User Manual
Product Model: DWS-4000 series DWL-8600AP DWL-6600AP DWL-3600AP
Unified Wired & Wireless Access System Release 2.0
November 2011
©Copyright 2011. All rights reserved.
D Link UWS User Manual
FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with this manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.
CE Mark Warning
This is a Class A product. In a domestic environment, this product may cause radio interference in which case the user may be required to take adequate measures.
Warnung!
Dies ist ein Produkt der Klasse A. Im Wohnbereich kann dieses Produkt Funkstoerungen verursachen. In diesem Fall kann vom Benutzer verlangt werden, angemessene Massnahmen zu ergreifen.
Precaución!
Este es un producto de Clase A. En un entorno doméstico, puede causar interferencias de radio, en cuyo case, puede requerirse al usuario para que adopte las medidas adecuadas.
Attention!
Ceci est un produit de classe A. Dans un environnement domestique, ce produit pourrait causer des interférences radio, auquel cas l`utilisateur devrait prendre les mesures adéquates.
Attenzione!
Il presente prodotto appartiene alla classe A. Se utilizzato in ambiente domestico il prodotto può causare interferenze radio, nel cui caso è possibile che l`utente debba assumere provvedimenti adeguati.
VCCI Warning
BSMI Warning
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 2 |
D Link UWS User Manual
MIC Warning
CCC Warning
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 3 |
D Link UWS User Manual |
|
Table of Contents |
|
About This Document................................................................................................................................... |
45 |
Audience ................................................................................................................................................ |
45 |
Organization........................................................................................................................................... |
45 |
Additional Documentation..................................................................................................................... |
46 |
Document Conventions ......................................................................................................................... |
46 |
Section 1: Getting Started ............................................................................................... |
47 |
Connecting the Switch to the Network........................................................................................................ |
47 |
Booting the Switch ....................................................................................................................................... |
48 |
Boot Menu Functions............................................................................................................................. |
49 |
Start Operational Code................................................................................................................... |
50 |
Change Baud Rate........................................................................................................................... |
50 |
Retrieve Event Log Using XMODEM ............................................................................................... |
51 |
Load New Operational Code Using XMODEM ................................................................................ |
51 |
Load Configuration Using XMODEM............................................................................................... |
52 |
Display Operational Code Vital Product Data................................................................................. |
52 |
Run Flash Diagnostics ..................................................................................................................... |
53 |
Update Boot Code .......................................................................................................................... |
54 |
Delete Operational Code ................................................................................................................ |
54 |
Reset the System ............................................................................................................................ |
55 |
Restore Configuration To Factory Defaults (Delete Configuration Files) ....................................... |
55 |
Activate Backup Image ................................................................................................................... |
55 |
Understanding the User Interfaces.............................................................................................................. |
56 |
Using the Web Interface ........................................................................................................................ |
56 |
Device View .................................................................................................................................... |
57 |
Navigation Tree View...................................................................................................................... |
58 |
Configuration and Monitoring Options .......................................................................................... |
59 |
Help Page Access ............................................................................................................................ |
60 |
Using the Command Line Interface ....................................................................................................... |
60 |
Using SNMP ........................................................................................................................................... |
61 |
Section 2: System Administration.................................................................................... |
62 |
System Description....................................................................................................................................... |
63 |
Defining System Information.......................................................................................................... |
64 |
Switch Configuration.................................................................................................................................... |
64 |
Viewing Inventory Information.................................................................................................................... |
65 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 4 |
D Link UWS User Manual |
|
Card Configuration ....................................................................................................................................... |
65 |
Slot Summary......................................................................................................................................... |
67 |
PoE Configuration .................................................................................................................................. |
68 |
PoE Status ..................................................................................................................................................... |
69 |
Serial Port ..................................................................................................................................................... |
70 |
IP Address ..................................................................................................................................................... |
71 |
Network DHCP Client Options...................................................................................................................... |
73 |
HTTP Configuration ...................................................................................................................................... |
74 |
User Accounts............................................................................................................................................... |
75 |
Adding a User Account ................................................................................................................... |
77 |
Changing User Account Information .............................................................................................. |
77 |
Deleting a User Account ................................................................................................................. |
77 |
Authentication List Configuration................................................................................................................ |
78 |
Creating an Authentication List ...................................................................................................... |
80 |
Configuring an Authentication List ................................................................................................. |
80 |
Deleting an Authentication List ...................................................................................................... |
80 |
Authentication List Summary....................................................................................................................... |
81 |
Login Session ................................................................................................................................................ |
82 |
User Login ..................................................................................................................................................... |
83 |
Assigning a User to an Authentication List ............................................................................................ |
84 |
Denial of Service Protection......................................................................................................................... |
84 |
Multiple Port Mirroring................................................................................................................................ |
86 |
Adding a Port Mirroring Session ............................................................................................................ |
87 |
Removing or Modifying a Port Mirroring Session.................................................................................. |
88 |
Telnet Sessions ............................................................................................................................................. |
88 |
Outbound Telnet Client Configuration ........................................................................................................ |
90 |
Ping Test ....................................................................................................................................................... |
91 |
TraceRoute.................................................................................................................................................... |
92 |
Configuring SNTP Settings............................................................................................................................ |
93 |
SNTP Settings ......................................................................................................................................... |
94 |
SNTP Server Configuration..................................................................................................................... |
95 |
SNTP Server Status................................................................................................................................. |
96 |
SNTP Global Status................................................................................................................................. |
97 |
Time Zone Configuration ....................................................................................................................... |
99 |
Summer Time Configuration................................................................................................................ |
100 |
Summer Time Recurring Configuration ........................................................................................ |
101 |
Clock Detail .......................................................................................................................................... |
102 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 5 |
D Link UWS User Manual
Configuring and Viewing Device Port Information.................................................................................... |
103 |
Port Configuration ............................................................................................................................... |
103 |
Port Summary ...................................................................................................................................... |
106 |
Port Description ................................................................................................................................... |
109 |
Managing and Viewing Logs....................................................................................................................... |
110 |
Buffered Log Configuration.................................................................................................................. |
110 |
Viewing Buffered Log Messages .......................................................................................................... |
111 |
Command Logger Configuration.......................................................................................................... |
112 |
Console Log Configuration................................................................................................................... |
113 |
Event Log.............................................................................................................................................. |
114 |
Hosts Configuration ............................................................................................................................. |
115 |
Adding a Remote Logging Host..................................................................................................... |
115 |
Deleting a Remote Logging Host .................................................................................................. |
116 |
Persistent Log Configuration................................................................................................................ |
116 |
Persistent Log....................................................................................................................................... |
118 |
Syslog Configuration ............................................................................................................................ |
119 |
Trap Log ............................................................................................................................................... |
120 |
Defining SNMP Parameters........................................................................................................................ |
121 |
SNMP v1 and v2 ................................................................................................................................... |
121 |
SNMP v3............................................................................................................................................... |
121 |
SNMP Community Configuration......................................................................................................... |
122 |
Trap Receiver Configuration ................................................................................................................ |
123 |
Trap Flags............................................................................................................................................. |
124 |
Supported MIBs ................................................................................................................................... |
126 |
Managing the DHCP Server ........................................................................................................................ |
127 |
Global Configuration............................................................................................................................ |
127 |
Pool Configuration ............................................................................................................................... |
129 |
Pool Options ........................................................................................................................................ |
132 |
Reset Configuration ............................................................................................................................. |
133 |
DHCP Server Summary ............................................................................................................................... |
134 |
Bindings Information ........................................................................................................................... |
134 |
Server Statistics.................................................................................................................................... |
135 |
Conflicts Information ........................................................................................................................... |
136 |
Configuring Time Ranges............................................................................................................................ |
137 |
Time Range Configuration ................................................................................................................... |
137 |
Time Range Summary .......................................................................................................................... |
138 |
Time Range Entry Configuration.......................................................................................................... |
139 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 6 |
D Link UWS User Manual |
|
Configuring DNS.......................................................................................................................................... |
141 |
Global Configuration............................................................................................................................ |
141 |
Server Configuration............................................................................................................................ |
142 |
DNS Host Name IP Mapping Configuration ......................................................................................... |
143 |
DNS Host Name IP Mapping Summary ................................................................................................ |
144 |
Configuring and Viewing ISDP Information ............................................................................................... |
145 |
Global Configuration............................................................................................................................ |
145 |
Cache Table.......................................................................................................................................... |
146 |
Interface Configuration........................................................................................................................ |
147 |
Statistics............................................................................................................................................... |
148 |
Configuring sFlow ....................................................................................................................................... |
149 |
sFlow Agent Summary ......................................................................................................................... |
149 |
sFlow Receiver Configuration .............................................................................................................. |
150 |
sFlow Poller Configuration................................................................................................................... |
152 |
Counter Sampling ......................................................................................................................... |
152 |
sFlow Sampler Configuration............................................................................................................... |
153 |
Packet Flow Sampling ................................................................................................................... |
153 |
Viewing System Statistics........................................................................................................................... |
154 |
Switch Detailed .................................................................................................................................... |
154 |
Switch Summary .................................................................................................................................. |
156 |
Port Detailed........................................................................................................................................ |
158 |
Port Summary Statistics....................................................................................................................... |
164 |
Section 3: Using System Tools ....................................................................................... |
165 |
Reset Configuration to Defaults................................................................................................................. |
165 |
Reset Passwords to Defaults...................................................................................................................... |
166 |
System Reset .............................................................................................................................................. |
166 |
Save All Applied Changes ........................................................................................................................... |
167 |
Download File To Switch (TFTP)................................................................................................................. |
167 |
Downloading a File to the Switch ........................................................................................................ |
169 |
HTTP File Download ................................................................................................................................... |
170 |
Upload File From Switch (TFTP) ................................................................................................................. |
171 |
Uploading Files ............................................................................................................................. |
172 |
Multiple Image Service............................................................................................................................... |
172 |
Viewing the Dual Image Status ............................................................................................................ |
174 |
Erase Startup config File ............................................................................................................................ |
175 |
AutoInstall .................................................................................................................................................. |
175 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 7 |
D Link UWS User Manual |
|
Section 4: Configuring L2 Features................................................................................. |
177 |
Configuring and Searching the Forwarding Database............................................................................... |
178 |
Configuration ....................................................................................................................................... |
178 |
MAC Address Table.............................................................................................................................. |
179 |
Searching the Forwarding Database............................................................................................. |
180 |
Managing VLANs ........................................................................................................................................ |
180 |
VLAN Configuration ............................................................................................................................. |
180 |
VLAN Status ......................................................................................................................................... |
182 |
VLAN Port Configuration...................................................................................................................... |
183 |
VLAN Port Summary ............................................................................................................................ |
184 |
Managing Protocol Based VLANs......................................................................................................... |
185 |
Protocol Based VLAN Summary........................................................................................................... |
187 |
Managing IP Subnet Based VLANs....................................................................................................... |
188 |
IP Subnet based VLAN Summary ......................................................................................................... |
189 |
MAC based VLAN Configuration .......................................................................................................... |
189 |
MAC based VLAN Summary................................................................................................................. |
190 |
Double VLAN Tunneling ....................................................................................................................... |
191 |
Double VLAN Tunneling Summary....................................................................................................... |
192 |
Voice VLAN Configuration.......................................................................................................................... |
193 |
Reset VLAN Configuration.................................................................................................................... |
194 |
Configuring Protected Ports....................................................................................................................... |
195 |
Protected Port Configuration............................................................................................................... |
195 |
Assigning Ports to a Group ........................................................................................................... |
196 |
Protected Ports Summary.................................................................................................................... |
196 |
Creating MAC Filters................................................................................................................................... |
197 |
Adding MAC Filters ....................................................................................................................... |
198 |
Modifying MAC Filters .................................................................................................................. |
198 |
Deleting MAC Filters ..................................................................................................................... |
198 |
MAC Filter Summary ............................................................................................................................ |
198 |
Configuring GARP ....................................................................................................................................... |
199 |
GARP Status ......................................................................................................................................... |
199 |
GARP Switch Configuration.................................................................................................................. |
201 |
GARP Port Configuration ..................................................................................................................... |
202 |
Creating Port Channels (Trunking)............................................................................................................. |
204 |
Port Channel Configuration ................................................................................................................. |
204 |
Port Channel Status ............................................................................................................................. |
206 |
Configuring IGMP Snooping ....................................................................................................................... |
208 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 8 |
D Link UWS User Manual |
|
Global Configuration and Status .......................................................................................................... |
209 |
Interface Configuration........................................................................................................................ |
210 |
VLAN Configuration ............................................................................................................................. |
211 |
VLAN Status ......................................................................................................................................... |
212 |
Multicast Router Configuration ........................................................................................................... |
213 |
Multicast Router Status ....................................................................................................................... |
214 |
Multicast Router VLAN Configuration.................................................................................................. |
215 |
Multicast Router VLAN Status.............................................................................................................. |
216 |
Configuring IGMP Snooping Queriers........................................................................................................ |
217 |
IGMP Snooping Querier Configuration ................................................................................................ |
217 |
IGMP Snooping Querier VLAN Configuration ...................................................................................... |
218 |
IGMP Snooping Querier VLAN Configuration Summary ...................................................................... |
219 |
IGMP Snooping Querier VLAN Status .................................................................................................. |
220 |
Configuring MLD Snooping......................................................................................................................... |
221 |
Configuration and Status ..................................................................................................................... |
221 |
Interface Configuration........................................................................................................................ |
222 |
VLAN Status ......................................................................................................................................... |
223 |
VLAN Configuration ............................................................................................................................. |
224 |
Multicast Router Configuration ........................................................................................................... |
225 |
Multicast Router Status ....................................................................................................................... |
226 |
Multicast Router VLAN Configuration.................................................................................................. |
227 |
Multicast Router VLAN Status.............................................................................................................. |
228 |
Configuring MLD Snooping Queriers ......................................................................................................... |
229 |
MLD Snooping Querier Configuration.................................................................................................. |
229 |
MLD Snooping Querier VLAN Configuration........................................................................................ |
230 |
MLD Snooping Querier VLAN Configuration Summary........................................................................ |
231 |
MLD Snooping Querier VLAN Status.................................................................................................... |
232 |
Viewing Multicast Forwarding Database Information .............................................................................. |
233 |
MFDB Table.......................................................................................................................................... |
233 |
MFDB GMRP Table............................................................................................................................... |
234 |
MFDB IGMP Snooping Table................................................................................................................ |
235 |
MFDB MLD Snooping Table ................................................................................................................. |
236 |
MFDB Statistics .................................................................................................................................... |
237 |
Configuring Spanning Tree Protocol .......................................................................................................... |
238 |
Switch Configuration/Status ................................................................................................................ |
238 |
CST Configuration/Status..................................................................................................................... |
240 |
MST Configuration/Status.................................................................................................................... |
242 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 9 |
D Link UWS User Manual |
|
CST Port Configuration/Status ............................................................................................................. |
244 |
MST Port Configuration/Status............................................................................................................ |
247 |
Statistics............................................................................................................................................... |
250 |
Configuring DHCP Snooping ....................................................................................................................... |
251 |
Global DHCP Snooping Configuration.................................................................................................. |
251 |
DHCP Snooping VLAN Configuration.................................................................................................... |
252 |
DHCP Snooping Interface Configuration.............................................................................................. |
252 |
Managing LLDP ........................................................................................................................................... |
254 |
Global Configuration............................................................................................................................ |
255 |
Interface Configuration........................................................................................................................ |
256 |
Interface Summary .............................................................................................................................. |
257 |
Statistics............................................................................................................................................... |
258 |
Local Device Information ..................................................................................................................... |
259 |
Local Device Summary ......................................................................................................................... |
260 |
Remote Device Information................................................................................................................. |
261 |
Remote Device Summary..................................................................................................................... |
262 |
LLDP MED ............................................................................................................................................ |
263 |
LLDP MED Global Configuration................................................................................................... |
263 |
LLDP MED Interface Configuration............................................................................................... |
264 |
LLDP MED Interface Summary ..................................................................................................... |
265 |
LLDP Local Device Information ..................................................................................................... |
266 |
LLDP MED Remote Device Information........................................................................................ |
268 |
Configuring Dynamic ARP Inspection ........................................................................................................ |
270 |
DAI Configuration ................................................................................................................................ |
270 |
DAI VLAN Configuration....................................................................................................................... |
271 |
DAI Interface Configuration ................................................................................................................. |
272 |
DAI ARP ACL Configuration .................................................................................................................. |
273 |
DAI ARP ACL Rule Configuration .......................................................................................................... |
274 |
Dynamic ARP Inspection Statistics....................................................................................................... |
275 |
Section 5: Configuring L3 Features................................................................................. |
276 |
Managing the BOOTP/DHCP Relay Agent.................................................................................................. |
276 |
BootP/DHCP Relay Agent Configuration.............................................................................................. |
277 |
BOOTP/DHCP Relay Agent Status ........................................................................................................ |
278 |
Configuring the IP Helper Features............................................................................................................ |
279 |
IP Helper Global Configuration ............................................................................................................ |
279 |
IP Helper Interface Configuration ........................................................................................................ |
281 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 10 |
D Link UWS User Manual |
|
IP Helper Statistics ............................................................................................................................... |
283 |
Configuring ARP.......................................................................................................................................... |
284 |
ARP Create ........................................................................................................................................... |
285 |
ARP Table Configuration ...................................................................................................................... |
286 |
Viewing ARP Cache..................................................................................................................................... |
288 |
Configuring Global and Interface IP Settings............................................................................................. |
289 |
IP Configuration ................................................................................................................................... |
289 |
IP Interface Configuration.................................................................................................................... |
291 |
IP Statistics........................................................................................................................................... |
293 |
Loopback Interfaces ................................................................................................................................... |
296 |
Loopbacks Configuration ..................................................................................................................... |
296 |
Creating a New Loopback (IPv4)................................................................................................... |
297 |
Removing a Loopback................................................................................................................... |
298 |
Removing a Secondary Address.................................................................................................... |
298 |
Loopbacks Summary ............................................................................................................................ |
299 |
Configuring RIP ........................................................................................................................................... |
300 |
RIP Configuration ................................................................................................................................. |
300 |
RIP Interface Configuration.................................................................................................................. |
301 |
Configuring the RIP Interface........................................................................................................ |
303 |
RIP Interface Summary ........................................................................................................................ |
304 |
RIP Route Redistribution Configuration............................................................................................... |
305 |
RIP Route Redistribution Summary ..................................................................................................... |
306 |
Router Discovery ........................................................................................................................................ |
307 |
Router Discovery Configuration........................................................................................................... |
307 |
Router Discovery Status....................................................................................................................... |
308 |
Router ......................................................................................................................................................... |
309 |
Route Table.......................................................................................................................................... |
309 |
Best Routes Table ................................................................................................................................ |
311 |
Configured (Static) Routes ................................................................................................................... |
312 |
Adding a Static Route ................................................................................................................... |
312 |
Deleting a Route ........................................................................................................................... |
313 |
Route Preferences Configuration ........................................................................................................ |
314 |
VLAN Routing.............................................................................................................................................. |
315 |
VLAN Routing Configuration ................................................................................................................ |
315 |
Creating a VLAN Routing Interface ............................................................................................... |
316 |
Deleting a VLAN Router Interface................................................................................................. |
317 |
VLAN Routing Summary....................................................................................................................... |
318 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 11 |
D Link UWS User Manual |
|
Virtual Router Redundancy Protocol (VRRP)............................................................................................. |
319 |
VRRP Configuration.............................................................................................................................. |
319 |
Virtual Router Configuration................................................................................................................ |
320 |
Configuring a Secondary VRRP Address........................................................................................ |
321 |
Creating a New Virtual Router...................................................................................................... |
322 |
Modifying a Virtual Router ........................................................................................................... |
322 |
VRRP Interface Tracking Configuration ........................................................................................ |
322 |
VRRP Interface Tracking ............................................................................................................... |
323 |
VRRP Route Tracking Configuration ............................................................................................. |
324 |
VRRP Route Tracking .................................................................................................................... |
325 |
Virtual Router Status............................................................................................................................ |
325 |
Virtual Router Statistics ....................................................................................................................... |
327 |
Section 6: Configuring Quality of Service ....................................................................... |
329 |
Configuring Class of Service ....................................................................................................................... |
329 |
Mapping 802.1p Priority ...................................................................................................................... |
329 |
Trust Mode Configuration ................................................................................................................... |
330 |
IP DSCP Mapping Configuration........................................................................................................... |
332 |
CoS Interface Configuration................................................................................................................. |
333 |
CoS Interface Queue Configuration ..................................................................................................... |
334 |
CoS Interface Queue Status ................................................................................................................. |
335 |
Configuring Differentiated Services........................................................................................................... |
336 |
Diffserv Configuration.......................................................................................................................... |
336 |
Class Configuration .............................................................................................................................. |
338 |
DiffServ Class Summary ....................................................................................................................... |
340 |
Policy Configuration............................................................................................................................. |
341 |
DiffServ Policy Summary...................................................................................................................... |
342 |
Policy Class Definition .......................................................................................................................... |
343 |
DiffServ Policy Attribute Summary ...................................................................................................... |
345 |
Service Configuration........................................................................................................................... |
345 |
DiffServ Service Summary.................................................................................................................... |
346 |
Service Statistics .................................................................................................................................. |
346 |
Service Detailed Statistics .................................................................................................................... |
347 |
Configuring Auto VoIP................................................................................................................................ |
349 |
Auto VoIP Configuration ...................................................................................................................... |
349 |
Auto VoIP Summary............................................................................................................................. |
350 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 12 |
D Link UWS User Manual |
|
Section 7: Configuring Access Control Lists .................................................................... |
351 |
Configuring IP Access Control Lists ............................................................................................................ |
351 |
IP ACL Configuration ............................................................................................................................ |
352 |
IP ACL Rule Configuration .................................................................................................................... |
353 |
Modifying an IP based Rule .................................................................................................. |
357 |
Adding a New Rule to an IP based ACL................................................................................. |
358 |
Deleting a Rule from an IP based ACL .................................................................................. |
358 |
IP ACL Summary ................................................................................................................................... |
358 |
IP ACL Rule Summary........................................................................................................................... |
359 |
MAC Access Control Lists ........................................................................................................................... |
359 |
MAC ACL Configuration ....................................................................................................................... |
360 |
MAC ACL Rule Configuration ........................................................................................................ |
361 |
Adding a New Rule to a MAC based ACL .............................................................................. |
364 |
Removing a Rule From a MAC based ACL............................................................................. |
364 |
MAC ACL Summary .............................................................................................................................. |
365 |
MAC ACL Rule Summary ...................................................................................................................... |
365 |
ACL Interface Configuration ....................................................................................................................... |
366 |
Assigning an ACL to an Interface .................................................................................................. |
367 |
Removing an ACL from an Interface ............................................................................................. |
367 |
Section 8: Managing Device Security ............................................................................. |
368 |
Configuring Port Security ........................................................................................................................... |
368 |
Port Security Administration................................................................................................................ |
369 |
Port Security Interface Configuration .................................................................................................. |
369 |
Port Security Static............................................................................................................................... |
371 |
Port Security Dynamic.......................................................................................................................... |
372 |
Port Security Violation Status .............................................................................................................. |
373 |
SSL/Secure HTTP Configuration ................................................................................................................. |
374 |
Generating Certificates......................................................................................................... |
375 |
Downloading SSL Certificates ............................................................................................... |
375 |
Secure Shell (SSH) Configuration ............................................................................................................... |
377 |
Secure Shell Configuration................................................................................................................... |
377 |
Downloading SSH Host Keys ......................................................................................................... |
378 |
Captive Portal Configuration...................................................................................................................... |
379 |
Captive Portal Global Configuration .................................................................................................... |
379 |
CP Configuration .................................................................................................................................. |
381 |
Changing the Captive Portal Settings ........................................................................................... |
382 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 13 |
D Link UWS User Manual
Customizing the Captive Portal Web Page ................................................................................... |
384 |
Local User............................................................................................................................................. |
390 |
Adding a Local User ...................................................................................................................... |
391 |
Configuring Users in the Local Database ...................................................................................... |
392 |
Configuring Users in a Remote RADIUS Server............................................................................. |
393 |
Interface Association ........................................................................................................................... |
395 |
CP Global Status................................................................................................................................... |
396 |
Viewing CP Activation and Activity Status .................................................................................... |
397 |
Interface Status.................................................................................................................................... |
399 |
Viewing Interface Activation Status.............................................................................................. |
399 |
Viewing Interface Capability Status.............................................................................................. |
400 |
Client Connection Status...................................................................................................................... |
401 |
Viewing Client Details ................................................................................................................... |
402 |
Viewing the Client Statistics ......................................................................................................... |
403 |
Viewing the Client Interface Association Status ........................................................................... |
403 |
Viewing the Client CP Association Status ..................................................................................... |
404 |
SNMP Trap Configuration .................................................................................................................... |
405 |
RADIUS Settings.......................................................................................................................................... |
406 |
RADIUS Configuration .......................................................................................................................... |
406 |
RADIUS Server Configuration............................................................................................................... |
408 |
Viewing Named Server Status Information .................................................................................. |
410 |
RADIUS Server Statistics ...................................................................................................................... |
411 |
RADIUS Accounting Server Configuration............................................................................................ |
411 |
Viewing Named Accounting Server Status ................................................................................... |
413 |
RADIUS Server Statistics ...................................................................................................................... |
414 |
Clear Statistics...................................................................................................................................... |
414 |
Port Access Control .................................................................................................................................... |
415 |
Global Port Access Control Configuration............................................................................................ |
415 |
Port Configuration ............................................................................................................................... |
416 |
Port Access Entity Capability Configuration......................................................................................... |
418 |
Supplicant Port Configuration.............................................................................................................. |
419 |
Port Status ........................................................................................................................................... |
420 |
Port Summary ...................................................................................................................................... |
424 |
Port Access Control Statistics............................................................................................................... |
426 |
Client Summary.................................................................................................................................... |
427 |
Port Access Privileges .......................................................................................................................... |
428 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 14 |
D Link UWS User Manual |
|
TACACS+ Settings ....................................................................................................................................... |
429 |
TACACS+ Configuration........................................................................................................................ |
429 |
TACACS+ Server Configuration ............................................................................................................ |
430 |
Section 9: Configuring the Wireless Features................................................................. |
431 |
Unified Wired and Wireless Access System Components......................................................................... |
431 |
D Link DWS 4000 Series Unified Wireless Switch................................................................................ |
432 |
DWL X600AP Unified Access Points..................................................................................................... |
432 |
DWS 4000 Series Switch and AP Discovery Methods.......................................................................... |
433 |
L2 Discovery.................................................................................................................................. |
433 |
IP Address of AP Configured in the Switch ................................................................................... |
434 |
IP Address of Switch Configured in the AP ................................................................................... |
434 |
Configuring the DHCP Option ....................................................................................................... |
435 |
Discovery and Peer Switches ............................................................................................................... |
437 |
Monitoring Status and Statistics................................................................................................................ |
438 |
Wireless Global Status/Statistics ......................................................................................................... |
438 |
Viewing Switch Status and Statistics Information ........................................................................ |
443 |
Viewing IP Discovery Status.......................................................................................................... |
447 |
Viewing the Peer Switch Configuration Received Status.............................................................. |
449 |
Viewing the AP Hardware Capability List...................................................................................... |
450 |
AP Hardware Radio Capability.............................................................................................. |
451 |
AP Image Capability ............................................................................................................................. |
452 |
Peer Switch Status ............................................................................................................................... |
453 |
Viewing Peer Switch Configuration Status ................................................................................... |
454 |
Viewing Peer Switch Managed AP Status ..................................................................................... |
455 |
All AP Status ........................................................................................................................................ |
456 |
Managed AP Status.............................................................................................................................. |
458 |
Monitoring AP Status.................................................................................................................... |
459 |
Viewing Detailed Managed Access Point Status........................................................................... |
461 |
Viewing Managed Access Point Radio Summary Information...................................................... |
464 |
Viewing Detailed Managed Access Point Radio Information ....................................................... |
464 |
Viewing Managed Access Point Neighbor APs ............................................................................. |
466 |
Viewing Clients Associated with Neighbor Access Points............................................................. |
467 |
Viewing Managed Access Point VAPs ........................................................................................... |
468 |
Viewing Managed Access Point VAP TSPEC Status....................................................................... |
468 |
Viewing Distributed Tunneling Information ................................................................................. |
470 |
Managed Access Point Statistics.......................................................................................................... |
471 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 15 |
D Link UWS User Manual
Viewing Managed Access Point Ethernet Statistics...................................................................... |
472 |
Viewing Detailed Managed Access Point Statistics ...................................................................... |
472 |
Viewing Managed Access Point Radio Statistics........................................................................... |
474 |
Viewing Managed Access Point VAP Statistics ............................................................................. |
475 |
Viewing Distributed Tunneling Statistics .................................................................................... |
476 |
AP Authentication Failure Status ......................................................................................................... |
477 |
Viewing Details About AP Authentication Failures....................................................................... |
479 |
AP RF Scan Status................................................................................................................................. |
480 |
Viewing Details About an AP Detected in the RF Scan ................................................................. |
482 |
Viewing AP Triangulation Information ......................................................................................... |
484 |
Viewing WIDS AP Rogue Classification Information ..................................................................... |
485 |
AP De Authentication Attack Status .................................................................................................... |
487 |
Associated Client Status/Statistics....................................................................................................... |
488 |
Viewing Associated Client Summary Status ................................................................................. |
489 |
Viewing Detailed Associated Client Status ................................................................................... |
490 |
Viewing Associated Client QoS Status .......................................................................................... |
492 |
Viewing Associated Client Neighbor AP Status............................................................................. |
493 |
Viewing Associated Client Distributed Tunneling Status.............................................................. |
494 |
Viewing Associated Client TSPEC Status ....................................................................................... |
496 |
Viewing Associated Client RRM Status ......................................................................................... |
497 |
Viewing Associated Client SSID Status.......................................................................................... |
498 |
Viewing Associated Client VAP Status .......................................................................................... |
499 |
Switch Associated Client Status.................................................................................................... |
500 |
Viewing Associated Client Statistics ............................................................................................. |
501 |
Viewing Associated Client Session Summary Statistics ................................................................ |
502 |
Viewing Detailed Associated Client Association Statistics............................................................ |
503 |
Viewing Detailed Associated Client Session Statistics .................................................................. |
504 |
Viewing Detailed Associated Client TSPEC Statistics .................................................................... |
505 |
Ad Hoc Client Status............................................................................................................................. |
506 |
Detected Client Status ......................................................................................................................... |
507 |
Viewing Detailed Detected Client Status...................................................................................... |
509 |
Viewing WIDS Client Rogue Classification .................................................................................... |
511 |
Viewing Detected Client Pre Authentication History ................................................................... |
513 |
Viewing Detected Client Triangulation......................................................................................... |
514 |
Viewing Detected Client Roam History......................................................................................... |
515 |
Detected Client Pre Authentication Summary ............................................................................. |
516 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 16 |
D Link UWS User Manual |
|
Detected Client Roam History Summary ...................................................................................... |
517 |
Radio Resource Measurement Status Information ............................................................................. |
518 |
Viewing the RRM Channel Load Configuration............................................................................. |
518 |
Viewing the RRM Channel Load History ....................................................................................... |
520 |
Viewing RRM Neighbors ............................................................................................................... |
521 |
WDS Managed AP Information............................................................................................................ |
522 |
WDS Group Status Summary ........................................................................................................ |
522 |
WDS AP Group Status ................................................................................................................... |
523 |
WDS Group AP Status Summary................................................................................................... |
525 |
WDS AP Link Status Summary ...................................................................................................... |
526 |
WDS Group Link Statistics Summary ............................................................................................ |
528 |
Basic Setup.................................................................................................................................................. |
