This document provides an understanding of the CLI and Web configuration options for
D-Link DWS-3000 features.
Document Organization
This document shows examples of the use of the Unified Switch in a typical network. It
describes the use and advantages of specific functions provided by the Unified Switch and
includes information about configuring those functions using the command-line interface
(CLI) and Web interface.
The Unified Switch can operate as a Layer 2 switch, a Layer 3 router, or a combination switch/
router. The switch also includes support for network management and Quality of Service
functions such as Access Control Lists and Differentiated Services. The functions you choose
to activate will depend on the size and complexity of your network.
This document illustrates configuration for the following functions:
•L2 Features
-Virtual LANs (VLANs)
-Storm Control
-Trunking (Link Aggregation/Port Channels)
-Internet Group Management Protocol (IGMP) Snooping
-Port Mirroring
-Link Layer Discovery Protocol (LLDP)
-Denial of Service Attack Protection
•L3 Features
-Port Routing
-VLAN Routing
-Virtual Router Redundancy Protocol (VRRP)
-Proxy ARP
-Routing Information Protocol (RIP)
•Security Features
-802.1x Network Access Control
-Captive Portal
-RADIUS
-TACACS+
-Port Security
•Quality of Service (QoS)
-Access Control Lists (ACLs)
-Class of Service (CoS)
-Differentiated Services
Document Organization15
Configuration Guide
•Management
CLI/Web Examples - Slot/Port Designations
To help you understand configuration tasks, this document contains examples from the CLI
and Web Interfaces. The examples are based on the D-Link DWS-3000 switch and use the
slot/port naming convention for interfaces, e.g. 0/2
Audience
-DHCP Filtering
-Traceroute
-Configuration Scripting
-Outbound Telnet
-Pre-Login Banner
-Simple Network Time Protocol (SNTP)
-Syslog
-Port Description
Use this guide if you are a(n):
•Experienced system administrator who is responsible for configuring and operating a net-
work using the D-Link DWS-3000 switch
•Level 1 and/or Level 2 Support provider
To obtain the greatest benefit from this guide, you should have an understanding of the Unified
Switch. You should also have basic knowledge of Ethernet and networking concepts.
CLI Documentation
The DWS-3000 CLI Command Reference gives information about the CLI commands used to
configure the switch. The document provides CLI descriptions, syntax, and default values.
Refer to the DWS-3000 CLI Command Reference for information on:
Connect a terminal to the switch to begin configuration.
In-Band and Out-of-Band Connectivity
Ask the system administrator to determine whether you will configure the switch for in-band
or out-of-band connectivity. To use the Web Interface, you must set up your system for in-band
connectivity.
Configuring for In-Band Connectivity
In-band connectivity allows you to access the switch from a remote workstation using the
Ethernet network. To use in-band connectivity, you must configure the switch with IP
information (IP address, subnet mask, and default gateway).
1
Configure for In-band connectivity using one of the following methods:
•BootP or DHCP
•EIA-232 port
Using BootP or DHCP
You can assign IP information initially over the network or over the Ethernet service port
through BootP or DHCP. Check with your system administrator to determine whether BootP
or DHCP is enabled.
You need to configure the BootP or DHCP server with information about the switch —obtain
this information through the serial port connection using the
the server with the following values:
IP Address
Unique IP address for the switch. Each IP parameter is made up of four decimal numbers, ranging from 0 to 255. The default for all IP parameters is
10.90.90.90.
Subnet
Subnet mask for the LAN
show network command. Set up
In-Band and Out-of-Band Connectivity17
Configuration Guide
Gateway
MAC Address
When you connect the switch to the network for the first time after setting up the BootP or
DHCP server, it is configured with the information supplied above. The switch is ready for inband connectivity over the network.
If you do not use BootP or DHCP, access the switch through the EIA-232 port, and configure
the network information as described below.
Using the EIA-232 Port
You can use a locally or remotely attached terminal to configure in-band management through
the EIA-232 port.
1. To use a locally attached terminal, attach one end of a null-modem serial cable to the
2. Set up the terminal for VT100 terminal emulation.
IP address of the default router, if the switch is a node outside the IP range of
the LAN
MAC address of the switch
EIA-232 port of the switch and the other end to the COM port of the terminal or workstation.
For remote attachment, attach one end of the serial cable to the EIA-232 port of the switch
and the other end to the modem.
A. Set the terminal ON.
B. Launch the VT100 application.
C. Configure the COM port as follows:
I.Set the data rate to 115,200 baud.
II. Set the data format to 8 data bits, 1 stop bit, and no parity.
III. Set the flow control to none.
IV. Select the proper mode under Properties.
V. Select Terminal keys.
3. The Log-in User prompt displays when the terminal interface initializes.
Enter an approved user name and password. The default is
admin for the user name and
the password is blank.
The switch is installed and loaded with the default configuration.
4. Reduce network traffic by turning off the Network Configuration Protocol. Enter the following command:
configure network protocol none
5. Set the IP address, subnet mask, and gateway address by issue the following command:
Unique IP address for the switch. Each IP parameter is made up of four decimal numbers, ranging from 0 to 255. The default for all IP parameters is 10.90.90.90.
IP address of the default router, if the switch is a node outside the IP range of the
LAN.
6. To enable these changes to be retained during a reset of the switch, type
to the main prompt, type
changes.
7. To view the changes and verify in-band information, issue the command:
8. The switch is configured for in-band connectivity and ready for Web-based management.
save config at the main menu prompt, and type y to confirm the
Configuring for Out-of-Band Connectivity
To monitor and configure the switch using out-of-band connectivity, use the console port to
connect the switch to a terminal desktop system running terminal emulation software. The
console port connector is a female DB-9 connector, implemented as a data terminal equipment
(DTE) connector.
1 Getting Started
CTRL+Z to return
show network.
The following hardware is required to use the console port:
•VT100-compatible terminal, or a desktop, or a portable system with a serial port running
VT100 terminal emulation software.
•An RS-232 cable with a male DB-9 connector for the console port and the appropriate
connector for the terminal.
Perform the following tasks to connect a terminal to the switch console port using out-of-band
connectivity:
1. Connect the RS-232 cable to the terminal running VT100 terminal emulation software.
2. Configure the terminal emulation software as follows:
A. Select the appropriate serial port (serial port 1 or serial port 2) to connect to the con-
sole.
B. Set the data rate to 115,200 baud.
C. Set the data format to 8 data bits, 1 stop bit, and no parity.
D. Set the flow control to none.
E. Select the proper mode under
F. Select Terminal keys.
NOTE: When using HyperTerminal with Microsoft Windows 2000, make sure that
you have Windows 2000 Service Pack 2 or later installed. With Windows
2000 Service Pack 2, the arrow keys function properly in HyperTerminal's
VT100 emulation. Go to www.microsoft.com
dows 2000 service packs.
Properties.
for more information on Win-
3. Connect the RS-232 cable directly to the switch console port, and tighten the captive
retaining screws.
In-Band and Out-of-Band Connectivity19
Configuration Guide
Starting the Switch
1. Make sure that the switch console port is connected to a VT100 terminal or a VT100 ter-
2. Locate an AC power receptacle.
3. Deactivate the AC power receptacle.
4. Connect the switch to the AC receptacle.
5. Activate the AC power receptacle.
When the power is turned on with the local terminal already connected, the switch goes
through a power-on self-test (POST). POST runs every time the switch is initialized and
checks hardware components to determine if the switch is fully operational before completely
booting. If POST detects a critical problem, the startup procedure stops. If POST passes
successfully, a valid executable image is loaded into RAM. POST messages are displayed on
the terminal and indicate test success or failure. The boot process runs for approximately 60
seconds.
minal emulator via the RS-232 crossover cable.
Initial Configuration
NOTE: The initial simple configuration procedure is based on the following assump-
tions:
•The switch was not configured before and is in the same state as when you received it.
•The switch booted successfully.
•The console connection was established and the console prompt appears on the screen of a
VT100 terminal or terminal equivalent.
The initial switch configuration is performed through the console port. After the initial
configuration, you can manage the switch either from the already-connected console port or
remotely through an interface defined during the initial configuration.
NOTE: The switch is not configured with a default user name and password.
NOTE: All of the settings below are necessary to allow the remote management of the
switch through Telnet (Telnet client) or HTTP (Web browser).
Before setting up the initial configuration of the switch, obtain the following information from
your network administrator:
•The IP address to be assigned to the management interface through which the switch is
This section contains procedures to help you become acquainted quickly with the switch
software.
Before installing the Unified Switch, you should verify that the switch operates with the most
recent firmware.
Quick Starting the Networking Device
1. Configure the switch for In-band or Out-of-Band connectivity. In-band connectivity
allows access to the Unified Switch locally or from a remote workstation. You must configure the device with IP information (IP address, subnet mask, and default gateway).
2. Turn the Power ON.
3. Allow the device to load the software until the login prompt appears. The device initial
state is called the default mode.
4. When the prompt asks for operator login, do the following steps:
-Type admin at the login prompt. Since a number of the Quick Setup commands
require administrator account rights, D-Link suggests logging into an administrator
account.
Do not enter a password because the default mode does not use a password - after typing
admin, press Enter two times.
-The CLI User EXEC prompt is displayed.
-Type enable to switch to the Privileged EXEC mode from User EXEC.
-Type configure to switch to the Global Config mode from Privileged EXEC.
-Type exit to return to the previous mode.
-Enter ? to show a list of commands that are available in the current mode.
1 Getting Started
NOTE: For more information about the configuration modes, see the CLI Command
Reference.
System Information and System Setup
This section describes the commands you use to view system information and to setup the
network device. The tables below contain the Quick Start commands that allow you to view or
configure the following information:
•Software versions
•Physical port data
•User account management
•IP address configuration
•Uploading from Networking Device to Out-of-Band PC (Only XMODEM)
•Downloading from Out-of-Band PC to Networking Device (Only XMODEM)
•Downloading from TFTP Server
•Restoring factory defaults
For each of these tasks, a table shows the command syntax, the mode you must be in to
execute the command, and the purpose and output of the command. If you configure any
network parameters, you should execute the
write command.
Unified Switch Installation21
Configuration Guide
This command saves the changes to the configuration file. You must be in the correct mode to
execute the command. If you do not save the configuration, all changes are lost when you
power down or reset the networking device.
Quick Start up Software Version Information
Table 1 . Quick Start up Software Version Information
show hardware
(Privileged EXEC
Mode)
CommandDetails
Switch: 1
System Description..................... D-Link DWS-3026
Machine Model.......................... DWS-3026
Serial Number.......................... 123456abcdef
FRU Number..............................
Maintenance Level...................... A
Manufacturer........................... 0xbc00
Burned In MAC Address.................. 00:01:17:86:34:55
Software Version....................... D.4.18.8
Additional Packages.................... QOS
Quick Start up Physical Port Data
Table 2 . Quick Start up Physical Port Data
CommandDetails
show port all
(Privileged EXEC
Mode)
Displays the ports
Interface - slot/port, See the CLI Command Reference for more informa-
tion about naming conventions.
Type - Indicates if the port is a special type of port.
Admin Mode - Selects the Port Control Administration State.
Physical Mode - Selects the desired port speed and duplex mode.
Physical Status - Indicates the port speed and duplex mode.
Link Status - Indicates whether the link is up or down.
Link Trap - Determines whether or not to send a trap when link status
changes.
LACP Mode - Displays whether LACP is enabled or disabled on this port.
Displays all of the users who are allowed to access the networking device
Access Mode - Shows whether the user is able to change
parameters on the networking device(Read/Write) or is only
able to view them (Read Only).
As a factory default, the admin user has Read/Write access and
the guest user has Read Only access. There can only be one
Read/Write user and up to five Read Only users.
Displays all of the login session information.
Allows the user to set passwords or change passwords needed
to login
A prompt appears after the command is entered requesting the
user’s old password. In the absence of an old password, leave
the area blank. The user must press Enter to execute the command.
The system then prompts the user for a new password; then a
prompt to confirm the new password. If the new password and
the confirmed password match, a confirmation message is displayed.
A user password should not be more than eight characters in
length.
This command saves passwords and all other changes to the
device.
If you do not save the configuration by entering this command,
all configurations are lost when a power cycle is performed on
the networking device or when the networking device is reset.
Logs the user out of the networking device.
1 Getting Started
Unified Switch Installation23
Configuration Guide
Quick Start up IP Address
To view the network parameters the operator can access the device by the following three
methods.
•Simple Network Management Protocol - SNMP
•Te lnet
•We b Br owser
NOTE: Helpful Hint: The user should do a ‘copy system:running-config
Table 4 . Quick Start up IP Address
show network
(User EXEC Mode)
network parms <ipaddr>
<netmask> [gateway]
(Privileged EXEC Mode)
nvram:startup-config’ after configuring the network parameters so that the
configurations are not lost
CommandDetails
Displays the Network Configurations
IP Address - IP Address of the interface
Default IP is 10.90.90.90
Subnet Mask - IP Subnet Mask for the interface
Default is 255.0.0.0
Default Gateway - The default Gateway for this interface
Default value is 0.0.0.0
Burned in MAC Address - The Burned in MAC Address used for
in-band connectivity
Locally Administered MAC Address - Can be configured to allow a
locally administered MAC address
MAC Address Type - Specifies which MAC address should be used
for in-band connectivity
Network Configurations Protocol Current - Indicates which network protocol is being used
Default is none
Management VLAN ID - Specifies VLAN ID
Sets the IP Address, subnet mask, and gateway of the router. The IP
Address and the gateway must be on the same subnet.
IP Address range from 0.0.0.0 to 255.255.255.255
Subnet Mask range from 0.0.0.0 to 255.255.255.255
Gateway Address range from 0.0.0.0 to 255.255.255.255
This chapter is a brief introduction to the Web interface — it explains how to access the Webbased management panels to configure and manage the system.
Tip: Use the Web interface for configuration instead of the CLI interface. Web configuration
is quicker and easier than entering multiple required CLI commands.
You can manage your switch through a Web browser and Internet connection. This is referred
to as Web-based management. To use Web-based management, the system must be set up for
in-band connectivity.
To access the switch, the Web browser must support:
•HTML version 4.0, or later
•HTTP version 1.1, or later
•JavaScript
•Java
TM
TM
version 1.2, or later
Runtime Plug-in 1.50-06 or later
2
There are equivalent functions in the Web interface and the terminal interface — both
applications usually employ the same menus to accomplish a task. For example, when you log
in, there is a Main Menu with the same functions available, etc.
There are several differences between the Web and terminal interfaces. For example, on the
Web interface the entire forwarding database can be displayed, while the terminal interface
only displays 10 entries starting at specified addresses.
To terminate the Web interface session, click the Logout button.
Configuring for Web Access
To enable Web access to the switch:
1. Configure the switch for in-band connectivity. The Getting Started section of this docu-
ment gives instructions for doing this.
2. Enable Web mode:
A. At the CLI prompt, enter the
B. Set Web Mode to Enabled.
show networkcommand.
Configuring for Web Access27
Configuration Guide
Starting the Web Interface
Follow these steps to start the switch Web interface:
1. Enter the IP address of the switch in the Web browser address field.
2. Enter the appropriate User Name and Password. The User Name and associated Password
Figure 1. Web Interface Panel-Example
are the same as those used for the terminal interface. Click on the Login button.
3. The System Description Menu displays as shown in Figure 2, with the navigation tree
appearing to the left of the screen.
4. Make a selection by clicking on the appropriate item in the navigation tree.
Web Page Layout
A Web interface panel for the switch Web page consists of three areas (Figure 2).
A banner graphic of the switch appears across the top of the panel.
The second area, a hierarchical-tree view appears to the left of the panel. The tree consists of a
combination of folders, subfolders, and configuration and status HTML pages. You can think
of the folders and subfolders as branches and the configuration and status HTML pages as
leaves. Only the selection of a leaf (not a folder or subfolder) will cause the display of a new
HTML page. A folder or subfolder has no corresponding HTML page.
The third area, at the bottom-right of the panel, displays the currently selected device
configuration status and/or the user configurable information that you have selected from the
tree view.
Configuring an SNMP V3 user profile is a part of user configuration. Any user can connect to
the switch using the SNMPv3 protocol, but for authentication and encryption, additional steps
are needed. Use the following steps to configure an SNMP V3 new user profile.
Figure 3. Configuring an SNMP V3 User Profile
1. From the LAN navigation menu, select LAN> Administration> User Accounts (see
Figure 3).
Starting the Web Interface29
Configuration Guide
2. Using the User pull-down menu, select Create to create a new user.
3. Enter a new user name in the User Name field.
4. Enter a new user password in the Password field and then retype it in the Confirm
NOTE: If SNMPv3 Authentication is to be implemented for this user, set a password
5. If you do not need authentication, go to Step 9.
6. To enable authentication, use the Authentication Protocol pull-down menu to select
7. If you do not need encryption, go to Step 9.
8. To enable encryption, use the Encryption Protocol pull-down menu to select DES for the
9. Click Submit.
Command Buttons
Password field.
of eight or more alphanumeric characters.
either MD5 or SHA for the authentication protocol.
encryption scheme. Then, enter an encryption code of eight or more alphanumeric
characters in the Encryption Key field.
The following command buttons are used throughout the Web interface panels for the switch:
Save Pressing the Save button implements and saves the changes you just made.
Some settings may require you to reset the system in order for them to take
effect.
Refresh Pressing the Refresh button that appears next to the Apply button in Web
interface panels refreshes the data on the panel.
Submit Pressing the Submit button sends the updated configuration to the switch.
Configuration changes take effect immediately, but these changes are not
retained across a power cycle unless a save is performed.
Adding Virtual LAN (VLAN) support to a Layer 2 switch offers some of the benefits of both
bridging and routing. Like a bridge, a VLAN switch forwards traffic based on the Layer 2
header, which is fast. Like a router, it partitions the network into logical segments, which
provides better administration, security and management of multicast traffic.
A VLAN is a set of end stations and the switch ports that connect them. You can have many
reasons for the logical division, for example, department or project membership. The only
physical requirement is that the end station, and the port to which it is connected, both belong
to the same VLAN.
Each VLAN in a network has an associated VLAN ID, which appears in the IEEE 802.1Q tag
in the Layer 2 header of packets transmitted on a VLAN. An end station may omit the tag, or
the VLAN portion of the tag, in which case the first switch port to receive the packet may
either reject it or insert a tag using its default VLAN ID. A given port may handle traffic for
more than one VLAN, but it can only support one default VLAN ID.
3
Two features let you define packet filters that the switch uses as the matching criteria to
determine if a particular packet belongs to a particular VLAN.
•The IP-subnet Based VLAN feature lets you map IP addresses to VLANs by specifying a
source IP address, network mask, and the desired VLAN ID.
