: ...onformit con le specifiche e i requisiti di connessione c movimentazione impropria d guasto di prodotti o servizi non forniti da D LINK o non soggetti a una garanzia successiva di D LINK o a un accord...

Page 230: ...Telefono 44 020 8731 5555 Fax 44 020 8731 5511 www dlink co uk...

Page 231: ...Friday 8 00am to 8 00pm EST Saturday 9 00am to 1 00pm EST D Link Technical Support over the Internet http www dlink com au email support dlink com au Tech Support for customers within New Zealand D L...

Page 232: ...site Tech Support for customers within South Eastern Asia and Korea D Link South Eastern Asia and Korea Technical Support over the Telephone 65 6895 5355 Monday to Friday 9 00am to 12 30pm 2 00pm 6 00...

Page 233: ...customers within India D Link Technical Support over the Telephone 91 22 26526741 91 22 26526696 ext 161 to 167 Monday to Friday 9 30AM to 7 00PM D Link Technical Support over the Internet http ww dli...

Page 234: ...e duration of the warranty period on this product Customers can contact D Link technical support through our web site or by phone Tech Support for customers within the Russia D Link Technical Support...

Page 235: ...rael D Link Technical Support over the Telephone 972 971 5701 Sunday to Thursday 9 00am to 5 00pm D Link Technical Support over the Internet http www dlink co il forum e mail support dlink co il Tech...

Page 236: ...tomers within South Africa and Sub Sahara Region D Link South Africa and Sub Sahara Technical Support over the Telephone 27 12 665 2165 08600 DLINK For South Africa only Monday to Friday 8 30am to 9 0...

Page 237: ...o 20 00pm El Salvador 800 6137 Monday to Friday 06 00am to 19 00pm Guatemala 1800 300 0017 Monday to Friday 06 00am to 19 00pm Panama 0800 560 0193 Monday to Friday 07 00am to 20 00pm Peru 0800 52049...

Page 238: ...D Link D Link D Link D Link 095 744 00 99 http www dlink ru email support dlink ru...

Page 239: ...nico Help Desk Chile Tel fono 800 214422 Lunes a Viernes 08 00 am a 21 00 pm Soporte T cnico Help Desk Colombia Tel fono 01800 7001588 Lunes a Viernes 07 00 am a 20 00 pm Soporte T cnico Help Desk Ecu...

Page 240: ...brasil com br A D Link fornece suporte t cnico gratuito para clientes no Brasil durante o per odo de vig ncia da garantia deste produto Suporte T cnico para clientes no Brasil Telefone S o Paulo 11 21...

Page 241: ...8 30 a m 7 00 p m Web http www dlinktw com tw FAQ http www dlinktw com tw support asp Email dssqa_service dlinktw com tw Phone 0800 002 615 D Link...

Page 242: ...upport through our website or by phone Tech Support for customers within the United States D Link Technical Support over the Telephone 888 843 6100 Hours of Operation 8 00AM to 6 00PM PST D Link Techn...

Page 243: ...and D Link UK Ireland Technical Support over the Telephone 08456 12 0003 United Kingdom 44 8456 12 0003 Ireland Monday to Friday 8 00 am to 10 00 pm GMT Sat Sun 10 00 am to 7 00 pm GMT D Link UK Irela...

Page 244: ...nische Unterst tzung ber unsere Website per E Mail oder telefonisch anfordern Web http www dlink de E Mail support dlink de Telefon 49 1805 2787 0 12 Min aus dem Festnetz der Deutschen Telekom Telefon...

Page 245: ...de D Link par notre site internet ou par t l phone Support technique destin aux clients tablis en France Assistance technique D Link par t l phone 0 820 0803 03 Assistance technique D Link sur interne...

Page 246: ...nte el periodo de garant a del producto Los clientes espa oles pueden ponerse en contacto con la asistencia t cnica de D Link a trav s de nuestro sitio web o por tel fono Asistencia T cnica de D Link...

Page 247: ...ito D Link Supporto tecnico per i clienti residenti in Italia D Link Mediterraneo S r L Via N Bonnet 6 B 20154 Milano Supporto Tecnico dal luned al venerd dalle ore 9 00 alle ore 19 00 con orario cont...

Page 248: ...ands D Link Technical Support over the Telephone 0900 501 2007 Monday to Friday 8 00 am to 10 00 pm D Link Technical Support over the Internet www dlink nl Tech Support for customers within Belgium D...

Page 249: ...moc techniczn klientom w Polsce w okresie gwarancyjnym produktu Klienci z Polski mog si kontaktowa z dzia em pomocy technicznej firmy D Link za po rednictwem Internetu lub telefonicznie Telefoniczna p...

Page 250: ...nk D Link poskytuje sv m z kazn k m bezplatnou technickou podporu Z kazn ci mohou kontaktovat odd len technick podpory p es webov str nky mailem nebo telefonicky Web http www dlink de E Mail support d...

Page 251: ...t munkanapokon h tf t l cs t rt kig 9 00 16 00 r ig s p nteken 9 00 14 00 r ig k rhet a 1 461 3001 telefonsz mon vagy a support dlink hu emailc men Magyarorsz gi technikai t mogat s D Link Magyarorsz...

Page 252: ...ider D Link tilbyr sine kunder gratis teknisk support under produktets garantitid Kunder kan kontakte D Links teknisk support via v re hjemmesider eller p tlf Teknisk Support D Link Teknisk telefon Su...

Page 253: ...teknisk support til kunder i Danmark i hele produktets garantiperiode Danske kunder kan kontakte D Link s tekniske support via vores hjemmeside eller telefonisk D Link teknisk support over telefonen T...

Page 254: ...arinformation D Link tillhandah ller teknisk support till kunder i Sverige under hela garantitiden f r denna produkt Teknisk Support f r kunder i Sverige D Link Teknisk Support via telefon 0770 33 00...

Page 255: ...Ver 1 00 71 C1 202 100025 8008868192 028 85176977 028 85176948 9 1107 100081 010 68477035 68477036 68477037 010 68477036 http www dlink com cn 09 00 18 00...

Page 256: ...1800 FAX 61 2 8899 1868 URL www dlink com au India D Link House Kurla Bandra Complex Road Off CST Road Santacruz East Mumbai 400098 India TEL 91 022 26526696 56902210 FAX 91 022 26528914 URL www dlink...

Page 257: ...______________________________________________________ Answers to the following questions help us to support your product 1 Where and how will the product primarily be used Home Office Travel Company...

Page 258: ......

Reviews: