background image

DXS-3326GSR Gigabit Layer 3 Switch 

Section 10 

Monitoring 

 

Port Utilization 

CPU Utilization 

Packets 

Received (RX) 

UMB_cast (RX) 

Transmitted (TX) 

Errors 

Received (RX) 

Transmitted (TX) 

Size 

Packet Size 

Stacking Information 

Device Status 

MAC Address 

Switch History Log 

IGMP Snooping Group 

IGMP Snooping Forward 

Browse Router Port 

Port Access Control 

Authenticator State 

Authenticator Statistics 

Authenticator Session-Statistics 

Authenticator Diagnostics 

RADIUS Authentication 

RADIUS Accounting 

Layer 3 Feature 

Browse IP Address 

Browse Routing Table 

Browse ARP Table 

Browse IP Multicast Forwarding Table 

Browse IGMP Group Table 

OSPF Monitor 

Browse OSPF LSDB Table 

Browse OSPF Neighbor Table 

Browse OSPF Virtual Neighbor Table 

201 

Содержание DXS-3326GSR - xStack Switch - Stackable

Страница 1: ...D Link DXS 3326GSR Managed 24 port Gigabit and 4 1000Base T Combo Ports Layer 3 Stackable Ethernet Switch Manual...

Страница 2: ...D Link Computer Corporation is strictly forbidden Trademarks used in this text D Link and the D LINK logo are trademarks of D Link Computer Corporation Microsoft and Windows are registered trademarks...

Страница 3: ...4 Front Panel Components 5 LED Indicators 5 Rear Panel Description 6 Side Panel Description 6 Installation 8 Package Contents 8 Before You Connect to the Network 8 Installing the Switch Without the R...

Страница 4: ...b Manager 29 Web based User Interface 30 Web Pages 31 Configuration 32 Switch Information 33 IP Address 34 Box Information 35 Advanced Settings 36 Port Configuration 38 Port Description 40 Port Mirror...

Страница 5: ...e 95 Port Access Entity 109 Configure Authenticator 111 Local users 114 PAE System Control 114 RADIUS Server 120 Layer 3 IP Networking 121 L3 Global Advanced Settings 122 IP Interfaces Table 122 MD5 K...

Страница 6: ...IP 171 User Accounts 172 Access Authentication Control 173 Policy and Parameters 174 Application Authentication Settings 175 Authentication Server Group 175 Authentication Server Host 177 Login Metho...

Страница 7: ...l 222 Authenticator State 222 Authenticator Statistics 225 Authenticator Session Statistics 226 Authenticator Diagnostics 227 RADIUS Authentication 229 RADIUS Accounting 230 Layer 3 Feature 232 Browse...

Страница 8: ...4 Reset 245 Reboot Device 246 Logout 247 Single IP Management 248 SIM Settings 249 Topology 250 Firmware Upgrade 259 Configuration File Backup Restore 260 Appendix A 261 Technical Specifications 261 A...

Страница 9: ...the Spanning Tree Section 7 Layer 3 IP Networking A discussion about Layer 3 IP Networking features including RIP OSPF DHCP BOOTP Relay DNS Relay VRRP IP Multicast Routing Protocol and PIM DM Section...

Страница 10: ...oldface Typewriter Font Indicates commands and responses to prompts that must be typed exactly as printed in the manual Initial capital letter Indicates a window name Names of keys on the keyboard hav...

Страница 11: ...provider Do not push any objects into the openings of your system Doing so can cause fire or electric shock by shorting out interior components Use the product only with approved equipment Allow the p...

Страница 12: ...er to the rack installation documentation accompanying the system and the rack for specific caution statements and procedures Systems are considered to be components in a rack Thus component refers to...

Страница 13: ...l exist if the safety ground cable is omitted or disconnected Protecting Against Electrostatic Discharge Static electricity can harm delicate components inside your system To prevent static damage dis...

Страница 14: ...a tenfold increase in theoretical throughput over 100Mbps Fast Ethernet and a one hundred fold increase over 10Mbps Ethernet Since it is compatible with all 10Mbps and 100Mbps Ethernet environments G...

Страница 15: ...ion problems Switch Description The DXS 3326GSR is a manageable Gigabit stackable switch designed to uplink network backbones servers workstations and internetwork systems The DXS 3326GSR is equipped...

Страница 16: ...tering at full wire speed up to 128Gbps Full and half duplex for all gigabit ports Full duplex allows the switch port to simultaneously transmit and receive data It only works with connections to full...

Страница 17: ...Switch to add an optional 2 port 10 gigabit XFP module for uplionking using fibre optic cabling RS 232 DCE Diagnostic port console port for setting up and managing the Switch via a connection to a con...

Страница 18: ...g the Stack ID number as well as 24 SFP ports four 1000BASE T gigabit Ethernet ports and a RS 232 DCE console port for Switch management DXS 3326GSR Figure 1 2 Front Panel View of the DXS 3326GSR as s...

Страница 19: ...the two 10 gigabit stacking ports at the rear of the Switch These LEDs are marked 1 and 2 and will light solid green to denote activity on the port while a blinking light will indicate a valid link St...

Страница 20: ...DXS 3326GSR Gigabit Layer 3 Switch Figure 1 5 Side Panels 7...

Страница 21: ...nd Getting Started Guide This Manual If any item is found missing or damaged please contact your local D Link reseller for replacement Before You Connect to the Network The site where you install the...

Страница 22: ...op or shelf the rubber feet included with the Switch should first be attached Attach these cushioning feet on the bottom at each corner of the device Allow enough ventilation space between the Switch...

Страница 23: ...transmit information at a rate of 10 gigabits a second These two ports are compliant with standard IEEE 802 3ae support full duplex transmissions only and can be used with XFP MSA compliant transceiv...

Страница 24: ...he module Gently but firmly push in on the module to secure it to the Switch The module should fit snugly into the corresponding receptors Figure 2 6 Inserting the optional module into the DXS 3326GSR...

Страница 25: ...igabit Layer 3 Switch Figure 2 8 The DXS 3326GSR with the DPS 500 Redundant External Power Supply Figure 2 9 The DXS 3326GSR with the DPS 900 chassis RPS NOTE See the DPS 500 documentation for more in...

Страница 26: ...DXS 3326GSR Gigabit Layer 3 Switch CAUTION Do not use the Switch with any redundant power system other than the DPS 500 13...

Страница 27: ...our 1000BASE T ports of the Switch Figure 3 1 Switch connected to an end node The Link Act LEDs for each UTP port will light green or amber when the link is valid A blinking LED indicates packet activ...

Страница 28: ...24 SFP ports and the four combo 1000BASE T ports are ideal for uplinking to a network backbone server or server farm The copper ports operate at a speed of 1000 100 or 10Mbps in full or half duplex m...

