background image

xStack DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch 

Switch, which is used to determine the CoS queue to which packets are forwarded to. Once this 
field is specified, packets accepted by the Switch that match this priority are forwarded to the 
CoS queue specified previously by the user. 

replace priority  

 Click the corresponding box if you want to re-write the 802.1p default priority of 

a packet to the value entered in the Priority field, which meets the criteria specified previously in 
this command, before forwarding it on to the specified CoS queue. Otherwise, a packet will have 
its incoming 802.1p user priority re-written to its original value before being forwarded by the 
Switch. 
For more information on priority queues, CoS queues and mapping for 802.1p, see the QoS 
section of this manual. 

VLAN Name 

Allows the entry of a name for a previously configured VLAN. 

Source MAC 

Source MAC Address - Enter a MAC Address for the source MAC address. 

Destination MAC 

Destination MAC Address - Enter a MAC Address mask for the destination MAC address. 

802.1p (0-7) 

Enter a value from 0-7 to specify that the access profile will apply only to packets with this 802.1p 
priority value. 

Ethernet Type 

Specifies that the access profile will apply only to packets with this hexadecimal 802.1Q Ethernet 
type value (hex 0x0-0xffff) in the packet header. The Ethernet type value may be set in the form 
hex 0x0-0xffff, which means the user may choose any combination of letters and numbers 
ranging from a-f and from 0-9. 

Port 

The Access Rule may be configured on a per-port basis by entering the port number of the 
switch in the switch stack into this field. When a range of ports is to be configured, the 

Auto 

Assign

 check box MUST be clicked in the 

Access ID

 field of this window. If not, the user will be 

presented with an error message and the access rule will not be configured. The port list is 
specified by listing the lowest switch number and the beginning port number on that switch, 
separated by a colon. Then the highest switch number, and the highest port number of the range 
(also separated by a colon) are specified. The beginning and end of the port list range are 
separated by a dash. For example, 1:3 specifies switch number 1, port 3. 2:4 specifies switch 
number 2, port 4. 1:3 - 2:4 specifies all of the ports between switch 1, port 3 and switch 2, port 4 

 in numerical order. Entering 

all

 will denote all ports on the Switch. 

Rx Rate 

Use this to limit Rx bandwidth for the profile being configured. This rate is implemented using the 
following equation: 1 value = 64kbit/sec. (ex. If the user selects an Rx rate of 10 then the ingress 
rate is 640kbit/sec.) The user many select a value between 

1-156249

 or 

No Limit

. The default 

setting is No Limit. 

Time Range 

Click the check box and enter the name of the Time Range settings that has been previously 
configured in the 

Time Range

 window. This will set specific times when this access rule will be 

implemented on the Switch. 

To view the settings of a previously correctly configured rule, click 

 in the 

Access Rule Table

 to view the following screen: 

164 

     

Содержание xStack DGS-3426P

Страница 1: ...xStack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch User Manual Product Model TM DGS 3400 Series Layer 2 Gigabit EthernetManaged Switch Release 2 3 i...

Страница 2: ...Computer Corporation is strictly forbidden Trademarks used in this text D Link and the D LINK logo are trademarks of D Link Computer Corporation Microsoft and Windows are registered trademarks of Mic...

Страница 3: ...n Guidelines 9 Installing the Switch without the Rack 10 Installing the Switch in a Rack 10 Mounting the Switch in a Standard 19 Rack 11 Power On 11 Power Failure 11 Installing the SFP ports 12 The Op...

Страница 4: ...P Address 39 Setting the Switch s IP Address using the Console Interface 40 Interface Settings 41 IPv4 Interface Settings 41 IPv6 Interface Settings 42 Stacking 46 Stack Switch Swapping 47 Stacking Mo...

Страница 5: ...Trap Settings 81 SNMP User Table 81 SNMP View Table 83 SNMP Group Table 84 SNMP Community Table 86 SNMP Host Table 87 SNMP Engine ID 88 IP MAC Port Binding 89 ACL Mode 89 IP MAC Binding Port 91 IP MA...

Страница 6: ...ettings 128 Router Port Settings 129 ISM VLAN 131 Restrictions and Provisos 131 Limited Multicast Address Range 133 MLD Snooping 134 MLD Control Messages 134 MLD Snooping Settings 134 MLD Router Port...

Страница 7: ...186 Limitations Using the Guest VLAN 186 Guest VLAN 187 Configure 802 1X Authenticator 188 Configure 802 1x Guest VLAN 190 Authentic RADIUS Server 191 Trust Host 192 Access Authentication Control 193...

Страница 8: ...wse MLD Router Port 234 VLAN Status 235 Port Access Control 236 RADIUS Authentication 236 RADIUS Account Client 237 MAC Address Table 239 IGMP Snooping Group 240 MLD Snooping Group 241 Switch Logs 242...

Страница 9: ...Cable Lengths 255 Appendix D 256 Switch Log Entries 256 Glossary 268 Warranties Registration 270 Technical Support 278 International Offices 302...

Страница 10: ...ssages or prompts appearing on screen For example You have mail Bold font is also used to represent filenames program names and commands For example use the copy command Boldface Typewriter Font Indic...

Страница 11: ...nd Cautions A NOTE indicates important information that helps make better use of the device A NOTICE indicates either potential damage to hardware or loss of data and tells how to avoid the problem A...

Страница 12: ...penings of the system Doing so can cause fire or electric shock by shorting out interior components Use the product only with approved equipment Allow the product to cool before removing covers or tou...

Страница 13: ...ecific caution statements and procedures Systems are considered to be components in a rack Thus component refers to any system as well as to various peripherals or supporting hardware CAUTION Installi...

Страница 14: ...battery to explode Replace this battery only with the same or equivalent type recommended by the manufacturer Discard used batteries according to the manufacturers instructions Protecting Against Ele...

Страница 15: ...on D Link s next generation xStack DGS 3400 Series switches are high port density stackable switches that combine the ultimate performance with fault tolerance security management functions with flexi...

Страница 16: ...l Image Firmware Simple Network Time Protocol support MAC Notification support System and Port Utilization support System Log Support High performance switching engine performs forwarding and filterin...

Страница 17: ...Ports Two slots open for single port 10GE XFP or 10GBASE CX4 modules One RS 232 DB 9 console port DGS 3426P Twenty four PoE Compliant 10 100 1000BASE T Gigabit ports Four Combo SFP Ports Two slots op...

Страница 18: ...ront panel includes a seven segment LED indicating the Stack ID number A separate table below describes LED indicators in more detail DGS 3426P also includes a Mode Select button for changing the mode...

Страница 19: ...The Switch supports LED indicators for Power Console RPS and Port LEDs including 10GE port LEDs for optional module inserts Figure 2 5 LED Indicators on DGS 3450 Figure 2 6 LED Indicators on DGS 3427...

Страница 20: ...ng green light indicates activity on the port at 1000Mbps A steady orange light denotes a valid 10 or 100Mbps link on the port while a blinking orange light indicates activity on the port at 100Mbps T...

Страница 21: ...l module inserts Figure 2 11 Rear panel view of DGS 3427 DGS 3450 The rear panel of the DGS 3450 contains an AC power connector two empty slots for optional module inserts a redundant power supply con...

Страница 22: ...Leave at least 6 inches of space at the rear and sides of the Switch for proper ventilation Be reminded that without proper heat dissipation and air circulation system components might overheat which...

Страница 23: ...nes Please follow these guidelines for setting up the Switch Install the Switch on a sturdy level surface that can support at least 6 6 lb 3 kg of weight Do not place heavy objects on the Switch The p...

Страница 24: ...h ventilation space between the Switch and any other objects in the vicinity Figure 2 16 Prepare Switch for installation on a desktop or shelf Installing the Switch in a Rack The Switch can be mounted...

Страница 25: ...AC power cord into the power connector of the Switch and the other end into the local power source outlet 2 After powering on the Switch the LED indicators will momentarily blink This blinking of the...

Страница 26: ...g in order to uplink various other networking devices for a gigabit link that may span great distances These SFP ports support full duplex transmissions have auto negotiation and can be used with DEM...

Страница 27: ...herefore has a transmit length limit up to 1 meter Compliant with the IEEE802 3ak standard this module uses a 4 laned copper connector for data transfer in full duplex mode within a stacking configura...

Страница 28: ...ches the back as shown in the following figure Gently but firmly push in on the module to secure it to the Switch The module should fit snugly into the corresponding receptors Figure 2 22 Inserting th...

Страница 29: ...edundant power system The diagrams below illustrate a proper RPS power connection to the Switch Please consult the documentation for information on power cabling and connectors and setup procedure Fig...

Страница 30: ...Switch Series the DGS 3426P utilizes the DPS 600 as its External Redundant Power Supply The DPS 600 is the ONLY RPS to be used with the DGS 3426P NOTE See the DPS 500 or DPS 600 documentation for more...

Страница 31: ...acket activity on that port Switch to Switch There is a great deal of flexibility on how connections are made using the appropriate cabling Connect a 10BASE T hub or switch to the Switch via a twisted...

Страница 32: ...e copper ports operate at a speed of 1000 100 or 10Mbps in full or half duplex mode The fiber optic ports can operate at 1000Mbps in full duplex mode only Connections to the Gigabit Ethernet ports are...

Страница 33: ...configure the Switch monitor the LED panel and display statistics graphically using a web browser such as Netscape Navigator version 6 2 and higher or Microsoft Internet Explorer version 5 0 2 SNMP Ba...

Страница 34: ...000 Service Pack 2 or later is installed Windows 2000 Service Pack 2 allows use of arrow keys in HyperTerminal s VT100 emulation See www microsoft com for information on Windows 2000 service packs Aft...

Страница 35: ...gure 4 1 Boot up display in console screen DGS 3427 Managing the Switch for the First Time The Switch supports user based security that can allow prevention of unauthorized users from accessing the Sw...

Страница 36: ...predefined administrator level user name will give the user privileged access to the Switch s management software After the initial login define new passwords for both default user names to prevent un...

Страница 37: ...nager Command create account admin newmanager Enter a case sensitive new password Enter the new password again for confirmation Success DGS 34xx 4 NOTICE CLI configuration commands only modify the run...

Страница 38: ...uthentication process that is separated into two parts The first part is to maintain a list of users and their attributes that are allowed to act as SNMP managers The second part describes what each u...

Страница 39: ...manager The Switch IP address can be automatically set using BOOTP or DHCP protocols in which case the actual address assigned to the Switch must be known The IP address may be set using the Command...

Страница 40: ...t and the CLI or via the Web based management NOTE The DGS 3400 series of switches have the capability to be configured for an IP address of 0 0 0 0 or in essence have no IP address This function mayb...

Страница 41: ...icate directly with the Switch using the HTTP protocol The Web based management module and the Console program and Telnet are different ways to access the same internal switching software and configur...

Страница 42: ...rface Three distinct areas divide the user interface as described in the table Area 2 Area 1 Area 3 Figure 5 2 Main Web Manager Screen Area Function Area 1 Select the menu or window to display Open fo...

Страница 43: ...sub directories Bandwidth Control QoS Scheduling Mechanism QoS Output Scheduling 802 1p Default Priority and 802 1p User Priority ACL Contains the following menu pages and sub directories Time Range A...

Страница 44: ...tacking Port Configuration User Accounts Port Mirroring System Log System Severity Settings SNTP Settings MAC Notification Settings TFTP Services Multiple Image Services Ping Test Safeguard Engine Sta...

Страница 45: ...IGMP Snooping capability select Enabled IGMP snooping is Disabled by default Enabling IGMP snooping allows the user to specify use of a multicast router only see below To configure IGMP Snooping for i...

Страница 46: ...lgorithm that the Switch uses to balance the load across the ports that make up the port trunk group is defined by this definition Choose MAC Source MAC Destination MAC Src Dest IP Source IP Destinati...

Страница 47: ...the method of assigning an IP address to an interface has become cleaner and quicker Unicast and multicast addresses still exist but in a purer form and multicast addresses now have a scope field whi...

Страница 48: ...an identical set of options In this way router can process these packets more efficiently once the flow class has been identified and the rest of the packet header no longer needs to be fully process...

Страница 49: ...o split these packets into fragments in individual packets which will be rebuilt when it reaches its final destination Each of the packets that will be fragmented is given an Identification value by t...

Страница 50: ...prefixes to produce unique IPv6 addresses which will limit global routing table entries The MAC address of the device is used to produce this address in this form Global Routing Prefix Site Level Agg...

Страница 51: ...reachability of routers as well as if changes occur within link layer addresses of nodes on the network or identical unicast addresses are present on the local link The functionality of the Neighbor D...

Страница 52: ...es are considered as one interface on the Internet layer multiple unicast addresses may be alloted to multiple physical interfaces which would be beneficial for load sharing on these interfaces This i...

Страница 53: ...te IP Address and Subnet Mask 3 If accessing the Switch from a different subnet from the one it is installed on enter the IP address of the Default Gateway If managing the Switch from the subnet on wh...

Страница 54: ...sses are entered in the Security IP Management menu If VLANs have not yet been configured for the Switch the default VLAN contains all of the Switch s ports There are no entries in the Security IP Man...

Страница 55: ...ngs link the following window will be displayed for the user to view Figure 6 3 IPv4 Interface Settings window To manually assign the Switch s IPv4 address and its related configurations click the Add...

Страница 56: ...dress is 10 90 90 90 with a subnet mask of 255 0 0 0 and a default gateway of 0 0 0 0 IPv6 Interface Settings The following window is used to setup IPv6 interfaces and addresses for the switch To acce...

Страница 57: ...v6 address created automatically by the Switch based on the MAC Address of the Switch This is a site local address used only for local routing Global Unicast Address This field is the unicast address...

Страница 58: ...able or disable the switch as being capable of accepting solicitation from a neighbor and thus becoming an IPv6 neighbor Once enabled this Switch is now capable of producing Router Advertisement messa...

Страница 59: ...onds and no more than 1800 seconds The user may configure a time between 4 and 1800 seconds with a default setting of 600 seconds RA Min Router AdvInterval Used to set the minimum interval time betwee...

Страница 60: ...n then data transfer will obviously be affected Figure 6 9 Switches stacked in a Duplex Ring Figure 6 10 Switches stacked in a Duplex Chain Within each of these topologies each switch plays a role in...

Страница 61: ...fer of data between switches in the stack with a few minor provisions When switches are hot inserted into the running stack the new switch may take on the Backup Master or Slave role depending on conf...

Страница 62: ...gure stacking parameters associated with all switches in the xStack DGS 3400 Series The user may configure parameters such as box ID box priority and pre assigning model names to switches to be entere...

Страница 63: ...o connections running a 1000BASE T cable for connection between the Switch port and other device capable of a gigabit connection The master setting 1000M Full_M will allow the port to advertise capabi...

Страница 64: ...is defines the type of transport medium to be used whether copper or fiber Click Apply to implement the new settings on the Switch Port Error Disabled The following window will display the information...

Страница 65: ...w the following window First use the Unit pull down menu to choose the switch in the stack to be configured and then the From and To pull down menu to choose a port or range of ports to describe Users...

Страница 66: ...re 6 17 User Accounts Add Add a new user by typing in a User Name and New Password and retype the same password in the Confirm New Password Choose the level of privilege Admin or User from the Access...

Страница 67: ...ou cannot mirror a fast port onto a slower port For example if you try to mirror the traffic from a 100 Mbps port onto a 10 Mbps port this can cause throughput problems The port you are copying frames...

Страница 68: ...Managed Switch 2 If the device hot removed from the stack holds the target port for the mirroing function the primary master will disable the mirroing function for the whole stack 3 Stacking ports ca...

Страница 69: ...em Log Server In the Administration folder click System Log Settings System Log Host to view the window shown below Figure 6 20 System Log Host list The parameters configured for adding and editing Sy...

Страница 70: ...sages generated internally by syslog line printer subsystem network news subsystem UUCP subsystem clock daemon security authorization messages FTP daemon NTP subsystem log audit log alert clock daemon...

Страница 71: ...ration field The user may set a time between 1 and 65535 minutes The default setting is one minute On Demand Users who choose this method will only save log files when they manually tell the Switch to...

Страница 72: ...scribed below Parameter Description System Severity Choose how the alerts are used from the drop down menu Select log to send the alert of the Severity Type configured to the Switch s log for analysis...

Страница 73: ...ource Displays the time source for the system Current Time SNTP Settings SNTP State Use this pull down menu to Enabled or Disabled SNTP SNTP Primary Server The IP address of the primary server from wh...

Страница 74: ...begin DST on Saturday during the second week of April and end DST on Sunday during the last week of October From Which Day Enter the week of the month that DST will start From Day of Week Enter the da...

Страница 75: ...he Switch Interval sec The time in seconds between notifications History size The maximum number of entries listed in the history log used for notification Up to 500 entries can be specified Port Sett...

Страница 76: ...Upload Log Enter the IP address of the TFTP server and the path and filename for the history log on the TFTP server Click Start to record the IP address of the TFTP server and to initiate the file tra...

Страница 77: ...ze States the size of the corresponding firmware in bytes Update Time States the specific time the firmware version was downloaded to the Switch From States the IP address of the origin of the firmwar...

Страница 78: ...memory and either can be configured to be the boot up firmware for the Switch The user may select a boot up firmware image for the Switch in the switch stack by using the Image pull down window to se...

Страница 79: ...ng window is used to Ping an IPv4 address To locate this window open the Administration folder and click Ping Test IPv4 Ping Test Figure 6 31 Ping Test window The user may use Infinite times radio but...

Страница 80: ...ic interface for a link local IPv6 address For Global IPv6 addresses this field may be omitted Repeat Times Enter the number of times desired to attempt to ping the IPv6 address configured in this win...

Страница 81: ...many packets flooding the Switch it will stop accepting all ARP and IP broadcast packets and packets from untrusted IP addresses for double the time of the previous stop period This doubling of time f...

Страница 82: ...uard Engine mechanism is enabled Once the CPU utilization reaches this percentage level the Switch will move into Safeguard Engine state based on the parameters provided in this window Falling Used to...

Страница 83: ...5 Static ARP Settings window To add a new entry click the Add button revealing the following screen to configure Figure 6 36 Static ARP Settings Add window To modify a current entry click the correspo...

Страница 84: ...To view this window open the Administration folder and click IPv6 Neighbor IPv6 Neighbor Settings Figure 6 38 IPv6 Neighbor Settings window The following fields can be viewed Parameter Description Ne...

Страница 85: ...nter the specific interface for a link local IPv6 address For Global IPv6 addresses this field may be omitted Neighbor IPv6 Address The IPv6 address of the neighbor entry Specify the address using the...

Страница 86: ...down If the primary route is lost the backup route will uplink and its status will become Active IPv4 Static Default Route Settings Entries into the Switch s forwarding table can be made using both MA...

Страница 87: ...kup State The user may choose between Primary and Backup If the Primary Static Default Route fails the Backup Route will support the entry Please take note that the Primary and Backup entries cannot h...

Страница 88: ...this will be the default IPv6 route Choosing this option will allow the user to configure the default gateway for the next hop router only The following fields can be set Parameter Description Interfa...

Страница 89: ...nes the maximum time limit for routing a DHCP BOOTP packet If a value of 0 is entered the Switch will not process the value in the seconds field of the BOOTP or DHCP packet If a non zero value is ente...

Страница 90: ...field can be toggled between Replace Drop and Keep by using the pull down menu It is used to set the Switches policy for handling packets when the DHCP Relay Agent Information Option 82 Check is set t...

Страница 91: ...t 1 2 3 4 5 6 7 1 6 0 4 VLAN Module Port 1 byte 1 byte 1 byte 1 byte 2 bytes 1 byte 1 byte a Sub option type b Length c Circuit ID type d Length e VLAN the incoming VLAN ID of DHCP client packet f Mod...

Страница 92: ...clicks the Add button under the Apply heading The user may add up to four server IPs per IP interface on the Switch Entries may be deleted by clicking the corresponding button To enable and configure...

Страница 93: ...server must be up and running and hold the necessary configuration file stored in its base directory when the request is received from the Switch For more information about loading a configuration fil...

Страница 94: ...llowed to view read only information or receive traps using SNMPv1 while assigning a higher level of security to another group granting read write privi leges using SNMPv3 Using SNMPv3 individual user...

Страница 95: ...click Apply SNMP User Table The SNMP User Table displays all of the SNMP users currently configured on the Switch In the SNMP Manager folder located in the Administration folder click on the SNMP Use...

Страница 96: ...ters This is used to identify the SNMP user Group Name This name is used to specify the SNMP group created can request SNMP messages SNMP Version V1 Specifies that SNMP version 1 will be used V2 Speci...

Страница 97: ...onfiguration window The SNMP Group created with this table maps SNMP users identified in the SNMP User Table to the views created in the previous window The following parameters can set Parameter Desc...

Страница 98: ...ppear Figure 6 54 SNMP Group Table window To delete an existing SNMP Group Table entry click the corresponding under the Delete heading To display the current settings for an existing SNMP Group Table...

Страница 99: ...ributed network management strategies It includes improvements in the Structure of Management Information SMI and adds some security features SNMPv3 Specifies that the SNMP version 3 will be used SNMP...

Страница 100: ...open the following window Figure 6 57 SNMP Community Table Configuration window The following parameters can set Parameter Description Community Name Type an alphanumeric string of up to 32 characters...

Страница 101: ...the SNMP Host Table Configuration window as shown below Figure 6 59 SNMP IPv4 Host Table Configuration window The following parameters can set Parameter Description Host IPv4 Address Type the IPv4 ad...

Страница 102: ...that the SNMP version 3 will be used with an Auth Priv security level Community String or SNMP V3 User Name Type in the community string or SNMP V3 user name as appropriate To implement your new sett...

Страница 103: ...this problem for users When enabled in the IP MAC Binding Port window the Switch will create two entries in the Access Profile Table as shown below The entries may only be created if there are at lea...

Страница 104: ...inoperable due to the overlapping of settings combined with the ACL entry priority defined by profile ID For more information on ACL settings please see Configuring the Access Profile section mentione...

Страница 105: ...t Binding folder on the Administration Menu to open the IP MAC Binding Ports Settings window Select a port or a range of ports with the From and To fields Enable or disable the port with the State fie...

Страница 106: ...can only be automatically installed if the Access Profile table has two entries available of the possible 255 entries allowed ACL Binding Trap Log This field will enable and disable the sending of tr...

Страница 107: ...MAC Port Binding folder on the Administration menu to open the IP MAC Binding Blocked window Figure 6 68 IP MAC Binding Blocked window To find an unauthorized device that has been blocked by the IP M...

