Sign In
Upload
Manuals
Brands
D-Link Manuals
Switch
xStack DGS-3610 Series
D-Link xStack DGS-3610 Series Switch Manuals
Manuals and User Guides for D-Link xStack DGS-3610 Series Switch. We have
3
D-Link xStack DGS-3610 Series Switch manuals available for free PDF download: Configuration Manual, Hardware Installation Manual, Quick Installation Manual
D-Link xStack DGS-3610 Series Configuration Manual (703 pages)
Brand:
D-Link
| Category:
Switch
| Size: 9 MB
Table of Contents
Table of Contents
5
1 Command Line Interface Configuration
31
Command Mode
31
Obtaining Help
33
Abbreviating Commands
34
Using no and Default Options
34
Understanding CLI Prompt Messages
34
Using History Commands
35
Using Editing Features
35
Edit Shortcut Keys
36
Sliding Window of Command Line
36
Filtration and Lookup of CLI Output Information
37
Lookup and Filtration of Show Command
37
Using Command Alias
38
Accessing CLI
39
2 Configuration of Switch Basic Management
41
Overview
41
Access Control by Command Authorization
41
Default Password and Privilege Level Configuration
42
Configuring or Changing Passwords of Different Levels
42
Configuring Multiple Privilege Levels
42
Configuration of Command Authorization
43
Example of Command Authorization Configuration
43
Configuring Line Password Protection
44
Supporting Session Locking
44
Logon Authentication Control
45
Overview
45
Configuring Local Users
45
Configuring Line Logon Authentication
46
System Time Configuration
46
Overview
46
Setting the System Time
46
Setting the System Time and Date
47
Scheduled Restart
47
Overview
47
Specifying the System to Restart at a Specific Time
48
Specifying the System to Restart after a Period of Time
49
Immediate Restart
49
Deleting the Configured Reload Scheme
49
System Name and Command Prompt
49
Overview
49
Configuring a System Name
50
Configuring a Command Prompt
50
Banner Configuration
50
Overview
50
Configuring a Message-Of-The-Day
51
Configuring a Login Banner
51
Displaying a Banner
52
Viewing System Information
52
Overview
52
Viewing System Information and Version
53
Viewing Hardware Information
53
Console Rate Setting
53
Overview
53
Setting Console Rate
53
Using Telnet on the Network Devices
54
Overview
54
Using Telnet Client
55
Connection Timeout Setting
55
Overview
55
Connection Timeout
55
Session Timeout
56
Process the Command in the Execution File in Batch
56
Setting of Service Switch
57
3 LINE Mode Configuration
59
Overview
59
Enter the LINE Mode
59
Increase/Decrease LINE VTY Quantity
59
Configure the Allowed Communication Protocol in LINE
60
Configure the Access Control List in Line
60
4 Configuration of System Upgrade and Maintenance
61
Overview
61
Upgrade and Maintenance Method
61
Transferring Files by Using the TFTP Protocol
61
Transferring Files by Using the XMODEM Protocol
62
Upgrade the System
64
5 Network Communication Detection Tools
69
Ping Connectivity Test
69
Traceroute Connectivity Test
70
6 Configuring Interfaces
73
Overview of Interface Types
73
L2 Interfaces
73
L3 Interfaces
75
Configuring Interfaces
77
Numbering Rules for Interfaces
77
Using Interface Configuration Commands
78
Using the Interface Range Command
78
Selecting Interface Medium Type
80
Setting Description and Management Status of the Interface
81
Setting Speed, Duplexing, and Flow Control for Interfaces
82
Configuring MTU of the Interface
82
Configuring L2 Interfaces
83
Configuring L3 Interfaces
86
Showing Interface Configuration and Status
89
Linktrap Policy Configuration
91
Configuring Command
91
Configuration Example
91
7 Aggregate Port Configuration
93
Overview
93
Understanding Aggregate Port
93
Understanding Traffic Balancing
93
Configuring Aggregate Port
95
Default Configurations of Aggregate Port
95
Configuration Guide for Aggregate Port
95
Configuring Layer-3 Aggregate Port
96
Configuring Traffic Balancing of Aggregate Port
97
Showing Aggregate Port
98
8 VLAN Configuration
99
Overview
99
Supported VLAN
100
VLAN Member Type
100
Configuring VLAN
100
Saving the VLAN Configuration Information
100
Default VLAN Configuration
101
Creating/Modifying a VLAN
101
Deleting a VLAN
101
Assigning Access Ports to the VLAN
101
Configuring VLAN Trunks
102
Trunking Overview
102
Configuring a Trunk Port
104
Defining the Allowed VLAN List of a Trunk Port
104
Configure Native VLAN
105
Showing VLAN
105
9 Super VLAN Configuration
107
Overview
107
Configuring Super VLAN
108
Configuring Sub VLAN of Super VLAN
109
Setting Address Range of Sub VLAN
109
Setting Virtual Interface for Super VLAN
110
Setting Agent ARP Function for VLAN
110
Showing Super VLAN Setting
111
Configuration Example
111
10 Protocol VLAN Configuration
113
Protocol VLAN Technology
113
Configuring Protocol VLAN
114
Default Protocol VLAN
114
Configuring IP Address-Based VLAN Classification
114
Configuring the Profile of Packet Type and Ethernet Type
115
Applying Profile
115
Showing Protocol VLAN
116
11 Private VLAN Configuration
117
Private VLAN Technology
117
Private VLAN Configuration
118
Default Private VLAN Setting
118
Configuring VLAN as a Private VLAN
118
Associating Secondary VLAN with Primary VLAN
119
Mapping Layer 3 Interfaces of Secondary VLAN and Primary VLAN
120
Configuring Layer 2 Interface as Host Port of Private VLAN
120
Configuring Layer 2 Interface as Promiscuous Port of Private VLAN
121
Private VLAN Showing
122
Showing Private VLAN
122
12 802.1Q Tunneling
123
Understanding 802.1Q Tunneling
123
Configuring 802.1Q Tunneling
125
Default Configurations of the 802.1Q Tunneling
125
Q Tunneling Configuration Guide
125
Restriction of 802.1Q Tunneling Configuration
126
Configuring an 802.1Q Tunneling Port
126
Configuring an Uplink Port
127
Configuring TPID Value in Vendor Tag
127
Configuring Priority Duplication of User Tag
128
13 MAC Address Configuration
129
Managing the MAC Address Table
129
Overview
129
Configuring MAC Address
130
Viewing MAC Addresses Information
133
The Changing Notification of the MAC Address
134
Overview
134
Configuring MAC Address Changing Notification Function
135
Viewing the Informationmac Address Change Notification
136
IP and MAC Address Binding
137
Overview
137
Configuring Address Binding
137
Viewing the Address Binding Table
137
Configuring the Exceptional Ports for Address Binding
138
Viewing Exceptional Ports for Address Binding
138
14 DHCP Snooping Configuration
139
DHCP Snooping Overview
139
Understanding DHCP
139
Understanding DHCP Snooping
140
Understanding DHCP Snooping Information Option
140
Related Security Functions of DHCP Snooping
141
Understanding Address Binding Function of DHCP Snooping
142
Relationship between DHCP Snooping and ARP Detectation
142
Other Precautions on DHCP Snooping Configuration
142
DHCP Snooping Configuration
143
Configuration of Enabling and Disabling DHCP Snooping
143
Configuring DHCP Source MAC Check Function
143
Configuring Static DHCP Snooping User
143
Configuring Static DHCP Snooping Information Option
144
Configuring Static Address Binding of DHCP Snooping
144
Schedule Writing of DHCP Snooping Database Information to Flash
145
Writing DHCP Snooping Database Information to Flash Manually
146
Configuring Port as TRUST Port
146
Clearing Dynamic User Information from DHCP Snooping Database
146
Showing DHCP Snooping Configuration
147
Showing DHCP Snooping
147
Showing DHCP Snooping Database Information
147
15 IGMP Snooping Configuration
149
Overview
149
Understanding IGMP
149
Understanding IGMP Snooping
152
Understanding Router Interface
152
Understanding Operation Modes of IGMP Snooping
155
Understanding Source Port Check
156
Understanding Fast-Leave
156
Understanding IGMP Snooping Suppression
156
Typical Application
156
Configuring IGMP Snooping
157
IGMP Snooping Default
158
Configuring IGMP Profiles
158
Configuring Router Interface
159
Configuring the Range of Multicast Frame Forwarded by Router Interface15-12
160
Configuring the Aging Time of the Route Interface in Dynamic Learning
161
Configuring IVGL Mode
161
Configuring SVGL Mode
162
Configuring Coexistence Mode of IVGL and SVGL
162
Configuring DISABLE Mode
163
Configuring Maximum Response Time of Query Message
163
Configuring Source Port Check
163
Configuring Source IP Check
164
Configuring Fast-Leave
164
Configuring IGMP Snooping Suppression
165
Configuring Static Members of IGMP Snooping
165
Configuration IGMP Filtering
166
Viewing IGMP Snooping Information
166
Viewing Current Mode
167
Viewing and Clearing IGMP Snooping Statistics
167
View Router Interface Information
167
Viewing Dynamic Forwarding Table
168
Viewing Source Port Check Status
168
Viewing IGMP Profile
169
Viewing IGMP Filtering
169
Configuring Other Restrictions of IGMP Snooping
169
16 PIM Snooping Configuration
171
Understanding PIM Snooping Principle
171
Configuration of PIM Snooping by Default
172
Guiding and Limiting PIM Snooping Configuration
172
Configuring PIM Snooping
172
Enable PIM Snooping Globally
173
Enable PIM Snooping on SVI
173
17 MSTP Configuration
175
MSTP Overview
175
STP and RSTP
175
MSTP Overview
184
Overview of Optional Features of MSTP
190
Understanding Port Fast
190
Understanding BPDU Guard
191
Understanding BPDU Filter
191
Understanding Tc-Protection
191
Understanding TC Guard
192
Understanding BPDU Source MAC Check
192
Understanding Illegal Length Filtering for BPDU
192
Understanding Automatic Identification of Edge Ports
192
Configuring MSTP
193
Default Configuration of Spanning Tree
193
Enable and Disable Spanning Tree Protocol
194
Configuring Mode of Spanning Tree
194
Configuring Switch Priority
195
Configuring Port Priority
195
Configuring Path Cost of the Port
196
Configuring Default Calculation Method of Path Cost (Path Cost Method)
197
Configuring Hello Time
198
Configuring Forward-Delay Time
198
Configuring Max-Age Time
199
Configuring Tx-Hold-Count
199
Configuring Link-Type
200
Configuring Protocol Migration Processing
201
Configuring MSTP Region
201
Configuring Maximum-Hop Count
202
Configuring Optional Features of MSTP
203
Default Setting of Optional Features for Spanning Tree
203
Enabling Port Fast
203
Enabling BPDU Guard
204
Enabling BPDU Filter
204
Enabling Tc_Protection
205
Enabling TC Guard
205
Enabling the BPDU Source MAC Check
206
Disabling the Automatic Identification of Edge Ports
207
Showing MSTP Configuration and Status
207
18 SPAN Configuration
209
Overview
209
Understanding SPAN
209
Precautions
209
SPAN Concepts and Terms
210
SPAN Session
210
Frame Type
210
Source Port
211
Destination Port
211
SPAN Traffic
211
Interfaces between the SPAN and Other Functions
211
Configuring SPAN
211
SPAN Configuration Guide
212
Creating a SPAN Session and Specifying the Monitoring Port and Monitored Port
212
Deleting a Port from the SPAN Session
213
Showing the SPAN Status
214
19 IP Address and Service Configuration
215
IP Addressing Configuration
215
IP Address Overview
215
IP Address Configuration Task List
217
Monitoring and Maintaining IP Address
222
IP Addressing Configuration Examples
223
IP Service Configuration
225
IP Services Configuration Task List
225
IP Connectionsmanagement
225
20 DHCP Configuration
229
Introduction to DHCP
229
Introduction to DHCP Server
229
Introduction to DHCP Client
231
Introduction to DHCP Relay Agent
231
Configuring DHCP
231
Enabling DHCP Server and Relay Agent
232
Configuring DHCP Excluded Addresses
232
Configuration of DHCP Address Pool
232
Configuring Address Pool Name and Enter Its Configuration Mode
233
Configuring Client Boot File
233
Configuring Default Gateway for Client
234
Configuring Address Lease Period
234
Configuring Domain Name of Client
234
Configuring Domain Name Server
235
Configuring Netbios WINS Server
235
Configuring Netbios Node Type for Client
235
Configuring Network Number and Mask for DHCP Address Pool
236
Binding Address Manually
236
Configuring Number of Packet Ping
237
Configuring Packet Ping Timeout
238
Configuring DHCP Client over Ethernet Interface
238
Configuring DHCP Client on PPP Encapsulated Link
238
Configuring DHCP Client on FR Encapsulated Link
238
Configuring DHCP Client on HDLC Encapsulated Link
239
Monitoring and Maintaining Information
239
Monitoring and Maintaining DHCP Server
239
Monitoring and Maintaining DHCP Client
240
Configuration Examples
240
Address Pool Configuration Example
240
Manual Binding Configuration
240
DHCP Client Configuration
240
21 DHCP Relay Configuration
243
Overview
243
Understanding DHCP
243
Understanding DHCP Relay Agent
243
Understanding DHCP Relay Agent Information(Option 82)
244
Understanding DHCP Relay Check Server-ID Function
245
Configuring DHCP
245
Configuring DHCP Relay Agent
245
Configuring the DHCP Server IP Address
246
Configuring DHCP Option Dot1X
246
Configuring DHCP Option Dot1X Access-Group
