D-link des 3550 manual




















Port Security Settings window Page Qos CoS queues that have been given a nonzero value, and depending upon the weight, will follow a common weighted round-robin scheme. Traffic control settings are applied to individual Switch modules.

The priority queues are numbered from 0, the lowest priority, to 7, the highest priority. In the Configuration folder open the QoS folder and click A value between 0 and can be specified. Latency Specifies the maximum amount of time the above specified hardware priority queue will be allowed to transmit packets before allowing the next lowest hardware priority queue to begin transmitting its packets.

The user may set the following parameters: Parameter Page Lacp Port trunk groups are used to combine a number of ports together to make a single high- bandwidth data pipeline. The DES supports up to 6 port trunk groups with 2 to 8 ports in each group. A potential bit rate of Mbps can be achieved. Link aggregation allows several ports to be grouped together and to act as a single link.

Link Aggregation Settings window — Add Figure 6- Active Port Shows the port that is currently forwarding packets. Access Profile Table Ethernet The following parameters can be set for Ethernet: Parameter Description Type in a unique identifier number for this profile set.

This value can be set Profile ID from 1 — Access Profile Configuration window Packet Content Mask This screen will aid the user in configuring the Switch to mask packet headers beginning with the offset value specified. The following fields are used to configure the Packet Content Mode Select Permit to specify that the packets that match the access profile are forwarded by the Switch, according to any additional rule added see below.

The user may choose a value between 0 and Access Rule Configuration window Ethernet. To set the Access Rule for Ethernet, adjust the following parameters and click Apply.

Ethernet Type Specifies that the access profile will apply only to packets with this hexadecimal A number between 0, the lowest priority, and 7, the highest priority, can be entered.

In the Configuration folder, click System Log Server, to view the screen shown below. Page Pae Access Entity Typical Conformance to IEEE This mechanism is intended to allow only authorized users, or other network devices, access to network resources by establishing criteria for each port on the Switch that a user or network device must meet before allowing that port to forward or receive frames.

QuietPeriod:[60 ] This allows you to set the number of seconds that the Switch remains in the quiet state following a failed authentication exchange with the client. Next, enable the ports by selecting Authenticator from the drop-down menu under Capability. Click Apply to make your change take effect. Port A read only field indicating a port on the Switch.

The default is Choose the level of privilege Admin or User from the Access Right drop-down menu. Users failing to be authenticated after the set amount of attempts will be denied access to the Switch and will be locked out of further authentication attempts.

Command line interface users will have to wait 60 seconds before another authentication attempt. The Switch has three built-in Authentication Server Groups that cannot be removed but can be modified. The maximum supported number of server hosts is Login Method List —Edit default Figure 7- Once a user Enable Method List — Edit window Figure 7- To implement the changes, click Apply.

This is used to identify the new SNMP view being created. SNMPv3 provides secure access to devices through a combination of authentication and encrypting packets over the network. The default value is one second. Select number of times the Switch will be polled between 20 and The Record Number default value is Six windows are offered.

Figure 8- 5. Figure 8- 6. Four windows are offered. View Table Clicking this button instructs the Switch to display a table rather than a line graph. View Line Chart Clicking this button instructs the Switch to display a line graph rather than a table. Two windows are offered. A router port configured by a user using the console or Web-based management interfaces is displayed as a static router port, designated by S. Authenticator State Figure 8- Authenticator Status window This window displays the Authenticator Status for an individual port.

This will be the firmware that the Switch will immediately use. Switch History window The Switch can record event information in its own logs, to designated SNMP trap receiving stations, and to the PC connected to the console manager.

Clicking Next at the bottom of the window will allow you to display all the switch Trap Logs. Page Saving Changes Ping program. Configuration changes are made effective by clicking the Apply button. When this is done, the settings will be immediately applied to the switching software in RAM and will immediately take effect. These settings will be used every time the Switch is rebooted. Reboot Services The following section will aid the user in rebooting and resetting the Switch using the following windows, described in detailed.

If the Switch is reset with this option enabled, and Save Changes is not executed, the Switch will return to the last saved configuration when rebooted.

This enables the user to manage a switch that is more than one hop away from the CS. The SIM group is a group of switches that are managed as a single entity.

The following message should appear the first time the user clicks the Topology link in the Single IP Management folder. The Topology View will refresh itself periodically 20 seconds by default. Layer 3 member switch Member switch of other group Layer 2 candidate switch Device Information Utilizing the Tool Tip Setting the mouse cursor over a line between two devices will display the connection speed between two devices, as shown below.

Figure 7. Port Speed Utilizing the Tool Tip Right Clicking a Commander Icon The following options may appear for the user to configure: Collapse - To collapse the group that will be represented by a single icon. Right Clicking a Member icon The following options may appear for the user to configure: Remove from group - Remove a member from a group. Configure - Launch the web management to configure the Switch. Right Clicking a Candidate icon The following options may appear for the user to configure: Add to group - Add a candidate to a group.

Clicking this option will reveal the following screen for the user to enter a password for authentication from the Candidate Switch before being added to the SIM group. If no Device Name is configured by the name, it will be given the name default and tagged with the last six digits of the MAC Address to identify it.

Input password window. Remove from Group - Remove an MS from the group. Device Configure — Will open the web manager for the specific device. View Refresh - Update the views with the latest status. Please review these products for matching cable pin assignment. A connection oriented transmission protocol based on fixed length cells packets.

ATM is designed to carry a complete range of user traffic, including voice, data, and video signals. Page IP address: Internet Protocol address. The address is written as four octets separated with full-stops periods , and is made up of a network section, an optional subnet section and a host section. The Switch learns the addresses associated with each switch port and builds tables based on this information to be used for the switching decision.

Page Warranty service for software products may be obtained by contacting a D-Link office within the applicable warranty period. A list of D-Link offices is provided at the back of this manual, together with a copy of the Registration Card.

SNMP Settings IP Address Assignment Connecting Devices to the Switch Introduction to Web-based Switch Configuration Login to Web Manager Web-based User Interface Areas of the User Interface Web Pages Configuring The Switch Switch Information IP Address Advanced Settings Port Configurations Port Description Port Mirroring Link Aggregation Understanding Port Trunk Groups MAC Notification IGMP Snooping Static Router Ports Spanning Tree Port Transition States Edge Port P2P Port MST Configuration Table MSTI Settings STP Instance Settings Forwarding Filtering Unicast Forwarding Static Multicast Forwarding Multicast Port Filtering Understanding IEEE VLAN Description IEEE Tagging and Untagging Ingress Filtering Default VLANs Port-based VLANs VLAN Segmentation GVRP Setting Traffic Control Port Security The Advantages of QoS Understanding QoS Port Bandwidth Traffic Segmentation System Log Server SNTP Settings Current Time Settings Time Zone and DST Access Profile Table Configuring the Access Profile Table PAE Access Entity Authentication Server Authentication Process Port-Based Network Access Control Configure Authenticator PAE System Control Port Capability Initializing Ports for Port Based Reauthenticate Port s for Port Based Layer 3 IP Networking Static ARP Table Security IP User Accounts Admin and User Privileges Access Authentication Control Application's Authentication Settings Authentication Server Group Settings Authentication Server Hosts Login Method Lists Enable Method Lists Local Enable Password Enable Admin Download Certificate Secure Shell SSH SSH Configuration SSH Algorithm SSH User Authentication SNMP Manager Port Utilization CPU Utilization Received RX Transmitted TX MAC Address Switch History VLAN Status Router Port Port Access Control Authenticator State Layer 3 Feature Browse ARP Table TFTP Services Download Configuration File Upload Configuration Upload Log Ping Test Save Changes Reset System Reset Config Reboot Device Tool Tips Right Click Group Icon Commander Switch Icon Member Switch Icon Candidate Switch Icon Menu Bar Firmware Upgrade Appendix A Appendix B Cables and Connectors Appendix C Cable Lengths Warranty and Registration Information The DES Manual is divided into sections that describe the system installation and operating instructions with examples.

Glossary - Lists definitions for terms and acronyms used in this document. This manual is intended for network managers familiar with network management concepts and terminology.

In a command line, square brackets indicate an optional entry. For example: [copy. Indicates a button, a toolbar icon, menu, or menu item. For example: Open the File. Used for emphasis. May also indicate system messages. For example: You have mail. Bold font is also. Indicates commands and responses to prompts that must be typed exactly as printed.

Indicates a window name. Names of keys on the keyboard have initial capitals. Indicates a window name or a field. Also can indicate a variables or parameter that is. For example: type filename means that. Properties means the Port Properties menu option under the Port menu option that. A NOTE indicates important information that helps you make better use of your device. Use the following safety guidelines to ensure your own personal safety and to help protect your system from potential. Throughout this safety section, the caution icon is used to indicate cautions and precautions that you need to review and follow.

To reduce the risk of bodily injury, electrical shock, fire, and damage to the equipment, observe the following precautions. Also, do not block cooling vents.

If the system gets wet, see the appropriate section in your troubleshooting guide or contact your trained service provider. Doing so can cause fire or electric shock by shorting out interior components.

If you are not sure of the type of power source required, consult your service provider or local power company. If you have not been provided with a power cable for your system or for any ACpowered option intended for your system, purchase a power cable that is approved for use in your country. The power cable must be rated for the product and for the voltage and current marked on the product's electrical ratings label. The voltage and current rating of the cable should be greater than the ratings marked on the product.

These cables are equipped with three-prong plugs to help ensure proper grounding. Do not use adapter plugs or. If you must use an extension cable, use a 3-wire cable with properly grounded plugs.

Make sure that the total ampere rating of all products plugged into the extension cable or power strip does not exceed 80 percent of the ampere ratings limit for the extension cable or power strip. Be sure that nothing rests on any cables. Consult a licensed electrician or your power company for site modifications. Avoid sudden stops and uneven surfaces.

Observe the following precautions for rack stability and safety. Also refer to the rack installation documentation accompanying the system and the rack for specific caution statements and procedures. Thus, "component" refers to any system as well as to various peripherals or supporting hardware. CAUTION: Installing systems in a rack without the front and side stabilizers installed could cause the rack to tip over, potentially resulting in bodily injury under certain circumstances.

Therefore, always install the stabilizers before installing components in the rack. The weight of more than one extended component could cause the rack to tip over and may result in serious injury. Install front and side stabilizers on a single rack or front stabilizers for joined multiple racks before working on the rack.

The total rack load should not exceed 80 percent of the branch circuit rating. All electrical wiring must comply with applicable local or national codes and practices. Contact the appropriate electrical inspection authority or an electrician if you are uncertain that suitable grounding is available. Do not attempt to connect power to the system until grounding cables are connected.

Completed power and safety ground wiring must be inspected by a qualified electrical inspector. An energy hazard will exist if the safety ground cable is omitted or disconnected. Static electricity can harm delicate components inside your system. To prevent static damage, discharge static electricity from your body before you touch any of the electronic components, such as the microprocessor. You can do so by periodically touching an unpainted metal surface on the chassis. You can also take the following steps to prevent damage from electrostatic discharge ESD :.

When unpacking a static-sensitive component from its shipping carton, do not remove the component from the antistatic packing material until you are ready to install the component in your system. Just before unwrapping the antistatic packaging, be sure to discharge static electricity from your body. When transporting a sensitive component, first place it in an antistatic container or packaging. Handle all sensitive components in a static-safe area.

If possible, use antistatic floor pads, workbench pads and an antistatic grounding strap. The growing importance of LANs and the increasing complexity of desktop computing applications are fueling the need for high performance networks. Since it is compatible with all 10Mbps and Mbps Ethernet environments, Gigabit Ethernet provides a straightforward upgrade without wasting a company's existing investment in hardware, software, and trained personnel.

The increased speed and extra bandwidth offered by Gigabit Ethernet are essential to coping with the network bottlenecks that frequently develop as computers and their busses get faster and more users use applications that generate more traffic.

Upgrading key components, such as your backbone and servers to Gigabit Ethernet can greatly improve network response times as well as significantly speed up the traffic between your subnetworks. Gigabit Ethernet enables fast optical fiber connections to support video conferencing, complex imaging, and similar dataintensive applications.

Likewise, since data transfers occur 10 times faster than Fast Ethernet, servers outfitted with Gigabit Ethernet NIC's are able to perform 10 times the number of operations in the same amount of time. In addition, the phenomenal bandwidth delivered by Gigabit Ethernet is the most cost-effective method to take advantage of today and tomorrow's rapidly improving switching and routing internetworking technologies. Another key development pushing the limits of Ethernet technology is in the field of switching technology.

Switching is a cost-effective way of increasing the total network capacity available to users on a local area network.

A switch increases capacity and decreases network loading by making it possible for a local area network to be divided into different segments, which are not competing with each other for network transmission capacity, and therefore decreasing the load on each segment. The Switch acts as a high-speed selective bridge between the individual segments. Traffic that needs to go from one segment to another from one port to another is automatically forwarded by the Switch, without interfering with any other segments ports.

This allows the total network capacity to be multiplied, while still maintaining the same network cabling and adapter cards. For Fast Ethernet or Gigabit Ethernet networks, a switch is an effective way of eliminating problems of chaining hubs beyond the "two-repeater limit. Switches supporting both traditional 10Mbps Ethernet and Mbps Fast Ethernet are also ideal for bridging between existing 10Mbps networks and new Mbps networks.

Switching LAN technology is a marked improvement over the previous generation of network bridges, which were characterized by higher latencies.

Routers have also been used to segment local area networks, but the cost of a router and the setup and maintenance required make routers relatively impractical. Today's switches are an ideal solution to most kinds of local area network congestion problems. These ports can be used for connecting PCs, printers, servers, hubs, routers, switches and other networking devices. The dual speed ports use standard twisted-pair cabling and are ideal for segmenting networks into small, connected subnetworks for superior performance.

These two gigabit combo ports are ideal for connecting to a server or network backbone. This stand-alone Switch enables the network to use some of the most demanding multimedia and imaging applications concurrently with other user applications without creating bottlenecks. The built-in console interface can be used to configure the Switch's settings for priority queuing, VLANs, and port trunk groups, port monitoring, and port speed.

Full duplex allows the switch port to simultaneously transmit and receive data. It only works with connections to full-duplex-capable end stations and switches. Connections to a hub must take place at half-duplex. The following shows the LED indicators for the Switch along with an explanation of each indicator.

This LED will light green after the Switch is powered on to indicate the ready state of the. When the POST is finished,. This indicator is lit sold green when the Switch is being logged into via.

This LED will be lit when the redundant power supply is present and in use. Otherwise it will. One row of LEDs for each port is located above the ports on the front panel. The first LED is. These port LEDs will light two. Amber - For speeds of 10 Mbps. A solid light denotes activity on the port while a. Green - For speeds of Mbps. These LEDs will light steady green to indicate that the port is transferring data at Mbps.

A blinking LED indicates. The AC power connector is a standard three-pronged connector that supports the power cord. Plug-in the female connector of the provided power cord into this socket, and the male side of the cord into a power outlet. The rear panel also includes an outlet for an optional external power supply.

When power fails, the optional external RPS will take over all the power immediately and automatically. The right-hand side panel of the Switch contains a system fan, while the left hand panel includes a system fan and a heat vent.

The system fans are used to dissipate heat. The sides of the system also provide heat vents to serve the same purpose. Do not block these openings, and leave at least 6 inches of space at the rear and sides of the Switch for proper ventilation. Be reminded that without proper heat dissipation and air circulation, system components might overheat, which could lead to system failure.

Please note that although these two front panel modules can be used simultaneously, the ports must be different. The GBIC port will always have the highest priority. Open the shipping carton of the Switch and carefully unpack its contents. The carton should contain the following items:. If any item is found missing or damaged, please contact your local D-Link Reseller for replacement. The site where you install the Switch may greatly affect its performance.

Please follow these guidelines for setting up the Switch. Do not place heavy objects on the Switch. Leave at least 10 cm 4 inches of space at the front and rear of the Switch for ventilation.

The rubber feet cushion the Switch, protect the casing from scratches and prevent it from scratching other surfaces. When installing the Switch on a desktop or shelf, the rubber feet included with the Switch should first be attached. Attach these cushioning feet on the bottom at each corner of the device. Allow enough ventilation space between the Switch and any other objects in the vicinity.

The Switch can be mounted in a standard 19" rack. Use the following diagrams to guide you. Fasten the mounting brackets to the Switch using the screws provided. With the brackets attached securely, you can mount the Switch in a standard rack as shown in Figure on the following page. Plug one end of the AC power cord into the power connector of the Switch and the other end into the local power source outlet.

After the Switch is powered on, the LED indicators will momentarily blink. This blinking of the LED indicators represents a reset of the system. As a precaution, in the event of a power failure, unplug the Switch. When power is resumed, plug the Switch back in. The end node should be connected to any of the ports of the Switch. A blinking LED indicates packet activity on that port.

Figure 3- 2. Switch connected to a port on a hub or switch using either a straight or crossover cableany normal cable is fine. The copper ports operate at a speed of , or 10Mbps in full or half duplex mode.

The fiber optic ports can operate at Mbps in full duplex mode. Connections to the Gigabit Ethernet ports are made using fiber optic cable or Category 5 copper cable, depending on the type of port. A valid connection is indicated when the Link LED is lit.

This system may be managed out-of-band through the console port on the front panel or in-band using Telnet.

The user may also choose the web-based management, accessible through a web browser. After you have successfully installed the Switch, you can configure the Switch, monitor the LED panel, and display statistics graphically using a web browser, such as Netscape Navigator version 6.

You can also connect a computer or terminal to the serial console port to access the Switch. The command-line-driven interface provides complete access to all Switch management features. The Switch provides an RS serial port that enables a connection to a computer or terminal for monitoring and configuring the Switch. Connect the female connector of the RS cable directly to the console port on the Switch, and tighten the captive retaining screws.

Connect the other end of the cable to a terminal or to the serial connector of a computer running terminal emulation software. Set the terminal emulation software as follows:. Set the data rate to baud. Set the data format to 8 data bits, 1 stop bit, and no parity. Under Properties, select VT for Emulation mode. Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that you select Terminal keys not Windows keys.

See www. After you have correctly set up the terminal, plug the power cable into the power receptacle on the back of the Switch.

The boot sequence appears in the terminal. After the boot sequence completes, the console login screen displays. If you have not logged into the command line interface CLI program, press the Enter key at the User name and password prompts. There is no default user name and password for the Switch. User names and passwords must first be created by the administrator. If you have previously set up user accounts, log in and continue to configure the Switch. Enter the commands to complete your desired tasks.

Many commands require administrator-level access privileges. Read the next section for more information on setting up user accounts. When you have completed your tasks, exit the session with the logout command or close the emulator program. Make sure the terminal or PC you are using to make this connection is configured to match these settings. If you are having problems making this connection on a PC, make sure the emulation is set to VT You will be able to set the emulation by clicking on the File menu in you HyperTerminal window, clicking on Properties in the drop-down menu, and then clicking the Settings tab.

This is where you will find the Emulation options. If you still do not see anything, try rebooting the Switch by disconnecting its power supply. Once connected to the console, the screen below will appear on your console screen. This is where the user will enter commands to perform all the available management functions.

The Switch will prompt the user to enter a user name and a password. Upon the initial connection, there is no user name or password and therefore just press enter twice to access the command line interface. The Switch supports user-based security that can allow you to prevent unauthorized users from accessing the Switch or changing its settings.

This section tells how to log onto the Switch. When you first connect to the Switch, you will be presented with the first login screen shown below. This command can be used at any time to force the console program in the Switch to refresh the console screen. Press Enter in both the Username and Password fields. You will be given access to the command prompt DES shown below:. There is no initial username or password. Leave the Username and Password fields blank.

It is recommended to create at least one Admin-level user account for the Switch. The DES does not have a default user name and password. One of the first tasks when settings up the Switch is to create user accounts.

If you log in using a predefined administrator-level user name, you have privileged access to the Switch's management software. After your initial login, define new passwords for both default user names to prevent unauthorized access to the Switch, and record the passwords for future reference. Type the same password and press the Enter key. NOTE: Passwords are case sensitive. User names and passwords can be up to 15 characters in length.

The sample below illustrates a successful creation of a new administrator-level account with the user name "newmanager". To save all your configuration changes in nonvolatile storage, you must use the save command to copy the running configuration file to the startup configuration.

SNMP enables network management stations to read and modify the settings of gateways, routers, switches, and other network devices. Use SNMP to configure system features for proper operation, monitor performance and detect potential problems in the Switch, switch group or network. Managed devices that support SNMP include software referred to as an agent , which runs locally on the device.

A defined set of variables managed objects is maintained by the SNMP agent and used to manage the device. These objects are defined in a Management Information Base MIB , which provides a standard presentation of the information. SNMP defines both the format of the MIB specifications and the protocol used to access this information over the network.

The three versions of SNMP vary in the level of security provided between the management station and the network device. In SNMP v. SNMP packets from any station that has not been authenticated are ignored dropped. SNMP v. The first part is to maintain a list of users and their attributes that are allowed to act as SNMP managers.

The second part describes what each user on that list can do as an SNMP manager. The Switch allows groups of users to be listed and configured with a shared set of privileges. Using SNMP v. An additional layer of security is available for SNMP v. To read more about how to configure SNMP v. Traps are messages that alert network personnel of events that occur on the Switch. The events can be as serious as a reboot someone accidentally turned OFF the Switch , or less serious like a port status change.

The Switch generates traps and sends them to the trap recipient or network manager. MIB values can be either read-only or read-write. The Switch's default IP address is You can change the default Switch IP address to meet the specification of your networking address scheme.

The Switch is also assigned a unique MAC address by the factory. This MAC address cannot be changed, and can be found by entering the command "show switch" into the command line interface, as shown below.

The IP address for the Switch must be set before it can be managed with the Web-based manager. Starting at the command line prompt, enter the commands config ipif System ipaddress xxx. Alternatively, you can enter config ipif System ipaddress xxx. The IP interface named System on the Switch can be assigned an IP address and subnet mask which can then be used to connect a management station to the Switch's Telnet or Web-based management agent.

In the above example, the Switch was assigned an IP address of



0コメント

  • 1000 / 1000