Installing the Device ........................18 Connecting the Device ........................21 Initial Configuration ....................... 22 Getting Started........................38 Starting the D-Link Embedded Web Interface ................39 Understanding the D-Link Embedded Web Interface ..............41 Using Screen and Table Options....................44 Resetting the Device ........................46 Logging Off from the Device ......................
Interface web pages are easy-to-use and easy-to-navigate. In addition, The D-Link Embedded Web Interface pro- vides real time graphs and RMON statistics to help system administrators monitor network performance. This preface provides an overview to the D-Link Embedded Interface User Guide, and includes the following sec- tions: •...
Section 3. Initial Configuration — Provides step-by-step instructions for the initial device configuration. Using the Embedded Web Interface User Guide This section provides an overview to the D-Link Web System Interface User Guide. The D-Link Web System Inter- face User Guide provides the following sections: •...
• Appendix B Troubleshooting — Provides basic troubleshooting for installing the device. • Appendix C Technical Support — Provides details for contacting D-Link technical support Intended Audience This guide is intended for network administrators familiar with IT concepts and terminology.
Device Description Viewing the Device Section 1. Device Description This section contains a description of the D-Link DES-3252P and contains the following topics: • Viewing the Device • Ports Description • Cable Specifications • LED Definitions • Cable, Port, and Pinout Information •...
Device Description Ports Description • 4 1000Base-T ports — Four RJ-45 stacking ports designated as ports 49,50,51 and 52. • LED Indicators — Port activity Light Emitting Diodes (LED) for each port and system LEDs that are dis- played separately. Back Panel The following figure illustrates the DES-3252P back panel.
Page 10
Device Description Ports Description Figure 3: Inserting a GBIC into the Device RS-232 Console Port The RS-232 port is an asynchronous serial console port supporting the RS-232 electrical specification. The port is used to connect the device to a console managing the device. This interface configuration is as follows: •...
Device Description Cable Specifications Cable Specifications The following table contains the various cable specification for the DES-3252P: Table 1: DES- 3252P Cable Specifications Cab le Typ e D escr ip tio n 10/100Base-TX UTP CAT-3/4/5 (100 meters maximum) UTP Cat. 5e (100 meters maximum) 1000Base-T UTP Cat.
Page 12
Device Description LED Definitions Each RJ-45 ports has one LED indicator for Link /activity and PoE indications. The LED indications are described in the following table: Table 2: DES - 3252P Fast Ethernet RJ-45 Port LED Indications Por t Des criptio n L ED In dica tio n D escr ip tio n Link/Activity LED...
Device Description Cable, Port, and Pinout Information System LEDs The DES-3252P system LEDs are located on the front panel’s left side. The following figure illustrates the DES- 3252P system LEDs. Figure 5: DES-3252P System LEDs The LED indications are described in the following table: Table 5: System LEDs LED Des cription...
Page 14
Device Description Cable, Port, and Pinout Information Pin Connections for the 10/100/1000 Ethernet Interface The switching port can connect to stations wired in standard RJ-45 Ethernet station mode using straight cables. Transmission devices connected to each other use crossed cables. The following figure illustrates the pin allocation.
Device Description Physical Dimensions Pin Connections for the Console Port The RS-232 port is an asynchronous serial console port supporting the RS-232 electrical specification. The port is used to connect the device to a console managing the device. The following figure illustrates the pin allocation. Figure 7: Console Port Pin Allocation The following table describes the pin allocation...
Mounting Device Preparing for Installation Section 2. Mounting Device This section contains information for installing the device, and includes the following sections: • Preparing for Installation • Installing the Device • Connecting the Device • Rack Installation Preparing for Installation This section provides an explanation for preparing the installation site, and includes the following topics: •...
Carefully remove the device from the container and place it on a secure and clean surface. Remove all the packaging material. Inspect the product for damage. Report any damage immediately. If any item is found missing or damaged, please contact your local D-Link reseller for replacement. Page 17...
Mounting Device Installing the Device Installing the Device The device can be installed on a flat surface or mounted in a rack. This section includes the following topics: • Desktop or Shelf Installation • Rack Installation Desktop or Shelf Installation When installing the switch on a desktop or shelf, the rubber feet included with the device should first be attached.
Mounting Device Installing the Device Rack Installation The device can be mounted in an EIA standard-sized, 19-inch rack, which can be placed in a wiring closet with other equipment. To install, the device the mounting brackets must first be attached on the devices’s sides. Notes •...
Mounting Device Installing the Device Figure 10: Mounting Device in a Rack Secure the unit to the rack with the rack screws (not provided). Fasten the lower pair of screws before the upper pair of screws. This ensures that the weight of the unit is evenly distributed during installation. Ensure that the ventilation holes are not obstructed.
Mounting Device Connecting the Device Connecting the Device This section describes how to connect the device, and includes the following sections: • Connecting the Switch to a Terminal • AC Power Connection Connecting the Switch to a Terminal The device is connected to a terminal through an console port on the front panel, which enables a connection to a terminal desktop system running terminal emulation software for monitoring and configuring the device.
Initial Configuration Section 3. Initial Configuration This section describes the initial device configuration and includes the following topics: • General Configuration Information • Booting the Switch • Configuration Overview • Advanced Configuration • Software Download and Reboot • Startup Menu Functions After completing all external connections, connect a terminal to the device to monitor the boot and other proce- dures.
Initial Configuration Device Port Default Settings The following table describes the device port default settings. Table 8: Device Port Defaults Function Default Settings Port speed and mode 100M Auto-negotiation Copper/Fiber GE 1000M Port forwarding state Enabled Head of line blocking prevention On (Enabled) Flow Control Back Pressure...
Page 24
Initial Configuration As the switch boots, the bootup test first counts the device memory availability and then continues to boot. The fol- lowing screen is an example of the displayed POST. ------ Performing the Power-On Self Test (POST) ------ UART Channel Loopback Test......PASS Testing the System SDRAM......PASS Boot1 Checksum Test.......PASS Boot2 Checksum Test.......PASS...
Page 25
Initial Configuration Note The following screen is an example configuration.Items such as addresses, versions, and dates may differ for each device. Preparing to decompress... Decompressing SW from image-1 638000 Running from RAM... ********************************************************************* *** Running SW Ver. x.x.x.x Date 11-Jan-200x Time 15:43:13 *** ********************************************************************* HW version is Base Mac address is: 00:00:b0:24:11:80...
Initial Configuration After the switch boots successfully, a system prompt appears (console>) and the local terminal can be used to begin configuring the switch. However, before configuring the switch, ensure that the software version installed on the device is the latest version. If it is not the latest version, download and install the latest version. See "Software Download and Reboot."...
Initial Configuration Note 100.1.1.33 is the IP address of the next hop that can be used to reach the management network 192.168.2.0. Console# show ip interface Proxy ARP is disabled IP Address Type Directed Broadcast 100.1.1.1/24 vlan 1 static disable User Name A user name is used to manage the device remotely, for example through SSH, Telnet, or the Web interface.
Page 28
Initial Configuration Note The device switch is delivered with no community strings configured. The following screen displays the default device configuration: Console(config)# show snmp Community-String Community-Access IP address ---------------- ---------------- ---------- System Contact: System Location: The community-string, community-access, and IP address can be configured through the local terminal during the initial configuration procedure.
Initial Configuration Console# configure Config(config)# rw 11.1.1.2 router snmp-server community private type Config(config)# exit Console(config)# show snmp Community-String Community-Access IP address ---------------- ---------------- ---------- private readWrite 11.1.1.2 Traps are enabled. Authentication-failure trap is enabled. Trap-Rec-Address Trap-Rec-Community Version ---------------- ------------------ ------- System Contact: System Location: This completes the initial configuration of the device from a local terminal.
Initial Configuration – Assigning Dynamic IP Addresses: console# configure console(config)# interface ethernet console(config-if)# <string> ip address dhcp hostname console(config-if)# exit console(config)# The interface receives the IP address automatically. To verify the IP address, enter the “show ip interface” command at the system prompt as shown in the follow- ing example.
Initial Configuration Note When the device reboot begins, any input at the ASCII terminal or keyboard automatically cancels the BOOTP process before completion and the device does not receive an IP address from the BOOTP server. The following example illustrates the process: Console>...
Initial Configuration Configuring an Initial Console Password To configure an initial console password, enter the following commands: Console(config)# aaa authentication login default line Console(config)# aaa authentication enable default line Console(config)# line console Console(config-line)# login authentication default Console(config-line)# enable authentication default Console(config-line)# george password...
Initial Configuration Configuring an Initial HTTPS Password To configure an initial HTTPS password, enter the following commands: Console(config)# ip https authentication local Console(config)# admin user1 username password level Enter the following commands once when configuring to use a console, a Telnet, or an SSH session in order to use an HTTPS session.
Initial Configuration Software Download Through TFTP Server This section contains instructions for downloading device software (system and boot images) through a TFTP server. The TFTP server must be configured before downloading the software. The switch boots and runs when decompressing the system image from the flash memory area where a copy of the system image is stored.
Initial Configuration Enter the command reload. The following message is displayed: Console# reload This command will reset the whole system and disconnect your current session.Do you want to continue (y/n)[n]? Enter “Y” to reboot the switch. Boot Image Download Loading a new boot image from the TFTP server and programming it into the flash updates the boot image. The boot image is loaded when the switch is powered on.
Page 36
Initial Configuration The Startup menu is displayed and contains the following configuration functions: [1]Download Software [2]Erase Flash File [3]Erase Flash Sectors [4]Password Recovery Procedure [5]Enter Diagnostic Mode [6]Back Enter your choice or press 'ESC' to exit: The following sections describe the Startup menu options. If no selection is made within 25 seconds (default), the switch times out and the device continues to load normally.
Page 37
Initial Configuration The following message is displayed. Write Flash file name (Up to 8 characters, Enter for none.):config File config (if present) will be erased after system initialization ========Press Enter To Continue ======== Enter as the name of the flash file. The configuration is erased and the device reboots. config Perform the switch’s initial configuration.
Getting Started Section 4. Getting Started This section provides an introduction to the user interface, and includes the following topics: • Starting the D-Link Embedded Web Interface • Understanding the D-Link Embedded Web Interface • Using Screen and Table Options •...
Notes • Disable the popup blocker before beginning device configuration using the EWS. This section contains information on starting the D-Link Embedded Web interface. To access the D-Link user interface: Open an Internet browser. Ensure that pop-up blockers are disabled. If pop-up blockers are enable, edit, add, and device information messages may not open.
Page 40
Getting Started Starting the D-Link Embedded Web Interface Figure 12: D-Link Embedded Web Interface Home Page Page 40...
Understanding the D-Link Embedded Web Interface Understanding the D-Link Embedded Web Interface The D-Link Embedded Web Interface Home Page contains the following views: • Port LED Indicators — Located at the top of the home page, the port LED indicators provide a visual repre- sentation of the ports on the D-Link front panel.
EWS. This section provides the following additional information: • Device Representation — Provides an explanation of the D-Link user interface buttons, including both man- agement buttons and task icons. • Using the D-Link Embedded Web Interface Management Buttons — Provides instructions for adding, modifying, and deleting configuration parameters.
Page 43
Getting Started Understanding the D-Link Embedded Web Interface Using the D-Link Embedded Web Interface Management Buttons Configuration Management buttons and icons provide an easy method of configuring device information, and include the following: Table 10: D-Link Web Interface Configuration Buttons...
• Deleting Configuration Information Adding Configuration Information User-defined information can be added to specific D-Link Web Interface pages, by opening a new Add page. To add information to tables or D-Link Web Interface pages: Open an D-Link Web Interface page.
Modify the fields. Click . The fields are modified, and the information is saved to the device. Deleting Configuration Information Open The D-Link Embedded Web Interface page. Select a table row. Select the Remove checkbox. Click . The information is deleted, and the device is updated.
Getting Started Resetting the Device Resetting the Device The Reset page enables resetting the device from a remote location. Note To prevent the current configuration from being lost, save all changes from the running configuration file to the startup configuration file before resetting the device. For instructions, see Copying Files. To reset the device: Click System >...
Getting Started Logging Off from the Device Logging Off from the Device Click . The Logout Page opens. Figure 19: Logout Page Click . The D-Link Embedded Web Interface Home Page closes. Page 47...
Managing Device Information Section 5. Managing Device Information This section contains information for setting general system information, and includes the following sections: • Defining the System Description • Configuring System Time Page 48...
Managing Device Information Defining the System Description Defining the System Description The System Description Page contains parameters for configuring general device information, including the sys- tem name, location, and contact, the system MAC Address, System Object ID, System Up Time, System IP and MAC addresses, and both software and hardware versions.
Managing Device Information Configuring System Time Configuring System Time This section provides information for configuring system time parameters, including: • Configuring Daylight Saving Time • Configuring SNTP Page 50...
Managing Device Information Configuring Daylight Saving Time Configuring Daylight Saving Time The Time Page contains fields for defining system time parameters for both the local hardware clock and the external SNTP clock. If the system time is kept using an external SNTP clock, and the external SNTP clock fails, the system time reverts to the local hardware clock.
Page 52
Managing Device Information Configuring Daylight Saving Time • Mexico — From the first Sunday in April at 02:00 to the last Sunday in October at 02:00. • Moldova — From the last weekend of March until the last weekend of October. •...
Page 53
Managing Device Information Configuring Daylight Saving Time Figure 21: Time Page The Time Page contains the following sections: • Clock Source — The source used to set the system clock. The possible field values are: – None — Indicates that a clock source is not used. The clock is set locally. –...
Page 54
Managing Device Information Configuring Daylight Saving Time – Month — The month of the year in which DST begins. The possible field range is Jan-Dec. – Year — The year in which the configured DST begins. – Time — The time at which DST begins. The field format is HH:MM. For example: 05:30. •...
Managing Device Information Configuring SNTP Configuring SNTP The device supports the Simple Network Time Protocol (SNTP). SNTP assures accurate network device clock time synchronization up to the millisecond. Time synchronization is performed by a network SNTP server. The device operates only as an SNTP client, and cannot provide time services to other systems. The device can poll the following server types for the server time: •...
Page 56
Managing Device Information Configuring SNTP This section contains the following topics: ² Defining SNTP Global Settings ² Defining SNTP Authentication ² Defining SNTP Servers • Defining SNTP Interface Settings Page 56...
Managing Device Information Defining SNTP Global Settings Defining SNTP Global Settings The SNTP Properties Page provides information for defining SNTP parameters globally. To define SNTP global parameters: Click System > SNTP > Properties. The SNTP Properties Page opens: Figure 22: SNTP Properties Page The SNTP Properties Page contains the following fields: •...
Page 58
Managing Device Information Defining SNTP Global Settings Define the Poll Interval, Enable Receive Broadcast Servers Update, Enable Receive Anycast Servers Update, Enable Receive Unicast Servers Update, and Enable Poll Unicast Servers fields and select at least one of the Enable fields. Click .
Managing Device Information Defining SNTP Authentication Defining SNTP Authentication The SNTP Authentication Page provides parameters for defining the means by which the SNTP server is authen- ticated. To define SNTP authentication: Click System > SNTP > Authentication. The SNTP Authentication Page opens: Figure 23: SNTP Authentication Page The SNTP Authentication Page contains the following fields:...
Page 60
Managing Device Information Defining SNTP Authentication To define SNTP authentication parameters: Click . The Add SNTP Authentication page opens: Figure 24: Add SNTP Authentication Define the Encryption Key ID, Authentication Key, and Trusted Key fields. Click . The SNTP Authentication Key is added, and the device is updated. Page 60...
Managing Device Information Defining SNTP Servers Defining SNTP Servers The SNTP Servers Page contains information for defining SNTP servers, as well as adding new SNTP servers. In addition, the SNTP Servers Page enables the device to request and accept SNTP traffic from a server. To define an SNTP server: Click System >...
Page 62
Managing Device Information Defining SNTP Servers Note 0 is displayed in the Encryption Key ID field - the range for Servers created with authentication is 1- 4294967295 Click . The Add SNTP Server Page opens: Page 62...
Page 63
Managing Device Information Defining SNTP Servers Figure 26: Add SNTP Server Page Define the SNTP Server, Enable Poll Interval, and Encryption Key ID fields. Click . The SNTP Server is added, and the device is updated. Page 63...
Managing Device Information Defining SNTP Interface Settings Defining SNTP Interface Settings The SNTP Interface Settings Page contains fields for setting SNTP on different interfaces. To define SNTP inter- face settings: Click System > SNTP > Interface Settings. The SNTP Interface Settings Page opens: Figure 27: SNTP Interface Settings Page The SNTP Interface Settings Page contains the following fields:...
Page 65
Managing Device Information Defining SNTP Interface Settings Figure 28: Add SNTP Interface Page Define the Interface and Receive Server Updates fields. Click . The SNTP interface is added, and the device is updated. – Page 65...
Managing Device Information Resetting the Device Resetting the Device The Reset page enables resetting the device from a remote location. To prevent the current configuration from being lost, save all changes from the running configuration file to the startup configuration file before resetting the device.
Configuring Ports Section 6. Configuring Ports The Interface Configuration Page contains fields for defining port parameters. To define port parameters: Click Basic Setup > Interface > Interface Configuration. The Interface Configuration Page opens. Figure 30: Interface Configuration Page The Interface Configuration Page is divided into the following sections: •...
Page 68
Configuring Ports – Half — The interface supports transmission between the device and the client in only one direction at a time. • Auto Negotiation — Displays the auto negotiation status on the port. Auto negotiation is a protocol between two link partners that enables a port to advertise its transmission rate, duplex mode, and flow control abilities to its partner.
Page 69
Configuring Ports In addition to the fields in the Interface Configuration Page, the Port or LAG Configuration Settings Page includes the Reactivate Suspended Port or Reactivate Suspended LAG fields. Select Reactivate Suspended Port or Reac- tivate Suspended LAG fields to return a suspended port or LAG to active status. Figure 31: Port Configuration Settings Page Modify the Admin Speed, Admin Duplex, and Admin Advertisement fields.
Configuring Ports Viewing Port Properties Viewing Port Properties The Interface Properties Page contains fields for defining port parameters. To view port properties: Click Basic Setup > Interface > Interface Properties. The Interface Properties Page opens: Figure 32: Interface Properties Page The Interface Properties Page is contains the following fields: •...
Page 71
Configuring Ports Viewing Port Properties Figure 33: Port Properties Page Define the Port and Description fields. Click . The interface properties are modified, and the device is updated. • Page 71...
Aggregating Ports Section 7. Aggregating Ports Link Aggregation optimizes port usage by linking a group of ports together to form a single LAG. Aggregating ports multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. The device supports both static LAGs and Link Aggregation Control Protocol (LACP) LAGs. LACP LAGs negotiate aggregating port links with other LACP ports located on a different device.
Aggregating Ports Defining LAG Membership Defining LAG Membership The LAG Membership Page contains fields for configuring parameters for configured LAGs. The device supports up to eight ports per LAG, and eight LAGs per system. To define LAG parameters: Click Advanced Setup > Interface > LAG Membership. The opens. Figure 34: LAG Membership Page The LAG Membership Page contains the following fields: •...
Aggregating Ports Configuring LACP Configuring LACP LAG ports can contain different media types if the ports are operating at the same speed. Aggregated links can be set up manually or automatically established by enabling LACP on the relevant links. Aggregate ports can be linked into link-aggregation port-groups.
Page 75
Aggregating Ports Configuring LACP Figure 36: LACP Parameters Settings Page Edit the Port Priority and LACP Timeout fields. Click . The LACP settings are saved, and the device is updated – Page 75...
Configuring VLANs Section 8. Configuring VLANs VLANs are logical subgroups with a Local Area Network (LAN) which combine user stations and network devices into a single unit, regardless of the physical LAN segment to which they are attached. VLANs allow network traffic to flow more efficiently within subgroups.
Configuring VLANs Defining VLAN Properties Defining VLAN Properties The VLAN Properties Page provides information and global parameters for configuring and working with VLANs. To define VLAN properties: Click Basic Setup > VLAN > Membership > Properties. The VLAN Properties Page opens. Figure 37: VLAN Properties Page The VLAN Properties Page contains the following fields: •...
Page 78
Configuring VLANs Defining VLAN Properties Figure 38: Add VLAN Page Define the VLAN ID and VLAN Name fields. Click . The VLAN ID is defined, and the device is updated. To edit the VLAN Settings: Click System > VLAN > Membership > Properties. The Edit VLAN Page opens. Click .
Page 79
Configuring VLANs Defining VLAN Properties Figure 39: Edit VLAN Page Edit the VLAN Name and Disable Unauthenticated VLAN fields. Click . The VLAN Settings are saved, and the device is updated Page 79...
Configuring VLANs Defining VLAN Membership Defining VLAN Membership The VLAN Membership Page contains a table that maps VLAN parameters to ports. Ports are assigned to VLAN membership by toggling through the Port Control settings. To define VLAN membership: Click Basic Setup > VLAN > Membership > Membership. The VLAN Membership Page opens. Figure 40: VLAN Membership Page The VLAN Membership Page contains the following fields: •...
Configuring VLANs Defining VLAN Interface Settings Defining VLAN Interface Settings The VLAN Interface Settings Page contains fields for managing ports that are part of a VLAN. The Port Default VLAN ID (PVID) is configured on the VLAN Interface Settings Page. All untagged packets arriving at the device are tagged with the port PVID.
Page 82
Configuring VLANs Defining VLAN Interface Settings – Disable — Disables ingress filtering on the device. • Reserve VLAN — Indicates the VLAN is the Reserved VLAN. VLANS can be selected as the Reserved VLAN is not being used by the system. Select a port.
Configuring VLANs Configuring GARP Configuring GARP This section contains information for configuring Generic Attribute Registration Protocol (GARP). This section includes the following topics: • Defining GARP • Defining GVRP Defining GARP Generic Attribute Registration Protocol (GARP) protocol is a general-purpose protocol that registers any network connectivity or membership-style information.
Page 84
Configuring VLANs Configuring GARP message received. Leave time must be greater than or equal to three times the join time. The default value is 60 centiseconds. • Leave All Timer — Indicates the amount of time lapse, in centiseconds, that all device waits before leaving the GARP state.
Configuring VLANs Configuring GARP Defining GVRP GARP VLAN Registration Protocol (GVRP) is specifically provided for automatic distribution of VLAN membership information among VLAN-aware bridges. GVRP allows VLAN-aware bridges to automatically learn VLANs to bridge ports mapping, without having to individually configure each bridge and register VLAN membership. To define GARP.
Page 86
Configuring VLANs Configuring GARP • GVRP Registration — Indicates if VLAN registration through GVRP is enabled on the device. The possible field values are: – Enable — Enables GVRP registration on the device. – Disable — Disables GVRP registration on the device. Click .
Defining the Forwarding Database Section 9. Defining the Forwarding Database Packets addressed to destinations stored in either the Static or Dynamic databases are immediately forwarded to the port. The Dynamic MAC Address Table can be sorted by interface, VLAN, or MAC Address, whereas MAC addresses are dynamically learned as packets from sources that arrive at the device.
Defining the Forwarding Database Defining Static Forwarding Database Entries Defining Static Forwarding Database Entries The Forwarding Database Static Addresses Page contains parameters for defining the age interval on the device. To prevent static MAC addresses from being deleted when the device is reset, ensure that the port attached to the MAC address is locked.
Page 89
Defining the Forwarding Database Defining Static Forwarding Database Entries Click . The Add Forwarding Database Page opens: Figure 48: Add Forwarding Database Page Define the Interface, MAC Address, VLAN ID or VLAN Name, and Status fields. Click . The forwarding database information is modified, and the device is updated. Page 89...
Defining the Forwarding Database Defining Dynamic Forwarding Database Entries Defining Dynamic Forwarding Database Entries The Dynamic Addresses Page contains parameters for querying information in the Dynamic MAC Address Table, including the interface type, MAC addresses, VLAN, and table storing. The Dynamic MAC Address table contains information about the aging time before a dynamic MAC address is erased, and includes parameters for querying and viewing the Dynamic MAC Address table.
Page 91
Defining the Forwarding Database Defining Dynamic Forwarding Database Entries Address Table Sort Key —Specifies the means by which the Dynamic MAC Address Table is sorted. The address table can be sorted by address, VLAN, or interface.Define the fields. Click . The Dynamic Address Aging field is defined, and the device is updated. To query the Dynamic MAC Address Table: Click Advanced Setup >...
Configuring Spanning Tree Section 10. Configuring Spanning Tree Spanning Tree Protocol (STP) provides tree topography for any arrangement of bridges. STP also provides a sin- gle path between end stations on a network, eliminating loops. Loops occur when alternate routes exist between hosts. Loops in an extended network can cause bridges to for- ward traffic indefinitely, resulting in increased traffic and reducing network efficiency.
Configuring Spanning Tree Defining Classic Spanning Tree Defining Classic Spanning Tree The STP Properties Page contains parameters for enabling STP on the device. To enable STP on the device: Click Advanced Setup > Spanning Tree > STP > Properties. The STP Properties Page opens: Figure 50: STP Properties Page The STP Properties Page contains the following fields: •...
Page 94
Configuring Spanning Tree Defining Classic Spanning Tree • Path Cost Default Values — Specifies the method used to assign default path cost to STP ports. The possi- ble field values are: – Short — Specifies 1 through 65,535 range for port path cost. This is the default value. –...
Configuring Spanning Tree Defining STP on Interfaces Defining STP on Interfaces Network administrators can assign STP settings to specific interfaces using the STP Interface Page. The Global LAGs section displays the STP information for Link Aggregated Groups. To assign STP settings to an interface: Click Advanced Setup >...
Page 96
Designated Bridge ID — Indicates the bridge priority and the MAC Address of the designated bridge. • Designated Port ID — Indicates the selected port D-Link priority and interface. • Designated Cost — Indicates the cost of the port participating in the STP topology. Ports with a lower cost are less likely to be blocked if STP detects loops.
Page 97
Configuring Spanning Tree Defining STP on Interfaces Select Enable in the STP field. Define the Fast Link, Enable Root Guard, Path Cost, Default Path Cost, and Priority fields. Click . STP is enabled on the interface, and the device is updated. Page 97...
Configuring Spanning Tree Defining Rapid Spanning Tree Defining Rapid Spanning Tree While Classic STP prevents Layer 2 forwarding loops in a general network topology, convergence can take between 30-60 seconds. This time may delay detecting possible loops and propagating status topology changes. Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies that allow a faster STP convergence without creating forwarding loops.
Page 99
Configuring Spanning Tree Defining Rapid Spanning Tree – Multiple STP — Multiple STP is enabled on the device. • Fast Link Operational Status — Indicates whether Fast Link is enabled or disabled for the port or LAG. If Fast Link is enabled for a port, the port is automatically placed in the forwarding state. •...
Configuring Spanning Tree Defining Multiple Spanning Tree Defining Multiple Spanning Tree Multiple Spanning Tree (MSTP) provides differing load balancing scenarios. For example, while port A is blocked in one STP instance, the same port can be placed in the Forwarding state in another STP instance. The MSTP Properties Page contains information for defining global MSTP settings, including region names, MSTP revisions, and maximum hops.
Configuring Spanning Tree Defining Multiple Spanning Tree Defining MSTP Instance Settings MSTP maps VLANs into STP instances. Packets assigned to various VLANs are transmitted along different paths within Multiple Spanning Tree Regions (MST Regions). Regions are one or more Multiple Spanning Tree bridges by which frames can be transmitted.
Page 102
Configuring Spanning Tree Defining Multiple Spanning Tree Figure 57: VLAN Instance Configuration Table Define the Instance ID field. Click . The MSTP Instances are assigned, and the device is updated. Page 102...
Configuring Spanning Tree Defining Multiple Spanning Tree Defining MSTP Interface Settings Network Administrators can assign MSTP Interface settings in the MSTP Instance Settings Page To define MSTP interface settings: Click Advanced Setup > Spanning Tree > MSTP > Interface Settings. The MSTP Interface Settings Page opens: Figure 58: MSTP Interface Settings Page MSTP Instance Settings Page contains the following fields:...
Page 104
Configuring Spanning Tree Defining Multiple Spanning Tree • Role — Indicates the port role assigned by the STP algorithm to provide to STP paths. The possible field val- ues are: – Root — Provides the lowest cost path to forward packets to the root device. –...
Page 105
Configuring Spanning Tree Defining Multiple Spanning Tree Figure 59: MSTP Interface Table Define the Port Priority and the Path Cost fields. Click . The MSTP interface settings are defined, and the device is updated. Page 105...
Configuring Device Security Section 11. Configuring Device Security This section provides access to security pages that contain fields for setting security parameters for ports, device management methods, users, and server security. This section contains the following topics: • Configuring Management Security •...
Configuring Device Security Configuring Management Security Configuring Management Security This section provides information for configuring device management security. This section includes the following topics: • Configuring Authentication Methods • Configuring Passwords Configuring Authentication Methods This section provides information for configuring device authentication methods. This section includes the topics: •...
Configuring Device Security Configuring Management Security Defining Access Profiles Access profiles are profiles and rules for accessing the device. Access to management functions can be limited to user groups. User groups are defined for interfaces according to IP addresses or IP subnets. Access profiles con- tain management methods for accessing and managing the device.
Page 109
Configuring Device Security Configuring Management Security • Remove — Removes the selected access profile. The possible field values are: – Checked — Removes the selected access profile. Access Profiles cannot be removed when Active. – Unchecked — Maintains the access profiles. Click .
Page 110
Configuring Device Security Configuring Management Security • Interface — Defines the interface on which the access profile is defined. The possible field values are: – Port — Specifies the port on which the access profile is defined. – LAG — Specifies the LAG on which the access profile is defined. –...
Configuring Device Security Configuring Management Security Defining Profile Rules Access profiles can contain up to 128 rules that determine which users can manage the switch module, and by which methods. Users can also be blocked from accessing the device. Rules are composed of filters including: •...
Page 112
Configuring Device Security Configuring Management Security – All — Assigns all management methods to the rule. – Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device. –...
Page 113
Configuring Device Security Configuring Management Security To modify a Profile Rule: Click System > Management Security > Authentication > Profile Rules. The Access Profile Page opens Click . The Profile Rule settingsProfile Rule settingsProfile Rule settings opens: Figure 64: Profile Rule settingsProfile Rule settings Modify the fields.
Configuring Device Security Configuring Management Security Defining Authentication Profiles Authentication profiles allow network administrators to assign authentication methods for user authentication. User authentication can be performed either locally or on an external server. User authentication occurs in the order the methods are selected. If the first authentication method is not available, the next selected method is used.
Page 115
Configuring Device Security Configuring Management Security – Unchecked — Maintains the authentication profiles. Click . The Add Authentication Profile Page opens. Figure 66: Add Authentication Profile Page Define the Profile Method, Profile Name and Authentication Methods fields. Click . The authentication profile is defined, and the device is updated. Page 115...
Page 116
Configuring Device Security Configuring Management Security To modify an authentication profile: Click System > Management Security > Authentication > Authentication Profiles. The Authentication Profile Page opens. Click . The Authentication Profile Settings Page opens: Figure 67: Authentication Profile Settings Page Select an authentication method from the Optional Methods list.
Configuring Device Security Configuring Management Security Mapping Authentication Methods After authentication profiles are defined, they can be applied to management access methods. For example, con- sole users can be authenticated by Authentication Profile List 1, while Telnet users are authenticated by Authenti- cation Method List 2.
Page 118
Configuring Device Security Configuring Management Security Secured HTTP • Optional Methods — Displays the methods by which users are authenticated during an HTTP session. The possible field values are: – None — Indicates that no authentication method is used for access. –...
Configuring Device Security Configuring Management Security Defining RADIUS Settings Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for networks. RADIUS servers provide a centralized authentication method for web access. The default parameters are user-defined, and are applied to newly defined RADIUS servers. If new default param- eters are not defined, the system default values are applied to newly defined RADIUS servers.
Page 120
Configuring Device Security Configuring Management Security • Priority — Displays the RADIUS server priority. The possible values are 1-65535, where 1 is the highest value. The RADIUS server priority is used to configure the server query order. • Authentication Port — Identifies the authentication port. The authentication port is used to verify the RADIUS server authentication.
Page 121
Configuring Device Security Configuring Management Security Figure 70: Add Radius Server Page Define the Host IP Address, Priority, Authenticated Port, Timeout for Reply, Dead Time, and Usage Type fields. Click . The RADIUS server is added, and the device is updated. Page 121...
Page 122
Configuring Device Security Configuring Management Security To edit RADIUS Server Settings: Click System > Management Security > Authentication > Radius. The RADIUS Page opens. Click . The RADIUS Server Settings Page opens: Figure 71: RADIUS Server Settings Page Define the Host IP Address, Priority, Source IP Address, Key String, Number of Retries, Authentication Port, Timeout for Reply, Dead Time, and Usage Type fields.
Page 123
Configuring Device Security Configuring Management Security Defining TACACS+ Authentication Terminal Access Controller Access Control System (TACACS+) provides centralized security user access valida- tion. The system supports up-to 4 TACACS+ servers. TACACS+ provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes.
Page 124
Configuring Device Security Configuring Management Security The TACACS+ Page also contains the following fields: • Host IP Address — Defines the TACACS+ Server IP address. • Priority — Defines the order in which the TACACS+ servers are used. The field range is 0-65535. The default is 0.
Page 125
Configuring Device Security Configuring Management Security Click . The TACACS+ server is defined, and the device is updated. To edit a TACACS+ server settings: Click System > Management Security >Authentication > TACACS+. The TACACS+ Page opens. Select TACACS+ server entry. Click .
Configuring Device Security Configuring Management Security Configuring Passwords This section contains information for defining device passwords, and includes the following topics. • Defining Local Users • Defining Line Passwords • Defining Enable Passwords Defining Local Users define users, passwords, and access levels for users using the Local User Network administrators can Page.
Page 127
Configuring Device Security Configuring Management Security Figure 76: Add Local User Page In addition to the fields in the Local User Page, the Add Local User Page contains the following fields: • Password — Defines the local user password. Local user passwords can contain up to 159 characters. •...
Page 128
Configuring Device Security Configuring Management Security Define the User Name, Access Level, Password, and Confirm Password fields. Page 128...
Configuring Device Security Configuring Management Security Defining Line Passwords Network administrators can define line passwords for Console, Telnet, and SSH in the Line Password Page. For line passwords, no level should be defined. The device can be accessed using the following methods: To define line passwords: Click System >...
Configuring Device Security Configuring Management Security Defining Enable Passwords The Enable Password Page sets a local password for a particular access level. To enable passwords: Click System > Management Security > Passwords > Enable Password. The Enable Password Page opens: Figure 79: Enable Password Page The Enable Password Page contains the following fields: •...
Configuring Device Security Configuring Network Security Configuring Network Security Network security manages both access control lists and locked ports. This section contains the following topics: • Network Security Overview • Defining Network Authentication Properties • Defining Port Authentication • Configuring Traffic Control Network Security Overview This section provides an overview of network security and contains the following topics: •...
Page 132
Configuring Device Security Configuring Network Security Advanced port-based authentication is implemented in the following modes: • Single Host Mode — Allows port access only to the authorized host. • Multiple Host Mode — Multiple hosts can be attached to a single port. Only one host must be authorized for all hosts to access the network.
Configuring Device Security Configuring Network Security Defining Network Authentication Properties Define the Select Enable Access Level, Password, and Confirm Password fields. Click . The enable password is defined, and the device is updated. Page 133...
Configuring Device Security Configuring Network Security Configuring Network Security Network security manages both access control lists and locked ports. This section contains the following topics: • Network Security Overview • Defining Network Authentication Properties • Defining Port Authentication • Configuring Traffic Control Network Security Overview This section provides an overview of network security and contains the following topics: •...
Page 135
Configuring Device Security Configuring Network Security • Authentication Method — Specifies the authentication method used for port authentication. The possible field values are: – RADIUS, None — Provides port authentication, first using the RADIUS server. If the port is not authenticated, then no authentication method is used, and the session is permitted.
Configuring Device Security Configuring Network Security Defining Port Authentication The Port Authentication Page allows network managers to configure port-based authentication global parameters. To define the port-based authentication global properties: Click Advanced Setup > Security Suite > Authentication > Port Authentication. The Port Authentication Page opens.
Page 137
Configuring Device Security Configuring Network Security • Reauthentication Period — Displays the time span (in seconds) in which the selected port is reauthenti- cated. The field default is 3600 seconds. • Reauthenticate Now — Reauthenticates the selected ports immediately. Select All selects all ports for reau- thentication.
Page 138
Configuring Device Security Configuring Network Security Click . The port authentication settings are defined, and the device is updated. Page 138...
Configuring Device Security Configuring Network Security Configuring Multiple Hosts The Multiple Host Page allows network managers to configure advanced port-based authentication settings for specific ports and VLANs. For more information on advanced port-based authentication, see Advanced Port- Based Authentication. To define the network authentication global properties: Click Advanced Setup >...
Page 140
Configuring Device Security Configuring Network Security • Status — Indicates the host status. If there is an asterisk (*), the port is either not linked or is down. The pos- sible field values are: – Unauthorized — Indicates that either the port control is Force Unauthorized and the port link is down, or the port control is Auto but a client has not been authenticated via the port.
Configuring Device Security Configuring Network Security Defining Access Control Lists Access Control Lists (ACL) allow network managers to define classification actions and rules for specific ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entry and the ingress port is disabled.
Configuring Device Security Configuring Network Security Defining IP Based Access Control Lists Access Control Lists (ACL) allow network managers to define classification actions and rules for specific ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entry and the ingress port is disabled.
Page 144
Configuring Device Security Configuring Network Security – Unchecked — Maintains the IP based ACLs. • Create ACL — Creates an IP based ACL. • Create ACE — Creates an IP based ACE. • ACE Priority — Indicates the ACE priority that determines which ACE is matched to a packet based on a first-match basis.
Page 145
Configuring Device Security Configuring Network Security Figure 87: Add IP Based ACL Page In addition to the fields in the Add IP Based ACL Page contains the following additional fields: • New ACE Priority — Defines the new ACE priority, which determines which ACE is matched to a packet on a first-match basis.
Page 146
Configuring Device Security Configuring Network Security Figure 88: IP Based ACL Settings Modify the ACL Name, New Priority, Protocol, Source Port, Destination Port, Source IP Interface, Destination Port, WIldcard Mask, Match DSCP, Match IP Precedence, and Action field. Click . The IP based protocol is defined, and the device is updated. Page 146...
Configuring Device Security Configuring Network Security Defining MAC Based Access Control Lists MAC Based ACL Page allows a MAC- based ACL to be defined. ACEs can be added only if the ACL is not bound to an interface. To define MAC Based ACLs: Click Security >...
Page 148
Configuring Device Security Configuring Network Security Shutdown — Drops packet that meet the ACL criteria, and disables the port to which the packet was addressed. Ports are reactivated from the Interface Configuration Page Default. For more information on reactivating ports, see Configuring Ports.Click .
Configuring Device Security Configuring Network Security Figure 91: MAC Based Settings Page Modify the ACL Name, New Priority, Protocol, Source MAC Address, Destination MAC Address, Wildcard Masks, VLAN ID, CoS, CoS Mask, and Action fields. Click . The MAC based protocol is defined, and the device is updated. –...
Page 150
Configuring Device Security Configuring Network Security Figure 92: ACL Binding Page The ACL Binding Page contains the following fields: • Copy from Entry Number — Copies the ACL information from the defined interface. • To Row Number(s) — Copies the ACL information to the defined interface. •...
Page 151
Configuring Device Security Configuring Network Security Figure 93: ACL Binding Settings Page Define the Select ACL field. Click . The ACL is bound the interface, and the device is updated Page 151...
Configuring Device Security Configuring Network Security Configuring Traffic Control This section contains information for managing both port security and storm control, and includes the following topics: • Managing Port Security • Enabling Storm Control Page 152...
MAC addresses. These addresses are either manually defined on the port, or learned on that port up to the point when it is locked. When a packet is received on a locked port, and the packet D-Link source MAC address is not tied to that port (either it was learned on a different port, or it is unknown to the system), the protec- tion mechanism is invoked, and can provide various options.
Page 154
Configuring Device Security Configuring Network Security – Single-host Lock — Indicates that the port control is Auto and a single client has been authenticated via the port. • Learning Mode – Defines the locked port type. The Learning Mode field is enabled only if Locked is selected in the Set Port field.
Configuring Device Security Configuring Network Security Enabling Storm Control Storm control limits the amount of Multicast and Broadcast frames accepted and forwarded by the device. When Layer 2 frames are forwarded, Broadcast, and Multicast frames are flooded to all ports on the relevant VLAN. This occupies bandwidth, and loads all nodes on all ports.
Page 156
Configuring Device Security Configuring Network Security – Disable — Disables storm control on the selected port. • Broadcast Mode — Specifies the Broadcast mode currently enabled on the device. The possible field values are: – Unknown Unicast, Multicast & Broadcast — Counts Unicast, Multicast, and Broadcast traffic. –...
Configuring IP Information Section 12. Configuring IP Information This section contains information for defining IP interfaces, and includes the following sections: • Defining IP Addresses • Defining Default Gateways • Configuring DHCP • Configuring ARP • Configuring Domain Name Servers •...
Configuring IP Information Defining IP Addresses Defining IP Addresses The IP Interface Page contains fields for assigning IP addresses. Packets are forwarded to the default IP when frames are sent to a remote network. The configured IP address must belong to the same IP address subnet of one of the IP interfaces.
Page 159
Configuring IP Information Defining IP Addresses Figure 99: Add IP Interface Page Define the IP Address, Network Mask or Prefix Length, and Interface fields. Click . The IP configuration fields are saved, and the device is updated. To modify an IP interface: Click Basic Setup >...
Page 160
Configuring IP Information Defining IP Addresses Modify the IP Address, Network Mask or Prefix Length, and Interface fields. Click . The IP Interface is modified, and the device is updated. Page 160...
Configuring IP Information Defining Default Gateways Defining Default Gateways Packets are forwarded to the default IP when frames are sent to a remote network via the default gateway. The configured IP address must belong to the same subnet of one of the IP interfaces. To define a default gateway: Click Basic Setup >...
Configuring IP Information Configuring DHCP Configuring DHCP The Dynamic Host Configuration Protocol (DHCP) assigns dynamic IP addresses to devices on a network. DHCP ensures that network devices can have a different IP address every time the device connects to the network. To define a DHCP Interface: Click Basic Setup >...
Page 163
Configuring IP Information Configuring DHCP Figure 103:Add DHCP IP Interface Page Define the Interface and Host Name fields. Click . The DHCP interface is added, and the device is updated. Page 163...
Configuring IP Information Configuring ARP Configuring ARP The Address Resolution Protocol (ARP) converts IP addresses into physical addresses, and maps the IP address to a MAC address. ARP allows a host to communicate with other hosts only when the IP address of its neighbors is known.
Page 165
Configuring IP Information Configuring ARP • Remove — Removes a specific ARP entry. The possible field values are: – Checked — Removes the selected ARP entries. – Unchecked — Maintains the current ARP entries. Define the ARP Entry Age Out and Clear ARP Table Entries fields. Click .
Configuring IP Information Configuring Domain Name Servers Configuring Domain Name Servers Domain Name System (DNS) converts user-defined domain names into IP addresses. Each time a domain name is assigned, the DNS service translates the name into a numeric IP address. For example, www.ipexample.com is translated into 192.87.56.2.
Page 167
Configuring IP Information Configuring Domain Name Servers – Static — The IP address is a static IP address. • Remove — Removes DNS servers. The possible field values are: – Checked — Removes the selected DNS server – Unchecked — Maintains the current DNS server list. •...
Configuring IP Information Defining DNS Host Mapping Defining DNS Host Mapping The DNS Host Mapping Page provides information for defining DNS Host Mapping. To define DNS host mapping: 1. Click Basic Setup > IP Configuration > Domain Name System > Host Mapping. The DNS Host Mapping Page opens: Figure 108:DNS Host Mapping Page The DNS Host Mapping Page contains the following fields:...
Page 169
Configuring IP Information Defining DNS Host Mapping Figure 109:Add DNS Host Page Define the Host Name and IP Address fields. Click . The DNS host is added, and the device is updated. Page 169...
Configuring Multicast Forwarding Section 13. Configuring Multicast Forwarding Multicast forwarding allows a single packet to be forwarded to multiple destinations. L2 Multicast service is based on L2 switch receiving a single packet addressed to a specific multicast address. Multicast forwarding creates copies of the packet, and transmits the packets to the relevant ports.
Configuring Multicast Forwarding Defining IGMP Snooping Defining IGMP Snooping When IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. The CPU analyzes the incoming packets and determines: • Which ports want to join which Multicast groups. •...
Page 172
Configuring Multicast Forwarding Defining IGMP Snooping • Host Timeout — Indicates the amount of time host waits to receive a message before timing out. The default time is 260 seconds. • MRouter Timeout — Indicates the amount of the time the Multicast router waits to receive a message before it times out.
Configuring Multicast Forwarding Defining Multicast Bridging Groups Defining Multicast Bridging Groups The Multicast Group Page displays the ports and LAGs attached to the Multicast service group in the Ports and LAGs tables. The Port and LAG tables also reflect the manner in which the port or LAGs joined the Multicast group.
Page 174
Configuring Multicast Forwarding Defining Multicast Bridging Groups Click . The Add Multicast Group Page opens: Figure 113: Add Multicast Group Page Define the VLAN ID, Bridge Multicast IP Address, and Bridge Multicast MAC Address fields. Select ports to join the Multicast group. Define the Multicast port settings.
Configuring Multicast Forwarding Defining Multicast Bridging Groups Defining Multicast Forward All Settings The Multicast Forward All Page contains fields for attaching ports or LAGs to a device that is attached to a neigh- boring Multicast router/switch. Once IGMP Snooping is enabled, Multicast packets are forwarded to the appropri- ate port or VLAN.
Managing Power over Ethernet Devices Section 14. Managing Power over Ethernet Devices Power over Ethernet (PoE) provides power to devices over existing LAN cabling, without updating or modifying the network infrastructure. Power over Ethernet removes the necessity of placing network devices next to power sources.
Managing Power over Ethernet Devices Defining PoE System Information Defining PoE System Information The PoE Properties Page contains system PoE information for enabling PoE on the device, monitoring the current power usage, and enabling PoE traps. To enable PoE on the device: Click the System >...
Managing Power over Ethernet Devices Displaying and Editing PoE System Information Displaying and Editing PoE System Information The PoE Interface Page displays system PoE information on the device and monitoring the current power usage. To display system PoE information on the device: Click the System >...
Page 179
Managing Power over Ethernet Devices Displaying and Editing PoE System Information port 1 is prioritized as high, but port 3 is prioritized as low, port 1 is prioritized to receive power, and port 3 may be denied power. The possible field values are: –...
Managing System Files Section 15. Managing System Files The configuration file structure consists of the following configuration files: • Startup Configuration File — Contains the commands required to reconfigure the device to the same set- tings as when the device is powered down or rebooted. The Startup file is created by copying the configura- tion commands from the Running Configuration file or the Backup Configuration file.
Managing System Files Downloading System Files Downloading System Files The File Download page contains parameters for downloading system files. Only one type of download can be performed at any one time. To download a file: Click System > File Management > File Download. The File Download Page opens: Figure 118: File Download Page File Download Page is divided into the following sections: •...
Page 182
Managing System Files Downloading System Files Configuration Download The Configuration Download section contains the following fields: • Configuration Download — Indicates that the download is for configuration files. If Configuration Download is selected, the Firmware Download fields are grayed out. •...
Managing System Files Uploading System Files Uploading System Files The File Upload Page contains fields for uploading the software from the device to the TFTP server. To upload system files: Click System > File Management > File Upload. The File Upload Page opens: Figure 119: File Upload Page The File Upload Page is divided into the following sections: •...
Page 184
Managing System Files Uploading System Files Configuration Upload The Configuration Upload section contains the following fields: • TFTP Server IP Address — Specifies the TFTP Server IP Address to which the Configuration file is uploaded. • Destination File Name— Specifies the file name to which the Startup Configuration file is uploaded. The sys- tem can store up-to five configuration files.
Managing System Files Activating Image Files Activating Image Files The Active Image Page allows network managers to select and reset the Image files. To open the Active Image Page : Click System > File Management > Active Image. The Active Image Page opens: Figure 120:Active Image Page The Active Image Page contains the following fields: •...
Managing System Files Copying Files Copying Files Files can be copied by using the Copy Files Page. To copy files: To open the Copy Files Page: Click System > File Management > Copy Files The Copy Files Page opens: Figure 121:Copy Files Page The Copy Files Page contains the following fields: •...
Managing System Files Managing System Files Managing System Files The File System Page provides information about files currently stored on the system, including file names, file sizes, files modifications, and file permissions. The file system permits managing up to five files and a total file size of 3MB.
Configuring Quality of Service Section 16. Configuring Quality of Service Quality of Service (QoS) provides the ability to implement QoS and priority queuing within a network. For example, certain types of traffic that require minimal delay, such as Voice, Video, and real-time traffic can be assigned a high priority queue, while other traffic can be assigned a lower priority queue.
Configuring Quality of Service Defining General QoS Settings CoS Services After packets are assigned to a specific egress queue, CoS services can be assigned to the queue. Egress queues are configured with a scheduling scheme by one of the following methods: •...
Configuring Quality of Service Defining General QoS Settings Figure 123:CoS Global Parameters Page The CoS Global Parameters Page contains the following: • CoS Mode — Enables CoS Mode on the interface. The possible CoS Mode values are: – Disable — Disables CoS Mode on the interface. –...
Configuring Quality of Service Defining General QoS Settings Configure Bandwidth Settings The Bandwidth Settings Page allows network managers to define the bandwidth settings for a specified egress interface. Modifying queue scheduling affects the queue settings globally. Queue shaping can be based per queue and/or per interface. Shaping is determined by the lower specified value. The queue shaping type is selected in the Bandwidth Settings Page.
Page 192
Configuring Quality of Service Defining General QoS Settings Figure 125:Bandwidth Settings Edit Page Define the fields. Click . The bandwidth settings are saved to interface, and the device is updated. Page 192...
Configuring Quality of Service Defining General QoS Settings Defining Queues The Queue Page contains fields for defining the QoS queue forwarding types. To set the queue settings: Click Basic Setup > Quality of Service > Global Parameters> Queue. The Queue Page opens. Figure 126:Queue Page The Queue Page contains the following fields: •...
Configuring Quality of Service Configuring QoS Mapping Configuring QoS Mapping This section contains information for mapping CoS and DSCP values to queues, and includes the following sections: • Mapping CoS Values to Queues • Mapping DSCP Values to Queues Mapping CoS Values to Queues The CoS to Queue Page contains fields for mapping CoS values to traffic queues.
Configuring Quality of Service Configuring QoS Mapping Mapping DSCP Values to Queues The DSCP to Queue Page contains fields for mapping DSCP settings to traffic queues. For example, a packet with a DSCP tag value of 3 can be assigned to queue 2. To map CoS values to queues: Click Basic Setup >...
Configuring Quality of Service Configuring Basic Mode Configuring Basic Mode This section contain information for configuring the Basic QoS Mode, and includes the following topics: • Configuring Trust Mode • Configuring DSCP Rewrite Configuring Trust Mode The Trust Setup Page contains information for enabling Trust on the device. Trust mode is configured globally. Packets entering a QoS domain are classified at the edge of the QoS domain.
Configuring Quality of Service Configuring Basic Mode Configuring DSCP Rewrite The DSCP Rewrite Page allows network managers to assign new DSCP values to incoming packets. To enable DSCP Rewrite: Click Basic Setup > Quality of Service > Basic Mode > DSCP Rewrite. The DSCP Rewrite Page opens: Figure 130:DSCP Rewrite Page The DSCP Rewrite Page contains the following fields: •...
Configuring Quality of Service Configuring Advanced QoS Settings Configuring Advanced QoS Settings This section contains information for configuring advanced QoS features, and includes the following topics: • Defining Policy Properties • Defining Policy Profiles Defining Policy Properties This section contains information for configuring advanced policy properties, and includes the following topics: •...
Page 199
Configuring Quality of Service Configuring Advanced QoS Settings Mapping DSCP Values When traffic exceeds user-defined limits, use the Advanced DSCP Mapping Page to configure the DSCP tag to use in place of the incoming DSCP tags. To define Advance QoS DSCP mapping. Click Advanced Setup >...
Configuring Quality of Service Configuring Advanced QoS Settings Defining Tail Dropping The Tail Drop Page permits network managers to set the device to drop packets which exceed the threshold size. Tail Drop is configured per queue. • Click Advance Setup > Quality of Service > Policy Properties > Tail Drop. The Tail Drop Page opens. Figure 132:Tail Drop Page The Tail Drop Page contains the following field: •...
Configuring Quality of Service Configuring Advanced QoS Settings Mapping DSCP to Drop Precedence Drop Precedence (DP) enables marking frames that exceed policier CIR threshold. In a congested network, frames containing a higher DP are discarded before frames with a lower DP. To map DSCP values to DP values: Click Basic Setup>...
Page 202
Configuring Quality of Service Configuring Advanced QoS Settings The Class Map Page contains the following fields: • — Displays the user-defined name of the class map. Class-Map Name • 1— Contains a list of the user defined ACLs. • — Indicates the criteria used to match class maps with an ACL’s address. Possible values are: Match –...
Page 203
Configuring Quality of Service Configuring Advanced QoS Settings Figure 135:Add Class Map Page Define the Class Map Name, Preferred ACL, IP ACL, Match, and MAC. Click . The Class Map is defined, and the device is updated. Page 203...
Page 204
Configuring Quality of Service Configuring Advanced QoS Settings Aggregating Policiers After a packet is classified, the policing process begins. A policier specifies the bandwidth limit for incoming traffic on the classified flow and actions are defined for packets that exceed the limits. These actions include forwarding packets, dropping packets, or remarking packets with a new DSCP value.
Page 205
Configuring Quality of Service Configuring Advanced QoS Settings Figure 137:Add Aggregated Policier Page Define the Aggregate Policer Name, Ingress Committed Information rate, Ingress Committed Burst size, and Exceed Action fields. Click . The Aggregated Policier is defined, and the device is updated. Page 205...
Configuring Quality of Service Configuring Advanced QoS Settings Defining Policy Profiles This section contains information for configuring policy profiles, and includes the following topics: • Defining Policies • Attaching Policies to Interfaces Defining Policies A policy is a collection of classes, each of which is a combination of a class map and a QoS action to apply to matching traffic.
Page 207
Configuring Quality of Service Configuring Advanced QoS Settings Figure 139:Add QoS Policy Profile Page In addition to the fields in the Policy Page, the Add QoS Policy Profile Page contains the following fields: • Class Map — Selects a class map for the class. •...
Page 208
Configuring Quality of Service Configuring Advanced QoS Settings Click . The policy is defined, and the device is updated. Attaching Policies to Interfaces The Policy Binding Page contains information for attaching policies on interfaces. To attach a policy to an interface: Click Advance Setup >...
Configuring SNMP SNMP v1 and v2c Section 17. Configuring SNMP Simple Network Management Protocol (SNMP) provides a method for managing network devices. The device supports the following SNMP versions: • SNMP version 1 • SNMP version 2c • SNMP version 3 SNMP v1 and v2c The SNMP agents maintain a list of variables, which are used to manage the device.
Configuring SNMP Configuring SNMP Security Configuring SNMP Security This section contains information for configuring SNMP security parameters, and contains the following topics: • Defining SNMP Security • Defining SNMP Views • Defining SNMP Group Profiles • Defining SNMP Group Members •...
Page 211
Configuring SNMP Configuring SNMP Security Click . The SNMP global security parameters are set, and the device is updated. Page 211...
Configuring SNMP Configuring SNMP Security Defining SNMP Views SNMP Insert space views provide or block access to device features or portions of features. For example, a view can be defined which provides that SNMP group A has Read Only (R/O) access to Multicast groups, while SNMP group B has Read-Write (R/W) access to Multicast groups.
Page 213
Configuring SNMP Configuring SNMP Security Figure 143:Add SNMP View Page Define the View Name field. Define the view using Define the View Type field. Click . The view is defined, and the device is updated. Page 213...
Configuring SNMP Configuring SNMP Security Defining SNMP Group Profiles The SNMP Group Profile Page provides information for creating SNMP groups, and assigning SNMP access con- trol privileges to SNMP groups. Groups allow network managers to assign access rights to specific device fea- tures, or feature aspects.
Page 215
Configuring SNMP Configuring SNMP Security – Checked — Removes the selected SNMP group. – Unchecked — Maintains the SNMP groups. Click . The Add SNMP Group Profile Page opens: Figure 145: Add SNMP Group Profile Page Define the Group Name, Security Model, Security Level, and Operation fields. Click .
Page 216
Configuring SNMP Configuring SNMP Security Figure 146:SNMP Group Profile Settings Page Modify the Group Name, Security Model, Security Level, and Operation fields. Click . The SNMP group profile is modified, and the device is updated. Page 216...
Configuring SNMP Configuring SNMP Security Defining SNMP Group Members The SNMP Group Membership Page enables assigning system users to SNMP groups, as well as defining the user authentication method. Click System > SNMP > Security > Group Membership. The SNMP Group Membership Page opens: Figure 147:SNMP Group Membership Page The SNMP Group Membership Page contains the following fields: •...
Page 218
Configuring SNMP Configuring SNMP Security Figure 148:Add SNMP Group Membership Page In addition to the fields in the SNMP Group Membership Page, the Add SNMP Group Membership Page contains the following fields: • Authentication Method — Defines the SNMP Authentication Method. •...
Page 219
Configuring SNMP Configuring SNMP Security Figure 149:SNMP Group Membership Settings Page Modify the Group Name, Engine ID, Authentication Method, Password, Authentication Key, and Privacy Key fields. Click . The SNMP group membership is modified, and the device is updated. Page 219...
Configuring SNMP Configuring SNMP Security Defining SNMP Communities Access rights are managed by defining communities in the SNMP Communities Page. When the community names are changed, access rights are also changed. SNMP communities are defined only for SNMP v1 and SNMP v2c.
Page 221
Configuring SNMP Configuring SNMP Security • Remove — Removes a community. The possible field values are: – Checked — Removes the selected SNMP community. – Unchecked — Maintains the SNMP communities. SNMP Communities Advanced Tables The SNMP Community Settings Page SNMP Community Advanced Table contains the following fields: •...
Page 222
Configuring SNMP Configuring SNMP Security Figure 152: SNMP Community Settings Page Modify the SNMP Management Station, Community String, and Basic or Advanced fields. Click . The SNMP community is modified, and the device is updated. Page 222...
Configuring SNMP Configuring SNMP Notifications Defining SNMP Notification Filters The SNMP Notification Filter Page permits filtering traps based on OIDs. Each OID is linked to a device feature or a portion of a feature. The SNMP Notification Filter Page also allows network managers to filter notifications. To define SNMP notification filters: Click System >...
Page 226
Configuring SNMP Configuring SNMP Notifications Figure 155:Add SNMP Notification Filter Page Define the Filter Name, New Object Identifier Tree, and Filter Type fields. Click . The SNMP notification filter is defined, and the device is updated. Page 226...
Configuring SNMP Configuring SNMP Notifications Defining SNMP Notification Recipients The SNMP Notification Receiver Page contains information for defining filters that determine whether traps are sent to specific users, and the trap type sent. SNMP notification filters provide the following services: •...
Page 228
Configuring SNMP Configuring SNMP Notifications • Filter Name — Indicates if the SNMP filter for which the SNMP Notification filter is defined. • Timeout — Indicates the amount of time (in seconds) the device waits before re-sending informs. The default is 15 seconds.
Page 229
Configuring SNMP Configuring SNMP Notifications Figure 157:Add SNMP Notification Receiver Page Define the Recipient IP, Notification Type, SNMPV1,v2c or SNMPv3, UPD Port, Filter Name, Timeout, and Retries fields. Click . The SNMP Notification recipients are defined, and the device is updated. To modify SNMP notification recipients: Click System >...
Page 230
Configuring SNMP Configuring SNMP Notifications Click . The SNMP notification recipients are defined, and the device is updated. Page 230...
Managing System Logs Section 18. Managing System Logs This section provides information for managing system logs. The system logs enable viewing device events in real time, and recording the events for later usage. System Logs record and manage events and report errors and informational messages.
Managing System Logs Enabling System Logs Enabling System Logs The Syslog Properties Page contains fields for defining which events are recorded to which logs. It contains fields for enabling logs globally, and parameters for defining logs. Log messages are listed from the highest severity to the lowest severity level.
Page 233
Managing System Logs Enabling System Logs Note When a severity level is selected, all severity level choices above the selection are selected automatically. – Console — Defines the minimum severity level from which logs are sent to the console. – RAM Logs —...
Managing System Logs Viewing the Device Memory Logs Viewing the Device Memory Logs The Device Memory Log Page contains all system logs in a chronological order that are saved in RAM (Cache). To open the Device Memory Log Page: • Click System >...
Managing System Logs Viewing the FLASH Logs Viewing the FLASH Logs The Syslog Flash Page contains information about log entries saved to the log file in Flash, including the time the log was generated, the log severity, and a description of the log message. The message log is available after reboot.
Managing System Logs Defining Servers Log Parameters Defining Servers Log Parameters The Syslog Server Settings Page contains information for viewing and configuring the remote log servers. New log servers can be defined, and the log severity sent to each server. To open the Syslog Server Settings Page: Click System >...
Page 237
Managing System Logs Defining Servers Log Parameters Figure 163:Add Syslog Server Page Define the Log Server IP Address, UDP Port, Facility, Description, and Minimum servers fields. – Click . The Syslog Server is defined, and the device is updated. Page 237...
Managing Device Diagnostics Configuring Port Mirroring Configuring Port Mirroring Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port. Port mirroring can be used as a diagnostic tool as well as a debugging feature. Port mirroring also enables switch performance monitoring.
Page 240
Managing Device Diagnostics Configuring Port Mirroring Select a port in the Source Port field. Select a port type in the Type field. Click . The port mirroring session is defined, and the device is updated. To edit the port mirroring settings: Click System >...
Managing Device Diagnostics Viewing Integrated Cable Tests Viewing Integrated Cable Tests The Copper Cable Tests Page contains fields for performing tests on copper cables. Virtual Cable Testing (VCT) provides information about where errors occurred in the cable, the last time a cable test was performed, and the type of cable error, which occurred.
Managing Device Diagnostics Viewing Optical Transceivers Viewing Optical Transceivers The Optical Transceivers Page allows network managers to perform tests on Fiber Optic cables. Optical trans- ceiver diagnostics can be performed only when the link is present. To test cables: • Click System >...
Managing Device Diagnostics Viewing the CPU Utilization Viewing the CPU Utilization The CPU Utilization Page contains information about the system’s CPU utilization. To view the CPU Utilization: • Click System >CPU > CPU Utilization. The CPU Utilization Page opens: Figure 169: CPU Utilization Page The CPU Utilization Page contains the following fields: •...
Viewing Statistics Viewing Interface Statistics Viewing Device Interface Statistics The Interface Statistics Page contains statistics for both received and transmitted packets. To view interface statis- tics: Click Basic Setup > Interface Statistics > Interface. The Interface Statistics Page opens. Figure 170:Interface Statistics Page The Interface Statistics Page contains the following fields: •...
Page 246
Viewing Statistics Viewing Interface Statistics • Packets with Errors — Displays the number of error packets received from the selected interface. Transmit Statistics • Total Bytes (Octets) — Displays the number of octets transmitted on the selected interface. • Unicast Packets — Displays the number of Unicast packets transmitted on the selected interface. •...
Viewing Statistics Managing RMON Statistics Managing RMON Statistics This section contains the following topics: • Viewing RMON Statistics • Configuring RMON History • Configuring RMON Events • Defining RMON Alarms Viewing RMON Statistics The Viewing RMON Statistics contains fields for viewing information about device utilization and errors that occurred on the device.
Viewing Statistics Managing RMON Statistics – 60 Sec — Indicates that the RMON statistics are refreshed every 60 seconds. • Drop Events — Displays the number of dropped events that have occurred on the interface since the device was last refreshed. •...
Viewing Statistics Managing RMON Statistics Configuring RMON History This section contains the following topics: • Defining RMON History Control • Viewing the RMON History Table Defining RMON History Control The RMON History Control Page contains information about samples of data taken from ports. For example, the samples may include interface definitions or polling periods.
Page 250
Viewing Statistics Managing RMON Statistics Click . The RMON History Control Settings Page opens: Figure 173:RMON History Control Settings Page Define the Source Interface, Owner, Sampling Interval, Max. No. of Samples to Keep, and Samples Requested. fields. Click . The entry is added to the RMON History Control Page, and the device is updated. Page 250...
Viewing Statistics Managing RMON Statistics Viewing the RMON History Table The RMON History Table Page contains interface specific statistical network samplings. Each table entry repre- sents all counter values compiled during a single sample. To view the RMON History Table: Click Advanced Setup >...
Page 252
Viewing Statistics Managing RMON Statistics • Fragments — Displays the number of fragments (packets with less than 64 octets, excluding framing bits, but including FCS octets) received on the interface since the device was last refreshed. • Jabbers — Displays the total number of received packets that were longer than 1518 octets. This number excludes frame bits, but includes FCS octets that had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number.
Viewing Statistics Managing RMON Statistics Configuring RMON Events This section includes the following topics: • Defining RMON Events Control • Viewing the RMON Events Logs Defining RMON Events Control The RMON Events Control Page contains fields for defining RMON events. To view RMON events: •...
Viewing Statistics Managing RMON Statistics Defining RMON Alarms The RMON Alarm Page contains fields for setting network alarms. Network alarms occur when a network problem, or event, is detected. Rising and falling thresholds generate events. To set RMON alarms: Click Advanced Setup > RMON > Alarm. The RMON Alarm Page opens. Figure 177:RMON Alarm Page The RMON Alarm Page contains the following fields: •...
Page 256
Viewing Statistics Managing RMON Statistics • Falling Event — Displays the mechanism in which the alarms are reported. • Startup Alarm — Displays the trigger that activates the alarm generation. Rising is defined by crossing the threshold from a low-value threshold to a higher-value threshold. •...
Viewing Statistics Managing RMON Statistics Viewing Port Utilization Statistics The Port Utilization Page contains information about the system’s Port utilization. To view the Port Utilization: • Click Basic Setup > Interface Statistics > Port Utilization. The Port Utilization Page opens: Figure 180: Port Utilization Page The Port Utilization Page contains the following fields: •...
Appendix A Device Specifications & Features Appendix A Device Specifications & Features This appendix contains the device specifications and features pertaining to the DES-3252P. This section contains the following topics: • Hardware Specifications • DES-3252P Features Hardware Specifications This section contains the DES-3252P hardware specifications: Ports provides 48-Ports 10/100BASE-TX + 2 Combo Copper/SFP (100BASE-FX/ 1000BASE-X Fiber ports) + 2 1000 Mbps Copper L2 Management Switch...
Page 261
Appendix A Device Specifications & Features DES-3252P Features This appendix describes the device features. The system supports the following features: F e a t u r e D e s c r i p t i o n Auto negotiation allows an device to advertise modes of opera- Auto Negotiation tion.
Page 262
Appendix A Device Specifications & Features F e a t u r e D e s c r i p t i o n Domain Name System (DNS) converts user-defined domain Domain Name System names into IP addresses. Each time a domain name is assigned the DNS service translates the name into a numeric IP address.
Page 263
Appendix A Device Specifications & Features F e a t u r e D e s c r i p t i o n Multicast service is a limited broadcast service, which allows one- MAC Multicast Support to-many and many-to-many connections for information distribu- tion.
Page 264
Appendix A Device Specifications & Features F e a t u r e D e s c r i p t i o n Power over Ethernet (PoE) provide power to devices over exist- Power over Ethernet ing LAN cabling, without updating or modifying the network infra- structure.
Page 265
Appendix A Device Specifications & Features F e a t u r e D e s c r i p t i o n 802.1d Spanning tree is a standard Layer 2 switch requirement Spanning Tree Protocol that allows bridges to automatically prevent and resolve L2 for- warding loops.
Page 266
Appendix A Device Specifications & Features F e a t u r e D e s c r i p t i o n The device always performs VLAN-aware bridging. Classic bridg- VLAN-aware MAC-based Switching ing(IEEE802.1D) is not performed, where frames are forwarded based only on their destination MAC address.
Appendix B Troubleshooting Appendix B Troubleshooting This section describes problems that may arise when installing the and how to resolve these issue. This section includes the following topics: • Problem Solving — Provides information about problem management with DES-3252P. • Troubleshooting Solutions —...
Page 268
Appendix B Troubleshooting P r o bl em s P os si bl e C au se So lu t io n No response from the Faulty serial cable Replace the serial cable terminal emulation soft- Incorrect serial cable Replace serial cable for a pin-to-pin straight/flat ware cable Reconfigure the emulation software connection set-...
Page 269
Appendix B Troubleshooting P r o bl em s P os si bl e C au se So lu t io n Lost password The Password Recovery Procedure enables the user to override the current password configuration, and disables the need for a password to access the con- sole.
Appendix C Technical Support Contacting D-Link Technical Support Software updates and user documentation can be found on the D-Link website. D-Link provides free technical support for customers within the United States and within Canada for the warranty duration. For more information on locating the D-Link office in your region, see International Offices .
Page 271
Appendix C Technical Support Contacting D-Link Technical Support Page 271...
Page 272
Appendix C Technical Support Contacting D-Link Technical Support Page 272...
Page 273
Appendix C Technical Support Contacting D-Link Technical Support Page 273...
Page 274
Appendix C Technical Support Contacting D-Link Technical Support Page 274...
Page 275
Appendix C Technical Support Contacting D-Link Technical Support Page 275...
Page 276
Appendix C Technical Support Contacting D-Link Technical Support Page 276...
Page 277
Appendix C Technical Support Contacting D-Link Technical Support Page 277...
Page 278
Appendix C Technical Support Contacting D-Link Technical Support Page 278...
Page 279
Appendix C Technical Support Contacting D-Link Technical Support Page 279...
Page 280
Appendix C Technical Support Contacting D-Link Technical Support Page 280...
Page 281
Appendix C Technical Support Contacting D-Link Technical Support Page 281...
Page 282
Appendix C Technical Support Contacting D-Link Technical Support Page 282...
Page 283
Appendix C Technical Support Contacting D-Link Technical Support Page 283...
Page 284
Appendix C Technical Support Contacting D-Link Technical Support Page 284...
Page 285
Appendix C Technical Support Contacting D-Link Technical Support Page 285...
Page 286
Appendix C Technical Support Contacting D-Link Technical Support Page 286...
Page 287
Appendix C Technical Support Contacting D-Link Technical Support Page 287...
Page 288
Appendix C Technical Support Contacting D-Link Technical Support Page 288...
Page 289
Appendix C Technical Support Contacting D-Link Technical Support Page 289...
Page 290
Appendix C Technical Support Contacting D-Link Technical Support Page 290...
Page 291
Appendix C Technical Support Contacting D-Link Technical Support Page 291...
Page 292
Appendix C Technical Support Contacting D-Link Technical Support Page 292...
Page 293
Appendix C Technical Support Contacting D-Link Technical Support Page 293...
Page 294
Appendix C Technical Support Contacting D-Link Technical Support Page 294...
Page 295
Appendix C Technical Support Contacting D-Link Technical Support Page 295...
Page 296
Appendix C Technical Support Contacting D-Link Technical Support Page 296...
Hardware will be refunded by D-Link upon return to D-Link of the defective Hardware. All Hardware or part thereof that is replaced by D-Link, or for which the purchase price is refunded, shall become the property of D- Link upon replacement or refund.
Page 298
UPS Ground or any common carrier selected by D-Link. Return shipping charges shall be prepaid by D-Link if you use an address in the United States, otherwise we will ship the product to you freight collect. Expedited shipping is available upon request and provided shipping charges are prepaid by the customer.
Page 299
HEREIN, THE ENTIRE RISK AS TO THE QUALITY, SELECTION AND PERFORMANCE OF THE PRODUCT IS WITH THE PURCHASER OF THE PRODUCT. Limitation of Liability: TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK IS NOT LIABLE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY...
Product Registration Product Registration http://support.dlink.com/register/ D-Link products can be registered online at . Product registration is entirely voluntary and failure to complete or return this form will not diminish your warranty rights. Page 300...
Need help?
Do you have a question about the Web Smart DES-3252P and is the answer not in the manual?
Questions and answers