Download  Print this page

D-Link DWL-8600AP User Manual

Dws-4000 series access points
Hide thumbs
   
1
2
3
Table Of Contents
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754

Advertisement

User Manual

Product Model:
Unified Wired & Wireless Access System
Release 2.01
October 2015
DWS-4000 series
DWL-8600AP DWL-8610AP
DWL-6600AP DWL-6610AP
DWL-2600AP DWL-3600AP
DWL-6700AP
©Copyright 2015. All rights reserved.

Advertisement

Table of Contents
loading

  Related Manuals for D-Link DWL-8600AP

  Summary of Contents for D-Link DWL-8600AP

  • Page 1: User Manual

    User Manual Product Model: DWS-4000 series DWL-8600AP DWL-8610AP DWL-6600AP DWL-6610AP DWL-2600AP DWL-3600AP DWL-6700AP Unified Wired & Wireless Access System Release 2.01 October 2015 ©Copyright 2015. All rights reserved.
  • Page 2 D-Link UWS User Manual FCC Warning This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
  • Page 3 D-Link UWS User Manual MIC Warning CCC Warning Unified Wired and Wireless Access System D-Link July 2012 Page 3...
  • Page 4: Table Of Contents

    D-Link UWS User Manual Table of Contents About This Document...........................45 Audience ..............................45 Organization............................45 Additional Documentation........................46 Document Conventions .........................46 Section 1: Getting Started ....................47 Connecting the Switch to the Network......................47 Booting the Switch ............................48 Boot Menu Functions..........................49 Start Operational Code ........................50 Change Baud Rate...........................50...
  • Page 5 D-Link UWS User Manual Card Configuration ............................66 Slot Summary............................68 PoE Configuration ..........................69 PoE Status ..............................71 Serial Port ..............................73 IP Address ..............................74 Network DHCP Client Options........................75 HTTP Configuration ............................77 User Accounts...............................78 Adding a User Account ........................80 Changing User Account Information ....................80 Deleting a User Account .........................80...
  • Page 6 D-Link UWS User Manual Configuring and Viewing Device Port Information..................107 Port Configuration ..........................107 Port Summary ............................110 Port Description ...........................113 Managing and Viewing Logs........................114 Buffered Log Configuration........................114 Viewing Buffered Log Messages ......................115 Command Logger Configuration......................116 Console Log Configuration ........................117 Event Log..............................118 Hosts Configuration ..........................119...
  • Page 7 D-Link UWS User Manual Global Configuration..........................145 Server Configuration ..........................146 DNS Host Name IP Mapping Configuration ..................147 DNS Host Name IP Mapping Summary ....................148 Configuring and Viewing ISDP Information ....................149 Global Configuration..........................149 Cache Table............................150 Interface Configuration........................151 Statistics ...............................152 Configuring sFlow ............................153 sFlow Agent Summary .........................153...
  • Page 8 D-Link UWS User Manual Section 4: Configuring L2 Features................. 181 Configuring and Searching the Forwarding Database ................182 Configuration ............................182 MAC Address Table ..........................183 Searching the Forwarding Database.....................184 Managing VLANs............................184 VLAN Configuration ..........................184 VLAN Status............................187 VLAN Port Configuration........................188 VLAN Port Summary ..........................189 Managing Protocol-Based VLANs......................190...
  • Page 9 D-Link UWS User Manual Global Configuration and Status ......................214 Interface Configuration........................215 VLAN Configuration ..........................216 VLAN Status............................217 Multicast Router Configuration ......................218 Multicast Router Status ........................219 Multicast Router VLAN Configuration....................220 Multicast Router VLAN Status......................221 Configuring IGMP Snooping Queriers ......................222 IGMP Snooping Querier Configuration ....................222 IGMP Snooping Querier VLAN Configuration ..................223...
  • Page 10 D-Link UWS User Manual CST Port Configuration/Status ......................249 MST Port Configuration/Status......................252 Statistics ...............................254 Configuring DHCP Snooping ........................255 Global DHCP Snooping Configuration ....................255 DHCP Snooping VLAN Configuration....................256 DHCP Snooping Interface Configuration....................257 Managing LLDP ............................258 Global Configuration..........................259 Interface Configuration........................260 Interface Summary ..........................261 Statistics ...............................262...
  • Page 11 D-Link UWS User Manual IP Helper Statistics ..........................287 Configuring ARP............................288 ARP Create ............................289 ARP Table Configuration ........................290 Viewing ARP Cache.............................292 Configuring Global and Interface IP Settings.....................293 IP Configuration ...........................293 IP Interface Configuration........................295 IP Statistics ............................297 Loopback Interfaces ...........................300 Loopbacks Configuration ........................300 Creating a New Loopback (IPv4) ....................301...
  • Page 12 D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP).....................324 VRRP Configuration..........................324 Virtual Router Configuration........................325 Configuring a Secondary VRRP Address..................326 Creating a New Virtual Router......................327 Modifying a Virtual Router ......................327 VRRP Interface Tracking Configuration..................327 VRRP Interface Tracking........................328 VRRP Route Tracking Configuration .....................329 VRRP Route Tracking ........................330...
  • Page 13 D-Link UWS User Manual Section 7: Configuring Access Control Lists ..............356 Configuring IP Access Control Lists ......................356 IP ACL Configuration ..........................357 IP ACL Rule Configuration ........................358 Modifying an IP-based Rule ....................362 Adding a New Rule to an IP-based ACL.................363 Deleting a Rule from an IP-based ACL ..................363...
  • Page 14 D-Link UWS User Manual Customizing the Captive Portal Web Page ...................389 Local User.............................395 Adding a Local User ........................396 Configuring Users in the Local Database ..................397 Configuring Users in a Remote RADIUS Server................398 Interface Association ...........................400 CP Global Status...........................401 Viewing CP Activation and Activity Status ..................402 Interface Status............................404...
  • Page 15 TACACS+ Configuration........................434 TACACS+ Server Configuration ......................435 Section 9: Configuring the Wireless Features..............437 Unified Wired and Wireless Access System Components.................437 D-Link DWS-4000 Series Unified Wireless Switch................438 DWL-X600AP Unified Access Points.....................438 DWS-4000 Series Switch and AP Discovery Methods ................439 L2 Discovery..........................439 IP Address of AP Configured in the Switch ...................440...
  • Page 16 D-Link UWS User Manual Viewing Managed Access Point Ethernet Statistics..............480 Viewing Detailed Managed Access Point Statistics ..............480 Viewing Managed Access Point Radio Statistics................482 Viewing Managed Access Point VAP Statistics ................483 Viewing Distributed Tunneling Statistics ..................484 AP Authentication Failure Status ......................486 Viewing Details About AP Authentication Failures...............488...
  • Page 17 D-Link UWS User Manual Detected Client Roam History Summary ..................527 Radio Resource Measurement Status Information................528 Viewing the RRM Channel Load Configuration................528 Viewing the RRM Channel Load History ..................530 Viewing RRM Neighbors .......................531 WDS-Managed AP Information......................532 WDS Group Status Summary ......................532 WDS AP Group Status ........................533...
  • Page 18 D-Link UWS User Manual Access Point Software Download ......................583 Managed AP Advanced Settings ......................586 Debugging the AP .........................587 Adjusting the Channel and Power ....................588 AP Provisioning ............................590 AP Provisioning Summary Status....................590 Detailed AP Provisioning Status....................591 Configuring Advanced Settings ........................594 Advanced Global Settings ........................594 Wireless SNMP Trap Configuration ....................597...
  • Page 19 D-Link UWS User Manual WDS Link Configuration ........................648 WDS Link Create ...........................649 Locating WLAN Devices ..........................650 Managed AP Location ..........................650 Building ............................650 Building Floor..........................652 Managed AP Coordinates ......................653 Managed AP Location Summary....................654 On-Demand Location Trigger......................655 On-Demand Location Trigger Status....................656 On-Demand Location Trigger Global Status .................656 On-Demand Location Trigger Floor Status ...................658...
  • Page 20 D-Link UWS User Manual Configuring Differentiated Services for VoIP.....................694 Configuring a Network with WDS-Managed APs ..................697 Configuring a Network to Use WPA2-Enterprise and Dynamic VLANs.............706 Configuring Client Information on the RADIUS Server ................707 Configuring RADIUS Information and AP Profiles on the Switch ............708 Verifying the Configuration........................713...
  • Page 21 D-Link UWS User Manual List of Figures Figure 1: Web Interface Layout ........................57 Figure 2: Device View—Back ..........................57 Figure 3: Cascading Navigation Menu ......................58 Figure 4: Navigation Tree View ........................58 Figure 5: LAN and WLAN Tabs ..........................59 Figure 6: Help Link ............................60 Figure 7: System Description..........................63...
  • Page 22 D-Link UWS User Manual Figure 36: Summer Time Recurring Configuration..................105 Figure 37: Clock Detail............................106 Figure 38: Port Configuration .........................107 Figure 39: Port Summary..........................110 Figure 40: Port Description..........................113 Figure 41: Buffered Log Configuration ......................114 Figure 42: Buffered Log ..........................115 Figure 43: Command Logger Configuration ....................116 Figure 44: Console Log Configuration ......................117...
  • Page 23 D-Link UWS User Manual Figure 73: ISDP Statistics ..........................152 Figure 74: sFlow Agent Summary........................153 Figure 75: sFlow Receiver Configuration......................154 Figure 76: sFlow Poller Configuration ......................156 Figure 77: sFlow Sampler Configuration ......................157 Figure 78: Switch Detailed..........................158 Figure 79: Switch Summary..........................160 Figure 80: Port Detailed ..........................162 Figure 81: Port Summary..........................168...
  • Page 24 D-Link UWS User Manual Figure 110: Protected Port Configuration ......................200 Figure 111: Protected Ports Summary ......................201 Figure 112: MAC Filter Configuration......................202 Figure 113: MAC Filter Summary ........................203 Figure 114: GARP Status..........................204 Figure 115: GARP Switch Configuration ......................206 Figure 116: GARP Port Configuration ......................207 Figure 117: Port Channel Configuration......................209...
  • Page 25 D-Link UWS User Manual Figure 147: Multicast Forwarding Database Statistics ...................242 Figure 148: Spanning Tree Switch Configuration/Status................243 Figure 149: Spanning Tree CST Configuration/Status ..................245 Figure 150: Spanning Tree MST Configuration/Status ...................247 Figure 151: Spanning Tree MST Configuration/Status ...................247 Figure 152: Spanning Tree CST Port Configuration/Status................249 Figure 153: Spanning Tree MST Port Configuration/Status ................252...
  • Page 26 D-Link UWS User Manual Figure 184: ARP Create...........................289 Figure 185: ARP Table Configuration......................290 Figure 186: ARP Cache............................292 Figure 187: IP Configuration...........................293 Figure 188: IP Interface Configuration ......................295 Figure 189: IP Statistics ..........................297 Figure 190: Loopback Configuration—Create ....................300 Figure 191: Configured Loopback Interface ....................300 Figure 192: Loopbacks Configuration—IPv4 Entry ..................302...
  • Page 27 D-Link UWS User Manual Figure 221: Interface Configuration .......................338 Figure 222: Interface Queue Configuration....................339 Figure 223: Interface Queue Status........................340 Figure 224: DiffServ Configuration .........................342 Figure 225: DiffServ Class Configuration ......................343 Figure 226: DiffServ Class Configuration ......................343 Figure 227: Class Summary ..........................345 Figure 228: Policy Configuration ........................346...
  • Page 28 D-Link UWS User Manual Figure 258: Secure Shell Configuration ......................382 Figure 259: Captive Portal Global Configuration....................384 Figure 260: Captive Portal Summary......................386 Figure 261: Captive Portal Configuration .......................387 Figure 262: CP Web Page Customization — Global Parameters ..............390 Figure 263: CP Web Page Customization — Authentication page ..............391 Figure 264: CP Web Page Customization —...
  • Page 29 D-Link UWS User Manual Figure 295: Port Access Control Status ......................425 Figure 296: Port Access Control Status - MAC-based Control Mode .............426 Figure 297: Port Access Control Port Summary .....................429 Figure 298: Port Access Control Statistics ......................431 Figure 299: Port Access Control Client Summary ...................432 Figure 300: Port Access Privileges ........................433...
  • Page 30 D-Link UWS User Manual Figure 332: VAP Associated Client Status.......................508 Figure 333: Switch Associated Client Status....................509 Figure 334: Associated Client Association Summary Statistics ..............510 Figure 335: Associated Client Statistics Session Summary................511 Figure 336: Associated Client Association Detail Statistics ................512 Figure 337: Associated Client Session Detail Statistics...................513 Figure 338: Associated Client Session Detail Statistics...................514...
  • Page 31 D-Link UWS User Manual Figure 369: RF Channel Plan and Power Configuration..................577 Figure 370: Channel Plan History ........................579 Figure 371: Manual Channel Plan........................580 Figure 372: Manual Power Adjustments ......................582 Figure 373: Software Download........................583 Figure 374: Advanced AP Management ......................586 Figure 375: Managed AP Debug ........................587 Figure 376: Managed AP Debug ........................588...
  • Page 32 D-Link UWS User Manual Figure 406: WDS AP Link Configuration ......................648 Figure 407: WDS Link Create ..........................649 Figure 408: Building............................651 Figure 409: Building Floor..........................652 Figure 410: Managed AP Coordinates......................653 Figure 411: Managed AP Location Summary ....................654 Figure 412: On-Demand Location Trigger ......................655 Figure 413: On-Demand Location Trigger Global Status ................656...
  • Page 33 D-Link UWS User Manual Figure 443: Honeypot AP..........................728 Figure 444: All AP Status with Rogue ......................729 Figure 445: Honeypot AP Rogue Status......................729 Figure 446: WIDS Test Discovers Rogue ......................730 Figure 447: De-Authentication Attack Enabled ....................730 Figure 448: Rogue AP Mitigation........................731 Figure 449: De-Authentication Attack Status....................731...
  • Page 34 D-Link UWS User Manual List of Tables Table 1: Typographical Conventions ........................46 Table 2: Common Command Buttons ......................59 Table 3: System Description Fields........................63 Table 4: Switch Configuration Fields ........................64 Table 5: Card Configuration Fields ........................67 Table 6: Slot Summary Fields ...........................68 Table 7: PoE Configuration Fields........................69...
  • Page 35 D-Link UWS User Manual Table 36: Buffered Log Fields .........................115 Table 37: Command Logger Configuration Fields...................116 Table 38: Console Log Configuration Fields....................117 Table 39: Event Log Fields ..........................118 Table 40: Persistent Log Configuration Fields ....................121 Table 41: Persistent Log Fields ........................122 Table 42: Syslog Configuration Fields......................123...
  • Page 36 D-Link UWS User Manual Table 73: Port Summary Statistics Fields......................168 Table 74: Download File to Switch Fields .......................172 Table 75: HTTP File Download Fields......................174 Table 76: Upload File from Switch Fields .......................175 Table 77: Multiple Image Service Fields ......................177 Table 78: Dual Image Status Fields.........................178 Table 79: AutoInstall Fields ..........................180...
  • Page 37 D-Link UWS User Manual Table 110: Multicast Router VLAN Status Fields ....................221 Table 111: IGMP Snooping Querier Configuration Fields................222 Table 112: IGMP Snooping Querier VLAN Configuration Fields ..............223 Table 113: IGMP Snooping Querier VLAN Configuration Summary Fields.............224 Table 114: IGMP Snooping Querier VLAN Status Fields .................225 Table 115: MLD Snooping Global Configuration and Status Fields ..............226...
  • Page 38 D-Link UWS User Manual Table 147: LLDP Remote Device Information Fields..................265 Table 148: LLDP Remote Device Summary Columns..................266 Table 149: LLDP Global Configuration Fields....................267 Table 150: LLDP-MED Interface Configuration Fields..................268 Table 151: LLDP-MED Interface Summary Fields ...................269 Table 152: LLDP-MED Local Device Information Fields ..................270 Table 153: LLDP-MED Remote Device Information Fields................272...
  • Page 39 D-Link UWS User Manual Table 184: Route Table Fields ........................314 Table 185: Best Routes Table Fields .......................316 Table 186: Configured Routes Fields ......................317 Table 187: Route Entry Create Fields ......................318 Table 188: Route Preferences Configuration Fields ..................319 Table 189: VLAN Routing Configuration Fields....................321 Table 190: VLAN Routing Summary Fields .....................323...
  • Page 40 D-Link UWS User Manual Table 221: Secure HTTP Configuration Fields....................379 Table 222: Secure Shell Configuration Fields ....................382 Table 223: Captive Portal Global Configuration .....................385 Table 224: Captive Portal Summary .......................386 Table 225: CP Configuration...........................387 Table 226: CP Web Page Customization......................392 Table 227: Local User Summary ........................395...
  • Page 41 D-Link UWS User Manual Table 258: Global WLAN Status/Statistics......................446 Table 259: Switch Status/Statistics.........................450 Table 260: AP Hardware Capability Radio Detail....................453 Table 261: Peer Switch Configuration ......................455 Table 262: AP Hardware Capability Summary....................457 Table 263: AP Hardware Capability Radio Detail....................457 Table 264: AP Image Capability ........................458 Table 265: Peer Switch Status ........................459...
  • Page 42 D-Link UWS User Manual Table 295: Associated Client Neighbor AP Status ..................502 Table 296: Associated Client Distributed Tunneling Status................504 Table 297: Associated Client TSPEC Status.....................505 Table 298: Associated Client RRM Status.......................506 Table 299: SSID Associated Client Status .......................507 Table 300: VAP Associated Client Status ......................508 Table 301: Switch Associated Client Status ....................509...
  • Page 43 D-Link UWS User Manual Table 332: WPA Security ..........................567 Table 333: Valid Access Point Summary......................569 Table 334: Valid AP Configuration........................571 Table 335: Valid AP Configuration (Standalone Mode)..................573 Table 336: Local OUI Database Summary ......................574 Table 337: Reset Fields...........................575 Table 338: RF Channel Plan and Power Adjustment ..................578 Table 339: Channel Plan History........................580...
  • Page 44 D-Link UWS User Manual Table 369: Edit WDS Managed AP Group Settings..................645 Table 370: WDS Managed AP Summary......................646 Table 371: WDS Managed AP Configuration - Add AP ...................647 Table 372: WDS AP Link Configuration......................648 Table 373: WDS Link Create ...........................649 Table 374: Building ............................651...
  • Page 45: About This Document

    Web-based graphical user interface (GUI). The Unified Wired and Wireless Access System architecture accommodates a variety of software modules, so D-Link DWS-4000 Series can be a Layer 2 switch in a basic network or a Layer 3 router in a large, complex network. The switch software includes WLAN features that allow it to manage and monitor multiple D-Link DWL-x600AP Access Points.
  • Page 46: Additional Documentation

    • The Unified Wired & Wireless Access System Configuration Guide contains several configuration scenarios that show how to set up a WLAN network and configure the wireless features. • Release notes for this D-Link DWS-4000 Series product detail the platform-specific functionality of the software packages, including issues and workarounds.
  • Page 47: Section 1: Getting Started

    There is no default password. Press ENTER at the password prompt if you admin did not change the default password. After a successful login, the screen shows the system prompt, which varies based on the D-Link DWS-4000 Series switch model. For example, the default prompt for a DWS-4026 switch is (DWS-4026)>...
  • Page 48: Booting The Switch

    D-Link UWS User Manual Booting the Switch password to enter Privileged EXEC mode. Press ENTER at the password prompt if you did not change the default password. The command prompt changes to ( DWS-4026)# 6. Configure network information. – To use a DHCP server to obtain the IP address, subnet mask, and default gateway information, enter: network protocol dhcp –...
  • Page 49: Boot Menu Functions

    D-Link UWS User Manual Booting the Switch For information about the Boot menu, see ““Boot Menu Functions” on page 49." If you do not start the boot menu, the operational code continues to load.After the switch boots successfully, the User login prompt appears and you can use the local terminal to begin configuring the switch.
  • Page 50: Start Operational Code

    D-Link UWS User Manual Booting the Switch Start Operational Code Use option 1 to resume loading the operational code. To relaunch the boot process from the Boot menu: 1. On the Boot menu, select 1 and press <Enter>. The following prompt displays: Operational Code Date: Thu Jun 8 12:51:44 2006 Uncompressing..
  • Page 51: Retrieve Event Log Using Xmodem

    D-Link UWS User Manual Booting the Switch Retrieve Event Log Using XMODEM Use option 3 to retrieve the event log and download it to your ASCII terminal. To retrieve the event log from the Boot menu: 1. On the Boot menu, select 3 and press <Enter>.
  • Page 52: Load Configuration Using Xmodem

    D-Link UWS User Manual Booting the Switch Load Configuration Using XMODEM Use option 5 when a new configuration file must be downloaded to replace the saved system configuration file. To download software from the Boot menu: 1. On the Boot menu, select 5 and press <Enter>.
  • Page 53: Run Flash Diagnostics

    D-Link UWS User Manual Booting the Switch Run Flash Diagnostics Use option 7 to run flash diagnostics. User action is confirmed with a Y/N question before executing the command. To perform a complete test of the flash memory from the Boot menu: 1.
  • Page 54: Update Boot Code

    D-Link UWS User Manual Booting the Switch Update Boot Code Use option 8 to update the boot code in the flash memory. This option is only valid after loading new boot code using Boot Menu option 4. User action is confirmed with a Y/N question before executing the command.
  • Page 55: Reset The System

    D-Link UWS User Manual Booting the Switch Reset the System Use option 10 to clear all flash and reset the system to its default setting. User action is confirmed with a Y/N question before executing the command. To reset the system from the Boot menu: 1.
  • Page 56: Understanding The User Interfaces

    This guide describes how to use the Web-based interface to manage and monitor the system. For information about how to manage and monitor the system by using the CLI, see the D-Link DWS-4000 Series CLI Command Reference.
  • Page 57: Device View

    D-Link UWS User Manual Understanding the User Interfaces 3. After the system authenticates you, the System Description page displays. Figure 1 shows the layout of the switch Web interface. Each Web page contains three main areas: device view, the navigation tree, and the configuration status and options.
  • Page 58: Navigation Tree View

    D-Link UWS User Manual Understanding the User Interfaces Click the port you want to view or configure to see a menu that displays statistics and configuration options. Click the menu option to access the page that contains the configuration or monitoring options.
  • Page 59: Configuration And Monitoring Options

    D-Link UWS User Manual Understanding the User Interfaces The D-Link DWS-4000 Series switch navigation tree also contains a LAN tab for wired features and a WLAN tab for Wireless features, as the following figure shows. LAN Tab WLAN Tab Figure 5: LAN and WLAN Tabs...
  • Page 60: Help Page Access

    For more information about the CLI, see the D-Link DWS-4000 Series CLI Command Reference. The D-Link DWS-4000 Series CLI Command Reference lists each command available from the CLI by the command name and provides a brief description of the command. Each command reference also contains the following information: •...
  • Page 61: Using Snmp

    Understanding the User Interfaces Using SNMP You can manage the D-Link DWS-4000 Series switch using SNMP. You can configure SNMP groups and users that can manage traps that the SNMP agent generates. D-Link DWS-4000 Series uses both standard public MIBs for standard functionality and private MIBs that support additional switch functionality.
  • Page 62: Section 2: System Administration

    D-Link UWS User Manual System Administration Section 2: System Administration Use the features in the Administration navigation tree folder to define the switch’s relationship to its environment. The Administration folder contains links to the following features: • “System Description” •...
  • Page 63: System Description

    D-Link UWS User Manual System Description System Description After a successful login, the System Description page displays. Use this page to configure and view general device information. To display the System Description page, click LAN > Administration > System Description in the navigation tree.
  • Page 64: Defining System Information

    D-Link UWS User Manual Switch Configuration Defining System Information 1. Open the System Description page. 2. Define the following fields: System Name, System Contact, and System Location. 3. If the SNTP Time has synchronized, you can click the Synchronize system time with NTP time to apply the SNTP time to system time 4.
  • Page 65 D-Link UWS User Manual Switch Configuration • If you change the mode, click Submit to apply the changes to the system. If you want the switch to retain the new values across a power cycle, you must perform a save.
  • Page 66: Viewing Inventory Information

    D-Link UWS User Manual Viewing Inventory Information Viewing Inventory Information Use the Inventory Information page to display the switch's Vital Product Data, which is stored in non-volatile memory at the factory. To display the inventory information, click LAN > Monitoring  Inventory Information page in the navigation tree.
  • Page 67: Table 5: Card Configuration Fields

    D-Link UWS User Manual Card Configuration Table 5: Card Configuration Fields Field Description Slot Indicates the slot in the selected unit for which data is to be displayed or configured. Slot Status Indicates whether a card is in the slot (Full or Empty).
  • Page 68: Slot Summary

    D-Link UWS User Manual Card Configuration Slot Summary The Slot Summary page displays information about the slots present in the switch. To access the Slot Summary page, click LAN > Monitoring > Slot Summary in the navigation tree. Figure 11: Slot Summary...
  • Page 69: Poe Configuration

    D-Link UWS User Manual Card Configuration PoE Configuration Use the PoE Configuration page to configure the Power over Ethernet (PoE) features. To access the PoE Configuration page, click LAN > Administration > PoE Configuration in the navigation menu. The following figure shows the fields that display.
  • Page 70 D-Link UWS User Manual Card Configuration Table 7: PoE Configuration Fields (Cont.) Field Description Priority The switch may not be able to supply power to all connected devices. So, priority is used to determine which ports can supply power. For ports with the same priority, the lower numbered port will have a higher priority.
  • Page 71: Poe Status

    D-Link UWS User Manual PoE Status PoE Status Power over Ethernet (PoE) technology allows IP telephones, wireless LAN Access Points, Web-Cameras and many other appliances to receive power as well as data over existing LAN cabling, without needing to modify the existing Ethernet infrastructure.
  • Page 72 D-Link UWS User Manual PoE Status Table 8: PoE Status Fields (Cont.) Field Description Status Operational status of the port PD detection. The possible values for this field are: • Disabled: Indicates no power being delivered. • Requesting Power: Indicates PoE switch does not have enough power to supply power to the requesting powered device.
  • Page 73: Serial Port

    D-Link UWS User Manual Serial Port Serial Port The Serial Port Configuration page allows you to change the switch’s serial port settings. In order for a terminal or terminal emulator to communicate with the switch, the serial port settings on both devices must be the same.
  • Page 74: Ip Address

    D-Link UWS User Manual IP Address IP Address The network interface is the logical interface used for in-band connectivity with the switch via any of the switch's front panel ports. The configuration parameters associated with the switch's network interface do not affect the configuration of the front panel ports through which traffic is switched or routed.
  • Page 75: Network Dhcp Client Options

    D-Link UWS User Manual Network DHCP Client Options Table 10: Network Connectivity Fields (Cont.) Field Description Locally Administered MAC You can optionally configure a locally administered MAC address for in-band Address connectivity instead of using the burned-in universally administered MAC address.
  • Page 76: Figure 16: Dhcp Client Options

    D-Link UWS User Manual Network DHCP Client Options Figure 16: DHCP Client Options Table 11: DHCP Client Option Fields Field Description DHCP Vendor Class ID Mode Specify whether to enable or disable the vendor class identifier mode. DHCP Vendor Class ID String Enter the text to add to DHCP requests as Option-60, which is the Vendor Class Identifier option.
  • Page 77: Http Configuration

    D-Link UWS User Manual HTTP Configuration HTTP Configuration Use the HTTP Configuration page to configure the HTTP server settings on the system. To access the HTTP Configuration page, click LAN > Administration > HTTP Configuration in the navigation menu. Figure 17: HTTP Configuration...
  • Page 78: User Accounts

    D-Link UWS User Manual User Accounts User Accounts By default, the switch contains two user accounts: • admin, with 'Read/Write' privileges • guest, with 'Read Only' privileges Both of these accounts have blank passwords by default. The names are not case sensitive.
  • Page 79: Table 13: User Accounts Fields

    D-Link UWS User Manual User Accounts Table 13: User Accounts Fields Field Description User From the User menu, select an existing user to configure, or select Create to create a new user account. The system can have a maximum of five 'Read Only' accounts and one Read/Write account.
  • Page 80: Adding A User Account

    D-Link UWS User Manual User Accounts Table 13: User Accounts Fields (Cont.) Field Description Encryption Key If you selected DES in the Encryption Protocol field enter the SNMPv3 Encryption Key here. Otherwise this field is ignored. Valid keys are 0 to 15 characters long.
  • Page 81: Authentication List Configuration

    D-Link UWS User Manual Authentication List Configuration Authentication List Configuration Use the Authentication List page to configure login lists. A login list specifies one or more authentication methods to validate switch or port access for the users associated with the list.
  • Page 82 D-Link UWS User Manual Authentication List Configuration Table 14: Authentication Profile Fields (Cont.) Field Description Method 1 Use the menu to select the method that should appear first in the selected authentication login list. User authentication occurs in the order the methods are selected.
  • Page 83: Creating An Authentication List

    D-Link UWS User Manual Authentication List Configuration Creating an Authentication List To create a new authentication list, use the following procedures. 1. Select Create from the Authentication List field. The page refreshes, and different fields are available. 2. In the Authentication List Name field, enter a name of 1 to 12 characters.
  • Page 84: Authentication List Summary

    D-Link UWS User Manual Authentication List Summary Authentication List Summary Use the Authentication List Summary page to view information about the authentication lists on the system and which users are associated with each list. The page also displays information about 802.1X port security users.
  • Page 85 D-Link UWS User Manual Authentication List Summary The same fields are displayed in case of Enable Authentication List Table and the Authentication Lists and Authentication Methods configured for each List of Console, Telnet, SSH, HTTPS, HTTP and DOT1X are displayed respectively.
  • Page 86: Login Session

    D-Link UWS User Manual Login Session Login Session Use the Login Session page to view information about users who have logged on to the switch. To access the Login Session page, click LAN > Monitoring > Login Session in the navigation tree.
  • Page 87: User Login

    D-Link UWS User Manual User Login User Login Each configured user is assigned to a login list that specifies how the user should be authenticated when attempting to access the switch or a port on the switch. After creating a new user account on the User Account screen, you can use the User Login page to assign the user to a login list for the switch.
  • Page 88: Assigning A User To An Authentication List

    3. Click Submit to apply the changes to the switch. Denial of Service Protection Use the Denial of Service (DoS) page to configure DoS control. D-Link DWS-4000 Series software provides support for classifying and blocking specific types of DoS attacks. You can configure your system to monitor and block a variety of DoS attacks.
  • Page 89: Table 18: Denial Of Service Configuration Fields

    D-Link UWS User Manual Denial of Service Protection Table 18: Denial of Service Configuration Fields Field Description Denial of Service First Enable or disable this option by selecting the corresponding line on the Fragment pulldown entry field. Enabling First Fragment DoS prevention causes the switch to drop packets that have a TCP header smaller then the configured Min TCP Hdr Size.
  • Page 90: Multiple Port Mirroring

    D-Link UWS User Manual Multiple Port Mirroring Multiple Port Mirroring Port mirroring selects the network traffic for analysis by a network analyzer. This is done for specific ports of the switch. As such, many switch ports are configured as source ports and one switch port is configured as a destination port.
  • Page 91: Adding A Port Mirroring Session

    D-Link UWS User Manual Multiple Port Mirroring Adding a Port Mirroring Session Note: A Port will be removed from a VLAN or LAG when it becomes a destination mirror. 1. From the LAN > Administration > Multiple Port Mirroring page, click Add Source Port to display the Add Source Port page.
  • Page 92: Removing Or Modifying A Port Mirroring Session

    D-Link UWS User Manual Telnet Sessions Removing or Modifying a Port Mirroring Session 1. From the Port Mirroring page, click Remove Source Port. 2. Select one or more source ports to remove from the session. Use the CTRL key to select multiple ports to remove.
  • Page 93: Table 21: Telnet Session Configuration Fields

    D-Link UWS User Manual Telnet Sessions Table 21: Telnet Session Configuration Fields Field Description Telnet Session Timeout Specify how many minutes of inactivity should occur on a telnet session (minutes) before the session is logged off. You may enter any number from 1 to 160. The factory default is 5.
  • Page 94: Outbound Telnet Client Configuration

    D-Link UWS User Manual Outbound Telnet Client Configuration Outbound Telnet Client Configuration The outbound telnet feature is not available on all platforms. Use the outbound telnet client settings to control the telnet sessions that originate from the switch and connect to a remote system.
  • Page 95: Ping Test

    D-Link UWS User Manual Ping Test Ping Test Use the Ping page to tell the switch to send a Ping request to a specified IP address. You can use this feature to check whether the switch can communicate with a particular network host.
  • Page 96: Traceroute

    D-Link UWS User Manual TraceRoute TraceRoute You can use the TraceRoute utility to discover the paths that a packet takes to a remote destination. To display this page, click LAN > Administration > TraceRoute in the navigation tree. Figure 29: TraceRoute...
  • Page 97: Configuring Sntp Settings

    D-Link DWS-4000 Series DWS-4000 Series switch software supports the Simple Network Time Protocol (SNTP). SNTP assures accurate network device clock time synchronization up to the millisecond. Time synchronization is performed by a network SNTP server. D-Link DWS-4000 Series software operates only as an SNTP client and cannot provide time services to other systems.
  • Page 98: Sntp Settings

    D-Link UWS User Manual Configuring SNTP Settings MD5 (Message Digest 5) Authentication safeguards device synchronization paths to SNTP servers. MD5 is an algorithm that produces a 128-bit hash. MD5 is a variation of MD4, and increases MD4 security. MD5 verifies the integrity of the communication, authenticates the origin of the communication.
  • Page 99: Sntp Server Configuration

    D-Link UWS User Manual Configuring SNTP Settings Table 25: SNTP Global Configuration Fields (Cont.) Field Description Unicast Poll Timeout Specifies the number of seconds to wait for an SNTP response when configured in unicast mode. Allowed range is (1 to 30). Default value is 5.
  • Page 100: Sntp Server Status

    D-Link UWS User Manual Configuring SNTP Settings • To add an SNTP server, select Create from the Server list, complete the remaining fields as desired, and click Submit. The SNTP server is added, and is now reflected in the Server list. You must perform a save to retain your changes over a power cycle.
  • Page 101: Sntp Global Status

    D-Link UWS User Manual Configuring SNTP Settings Table 27: SNTP Server Status Fields (Cont.) Field Description Last Attempt Status Specifies the status of the last SNTP request to this server. If no packet has been received from this server, a status of Other is displayed: •...
  • Page 102: Figure 33: Global Status

    D-Link UWS User Manual Configuring SNTP Settings Figure 33: Global Status Table 28: Global Status Fields Field Description Version Specifies the SNTP Version the client supports. Supported Mode Specifies the SNTP modes the client supports. Multiple modes may be supported by a client.
  • Page 103: Time Zone Configuration

    D-Link UWS User Manual Configuring SNTP Settings Table 28: Global Status Fields (Cont.) Field Description Address Type Specifies the address type of the SNTP Server address for the last received valid packet. Server Stratum Specifies the claimed stratum of the server for the last received valid packet.
  • Page 104: Summer Time Configuration

    D-Link UWS User Manual Configuring SNTP Settings Summer Time Configuration Use the Summer Time Configuration page to specify a defined summer time duration and offset. To display the Summer Time Configuration page, click LAN > Administration > SNTP Summer Time Configuration in the navigation menu.
  • Page 105: Summer Time Recurring Configuration

    D-Link UWS User Manual Configuring SNTP Settings Summer Time Recurring Configuration Clicking the Recurring check box indicates that the configuration is to be repeated every year. When you select Recurring, the fields shown in the following table occur. Figure 36: Summer Time Recurring Configuration...
  • Page 106: Clock Detail

    D-Link UWS User Manual Configuring SNTP Settings Clock Detail Use the Clock Detail page to view information about the current time, time zone, and summer time settings. To display the Clock Detail page, click LAN > Monitoring Clock Detail in the navigation menu. The following figure shows the Clock Detail page when Summertime is enabled.
  • Page 107: Configuring And Viewing Device Port Information

    D-Link UWS User Manual Configuring and Viewing Device Port Information Configuring and Viewing Device Port Information The pages in the Port folder allow you to view and monitor the physical port information for the ports available on the switch. Port Configuration Use the Port Configuration page to configure the physical interfaces on the switch.
  • Page 108: Table 33: Port Configuration Fields

    D-Link UWS User Manual Configuring and Viewing Device Port Information Table 33: Port Configuration Fields Field Description Slot/Port Select the port from the menu to display or configure data for that port. If you select All, the changes you make to the Port Configuration page apply to all physical ports on the system.
  • Page 109 • <Speed> Half Duplex: The port speeds available from the menu depend on the platform on which the D-Link DWS-4000 Series software is running and which port you select. In half-duplex mode, the transmissions are one- way. In other words, the port does not send and receive traffic at the same time.
  • Page 110: Port Summary

    D-Link UWS User Manual Configuring and Viewing Device Port Information Port Summary Use the Port Summary page to view the settings for all physical ports on the platform. To access the Port Summary page, click LAN > Monitoring > Port Utilization in the navigation menu.
  • Page 111 D-Link UWS User Manual Configuring and Viewing Device Port Information Table 34: Port Summary Fields (Cont.) Field Description Forwarding State The port's current state Spanning Tree state. This state controls what action a port takes on receipt of a frame. If the bridge detects a malfunctioning port it will place that port into the broken state.
  • Page 112 • <Speed> Half Duplex: The port speeds available from the menu depend on the platform on which the D-Link DWS-4000 Series software is running and which port you select. In half-duplex mode, the transmissions are one- way. In other words, the port does not send and receive traffic at the same time.
  • Page 113: Port Description

    D-Link UWS User Manual Configuring and Viewing Device Port Information Port Description Use the Port Description page to configure a human-readable description of the port. To access the Port Description page, click LAN > Administration > Port Configuration > Port Description in the navigation tree.
  • Page 114: Managing And Viewing Logs

    D-Link UWS User Manual Managing and Viewing Logs Managing and Viewing Logs The switch may generate messages in response to events, faults, or errors occurring on the platform as well as changes in configuration or other occurrences. These messages are stored both locally on the platform and forwarded to one or more centralized points of collection for monitoring purposes as well as long term archival storage.
  • Page 115: Viewing Buffered Log Messages

    D-Link UWS User Manual Managing and Viewing Logs Viewing Buffered Log Messages Use the Buffered Log page to view the log messages in the system buffer. The newest messages are displayed at the bottom of the page. To access the Buffered Log page, click LAN > Monitoring > Log > Buffered Log in the navigation menu.
  • Page 116: Command Logger Configuration

    D-Link UWS User Manual Managing and Viewing Logs Command Logger Configuration Use the Command Logger Configuration page to enable the system to log all CLI commands issued on the system. The command log messages are interleaved with the other system logs messages.
  • Page 117: Console Log Configuration

    D-Link UWS User Manual Managing and Viewing Logs Console Log Configuration Use the Console Log Configuration page to control logging to any serial device attached to the switch. To access the Console Log Configuration page, click LAN > Administration > Log > Console Log Configuration in the navigation menu.
  • Page 118: Event Log

    Entry The number of the entry within the event log. The most recent entry is first. Filename The D-Link DWS-4000 Series source code filename identifying the code that detected the event. Line The line number within the source file of the code that detected the event.
  • Page 119: Hosts Configuration

    D-Link UWS User Manual Managing and Viewing Logs Hosts Configuration Use the Host Configuration page to configure remote logging hosts where the switch can send logs. To enable remote logging, see “Syslog Configuration” on page 123. To access the Host Configuration page, click LAN > Administration > Log > Host Configuration in the navigation tree.
  • Page 120: Deleting A Remote Logging Host

    D-Link UWS User Manual Managing and Viewing Logs Deleting a Remote Logging Host To delete a remote logging host from the configured list, select the IP address of the host from the Host field, and then click Delete. Persistent Log Configuration The persistent log is stored in persistent storage, which means that the log messages are retained across a switch reboot.
  • Page 121: Table 40: Persistent Log Configuration Fields

    D-Link UWS User Manual Managing and Viewing Logs Table 40: Persistent Log Configuration Fields Field Description Admin Status Select whether to enable or disable persistent logging. The default is disabled. • Enabled: Prints log messages to the device attached to the switch serial port.
  • Page 122: Persistent Log

    D-Link UWS User Manual Managing and Viewing Logs Persistent Log Use the Persistent Log page to view the persistent log messages. To access the Persistent Log page, click LAN > Monitoring > Log > Persistent Log in the navigation tree menu.
  • Page 123: Syslog Configuration

    D-Link UWS User Manual Managing and Viewing Logs Syslog Configuration Use the Syslog Configuration page to allow the switch to send log messages to the remote logging hosts configured on the system. To access the System Log Configuration page, click LAN > Administration > Log > System Log Configuration in the navigation tree.
  • Page 124: Trap Log

    D-Link UWS User Manual Managing and Viewing Logs Trap Log Use the Trap Log page to view the entries in the trap log. For information about how to copy the file to a TFTP server, see “Upload File From Switch (TFTP)” on page 175.
  • Page 125: Defining Snmp Parameters

    D-Link UWS User Manual Defining SNMP Parameters Defining SNMP Parameters Simple Network Management Protocol (SNMP) provides a method for managing network devices. The device supports SNMP version 1, SNMP version 2, and SNMP version 3. The Web interfaces supports configuration of SNMPv1 and v2;...
  • Page 126: Snmp Community Configuration

    D-Link UWS User Manual Defining SNMP Parameters SNMP Community Configuration Access rights are managed by defining communities on the SNMPv1, 2 Community page. When the community names are changed, access rights are also changed. SNMP Communities are defined only for SNMP v1 and SNMP v2.
  • Page 127: Trap Receiver Configuration

    D-Link UWS User Manual Defining SNMP Parameters Table 44: Community Configuration Fields (Cont.) Field Description Client IP Mask Along with the Client IP Address, the Client IP Mask denotes a range of IP addresses from which SNMP clients may use that community to access this device.
  • Page 128: Trap Flags

    D-Link UWS User Manual Defining SNMP Parameters Table 45: Trap Receiver Configuration Fields Field Description SNMP Trap Name Select Create, to configure the SNMP trap name for the SNMP trap packet to be sent to the trap manager. If you have already configured an SNMP trap name, you can select it from the drop-down menu to change the settings or delete it.
  • Page 129: Figure 54: Trap Flags Configuration

    D-Link UWS User Manual Defining SNMP Parameters Figure 54: Trap Flags Configuration Table 46: Trap Flags Configuration Fields Field Description Authentication Enable or disable activation of authentication failure traps by selecting the corresponding line on the pulldown entry field. The factory default is enabled.
  • Page 130: Supported Mibs

    D-Link UWS User Manual Defining SNMP Parameters Supported MIBs The Supported MIBs page lists the MIBs that the system currently supports. To access the Supported MIBs page, click LAN > Monitoring > Supported MIBs in the navigation menu. A portion of the web screen is shown...
  • Page 131: Managing The Dhcp Server

    D-Link UWS User Manual Managing the DHCP Server Managing the DHCP Server DHCP is generally used between clients (e.g., hosts) and servers (e.g., routers) for the purpose of assigning IP addresses, gateways, and other networking definitions such as DNS, NTP, and/or SIP parameters. The DHCP Server folder contains links to web pages that define and display DHCP parameters and data.
  • Page 132 D-Link UWS User Manual Managing the DHCP Server Table 48: DHCP Server Global Configuration Fields (Cont.) Field Description Add Excluded Addresses Use the From and To fields to specify the IP addresses that the server should not assign to the client. If you want to exclude a range of addresses, set the range boundaries.
  • Page 133: Pool Configuration

    D-Link UWS User Manual Managing the DHCP Server Pool Configuration Use the DHCP Pool Configuration page to create the pools of addresses that can be assigned by the server. To access the Pool Configuration page, click LAN > Administration > DHCP Server > Pool Configuration in the navigation tree.
  • Page 134: Table 49: Pool Configuration Fields

    D-Link UWS User Manual Managing the DHCP Server Table 49: Pool Configuration Fields Field Description Pool Name For a user with read/write permission, this field would show names of all the existing pools along with an additional option Create. When the user selects Create, another text box, Pool Name, appears where the user may enter name for the Pool to be created.For a user with read-only permission, this field would show names of the...
  • Page 135 D-Link UWS User Manual Managing the DHCP Server Table 49: Pool Configuration Fields (Cont.) Field Description Lease Time Specifies the type of lease to assign clients: • Infinite: For dynamic bindings, an infinite least time is a lease period of 60 days. For manual bindings, an infinite lease time means the lease period does not expire.
  • Page 136: Pool Options

    D-Link UWS User Manual Managing the DHCP Server Pool Options Use the Pool Options page to configure DHCP options that the DHCP server can pass to the client. For more information about DHCP options, see RFC 2132. To access the Pool Options page, click LAN > Administration > DHCP Server > Pool Options in the navigation menu.
  • Page 137: Reset Configuration

    D-Link UWS User Manual Managing the DHCP Server Reset Configuration Use the Reset Configuration page to clear IP address bindings between that the DHCP server assigned to the client. To access the Reset Configuration page, click LAN > Administration > DHCP Server > Reset Configuration in the navigation tree.
  • Page 138: Bindings Information

    D-Link UWS User Manual Managing the DHCP Server Bindings Information Use the DHCP Server Bindings Information page to view information about the IP address bindings in the DHCP server database. To access the DHCP Server Bindings Information page, click LAN > Monitoring > DHCP Server Summary >...
  • Page 139: Server Statistics

    D-Link UWS User Manual Managing the DHCP Server Server Statistics Use the DHCP Server Statistics page to view information about the DHCP server bindings and messages. To access the Server Statistics page, click LAN > Monitoring > DHCP Server Summary > Server Statistics in the navigation menu.
  • Page 140: Conflicts Information

    D-Link UWS User Manual Managing the DHCP Server • Click Refresh to update the information on the screen. • Click Clear Server Statistics to reset all counters to zero. Conflicts Information Use the Conflicts Information page to view information on hosts that have address conflicts; i.e., when the same IP address is assigned to two or more devices on the network.
  • Page 141: Configuring Time Ranges

    D-Link UWS User Manual Configuring Time Ranges Configuring Time Ranges Use these pages to configure time ranges to use in time-based access control list (ACL) rules. Time-based ACLs allow one or more rules within an ACL to be based on a periodic or absolute time. Each ACL rule within an ACL except for the implicit deny all rule can be configured to be active and operational only during a specific time period.
  • Page 142: Time Range Summary

    D-Link UWS User Manual Configuring Time Ranges • Use Submit to add a new time range. • Use Delete to remove an existing time range. Time Range Summary Use this page to view summary information about configured time ranges. To access this page, click LAN > Administration > Time Range > Summary.
  • Page 143: Time Range Entry Configuration

    D-Link UWS User Manual Configuring Time Ranges Time Range Entry Configuration Use this page to configure periodic and absolute time range entries and add them to named time ranges. Note: The time range entries use the system time for the time periods in which they take effect.
  • Page 144 D-Link UWS User Manual Configuring Time Ranges Table 57: Time Range Entry Configuration Field Description Periodic Time Range Entry Applicable Days Specify the day(s) when the time entry occurs: • Daily — Has the same start and end time every day •...
  • Page 145: Configuring Dns

    D-Link UWS User Manual Configuring DNS Configuring DNS You can use these pages to configure information about DNS servers the network uses and how the switch/ router operates as a DNS client. Global Configuration Use this page to configure global DNS settings and to view DNS client status information.
  • Page 146: Server Configuration

    D-Link UWS User Manual Configuring DNS • To create a new list of domain names, click Create. Then enter a name of the list and click submit. Repeat this step to add multiple domains to the default domain list. • To remove a domain from the default list select the Remove option next to the item you want to remove and click Submit.
  • Page 147: Dns Host Name Ip Mapping Configuration

    D-Link UWS User Manual Configuring DNS DNS Host Name IP Mapping Configuration Use this page to configure DNS host names for hosts on the network. The host names are associated with IPv4 or IPv6 addresses on the network, which are statically assigned to particular hosts.
  • Page 148: Dns Host Name Ip Mapping Summary

    D-Link UWS User Manual Configuring DNS DNS Host Name IP Mapping Summary Use this page to configure static and dynamic DNS host names for hosts on the network. The host names are associated with IPv4 or IPv6 addresses on the network, which are assigned to particular hosts.
  • Page 149: Configuring And Viewing Isdp Information

    Cisco® devices running the Cisco Discovery Protocol (CDP). ISDP is used to share information between neighboring devices. D-Link DWS-4000 Series switches participate in the CDP protocol and are able to both discover and be discovered by other CDP supporting devices.
  • Page 150: Cache Table

    D-Link UWS User Manual Configuring and Viewing ISDP Information Table 62: ISDP Global Configuration Field Description Device ID Format Indicates the Device ID format capability of the device. Capability • serialNumber—Indicates that the device uses serial number as the format for its Device ID.
  • Page 151: Interface Configuration

    D-Link UWS User Manual Configuring and Viewing ISDP Information Table 63: ISDP Cache Table (Cont.) Field Description Holdtime Displays the ISDP holdtime for the neighbor. Capability Displays the ISDP Functional Capabilities for the neighbor. Platform Displays the ISDP Hardware Platform for the neighbor.
  • Page 152: Statistics

    D-Link UWS User Manual Configuring and Viewing ISDP Information Statistics From the ISDP Statistics page, you can view information about the ISDP packets sent and received by the switch. To display the ISDP Statistics page, click LAN > Monitoring > ISDP > Statistics in the navigation tree.
  • Page 153: Configuring Sflow

    D-Link UWS User Manual Configuring sFlow Configuring sFlow sFlow® is the standard for monitoring high-speed switched and routed networks. sFlow technology is built into network equipment and gives complete visibility into network activity, enabling effective management and control of network resources.
  • Page 154: Sflow Receiver Configuration

    D-Link UWS User Manual Configuring sFlow Table 66: sFlow Agent Summary Field Description Version Uniquely identifies the version and implementation of this MIB. The version string must have the following structure: MIB Version;Organization;Software Revision where: • MIB Version: ‘1.3’, the version of this MIB.
  • Page 155: Table 67: Sflow Receiver Configuration

    D-Link UWS User Manual Configuring sFlow Table 67: sFlow Receiver Configuration Field Description Receiver Index Selects the receiver for which data is to be displayed or configured. The allowed range is 1 to Receiver Owner The entity making use of this sFlowRcvrTable entry. The empty string indicates that the entry String is currently unclaimed and the receiver configuration is reset to the default values.
  • Page 156: Sflow Poller Configuration

    D-Link UWS User Manual Configuring sFlow sFlow Poller Configuration The sFlow agent collects time-based sampling of network interface statistics and sends them to the configured sFlow receivers. A data source configured to collect counter samples is called a poller. Counter Sampling The primary objective of Counter Sampling is to efficiently, periodically export counters associated with Data Sources.
  • Page 157: Sflow Sampler Configuration

    D-Link UWS User Manual Configuring sFlow sFlow Sampler Configuration The sFlow Agent collects a statistical packet-based sampling of the switched flows and sends them to the configured receivers. A data source configured to collect flow samples is called a sampler.
  • Page 158: Viewing System Statistics

    D-Link UWS User Manual Viewing System Statistics Viewing System Statistics The pages in the Statistics folder contain a variety of information about the number and type of traffic transmitted from and received on the switch. Switch Detailed The Switch Detailed page shows detailed statistical information about the traffic the switch handles.
  • Page 159: Table 70: Switch Detailed Statistics Fields

    D-Link UWS User Manual Viewing System Statistics Table 70: Switch Detailed Statistics Fields Field Description fIndex This object indicates the ifIndex of the interface table entry associated with the processor of this switch. Octets Received The total number of octets of data received by the processor (excluding framing bits but including FCS octets).
  • Page 160: Switch Summary

    D-Link UWS User Manual Viewing System Statistics Table 70: Switch Detailed Statistics Fields (Cont.) Field Description VLAN Deletes The number of VLANs on this switch that have been created and then deleted since the last reboot. Time Since Counters Last...
  • Page 161 D-Link UWS User Manual Viewing System Statistics Table 71: Switch Summary Fields (Cont.) Field Description Packets Received With Error The number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol. Packets Transmitted Without The total number of packets transmitted out of the interface.
  • Page 162: Port Detailed

    D-Link UWS User Manual Viewing System Statistics Port Detailed The Port Detailed page displays a variety of per-port traffic statistics. To access the Port Detailed page, click LAN > Monitoring > System Statistics > Port Detailed in the navigation tree.
  • Page 163 D-Link UWS User Manual Viewing System Statistics Table 72: Detailed Port Statistics Fields (Cont.) Field Description Packets RX and TX 128-255 The total number of packets (including bad packets) received or transmitted Octets that were between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets).
  • Page 164 D-Link UWS User Manual Viewing System Statistics Table 72: Detailed Port Statistics Fields (Cont.) Field Description Packets Received > 1522 The total number of packets received that were longer than 1522 octets Octets (excluding framing bits, but including FCS octets) and were otherwise well formed.
  • Page 165 D-Link UWS User Manual Viewing System Statistics Table 72: Detailed Port Statistics Fields (Cont.) Field Description 802.3x Pause Frames A count of MAC Control frames received on this interface with an opcode Received indicating the PAUSE operation. This counter does not increment when the interface is operating in half-duplex mode.
  • Page 166 D-Link UWS User Manual Viewing System Statistics Table 72: Detailed Port Statistics Fields (Cont.) Field Description Unicast Packets Transmitted The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent.
  • Page 167 D-Link UWS User Manual Viewing System Statistics Table 72: Detailed Port Statistics Fields (Cont.) Field Description 802.3x Pause Frames A count of MAC Control frames transmitted on this interface with an opcode Transmitted indicating the PAUSE operation. This counter does not increment when the interface is operating in half-duplex mode.
  • Page 168: Port Summary Statistics

    D-Link UWS User Manual Viewing System Statistics Port Summary Statistics The Port Summary Statistics page shows a summary of per-port traffic statistics on the switch. To access the Port Summary Statistics page, click LAN > Monitoring > System Statistics > Port Summary.
  • Page 169: Section 3: Using System Tools

    D-Link UWS User Manual Using System Tools Section 3: Using System Tools The Tools menu contains links to the following Web pages that help you perform switch maintenance: • “Reset Configuration to Defaults” • “Reset Passwords to Defaults” • “System Reset”...
  • Page 170: Reset Passwords To Defaults

    D-Link UWS User Manual Reset Passwords to Defaults Reset Passwords to Defaults Use the Reset Passwords to Defaults page to reset the passwords for the default read/write (admin) and read- only (guest) users on the system. By default, the passwords are blank. If you have configured additional read- only users on your system, their passwords are not affected.
  • Page 171: Save All Applied Changes

    D-Link UWS User Manual Save All Applied Changes Save All Applied Changes When you click Submit, the changes are applied to the system and saved in the running configuration file. However, these changes are not saved to non-volatile memory and will be lost if the system resets. Use the Save All Applied Changes page to make the changes you submit persist across a system reset.
  • Page 172: Table 74: Download File To Switch Fields

    • Text Configuration: A text-based configuration file enables you to edit a configured text file (startup-config) offline as needed without having to translate the contents for the D-Link software to understand. The most common usage of text-based configuration is to upload a working configuration from a device, edit it offline to personalize it for another similar device (i.e., change the device name, serial number, IP address,...
  • Page 173: Downloading A File To The Switch

    1. From the File Type field, select the type of file to download. 2. If you are downloading a D-Link DWS-4000 Series image (Code), select the image on the switch to overwrite. If you are downloading another type of file, the Image field is not available.
  • Page 174: Http File Download

    D-Link UWS User Manual HTTP File Download HTTP File Download Use the HTTP File Download page to download files of various types to the switch using an HTTP session (i.e., via your web browser). To display this page, click Tool > HTTP File Download in the navigation menu.
  • Page 175: Upload File From Switch (Tftp)

    D-Link UWS User Manual Upload File From Switch (TFTP) • Click the Start File Transfer button to initiate the file download. Upload File From Switch (TFTP) Use the Upload File from Switch page to upload configuration (ASCII) and image (binary) files from the switch to the TFTP server.
  • Page 176: Uploading Files

    1. From the File Type field, select the type of file to copy from the switch to the TFTP server. 2. If you are uploading a D-Link DWS-4000 Series image (Code), select the image on the switch to upload. If you are uploading another type of file, the Image Name field is not available.
  • Page 177: Figure 89: Multiple Image Service

    D-Link UWS User Manual Multiple Image Service Figure 89: Multiple Image Service The Active Image page contains the following fields: Table 77: Multiple Image Service Fields Field Description Image Name Select Active or Backup from the menu to activate on the next reload or to be deleted.
  • Page 178: Viewing The Dual Image Status

    Viewing the Dual Image Status The Dual Image feature allows the switch to have two D-Link DWS-4000 Series software images in the permanent storage. One image is the active image, and the second image is the backup. This feature reduces the system down-time during upgrades and downgrades.
  • Page 179: Erase Startup-Config File

    D-Link UWS User Manual Erase Startup-config File Erase Startup-config File Use the Erase Startup-config File to erase the startup-configuration file. To display this page, click Tool > Erase Startup-config File in the navigation menu. Figure 91: Erase Startup-config File AutoInstall The AutoInstall feature enables the configuration of a switch automatically when the device is turned on and, during the boot process, no configuration file is found in device storage.
  • Page 180: Table 79: Autoinstall Fields

    D-Link UWS User Manual AutoInstall Table 79: AutoInstall Fields Field Description AutoInstall Mode • Select Start to initiate sending a request to a DHCP server to obtain an IP address of a server and the configuration file name. If it obtains the server address, AutoInstall proceeds to search for and download a configuration file from the server.
  • Page 181: Section 4: Configuring L2 Features

    Section 4: Configuring L2 Features Use the pages in the L2 Features navigation tree folder to configure the Layer 2 switching features available on the D-Link DWS-4000 Series switch. The L2 Features folder contains links to the following features: •...
  • Page 182: Configuring And Searching The Forwarding Database

    D-Link UWS User Manual Configuring and Searching the Forwarding Database Configuring and Searching the Forwarding Database The forwarding database maintains a list of MAC addresses after having received a packet from this MAC address. The transparent bridging function uses the forwarding database entries to determine how to forward a received frame.
  • Page 183: Mac Address Table

    D-Link UWS User Manual Configuring and Searching the Forwarding Database MAC Address Table Use the MAC Address Table page to display information about entries in the forwarding database. To access the page, click LAN > Monitoring > MAC Address Table in the navigation tree.
  • Page 184: Searching The Forwarding Database

    D-Link UWS User Manual Managing VLANs Searching the Forwarding Database Use the following procedures to search the forwarding database. 1. Enter the two-byte hexadecimal VLAN ID followed by the six byte hexadecimal MAC address in two-digit groups separated by colons.
  • Page 185: Figure 95: Vlan Configuration

    D-Link UWS User Manual Managing VLANs Figure 95: VLAN Configuration Table 81: VLAN Configuration Fields Field Description VLAN ID List You can use this screen view/modify/delete an existing VLAN configuration or to create new single/multiple VLAN IDs specified in VLAN ID field. Use this pull down menu to select one of the existing VLANs to view/modify the configuration.
  • Page 186 D-Link UWS User Manual Managing VLANs Table 81: VLAN Configuration Fields (Cont.) Field Description Participation Use this field to specify whether a port will participate in this VLAN. The factory default is “Autodetect.” The possible values are: • Include: This port is always a member of this VLAN. This is equivalent to registration fixed in the IEEE 802.1Q standard.
  • Page 187: Vlan Status

    D-Link UWS User Manual Managing VLANs VLAN. VLAN Status Use the VLAN Status page to view information about the VLANs configured on your system. To access the VLAN Status page, click LAN > Monitoring> VLAN Summary > VLAN Status in the navigation tree.
  • Page 188: Vlan Port Configuration

    D-Link UWS User Manual Managing VLANs VLAN Port Configuration Use the VLAN Port Configuration page to configure a virtual LAN on a port. To access the VLAN Port Configuration page, click LAN > L2 Features> VLAN > Port Configuration in the navigation tree.
  • Page 189: Vlan Port Summary

    D-Link UWS User Manual Managing VLANs VLAN Port Summary Use the VLAN Port Summary page to view VLAN configuration information for all the ports on the system. To access the VLAN Port Summary page, click LAN > Monitoring> VLAN Summary > VLAN Port Summary in the navigation menu.
  • Page 190: Managing Protocol-Based Vlans

    D-Link UWS User Manual Managing VLANs Managing Protocol-Based VLANs In a protocol-based VLAN, traffic is bridged through specified ports based on the protocol associated with the VLAN. User-defined packet filters determine whether a particular packet belongs to a particular VLAN.
  • Page 191: Figure 100: Protocol Group

    D-Link UWS User Manual Managing VLANs To create and configure a protocol group, enter a group ID and click Submit. The page refreshes and additional fields appear. Figure 100: Protocol Group Table 86: Protocol Group Fields Field Description Group ID Use the drop-down menu to create a new group or to configure the selected protocol group.
  • Page 192: Protocol-Based Vlan Summary

    D-Link UWS User Manual Managing VLANs Protocol-Based VLAN Summary Use the Protocol-based VLAN Summary page to view information about protocol-based VLAN groups configured on the system. To access the Protocol-based VLAN Summary page, click LAN > Monitoring> VLAN Summary > Protocol-based VLAN Port Summary in the navigation tree.
  • Page 193: Managing Ip Subnet-Based Vlans

    D-Link UWS User Manual Managing VLANs Managing IP Subnet-Based VLANs If a packet is untagged or priority- tagged, the device associates the packet with any matching IP subnet classification. If no IP subnet classification can be made, then the packet is subjected to the normal VLAN classification rules of the device.
  • Page 194: Ip Subnet-Based Vlan Summary

    D-Link UWS User Manual Managing VLANs IP Subnet-based VLAN Summary Use the IP Subnet-based VLAN Summary page to view information about IP subnet to VLAN mappings configured on your system. If no mappings are configured, the screen displays a “No IP Subnet-based VLAN Configured”...
  • Page 195: Mac-Based Vlan Summary

    D-Link UWS User Manual Managing VLANs Figure 104: MAC-based VLAN Configuration Table 90: MAC-based VLAN Configuration Fields Field Description MAC Address Specifies the source MAC address to map to a VLAN. VLAN ID Specifies the VLAN to which the source MAC address is to be bound.
  • Page 196: Double Vlan Tunneling

    D-Link UWS User Manual Managing VLANs Double VLAN Tunneling Double VLAN Tunneling allows the use of a second tag on network traffic. The additional tag helps differentiate between customers in the Metropolitan Area Networks (MAN) while preserving individual customer’s VLAN identification when they enter their own 802.1Q domain.
  • Page 197: Double Vlan Tunneling Summary

    D-Link UWS User Manual Managing VLANs Double VLAN Tunneling Summary The Double VLAN Tunneling Summary page shows the double VLAN tunneling configuration status for all ports on the system. To access the Double VLAN Tunneling Summary page, click LAN > Monitoring > VLAN Summary > Double VLAN Status in the navigation tree.
  • Page 198: Voice Vlan Configuration

    D-Link UWS User Manual Voice VLAN Configuration Voice VLAN Configuration The voice VLAN feature enables switch ports to carry voice traffic with defined settings so that voice and data traffic are separated when coming onto the port. A voice VLAN ensures that the sound quality of an IP phone is safeguarded from deterioration when data traffic on the port is high.
  • Page 199: Reset Vlan Configuration

    D-Link UWS User Manual Voice VLAN Configuration Table 94: Voice VLAN Configuration Fields (Cont.) Field Description Voice VLAN Interface Mode Select one of the following interface modes: • Disable: The voice VLAN service is disabled on this interface. Note that the Admin mode field takes precedence;...
  • Page 200: Configuring Protected Ports

    D-Link UWS User Manual Configuring Protected Ports Configuring Protected Ports The Protected Ports feature assists in Layer 2 security. Ports that are configured to be protected cannot forward traffic to other protected ports in the same group, regardless of having the same VLAN membership.
  • Page 201: Assigning Ports To A Group

    D-Link UWS User Manual Configuring Protected Ports Assigning Ports to a Group 1. Select a group ID from the Group ID field. 2. From the Protected Port(s) field, click one port to add a single port to the group, or hold the CTRL key and click multiple ports to add more than one port to the group.
  • Page 202: Creating Mac Filters

    D-Link UWS User Manual Creating MAC Filters Creating MAC Filters Use the MAC Filtering Configuration page to associate a MAC address with a VLAN and set of source ports and destination ports. Any packet with a static MAC address in a specific VLAN is admitted only if the ingress port is included in the set of source ports;...
  • Page 203: Adding Mac Filters

    D-Link UWS User Manual Creating MAC Filters • Click Submit to update the switch with the values on the screen. If you want the switch to retain the new values across a power cycle, you must perform a save. • Click Delete to remove the currently selected filter.
  • Page 204: Configuring Garp

    D-Link UWS User Manual Configuring GARP Configuring GARP Generic Attribute Registration Protocol (GARP) is a general-purpose protocol that registers any network connectivity or membership-style information. GARP defines a set of switches interested in a given network attribute, such as VLAN or multicast address.
  • Page 205: Table 98: Garp Status Fields

    D-Link UWS User Manual Configuring GARP The GARP Status page contains the following fields: Table 98: GARP Status Fields Field Description Switch GVRP Shows whether the switch GVRP protocol is enabled or disabled. Switch GMRP Shows whether the switch GMRP protocol is enabled or disabled.
  • Page 206: Garp Switch Configuration

    D-Link UWS User Manual Configuring GARP GARP Switch Configuration Use the GARP Switch Configuration page to configure GARP settings for the system. To access the GARP Switch Configuration page, click LAN > L2 Features> GARP > Switch Configuration in the navigation tree.
  • Page 207: Garp Port Configuration

    D-Link UWS User Manual Configuring GARP GARP Port Configuration Use the GARP Port Configuration page to configure GARP settings for a specific interface. To access the GARP Port Configuration page, click LAN > L2 Features> GARP > Port Configuration in the navigation tree.
  • Page 208 D-Link UWS User Manual Configuring GARP Table 100: GARP Port Configuration Fields (Cont.) Field Description GARP Leave Timer (centisecs) Displays time lapse, in centiseconds, that the switch waits before leaving its GARP state. Leave time is activated by a Leave All Time message sent/ received, and cancelled by the Join message received.This allows time for...
  • Page 209: Creating Port Channels (Trunking)

    D-Link UWS User Manual Creating Port Channels (Trunking) Creating Port Channels (Trunking) Port-trunks, which are also known as link aggregation groups (LAGs), allow you to combine multiple full-duplex Ethernet links into a single logical link. Network devices treat the aggregation as if it were a single link, which increases fault tolerance and provides load sharing.
  • Page 210: Table 101: Port Channel Configuration Fields

    D-Link UWS User Manual Creating Port Channels (Trunking) Table 101: Port Channel Configuration Fields Field Description Port Channel Interface You can use this screen to reconfigure an existing Port Channel, or to create a new one. Use this pull down menu to select one of the existing Port Channels, or select 'Create' to add a new one.
  • Page 211: Port Channel Status

    D-Link UWS User Manual Creating Port Channels (Trunking) Table 101: Port Channel Configuration Fields (Cont.) Field Description Participation Select each port’s membership status for the Port Channel you are configuring. There can be a maximum of 8 ports assigned to a Port Channel.
  • Page 212 D-Link UWS User Manual Creating Port Channels (Trunking) Table 102: Port Channel Status Fields (Cont.) Field Description Admin Mode Select enable or disable from the pulldown menu. When the Port Channel is disabled no traffic will flow and LACPDUs will be dropped, but the links that form the Port Channel will not be released.
  • Page 213: Configuring Igmp Snooping

    D-Link UWS User Manual Configuring IGMP Snooping Configuring IGMP Snooping Internet Group Management Protocol (IGMP) Snooping is a feature that allows a switch to forward multicast traffic intelligently on the switch. Multicast IP traffic is traffic that is destined to a host group. Host groups are identified by class D IP addresses, which range from 224.0.0.0 to 239.255.255.255.
  • Page 214: Global Configuration And Status

    D-Link UWS User Manual Configuring IGMP Snooping Global Configuration and Status Use the IGMP Snooping Global Configuration and Status page to enable IGMP snooping on the switch and view information about the current IGMP configuration. To access the IGMP Snooping Configuration and Status page, click LAN > L2 Features> IGMP Snooping >...
  • Page 215: Interface Configuration

    D-Link UWS User Manual Configuring IGMP Snooping Interface Configuration Use the IGMP Snooping Interface Configuration page to configure IGMP snooping settings on specific interfaces. To access the IGMP Snooping Interface Configuration page, click LAN > L2 Features> IGMP Snooping >...
  • Page 216: Vlan Configuration

    D-Link UWS User Manual Configuring IGMP Snooping VLAN Configuration Use the IGMP Snooping VLAN Configuration page to configure IGMP snooping settings for VLANs on the system. To access the IGMP Snooping VLAN Configuration page, click LAN > L2 Features> IGMP Snooping > VLAN Configuration in the navigation tree.
  • Page 217: Vlan Status

    D-Link UWS User Manual Configuring IGMP Snooping Table 105: IGMP Snooping VLAN Configuration Fields (Cont.) Field Description Operational Maximum This read-only field displays the value for maximum response time of IGMP Response Time Snooping for the specified VLAN ID. Its value is learned dynamically from the IGMPv2 or IGMPv3 queries received on this VLAN.
  • Page 218: Multicast Router Configuration

    D-Link UWS User Manual Configuring IGMP Snooping Table 106: IGMP Snooping VLAN Status Fields (Cont.) Field Description Operational Maximum Displays the value for maximum response time of IGMP Snooping for the Response Time specified VLAN ID. Its value is learned dynamically from the IGMPv2 or IGMPv3 queries received on this VLAN.
  • Page 219: Multicast Router Status

    D-Link UWS User Manual Configuring IGMP Snooping Multicast Router Status Use the IGMP Snooping Multicast Router Status page to see whether a particular interface is configured as a multicast router interface. To access the IGMP Snooping Multicast Router Statistics page, click Monitoring> IGMP Snooping Status >...
  • Page 220: Multicast Router Vlan Configuration

    D-Link UWS User Manual Configuring IGMP Snooping Multicast Router VLAN Configuration Use the IGMP Snooping Multicast Router VLAN Configuration page to configure multicast router settings for VLANs on an interface. To access the IGMP Snooping Multicast Router VLAN Configuration page, click LAN > L2 Features> IGMP Snooping >...
  • Page 221: Multicast Router Vlan Status

    D-Link UWS User Manual Configuring IGMP Snooping Multicast Router VLAN Status Use the IGMP Snooping Multicast Router VLAN Status page to view multicast router settings for VLANs on a specific interface. To access the IGMP Snooping Multicast Router VLAN Status page, click Monitoring> IGMP Snooping Status >...
  • Page 222: Configuring Igmp Snooping Queriers

    D-Link UWS User Manual Configuring IGMP Snooping Queriers Configuring IGMP Snooping Queriers IGMP snooping requires that one central switch or router periodically query all end-devices on the network to announce their multicast memberships. This central device is the 'IGMP querier'. The IGMP query responses, known as IGMP reports, keep the switch updated with the current multicast group membership on a port-by- port basis.
  • Page 223: Igmp Snooping Querier Vlan Configuration

    D-Link UWS User Manual Configuring IGMP Snooping Queriers Table 111: IGMP Snooping Querier Configuration Fields (Cont.) Field Description Querier Expiry Interval Specify the time interval in seconds after which the last querier information is removed. The Querier Expiry Interval must be a value in the range of 60 and 300.
  • Page 224: Igmp Snooping Querier Vlan Configuration Summary

    D-Link UWS User Manual Configuring IGMP Snooping Queriers IGMP Snooping Querier VLAN Configuration Summary Use this page to view summary information for IGMP snooping queriers for on VLANs in the network. To access this page, click LAN > L2 Features> IGMP Snooping Querier > IGMP Snooping Querier VLAN Configuration Summary in the navigation tree.
  • Page 225: Igmp Snooping Querier Vlan Status

    D-Link UWS User Manual Configuring IGMP Snooping Queriers IGMP Snooping Querier VLAN Status Use this page to view the operational state and other information for IGMP snooping queriers for VLANs on the network. To access this page, click Monitoring > Querier VLAN Status in the navigation tree.
  • Page 226: Configuring Mld Snooping

    D-Link UWS User Manual Configuring MLD Snooping Configuring MLD Snooping In IPv4, Layer 2 switches can use IGMP snooping to limit the flooding of multicast traffic by dynamically configuring Layer-2 interfaces so that multicast traffic is forwarded to only those interfaces associated with an IP multicast address.
  • Page 227: Interface Configuration

    D-Link UWS User Manual Configuring MLD Snooping Table 115: MLD Snooping Global Configuration and Status Fields (Cont.) Field Description Data Frames Forwarded by Shows the number of data frames forwarded by the CPU. the CPU VLAN Ids Enabled For MLD Displays VLAN Ids enabled for MLD snooping.
  • Page 228: Vlan Status

    D-Link UWS User Manual Configuring MLD Snooping Table 116: MLD Snooping Interface Configuration Fields (Cont.) Field Description Multicast Router Present Specify the amount of time you want the switch to wait to receive a query on Expiration Time an interface before removing it from the list of interfaces with multicast routers attached.
  • Page 229: Vlan Configuration

    D-Link UWS User Manual Configuring MLD Snooping VLAN Configuration Use the MLD Snooping VLAN Configuration page to configure MLD Snooping settings for VLANs on the system. To access the MLD Snooping VLAN Configuration page, click LAN > L2 Features> MLD Snooping > VLAN Configuration in the navigation tree.
  • Page 230: Multicast Router Configuration

    D-Link UWS User Manual Configuring MLD Snooping Table 118: MLD Snooping VLAN Configuration Fields (Cont.) Field Description Multicast Router Expiry Time Enter the amount of time in seconds that a switch waits for a query to be received on an interface before the interface is removed from the list of interfaces with multicast routers attached.
  • Page 231: Multicast Router Status

    D-Link UWS User Manual Configuring MLD Snooping Multicast Router Status Use the MLD Snooping Multicast Router Status page to view multicast router functionality on selected ports. To access this page, click Monitoring > MLD Snooping > Multicast Router Status in the navigation tree.
  • Page 232: Multicast Router Vlan Configuration

    D-Link UWS User Manual Configuring MLD Snooping Multicast Router VLAN Configuration Use the MLD Snooping Multicast Router VLAN Configuration page to configure multicast router settings for VLANs on an interface. To access the MLD Snooping Multicast Router VLAN Configuration page, click LAN > L2 Features> MLD Snooping >...
  • Page 233: Multicast Router Vlan Status

    D-Link UWS User Manual Configuring MLD Snooping Multicast Router VLAN Status Use the MLD Snooping Multicast Router VLAN Status page to view multicast router settings for VLANs on a specific interface. To access the MLD Snooping Multicast Router VLAN Statistics page, click Monitoring > MLD Snooping >...
  • Page 234: Configuring Mld Snooping Queriers

    D-Link UWS User Manual Configuring MLD Snooping Queriers Configuring MLD Snooping Queriers In an IPv6 environment, MLD Snooping requires that one central switch or router periodically query all end- devices on the network to announce their multicast memberships. This central device is the 'MLD querier'. The MLD query responses, known as MLD reports, keep the switch updated with the current multicast group membership on a port-by-port basis.
  • Page 235: Mld Snooping Querier Vlan Configuration

    D-Link UWS User Manual Configuring MLD Snooping Queriers Table 123: MLD Snooping Querier Configuration Fields (Cont.) Field Description Querier Expiry Interval Specify the time interval in seconds after which the last querier information is removed. The Querier Expiry Interval must be a value in the range of 60 and 300.
  • Page 236: Mld Snooping Querier Vlan Configuration Summary

    D-Link UWS User Manual Configuring MLD Snooping Queriers MLD Snooping Querier VLAN Configuration Summary Use this page to view summary information for MLD Snooping queriers for on VLANs in the network. To access this page, click Monitoring > MLD Snooping Querier > Querier VLAN Configuration Summary in the navigation tree.
  • Page 237: Mld Snooping Querier Vlan Status

    D-Link UWS User Manual Configuring MLD Snooping Queriers MLD Snooping Querier VLAN Status Use this page to view the operational state and other information for MLD Snooping queriers for VLANs on the network. To access this page, click LAN > Monitoring > MLD Snooping Querier > Querier VLAN Status in the navigation tree.
  • Page 238: Viewing Multicast Forwarding Database Information

    D-Link UWS User Manual Viewing Multicast Forwarding Database Information Viewing Multicast Forwarding Database Information The Layer 2 Multicast Forwarding Database (MFDB) is used by the switch to make forwarding decisions for packets that arrive with a multicast destination MAC address. By limiting multicasts to only certain ports in the switch, traffic is prevented from going to parts of the network where that traffic is unnecessary.
  • Page 239: Mfdb Gmrp Table

    D-Link UWS User Manual Viewing Multicast Forwarding Database Information Table 127: MFDB Table Fields (Cont.) Field Description Description The text description of this multicast table entry. Possible values are Management Configured, Network Configured and Network Assisted. Interface(s) The list of interfaces that are designated for forwarding (Fwd) and filtering (Flt) for the selected address.
  • Page 240: Mfdb Igmp Snooping Table

    D-Link UWS User Manual Viewing Multicast Forwarding Database Information MFDB IGMP Snooping Table Use the IGMP Snooping Table page to view all of the entries in the Multicast Forwarding Database that were created for IGMP snooping. To access the IGMP Snooping Table page, click LAN > Monitoring > Multicast Forwarding Database > IGMP Snooping Table in the navigation tree.
  • Page 241: Mfdb Mld Snooping Table

    D-Link UWS User Manual Viewing Multicast Forwarding Database Information MFDB MLD Snooping Table Use the MLD Snooping Table page to view all of the entries in the Multicast Forwarding Database that were created for MLD Snooping. To access the MLD Snooping Table page, click LAN > Monitoring> Multicast Forwarding Database > MLD Snooping Table in the navigation tree.
  • Page 242: Mfdb Statistics

    D-Link UWS User Manual Viewing Multicast Forwarding Database Information MFDB Statistics Use the multicast forwarding database Stats page to view statistical information about the MFDB table. To access the Stats page, click LAN > Monitoring > Multicast Forwarding Database > Statistics in the navigation tree.
  • Page 243: Configuring Spanning Tree Protocol

    D-Link UWS User Manual Configuring Spanning Tree Protocol Configuring Spanning Tree Protocol The Spanning Tree Protocol () provides a tree topology for any arrangement of bridges. also provides one path between end stations on a network, eliminating loops. Spanning tree versions supported include Common , Multiple , and Rapid .
  • Page 244: Table 132: Spanning Tree Switch Configuration/Status Fields

    D-Link UWS User Manual Configuring Spanning Tree Protocol Table 132: Spanning Tree Switch Configuration/Status Fields Field Description Spanning Tree Admin Mode Enables or disables on the switch. Force Protocol Version Specifies the Force Protocol Version parameter for the switch: • IEEE 802.1D: Spanning Tree Protocol () •...
  • Page 245: Cst Configuration/Status

    D-Link UWS User Manual Configuring Spanning Tree Protocol CST Configuration/Status Use the Spanning Tree CST Configuration/Status page to configure Common Spanning Tree (CST) and Internal Spanning Tree on the switch. To display the Spanning Tree CST Configuration/Status page, click LAN > L2 FeaturesSpanning TreeCST Configuration/Status in the navigation tree.
  • Page 246 D-Link UWS User Manual Configuring Spanning Tree Protocol Table 133: Spanning Tree CST Configuration/Status Fields (Cont.) Field Description Bridge Max Age (secs) Specifies the switch maximum age time, which indicates the amount of time in seconds a bridge waits before implementing a topological change. The valid range is 6-40, and the value must be less than or equal to (2 * Bridge Forward Delay) –...
  • Page 247: Mst Configuration/Status

    D-Link UWS User Manual Configuring Spanning Tree Protocol MST Configuration/Status Use the Spanning Tree MST Configuration/Status page to configure Multiple Spanning Tree (MST) on the switch. To display the Spanning Tree MST Configuration/Status page, click LAN > L2 FeaturesSpanning TreeMST Configuration/Status Identification in the navigation tree.
  • Page 248: Table 134: Spanning Tree Mst Configuration/Status

    D-Link UWS User Manual Configuring Spanning Tree Protocol Table 134: Spanning Tree MST Configuration/Status Field Description Use the drop-down menu to create and configure a new MST or select an existing MST to display or configure. MST ID This is only visible when Create is selected from the MST field drop-down menu. The ID of the MST being created.
  • Page 249: Cst Port Configuration/Status

    D-Link UWS User Manual Configuring Spanning Tree Protocol CST Port Configuration/Status Use the Spanning Tree CST Port Configuration/Status page to configure Common Spanning Tree (CST) and Internal Spanning Tree on a specific port on the switch. To display the Spanning Tree CST Port Configuration/Status page, click LAN > L2 FeaturesSpanning Tree...
  • Page 250: Table 135: Spanning Tree Cst Port Configuration/Status Fields

    D-Link UWS User Manual Configuring Spanning Tree Protocol Table 135: Spanning Tree CST Port Configuration/Status Fields Field Description Interface Select a physical or port channel interface to configure. The port is associated with the VLAN(s) associated with the CST. Port Priority The priority for a particular port within the CST.
  • Page 251 D-Link UWS User Manual Configuring Spanning Tree Protocol Table 135: Spanning Tree CST Port Configuration/Status Fields (Cont.) Field Description Port Forwarding State Indicates the current state of a port. If enabled, the port state determines what forwarding action is taken on traffic. Possible port states are: •...
  • Page 252: Mst Port Configuration/Status

    D-Link UWS User Manual Configuring Spanning Tree Protocol Table 135: Spanning Tree CST Port Configuration/Status Fields (Cont.) Field Description Transitions Into Loop Shows the number of times this interface has moved into a loop inconsistent Inconsistent State state. Transitions Out Of Loop...
  • Page 253: Table 136: Spanning Tree Mst Port Configuration/Status Fields

    D-Link UWS User Manual Configuring Spanning Tree Protocol Table 136: Spanning Tree MST Port Configuration/Status Fields Field Description MST ID Select an existing MST instance from drop-down list to display or configure its values. Interface Select a physical or port channel interface to configure. The port is associated with the VLAN(s) associated with the MST.
  • Page 254: Statistics

    D-Link UWS User Manual Configuring Spanning Tree Protocol Table 136: Spanning Tree MST Port Configuration/Status Fields (Cont.) Field Description Loop Inconsistent State This parameter identifies whether the port is in a loop inconsistent state in the specified MST instance. If the port is in a loop inconsistent state, it does not forward packets.
  • Page 255: Configuring Dhcp Snooping

    D-Link UWS User Manual Configuring DHCP Snooping Table 137: Spanning Tree Statistics Fields (Cont.) Field Description R BPDUs Transmitted Number of R BPDUs transmitted from the selected port. M BPDUs Received Number of M BPDUs received at the selected port.
  • Page 256: Dhcp Snooping Vlan Configuration

    D-Link UWS User Manual Configuring DHCP Snooping Table 138: DHCP Snooping Configuration Field Description DHCP Snooping Mode Enables or disables the DHCP Snooping feature. The default is Disable. MAC Address Validation Enables or disables the validation of sender MAC Address for DHCP Snooping.
  • Page 257: Dhcp Snooping Interface Configuration

    D-Link UWS User Manual Configuring DHCP Snooping DHCP Snooping Interface Configuration The hardware rate limits DHCP packets sent to the CPU from untrusted interfaces to 15 packets per second. There is no hardware rate limiting on trusted interfaces. To prevent DHCP packets from being used as a DoS attack when DHCP snooping is enabled, the snooping application enforces a rate limit for DHCP packets received on untrusted interfaces.
  • Page 258: Managing Lldp

    D-Link DWS-4000 Series allows LLDP to have multiple LLDP neighbors per interface. The number of such neighbors is limited by the memory constraints. A product-specific constant defines the maximum number of neighbors supported by the switch.
  • Page 259: Global Configuration

    D-Link UWS User Manual Managing LLDP Global Configuration Use the LLDP Global Configuration page to specify LLDP parameters that are applied to the switch. To display the LLDP Global Configuration page, click LAN > L2 Features > LLDP > Global Configuration in the navigation tree.
  • Page 260: Interface Configuration

    D-Link UWS User Manual Managing LLDP Interface Configuration Use the LLDP Interface Configuration page to specify LLDP parameters that are applied to a specific interface. To display the LLDP Interface Configuration page, click LAN > L2 FeaturesLLDPInterface Configuration in the navigation tree.
  • Page 261: Interface Summary

    D-Link UWS User Manual Managing LLDP Interface Summary Use the LLDP Interface Summary page to view the LLDP parameters configured on each physical port on the system. To display the LLDP Interface Summary page, click LAN > Monitoring > LLDP StatusInterface Summaryin the navigation tree.
  • Page 262: Statistics

    D-Link UWS User Manual Managing LLDP Statistics Use the LLDP Statistics page to view the global and interface LLDP statistics. To display the LLDP Statistics page, click LAN > Monitoring > LLDP StatusStatistics in the navigation tree. Figure 161: LLDP Statistics...
  • Page 263: Local Device Information

    D-Link UWS User Manual Managing LLDP Table 144: LLDP Statistics Fields (Cont.) Field Description Errors Displays the number of invalid LLDP frames received by the LLDP agent on the corresponding port, while the LLDP agent is enabled. Ageouts Displays the number of age-outs that occurred on a given port. An age-out is the number...
  • Page 264: Local Device Summary

    D-Link UWS User Manual Managing LLDP Table 145: LLDP Local Device Information Fields Field Description Interface Select from the list of all the ports on which LLDP-802.1AB frames can be transmitted. Chassis ID Subtype Displays the string that describes the source of the chassis identifier.
  • Page 265: Remote Device Information

    D-Link UWS User Manual Managing LLDP Table 146: LLDP Local Device Summary Columns Field Description Interface Displays the slot/port on which LLDP-802.1AB frames can be transmitted. Port ID Displays the string describing the source of the port identifier. Port Description Displays the description of the port associated with the local system.
  • Page 266: Remote Device Summary

    D-Link UWS User Manual Managing LLDP Table 147: LLDP Remote Device Information Fields (Cont.) Field Description Port Description Displays the user-defined description of the port. System Capabilities Displays the system capabilities of the remote system. Supported System Capabilities Enabled Displays the system capabilities of the remote system which are supported and enabled.
  • Page 267: Lldp-Med

    D-Link UWS User Manual Managing LLDP LLDP-MED The Link Layer Discovery Protocol-Media Endpoint Discovery (LLDP-MED) is an enhancement to LLDP that features: • Auto-discovery of LAN policies (such as VLAN, Layer 2 Priority and DiffServ settings), enabling plug and play networking.
  • Page 268: Lldp-Med Interface Configuration

    D-Link UWS User Manual Managing LLDP LLDP-MED Interface Configuration Use this page to enable LLDP-MED mode on an interface and configure its properties. To display this page, click LAN > L2 Features > LLDP > LLDP-MED > Interface Configuration in the navigation tree.
  • Page 269: Lldp-Med Interface Summary

    D-Link UWS User Manual Managing LLDP LLDP-MED Interface Summary This page lists each switch interface and its LLDP configuration status. To display this page, click LAN > Monitoring > LLDP Status LLDP-MED > Interface Summary in the navigation tree. Figure 168: LLDP-MED Interface Summary...
  • Page 270: Lldp Local Device Information

    D-Link UWS User Manual Managing LLDP LLDP Local Device Information This page displays information on LLDP-MED information advertised on the selected local interface. To display this page, click LAN > Monitoring > LLDP Status LLDP-MED > Local Device Information in the navigation tree.
  • Page 271 D-Link UWS User Manual Managing LLDP Table 152: LLDP-MED Local Device Information Fields (Cont.) Field Description Inventory Specifies the inventory TLV present in LLDP frames: • Hardware Revisions. Specifies hardware version. • Firmware Revisions. Specifies firmware version. • Software Revisions. Specifies software version.
  • Page 272: Lldp-Med Remote Device Information

    D-Link UWS User Manual Managing LLDP LLDP-MED Remote Device Information This page displays information on LLDP-MED information received from remote clients on the selected local interface. To display this page, click LAN > Monitoring > LLDP Status > LLDP-MED > Remote Device Information in the navigation tree.
  • Page 273 D-Link UWS User Manual Managing LLDP Table 153: LLDP-MED Remote Device Information Fields (Cont.) Field Description Network Policy Information Specifies if network policy TLV is received in the LLDP frames on this port: • Media Application Type: Specifies the application type. Types of...
  • Page 274: Configuring Dynamic Arp Inspection

    D-Link UWS User Manual Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP packets. DAI prevents a class of man-in-the-middle attacks, where an unfriendly station intercepts traffic for other stations by poisoning the ARP caches of its unsuspecting neighbors.
  • Page 275: Dai Vlan Configuration

    D-Link UWS User Manual Configuring Dynamic ARP Inspection DAI VLAN Configuration Use the DAI VLAN Configuration page to select the DAI-capable VLANs for which information is to be displayed or configured. To display the DAI Configuration page, click LAN > L2 Features>Dynamic ARP Inspection > DAI VLAN Configuration in the navigation tree.
  • Page 276: Dai Interface Configuration

    D-Link UWS User Manual Configuring Dynamic ARP Inspection DAI Interface Configuration Use the DAI Interface Configuration page to select the DAI Interface for which information is to be displayed or configured. To display the DAI Interface Configuration page, click LAN > L2 Features>Dynamic ARP Inspection > DAI Interface Configuration in the navigation tree.
  • Page 277: Dai Arp Acl Configuration

    D-Link UWS User Manual Configuring Dynamic ARP Inspection DAI ARP ACL Configuration Use the DAI ARP ACL Configuration page to add or remove DAI ARP ACLs. To display the DAI ARP ACL Configuration page, click LAN > L2 Features>Dynamic ARP Inspection > DAI ARP ACL Configuration in the navigation tree.
  • Page 278: Dai Arp Acl Rule Configuration

    D-Link UWS User Manual Configuring Dynamic ARP Inspection DAI ARP ACL Rule Configuration Use the DAI ARP ACL Rule Configuration page to add or remove DAI ARP ACL Rules. To display the DAI ARP ACL Rule Configuration page, click LAN > L2 Features>Dynamic ARP Inspection > DAI ARP ACL Rule Configuration in the navigation tree.
  • Page 279: Dynamic Arp Inspection Statistics

    D-Link UWS User Manual Configuring Dynamic ARP Inspection Dynamic ARP Inspection Statistics Use the Dynamic ARP Inspection (DAI) Statistics page to display the statistics per VLAN. To display the DAI Statistics page, click LAN > Monitoring > Dynamic ARP Inspection Statistics in the navigation tree.
  • Page 280: Section 5: Configuring L3 Features

    Configuring L3 Features Section 5: Configuring L3 Features The D-Link Unified Switch supports IP routing. Use the pages in the LAN > L3 Features navigation tree folder to manage routing on the system. This section contains the following information: •...
  • Page 281: Bootp/Dhcp Relay Agent Configuration

    D-Link UWS User Manual Managing the BOOTP/DHCP Relay Agent BootP/DHCP Relay Agent Configuration Use the BOOTP/DHCP Relay Agent Configuration page to configure and display a BOOTP/DHCP relay agent. To display the page, click LAN > L3 Features > BOOTP/DHCP Relay Agent > Configuration in the navigation tree.
  • Page 282: Bootp/Dhcp Relay Agent Status

    D-Link UWS User Manual Managing the BOOTP/DHCP Relay Agent BOOTP/DHCP Relay Agent Status Use the BOOTP/DHCP Relay Agent Status page to display the BOOTP/DHCP Relay Agent configuration and status information. To display the page, click LAN > Monitoring > L3 Status > BOOTP/DHCP Relay Agent Status in the navigation tree.
  • Page 283: Configuring The Ip Helper Features

    D-Link UWS User Manual Configuring the IP Helper Features Configuring the IP Helper Features The IP Helper feature provides the ability for a router to forward configured UDP broadcast packets to a particular IP address. This allows applications to reach servers on non-local subnets. This is possible even when the application is designed to assume a server is always on a local subnet or when the application uses broadcast packets to reach the server (with the limited broadcast address 255.255.255.255, or a network...
  • Page 284: Figure 180: Adding A Global Ip Helper Entry

    D-Link UWS User Manual Configuring the IP Helper Features Table 162: IP Helper Global Configuration Fields (Cont.) Field Description Server Address Shows the Server Address to which the packets with the given UDP Destination Port will be relayed. Hit Count Shows the number of times a packet has been forwarded or discarded according to this entry.
  • Page 285: Ip Helper Interface Configuration

    D-Link UWS User Manual Configuring the IP Helper Features IP Helper Interface Configuration Use the IP Helper Interface Configuration page to configure per-interface relay settings. To display the page, click LAN > L3 Features >IP Helper > Interface Configuration in the navigation tree.
  • Page 286: Figure 182: Adding An Ip Helper Entry To An Interface

    D-Link UWS User Manual Configuring the IP Helper Features To add a relay entry, click Add. The page refreshes and provides the configurable fields to add a UDP destination port and server IP address. Figure 182: Adding an IP Helper Entry to an Interface...
  • Page 287: Ip Helper Statistics

    D-Link UWS User Manual Configuring the IP Helper Features IP Helper Statistics Use the IP Helper – Helper Statistics page to view IP Helper statistics. To display the page, click LAN > L3 Features >IP Helper > Statistics in the navigation tree.
  • Page 288: Configuring Arp

    Specifies the number of UDP packets discarded. Configuring ARP The ARP protocol associates a layer 2 MAC address with a layer 3 IPv4 address. D-Link DWS-4000 Series software features both dynamic and manual ARP configuration. With manual ARP configuration, you can statically add entries into the ARP table.
  • Page 289: Arp Create

    D-Link UWS User Manual Configuring ARP ARP Create Use the ARP Create page to add an entry to the Address Resolution Protocol table. To display the page, click LAN > L3 Features > ARP > ARP Create in the navigation tree.
  • Page 290: Arp Table Configuration

    D-Link UWS User Manual Configuring ARP ARP Table Configuration Use this page to change the configuration parameters for the Address Resolution Protocol Table. You can also use this screen to display the contents of the table. To display the page, click LAN > L3 Features > ARP > ARP Table Configuration in the navigation tree.
  • Page 291: Table 169: Arp Table Fields

    D-Link UWS User Manual Configuring ARP Table 168: ARP Table Configuration Fields (Cont.) Field Description Peak Total Entries Highest value reached by Total Entry Count. This counter value is restarted whenever the ARP table Cache Size value is changed. Active Static Entries Total number of active static entries in the ARP table.
  • Page 292: Viewing Arp Cache

    D-Link UWS User Manual Viewing ARP Cache Viewing ARP Cache The ARP cache is a table maintained locally in each station on a network. ARP cache entries are learned by examining the source information in the ARP packet payload fields, regardless of whether it is an ARP request or response.
  • Page 293: Configuring Global And Interface Ip Settings

    By default, the D-Link DWS-4000 Series switch functions as a layer 2 switch. The pages under the IP folder allow you to enable routing and configure port or VLAN IP addresses so that the D-Link DWS-4000 Series switch also performs layer 3 routing and can route IP packets between devices in different subnets.
  • Page 294 D-Link UWS User Manual Configuring Global and Interface IP Settings Table 171: IP Configuration Fields (Cont.) Field Description ICMP Rate Limit Interval To control the ICMP error packets, you can specify the number of ICMP error packets that are allowed per burst interval. By default, the rate limit is 100 packets per second, i.e.
  • Page 295: Ip Interface Configuration

    D-Link UWS User Manual Configuring Global and Interface IP Settings IP Interface Configuration Use the IP Interface Configuration page to update IP interface data for this switch. To display the page, click LAN > L3 Features > IP > Interface Configuration in the navigation tree.
  • Page 296 D-Link UWS User Manual Configuring Global and Interface IP Settings Table 172: IP Interface Configuration Fields (Cont.) Field Description Routing Mode Setting this Enables or Disables routing for an interface. By default, routing is disabled on port-based routing interfaces and enabled on VLAN-based routing interfaces.
  • Page 297: Ip Statistics

    D-Link UWS User Manual Configuring Global and Interface IP Settings IP Statistics The statistics reported on the IP Statistics page are as specified in RFC 1213. To display the page, click LAN > Monitoring > L3 Status > IP Statistics in the navigation tree.
  • Page 298 D-Link UWS User Manual Configuring Global and Interface IP Settings Table 173: IP Statistics Fields (Cont.) Field Description IpInDelivers The total number of input datagrams successfully delivered to IP user- protocols (including ICMP). IpOutRequests The total number of IP datagrams which local IP user-protocols (including ICMP) supplied to IP in requests for transmission.
  • Page 299 D-Link UWS User Manual Configuring Global and Interface IP Settings Table 173: IP Statistics Fields (Cont.) Field Description IcmpInEchoReps The number of ICMP Echo Reply messages received. IcmpInTimestamps The number of ICMP Timestamp (request) messages received. IcmpInTimestampReps The number of ICMP Timestamp Reply messages received.
  • Page 300: Loopback Interfaces

    D-Link UWS User Manual Loopback Interfaces Loopback Interfaces D-Link DWS-4000 Series software provides for the creation, deletion, and management of loopback interfaces. They are dynamic interfaces that are created and deleted via user-configuration. D-Link DWS-4000 Series software supports multiple loopback interfaces.
  • Page 301: Creating A New Loopback (Ipv4)

    D-Link UWS User Manual Loopback Interfaces The fields available on the Loopbacks Configuration page depend on whether any loopback interfaces exist and whether the protocol is IPv4 or IPv6. The following table describes all fields, which are not all on the same screen at the same time.
  • Page 302: Removing A Loopback

    D-Link UWS User Manual Loopback Interfaces Figure 192: Loopbacks Configuration—IPv4 Entry 4. In the Protocol field, select IPv4 5. Enter desired values in the remaining fields. 6. Click Submit. The new loopback is saved, and the web page reappears showing secondary address configuration fields.
  • Page 303: Loopbacks Summary

    D-Link UWS User Manual Loopback Interfaces Loopbacks Summary Use the Loopbacks Summary page to display a summary of configured loopbacks. To display the page, click LAN > Monitoring > L3 Status > Loopback Summary in the navigation tree. Figure 193: Loopbacks Summary...
  • Page 304: Configuring Rip

    D-Link UWS User Manual Configuring RIP Configuring RIP RIP is an Interior Gateway Protocol (IGP) based on the Bellman-Ford algorithm and targeted at smaller networks (network diameter no greater than 15 hops). The routing information is propagated in RIP update packets that are sent out both periodically and in the event of a network topology change.
  • Page 305: Rip Interface Configuration

    D-Link UWS User Manual Configuring RIP Table 177: RIP Configuration Fields (Cont.) Field Description Auto Summary Mode Select Enable or Disable from the dropdown menu. If you select Enable, groups of adjacent routes are summarized into single entries, in order to reduce the total number of entries.
  • Page 306: Table 178: Rip Interface Configuration Fields

    D-Link UWS User Manual Configuring RIP Table 178: RIP Interface Configuration Fields Field Description Interface Select the interface for which data is to be configured from the menu. Send Version RIP Version that router sends with its routing updates. The default is RIP-2.
  • Page 307: Configuring The Rip Interface

    D-Link UWS User Manual Configuring RIP Configuring the RIP Interface 1. Open the RIP Interface Configuration page. 2. Specify the interface for which data is to be configured. 3. Enter data into the fields as needed. 4. To change the Authentication Type, click Configure Authentication to configure different Authentication Types.
  • Page 308: Rip Interface Summary

    D-Link UWS User Manual Configuring RIP RIP Interface Summary Use the RIP Interface Summary page to display RIP configuration status on an interface. To display the page, click LAN > Monitoring > L3 Status > RIP > Interface Summary in the navigation tree.
  • Page 309: Rip Route Redistribution Configuration

    D-Link UWS User Manual Configuring RIP RIP Route Redistribution Configuration Use the RIP Route Redistribution Configuration page to configure which routes are redistributed to other routers using RIP. The allowable values for each fields are displayed next to the field. If any invalid values are entered, an alert message is displayed with the list of all the valid values.
  • Page 310: Rip Route Redistribution Summary

    D-Link UWS User Manual Configuring RIP When an access list rule includes a destination IP address and netmask (an extended access list), the destination IP address is compared to the network mask of the destination of the route. The destination netmask in the access list serves as a wildcard mask, indicating which bits in the route’s destination mask are...
  • Page 311: Router Discovery

    D-Link UWS User Manual Router Discovery Router Discovery The Router Discovery protocol is used by hosts to identify operational routers on the subnet. Router Discovery messages are of two types: “Router Advertisements” and “Router Solicitations.” The protocol mandates that every router periodically advertise the IP Addresses it is associated with. Hosts listen for these advertisements and discover the IP Addresses of neighboring routers.
  • Page 312 D-Link UWS User Manual Router Discovery • If you make any changes to the page, click Submit to apply the changes to the system. Unified Wired and Wireless Access System D-Link Oct. 2015 Page 312...
  • Page 313: Router Discovery Status

    D-Link UWS User Manual Router Discovery Router Discovery Status Use the Router Discovery Status page to display Router Discovery data for each port. To display the page, click LAN > L3 Features > Router Discovery > Status in the navigation tree.
  • Page 314: Router

    D-Link UWS User Manual Router Table 183: Router Discovery Status Fields (Cont.) Field Description Minimum Advertise The minimum time (in seconds) allowed between router advertisements Interval(secs) sent from the interface. Advertise Lifetime(secs) The value (in seconds) used as the lifetime field in router advertisements sent from the interface.
  • Page 315 D-Link UWS User Manual Router Table 184: Route Table Fields (Cont.) Field Description Protocol This field tells which protocol created the specified route. The possibilities are one of the following: • Local • Static • Default • RIP Next Hop Slot/Port The outgoing router interface to use when forwarding traffic to the destination.
  • Page 316: Best Routes Table

    D-Link UWS User Manual Router Best Routes Table The route table manager collects routes from multiple sources: static routes, RIP routes, and local routes. The route table manager may learn multiple routes to the same destination from multiple sources. In that case, the route table manager selects the route with the lowest route preference value to use for forwarding to that destination.
  • Page 317: Configured (Static) Routes

    D-Link UWS User Manual Router Configured (Static) Routes Use the Configured Routes page to create and display static routes. To display the page, click LAN > L3 Features > Router > Configured Routes in the navigation tree. Figure 204: Configured Routes...
  • Page 318: Deleting A Route

    D-Link UWS User Manual Router Figure 205: Create Static Route Table 187: Route Entry Create Fields Field Description Route Type Specifies whether the route is to be a Default, Static, or Static Reject route. Packets sent to the static reject route are dropped.
  • Page 319: Route Preferences Configuration

    D-Link UWS User Manual Router Route Preferences Configuration Use the Route Preferences Configuration page to configure the default preference for each protocol. These values are arbitrary values that range from 1 to 255, and are independent of route metrics. Most routing protocols use a route metric to determine the shortest path known to the protocol, independent of any other protocol.
  • Page 320: Vlan Routing

    VLAN Routing You can configure the D-Link DWS-4000 Series switch with some ports supporting VLANs and some supporting routing. You can also configure the software to allow traffic on a VLAN to be treated as if the VLAN were a router port.
  • Page 321: Creating A Vlan Routing Interface

    D-Link UWS User Manual VLAN Routing Figure 207 shows the page when at least one VLAN routing interface has been created. Figure 208: VLAN Routing Configuration - Interface Exists Table 189: VLAN Routing Configuration Fields Field Description VLAN ID Enter the ID of a VLAN to configure for VLAN Routing. Initially, the field will display the ID of the first VLAN.
  • Page 322: Deleting A Vlan Router Interface

    D-Link UWS User Manual VLAN Routing 5. Enter the IP address and subnet mask for the VLAN, and configure any other interface settings. 6. Click Submit to apply the settings to the VLAN routing interface. 7. Navigate to the LAN > Monitoring > VLAN Routing Summary page to view the new VLAN in the table.
  • Page 323: Vlan Routing Summary

    D-Link UWS User Manual VLAN Routing VLAN Routing Summary Use the VLAN Routing Summary page to display information about the VLAN Routing interfaces configured on the system. To display the page, click LAN > Monitoring > L3 Status > VLAN Routing Summary in the navigation tree.
  • Page 324: Virtual Router Redundancy Protocol (Vrrp)

    D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP) Virtual Router Redundancy Protocol (VRRP) The Virtual Router Redundancy protocol is designed to handle default router failures by providing a scheme to dynamically elect a backup router. The driving force was to minimize “black hole” periods due to the failure of the default gateway router during which all traffic directed towards it is lost until the failure is detected.
  • Page 325: Virtual Router Configuration

    D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP) Virtual Router Configuration Use the Virtual Router Configuration page to create a new virtual router or to configure an existing one. To display the page, click LAN > L3 Features > VRRP > Virtual Router Interface in the navigation tree.
  • Page 326: Configuring A Secondary Vrrp Address

    D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP) Table 192: Virtual Router Configuration Fields (Cont.) Field Description Configured Priority Enter the priority value to be used by the VRRP router in the election for the master virtual router. If the Virtual IP Address is the same as the interface IP Address, the priority gets set to 255 no matter what you enter.
  • Page 327: Creating A New Virtual Router

    D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP) Creating a New Virtual Router 1. From the Virtual Router Configuration page, select Create from the VRID and Slot/Port menu. 2. Specify the VRID, the virtual router address, and the interface for the new virtual router.
  • Page 328: Vrrp Interface Tracking

    D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP) • Click Add to proceed to the VRRP Interface Tracking page. • Click Submit to apply the new configuration. Configuration changes take effect immediately. These changes will not be retained across a power cycle unless a Save configuration is performed.
  • Page 329: Vrrp Route Tracking Configuration

    D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP) VRRP Route Tracking Configuration Use VRRP Route Tracking Configuration to track specific route IP states within the router that can alter the priority level of a virtual router for a VRRP group.
  • Page 330: Vrrp Route Tracking

    D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP) VRRP Route Tracking Use the VRRP Route Tracking page to add a route into the tracking list. To access this page, click Add from the VRRP Route Tracking page. Figure 215: VRRP Route Tracking...
  • Page 331: Table 197: Virtual Router Status Fields

    D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP) Table 197: Virtual Router Status Fields Field Description VRID Virtual Router Identifier. Slot/Port Indicates the interface associate with the VRID. Priority The priority value used by the VRRP router in the election for the master virtual router.
  • Page 332: Virtual Router Statistics

    D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP) Virtual Router Statistics Use the Virtual Router Statistics page to display statistics for a specified virtual router. To display the page, click LAN > Monitoring > L3 Status > Virtual Router Statistics in the navigation tree.
  • Page 333 D-Link UWS User Manual Virtual Router Redundancy Protocol (VRRP) Table 198: Virtual Router Statistics Fields (Cont.) Field Description Slot/Port The interface for the selected Virtual Router. Up Time The time, in days, hours, minutes and seconds, that has elapsed since the virtual router transitioned to the initialized state.
  • Page 334: Section 6: Configuring Quality Of Service

    D-Link UWS User Manual Configuring Quality of Service Section 6: Configuring Quality of Service This section gives an overview of Quality of Service (QoS) and explains the QoS features available from the Quality of Service navigation tree menu, which include the following: •...
  • Page 335: Trust Mode Configuration

    D-Link UWS User Manual Configuring Class of Service To display the page, click LAN > QoS> Class of Service802.1p Priority Mapping in the navigation tree. Figure 218: 802.1p Priority Mapping Table 199: 802.1p Priority Mapping Field Description Interface Selects the interface to which the class of service configuration is applied.
  • Page 336: Figure 219: Trust Mode Configuration

    D-Link UWS User Manual Configuring Class of Service Alternatively, when a port is configured as untrusted, it does not trust any incoming packet priority designation and uses the port default priority value instead. All packets arriving at the ingress of an untrusted port are directed to a specific CoS queue on the appropriate egress port(s) in accordance with the configured default priority of the ingress port.
  • Page 337: Ip Dscp Mapping Configuration

    D-Link UWS User Manual Configuring Class of Service The Trust Mode Configuration page also displays the Current 802.1p Priority Mapping table. For information about 802.1p priority mapping, see “Mapping 802.1p Priority” on page 334. To access the 802.1 priority mapping configuration page, click LAN > QoS > Class of Service > 802.1p Priority Mapping in the navigation menu.
  • Page 338: Cos Interface Configuration

    D-Link UWS User Manual Configuring Class of Service CoS Interface Configuration Use the CoS Interface Configuration page to apply an interface shaping rate to all ports or to a specific port. To display the CoS Interface Configuration page, click LAN > QoS > Class of Service > CoS Interface Configuration in the navigation menu.
  • Page 339: Cos Interface Queue Configuration

    D-Link UWS User Manual Configuring Class of Service CoS Interface Queue Configuration Use the CoS Interface Queue Configuration page to define what a particular queue does by configuring switch egress queues. User-configurable parameters control the amount of bandwidth used by the queue, the queue depth during times of congestion, and the scheduling of packet transmission from the set of all queues on a port.
  • Page 340: Cos Interface Queue Status

    D-Link UWS User Manual Configuring Class of Service Table 203: Interface Queue Configuration Fields (Cont.) Field Description Scheduler Type Selects the type of queue processing from the dropdown menu. Options are Weighted and Strict. Defining on a per-queue basis allows the user to create the desired service characteristics for different types of traffic.
  • Page 341: Configuring Differentiated Services

    D-Link UWS User Manual Configuring Differentiated Services Configuring Differentiated Services The QoS feature contains Differentiated Services (DiffServ) support that allows traffic to be classified into streams and given certain QoS treatment in accordance with defined per-hop behaviors. Standard IP-based networks are designed to provide “best effort” data delivery service. “Best effort” service implies that the network delivers the data in a timely fashion, although there is no guarantee that it will.
  • Page 342: Figure 224: Diffserv Configuration

    D-Link UWS User Manual Configuring Differentiated Services To display the page, click LAN > Quality of Service > Differentiated Services > Diffserv Configuration in the navigation menu. Figure 224: DiffServ Configuration Table 204: DiffServ Configuration Fields Field Description DiffServ Admin Mode Turns admin mode on and off.
  • Page 343: Class Configuration

    D-Link UWS User Manual Configuring Differentiated Services Class Configuration Use the Class Configuration page to add a new Diffserv class name, or to rename or delete an existing class. The page also allows you to define the criteria to associate with a DiffServ class. As packets are received, these DiffServ classes are used to prioritize packets.
  • Page 344: Table 205: Diffserv Class Configuration Fields

    D-Link UWS User Manual Configuring Differentiated Services Table 205: DiffServ Class Configuration Fields Field Description Class Selector To configure a new DiffServ class, select Create. To modify or view an existing class, select the name of the class from the dropdown menu.
  • Page 345: Diffserv Class Summary

    D-Link UWS User Manual Configuring Differentiated Services Table 205: DiffServ Class Configuration Fields (Cont.) Field Description Class Match Selector (cont.) • Protocol: Requires a packet’s layer 4 protocol to match the protocol you select. If you select Other, enter a protocol number in the field that appears.
  • Page 346: Policy Configuration

    D-Link UWS User Manual Configuring Differentiated Services Policy Configuration Use the Policy Configuration page to associate a collection of classes with one or more policy statements. To display the page, click LAN > QoS > Differentiated Services > Policy Configuration in the navigation menu.
  • Page 347: Diffserv Policy Summary

    D-Link UWS User Manual Configuring Differentiated Services Table 206: Policy Configuration Fields (Cont.) Field Description Policy Type The available policy type is In, which indicates the type is specific to inbound traffic. Out indicates the type is specific to outbound traffic direction. This field is only configurable when you create a new policy.
  • Page 348: Policy Class Definition

    D-Link UWS User Manual Configuring Differentiated Services Policy Class Definition Use the Policy Class Definition page to associate a class to a policy and to define attributes for that policy-class instance. To display the page, click LAN > QoS > Differentiated Services > Policy Class Definition in the navigation menu.
  • Page 349 D-Link UWS User Manual Configuring Differentiated Services Table 207: Policy Class Definition Fields (Cont.) Field Description Policy Attribute • Mark IP Precedence: Use this attribute to mark all packets for the associated traffic Selector (Cont.) stream with the IP Precedence value you enter in the IP Precedence Value field.
  • Page 350: Diffserv Policy Attribute Summary

    D-Link UWS User Manual Configuring Differentiated Services DiffServ Policy Attribute Summary The DiffServ Policy Attribute Summary page provides an overview of the attributes that have been configured for each policy. To display the page, click LAN > Monitoring > Differentiated Services > Policy Attribute Summary in the navigation menu.
  • Page 351: Diffserv Service Summary

    D-Link UWS User Manual Configuring Differentiated Services DiffServ Service Summary The DiffServ Service Summary page provides an overview of the policies-port associations. To display the page, click LAN > Monitoring > Differentiated Services > Service Summary in the navigation menu.
  • Page 352: Service Detailed Statistics

    D-Link UWS User Manual Configuring Differentiated Services Table 209: Service Statistics Fields (Cont.) Field Description Operational Status Shows the operational status of this service interface, which is either Up or Down. Offered Octets Shows the total number of packets/octets offered to all class instances in this service policy before their defined DiffServ treatment is applied.
  • Page 353: Table 210: Service Detailed Statistics Fields

    D-Link UWS User Manual Configuring Differentiated Services Table 210: Service Detailed Statistics Fields Field Description Counter Mode Selects the format of the displayed counter values, which must be either Octets or Packets. Selector The default is Octets. Interface List of all valid slot number and port number combinations in the system that have a DiffServ policy currently attached in the In direction.
  • Page 354: Configuring Auto Voip

    D-Link UWS User Manual Configuring Auto VoIP Configuring Auto VoIP Voice over Internet Protocol (VoIP) allows you to make telephone calls using a computer network over a data network like the Internet. With the increased prominence of delay-sensitive applications (voice, video, and other multimedia applications) deployed in networks today, proper QoS configuration will ensure high-quality application performance.
  • Page 355: Auto Voip Summary

    D-Link UWS User Manual Configuring Auto VoIP Table 211: Auto VoIP Configuration Fields Field Description Interface Specifies all Auto VoIP configurable interfaces. The All option represents the most recent configuration settings done for all ports. These settings may be overridden on a per-interface basis.
  • Page 356: Section 7: Configuring Access Control Lists

    D-Link DWS-4000 Series software supports IPv4 and MAC ACLs. The total number of MAC and IP ACLs supported by D-Link DWS-4000 Series software is 100.
  • Page 357: Ip Acl Configuration

    D-Link UWS User Manual Configuring IP Access Control Lists IP ACL Configuration Use the IP ACL Configuration page to add or remove IP-based ACLs. On this menu the interfaces to which an IP ACL applies must be specified, as well as whether it applies to inbound or outbound traffic. Rules for the IP ACL are specified/created using the “IP ACL Rule...
  • Page 358: Ip Acl Rule Configuration

    D-Link UWS User Manual Configuring IP Access Control Lists The ACL Table at the bottom of the page shows the current size of the ACL table versus the maximum size of the ACL table. The current size is equal to the number of configured IPv4 and IPv6 ACLs plus the number of configured MAC ACLs.
  • Page 359: Figure 241: Ip Acl Rule Configuration (Extended Acl Rule)

    D-Link UWS User Manual Configuring IP Access Control Lists Figure 241 shows the fields available when you create a rule for an extended IP ACL. Figure 241: IP ACL Rule Configuration (Extended ACL Rule) Table 213 shows all possible fields on the IP ACL Rule Configuration page. The actual fields available on the page depend on what type of rule you configure, whether you create a new rule or modify an existing rule, and whether the rule action is Permit or Deny.
  • Page 360 D-Link UWS User Manual Configuring IP Access Control Lists Table 213: IP ACL Rule Configuration Fields (Cont.) Field Description Logging This field is only visible for a Deny Action. When set to True, logging is enabled for this ACL rule (subject to resource availability in the device). If the Access...
  • Page 361 D-Link UWS User Manual Configuring IP Access Control Lists Table 213: IP ACL Rule Configuration Fields (Cont.) Field Description Source IP Address Requires a packet’s source port IP address to match the address listed here. Click Configure, and then enter an IP Address in the appropriate field using dotted-decimal notation.
  • Page 362: Modifying An Ip-Based Rule

    D-Link UWS User Manual Configuring IP Access Control Lists Table 213: IP ACL Rule Configuration Fields (Cont.) Field Description Service Type Select one of the following three Match conditions for the extended IP ACL rule. These are alternative ways of specifying a match condition for the same Service Type field in the IP header, however each uses a different user notation.
  • Page 363: Adding A New Rule To An Ip-Based Acl

    D-Link UWS User Manual Configuring IP Access Control Lists Adding a New Rule to an IP-based ACL 1. Open the IP ACL Rule Configuration page. 2. Select the desired ACL from the IP ACL menu. 3. Specify Create Rule for Rule ID and enter a new ID number.
  • Page 364: Ip Acl Rule Summary

    D-Link UWS User Manual MAC Access Control Lists IP ACL Rule Summary Use the IP ACL Rule Summary page to view a summary of the IP ACLs that have been configured on the switch. To access the page, click LAN > Monitoring > Access Control Lists > IP Access Control Lists > Summary.
  • Page 365: Mac Acl Configuration

    D-Link UWS User Manual MAC Access Control Lists MAC ACL Configuration The MAC ACL Configuration page allows network administrators to define a MAC-based ACL. To display the MAC ACL Configuration page, click LAN > QoS > Access Control Lists > MAC Access Control Lists >...
  • Page 366: Mac Acl Rule Configuration

    D-Link UWS User Manual MAC Access Control Lists MAC ACL Rule Configuration Use the MAC ACL Rule Configuration page to define rules for MAC-based ACLs. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. A default 'deny all' rule is the last rule of every list.
  • Page 367: Figure 247: Mac Acl Rule Configuration (Permit Action)

    D-Link UWS User Manual MAC Access Control Lists Figure 247 shows the fields available when you create a rule for a MAC ACL. Figure 247: MAC ACL Rule Configuration (Permit Action) Table 215 shows all possible fields on the MAC ACL Rule Configuration page. The actual fields available on the page depend on whether you create a new rule or modify an existing rule, and whether the rule action is Permit or Deny.
  • Page 368 D-Link UWS User Manual MAC Access Control Lists Table 215: MAC ACL Rule Configuration Fields (Cont.) Field Description Logging This field is only visible for a Deny Action. When set to True, logging is enabled for this ACL rule (subject to resource availability in the device). If the Access...
  • Page 369: Adding A New Rule To A Mac-Based Acl

    D-Link UWS User Manual MAC Access Control Lists Table 215: MAC ACL Rule Configuration Fields (Cont.) Field Description EtherType Key Requires a packet’s EtherType to match the EtherType you select. Click Configure, and then select the EtherType value from the dropdown menu. If you select User Value, you can enter a custom EtherType value.
  • Page 370: Mac Acl Summary

    D-Link UWS User Manual MAC Access Control Lists MAC ACL Summary Use the MAC ACL Summary page to view a summary of the MAC ACLs that have been configured on the switch. To access the page, click LAN > Monitoring > Access Control Lists > MAC Access Control Lists > Summary.
  • Page 371: Acl Interface Configuration

    D-Link UWS User Manual ACL Interface Configuration ACL Interface Configuration When an ACL is bound to an interface, all the rules that have been defined are applied to the selected interface. Use the ACL Interface Configuration page to assign ACLs and Interfaces and prioritize the ACLs that are bound to each interface.
  • Page 372: Assigning An Acl To An Interface

    D-Link UWS User Manual ACL Interface Configuration Assigning an ACL to an Interface 1. Open the ACL Interface Configuration page. 2. Select the interface from the Slot/Port field to which you want to bind the ACL. 3. Select the type of ACL in the ACL Type field.
  • Page 373: Section 8: Managing Device Security

    D-Link UWS User Manual Managing Device Security Section 8: Managing Device Security Use the features in the Security folder on the navigation tree menu to set management security parameters for port, user, and server security. The Security folder contains links to the following features: •...
  • Page 374: Port Security Administration

    D-Link UWS User Manual Configuring Port Security Port Security Administration Use the Port Security Administration page to enable or disable the port security feature on your switch. To access the Port Security Administration page, click LAN > Security > Port Security Administration in the navigation tree.
  • Page 375: Table 217: Port Security Interface Configuration Fields

    D-Link UWS User Manual Configuring Port Security Table 217: Port Security Interface Configuration Fields Field Description Interface Select the physical interface or the LAG on which to configure port security information. Port Security Determines whether port security is enabled. The default mode is Disable.
  • Page 376: Port Security Static

    D-Link UWS User Manual Configuring Port Security Port Security Static Use the Port Security Static page to view static MAC addresses configured on an interface. To access the Port Security Static page, click LAN > Security > Port Security Static in the navigation tree.
  • Page 377: Port Security Dynamic

    D-Link UWS User Manual Configuring Port Security Port Security Dynamic Use the Port Security Dynamic page to view a table with the dynamically learned MAC addresses on an interface. With dynamic locking, MAC addresses are learned on a “first arrival” basis. You specify how many addresses can be learned on the locked port.
  • Page 378: Port Security Violation Status

    D-Link UWS User Manual Configuring Port Security Port Security Violation Status Use the Port Security Violation Status page to enable or disable the port security feature on your switch. To access the Port Security Violation Status page, click LAN > Monitoring > Port Security > Port Security Violation in the navigation tree.
  • Page 379: Ssl/Secure Http Configuration

    D-Link UWS User Manual SSL/Secure HTTP Configuration SSL/Secure HTTP Configuration Secure HTTP enables the transmission of HTTP over an encrypted Secure Sockets Layer (SSL) or Transport Layer Security (TLS) connection. When you manage the switch by using a Web interface, secure HTTP can help ensure that communication between the management system and the switch is protected from eavesdroppers and man-in-the-middle attacks.
  • Page 380: Generating Certificates

    D-Link UWS User Manual SSL/Secure HTTP Configuration Table 221: Secure HTTP Configuration Fields (Cont.) Field Description HTTPS Session Hard Timeout Sets the hard timeout for HTTPS sessions. This timeout is unaffected by the activity level of the session. The value must be in the range of (1 to 168) hours.
  • Page 381: Figure 257: File Download

    D-Link UWS User Manual SSL/Secure HTTP Configuration Figure 257: File Download 2. From the File Type field on the File Download page, select one of the following types of SSL files to download: – SSL Trusted Root Certificate PEM File: SSL Trusted Root Certificate File (PEM Encoded).
  • Page 382: Secure Shell (Ssh) Configuration

    D-Link UWS User Manual Secure Shell (SSH) Configuration Secure Shell (SSH) Configuration If you use the command-line interface (CLI) to manage the switch from a remote system, you can use Secure Shell (SSH) to establish a secure connection. SSH uses public-key cryptography to authenticate the remote computer.
  • Page 383: Downloading Ssh Host Keys

    D-Link UWS User Manual Secure Shell (SSH) Configuration Table 222: Secure Shell Configuration Fields (Cont.) Field Description SSH Session Timeout This text field is used to configure the inactivity timeout value for incoming (Minutes) SSH sessions to the switch. The acceptable range for this value is (1-160) minutes.
  • Page 384: Captive Portal Configuration

    D-Link UWS User Manual Captive Portal Configuration Captive Portal Configuration The Captive Portal (CP) feature allows you to block both wired and wireless clients from accessing the network until user verification has been established. You can configure CP verification to allow access for both guest and authenticated users.
  • Page 385: Table 223: Captive Portal Global Configuration

    D-Link UWS User Manual Captive Portal Configuration The following table describes the global CP fields you can view or configure. Table 223: Captive Portal Global Configuration Field Description Enable Captive Select the check box to enable the CP feature on the switch. Clear the check box to Portal disable the captive portal feature.
  • Page 386: Cp Configuration

    D-Link UWS User Manual Captive Portal Configuration CP Configuration From the CP Configuration page, you can view summary information about captive portals on the system, add a captive portal, and configure existing captive portals. Use the CP Summary page to create or delete captive portal configurations. The switch supports 10 CP configurations.
  • Page 387: Changing The Captive Portal Settings

    D-Link UWS User Manual Captive Portal Configuration Table 224: Captive Portal Summary (Cont.) Field Description Protocol Indicates whether the portal uses HTTP or HTTPS. Verification Specifies which type of user verification to perform: • Guest: The user does not need to be authenticated by a database.
  • Page 388 D-Link UWS User Manual Captive Portal Configuration Table 225: CP Configuration (Cont.) Field Description Configuration This field allows you to change the name of the portal added from the CP Summary page. Name Protocol Mode Choose whether to use HTTP or HTTPs as the protocol for the portal to use during the verification process.
  • Page 389: Customizing The Captive Portal Web Page

    D-Link UWS User Manual Captive Portal Configuration Table 225: CP Configuration (Cont.) Field Description Max Transmit Enter the maximum number of bytes that a client is allowed to transmit when using the captive portal. After this limit has been reached the user will be disconnected.
  • Page 390: Figure 262: Cp Web Page Customization - Global Parameters

    D-Link UWS User Manual Captive Portal Configuration deauthenticate. The fields available on the CP WEB Customization page depend on the category you select from the menu. After you modify the fields within a category, make sure you click Submit before you select a different category;...
  • Page 391: Figure 263: Cp Web Page Customization - Authentication Page

    D-Link UWS User Manual Captive Portal Configuration Figure 263: CP Web Page Customization — Authentication page Figure 264: CP Web Page Customization — Welcome Page Unified Wired and Wireless Access System D-Link Oct. 2015 Page 391...
  • Page 392: Figure 265: Cp Web Page Customization - Logout Page

    D-Link UWS User Manual Captive Portal Configuration Figure 265: CP Web Page Customization — Logout Page Figure 266: CP Web Page Customization — Logout Success Page Table 226 describes the fields on the CP Web Page Customization page. Table 226: CP Web Page Customization...
  • Page 393 D-Link UWS User Manual Captive Portal Configuration Table 226: CP Web Page Customization Field Description Background Image Select the name of the image to display as the page background. Use the drop-down menu to display the file names of the available images. Click the ...
  • Page 394 D-Link UWS User Manual Captive Portal Configuration Table 226: CP Web Page Customization Field Description Denied Message Enter the text to display when the user does not provide valid authentication information. This message displays after the user clicks the button to connect to the network.
  • Page 395: Local User

    D-Link UWS User Manual Captive Portal Configuration Local User You can configure a portal to accommodate guest users and authorized users. Guest users do not have assigned user names and passwords. Authorized users provide a valid user name and password that must first be validated against a local database or RADIUS server.
  • Page 396: Adding A Local User

    D-Link UWS User Manual Captive Portal Configuration Adding a Local User When you click Add from the Local User Summary page, the screen refreshes, and you can add a new user to the Local User database. To configure additional parameters for the new user, return to the Local User Summary page and click the name of the new user.
  • Page 397: Configuring Users In The Local Database

    D-Link UWS User Manual Captive Portal Configuration Configuring Users in the Local Database From the Local User Configuration page, you can configure additional settings for an existing CP user in the local database. When you add a user, you can set maximum data transmission rates to control bandwidth usage.
  • Page 398: Configuring Users In A Remote Radius Server

    D-Link UWS User Manual Captive Portal Configuration Table 229: Local User Configuration (Cont.) Field Description Max Transmit Enter the maximum number of bytes that the user is allowed to transmit when using the captive portal. After this limit has been reached the user will be disconnected.
  • Page 399 D-Link UWS User Manual Captive Portal Configuration Table 230: Captive Portal User RADIUS Attributes Attribute Number Description Range Usage Default WISPr-Bandwidth- 14122, 8 Maximum client receive rate Integer Optional – Max-Down (b/s). Limits the bandwidth at which the client can receive data from the network.
  • Page 400: Interface Association

    D-Link UWS User Manual Captive Portal Configuration Interface Association From the Interface Association page, you can associate a configured captive portal with a specific physical interface or wireless network (SSID). The CP feature only runs on the wired or wireless interfaces that you specify.
  • Page 401: Cp Global Status

    D-Link UWS User Manual Captive Portal Configuration Use the following steps to associate one or more interfaces with a captive portal. 1. Select the desired captive portal from the CP Configuration list. 2. Select the interface or interfaces from the Interface List. To select more than one interface, hold CTRL and click multiple interfaces.
  • Page 402: Viewing Cp Activation And Activity Status

    D-Link UWS User Manual Captive Portal Configuration Table 232 describes the fields displayed on the CP Global Status page. Table 232: Global Captive Portal Status Field Description CP Global Operational Status Shows whether the CP feature is enabled. CP Global Disable Reason...
  • Page 403: Table 233: Cp Activation And Activity Status

    D-Link UWS User Manual Captive Portal Configuration Table 233 describes the information that displays for each portal. Table 233: CP Activation and Activity Status Field Description Operational Status Indicates whether the captive portal is enabled or disabled. Disable Reason If the captive portal is disabled, then this field indicates the reason. The portal instance may be disabled for the following reasons: •...
  • Page 404: Interface Status

    D-Link UWS User Manual Captive Portal Configuration Interface Status The pages available from the Interface Status link provide information about the captive portal interfaces and their capabilities. Viewing Interface Activation Status The Interface Activation Status page shows information for every interface assigned to a captive portal instance.
  • Page 405: Viewing Interface Capability Status

    D-Link UWS User Manual Captive Portal Configuration Viewing Interface Capability Status The Interface Capability Status page contains information about interfaces that can have CPs associated with them. The page also contains status information for various capabilities. Specifically, this page indicates what services are provided through the CP to clients connected on this interface.
  • Page 406: Client Connection Status

    D-Link UWS User Manual Captive Portal Configuration Client Connection Status From the Client Connection Status page, you can access several pages that provide information about clients that are connected to the switch through the CP. Use the Client Summary page to view summary information about all authenticated wireless clients that are connected through the captive portal.
  • Page 407: Viewing Client Details

    D-Link UWS User Manual Captive Portal Configuration Viewing Client Details The Client Detail page shows detailed information about each client connected to the network through a captive portal. Figure 276: Client Detail The drop-down menu lists each associated client by MAC address. To view status information for a different client, select its MAC address from the list.
  • Page 408: Viewing The Client Statistics

    D-Link UWS User Manual Captive Portal Configuration Viewing the Client Statistics Use the Client Statistics page to view information about the traffic a client has sent or received. Figure 277: Client Statistics The drop-down menu lists each associated client by MAC address. To view statistical information for a client, select it from the list.
  • Page 409: Viewing The Client Cp Association Status

    D-Link UWS User Manual Captive Portal Configuration Table 239 describes the fields on the Interface - Client Status page. Table 239: Interface - Client Status Field Description MAC Address Identifies the MAC address of the wireless client. If the MAC address is marked with an asterisk (*), the authenticated client is authenticated by a peer switch.
  • Page 410: Snmp Trap Configuration

    D-Link UWS User Manual Captive Portal Configuration SNMP Trap Configuration Use the SNMP Trap Configuration page to configure whether or not SNMP traps are sent from the Captive Portal and to specify captive portal events that will generate a trap.
  • Page 411: Radius Settings

    D-Link UWS User Manual RADIUS Settings RADIUS Settings Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for networks. The RADIUS server maintains a user database, which contains per-user authentication information. RADIUS servers provide a centralized authentication method for: •...
  • Page 412 D-Link UWS User Manual RADIUS Settings Table 242: RADIUS Configuration Fields (Cont.) Field Description Number of Named Accounting The number of accounting server groups configured on the system. An Server Groups accounting server group contains one or more configured authentication servers that share the same RADIUS server name.
  • Page 413: Radius Server Configuration

    D-Link UWS User Manual RADIUS Settings RADIUS Server Configuration From the RADIUS Authentication Server Configuration page, you can add a new RADIUS server, configure settings for a new or existing RADIUS server, and view RADIUS server status information. The RADIUS client on the switch supports up to 32 named authentication and accounting servers.
  • Page 414: Table 243: Radius Server Configuration Fields

    D-Link UWS User Manual RADIUS Settings Table 243: RADIUS Server Configuration Fields Field Description RADIUS Server Host Address Use the drop-down menu to select the IP address of the RADIUS server to view or configure. Select Add to configure additional RADIUS servers.
  • Page 415: Viewing Named Server Status Information

    D-Link UWS User Manual RADIUS Settings Use the buttons at the bottom of the page to perform the following actions: • If you make changes to the page, click Submit to apply the changes to the system. • To delete a configured RADIUS authentication server, select the IP address of the server from the RADIUS Server Host Address menu, and then click Remove.
  • Page 416: Radius Server Statistics

    D-Link UWS User Manual RADIUS Settings RADIUS Server Statistics To access the RADIUS Server Statistics page, click LAN > Monitoring > RADIUS Statistics > Server Statistics in the navigation menu. Figure 285: RADIUS Server Statistics RADIUS Accounting Server Configuration From the RADIUS Accounting Server Configuration page, you can add a new RADIUS accounting server, configure settings for a new or existing RADIUS accounting server, and view RADIUS accounting server status information.
  • Page 417: Figure 287: Radius Accounting Server Configuration-Server Added

    D-Link UWS User Manual RADIUS Settings If at least one RADIUS accounting server is configured on the switch, and a host address is selected in the Accounting Server Host Address field, then additional fields are available on the Accounting Server Configuration page.
  • Page 418: Viewing Named Accounting Server Status

    D-Link UWS User Manual RADIUS Settings Viewing Named Accounting Server Status The RADIUS Named Accounting Server Status page shows summary information about the accounting servers configured on the system. Figure 288: RADIUS Named Accounting Server Status Table 246: Named Accounting Server Fields...
  • Page 419: Radius Server Statistics

    D-Link UWS User Manual RADIUS Settings RADIUS Server Statistics To access the RADIUS Server Statistics page, click LAN > Monitoring > RADIUS Statistics > Server Statistics in the navigation menu. Figure 289: RADIUS Accounting Server Statistics Clear Statistics Use the RADIUS Clear Statistics page to reset all RADIUS authentication and accounting statistics to zero.
  • Page 420: Port Access Control

    D-Link UWS User Manual Port Access Control Port Access Control In port-based authentication mode, when 802.1X is enabled globally and on the port, successful authentication of any one supplicant attached to the port results in all users being able to use the port without restrictions.
  • Page 421: Port Configuration

    D-Link UWS User Manual Port Access Control Table 247: Global Port Access Control Configuration Fields (Cont.) Field Description Dynamic VLAN Creation Mode Select Enable to allow the switch to dynamically create a RADIUS-assigned VLAN if it does not already exist in the VLAN database.
  • Page 422: Table 248: Port Access Control Port Configuration Fields

    D-Link UWS User Manual Port Access Control Table 248: Port Access Control Port Configuration Fields Field Description Interface Selects the Port to configure. Control Mode Defines the port authorization state. The control mode is only set if the link status of the port is link up. The possible field values are: •...
  • Page 423: Port Access Entity Capability Configuration

    D-Link UWS User Manual Port Access Control • Click Submit to send the updated screen to the switch and cause the changes to take effect on the switch but these changes will not be retained across a power cycle unless a save is performed.
  • Page 424: Supplicant Port Configuration

    D-Link UWS User Manual Port Access Control Supplicant Port Configuration After you have configured a port as a supplicant, use this page to configure operational properties of the port. To access the Supplicant Port Configuration page, click LAN > Security > Port Access Control > Supplicant Port Configuration.
  • Page 425: Port Status

    D-Link UWS User Manual Port Access Control Port Status Use the Port Access Control Port Status page to view information about the port access control settings on a specific port. To access the Port Access Control Port Status page, click Security > Port Access Control > Port Status in the navigation menu.
  • Page 426: Figure 296: Port Access Control Status - Mac-Based Control Mode

    D-Link UWS User Manual Port Access Control Figure 296: Port Access Control Status - MAC-based Control Mode Table 251: Port Access Control Status Fields Field Description Interface Selects the Unit and Port to view. Protocol Version This field displays the protocol version associated with the selected port. The only possible value is 1, corresponding to the first version of the 802.1x...
  • Page 427 D-Link UWS User Manual Port Access Control Table 251: Port Access Control Status Fields (Cont.) Field Description Authenticator PAE State This field displays the current state of the authenticator PAE state machine. Possible values are as follows: • Initialize • Disconnected •...
  • Page 428 D-Link UWS User Manual Port Access Control Table 251: Port Access Control Status Fields (Cont.) Field Description Maximum Requests Displays the configured maximum requests for the selected port. The maximum requests value is the maximum number of times the authenticator state machine on this port will retransmit an EAPOL EAP Request/Identity before timing out the supplicant.
  • Page 429: Port Summary

    D-Link UWS User Manual Port Access Control Table 251: Port Access Control Status Fields (Cont.) Field Description Session Termination Action Displays the Termination Action set by the RADIUS Server for the selected port. Possible values are: • Default • Reauthenticate If the termination action is Default then, at the end of the session, the client details are initialized.
  • Page 430: Table 252: Port Access Control Port Summary Fields

    D-Link UWS User Manual Port Access Control Table 252: Port Access Control Port Summary Fields Field Description Interface Selects the Unit and Port to view. Control Mode Displays the port authorization state. The possible field values are: • Auto: Automatically detects the mode of the interface.
  • Page 431: Port Access Control Statistics

    D-Link UWS User Manual Port Access Control Port Access Control Statistics Use the Port Access Control Statistics page to view EAP and EAPOL information on a specific port. To access the Port Based Access Control Statistics page, click Security > Port Based Access Control > Statistics in the navigation menu.
  • Page 432: Client Summary

    D-Link UWS User Manual Port Access Control Table 253: Port Access Control Statistics Fields (Cont.) Field Description EAP Request/ID Frames Displays the number of EAP Requested ID frames transmitted via the port. Transmitted EAP Request Frames Displays the number of EAP Request frames transmitted via the port.
  • Page 433: Port Access Privileges

    D-Link UWS User Manual Port Access Control Port Access Privileges Use the Port Access Control Privileges page to grant or deny port access to users configured on the system. To access the Port Based Access Control Privileges page, click LAN > Security > Port Access Control > Port Access Privileges in the navigation menu.
  • Page 434: Tacacs+ Settings

    TACACS+ Settings TACACS+ Settings D-Link DWS-4000 Series switch provides Terminal Access Controller Access Control System (TACACS+) client support. TACACS+ provides centralized security for validation of users accessing the device. TACACS+ provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes.
  • Page 435: Tacacs+ Server Configuration

    D-Link UWS User Manual TACACS+ Settings TACACS+ Server Configuration Use the TACACS+ Server Configuration page to configure up to five TACACS+ servers with which the switch can communicate. To display the TACACS+ Server Configuration page, click LAN > Security > TACACS+ > Server Configuration in the navigation menu.
  • Page 436 D-Link UWS User Manual TACACS+ Settings Unified Wired and Wireless Access System D-Link Oct. 2015 Page 436...
  • Page 437: Section 9: Configuring The Wireless Features

    D-Link UWS User Manual Configuring the Wireless Features Section 9: Configuring the Wireless Features The D-Link Unified Switch is a wireless local area network (WLAN) solution that enables WLAN deployment while providing state-of-the-art wireless networking features. It is a scalable solution that provides secure wireless connectivity and seamless layer 2 and layer 3 fast roaming for end users.
  • Page 438: D-Link Dws-4000 Series Unified Wireless Switch

    AP management and streamline the AP upgrade process by pushing configuration profiles and software upgrades from the DWS-4000 Series switch to the managed APs. The DWL-8600AP and DWL-6600AP each have two radios and are capable of broadcasting in the following wireless modes: •...
  • Page 439: Dws-4000 Series Switch And Ap Discovery Methods

    D-Link UWS User Manual Unified Wired and Wireless Access System Components The DWL-3600AP has one radio and is capable of broadcasting in the following wireless modes: • IEEE 802.11b mode • IEEE 802.11g mode • IEEE 802.11n mode (2.4 GHz) The DWL-X600AP access points support up to 16 virtual access points (VAPs) per radio.
  • Page 440: Ip Address Of Ap Configured In The Switch

    D-Link UWS User Manual Unified Wired and Wireless Access System Components IP Address of AP Configured in the Switch If APs are in a different broadcast domain than the DWS-4000 Series switch or use different management VLANs, You can add the IP addresses of the APs to the L3 Discovery list on the switch. The DWS-4000 Series switch sends UDP discovery messages to the IP addresses in its list.
  • Page 441: Configuring The Dhcp Option

    D-Link UWS User Manual Unified Wired and Wireless Access System Components switch-address-2 192.168.19.242 switch-address-3 switch-address-4 dhcp-switch-address-1 dhcp-switch-address-2 dhcp-switch-address-3 dhcp-switch-address-4 managed-mode-watchdog 0 Configuring the DHCP Option You can configure the IP address of the DWS-4000 Series switch as an option in the DHCP response to the DHCP request that the AP sends the DHCP server.
  • Page 442 D-Link UWS User Manual Unified Wired and Wireless Access System Components 2. From the Available Options list, scroll to Option 43 and select the 043 Vendor Specific Info check box. 3. Enter the Option 43 data into the Data Entry field.
  • Page 443: Discovery And Peer Switches

    D-Link UWS User Manual Unified Wired and Wireless Access System Components Discovery and Peer Switches When multiple peer switches are present in the network, you can control which switch or switches are allowed to discover a particular AP by the discovery method you use.
  • Page 444: Monitoring Status And Statistics

    • Configure the DHCP option 43 with the IP addresses of additional switches in the cluster. Monitoring Status and Statistics The Status/Statistics folder contains links to the following pages that help you monitor the status and statistics for your D-Link Unified Switch network: • Monitoring Status and Statistics •...
  • Page 445: Figure 303: Global Wlan Status/Statistics

    D-Link UWS User Manual Monitoring Status and Statistics Figure 303: Global WLAN Status/Statistics Table 258 on page 446 describes the fields on the Wireless Global Status/Statistics page. Unified Wired and Wireless Access System D-Link Oct. 2015 Page 445...
  • Page 446: Table 258: Global Wlan Status/Statistics

    D-Link UWS User Manual Monitoring Status and Statistics Table 258: Global WLAN Status/Statistics Field Description WLAN Switch This status field displays the operational status of the WLAN Switch. The WLAN Operational Status Switch may be configured as enabled, but is operationally disabled due to configuration dependencies.
  • Page 447 D-Link UWS User Manual Monitoring Status and Statistics Table 258: Global WLAN Status/Statistics (Cont.) Field Description Discovered Access APs that have a connection with the switch, but haven't been completely configured. Points This value includes all managed APs with a Discovered or Authenticated status.
  • Page 448 D-Link UWS User Manual Monitoring Status and Statistics Table 258: Global WLAN Status/Statistics (Cont.) Field Description Maximum AP Number of AP provisioning entries that can be stored by the system. Provisioning Entries RRM Channel Load Current number of RRM channel load history entries in use by the system.
  • Page 449: Viewing Switch Status And Statistics Information

    D-Link UWS User Manual Monitoring Status and Statistics Table 258: Global WLAN Status/Statistics (Cont.) Field Description TSPEC Statistics (Voice and Video) Total TSPEC Packets The number of TSPEC packets sent from the wireless client to the AP. The number is Received a total for all APs managed by the switch.
  • Page 450: Figure 304: Switch Status/Statistics

    D-Link UWS User Manual Monitoring Status and Statistics Figure 304: Switch Status/Statistics Table 258 on page 446 describes the fields on the Wireless Global Status page. Table 259: Switch Status/Statistics Field Description Total Access Points Total number of Managed APs in the database. This value is always equal to the sum of Managed Access Points, Connection Failed Access Points, and Discovered Access Points.
  • Page 451 D-Link UWS User Manual Monitoring Status and Statistics Table 259: Switch Status/Statistics Field Description Maximum Managed Maximum number of access points that can be managed by the switch. Access Points WLAN Utilization Total network utilization across all APs managed by this switch. This is based on global statistics.
  • Page 452 D-Link UWS User Manual Monitoring Status and Statistics Table 259: Switch Status/Statistics Field Description TSPEC Statistics (Voice and Video) Total TSPEC Packets The number of TSPEC packets sent from the wireless client to the AP. The number is Received a total for all APs managed by the switch.
  • Page 453: Viewing Ip Discovery Status

    D-Link UWS User Manual Monitoring Status and Statistics Viewing IP Discovery Status From the WLAN > Monitoring > Global > IP Discovery tab, you can view information about communication with the devices in the IP discovery list on the WLAN > Administration > Basic Setup > Discovery page.
  • Page 454 D-Link UWS User Manual Monitoring Status and Statistics Table 260: AP Hardware Capability Radio Detail (Cont.) Field Description IP Address Shows the IP address of the device configured in the IP Discovery list. Status The status is in one of the following states: •...
  • Page 455: Viewing The Peer Switch Configuration Received Status

    D-Link UWS User Manual Monitoring Status and Statistics Viewing the Peer Switch Configuration Received Status The Peer Switch Configuration feature allows you to send the critical wireless configuration from one switch to all other switches. In addition to keeping the switches synchronized, this function enables the administrator to manage all wireless switches in the cluster from one switch.
  • Page 456: Viewing The Ap Hardware Capability List

    D-Link UWS User Manual Monitoring Status and Statistics Table 261: Peer Switch Configuration (Cont.) Field Description Configuration Indicates which portions of configuration were last received from a peer switch, which can be one or more of the following: • Global •...
  • Page 457: Ap Hardware Radio Capability

    D-Link UWS User Manual Monitoring Status and Statistics Table 262 describes the fields available on the AP Hardware Capabilities page. Table 262: AP Hardware Capability Summary Field Description Hardware Type Identifies the ID number assigned to each AP hardware type. The switch supports up to six different AP hardware types.
  • Page 458: Ap Image Capability

    D-Link UWS User Manual Monitoring Status and Statistics AP Image Capability The switch is able to update software on the access points that it manages. To update the AP with the correct software, the UWS can store up to three AP software images to support different AP hardware types. This page displays the image ID-to-hardware type mapping.
  • Page 459: Peer Switch Status

    D-Link UWS User Manual Monitoring Status and Statistics Peer Switch Status The Peer Switch Status page provides information about other Unified Wireless Switches in the network. To access the peer switch information, click WLAN > Monitoring > Peer Switch. Peer wireless switches within the same cluster exchange data about themselves, their managed APs, and clients.
  • Page 460: Viewing Peer Switch Configuration Status

    D-Link UWS User Manual Monitoring Status and Statistics Viewing Peer Switch Configuration Status You can push portions of the switch configuration from one switch to another switch in the cluster. The Peer Switch Configuration Status page displays information about the configuration sent by a peer switch in the cluster.
  • Page 461: Viewing Peer Switch Managed Ap Status

    D-Link UWS User Manual Monitoring Status and Statistics Command Buttons The page includes the following button: • Refresh—Updates the page with the latest information. Viewing Peer Switch Managed AP Status The Peer Switch Managed AP Status page displays information about the APs that each peer switch in the cluster manages.
  • Page 462: All Ap Status

    The network address of the access point. Software Version Shows the version of D-Link Access Point software that the AP is running. Shows how much time has passed since the AP was last detected and the information was last updated.
  • Page 463 D-Link UWS User Manual Monitoring Status and Statistics Table 268: Monitoring All Access Points (Cont.) Field Description Status Shows the access point status: • Managed—The AP profile configuration has been applied to the AP and it's operating in managed mode.
  • Page 464: Managed Ap Status

    D-Link UWS User Manual Monitoring Status and Statistics Table 268: Monitoring All Access Points (Cont.) Field Description Radio Shows the wireless radio mode the AP is using. Channel Shows the operating channel for the radio. Authenticated Clients Shows the number of wireless clients that are associated and authenticated with the access point per radio.
  • Page 465: Monitoring Ap Status

    D-Link UWS User Manual Monitoring Status and Statistics Monitoring AP Status The following figure shows the Managed Access Point Status page with two managed APs. Figure 314: Managed AP Status The following tabs are available from the Managed AP Status page: •...
  • Page 466 D-Link UWS User Manual Monitoring Status and Statistics Table 269: Managed Access Point Status (Cont.) Field Description IP Address The network IP address of the managed AP. Software Version The software version the AP is currently running. Time since last communication between the DWS-4000 Series switch and the AP.
  • Page 467: Viewing Detailed Managed Access Point Status

    D-Link UWS User Manual Monitoring Status and Statistics Note: You can sort the list of APs by clicking any of the column headings. For example, to sort the APs by the profile they use, click Profile. Command Buttons The page includes the following buttons: •...
  • Page 468 D-Link UWS User Manual Monitoring Status and Statistics Table 270: Detailed Managed Access Point Status (Cont.) Field Description Code Download Status Indicates the current status of a code download request for this AP. The possible values include the following: • Not Started: No download has begun.
  • Page 469 IP address. • Switch IP DHCP: The managed AP learned the current DWL-X600AP IP address through DHCP option 43. • L2 Poll Received: The AP was discovered through the D-Link Wireless Device Discovery protocol. Protocol Version Indicates the protocol version supported by the software on the AP, which is learned from the AP during discovery.
  • Page 470 D-Link UWS User Manual Monitoring Status and Statistics • Back—Returns to the Managed AP Status page. Unified Wired and Wireless Access System D-Link Oct. 2015 Page 470...
  • Page 471: Viewing Managed Access Point Radio Summary Information

    D-Link UWS User Manual Monitoring Status and Statistics Viewing Managed Access Point Radio Summary Information You can view general information about each operational radio on all APs managed by the switch. The Managed Access Point Radio Summary page shows the channel, transmit power, and number of associated wireless clients for all managed APs.
  • Page 472 D-Link UWS User Manual Monitoring Status and Statistics Table 272: Managed AP Radio Detail (Cont.) Field Description Manual Channel Indicates the current state of a manual request to change the channel on this radio. Adjustment Status The valid values are: •...
  • Page 473: Viewing Managed Access Point Neighbor Aps

    D-Link UWS User Manual Monitoring Status and Statistics Table 272: Managed AP Radio Detail (Cont.) Field Description Medium Time Current sum of medium time (bandwidth) allocated to clients using a traffic stream Admitted on the radio. Medium time is measured in 32 μsec/sec units.
  • Page 474: Viewing Clients Associated With Neighbor Access Points

    The Ethernet MAC address of the neighbor AP network, this could be a physical radio interface or VAP MAC address. For D-Link APs this is always a VAP MAC address. The neighbor AP MAC address may be cross-referenced in the RF Scan status.
  • Page 475: Table 275: Neighbor Ap Clients

    D-Link UWS User Manual Monitoring Status and Statistics Table 275 describes the fields you see on the Neighbor Clients page for the managed access point status. Table 275: Neighbor AP Clients Field Description Neighbor Client MAC The Ethernet address of client station.
  • Page 476: Viewing Managed Access Point Vaps

    D-Link UWS User Manual Monitoring Status and Statistics Viewing Managed Access Point VAPs There are 16 virtual access points (VAPs) available on each radio of an AP. For each radio of an access point managed by the switch, you can view a summary of the VAP configuration and the number of wireless clients associated with a particular VAP.
  • Page 477: Table 277: Managed Access Point Vap Tspec Status

    D-Link UWS User Manual Monitoring Status and Statistics The following table describes the fields you see on the VAP TSPEC page. Table 277: Managed Access Point VAP TSPEC Status Field Description VAP ID The integer ID used to identify the VAP (0-15), this is used to uniquely identify the VAP for configuration via CLI/SNMP.
  • Page 478: Viewing Distributed Tunneling Information

    D-Link UWS User Manual Monitoring Status and Statistics Viewing Distributed Tunneling Information The AP-AP tunneling mode is used to support L3 roaming for wireless clients without forwarding any data traffic to the wireless switch. In the AP-AP tunneling mode, when a client first associates with an AP in the wireless system, the AP forwards the wireless client’s data using VLAN forwarding mode.
  • Page 479: Managed Access Point Statistics

    D-Link UWS User Manual Monitoring Status and Statistics Managed Access Point Statistics The managed AP statistics page shows information about traffic on the wired and wireless interfaces of the access point. This information can help diagnose network issues, such as throughput problems.
  • Page 480: Viewing Managed Access Point Ethernet Statistics

    D-Link UWS User Manual Monitoring Status and Statistics Note: You can sort the list of APs by clicking any of the column headings. For example, to sort the APs by the number of packets transmitted, click Packets Transmitted. Command Buttons The page includes the following button: •...
  • Page 481 D-Link UWS User Manual Monitoring Status and Statistics Table 281: Detailed Managed Access Point Statistics (Cont.) Field Description WLAN Bytes Receive Dropped Number of bytes received by the AP on the wireless network that were dropped. WLAN Packets Transmit Dropped Number of packets transmitted by the AP on the wireless network that were dropped.
  • Page 482: Viewing Managed Access Point Radio Statistics

    D-Link UWS User Manual Monitoring Status and Statistics Viewing Managed Access Point Radio Statistics The radio statistics show detailed information about the packets and bytes transmitted and received on the radio (wireless) interface of a particular access point managed by the switch.
  • Page 483: Viewing Managed Access Point Vap Statistics

    D-Link UWS User Manual Monitoring Status and Statistics Table 282: Managed Access Point Radio Statistics Field Description Frames Transmitted Count of each successfully transmitted MSDU. WEP Undecryptable Count Count of encrypted frames received and the key configuration of the transmitter indicates that the frame should not have been encrypted or that frame was discarded due to the receiving station not implementing the privacy option.
  • Page 484: Viewing Distributed Tunneling Statistics

    D-Link UWS User Manual Monitoring Status and Statistics Table 283: Managed Access Point VAP Statistics Field Description Client Association Failures Number of clients that have been denied association to the VAP. Client Authentication Failures Number of clients that have failed authentication to the VAP.