529 |
Wireless Global Configuration ............................................................................................................. |
529 |
Wireless Discovery Configuration........................................................................................................ |
534 |
L3/IP Discovery ............................................................................................................................. |
535 |
L2/VLAN Discovery ....................................................................................................................... |
536 |
Profile................................................................................................................................................... |
537 |
Radio Configuration ............................................................................................................................. |
538 |
Wireless Default VAP Configuration .................................................................................................... |
543 |
Managing the Virtual Access Point Configuration ........................................................................ |
543 |
Configuring the Default Network ................................................................................................. |
545 |
Configuring AP Security ................................................................................................................ |
551 |
Using No Security.................................................................................................................. |
551 |
Using Static or Dynamic WEP ............................................................................................... |
551 |
Static WEP Rules ................................................................................................................... |
553 |
Using WPA/WPA2 Personal or Enterprise ............................................................................ |
553 |
Valid Access Point Summary................................................................................................................ |
556 |
Valid Access Point Configuration.................................................................................................. |
557 |
Local OUI Database Summary.............................................................................................................. |
561 |
AP Management......................................................................................................................................... |
562 |
Reset .................................................................................................................................................... |
562 |
RF Management................................................................................................................................... |
563 |
Configuring Channel Plan and Power Settings ............................................................................. |
563 |
Viewing the Channel Plan History................................................................................................. |
566 |
Initiating Manual Channel Plan Assignments ............................................................................... |
567 |
Initiating Manual Power Adjustments.......................................................................................... |
569 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 17 |
D Link UWS User Manual |
|
Access Point Software Download ........................................................................................................ |
570 |
Managed AP Advanced Settings .......................................................................................................... |
573 |
Debugging the AP ......................................................................................................................... |
574 |
Adjusting the Channel and Power ................................................................................................ |
575 |
AP Provisioning .................................................................................................................................... |
577 |
AP Provisioning Summary Status.................................................................................................. |
577 |
Detailed AP Provisioning Status.................................................................................................... |
578 |
Configuring Advanced Settings .................................................................................................................. |
581 |
Advanced Global Settings .................................................................................................................... |
581 |
Wireless SNMP Trap Configuration .............................................................................................. |
584 |
Distributed Tunneling Configuration ............................................................................................ |
587 |
Device Location Configuration...................................................................................................... |
588 |
Wireless Network List .......................................................................................................................... |
589 |
Configuring Networks .......................................................................................................................... |
590 |
AP Profiles............................................................................................................................................ |
590 |
Creating, Copying, and Deleting AP Profiles ................................................................................. |
591 |
Applying an AP Profile .................................................................................................................. |
593 |
Configuring the AP Profile Global Settings ................................................................................... |
595 |
Access Point Profile Radio Configuration ..................................................................................... |
596 |
Access Point Profile VAP Configuration ........................................................................................ |
604 |
Access Point Profile QoS Configuration ........................................................................................ |
606 |
Access Point Profile TSPEC Configuration..................................................................................... |
609 |
Peer Switch .......................................................................................................................................... |
612 |
Peer Switch Configuration Enable/Disable ................................................................................... |
613 |
Mutual Authentication ................................................................................................................. |
615 |
WIDS Security....................................................................................................................................... |
616 |
WIDS AP Configuration ................................................................................................................. |
616 |
WIDS Client Configuration ............................................................................................................ |
619 |
Known Client........................................................................................................................................ |
621 |
Known Client Configuration.......................................................................................................... |
623 |
Switch Provisioning.............................................................................................................................. |
624 |
Provisioning .................................................................................................................................. |
625 |
Enabling AeroScout™ Engine Support ................................................................................................. |
626 |
Configuring the Wireless Distribution System........................................................................................... |
626 |
WDS Managed AP Group Configuration .............................................................................................. |
629 |
WDS Managed AP Configuration ......................................................................................................... |
631 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 18 |
D Link UWS User Manual |
|
WDS Link Configuration ....................................................................................................................... |
633 |
WDS Link Create ........................................................................................................................... |
634 |
Locating WLAN Devices.............................................................................................................................. |
635 |
Managed AP Location .......................................................................................................................... |
635 |
Building......................................................................................................................................... |
635 |
Building Floor................................................................................................................................ |
637 |
Managed AP Coordinates ............................................................................................................. |
638 |
Managed AP Location Summary................................................................................................... |
639 |
On Demand Location Trigger........................................................................................................ |
640 |
On Demand Location Trigger Status.................................................................................................... |
641 |
On Demand Location Trigger Global Status ................................................................................. |
641 |
On Demand Location Trigger Floor Status ................................................................................... |
643 |
AP Triangulation Location.................................................................................................................... |
644 |
AP Triangulation Summary ........................................................................................................... |
644 |
Detailed AP Triangulation Status .................................................................................................. |
645 |
Client Triangulation Location............................................................................................................... |
647 |
Client Triangulation Summary ...................................................................................................... |
647 |
Detailed AP Triangulation Status .................................................................................................. |
648 |
Visualizing the Wireless Network .............................................................................................................. |
650 |
WLAN Visualization Overview.............................................................................................................. |
650 |
Importing and Configuring a Background Image ................................................................................. |
651 |
Setting Up the Graph ........................................................................................................................... |
652 |
Creating a New Graph .................................................................................................................. |
652 |
Manually Graphing the Components............................................................................................ |
654 |
Checking the Location of an AP or Client............................................................................................. |
654 |
Understanding the Menu Options and Icons....................................................................................... |
657 |
Legend Menu................................................................................................................................ |
660 |
Viewing Component Information ........................................................................................................ |
661 |
Appendix A: Configuration Examples............................................................................. |
662 |
Configuring VLANs...................................................................................................................................... |
662 |
Configuring Multiple Spanning Tree Protocol ........................................................................................... |
665 |
Configuring VLAN Routing.......................................................................................................................... |
668 |
Configuring 802.1X Network Access Control ............................................................................................. |
671 |
Configuring a Virtual Access Point ............................................................................................................. |
673 |
Configuring Differentiated Services for VoIP............................................................................................. |
677 |
Configuring a Network with WDS Managed APs ...................................................................................... |
680 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 19 |
D Link UWS User Manual |
|
Configuring a Network to Use WPA2 Enterprise and Dynamic VLANs..................................................... |
689 |
Configuring Client Information on the RADIUS Server ........................................................................ |
690 |
Configuring RADIUS Information and AP Profiles on the Switch ......................................................... |
691 |
Verifying the Configuration.................................................................................................................. |
696 |
Optimizing WLAN Traffic............................................................................................................................ |
698 |
Monitoring and Managing Channel Information ................................................................................. |
698 |
Running and Applying a Manual Channel Plan............................................................................. |
700 |
Monitoring the RF Transmission Power Level ..................................................................................... |
702 |
Configuring the Automatic Power Adjustment ............................................................................ |
703 |
Load Balancing and WLAN Utilization.................................................................................................. |
706 |
Detecting and Preventing Wireless Intrusion............................................................................................ |
709 |
Configuring a Radio in Sentry Mode .................................................................................................... |
709 |
Configuring and Monitoring WIDS/WIPS to Detect Rogue APs ........................................................... |
710 |
Using WIDS/WIPS to Detect Rogue Clients.......................................................................................... |
715 |
Mitigating a Rogue Client Threat ......................................................................................................... |
717 |
Appendix B: Warranty & Support.................................................................................... |
722 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 20 |
D Link UWS User Manual |
|
List of Figures |
|
Figure 1: Web Interface Layout ........................................................................................................................ |
57 |
Figure 2: Device View—Back ............................................................................................................................ |
57 |
Figure 3: Cascading Navigation Menu .............................................................................................................. |
58 |
Figure 4: Navigation Tree View ........................................................................................................................ |
58 |
Figure 5: LAN and WLAN Tabs.......................................................................................................................... |
59 |
Figure 6: Help Link ............................................................................................................................................ |
60 |
Figure 7: System Description............................................................................................................................ |
63 |
Figure 8: Switch Configuration ......................................................................................................................... |
64 |
Figure 9: Inventory Information ....................................................................................................................... |
65 |
Figure 10: Card Configuration .......................................................................................................................... |
65 |
Figure 11: Slot Summary .................................................................................................................................. |
67 |
Figure 12: PoE Configuration............................................................................................................................ |
68 |
Figure 13: PoE Status........................................................................................................................................ |
69 |
Figure 14: Serial Port ........................................................................................................................................ |
70 |
Figure 15: Network Connectivity—IPv4 ........................................................................................................... |
71 |
Figure 16: Network Connectivity—IPv6 ........................................................................................................... |
71 |
Figure 17: DHCP Client Options........................................................................................................................ |
73 |
Figure 18: HTTP Configuration ......................................................................................................................... |
74 |
Figure 19: User Accounts.................................................................................................................................. |
75 |
Figure 20: Authentication List Configuration ................................................................................................... |
78 |
Figure 21: Login Session ................................................................................................................................... |
81 |
Figure 22: Login Session ................................................................................................................................... |
82 |
Figure 23: User Login........................................................................................................................................ |
83 |
Figure 24: Denial of Service.............................................................................................................................. |
84 |
Figure 25: Multiple Port Mirroring ................................................................................................................... |
86 |
Figure 26: Multiple Port Mirroring—Add Source Ports.................................................................................... |
87 |
Figure 27: Telnet Session Configuration........................................................................................................... |
88 |
Figure 28: Outbound Telnet ............................................................................................................................. |
90 |
Figure 29: Ping.................................................................................................................................................. |
91 |
Figure 30: TraceRoute ...................................................................................................................................... |
92 |
Figure 31: SNTP Global Configuration .............................................................................................................. |
94 |
Figure 32: SNTP Server Configuration .............................................................................................................. |
95 |
Figure 33: SNTP Server Status .......................................................................................................................... |
96 |
Figure 34: Global Status ................................................................................................................................... |
98 |
Figure 35: Time Zone Configuration................................................................................................................. |
99 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 21 |
D Link UWS User Manual |
|
Figure 36: Summer Time Configuration ......................................................................................................... |
100 |
Figure 37: Summer Time Recurring Configuration......................................................................................... |
101 |
Figure 38: Clock Detail.................................................................................................................................... |
102 |
Figure 39: Port Configuration......................................................................................................................... |
103 |
Figure 40: Port Summary................................................................................................................................ |
106 |
Figure 41: Port Description............................................................................................................................. |
109 |
Figure 42: Buffered Log Configuration ........................................................................................................... |
110 |
Figure 43: Buffered Log .................................................................................................................................. |
111 |
Figure 44: Command Logger Configuration ................................................................................................... |
112 |
Figure 45: Console Log Configuration ............................................................................................................ |
113 |
Figure 46: Event Log ....................................................................................................................................... |
114 |
Figure 47: Host Configuration ........................................................................................................................ |
115 |
Figure 48: Host Configuration with Logging Host........................................................................................... |
115 |
Figure 49: Persistent Log Configuration ......................................................................................................... |
116 |
Figure 50: Persistent Log ................................................................................................................................ |
118 |
Figure 51: System Log..................................................................................................................................... |
119 |
Figure 52: Trap Log......................................................................................................................................... |
120 |
Figure 53: SNMP Community Configuration .................................................................................................. |
122 |
Figure 54: Trap Receiver Configuration.......................................................................................................... |
123 |
Figure 55: Trap Flags Configuration................................................................................................................ |
125 |
Figure 56: Supported MIBs............................................................................................................................. |
126 |
Figure 57: DHCP Server Global Configuration ................................................................................................ |
127 |
Figure 58: Pool Configuration......................................................................................................................... |
129 |
Figure 59: Pool Options .................................................................................................................................. |
132 |
Figure 60: Reset Configuration....................................................................................................................... |
133 |
Figure 61: Bindings Information ..................................................................................................................... |
134 |
Figure 62: Server Statistics ............................................................................................................................. |
135 |
Figure 63: Conflicts Information..................................................................................................................... |
136 |
Figure 64: Time Range Configuration............................................................................................................. |
137 |
Figure 65: Time Range Summary.................................................................................................................... |
138 |
Figure 66: Time Range Entry Configuration ................................................................................................... |
139 |
Figure 67: DNS Global Configuration.............................................................................................................. |
141 |
Figure 68: DNS Server Configuration.............................................................................................................. |
142 |
Figure 69: DNS Host Name Mapping Configuration....................................................................................... |
143 |
Figure 70: DNS Host Name IP Mapping Summary.......................................................................................... |
144 |
Figure 71: ISDP Global Configuration ............................................................................................................. |
145 |
Figure 72: ISDP Cache Table ........................................................................................................................... |
146 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 22 |
D Link UWS User Manual |
|
Figure 73: ISDP Interface Configuration ......................................................................................................... |
147 |
Figure 74: ISDP Statistics ................................................................................................................................ |
148 |
Figure 75: sFlow Agent Summary................................................................................................................... |
149 |
Figure 76: sFlow Receiver Configuration........................................................................................................ |
150 |
Figure 77: sFlow Poller Configuration ............................................................................................................ |
152 |
Figure 78: sFlow Sampler Configuration ........................................................................................................ |
153 |
Figure 79: Switch Detailed.............................................................................................................................. |
154 |
Figure 80: Switch Summary............................................................................................................................ |
156 |
Figure 81: Port Detailed ................................................................................................................................. |
158 |
Figure 82: Port Summary................................................................................................................................ |
164 |
Figure 83: Reset Configuration to Defaults .................................................................................................... |
165 |
Figure 84: Reset Passwords to Defaults ......................................................................................................... |
166 |
Figure 85: System Reset ................................................................................................................................. |
166 |
Figure 86: Save All Applied Changes .............................................................................................................. |
167 |
Figure 87: Download File to Switch................................................................................................................ |
167 |
Figure 88: HTTP File Download ...................................................................................................................... |
170 |
Figure 89: Upload File from Switch ................................................................................................................ |
171 |
Figure 90: Multiple Image Service.................................................................................................................. |
173 |
Figure 91: Dual Image Status.......................................................................................................................... |
174 |
Figure 92: Erase Startup config File................................................................................................................ |
175 |
Figure 93: AutoInstall ..................................................................................................................................... |
175 |
Figure 94: Forwarding Database Age Out Interval......................................................................................... |
178 |
Figure 95: Forwarding Database Search......................................................................................................... |
179 |
Figure 96: VLAN Configuration ....................................................................................................................... |
181 |
Figure 97: VLAN Status ................................................................................................................................... |
182 |
Figure 98: VLAN Port Configuration ............................................................................................................... |
183 |
Figure 99: VLAN Port Summary ...................................................................................................................... |
184 |
Figure 100: Create Protocol Group ................................................................................................................ |
185 |
Figure 101: Protocol Group ............................................................................................................................ |
186 |
Figure 102: Protocol based VLAN Summary .................................................................................................. |
187 |
Figure 103: IP Subnet based VLAN Configuration .......................................................................................... |
188 |
Figure 104: IP Subnet based VLAN Summary................................................................................................. |
189 |
Figure 105: MAC based VLAN Configuration ................................................................................................. |
190 |
Figure 106: MAC based VLAN Summary ........................................................................................................ |
190 |
Figure 107: Double VLAN Tunneling............................................................................................................... |
191 |
Figure 108: Double VLAN Tunneling Summary .............................................................................................. |
192 |
Figure 109: Voice VLAN Configuration ........................................................................................................... |
193 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 23 |
D Link UWS User Manual |
|
Figure 110: Reset VLAN Configuration ........................................................................................................... |
194 |
Figure 111: Protected Port Configuration ...................................................................................................... |
195 |
Figure 112: Protected Ports Summary ........................................................................................................... |
196 |
Figure 113: MAC Filter Configuration............................................................................................................. |
197 |
Figure 114: MAC Filter Summary ................................................................................................................... |
198 |
Figure 115: GARP Status................................................................................................................................. |
199 |
Figure 116: GARP Switch Configuration ......................................................................................................... |
201 |
Figure 117: GARP Port Configuration ............................................................................................................. |
202 |
Figure 118: Port Channel Configuration......................................................................................................... |
204 |
Figure 119: Port Channel Status..................................................................................................................... |
206 |
Figure 120: IGMP Snooping Global Configuration and Status........................................................................ |
209 |
Figure 121: IGMP Snooping Interface Configuration ..................................................................................... |
210 |
Figure 122: IGMP Snooping VLAN Configuration ........................................................................................... |
211 |
Figure 123: IGMP Snooping VLAN Status ....................................................................................................... |
212 |
Figure 124: Multicast Router Configuration................................................................................................... |
213 |
Figure 125: Multicast Router Status............................................................................................................... |
214 |
Figure 126: Multicast Router VLAN Configuration ......................................................................................... |
215 |
Figure 127: Multicast Router VLAN Status ..................................................................................................... |
216 |
Figure 128: IGMP Snooping Querier Configuration........................................................................................ |
217 |
Figure 129: IGMP Snooping Querier VLAN Configuration.............................................................................. |
218 |
Figure 130: IGMP Snooping Querier VLAN Configuration Summary.............................................................. |
219 |
Figure 131: IGMP Snooping Querier VLAN Status .......................................................................................... |
220 |
Figure 132: MLD Snooping Global Configuration and Status ......................................................................... |
221 |
Figure 133: MLD Snooping Interface Configuration....................................................................................... |
222 |
Figure 134: MLD Snooping VLAN Status......................................................................................................... |
223 |
Figure 135: MLD Snooping VLAN Configuration............................................................................................. |
224 |
Figure 136: MLD Snooping Multicast Router Configuration .......................................................................... |
225 |
Figure 137: MLD Snooping Multicast Router Status ...................................................................................... |
226 |
Figure 138: Multicast Router VLAN Configuration ......................................................................................... |
227 |
Figure 139: MLD Snooping Multicast Router VLAN Status............................................................................. |
228 |
Figure 140: MLD Snooping Querier Configuration ......................................................................................... |
229 |
Figure 141: MLD Snooping Querier VLAN Configuration ............................................................................... |
230 |
Figure 142: MLD Snooping Querier VLAN Configuration Summary ............................................................... |
231 |
Figure 143: MLD Snooping Querier VLAN Status ........................................................................................... |
232 |
Figure 144: MFDB Table ................................................................................................................................. |
233 |
Figure 145: GMRP Table................................................................................................................................. |
234 |
Figure 146: IGMP Snooping Table .................................................................................................................. |
235 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 24 |
D Link UWS User Manual |
|
Figure 147: MFDB MLD Snooping Table......................................................................................................... |
236 |
Figure 148: Multicast Forwarding Database Statistics ................................................................................... |
237 |
Figure 149: Spanning Tree Switch Configuration/Status................................................................................ |
238 |
Figure 150: Spanning Tree CST Configuration/Status .................................................................................... |
240 |
Figure 151: Spanning Tree MST Configuration/Status ................................................................................... |
242 |
Figure 152: Spanning Tree MST Configuration/Status ................................................................................... |
242 |
Figure 153: Spanning Tree CST Port Configuration/Status............................................................................. |
244 |
Figure 154: Spanning Tree MST Port Configuration/Status ........................................................................... |
247 |
Figure 155: Spanning Tree Statistics .............................................................................................................. |
250 |
Figure 156: DHCP Snooping Configuration..................................................................................................... |
251 |
Figure 157: DHCP Snooping VLAN Configuration ........................................................................................... |
252 |
Figure 158: DHCP Snooping Interface Configuration ..................................................................................... |
253 |
Figure 159: LLDP Global Configuration........................................................................................................... |
255 |
Figure 160: LLDP Interface Configuration ...................................................................................................... |
256 |
Figure 161: LLDP Interface Summary ............................................................................................................. |
257 |
Figure 162: LLDP Statistics.............................................................................................................................. |
258 |
Figure 163: LLDP Local Device Information.................................................................................................... |
259 |
Figure 164: LLDP Local Device Summary........................................................................................................ |
260 |
Figure 165: LLDP Remote Device Information ............................................................................................... |
261 |
Figure 166: LLDP Remote Device Summary ................................................................................................... |
262 |
Figure 167: LLDP Global Configuration........................................................................................................... |
263 |
Figure 168: LLDP MED Interface Configure.................................................................................................... |
264 |
Figure 169: LLDP MED Interface Summary .................................................................................................... |
265 |
Figure 170: LLDP MED Local Device Information........................................................................................... |
266 |
Figure 171: LLDP Remote Device Information ............................................................................................... |
268 |
Figure 172: Dynamic ARP Inspection Configuration....................................................................................... |
270 |
Figure 173: Dynamic ARP Inspection VLAN Configuration ............................................................................. |
271 |
Figure 174: Dynamic ARP Inspection Interface Configuration ....................................................................... |
272 |
Figure 175: Dynamic ARP Inspection ARP ACL Configuration ........................................................................ |
273 |
Figure 176: Dynamic ARP Inspection ARP ACL Rule Configuration ................................................................ |
274 |
Figure 177: Dynamic ARP Inspection Statistics .............................................................................................. |
275 |
Figure 178: BOOTP/DHCP Relay Agent Configuration.................................................................................... |
277 |
Figure 179: BOOTP/DHCP Relay Agent Status................................................................................................ |
278 |
Figure 180: IP Helper Global Configuration.................................................................................................... |
279 |
Figure 181: Adding a Global IP Helper Entry .................................................................................................. |
280 |
Figure 182: IP Helper Interface Configuration................................................................................................ |
281 |
Figure 183: Adding an IP Helper Entry to an Interface................................................................................... |
282 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 25 |
D Link UWS User Manual |
|
|
Figure 184: IP Helper Statistics....................................................................................................................... |
283 |
|
Figure 185: ARP Create................................................................................................................................... |
285 |
|
Figure 186: ARP Table Configuration.............................................................................................................. |
286 |
|
Figure 187: ARP Cache.................................................................................................................................... |
288 |
|
Figure 188: IP Configuration........................................................................................................................... |
289 |
|
Figure 189: IP Interface Configuration ........................................................................................................... |
291 |
|
Figure 190: IP Statistics .................................................................................................................................. |
293 |
|
Figure 191: Loopback Configuration—Create ................................................................................................ |
296 |
|
Figure 192: Configured Loopback Interface ................................................................................................... |
296 |
|
Figure 193: Loopbacks Configuration—IPv4 Entry ......................................................................................... |
298 |
|
Figure 194: Loopbacks Summary.................................................................................................................... |
299 |
|
Figure 195: RIP Configuration......................................................................................................................... |
300 |
|
Figure 196: RIP Interface Configuration ......................................................................................................... |
301 |
|
Figure 197: RIP Interface Authentication Configuration ................................................................................ |
303 |
|
Figure 198: RIP Interface Summary................................................................................................................ |
304 |
|
Figure 199: RIP Route Redistribution Configuration ...................................................................................... |
305 |
|
Figure 200: RIP Route Redistribution Summary ............................................................................................. |
306 |
|
Figure 201: Router Discovery Configuration .................................................................................................. |
307 |
|
Figure 202: Router Discovery Status .............................................................................................................. |
308 |
|
Figure 203: Route Table ................................................................................................................................. |
309 |
|
Figure 204: Best Routes Table........................................................................................................................ |
311 |
|
Figure 205: Configured Routes....................................................................................................................... |
312 |
|
Figure 206: Create Static Route...................................................................................................................... |
313 |
|
Figure 207: Route Preferences Configuration ................................................................................................ |
314 |
|
Figure 208: VLAN Routing Configuration........................................................................................................ |
315 |
|
Figure 209: VLAN Routing Configuration Interface Exists ............................................................................ |
316 |
|
Figure 210: VLAN Routing Summary .............................................................................................................. |
318 |
|
Figure 211: VRRP Configuration ..................................................................................................................... |
319 |
|
Figure 212: Virtual Router Configuration ....................................................................................................... |
320 |
|
Figure 213: VRRP Interface Tracking Configuration ....................................................................................... |
322 |
|
Figure 214: VRRP Interface Tracking .............................................................................................................. |
323 |
|
Figure 215: VRRP Route Tracking Configuration ............................................................................................ |
324 |
|
Figure 216: VRRP Route Tracking ................................................................................................................... |
325 |
|
Figure 217: Virtual Router Status ................................................................................................................... |
325 |
|
Figure 218: Virtual Router Statistics—Virtual Router Configured.................................................................. |
327 |
|
Figure 219: |
802.1p Priority Mapping.............................................................................................................. |
330 |
Figure 220: |
Trust Mode Configuration ........................................................................................................... |
331 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 26 |
D Link UWS User Manual |
|
Figure 221: IP DSCP Mapping Configuration .................................................................................................. |
332 |
Figure 222: Interface Configuration ............................................................................................................... |
333 |
Figure 223: Interface Queue Configuration.................................................................................................... |
334 |
Figure 224: Interface Queue Status................................................................................................................ |
335 |
Figure 225: Diffserv Configuration ................................................................................................................. |
337 |
Figure 226: Diffserv Class Configuration ........................................................................................................ |
338 |
Figure 227: Diffserv Class Configuration ........................................................................................................ |
338 |
Figure 228: Class Summary ............................................................................................................................ |
340 |
Figure 229: Policy Configuration .................................................................................................................... |
341 |
Figure 230: Policy Configuration .................................................................................................................... |
341 |
Figure 231: Policy Summary ........................................................................................................................... |
342 |
Figure 232: Policy Class Definition ................................................................................................................. |
343 |
Figure 233: Policy Attribute Summary ........................................................................................................... |
345 |
Figure 234: Service Configuration .................................................................................................................. |
345 |
Figure 235: Service Summary ......................................................................................................................... |
346 |
Figure 236: Service Statistics .......................................................................................................................... |
346 |
Figure 237: Service Detailed Statistics............................................................................................................ |
347 |
Figure 238: Auto VoIP Configuration.............................................................................................................. |
349 |
Figure 239: Auto VoIP Summary .................................................................................................................... |
350 |
Figure 240: IP ACL Configuration.................................................................................................................... |
352 |
Figure 241: IP ACL Rule Configuration (Create Rule)...................................................................................... |
353 |
Figure 242: IP ACL Rule Configuration (Extended ACL Rule) .......................................................................... |
354 |
Figure 243: IP ACL Summary .......................................................................................................................... |
358 |
Figure 244: IP ACL Rule Summary .................................................................................................................. |
359 |
Figure 245: MAC ACL Configuration ............................................................................................................... |
360 |
Figure 246: MAC ACL Rule Configuration (Create Rule) ................................................................................. |
361 |
Figure 247: MAC ACL Rule Configuration (Deny Action) ................................................................................ |
361 |
Figure 248: MAC ACL Rule Configuration (Permit Action).............................................................................. |
362 |
Figure 249: MAC ACL Summary...................................................................................................................... |
365 |
Figure 250: MAC ACL Rule Summary.............................................................................................................. |
365 |
Figure 251: ACL Interface Configuration ........................................................................................................ |
366 |
Figure 252: Port Security Administration ....................................................................................................... |
369 |
Figure 253: Port Security Interface Configuration.......................................................................................... |
369 |
Figure 254: Port Security Static ...................................................................................................................... |
371 |
Figure 255: Port Security Dynamic ................................................................................................................. |
372 |
Figure 256: Port Security Violation Status...................................................................................................... |
373 |
Figure 257: Secure HTTP Configuration.......................................................................................................... |
374 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 27 |
D Link UWS User Manual |
|
Figure 258: File Download.............................................................................................................................. |
376 |
Figure 259: Secure Shell Configuration .......................................................................................................... |
377 |
Figure 260: Captive Portal Global Configuration............................................................................................ |
379 |
Figure 261: Captive Portal Summary.............................................................................................................. |
381 |
Figure 262: Captive Portal Configuration ....................................................................................................... |
382 |
Figure 263: CP Web Page Customization—Global Parameters ..................................................................... |
385 |
Figure 264: CP Web Page Customization—Authentication page .................................................................. |
386 |
Figure 265: CP Web Page Customization—Welcome Page ........................................................................... |
386 |
Figure 266: CP Web Page Customization—Logout Page ............................................................................... |
387 |
Figure 267: CP Web Page Customization—Logout Success Page .................................................................. |
387 |
Figure 268: Captive Portal Local User Summary ............................................................................................ |
390 |
Figure 269: Adding a New User ...................................................................................................................... |
391 |
Figure 270: Local User Configuration ............................................................................................................. |
392 |
Figure 271: Interface Association................................................................................................................... |
395 |
Figure 272: Global Captive Portal Status........................................................................................................ |
396 |
Figure 273: CP Activation and Activity Status ................................................................................................ |
397 |
Figure 274: Interface Activation Status .......................................................................................................... |
399 |
Figure 275: Interface Capability Status .......................................................................................................... |
400 |
Figure 276: Client Summary ........................................................................................................................... |
401 |
Figure 277: Client Detail ................................................................................................................................. |
402 |
Figure 278: Client Statistics ............................................................................................................................ |
403 |
Figure 279: Interface Client Status............................................................................................................... |
403 |
Figure 280: CP Client Status ......................................................................................................................... |
404 |
Figure 281: SNMP Trap Configuration............................................................................................................ |
405 |
Figure 282: RADIUS Configuration ................................................................................................................. |
406 |
Figure 283: RADIUS Server Configuration—Add Server ................................................................................. |
408 |
Figure 284: RADIUS Server Configuration—Server Added............................................................................. |
408 |
Figure 285: Named Server Status................................................................................................................... |
410 |
Figure 286: RADIUS Server Statistics .............................................................................................................. |
411 |
Figure 287: Add RADIUS Accounting Server................................................................................................... |
411 |
Figure 288: RADIUS Accounting Server Configuration—Server Added.......................................................... |
412 |
Figure 289: RADIUS Server Configuration—Server Added............................................................................. |
413 |
Figure 290: RADIUS Accounting Server Statistics ........................................................................................... |
414 |
Figure 291: RADIUS Clear Statistics ................................................................................................................ |
414 |
Figure 292: Global Port Access Control Configuration ................................................................................... |
415 |
Figure 293: Port Access Control Port Configuration....................................................................................... |
416 |
Figure 294: PAE Capability Configuration....................................................................................................... |
418 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 28 |
D Link UWS User Manual |
|
Figure 295: Port Access Control Supplicant Port Configuration..................................................................... |
419 |
Figure 296: Port Access Control Status .......................................................................................................... |
420 |
Figure 297: Port Access Control Status MAC based Control Mode ............................................................. |
421 |
Figure 298: Port Access Control Port Summary ............................................................................................. |
424 |
Figure 299: Port Access Control Statistics ...................................................................................................... |
426 |
Figure 300: Port Access Control Client Summary........................................................................................... |
427 |
Figure 301: Port Access Privileges .................................................................................................................. |
428 |
Figure 302: TACACS+ Configuration ............................................................................................................... |
429 |
Figure 303: TACACS+ Configuration—No Server............................................................................................ |
430 |
Figure 304: Global WLAN Status/Statistics..................................................................................................... |
439 |
Figure 305: Switch Status/Statistics ............................................................................................................... |
444 |
Figure 306: Wireless Discovery Status ........................................................................................................... |
447 |
Figure 307: Configuration Received ............................................................................................................... |
449 |
Figure 308: AP Hardware Capability Information........................................................................................... |
450 |
Figure 309: Radio Detail ................................................................................................................................. |
451 |
Figure 310: Image Table ................................................................................................................................. |
452 |
Figure 311: Peer Switch Status....................................................................................................................... |
453 |
Figure 312: Peer Switch Configuration Status................................................................................................ |
454 |
Figure 313: Peer Switch Managed AP Status.................................................................................................. |
455 |
Figure 314: All Access Points .......................................................................................................................... |
456 |
Figure 315: Managed AP Status ..................................................................................................................... |
459 |
Figure 316: Managed AP Statistics ................................................................................................................. |
471 |
Figure 317: AP Authentication Failure Status................................................................................................. |
477 |
Figure 318: AP Authentication Failure Details................................................................................................ |
479 |
Figure 319: RF Scan ........................................................................................................................................ |
481 |
Figure 320: RF Scan AP Details ....................................................................................................................... |
482 |
Figure 321: AP Triangulation Status ............................................................................................................... |
484 |
Figure 322: WIDS AP Rogue Classification...................................................................................................... |
485 |
Figure 323: AP De Authentication Attack Status............................................................................................ |
487 |
Figure 324: Associated Client Status .............................................................................................................. |
488 |
Figure 325: Associated Client Status .............................................................................................................. |
489 |
Figure 326: Associated Client Status Detail.................................................................................................... |
490 |
Figure 327: Associated Client QoS Status....................................................................................................... |
492 |
Figure 328: Associated Client Neighbor AP Status ......................................................................................... |
493 |
Figure 329: Associated Client Distributed Tunneling Status .......................................................................... |
494 |
Figure 330: Associated Client TSPEC Status ................................................................................................... |
496 |
Figure 331: Associated Client RRM Status...................................................................................................... |
497 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 29 |
D Link UWS User Manual |
|
Figure 332: SSID Associated Client Status ...................................................................................................... |
498 |
Figure 333: VAP Associated Client Status....................................................................................................... |
499 |
Figure 334: Switch Associated Client Status................................................................................................... |
500 |
Figure 335: Associated Client Association Summary Statistics ...................................................................... |
501 |
Figure 336: Associated Client Statistics Session Summary............................................................................. |
502 |
Figure 337: Associated Client Association Detail Statistics ............................................................................ |
503 |
Figure 338: Associated Client Session Detail Statistics................................................................................... |
504 |
Figure 339: Associated Client Session Detail Statistics................................................................................... |
505 |
Figure 340: Ad Hoc Clients ............................................................................................................................. |
506 |
Figure 341: Detected Client Status................................................................................................................. |
507 |
Figure 342: Detailed Detected Client Status .................................................................................................. |
509 |
Figure 343: WIDS Client Rogue Classification................................................................................................. |
511 |
Figure 344: Detected Client Pre Authentication History................................................................................ |
513 |
Figure 345: Detected Client Triangulation ..................................................................................................... |
514 |
Figure 346: Detected Client Roam History ..................................................................................................... |
515 |
Figure 347: Detected Client Pre Authentication History Summary ............................................................... |
516 |
Figure 348: Detected Client Roam History Summary..................................................................................... |
517 |
Figure 349: RRM Channel Load Configuration ............................................................................................... |
518 |
Figure 350: RRM Channel Load History.......................................................................................................... |
520 |
Figure 351: RRM Neighbors............................................................................................................................ |
521 |
Figure 352: WDS Group Status Summary....................................................................................................... |
522 |
Figure 353: WDS AP Group Status.................................................................................................................. |
523 |
Figure 354: WDS AP Group Status Summary ................................................................................................. |
525 |
Figure 355: WDS AP Link Status Summary ..................................................................................................... |
526 |
Figure 356: WDS Group Link Statistics Summary ........................................................................................... |
528 |
Figure 357: Wireless Global Configuration..................................................................................................... |
529 |
Figure 358: Wireless Discovery Configuration ............................................................................................... |
535 |
Figure 359: AP Hardware Capabilities ............................................................................................................ |
537 |
Figure 360: Radio Settings.............................................................................................................................. |
539 |
Figure 361: VAP Settings ................................................................................................................................ |
543 |
Figure 362: Configuring Network Settings ..................................................................................................... |
545 |
Figure 363: AP Network Security Options ...................................................................................................... |
551 |
Figure 364: Static WEP Configuration ............................................................................................................ |
552 |
Figure 365: WPA Personal Configuration ....................................................................................................... |
554 |
Figure 366: Adding a Valid AP ........................................................................................................................ |
556 |
Figure 367: Configuring a Valid AP ................................................................................................................. |
558 |
Figure 368: Local OUI Database Summary ..................................................................................................... |
561 |
D-Link |
Unified Wired and Wireless Access System |
November 2011 |
Page 30 |