User Manual: D-Link™ DGS-3100 SERIES Gigabit Stackable Managed Switch
User Manual: D-Link™ DGS-3100 SERIES Gigabit Stackable Managed Switch
User Manual: D-Link™ DGS-3100 SERIES Gigabit Stackable Managed Switch
User Manual
V2.00
Information in this document is subject to change without notice.
© 2007 D-Link Computer Corporation. All rights reserved.
Reproduction in any manner whatsoever without the written permission of D-Link Computer Corporation is strictly
forbidden.
Trademarks used in this text: D-Link and the D-Link logo are trademarks of D-Link Computer Corporation; Microsoft and
Windows are registered trademarks of Microsoft Corporation.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names
or their products. D-Link Computer Corporation disclaims any proprietary interest in trademarks and trade names other than
its own.
FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the
FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with this user’s guide, may cause harmful interference to radio communications. Operation
of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to
correct the interference at his own expense.
CE Mark Warning
This is a Class A product. In a domestic environment, this product may cause radio interference in which case the user may
be required to take adequate measures.
Warnung!
Dies ist ein Produkt der Klasse A. Im Wohnbereich kann dieses Produkt Funkstoerungen verursachen. In diesem Fall kann
vom Benutzer verlangt werden, angemessene Massnahmen zu ergreifen.
Precaución!
Este es un producto de Clase A. En un entorno doméstico, puede causar interferencias de radio, en cuyo case, puede
requerirse al usuario para que adopte las medidas adecuadas.
Attention!
Ceci est un produit de classe A. Dans un environnement domestique, ce produit pourrait causer des interférences radio,
auquel cas l`utilisateur devrait prendre les mesures adéquates.
Attenzione!
Il presente prodotto appartiene alla classe A. Se utilizzato in ambiente domestico il prodotto può causare interferenze radio,
nel cui caso è possibile che l`utente debba assumere provvedimenti adeguati.
VCCI Warning
Preface
This preface provides an overview to the guide, and includes the following sections:
• General Precautions for Rack-Mountable Products
• System Overview
• Viewing the Device
• Device Management Methods
•
• User Guide Overview
• Intended Audience
• Notes, Notices, and Cautions
• Safety Cautions
• General Precautions for Rack-Mountable Products
i
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
System Overview
The DGS-3100 series and the DGS-3100-24TG Gigabit Ethernet Switches enhance networks by providing a powerful
switch that eliminates network bottlenecks, enabling network administrators to fine tune network configurations.
The DGS-3100 series and the DGS-3100-24TG are perfect for departmental and enterprise connections, and are ideal for
backbone and server connections.
ii
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
iii
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Intended Audience
The DGS-3100 series/DGS-3100-24TG User Guide contains information for configuring and managing the DGS-3100
series/DGS-3100-24TG Switches. This guide is intended for network managers familiar with network management concepts
and terminology.
NOTE: A NOTE indicates important information that helps you make better use of your device.
NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death.
Safety Cautions
Use the following safety guidelines to ensure your own personal safety and to help protect your system from potential
damage. Throughout this safety section, the caution icon ( ) is used to indicate cautions and precautions that you need to
review and follow.
To reduce the risk of bodily injury, electrical shock, fire, and damage to the equipment, observe the following precautions.
• Do not service any product except as explained in your system documentation. Opening or removing covers that
are marked with the triangular symbol with a lightning bolt may expose you to electrical shock. Only a trained
service technician should service components inside these compartments.
iv
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
• If any of the following conditions occur, unplug the product from the electrical outlet and replace the part or
contact your trained service provider:
– The power cable, extension cable, or plug is damaged.
– An object has fallen into the product.
– The product has been exposed to water.
– The product has been dropped or damaged.
– The product does not operate correctly when you follow the operating instructions.
• Keep your system away from radiators and heat sources. Also, do not block the cooling vents.
• Do not spill food or liquids on your system components, and never operate the product in a wet environment. If the
system gets wet, see the appropriate section in your troubleshooting guide or contact your trained service provider.
• Do not push any objects into the openings of your system. Doing so can cause a fire or an electric shock by
shorting out interior components.
• Use the product only with approved equipment.
• Allow the product to cool before removing covers or touching internal components.
• Operate the product only from the type of external power source indicated on the electrical ratings label. If you are
not sure of the type of power source required, consult your service provider or local power company.
• To help avoid damaging your system, be sure the voltage selection Switch (if provided) on the power supply is set
to match the power available at your location:
– 115 volts (V)/60 hertz (Hz) in most of North and South America and some Far Eastern countries such as South
Korea and Taiwan
– 100 V/50 Hz in eastern Japan and 100 V/60 Hz in western Japan
– 230 V/50 Hz in most of Europe, the Middle East, and the Far East
• Also be sure that attached devices are electrically rated to operate with the power available in your location.
• Use only approved power cable(s). If you have not been provided with a power cable for your system or for any
AC-powered option intended for your system, purchase a power cable that is approved for use in your country. The
power cable must be rated for the product and for the voltage and current marked on the product's electrical ratings
label. The voltage and current rating of the cable should be greater than the ratings marked on the product.
• To help prevent an electric shock, plug the system and peripheral power cables into properly grounded electrical
outlets. These cables are equipped with three-prong plugs to help ensure proper grounding. Do not use adapter
plugs or remove the grounding prong from a cable. If you must use an extension cable, use a 3-wire cable with
properly grounded plugs.
• Observe extension cable and power strip ratings. Make sure that the total ampere rating of all products plugged into
the extension cable or power strip does not exceed 80 percent of the ampere ratings limit for the extension cable or
power strip.
• To help protect your system from sudden, transient increases and decreases in electrical power, use a surge
suppressor, line conditioner, or uninterruptible power supply (UPS).
• Position system cables and power cables carefully; route cables so that they cannot be stepped on or tripped over.
Be sure that nothing rests on any cables.
• Do not modify power cables or plugs. Consult a licensed electrician or your power company for site modifications.
Always follow your local/national wiring rules.
• When connecting or disconnecting power to hot-pluggable power supplies, if offered with your system, observe the
following guidelines:
– Install the power supply before connecting the power cable to the power supply.
– Unplug the power cable before removing the power supply.
– If the system has multiple sources of power, disconnect power from the system by unplugging all power cables
from the power supplies.
Move products with care; ensure that all casters and/or stabilizers are firmly connected to the system. Avoid sudden stops
and uneven surfaces.
v
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Observe the following precautions for rack stability and safety. Also refer to the rack installation documentation
accompanying the system and the rack for specific caution statements and procedures.
Systems are considered to be components in a rack. Thus, "component" refers to any system as well as to various
peripherals or supporting hardware.
CAUTION: Installing systems in a rack without the front and side stabilizers installed could cause
the rack to tip over, potentially resulting in bodily injury under certain circumstances. Therefore,
always install the stabilizers before installing components in the rack.
After installing system/components in a rack, never pull more than one component out of the rack
on its slide assemblies at one time. The weight of more than one extended component could
cause the rack to tip over and may result in serious injury.
• Before working on the rack, make sure that the stabilizers are secured to the rack, extended to the floor, and that
the full weight of the rack rests on the floor. Install front and side stabilizers on a single rack or front stabilizers for
joined multiple racks before working on the rack.
Always load the rack from the bottom up, and load the heaviest item in the rack first.
Make sure that the rack is level and stable before extending a component from the rack.
Use caution when pressing the component rail release latches and sliding a component into or out of a rack; the slide rails
can pinch your fingers.
After a component is inserted into the rack, carefully extend the rail into a locking position, and then slide the component
into the rack.
Do not overload the AC supply branch circuit that provides power to the rack. The total rack load should not exceed 80
percent of the branch circuit rating.
Ensure that proper airflow is provided to components in the rack.
Do not step on or stand on any component when servicing other components in a rack.
NOTE: A qualified electrician must perform all connections to DC power and to safety grounds.
All electrical wiring must comply with applicable local or national codes and practices.
CAUTION: Never defeat the ground conductor or operate the equipment in the absence of a
suitably installed ground conductor. Contact the appropriate electrical inspection authority or an
electrician if you are uncertain that suitable grounding is available.
CAUTION: The system chassis must be positively grounded to the rack cabinet frame. Do not
attempt to connect power to the system until grounding cables are connected. Completed power
and safety ground wiring must be inspected by a qualified electrical inspector. An energy hazard
will exist if the safety ground cable is omitted or disconnected.
vi
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
vii
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
1
GETTING STARTED
To begin managing the device, simply run the browser installed on the management station and point it to the IP address
defined for the device. For example; http://123.123.123.123. Please note that the proxy for session connection should be
turned off.
This section contains information on starting the D-Link Embedded Web Interface. To access the D-Link user interface:
1. Open an Internet browser. Ensure that pop-up blockers are disabled. If pop-up blockers are enabled, edit, add, and
device information messages may not open.
2. Enter the device IP address in the address bar and press Enter.
Device Information View Located in the main part of the home page, the device view provides a view of the
device, an information or table area, and configuration instructions.
Stacking Status View Located at the bottom left corner of the home page, the stacking status view provides
a graphic representation of the stacking links and ports status.
1
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
4. Zoom View Presents a graphical near real-time image of the front panel of the Switch. This area displays
the Switch's ports and expansion modules, showing port activity, duplex mode, or flow
control, depending on the specified mode.
Various areas of the graphic can be selected for performing management functions, including
port configuration
5 Device Provides access to the device logout, and provides information about the Safe Guard mode
Application Buttons currently enabled on the device.
6 Stacking Status Provides a graphic representation of the stacking links and ports status.
View
2
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Locating Devices
The Device Locator Page enables locating system devices by activating LED locators. To locate devices:
3
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
1. Click > Config Backup & Restore. The Config Backup and Restore Page opens.
4
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
2. Click . The factory default settings are restored, and the device is updated.
5
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
6
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
7
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
8
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
2
CONFIGURING BASIC CONFIGURATION
This section contains information for viewing device information, defining IP addresses, managing stacking, defining port
parameters, configuring system user accounts, configuring and managing system logs, defining the system time, and
configuring SNMP system management. This section contains the following topics:
• Viewing Device Description
• Defining System Information
• Defining IP Addresses
• Managing Stacking
• Defining Ports
• ARP Settings
• Configuring User Accounts
• Managing System Logs
• Configuring SNTP
• Configuring SNMP
• DHCP Auto Configuration
• Dual Image Services
9
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
10
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Boot Version Displays the installed device boot version number.
MAC Address Displays the MAC address assigned to the device.
IP Address Displays the IP address assigned to the device.
Subnet Mask Displays the subnet mask assigned to the device.
Default Gateway Displays the device default gateway assigned to the device.
Login Timeout (minutes) Indicates the amount of time after which if no user activity occurs, the device times out.
The default is 10 minutes.
Time Source Provides a shortcut to viewing the system clock settings.
802.1D Spanning Tree Indicates if STP is enabled on the device, and provides a shortcut to viewing the STP
settings.
DHCP Client Indicates if DCHP Client is enabled on the device, and provides a shortcut to viewing the
DHCP Client settings.
Safeguard Engine Indicates if the Safeguard Engine is enabled on the device, and provides a shortcut to
viewing the Safeguard Engine settings.
SNMP Trap Indicates if SNMP Traps are enabled on the device, and provides a shortcut to viewing
the SNMP Traps settings.
SSL Indicates if Secure Socket Layer (SSL) is enabled on the device, and provides a shortcut
to viewing the SSL settings.
GVRP Setting Indicates if Group VLAN Registration Protocol is enabled.
Jumbo Frames Indicates if Jumbo Frames are enabled on the device, and provides a shortcut to viewing
the Jumbo Frames settings.
BPDU Forwarding Indicates if BPDU Forwarding is enabled on the device, and provides a shortcut to
viewing the BPDU Forwarding settings.
IGMP Snooping Indicates if IGMP Snooping is enabled on the device, and provides a shortcut to viewing
the IGMP Snooping settings.
Broadcast Storm Control Indicates if Broadcast Storm Control is enabled on the device, and provides a shortcut to
viewing the Broadcast Storm Control settings.
802.1X Status Indicates if 802.1X is enabled on the device, and provides a shortcut to viewing the
802.1X settings.
SSH Indicates if Secure Shell Protocol (SSH) is enabled on the device, and provides a shortcut
to viewing the SSH settings.
Port Mirroring Indicates if Port Mirroring is enabled.
To view settings for a device feature:
1. Select a device feature under the Device Status and Quick Configuration Section.
2. Click setting next to the feature name. The configuration page for the selected device feature opens.
11
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
12
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Defining IP Addresses
The IP Address Page contains fields for assigning IP addresses. Packets are forwarded to the default IP when frames are
sent to a remote network via the Default Gateway. The configured IP address must belong to the same IP address subnet of
one of the IP interfaces. The Dynamic Host Configuration Protocol (DHCP) assigns dynamic IP addresses to devices on a
network. DHCP ensures that network devices can have a different IP address every time the device connects to the network.
1. Click Configuration > IP Address. The IP Address Page opens:
13
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Managing Stacking
Stacking provides multiple switch management through a single point as if all stack members are a single unit. All stack
members are accessed through a single IP address through which the stack is managed. The stack can be managed from the
following:
• Web-based Interface
• SNMP Management Station
• Command Line Interface (CLI)
Devices support stacking up to six units per stack, or can operate as stand-alone units.
During the stacking setup, one switch is selected as the Stacking Master and another stacking member can be selected as the
Backup Master. All other devices are selected as stack members, and assigned a unique unit ID.
Switch software is downloaded separately for each stack member. However, all units in the stack must be running the same
software version.
Switch stacking and configuration is maintained by the Stacking Master. The Stacking Master detects and reconfigures the
ports with minimal operational impact in the event of the following circumstances:
• Unit Failure
• Inter-unit Stacking Link Failure
• Unit Insertion
• Removing a Stacking Unit
Stacked devices operate in a ring or chain topology. A ring topology occurs when devices in the stack are connected to each
other forming a circle. Each stacked device accepts data and sends it to the device to which it is physically connected. The
packet continues through the stack until it reaches the destination port. The system automatically determines the optimal
path on which to send traffic.
Most difficulties incurred in ring topologies occur when a device in the ring becomes non-functional, or a link is severed. In
a stack, the system automatically switches to a stacking failover feature on the device without any system downtime. An
SNMP message is automatically generated, but no stack management action is required. However, the stacking link or
stacking member must be repaired to ensure the stacking integrity.
After the stacking issues are resolved, the device can be reconnected to the stack without interruption, and the ring topology
is restored.
A chain topology occurs when devices in the stack are connected in a chain-like fashion. Each stacked device accepts data
and sends it along the chain to the next device to which it is physically connected. The packet continues through the stack
until it reaches the destination port.
14
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
15
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
16
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Configuring Stacking
The Stacking Settings Page allows network managers to either reset the entire stack or a specific device within the stack.
Save all device configuration changes before the device is reset to ensure the changes are saved. If the Stacking Master is
reset, the entire stack is reset.
1. Click Configuration > Stacking Settings. The Stacking Settings Page opens:
17
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Defining Ports
• Configuring Port Properties
• Viewing Port Properties
18
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
10M/Half — Indicates the port is currently operating at 10 Mbps and half duplex mode.
100M/Full — Indicates the port is currently operating at 100 Mbps and full duplex mode.
100M/Half — Indicates the port is currently operating at 100 Mbps and half duplex mode.
1000M/Full — Indicates the port is currently operating at 1000 Mbps and full duplex mode.
Auto —Indicates the port is automatically configured to the fastest network traffic the
interface can manage.
Flow Control Defines the flow control scheme used for the various port configurations. Ports configured for
full-duplex use 802.3x flow control, half-duplex ports use backpressure flow control, and Auto
ports use an automatic selection of the two. The default is Disabled.
Learning Defines whether MAC address learning is enabled on the ports. The possible field values are:
Enabled — Enables MAC address learning on the port. If MAC address learning is enabled,
the source and destination MAC address are recorded in the Forwarding Table.
Disabled — Disables MAC address learning. This is the default value.
2. Define the Unit, From Port, To Port, State, Speed, Flow Control, and Learning fields.
3. Click . The port configuration is saved, and the device is updated.
19
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
20
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
ARP Settings
The Address Resolution Protocol (ARP) converts IP addresses into physical addresses and maps the IP address to a MAC
address. ARP allows a host to communicate with other hosts only when the IP addresses of its neighbors are known. To
define ARP information:
1. Click Configuration > ARP Settings. The ARP Settings Page opens:
21
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
22
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
23
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
24
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
2. Define the Index, Severity, Server IP, Facility, and UDP Port fields.
3. Click . The System Log Host is defined, and the device is updated.
To delete a log entry:
1. Select the entry.
2. Click . The entry is deleted, and the device is updated.
Configuring SNTP
The device supports the Simple Network Time Protocol (SNTP). SNTP assures accurate network device clock time
synchronization up to the millisecond. Time synchronization is performed by a network SNTP server. The device operates
only as an SNTP client, and cannot provide time services to other systems. The device polls Unicast type servers for the
server time.
Time sources are established by stratums. Stratums define the accuracy of the reference clock. The higher the stratum
(where zero is the highest), the more accurate the clock. The device receives time from stratum 1 and above.
The following is an example of stratums:
Stratum Example
Stratum 0 A real time clock (such as a GPS system) is used as the time source.
Stratum 1 A server that is directly linked to a Stratum 0 time source is used as the time source. Stratum 1
time servers provide primary network time standards
Stratum 2 The time source is distanced from the Stratum 1 server over a network path. For example, a
Stratum 2 server receives the time over a network link, via NTP, from a Stratum 1 server.
Information received from SNTP servers is evaluated based on the Time level and server type. SNTP time definitions are
assessed and determined by the following time levels:
Time level SNTP Time Definition
T1 The time at which the original request was sent by the client.
T2 The time at which the original request was received by the server.
T3 The time at which the server sent the client a reply.
T4 The time at which the client recived the server's reply.
25
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
26
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
27
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
• Montenegro — From the last weekend of March until the last weekend of October.
• Netherlands — From the last weekend of March until the last weekend of October.
• New Zealand — From the first Sunday in October until the first Sunday on or after March 15.
• Norway — From the last weekend of March until the last weekend of October.
• Paraguay — From April 6 until September 7.
• Poland — From the last weekend of March until the last weekend of October.
• Portugal — From the last weekend of March until the last weekend of October.
• Romania — From the last weekend of March until the last weekend of October.
• Russia — From the last weekend of March until the last weekend of October.
• Serbia — From the last weekend of March until the last weekend of October.
• Slovak Republic - From the last weekend of March until the last weekend of October.
• South Africa — South Africa does not use daylight saving time.
• Spain — From the last weekend of March until the last weekend of October.
• Sweden — From the last weekend of March until the last weekend of October.
• Switzerland — From the last weekend of March until the last weekend of October.
• Syria — From March 31 until October 30.
• Taiwan — Taiwan does not use daylight saving time.
• Turkey — From the last weekend of March until the last weekend of October.
• United Kingdom — From the last weekend of March until the last weekend of October.
• United States of America — From the second Sunday in March at 02:00 to the first Sunday in November at
02:00.
To configure the system time:
• Click Configuration > SNTP Settings > TimeZone Settings. The TimeZone Settings Page opens:
28
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
29
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
30
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Configuring SNMP
Simple Network Management Protocol (SNMP) provides a method for managing network devices. The device supports the
following SNMP versions:
• SNMP version 1
• SNMP version 2c
• SNMP version 3
SNMP v1 and v2c
The SNMP agents maintain a list of variables used to manage the device. The variables are defined in the Management
Information Base (MIB). The SNMP agent defines the MIB specification format, as well as the format used to access the
information over the network. Access rights to the SNMP agents are controlled by access strings.
SNMP v3
SNMP v3 applies access control and a new traps mechanism. In addition, User Security Model (USM) parameters are
defined for SNMPv3, including:
Parameters Description
Authentication Provides data integrity and data origin authentication.
Privacy Prevents message content disclosure. Cipher Block-Chaining (CBC) is used for encryption.
Either authentication is enabled on a SNMP message, or both authentication and privacy are
enabled on an SNMP message. However, privacy cannot be enabled without authentication.
Key Management Defines key generation, key updates, and key use.
The device supports SNMP notification filters based on Object IDs (OIDs). OIDs are used by the system to manage device
features. SNMP v3 supports the following features:
• Security
• Feature Access Control
• Traps
31
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
32
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
33
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Notify View Name Defines a Notify view. The Notify view sends traps for the assigned SNMP view. This is
applicable for SNMPv3 only. The possible values are:
Community/View
TestReadView
PWriteView
PrivateView
Security Model Defines the SNMP version attached to the group. The possible field values are:
SNMPv1 — Defines SNMPv1 as the security model for the group.
SNMPv2 — Defines SNMPv2 as the security model for the group.
SNMPv3 — Defines SNMPv3 as the security model for the group.
Security Level Defines the security level attached to the group. Security levels apply to SNMPv3 only. The
possible field values are:
NoAuthNoPriv — Defines that neither the Authentication nor the Privacy security levels are
assigned to the group.
AuthNoPriv — Authenticates SNMP messages, and ensures that the SNMP message’s origin
is authenticated.
AuthPriv — Encrypts SNMP messages.
2. Define the Group Name, Read View Name, Write View Name, and Notify View Name fields.
3. Select a security model from the Security Model list.
4. Click . The SNMP groups are defined, and the device is updated.
To delete a Group Name from the SNMP Group Table Page List:
1. Select a Group Name.
2. Click . The Group Name is deleted, and the device is updated.
34
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
35
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Auth-Protocol by Key Selects the authentication key type used to authenticate users. The possible field values
are:
MD5 — Defines that users are authenticated via a HMAC-MD5 algorithm key.
SHA — Defines that users are authenticated via a HMAC-SHA-96 authentication
level key.
Key Defines the authentication key for authentication.
Confirm Key Confirms the authentication key for authentication.
2. Define the User Name, Group Name, and SNMP V3 Encryption fields.
3. Define the authentication password or authentication key.
4. Click . The SNMP authentication method is defined, and the device is updated.
36
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
3. Click . The SNMP Community Table is defined, and the device is updated.
To delete a SNMP Community Table Page List entry:
1. Select a Community Name.
2. Click . The entry is deleted, and the device is updated.
37
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
38
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
5. Click . The SNMP Host Table is defined, and the device is updated.
To delete a SNMP Host Table Page List entry:
1. Select an entry.
2. Click . The entry is deleted, and the device is updated.
39
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
40
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
3. Click . The SNMP trap status is modified, and the device is updated.
41
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
42
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
3. Select Enabled to turn on DHCP Auto configuration or Disabled to turn it off. Disabled is the default.
4. Click . The DHCP automatic configuration update is modified, and the device is updated.
43
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Firmware Information
The Firmware Information Page contains information about the image files stored for the device, or in case of a stacked
system, for all devices in the stack. To view the list of device images:
• Click Configuration > Dual Image Services > Firmware Information. The Firmware Information Page opens:
44
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Version Displays the image file’s version number.
Update Time Displays the time and date that the file was downloaded to the device.
3. Click . The device will use the defined image file the next time it reboots.
45
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
3
CONFIGURING L2 FEATURES
This section contains information for enabling and configuring L2 Features. This section contains the following topics:
• Enabling Jumbo Frames
• Defining VLAN Properties
• Configuring GVRP
• Defining Trunking
• Traffic Segmentation
• Configuring LACP
• Defining IGMP Snooping
• Configuring Port Mirroring
• Configuring Spanning Tree
• Defining Forwarding and Filtering
46
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
47
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Configuring VLANs
Priority tagging is an IEEE 802.1p defined standard function designed to provide a means of managing traffic on networks
where many different types of data are transmitted simultaneously. It is intended to alleviate problems associated with the
delivery of time-critical data over congested networks. The quality of applications dependent on such data, such as video
conferencing, can be severely and adversely affected by even very small delays in transmission.
IEEE 802.1p standard-compliant network devices recognize the priority level of data packets and can assign priority labels
or tags to packets, as well as strip priority tags from packets. The priority tag determines the packet's degree of
expeditiousness and the queue to which it is assigned.
Priority tags are assigned values from 0 to 7, with 0 being assigned to the lowest priority data, and 7 to the highest.
Generally, tag 7 is used for data associated with video or audio applications, sensitive to even slight delays, or for data from
specified end users whose data transmissions warrant special consideration.
The switch enables increased definition for handling priority tagged data packets on the network. Using queues to manage
priority tagged data enables user-specification for the data’s relative priority to suit the needs of the network. Circumstances
can arise where it is advantageous to group two or more differently tagged packets into the same queue. Generally, however,
it is recommended that the highest priority queue, Queue 1, be reserved for data packets with a priority value of 7.
A weighted round robin system is employed on the switch to determine the rate at which the queues are emptied of packets.
The ratio used for clearing the queues is 4:1. This means that the highest priority queue, Queue 1, clears four packets for
every one packet cleared from Queue 0.
It is important that the priority queue settings on the switch are for all ports, and all devices connected to the switch are
affected. The priority queuing system is especially beneficial for networks that employ priority tag assignment capable
switches.
VLAN Description
A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the
physical layout. VLANs can be used to combine any collection of LAN segments into an autonomous user group that
appears as a single LAN. VLANs also logically segment the network into different broadcast domains so that packets are
forwarded only between ports within the VLAN. Typically, a VLAN corresponds to a particular subnet, although not
necessarily.
VLANs can enhance performance by conserving bandwidth, and improve security by limiting traffic to specific domains.
A VLAN is a collection of end nodes grouped by logic instead of physical location. End nodes that frequently communicate
with each other are assigned to the same VLAN, regardless of where they are physically on the network. Logically, a VLAN
can be equated to a broadcast domain, because broadcast packets are forwarded to only members of the VLAN on which the
broadcast was initiated.
48
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Term Description
Ingress port A port on a switch where packets are flowing into the switch and VLAN decisions must be
made.
Egress port A port on a switch where packets are flowing out of the switch, either to another switch or to
an end station, and tagging decisions must be made.
IEEE 802.1Q (tagged) VLANs are implemented on the switch. 802.1Q VLANs require tagging, which enables them to span
the entire network (assuming all switches on the network are IEEE 802.1Q-compliant).
VLANs allow a network to be segmented in order to reduce the size of broadcast domains. All packets entering a VLAN are
only forwarded to the stations (over IEEE 802.1Q enabled switches) that are members of that VLAN, and this includes
broadcast, multicast and unicast packets from unknown sources.
VLANs can also provide a level of security to a network. IEEE 802.1Q VLANs only deliver packets between stations that
are members of the VLAN.
Any port can be configured as either tagged or untagged. The untagging feature of IEEE 802.1Q VLANs allows VLANs to
work with legacy switches that don't recognize VLAN tags in packet headers. The tagging feature allows VLANs to span
multiple 802.1Q-compliant switches through a single physical connection and allows Spanning Tree to be enabled on all
ports and work normally.
The IEEE 802.1Q standard restricts the forwarding of untagged packets to the VLAN in which the receiving port is a
member.
The main characteristics of IEEE 802.1Q are as follows:
• Assigns packets to VLANs by filtering.
• Assumes the presence of a single global spanning tree.
• Uses an explicit tagging scheme with one-level tagging.
• 802.1Q VLAN Packet Forwarding
Packet forwarding decisions are made based upon the following three types of rules:
• Ingress rules - rules relevant to the classification of received packets belonging to a VLAN.
• Forwarding rules between ports - decides whether to filter or forward the packet.
• Egress rules - determines if the packet must be sent tagged or untagged.
49
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
50
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Port VLAN ID
Tagged packets (carrying the 802.1Q VID information) can be transmitted from one 802.1Q compliant network device to
another with the VLAN information intact. This allows 802.1Q VLANs to span network devices (and the entire network,
providing all network devices are 802.1Q compliant).
Not all network devices are 802.1Q compliant. Such devices are referred to as tag-unaware. 802.1Q devices are referred to
as tag-aware.
Prior to the adoption of 802.1Q VLANs, port-based and MAC-based VLANs were in common use. These VLANs relied
upon a Port VLAN ID (PVID) to forward packets. A packet received on a given port would be assigned that port's PVID
and then be forwarded to the port that corresponds to the packet's destination address (found in the switch's forwarding
table). If the PVID of the port receiving the packet is different from the PVID of the port that is to transmit the packet, the
switch drops the packet.
Within the switch, different PVIDs mean different VLANs (remember that two VLANs cannot communicate without an
external router). So, VLAN identification based upon the PVIDs cannot create VLANs that extend outside a given switch
(or switch stack).
Every physical port on a switch has a PVID. 802.1Q ports are also assigned a PVID, for use within the switch. If no VLANs
are defined on the switch, all ports are then assigned to a default VLAN with a PVID equal to 1. Untagged packets are
assigned the PVID of the port on which they were received. Forwarding decisions are based upon this PVID, in so far as
VLANs are concerned. Tagged packets are forwarded according to the VID contained within the tag. Tagged packets are
also assigned a PVID, but the PVID is not used to make packet forwarding decisions, the VID is.
Tag-aware switches must keep a table to relate PVIDs within the switch to VIDs on the network. The switch compares the
VID of a packet to be transmitted to the VID of the port that is to transmit the packet. If the two VIDs are different, the
switch drops the packet. As a result of the existence of the PVID for untagged packets, and the VID for tagged packets, tag-
aware and tag-unaware network devices can coexist on the same network.
A switch port can only have one PVID, but it can have as many VIDs that the switch’s memory storage capacity has in its
VLAN table, to store them.
As some devices on a network may be tag-unaware, a decision must be made at each port on a tag-aware device before
packets are transmitted; Should the packet to be transmitted have a tag or not? If the transmitting port is connected to a tag-
unaware device, the packet should be untagged. If the transmitting port is connected to a tag-aware device, the packet
should be tagged.
Ingress Filtering
A port on a switch where packets are flowing into the switch, and VLAN decisions must be made, is referred to as an
ingress port. If ingress filtering is enabled for a port, the switch examines the VLAN information in the packet header (if
present) and decides whether or not to forward the packet.
If the packet is tagged with VLAN information, the ingress port first determines if the ingress port itself is a member of the
tagged VLAN. If it is not, the packet is dropped. If the ingress port is a member of the 802.1Q VLAN, the switch determines
if the destination port is a member of the 802.1Q VLAN. If it is not, the packet is dropped. If the destination port is a
member of the 802.1Q VLAN, the packet is forwarded and the destination port transmits it to its attached network segment.
If the packet is not tagged with VLAN information, the ingress port tags the packet with its own PVID as a VID (if the port
is a tagging port). The switch then determines if the destination port is a member of the same VLAN (has the same VID) as
51
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
the ingress port. If it does not, the packet is dropped. If it has the same VID, the packet is forwarded and the destination port
transmits it on its attached network segment.
This process is referred to as ingress filtering, and is used to conserve bandwidth within the switch, by dropping packets that
are not on the same VLAN as the ingress port at the point of reception. This eliminates the subsequent processing of packets
that is just dropped by the destination port.
Default VLANs
The switch initially configures one VLAN, VID = 1, called ‘default.’ The factory default setting assigns all ports on the
switch to the ‘default.’
Packets cannot cross VLANs. If a member of one VLAN wants to connect to another VLAN, the link must be through an
external router.
NOTE: If no VLANs are configured on the switch, then all packets are forwarded to any destination
port. Packets with unknown source addresses are flooded to all ports. Broadcast and multicast packets
are also flooded to all ports.
VLAN Status
The VLAN List displays VLANs, VLAN membership and membershiop type. This window displays the ports on the switch
that are currently Egress or Tag ports. To view the following table, open the L2 features->VLAN folder and click the
VLAN Status Link.
This section contains the following topics:
• Defining VLAN Properties
• Configuring GVRP
52
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
53
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
2. Click the Add/Edit VLAN tab. The Add/Edit VLAN Information Page opens:
54
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Configuring GVRP
Generic Attribute Registration Protocol (GARP) is a general-purpose protocol that registers any network connectivity or
membership-style information. GARP defines a set of devices interested in a given network attribute, such as VLAN or
multicast address. When configuring GARP, ensure the following:
• The leave time must be greater than or equal to three times the join time.
• The leave-all time must be greater than the leave time.
Set the same GARP timer values on all Layer 2-connected devices. If the GARP timers are set differently on the Layer 2-
connected devices, the GARP application does not operate successfully.
GARP VLAN Registration Protocol (GVRP) is specifically provided for automatic distribution of VLAN membership
information between VLAN-aware bridges. GVRP allows VLAN-aware bridges to automatically learn VLANs to bridge
port mapping without requiring the individual configuration of each bridge and register VLAN membership. To define
GVRP on the device:
1. Click L2 Features > GVRP Settings. The GVRP Setting Page opens:
55
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
GRVP Global Setting Defines whether GRVP is enabled on the device. The possible field values are:
Enabled — Enables GRVP on the device.
Disabled — Disables GRVP on the device. This is the default value.
Unit Defines the stacking member’s Unit ID for which GVRP parameters are displayed.
From Port Defines the first port number that is displayed to which GVRP are assigned.
To Port Defines the last port number that is displayed to which GVRP are assigned.
PVID Defines the PVID assigned to the port.
GVRP Defines whether GVRP is enabled on the port. The possible field values are:
Enabled — Enables GVRP on the selected port.
Disabled — Disables GVRP on the selected port.
Ingress Defines whether Ingress checking is enabled on the device. The possible field values are:
Enabled — Enables Ingress filtering on the device. Ingress checking compares an
incoming VID tag packet with the PVID number assigned to the port. If the PVIDs vary,
the port drops the packet. This is the default value.
Disabled — Disables Ingress checking on the device.
Acceptable Frame Defines the packet type accepted on the port. The possible field values are:
Type Admit Tagged Only —Only tagged packets are accepted on the port.
Admit All — Both tagged and untagged packets are accepted on the port.
2. Select a stacking member in the Unit field.
3. Select the ports to and from which the GVRP parameters are displayed in the From/To Port fields.
4. Define the PVID, GVRP, Ingress, and Acceptable Frame Type fields.
5. Click . The GVRP is enabled, and the device is updated.
56
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Defining Trunking
The Trunking Configuration Page contains information for assigning ports to LAGs and defining LAG parameters. To
assign ports to LAGs:
1. Click L2 Features > Trunking. The Trunking Configuration Page opens:
Unit Defines the stacking member’s Unit ID for which LAG parameters are displayed.
Group ID Displays the LAG number.
Type Defines the LAG type. The possible field values are:
Static — The LAG is static; LACP is disabled on the LAG.
LACP — LACP is enabled on the device. This is the default value.
Ports Displays the ports which are included in the LAG.
2. Select a stacking unit in the Unit field.
3. Define the Group ID and Type fields.
4. Check the ports to be added to the LAG. The port numbers are displayed in the Ports field.
5. Click . The LAG settings are saved, and the device is updated.
57
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Traffic Segmentation
The Traffic Segmentation Page enables administrators to force traffic from source ports to bypass the Forwarding Database
(FDB), and forward all Unicast, Multicast and Broadcast traffic to a forwarding port, or uplink. Forwarding decisions by the
forwarding port overwrite those of the protected source port. To define Traffic Segmentation:
1. Click L2 Features > Traffic Segmentation. The Traffic Segmentation Page opens:
3. Click . The new traffic forwarding definition appears in the Traffic Segmentation table, and the
device is updated.
To delete a Traffic Segmentation entry:
1. Select the entry in the table.
2. Click . The entry is deleted, and the device is updated.
58
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Configuring LACP
LAG ports can contain different media types if the ports are operating at the same speed. Aggregated links can be set up
manually or automatically established by enabling LACP on the relevant links. Aggregate ports can be linked into link-
aggregation port-groups. Each group is comprised of ports with the same speed. The LACP Port Settings Page contains
fields for configuring LACP LAGs.
1. Click L2 features > LACP Port Settings. The LACP Port Settings Page opens:
Unit Defines the stacking member’s Unit ID for which LACP parameters are displayed.
From Port Defines the first port number that is displayed to which timeout and priority values are
assigned.
To Port Defines the last port number that is displayed to which timeout and priority values are
assigned.
Port-Priority (0-65535) Displays the LACP priority value for the port. The field range is 0-65535.
Timeout Defines the administrative LACP timeout. The possible field values are:
Short (3 Sec) — Defines the LACP timeout as 3 seconds. This is the default value.
Long (90 Sec) — Defines the LACP timeout as 90 seconds.
2. Select a stacking member in the Unit field.
3. Select the ports to and from which the LACP parameters are displayed in the From/To Port fields.
4. Define the Port-Priority and LACP Timeout fields.
5. Click . The LACP parameters are defined, and the device is updated.
59
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
60
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
16711450 seconds.
Host Timeout Defines the time the host waits to receive a message before timing out. The
default time is 260 seconds. The field range is 60-16711450 seconds.
Router Timeout Defines the time the Multicast router waits to receive a message before it
times out. The default value is 300 seconds. The field range is 1-16711450
seconds.
State Indicates if IGMP snooping is enabled on the VLAN. The possible field
values are:
Enable — Enables IGMP Snooping on the VLAN.
Disable — Disables IGMP Snooping on the VLAN.
Static Router Port Setting (Edit button) Displays the Static Router Ports Settings Page.
Multicast Entry Table (View Button) Displays the Multicast Entry Table.
61
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Host Timeout Defines the time the host waits to receive a message before timing out. The default
time is 260 seconds. The field range is 60-16711450 seconds.
Router Timeout Defines the time the Multicast router waits to receive a message before it times out.
The default value is 300 seconds. The field range is 1-16711450 seconds.
State Indicates if IGMP snooping is enabled on the VLAN. The possible field values are:
Enable — Enables IGMP Snooping on the VLAN.
Disable — Disables IGMP Snooping on the VLAN
Unit Defines the unit number.
Static Router Ports Defines the port numbers which can be added as static router ports.
Ports Indicates the units and allocated ports as static router ports.
Dynamic Router Ports Defines the port numbers which can be added as dynamic router ports.
3. Define the Leave Timer, Host Timeout, Router Timeout, State, Static and Dynamic Router Ports fields.
4. Click . Static Router Port Settings are defined, and the device is updated.
62
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
63
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
64
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
65
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
66
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Disabled – BPDU filtering is disabled on the device.
Bridge Priority (0 – 61440) Specifies the selected spanning tree instance device priority. The field range is 0-61440.
The default value is 32768.
Bridge Max Age (6- 40) Set to ensure old information is not circulated endlessly through redundant paths in the
network, preventing the effective propagation of the new information. Set by the Root
Bridge, this value aids in determining that the switch has spanning tree configuration
values consistent with other devices on the bridged LAN. If the value ages out and a
BPDU has still not been received from the Root Bridge, the switch will start sending its
own BPDU to all other switches for permission to become the Root Bridge. If your
switch has the lowest Bridge Identifier, it will become the Root Bridge. The user can
choose between 6 and 40 seconds. The default value is 20.
Bridge Hello Time (1 – 10) The interval between two transmissions of BPDU packets sent by the Root Bridge to
indicate to all other switches that it is indeed the Root Bridge. The default value is 2.
Bridge Forward Delay Defines the time any port on the switch is in the listening state while moving from the
(4 – 30) blocking state to the forwarding state. The default value is 15.
Max Hops (1 – 20) Specifies the total number of hops that occur before the BPDU is discarded. Once the
BPDU is discarded, the port information is aged out. The possible field range is 1-20.
The field default is 20 hops.
2. Select Enable/Disable in the STP Status field.
3. Define the STP Version, Forwarding BPDU, Bridge Priority, Bridge Max Age, Bridge Hello Time, Bridge
Forward Delay, and Max Hops fields.
4. Click . The Spanning Tree Global Parameters are defined, and the device is updated.
67
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Unit Indicates the stacking member for which the STP port settings are displayed.
From Port Defines the first port in a consecutive sequence of ports.
To Port Defines last port in a consecutive sequence of ports.
Cost (0=Auto) Defines a metric that indicates the relative cost of forwarding packets to the specified port list.
Port cost can be set automatically or as a metric value. The default value is 0 (auto).
0 (auto) — Setting 0 for the external cost automatically sets the speed for forwarding
packets to the specified port(s) in the list (for optimal efficiency). Default port cost:
100Mbps port = 200000. Gigabit port = 20000.
Value 1-20000 — Define a value between 1 and 20000 to determine the external cost. The
lower the number, the greater the probability the port will be chosen to forward packets.
68
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Edge Indicates whether the selected port is an edge port. The possible field values are:
True — Defines the port as an edge port. Edge ports cannot create loops; however, they
can lose edge port status if a topology change creates a potential for a loop. An edge port
normally should not receive BPDU packets. If a BPDU packet is received, it automatically
loses edge port status.
False — Indicates that the port does not have edge port status.
Forwarding BPDU Bridges use Bridge Protocol Data Units (BPDU) to provide spanning tree information. STP
BPDUs filtering is useful when a bridge interconnects two regions; each region needing a
separate spanning tree. BPDU filtering functions only when STP is disabled either globally or
on a single interface. The possible field values are:
Disabled – BPDU filtering is disabled on the port.
Enabled – BPDU filtering is enabled on the port (if STP is disabled).
Global – BPDU filtering functions according to the device-wide setting (see STP Bridge
Global Settings Page).
P2P Indicates whether the selected port is P2P is enabled. The possible field values are:
True — Indicates a point-to-point (P2P) shared link. P2P ports are similar to edge ports,
however they are restricted in that a P2P port must operate in full duplex. Like edge ports,
P2P ports transition to a forwarding state rapidly thus benefiting from RSTP.
False — Indicates that the port cannot have P2P status.
Auto — Allows the port to have P2P status whenever possible and operate as if the P2P
status were true. If the port cannot maintain this status, (for example if the port is forced to
half-duplex operation) the P2P status changes to operate as if the P2P value were False.
The default setting is True.
State Set to enable or disable STP for the selected group of ports. The default is Enabled. The port
STP State overrides the STP Global State
2. Define the Unit, From Port, To Port, Cost, Edge, P2P, and State fields.
3. Click . The STP Port Settings are defined, and the device is updated.
69
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
70
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
3. Click .
4. Click to an ID row to edit the ID value.
5. Define the new value.
6. Click . The Multiple Spanning Tree Configuration Identification is defined, and the device is
updated.
Field Description
Enabled — Enables the port for the specific instance.
Root — Provides the lowest cost path to forward packets to the root device.
Designated — Indicates the port or LAG through which the designated device is attached
to the LAN.
Alternate — Provides an alternate path to the root device from the root interface.
Backup — Provides a backup path to the designated port path toward the Spanning Tree
leaves. Backup ports occur only when two ports are connected in a loop by a point-to-point
link or when a LAN has two or more connections connected to a shared segment.
Disabled — Indicates the port is not participating in the Spanning Tree.
5. Click .
6. Click adjacent to an MSTI ID row to edit the values for Internal Path Cost and Priority.
72
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
2. Define the VID, Multicast MAC Address, Unit, and Egress fields.
74
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
4. Click .The Multicast forwarding settings are applied to the port, and the device is updated.
To restore the default settings:
1. Click The default settings are restored.
2. To edit a VID entry:
75
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
4
CONFIGURING QUALITY OF SERVICE
QoS is an implementation of the IEEE 802.1p standard that allows network administrators a method of reserving bandwidth
for important functions that require a large bandwidth or have a high priority, such as VoIP (voice-over Internet Protocol),
Web browsing applications, file server applications or video conferencing. Not only can a larger bandwidth be created, but
other less critical traffic can be limited, so excessive bandwidth can be saved. The Switch has separate hardware queues on
every physical port to which packets from various applications can be mapped to, and, in turn prioritized. View the
following map to see how the DGS-3100 series implements 802.1P priority queuing.
Understanding QoS
The Switch has four priority queues. These priority queues are labeled as 3 (the highest queue) to 0 (the lowest queue). The
four priority tags, specified in IEEE 802.1p are mapped to the Switch's priority tags as follows:
• Priority 0 is assigned to the Switch's Q0 queue.
• Priority 1 is assigned to the Switch's Q1 queue.
• Priority 2 is assigned to the Switch's Q2 queue.
• Priority 3 is assigned to the Switch's Q3 queue.
76
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
For strict priority-based scheduling, any packets residing in the higher priority queues are transmitted first. Multiple strict
priority queues empty based on their priority tags. Only when these queues are empty, are packets of lower priority
transmitted.
For weighted round-robin queuing, the number of packets sent from each priority queue depends upon the assigned weight.
For a configuration of eight CoS queues, A~H with their respective weight value: 8~1, the packets are sent in the following
sequence: A1, B1, C1, D1, E1, F1, G1, H1, A2, B2, C2, D2, E2, F2, G2, A3, B3, C3, D3, E3, F3, A4, B4, C4, D4, E4, A5,
B5, C5, D5, A6, B6, C6, A7, B7, A8, A1, B1, C1, D1, E1, F1, G1, H1.
For weighted round-robin queuing, if each CoS queue has the same weight value, then each CoS queue has an equal
opportunity to send packets just like round-robin queuing.
For weighted round-robin queuing, if the weight for a CoS is set to 0, then it will continue processing the packets from this
CoS until there are no more packets for this CoS. The other CoS queues that have been given a nonzero value, and
depending upon the weight, will follow a common weighted round-robin scheme.
Remember that the DGS-3100 series has four priority queues (and eight Classes of Service) for each port on the Switch.
This section contains the following topics:
• General Precautions for Rack-Mountable Products
• Configuring Storm Control
• Mapping Ports to Packet Priorities
• Mapping Priority to Classes (Queues)
• Configuring QoS Scheduling
• Defining Multi-Layer CoS Settings
77
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
3. Click . The bandwidth settings are defined, and the device is updated.
78
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
79
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
exception of the value zero.
2. Define the Unit, From Port, To Port, Storm Control Type, State, and Threshold fields.
3. Click . The storm control settings are configured, and the device is updated.
3. Click . Ports are mapped to packet priorities, and the device is updated.
80
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
81
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
3. Click . The QoS Scheduling Mechanism is configured, and the device is updated.
82
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
83
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
5
SECURITY FEATURES
This section contains information for enabling and configuring device security including user accounts.
• Configuring the Safeguard Engine
• Configuring VLANs
• Priority tagging is an IEEE 802.1p defined standard function designed to provide a means of managing traffic on
networks where many different types of data are transmitted simultaneously. It is intended to alleviate problems
associated with the delivery of time-critical data over congested networks. The quality of applications dependent on
such data, such as video conferencing, can be severely and adversely affected by even very small delays in transmission.
IEEE 802.1p standard-compliant network devices recognize the priority level of data packets and can assign priority labels
or tags to packets, as well as strip priority tags from packets. The priority tag determines the packet's degree of
expeditiousness and the queue to which it is assigned.
Priority tags are assigned values from 0 to 7, with 0 being assigned to the lowest priority data, and 7 to the highest.
Generally, tag 7 is used for data associated with video or audio applications, sensitive to even slight delays, or for data from
specified end users whose data transmissions warrant special consideration.
The switch enables increased definition for handling priority tagged data packets on the network. Using queues to manage
priority tagged data enables user-specification for the data’s relative priority to suit the needs of the network. Circumstances
can arise where it is advantageous to group two or more differently tagged packets into the same queue. Generally, however,
it is recommended that the highest priority queue, Queue 1, be reserved for data packets with a priority value of 7.
A weighted round robin system is employed on the switch to determine the rate at which the queues are emptied of packets.
The ratio used for clearing the queues is 4:1. This means that the highest priority queue, Queue 1, clears four packets for
every one packet cleared from Queue 0.
It is important that the priority queue settings on the switch are for all ports, and all devices connected to the switch are
affected. The priority queuing system is especially beneficial for networks that employ priority tag assignment capable
switches.
VLAN Description
A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the
physical layout. VLANs can be used to combine any collection of LAN segments into an autonomous user group that
appears as a single LAN. VLANs also logically segment the network into different broadcast domains so that packets are
forwarded only between ports within the VLAN. Typically, a VLAN corresponds to a particular subnet, although not
necessarily.
VLANs can enhance performance by conserving bandwidth, and improve security by limiting traffic to specific domains.
A VLAN is a collection of end nodes grouped by logic instead of physical location. End nodes that frequently communicate
with each other are assigned to the same VLAN, regardless of where they are physically on the network. Logically, a VLAN
can be equated to a broadcast domain, because broadcast packets are forwarded to only members of the VLAN on which the
broadcast was initiated.
85
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
86
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Port VLAN ID
Tagged packets (carrying the 802.1Q VID information) can be transmitted from one 802.1Q compliant network device to
another with the VLAN information intact. This allows 802.1Q VLANs to span network devices (and the entire network,
providing all network devices are 802.1Q compliant).
Not all network devices are 802.1Q compliant. Such devices are referred to as tag-unaware. 802.1Q devices are referred to
as tag-aware.
Prior to the adoption of 802.1Q VLANs, port-based and MAC-based VLANs were in common use. These VLANs relied
upon a Port VLAN ID (PVID) to forward packets. A packet received on a given port would be assigned that port's PVID
and then be forwarded to the port that corresponds to the packet's destination address (found in the switch's forwarding
table). If the PVID of the port receiving the packet is different from the PVID of the port that is to transmit the packet, the
switch drops the packet.
Within the switch, different PVIDs mean different VLANs (remember that two VLANs cannot communicate without an
external router). So, VLAN identification based upon the PVIDs cannot create VLANs that extend outside a given switch
(or switch stack).
Every physical port on a switch has a PVID. 802.1Q ports are also assigned a PVID, for use within the switch. If no VLANs
are defined on the switch, all ports are then assigned to a default VLAN with a PVID equal to 1. Untagged packets are
assigned the PVID of the port on which they were received. Forwarding decisions are based upon this PVID, in so far as
VLANs are concerned. Tagged packets are forwarded according to the VID contained within the tag. Tagged packets are
also assigned a PVID, but the PVID is not used to make packet forwarding decisions, the VID is.
Tag-aware switches must keep a table to relate PVIDs within the switch to VIDs on the network. The switch compares the
VID of a packet to be transmitted to the VID of the port that is to transmit the packet. If the two VIDs are different, the
switch drops the packet. As a result of the existence of the PVID for untagged packets, and the VID for tagged packets, tag-
aware and tag-unaware network devices can coexist on the same network.
A switch port can only have one PVID, but it can have as many VIDs that the switch’s memory storage capacity has in its
VLAN table, to store them.
As some devices on a network may be tag-unaware, a decision must be made at each port on a tag-aware device before
packets are transmitted; Should the packet to be transmitted have a tag or not? If the transmitting port is connected to a tag-
unaware device, the packet should be untagged. If the transmitting port is connected to a tag-aware device, the packet
should be tagged.
Ingress Filtering
A port on a switch where packets are flowing into the switch, and VLAN decisions must be made, is referred to as an
ingress port. If ingress filtering is enabled for a port, the switch examines the VLAN information in the packet header (if
present) and decides whether or not to forward the packet.
If the packet is tagged with VLAN information, the ingress port first determines if the ingress port itself is a member of the
tagged VLAN. If it is not, the packet is dropped. If the ingress port is a member of the 802.1Q VLAN, the switch determines
87
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
if the destination port is a member of the 802.1Q VLAN. If it is not, the packet is dropped. If the destination port is a
member of the 802.1Q VLAN, the packet is forwarded and the destination port transmits it to its attached network segment.
If the packet is not tagged with VLAN information, the ingress port tags the packet with its own PVID as a VID (if the port
is a tagging port). The switch then determines if the destination port is a member of the same VLAN (has the same VID) as
the ingress port. If it does not, the packet is dropped. If it has the same VID, the packet is forwarded and the destination port
transmits it on its attached network segment.
This process is referred to as ingress filtering, and is used to conserve bandwidth within the switch, by dropping packets that
are not on the same VLAN as the ingress port at the point of reception. This eliminates the subsequent processing of packets
that is just dropped by the destination port.
Default VLANs
The switch initially configures one VLAN, VID = 1, called ‘default.’ The factory default setting assigns all ports on the
switch to the ‘default.’
Packets cannot cross VLANs. If a member of one VLAN wants to connect to another VLAN, the link must be through an
external router.
NOTE: If no VLANs are configured on the switch, then all packets are forwarded to any destination
port. Packets with unknown source addresses are flooded to all ports. Broadcast and multicast packets
are also flooded to all ports.
VLAN Status
The VLAN List displays VLANs, VLAN membership and membershiop type. This window displays the ports on the switch
that are currently Egress or Tag ports. To view the following table, open the L2 features->VLAN folder and click the
VLAN Status Link.
This section contains the following topics:
• Defining VLAN Properties
• Configuring GVRP
88
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
89
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
4. Click the Add/Edit VLAN tab. The Add/Edit VLAN Information Page opens:
Configuring GVRP
Generic Attribute Registration Protocol (GARP) is a general-purpose protocol that registers any network connectivity or
membership-style information. GARP defines a set of devices interested in a given network attribute, such as VLAN or
multicast address. When configuring GARP, ensure the following:
• The leave time must be greater than or equal to three times the join time.
• The leave-all time must be greater than the leave time.
Set the same GARP timer values on all Layer 2-connected devices. If the GARP timers are set differently on the Layer 2-
connected devices, the GARP application does not operate successfully.
GARP VLAN Registration Protocol (GVRP) is specifically provided for automatic distribution of VLAN membership
information between VLAN-aware bridges. GVRP allows VLAN-aware bridges to automatically learn VLANs to bridge
port mapping without requiring the individual configuration of each bridge and register VLAN membership. To define
GVRP on the device:
13. Click L2 Features > GVRP Settings. The GVRP Setting Page opens:
91
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
GRVP Global Setting Defines whether GRVP is enabled on the device. The possible field values are:
Enabled — Enables GRVP on the device.
Disabled — Disables GRVP on the device. This is the default value.
Unit Defines the stacking member’s Unit ID for which GVRP parameters are displayed.
From Port Defines the first port number that is displayed to which GVRP are assigned.
To Port Defines the last port number that is displayed to which GVRP are assigned.
PVID Defines the PVID assigned to the port.
GVRP Defines whether GVRP is enabled on the port. The possible field values are:
Enabled — Enables GVRP on the selected port.
Disabled — Disables GVRP on the selected port.
Ingress Defines whether Ingress checking is enabled on the device. The possible field values are:
Enabled — Enables Ingress filtering on the device. Ingress checking compares an
incoming VID tag packet with the PVID number assigned to the port. If the PVIDs vary,
the port drops the packet. This is the default value.
Disabled — Disables Ingress checking on the device.
Acceptable Frame Defines the packet type accepted on the port. The possible field values are:
Type Admit Tagged Only —Only tagged packets are accepted on the port.
Admit All — Both tagged and untagged packets are accepted on the port.
14. Select a stacking member in the Unit field.
15. Select the ports to and from which the GVRP parameters are displayed in the From/To Port fields.
16. Define the PVID, GVRP, Ingress, and Acceptable Frame Type fields.
17. Click . The GVRP is enabled, and the device is updated.
•
• Configuring Port Security
• Configuring Guest VLANs
• Configuring Port Authentication 802.1X
• Defining RADIUS Settings
• Configuring Secure Shell Security
• Defining SSH Algorithm Settings
• Defining Application Authentication Settings
• Configuring the Authentication Server Hosts
•
• Defining the Login Methods
• Defining the Enable Methods
92
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
93
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
IP1 Access to Switch Defines the first management station IP address from which the device can be managed.
IP2 Access to Switch Defines the second management station IP address from which the device can be managed
IP3 Access to Switch Defines the third management station IP address from which the device can be managed.
2. Define the IP1, IP2, and IP3 Address fields to define the remote management stations.
3. Click . The management stations are defined, and the device is updated.
94
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
95
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Max Learning Addr Indicates the number of MAC addresses that can be learned on the port.
2. Define the Unit, From Port, To Port, Max Address (0-64), and Admin State fields.
96
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
97
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
98
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
value.
Disabled — Disables re-authenticating the port or MAC addresses after
the port or MAC address authentication has timed out.
Control Indicates the host status. If there is an asterisk (*), the port is either not
linked or is down. The possible field values are:
ForceUnauthorized — Indicates that either the port control is Force
Unauthorized and the port link is down, or the port control is Auto but a
client has not been authenticated via the port.
ForceAuthorized — Indicates that the port control is Forced Authorized,
and clients have full port access.
Auto — Indicates that the port control is Auto and a single client has
been authenticated via the port.
Unit Indicate the stacking member for which the 802.1X parameters are
displayed.
From Port Indicates the first port for which the 802.1X parameters are defined.
To Port Indicates the last port for which the 802.1X parameters are defined.
Mode Indicates the 802.1X mode enabled on the device. The possible field values
are:
Port Base — Enables 802.1X on ports. This is the default value.
MAC Base — Enables 802.1xon MAC addresses.
2. Enable or disable the 802.1X status in the 802.1X field.
3. Define the Mode field.
4. In the 802.1X Port Access Control section, define the time fields.
5. Set the ReAuthEnabled field and the Control fields.
6. Set the values in the Unit, From Port, and To Port fields.
7. Click . The 802.1x Access Control is configured, and the device is updated.
99
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
100
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
8. Click .
• To edit the Radius Server list, click adjacent to the required listed server. The upper fields display the
current values, which then can be edited.
• To delete a radius server from the list, click adjacent to the relative list entry. The radius servers are
defined, and the device is updated.
101
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
102
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
103
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
104
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
3. Click . The SSH Algorithm setting is defined, and the device is updated.
105
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
4. Click . The Application Authentication settings are defined, and the device is updated.
106
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
107
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
3. Click .The Authentication Host properties are defined, and the device is updated.
• To edit an authentication, click adjacent to the relevant IP Address on the list. The upper fields display the
current values, which then can be edited.
• To delete an authentication, click adjacent to the relevant IP Address on the list. The Authentication Server
settings are defined, and the device is updated.
108
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Method 2 Indicates the second method used to authenticate the network user. The possible field values
are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
Method 3 Indicates the third method used to authenticate the network user. The possible field values are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
Method 4 Indicates the fourth method used to authenticate the network user. The possible field values
are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
2. Define the Method List Name in the Method List Name field.
3. Select the methods used to authenticate network users in the Method 1, Method 2, Method 3 and, Method 4 fields.
4. Click . The Login methods are defined, and the device is updated.
• To edit the Method List, click adjacent to a Method List Name on the list. The upper fields display the
current values, which then can be edited.
• To delete a Method List Name, click . The Login Method Lists are defined, and the device is updated.
109
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
110
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Method 2 Indicates the second method used to authenticate the network user. The possible field values
are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
Method 3 Indicates the third method used to authenticate the network user. The possible field values are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
Method 4 Indicates the fourth method used to authenticate the network user. The possible field values
are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
2. Define the Method List Name in the Method List Name field.
3. Select the methods used to authenticate network users in the Method 1, Method 2, Method 3 and, Method 4 fields.
4. Click . The Enable method and passwords are defined, and the device is updated.
• To edit the Enable Method List, click adjacent to an Enable Method List Name on the list. The upper
fields display the current values, which then can be edited.
• To delete an Enable Method List Name, click . The Enable Method Lists are defined, and the device is
updated.
111
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
112
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
6
MONITORING THE DEVICE
This section contains information for view device and packet statistics as well as, viewing IGMP information and MAC
address information. This section includes the following topics:
• Viewing Stacking Information
• Viewing the CPU Utilization
• Viewing Port Utilization
• Viewing Packet Size Information
• Viewing Received Packet Statistics
• Viewing UMB_cast Packet Statistics
• Viewing Transmitted Packet Statistics
• Viewing RADIUS Authenticated Session Statistics
• Viewing the ARP Table
• Viewing Router Ports
• Viewing Session Table
• Viewing IGMP Group Information
• Defining Dynamic and Static MAC Addresses
• Viewing System Log
113
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Master ID Displays the Stacking Master Unit ID number. The Stacking Master Unit is always assigned the
unit ID 1.
Backup ID Displays the Backup Master Unit ID number. The Backup Master Unit is always assigned the
unit ID 2.
Box ID Displays the Unit ID numbers assigned to the stacking members.
Runtime version Indicates the software version running on the device.
H/W version Displays the stacking member’s hardware version.
114
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
115
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
4. Click . A sample record of CPU utilization is stored, and the device is updated.
116
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
4. Click . A sample record of CPU port utilization is stored, and the device is updated.
117
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
2. Click . A sample record of packet size analysis is stored, and the device is updated.
3. Define the Show/Hide field.
4. To view the graph as a table, click View Table.
118
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
119
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
120
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
121
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Packets checked — Displays the total amount of transmitted packets.
2. Define the Unit and Port fields.
122
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
123
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
124
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
125
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
126
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
127
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
128
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
4. Click .
129
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
130
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
7
MANAGING POWER OVER ETHERNET DEVICES
Power over Ethernet (PoE) provides power to devices over existing LAN cabling, without updating or modifying the
network infrastructure. Power over Ethernet removes the necessity of placing network devices next to power sources. Power
over Ethernet can be used with:
• IP Phones
• Wireless Access Points
• IP Gateways
• Audio and video remote monitoring
Powered Devices are devices which receive power from the DGS-3100 series device power supplies, for example IP phones.
Powered Devices are connected to the DGS-3100 series device via Ethernet ports.
PoE is enabled only on the DGS-3100-24P and DGS-3100-48P devices.
This section includes the following topics:
• Defining PoE System Information
• Displaying and Editing PoE System Information
131
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Voltage (W) Indicates the amount of voltage assigned to the powered device connected to the selected interface.
Current (mA) Indicates the amount of power assigned to the provided powered device.
Classification Indicates Power consumption classification of the powered device. The possible field values are:
Class 0 — Indicates the power consumption is 15.4W, which is the maximum output class.
Class 1— Indicates the power consumption is 4W.
132
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Fields Description
Class 2 — Indicates the power consumption is 7W.
Class 3 — Indicates the power consumption is 15.4W.
Status Indicates the inline power source status. The possible field values are:
Normal — Indicates that the power supply unit is functioning.
Off — Indicates that the power supply unit is not functioning.
Faulty — Indicates that the power supply unit is functioning, but an error has occurred. For
example, a power overload or a short circuit.
2. Define the Unit, From Port, To Port, PoE Enable and Power Limit fields.
3. Click . The system PoE parameters are defined, and the device is updated.
133
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
134
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
8
DEFINING ACCESS PROFILE LISTS
Access Control Lists (ACL) allow network managers to define classification actions and rules for specific ingress ports.
Packets entering an ingress port with an active ACL are either admitted, denied or subject to Quality of Service action.
For example, a network administrator defines an ACL rule that states port number 20 can receive TCP packets, however, if
a UDP packet is received, the packet is dropped.
Access Profiles and Access Rules that are made of the filters determine traffic classifications.
This section cotains the following topics:
• Viewing the CPU Utilization
• Defining Access Profile Lists
• Defining Access Rules Lists
• ACL Finder Page
52
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
From Defines the origin of accessible packets. The possible values are:
Any — Indicates ACL action will be on packets from any source.
MAC Address — Indicates ACL action will be on packets from this MAC address.
IPv4 Addresses — Indicates ACL action will be on packets from this IPv4 source address.
To Defines the destination of accessible packets. The possible values are:
Any — Indicates ACL action will take placed for packets with any destination.
MAC Address — Indicates ACL action will take place for packets to this MAC address
only.
IPv4 Addresses — Indicates ACL action will take place on packets to this IPv4 address.
Service Type Defines the type of service. The possible values are:
Any — Indicates ACL action will take place for packets of all service types.
Ethertype — Specifies Ethertype packet filtering.
ICMP All — Specifies an ICMP type and code message or filtering ICMP packets.
IGMP — IGMP packets can be filtered by IGMP message type.
TCP ALL — Matches the packet to the TCP Port
TCP Source Port — Matches the packet to the TCP Source Port
TCP Destination Port — Matches the packet to the TCP Destination Port
53
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
54
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
• To display an ACL’s profile details, click . The ACL profile details are displayed below the
ACL table.
• To define or show an access rule, click . The Add Access Rule Page opens. (See ‘Defining
Access Rules Lists’ section, below.)
• To delete an ACL profile, click . The ACL profile is deleted.
2. To add an ACL profile Click . The Access Profile List Page opens:
55
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
4. Click The Access Profile List Page updates accordingly, enabling selection of the packet field to create
filtering masks.
56
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
57
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Source MAC Mask Defines the range of source addresses relative to the ACL rules (0=ignore, 1=check).
For example, to set 00:00:00:00:10:XX, use mask FF:FF:FF:FF:FF:00.
Destination MAC Mask Defines the range of destination addresses relative to the ACL rules (0=ignore,
1=check).
For example, to set 00:00:00:00:10:XX, use mask FF:FF:FF:FF:FF:00.
2. Select Source MAC Mask and/or Destination MAC Mask. The Mask Generate button is active.
3. Enter a MAC mask in the box adjacent to the Mask Generate button.
Alternatively, click . The Generate Mask by range fields appear.
Enter a MAC address range into the Generate Mask by range fields, and click . The mask is
generated.
4. Click . The ACL profile is added, and the device is updated.
To define L2 802.1Q VLAN ACL profile:
1. Click the 802.1Q VLAN button. The ACL Profile L2 ACL Tagged Page updates to show the following:
58
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
1. Click the Ether Type button. The ACL Profile L2 ACL Tagged Page updates to show the following:
NOTE: A combination of one or several filtering masks can be selected simultaneously. The page
updates with the relevant field(s).
59
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
If L2 ACL Untagged is selected, the page updates as follows (without the 802.1Q VLAN field):
60
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
This option defines whether or not the DSCP field is checked for a match.
1. Click the IPv4 DSCP button. The Add ACL Profile L3 Page updates to show the following:
Field Description
Source IP Mask Defines the range of source IP addresses, relevant to the ACL rules. (0=ignore,
1=check).
For example, to set 176.212.XX.XX, use mask 255.255.0.0
Destination IP Mask Defines the range of destination IP addresses, relevant to the ACL rules. (0=ignore,
1=check).
For example, to set 176.212.XX.XX, use mask 255.255.0.0
2. Select Source IP Mask and/or Destination IP Mask. The Mask Generate button is active.
3. Enter an IP mask in the box adjacent to the Mask Generate button.
Alternatively, click . The Generate Mask by range fields appear.
Enter an IP address range into the Generate Mask by range fields, and click . The mask is generated.
63
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
64
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Source Port Mask Defines the range of source Ports relevant to the ACL rules. (0=ignore, 1=check).
For example, to set 0 – 15, set mask of F.
Destination Port Mask Defines the range of destination IP addresses, relevant to the ACL rules. (0=ignore,
1=check).
For example, to set 0 – 15, set mask of F.
2. Select Source Port Mask and/or Destination Port Mask. The Mask Generate button is active.
3. Enter a port ID in the box adjacent to the Mask Generate button.
Alternatively, click . The Generate Mask by range fields appear.
Enter a port ID range into the Generate Mask by range fields, and click . The mask is generated.
65
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
The ACL Profile L3 UDP Port Page contains the following fields:
Field Description
66
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field Description
Source Port Mask Defines the range of source Ports relevant to the ACL rules. (0=ignore, 1=check).
For example, to set 0 – 15, set mask of F.
Destination Port Mask Defines the range of destination IP addresses, relevant to the ACL rules. (0=ignore,
1=check).
For example, to set 0 – 15, set mask of F.
2. Select Source Port Mask and/or Destination Port Mask. The Mask Generate button is active.
3. Enter a port ID in the box adjacent to the Mask Generate button.
Alternatively, click . The Generate Mask by range fields appear.
Enter a port ID range into the Generate Mask by range fields, and click . The mask is generated.
NOTE: A combination of one or several filtering masks can be selected simultaneously. The page
updates with the relevant field(s).
67
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
68
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Profile ID Displays the Profile ID to which the rule is being added to.
Source ID Displays the source IP address
TCP Source Port Displays The TCP Source Port
TCP Flag Mask Indicates if TCP flag mask is active.
Access ID Defines the Access ID
Type Displays the profile type (IP based).
Source IP Address Displays the source IP address.
TCP Flag Defines the indicated TCP flag that can be triggered.
Source Port Displays the TCP source port.
Ports Defines the source ports.
Action Defines the action to be taken The possible values are:
Permit — Forwards packets if all other ACL criteria are met.
Deny — Drops packets if all other ACL criteria is met.
Rate Limiting — Rate limiting is activated if all other ACL criteria are met.
Change 1P priority — VPT (CoS) value is changed if all other ACL criteria is met.
Replace DSCP — Reassigns a new DSCP value to the packet if all other ACL
criteria are met.
2. Define the Rule Detail fields.
3. Click . The rule is changed, and the device is updated.
69
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
70
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
71
Subject to the terms and conditions set forth herein, D-Link Systems, Inc. (“D-Link”) provides this Limited Warranty:
•
Only to the person or entity that originally purchased the product from D-Link or its authorized reseller or distributor, and
•
Only for products purchased and delivered within the fifty states of the United States, the District of Columbia, U.S. Possessions or
Protectorates, U.S. Military Installations, or addresses with an APO or FPO.
Limited Warranty: D-Link warrants that the hardware portion of the D-Link product described below (“Hardware”) will be free from material
defects in workmanship and materials under normal use from the date of original retail purchase of the product, for the period set forth below
(“Warranty Period”), except as otherwise stated herein.
Limited Lifetime Warranty for the product is defined as follows:
•
Hardware: For as long as the original customer/end user owns the product, or five (5) years after product discontinuance, whichever occurs
first (excluding power supplies and fans)
•
Power supplies and fans: Three (3) Year
•
Spare parts and spare kits: Ninety (90) days
The customer's sole and exclusive remedy and the entire liability of D-Link and its suppliers under this Limited Warranty will be, at D-Link’s
option, to repair or replace the defective Hardware during the Warranty Period at no charge to the original owner or to refund the actual
purchase price paid. Any repair or replacement will be rendered by D-Link at an Authorized D-Link Service Office. The replacement
hardware need not be new or have an identical make, model or part. D-Link may, at its option, replace the defective Hardware or any part
thereof with any reconditioned product that D-Link reasonably determines is substantially equivalent (or superior) in all material respects to
the defective Hardware. Repaired or replacement hardware will be warranted for the remainder of the original Warranty Period or ninety (90)
days, whichever is longer, and is subject to the same limitations and exclusions. If a material defect is incapable of correction, or if D-Link
determines that it is not practical to repair or replace the defective Hardware, the actual price paid by the original purchaser for the defective
Hardware will be refunded by D-Link upon return to D-Link of the defective Hardware. All Hardware or part thereof that is replaced by D-Link,
or for which the purchase price is refunded, shall become the property of D-Link upon replacement or refund.
Limited Software Warranty: D-Link warrants that the software portion of the product (“Software”) will substantially conform to D-Link’s then
current functional specifications for the Software, as set forth in the applicable documentation, from the date of original retail purchase of the
Software for a period of ninety (90) days (“Software Warranty Period”), provided that the Software is properly installed on approved
hardware and operated as contemplated in its documentation. D-Link further warrants that, during the Software Warranty Period, the
magnetic media on which D-Link delivers the Software will be free of physical defects. The customer's sole and exclusive remedy and the
entire liability of D-Link and its suppliers under this Limited Warranty will be, at D-Link’s option, to replace the non-conforming Software (or
defective media) with software that substantially conforms to D-Link’s functional specifications for the Software or to refund the portion of the
actual purchase price paid that is attributable to the Software. Except as otherwise agreed by D-Link in writing, the replacement Software is
provided only to the original licensee, and is subject to the terms and conditions of the license granted by D-Link for the Software.
Replacement Software will be warranted for the remainder of the original Warranty Period and is subject to the same limitations and
exclusions. If a material non-conformance is incapable of correction, or if D-Link determines in its sole discretion that it is not practical to
replace the non-conforming Software, the price paid by the original licensee for the non-conforming Software will be refunded by D-Link;
provided that the non-conforming Software (and all copies thereof) is first returned to D-Link. The license granted respecting any Software
for which a refund is given automatically terminates.
Non-Applicability of Warranty: The Limited Warranty provided hereunder for Hardware and Software portions of D-Link's products will not
be applied to and does not cover any refurbished product and any product purchased through the inventory clearance or liquidation sale or
other sales in which D-Link, the sellers, or the liquidators expressly disclaim their warranty obligation pertaining to the product and in that
case, the product is being sold "As-Is" without any warranty whatsoever including, without limitation, the Limited Warranty as described
herein, notwithstanding anything stated herein to the contrary.
Submitting A Claim: The customer shall return the product to the original purchase point based on its return policy. In case the return policy
period has expired and the product is within warranty, the customer shall submit a claim to D-Link as outlined below:
• The customer must submit with the product as part of the claim a written description of the Hardware defect or Software
nonconformance in sufficient detail to allow D-Link to confirm the same, along with proof of purchase of the product (such as a copy of the
dated purchase invoice for the product) if the product is not registered.
• The customer must obtain a Case ID Number from D-Link Technical Support at 1-877-453-5465, who will attempt to assist the
customer in resolving any suspected defects with the product. If the product is considered defective, the customer must obtain a Return
Material Authorization (“RMA”) number by completing the RMA form and entering the assigned Case ID Number at https://rma.dlink.com/.
52
• After an RMA number is issued, the defective product must be packaged securely in the original or other suitable shipping package
to ensure that it will not be damaged in transit, and the RMA number must be prominently marked on the outside of the package. Do not
include any manuals or accessories in the shipping package. D-Link will only replace the defective portion of the product and will not ship
back any accessories.
• The customer is responsible for all in-bound shipping charges to D-Link. No Cash on Delivery (“COD”) is allowed. Products sent
COD will either be rejected by D-Link or become the property of D-Link. Products shall be fully insured by the customer and shipped to D-
Link Systems, Inc., 17595 Mt. Herrmann, Fountain Valley, CA 92708. D-Link will not be held responsible for any packages that are lost in
transit to D-Link. The repaired or replaced packages will be shipped to the customer via UPS Ground or any common carrier selected by D-
Link. Return shipping charges shall be prepaid by D-Link if you use an address in the United States, otherwise we will ship the product to you
freight collect. Expedited shipping is available upon request and provided shipping charges are prepaid by the customer.
D-Link may reject or return any product that is not packaged and shipped in strict compliance with the foregoing requirements, or for which
an RMA number is not visible from the outside of the package. The product owner agrees to pay D-Link’s reasonable handling and return
shipping charges for any product that is not packaged and shipped in accordance with the foregoing requirements, or that is determined by
D-Link not to be defective or non-conforming.
What Is Not Covered: The Limited Warranty provided herein by D-Link does not cover: Products that, in D-Link’s judgment, have been
subjected to abuse, accident, alteration, modification, tampering, negligence, misuse, faulty installation, lack of reasonable care, repair or
service in any way that is not contemplated in the documentation for the product, or if the model or serial number has been altered, tampered
with, defaced or removed; Initial installation, installation and removal of the product for repair, and shipping costs; Operational adjustments
covered in the operating manual for the product, and normal maintenance; Damage that occurs in shipment, due to act of God, failures due
to power surge, and cosmetic damage; Any hardware, software, firmware or other products or services provided by anyone other than D-Link;
and Products that have been purchased from inventory clearance or liquidation sales or other sales in which D-Link, the sellers, or the
liquidators expressly disclaim their warranty obligation pertaining to the product. While necessary maintenance or repairs on your Product
can be performed by any company, we recommend that you use only an Authorized D-Link Service Office. Improper or incorrectly performed
maintenance or repair voids this Limited Warranty.
Disclaimer of Other Warranties: EXCEPT FOR THE LIMITED WARRANTY SPECIFIED HEREIN, THE PRODUCT IS PROVIDED “AS-IS”
WITHOUT ANY WARRANTY OF ANY KIND WHATSOEVER INCLUDING, WITHOUT LIMITATION, ANY WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IF ANY IMPLIED WARRANTY CANNOT BE
DISCLAIMED IN ANY TERRITORY WHERE A PRODUCT IS SOLD, THE DURATION OF SUCH IMPLIED WARRANTY SHALL BE
LIMITED TO NINETY (90) DAYS. EXCEPT AS EXPRESSLY COVERED UNDER THE LIMITED WARRANTY PROVIDED HEREIN, THE
ENTIRE RISK AS TO THE QUALITY, SELECTION AND PERFORMANCE OF THE PRODUCT IS WITH THE PURCHASER OF THE
PRODUCT.
Limitation of Liability: TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK IS NOT LIABLE UNDER ANY CONTRACT,
NEGLIGENCE, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY LOSS OF USE OF THE PRODUCT,
INCONVENIENCE OR DAMAGES OF ANY CHARACTER, WHETHER DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
(INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOSS OF REVENUE OR PROFIT, WORK STOPPAGE,
COMPUTER FAILURE OR MALFUNCTION, FAILURE OF OTHER EQUIPMENT OR COMPUTER PROGRAMS TO WHICH D-LINK’S
PRODUCT IS CONNECTED WITH, LOSS OF INFORMATION OR DATA CONTAINED IN, STORED ON, OR INTEGRATED WITH ANY
PRODUCT RETURNED TO D-LINK FOR WARRANTY SERVICE) RESULTING FROM THE USE OF THE PRODUCT, RELATING TO
WARRANTY SERVICE, OR ARISING OUT OF ANY BREACH OF THIS LIMITED WARRANTY, EVEN IF D-LINK HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES. THE SOLE REMEDY FOR A BREACH OF THE FOREGOING LIMITED WARRANTY IS REPAIR,
REPLACEMENT OR REFUND OF THE DEFECTIVE OR NON-CONFORMING PRODUCT. THE MAXIMUM LIABILITY OF D-LINK UNDER
THIS WARRANTY IS LIMITED TO THE PURCHASE PRICE OF THE PRODUCT COVERED BY THE WARRANTY. THE FOREGOING
EXPRESS WRITTEN WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ANY OTHER WARRANTIES OR
REMEDIES, EXPRESS, IMPLIED OR STATUTORY.
Governing Law: This Limited Warranty shall be governed by the laws of the State of California. Some states do not allow exclusion or
limitation of incidental or consequential damages, or limitations on how long an implied warranty lasts, so the foregoing limitations and
exclusions may not apply. This Limited Warranty provides specific legal rights and you may also have other rights which vary from state to
state.
Trademarks: D-Link is a registered trademark of D-Link Systems, Inc. Other trademarks or registered trademarks are the property of their
respective owners.
Copyright Statement: No part of this publication or documentation accompanying this product may be
reproduced in any form or by any means or used to make any derivative such as translation,
transformation, or adaptation without permission from D-Link Corporation/D-Link Systems, Inc., as
stipulated by the United States Copyright Act of 1976 and any amendments thereto. Contents are subject
to change without prior notice. Copyright 2007 by D-Link Corporation/D-Link Systems, Inc. All rights
reserved.
CE Mark Warning: This is a Class A product. In a residential environment, this product may cause radio interference, in which case the user
may be required to take adequate measures.
Gover ning Law: This Limited Warranty shall be governed by the laws of the State of California. Some states do not allow exclusion or
limitation of incidental or consequential damages, or limitations on how long an implied warranty lasts, so the foregoing limitations and
exclusions may not apply. This limited warranty provides specific legal rights and the product owner may also have other rights which
vary from state to state.
Trademarks: D-Link is a registered trademark of D-Link Systems, Inc. Other trademarks or registered trademarks are the property of
their respective manufacturers or owners.
53
FCC Statement: This equipment has been tested and found to comply with the limits for a
Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a commercial installation. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed and
used in accordance with the instructions, may cause harmful interference to radio
communication. However, there is no guarantee that interference will not occur in a particular
installation. Operation of this equipment in a residential environment is likely to cause harmful
interference to radio or television reception. If this equipment does cause harmful interference
to radio or television reception, which can be determined by turning the equipment off and on,
the user is encouraged to try to correct the interference by one or more of the following
measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
For detailed warranty information applicable to products purchased outside the United States, please contact the
corresponding local D-Link office.
54
Product Registration
55
LIMITED WARRANTY
D-Link provides this limited warranty for its product only to the person or entity who originally
purchased the product from D-Link or its authorized reseller or distributor. D-Link would fulfill
the warranty obligation according to the local warranty policy in which you purchased our
products.
Limited Hardware Warranty: D-Link warrants that the hardware portion of the D-Link
products described below (“Hardware”) will be free from material defects in workmanship and
materials from the date of original retail purchase of the Hardware, for the period set forth
below applicable to the product type (“Warranty Period”) if the Hardware is used and serviced
in accordance with applicable documentation; provided that a completed Registration Card is
returned to an Authorized D-Link Service Office within ninety (90) days after the date of
original retail purchase of the Hardware. If a completed Registration Card is not received by an
authorized D-Link Service Office within such ninety (90) period, then the Warranty Period
shall be ninety (90) days from the date of purchase.
D-Link’s sole obligation shall be to repair or replace the defective Hardware at no charge to
the original owner. Such repair or replacement will be rendered by D-Link at an Authorized D-
Link Service Office. The replacement Hardware need not be new or of an identical make,
model or part; D-Link may in its discretion may replace the defective Hardware (or any part
thereof) with any reconditioned product that D-Link reasonably determines is substantially
equivalent (or superior) in all material respects to the defective Hardware. The Warranty
Period shall extend for an additional ninety (90) days after any repaired or replaced Hardware
is delivered. If a material defect is incapable of correction, or if D-Link determines in its sole
discretion that it is not practical to repair or replace the defective Hardware, the price paid by
the original purchaser for the defective Hardware will be refunded by D-Link upon return to D-
Link of the defective Hardware. All Hardware (or part thereof) that is replaced by D-Link, or for
which the purchase price is refunded, shall become the property of D-Link upon replacement
or refund.
Limited Software Warranty: D-Link warrants that the software portion of the product (“Software”)
will substantially conform to D-Link’s then current functional specifications for the Software, as set
forth in the applicable documentation, from the date of original delivery of the Software for a period of
ninety (90) days (“Warranty Period”), if the Software is properly installed on approved hardware and
operated as contemplated in its documentation. D-Link further warrants that, during the Warranty
Period, the magnetic media on which D-Link delivers the Software will be free of physical defects.
56
D-Link’s sole obligation shall be to replace the non-conforming Software (or defective media)
with software that substantially conforms to D-Link’s functional specifications for the Software.
Except as otherwise agreed by D-Link in writing, the replacement Software is provided only to
the original licensee, and is subject to the terms and conditions of the license granted by D-Link
for the Software. The Warranty Period shall extend for an additional ninety (90) days after any
replacement Software is delivered. If a material non-conformance is incapable of correction, or
if D-Link determines in its sole discretion that it is not practical to replace the non-conforming
Software, the price paid by the original licensee for the non-conforming Software will be
refunded by D-Link; provided that the non-conforming Software (and all copies thereof) is first
returned to D-Link. The license granted respecting any Software for which a refund is given
automatically terminates.
Registration Card. The Registration Card provided at the back of this manual must be
completed and returned to an Authorized D-Link Service Office for each D-Link product
within ninety (90) days after the product is purchased and/or licensed. The
addresses/telephone/fax list of the nearest Authorized D-Link Service Office is provided in the
back of this manual. FAILURE TO PROPERLY COMPLETE AND TIMELY RETURN THE
REGISTRATION CARD MAY AFFECT THE WARRANTY FOR THIS PRODUCT.
Submitting A Claim. Any claim under this limited warranty must be submitted in writing
before the end of the Warranty Period to an Authorized D-Link Service Office. The claim must
include a written description of the Hardware defect or Software nonconformance in sufficient
detail to allow D-Link to confirm the same. The original product owner must obtain a Return
Material Authorization (RMA) number from the Authorized D-Link Service Office and, if
requested, provide written proof of purchase of the product (such as a copy of the dated
purchase invoice for the product) before the warranty service is provided. After an RMA
number is issued, the defective product must be packaged securely in the original or other
suitable shipping package to ensure that it will not be damaged in transit, and the RMA number
must be prominently marked on the outside of the package. The packaged product shall be
insured and shipped to Authorized D-Link Service Office with all shipping costs prepaid. D-
Link may reject or return any product that is not packaged and shipped in strict compliance
with the foregoing requirements, or for which an RMA number is not visible from the outside
of the package. The product owner agrees to pay D-Link’s reasonable handling and return
shipping charges for any product that is not packaged and shipped in accordance with the
foregoing requirements, or that is determined by D-Link not to be defective or non-conforming.
57
Products that have been subjected to abuse, accident, alteration, modification, tampering,
negligence, misuse, faulty installation, lack of reasonable care, repair or service in any way that
is not contemplated in the documentation for the product, or if the model or serial number has
been altered, tampered with, defaced or removed;
Initial installation, installation and removal of the product for repair, and shipping costs;
Operational adjustments covered in the operating manual for the product, and normal
maintenance;
Damage that occurs in shipment, due to act of God, failures due to power surge, and cosmetic
damage;
and
Any hardware, software, firmware or other products or services provided by anyone other than
D-Link.
GOVERNING LAW: This Limited Warranty shall be governed by the laws of the state of
California.
58
Some states do not allow exclusion or limitation of incidental or consequential damages, or
limitations on how long an implied warranty lasts, so the foregoing limitations and exclusions
may not apply. This limited warranty provides specific legal rights and the product owner may
also have other rights which vary from state to state.
Trademarks
Copyright 2007 D-Link Corporation. Contents subject to change without prior notice. D-Link is
a
registered trademark of D-Link Corporation/D-Link Systems, Inc. All other trademarks belong
to their
respective proprietors.
Copyright Statement
No part of this publication may be reproduced in any form or by any means or used to make
any derivative such as translation, transformation, or adaptation without permission from D-
Link Corporation/D-Link Systems Inc., as stipulated by the United States Copyright Act of
1976.
FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the
FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with this manual, may cause harmful interference to radio communications. Operation of
this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct
the interference at his own expense.
59
Technical Support
Technical Support
You can find software updates and user documentation on the D-Link websites.
If you require product support, we encourage you to browse our FAQ section on
the Web Site before contacting the Support line. We have many FAQ’s which
we hope will provide you a speedy resolution for your problem.
60
Technische Unterstützung
Web: http://www.dlink.de
E-Mail: support@dlink.de
Telefon: +49 (1805)2787
0,12€/Min aus dem Festnetz der Deutschen Telekom.
61
Assistance technique
Vous trouverez la documentation et les logiciels les plus récents sur le site
web D-Link.
62
Asistencia Técnica
63
Supporto tecnico
URL : http://www.dlink.it/supporto.html
Email: tech@dlink.it
64
Technical Support
You can find software updates and user documentation on the D-Link website.
D-Link provides free technical support for customers within Benelux for the
duration of the warranty period on this product.
Benelux customers can contact D-Link technical support through our website, or
by phone.
65
Pomoc techniczna
66
Technická podpora
Web: http://www.dlink.cz/suppport/
E-mail: support@dlink.cz
Telefon: 224 247 503
67
Technikai Támogatás
D-Link Magyarország
1074 Budapest, Alsóerdősor u. 6. – R70 Irodaház 1 em.
Tel. : 06 1 461-3001
Fax : 06 1 461-3004
email : support@dlink.hu
URL : http://www.dlink.hu
68
Teknisk Support
Du kan finne programvare oppdateringer og bruker
dokumentasjon på D-Links web sider.
Teknisk Support:
D-Link Teknisk telefon Support:
800 10 610
(Hverdager 08:00-20:00)
69
Teknisk Support
Du finder software opdateringer og bruger-
dokumentation på D-Link’s hjemmeside.
70
Teknistä tukea asiakkaille
Suomessa:
D-Link tarjoaa teknistä tukea asiakkailleen.
Tuotteen takuun voimassaoloajan.
Tekninen tuki palvelee seuraavasti:
Arkisin klo. 9 - 21
numerosta
0800-114 677
Internetin kautta
Ajurit ja lisätietoja tuotteista.
http://www.dlink.fi
Sähköpostin kautta
voit myös tehdä kyselyitä.
71
Teknisk Support
På vår hemsida kan du hitta mer information om
mjukvaru uppdateringar och annan användarinformation.
72
Suporte Técnico
Você pode encontrar atualizações de software e documentação de
utilizador no site de D-Link Portugal http://www.dlink.pt.
Assistência Técnica:
Email: soporte@dlink.es
http://www.dlink.pt/support/
ftp://ftp.dlink.es
73
Τεχνική Υποστήριξη
Μπορείτε να βρείτε software updates και πληροφορίες για τη χρήση των
προϊόντων στις ιστοσελίδες της D-Link
e-mail: support@dlink.gr
http://www.dlink.gr
ftp://ftp.dlink.it
74
Technical Support
You can find software updates and user documentation on the D-Link website.
Tech Support for customers in
Australia:
Tel: 1300-766-868
Monday to Friday 8:00am to 8:00pm EST
Saturday 9:00am to 1:00pm EST
http://www.dlink.com.au
e-mail: support@dlink.com.au
India:
Tel: 1800-222-002
Monday to Friday 9:30AM to 7:00PM
http://www.dlink.co.in/support/productsupport.aspx
Indonesia, Malaysia, Singapore and Thailand:
Tel: +62-21-5731610 (Indonesia)
Tel: 1800-882-880 (Malaysia)
Tel: +65 66229355 (Singapore)
Tel: +66-2-719-8978/9 (Thailand)
Monday to Friday 9:00am to 6:00pm
http://www.dlink.com.sg/support/
e-mail: support@dlink.com.sg
Korea:
Tel: +82-2-890-5496
Monday to Friday 9:00am to 6:00pm
http://www.d-link.co.kr
e-mail: lee@d-link.co.kr
New Zealand:
Tel: 0800-900-900
Monday to Friday 8:30am to 8:30pm
Saturday 9:00am to 5:00pm
http://www.dlink.co.nz
e-mail: support@dlink.co.nz
75
Technical Support
You can find software updates and user documentation on the D-Link website.
Tech Support for customers in
Egypt:
Tel: +202-2919035 or +202-2919047
Sunday to Thursday 9:00am to 5:00pm
http://support.dlink-me.com
e-mail: amostafa@dlink-me.com
Iran:
Tel: +98-21-88822613
Sunday to Thursday 9:00am to 6:00pm
http://support.dlink-me.com
e-mail: support.ir@dlink-me.com
Israel:
Tel: +972-9-9715701
Sunday to Thursday 9:00am to 5:00pm
http://www.dlink.co.il/support/
e-mail: support@dlink.co.il
Pakistan:
Tel: +92-21-4548158 or +92-21-4548310
Sunday to Thursday 9:00am to 6:00pm
http://support.dlink-me.com
e-mail: support.pk@dlink-me.com
South Africa and Sub Sahara Region:
Tel: +27-12-665-2165
08600 DLINK (for South Africa only)
Monday to Friday 8:30am to 9:00pm South Africa Time
http://www.d-link.co.za
Turkey:
Tel: +90-212-2895659
Monday to Friday 9:00am to 6:00pm
http://www.dlink.com.tr
e-mail: turkiye@dlink-me.com
e-mail: support@d-link.co.za
U.A.E and North Africa:
Tel: +971-4-391-6480 (U.A.E)
Sunday to Wednesday 9:00am to 6:00pm GMT+4
Thursday 9:00am to 1:00pm GMT+4
http://support.dlink-me.com
e-mail: support@dlink-me.com
76
Техническая поддержка
Обновления программного обеспечения и документация
доступны на Интернет-сайте D-Link.
77
Asistencia Técnica
D-Link Latin América pone a disposición de sus clientes, especificaciones,
documentación y software mas reciente a través de nuestro Sitio Web
www.dlinkla.com
El servicio de soporte técnico tiene presencia en numerosos países de la
Región Latino América, y presta asistencia gratuita a todos los clientes de
D-Link, en forma telefónica e internet, a través de la casilla
soporte@dlinkla.com
Soporte Técnico Help Desk Argentina:
TTeléfono: 0800-12235465 Lunes a Viernes 09:00 am a 22:00 pm
Soporte Técnico Help Desk Chile:
Teléfono: 800 8 35465 Lunes a Viernes 08:00 am a 21:00 pm
Soporte Técnico Help Desk Colombia:
Teléfono: 01800-9525465 Lunes a Viernes 07:00 am a 20:00 pm
Soporte Técnico Help Desk Ecuador:
Teléfono: 1800-035465 Lunes a Viernes 07:00 am a 20:00 pm
Soporte Técnico Help Desk El Salvador:
Teléfono: 800-6335 Lunes a Viernes 06:00 am a 19:00 pm
Soporte Técnico Help Desk Guatemala:
Teléfono: 1800-8350255 Lunes a Viernes 06:00 am a 19:00 pm
Soporte Técnico Help Desk Panamá:
Teléfono: 00800 0525465 Lunes a Viernes 07:00 am a 20:00 pm
Soporte Técnico Help Desk Costa Rica:
Teléfono: 0800 0521478 Lunes a Viernes 06:00 am a 19:00 pm
Soporte Técnico Help Desk Perú:
Teléfono: 0800-00968 Lunes a Viernes 07:00 am a 20:00 pm
Soporte Técnico Help Desk México:
Teléfono: 001 800 123-3201 Lunes a Viernes 06:00 am a 19:00
Soporte Técnico Help Desk Venezuela:
Teléfono: 0800-1005767 Lunes a Viernes 08:00 am a 21:00 pm
78
Suporte Técnico
E-mail:
e-mail: suporte@dlinkbrasil.com.br
79
D-Link 友訊科技 台灣分公司
技術支援資訊
如果您還有任何本使用手冊無法協助您解決的產品相關問題,台灣
地區用戶可以透過我們的網站、電子郵件或電話等方式與D-Link台灣
地區技術支援工程師聯絡。
D-Link 免付費技術諮詢專線
0800-002-615
服務時間:週一至週五,早上8:30 到 晚上9:00
(不含周六、日及國定假日)
網 站:http://www.dlink.com.tw
電子郵件:dssqa_service@dlink.com.tw
如果您是台灣地區以外的用戶,請參考D-Link網站 全球各地
分公司的聯絡資訊以取得相關支援服務。
產品保固期限、台灣區維修據點查詢,請參考以下網頁說明:
http://www.dlink.com.tw
產品維修:
使用者可直接送至全省聯強直營維修站或請洽您的原購買經銷商。
80
Dukungan Teknis
Update perangkat lunak dan dokumentasi pengguna dapat
diperoleh pada situs web D-Link.
81
技术支持
您可以在 D-Link 的官方網站找到產品的軟件升級和使用手冊
技术支持中心电话:8008296688/ (028)66052968
技术支持中心传真:(028)85176948
维修中心电话:(010) 58257789
维修中心传真:(010) 58257790
网址:http://www.dlink.com.cn
办公时间:周一到周五,早09:00到晚18:00
82
International Offices
83
Registration Card
All Countries and Regions Excluding USA
Print, type or use block letters.
Product Model Product Serial No. * Product installed in type of * Product installed in