D-Link Web Smart DES-3252P Install Manual
D-Link Web Smart DES-3252P Install Manual

D-Link Web Smart DES-3252P Install Manual

Layer 2 switch managed 48-port 10/100base-tx poe with gigabit uplinks
Hide thumbs Also See for Web Smart DES-3252P:
Table of Contents

Advertisement

Advertisement

Table of Contents
loading

Summary of Contents for D-Link Web Smart DES-3252P

  • Page 2: Table Of Contents

    Installing the Device ........................18 Connecting the Device ........................21 Initial Configuration ....................... 22 Getting Started........................38 Starting the D-Link Embedded Web Interface ................39 Understanding the D-Link Embedded Web Interface ..............41 Using Screen and Table Options....................44 Resetting the Device ........................46 Logging Off from the Device ......................
  • Page 3 Aggregating Ports ......................... 72 Defining LAG Membership ......................73 Configuring LACP.......................... 74 Configuring VLANs ....................... 76 Defining VLAN Properties......................77 Defining VLAN Membership ......................80 Defining VLAN Interface Settings ....................81 Configuring GARP ......................... 83 Defining the Forwarding Database ..................87 Defining Static Forwarding Database Entries ................
  • Page 4 Viewing the CPU Utilization ......................243 Viewing Statistics ........................ 244 Viewing Interface Statistics......................244 Managing RMON Statistics ......................247 Appendix A Device Specifications & Features ..............260 Appendix B Troubleshooting....................267 Appendix C Technical Support ................... 270 Contacting D-Link Technical Support......................270 Warranty................................297 Product Registration............................300 Page 4...
  • Page 5: Preface

    Interface web pages are easy-to-use and easy-to-navigate. In addition, The D-Link Embedded Web Interface pro- vides real time graphs and RMON statistics to help system administrators monitor network performance. This preface provides an overview to the D-Link Embedded Interface User Guide, and includes the following sec- tions: •...
  • Page 6: Using The Installation Guide

    Section 3. Initial Configuration — Provides step-by-step instructions for the initial device configuration. Using the Embedded Web Interface User Guide This section provides an overview to the D-Link Web System Interface User Guide. The D-Link Web System Inter- face User Guide provides the following sections: •...
  • Page 7: Intended Audience

    • Appendix B Troubleshooting — Provides basic troubleshooting for installing the device. • Appendix C Technical Support — Provides details for contacting D-Link technical support Intended Audience This guide is intended for network administrators familiar with IT concepts and terminology.
  • Page 8: Device Description

    Device Description Viewing the Device Section 1. Device Description This section contains a description of the D-Link DES-3252P and contains the following topics: • Viewing the Device • Ports Description • Cable Specifications • LED Definitions • Cable, Port, and Pinout Information •...
  • Page 9: Ports Description

    Device Description Ports Description • 4 1000Base-T ports — Four RJ-45 stacking ports designated as ports 49,50,51 and 52. • LED Indicators — Port activity Light Emitting Diodes (LED) for each port and system LEDs that are dis- played separately. Back Panel The following figure illustrates the DES-3252P back panel.
  • Page 10 Device Description Ports Description Figure 3: Inserting a GBIC into the Device RS-232 Console Port The RS-232 port is an asynchronous serial console port supporting the RS-232 electrical specification. The port is used to connect the device to a console managing the device. This interface configuration is as follows: •...
  • Page 11: Cable Specifications

    Device Description Cable Specifications Cable Specifications The following table contains the various cable specification for the DES-3252P: Table 1: DES- 3252P Cable Specifications Cab le Typ e D escr ip tio n 10/100Base-TX UTP CAT-3/4/5 (100 meters maximum) UTP Cat. 5e (100 meters maximum) 1000Base-T UTP Cat.
  • Page 12 Device Description LED Definitions Each RJ-45 ports has one LED indicator for Link /activity and PoE indications. The LED indications are described in the following table: Table 2: DES - 3252P Fast Ethernet RJ-45 Port LED Indications Por t Des criptio n L ED In dica tio n D escr ip tio n Link/Activity LED...
  • Page 13: Cable, Port, And Pinout Information

    Device Description Cable, Port, and Pinout Information System LEDs The DES-3252P system LEDs are located on the front panel’s left side. The following figure illustrates the DES- 3252P system LEDs. Figure 5: DES-3252P System LEDs The LED indications are described in the following table: Table 5: System LEDs LED Des cription...
  • Page 14 Device Description Cable, Port, and Pinout Information Pin Connections for the 10/100/1000 Ethernet Interface The switching port can connect to stations wired in standard RJ-45 Ethernet station mode using straight cables. Transmission devices connected to each other use crossed cables. The following figure illustrates the pin allocation.
  • Page 15: Physical Dimensions

    Device Description Physical Dimensions Pin Connections for the Console Port The RS-232 port is an asynchronous serial console port supporting the RS-232 electrical specification. The port is used to connect the device to a console managing the device. The following figure illustrates the pin allocation. Figure 7: Console Port Pin Allocation The following table describes the pin allocation...
  • Page 16: Mounting Device

    Mounting Device Preparing for Installation Section 2. Mounting Device This section contains information for installing the device, and includes the following sections: • Preparing for Installation • Installing the Device • Connecting the Device • Rack Installation Preparing for Installation This section provides an explanation for preparing the installation site, and includes the following topics: •...
  • Page 17: Site Requirements

    Carefully remove the device from the container and place it on a secure and clean surface. Remove all the packaging material. Inspect the product for damage. Report any damage immediately. If any item is found missing or damaged, please contact your local D-Link reseller for replacement. Page 17...
  • Page 18: Installing The Device

    Mounting Device Installing the Device Installing the Device The device can be installed on a flat surface or mounted in a rack. This section includes the following topics: • Desktop or Shelf Installation • Rack Installation Desktop or Shelf Installation When installing the switch on a desktop or shelf, the rubber feet included with the device should first be attached.
  • Page 19: Rack Installation

    Mounting Device Installing the Device Rack Installation The device can be mounted in an EIA standard-sized, 19-inch rack, which can be placed in a wiring closet with other equipment. To install, the device the mounting brackets must first be attached on the devices’s sides. Notes •...
  • Page 20: Optional Redundant Power Supply

    Mounting Device Installing the Device Figure 10: Mounting Device in a Rack Secure the unit to the rack with the rack screws (not provided). Fasten the lower pair of screws before the upper pair of screws. This ensures that the weight of the unit is evenly distributed during installation. Ensure that the ventilation holes are not obstructed.
  • Page 21: Connecting The Device

    Mounting Device Connecting the Device Connecting the Device This section describes how to connect the device, and includes the following sections: • Connecting the Switch to a Terminal • AC Power Connection Connecting the Switch to a Terminal The device is connected to a terminal through an console port on the front panel, which enables a connection to a terminal desktop system running terminal emulation software for monitoring and configuring the device.
  • Page 22: Initial Configuration

    Initial Configuration Section 3. Initial Configuration This section describes the initial device configuration and includes the following topics: • General Configuration Information • Booting the Switch • Configuration Overview • Advanced Configuration • Software Download and Reboot • Startup Menu Functions After completing all external connections, connect a terminal to the device to monitor the boot and other proce- dures.
  • Page 23: Device Port Default Settings

    Initial Configuration Device Port Default Settings The following table describes the device port default settings. Table 8: Device Port Defaults Function Default Settings Port speed and mode 100M Auto-negotiation Copper/Fiber GE 1000M Port forwarding state Enabled Head of line blocking prevention On (Enabled) Flow Control Back Pressure...
  • Page 24 Initial Configuration As the switch boots, the bootup test first counts the device memory availability and then continues to boot. The fol- lowing screen is an example of the displayed POST. ------ Performing the Power-On Self Test (POST) ------ UART Channel Loopback Test......PASS Testing the System SDRAM......PASS Boot1 Checksum Test.......PASS Boot2 Checksum Test.......PASS...
  • Page 25 Initial Configuration Note The following screen is an example configuration.Items such as addresses, versions, and dates may differ for each device. Preparing to decompress... Decompressing SW from image-1 638000 Running from RAM... ********************************************************************* *** Running SW Ver. x.x.x.x Date 11-Jan-200x Time 15:43:13 *** ********************************************************************* HW version is Base Mac address is: 00:00:b0:24:11:80...
  • Page 26: Configuration Overview

    Initial Configuration After the switch boots successfully, a system prompt appears (console>) and the local terminal can be used to begin configuring the switch. However, before configuring the switch, ensure that the software version installed on the device is the latest version. If it is not the latest version, download and install the latest version. See "Software Download and Reboot."...
  • Page 27: User Name

    Initial Configuration Note 100.1.1.33 is the IP address of the next hop that can be used to reach the management network 192.168.2.0. Console# show ip interface Proxy ARP is disabled IP Address Type Directed Broadcast 100.1.1.1/24 vlan 1 static disable User Name A user name is used to manage the device remotely, for example through SSH, Telnet, or the Web interface.
  • Page 28 Initial Configuration Note The device switch is delivered with no community strings configured. The following screen displays the default device configuration: Console(config)# show snmp Community-String Community-Access IP address ---------------- ---------------- ---------- System Contact: System Location: The community-string, community-access, and IP address can be configured through the local terminal during the initial configuration procedure.
  • Page 29: Advanced Configuration

    Initial Configuration Console# configure Config(config)# rw 11.1.1.2 router snmp-server community private type Config(config)# exit Console(config)# show snmp Community-String Community-Access IP address ---------------- ---------------- ---------- private readWrite 11.1.1.2 Traps are enabled. Authentication-failure trap is enabled. Trap-Rec-Address Trap-Rec-Community Version ---------------- ------------------ ------- System Contact: System Location: This completes the initial configuration of the device from a local terminal.
  • Page 30: Receiving An Ip Address From A Bootp Server

    Initial Configuration – Assigning Dynamic IP Addresses: console# configure console(config)# interface ethernet console(config-if)# <string> ip address dhcp hostname console(config-if)# exit console(config)# The interface receives the IP address automatically. To verify the IP address, enter the “show ip interface” command at the system prompt as shown in the follow- ing example.
  • Page 31: Security Management And Password Configuration

    Initial Configuration Note When the device reboot begins, any input at the ASCII terminal or keyboard automatically cancels the BOOTP process before completion and the device does not receive an IP address from the BOOTP server. The following example illustrates the process: Console>...
  • Page 32: Configuring An Initial Console Password

    Initial Configuration Configuring an Initial Console Password To configure an initial console password, enter the following commands: Console(config)# aaa authentication login default line Console(config)# aaa authentication enable default line Console(config)# line console Console(config-line)# login authentication default Console(config-line)# enable authentication default Console(config-line)# george password...
  • Page 33: Configuring An Initial Https Password

    Initial Configuration Configuring an Initial HTTPS Password To configure an initial HTTPS password, enter the following commands: Console(config)# ip https authentication local Console(config)# admin user1 username password level Enter the following commands once when configuring to use a console, a Telnet, or an SSH session in order to use an HTTPS session.
  • Page 34: Software Download Through Tftp Server

    Initial Configuration Software Download Through TFTP Server This section contains instructions for downloading device software (system and boot images) through a TFTP server. The TFTP server must be configured before downloading the software. The switch boots and runs when decompressing the system image from the flash memory area where a copy of the system image is stored.
  • Page 35: Boot Image Download

    Initial Configuration Enter the command reload. The following message is displayed: Console# reload This command will reset the whole system and disconnect your current session.Do you want to continue (y/n)[n]? Enter “Y” to reboot the switch. Boot Image Download Loading a new boot image from the TFTP server and programming it into the flash updates the boot image. The boot image is loaded when the switch is powered on.
  • Page 36 Initial Configuration The Startup menu is displayed and contains the following configuration functions: [1]Download Software [2]Erase Flash File [3]Erase Flash Sectors [4]Password Recovery Procedure [5]Enter Diagnostic Mode [6]Back Enter your choice or press 'ESC' to exit: The following sections describe the Startup menu options. If no selection is made within 25 seconds (default), the switch times out and the device continues to load normally.
  • Page 37 Initial Configuration The following message is displayed. Write Flash file name (Up to 8 characters, Enter for none.):config File config (if present) will be erased after system initialization ========Press Enter To Continue ======== Enter as the name of the flash file. The configuration is erased and the device reboots. config Perform the switch’s initial configuration.
  • Page 38: Getting Started

    Getting Started Section 4. Getting Started This section provides an introduction to the user interface, and includes the following topics: • Starting the D-Link Embedded Web Interface • Understanding the D-Link Embedded Web Interface • Using Screen and Table Options •...
  • Page 39: Starting The D-Link Embedded Web Interface

    Notes • Disable the popup blocker before beginning device configuration using the EWS. This section contains information on starting the D-Link Embedded Web interface. To access the D-Link user interface: Open an Internet browser. Ensure that pop-up blockers are disabled. If pop-up blockers are enable, edit, add, and device information messages may not open.
  • Page 40 Getting Started Starting the D-Link Embedded Web Interface Figure 12: D-Link Embedded Web Interface Home Page Page 40...
  • Page 41: Understanding The D-Link Embedded Web Interface

    Understanding the D-Link Embedded Web Interface Understanding the D-Link Embedded Web Interface The D-Link Embedded Web Interface Home Page contains the following views: • Port LED Indicators — Located at the top of the home page, the port LED indicators provide a visual repre- sentation of the ports on the D-Link front panel.
  • Page 42: Device Representation

    EWS. This section provides the following additional information: • Device Representation — Provides an explanation of the D-Link user interface buttons, including both man- agement buttons and task icons. • Using the D-Link Embedded Web Interface Management Buttons — Provides instructions for adding, modifying, and deleting configuration parameters.
  • Page 43 Getting Started Understanding the D-Link Embedded Web Interface Using the D-Link Embedded Web Interface Management Buttons Configuration Management buttons and icons provide an easy method of configuring device information, and include the following: Table 10: D-Link Web Interface Configuration Buttons...
  • Page 44: Using Screen And Table Options

    • Deleting Configuration Information Adding Configuration Information User-defined information can be added to specific D-Link Web Interface pages, by opening a new Add page. To add information to tables or D-Link Web Interface pages: Open an D-Link Web Interface page.
  • Page 45: Deleting Configuration Information

    Modify the fields. Click . The fields are modified, and the information is saved to the device. Deleting Configuration Information Open The D-Link Embedded Web Interface page. Select a table row. Select the Remove checkbox. Click . The information is deleted, and the device is updated.
  • Page 46: Resetting The Device

    Getting Started Resetting the Device Resetting the Device The Reset page enables resetting the device from a remote location. Note To prevent the current configuration from being lost, save all changes from the running configuration file to the startup configuration file before resetting the device. For instructions, see Copying Files. To reset the device: Click System >...
  • Page 47: Logging Off From The Device

    Getting Started Logging Off from the Device Logging Off from the Device Click . The Logout Page opens. Figure 19: Logout Page Click . The D-Link Embedded Web Interface Home Page closes. Page 47...
  • Page 48: Managing Device Information

    Managing Device Information Section 5. Managing Device Information This section contains information for setting general system information, and includes the following sections: • Defining the System Description • Configuring System Time Page 48...
  • Page 49: Defining The System Description

    Managing Device Information Defining the System Description Defining the System Description The System Description Page contains parameters for configuring general device information, including the sys- tem name, location, and contact, the system MAC Address, System Object ID, System Up Time, System IP and MAC addresses, and both software and hardware versions.
  • Page 50: Configuring System Time

    Managing Device Information Configuring System Time Configuring System Time This section provides information for configuring system time parameters, including: • Configuring Daylight Saving Time • Configuring SNTP Page 50...
  • Page 51: Configuring Daylight Saving Time

    Managing Device Information Configuring Daylight Saving Time Configuring Daylight Saving Time The Time Page contains fields for defining system time parameters for both the local hardware clock and the external SNTP clock. If the system time is kept using an external SNTP clock, and the external SNTP clock fails, the system time reverts to the local hardware clock.
  • Page 52 Managing Device Information Configuring Daylight Saving Time • Mexico — From the first Sunday in April at 02:00 to the last Sunday in October at 02:00. • Moldova — From the last weekend of March until the last weekend of October. •...
  • Page 53 Managing Device Information Configuring Daylight Saving Time Figure 21: Time Page The Time Page contains the following sections: • Clock Source — The source used to set the system clock. The possible field values are: – None — Indicates that a clock source is not used. The clock is set locally. –...
  • Page 54 Managing Device Information Configuring Daylight Saving Time – Month — The month of the year in which DST begins. The possible field range is Jan-Dec. – Year — The year in which the configured DST begins. – Time — The time at which DST begins. The field format is HH:MM. For example: 05:30. •...
  • Page 55: Configuring Sntp

    Managing Device Information Configuring SNTP Configuring SNTP The device supports the Simple Network Time Protocol (SNTP). SNTP assures accurate network device clock time synchronization up to the millisecond. Time synchronization is performed by a network SNTP server. The device operates only as an SNTP client, and cannot provide time services to other systems. The device can poll the following server types for the server time: •...
  • Page 56 Managing Device Information Configuring SNTP This section contains the following topics: ² Defining SNTP Global Settings ² Defining SNTP Authentication ² Defining SNTP Servers • Defining SNTP Interface Settings Page 56...
  • Page 57: Defining Sntp Global Settings

    Managing Device Information Defining SNTP Global Settings Defining SNTP Global Settings The SNTP Properties Page provides information for defining SNTP parameters globally. To define SNTP global parameters: Click System > SNTP > Properties. The SNTP Properties Page opens: Figure 22: SNTP Properties Page The SNTP Properties Page contains the following fields: •...
  • Page 58 Managing Device Information Defining SNTP Global Settings Define the Poll Interval, Enable Receive Broadcast Servers Update, Enable Receive Anycast Servers Update, Enable Receive Unicast Servers Update, and Enable Poll Unicast Servers fields and select at least one of the Enable fields. Click .
  • Page 59: Defining Sntp Authentication

    Managing Device Information Defining SNTP Authentication Defining SNTP Authentication The SNTP Authentication Page provides parameters for defining the means by which the SNTP server is authen- ticated. To define SNTP authentication: Click System > SNTP > Authentication. The SNTP Authentication Page opens: Figure 23: SNTP Authentication Page The SNTP Authentication Page contains the following fields:...
  • Page 60 Managing Device Information Defining SNTP Authentication To define SNTP authentication parameters: Click . The Add SNTP Authentication page opens: Figure 24: Add SNTP Authentication Define the Encryption Key ID, Authentication Key, and Trusted Key fields. Click . The SNTP Authentication Key is added, and the device is updated. Page 60...
  • Page 61: Defining Sntp Servers

    Managing Device Information Defining SNTP Servers Defining SNTP Servers The SNTP Servers Page contains information for defining SNTP servers, as well as adding new SNTP servers. In addition, the SNTP Servers Page enables the device to request and accept SNTP traffic from a server. To define an SNTP server: Click System >...
  • Page 62 Managing Device Information Defining SNTP Servers Note 0 is displayed in the Encryption Key ID field - the range for Servers created with authentication is 1- 4294967295 Click . The Add SNTP Server Page opens: Page 62...
  • Page 63 Managing Device Information Defining SNTP Servers Figure 26: Add SNTP Server Page Define the SNTP Server, Enable Poll Interval, and Encryption Key ID fields. Click . The SNTP Server is added, and the device is updated. Page 63...
  • Page 64: Defining Sntp Interface Settings

    Managing Device Information Defining SNTP Interface Settings Defining SNTP Interface Settings The SNTP Interface Settings Page contains fields for setting SNTP on different interfaces. To define SNTP inter- face settings: Click System > SNTP > Interface Settings. The SNTP Interface Settings Page opens: Figure 27: SNTP Interface Settings Page The SNTP Interface Settings Page contains the following fields:...
  • Page 65 Managing Device Information Defining SNTP Interface Settings Figure 28: Add SNTP Interface Page Define the Interface and Receive Server Updates fields. Click . The SNTP interface is added, and the device is updated. – Page 65...
  • Page 66: Resetting The Device

    Managing Device Information Resetting the Device Resetting the Device The Reset page enables resetting the device from a remote location. To prevent the current configuration from being lost, save all changes from the running configuration file to the startup configuration file before resetting the device.
  • Page 67: Configuring Ports

    Configuring Ports Section 6. Configuring Ports The Interface Configuration Page contains fields for defining port parameters. To define port parameters: Click Basic Setup > Interface > Interface Configuration. The Interface Configuration Page opens. Figure 30: Interface Configuration Page The Interface Configuration Page is divided into the following sections: •...
  • Page 68 Configuring Ports – Half — The interface supports transmission between the device and the client in only one direction at a time. • Auto Negotiation — Displays the auto negotiation status on the port. Auto negotiation is a protocol between two link partners that enables a port to advertise its transmission rate, duplex mode, and flow control abilities to its partner.
  • Page 69 Configuring Ports In addition to the fields in the Interface Configuration Page, the Port or LAG Configuration Settings Page includes the Reactivate Suspended Port or Reactivate Suspended LAG fields. Select Reactivate Suspended Port or Reac- tivate Suspended LAG fields to return a suspended port or LAG to active status. Figure 31: Port Configuration Settings Page Modify the Admin Speed, Admin Duplex, and Admin Advertisement fields.
  • Page 70: Viewing Port Properties

    Configuring Ports Viewing Port Properties Viewing Port Properties The Interface Properties Page contains fields for defining port parameters. To view port properties: Click Basic Setup > Interface > Interface Properties. The Interface Properties Page opens: Figure 32: Interface Properties Page The Interface Properties Page is contains the following fields: •...
  • Page 71 Configuring Ports Viewing Port Properties Figure 33: Port Properties Page Define the Port and Description fields. Click . The interface properties are modified, and the device is updated. • Page 71...
  • Page 72: Aggregating Ports

    Aggregating Ports Section 7. Aggregating Ports Link Aggregation optimizes port usage by linking a group of ports together to form a single LAG. Aggregating ports multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. The device supports both static LAGs and Link Aggregation Control Protocol (LACP) LAGs. LACP LAGs negotiate aggregating port links with other LACP ports located on a different device.
  • Page 73: Defining Lag Membership

    Aggregating Ports Defining LAG Membership Defining LAG Membership The LAG Membership Page contains fields for configuring parameters for configured LAGs. The device supports up to eight ports per LAG, and eight LAGs per system. To define LAG parameters: Click Advanced Setup > Interface > LAG Membership. The opens. Figure 34: LAG Membership Page The LAG Membership Page contains the following fields: •...
  • Page 74: Configuring Lacp

    Aggregating Ports Configuring LACP Configuring LACP LAG ports can contain different media types if the ports are operating at the same speed. Aggregated links can be set up manually or automatically established by enabling LACP on the relevant links. Aggregate ports can be linked into link-aggregation port-groups.
  • Page 75 Aggregating Ports Configuring LACP Figure 36: LACP Parameters Settings Page Edit the Port Priority and LACP Timeout fields. Click . The LACP settings are saved, and the device is updated – Page 75...
  • Page 76: Configuring Vlans

    Configuring VLANs Section 8. Configuring VLANs VLANs are logical subgroups with a Local Area Network (LAN) which combine user stations and network devices into a single unit, regardless of the physical LAN segment to which they are attached. VLANs allow network traffic to flow more efficiently within subgroups.
  • Page 77: Defining Vlan Properties

    Configuring VLANs Defining VLAN Properties Defining VLAN Properties The VLAN Properties Page provides information and global parameters for configuring and working with VLANs. To define VLAN properties: Click Basic Setup > VLAN > Membership > Properties. The VLAN Properties Page opens. Figure 37: VLAN Properties Page The VLAN Properties Page contains the following fields: •...
  • Page 78 Configuring VLANs Defining VLAN Properties Figure 38: Add VLAN Page Define the VLAN ID and VLAN Name fields. Click . The VLAN ID is defined, and the device is updated. To edit the VLAN Settings: Click System > VLAN > Membership > Properties. The Edit VLAN Page opens. Click .
  • Page 79 Configuring VLANs Defining VLAN Properties Figure 39: Edit VLAN Page Edit the VLAN Name and Disable Unauthenticated VLAN fields. Click . The VLAN Settings are saved, and the device is updated Page 79...
  • Page 80: Defining Vlan Membership

    Configuring VLANs Defining VLAN Membership Defining VLAN Membership The VLAN Membership Page contains a table that maps VLAN parameters to ports. Ports are assigned to VLAN membership by toggling through the Port Control settings. To define VLAN membership: Click Basic Setup > VLAN > Membership > Membership. The VLAN Membership Page opens. Figure 40: VLAN Membership Page The VLAN Membership Page contains the following fields: •...
  • Page 81: Defining Vlan Interface Settings

    Configuring VLANs Defining VLAN Interface Settings Defining VLAN Interface Settings The VLAN Interface Settings Page contains fields for managing ports that are part of a VLAN. The Port Default VLAN ID (PVID) is configured on the VLAN Interface Settings Page. All untagged packets arriving at the device are tagged with the port PVID.
  • Page 82 Configuring VLANs Defining VLAN Interface Settings – Disable — Disables ingress filtering on the device. • Reserve VLAN — Indicates the VLAN is the Reserved VLAN. VLANS can be selected as the Reserved VLAN is not being used by the system. Select a port.
  • Page 83: Configuring Garp

    Configuring VLANs Configuring GARP Configuring GARP This section contains information for configuring Generic Attribute Registration Protocol (GARP). This section includes the following topics: • Defining GARP • Defining GVRP Defining GARP Generic Attribute Registration Protocol (GARP) protocol is a general-purpose protocol that registers any network connectivity or membership-style information.
  • Page 84 Configuring VLANs Configuring GARP message received. Leave time must be greater than or equal to three times the join time. The default value is 60 centiseconds. • Leave All Timer — Indicates the amount of time lapse, in centiseconds, that all device waits before leaving the GARP state.
  • Page 85: Defining Gvrp

    Configuring VLANs Configuring GARP Defining GVRP GARP VLAN Registration Protocol (GVRP) is specifically provided for automatic distribution of VLAN membership information among VLAN-aware bridges. GVRP allows VLAN-aware bridges to automatically learn VLANs to bridge ports mapping, without having to individually configure each bridge and register VLAN membership. To define GARP.
  • Page 86 Configuring VLANs Configuring GARP • GVRP Registration — Indicates if VLAN registration through GVRP is enabled on the device. The possible field values are: – Enable — Enables GVRP registration on the device. – Disable — Disables GVRP registration on the device. Click .
  • Page 87: Defining The Forwarding Database

    Defining the Forwarding Database Section 9. Defining the Forwarding Database Packets addressed to destinations stored in either the Static or Dynamic databases are immediately forwarded to the port. The Dynamic MAC Address Table can be sorted by interface, VLAN, or MAC Address, whereas MAC addresses are dynamically learned as packets from sources that arrive at the device.
  • Page 88: Defining Static Forwarding Database Entries

    Defining the Forwarding Database Defining Static Forwarding Database Entries Defining Static Forwarding Database Entries The Forwarding Database Static Addresses Page contains parameters for defining the age interval on the device. To prevent static MAC addresses from being deleted when the device is reset, ensure that the port attached to the MAC address is locked.
  • Page 89 Defining the Forwarding Database Defining Static Forwarding Database Entries Click . The Add Forwarding Database Page opens: Figure 48: Add Forwarding Database Page Define the Interface, MAC Address, VLAN ID or VLAN Name, and Status fields. Click . The forwarding database information is modified, and the device is updated. Page 89...
  • Page 90: Defining Dynamic Forwarding Database Entries

    Defining the Forwarding Database Defining Dynamic Forwarding Database Entries Defining Dynamic Forwarding Database Entries The Dynamic Addresses Page contains parameters for querying information in the Dynamic MAC Address Table, including the interface type, MAC addresses, VLAN, and table storing. The Dynamic MAC Address table contains information about the aging time before a dynamic MAC address is erased, and includes parameters for querying and viewing the Dynamic MAC Address table.
  • Page 91 Defining the Forwarding Database Defining Dynamic Forwarding Database Entries Address Table Sort Key —Specifies the means by which the Dynamic MAC Address Table is sorted. The address table can be sorted by address, VLAN, or interface.Define the fields. Click . The Dynamic Address Aging field is defined, and the device is updated. To query the Dynamic MAC Address Table: Click Advanced Setup >...
  • Page 92: Configuring Spanning Tree

    Configuring Spanning Tree Section 10. Configuring Spanning Tree Spanning Tree Protocol (STP) provides tree topography for any arrangement of bridges. STP also provides a sin- gle path between end stations on a network, eliminating loops. Loops occur when alternate routes exist between hosts. Loops in an extended network can cause bridges to for- ward traffic indefinitely, resulting in increased traffic and reducing network efficiency.
  • Page 93: Defining Classic Spanning Tree

    Configuring Spanning Tree Defining Classic Spanning Tree Defining Classic Spanning Tree The STP Properties Page contains parameters for enabling STP on the device. To enable STP on the device: Click Advanced Setup > Spanning Tree > STP > Properties. The STP Properties Page opens: Figure 50: STP Properties Page The STP Properties Page contains the following fields: •...
  • Page 94 Configuring Spanning Tree Defining Classic Spanning Tree • Path Cost Default Values — Specifies the method used to assign default path cost to STP ports. The possi- ble field values are: – Short — Specifies 1 through 65,535 range for port path cost. This is the default value. –...
  • Page 95: Defining Stp On Interfaces

    Configuring Spanning Tree Defining STP on Interfaces Defining STP on Interfaces Network administrators can assign STP settings to specific interfaces using the STP Interface Page. The Global LAGs section displays the STP information for Link Aggregated Groups. To assign STP settings to an interface: Click Advanced Setup >...
  • Page 96 Designated Bridge ID — Indicates the bridge priority and the MAC Address of the designated bridge. • Designated Port ID — Indicates the selected port D-Link priority and interface. • Designated Cost — Indicates the cost of the port participating in the STP topology. Ports with a lower cost are less likely to be blocked if STP detects loops.
  • Page 97 Configuring Spanning Tree Defining STP on Interfaces Select Enable in the STP field. Define the Fast Link, Enable Root Guard, Path Cost, Default Path Cost, and Priority fields. Click . STP is enabled on the interface, and the device is updated. Page 97...
  • Page 98: Defining Rapid Spanning Tree

    Configuring Spanning Tree Defining Rapid Spanning Tree Defining Rapid Spanning Tree While Classic STP prevents Layer 2 forwarding loops in a general network topology, convergence can take between 30-60 seconds. This time may delay detecting possible loops and propagating status topology changes. Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies that allow a faster STP convergence without creating forwarding loops.
  • Page 99 Configuring Spanning Tree Defining Rapid Spanning Tree – Multiple STP — Multiple STP is enabled on the device. • Fast Link Operational Status — Indicates whether Fast Link is enabled or disabled for the port or LAG. If Fast Link is enabled for a port, the port is automatically placed in the forwarding state. •...
  • Page 100: Defining Multiple Spanning Tree

    Configuring Spanning Tree Defining Multiple Spanning Tree Defining Multiple Spanning Tree Multiple Spanning Tree (MSTP) provides differing load balancing scenarios. For example, while port A is blocked in one STP instance, the same port can be placed in the Forwarding state in another STP instance. The MSTP Properties Page contains information for defining global MSTP settings, including region names, MSTP revisions, and maximum hops.
  • Page 101: Defining Mstp Instance Settings

    Configuring Spanning Tree Defining Multiple Spanning Tree Defining MSTP Instance Settings MSTP maps VLANs into STP instances. Packets assigned to various VLANs are transmitted along different paths within Multiple Spanning Tree Regions (MST Regions). Regions are one or more Multiple Spanning Tree bridges by which frames can be transmitted.
  • Page 102 Configuring Spanning Tree Defining Multiple Spanning Tree Figure 57: VLAN Instance Configuration Table Define the Instance ID field. Click . The MSTP Instances are assigned, and the device is updated. Page 102...
  • Page 103: Defining Mstp Interface Settings

    Configuring Spanning Tree Defining Multiple Spanning Tree Defining MSTP Interface Settings Network Administrators can assign MSTP Interface settings in the MSTP Instance Settings Page To define MSTP interface settings: Click Advanced Setup > Spanning Tree > MSTP > Interface Settings. The MSTP Interface Settings Page opens: Figure 58: MSTP Interface Settings Page MSTP Instance Settings Page contains the following fields:...
  • Page 104 Configuring Spanning Tree Defining Multiple Spanning Tree • Role — Indicates the port role assigned by the STP algorithm to provide to STP paths. The possible field val- ues are: – Root — Provides the lowest cost path to forward packets to the root device. –...
  • Page 105 Configuring Spanning Tree Defining Multiple Spanning Tree Figure 59: MSTP Interface Table Define the Port Priority and the Path Cost fields. Click . The MSTP interface settings are defined, and the device is updated. Page 105...
  • Page 106: Configuring Device Security

    Configuring Device Security Section 11. Configuring Device Security This section provides access to security pages that contain fields for setting security parameters for ports, device management methods, users, and server security. This section contains the following topics: • Configuring Management Security •...
  • Page 107: Configuring Management Security

    Configuring Device Security Configuring Management Security Configuring Management Security This section provides information for configuring device management security. This section includes the following topics: • Configuring Authentication Methods • Configuring Passwords Configuring Authentication Methods This section provides information for configuring device authentication methods. This section includes the topics: •...
  • Page 108: Defining Access Profiles

    Configuring Device Security Configuring Management Security Defining Access Profiles Access profiles are profiles and rules for accessing the device. Access to management functions can be limited to user groups. User groups are defined for interfaces according to IP addresses or IP subnets. Access profiles con- tain management methods for accessing and managing the device.
  • Page 109 Configuring Device Security Configuring Management Security • Remove — Removes the selected access profile. The possible field values are: – Checked — Removes the selected access profile. Access Profiles cannot be removed when Active. – Unchecked — Maintains the access profiles. Click .
  • Page 110 Configuring Device Security Configuring Management Security • Interface — Defines the interface on which the access profile is defined. The possible field values are: – Port — Specifies the port on which the access profile is defined. – LAG — Specifies the LAG on which the access profile is defined. –...
  • Page 111: Defining Profile Rules

    Configuring Device Security Configuring Management Security Defining Profile Rules Access profiles can contain up to 128 rules that determine which users can manage the switch module, and by which methods. Users can also be blocked from accessing the device. Rules are composed of filters including: •...
  • Page 112 Configuring Device Security Configuring Management Security – All — Assigns all management methods to the rule. – Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device. –...
  • Page 113 Configuring Device Security Configuring Management Security To modify a Profile Rule: Click System > Management Security > Authentication > Profile Rules. The Access Profile Page opens Click . The Profile Rule settingsProfile Rule settingsProfile Rule settings opens: Figure 64: Profile Rule settingsProfile Rule settings Modify the fields.
  • Page 114: Defining Authentication Profiles

    Configuring Device Security Configuring Management Security Defining Authentication Profiles Authentication profiles allow network administrators to assign authentication methods for user authentication. User authentication can be performed either locally or on an external server. User authentication occurs in the order the methods are selected. If the first authentication method is not available, the next selected method is used.
  • Page 115 Configuring Device Security Configuring Management Security – Unchecked — Maintains the authentication profiles. Click . The Add Authentication Profile Page opens. Figure 66: Add Authentication Profile Page Define the Profile Method, Profile Name and Authentication Methods fields. Click . The authentication profile is defined, and the device is updated. Page 115...
  • Page 116 Configuring Device Security Configuring Management Security To modify an authentication profile: Click System > Management Security > Authentication > Authentication Profiles. The Authentication Profile Page opens. Click . The Authentication Profile Settings Page opens: Figure 67: Authentication Profile Settings Page Select an authentication method from the Optional Methods list.
  • Page 117: Mapping Authentication Methods

    Configuring Device Security Configuring Management Security Mapping Authentication Methods After authentication profiles are defined, they can be applied to management access methods. For example, con- sole users can be authenticated by Authentication Profile List 1, while Telnet users are authenticated by Authenti- cation Method List 2.
  • Page 118 Configuring Device Security Configuring Management Security Secured HTTP • Optional Methods — Displays the methods by which users are authenticated during an HTTP session. The possible field values are: – None — Indicates that no authentication method is used for access. –...
  • Page 119: Defining Radius Settings

    Configuring Device Security Configuring Management Security Defining RADIUS Settings Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for networks. RADIUS servers provide a centralized authentication method for web access. The default parameters are user-defined, and are applied to newly defined RADIUS servers. If new default param- eters are not defined, the system default values are applied to newly defined RADIUS servers.
  • Page 120 Configuring Device Security Configuring Management Security • Priority — Displays the RADIUS server priority. The possible values are 1-65535, where 1 is the highest value. The RADIUS server priority is used to configure the server query order. • Authentication Port — Identifies the authentication port. The authentication port is used to verify the RADIUS server authentication.
  • Page 121 Configuring Device Security Configuring Management Security Figure 70: Add Radius Server Page Define the Host IP Address, Priority, Authenticated Port, Timeout for Reply, Dead Time, and Usage Type fields. Click . The RADIUS server is added, and the device is updated. Page 121...
  • Page 122 Configuring Device Security Configuring Management Security To edit RADIUS Server Settings: Click System > Management Security > Authentication > Radius. The RADIUS Page opens. Click . The RADIUS Server Settings Page opens: Figure 71: RADIUS Server Settings Page Define the Host IP Address, Priority, Source IP Address, Key String, Number of Retries, Authentication Port, Timeout for Reply, Dead Time, and Usage Type fields.
  • Page 123 Configuring Device Security Configuring Management Security Defining TACACS+ Authentication Terminal Access Controller Access Control System (TACACS+) provides centralized security user access valida- tion. The system supports up-to 4 TACACS+ servers. TACACS+ provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes.
  • Page 124 Configuring Device Security Configuring Management Security The TACACS+ Page also contains the following fields: • Host IP Address — Defines the TACACS+ Server IP address. • Priority — Defines the order in which the TACACS+ servers are used. The field range is 0-65535. The default is 0.
  • Page 125 Configuring Device Security Configuring Management Security Click . The TACACS+ server is defined, and the device is updated. To edit a TACACS+ server settings: Click System > Management Security >Authentication > TACACS+. The TACACS+ Page opens. Select TACACS+ server entry. Click .
  • Page 126: Configuring Passwords

    Configuring Device Security Configuring Management Security Configuring Passwords This section contains information for defining device passwords, and includes the following topics. • Defining Local Users • Defining Line Passwords • Defining Enable Passwords Defining Local Users define users, passwords, and access levels for users using the Local User Network administrators can Page.
  • Page 127 Configuring Device Security Configuring Management Security Figure 76: Add Local User Page In addition to the fields in the Local User Page, the Add Local User Page contains the following fields: • Password — Defines the local user password. Local user passwords can contain up to 159 characters. •...
  • Page 128 Configuring Device Security Configuring Management Security Define the User Name, Access Level, Password, and Confirm Password fields. Page 128...
  • Page 129: Defining Line Passwords

    Configuring Device Security Configuring Management Security Defining Line Passwords Network administrators can define line passwords for Console, Telnet, and SSH in the Line Password Page. For line passwords, no level should be defined. The device can be accessed using the following methods: To define line passwords: Click System >...
  • Page 130: Defining Enable Passwords

    Configuring Device Security Configuring Management Security Defining Enable Passwords The Enable Password Page sets a local password for a particular access level. To enable passwords: Click System > Management Security > Passwords > Enable Password. The Enable Password Page opens: Figure 79: Enable Password Page The Enable Password Page contains the following fields: •...
  • Page 131: Configuring Network Security

    Configuring Device Security Configuring Network Security Configuring Network Security Network security manages both access control lists and locked ports. This section contains the following topics: • Network Security Overview • Defining Network Authentication Properties • Defining Port Authentication • Configuring Traffic Control Network Security Overview This section provides an overview of network security and contains the following topics: •...
  • Page 132 Configuring Device Security Configuring Network Security Advanced port-based authentication is implemented in the following modes: • Single Host Mode — Allows port access only to the authorized host. • Multiple Host Mode — Multiple hosts can be attached to a single port. Only one host must be authorized for all hosts to access the network.
  • Page 133: Defining Network Authentication Properties

    Configuring Device Security Configuring Network Security Defining Network Authentication Properties Define the Select Enable Access Level, Password, and Confirm Password fields. Click . The enable password is defined, and the device is updated. Page 133...
  • Page 134: Configuring Network Security

    Configuring Device Security Configuring Network Security Configuring Network Security Network security manages both access control lists and locked ports. This section contains the following topics: • Network Security Overview • Defining Network Authentication Properties • Defining Port Authentication • Configuring Traffic Control Network Security Overview This section provides an overview of network security and contains the following topics: •...
  • Page 135 Configuring Device Security Configuring Network Security • Authentication Method — Specifies the authentication method used for port authentication. The possible field values are: – RADIUS, None — Provides port authentication, first using the RADIUS server. If the port is not authenticated, then no authentication method is used, and the session is permitted.
  • Page 136: Defining Port Authentication

    Configuring Device Security Configuring Network Security Defining Port Authentication The Port Authentication Page allows network managers to configure port-based authentication global parameters. To define the port-based authentication global properties: Click Advanced Setup > Security Suite > Authentication > Port Authentication. The Port Authentication Page opens.
  • Page 137 Configuring Device Security Configuring Network Security • Reauthentication Period — Displays the time span (in seconds) in which the selected port is reauthenti- cated. The field default is 3600 seconds. • Reauthenticate Now — Reauthenticates the selected ports immediately. Select All selects all ports for reau- thentication.
  • Page 138 Configuring Device Security Configuring Network Security Click . The port authentication settings are defined, and the device is updated. Page 138...
  • Page 139: Configuring Multiple Hosts

    Configuring Device Security Configuring Network Security Configuring Multiple Hosts The Multiple Host Page allows network managers to configure advanced port-based authentication settings for specific ports and VLANs. For more information on advanced port-based authentication, see Advanced Port- Based Authentication. To define the network authentication global properties: Click Advanced Setup >...
  • Page 140 Configuring Device Security Configuring Network Security • Status — Indicates the host status. If there is an asterisk (*), the port is either not linked or is down. The pos- sible field values are: – Unauthorized — Indicates that either the port control is Force Unauthorized and the port link is down, or the port control is Auto but a client has not been authenticated via the port.
  • Page 141: Defining Authentication Hosts

    Configuring Device Security Configuring Network Security Defining Authentication Hosts The Authenticated Host Page contains a list of authenticated users. To define authenticated users: Click Advanced Setup > Security Suite > Authentication > Authenticated Host. The Authenticated Host Page opens: Figure 85: Authenticated Host Page The Authenticated Host Page contains the following fields: •...
  • Page 142: Defining Access Control Lists

    Configuring Device Security Configuring Network Security Defining Access Control Lists Access Control Lists (ACL) allow network managers to define classification actions and rules for specific ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entry and the ingress port is disabled.
  • Page 143: Defining Ip Based Access Control Lists

    Configuring Device Security Configuring Network Security Defining IP Based Access Control Lists Access Control Lists (ACL) allow network managers to define classification actions and rules for specific ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entry and the ingress port is disabled.
  • Page 144 Configuring Device Security Configuring Network Security – Unchecked — Maintains the IP based ACLs. • Create ACL — Creates an IP based ACL. • Create ACE — Creates an IP based ACE. • ACE Priority — Indicates the ACE priority that determines which ACE is matched to a packet based on a first-match basis.
  • Page 145 Configuring Device Security Configuring Network Security Figure 87: Add IP Based ACL Page In addition to the fields in the Add IP Based ACL Page contains the following additional fields: • New ACE Priority — Defines the new ACE priority, which determines which ACE is matched to a packet on a first-match basis.
  • Page 146 Configuring Device Security Configuring Network Security Figure 88: IP Based ACL Settings Modify the ACL Name, New Priority, Protocol, Source Port, Destination Port, Source IP Interface, Destination Port, WIldcard Mask, Match DSCP, Match IP Precedence, and Action field. Click . The IP based protocol is defined, and the device is updated. Page 146...
  • Page 147: Defining Mac Based Access Control Lists

    Configuring Device Security Configuring Network Security Defining MAC Based Access Control Lists MAC Based ACL Page allows a MAC- based ACL to be defined. ACEs can be added only if the ACL is not bound to an interface. To define MAC Based ACLs: Click Security >...
  • Page 148 Configuring Device Security Configuring Network Security Shutdown — Drops packet that meet the ACL criteria, and disables the port to which the packet was addressed. Ports are reactivated from the Interface Configuration Page Default. For more information on reactivating ports, see Configuring Ports.Click .
  • Page 149: Binding Device Security Acls

    Configuring Device Security Configuring Network Security Figure 91: MAC Based Settings Page Modify the ACL Name, New Priority, Protocol, Source MAC Address, Destination MAC Address, Wildcard Masks, VLAN ID, CoS, CoS Mask, and Action fields. Click . The MAC based protocol is defined, and the device is updated. –...
  • Page 150 Configuring Device Security Configuring Network Security Figure 92: ACL Binding Page The ACL Binding Page contains the following fields: • Copy from Entry Number — Copies the ACL information from the defined interface. • To Row Number(s) — Copies the ACL information to the defined interface. •...
  • Page 151 Configuring Device Security Configuring Network Security Figure 93: ACL Binding Settings Page Define the Select ACL field. Click . The ACL is bound the interface, and the device is updated Page 151...
  • Page 152: Configuring Traffic Control

    Configuring Device Security Configuring Network Security Configuring Traffic Control This section contains information for managing both port security and storm control, and includes the following topics: • Managing Port Security • Enabling Storm Control Page 152...
  • Page 153: Managing Port Security

    MAC addresses. These addresses are either manually defined on the port, or learned on that port up to the point when it is locked. When a packet is received on a locked port, and the packet D-Link source MAC address is not tied to that port (either it was learned on a different port, or it is unknown to the system), the protec- tion mechanism is invoked, and can provide various options.
  • Page 154 Configuring Device Security Configuring Network Security – Single-host Lock — Indicates that the port control is Auto and a single client has been authenticated via the port. • Learning Mode – Defines the locked port type. The Learning Mode field is enabled only if Locked is selected in the Set Port field.
  • Page 155: Enabling Storm Control

    Configuring Device Security Configuring Network Security Enabling Storm Control Storm control limits the amount of Multicast and Broadcast frames accepted and forwarded by the device. When Layer 2 frames are forwarded, Broadcast, and Multicast frames are flooded to all ports on the relevant VLAN. This occupies bandwidth, and loads all nodes on all ports.
  • Page 156 Configuring Device Security Configuring Network Security – Disable — Disables storm control on the selected port. • Broadcast Mode — Specifies the Broadcast mode currently enabled on the device. The possible field values are: – Unknown Unicast, Multicast & Broadcast — Counts Unicast, Multicast, and Broadcast traffic. –...
  • Page 157: Configuring Ip Information

    Configuring IP Information Section 12. Configuring IP Information This section contains information for defining IP interfaces, and includes the following sections: • Defining IP Addresses • Defining Default Gateways • Configuring DHCP • Configuring ARP • Configuring Domain Name Servers •...
  • Page 158: Defining Ip Addresses

    Configuring IP Information Defining IP Addresses Defining IP Addresses The IP Interface Page contains fields for assigning IP addresses. Packets are forwarded to the default IP when frames are sent to a remote network. The configured IP address must belong to the same IP address subnet of one of the IP interfaces.
  • Page 159 Configuring IP Information Defining IP Addresses Figure 99: Add IP Interface Page Define the IP Address, Network Mask or Prefix Length, and Interface fields. Click . The IP configuration fields are saved, and the device is updated. To modify an IP interface: Click Basic Setup >...
  • Page 160 Configuring IP Information Defining IP Addresses Modify the IP Address, Network Mask or Prefix Length, and Interface fields. Click . The IP Interface is modified, and the device is updated. Page 160...
  • Page 161: Defining Default Gateways

    Configuring IP Information Defining Default Gateways Defining Default Gateways Packets are forwarded to the default IP when frames are sent to a remote network via the default gateway. The configured IP address must belong to the same subnet of one of the IP interfaces. To define a default gateway: Click Basic Setup >...
  • Page 162: Configuring Dhcp

    Configuring IP Information Configuring DHCP Configuring DHCP The Dynamic Host Configuration Protocol (DHCP) assigns dynamic IP addresses to devices on a network. DHCP ensures that network devices can have a different IP address every time the device connects to the network. To define a DHCP Interface: Click Basic Setup >...
  • Page 163 Configuring IP Information Configuring DHCP Figure 103:Add DHCP IP Interface Page Define the Interface and Host Name fields. Click . The DHCP interface is added, and the device is updated. Page 163...
  • Page 164: Configuring Arp

    Configuring IP Information Configuring ARP Configuring ARP The Address Resolution Protocol (ARP) converts IP addresses into physical addresses, and maps the IP address to a MAC address. ARP allows a host to communicate with other hosts only when the IP address of its neighbors is known.
  • Page 165 Configuring IP Information Configuring ARP • Remove — Removes a specific ARP entry. The possible field values are: – Checked — Removes the selected ARP entries. – Unchecked — Maintains the current ARP entries. Define the ARP Entry Age Out and Clear ARP Table Entries fields. Click .
  • Page 166: Configuring Domain Name Servers

    Configuring IP Information Configuring Domain Name Servers Configuring Domain Name Servers Domain Name System (DNS) converts user-defined domain names into IP addresses. Each time a domain name is assigned, the DNS service translates the name into a numeric IP address. For example, www.ipexample.com is translated into 192.87.56.2.
  • Page 167 Configuring IP Information Configuring Domain Name Servers – Static — The IP address is a static IP address. • Remove — Removes DNS servers. The possible field values are: – Checked — Removes the selected DNS server – Unchecked — Maintains the current DNS server list. •...
  • Page 168: Defining Dns Host Mapping

    Configuring IP Information Defining DNS Host Mapping Defining DNS Host Mapping The DNS Host Mapping Page provides information for defining DNS Host Mapping. To define DNS host mapping: 1. Click Basic Setup > IP Configuration > Domain Name System > Host Mapping. The DNS Host Mapping Page opens: Figure 108:DNS Host Mapping Page The DNS Host Mapping Page contains the following fields:...
  • Page 169 Configuring IP Information Defining DNS Host Mapping Figure 109:Add DNS Host Page Define the Host Name and IP Address fields. Click . The DNS host is added, and the device is updated. Page 169...
  • Page 170: Configuring Multicast Forwarding

    Configuring Multicast Forwarding Section 13. Configuring Multicast Forwarding Multicast forwarding allows a single packet to be forwarded to multiple destinations. L2 Multicast service is based on L2 switch receiving a single packet addressed to a specific multicast address. Multicast forwarding creates copies of the packet, and transmits the packets to the relevant ports.
  • Page 171: Defining Igmp Snooping

    Configuring Multicast Forwarding Defining IGMP Snooping Defining IGMP Snooping When IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. The CPU analyzes the incoming packets and determines: • Which ports want to join which Multicast groups. •...
  • Page 172 Configuring Multicast Forwarding Defining IGMP Snooping • Host Timeout — Indicates the amount of time host waits to receive a message before timing out. The default time is 260 seconds. • MRouter Timeout — Indicates the amount of the time the Multicast router waits to receive a message before it times out.
  • Page 173: Defining Multicast Bridging Groups

    Configuring Multicast Forwarding Defining Multicast Bridging Groups Defining Multicast Bridging Groups The Multicast Group Page displays the ports and LAGs attached to the Multicast service group in the Ports and LAGs tables. The Port and LAG tables also reflect the manner in which the port or LAGs joined the Multicast group.
  • Page 174 Configuring Multicast Forwarding Defining Multicast Bridging Groups Click . The Add Multicast Group Page opens: Figure 113: Add Multicast Group Page Define the VLAN ID, Bridge Multicast IP Address, and Bridge Multicast MAC Address fields. Select ports to join the Multicast group. Define the Multicast port settings.
  • Page 175: Defining Multicast Forward All Settings

    Configuring Multicast Forwarding Defining Multicast Bridging Groups Defining Multicast Forward All Settings The Multicast Forward All Page contains fields for attaching ports or LAGs to a device that is attached to a neigh- boring Multicast router/switch. Once IGMP Snooping is enabled, Multicast packets are forwarded to the appropri- ate port or VLAN.
  • Page 176: Managing Power Over Ethernet Devices

    Managing Power over Ethernet Devices Section 14. Managing Power over Ethernet Devices Power over Ethernet (PoE) provides power to devices over existing LAN cabling, without updating or modifying the network infrastructure. Power over Ethernet removes the necessity of placing network devices next to power sources.
  • Page 177: Defining Poe System Information

    Managing Power over Ethernet Devices Defining PoE System Information Defining PoE System Information The PoE Properties Page contains system PoE information for enabling PoE on the device, monitoring the current power usage, and enabling PoE traps. To enable PoE on the device: Click the System >...
  • Page 178: Displaying And Editing Poe System Information

    Managing Power over Ethernet Devices Displaying and Editing PoE System Information Displaying and Editing PoE System Information The PoE Interface Page displays system PoE information on the device and monitoring the current power usage. To display system PoE information on the device: Click the System >...
  • Page 179 Managing Power over Ethernet Devices Displaying and Editing PoE System Information port 1 is prioritized as high, but port 3 is prioritized as low, port 1 is prioritized to receive power, and port 3 may be denied power. The possible field values are: –...
  • Page 180: Managing System Files

    Managing System Files Section 15. Managing System Files The configuration file structure consists of the following configuration files: • Startup Configuration File — Contains the commands required to reconfigure the device to the same set- tings as when the device is powered down or rebooted. The Startup file is created by copying the configura- tion commands from the Running Configuration file or the Backup Configuration file.
  • Page 181: Downloading System Files

    Managing System Files Downloading System Files Downloading System Files The File Download page contains parameters for downloading system files. Only one type of download can be performed at any one time. To download a file: Click System > File Management > File Download. The File Download Page opens: Figure 118: File Download Page File Download Page is divided into the following sections: •...
  • Page 182 Managing System Files Downloading System Files Configuration Download The Configuration Download section contains the following fields: • Configuration Download — Indicates that the download is for configuration files. If Configuration Download is selected, the Firmware Download fields are grayed out. •...
  • Page 183: Uploading System Files

    Managing System Files Uploading System Files Uploading System Files The File Upload Page contains fields for uploading the software from the device to the TFTP server. To upload system files: Click System > File Management > File Upload. The File Upload Page opens: Figure 119: File Upload Page The File Upload Page is divided into the following sections: •...
  • Page 184 Managing System Files Uploading System Files Configuration Upload The Configuration Upload section contains the following fields: • TFTP Server IP Address — Specifies the TFTP Server IP Address to which the Configuration file is uploaded. • Destination File Name— Specifies the file name to which the Startup Configuration file is uploaded. The sys- tem can store up-to five configuration files.
  • Page 185: Activating Image Files

    Managing System Files Activating Image Files Activating Image Files The Active Image Page allows network managers to select and reset the Image files. To open the Active Image Page : Click System > File Management > Active Image. The Active Image Page opens: Figure 120:Active Image Page The Active Image Page contains the following fields: •...
  • Page 186: Copying Files

    Managing System Files Copying Files Copying Files Files can be copied by using the Copy Files Page. To copy files: To open the Copy Files Page: Click System > File Management > Copy Files The Copy Files Page opens: Figure 121:Copy Files Page The Copy Files Page contains the following fields: •...
  • Page 187: Managing System Files

    Managing System Files Managing System Files Managing System Files The File System Page provides information about files currently stored on the system, including file names, file sizes, files modifications, and file permissions. The file system permits managing up to five files and a total file size of 3MB.
  • Page 188: Configuring Quality Of Service

    Configuring Quality of Service Section 16. Configuring Quality of Service Quality of Service (QoS) provides the ability to implement QoS and priority queuing within a network. For example, certain types of traffic that require minimal delay, such as Voice, Video, and real-time traffic can be assigned a high priority queue, while other traffic can be assigned a lower priority queue.
  • Page 189: Defining General Qos Settings

    Configuring Quality of Service Defining General QoS Settings CoS Services After packets are assigned to a specific egress queue, CoS services can be assigned to the queue. Egress queues are configured with a scheduling scheme by one of the following methods: •...
  • Page 190: Restoring Factory Default Qos Interface Settings

    Configuring Quality of Service Defining General QoS Settings Figure 123:CoS Global Parameters Page The CoS Global Parameters Page contains the following: • CoS Mode — Enables CoS Mode on the interface. The possible CoS Mode values are: – Disable — Disables CoS Mode on the interface. –...
  • Page 191: Configure Bandwidth Settings

    Configuring Quality of Service Defining General QoS Settings Configure Bandwidth Settings The Bandwidth Settings Page allows network managers to define the bandwidth settings for a specified egress interface. Modifying queue scheduling affects the queue settings globally. Queue shaping can be based per queue and/or per interface. Shaping is determined by the lower specified value. The queue shaping type is selected in the Bandwidth Settings Page.
  • Page 192 Configuring Quality of Service Defining General QoS Settings Figure 125:Bandwidth Settings Edit Page Define the fields. Click . The bandwidth settings are saved to interface, and the device is updated. Page 192...
  • Page 193: Defining Queues

    Configuring Quality of Service Defining General QoS Settings Defining Queues The Queue Page contains fields for defining the QoS queue forwarding types. To set the queue settings: Click Basic Setup > Quality of Service > Global Parameters> Queue. The Queue Page opens. Figure 126:Queue Page The Queue Page contains the following fields: •...
  • Page 194: Configuring Qos Mapping

    Configuring Quality of Service Configuring QoS Mapping Configuring QoS Mapping This section contains information for mapping CoS and DSCP values to queues, and includes the following sections: • Mapping CoS Values to Queues • Mapping DSCP Values to Queues Mapping CoS Values to Queues The CoS to Queue Page contains fields for mapping CoS values to traffic queues.
  • Page 195: Mapping Dscp Values To Queues

    Configuring Quality of Service Configuring QoS Mapping Mapping DSCP Values to Queues The DSCP to Queue Page contains fields for mapping DSCP settings to traffic queues. For example, a packet with a DSCP tag value of 3 can be assigned to queue 2. To map CoS values to queues: Click Basic Setup >...
  • Page 196: Configuring Basic Mode

    Configuring Quality of Service Configuring Basic Mode Configuring Basic Mode This section contain information for configuring the Basic QoS Mode, and includes the following topics: • Configuring Trust Mode • Configuring DSCP Rewrite Configuring Trust Mode The Trust Setup Page contains information for enabling Trust on the device. Trust mode is configured globally. Packets entering a QoS domain are classified at the edge of the QoS domain.
  • Page 197: Configuring Dscp Rewrite

    Configuring Quality of Service Configuring Basic Mode Configuring DSCP Rewrite The DSCP Rewrite Page allows network managers to assign new DSCP values to incoming packets. To enable DSCP Rewrite: Click Basic Setup > Quality of Service > Basic Mode > DSCP Rewrite. The DSCP Rewrite Page opens: Figure 130:DSCP Rewrite Page The DSCP Rewrite Page contains the following fields: •...
  • Page 198: Configuring Advanced Qos Settings

    Configuring Quality of Service Configuring Advanced QoS Settings Configuring Advanced QoS Settings This section contains information for configuring advanced QoS features, and includes the following topics: • Defining Policy Properties • Defining Policy Profiles Defining Policy Properties This section contains information for configuring advanced policy properties, and includes the following topics: •...
  • Page 199 Configuring Quality of Service Configuring Advanced QoS Settings Mapping DSCP Values When traffic exceeds user-defined limits, use the Advanced DSCP Mapping Page to configure the DSCP tag to use in place of the incoming DSCP tags. To define Advance QoS DSCP mapping. Click Advanced Setup >...
  • Page 200: Defining Tail Dropping

    Configuring Quality of Service Configuring Advanced QoS Settings Defining Tail Dropping The Tail Drop Page permits network managers to set the device to drop packets which exceed the threshold size. Tail Drop is configured per queue. • Click Advance Setup > Quality of Service > Policy Properties > Tail Drop. The Tail Drop Page opens. Figure 132:Tail Drop Page The Tail Drop Page contains the following field: •...
  • Page 201: Creating Class Maps

    Configuring Quality of Service Configuring Advanced QoS Settings Mapping DSCP to Drop Precedence Drop Precedence (DP) enables marking frames that exceed policier CIR threshold. In a congested network, frames containing a higher DP are discarded before frames with a lower DP. To map DSCP values to DP values: Click Basic Setup>...
  • Page 202 Configuring Quality of Service Configuring Advanced QoS Settings The Class Map Page contains the following fields: • — Displays the user-defined name of the class map. Class-Map Name • 1— Contains a list of the user defined ACLs. • — Indicates the criteria used to match class maps with an ACL’s address. Possible values are: Match –...
  • Page 203 Configuring Quality of Service Configuring Advanced QoS Settings Figure 135:Add Class Map Page Define the Class Map Name, Preferred ACL, IP ACL, Match, and MAC. Click . The Class Map is defined, and the device is updated. Page 203...
  • Page 204 Configuring Quality of Service Configuring Advanced QoS Settings Aggregating Policiers After a packet is classified, the policing process begins. A policier specifies the bandwidth limit for incoming traffic on the classified flow and actions are defined for packets that exceed the limits. These actions include forwarding packets, dropping packets, or remarking packets with a new DSCP value.
  • Page 205 Configuring Quality of Service Configuring Advanced QoS Settings Figure 137:Add Aggregated Policier Page Define the Aggregate Policer Name, Ingress Committed Information rate, Ingress Committed Burst size, and Exceed Action fields. Click . The Aggregated Policier is defined, and the device is updated. Page 205...
  • Page 206: Defining Policy Profiles

    Configuring Quality of Service Configuring Advanced QoS Settings Defining Policy Profiles This section contains information for configuring policy profiles, and includes the following topics: • Defining Policies • Attaching Policies to Interfaces Defining Policies A policy is a collection of classes, each of which is a combination of a class map and a QoS action to apply to matching traffic.
  • Page 207 Configuring Quality of Service Configuring Advanced QoS Settings Figure 139:Add QoS Policy Profile Page In addition to the fields in the Policy Page, the Add QoS Policy Profile Page contains the following fields: • Class Map — Selects a class map for the class. •...
  • Page 208 Configuring Quality of Service Configuring Advanced QoS Settings Click . The policy is defined, and the device is updated. Attaching Policies to Interfaces The Policy Binding Page contains information for attaching policies on interfaces. To attach a policy to an interface: Click Advance Setup >...
  • Page 209: Configuring Snmp

    Configuring SNMP SNMP v1 and v2c Section 17. Configuring SNMP Simple Network Management Protocol (SNMP) provides a method for managing network devices. The device supports the following SNMP versions: • SNMP version 1 • SNMP version 2c • SNMP version 3 SNMP v1 and v2c The SNMP agents maintain a list of variables, which are used to manage the device.
  • Page 210: Configuring Snmp Security

    Configuring SNMP Configuring SNMP Security Configuring SNMP Security This section contains information for configuring SNMP security parameters, and contains the following topics: • Defining SNMP Security • Defining SNMP Views • Defining SNMP Group Profiles • Defining SNMP Group Members •...
  • Page 211 Configuring SNMP Configuring SNMP Security Click . The SNMP global security parameters are set, and the device is updated. Page 211...
  • Page 212: Defining Snmp Views

    Configuring SNMP Configuring SNMP Security Defining SNMP Views SNMP Insert space views provide or block access to device features or portions of features. For example, a view can be defined which provides that SNMP group A has Read Only (R/O) access to Multicast groups, while SNMP group B has Read-Write (R/W) access to Multicast groups.
  • Page 213 Configuring SNMP Configuring SNMP Security Figure 143:Add SNMP View Page Define the View Name field. Define the view using Define the View Type field. Click . The view is defined, and the device is updated. Page 213...
  • Page 214: Defining Snmp Group Profiles

    Configuring SNMP Configuring SNMP Security Defining SNMP Group Profiles The SNMP Group Profile Page provides information for creating SNMP groups, and assigning SNMP access con- trol privileges to SNMP groups. Groups allow network managers to assign access rights to specific device fea- tures, or feature aspects.
  • Page 215 Configuring SNMP Configuring SNMP Security – Checked — Removes the selected SNMP group. – Unchecked — Maintains the SNMP groups. Click . The Add SNMP Group Profile Page opens: Figure 145: Add SNMP Group Profile Page Define the Group Name, Security Model, Security Level, and Operation fields. Click .
  • Page 216 Configuring SNMP Configuring SNMP Security Figure 146:SNMP Group Profile Settings Page Modify the Group Name, Security Model, Security Level, and Operation fields. Click . The SNMP group profile is modified, and the device is updated. Page 216...
  • Page 217: Defining Snmp Group Members

    Configuring SNMP Configuring SNMP Security Defining SNMP Group Members The SNMP Group Membership Page enables assigning system users to SNMP groups, as well as defining the user authentication method. Click System > SNMP > Security > Group Membership. The SNMP Group Membership Page opens: Figure 147:SNMP Group Membership Page The SNMP Group Membership Page contains the following fields: •...
  • Page 218 Configuring SNMP Configuring SNMP Security Figure 148:Add SNMP Group Membership Page In addition to the fields in the SNMP Group Membership Page, the Add SNMP Group Membership Page contains the following fields: • Authentication Method — Defines the SNMP Authentication Method. •...
  • Page 219 Configuring SNMP Configuring SNMP Security Figure 149:SNMP Group Membership Settings Page Modify the Group Name, Engine ID, Authentication Method, Password, Authentication Key, and Privacy Key fields. Click . The SNMP group membership is modified, and the device is updated. Page 219...
  • Page 220: Defining Snmp Communities

    Configuring SNMP Configuring SNMP Security Defining SNMP Communities Access rights are managed by defining communities in the SNMP Communities Page. When the community names are changed, access rights are also changed. SNMP communities are defined only for SNMP v1 and SNMP v2c.
  • Page 221 Configuring SNMP Configuring SNMP Security • Remove — Removes a community. The possible field values are: – Checked — Removes the selected SNMP community. – Unchecked — Maintains the SNMP communities. SNMP Communities Advanced Tables The SNMP Community Settings Page SNMP Community Advanced Table contains the following fields: •...
  • Page 222 Configuring SNMP Configuring SNMP Security Figure 152: SNMP Community Settings Page Modify the SNMP Management Station, Community String, and Basic or Advanced fields. Click . The SNMP community is modified, and the device is updated. Page 222...
  • Page 223: Configuring Snmp Notifications

    Configuring SNMP Configuring SNMP Notifications Configuring SNMP Notifications This section contains information for configuring SNMP Notifications, and contains the following topics: • Defining SNMP Notification Global Parameters • Defining SNMP Notification Filters • Defining SNMP Notification Recipients Page 223...
  • Page 224: Defining Snmp Notification Global Parameters

    Configuring SNMP Configuring SNMP Notifications Defining SNMP Notification Global Parameters The SNMP Notification Properties Page contains parameters for defining SNMP notification parameters. To define SNMP notification global parameters: Click System > SNMP > Notification > Properties. The SNMP Notification Properties Page opens: Figure 153:SNMP Notification Properties Page The SNMP Notification Properties Page contains the following fields: •...
  • Page 225: Defining Snmp Notification Filters

    Configuring SNMP Configuring SNMP Notifications Defining SNMP Notification Filters The SNMP Notification Filter Page permits filtering traps based on OIDs. Each OID is linked to a device feature or a portion of a feature. The SNMP Notification Filter Page also allows network managers to filter notifications. To define SNMP notification filters: Click System >...
  • Page 226 Configuring SNMP Configuring SNMP Notifications Figure 155:Add SNMP Notification Filter Page Define the Filter Name, New Object Identifier Tree, and Filter Type fields. Click . The SNMP notification filter is defined, and the device is updated. Page 226...
  • Page 227: Defining Snmp Notification Recipients

    Configuring SNMP Configuring SNMP Notifications Defining SNMP Notification Recipients The SNMP Notification Receiver Page contains information for defining filters that determine whether traps are sent to specific users, and the trap type sent. SNMP notification filters provide the following services: •...
  • Page 228 Configuring SNMP Configuring SNMP Notifications • Filter Name — Indicates if the SNMP filter for which the SNMP Notification filter is defined. • Timeout — Indicates the amount of time (in seconds) the device waits before re-sending informs. The default is 15 seconds.
  • Page 229 Configuring SNMP Configuring SNMP Notifications Figure 157:Add SNMP Notification Receiver Page Define the Recipient IP, Notification Type, SNMPV1,v2c or SNMPv3, UPD Port, Filter Name, Timeout, and Retries fields. Click . The SNMP Notification recipients are defined, and the device is updated. To modify SNMP notification recipients: Click System >...
  • Page 230 Configuring SNMP Configuring SNMP Notifications Click . The SNMP notification recipients are defined, and the device is updated. Page 230...
  • Page 231: Managing System Logs

    Managing System Logs Section 18. Managing System Logs This section provides information for managing system logs. The system logs enable viewing device events in real time, and recording the events for later usage. System Logs record and manage events and report errors and informational messages.
  • Page 232: Enabling System Logs

    Managing System Logs Enabling System Logs Enabling System Logs The Syslog Properties Page contains fields for defining which events are recorded to which logs. It contains fields for enabling logs globally, and parameters for defining logs. Log messages are listed from the highest severity to the lowest severity level.
  • Page 233 Managing System Logs Enabling System Logs Note When a severity level is selected, all severity level choices above the selection are selected automatically. – Console — Defines the minimum severity level from which logs are sent to the console. – RAM Logs —...
  • Page 234: Viewing The Device Memory Logs

    Managing System Logs Viewing the Device Memory Logs Viewing the Device Memory Logs The Device Memory Log Page contains all system logs in a chronological order that are saved in RAM (Cache). To open the Device Memory Log Page: • Click System >...
  • Page 235: Viewing The Flash Logs

    Managing System Logs Viewing the FLASH Logs Viewing the FLASH Logs The Syslog Flash Page contains information about log entries saved to the log file in Flash, including the time the log was generated, the log severity, and a description of the log message. The message log is available after reboot.
  • Page 236: Defining Servers Log Parameters

    Managing System Logs Defining Servers Log Parameters Defining Servers Log Parameters The Syslog Server Settings Page contains information for viewing and configuring the remote log servers. New log servers can be defined, and the log severity sent to each server. To open the Syslog Server Settings Page: Click System >...
  • Page 237 Managing System Logs Defining Servers Log Parameters Figure 163:Add Syslog Server Page Define the Log Server IP Address, UDP Port, Facility, Description, and Minimum servers fields. – Click . The Syslog Server is defined, and the device is updated. Page 237...
  • Page 238: Managing Device Diagnostics

    Managing Device Diagnostics Section 19. Managing Device Diagnostics This section contains the following topics: • Configuring Port Mirroring • Viewing Integrated Cable Tests • Viewing Optical Transceivers • Viewing the CPU Utilization Page 238...
  • Page 239: Configuring Port Mirroring

    Managing Device Diagnostics Configuring Port Mirroring Configuring Port Mirroring Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port. Port mirroring can be used as a diagnostic tool as well as a debugging feature. Port mirroring also enables switch performance monitoring.
  • Page 240 Managing Device Diagnostics Configuring Port Mirroring Select a port in the Source Port field. Select a port type in the Type field. Click . The port mirroring session is defined, and the device is updated. To edit the port mirroring settings: Click System >...
  • Page 241: Viewing Integrated Cable Tests

    Managing Device Diagnostics Viewing Integrated Cable Tests Viewing Integrated Cable Tests The Copper Cable Tests Page contains fields for performing tests on copper cables. Virtual Cable Testing (VCT) provides information about where errors occurred in the cable, the last time a cable test was performed, and the type of cable error, which occurred.
  • Page 242: Viewing Optical Transceivers

    Managing Device Diagnostics Viewing Optical Transceivers Viewing Optical Transceivers The Optical Transceivers Page allows network managers to perform tests on Fiber Optic cables. Optical trans- ceiver diagnostics can be performed only when the link is present. To test cables: • Click System >...
  • Page 243: Viewing The Cpu Utilization

    Managing Device Diagnostics Viewing the CPU Utilization Viewing the CPU Utilization The CPU Utilization Page contains information about the system’s CPU utilization. To view the CPU Utilization: • Click System >CPU > CPU Utilization. The CPU Utilization Page opens: Figure 169: CPU Utilization Page The CPU Utilization Page contains the following fields: •...
  • Page 244: Viewing Statistics

    Viewing Statistics Viewing Interface Statistics Section 20. Viewing Statistics This section provides device statistics for RMON, interfaces, GVRP, EAP, and Etherlike statistics. This section contains the following topics: • Viewing Interface Statistics • Managing RMON Statistics Viewing Interface Statistics This section contains the following topics: •...
  • Page 245: Viewing Device Interface Statistics

    Viewing Statistics Viewing Interface Statistics Viewing Device Interface Statistics The Interface Statistics Page contains statistics for both received and transmitted packets. To view interface statis- tics: Click Basic Setup > Interface Statistics > Interface. The Interface Statistics Page opens. Figure 170:Interface Statistics Page The Interface Statistics Page contains the following fields: •...
  • Page 246 Viewing Statistics Viewing Interface Statistics • Packets with Errors — Displays the number of error packets received from the selected interface. Transmit Statistics • Total Bytes (Octets) — Displays the number of octets transmitted on the selected interface. • Unicast Packets — Displays the number of Unicast packets transmitted on the selected interface. •...
  • Page 247: Managing Rmon Statistics

    Viewing Statistics Managing RMON Statistics Managing RMON Statistics This section contains the following topics: • Viewing RMON Statistics • Configuring RMON History • Configuring RMON Events • Defining RMON Alarms Viewing RMON Statistics The Viewing RMON Statistics contains fields for viewing information about device utilization and errors that occurred on the device.
  • Page 248: Resetting Rmon Statistics Counters

    Viewing Statistics Managing RMON Statistics – 60 Sec — Indicates that the RMON statistics are refreshed every 60 seconds. • Drop Events — Displays the number of dropped events that have occurred on the interface since the device was last refreshed. •...
  • Page 249: Configuring Rmon History

    Viewing Statistics Managing RMON Statistics Configuring RMON History This section contains the following topics: • Defining RMON History Control • Viewing the RMON History Table Defining RMON History Control The RMON History Control Page contains information about samples of data taken from ports. For example, the samples may include interface definitions or polling periods.
  • Page 250 Viewing Statistics Managing RMON Statistics Click . The RMON History Control Settings Page opens: Figure 173:RMON History Control Settings Page Define the Source Interface, Owner, Sampling Interval, Max. No. of Samples to Keep, and Samples Requested. fields. Click . The entry is added to the RMON History Control Page, and the device is updated. Page 250...
  • Page 251: Viewing The Rmon History Table

    Viewing Statistics Managing RMON Statistics Viewing the RMON History Table The RMON History Table Page contains interface specific statistical network samplings. Each table entry repre- sents all counter values compiled during a single sample. To view the RMON History Table: Click Advanced Setup >...
  • Page 252 Viewing Statistics Managing RMON Statistics • Fragments — Displays the number of fragments (packets with less than 64 octets, excluding framing bits, but including FCS octets) received on the interface since the device was last refreshed. • Jabbers — Displays the total number of received packets that were longer than 1518 octets. This number excludes frame bits, but includes FCS octets that had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number.
  • Page 253: Configuring Rmon Events

    Viewing Statistics Managing RMON Statistics Configuring RMON Events This section includes the following topics: • Defining RMON Events Control • Viewing the RMON Events Logs Defining RMON Events Control The RMON Events Control Page contains fields for defining RMON events. To view RMON events: •...
  • Page 254: Viewing The Rmon Events Logs

    Viewing Statistics Managing RMON Statistics Viewing the RMON Events Logs The RMON Events Logs Page contains a list of RMON events. To view RMON event logs: • Click Advanced Setup > RMON > Events > Events Logs. The RMON Events Logs Page opens. Figure 176:RMON Events Logs Page The RMON Events Logs Page contains the following fields: •...
  • Page 255: Defining Rmon Alarms

    Viewing Statistics Managing RMON Statistics Defining RMON Alarms The RMON Alarm Page contains fields for setting network alarms. Network alarms occur when a network problem, or event, is detected. Rising and falling thresholds generate events. To set RMON alarms: Click Advanced Setup > RMON > Alarm. The RMON Alarm Page opens. Figure 177:RMON Alarm Page The RMON Alarm Page contains the following fields: •...
  • Page 256 Viewing Statistics Managing RMON Statistics • Falling Event — Displays the mechanism in which the alarms are reported. • Startup Alarm — Displays the trigger that activates the alarm generation. Rising is defined by crossing the threshold from a low-value threshold to a higher-value threshold. •...
  • Page 257: Viewing Etherlike Statistics

    Viewing Statistics Managing RMON Statistics Viewing Etherlike Statistics The Etherlike Statistics Page contains interface statistics. To view Etherlike Statistics: Click Basic Setup > Interfaces Statistics > Etherlike. The Etherlike Statistics Page opens Figure 179:Etherlike Statistics Page The Etherlike Statistics Page contains the following fields: •...
  • Page 258: Resetting Etherlike Statistics Counters

    Viewing Statistics Managing RMON Statistics Resetting Etherlike Statistics Counters Open the Etherlike Statistics Page. Click . The Etherlike statistics counters are cleared. Page 258...
  • Page 259: Viewing Port Utilization Statistics

    Viewing Statistics Managing RMON Statistics Viewing Port Utilization Statistics The Port Utilization Page contains information about the system’s Port utilization. To view the Port Utilization: • Click Basic Setup > Interface Statistics > Port Utilization. The Port Utilization Page opens: Figure 180: Port Utilization Page The Port Utilization Page contains the following fields: •...
  • Page 260: Appendix A Device Specifications & Features

    Appendix A Device Specifications & Features Appendix A Device Specifications & Features This appendix contains the device specifications and features pertaining to the DES-3252P. This section contains the following topics: • Hardware Specifications • DES-3252P Features Hardware Specifications This section contains the DES-3252P hardware specifications: Ports provides 48-Ports 10/100BASE-TX + 2 Combo Copper/SFP (100BASE-FX/ 1000BASE-X Fiber ports) + 2 1000 Mbps Copper L2 Management Switch...
  • Page 261 Appendix A Device Specifications & Features DES-3252P Features This appendix describes the device features. The system supports the following features: F e a t u r e D e s c r i p t i o n Auto negotiation allows an device to advertise modes of opera- Auto Negotiation tion.
  • Page 262 Appendix A Device Specifications & Features F e a t u r e D e s c r i p t i o n Domain Name System (DNS) converts user-defined domain Domain Name System names into IP addresses. Each time a domain name is assigned the DNS service translates the name into a numeric IP address.
  • Page 263 Appendix A Device Specifications & Features F e a t u r e D e s c r i p t i o n Multicast service is a limited broadcast service, which allows one- MAC Multicast Support to-many and many-to-many connections for information distribu- tion.
  • Page 264 Appendix A Device Specifications & Features F e a t u r e D e s c r i p t i o n Power over Ethernet (PoE) provide power to devices over exist- Power over Ethernet ing LAN cabling, without updating or modifying the network infra- structure.
  • Page 265 Appendix A Device Specifications & Features F e a t u r e D e s c r i p t i o n 802.1d Spanning tree is a standard Layer 2 switch requirement Spanning Tree Protocol that allows bridges to automatically prevent and resolve L2 for- warding loops.
  • Page 266 Appendix A Device Specifications & Features F e a t u r e D e s c r i p t i o n The device always performs VLAN-aware bridging. Classic bridg- VLAN-aware MAC-based Switching ing(IEEE802.1D) is not performed, where frames are forwarded based only on their destination MAC address.
  • Page 267: Appendix B Troubleshooting

    Appendix B Troubleshooting Appendix B Troubleshooting This section describes problems that may arise when installing the and how to resolve these issue. This section includes the following topics: • Problem Solving — Provides information about problem management with DES-3252P. • Troubleshooting Solutions —...
  • Page 268 Appendix B Troubleshooting P r o bl em s P os si bl e C au se So lu t io n No response from the Faulty serial cable Replace the serial cable terminal emulation soft- Incorrect serial cable Replace serial cable for a pin-to-pin straight/flat ware cable Reconfigure the emulation software connection set-...
  • Page 269 Appendix B Troubleshooting P r o bl em s P os si bl e C au se So lu t io n Lost password The Password Recovery Procedure enables the user to override the current password configuration, and disables the need for a password to access the con- sole.
  • Page 270: Appendix C Technical Support

    Appendix C Technical Support Contacting D-Link Technical Support Software updates and user documentation can be found on the D-Link website. D-Link provides free technical support for customers within the United States and within Canada for the warranty duration. For more information on locating the D-Link office in your region, see International Offices .
  • Page 271 Appendix C Technical Support Contacting D-Link Technical Support Page 271...
  • Page 272 Appendix C Technical Support Contacting D-Link Technical Support Page 272...
  • Page 273 Appendix C Technical Support Contacting D-Link Technical Support Page 273...
  • Page 274 Appendix C Technical Support Contacting D-Link Technical Support Page 274...
  • Page 275 Appendix C Technical Support Contacting D-Link Technical Support Page 275...
  • Page 276 Appendix C Technical Support Contacting D-Link Technical Support Page 276...
  • Page 277 Appendix C Technical Support Contacting D-Link Technical Support Page 277...
  • Page 278 Appendix C Technical Support Contacting D-Link Technical Support Page 278...
  • Page 279 Appendix C Technical Support Contacting D-Link Technical Support Page 279...
  • Page 280 Appendix C Technical Support Contacting D-Link Technical Support Page 280...
  • Page 281 Appendix C Technical Support Contacting D-Link Technical Support Page 281...
  • Page 282 Appendix C Technical Support Contacting D-Link Technical Support Page 282...
  • Page 283 Appendix C Technical Support Contacting D-Link Technical Support Page 283...
  • Page 284 Appendix C Technical Support Contacting D-Link Technical Support Page 284...
  • Page 285 Appendix C Technical Support Contacting D-Link Technical Support Page 285...
  • Page 286 Appendix C Technical Support Contacting D-Link Technical Support Page 286...
  • Page 287 Appendix C Technical Support Contacting D-Link Technical Support Page 287...
  • Page 288 Appendix C Technical Support Contacting D-Link Technical Support Page 288...
  • Page 289 Appendix C Technical Support Contacting D-Link Technical Support Page 289...
  • Page 290 Appendix C Technical Support Contacting D-Link Technical Support Page 290...
  • Page 291 Appendix C Technical Support Contacting D-Link Technical Support Page 291...
  • Page 292 Appendix C Technical Support Contacting D-Link Technical Support Page 292...
  • Page 293 Appendix C Technical Support Contacting D-Link Technical Support Page 293...
  • Page 294 Appendix C Technical Support Contacting D-Link Technical Support Page 294...
  • Page 295 Appendix C Technical Support Contacting D-Link Technical Support Page 295...
  • Page 296 Appendix C Technical Support Contacting D-Link Technical Support Page 296...
  • Page 297: Warranty

    Hardware will be refunded by D-Link upon return to D-Link of the defective Hardware. All Hardware or part thereof that is replaced by D-Link, or for which the purchase price is refunded, shall become the property of D- Link upon replacement or refund.
  • Page 298 UPS Ground or any common carrier selected by D-Link. Return shipping charges shall be prepaid by D-Link if you use an address in the United States, otherwise we will ship the product to you freight collect. Expedited shipping is available upon request and provided shipping charges are prepaid by the customer.
  • Page 299 HEREIN, THE ENTIRE RISK AS TO THE QUALITY, SELECTION AND PERFORMANCE OF THE PRODUCT IS WITH THE PURCHASER OF THE PRODUCT. Limitation of Liability: TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK IS NOT LIABLE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY...
  • Page 300: Product Registration

    Product Registration Product Registration http://support.dlink.com/register/ D-Link products can be registered online at . Product registration is entirely voluntary and failure to complete or return this form will not diminish your warranty rights. Page 300...
  • Page 301: International Offices

    FAX: 61-2-8899-1868 TEL: 27-12-665-2165 France URL: www.dlink.com.au FAX: 27-12-665-2186 TEL: 33-1-30238688 India URL: www.d-link.co.za FAX: 33-1-30238689 D-Link House, Kurla Bandra Complex Russia URL: www.dlink-france.fr Road, Grafsky per., 14, floor 6 Netherlands Off CST Road, Santacruz (East), Mumbai - Moscow Weena 290 400098.

Table of Contents