D-Link DWL-8220AP - AirPremier Wireless Switch Dualband Access Point Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Routers D-Link DWL-8220AP - AirPremier Wireless Switch Dualband Access Point. D-Link DWL-8220AP - AirPremier Wireless Switch Dualband Access Point User`s manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir

Resumo do Conteúdo

Página 2 - Table of Contents

5DWS-1008 User’s Manual D-Link Systems, Inc.Installation OverviewInstallation OverviewCaution: The DWS-1008 switch has been designed and tested to be

Página 3

95DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesYou must generate an SSH authentication key befo

Página 4

96DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesChanging the SSH Service Port NumberTo change the SS

Página 5

97DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesManaging TelnetTelnet requires a valid username and pas

Página 6 - System Requirements

98DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesChanging the Telnet Service Port NumberTo change the

Página 7 - Introduction

99DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesConguring and Managing DNSYou can congure an Swit

Página 8

100DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesEnabling or Disabling the DNS ClientThe DNS client is

Página 9 - Features

101DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesAdding the Default Domain NameTo add the default domai

Página 10 - Installation Overview

102DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesAdding an AliasTo add an alias, use the following comm

Página 11

103DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesTo statically set the time and date: • Set the time z

Página 12 - Getting Started

104DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesClearing the Time ZoneTo clear the time zone, use the

Página 13 - Installation

6DWS-1008 User’s Manual D-Link Systems, Inc.Installation Hardware and ToolsCaution: To reduce the risk of equipment damage, make sure the switch is in

Página 14 - Installation (continued)

105DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesClearing the Summertime PeriodTo clear the summertime

Página 15

106DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesMSS adjusts the NTP reply according to the followi

Página 16 - Configuration

107DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesResetting the Update Interval to the DefaultTo reset t

Página 17 - Configuration (continued)

108DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesDisplaying ARP Table EntriesTo display ARP table entri

Página 18

109DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesTo change the aging timeout, use the following command

Página 19

110DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesTo establish a Telnet session from the switch to 10.10

Página 20

111DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesThe traceroute facility determines the address of the

Página 21

112DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and Services* = From DHCPVLAN Name Address Mask Enabled

Página 22

113DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesDWS-1008# show ip routeRouter table for IPv4Destinatio

Página 23

114DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesDWS-1008# show summertimeSummertime is enabled, and se

Página 24

7DWS-1008 User’s Manual D-Link Systems, Inc.Please read the following before you begin:Mobility System Software* (MSS) operates a D-Link Mobility Syst

Página 25

115DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPConfiguring SNMPOverviewThe MSS SNMP engine (also called the SNMP server or agent) can ru

Página 26

116DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPSetting the System Location and Contact StringsTo set the location and contact strings f

Página 27

117DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPConguring Community Strings (SNMPv1 and SNMPv2c Only)To congure a community string for

Página 28

118DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPCreating a USM User for SNMPv3 To create a USM user for SNMPv3, use the following comman

Página 29

119DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPThe auth-type option species the authentication type used to authenticate communication

Página 30

120DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPSetting SNMP SecurityBy default, MSS allows nonsecure SNMP message exchanges. You can co

Página 31

121DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPConguring a Notication ProleA notification profile is a named list of all the

Página 32

122DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMP • ClientDot1xFailureTraps - Generated when a client experiences an 802.1X failure

Página 33

123DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMP • RFDetectClientViaRogueWiredAPTraps - Generated when MSS detects, on the wired p

Página 34

124DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPCommand ExamplesThe following command changes the action in the default notication p

Página 35

8DWS-1008 User’s Manual D-Link Systems, Inc.InstallationInstallationEquipment Rack Installation1. Remove the four bracket screws from each side of the

Página 36

125DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPDWS-1008 set snmp notify prole snmpprof_rfdetect sendRFDetectSpoofedSsidAPTrapssuccess:

Página 37

126DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPTo congure a notication target for informs from SNMPv2c, use the following command:set

Página 38

127DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPThe security option species the security level, and is applicable only when

Página 39

128DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPDisplaying SNMP InformationYou can display the following SNMP information: • Version a

Página 40

129DWS-1008 User’s Manual D-Link Systems, Inc.Conguring SNMPDisplaying SNMP Statistics CountersTo display SNMP statistics counters, use the followin

Página 41

130DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsConfiguring DWL-8220AP Access PointsDWL-8220AP access points contai

Página 42

131DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsDirectly Connected DWL-8220APs and Distributed APsTo congure the swi

Página 43

132DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Pointssubnet. If the AP is unable to locate an DWS-1008 on the subnet it is

Página 44

133DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Pointson the other device:• Disable STP on the other device’s port.• Enable

Página 45

134DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsAP ParametersThe table below summarizes parameters that apply to indi

Página 46

9DWS-1008 User’s Manual D-Link Systems, Inc.Installation (continued)InstallationPowering On a DWS-1008 Switch (continued)4. Observe the power supply L

Página 47

135DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsResiliency and Dual-Homing Options for APsAPs can support a wide vari

Página 48

136DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsAP Boot ProcessA DWL-8220AP access point brings up the link on the AP

Página 49

137DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Points• If an switch that receives the Find DWS-1008 message does not have

Página 50

138DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Points6. The DNS server replies with the system IP address of an switch. •

Página 51

139DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsSession Load BalancingYou can assign DWL-8220AP access points t

Página 52

140DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Pointsauth-fallthru none Denies access to users who do not match an 802.1X

Página 53

141DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Pointsshared-key-auth disable Does not use shared-key authentication.This p

Página 54

142DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsPublic and Private SSIDsEach radio can support the following types of

Página 55

143DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsEncryptionEncrypted SSIDs can use the following encryption methods:•

Página 56

144DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Pointscountermeasures Not conguredDoes not issue countermeasures against a

Página 57 - Local Access

10DWS-1008 User’s Manual D-Link Systems, Inc.Connecting to the NetworkUse the following procedures to connect a DWS-1008 switch to DWL-8220AP access p

Página 58 - Access Modes

145DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Pointsrts-threshold 2346 Transmits frames longer than 2346 bytes by means o

Página 59 - Enabling an Administrator

146DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Pointsvalues for each radio for optimal performance. For example, leaving t

Página 60 - Authenticating at the Console

147DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsTo verify the conguration change, use the following command:show sys

Página 61

148DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Points============================================================= Fan sta

Página 62 - Setting User Passwords

149DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsTo display the AP settings in the template, type the following comman

Página 63

150DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsAPs that receive their congurations from the template also receive t

Página 64 - Saving the Conguration

151DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsDisplaying Status Information for APs Congured by the TemplateTo dis

Página 65 - Telnet Users

152DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsConguring AP Port ParametersTo congure a switch for connection to a

Página 66

153DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Points802.1X Port uses authentication parameters congured for users.Port g

Página 67

154DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsThe dap-num parameter identies the Distributed AP connection for

Página 68 - Ports and VLANs

11DWS-1008 User’s Manual D-Link Systems, Inc.ConfigurationCongurationYou can use CLI (Command Line Interface) to congure a new switch or

Página 69

155DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsChanging BiasThe CLI commands described in this section enable you to

Página 70 - Clearing a Port

156DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsTo enable or disable LED blink mode, use the following command:set {a

Página 71 - Removing a Port Name

157DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsAP Security Requirements AP Security SettingAP Has FingerprintFingerp

Página 72

158DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsThe ngerprint is displayed regardless of whether it has been veried

Página 73 - Displaying Port Information

159DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsConguring a Service ProleA service prole is a set of parameters th

Página 74 - Clearing Statistics Counters

160DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsChanging the Fallthru Authentication TypeBy default, MSS denies acces

Página 75 - Monitoring Port Statistics

161DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsChanging the Beacon IntervalThe beacon interval is the rate at which

Página 76 - Conguring a Port Group

162DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsWhen a frame is long enough for the RTS/CTS method to be applicabl

Página 77 - Removing a Port Group

163DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsChanging the Long Retry ThresholdThe long retry threshold species th

Página 78 - Conguring and Managing VLANs

164DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsDisabling 802.11b Client Associations on 802.11b/g RadiosBy default,

Página 79 - VLAN Names

12DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationCLI Quickstart CommandThe quickstart command runs a script that in

Página 80 - Conguring a VLAN

165DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsGenerally, clients assume access points require long preambles and

Página 81 - Adding Ports to a VLAN

166DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsRemoving a Radio ProleTo remove a radio prole, use the following co

Página 82 - Displaying VLAN Information

167DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsThe parameters are shown in separate commands for simplicity. However

Página 83

168DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsTo map a radio prole to a service prole, use the following command:

Página 84

169DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsDisabling or Reenabling All Radios Using a ProleTo disable or reenab

Página 85

170DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsRestarting an APTo restart an access point, use the following command

Página 86

171DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsTo display conguration information for a Distributed AP access point

Página 87

172DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsDisplaying Connection Information for Distributed APsA Distributed AP

Página 88

173DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsTo display radio prole information for the default radio prole, typ

Página 89

174DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access PointsRadio 2 type: 802.11a, state: configure succeed [Enabled] operati

Página 90

13DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationTo run the quickstart command:1. Attach a PC to the DWS-1008 sw

Página 91 - Interfaces and Services

175DWS-1008 User’s Manual D-Link Systems, Inc.Conguring DWL-8220AP Access Points TxUniPkt TxUniByte RxPkt RxByte Un

Página 92 - Enabling the DHCP Client

176DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User EncryptionConfiguring User EncryptionMobility System Software (MSS) encrypts wireless use

Página 93 - Conguring the DHCP Client

177DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption177D-Link Systems, Inc.The table below lists the encryption types supported by

Página 94 - Removing an IP Interface

178DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption178D-Link Systems, Inc.Conguring WPAWi-Fi Protected Access (WPA) is a s

Página 95

179DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption179D-Link Systems, Inc.• If the recalculated MIC does not match the MIC receiv

Página 96 - Displaying IP Routes

180DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption180D-Link Systems, Inc.Note: For a MAC client that authenticates using a PSK,

Página 97 - Adding a Static Route

181DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption181D-Link Systems, Inc.The table below lists the encryption support for WPA an

Página 98 - Removing a Static Route

182DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption182D-Link Systems, Inc.To create a new service prole named wpa, type the foll

Página 99 - Enabling SSH

183DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption183D-Link Systems, Inc.set service-prole name tkip-mc-time wait-timeTo change

Página 100 - Adding an SSH User

184DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption184D-Link Systems, Inc.Examples: To congure service prole wpa to use

Página 101 - Managing SSH Server Sessions

14DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)Conguration • Administrative user admin1, with password letmein. The only manag

Página 102 - Displaying Telnet Status

185DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption185D-Link Systems, Inc.Assigning the Service Prole to Radios and Enabling the

Página 103

186DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption186D-Link Systems, Inc.If you plan to use PSK authentication, you also need to

Página 104 - Conguring and Managing DNS

187DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption187D-Link Systems, Inc.After you type this command, the service prole support

Página 105 - Removing a DNS Server

188DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption188D-Link Systems, Inc.Conguring WEPWired-Equivalent Privacy (WEP) is a secur

Página 106

189DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption189D-Link Systems, Inc.The key value parameter specifies the hexadecimal value

Página 107 - Displaying Aliases

190DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption190D-Link Systems, Inc.Encryption Conguration ScenariosThe following scenario

Página 108 - Displaying the Time Zone

191DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption191D-Link Systems, Inc.6. Map service prole wpa to radio prole rp1. Type the

Página 109 - Clearing the Time Zone

192DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption192D-Link Systems, Inc.2. Create a service prole named wpa-wep for the SSID.

Página 110 - Conguring and Managing NTP

193DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption193D-Link Systems, Inc.8. Apply radio prole rp2 to radio 1 on port 5 and to r

Página 111 - Removing an NTP Server

194DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption194D-Link Systems, Inc.3. Add MAC users to MAC user group wpa-for-mac. Type th

Página 112 - Managing the ARP Table

DWS-1008 User’s Manual D-Link Systems, Inc.ITable of ContentsTable of ContentsProduct ContentsSystem RequirementsIntroductionHardware OverviewFeatures

Página 113 - Changing the Aging Timeout

15DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationDWS-1008-aabbcc# quickstartThis will erase any existing config. Contin

Página 114 - Logging In to a Remote Device

195DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption195D-Link Systems, Inc.8. Enable the WEP40 cipher suite in service prole wpa-

Página 115 - Tracing a Route

196DWS-1008 User’s Manual D-Link Systems, Inc.Conguring User Encryption196D-Link Systems, Inc.DWS-1008# show ap congPort 4: AP model: DWL-8220AP, P

Página 116

197DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-TuningConfiguring RF Auto-TuningRF AutoTuning OverviewThe RF AutoTuning feature dynami

Página 117

198DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-TuningChannel and Power TuningRF AutoTuning can change the channel or power of a radi

Página 118

199DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-Tuning• Utilization, calculated based on the number of multicast packets per second t

Página 119

200DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-Tuningchannel-interval 3600 Every 3600 seconds, MSS examines the RF information gathe

Página 120 - Configuring SNMP

201DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-Tuningmax-retransmissions 10 If more than 10% of the packets received by the radio fr

Página 121 - Enabling SNMP Versions

202DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-TuningChanging RF AutoTuning Settings

Página 122

203DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-TuningChanging Power Tuning SettingsEnabling Power TuningRF AutoTuning for power is d

Página 123

204DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-TuningChanging the Maximum Default Power Allowed On a RadioBy default, the maximum de

Página 124 - Command Examples

16DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)Conguration6. Optionally, enable Telnet.DWS-1008-aabbcc# set ip telnet server e

Página 125 - Command Example

205DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-TuningDisplaying RF AutoTuning InformationYou can display the RF AutoTuning congurat

Página 126

206DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-TuningTo display the RF AutoTuning and other individual radio settings on b

Página 127

207DWS-1008 User’s Manual D-Link Systems, Inc.Conguring RF Auto-TuningDisplaying RF AttributesTo display the current values of the RF attributes RF A

Página 128

208DWS-1008 User’s Manual D-Link Systems, Inc.Wi-Fi MultimediaWi-Fi MultimediaMSS supports Wi-Fi Multimedia (WMM). WMM provides wireless Quali

Página 129

209DWS-1008 User’s Manual D-Link Systems, Inc.Wi-Fi MultimediaQoS on a DWL-8220APDWL-8220AP access points use forwarding queues to prioritize t

Página 130

210DWS-1008 User’s Manual D-Link Systems, Inc.Wi-Fi MultimediaDisplaying the WMM StateTo display the WMM state for a radio prole, use the following c

Página 131

211DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STPConfiguring and Managing Spanning Tree ProtocolThe purpose of the Spanning

Página 132 - Enabling the SNMP Service

212DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP212D-Link Systems, Inc.Bridge PriorityThe bridge priority determines the swit

Página 133

213DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP213D-Link Systems, Inc.Changing the Bridge PriorityTo change the bridge prior

Página 134

214DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP214D-Link Systems, Inc.The command applies only to the ports you specify. The

Página 135 - Country of Operation

17DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationAccessing the CLITo enter the conguration commands in this section,

Página 136

215DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP215D-Link Systems, Inc.Changing Spanning Tree TimersYou can change the follow

Página 137 - Distributed APs and STP

216DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP216D-Link Systems, Inc.Changing the STP Maximum AgeTo change the maximum age,

Página 138

217DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP217D-Link Systems, Inc.Uplink Fast ConvergenceUplink fast convergence enables

Página 139 - AP Parameters

218DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP218D-Link Systems, Inc.Conguring Backbone Fast ConvergenceTo enable or disab

Página 140

219DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP219D-Link Systems, Inc.Displaying Spanning Tree InformationYou can use CLI co

Página 141 - AP Boot Process

220DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP220D-Link Systems, Inc.Displaying the STP Port Cost on a VLAN BasisTo display

Página 142

221DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP221D-Link Systems, Inc.To display STP statistics for port 1, type the followi

Página 143

222DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP222D-Link Systems, Inc.bridge forward delay 15topology change initiator

Página 144 - Service Proles

223DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP223D-Link Systems, Inc.DWS-1008# show port statusPort Name Admin Oper

Página 145

224DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing STP224D-Link Systems, Inc.Bridge ID Priority 32768Bridge Max Age 20 se

Página 146

18DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguration OverviewTo congure a DWS-1008 switch for basic s

Página 147 - Public and Private SSIDs

225DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IGMP SnoopingConfiguring and ManagingIGMP SnoopingInternet Group Management Pr

Página 148 - Radio Proles

226DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IGMP SnoopingDWS-1008 User’s Manual Note: D-Link recommends that you use the pse

Página 149

227DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IGMP SnoopingDWS-1008 User’s Manual Changing the Query Response IntervalTo set t

Página 150 - Radio-Specic Parameters

228DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IGMP SnoopingDWS-1008 User’s Manual Conguring Static Multicast PortsA DWS-1008

Página 151 - Conguring Access Points

229DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IGMP SnoopingDWS-1008 User’s Manual To display multicast information for VLAN or

Página 152

230DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IGMP SnoopingDWS-1008 User’s Manual Displaying Multicast Statistics OnlyTo displ

Página 153 - Conguring a Template

231DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IGMP SnoopingDWS-1008 User’s Manual Displaying Multicast ReceiversTo display inf

Página 154 - Distributed APs

232DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsConfiguring and ManagingSecurity ACLsAbout Security Access Control L

Página 155 - Enabling the Template

233DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsOverview of Security ACL CommandsThe gure below provides a visual

Página 156

234DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsCreating and Committing a Security ACLThe security ACLs you create

Página 157 - Conguring AP Port Parameters

19DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguring an Enable PasswordD-Link recommends that you congure

Página 158

235DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsCommon IP Protocol NumbersNumber IP Protocol1 Internet Message Cont

Página 159 - Changing AP Names

236DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsClass of ServiceClass-of-service (CoS) assignment determines the pr

Página 160 - Enabling LED Blink Mode

237DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsThe before 1 portion of the ACE places it before any others in the

Página 161 - Encryption Options

238DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsSetting a TCP ACLThe following command lters TCP packets: set secu

Página 162 - Finding the Fingerprint

239DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsCommitting a Security ACLTo put the security ACLs you have created

Página 163 - Fingerprint Log Message

240DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsViewing Committed Security ACLsTo view a summary of the committed s

Página 164 - Conguring a Service Prole

241DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsDisplaying Security ACL HitsOnce you map an ACL, you can view the n

Página 165 - Changing Radio Parameters

242DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsMapping Security ACLsUser-based security ACLs are mapped to an

Página 166 - Changing the RTS Threshold

243DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsMapping Target CommandsUser authenticated by a passwordset user use

Página 167

244DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsDisplaying ACL Maps to Ports, VLANs, and Virtual PortsTwo commands

Página 168

20DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguring the Time and DateTo set the system time and date:1. Set th

Página 169 - Changing the Preamble Length

245DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsconguration in the local database on the switch or on the RADIUS s

Página 170

246DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLs DWS-1008# set security acl ip acl-violet permit 192.168.123.11 0.

Página 171 - Removing a Radio Prole

247DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLs DWS-1008# show security acl info all ACL information for all se

Página 172

248DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLs DWS-1008# show security acl info all ACL information for all se

Página 173

249DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLs DWS-1008# show security acl info all editbuffer ACL edit-buffer

Página 174

250DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsDWS-1008# set security acl map acl1 dap 2 outsuccess: change accept

Página 175 - Displaying AP Information

251DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsWMM Priority DesiredCLI CoS Value to EnterBackground 1 or 2Best eff

Página 176

252DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLs DWS-1008# commit security acl voip4. Map the ACL to the outbound

Página 177

253DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLsSecurity ACL Conguration ScenarioThe following scenario illustrate

Página 178

254DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Security ACLs7. To save your conguration, type the following command: DWS-1008

Página 179

21DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationAdditional commands congure an NTP server and enable the switch’s NT

Página 180

255DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and CerticatesA digital certicate is a form of electronic identication for computers.

Página 181 - Configuring User Encryption

256DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and Certicates2. Inside the switch’s digital certicate is the switch’s public key, which

Página 182

257DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and CerticatesPublic Key InfrastructuresA public-key infrastructure (PKI) is a system of

Página 183 - Conguring WPA

258DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and CerticatesPKCS #7, PKCS #10, and PKCS #12 Object FilesPublic-Key Cryptography Standar

Página 184 - WPA Authentication Methods

259DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and CerticatesPKCS #12 Personal Information Exchange Syntax StandardContains a certicate

Página 185 - Client Support

260DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and Certicates• PKCS #12 object le certicate - More secure than using self-signed certi

Página 186

261DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and CerticatesYou must include a common name (string) when you generate a self-signed cer

Página 187 - Enabling WPA

262DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and Certicates3. Unpack the PKCS #12 object le into the certicate and key storage area

Página 188 - Enabling PSK Authentication

263DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and CerticatesInstalling a CA’s Own CerticateIf you installed a CA-signed certicate fro

Página 189 - Displaying WPA Settings

264DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and CerticatesKey and Certicate Conguration ScenariosThe rst scenario shows how to gen

Página 190 - Conguring RSN (802.11i)

22DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguring IP ConnectivityTo congure IP connectivity:1. Congure a V

Página 191 - Enabling RSN

265DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and Certicates4. Display certicate information for verication:DWS-1008# show crypto cer

Página 192 - Displaying RSN Settings

266DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and CerticatesInstalling CA-Signed Certicates from PKCS #12 Object FilesThis scenario

Página 193 - Conguring WEP

267DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and CerticatesInstalling CA-Signed Certicates Using a PKCS #10 Object File (CSR) and a P

Página 194 - Assigning Static WEP Keys

268DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and Certicates8. Paste the signed certicate text block into the switch’s CLI, below the

Página 195 - Enabling WPA with TKIP

269DWS-1008 User’s Manual D-Link Systems, Inc.Managing Keys and CerticatesNotes

Página 196

270DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersConfiguring AAA for Network UsersAbout AAA for Network UsersNetwork users

Página 197

271DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersThe username or MAC address can be an exact match or can match a usergl

Página 198

272DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersLast-resort is described in Authentication Types. None means the

Página 199

273DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network Users• For a user to be successfully authenticated by an 802.1X rule, the us

Página 200

274DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network Users• Mobility-Prole - Controls the switch ports a user can access. For wi

Página 201

23DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationNote: To avoid confusion, do not assign numbers as VLAN nam

Página 202 - Configuring RF Auto-Tuning

275DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersAAA for network users controls and monitors their use of the network:•

Página 203 - Power Tuning

276DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network Users“Globs” and Groups for Network User Classication“Globbing” lets you cla

Página 204 - RF AutoTuning Parameters

277DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersLocal Override ExceptionThe one exception to the operation described in

Página 205

278DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network Users3. If server-2 does not respond, because the switch has no more servers

Página 206

279DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersPEAP-MS-CHAP-V2(Protected EAP with Microsoft Challenge Handshake Authent

Página 207

280DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersEffects of Authentication Type on Encryption MethodWireless users who ar

Página 208 - Enabling Power Tuning

281DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network Users2. The rst command whose SSID and user glob matches the SSID and incomi

Página 209

282DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersFor example, the following command authenticates 802.1X user Jose for wi

Página 210

283DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersThe authentication rule for the machine must be higher up in the list of

Página 211 - Displaying RF Neighbors

284DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersIf a Bonded Auth user’s session is ended due to 802.1X reauthenti

Página 212 - Displaying RF Attributes

24DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationVerifying IP ConnectivityTo verify that the switch can send and recei

Página 213 - Wi-Fi Multimedia

285DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersThe following command sets the Bonded Auth period to 60 seconds, to allo

Página 214 - Displaying WMM Information

286DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersUsers authorized by MAC address require a MAC authorization pas

Página 215 - Displaying the WMM State

287DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersFor example, the following command removes MAC user 01:0f:03:04:05:06 fr

Página 216 - Spanning Tree Protocol

288DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersFor example, to add the MAC user 00:01:02:03:04:05 to VLAN red:DWS-1008#

Página 217 - Port Priority

289DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersConguring Last-Resort AccessUsers who are not authenticated and authori

Página 218 - Changing the STP Port Cost

290DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersConguring AAA for Users of Third-Party APsA switch can provide netw

Página 219

291DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersRequirementsThird-Party AP Requirements• The third-party AP must be con

Página 220 - Changing Spanning Tree Timers

292DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersConguring Authentication for 802.1X Users of a Third-Party AP with Tagg

Página 221 - Backbone Fast Convergence

293DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersThe following command congures a MAC authentication rule that matches o

Página 222 - Uplink Fast Convergence

294DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersConguring Access for Any Users of a Non-Tagged SSIDIf SSID trafc from

Página 223

DWS-1008 User’s Manual D-Link Systems, Inc.IILogging In to a Remote DeviceTracing a RouteIP Interfaces and Services Conguration ScenarioConguring SN

Página 224

25DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationSpecifying the Country of OperationYou must specify the country in wh

Página 225 - Displaying Blocked STP Ports

295DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersAuthentication Attributes for Local Users Attribute Description Valid V

Página 226

296DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network Userslter-id(network access mode only)Security access control list (ACL), to

Página 227 - Clearing STP Statistics

297DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network Usersservice-type Type of access the user is requesting.One of the following

Página 228

298DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network Usersssid(network access mode only)SSID the user is allowed to access after a

Página 229

299DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network Usersvlan-name(network access mode only)Virtual LAN (VLAN) assignment.Note:

Página 230 - IGMP Snooping

300DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersAssigning a Security ACL to a User or a GroupOnce a security access

Página 231 - Changing IGMP Timers

301DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersThe following command applies the incoming lters of acl-101 to the user

Página 232 - Enabling Router Solicitation

302DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersAssigning and Clearing Encryption Types LocallyTo restrict wireless uses

Página 233

303DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersAssigning and Clearing Encryption Types on a RADIUS ServerTo assign or d

Página 234

304DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersHow the Location Policy Differs from a Security ACLAlthough structurally

Página 235 - Displaying Multicast Routers

26DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationThe following example sets the country code to US (United States) and

Página 236

305DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersApplying Security ACLs in a Location Policy RuleWhen reassigning securit

Página 237 - Security ACLs

306DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersTo move the rst rule to the end of the list and display the results, ty

Página 238

307DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersUsername UsernameSession duration Session durationTimestamp TimestampVLA

Página 239 - Setting a Source IP ACL

308DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersThe user started on DWS-1008-0013:DWS-1008-0013# show accounting statist

Página 240 - Wildcard Masks

309DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersDisplaying the AAA CongurationTo view the results of the AAA commands y

Página 241 - Class of Service

310DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersAvoiding AAA Problems in Conguration OrderUsing the Wildcard “Any” as t

Página 242 - Setting TCP and UDP ACLs

311DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersYou then set up PEAP-MS-CHAP-V2 authentication and authorization

Página 243 - Determining the ACE Order

312DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersConguring a Mobility ProleA Mobility Prole is a way of specifying, on

Página 244 - Committing a Security ACL

313DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersTo display the name of each Mobility Prole and its ports, type the foll

Página 245 - Viewing Security ACL Details

314DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersThis command applies the access list named acl-101 to each user at EXAMP

Página 246 - Displaying Security ACL Hits

27DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationTo verify the conguration change, use the following command:show sys

Página 247 - Mapping Security ACLs

315DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network Usersset accounting dot1x ssid mycorp EXAMPLE\* stop-only localset authentica

Página 248

316DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersEnabling PEAP-MS-CHAP-V2 AuthenticationThe following example illustra

Página 249 - Clearing a Security ACL Map

317DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersEnabling PEAP-MS-CHAP-V2 OfoadThe following example illustrates how to

Página 250 - Modifying a Security ACL

318DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersCombining EAP Ofoad with Pass-Through AuthenticationThe following examp

Página 251

319DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Network UsersOverriding AAA-Assigned VLANsThe following example shows how to change t

Página 252

320DWS-1008 User’s Manual D-Link Systems, Inc.Conguring Communication with RADIUSConfiguring Communication with RADIUSRADIUS OverviewRemote Authentica

Página 253

321DWS-1008 User’s Manual D-Link Systems, Inc.Conguring Communication with RADIUSIf a server does not respond before the last request attempt times o

Página 254 - Using ACLs to Change CoS

322DWS-1008 User’s Manual D-Link Systems, Inc.Conguring Communication with RADIUSSetting the System IP Address as the Source AddressBy default, RADIU

Página 255 - Handling

323DWS-1008 User’s Manual D-Link Systems, Inc.Conguring Communication with RADIUSNote: You must provide RADIUS servers with names that are unique. To

Página 256

324DWS-1008 User’s Manual D-Link Systems, Inc.Conguring Communication with RADIUSNote: Any RADIUS servers that do not respond are marked dead (unavai

Página 257

28DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguring for Authenticating UsersA DWS-1008 switch can provide auth

Página 258

325DWS-1008 User’s Manual D-Link Systems, Inc.Conguring Communication with RADIUSThe following command disables load balancing for a server group:cle

Página 259

326DWS-1008 User’s Manual D-Link Systems, Inc.Conguring Communication with RADIUSFor example, to delete the server group shorebirds, type the followi

Página 260 - Managing Keys and Certificates

327DWS-1008 User’s Manual D-Link Systems, Inc.Conguring Communication with RADIUS6. Display the conguration. Type the following command:DWS-1008# sh

Página 261 - About Keys and Certicates

328DWS-1008 User’s Manual D-Link Systems, Inc.Managing 802.1XManaging 802.1XCertain settings for IEEE 802.1X sessions on the DWS-1008 switch are enabl

Página 262 - Digital Certicates

329DWS-1008 User’s Manual D-Link Systems, Inc.Managing 802.1XFor example, the following command forces port 19 to unconditionally authenticate all 802

Página 263

330DWS-1008 User’s Manual D-Link Systems, Inc.Managing 802.1XConguring 802.1X Key Transmission Time IntervalsThe following command sets the number of

Página 264 - Creating Keys and Certicates

331DWS-1008 User’s Manual D-Link Systems, Inc.Managing 802.1XUse the following command to disable WEP rekeying for broadcast and multicast keys:DWS-10

Página 265

332DWS-1008 User’s Manual D-Link Systems, Inc.Managing 802.1XNote: To support SSIDs that have both 802.1X and static WEP clients, MSS sends a maximum

Página 266

333DWS-1008 User’s Manual D-Link Systems, Inc.Managing 802.1XNote: If the number of reauthentications for a wired authentication client is greater tha

Página 267

334DWS-1008 User’s Manual D-Link Systems, Inc.Managing 802.1XTo reset the Bonded Auth period to its default value, use the following command:clear dot

Página 268

29DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguring APs for Wireless UsersA wireless user makes a wireless con

Página 269

335DWS-1008 User’s Manual D-Link Systems, Inc.Managing 802.1XSetting the 802.1X Timeout for a ClientUse the following command to set the number of s

Página 270

336DWS-1008 User’s Manual D-Link Systems, Inc.Managing 802.1XViewing 802.1X ClientsType the following command to display active 802.1X clients:DWS-100

Página 271

337DWS-1008 User’s Manual D-Link Systems, Inc.Managing 802.1X port 5, authcontrol: auto, max-sessions: 16 port 6, authcontrol: auto, max

Página 272

338DWS-1008 User’s Manual D-Link Systems, Inc.Managing SessionsManaging SessionsAbout the Session ManagerA session is a related set of communic

Página 273

339DWS-1008 User’s Manual D-Link Systems, Inc.Managing SessionsTo clear the sessions of all administrative users, type the following command:DWS-1008#

Página 274 - Managing Keys and Certicates

340DWS-1008 User’s Manual D-Link Systems, Inc.Managing SessionsTo clear the administrative sessions of Telnet clients, use the following command:clear

Página 275 - About AAA for Network Users

341DWS-1008 User’s Manual D-Link Systems, Inc.Managing SessionsDisplaying Verbose Network Session InformationIn the show sessions network commands, yo

Página 276 -  Last-resort

342DWS-1008 User’s Manual D-Link Systems, Inc.Managing SessionsDWS-1008# show sessions network user E*User Sess IP or MAC

Página 277

343DWS-1008 User’s Manual D-Link Systems, Inc.Managing SessionsFor example, to clear all sessions for MAC address 00:01:02:04:05:06, type the followin

Página 278 - Authorization

344DWS-1008 User’s Manual D-Link Systems, Inc.Managing SessionsAuthentication Method: PEAP, using server 192.168.142.7Session statistics as updated fr

Página 279 - Summary of AAA Features

30DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationThe image below shows examples of direct and network DWL-822

Página 280 - AAA Tools for Network Users

345DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresRogue Detection and CountermeasuresAP radios automatically scan the

Página 281

346DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresRogue Detection ListsRogue detection lists specify the third-party de

Página 282

347DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresRadios perform both types of scans on all channels allowed for the co

Página 283

348DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresDynamic Frequency Selection (DFS)Some regulatory domains require conf

Página 284

349DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresPermitted vendor listList of OUIs to allow on the network. An OUI is

Página 285

350DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresActive scan Active scan sends probe any requests (probes with a null

Página 286 - Using Pass-Through

351DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresThe following example shows the permitted vendor list on switch:DWS-1

Página 287

352DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresThe following example shows the permitted SSID list on the switch:DWS

Página 288

353DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresThe following example shows the client black list on switch:DWS-1008#

Página 289 -  Set the Bonded Auth period

354DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresTo remove a MAC address from the attack list, use the following comma

Página 290

31DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationThe following sections list the conguration requirements for

Página 291

355DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresEnabling CountermeasuresCaution: Countermeasures affect wireless serv

Página 292

356DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresEnabling AP SignaturesAn AP signature is a set of bits in a managemen

Página 293

357DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresFlood AttacksA ood attack is a type of Denial of Service attack. Dur

Página 294 - Conguring Last-Resort Access

358DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and Countermeasures• Fake AP - A rogue device sends beacon frames for randomly

Página 295

359DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresDisallowed Devices or SSIDsYou can congure the following types of li

Página 296 - Requirements

360DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresManagement frame 7 oodClient aa:bb:cc:dd:ee:ff is sending rsvd mgmt

Página 297 - Tagged SSIDs

361DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresFake AP SSID (when source MAC address is known)FakeAP SSID attack det

Página 298

362DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresDisplaying RF Detection InformationYou can use the CLI commands liste

Página 299

363DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresDisplaying Rogue ClientsTo display the wireless clients detected by a

Página 300

364DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresDWS-1008# show rfdetect countersType Current Total--

Página 301

32DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationDNS - If the intermediate network between the switch and Distributed

Página 302

365DWS-1008 User’s Manual D-Link Systems, Inc.Rogue Detection and CountermeasuresDisplaying the APs Detected by an AP RadioTo displays the APs detecte

Página 303

366DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesManaging System FilesA DWS-1008 switch contains nonvolatile storage. MSS allo

Página 304

367DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesKernel: 3.0.0#43: Wed Jun 30 05:17:44 PDT 2004BootLoader: 1.19 /

Página 305

368DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesIn this example, the switch is running software version 1.1.0. The switch used the

Página 306

369DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesThe following command displays the les in the old subdirectory:DWS-1008# dir old==

Página 307

370DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesNote: You can copy a le from an switch to a TFTP server or from a TFTP server to a

Página 308 - About the Location Policy

371DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesTo copy le corpa-login.html from a TFTP server into subdirectory corpa

Página 309 - Setting the Location Policy

372DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesDWS-1008# mkdir corp2success: change accepted.DWS-1008# dir========================

Página 310

373DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesThis section describes how to display the running conguration and the conguration

Página 311

374DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesTo display only the VLAN conguration commands, type the following command:DWS-1008

Página 312

33DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguring for a Directly-Connected APCaution: When you set the port

Página 313

375DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesLoading a Conguration FileCaution: This command completely removes the running con

Página 314

376DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesBacking Up and Restoring the SystemMSS has commands that enable you to easily backu

Página 315

377DWS-1008 User’s Manual D-Link Systems, Inc.Managing System FilesCaution: Do not use the force option unless advised to do so by D-Link TAC. If you

Página 316

378DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingTroubleshootingSome common problems that occur during installation and

Página 317 - Conguring a Mobility Prole

379DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingClient cannot access the network.This symptom has more than one possible cau

Página 318

380DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingRecovering the System PasswordYou can recover the system enable password if

Página 319

381DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingLog Message ComponentsEach log message contains the following components: Fi

Página 320 - 8. Save the conguration:

382DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingSpecifying a severity level sends log messages for events or conditions at t

Página 321

383DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingTo stop sending messages to a syslog server, use the following command:clear

Página 322

384DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingTo lter the event log by MSS area, use the facility facility-name keyword.

Página 323

34DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationThe following example sets ports 1, 2, and 4 for the DWL-8220AP acces

Página 324 - Overriding AAA-Assigned VLANs

385DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingLogging Messages to a Syslog ServerTo send event messages to a syslog server

Página 325 - Conguring RADIUS Servers

386DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingChanging the Current Telnet Session DefaultsBy default, log information is n

Página 326

387DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingDisplaying the Log CongurationTo display your current log conguration, typ

Página 327

388DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingTracing Authentication ActivityTracing authentication activity can help you

Página 328 - Creating Server Groups

389DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingDWS-1008# show tracemilliseconds spent printing traces: 31.945Trace Area

Página 329

390DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingDisplaying Trace ResultsTo view the output of currently running trace comman

Página 330 - Deleting a Server Group

391DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingClearing the Trace LogTo clear all messages from the trace log buffer, type

Página 331

392DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - Troubleshootingset authentication dot1x *@xmpl.com pass-through sg1set authentication dot1x

Página 332

393DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingRemotely Monitoring TrafcRemote trafc monitoring enables you to snoop wire

Página 333 - Managing 802.1X

394DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - Troubleshooting• If the snoop lter is running on a Distributed AP, and the AP used a DHCP

Página 334

DWS-1008 User’s Manual D-Link Systems, Inc.IIIConguring and Managing IGMP SnoopingDisabling or Reenabling IGMP SnoopingDisabling or Reenabling Proxy

Página 335 - Managing WEP Keys

35DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationNote: You can congure an AP conguration template for automatically

Página 336

395DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingIf you omit a condition, all packets match that condition. For example, if y

Página 337

396DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingMapping a Snoop Filter to a RadioYou can map a snoop lter to a radio on a D

Página 338

397DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - Troubleshootingclear snoop map filter-name dap dap-num radio {1 | 2}The following command re

Página 339 - Managing Other Timers

398DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - TroubleshootingDWS-1008# show snoop stats snoop1Filter Dap Radio Rx Match Tx M

Página 340 - Displaying 802.1X Information

399DWS-1008 User’s Manual D-Link Systems, Inc.Appendix A - Troubleshooting To disable the decryption option in Ethereal:a. In the decode window, rig

Página 341 - Viewing 802.1X Clients

400DWS-1008 User’s Manual D-Link Systems, Inc.Appendix B - Supported RADIUS AttribitesSupported RADIUS AttributesD-Link’s Mobility System Software

Página 342 - Viewing 802.1X Statistics

401DWS-1008 User’s Manual D-Link Systems, Inc.Appendix B - Supported RADIUS AttribitesService-Type5 No Yes Yes Access type, which can be one of the fo

Página 343 - Managing Sessions

402DWS-1008 User’s Manual D-Link Systems, Inc.Appendix B - Supported RADIUS AttribitesClass 25 Yes No Yes If received, this information must be sent o

Página 344

403DWS-1008 User’s Manual D-Link Systems, Inc.Appendix B - Supported RADIUS AttribitesAcct-Input- Octets42 No No Yes Number of octets received from th

Página 345

404DWS-1008 User’s Manual D-Link Systems, Inc.Appendix B - Supported RADIUS AttribitesAcct-Input- Gigawords52 No No YesNumber of times the Acct-Input

Página 346

36DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationCongure the same Distributed AP on each of the switches you want to

Página 347

405DWS-1008 User’s Manual D-Link Systems, Inc.Appendix C - DHCP ServerDHCP ServerMSS has a DHCP server that the switch uses to allocate IP addresses t

Página 348

406DWS-1008 User’s Manual D-Link Systems, Inc.Appendix C - DHCP ServerHow the MSS DHCP Server WorksWhen MSS receives a DHCP Discover packet, the DHCP

Página 349

407DWS-1008 User’s Manual D-Link Systems, Inc.Appendix C - DHCP ServerThe following command enables the DHCP server on VLAN red-vlan to serv

Página 350 - Countermeasures

408DWS-1008 User’s Manual D-Link Systems, Inc.Appendix C - DHCP Server DHCP Clients: Hardware Address: 00:01:02:03:04:05 State:

Página 351 - RF Detection Scans

409DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryGlossary3DESA three-round application of the Data Encryption Standard (DES) that us

Página 352

410DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - Glossary802.11An IEEE LAN specication that denes the mobile (wireless) network access lin

Página 353

411DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - Glossaryaccess control listSee security ACL.access point (AP)A hardware unit that acts

Página 354

412DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryattributeIn authentication, authorization, and accounting (AAA), a property used to

Página 355

413DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryBSSBasic service set. A set of wireless stations that communicate with one another

Página 356

414DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryChallenge Handshake Authentication ProtocolSee CHAP.CHAPChallenge Handshake Authe

Página 357

37DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguring a Service ProleA service prole controls advertisement

Página 358 - Conguring an Attack List

415DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossarycryptographyThe science of information security. Modern cryptography is typ

Página 359 - Conguring an Ignore List

416DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryDHCPDynamic Host Conguration Protocol. A protocol that dynamically assigns

Página 360 - Enabling Countermeasures

417DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryDSSSDirect-sequence spread-spectrum. One of two types of spread-spectrum radio te

Página 361 - IDS and DoS Alerts

418DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryEAP over LANSee EAPoL.EAP over WirelessSee EAPoL.EAPoWSee EAPoL.EAPTLSExtensible Au

Página 362 - DoS Attacks

419DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryETSIEuropean Telecommunications Standards Institute. A nonprot organization that e

Página 363 - Weak WEP Key Used by Client

420DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - Glossaryforwarding database (FDB)A database maintained on a DWS-1008 switch for the purpose

Página 364 - IDS Log Message Examples

421DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - Glossarygroup transient keySee GTK.H.323A set of International Telecommunications Union Tel

Página 365

422DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryIEEEInstitute of Electrical and Electronic Engineers. An American professio

Página 366

423DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - Glossaryintegrity check valueSee ICV.interfaceA place at which independent systems meet and

Página 367

424DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryLDAPLightweight Directory Access Protocol. A protocol dened in RFC 1777 f

Página 368 - Displaying Rogue Clients

38DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationParameter Default Value Radio Behavior When Parameter Set To D

Página 369

425DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryMAC service data unitSee MSDU.master secretA code derived from the pre-master

Página 370

426DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - Glossaryminimum data transmit rateThe lowest rate at which a DWL-8220AP access point can tr

Página 371 - Managing System Files

427DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - Glossarynetwork address translationSee NAT.nonvolatile storageA way of storing images and c

Página 372 - Displaying Boot Information

428DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryPer-VLAN Spanning Tree protocolSee PVST+.PIMProtocol Independent Multicast protocol

Página 373 - Working with Files

429DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryPoE Power over Ethernet. A technology, dened in the developing IEEE 802.3

Página 374 - Copying a File

430DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryPRNGPseudorandom number generator. An algorithm of predictable behavior that

Página 375

431DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryQoSQuality of service. A networking technology that seeks to measure, improve, and

Página 376 - Creating a Subdirectory

432DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - Glossaryrestricted accessPermission to use most Mobility System Software (MSS) comm

Página 377 - Managing Conguration Files

433DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryscalabilityThe ability to adapt easily to increased or decreased requireme

Página 378

434DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossarySIPSession Initialization Protocol. A signaling protocol that establishes r

Página 379 - Saving Conguration Changes

39DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationTo create a service prole and assign an SSID to it, use the followin

Página 380 - Loading a Conguration File

435DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - Glossarysyslog serverA remote repository for log messages. D-Link Mobility System Software

Página 381

436DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryTTLSTunneled Transport Layer Security. An Extensible Authentication Protocol

Página 382 - Backup and Restore Examples

437DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - Glossaryuser globA D-Link convention for matching fully qualied structured usernames or se

Página 383 - Troubleshooting

438DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryVSAVendor-specic attribute. A type of RADIUS attribute that enables a ve

Página 384

439DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryWired-Equivalent Privacy protocolSee WEP.Wireless Ethernet Compatibility AllianceSe

Página 385

440DWS-1008 User’s Manual D-Link Systems, Inc.Appendix D - GlossaryX.500A standard of the International Organization for Standardization (ISO)

Página 386 - Log Message Components

441DWS-1008 User’s Manual D-Link Systems, Inc.Hardware SpecicationsPhysical and Environmental• Dimensions (W x D x H): 17.4 x 8.2 x 1.72 in (44.2 x

Página 387 - Using Log Commands

442DWS-1008 User’s Manual D-Link Systems, Inc.Technical Specifications (continued)Appendix E - Technical SpecicationsEMI / EMC• FCC PART 15 • ICES PAR

Página 388

443DWS-1008 User’s Manual D-Link Systems, Inc.Technical Specifications (continued)Appendix E - Technical SpecicationsGeneral• RFC 1122 Host requiremen

Página 389

444DWS-1008 User’s Manual D-Link Systems, Inc.WarrantyAppendix F - WarrantySubject to the terms and conditions set forth herein, D-Link Systems, Inc.

Página 390

40DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationThe following command congures radio prole rp1:DWS-1008# set radio-

Página 391

445DWS-1008 User’s Manual D-Link Systems, Inc.Except as otherwise agreed by D-Link in writing, the replacement Software is provided only to the origin

Página 392 - Running Traces

446DWS-1008 User’s Manual D-Link Systems, Inc.D-Link may reject or return any product that is not packaged and shipped in strict compliance with the f

Página 393 - Displaying a Trace

447DWS-1008 User’s Manual D-Link Systems, Inc.Limitation of Liability:TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK IS NOT LIABLE UNDER ANY CONTRACT,

Página 394 - About Trace Results

448DWS-1008 User’s Manual D-Link Systems, Inc.FCC Statement: This equipment has been tested and found to comply with the limits for a Class B digital

Página 395 - Displaying Trace Results

449DWS-1008 User’s Manual D-Link Systems, Inc.RegistrationAppendix G - RegistrationRevised: April 26, 2006 Version 1.1Product registration is entirely

Página 396 - Using Show Commands

41DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationParameter Default Value Radio Behavior When Parameter Set To D

Página 397 - Viewing ARP Information

42DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationThe following command congures radio 1 (the 802.11b/g radio) on Dist

Página 398 - Remotely Monitoring Trafc

43DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationHere is an example:DWS-1008# show ap cong 1Port 1: AP model: dwl-822

Página 399 - Conguring a Snoop Filter

44DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguring User AuthenticationMSS provides the following types of aut

Página 400

DWS-1008 User’s Manual D-Link Systems, Inc.IVManaging 802.1XManaging 802.1X on Wired Authentication PortsManaging 802.1X Encryption KeysManaging 802.1

Página 401

45DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)Conguration• Local - The switch performs all authentication with information in

Página 402

46DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguring RADIUS Servers for Pass-Through AuthenticationTo congure

Página 403

47DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationDWS-1008# show aaaDefault Valuesauthport=1812 acctport=1813 timeout=5

Página 404

48DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationAuthentication Example for Users in a UNIX DomainThe following comman

Página 405 - Supported RADIUS Attributes

49DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationConguring EAP Ofoad with Server AuthenticationYou can congure a DW

Página 406

50DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationDWS-1008# show aaaDefault Valuesauthport=1812 acctport=1813 timeout=5

Página 407

51DWS-1008 User’s Manual D-Link Systems, Inc.Configuration (continued)CongurationThe following command displays the beginning of the congurat

Página 408

52DWS-1008 User’s Manual D-Link Systems, Inc.Configuring AAA for Administrative and Local AccessOverview of AAA for Administrative and Local AccessD-Li

Página 409

53DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Administrative and Local Access• Accounting for administrative access sessions. Accoun

Página 410 - DHCP Server

54DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Administrative and Local AccessTypes of Administrative AccessMSS allows you access to

Página 411 - Conguring the DHCP Server

1DWS-1008 User’s Manual D-Link Systems, Inc.Product ContentsProduct ContentsDWS-1008 8-Port Wireless SwitchPower SupplySerial Cable for Connection to

Página 412

55DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Administrative and Local AccessSetting the DWS-1008 Switch Enable PasswordThere is one

Página 413

56DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Administrative and Local Access2. To enforce the use of console authentication via the

Página 414 - Glossary

57DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Administrative and Local AccessSetting User PasswordsLike usernames, passwords are cas

Página 415

58DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Administrative and Local AccessTo congure accounting for administrative logins over t

Página 416

59DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Administrative and Local AccessDisplaying the AAA CongurationTo display your AAA con

Página 417

60DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Administrative and Local AccessAdministrative AAA Conguration ScenariosThe following

Página 418

61DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Administrative and Local AccessDWS-1008# set authentication admin * sg1success: change

Página 419

62DWS-1008 User’s Manual D-Link Systems, Inc.Conguring AAA for Administrative and Local AccessAuthentication When RADIUS Servers Do Not RespondThis

Página 420 - 20 dBm/10

63DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsConfiguring and ManagingPorts and VLANsYou can congure and display

Página 421

64DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsTo set ports 4 through 6 for the DWL-8220AP and enable PoE on the

Página 422

2DWS-1008 User’s Manual D-Link Systems, Inc.IntroductionThe D-Link® AirPremier® MobileLAN™ DWS-1008 is a wireless LAN switch optimized for deployme

Página 423

65DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsSetting a Port for a Wired Authentication UserTo set a port for a

Página 424

66DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsClearing a Port (continued)Note: If clients are connected to

Página 425

67DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsConguring Port Operating ParametersAutonegotiation is enabled by

Página 426

68DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsResetting a PortYou can reset a port by toggling its link state an

Página 427

69DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsDisplaying PoE StateTo display the PoE state of a port, use the fo

Página 428

70DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsMonitoring Port StatisticsYou can display port statistics in a for

Página 429

71DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsTo cycle the display to the next set of statistics, press the Spac

Página 430

72DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsConguring a Port Group (continued)After you congure a port g

Página 431

73DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsInteroperating with Cisco Systems EtherChannelLoad-sharing port gr

Página 432 - Base64

74DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsNote. A wireless client cannot join a VLAN if the physical ne

Página 433

3DWS-1008 User’s Manual D-Link Systems, Inc.Hardware OverviewHardware Overview (Front Panel)Console Port:The serial console port provides a direct man

Página 434

75DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsTrafc ForwardingA DWS-1008 switch switches trafc at Layer 2 amon

Página 435

76DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsCreating a VLANTo create a VLAN, use the following command:set vla

Página 436

77DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsRemoving an Entire VLAN or a VLAN PortTo remove an entire VLAN or

Página 437

78DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsTo display information for VLAN burgundy, type the following comma

Página 438

79DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsHow Entries Enter the Forwarding DatabaseAn entry enters the forwa

Página 439

80DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsUse a colon between each byte in the address (for example, 11:22:3

Página 440

81DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsTo clear all dynamic forwarding database entries that match all VL

Página 441

82DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANs1. Assign names to ports to identify their functions, and verify t

Página 442

83DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANsBoot Time: 2000-03-18 22:59:19Uptime: 0 days 00:13:45=============

Página 443

84DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANs4. Congure port 5 and 6 as wired authentication ports and verify

Página 444

4DWS-1008 User’s Manual D-Link Systems, Inc.FeaturesPower Features Power supplies - The DWS-1008 switch contains one 100-120 VAC auto-sensing AC p

Página 445

85DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing Ports and VLANs7. Save the conguration. Type the following command:DWS-1008# sav

Página 446 - Technical Specifications

86DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesConfiguring and Managing IP Interfaces and ServicesMTU S

Página 447 - Software Specications

87DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesAdding an IP InterfaceYou can add an IP interface to a

Página 448

88DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and Services• If the address is not in use, MSS congures the VLAN

Página 449 - Warranty

89DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesThe IP interface table ags the address assigned by a D

Página 450 - Submitting A Claim:

90DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesConguring the System IP AddressYou can designate one o

Página 451 - What Is Not Covered:

91DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesIf the IP route table contains an explicit route for a

Página 452 - Copyright Statement:

92DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesThis example also shows two static routes, which have a

Página 453 - IMPORTANT NOTE:

93DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesTo add two default routes and congure MSS to always us

Página 454 - Registration

94DWS-1008 User’s Manual D-Link Systems, Inc.Conguring and Managing IP Interfaces and ServicesManaging SSHMSS supports Secure Shell (SSH) Version 2.

Comentários a estes Manuais

Sem comentários