247
Configuring DHCP Option 82
248
Configuring DHCP Relay Check Server-ID
248
Configuring DHCP Relay Suppression
249
DHCP Configuration Example
249
Other Precautions on DHCP Relay Configuration
249
Precautions on DHCP Option Dot1X Configuration
250
Precautions on DHCP Option82 Configuration
250
Showing DHCP Configuration
250
22 DNS Configuration
253
DNS Overview
253
Default Configuration of DNS
253
Enabling DNS Resolution Service
254
Configuring DNS Server
254
Configuring Mapping between Host Name and IP Address Statically
254
Clearing Cache Table of Dynamic Host Names
255
Showing Domain Name Resolution Information
255
Application Examples
255
23 NTP Configuration
257
Unerstanding NTP
257
Configuring NTP
257
Configuring Global Security Authentication Mechanism for the NTP
258
Configuring Global Authentication Key for the NTP
258
Configuring Global Trusted Key ID for the NTP
259
Configuring NTP Server
259
Disabling Receiving NTP Packets on the Interface
260
Enabling/Disabling NTP Function
261
Configuring Real Time Synchronization for NTP
261
Display of NTP Information
262
Debugging the NTP
262
Showing NTP Information
262
Configuration Examples
262
24 UDP-Helper Configuration
265
UDP-Helper Overview
265
Configuring UDP-Helper
265
Default Configuration of UDP-Helper
265
Enable the Function of Relay and Forwarding for UDP-Helper
266
Configuring Destination Server for Relay and Forward
266
Configuring UDP Port Requiring Relay and Forwarding
267
25 SNMP Configuration
269
SNMP Related Information
269
Overview
269
SNMP Protocol Versions
271
SNMP Management Operations
271
SNMP Security
272
SNMP Engine ID
273
SNMP Configuration
274
Setting the Community String and Access Authority
274
Configuring MIB Views and Groups
275
Configuring SNMP Users
275
Configuring SNMP Host Address
276
Configuring SNMP Agent Parameters
276
Defining Maximum Packet Length of SNMP Agent
276
Shielding SNMP Agent
277
Disable SNMP Agent
277
Configuring Agent to Send Trap to NMS Initiatively
277
Configuration of Link Trap Policy
277
Configuring Message Sending Operation Parameters
278
SNMP Monitoring and Maintenance
278
Checking Current SNMP Status
278
Checking MIB Objects Supported by Current SNMP Agent
279
Viewing SNMP View and Group
281
SNMP Configuration Example
281
Example of SNMP Access List Association Control
284
Snmpv3 Related Configuration Examples
284
26 Configuration of RMON
287
Overview
287
Statistics
287
History
287
Alarm
288
Event
288
List of RMON Configuration Tasks
288
Configuring Statistics
288
Configuring History Control
288
Configuring Alarm and Event
289
Showing RMON Status
290
RMON Configuration Examples
290
Example of Configuring Statistics
290
Example of Configuring History
290
Example of Configuring Alarm and Event
290
Example of Showing Rmon Status
291
27 RIP Routing Protocol Configuration
293
RIP Overview
293
RIP Configuration Task List
294
Create the RIP Routing Process
294
Configuration of Packet Unicast for the RIP
295
Configuration of Split Horizon
295
Defining the RIP Version
296
Disable Automatic Route Summary
297
Configuring RIP Authentication
297
Adjusting the RIP Timer
298
Configuring the RIP Route Source Address Validation
299
Control of RIP Interface Status
299
RIP Configuration Examples
300
Example of Configuring Split Horizon
300
Example of Configuring RIP Authentication
303
Example of Configuring Packet Unicast for the RIP
304
28 OSPF Routing Protocol Configuration
307
OSPF Overview
307
OSPF Configuration Task List
309
Creating the OSPF Routing Process
311
Configuring the OSPF Interface Parameters
312
Configuring the OSPF to Accommodate Different Physical Networks
313
Configuring the OSPF Area Parameters
317
Configuring OSPF NSSA
318
Configuring the Route Summary between OSPF Areas
319
Configuring Route Summary When Routes Are Injected to the OSPF
320
Creating the Virtual Connections
320
Creating the Default Routes
321
Using the Loopback Address as the Route ID
322
Changing the OSPF Default Management Distance
322
Configuring the Route Calculation Timer
323
Changing Lsas Group Pacing
323
Configuring Route Selection
324
Configuring Whether to Check the MTU Value When the Interface Receives the Database Description Packets
325
Configuring to Prohibit an Interface from Sending the OSPF Interface Parameters
325
OSPF TRAP Sending Configuration
326
Monitoring and Maintaining OSPF
326
Ospf Configuration Examples
330
Example of Configuring the OSPF NBMA Network Type
331
Example of Configuring the OSPF Point-To-Multipoint Board Network Type
332
Example of Configuring OSPF Authentication
334
Example of Configuring Route Summary
335
OSPF ABR, ASBR Configuration Examples
337
Example of Configuring OSPF Stub Area
339
Example of Configuring OSPF Virtual Connection
341
29 BGP Configuration
345
Operating BGP Protocol
346
Default Configuration of BGP
346
Inject Route Information to BGP Protocol
347
Configuring BGP Peer (Group) and Its Parameters
349
Configuring Management Policy for BGP
353
Configuring Synchronization between BGP and IGP
354
Configuring Interaction between BGP and IGP
355
Configuration Timer of BGP
355
Configuring Path Attribute for BGP
356
AS_PATH Attribute Related Configuration
356
NEXT_HOP Attribute Related Configuration
357
MULTI_EXIT_DISC Attribute Related Configuration
358
LOCAL_PREF Attribute Related Configuration
359
COMMUNITY Attribute Related Configuration
359
Other Related Configuration
361
Selection of Optimal Path for BGP
361
Configuring Route Aggregate for BGP
362
Configuring Route Reflector for BGP
362
Configuring Route Dampening for BGP
364
Configuring as Confederation for BGP
365
Configuring Management Distance for BGP
366
Monitoring of BGP
367
Protocol Independent Configuration
368
Route-Map Configuration
368
Regular Expression Configuration
368
BGP Configuration Examples
369
Configuring BGP Neighbor
369
Configuring BGP Synchronization
370
Configuring Neighbors to Use Aspath Filter
371
Configuring Aggregate Route
372
Configuring Confederation
373
Configuring Peergroup
377
Configuring TCP MD5 Code
380
30 Protocol-Independent Configuration
383
IP Route Configuration
383
Configuring Static Routes
383
Configuring Default Routes
384
Configuring the Number of Equivalent Routes
385
Route Redistribution
385
Configuring Route Redistribution
385
Configuration of Route Filtering
388
Configuring Switch Fast Forwarding ECMP/WCMP Policy
393
Selecting the Hash Algorithm
394
Configuration Commands
394
Configuration Examples
394
31 Policy-Based Routing Configuration
397
32 Ipv6 Configuration
401
Ipv6 Address Format
403
Type of Ipv6 Address
404
Ipv6 Packet Header Structure
409
Ipv6 MTU Discovery
410
Ipv6 Neighbor Discovery
411
Ipv6 Configuration
413
Configuring Ipv6 Address
413
Configuring Redirection Function for Icmpv6
415
Configuring Static Neighbor
416
Configuring Address Conflict Detection
417
Configuring Other Interface Parameters of Routers
418
Ipv6 Monitoring and Maintenance
419
33 IPV6 Tunnel Configuration
423
Overview
423
Ipv6 Manually Configured Tunnel
424
Automatic 6To4 Tunnel
424
ISATAP Tunnel
426
Ipv6 Tunnel Configuration
427
Configuring Manual Ipv6 Tunnels
427
Configuring 6To4 Tunnel
428
Configuring ISATAP Tunnel
429
Verifying Ipv6 Tunnel Configuration and Monitoring
431
Ipv6 Tunnel Configuration Instances
433
Manual Ipv6 Tunnel Configuration Instance
433
6To4 Tunnel Configuration Instance
435
ISATAP Tunnel Configuration Instance
437
Configuration Instance for Composite Application of ISATAP and 6To4 Tunnels33-16
438
34 Ospfv3 Configuration
443
Ospfv3 Protocol Overview
443
LSA Association Change
443
Interface Configuration
445
Router ID Configuration
445
Authentication Mechanism Setting
446
Ospfv3 Basic Configuration
446
Configuring Ospfv3 Interface Parameters
448
Configuring Ospfv3 Area Parameters
450
Configuring Ospfv3 Virtual Connection
451
Configuring Ospfv3 Route Information Convergence
452
Configuring Inter-Area Convergence
452
Configuring Bandwidth Reference Value of Ospfv3 Interface Measurement
452
Configuring Ospfv3 Timer
453
Configuring Ospfv3 Route Redistribution
453
Configuring Ospfv3 Passive Interface
454
Ospfv3 Debug and Monitoring
454
Ospfv3 Debug Command
455
Ospfv3 Monitoring Command
455
35 IP Multicast Routing Configuration
457
Overview
457
IP Multicast Routing Implementation
457
IGMP Overview
458
PIM-DM Overview
462
PIM-SM Overview
463
Basic Configuration of the Multicast Routing
466
Enabling Multicast Routing Forwarding
466
Enabling IP Multicast Routing Protocol
466
Enabling IGMP
467
Advanced Multicast Routing Configuration
467
Configuring Multicast Routing Characteristics
467
Configuring IGMP
469
Configuring Query Count of the Last Member
471
Configuring Query Interval of the Last Member
471
Configuring Query Interval of the General Member
471
Configuring the Maximum Response Interval
472
Configuring the Timeout Interval of the Other Queriers
472
Configuring the IGMP Group Member Quantity Limit
472
Configuring Immediate Group Leaving
474
Configuring IGMP PROXY - SERVER
474
Configuring IGMP MROUTE - PROXY
475
Enabling IGMP SSM-MAP
475
Configuring IGMP SSM-MAP STATIC
475
Clearingup Dynamic Group Membership in IGMP Cache from Response Message
476
Clearing up All Information on Specified Interface in IGMP Cache
476
Displaying the Status of IGMP Group Member in Directly-Connected Subnet35-20
476
Showing the Configuration Information of the IGMP Interface
477
Show the Configuration Information of IGMP SSM-MAP
478
Configuring PIM-DM
479
Configuring PIM-SM
483
Multicast Routing Configuration Examples
492
PIM-DM Configuration Example
492
PIM-SM Configuration Example
493
BSR Configuration Examples
494
36 Port-Based Flow Control Configuration
497
Storm Control
497
Overview
497
Configuring Storm Control
497
Viewing the Enable Status of Storm Control
498
Protected Port
499
Overview
499
Configuring Protected Ports
500
Configuring L3 Protected-Ports Route Deny
500
Showing Protected Port Configuration
500
Port Security
501
Overview
501
Configuring Port Security
502
Viewing Port Security Information
506
37 Configuration of 802.1X
509
Overview
509
Device Roles
510
Authentication Initiation and Packet Interaction During Authentication
511
States of Authorized Users and Unauthorized Users
512
Topologies of Typical Applications
513
Configuring 802.1X
516
Default Configuration of 802.1X
517
Precautions for Configuring 802.1X
517
Configuring the Communication between the Device and Radius Server
518
Setting the 802.1X Authentication Switch
519
Enabling/Disabling the Authentication of a Port
520
Enabling Timing Re-Authentication
521
Changing the QUIET Time
522
Setting the Packet Retransmission Interval
523
Setting the Maximum Number of Requests
523
Setting the Maximum Number of Re-Authentications
524
Setting the Server-Timeout
524
Configuring Acti Ve Initiation of 802.1X Authentication
525
Configuring 802.1X Accounting
527
Configuring IP Authorization Modes
530
Releasing Advertisement
532
List of Authenticable Hosts under a Port
532
Authorization
533
Configuring Authentication Modes
534
Configuring the Backup Authentication Server
535
Configuring and Managing Online Users
536
Implementing User-IP Binding
536
Port-Based Traffic Charging
536
Implementing Automatic Jumping and Control of VLAN
536
Shielding Proxy Server and Dial-Up
537
Configuring On-Line Client Probe
538
Configuring the Option Flag for EAPOL Frames to Carry TAG
539
Configuring the Port-Based User Authentication
539
Viewing the Configuration and Current Statistics of the 802.1X
540
Viewing the Radius Authentication and Accounting Configuration
541
Viewing the Number of Current Users
541
Viewing the List of the Authenticable Addresses
541
Viewing the User Authentication Status Information
542
Showing the 1X Client Probe Timer Configuration
542
Other Precautions for Configuring 802.1X
543
Basic AAA Principles
545
Basic AAA Principles
546
Method List
546
Basic AAA Configuration Steps
547
Overview of AAA Configuration Steps
547
Enabling AAA
548
Disabling AAA
548
Subsequent Configuration Steps
548
Configuring Authentication
548
Defining AAA Authentication Method List
549
Example of Method List
549
General Steps in Configuring AAA Authentication
550
Configuring the AAA Line Authentication
550
Example of Authentication Configuration
554
Configuring Authorization
555
Preparations for Authorization
555
Configuring Authorization List
555
RADIUS Authorization
556
Local Authorization
556
None Authorization
557
Example of Configuring Network Authorization
557
Configuring Accounting
557
Accounting Types
557
Network Accounting
558
Preparations for Accounting
558
Configuring Accounting
558
Monitoring AAA Users
558
Example of Configuring Accounting
559
38 Radius Configuration
561
Radius Overview
561
RADIUS Configuration Tasks
562
Configuring Radius Protocol Parameters
562
Specifying the Radius Authentication
563
Specify Radius Private Attribute Type
563
Monitoring RADIUS
566
Radius Configuration Example
566
39 SSH Terminal Service
569
About SSH
569
SSH Support Algorithms
569
SSH Support
569
SSH Configuration
570
Default SSH Configurations
570
User Authentication Configuration
570
Enabling SSH SERVER
570
Disabling SSH SERVER
570
Configuring SSH Server Support Version
571
Configuring SSH User Authentication Timeout Duration
571
Configuring SSH Re-Authentication Times
571
Device Management through SSH
572
40 CPU Protection Configuration
575
Function of CPU Protect
575
Principles of CPU Protect
575
Configuring CPU Protect
576
Default Value of CPU Protect
576
Configuring the Bandwidth for each Type of Packets
577
Configuring the Priority for each Type of Packets
577
Viewing CPU Protect Information
578
Viewing the Statistics of Packets Received by the CPU of the Management
578
Board
578
Viewing the Statistics of Packets Received by the CPU of the Line Card
578
Viewing the Statistics of Received Packets of a Specific Type
579
41 Anti-Attack System Guard Configuration
581
Overview
581
Anti-Attack System Guard Configuration
582
IP Anti-Scanning Configuration Task List
582
Enabling the Anti-Attack System Guard Function of the Interface
582
Setting the Isolation Period for Illegal Attacking IP
582
Setting the Threshold to Judge Illegal Attacking IP
583
Setting the Maximum Number of Monitored Ips
584
Setting Exceptional Ips Free from Monitoring
585
Clearing the Isolation Status of Isolated Ips
585
Viewing Related Information of System Guard
586
42 GSN Configuration
589
Overview of GSN Security Solution
589
Security Agent
589
Restore System
589
Security Switch
590
Configuring the GSN Security Switch
590
Configuring the Switch GSN Security
590
Configuring the Communication between SMP Servers
590
Configuring the Minimum Interval for Tranmission of Security Events
591
Configuring the Address Binding Switch Supported by the Port
591
GSN Configuration Display
592
Showing Smp Server
592
Showing Security Event Interval
592
Precuations for GSN Configuration
592
Number of GSN-Supporting Entries
592
Functions in Conflict with the GSN
593
Other Precuations for Using the GSN
593
43 Dynamic ARP Inspection Configuration
595
Understanding DAI
595
Understanding ARP Spoofing Attack
595
Understanding DAI and ARP Spoofing Attacks
596
Understanding DAI Global Switches
596
Interface Trust Status and Network Security
597
Restricting Rate of ARP Packets
597
Configuring DAI
597
Enabling Global DAI Function
598
Enabling the DAI Packet Check Function for Specified VLAN
598
Setting the Trust Status of Ports
598
Set Maximum Receiving Rate of ARP Packets for a Port
599
Related Configuration of DHCP Snooping Database
599
Showing DAI Configuration
600
Showing DAI Enabling Status of VLAN
600
Showing DAI Configuration Status of each Layer 2 Interface
600
44 Access Control List Configuration
601
Overview
601
Access Control List Introduction
601
Why to Configure Access Lists
602
When to Configure Access Lists
602
Input/Output ACL, Filtering Domain Template and Rules
603
Configuring IP Access Lists
605
Guide to Configure IP Access Lists
605
Configuring IP Access List
606
Configuration of Showing IP Access Lists
607
IP Access List Example
608
Configuring MAC Extended Access List
609
Configuration of MAC Extended Access List
609
Configuring MAC Extended Access List
610
Configuration of Showing MAC Extended Access Lists
611
MAC Extended Access List Example
611
Configuring Expert Extended Access List
612
Expert Extended Access List Configuration Guide
612
Configuring Expert Extended Access Lists
612
Configuration of Showing Expert Extended Access Lists
614
Expert Extended Access List Example
614
Configuring Ipv6 Extended Access List
614
Configuration of Showing Ipv6Extended Access Lists
615
Ipv6 Extended Access List Example
615
Configuring Access List ACL80
616
Configuring TCP Flag Filtering Control
618
Configuring ACL Entries by Priority
619
Configuring ACL Based on Time-Range
620
Configuration Examples
622
Configuring TCP One-Way Connection
622
45 QOS Configuration
625
QOS Overview
625
Basic Framework of Qos
625
QOS Processing Flow
626
Configuring QOS
629
Default QOS Configuration
629
Configuring the QOS Trust Mode of the Interface
630
Configuring the Default Cos Value of an Interface
630
Configuring Class Maps
631
Configuring Policy Maps
631
Configuring the Interface to Apply Policy Maps
632
Configuring the Output Queue Scheduling Algorithm
633
Configuring Output Round-Robin Weight
634
Configuring Cos-Map
635
Configuring Cos-To-DSCP Map
636
Configuring DSCP-To-Cos Map
636
Configuring Port Rate Limit
637
Configuring Ippre to DSCP Map
637
QOS Display
638
Showing Class-Map
638
Showing Policy-Map
639
Showing Mls Qos Interface
639
Showing Mls Qos Queueing
639
Showing Mls Qos Scheduler
640
Showing Mls Qos Maps
640
Showing Mls Qos Rate-Limit
641
Showing Policy-Map Interface
642
46 VRRP Configuration
643
VRRP Applications
644
Route Redundancy
645
Load Balancing
645
VRRP Configuration
646
VRRP Configuration Task List
646
Enabling the VRRP Backup Function
646
Setting the Authentication String of the VRRP Backup Group
647
Setting the Broadcast Interval of the VRRP Backup Group
647
Setting the Preemption Mode of Device in the VRRP Backup Group
648
Setting the Device Priority in the VRRP Backup Group
648
Setting a Monitored Interface for the VRRP Backup Group
649
Setting the VRRP Broadcast Timer Learning Function
649
Setting the Description String of a Network Device in the VRRP Backup Group
650
VRRP Monitoring and Maintenance
650
Show Vrrp
650
Debug Vrrp
652
Example of Typical VRRP Configuration
654
Example of Single VRRP Backup Group
655
Example of Monitored Interface Configuration of VRRP
656
Example of Multiple VRRP Backup Groups
658
VRRP Diagnosis and Troubleshooting
659
47 RLDP Configuration
661
About RLDP
661
Understanding RLDP
661
Typical Application
662
Configuring RLDP
664
Default Value of RLDP
664
Configuring Global RLDP
665
Configuring Port RLDP
665
Configuring Detection Vlan
666
Configuring RLDP Detection Interval
666
Configure the RLDP Maximum Detection Times
667
Restoring the RLDP Status of the Port
667
Viewing RLDP Information
668
Viewing the RLDP Status of All Ports
668
Viewing the RLDP Status of a Specified Port
669
48 TPP Configuration
671
TPP Overview
671
TPP Application
671
TPP Configuration
672
Configuring Global Topology Protection
673
Configuring the Topology Protection on Port
673
Typical TPP Configuration Examples
674
Viewing TPP Information
675
Viewing the TPP Configuration and Status of Devices
675
Advertisement
D-Link xStack DGS-3610 Series Hardware Installation Manual (26 pages)
Brand:
D-Link
| Category:
Switch
| Size: 0 MB
Table of Contents
Obtaining Documentation
3
Related Documents
3
Documentation Conventions
4
Obtaining Technical Assistance
4
Table of Contents
5
1 Product Overview
7
Technical Features of DGS-3610 Series
8
Product Features
8
Technical Specifications
10
Product Appearance
14
DGS-3610 10G Extension Module
16
2 Installation
18
Prior Preparation
18
Desktop Mounting
18
Rack Mounting
19
System Connection
20
Connecting the RJ-45 Port
20
Connecting Optical Fibers
21
Laser Safety
21
Connecting Power Cables to the Switch
21
Optional Installation Procedure
22
3 Troubleshooting
23
Common Troubleshooting Procedures
23
Connectors and Connection Media
25
1000BASE-T/100BASE-TX/10BASE-T Port
25
Optical Fiber Connection
26
D-Link xStack DGS-3610 Series Quick Installation Manual (6 pages)
Brand:
D-Link
| Category:
Network Router
| Size: 0 MB
Table of Contents
Product Overview
2
Prior Preparation
3
Desktop Mounting
3
Rack Mounting
4
System Connection
5
Connecting the RJ-45 Port
5
Connecting Optical Fibers
5
Laser Safety
6
Connecting Power Cables to the Switch
6
Optional Installation Procedure
6
Advertisement
Advertisement
Related Products
D-link xStack DGS-3612G series
D-Link xStack DGS-3612 series
D-Link DGS-3620-52T-EI
D-Link DGS-3620-28SC-SI
D-Link DGS-3620-28TC-EI
D-Link DGS-3620-52T-SE-LIC
D-Link xStack DGS-3620 Series
D-Link DGS-3630 SERIES
D-Link DGS-3630-28TC
D-Link xStack DGS-3620-28TC
D-Link Categories
Network Router
Switch
Wireless Router
Adapter
Security Camera
More D-Link Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL