Dgs-3427 pdf




















Table Of Contents. Table of Contents. User Manual TM. Previous Page. Next Page. Xstack dgs series layer 2 gigabit ethernet managed switch pages.

Des, dgs, des, dgs, dgs series pages. Xstack dgs series layer 2 managed stackable gigabit switch web ui reference guide pages. All rights reserved. Page 2 Microsoft Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. D-Link Computer Corporation disclaims any proprietary interest in trademarks and trade names other than its own.

Page 4 Introduction Page 7 SSH Algorithm This manual is intended for network managers familiar with network management concepts and terminology. Typographical Conventions Convention Description In a command line, square brackets indicate an optional entry. Throughout this safety section, the caution icon is used to indicate cautions and precautions that need to be reviewed and followed. These cables are equipped with three-prong plugs to help ensure proper grounding.

Do not use adapter plugs or remove the grounding prong from a cable. The total rack load should not exceed 80 percent of the branch circuit rating. The DGS Series switches are similar in configurations and basic hardware and consequentially, most of the information in this manual will be universal to the whole xStack DGS Series.

DGS Figure 2- 1. Figure 2- 4. The indicator is dark when the Switch is no longer receiving power i. Page Rear Panel Description Figure 2- 7. Figure 2- 8. Rear panel view of DGS Page Side Panel Description Switch for proper ventilation. Be reminded that without proper heat dissipation and air circulation, system components might overheat, which could lead to system failure and severely damage components.

Figure 2- Attach these cushioning feet on the bottom at each corner of the device. Allow enough ventilation space between the Switch and any other objects in the vicinity. Installing Switch in a rack Power On 1. Plug one end of the AC power cord into the power connector of the Switch and the other end into the local power source outlet.

To install the module, slide it in to the available slot at the rear of the Switch until it reaches the back, as shown in the following figure. Gently, but firmly push in on the module to secure it to the Switch. The diagrams below illustrate a proper RPS power connection to the Switch.

Please consult the documentation for information on power cabling and connectors and setup procedure. Page Managing The Switch For The First Time Upon the initial connection, there is no user name or password and therefore just press enter twice to access the command line interface.

Figure 4- 1. Boot up display in console screen DGS Managing the Switch for the First Time The Switch supports user-based security that can allow prevention of unauthorized users from accessing the Switch or changing its settings. Page 32 Press Enter in both the Username and Password fields. Leave the Username and Password fields blank. One of the first tasks when settings up the Switch is to create user accounts. Logging in using a predefined administrator-level user name will give the user privileged access to the Switch's management software.

SNMP enables network management stations to read and modify the settings of gateways, routers, switches and other network devices. The Switch's default IP address is 0. The system message Success indicates that the command was executed successfully. Open folders and click the hyperlinked menu buttons and subfolders contained within them to display menus. Click the D-Link logo to go to the D-Link website.

Area 2 Presents a graphical near real-time image of the front panel of the Switch. This area displays the Switch's ports and expansion modules, showing port activity, duplex mode, or flow control, depending on the specified mode. Enter a user name and password to access the Switch's management mode.

Below is a list of the main folders available in the web interface: Adminstration — Device Information and general settings This automatically logs the user out after Logout Time an idle period of time, as defined.

Choose the port or sequential range of ports using the From…To… port pull-down menus. This will open the User Account Management window, as shown below. You can attach a monitoring device to the mirrored port, such as a sniffer or an RMON probe, to view details about the packets passing through the first port. In the Administration folder, click System Log Setting, to view the window shown below.

Figure 6- 9. The IP address of the Syslog server. Server IP Severity This drop-down menu allows you to select the level of messages that will be sent. The level at which the alert triggers either a log entry or a trap message can be set as well. Use the System Severity Settings menu to set the criteria for alerts. Figure 6- Time State Daylight Saving Use this pull-down menu to specify the amount of time that will constitute your local DST Time Offset in offset - 30, 60, 90, or minutes.

The Switch allows two firmware images to be stored in its memory and either can be configured to be the boot up firmware for the Switch. The destination node then responds to or "echoes" the packets sent from the Switch. This is very useful to verify connectivity between the Switch and other nodes on the network.

This method can be accomplished through the CPU Interface Filtering mechanism explained in the previous section. Once the user configures these acceptable IP addresses, other packets containing different IP addresses will be dropped by the Switch, thus limiting the bandwidth of IP packets.

Parameter Description State This table allows network managers to view, define, modify and delete ARP information for specific devices. Static entries can be defined in the ARP Table. This will create a permanent entry is entered and is used to translate IPv6 address to MAC addresses.

Access both menus in the Routing Table folder. Choosing this option will allow the user to configure the default gateway for the next hop router only. SNMP enables network management stations to read and modify the settings of gateways, routers, switches, and other network devices. The following parameters can set: Parameter Description View Name There are some advantages in implementing the "Single IP Management" feature: 1. The Java Runtime Environment on your server should initiate and lead you to the topology window, as seen below.

The Topology View will refresh itself periodically 20 seconds by default. Topology view This screen will display how the devices within the Single IP Management Group connect to other groups and devices. Setting the mouse cursor over a specific device in the topology window tool tip will display the same information about a specific device as the Tree view does.

Group Icon Figure 6- Right Clicking a Commander Icon The following options may appear for the user to configure: Collapse - to collapse the group that will be represented by a single icon. Device Property window. If no Device Name is configured by the name, it will be given the name default and tagged with the last six digits of the MAC Address to identify it. End nodes that frequently communicate with each other are assigned to the same VLAN, regardless of where they are physically on the network.

Logically, a VLAN can be equated to a broadcast domain, because broadcast packets are forwarded to only members of the VLAN on which the broadcast was initiated. Page IEEE There are four additional octets inserted after the source MAC address. Their presence is indicated by a value of 0x in the EtherType field. Other Ports with untagging enabled will strip the If the packet doesn't have an Thus, all devices connected to a port are members of the VLAN s the port belongs to, whether there is a single computer directly connected to a switch, or an entire department.

To change an existing A new menu will appear to configure the port settings and to assign a unique name and number to the new VLAN. The DGS- Series supports up to 32 port trunk groups with 2 to 8 ports in each group. A potential bit rate of Mbps can be achieved. Page Link Aggregation xStack DGS Series Fast Ethernet Switch Load balancing is automatically applied to the ports in the aggregated group, and a link failure within the group causes the network traffic to be directed to the remaining links in the group.

The Spanning Tree Protocol will treat a link aggregation group as a single link, on the switch level. On the port level, the STP will use the port parameters of the Master Port in the calculation of port cost and in determining the state of the link aggregation group.

State Trunk groups can be toggled between Enabled and Disabled. This is used to turn a port trunking group on or off. Using the following window, the user may set which ports will be active and passive in processing and sending LACP control frames.

Page Spanning Tree However, since Table below compares how the three protocols differ regarding the port state transition. All three protocols calculate a stable topology in the same way. Every segment will have a single path to the root bridge. All bridges listen for BPDU packets. Otherwise, a configuration error will occur. These settings will uniquely identify a multiple spanning tree instance set on the Switch.

Redundant Ring Stacking. Alternatively, optional Gigabit modules can be installed in the open slots to create a physical stack. Up to 12 units or Gigabit ports can be configured for a stack. With each of these ports providing 20Gbps full duplex transmission on the cost-effective coaxial cable, the DGS series provides not only high-bandwidth stacking but also cost control capability that allows users to add ports strictly on a per need basis.

Modules with single Gigabit XFP can also be installed in any of the open slots for uplink to servers or a fiber backbone. In addition, it offers suppression capabilities and Layer 3 IP v. Built-in D-Link ZoneDefense technology allows business to integrate the switch stack with D-Link NetDefend firewalls to implement a full coverage, proactive security architecture.

Bandwidth Control can be flexibly set for each port using pre-defined thresholds to assure a committed level of service for end users. For advanced applications, per-flow bandwidth control allows easy fine-tuning of service types based on specific IP addresses or protocols. Actual product appearance may differ from the image displayed on this page.



0コメント

  • 1000 / 1000