Страница 29: ...k Figure 3 5 SIO 1 and SIO 2 Stacking ports at the rear of the DXS 3326GSR These two stacking ports named SIO 1 and SIO 2 can be used with other stacking switches for a scalable stacking solution of u...

Страница 30: ...e only one of the two Gigabit stacking ports will be in use This port will be connected to the master switch of the switch stack and will act as a slave switch of the stack The administrator may use e...

Страница 31: ...ing a Ring or Star Toplogy The Switches listed in the table below can all be stacked but there is a limitation as to the number of Switches that can be included in a given stack This limitation arises...

Страница 32: ...s calculations but we must remember that there is a maximum limitation of 12 switches so the actual maximum number of DXS 3326GSR switches that can be stacked together in the ring topology is twelve R...

Страница 33: ...eight DGS 3326GSRs 1 DGS 3324SRs Token Cost 2 two DXS 3350SRs Token Cost 4 and three DXS 3326GSRs Token Cost 2 This gives a total Token Cost for the stack of 1 2 8 2 2 4 3 2 32 Although the Token Cos...

Страница 34: ...hree DXS 3350SRs one with module Our switch count would equal 6 1 and our token cost would equal 22 2 2 4 14 22 32 Success From these examples we can see that there is a myriad of combinations possibl...

Страница 35: ...anage the Switch with an SNMP compatible console program The Switch supports SNMP version 1 0 version 2 0 and version 3 0 The SNMP agent decodes the incoming SNMP messages and responds to requests wit...

Страница 36: ...here is no default user name and password for the Switch User names and passwords must first be created by the administrator If you have previously set up user accounts log in and continue to configur...

Страница 37: ...access the Switch are case sensitive therefore S is not the same as s When you first connect to the Switch you will be presented with the first login screen shown above NOTE Press Ctrl R to refresh th...

Страница 38: ...ords for future reference To create an administrator level account for the Switch do the following At the CLI login prompt enter create account admin followed by the user name and press the Enter key...

Страница 39: ...shed using community strings which function like passwords The remote user SNMP application and the Switch SNMP must use the same community string SNMP packets from any station that has not been authe...

Страница 40: ...your networking address scheme The Switch is also assigned a unique MAC address by the factory This MAC address cannot be changed and can be found by entering the command show switch into the command...

Страница 41: ...executed successfully The Switch can now be configured and managed via Telnet and the CLI or via the Web based management Connecting Devices to the Switch After you assign IP addresses to the Switch y...

Страница 42: ...he Switch using the HTTP protocol The Web based management module and the Console program and Telnet are different ways to access the same internal switching software and configure it Thus all setting...

Страница 43: ...itor the system status Areas of the User Interface The figure below shows the user interface The user interface is divided into three distinct areas as described in the table Area 2 Area 3 Area 1 Figu...

Страница 44: ...figuration for L3 Global Advanced Settings IP Interface Table MD5 Key Table Configuration Route Redistribution Settings Static Default Route Route Preference Setting Static ARP Settings RIP OSPF DHCP...

Страница 45: ...l Settings MAC Notification Port Settings IGMP Snooping IGMP Snooping Settings Static Router Port Settings Spanning Tree STP Bridge Global Settings MST Configuration Table MSTI Port Settings STP Insta...

Страница 46: ...swords for management access privileges as well as how to save the changes and restart the Switch Click the Switch Information link in the Configuration folder Figure 6 1 Switch Information Basic Sett...

Страница 47: ...reviously configured on the Switch you can use the default VLAN Name The default VLAN contains all of the Switch ports as members If VLANs have been previously configured on the Switch you will need t...

Страница 48: ...tation that can connect to the Switch can access the Switch until a management VLAN is specified or Management Station IP Addresses are assigned Click Apply to let your changes take effect Setting the...

Страница 49: ...choose the model name of the Master switch in a stack to be the main configuring switch of that stack Priority Displays the priority ID of the Switch The lower the number the higher the priority The b...

Страница 50: ...ain in the forwarding table without being accessed that is how long a learned MAC Address is allowed to remain idle To change this type in a different value representing the MAC address age out time i...

Страница 51: ...is defined by this definition Choose MAC Source MAC Destination MAC Src Dest IP Source IP Destination or IP Src Dest See the Link Aggregation section of this manual Switch 802 1x The user may enable...

Страница 52: ...bed below Parameter Description State Enabled Toggle the State field to either enable or disable a given port or group of ports Speed Duplex Auto Toggle the Speed Duplex field to either select the spe...

Страница 53: ...the other side of the connection must be set for 1000M Full_S Any other configuration will result in a link down status for both ports Flow Control Displays the flow control scheme used for the vario...

Страница 54: ...Port Description Table Port Mirroring The Switch allows you to copy frames transmitted and received on a port and redirect the copies to another port You can attach a monitoring device to the mirrore...

Страница 55: ...Mbps port onto a 10 Mbps port this can cause throughput problems The port you are copying frames from should always support an equal or lower speed than the port to which you are sending the copies Al...

Страница 56: ...traffic segmentation and 802 1p default priority configurations must be identical Port locking port mirroring and 802 1X must not be enabled on the trunk group Further the aggregated links must all b...

Страница 57: ...gregation Group Entries table Figure 6 10 Link Aggregation Group Configuration window The user changeable parameters are as follows Parameter Description Group ID Select an ID number for the group Typ...

Страница 58: ...port to allow transmission of broadcasts and unknown unicasts After setting the previous parameters click Apply to allow your changes to be implemented Successfully created trunk groups will be shown...

Страница 59: ...ters Parameter Description Unit Choose the desired Unit From To A consecutive group of ports may be configured starting with the selected port Mode Active Active LACP ports are capable of processing a...

Страница 60: ...ive MAC Notification MAC Notification is used to monitor MAC addresses learned and entered into the forwarding database MAC Notification Global Settings To globally set MAC notification on the Switch...

Страница 61: ...DXS 3326GSR Gigabit Layer 3 Switch Figure 6 13 MAC Notification Port Settings window The following parameters may be set 48...

Страница 62: ...IGMP Snooping it must first be enabled for the entire Switch see Advanced Settings You may then fine tune the settings for each VLAN using the IGMP Snooping link in the Configuration folder When enabl...

Страница 63: ...GMP response report The Max Response Time field allows an entry between 1 and 25 seconds Default 10 Robustness Value 1 255 Adjust this variable according to expected packet loss If packet loss on the...

Страница 64: ...coming from the router to be propagated through the network as well as allowing multicast messages IGMP coming from the network to be propagated to the router A router port has the following behavior...

Страница 65: ...1d STP 802 1w RSTP and 802 1s MSTP 802 1s MSTP Multiple Spanning Tree Protocol or MSTP is a standard defined by the IEEE community that allows multiple VLANs to be mapped to a single spanning tree in...

Страница 66: ...ersion compatible with the IEEE 802 1d STP RSTP can operate with legacy equipment implementing IEEE 802 1d however the advantages of using RSTP will be lost The IEEE 802 1w Rapid Spanning Tree Protoco...

Страница 67: ...ely without going through the listening and learning states An edge port loses its status if it receives a BPDU packet immediately becoming a normal spanning tree port P2P Port A P2P port is also capa...

Страница 68: ...rt each Hello Time This field will only appear here when STP or RSTP is selected for the STP Version For MSTP the Hello Time must be set on a port per port basis See the MST Port Settings section for...

Страница 69: ...the Max Age Otherwise a configuration error will occur Observe the following formulas when setting the above parameters Max Age 2 x Forward Delay 1 second Max Age 2 x Hello Time 1 second MST Configura...

Страница 70: ...dow The user may configure the following parameters to create a MSTI in the Switch Parameter Description MSTI ID Enter a number between 1 and 15 to set a new MSTI on the Switch Type Create is selected...

Страница 71: ...choices Add VID Select this parameter to add VIDs to the MSTI ID in conjunction with the VID List parameter Remove VID Select this parameter to remove VIDs from the MSTI ID in conjunction with the VI...

Страница 72: ...lected within a STP instance The default setting is 0 auto There are two options 0 auto Selecting this parameter for the internalCost will set quickest route automatically and optimally for an interfa...

Страница 73: ...y to implement changes made To make changes to entries on the STP Instance Table window click Modify Figure 6 26 Instance ID Settings window The following information is displayed Parameter Descriptio...

Страница 74: ...ettings window In addition to setting Spanning Tree parameters for use on the switch level the Switch allows for the configuration of groups of ports each port group of which will have its own spannin...

Страница 75: ...nctioning The user may choose a time between 1 and 10 seconds The default is 2 seconds This field is only operable when the Switch is enabled for MSTP Migration Yes Setting this parameter as yes will...

Страница 76: ...click Add Modify Parameter Description VLAN ID VID The VLAN ID number of the VLAN on which the above Unicast MAC address resides MAC Address The MAC address to which packets will be statically forwar...

Страница 77: ...icast MAC Address The MAC address of the static source of multicast packets This must be a multicast MAC address Port Settings Allows the selection of ports that will be members of the static multicas...

Страница 78: ...rate at which the queues are emptied of packets The ratio used for clearing the queues is 4 1 This means that the highest priority queue Queue 1 will clear 4 packets for every 1 packet cleared from Qu...

Страница 79: ...deliver packets between stations that are members of the VLAN Any port can be configured as either tagging or untagging The untagging feature of IEEE 802 1Q VLANs allows VLANs to work with legacy swi...

Страница 80: ...be carried across Ethernet backbones and 12 bits of VLAN ID VID The 3 bits of user priority are used by 802 1p The VID is the VLAN identifier and is used by the 802 1Q standard Because the VID is 12 b...

Страница 81: ...e as many VIDs as the Switch has memory in its VLAN table to store them Because some devices on a network may be tag unaware a decision must be made at each port on a tag aware device before packets a...

Страница 82: ...cted to a port are members of the VLAN s the port belongs to whether there is a single computer directly connected to a switch or an entire department On port based VLANs NICs do not need to be able t...

Страница 83: ...to discover the type of protocol associated with it After assessing the protocol the Switch will forward the packets to all ports within the protocol assigned VLAN This feature will benefit the admin...

Страница 84: ...802 1Q VLAN click the corresponding button under the Delete heading To create a new 802 1Q VLAN click the Add button in the window above A new window will appear as shown below to configure the port...

Страница 85: ...r will instruct the switch to forward packets to this VLAN if the tag in the packet header is concurrent with this protocol This packet header information is defined by Novell NetWare 802 3 IPX Intern...

Страница 86: ...he user only need enter the final four integers of the hexidecimal format to define the packet ID hex 0x0 0xffff This field is only operable if userDefined is selected in the Protocol ID field Encap S...

Страница 87: ...gs window The following fields can be set Parameter Description Unit Choose the desired unit From To These two fields allow you to specify the range of ports that will be included in the Port based VL...

Страница 88: ...LAN when created in the 802 1Q Port Settings table The Switch s default is to assign all ports to the default VLAN with a VID of 1 The PVID is used by the port to tag outgoing untagged packets and to...

Страница 89: ...ort has a counter that tracks the number of broadcast packets received per second The counter is cleared once per second If the broadcast multicast or unknown unicast storm control is enabled the port...

Страница 90: ...e in the same window Click Apply to implement changes made Port Security A given port s or a range of ports dynamic MAC address learning can be locked such that the current source MAC addresses entere...

Страница 91: ...d unit From To A consecutive group of ports may be configured starting with the selected port Admin State This pull down menu allows you to enable or disable Port Security locked MAC address table for...

Страница 92: ...t after the aging timer expires DeleteOnTimeout The locked addresses will age out after the aging timer expires DeleteOnReset The locked addresses will not age out until the Switch has been reset Clic...

Страница 93: ...under the Delete heading of the corresponding MAC address to be deleted Click the Next button to view the next page of entries listed in this table This window displays the following information Para...

Страница 94: ...vice and benefits of using 802 1p priority queuing Advantages of QoS QoS is an implementation of the IEEE 802 1p standard that allows network administrators a method of reserving bandwidth for importa...

Страница 95: ...Q0 queue Priority 2 is assigned to the Switch s Q1 queue Priority 3 is assigned to the Switch s Q3 queue Priority 4 is assigned to the Switch s Q4 queue Priority 5 is assigned to the Switch s Q5 queu...

Страница 96: ...isplayed Parameter Description Unit Choose the desired unit From To A consecutive group of ports may be configured starting with the selected port Type This drop down menu allows you to select between...

Страница 97: ...nism has the following parameters Parameter Description Strict The highest queue is the first to process traffic That is the highest queue will finish before other queues empty Weight fair Use the wei...

Страница 98: ...priority queues listed in the window above Priority queues that have a 0 in the Max Packet field will forward packets with strict priority scheduling The remaining queues that do not have a 0 in thei...

Страница 99: ...figuration window Combination Queue Example 802 1p Default Priority The Switch allows the assignment of a default 802 1p priority to each port on the Switch In the Configuration folder open the QoS fo...

Страница 100: ...the Switch The priority queues are numbered from 0 the lowest priority to 7 the highest priority Click Apply to implement your settings 802 1p User Priority The DXS 3326GSR allows the assignment of a...