•The MAC-based VLAN feature let packets originating from end stations become part of a
VLAN according to source MAC address. To configure the feature, you specify a source
MAC address and a VLAN ID.
The Private Edge VLAN feature lets you set protection between ports located on the switch.
This means that a protected port cannot forward traffic to another protected port on the same
switch.
The feature does not provide protection between ports located on different switches.
The Voice VLAN feature lets you enable switch ports to carry traffic with defined settings so
that voice and data traffic are separated when coming onto the port.
33
Configuration Guide
VLAN Configuration Example
The diagram in this section shows a switch with four ports configured to handle the traffic for
two VLANs. Port 0/2 handles traffic for both VLANs, while port 0/1 is a member of VLAN 2
only, and ports 0/3 and 0/4 are members of VLAN 3 only. The script following the diagram
shows the commands you would use to configure the switch as shown in the diagram.
Figure 5. VLAN Example Network Diagram
Layer 3 Switch
Port 0/1
VLAN 2
Port 0/2
VLANs 2 & 3
VLAN 2
Configuring a Guest VLAN
You can configure a Guest VLAN for clients to limit network access. If a client station fails to
authenticate using 802.1X or RADIUS, or if the client does not support 802.1X, then after the
authentication times out, the station is put on the guest VLAN configured for that switch port.
Port 0/4
VLAN 3
Port 0/3
VLAN 3
VLAN 3
For more information about how to configure a Guest VLAN for wired clients, see “Guest
VLAN” on page 107.
Configuring Dynamic VLAN Assignments
The software supports VLAN assignment for clients based on the RADIUS server
authentication. You need an external RADIUS server to use the dynamic VLAN assignment
feature. For information about how to configure the switch to allow dynamic VLAN
assignments, see “Configuring Dynamic VLAN Assignment” on page 109.
This sequence shows how to assign ports to VLAN2, specify that frames will always be
transmitted tagged from all member ports, and that untagged frames will be rejected on
receipt.
(DWS-3024) (Vlan)#vlan association subnet 192.168.10.10 255.255.255.0 2
(DWS-3024) (Vlan)#exit
(DWS-3024) #show vlan association subnet
IP Address IP Mask VLAN ID
---------------- ---------------- -------
192.168.10.10 255.255.255.0 2
(DWS-3024) #
Web Interface
You can perform the same configuration in the CLI Examples section by using the Web
interface. To create VLANs and specify port participation, use the LAN> L2 Features > VLAN> VLAN Configuration page.
To specify the handling of untagged frames on receipt use the LAN> L2 Features > VLAN >
Port Configuration page.
Figure 7. VLAN Port Configuration
Private Edge VLANs
Use the Private Edge VLAN feature to prevent ports on the switch from forwarding traffic to
each other even if they are on the same VLAN.
•Protected ports cannot forward traffic to other protected ports in the same group, even if
they have the same VLAN membership. Protected ports can forward traffic to unprotected
ports.
•Unprotected ports can forward traffic to both protected and unprotected ports.
You can also configure groups of protected ports. Each group’s configuration consists of a
name and a mask of ports. A port can belong to only one set of protected ports. An unprotected
port can be added to a group as a protected port.
The group name is configurable by the network administrator.
Use the switchport protected command to designate a port as protected. Use the show switchport protected command to display a listing of the protected ports.
Private Edge VLANs37
Configuration Guide
CLI Example
Example #1: switchport protected
(DWS-3024) #config
(DWS-3024) (Config)#interface 0/1
(DWS-3024) (Interface 0/1)#switchport protected ?
<cr> Press Enter to execute the command.
(DWS-3024) (Interface 0/1)#switchport protected
Example #2: show switchport protected
(DWS-3024) #show switchport protected
0/1
Voice VLAN
The voice VLAN feature enables switch ports to carry voice traffic with defined settings so
that voice and data traffic are separated when coming onto the port. A voice VLAN ensures
that the sound quality of an IP phone is safeguarded from deterioration when data traffic on the
port is high.
The inherent isolation provided by VLANs ensures that inter-VLAN traffic is under
management control and that network-attached clients cannot initiate a direct attack on voice
components. A QoS protocol based on the IEEE 802.1P class-of-service (CoS) protocol uses
classification and scheduling to send network traffic from the switch in a predictable manner.
The system uses the source MAC of the traffic traveling through the port to identify the IP
phone data flow.
Voice VLAN is enabled per-port basis. A port can participate only in one voice VLAN at a
time. The Voice VLAN feature is disabled by default.
To display the Voice VLAN Configuration page, click L2 Features > VLAN > Voice VLAN Configuration.
The Voice VLAN Configuration page contains the following fields:
•Voice VLAN Admin Mode — Click Enable or Disable to administratively turn the Voice
VLAN feature on or off for all ports.
•Unit/Slot/Port — Specifies Select the stack unit, slot, and port to configure this service on.
•Voice VLAN Interface Mode — Select one of the following interface modes:
-Disable: The voice VLAN service is disabled on this interface. Note that the Admin
mode field takes precedence; i.e., if a particular interface is enabled, but the Admin
Mode field is set to Disabled, then the service will not be operational.
-None: The voice VLAN service is disabled on this interface; however, unlike Disable
mode, the CoS override feature is still operational on the port.
-VLAN ID: The voice VLAN packets are uniquely identified by a number you assign.
All voice traffic carries this VLAN ID to distinguish it from other data traffic which is
assigned the port’s default VLAN ID. However, voice traffic is not prioritized differently than other traffic.
-dot1p: This parameter is set by the VoIP device for all voice traffic to distinguish
voice data from other traffic. All other traffic is assigned the port’s default VLAN ID.
This feature may not be supported by all hardware configurations.
-Untagged: Configures the phone to send untagged voice traffic.
•CoS Override Mode — Overrides the 802.1p class-of-service (CoS) value for all data
(non-voice) packets arriving at the port. Thus any rogue client that is also connected to the
voice VLAN port cannot deteriorate the voice traffic.
•Operational State — Indicates whether the voice VLAN is operational.
If you make any changes, click Submit to apply the change to the system.
Click Refresh to display the latest information from the router.
A traffic storm is a condition that occurs when incoming packets flood the LAN, which creates
performance degradation in the network. The Unified Switch’s Storm Control feature protects
against this condition.
The Unified Switch provides broadcast, multicast, and unicast storm recovery for individual
interfaces or for all interfaces.