Страница 108: ...2 3 84 to 6 49W 3 6 49 to 12 95W To configure the PoE features on the DGS 3426P click Administration PoE Configuration The PoE System window is used to assign a power limit and power disconnect method...

Страница 109: ...he lowest priority to shut down to allow the high priority and critical priority ports to power up Management Mode Use the pull down menu to set the Management Mode for PoE ports The user has two choi...

Страница 110: ...of ports from the pull down menus to be enabled or disabled for PoE State Use the pull down menu to enable or disable ports for PoE Priority Use the pull down menu to select the priority of the PoE p...

Страница 111: ...er Switch numbered 0 There is no limit to the number of SIM groups in the same IP subnet broadcast domain however a single switch can only belong to one group If multiple VLANs are configured the SIM...

Страница 112: ...eft the SIM group either through a reboot or web malfunction This feature is accomplished through the use of Discover packets and Maintenance packets that previously set SIM members will emit after a...

Страница 113: ...Web Interface All xStack DGS 3400 Series Switches are set as Candidate CaS switches as their factory default configuration and Single IP Management will be disabled To enable SIM for the Switch using...

Страница 114: ...ilizing the Discovery Interval The user may set the hold time from 100 to 255 seconds Click Apply to implement the settings changed After enabling the Switch to be a Commander Switch CS the Single IP...

Страница 115: ...configured by the name it will be given the name default and tagged with the last six digits of the MAC Address to identify it Local Port Displays the number of the physical port on the CS that the M...

Страница 116: ...ement Group connect to other groups and devices Possible icons in this screen are as follows Icon Description Group Layer 2 commander switch Layer 3 commander switch Commander switch of other group La...

Страница 117: ...or over a specific device in the topology window tool tip will display the same information about a specific device as the Tree view does See the window below for an example Figure 6 75 Device Informa...

Страница 118: ...ption Device Name This field will display the Device Name of the switches in the SIM group configured by the user If no Device Name is configured by the name it will be given the name default and tagg...

Страница 119: ...igure 6 80 Right Clicking a Member icon The following options may appear for the user to configure Collapse to collapse the group that will be represented by a single icon Expand to expand the SIM gro...

Страница 120: ...ve menus on the menu bar are as follows File Print Setup will view the image to be printed Print Topology will print the topology map Preference will set display properties such as polling interval an...

Страница 121: ...g MLD Snooping Spanning Tree Forwarding and Filtering The following section will aid the user in configuring security functions for the Switch The Switch includes various functions for VLAN Trunking I...

Страница 122: ...ptied of packets The ratio used for clearing the queues is 4 1 This means that the highest priority queue Queue 7 will clear 4 packets for every 1 packet cleared from Queue 0 Remember the priority que...

Страница 123: ...tations that are members of the VLAN Any port can be configured as either tagging or untagging The untagging feature of IEEE 802 1Q VLANs allows VLANs to work with legacy switches that don t recognize...

Страница 124: ...94 unique VLANs can be identified The tag is inserted into the packet header making the entire packet longer by 4 octets All of the information originally contained in the packet is retained Figure 7...

Страница 125: ...into the header of all packets that flow into and out of it If a packet has previously been tagged the port will not alter the packet thus keeping the VLAN information intact Other 802 1Q compliant d...

Страница 126: ...e dropped by the Switch and will not reach its destination If Port 10 is a member of VLAN 2 the packet will go through This selective forwarding feature based on VLAN criteria is how VLANs segment net...

Страница 127: ...tch may cause discrepancies within the local network and failure to define the VLAN to which to forward packets Static VLAN Entry In the Layer 2 Features folder click VLAN Static VLAN Entries to open...

Страница 128: ...y click the Modify button of the corresponding entry to modify A new menu will appear to configure the port settings and to assign a unique name and number to the new VLAN See the table below for a de...

Страница 129: ...ent with this protocol This packet header information is defined by Novell NetWare 802 3 IPX Internet Packet Exchange IPX 802 2 Using this parameter will instruct the Switch to forward packets to this...

Страница 130: ...ader The user may define an entry in the hexadecimal form ffff to define the packet identification The user only need enter the final four integers of the hexadecimal format to define the packet ID he...

Страница 131: ...PVID The read only field in the 802 1Q Port Table shows the current PVID assignment for each port which may be manually assigned to a VLAN when created in the 802 1Q Port Settings table The Switch s d...

Страница 132: ...to be encapsulated within the VLAN tag of the packet This identifies the packet as double tagged and segregates it from other VLANs on the network therefore creating a hierarchy of VLANs within a sing...

Страница 133: ...es of at least 1522 bytes or more due to the addition of the SPVID tag 4 Access Ports must be an un tagged port of the service provider VLANs Uplink Ports must be a tagged port of the service provider...

Страница 134: ...LAN Table Parameters shown in the previous window are explained below Parameter Description Double VLAN State Use the pull down menu to enable or disable the Double VLAN function on this Switch Enabli...

Страница 135: ...be configured as uplink ports Access Ports These are the ports that are set as access ports on the Switch Access ports are for connecting Switch VLANs to customer VLANs Gigabit ports cannot be config...

Страница 136: ...ID Will allow users to configure the Tagged Protocol ID of the Service Provider VLAN in hex form Port Type Allows the user to choose the type of port being utilized by the Service Provider VLAN The us...

Страница 137: ...ies supports up to 32 port trunk groups with 2 to 8 ports in each group A potential bit rate of 8000 Mbps can be achieved Figure 7 14 Example of Port Trunk Group The Switch treats all ports in a trunk...

Страница 138: ...e Master Port of the group is to be configured by the user and all configuration options including the VLAN configuration that can be applied to the Master Port are applied to the entire link aggregat...

Страница 139: ...ack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch Figure 7 16 Link Aggregation Settings Add Figure 7 17 Link Aggregation Settings window Modify The user changeable parameters are as follows...

Страница 140: ...a group Flooding Port A trunking group must designate one port to allow transmission of broadcasts multicasts and unknown unicasts Active Port Shows the port that is currently forwarding packets Type...

Страница 141: ...s are capable of processing and sending LACP control frames This allows LACP compliant devices to negotiate the aggregated link so the group may be changed dynamically as needs require In order to uti...

Страница 142: ...atures folder When enabled for IGMP snooping the Switch can open or close a port to a specific multicast group member based on IGMP messages sent from the device to the IGMP host or vice versa The Swi...

Страница 143: ...issuing a group membership query If no response to the membership query is received before the Leave Timer expires the multicast forwarding entry for that host is deleted The default setting is 2 sec...

Страница 144: ...ed VLAN Name This is the name of the VLAN where the multicast router is attached Member Ports Ports on the Switch that will have a multicast router attached to them There are three options for which t...

Страница 145: ...LAN feature of this switch does have some restrictions and limitations such as 1 Multicast VLANs can only be implemented on edge switches 2 Member ports and source ports can be used in multiple ISM VL...

Страница 146: ...indow Parameter Description VLAN Name This is the VLAN Name that along with the VLAN ID identifies the VLAN the user wishes to modify VID 2 4094 This is the VLAN ID that along with the VLAN Name ident...

Страница 147: ...ure the parameters described below Figure 7 27 Limited Multicast Address Range Click Apply to implement the new settings on the Switch Click Delete to remove the configured range from the settings Cli...

Страница 148: ...ng multicast data There are two types of MLD query messages emitted by the router The General Query is used to advertise all multicast addresses that are ready to send multicast data to all listening...

Страница 149: ...If a subnet is expected to be lossy the user may wish to increase this interval Last Listener Query Interval The maximum amount of time to be set between group specific query messages This interval m...

Страница 150: ...rier devices present Calculated as robustness variable query interval 0 5 query response interval Last Listener Query Count The amount of group specific queries sent before the router assumes there ar...

Страница 151: ...ne Click this option to not set these ports as router ports Static Click this option to designate a range of ports as being connected to a multicast enabled router This command will ensure that all pa...

Страница 152: ...dge Global Settings window and 4 A 4096 element table defined here as a VID List in the MST Configuration Identification window which will associate each of the possible 4096 VLANs supported by the Sw...

Страница 153: ...introduces two new variables the edge port and the point to point P2P port Edge Port The edge port is a configurable designation used for a port that is directly connected to a segment where a loop ca...

Страница 154: ...r 2 Features menu and click the STP Bridge Global Settings link Use the STP Status pull down selector to enable or disable STP globally and choose the STP method used with the STP Version menu Figure...

Страница 155: ...value ages out and a BPDU has still not been received from the Root Bridge the Switch will start sending its own BPDU to all other switches for permission to become the Root Bridge If it turns out tha...

Страница 156: ...to the device running MSTP This field can be set in the STP Bridge Global Settings window Revision Level This value along with the Configuration Name will identify the MSTP region configured on the S...

Страница 157: ...h range from ID number 1 to 4094 This field is inoperable when configuring the CIST Click Apply to implement changes made To configure the parameters for a previously set MSTI click on its hyperlinked...

Страница 158: ...cular MSTI Instance click on its hyperlinked MSTI ID which will reveal the following window Figure 7 40 MSTI Settings The user may configure the following parameters Parameter Description Instance ID...

Страница 159: ...stance Status Displays the current status of the corresponding MSTI ID Instance Priority Displays the priority of the corresponding MSTI ID The lowest priority will be the root bridge Click Apply to i...

Страница 160: ...n edge port Edge ports cannot create loops however an edge port can lose edge port status if a topology change creates a poten tial for a loop An edge port normally should not receive BPDU packets If...

Страница 161: ...half duplex operation the p2p status changes to operate as if the p2p value were false The default setting for this parameter is true State This drop down menu allows you to enable or disable STP for...

Страница 162: ...k Add to implement the changes made To delete an entry in the Static Unicast Forwarding Table click the corresponding under the Delete heading Multicast Forwarding The following figure and table descr...

Страница 163: ...ast Forwarding Entries link to return to the Static Multicast Forwarding Settings window Multicast Filtering Mode Open the Forwarding Filtering folder and click on the Multicast Filtering Mode link to...

Страница 164: ...e Default QoS Mapping on the Switch The picture above shows the default priority setting for the Switch Class 6 has the highest priority of the seven priority classes of service on the Switch In order...

Страница 165: ...he number of packets sent from each priority queue depends upon the assigned weight For a configuration of 8 CoS queues A H with their respective weight value 8 1 the packets are sent in the following...

Страница 166: ...starting with the selected port Type This drop down menu allows a selection between RX receive TX transmit and Both This setting will determine whether the bandwidth ceiling is applied to receiving tr...

Страница 167: ...echanism to view the screen shown below Figure 7 50 QoS Scheduling Mechanism window The Scheduling Mechanism has the following parameters Parameter Description Strict The highest class of service is t...

Страница 168: ...ngs are not suitable In the Configuration folder open the QoS folder and click QoS Output Scheduling to view the screen shown below Figure 7 51 QoS Output Scheduling Configuration window The following...

Страница 169: ...ax Packet field this class of service will automatically begin forwarding packets until it is empty Once a priority class of service with a 0 in its Max Packet field is empty the remaining priority cl...

Страница 170: ...7 53 802 1p Default Priority window This page allows the user to assign a default 802 1p priority to any given port on the Switch The priority tags are numbered from 0 the lowest priority to 7 the hi...

Страница 171: ...each of the 802 1p priorities In the Configuration folder open the QoS folder and click 802 1p User Priority to view the screen shown below Figure 7 54 802 1p User Priority window Once a priority has...

Страница 172: ...user may adjust the following parameters to configure a time range on the Switch Parameter Description Range Name Enter a name of no more than 32 alphanumeric characters that will be used to identify...

Страница 173: ...ile Configuration pages one for Ethernet or MAC address based profile configuration one for IP address based profile configuration and one IPv6 You can switch between the three Access Profile Configur...

Страница 174: ...rame s header To view the settings for a created profile click its corresponding button in the Access Profile table revealing the following window Figure 8 4 Access Profile Entry Display for Ethernet...

Страница 175: ...y a source port mask and or a destination port mask src port mask Specify a TCP port mask for the source port in hex form hex 0x0 0xffff which you wish to filter dst port mask Specify a TCP port mask...

Страница 176: ...ne the class field of the IPv6 header This class field is a part of the packet header that is similar to the Type of Service ToS or Precedence bits field in IPv4 Flow Label Checking this field will in...

Страница 177: ...ss profile are forwarded by the Switch according to any additional rule added see below Select Deny to specify that packets that do not match the access profile are not forwarded by the Switch and wil...

Страница 178: ...y combination of letters and numbers ranging from a f and from 0 9 Port The Access Rule may be configured on a per port basis by entering the port number of the switch in the switch stack into this fi...

Страница 179: ...ess Profile Table link opening the Access Profile Table Under the heading Access Rule clicking Modify will open the following window Figure 8 12 Access Rule Table window IP To create a new rule set fo...

Страница 180: ...in the Switch which is used to determine the CoS queue to which packets are forwarded Once this field is specified packets accepted by the Switch that match this priority are forwarded to the CoS queu...

Страница 181: ...ning and end of the port list range are separated by a dash For example 1 3 specifies switch number 1 port 3 2 4 specifies switch number 2 port 4 1 3 2 4 specifies all of the ports between switch 1 po...

Страница 182: ...itch which is used to determine the CoS queue to which packets are forwarded to Once this field is specified packets accepted by the Switch that match this priority are forwarded to the CoS queue spec...

Страница 183: ...ied The beginning and end of the port list range are separated by a dash For example 1 3 specifies switch number 1 port 3 2 4 specifies switch number 2 port 4 1 3 2 4 specifies all of the ports betwee...

Страница 184: ...with the frame The entire process is described below CPU Interface Filtering State Settings In the following window the user may globally enable or disable the CPU Interface Filtering mechanism by usi...

Страница 185: ...ntent of the packet header VLAN Selecting this option instructs the Switch to examine the VLAN identifier of each packet header and use this as the full or partial criterion for forwarding Source MAC...

Страница 186: ...ce IP Mask Enter an IP address mask for the source IP address Destination IP Mask Enter an IP address mask for the destination IP address DSCP Selecting this option instructs the Switch to examine the...

Страница 187: ...hex 0x0 0xffff which you wish to filter Select UDP to use the UDP port number contained in an incoming packet as the forwarding criterion Selecting UDP requires that you specify a source port mask and...

Страница 188: ...cket header Select IP to instruct the Switch to examine the IP address in each frame s header Select Packet Content Mask to specify a mask to hide the content of the packet header Offset This field wi...

Страница 189: ...Table In this window the user may add a rule to a previously created CPU access profile by clicking the corresponding Modify button of the entry to configure Ethernet IP or Packet Content Each entry...

Страница 190: ...layer 2 part of each packet header IP instructs the Switch to examine the IP address in each frame s header Packet Content Mask instructs the Switch to examine the packet header VLAN Name Allows the e...

Страница 191: ...e Display Ethernet The following window is the CPU Interface Filtering Rule Table for IP Figure 8 29 CPU Interface Filtering Rule Table IP To create a new rule set for an access profile click the Add...

Страница 192: ...h frame s header Packet Content Mask instructs the Switch to examine the packet header VLAN Name Allows the entry of a name for a previously configured VLAN Source IP Source IP Address Enter an IP Add...

Страница 193: ...rface Filtering Rule Table for Packet Content Figure 8 32 CPU Interface Filtering Rule Table Packet Content To remove a previously created rule select it and click the button To add a new Access Rule...

Страница 194: ...nstructs the Switch to examine the packet header Offset This field will instruct the Switch to mask the packet header beginning with the offset value specified value 0 15 Enter a value in hex form to...

Страница 195: ...scan and monitor packets coming into the Switch by monitoring the Switch s chip counter This method is only viable for Broadcast and Multicast storms because the chip only has counters for these two t...

Страница 196: ...ed on the Threshold value stated and drop packets until the issue is resolved Shutdown Utilizes the Switch s software Traffic Control mechanism to determine the Packet Storm occurring Once detected th...

Страница 197: ...are set for Link Aggregation Port Trunking NOTE Ports that are in the Shutdown Forever mode will be seen as Discarding in Spanning Tree windows and implementations though these ports will still be for...

Страница 198: ...ified From To A consecutive group of ports may be configured starting with the selected port Admin State This pull down menu allows the user to enable or disable Port Security locked MAC address table...

Страница 199: ...deleted Click the Next button to view the next page of entries listed in this table Figure 9 3 Port Lock Entries Table This window displays the following information Parameter Description VID The VLA...

Страница 200: ...ing to access the Switch Upon initial entry to the Switch the client wishing services on the Switch will need to be authenticated by a remote RADIUS Server or local authentication on the Switch to be...

Страница 201: ...uring the Guest 802 1X VLAN which are Enable Ports Selecting this option will enable ports listed in the Port List below as part of the Guest VLAN Be sure that these ports are configured for this VLAN...

Страница 202: ...lick Security 802 1X Configure 802 1X Authenticator Parameter The user may toggle between switches in the switch stack by using the Unit pull down menu Figure 9 6 Configure 802 1X Authenticator Parame...

Страница 203: ...y the client to authenticate The Switch cannot provide authentication services to the client through the interface If Auto is selected it will enable 802 1X and cause the port to begin in the unauthor...

Страница 204: ...igure 802 1x Guest VLAN In the Security menu open the 802 1x folder and click Configure 802 1x Guest VLAN which will display the following window for the user to configure Remember to set a Guest 802...

Страница 205: ...r and Current RADIUS Server Settings Table window This window displays the following information Parameter Description Succession Choose the desired RADIUS server to configure First Second or Third RA...

Страница 206: ...le this feature be sure to first enter the IP address of the station you are currently using To configure secure IP addresses for trusted host management of the Switch type the IP address of the stati...

Страница 207: ...e Switch The server will not accept the username and password and the user is denied access to the Switch The server doesn t respond to the verification query At this point the Switch receives the tim...

Страница 208: ...default setting is 30 seconds User Attempts 1 255 This command will configure the maximum number of times the Switch will accept authentication attempts Users failing to be authenticated after the se...

Страница 209: ...Groups on the Switch A server group is a technique used to group TACACS XTACACS TACACS RADIUS server hosts into user defined categories for authentication using method lists The user may define the ty...

Страница 210: ...window will set user defined Authentication Server Hosts for the TACACS XTACACS TACACS RADIUS security protocols on the Switch When a user attempts to access the Switch with Authentication Policy enab...

Страница 211: ...er of the authentication protocol on a server host The default port number is 49 for TACACS XTACACS TACACS servers and 1813 for RADIUS servers but the user may set a unique port number for higher secu...

Страница 212: ...ocal account privilege configured on the Switch Successful login using any of these techniques will give the user a User privilege only If the user wishes to upgrade his or her status to the administr...

Страница 213: ...r she must be authenticated by a method on the Switch to gain administrator privileges on the Switch which is defined by the Administrator A maximum of eight 8 Enable Method Lists can be implemented o...

Страница 214: ...st be set by the user in the next section entitled Local Enable Password none Adding this parameter will require no authentication to access the Switch radius Adding this parameter will require the us...

Страница 215: ...cal Enabled field will result in a fail message Click Apply to implement changes made Enable Admin The Enable Admin window is for users who have logged on to the Switch on the normal user level and wi...

Страница 216: ...ure 9 25 Current Traffic Segmentation Table Click on the Setup button to open the Setup Forwarding ports menu as shown below Figure 9 26 Setup Forwarding Ports Configuring traffic segmentation on the...

Страница 217: ...allows the user to choose a message digest function which will determine a Message Authentication Code This Message Authentication Code will be encrypted with a sent message to provide integrity and...

Страница 218: ...me disabled To manage the Switch through the web based management while utilizing the SSL function the web browser must support SSL encryption and the header of the URL must begin with https Ex https...

Страница 219: ...Enabled by default RSA EXPORT with RC4 40 MD5 This ciphersuite combines the RSA Export key exchange and stream cipher RC4 encryption with 40 bit keys Use the pull down menu to enable or disable this c...

Страница 220: ...d using the SSH protocol 2 Configure the User Account to use a specified authorization method to identify users that are allowed to establish SSH connections with the Switch using the SSH User Authent...

Страница 221: ...ing This field is used to set the time period that the Switch will change the security shell encryptions by using the pull down menu The available options are Never 10 min 30 min and 60 min The defaul...

Страница 222: ...cryption algorithm with Cipher Block Chaining The default is Enabled AES256 CBC Use the pull down to enable or disable the Advanced Encryption Standard AES 256 encryption algorithm with Cipher Block C...

Страница 223: ...rameters for the SSH user To configure the parameters for a SSH user click on the hyperlinked User Name in the Current Accounts window which will reveal the following window to configure NOTE To set t...

Страница 224: ...use an administrator defined password for authentication Upon entry of this parameter the Switch will prompt the administrator for a password and then to re type the password for confirmation Public...

Страница 225: ...se the JWAC feature computer users need to pass through two stages of authentication The first stage is to do the authentication with the quarantine server and the second stage is the authentication w...

Страница 226: ...Server or the JWAC Login Page Redirect Delay Time 0 10 This parameter specifies the Delay Time before an unauthenticated host is redirected to the Quarantine Server or JWAC Login Page Enter a value be...

Страница 227: ...This parameter displays the Index of the Server IP Address This parameter displays the Server IP Address Mask This parameter displays the Server IP net mask Delete This button allows you to delete an...

Страница 228: ...The default setting is 1440 minutes To maintain a constant Port Configuration check the Infinite box in the JWAC configuration window Idle Time 1 1440 Minutes This parameter specifies the period of t...

Страница 229: ...ngs by port click on the Modify button in the corresponding column which will bring you to the following window Figure 9 38 JWAC Port Configuration window JWAC User Account To view JWAC user settings...

Страница 230: ...Password Enter the password of the user This field is case sensitive and must be a complete alphanumeric string Confirm New Password Retype the password entered in the previous field Click Apply to im...

Страница 231: ...2 JWAC Host Table Settings window To search for hosts hanlded by the switch enter the Port list information and select the state then click the Search button This will give you a list on the JWAC Host...

Страница 232: ...Module Information CPU Utilization Port Utilization Packets Errors Packet Size Browse Router Port Browse MLD Router Port VLAN Status Port Access Control MAC Address Table IGMP Snooping Group MLD Snoo...

Страница 233: ...he internal power supply is powering the system External Power RPS Displays Active if the RPS is powering the system Side Fan Indicates fan status Back Fan Indicates fan status Module Information The...

Страница 234: ...aph To view the CPU utilization by port use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a port Click Apply to implement the configured sett...

Страница 235: ...first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or...

Страница 236: ...owing graph of packets received on the Switch To select a port to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by usi...

Страница 237: ...kets Counts the number of packets received on the port Unicast Counts the total number of good packets that were received by a unicast address Multicast Counts the total number of good packets that we...

Страница 238: ...view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time gr...

Страница 239: ...ue is 200 Unicast Counts the total number of good packets that were received by a unicast address Multicast Counts the total number of good packets that were received by a multicast address Broadcast...

Страница 240: ...t to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real tim...

Страница 241: ...ort Packets Counts the number of packets successfully sent on the port Unicast Counts the total number of good packets that were transmitted by a unicast address Multicast Counts the total number of g...

Страница 242: ...llowing graph of error packets received on the Switch To select a port to view these statistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the por...

Страница 243: ...r than 1518 octets and less than the MAX_PKT_LEN Internally MAX_PKT_LEN is equal to 1536 Fragment The number of packets less than 64 bytes with either bad framing or an invalid CRC These are normally...

Страница 244: ...Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Switch and or switch stack at t...

Страница 245: ...that a collision is detected later than 512 bit times into the transmission of a packet ExColl Excessive Collisions The number of packets for which transmission failed due to excessive collisions Sing...

Страница 246: ...tistics for first select the Switch in the switch stack by using the Unit pull down menu and then select the port by using the Port pull down menu The user may also use the real time graphic of the Sw...

Страница 247: ...in length inclusive excluding framing bits but including FCS octets 256 511 The total number of packets including bad packets received that were between 256 and 511 octets in length inclusive excludin...

Страница 248: ...ort is designated by F To view the following window open the Monitoring folder and click the Browse Router Port link Figure 10 17 Browse Router Port Browse MLD Router Port Browse MLD Router Port This...

Страница 249: ...lows the VLAN status for each of the Switch s ports to be viewed by VLAN This window displays the ports on the Switch that are currently Egress E or Tag T ports To view the following table open the Mo...

Страница 250: ...ach RADIUS Authentication server that the client shares a secret with AuthServerAddress The conceptual table listing the RADIUS authentication servers with which the client shares a secret ServerPortN...

Страница 251: ...1s and 60s where s stands for seconds The default value is one second To clear the current statistics shown click the Clear button in the top left hand corner The following information is displayed P...

Страница 252: ...due to receipt of an Accounting Response a timeout or a retransmission ClientTimeouts The number of accounting timeouts to this server After a timeout the client may retry to the same server send to a...

Страница 253: ...The MAC address entered into the address table Unit Port The unit and port to which the MAC address above corresponds Type Describes the method which the Switch discovered the MAC address The possibl...

Страница 254: ...Table The user may search the IGMP Snooping Group Table by VLAN name by entering it in the top left hand corner and clicking Search The following field can be viewed Parameter Description VLAN Name Th...

Страница 255: ...rts field To view the MLD Snooping Group Table click MLD Snooping Group on the Monitoring menu Figure 10 24 MLD Snooping Group Table The following field can be viewed Parameter Description VLAN Name T...

Страница 256: ...o clear the Switch History Log The information in the table is categorized as Parameter Description Type Choose the type of log to view There are two choices Regular Log Choose this option to view reg...

Страница 257: ...Table window may be found in the Monitoring menu This window will show current ARP entries on the Switch To search a specific ARP entry enter an interface name into the Interface Name or an IP address...

Страница 258: ...xStack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch Session Table This window displays the management sessions since the Switch was last rebooted Figure 10 27 Current Session Table 244...

Страница 259: ...e found in the Monitoring menu The IP Forwarding Table is a read only screen where the user may view IP addresses discovered by the Switch To search a specific IP address enter it into the field label...

Страница 260: ...uting Table window may be found in the Monitoring menu This screen shows the current IP routing table of the Switch To find a specific IP route enter an IP address into the IP Address field along with...

Страница 261: ...ned while resetting all other configuration parameters to their factory defaults NOTE Only the Reset System option will enter the factory default parameters into the Switch s non volatile RAM and then...

Страница 262: ...x will instruct the Switch to save the current configuration to non volatile RAM before restarting the Switch Clicking the No click box instructs the Switch not to save the current configuration befor...

Страница 263: ...NV RAM before rebooting the switch To retain any configuration changes permanently click on the Save button in the Save Changes menu The save options allow one alternative configuration image to be st...

Страница 264: ...e configuration file was downloaded to the Switch From States the origin of the firmware There are five ways configuration files may be uploaded to the Switch R If the IP address has this letter attac...

Страница 265: ...on This field has three options for configuration Delete Select this option to delete the configuration file ID specified in the Configuration ID field above Boot_up Select this option to set the conf...

Страница 266: ...n Control IEEE 802 3x Full duplex Flow Control IEEE 802 1u Fast Ethernet IEEE 802 3af Power over Ethernet Protocols CSMA CD Data Transfer Rates Ethernet Fast Ethernet Gigabit Ethernet Fiber Optic Half...

Страница 267: ...5 95 non condensing Dimensions 441mm x 389mm x 44mm Weight DGS 3400 Series Switch DGS 3426 5 42 kg DGS 3426P 6 kg DGS 3427 5 51 kg DGS 3450 5 74 kg Module Inserts DEM 410CX 0 16 kg DEM 410X 0 18 kg EM...

Страница 268: ...following diagrams and tables show the standard RJ 45 receptacle connector and their pin assignments Appendix 1 1 The standard RJ 45 port and connector RJ 45 Pin Assignments Contact MDI X Port MDI II...

Страница 269: ...ia Type Maximum Distance Mini GBIC 1000BASE LX Single mode fiber module 1000BASE SX Multi mode fiber module 1000BASE LHX Single mode fiber module 1000BASE ZX Single mode fiber module 10km 550m 2km 40k...

Страница 270: ...d MAC information for logging Configuration and log saved to flash Unit unitID Configuration and log saved to flash by console Username username IP ipaddr MAC macaddr Informational by console and IP i...

Страница 271: ...sole was unsuccessful Username username IP ipaddr MAC macaddr Warning by console and IP ipaddr MAC macaddr are XOR shown in log string which means if user login by console will no IP and MAC informati...

Страница 272: ...ole Web Successful login through Web Successful login through Web Username username IP ipaddr MAC macaddr Informational Login failed through Web Login failed through Web Username username IP ipaddr MA...

Страница 273: ...h SSH Username username IP ipaddr MAC macaddr Warning Logout through SSH Logout through SSH Username username IP ipaddr MAC macaddr Informational SSH session timed out SSH session timed out Username u...

Страница 274: ...d Username username MAC macaddr Warning Successful login through SSH authenticated by AAA local method Successful login through SSH from userIP authenticated by AAA local method Username username MAC...

Страница 275: ...er serverIP Username username MAC macaddr Informational Login failed through Web authenticated by AAA server Login failed through Web from userIP authenticated by AAA server serverIP Username username...

Страница 276: ...due to AAA server timeout or improper configuration Username username MAC macaddr Warning Successful Enable Admin through Console authenticated by AAA local_enable method Successful Enable Admin thro...

Страница 277: ...enable method Enable Admin failed through SSH from userIP authenticated by AAA local_enable method Username username MAC macaddr Warning Successful Enable Admin through Console authenticated by AAA no...

Страница 278: ...eb authenticated by AAA server Enable Admin failed through Web from userIP authenticated by AAA server serverIP Username username MAC macaddr Warning Enable Admin failed through Web due to AAA server...

Страница 279: ...ailed through SSH from userIP authenticated by AAA server serverIP Username username MAC macaddr Warning Enable Admin failed through SSH due to AAA server timeout or improper configuration Enable Admi...

Страница 280: ...rface string VRID id receives an invalid VRRP TTL packet Warning string is interface name Invalid length packet received Interface string VRID id receives an invalid VRRP length packet Warning string...

Страница 281: ...portNum Broadcast storm has cleared Informational Multicast storm occurrence Port unitID portNum Multicast storm is occurring Warning Multicast storm cleared Port unitID portNum Multicast storm has cl...

Страница 282: ...n devices on the network broadcast storm Multiple simultaneous broadcasts that typically absorb available network bandwidth and can cause network failure console port The port on the Switch accepting...

Страница 283: ...f computers and networking equipment and may be used to manage many aspects of network and end station operation SLIP Serial Line Internet Protocol A protocol which allows IP to run over a serial line...

Страница 284: ...the original purchaser for the defective Hardware will be refunded by D Link upon return to D Link of the defective Hardware All Hardware or part thereof that is replaced by D Link or for which the pu...

Страница 285: ...y way that is not contemplated in the documentation for the product or if the model or serial number has been altered tampered with defaced or removed Initial installation installation and removal of...

Страница 286: ...ay be reproduced in any form or by any means or used to make any derivative such as translation transformation or adaptation without permission from D Link Corporation D Link Systems Inc as stipulated...

Страница 287: ...ertaining to the product and in that case the product is being sold As Is without any warranty whatsoever including without limitation the Limited Warranty as described herein notwithstanding anything...

Страница 288: ...pyright Statement No part of this publication or documentation accompanying this product may be reproduced in any form or by any means or used to make any derivative such as translation transformation...

Страница 289: ...egistration Register online your D Link product at http support dlink com register Product registration is entirely voluntary and failure to complete or return this form will not diminish your warrant...

Страница 290: ...fetime hardware warranty Warranty beneficiary The warranty beneficiary is the original end user The original end user is defined as the person that purchases the product as the first owner Duration of...

Страница 291: ...or by other circumstances of which D Link is not responsible Disclaimer of warranty Please note some countries do not allow the disclaimer of implied terms in contracts with consumers and the disclaim...

Страница 292: ...period on this product U S and Canadian customers can contact D Link technical support through our website or by phone Tech Support for customers within the United States D Link Technical Support ove...

Страница 293: ...United Kingdom Ireland D Link UK Ireland Technical Support over the Internet http www dlink co uk ftp ftp dlink co uk D Link UK Ireland Technical Support over the Telephone 08456 12 0003 United Kingd...

Страница 294: ...port dlink de Telefon 49 1805 2787 0 12 Min aus dem Festnetz der Deutschen Telekom Telefonische technische Unterst tzung erhalten Sie Montags bis Freitags von 09 00 bis 17 30 Uhr Unterst tzung erhalte...

Страница 295: ...Assistance technique D Link par t l phone 0820 0803 03 N INDIGO 0 12 TTC min Prix en France M tropolitaine au 3 mars 2005 Du lundi au samedi de 9h00 19h00 Assistance technique D Link sur internet htt...

Страница 296: ...ink ofrece asistencia t cnica gratuita para clientes residentes en Espa a durante el periodo de garant a del producto Asistencia T cnica de D Link por tel fono 34 902 30 45 45 Lunes a Viernes de 9 00...

Страница 297: ...ito D Link Supporto tecnico per i clienti residenti in Italia D Link Mediterraneo S r L Via N Bonnet 6 B 20154 Milano Supporto Tecnico dal luned al venerd dalle ore 9 00 alle ore 19 00 con orario cont...

Страница 298: ...erlands D Link Technical Support over the Telephone 0900 501 2007 Monday to Friday 9 00 am to 10 00 pm D Link Technical Support over the Internet www dlink nl Tech Support for customers within Belgium...

Страница 299: ...internetowym firmy D Link D Link zapewnia bezp atn pomoc techniczn klientom w Polsce w okresie gwarancyjnym produktu Klienci z Polski mog si kontaktowa z dzia em pomocy technicznej firmy D Link za po...

Страница 300: ...ajdete na webov str nce firmy D Link D Link poskytuje sv m z kazn k m bezplatnou technickou podporu Z kazn ci mohou kontaktovat odd len technick podpory p es webov str nky mailem nebo telefonicky Web...

Страница 301: ...t munkanapokon h tf t l cs t rt kig 9 00 16 00 r ig s p nteken 9 00 14 00 r ig k rhet a 1 461 3001 telefonsz mon vagy a support dlink hu emailc men Magyarorsz gi technikai t mogat s D Link Magyarorsz...

Страница 302: ...ider D Link tilbyr sine kunder gratis teknisk support under produktets garantitid Kunder kan kontakte D Links teknisk support via v re hjemmesider eller p tlf Teknisk Support D Link Teknisk telefon Su...

Страница 303: ...yder gratis teknisk support til kunder i Danmark i hele produktets garantiperiode Danske kunder kan kontakte D Link s tekniske support via vores hjemmeside eller telefonisk D Link teknisk support over...

Страница 304: ...a teknist tukea asiakkailleen Tuotteen takuun voimassaoloajan Tekninen tuki palvelee seuraavasti Arkisin klo 9 21 numerosta 0800 114 677 Internetin kautta Ajurit ja lis tietoja tuotteista http www dli...

Страница 305: ...annan anv ndarinformation D Link tillhandah ller teknisk support till kunder i Sverige under hela garantitiden f r denna produkt Teknisk Support f r kunder i Sverige D Link Teknisk Support via telefon...

Страница 306: ...te de D Link Portugal http www dlink pt A D Link fornece suporte t cnico gratuito para clientes no Portugal durante o per odo de vig ncia de garantia deste produto Suporte T cnico para clientes no Por...

Страница 307: ...software updates D Link D Link D Link 210 86 11 114 210 86 53 172 09 00 17 00 e mail support dlink gr D Link Internet...

Страница 308: ...tp www dlink com au e mail support dlink com au India Monday to Friday 9 30AM to 7 00PM http www dlink co in support productsupport aspx Indonesia Malaysia Singapore and Thailand Tel 62 21 3851275 Ind...

Страница 309: ...5 00pm http www dlink co il support e mail support dlink co il Pakistan Tel 92 21 4548158 or 92 21 4548310 Sunday to Thursday 9 00am to 6 00pm http support dlink me com e mail support pk dlink me com...

Страница 310: ...D Link D Link D Link D Link 495 744 00 99 http www dlink ru e mail support dlink ru...

Страница 311: ...pm Soporte T cnico Help Desk Colombia Tel fono 01800 9525465 Lunes a Viernes 07 00 am a 20 00 pm Soporte T cnico Help Desk Ecuador Tel fono 1800 035465 Lunes a Viernes 07 00 am a 20 00 pm Soporte T cn...

Страница 312: ...ink Brasil www dlinkbrasil com br A D Link fornece suporte t cnico gratuito para clientes no Brasil durante o per odo de vig ncia da garantia deste produto Suporte T cnico para clientes no Brasil Tele...

Страница 313: ...D Link D Link D Link 0800 002 615 8 30 7 00 http www dlink com tw dssqa_service dlink com tw D Link http www dlink com tw...

Страница 314: ...gguna dapat diperoleh pada situs web D Link Dukungan Teknis untuk pelanggan Dukungan Teknis D Link melalui telepon Tel 62 21 3851275 Senin sampai Jumat 9 00 12 30 14 00 18 00 Waktu Singapura Dukungan...

Страница 315: ...71 C1 202 100025 8008296688 028 66052968 028 85176948 71 C1 202 100025 010 58635800 010 58635799 http www dlink com cn 09 00 18 00...

Страница 316: ...International Offices...

Страница 317: ...Business Personal Use 2 How many employees work at installation site 1 employee 2 9 10 49 50 99 100 499 500 999 1000 or more 3 What network protocol s does your organization use XNS IPX TCP IP DECnet...

Страница 318: ......

Отзывы: