Des-3250tg user manual
Select Deny to specify that packets that This will open the following screen: Figure 7- Select Permit to specify that the packets Type in a unique identifier number for this access. System Log Servers window Click Add to add an entry to the table in the window above. System Log Server window Enter the desired system log server information and then click Apply to let your changes take effect.
Page Authentication Server Authentication Server can be on a different subnet. Page Authenticator 2. The All endstations must be running software that is compliant with the For users running Windows XP, that software is included within the operating system.
Page Authentication Process The following figure displays a more detailed explanation of how the authentication process is completed between the three roles stated above. The D-Link implementation of The Switch would regard the single physical Port connecting it to the shared media segment as consisting of a number of distinct logical Ports, each logical Port being independently controlled from the point of view of EAPOL exchanges and authorization state.
First Page Configure the following From pull-down whether controlled unauthorized will exert control over communication in both receiving and Page Figure 7- Next, enable the ports by selecting Authenticator from the drop-down menu under Capability. Then the user must specify the MAC address to be initialized by entering it into the MAC Address field and checking the corresponding check box. Reauthenticate Port s for MAC-based Then the user must specify the MAC address to be reauthenticated by entering it into the MAC Address field and checking the corresponding check box.
Page Management IP addresses. If there is one or more IP addresses entered in the IP Address fields, then only stations with the IP addresses entered will be allowed to access the switch to manage or configure it. The SNMP version used to monitor and control the switch can be specified by the administrator.
SNMP User Table window To delete an existing entry, click the selection button in the Delete column on the far right that corresponds to the port you want to configure. To create a new entry, click the Add button, a separate window will appear.
This can be Page To create a new entry, click the Add button, a separate window will appear. Figure 8- 9. SNMP Group Table window To delete an existing entry, click the selection button in the Delete column on the far right that corresponds to the port you want to remove.
The community string acts like a password to permit access to the agent on the switch. Page Snmp Host Table To delete an existing entry, click the selection button in the Delete column on the far right that corresponds to the port you want to remove. This is an alphanumeric string used to identify the SNMP engine on the switch.
Page Port Utilization To select a port to view these statistics for, first select the Switch in the switch stack by using the Unit pull-down menu. The default value is one second. Six windows are offered. Received RX Figure 9- 3. Select number of times the Switch will be polled between 20 and Clicking this button instructs the Switch to Four windows are offered.
The number of frames that are dropped by this port since the last Switch reboot. Two windows are offered. When the switch learns an association between a MAC address and a port number, it makes an entry into its forwarding table. These entries are then used to forward packets through the switch. Enter a MAC address for the forwarding This window will show current ARP entries on the Switch. A router port configured by a user using the console or Web-based management interfaces is displayed as a static router port in the first two rows of the Router Port window.
Authenticator Status window The switch records all traps, in sequence, that identify events on the switch. The time since the last cold start of the switch is also recorded. To retain any configuration changes permanently, highlight Save Changes on the Maintenance menu. Reboot window Reset Figure 9. Reset window Reset System Figure Reset System window Page Reset Config Click Apply if you want to logout of the Web configuration program and return to the main page.
Reset Config window Figure Logout Web Setup window General Example Usage: To create an access profile that will deny service to the subnet ranging from The value specifies the relative priority of the additional rule. A lower access ID, the higher the priority the rule will be given. Restrictions None. Syntax Description This command will display all commands. Enter a unique IP address. The value must be from to ! The switch does not have a history log! Your name: Mr. What network protocol s does your organization use?
TCP IP! What network operating system s does your organization use? D-Link LANsmart! Novell NetWare! NetWare Lite! SCO Unix Xenix! PC NFS! Banyan Vines! DECnet Pathwork! Windows NT! Windows NTAS! Windows '95! Print page 1 Print document pages.
Rename the bookmark. Delete bookmark? Cancel Delete. Delete from my manuals? Sign In OR. Don't have an account? Sign up! Restore password. Upload manual. When the specified hardware priority queue Packets MAX.
The switch has four hardware priority queues available. Parameters None. Restrictions None. Syntax config The port list is specified by listing the beginning port number and the highest port number of the range. That is, a range of ports for which all traffic will be copied and sent to the Target port. Syntax enable mirror Description This command, combined with the disable mirror command below, allows you to enter a port mirroring configuration into the switch, and then turn the port mirroring on and off without having to modify the port mirroring configuration.
You can configure ingress checking and the sending and receiving of GVRP information. The switch allows up to 6 link aggregation groups to be configured. This feature is only available using the address- based load-sharing algorithm. Syntax show ipif Description This command configuration of an IP interface on the switch. You might lower this interval to reduce the amount of time it takes a router to detect the loss of the last member of a Enter a unique username.
Enter a unique route. Page Le Florilege, No. Page U. D-Link U. Page Registration Card 3. What network protocol s does your organization use? What network operating system s does your organization use? D-Link LANsmart! Novell NetWare! The port untagging function can be used to remove the IEEE There are four additional octets inserted after the source MAC address.
Their presence is indicated by a value of 0x in the EtherType field. Page Ip Addresses The IP address discussed above is one part and a second number called the Subnet mask is the other part. To make this a bit more confusing, the subnet mask has the same numerical form as an IP address.
Page 32 Additional bits can be added to the default subnet mask for a given Class to further subnet a network. Page 33 Written in CIDR notation this becomes: It is intended to give the reader a reasonable understanding of the available facilities and some familiarity with terminology. It is not intended to be a complete description.
Each layer has clearly defined tasks, protocol, and interfaces for communicating with adjacent layers, but the exact way these tasks are accomplished is left to individual software designers. The Protocol Stack Between two protocol stacks, members of the same layer are known as peers and communicate by well- known open and published protocols. Within a protocol stack, adjacent layers communicate by an internal interface.
The backbone of the Internet is built using Layer 3 functions. IP is the premier Layer 3 protocol. Page Packet Headers D-Link DESTG Standalone Layer 2 Switch Because these functions are required by a large number of applications, they are grouped into a single protocol, rather than being the part of the specifications for just sending e-mail. TCP is then a library of routines that application software can use when reliable network communications are required.
This is simply a packet that has the acknowledgement number field filled in. An acknowledgement number of indicates that all of the data up to octet has been received. IP Packet Header The flags and fragment offset are used to keep track of packets that must be divided among several smaller packets to cross networks for which they are too large. Both the query and the response are very short. There is no need to divide the query or response between multiple packets, so the complexity of TCP is not required.
Page Web-Based Switch Management 2 bytes per character. Its function in a network can be thought of as a new generation of router that performs routing functions in hardware, rather than software. Page Configuring The Switch To begin managing your Switch simply run the browser you have installed on your computer and point it to the IP address you have defined for the device.
Page Save Changes You can logon again and are now ready to continue configuring the Switch. Configuration changes are made effective by clicking the Apply button. When this is done, the settings will be immediately applied to the switching software in RAM, and will immediately take effect.
Page Configuration Presents switch information based on your selection and the entry of configuration data. This section, arranged by topic, describes how to perform common monitoring and configuration tasks on the DESTG switch using the Web-based Manager, you can perform any of the tasks described in the following sections.
If you want to access the switch from a different subnet from the one it is installed on, enter the IP address of the gateway.
If you will manage the switch from the subnet on which it is installed, you can leave the default address in this field. If this option is set, the Switch will first look for a BOOTP server information before using the default or previously entered settings. Page Switch Information assigned by the factory and unchangeable. Toggle Disabled to Enabled. Status To enable the Web status, toggle Disabled to Enabled.
Page 54 The Auto setting allows the port to automatically determine the fastest settings the port on the device connected to the DESTG can handle, and then use those settings. For Combo ports 49 and 50, if the optional Toggle the State field to either enable or disable a given port. Page Link Aggregation — to the backbone of a network. The switch allows the creation of up to six link aggregation groups, each group consisting of up to eight links ports.
All of the ports in the group must be members of the same VLAN. Further, the aggregated links must all be of the same speed and should be configured as full duplex. Page 57 Master Port in the calculation of port cost and in determining the state of the link aggregation group. If two redundant link aggregation groups are configured on the switch, STP will block one entire group — in the same way STP will block a single port that has a redundant link.
Page Igmp Figure 6- Query Interval Allows the entry of a value between 1 and seconds, with a default of length of time between sending IGMP queries. On the port level, the settings are implemented on a user-defined Group of ports basis.
0コメント