Страница 101: ...used to limit traffic flow from a single port to a group of ports on either a single switch in standalone mode or a group of ports on another switch in a switch stack Single IP This method of segmenti...

Страница 102: ...be allowed to forward packets to other ports on that switch The user may set the following parameters Parameter Description Unit Choose the desired unit you wish to see the current traffic segmentati...

Страница 103: ...Port drop down menu allows you to select a port from that switch This is the port that will be transmitting packets The Unit drop down menu under the Setup Forwarding ports heading allows you to sele...

Страница 104: ...ty values Processes and daemons that have not been explicitly assigned a Facility may use any of the local use facilities or they may use the user level Facility Those Facilities that have been design...

Страница 105: ...r Disabled to activate or deactivate To set the System Log Server configuration click Apply To delete an entry from the Current System Log Servers window click the corresponding under the Delete headi...

Страница 106: ...ource Displays the time source for the system Current Time SNTP Settings SNTP State Use this pull down menu to Enable or Disable SNTP SNTP Primary Server This is the IP address of the primary server t...

Страница 107: ...s and seconds if you would like to update the system clock Time in HH MM SS Click Apply to implement your changes Time Zone and DST The following are windows used to configure time zones and Daylight...

Страница 108: ...nter the week of the month the DST will end To Day of Week Enter the day of the week that DST will end To Month Enter the month that DST will end To time in HH MM Enter the time DST will end DST Annua...

Страница 109: ...e window To add an entry to the Access Profile Table window click the Add button This will open the Access Profile Configuration window as shown below There are three Access Profile Configuration wind...

Страница 110: ...er a MAC address mask for the source MAC address Destination MAC Destination MAC Mask Enter a MAC address mask for the destination MAC address 802 1p Selecting this option instructs the Switch to exam...

Страница 111: ...hange the window according to the requirements for the type of profile Select Ethernet to instruct the Switch to examine the layer 2 part of each packet header Select IP to instruct the Switch to exam...

Страница 112: ...ts to filter Flag bits are parts of a packet that determine what to do with the packet The user may filter packets by filtering certain flag bits within the packets by checking the boxes corresponding...

Страница 113: ...fields are used to configure the Packet Content Mask Parameter Description Profile ID 1 8 Type in a unique identifier number for this profile set This value can be set from 1 to 8 Type Select profile...

Страница 114: ...8 63 Enter a value in hex form to mask the packet from byte 48 to byte 63 value 64 79 Enter a value in hex form to mask the packet from byte 64 to byte 79 Port The user may set the Access Profile Tabl...

Страница 115: ...s the Switch to examine the IP address in each frame s header Packet Content Mask instructs the Switch to examine the packet header Priority 0 7 This parameter is specified if you want to re write the...

Страница 116: ...lue in the space provided which will instruct the Switch to examine the DiffServ Code part of each packet header and use this as the or part of the criterion for forwarding The user may choose a value...

Страница 117: ...cription Profile ID This is the identifier number for this profile set Mode Select Permit to specify that the packets that match the access profile are forwarded by the Switch according to any additio...

Страница 118: ...to its original value before being forwarded by the Switch For more information on priority queues CoS queues and mapping for 802 1p see the QoS section of this manual Replace DSCP 0 63 Select this op...

Страница 119: ...Packet Content Mask open the Access Profile Table window and click Modify for a Packet Content Mask entry This will open the following window Figure 6 63 Access Rule Table Packet Content Mask window T...

Страница 120: ...le for the Packet Content Mask adjust the following parameters and click Apply Parameter Description Profile ID This is the identifier number for this profile set Mode Select Permit to specify that th...

Страница 121: ...red in the Priority field which meets the criteria specified previously in this window before forwarding it on to the CoS queue mapped previously by the user Otherwise a packet will have its incoming...

Страница 122: ...in such infrastructures has no more than two devices attached to it one of which is a Bridge Port The Bridge Port detects events that indicate the attachment of an active device at the remote end of...

Страница 123: ...e the connected device has successfully been authenticated the Port then becomes Authorized and all subsequent traffic on the Port is not subject to access control restriction until an event occurs th...

Страница 124: ...d be necessary to create logical Ports one for each attached device that required access to the LAN The Switch would regard the single physical Port connecting it to the shared media segment as consis...

Страница 125: ...Layer 3 Switch Figure 6 68 first 802 1X Authenticator Settings window To configure the settings by port click on the hyperlinked port number under the Port heading which will display the following tab...

Страница 126: ...and cause the port to transition to the authorized state without any authentication exchange required This means the port transmits and receives normal traffic without 802 1X based authentication of...

Страница 127: ...ing is 2 ReAuthPeriod 3600 A constant that defines a nonzero number of seconds between periodic reauthentication of the client The default settijng is 3600 seconds ReAuth Disabled Determines whether r...

Страница 128: ...6 71 802 1x Capability Settings window To set up the Switch s 802 1x port based authentication select which unit and ports are to be configured in the Unit and From To fields Next enable the ports by...

Страница 129: ...e choices can be selected Authenticator A user must pass the authentication process to gain access to the network None The port is not controlled by the 802 1x functions Initialize Ports Existing 802...

Страница 130: ...DXS 3326GSR Gigabit Layer 3 Switch Figure 6 72 Initialize Port Port Based window 117...

Страница 131: ...uthenticating Authenticated Aborting Held ForceAuth ForceUnauth and N A Backend State The Backend Authentication State will display one of the following Request Response Success Fail Timeout Idle Init...

Страница 132: ...er of the reauthenticated port MAC Address Displays the physical address of the Switch where the port resides Auth State The Authenticator State will display one of the following Initialize Disconnect...

Страница 133: ...Figure 6 76 Authentic RADIUS Server Setting window This window displays the following information Parameter Description Succession First Choose the desired RADIUS server to configure First Second or T...

Страница 134: ...OSPF OSPF Global Settings OSPF Area ID Setting OSPF Interface Settings OSPF Virtual Interface Settings OSPF Area Aggregation Settings OSPF Host Route Settings DHCP BOOTP Relay DHCP BOOTP Global Settin...

Страница 135: ...disable the Protocol Independent Multicast Dense Mode PIM DM function by using the pull down menu RIP State The user may globally enable or disable the Routing Information Protocol RIP function by us...

Страница 136: ...P Address VLAN Name VID Network Number IP Address System default 1 10 32 0 0 10 32 0 1 Engineer 2 10 64 0 0 10 64 0 1 Marketing 3 10 96 0 0 10 96 0 1 Finance 4 10 128 0 0 10 128 0 1 Sales 5 10 160 0 0...

Страница 137: ...k the Show All IP Interface Entries hyperlink Use the Save Settings window from the Maintenance folder to enter the changes into NV RAM The following fields can be set Parameter Description Interface...

Страница 138: ...re an MD5 Key click the MD5 Key Table Configuration link to open the following window Figure 7 5 MD5 Key Setting window The following fields can be set Parameter Description Key ID 1 255 A number from...

Страница 139: ...indow will redistribute routing information between the OSPF and RIP routing protocols to all routers on the network that are running OSPF or RIP To access the Route Redistribution Settings window go...

Страница 140: ...et Mask of the IP address entered into the table Gateway The corresponding Gateway of the IP address entered into the table Hops Represents the metric value of the IP interface entered into the table...

Страница 141: ...ence is a way for routers to select the best path when there are two or more different routes to the same destination from two different routing protocols The majority of routing protocols are not com...

Страница 142: ...ne that is less than the lowest value Static 60 or the user could change the other route values to more than 100 The user should be aware of three points before configuring the route preference 1 No t...

Страница 143: ...r routing packets The default value is 80 Static 1 999 Enter a value between 1 and 999 to set the route preference for Static route The lower the value the higher the chance the specified protocol wil...

Страница 144: ...ndow to configure Figure 7 11 Static ARP Table Add a New Entry window The following fields can be set Parameter Description IP Address The IP address of the ARP entry MAC Address The MAC address of th...

Страница 145: ...eachable RIP can also be slow to converge to remove inconsistent unreachable or looped routes from the routing table because RIP messages propagate relatively slowly through a network Slow convergence...

Страница 146: ...P version 2 can be used to propagate variable length subnet addresses or CIDR classless addresses RIP version 2 also adds an explicit next hop entry which speeds convergence and helps prevent the form...

Страница 147: ...Name showing in the field above TX Mode Disabled Toggle among Disabled v1 Only v1 Compatible and v2 Only This entry specifies which version of the RIP protocol will be used to transmit RIP packets Dis...

Страница 148: ...hm s steps When OSPF is started or when a change in the routing information changes the router generates a link state advertisement This advertisement is a specially formatted packet that contains inf...

Страница 149: ...0 0 10 10 5 5 10 10 Figure 7 16 Constructing a Shortest Path Tree The diagram above shows the network from the viewpoint of Router A Router A can reach 192 213 11 0 through Router B with a cost of 10...

Страница 150: ...state updates and the calculation of the shortest path tree are limited to the area that the router is connected to Routers that have connections to more than one area are called Border Routers BR The...

Страница 151: ...d Authentication A password or key can be configured on a per area basis Routers in the same area that participate in the routing domain must be configured with the same key This method is possibly vu...

Страница 152: ...d for link state database updates Designated Router Election The election of the DR and BDR is accomplished using the Hello protocol The router with the highest OSPF priority on a given multi access s...

Страница 153: ...SPF packet is preceded by a common 24 byte header This header contains the information necessary for a receiving router to determine if the packet should be accepted for further processing The format...

Страница 154: ...val These parameters are included in hello packets so that differences can inhibit the forming of neighbor relationships A detailed explanation of the receive processing for Hello packets so that diff...

Страница 155: ...base Multiple packets may be used to describe the database For this purpose a poll response procedure is used One of the routers is designated to be master the other a slave The master seconds Databas...

Страница 156: ...e Link State Request packet itself The router may receive even more recent instances in response The format of the Link State Request packet is shown below Version No Packet Length Router ID Area ID A...

Страница 157: ...packets Multiple link state advertisements can be acknowledged in a single Link State Acknowledgment packet Depending on the state of the sending interface and the source of the advertisements being...

Страница 158: ...nk state advertisements begin with a common 20 byte header This header contains enough information to uniquely identify the advertisements Link State Type Link State ID and Advertising Router Multiple...

Страница 159: ...eld Length The length in bytes of the link state advertisement This includes the 20 byte link state advertisement header Router Links Advertisements Router links advertisements are type 1 link state a...

Страница 160: ...n of the router link One of the following Type Description Point to point connection to another router Connection to a transit network Connection to a stub network Virtual link Link ID Identifies the...

Страница 161: ...inks advertisement The format of the Network Links Advertisement is shown below Link State Age Options Link State ID Advertising Router Link State Sequence Number Link State Checksum Length Network Li...

Страница 162: ...for TOS 0 Field Description Network Mask For Type 3 link state advertisements this indicates the destination network s IP address mask For example when advertising the location of a class A network th...

Страница 163: ...Forwarding Address Data traffic for the advertised destination will be forwarded to this address If the Forwarding Address is set to 0 0 0 0 data traffic will be forwarded instead to the advertisement...

Страница 164: ...Ds and to designate these areas as either Normal or Stub Normal OSPF areas allow Link State Database LSDB advertisements of routes to networks that are external to the area Stub areas do not allow the...

Страница 165: ...Displays whether or not the selected Area will allow Summary Link State Advertisements Summary LSAs to be imported into the area from other areas Stub Default Cost Displays the default cost for the ro...

Страница 166: ...ws the entry of an OSPF Area ID configured above Router Priority 0 255 Allows the entry of a number between 0 and 255 representing the OSPF priority of the selected area If a Router Priority of 0 is s...

Страница 167: ...only field describing the Designated Router state of the IP interface This field many read DR if the interface is the designated router or Backup DR if the interface is the Backup Designated Router Th...

Страница 168: ...d Authorization Key should have identical settings for all routers on the same network Dead Interval 1 65535 Specify the length of time between receiving Hello packets from a neighbor router before th...

Страница 169: ...ears To change an existing configuration click on the hyperlinked Area ID for the set you want to change The window to modify an existing configuration is the same as the one used to add a new configu...

Страница 170: ...ing an existing configuration you will be unable to change the Host Address To change an existing configuration click on the hyperlinked Host Address in the list for the configuration you want to chan...

Страница 171: ...Switch The default is Disabled BOOTP HOPS Count Limit 1 16 4 This field allows an entry between 1 and 16 to define the maximum number of router hops BOOTP messages can be forwarded across The default...

Страница 172: ...n The domain name system can be used by contacting the name servers one at a time or by asking the domain name system to do the complete name translation The client makes a query containing the name t...

Страница 173: ...This determines if a DNS cache will be enabled on the Switch DNS Static Table Status Disabled This field can be toggled using the pull down menu between Disabled and Enabled This determines if the sta...

Страница 174: ...alive regardless of the point of failure To configure VRRP for virtual routers on the Switch an IP interface must be present on the system and it must be a part of a VLAN VRRP IP interfaces may be ass...

Страница 175: ...sage digest algorithm has been selected to compare VRRP packets received by a virtual router for authentication VRID Displays the virtual router ID set by the user This will uniquely identify the VRRP...

Страница 176: ...th having the backup router s priority set higher than the masters priority will set the backup router as the Master router A False entry will disable the backup router from becoming the Master router...

Страница 177: ...ng information Parameter Description Interface Name An IP interface name that has been enabled for VRRP This entry must have been previously set in the IP Interface Settings table Authentication type...

Страница 178: ...itical IP Displays the status of the Critical IP address May be enabled or disabled Advertisement Interval Displays the time interval in seconds that VRRP messages are sent out to the network Preempt...

Страница 179: ...can be varied by entering a value in the Max Response Time field The Robustness Variable field allows IGMP to be tuned for sub networks that are expected to lose a lot of packets A high value max 255...

Страница 180: ...uting Information Protocol RIP but is extended for multicast delivery DVMRP builds a routing table to calculate shortest paths back to the source of a multicast message and defines route cost it is si...

Страница 181: ...e DVMRP route cost is a relative number that represents the real cost of using this route in the construction of a multicast delivery tree It is similar to but not defined as the hop count in RIP The...

Страница 182: ...l Settings window Use the pull down menu choose Enabled and click Apply to set the PIM DM function on the Switch PIM DM Interface Settings To view the first PIM DM Interface Settings window open the I...

Страница 183: ...his interval also determines the time interval the router uses to automatically remove prune information from a branch of a multicast delivery tree and begin to flood multicast messages to all branche...

Страница 184: ...e Sockets Layer SSL Download Certificate Configuration Secure Shell SSH SSH Configuration SSH Algorithm SSH User Authentication The following section will aid the user in configuring security function...

Страница 185: ...user privileges To view existing User Accounts open the Security Management folder and click on the User Accounts link This will open the User Account Management window as shown below Figure 8 2 User...

Страница 186: ...access to the Switch using the TACACS XTACACS TACACS RADIUS protocols When a user logs in to the Switch or tries to access the administrator level privilege he or she is prompted for a password If TAC...

Страница 187: ...may set up six different authentication techniques per user defined method list TACACS XTACACS TACACS RADIUS local none for authentication These techniques will be listed in an order preferable and de...

Страница 188: ...on the Switch The user may configure the Login Method List and Enable Method List for authentication for users utilizing the Console Command Line Interface application the Telnet application SSH and...

Страница 189: ...a Server Host to Server Group xtacacs window To add an Authentication Server Host to the list enter its IP address in the IP Address field choose the protocol associated with the IP address of the Au...

Страница 190: ...th Authentication Policy enabled the Switch will send authentication packets to a remote TACACS XTACACS TACACS RADIUS server host on a remote host The TACACS XTACACS TACACS RADIUS server host will the...

Страница 191: ...erver host but remember that TACACS XTACACS TACACS are separate entities and are not compatible with each other Login Method Lists This command will configure a user defined or default Login Method Li...

Страница 192: ...entry desired to be deleted To modify a Login Method List click on its hyperlinked Method List Name To configure a new Method List click the Add button Both actions will result in the same window to c...

Страница 193: ...ethods on the Switch Once a user acquires normal user level privileges on the Switch he or she must be authenticated by a method on the Switch to gain administrator privileges on the Switch which is d...

Страница 194: ...ter a method list name defined by the user of up to 15 characters Method 1 2 3 4 The user may add one or a combination of up to four of the following authentication methods to this method list local_e...

Страница 195: ...ew Local Enabled Password Enter the new password that you wish to set on the Switch to authenticate users attempting to access Administrator Level privileges on the Switch The user may set a password...

Страница 196: ...hm to be used This switch utilizes the Rivest Shamir Adleman RSA public key algorithm and the Digital Signature Algorithm DSA specified here as the DHE DSS Diffie Hellman DHE public key algorithm This...

Страница 197: ...record used for authenticating devices on the network It contains information on the owner keys for authentication and digital signatures Both the server and the client must have consistent certificat...

Страница 198: ...a key exchange Specifying a longer timeout will allow the SSL session to reuse the master key on future connections with that particular host therefore speeding up the negotiation process The default...

Страница 199: ...col for secure communication between a remote PC the SSH client and the Switch the SSH server are as follows 1 Create a user account with admin level access using the User Accounts window in the Secur...

Страница 200: ...SSH Server utilizing the SSH authentication After the maximum number of attempts has been exceeded the Switch will be disconnected and the user must reconnect to the Switch to attempt another login T...

Страница 201: ...ed by default Public Key This field may be enabled or disabled to choose if the administrator wishes to use a publickey configuration set on a SSH server for authentication This field is Enabled by de...

Страница 202: ...l down to enable or disable the twofish128 encryption algorithm The default is Enabled Twofish192 Use the pull down to enable or disable the twofish192 encryption algorithm The default is Enabled Twof...

Страница 203: ...trator wishes to use a remote SSH server for authentication purposes Choosing this parameter requires the user to input the following information to identify the SSH user Host Name Enter an alphanumer...

Страница 204: ...et the SSH User Authentication parameters on the Switch a User Account must be previously configured For more information on configuring local User Accounts on the Switch see the User Accounts section...

Страница 205: ...ated are ignored dropped The default community strings for the Switch used for SNMP v 1 and v 2 management access are public Allows authorized management stations to retrieve MIB objects private Allow...

Страница 206: ...agement Protocol SNMP versions 1 2c and 3 The administrator can specify the SNMP version used to monitor and control the Switch The three versions of SNMP vary in the level of security provided betwee...

Страница 207: ...the CBC DES DES 56 standard To return to the SNMP User Table window click the Show All SNMP User Table Entries link To add a new entry to the SNMP User Table window click on the Add button on the SNM...

Страница 208: ...to enter a password between 8 and 16 alphanumeric characters Encrypted Checking the corresponding box will enable encryption for SNMP V3 and is only oper able in SNMP V3 mode To implement changes made...

Страница 209: ...manager View Type Select Included to include this object in the list of objects that an SNMP manager can access Select Excluded to exclude this object from the list of objects that an SNMP manager ca...

Страница 210: ...The following parameters can set Parameter Description Group Name Type an alphanumeric string of up to 32 characters This is used to identify the new SNMP group of SNMP users Read View Name This name...

Страница 211: ...p Table window click the Show All SNMP Group Table Entries link SNMP Community Table Use this table to create an SNMP community string to define the relationship between the SNMP manager and an agent...

Страница 212: ...e heading corresponding to the entry you wish to delete SNMP Host Table Use the SNMP Host Table to set up SNMP trap recipients Open the SNMP Manager folder and click on the SNMP Host Table link This w...

