Manuel d'utilisation / d'entretien du produit DWS-3000 du fabricant D-Link
Aller à la page of 174
W ired Configur a tion Guide Product Mo del : DWS-3000 Series Unif ied W ired & W ire less A ccess System Rel e as e 2 . 1 Apri l 2008 ©Cop yright 2008 .
2 © 2001 - 2008 D-Lin k Corporat ion. All Ri ghts Re served. Wired Config uration Guide.
3 T able of Content s List of Fig ures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 List of T ables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 About This Bo ok . . .
4 © 2001 - 2008 D-Lin k Corporat ion. All Ri ghts Re served. Wired Config uration Guide Guest VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Configuring the Guest VLA N by Using the CLI. . . . .
5 10 Link Layer Discovery P r otocol . . . . . . . . . . . . . . . . . . . . . . . . . 69 CLI Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Example #1: Set Global LLDP Paramet ers . . . . . .
6 © 2001 - 2008 D-Lin k Corporat ion. All Ri ghts Re served. Wired Config uration Guide IP ACL CLI Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Example #1: Cr eate ACL 179 and Def ine an ACL Rule . . . .
7 Example #1: Enable DHCP Filteri ng for the Switch . . . . . . . . . . . . . . . . . . 146 Example #2: Enable DHCP Filteri ng for an Interf ace . . . . . . . . . . . . . . . . . 146 Example #3: Show DHCP Filtering Con figuration . . . . . . . . . . .
8 © 2001 - 2008 D-Lin k Corporat ion. All Ri ghts Re served. Wired Config uration Guide Interpr eting Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 CLI Examples . . . . . . . . . . . . . . . . . . .
9 List of Figures List of Figures Figure 1. Web Interfa ce Panel-Example .............................................................. 28 Figure 2. Web Interfa ce Panel-Example .............................................................. 29 Figure 3.
10 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Confi guration Guide Figure 44. VRRP Configuration ........................................................................... 91 Figure 45. Virtual Router Configuration ..............
11 List of Figures Figure 88. Create an Authentication List ............................................................ 137 Figure 89. Configure the Authentication List ..................................................... 137 Figure 90. Set the User Login .
12 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Confi guration Guide.
13 List o f T ables List of T ables Table 1. Quick Start up Software Version Information . . . . . . . . . . . . . . . . . . . . 22 Table 2. Quick Start up Physical Port Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Table 3. Quick Start up User Account Management .
14 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide.
Docu ment Orga nization 15 About Th is Book About This Book This docu ment prov ides an und erstanding o f the CLI an d W eb configurati on options for D-Link DWS-300 0 feature s. Document Organization This docu ment shows exa mples of th e use of t he Unified Swit ch in a ty pical netw ork.
16 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide • Management - RADIUS - T A CACS+ - DHCP Filter ing - T racer oute - Configur ati on Scr ipt in g - Outbound T.
In-Band an d Out-of-Ba nd Connect ivity 17 1 Getting S t arted Connect a termin al to the swi tch to begi n configu ration. In-Band and Out-of-Band Connectivity Ask the sy stem adminis trator to determine whether you wi ll confi gure the switch for i n-band or out-of -band connecti vity .
18 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Gateway IP add ress of the default r outer , if the switc h is a node outside the IP range of the L AN MAC Addre.
In-Band an d Out-of-Ba nd Connect ivity 19 1 Ge tting St arted Subne t Subnet mask for the LAN. Gateway IP addre ss of the default rout er , if the switc h is a node out side the IP range of the LAN.
20 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide S t ar ting the Switch 1. Make sure t hat the swit ch console port is connected to a VT100 termina l or a VT100 ter - minal emul ator via the RS-232 cros sover cabl e.
Unifie d Switch Ins tallat ion 21 1 Ge tting St arted Unified Switch Inst allation This sec tion contain s procedur es to hel p you become acqua inted qui ckly with the switch softw are . Befo re ins tall ing th e Un i fied Swit ch, y ou s h oul d veri fy th a t the switc h o perat es w i t h th e mos t recent firmware.
22 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide This command s aves the cha nge s t o the confi gur ati on f il e. Y ou must be in the co rr ect mode t o execute the comman d. If you do not save the c onfigurati on, all cha nges are lost when you power down or reset t he networki ng device .
Unifie d Switch Ins tallat ion 23 1 Ge tting St arted Quick S t art up User Acco unt Management Ta b l e 3 . Quick S tar t up User Accoun t Management Comm and Det ai ls show users (Pri vile ged E XEC.
24 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Quick S tart up IP Address T o view the network p arameters th e operato r can acce ss the devi ce by the fol lowing thr ee methods.
Unifie d Switch Ins tallat ion 25 1 Ge tting St arted Quick S t art up Uploading from Networki ng D evice to O ut-of-B and PC (X MODE M) Quick S t art up Downloadin g from Out-of-B and P C to Ne tworking Device (X MODEM) Ta b l e 5 .
26 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Quick S t art up Downlo ading from TFTP Serve r Before s tarting a TFTP serve r download, the opera tor mus t complete the Quick Star t up for the IP Addres s. Quick S tart up Facto ry Defaults Ta b l e 7 .
Configur ing for W eb Acce ss 27 2 Using the W eb Interface This chap ter is a brief in troducti on to the W eb inte rface — it explains how to access t he W eb- based mana gement panel s to configur e and manage the system. Ti p : Use the W eb interfa ce for con figuration instead o f the CLI i nterface .
28 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide S t arting the Web Interface Follow th ese steps to start the swit ch W eb interface : 1. E nter th e IP addr ess of th e swi tc h in the W eb br ow se r ad dre ss fie ld.
S t arting the We b Interface 29 2 Using the Web In terface Figure 2. W eb Interface Panel-Exa mple Configuring an SNMP V3 User Profile Configur ing an SNMP V3 user pr ofile is a par t of use r c onfi gur at io n.
30 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide 2. Using the User pul l-down menu, s elect Cr eate to crea te a ne w u se r . 3. E nter a new u ser n a me in the User N a me fi eld . 4. E nter a new u ser p a ssw o rd i n the P ass w ord fi eld and th en r etype it in the C onfir m Pass wor d fi el d.
31 3 Vi r t u a l L A N s Adding V irtual LAN (VLAN) sup port to a Layer 2 switch o ffe rs some of the benefits of both bridgin g and routi ng. Like a b ridge, a VLAN swi tch forwa rds traf fic based on the Layer 2 head er , wh ich is fast .
32 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide VLAN Config uration Example The d iagr am in this se ctio n sh o ws a sw itc h with four por t s con figur ed to han d le th e traffic for two VLANs.
CLI Exam ples 33 3 V irtual LANs CLI Ex amples The fol lowi ng exa mples sho w how to crea te VLANs, assign ports t o the VLANs, an d a ss ign a VLAN as the de fault VLAN to a port. Example #1 : Create T wo VLANs Use the fol lowing com mands to crea te two VLANs and to a ssign the VLAN IDs while leaving the names blank.
34 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide (DWS-3024) (Interface 0/4)#exit (DWS-3024) (Config)#exit E xample #4 : Assign VLAN3 as the Default V LAN This exampl e shows how to as sign VLAN 3 as t he default VLAN f or port 0/2.
Private E dge VLANs 35 3 V irtual LANs T o specif y the handli ng of untagg ed frames on re ceipt use the LAN> L2 Featur es > VLAN > Port Confi guration page.
36 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide CLI Example Exampl e #1: sw itchport p rotected (DWS-3024) #config (DWS-3024) (Config)#interface 0/1 (DWS-3024) (Interface 0/1)#switchport protected ? <cr> Press Enter to execute the command.
37 4 802.1X Network Access Control Port-ba sed network access control allows t he operation of a sys tem’ s port( s) to be controll ed to ensu re th a t acc ess to its s ervic es is perm itte d onl y by sy ste m s tha t are autho riz ed to d o so.
38 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide simpler . At the start of service for a user , the RADIUS cli ent that is configured t o use accounti ng sends a n accounti ng start packet spe cifying the type of se rvice th at it wil l deliver .
Guest VLAN 39 4 802.1X N etwork Acces s Control Guest VL AN The Guest VLAN featu re allows a switch to provid e a distingu ished service to unau thenticate d users. Th is featu re provide s a mechanism to allow vis itors and con tractors t o have networ k acces s to reach ext ern al netw ork with n o ab il ity to su rf int erna l LA N .
40 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Configuring the Guest VLAN by U sing the Web Interface T o enable the Guest VLAN features by using the W eb i nterface, us e the LAN> Security > 802.1x > 8 02.
Config uring Dyna mic VLAN As signment 41 4 802.1X N etwork Acces s Control Configuri ng Dy namic VLAN A ssig nment The soft ware also s upports VLAN as signment for clients based on th e RADIUS server authe nti cat ion.
42 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide.
CLI Exam ple 43 5 S torm Control A traffic stor m is a c ond ition tha t occu rs wh en in com ing pa cke ts flo od th e LA N, whi ch c reate s perfor mance degradati on i n the net work . The Unified Swi tc h’ s S t orm Control fea tur e pr ot ect s against this con ditio n.
44 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide <rate> Enter the storm-control threshold as percent of port speed.
Web In terface 45 5 S torm Control We b I n t e r f ac e The S torm Contro l configur ation opti ons are ava ilable on th e Port Conf iguratio n W eb page under th e Administr ation folde r .
46 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide.
CLI Exam ple 47 6 T r unking (Link Aggregation) This sec tion shows h ow to use th e T runking feature (also known as Link Aggre gation) to configur e port-c hannels by using the CLI and the W eb inte rface.
48 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Figure 9 shows the ex ample networ k. Figure 9. LAG/Port-channel Example Network Diagram Example 1: Create two p.
CLI Exam ple 49 6 T runking (Lin k Aggregation) (DWS-3024) #show port-channel all Port- Link Log. Channel Adm. Trap STP Mbr Port Port Intf Name Link Mode Mode Mode Type Ports Speed Active ------ ------------- ----- ---- ---- ------ ------- ------ --------- ------ 3/1 lag_10 Down En.
50 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide W eb Interface Configuration - LAGs/ Port-channels T o perform the same c onfigura tion using th e W eb interface, use the LAN> L2 Fea tures > T runking > Configura tion page.
Over view 51 7 IGMP Snooping This sect ion describ es the Internet Group Management Proto col (IGMP) feat ure: IGMPv3 and IGMP Snoopi ng. The IGMP Snooping fe ature ena bles the s witch to mon itor IGMP transa ctions betwee n hosts a nd r outers.
52 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide E xamp le # 2: show mac-address-table igmpsnooping (DWS-3024) #show mac-address-table igmpsnooping ? <cr> Press Enter to execute the command.
Web E xamples 53 7 IG MP Snooping W eb Examples The foll owing web page s are used in the IGMP Sno oping featur e. Click Help fo r more inform ation on the web int erface.
54 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Figure 12. IG MP Sn oopin g - Int erface Config ura tion Pag e Figure 13.
Web E xamples 55 7 IG MP Snooping Figure 14. IG MP Snoopin g - VLAN Status Page Figure 15. IG MP Sn oopin g - Mu lticas t Rout er S t atistics Pag e.
56 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Figure 16. IG MP Snoopin g - Multi cast Rout er Co nfigur at ion Page Figure 17.
Web E xamples 57 7 IG MP Snooping Figure 18. IGMP Sn ooping - Multicast Router VLAN Configuration Page.
58 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide.
Over view 59 8 Port Mirroring This sec tion desc ribes the Por t Mirroring f eature, wh ich can se rve as a diagn ostic to ol, debugging tool, or mea ns of fend ing of f atta cks.
60 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Example #2: Show the Port Mirr oring Session (DWS-3024) #show monitor session 1 Session ID Admin Mode Probe Port.
W eb Examples 61 8 Port Mi rroring W eb Examples The foll owing web page s are used with the Po rt Mirror ing feat ure. Figure 19. Multip le Port Mi rrorin g Figure 20.
62 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Figure 21. Syst em - Port Util izatio n Summary.
Over view 63 9 Port Security This sect io n d es crib es t he Po rt Sec uri ty fe at ure . Ove rview Port Secu rity: • Allows fo r limiting t he number of MAC addresses on a given po rt. • Packets t h at ha ve a matchin g MAC a ddre ss ( sec ure packe ts ) are for ward ed; all ot her p ack - ets (un secure pac kets) ar e restri cted.
64 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide CLI Ex amples The foll owing are e xamples of t he commands us ed in the P ort Securit y feature . Example #1 : show port secur ity (DWS-3024) #show port-security ? <cr> Press Enter to execute the command.
W eb Examples 65 9 P ort Secu ri ty W eb Examples The foll owing W eb pages are used in the Port Secur ity featur e. Figure 22. Port Security A dministration Figure 23.
66 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Figure 24. Port Security St atically Configured MAC Addresses T o view Port Securi ty statu s informat ion, navig ate to LAN> Monitori ng > Port Security from the navigation pa nel.
W eb Examples 67 9 P ort Secu ri ty Figure 26. Port Security Violation S tatus.
68 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide.
CLI Exam ples 69 10 Link Layer Discovery Protocol The Link Layer Discover y Pr ot ocol (LLDP) fe at ure allows i ndi vi dual interf ac es on the swi tc h to adver tise majo r capabilit ies and ph ysical descr iptions . Network manag ers can view t his informat ion and id entify s ystem topology a nd detect bad confi gurations on t he LAN.
70 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide (DWS-3024) # Example #2 : Set Inter face LLDP Parameter s The foll owing comman ds configu re inter face 0/10 to transmi t and recei ve LLDP inf ormation.
Using t he We b Interface to Configure LL DP 71 10 Link L ayer Disco very Protoc ol Using the W eb Interface to Con figure LLDP The LLDP menu page con tains li nks to the followin g feature s: • LLD.
72 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Use t he LL DP In terf a ce Co nfig urat ion sc reen to sp ecif y tran smit and re cei ve fun ctio n s fo r indivi dual inte rfaces.
Using t he We b Interface to Configure LL DP 73 10 Link L ayer Disco very Protoc ol Figure 29. LLDP I nterface Summary Figure 30. LLDP S tatis ti cs Y ou ca n also use the pages in t he LAN> Monitoring > LLDP S tatus folde r to view inform ation ab out local and remote devices.
74 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide.
Over view 75 11 Denial of Service Att ack Protection This sec tion desc ribes the D-Li nk DWS-3000 swit ch’ s Denial of Service Protect ion feature .
76 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide First Fragment Mode............................ Enable Min TCP Hdr Size............................... 20 TCP Fragment Mode.............................. Enable TCP Flag Mode.
Port Rou ting Config uration 77 12 Port Routing The fir st network s were small enough for the end st ations to c ommunicat e directly . As networks grew , Laye r 2 bridging was used to s egregate traf fic, a tec hnology th at worked wel l for uni cast tra ffic, b ut had p roblems cop ing with lar ge quantities of multic ast packe ts.
78 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide • ARP Mappi ng - r espo nsibl e for main tain ing th e AR P T abl e used to co rrel ate IP and MA C address es. The table contain s both st atic ent ri es and entr ies dynami cal ly upd at ed b ase d o n inform ation i n receive d ARP frames.
CLI Exam ples 79 12 Port Routing Example 2. Enabli ng Routing for Ports on the Switch Use the f ollowing c ommands to enab le routi ng for por ts on the sw itch. The d efault link -level encapsul ation fo rmat is Et hernet. Conf igure th e IP addres ses and su bnet masks f or the por ts.
80 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Using the W eb Interface to Con figure Ro uting Use the f ollowing s creens to perform the s ame configur ation using the Graphi cal User Inte rface: T o enable routing fo r t he swi tch, as shown i n Exampl e 1.
VLAN Rou ting Con figuration 81 13 VLAN Routing Y ou can con figure t he Unified Swit ch with some ports support ing VLANs and s ome support ing routing. Y ou can also conf igure th e Unified Switch to all ow traff ic on a VLAN to be trea ted as if the VLAN were a rou ter port .
82 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Figure 35. VLAN Routing Ex ample Net work Diagram Example 1: Create T wo VLANs The foll owing comman ds show an example of how to cr eate two VLANs with egress f rame tagging enabled.
CLI Exam ples 83 13 VLAN Routi ng Next spec ify the VLAN I D assigned to u ntagged fr ames recei ved on the ports. config interface 0/1 vlan pvid 10 exit interface 0/2 vlan pvid 10 exit interface 0/3 vlan pvid 20 exit exit Example 2: Set Up VLAN Routing for the VLANs and the Switch.
84 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Using the W eb Inte rface to Configure VLAN Routing Y ou ca n perform the s ame configu ration by using the W eb Interf ace.
Using the Web In terface to Configure VL AN Routing 85 13 VLAN Routi ng Use the LAN> L3 Feature s > VLAN Routing > Configura tion page to enable VLAN routing and confi gure the po rts. Figure 38. VLAN Routing Configuration T o enable routing for the s witch, use the LAN> L3 Featur es > IP > Configurat ion page.
86 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Use the LAN> L3 Feature s > IP > Interf ace Configurati on page to enab le routing f or the ports a nd configur e their IP addresses and subnet masks. Figure 40.
CLI Exam ples 87 14 V irtual Router Redundancy Protocol When an e nd station i s statical ly configur ed with the address o f the router that wil l handle its routed t raf fic, a singl e point o f failure i s introd uced into the network . If the r outer goe s down, the end s tation is u nable to c ommunicate.
88 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Figure 41. VRRP Example Netwo rk Configuration Example 1: Configuring VRRP on the Swit ch as a Master Router Enab le rou tin g fo r th e sw i tch . IP fo rwar din g is th en e nable d by d efa ult.
CLI Exam ples 89 14 V irtual Router Red undancy Protocol Assi gn vi r tua l route r ID s to th e por t tha t w ill pa rtic ipat e in th e pro tocol . config interface 0/2 ip vrrp 20 Specify the IP addr ess that the virt ual router function will reco gnize.
90 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Enable VRRP on the port. ip vrrp 20 mode exit Using the W eb Interface to Con figure VRRP Use the f ollowing s c.
Using th e Web Interface to Configure VRRP 91 14 V irtual Router Red undancy Protocol Figure 43. IP Interface Configuration T o enable VRRP for the swi tch, use th e LAN> L3 Feature s > VRRP > VRRP Configurat ion pag e.
92 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Figure 45. V irtu al Rout er Configuratio n.
Over view 93 15 Proxy Address Resol ution Protocol (ARP) This sec tion desc ribes the Pr oxy Address Re solution Protocol (ARP) feature. Ove rview • Proxy ARP allows a rout er to answe r ARP requests wh ere the t arget I P address is not the router itself but a destin ation tha t the router can reac h.
94 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Example #2 : ip proxy-ar p DWS-3024) (Interface 0/24)#ip proxy-arp ? <cr> Press Enter to execute the command. (DWS-3024) (Interface 0/24)#ip proxy-arp W eb Example The foll owing web page s are used in the pr oxy ARP feature.
Over view 95 16 Access Control List s (ACLs) This sect ion d escr i b es t he Ac ces s Con tro l L ists (AC Ls) fe atu re. Ove rview Access Cont rol List s (ACLs) are a collecti on of permi t and deny.
96 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide • The o rder o f th e rules is im por tant: w he n a pack et ma tch es mu ltiple rul es, th e fir s t rul e takes pr ecedence. Also, once yo u define a n ACL for a gi ven port, all traf fic not sp ecifi- cally p ermitted by t he ACL is denied a ccess.
ACL Confi guration Pro cess 97 16 Ac cess Contro l List s (ACLs) ACL Configuration Process T o configure ACLs, fol low these steps: • Create a MAC ACL by specifyi ng a name. • Create a n IP ACL by specif ying a number . • Add n e w ru le s to th e A C L.
98 © 2001- 2008 D-Link C orporation. All Right s Rese rved. Wired Config uration Guide Example #1: Create ACL 179 and Define an ACL Rule After t he mask has be en applie d, it permits packets car rying TCP tr aff ic that match es the specif ied Source IP address , and sends these pack ets to t he specif ied Destinat ion IP addr ess.
MAC ACL CLI E xamples 99 16 Ac cess Contro l List s (ACLs) Example #5 : Specify MAC ACL Attr ibutes (DWS-3024) (Config)#mac access-list extended mac1 (DWS-3024) (Config-mac-access-list)#deny ? <srcmac> Enter a MAC Address. any Configure a match condition for all the source MAC addresses in the Source MAC Address field.
100 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Example #6 Configure MAC Acces s Group (DWS-3024) (Config)#interface 0/5 (DWS-3024) (Interface 0/5)#mac ? access-group Attach MAC Access List to Interface. (DWS-3024) (Interface 0/5)#mac access-group ? <name> Enter name of MAC Access Control List.
MAC ACL CLI Examples 101 16 Ac cess Contro l List s (ACLs) Example #7 Set up an ACL with Permit Action (DWS-3024) (Config)#mac access-list extended mac2 (DWS-3024) (Config-mac-access-list)#permit ? <srcmac> Enter a MAC Address. any Configure a match condition for all the source MAC addresses in the Source MAC Address field.
102 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide W eb Examples Use the W eb pages in thi s section to configure and view MAC access cont rol list and IP access control lists. MAC ACL Web Pages The foll owing figur es show the pages avail able to vi ew and configur e MAC ACL setting s.
Web Ex amples 103 16 Ac cess Contro l List s (ACLs) Figure 50. MAC ACL Rule Co nfiguration Page - Add Destination MAC and MAC Mask Figure 51. MAC ACL Rule Co nfig uration Page - V iew the Current Sett.
104 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 52. ACL Interface Configuration Figure 53. MAC ACL Sum mary.
Web Ex amples 105 16 Ac cess Contro l List s (ACLs) Figure 54. MAC ACL Rule S ummary IP ACL Web Pages The foll owing figur es show the pages avai lable to vi ew and confi gure sta ndard and ex tended IP ACL sett ings.
106 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 56. IP ACL Configura ti on Page - Create a Rule and Assign an ID Figure 57.
Web Ex amples 107 16 Ac cess Contro l List s (ACLs) Figure 58. Attach IP ACL to an Interfa ce.
108 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 59. IP ACL Su mm ary Figure 60. IP ACL Ru le Sum mary.
Ingress Port Configu ration 109 17 Class of Service Queuing The Class of Serv ice (CoS) f eature let s you give preferen tial tr eatment t o certain types of traf fic o ver other s.
1 10 © 2001- 2008 D-Link Corporati on. All Rights Rese rved. Wired Config uration Guide CoS Mapping T able for T rusted Ports Mapping is from the de signated field val ues on trust ed ports’ incoming pa ckets to a t raf fic class pr iority (act ually a CoS traff ic queue).
CLI Exam ples 1 1 1 17 Class of Service Queui ng Figure 61. CoS Ma ppin g and Queue Con figura tion Continui ng t his example , you c onfi gur ed the egress Port 0/8 f or s tr ic t pr io ri ty on queue 6, a nd a set a weig hted schedul ing scheme fo r queues 5-0.
1 12 © 2001- 2008 D-Link Corporati on. All Rights Rese rved. Wired Config uration Guide Figure 62. CoS Configurat ion Exam ple Sy stem Diag ram Y ou will c onfigure the ingre ss interfa ce uniquely for all co s-queue an d VLAN parameters.
W eb Examples 1 13 17 Class of Service Queui ng W eb Examples The foll owing web page s are used for the Cl ass of Ser vice featur e. Figure 63. 802.1p Priority Mappin g Page Figure 64.
1 14 © 2001- 2008 D-Link Corporati on. All Rights Rese rved. Wired Config uration Guide Figure 65. IP DSCP Mapp ing Configuration Page Figure 66. CoS I nterface Co nfiguratio n Page.
W eb Examples 1 15 17 Class of Service Queui ng Figure 67. CoS Interface Queue Configuration Page Figure 68. CoS Interface Queue S tatus Page.
1 16 © 2001- 2008 D-Link Corporati on. All Rights Rese rved. Wired Config uration Guide.
11 7 18 Differentiated Services Dif ferenti ated Ser vices ( Diff Serv) is one tec hnique fo r impl ementing Qu ality of S ervic e (QoS) polici es. Using Dif fServ in your network al lows you to d irectly con figure t he relevant parame ters on the s witche s and routers rather than using a resourc e reserv ation prot ocol.
1 18 © 2001- 2008 D-Link Corporati on. All Rights Rese rved. Wired Config uration Guide The Unifi ed Switch suppor ts the T raffic Co nditioning Pol icy type which is associated with an i nbo und tra.
CLI Example 1 19 18 Differe ntiated Services 2. Create a Diff Serv class o f type “all” for each of the depart ments, and n ame them. Define the ma tch crit eria -- Sour ce IP addr ess -- fo r the new cl asses. class-map match-all finance_dept match srcip 172.
120 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide queue at tribute . It is pr esumed that the switc h will fo rward this traf fic to in terface 0/5 based on a normal des tinatio n address l ookup for internet tr aff ic.
Using the W eb Interface to C onfigure Diffse rv 121 18 Differe ntiated Services 3. V iew inf ormation about the Dif fServ policy and class con figuration . In the fo llowing exampl e, the inter face spec ified is interf ace 0/1. The policy is at tached t o interf aces 0/1 through 0 /4.
122 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 70. DiffServ Co nfiguratio n Figure 71. Diff Serv Clas s Co nfi gurat ion.
Using the W eb Interface to C onfigure Diffse rv 123 18 Differe ntiated Services Figure 72. DiffServ Cla ss Configuratio n - Add Match Criteria Figure 73.
124 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 74. Diff Serv Clas s Co nfi gurat ion Figure 75. DiffServ Cl ass Sum mary.
Using the W eb Interface to C onfigure Diffse rv 125 18 Differe ntiated Services Figure 76. DiffServ Policy Configuration Figure 77. DiffServ Policy Configuration.
126 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 78. DiffServ Policy Class Definition Figure 79. A ssi gn Que u e.
Using the W eb Interface to C onfigure Diffse rv 127 18 Differe ntiated Services Figure 80. DiffServ Policy Summary Figure 81. DiffServ Policy Attribute Summary.
128 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 82. DiffServ Service Configuration Figure 83. DiffServ Service Summary.
Using the W eb Interface to C onfigure Diffse rv 129 18 Differe ntiated Services Configuring the Color-Awar e Attribute by Using the Web The foll owing scre ens show the addition al steps to t ake to co nfigure t he finance_de pt class with a co lor -aware at tribute .
130 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide C. A ft er th e scre en r efres hes , ente r valu e s fo r the C ommi t ted Rate and C omm it ted Burst Size fi elds.
DiffS erv f or VoIP Conf igur at ion Ex ampl e 1 31 18 Differe ntiated Services DiffServ for V oIP Config uration Ex ample One of the most valua ble uses of Di ffServ is to suppo rt V oice over IP (V oIP). V oIP traf fic is inheren tly time- sensiti ve: for a network to provide a cceptable service , a guar anteed trans mis s ion rate is vita l.
132 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Configuring DiffServ V oIP Support Example Enter Glo bal Config mode. Set queu e 5 on all p orts to use s trict pri ority mode. This queue shall be u sed fo r all V o IP p a cke ts.
RADI US Co nfi gura tio n Exam ple 133 19 RADIUS Making use of a singl e databas e of accessi ble infor mation – as in an Authe nticati on Server – can great l y si mplify th e a uth ent ic ation and mana gemen t of users i n a l ar ge net work .
134 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide RADIUS server cannot be contacted. Thi s authent ication li st is then a ssociat ed with the default login. Figure 85. RADIUS Servers in a DWS-3 000 Network When a user attempts to log in, the switch prompts for a username and password.
RADI US Co nfi gura tio n Exam ple 135 19 RADIUS Configuring RADIUS b y Using the Web Interface The foll owing W eb screen s show how to p erform the configur ation descri bed in th e example.
136 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 87. Configuring the RAD IUS Server.
RADI US Co nfi gura tio n Exam ple 137 19 RADIUS Figure 88. Cr eat e an Aut h entication List Figure 89. Configure the Authentication L ist.
138 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 90. Set the User Login.
T AC ACS + Conf ig urat ion Ex ampl e 1 39 20 T ACACS+ T ACACS+ (T ermina l Access Cont roller Acce ss Control System) pr ovides acc ess control for networke d devices v ia one or more c entralized servers.
140 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 91. DWS-3000 wi th T ACACS+ When a us er attemp ts to log int o the swit ch, the NAS or switch pro mpts for a user name and passwo rd. The switch a ttempts to co mmunicate with the h ighest pr iority configured T ACACS+ server at 10 .
T AC ACS + Conf ig urat ion Ex ampl e 1 41 20 T ACACS+ Configuring T ACACS+ by Using the W eb Interface The foll owing W eb screen s show how to p erform the configur ation descri bed in th e example.
142 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 94. Create an Authentication List (T ACACS+) Figure 95.
T AC ACS + Conf ig urat ion Ex ampl e 1 43 20 T ACACS+ Figure 96. Set the User Login (T ACACS +).
144 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide.
Overv iew 145 21 DHCP Filtering This sec tion desc ribes the Dyna mic Host Confi guratio n Protocol (DHCP) Filteri ng feature. Ove rview DHCP filte ring provide s security b y filterin g untrust ed DHCP messages.
146 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide C LI Exampl es The comman ds shown below sho w examples of configur ing DHCP Filteri ng for the swi tch and for i ndividua l interf aces.
Web Ex amples 147 21 DHCP Filteri ng Use the DHCP Fi ltering Configurati on page to conf igure the DHCP Filtering a dmin mode on the swit ch. Figure 97. DHCP Filterin g Configuration Use the DHCP Filt erin g Int erfac e Confi gurat ion p age to c onfigu re DHCP Fi lter ing o n spec ific inter faces .
148 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 99. DHCP Filter Binding Information.
CLI E xam ple 149 22 T r aceroute This sect ion d escr ibe s th e Tracer out e fea tur e. Use T raceroute to discover the route s that pac kets take when traveli ng on a hop- by-hop basi s to thei r destin ation thr ough the ne twork.
150 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide (DWS-3024) #traceroute ? <ipaddr> Enter IP address. (DWS-3024) #traceroute 216.109.118.74 ? <cr> Press Enter to execute the command. <port> Enter port no.
Overv iew 151 23 Configuration Scripting Configur ation Scr ipting allo ws you to gene rate a t ext-forma tted script file that shows the current configur ation of the system . Y ou can gene rate multipl e scripts a nd upload an d apply them to mo re tha n one swi tc h.
152 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide list Lists all configuration script files present on the switch. show Displays the contents of configuration script. validate Validate the commands of configuration script.
CLI Example s 153 23 Configu ration Scripting Example #5 : copy nvram : script Use this command to upl oad a confi guration script. (DWS-3024) #copy nvram: script running-config.scr tftp://192.168.77.52/running-config.scr Mode.........................
154 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Example #7: V alidate another Configuration Script (DWS-3024) #script validate default.
Overv iew 155 24 Outbound T elnet This sec tion desc ribes the Out bound T elne t featur e. Ove rview Outbound T elnet: • Feature establi shes an outboun d telnet connectio n between a device and a remote hos t.
156 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Example #1: show network (DWS-3024) >telnet 192.168.77.151 Trying 192.168.77.151... (DWS-3024) User:admin Password: (DWS-3024)>enable Password: (DWS-3024)#show network IP Address.
Web Exam ple 157 24 Ou tbound T elnet <0-5> Configure the maximum number of outbound telnet sessions allowed. (DWS-3024) (Line)#session-limit 5 (DWS-3024) (Line)#session-timeout ? <1-160> Enter time in minutes. (DWS-3024) (Line)#session-timeout 15 W eb Example Y ou ca n set up th e Outbound T elnet sessi on through t he W eb interfac e.
158 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide.
Overv iew 159 25 Pre-Login Banner This sec tion desc ribes the Pre-Login Banner featur e. Ove rview Pre-Logi n Banner: • Allows you to creat e message scre ens when logg ing into t he CLI Inte rface.
160 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide (DWS-3024) #copy tftp://192.168.77.52/banner.txt nvram:clibanner Mode...........................................TFTP Set TFTP Server IP...........................
Overv iew 161 26 Simple Network T ime Protocol (SNTP) This sec tion descri bes the Si mple Network T ime Protoco l (SNTP) featur e. Ove rview SNTP: • Used for synchroniz ing netw ork resou rces • .
162 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Example #3 : show sntp serve r (DWS-3024) #show sntp server Server IP Address: 81.169.155.234 Server Type: ipv4 Server Stratum: 3 Server Reference Id: NTP Srv: 212.
Web I nterfac e Examples 163 26 Simple Network Tim e Protocol (SNTP) Example #6 : configuring sntp ser ver (DWS-3024)(Config) #sntp server 192.168.10.234 ? <cr> Press Enter to execute the command. <1-3> Enter SNTP server priority from 1 to 3.
164 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 102. SNTP Global S tatus Pa ge.
Web I nterfac e Examples 165 26 Simple Network Tim e Protocol (SNTP) Figure 103. SNTP Server Configuration Page Figure 104. SNTP Server S tatus Page.
166 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide.
Overv iew 167 27 Syslog This sec tion provi des info rmation abo ut the Sysl og feature. Ove rview Syslog : • Allows you to store sys tem messages and/or error s • Can store to local files o n the.
168 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide CLI Ex amples The foll owing are e xamples of t he commands us ed in the Sysl og featur e.
CLI Example s 169 27 Sysl og Example #3: show logging traplogs (DWS-3024) #show logging traplogs Number of Traps Since Last Reset............... 16 Trap Log Capacity.
170 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Example #5: logging port configuration (DWS-3024) #config (DWS-3024) (Config)#logging ? buffered Buffered (In-Memory) Logging Configuration. cli-command CLI Command Logging Configuration.
Web Ex amples 171 27 Sysl og W eb Examples The foll owing web page s are used with the Sy slog featur e. Figure 105. Log - Syslog Co nfigur ation Pa ge Figure 106.
172 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Figure 107. Log - Host s Co nfigur at ion Page - Add Host Figure 108.
CLI E xam ple 173 28 Port Description The P ort D esc ri ptio n feat ure lets y ou s pe cif y an al pha num eric in ter face id en ti fier that can b e used for SNMP network manag ement. CLI Example Use the c ommands shown below for th e Port Descr iption fe ature.
174 © 2001- 2008 D -Link Corp oration. Al l Rights Reserved. Wired Config uration Guide Configuring Port Description wi th the W eb Interface Use t he fol low ing W eb s cre en to e nte r Port Des cr ipt ion in for matio n.
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté D-Link DWS-3000 c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du D-Link DWS-3000 - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation D-Link DWS-3000, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le D-Link DWS-3000 va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le D-Link DWS-3000, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du D-Link DWS-3000.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le D-Link DWS-3000. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei D-Link DWS-3000 ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.