Unicast Storm Control protects against traffic whose MAC addresses are not known by the
system.
For broadcast, multicast, and unicast storm control, if the rate of traffic ingressing on an
interface increases beyond the configured threshold for that type, the traffic is dropped.
4
To configure storm control, you’ll enable the feature for all interfaces or for individual
interfaces, and you’ll set the threshold (storm control level) beyond which the broadcast,
multicast, or unicast traffic will be dropped.
Configuring a storm-control level also enables that form of storm-control. Disabling a stormcontrol level (using the “no” version of the command) sets the storm-control level back to
default value and disables that form of storm-control. Using the “no” version of the “stormcontrol” command (not stating a “level”) disables that form of storm-control but maintains the
configured “level” (to be active next time that form of storm-control is enabled).
CLI Example
Example #1: Set Broadcast Storm Control for All Interfaces
(DWS-3024) #config
(DWS-3024) (Config)#storm-control broadcast ?
all Configure storm-control features for all ports.
(DWS-3024) (Config)#storm-control broadcast all ?
<cr> Press Enter to execute the command.
level Configure storm-control thresholds.
(DWS-3024) (Config)#storm-control broadcast all level ?
CLI Example41
Configuration Guide
<rate> Enter the storm-control threshold as percent of port
speed.
(DWS-3024) (Config)#storm-control broadcast all level 7
(DWS-3024) (Config)#exit
(DWS-3024)
Example #2: Set Multicast Storm Control for All Interfaces
(DWS-3024) #config
(DWS-3024) (Config)#storm-control multicast all ?
<cr> Press Enter to execute the command.
level Configure storm-control thresholds.
(DWS-3024) (Config)#storm-control multicast all level 8
(DWS-3024) (Config)#exit
(DWS-3024) #
Example #3: Set Unicast Storm Control for All Interfaces
(DWS-3024) #config
(DWS-3024) (Config)#storm-control unicast all level 5
This section shows how to use the Trunking feature (also known as Link Aggregation) to
configure port-channels by using the CLI and the Web interface.
The Link Aggregation (LAG) feature allows the switch to treat multiple physical links
between two end-points as a single logical link called a port-channel. All of the physical links
in a given port-channel must operate in full-duplex mode at the same speed.
You can use the feature to directly connect two switches when the traffic between them
requires high bandwidth and reliability, or to provide a higher bandwidth connection to a
public network.
You can configure the port-channels as either dynamic or static. Dynamic configuration uses
the IEEE 802.3ad standard, which provides for the periodic exchanges of LACPDUs. Static
configuration is used when connecting the switch to an external switch that does not support
the exchange of LACPDUs.
5
The feature offers the following benefits:
•Increased reliability and availability — if one of the physical links in the port-channel
goes down, traffic is dynamically and transparently reassigned to one of the other physical
links.
•Increased bandwidth — the aggregated physical links deliver higher bandwidth than each
individual link.
•Incremental increase in bandwidth — A physical upgrade could produce a 10-times
increase in bandwidth; LAG produces a two- or five-times increase, useful if only a small
increase is needed.
Management functions treat a port-channel as if it were a single physical port.
You can include a port-channel in a VLAN. You can configure more than one port-channel for
a given switch.
CLI Example
The following shows an example of configuring the Unified Switch to support Link
Aggregation (LAG) to a server and to a Layer 2 switch.
CLI Example45
Configuration Guide
Figure 10 shows the example network.
Figure 10. LAG/Port-channel Example Network Diagram
Use the show port-channel all command to show the logical interface ids you will use to
identify the port-channels in subsequent commands. Assume that lag_10 is assigned id 3/1 and
lag_20 is assigned id 3/2.
This section describes the Internet Group Management Protocol (IGMP) feature: IGMPv3 and
IGMP Snooping. The IGMP Snooping feature enables the switch to monitor IGMP
transactions between hosts and routers. It can help conserve bandwidth by allowing the switch
to forward IP multicast traffic only to connected hosts that request multicast traffic.
Overview
IGMP:
•Uses Version 3 of IGMP
•Includes snooping
•Snooping can be enabled per VLAN
6
CLI Examples
The following are examples of the commands used in the IGMP Snooping feature.
Example #1: show igmpsnooping
(DWS-3024) #show igmpsnooping ?
<cr>Press Enter to execute the command.
<slot/port>Enter interface in slot/port format.
mrouterDisplay IGMP Snooping Multicast Router information.
<1-3965>Display IGMP Snooping valid VLAN ID information.
<cr> Press enter to execute the command.
groupmembership-interval Configure IGMP Group Membership Interval
(secs).
interfacemodeEnable/Disable IGMP Snooping.
maxresponseConfigure IGMP Max Response time (secs).
mcrtrexpiretimeSets the Multicast Router Present Expiration
time on the system.
(DWS-3026) (Config)#set igmp
Example #4: set igmp (Interface Config Mode)
(DWS-3026) (Config)#interface 0/2
(DWS-3026) (Interface 0/2)#set igmp ?
<cr> Press enter to execute the command.
fast-leave Enable/Disable Fast-Leave on a selected
interface
groupmembership-interval Configure IGMP Group Membership Interval
(secs).
maxresponse Configure IGMP Max Response time (secs).
mcrtrexpiretime Sets the Multicast Router Present Expiration
time on
the system.
mrouter Configure Multicast Router port.
This section describes the Port Mirroring feature, which can serve as a diagnostic tool,
debugging tool, or means of fending off attacks.
Overview
Port mirroring selects network traffic from specific ports for analysis by a network analyzer,
while allowing the same traffic to be switched to its destination. You can configure many
switch ports as source ports and one switch port as a destination port. You can also configure
how traffic is mirrored on a source port. Packets received on the source port, transmitted on a
port, or both received and transmitted, can be mirrored to the destination port.
7
CLI Examples
The following are examples of the commands used in the Port Mirroring feature.
Example #1: Set up a Port Mirroring Session
The following command sequence enables port mirroring and specifies a source and
destination ports.
The Link Layer Discovery Protocol (LLDP) feature allows individual interfaces on the switch
to advertise major capabilities and physical descriptions. Network managers can view this
information and identify system topology and detect bad configurations on the LAN.
LLDP has separately configurable transmit and receive functions. Interfaces can transmit and
receive LLDP information.
CLI Examples
Example #1: Set Global LLDP Parameters
8
Use the following sequence to specify switch-wide notification interval and timers for all
LLDP interfaces.
(DWS-3024) #config
(DWS-3024) (Config)#lldp ?
notification-interval Configure minimum interval to send remote data
<cr> Press Enter to execute the command.
hold The interval multiplier to set local LLDP data TTL.
interval The interval in seconds to transmit local LLDP data.
reinit The delay before re-initialization.
(DWS-3024) (Config)#lldp timers hold 8 reinit 5
(DWS-3024) (Config)#exit
CLI Examples61
Configuration Guide
(DWS-3024) #
Example #2: Set Interface LLDP Parameters
The following commands configure interface 0/10 to transmit and receive LLDP information.
The first networks were small enough for the end stations to communicate directly. As
networks grew, Layer 2 bridging was used to segregate traffic, a technology that worked well
for unicast traffic, but had problems coping with large quantities of multicast packets. The next
major development was routing, where packets were examined and redirected at Layer 3. End
stations needed to know how to reach their nearest router, and the routers had to understand
the network topology so that they could forward traffic. Although bridges tended to be faster
than routers, using routers allowed the network to be partitioned into logical subnetworks,
which restricted multicast traffic and also facilitated the development of security mechanisms.
An end station specifies the destination station’s Layer 3 address in the packet’s IP header but
sends the packet to the MAC address of a router. When the Layer 3 router receives the packet,
at a minimum it does the following:
10
•Looks up the Layer 3 address in its address table to determine the outbound port
•Updates the Layer 3 header
•Recreates the Layer 2 header
The router’s IP address is often statically configured in the end station, although the Unified
Switch supports DHCP that allow the address to be assigned dynamically. You may assign
static entries in the routing tables used by the router.
Port Routing Configuration
The Unified Switch always supports Layer 2 bridging, but Layer 3 routing must be explicitly
enabled, first for the Unified Switch as a whole, and then for each port which is to participate
in the routed network.
The configuration commands used in this section’s example enable IP routing on ports 0/2, 0/
3, and 0/5. The router ID is set to the Unified Switch’s management IP address, or to that of
any active router interface if the management address is not configured.
After you’ve issued the routing configuration commands, the following functions are active:
•IP Forwarding - responsible for forwarding received IP packets.
•ARP Mapping - responsible for maintaining the ARP Table used to correlate IP and MAC
addresses. The table contains both static entries and entries dynamically updated based on
information in received ARP frames.
Port Routing Configuration69
Configuration Guide
•Routing Table Object - responsible for maintaining the routing table populated by local
CLI Examples
The diagram in this section shows a Unified Switch configured for port routing. It connects
three different subnets, each connected to a different port. The script shows the commands you
would use to configure a Unified Switch to provide the port routing support shown in the
diagram.
Figure 28. Port Routing Example Network Diagram
and static routes.
Subnet 3
Port 0/3
192.130.3.1
Unified Switch
acting as a router
Port 0/2
192.150.2.2
Subnet 2
Port 0/5
192.64.4.1
Example 1. Enabling Routing for the Switch
Use the following command to enable routing for the switch. Execution of the command
enables IP forwarding by default.
config
ip routing
exit
Subnet 5
Example 2. Enabling Routing for Ports on the Switch
Use the following commands to enable routing for ports on the switch. The default link-level
encapsulation format is Ethernet. Configure the IP addresses and subnet masks for the ports.
You can configure the Unified Switch with some ports supporting VLANs and some
supporting routing. You can also configure the Unified Switch to allow traffic on a VLAN to
be treated as if the VLAN were a router port.
When a port is enabled for bridging (default) rather than routing, all normal bridge processing
is performed for an inbound packet, which is then associated with a VLAN. Its MAC
Destination Address (MAC DA) and VLAN ID are used to search the MAC address table. If
routing is enabled for the VLAN and the MAC DA of an inbound unicast packet is that of the
internal bridge-router interface, the packet will be routed. An inbound multicast packet will be
forwarded to all ports in the VLAN, plus the internal bridge-router interface if it was received
on a routed VLAN.
Since a port can be configured to belong to more than one VLAN, VLAN routing might be
enabled for all of the VLANs on the port, or for a subset. VLAN Routing can be used to allow
more than one physical port to reside on the same subnet. It could also be used when a VLAN
spans multiple physical networks, or when additional segmentation or security is required.
11
This section shows how to configure the Unified Switch to support VLAN routing. A port can
be either a VLAN port or a router port, but not both. However, a VLAN port may be part of a
VLAN that is itself a router port.
VLAN Routing Configuration
This section provides an example of how to configure the Unified Switch to support VLAN
routing. The configuration of the VLAN router port is similar to that of a physical port. The
main difference is that, after the VLAN has been created, you must use the show ip vlan
command to determine the VLAN’s interface ID so that you can use it in the router
configuration commands.
CLI Examples
The diagram in this section shows a Unified Switch configured for VLAN routing. It connects
two VLANs, with two ports participating in one VLAN, and one port in the other. The script
shows the commands you would use to configure the Unified Switch to provide the VLAN
routing support shown in the diagram.
VLAN Routing Configuration73
Configuration Guide
Figure 31. VLAN Routing Example Network Diagram
Layer 3 Switch
Physical Port 0/2
VLAN Router Port 4/1
192.150.3.1
Layer 2 Switch
VLAN 10
Physical
Port 0/1
Example 1: Create Two VLANs
The following commands show an example of how to create two VLANs with egress frame
tagging enabled.
vlan database
vlan 10
vlan 20
exit
Physical Port 0/3
VLAN Router Port 4/2
192.150.4.1
Layer 2 Switch
VLAN 20
config
interface 0/1
vlan participation include 10
exit
interface 0/2
vlan participation include 10
exit
interface 0/3
vlan participation include 20
exit
exit
config
vlan port tagging all 10
vlan port tagging all 20
exit
This returns the logical interface IDs that will be used in subsequent routing commands.
Assume that VLAN 10 is assigned ID 4/1 and VLAN 20 is assigned ID 4/2.
Enable routing for the switch:
config
ip routing
exit
The next sequence shows an example of configuring the IP addresses and subnet masks for the
VLAN router ports.
config
interface 4/1
ip address 192.150.3.1 255.255.255.0
exit
interface 4/2
ip address 192.150.4.1 255.255.255.0
exit
exit
CLI Examples75
Configuration Guide
Using the Web Interface to Configure VLAN Routing
You can perform the same configuration by using the Web Interface.
Use the LAN> L2 Features > VLAN> VLAN Configuration page to create the VLANs,
specify port participation, and configure whether frames will be transmitted tagged or
untagged.
Figure 32. VLAN Configuration
Use the LAN> L2 Features > VLAN > Port Configuration page to specify the handling of
untagged frames on receipt.
When an end station is statically configured with the address of the router that will handle its
routed traffic, a single point of failure is introduced into the network. If the router goes down,
the end station is unable to communicate. Since static configuration is a convenient way to
assign router addresses, Virtual Router Redundancy Protocol (VRRP) was developed to
provide a backup mechanism.
VRRP eliminates the single point of failure associated with static default routes by enabling a
backup router to take over from a “master” router without affecting the end stations using the
route. The end stations will use a “virtual” IP address that will be recognized by the backup
router if the master router fails. Participating routers use an election protocol to determine
which router is the master router at any given time. A given port may appear as more than one
virtual router to the network, also, more than one port on a Unified Switch may be configured
as a virtual router. Either a physical port or a routed VLAN may participate.
12
CLI Examples
This example shows how to configure the Unified Switch to support VRRP. Router 1 will be
the default master router for the virtual route, and Router 2 will be the backup router.
CLI Examples79
Configuration Guide
Figure 37. VRRP Example Network Configuration
Port 0/2
192.150.2.1
Virtual Router ID 20
Virtual Addr. 192.150.2.1
Layer 3 Switch acting
as Router 1
Layer 3 Switch acting
as Router 2
Port 0/4
192.150.4.1
Virtual Router ID 20
Virtual Addr. 192.150.2.1
Layer 2 Switch
Hosts
Example 1: Configuring VRRP on the Switch as a Master Router
Enable routing for the switch. IP forwarding is then enabled by default.
config
ip routing
exit
Configure the IP addresses and subnet masks for the port that will participate in the protocol.
config
interface 0/2
routing
ip address 192.150.2.1 255.255.255.0
exit
Enable VRRP for the switch.
config
ip vrrp
exit
Assign virtual router IDs to the port that will participate in the protocol.
Specify the IP address that the virtual router function will recognize. Note that the virtual IP
address on port 0/2 is the same as the port’s actual IP address, therefore this router will always
be the VRRP master when it is active. And the priority default is 255.
ip vrrp 20 ip 192.150.2.1
Enable VRRP on the port.
ip vrrp 20 mode
exit
Example 2: Configuring VRRP on the Switch as a Backup Router
Enable routing for the switch. IP forwarding is then enabled by default.
config
ip routing
exit
Configure the IP addresses and subnet masks for the port that will participate in the protocol.
config
interface 0/4
routing
ip address 192.150.4.1 255.255.255.0
exit
Enable VRRP for the switch.
config
ip vrrp 20
exit
Assign virtual router IDs to the port that will participate in the protocol.
config
interface 0/4
ip vrrp 20
Specify the IP address that the virtual router function will recognize. Since the virtual IP
address on port 0/4 is the same as Router 1’s port 0/2 actual IP address, this router will always
be the VRRP backup when Router 1 is active.
ip vrrp 20 ip 192.150.2.1
Set the priority for the port. The default priority is 100.
ip vrrp 20 priority 254
Enable VRRP on the port.
ip vrrp 20 mode
exit
CLI Examples81
Configuration Guide
Using the Web Interface to Configure VRRP
Use the following screens to perform the same configuration using the Graphical User
Interface:
To enable routing for the switch, use the LAN > L3 Features > IP > Configuration page.
Figure 38. IP Configuration
To enable routing for the ports and configure their IP addresses and subnet masks, use the
LAN> L3 Features > IP > Interface Configuration page.
This section describes the Proxy Address Resolution Protocol (ARP) feature.
Overview
•Proxy ARP allows a router to answer ARP requests where the target IP address is not the
router itself but a destination that the router can reach.
•If a host does not know the default gateway, proxy ARP can learn the first hop.
•Machines in one physical network appear to be part of another logical network.
•Without proxy ARP, a router responds to an ARP request only if the target IP address is an
address configured on the interface where the ARP request arrived.
13
CLI Examples
The following are examples of the commands used in the proxy ARP feature.
Example #1 show ip interface
(DWS-3024) #show ip interface ?
<slot/port> Enter an interface in slot/port format.
brief Display summary information about IP configuration
settings for all ports.
loopback Display the configured Loopback interface information.
IP MTU......................................... 1500
Overview85
Example #2: ip proxy-arp
DWS-3024) (Interface 0/24)#ip proxy-arp ?
<cr> Press Enter to execute the command.
(DWS-3024) (Interface 0/24)#ip proxy-arp
Web Example
The following web pages are used in the proxy ARP feature.
Figure 42. Proxy ARP Configuration
Web Example86
Routing Information Protocol (RIP)
This section describes the Routing Information Protocol (RIP). RIP is an Interior Gateway
Protocol (IGP) based on the Bellman-Ford algorithm and targeted at smaller networks
(network diameter no greater than 15 hops).
Overview
The routing information is propagated in RIP update packets that are sent out both periodically
and in the event of a network topology change. On receipt of a RIP update, depending on
whether the specified route exists or does not exist in the route table, the router may modify,
delete, or add the route to its route table.
14
The DWS-3000 switch supports RIP versions 1 and 2. RIPv2 supports carrying subnet
information in RIP packets, thereby enabling classless inter-domain routing. RIPv2 routers are
interoperable with RIPv1 routers on the network.
RIP Configuration
Use the RIP Configuration page to enable and configure or disable RIP in Global mode.
To display the page, click L3 Features > RIP > Configuration in the navigation tree.
Overview87
Configuration Guide
Figure 43. RIP Configuration
RIP Interface Configuration
Use the Interface Configuration page to enable and configure or to disable RIP on a specific
interface.
To display the page, click L3 Features > RIP > Interface Configuration in the navigation
tree.
Figure 44. RIP Interface Configuration
RIP Route Redistribution Configuration
Use the RIP Route Redistribution Configuration page to configure which routes are
redistributed to other routers using RIP. The allowable values for each fields are displayed next
to the field. If any invalid values are entered, an alert message is displayed with the list of all
the valid values.
To display the page, click L3 Features > RIP > Route Redistribution Configuration in the
navigation menu.
This section describes the Access Control Lists (ACLs) feature.
Overview
Access Control Lists (ACLs) are a collection of permit and deny conditions, called rules, that
provide security by blocking unauthorized users and allowing authorized users to access
specific resources. Normally ACLs reside in a firewall router or in a router connecting two
internal networks.
ACL Logging provides a means for counting the number of “hits” against an ACL rule. When
you configure ACL Logging, you augment the ACL deny rule specification with a ‘log’
parameter that enables hardware hit count collection and reporting. The D-Link DWS-3000
switch uses a fixed five minute logging interval, at which time trap log entries are written for
each ACL logging rule that accumulated a non-zero hit count during that interval. You cannot
configure the logging interval.
15
You can set up ACLs to control traffic at Layer 2, Layer 3, or Layer 4. MAC ACLs operate on
Layer 2. IP ACLs operate on Layers 3 and 4.
Limitations
The following limitations apply to ACLs.
•Maximum of 100 ACLs.
•Maximum rules per ACL is 10.
•The system supports ACLs set up for inbound traffic only.
•The system does not support MAC ACLs and IP ACLs on the same interface.
•It may not be possible to log every ACL rule due to limited hardware counter resources.
You can define an ACL with any number of logging rules, but the number of rules that are
actually logged cannot be determined until the ACL is applied to an interface. Furthermore, hardware counters that become available after an ACL is applied are not retroactively assigned to rules that were unable to be logged (the ACL must be un-applied then
re-applied). Rules that are unable to be logged are still active in the ACL for purposes of
permitting or denying a matching packet.
Overview91
Configuration Guide
•The order of the rules is important: when a packet matches multiple rules, the first rule
MAC ACLs
MAC ACLs are Layer 2 ACLs. You can configure the rules to inspect the following fields of a
packet:
•Source MAC address
•Source MAC mask
•Destination MAC address
•Destination MAC mask
•VLAN ID
•Class of Service (CoS) (802.1p)
•Ethertype
L2 ACLs can apply to one or more interfaces.
Multiple access lists can be applied to a single interface - sequence number determines the
order of execution.
takes precedence. Also, once you define an ACL for a given port, all traffic not specifically permitted by the ACL is denied access.
You can assign packets to queues using the assign queue option.
IP ACLs
IP ACLs classify for Layers 3 and 4.
Each ACL is a set of up to ten rules applied to inbound traffic. Each rule specifies whether the
contents of a given field should be used to permit or deny access to the network, and may
apply to one or more of the following fields within a packet:
The script in this section shows you how to set up an IP ACL with two rules, one applicable to
TCP traffic and one to UDP traffic. The content of the two rules is the same. TCP and UDP
packets will only be accepted by the Unified Switch if the source and destination stations have
IP addresses that fall within the defined sets.
Figure 46. IP ACL Example Network Diagram
15 Access Control Lists (ACLs)
UDP or TCP packet to
192.168.88.3 rejected:
Dest. IP not in range
Unified Switch
Port 0/2
CL 179
UDP or TCP packet to
192.168.77.3 accepted:
Dest. IP in range
Layer 2
Switch
192.168.77.1192.168.77.2192.168.77.9192.168.77.4
ACL Configuration Process93
Configuration Guide
Example #1: Create ACL 179 and Define an ACL Rule
After the mask has been applied, it permits packets carrying TCP traffic that matches the
specified Source IP address, and sends these packets to the specified Destination IP address.
<srcmac> Enter a MAC Address.
any Configure a match condition for all the source MAC
addresses in the Source MAC Address field.
(DWS-3024) (Config-mac-access-list)#deny any ?
<dstmac> Enter a MAC Address.
any Configure a match condition for all the destination
MAC addresses in the Destination MAC Address field.
bpdu Match on any BPDU destination MAC Address.
(DWS-3024) (Config-mac-access-list)#deny any 00:11:22:33:44:55 ?
<dstmacmask> Enter a MAC Address bit mask.
(DWS-3024) (Config-mac-access-list)#deny any 00:11:22:33:44:55 00
:00:00:00:FF:FF ?
15 Access Control Lists (ACLs)
<ethertypekey> Enter one of the following keywords to specify an
Ethertype (appletalk, arp, ibmsna, ipv4, ipv6, ipx,
mplsmcast, mplsucast, netbios, novell, pppoe, rarp).
<0x0600-0xffff> Enter a four-digit hexadecimal number in the range of
0x0600 to 0xffff to specify a custom Ethertype value.
vlan Configure a match condition based on a VLAN ID.
cos Configure a match condition based on a COS value.
log Configure logging for this access list rule.
assign-queue Configure the Queue Id assignment attribute.
<cr> Press Enter to execute the command.
(DWS-3024) (Config-mac-access-list)#deny any 00:11:22:33:44:55 00:00:00:00:FF:FF log ?
assign-queue Configure the Queue Id assignment attribute.
<cr> Press Enter to execute the command.
(DWS-3024) (Config-mac-access-list)#deny any 00:11:22:33:44:55 00:00:00:00:FF:FF log
<srcmac> Enter a MAC Address.
any Configure a match condition for all the source MAC
addresses in the Source MAC Address field.
(DWS-3024) (Config-mac-access-list)#permit any ?
<dstmac> Enter a MAC Address.
any Configure a match condition for all the destination
MAC addresses in the Destination MAC Address field.
bpdu Match on any BPDU destination MAC Address.
(DWS-3024) (Config-mac-access-list)#permit any any ?
<ethertypekey> Enter one of the following keywords to specify an
Ethertype (appletalk, arp, ibmsna, ipv4, ipv6, ipx,
mplsmcast, mplsucast, netbios, novell, pppoe, rarp).
<0x0600-0xffff> Enter a four-digit hexadecimal number in the range of
0x0600 to 0xffff to specify a custom Ethertype value.
vlan Configure a match condition based on a VLAN ID.
cos Configure a match condition based on a COS value.
log Configure logging for this access list rule.
assign-queue Configure the Queue Id assignment attribute.
<cr> Press Enter to execute the command.
15 Access Control Lists (ACLs)
(DWS-3024) (Config-mac-access-list)#permit any any
(DWS-3024) (Config-mac-access-list)#
Example #8: Show MAC Access Lists
(DWS-3024) #show mac access-lists
Current number of all ACLs: 2Maximum number of all ACLs: 100