Страница 213: ...meric string used to identify the SNMP engine on the Switch Figure 9 12 SNMP Engine ID Configuration window V3 NoAuth NoPriv To specify that the SNMP version 3 will be used with a NoAuth NoPriv securi...

Страница 214: ...P Snooping Group IGMP Snooping Forward Browse Router Port Port Access Control Authenticator State Authenticator Statistics Authenticator Session Statistics Authenticator Diagnostics RADIUS Authenticat...

Страница 215: ...displays the percentage of the total available bandwidth being used on the port To view the port utilization open the Monitoring folder and then the Port Utilization link Figure 10 1 Utilization windo...

Страница 216: ...s an integer percentage and calculated as a simple average by time interval To view this window open the Monitoring folder and click the CPU Utilization link Figure 10 2 CPU Utilization window Click A...

Страница 217: ...Six windows are offered Received RX Click the Received RX link in the Packets folder of the Monitoring menu to view the following graph of packets received on the Switch Figure 10 3 Rx Packets Analys...

Страница 218: ...ond Record Number Select number of times the Switch will be polled between 20 and 200 The default value is 200 Bytes Counts the number of bytes received on the port Packets Counts the number of packet...

Страница 219: ...elect a port to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use t...

Страница 220: ...cond Record Number Select number of times the Switch will be polled between 20 and 200 The default value is 200 Unicast Counts the total number of good packets that were received by a unicast address...

Страница 221: ...or first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and...

Страница 222: ...s The default value is one second Record Number Select number of times the Switch will be polled between 20 and 200 The default value is 200 Bytes Counts the number of bytes successfully sent from the...

Страница 223: ...eived RX Click the Received RX link in the Errors folder of the Monitoring menu to view the following graph of error packets received on the Switch To select a port to view these statistics for first...

Страница 224: ...s that did not end on a byte octet boundary Under Size The number of packets detected that are less than the minimum permitted packets size of 64 bytes and have a good CRC Undersize packets usually in...

Страница 225: ...than a line graph View Line Chart Clicking this button instructs the Switch to display a line graph rather than a table Transmitted TX Click the Transmitted TX link in the Errors folder of the Monito...

Страница 226: ...of packets for which the first transmission attempt on a particular interface was delayed because the medium was busy LateColl Counts the number of times that a collision is detected later than 512 b...

Страница 227: ...ble Two windows are offered To select a port to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull d...

Страница 228: ...kets received that were 64 octets in length excluding framing bits but including FCS octets 65 127 The total number of packets including bad packets received that were between 65 and 127 octets in len...

Страница 229: ...rder in the stack see Box Information in the Configuration folder The number of switches in the switch stack up to 12 total are displayed in the upper right hand corner of your web browser The icons a...

Страница 230: ...Box ID of the Switch currently in use Current State Displays the current stacking state of the Switch which may be MASTER or SLAVE Box Count Displays the number of switches in the switch stack Device...

Страница 231: ...an association between a MAC address and a port number it makes an entry into its forwarding table These entries are then used to forward packets through the Switch To view the MAC Address forwarding...

Страница 232: ...MAC address was learned from Port The port that the MAC address above corresponds to Type How the Switch discovered the MAC address The possible entries are Dynamic Self and Static Next Click this bu...

Страница 233: ...history log is made The table displays the last entry highest sequence number first Time Displays the time in days hours and minutes since the Switch was last restarted Log Text Displays text describ...

Страница 234: ...rt Member These are the ports where the IGMP packets were snooped are displayed NOTE To configure IGMP snooping for the DXS 3326GSR go to the Configuration folder and select IGMP Configuration and oth...

Страница 235: ...onfigured by a user using the console or Web based management interfaces is displayed as a static router port designated by S A router port that is dynamically configured by the Switch is designated b...

Страница 236: ...DXS 3326GSR Gigabit Layer 3 Switch Figure 10 2 Authenticator State Port Based 802 1x window 2 223...

Страница 237: ...ndow and click Apply A polling interval between 1 and 60 seconds can be set using the drop down menu at the top of the window and clicking OK The information on this window is described as follows Par...

Страница 238: ...Unit ID by using the pull down menu in the top left hand corner The user may also select the desired time interval to update the statistics between 1s and 60s where s stands for seconds The default v...

Страница 239: ...Statistics This table contains the session statistics objects for the Authenticator PAE associated with each port An entry appears in this table for each port that supports the Authenticator function...

Страница 240: ...There are eight possible reasons for termination 1 Supplicant Logoff 2 Port Failure 3 Supplicant Restart 4 Reauthentication Failure 5 AuthControlledPortControl set to ForceUnauthorized 6 Port re initi...

Страница 241: ...ackend Authentication state machine indicating authentication failure authFail TRUE Auth Reauth Counts the number of times that the state machine transitions from AUTHENTICATING to ABORTING as a resul...

Страница 242: ...tes that the Supplicant has successfully authenticated to the Authentication Server Bac Auth Fail Counts the number of times that the state machine receives a Reject message from the Authentication Se...

Страница 243: ...d as malformed access responses BadAuthenticators The number of RADIUS Access Response packets containing invalid authenticators or Signature attributes received from this server PendingRequests The n...

Страница 244: ...d the Accounting Request that matched it from this RADIUS accounting server Requests The number of RADIUS Accounting Request packets sent This does not include retransmissions Retransmissions The numb...

Страница 245: ...dropped for some other reason Note To configure 802 1x features for the DXS 3326GSR go to the Configuration folder and select Port Access Entity Configuration and other information concerning 802 1x m...

Страница 246: ...ndow may be found in the Monitoring menu in the Layer 3 Feature folder This window shows the current IP routing table of the Switch To find a specific IP route enter an IP address into the Destination...

Страница 247: ...rface Name or an IP address and click Find To clear the ARP Table click Clear All Figure 10 31 ARP Table window Browse IP Multicast Forwarding Table The IP Multicast Forwarding Table window may be fou...

Страница 248: ...ion offers windows regarding OSPF Open Shortest Path First information on the Switch including the OSPF LSDB Table OSPF Neighbor Table and the OSPF Virtual Neighbor Table To view these tables open the...

Страница 249: ...ticast Group and NSSA Not So Stubby Area Adv Router ID Displays the Advertising Router s ID Link State ID This field identifies the portion of the Internet environment that is being described by the a...

Страница 250: ...e area s Area Border Router Figure 10 3 OSPF Virtual Neighbor Table window 6 DVMRP Monitor This menu allows the DVMRP Distance Vector Multicast Routing Protocol to be monitored for each IP interface d...

Страница 251: ...fic source to a specific multicast group address This table is found in the Monitoring menu under DVMRP Monitoring with the heading Browse DVMRP Routing Next Hop Table To search this table enter eithe...

Страница 252: ...ure 10 4 PIM Neighbor Table window 0 To search this table enter either an Interface Name or Neighbor Address into the respective field and click the Find button PIM neighbors of that entry will appear...

Страница 253: ...TP server switch settings can be saved to the TFTP server and a history log can be uploaded from the Switch to the TFTP server Download Firmware To update the Switch s firmware open the TFTP Services...

Страница 254: ...load Configuration File To download a configuration file from a TFTP server click on the TFTP Service folder in the Maintenance folder and then the Download Configuration File link Figure 11 2 Downloa...

Страница 255: ...t firmware images stored on the Switch To access the following window click Maintenance Multiple Image Services Firmware Information Figure 11 5 Firmware Information window This window holds the follo...

Страница 256: ...information Parameter Description Image Select the firmware image to be configured using the pull down menu The Switch allows two firmware images to be stored in the Switch s memory Active This field...

Страница 257: ...he settings will be immediately applied to the switching software in RAM and will immediately take effect Some settings though require you to restart the Switch before they will take effect Restarting...

Страница 258: ...option you choose in the Save Settings window Figure 11 9 Save Settings window only save configuration Figure 11 1 Save Settings window only save log 0 Figure 11 1 Save Settings window save configurat...

Страница 259: ...the factory 2 Figure 11 1 Factory Reset to Default Value window Reboot Device The following window is used to restart the Switch Figure 11 1 Restart System window 3 Clicking the Yes click box will in...

Страница 260: ...DXS 3326GSR Gigabit Layer 3 Switch Logout Use the Logout page to logout of the Switch s Web based management agent by clicking on the Log Out button Figure 11 14 Logout Web Setups window 247...

Страница 261: ...Switch CaS which is a Switch that has a physical link to the SIM group but has not been recognized by the CS as a member of the SIM group A SIM group can only have one Commander Switch CS All switches...

Страница 262: ...he Switch to be a MS The CS will then serve as the in band entry point for access to the MS The CS s IP address will become the path to all MS s of the group and the CS s Administrator s password and...

Страница 263: ...erval in seconds that the Switch will send out discovery packets Returning information to a Commander Switch will include information about other switches connected to it Ex MS CaS The user may set th...

Страница 264: ...six digits of the MAC Address to identify it Local Port Displays the number of the physical port on the CS that the MS or CaS is connected to The CS will have no entry in this field Speed Displays th...

Страница 265: ...thin the Single IP Management Group are connected to other groups and devices Possible icons in this screen are as follows Icon Description Group Layer 2 commander switch Layer 3 commander switch Comm...

Страница 266: ...viewing device information Setting the mouse cursor over a specific device in the topology window tool tip will display the same information about a specific device as the Tree view does See the wind...

Страница 267: ...pending on the role of the Switch in the SIM group and the icon associated with it Group Icon Figure 12 8 Right Clicking a Group Icon The following options may appear for the user to configure Collaps...

Страница 268: ...Figure 12 1 Right clicking a Commander Icon 0 The following options may appear for the user to configure Collapse To collapse the group that will be represented by a single icon Expand To expand the...

Страница 269: ...wing options may appear for the user to configure Collapse To collapse the group that will be represented by a single icon Expand To expand the SIM group in detail Remove from group Remove a member fr...

Страница 270: ...ed by a single icon Expand To expand the SIM group in detail Add to group Add a candidate to a group Clicking this option will reveal the following screen for the user to enter a password for authenti...

Страница 271: ...the number of the physical port on the MS or CaS that the CS is connected to The CS will have no entry in this field Local Port No Displays the number of the physical port on the CS that the MS or CaS...

Страница 272: ...including the current SIM version NOTE Upon this firmware release some functions of the SIM can only be configured through the Command Line Interface See the DXS 3326GSR Command Line Interface Refere...

Страница 273: ...the CS where the MS resides MAC Address Model Name and Version Figure 12 2 Configuration File Backup Restore window 0 To specify a certain Switch for upgrading configuration files click its correspond...

Страница 274: ...m x 45 mm Weight 5 5 kg EMC FCC Part 15 Class A IECES 003 Class Canada EN55022 Class A EN55024 Safety CSA International General Standards IEEE 802 3u 100BASE TX Fast Ethernet IEEE 802 3ab 1000BASE T G...

Страница 275: ...odule 40km Single mode fiber module 80km SFP Transceiver for 1000BASE LX Single mode fiber module 10km Number of Ports 24 Mini GBIC Ports 4 1000BASE T Combo ports Performance Transmission Method Store...

Страница 276: ...ing diagrams and tables show the standard RJ 45 receptacle connector and their pin assignments Appendix B 1 The standard RJ 45 port and connector RJ 45 Pin Assignments Contact MDI X Port MDI II Port 1...

Страница 277: ...mum Distance Mini GBIC 1000BASE LX Single mode fiber module 1000BASE SX Multi mode fiber module 1000BASE LHX Single mode fiber module 1000BASE ZX Single mode fiber module 10km 550m 40km 80km 1000BASE...

Страница 278: ...n the link can self detect its optimum operating setup backbone The part of a network used as the primary path for transporting traffic between network segments bandwidth Information capacity measured...

Страница 279: ...wire connectors for IEEE 802 3 10BASE T networks RMON Remote Monitoring A subset of SNMP MIB II that allows monitoring and management capabilities by addressing up to ten different groups of informati...

Страница 280: ...application program on another device VLAN Virtual LAN A group of location and topology independent devices that communicate as if they are on a common physical LAN VLT Virtual LAN Trunk A Switch to...

Страница 281: ...1 Giffnock Avenue Republic of South Africa 78330 Fontenay le Fleury North Ryde NSW 2113 TEL 27 12 665 2165 France Australia FAX 27 12 665 2186 TEL 33 1 30238688 TEL 61 2 8899 1800 URL www d link co z...

Страница 282: ...be to replace the non conforming Software or defective media with software that substantially conforms to D Link s functional specifications for the Software or to refund at D Link s sole discretion E...

Страница 283: ...OR COMPUTER PROGRAMS TO WHICH D LINK S PRODUCT IS CONNECTED WITH LOSS OF INFORMATION OR DATA CONTAINED IN STORED ON OR INTEGRATED WITH ANY PRODUCT RETURNED TO D LINK FOR WARRANTY SERVICE RESULTING FR...

Страница 284: ...For detailed warranty outside the United States please contact corresponding local D Link office Register online your D Link product at http support dlink com register...

Страница 285: ...the following questions help us to support your product 1 Where and how will the product primarily be used Home Office Travel Company Business Home Business Personal Use 2 How many employees work at i...

Страница 286: ......

Отзывы: