D-Link DGS-3308TG [10/160] General precautions for rack mountable products
![D-Link DGS-3308TG [10/160] General precautions for rack mountable products](/views2/1043668/page10/bga.png)
DGS-3224TGR Gigabit Ethernet Switch User’s Guide
x
Safety Instructions (continued)
• To help prevent electric shock, plug the system and peripheral power cables into properly grounded electrical
outlets. These cables are equipped with three-prong plugs to help ensure proper grounding. Do not use adapter
plugs or remove the grounding prong from a cable. If you must use an extension cable, use a 3-wire cable with
properly grounded plugs.
• Observe extension cable and power strip ratings. Make sure that the total ampere rating of all products plugged
into the extension cable or power strip does not exceed 80 percent of the ampere ratings limit for the extension
cable or power strip.
• To help protect your system from sudden, transient increases and decreases in electrical power, use a surge
suppressor, line conditioner, or uninterruptible power supply (UPS).
• Position system cables and power cables carefully; route cables so that they cannot be stepped on or tripped over.
Be sure that nothing rests on any cables.
• Do not modify power cables or plugs. Consult a licensed electrician or your power company for site modifications.
Always follow your local/national wiring rules.
• When connecting or disconnecting power to hot-pluggable power supplies, if offered with your system, observe
the following guidelines:
– Install the power supply before connecting the power cable to the power supply.
– Unplug the power cable before removing the power supply.
– If the system has multiple sources of power, disconnect power from the system by
unplugging all power cables from the power supplies.
• Move products with care; ensure that all casters and/or stabilizers are firmly connected to the system. Avoid
sudden stops and uneven surfaces.
General Precautions for Rack-Mountable Products
Observe the following precautions for rack stability and safety. Also refer to the rack installation documentation
accompanying the system and the rack for specific caution statements and procedures.
Systems are considered to be components in a rack. Thus, "component" refers to any system as well as to various
peripherals or supporting hardware.
CAUTION: Installing systems in a rack without the front and side stabilizers
installed could cause the rack to tip over, potentially resulting in bodily injury under
certain circumstances. Therefore, always install the stabilizers before installing
components in the rack.
After installing system/components in a rack, never pull more than one component
out of the rack on its slide assemblies at one time. The weight of more than one
extended component could cause the rack to tip over and may result in serious
injury.
• Before working on the rack, make sure that the stabilizers are secured to the rack, extended to the floor, and that
the full weight of the rack rests on the floor. Install front and side stabilizers on a single rack or front stabilizers for
joined multiple racks before working on the rack.
Содержание
- User s guide 1
- Table of contents 3
- Intended readers 7
- Notes notices and cautions 7
- Preface 7
- Safety cautions 9
- Safety instructions 9
- General precautions for rack mountable products 10
- Safety instructions continued 10
- Safety instructions continued 11
- Battery handling reminder 12
- Protecting against electrostatic discharge 12
- Features 13
- Introduction 13
- Performance features 13
- Management 14
- Installation 15
- Unpacking 15
- Unpacking and setup 15
- Desktop or shelf installation 16
- Rack installation 16
- Power on 17
- External redundant power system 18
- Power failure 18
- Front panel 19
- Identifying external components 19
- Rear panel 19
- Led indicators 20
- Side panels 20
- Connecting the switch 21
- Switch to end node 21
- Switch to hub or switch 22
- Diagnostic console port rs 232 dce 23
- Local console management 23
- Switch management and operating concepts 23
- Ip addresses and snmp community names 24
- Setting an ip address 24
- Authentication 26
- Filtering 26
- Mac address aging time 26
- Packet forwarding 26
- Comparing port states 27
- Edge port 27
- P2p port 27
- Port transition states 27
- Spanning tree 27
- W rapid spanning tree 27
- D 802 w compatibility 28
- Ieee 802 q vlans 28
- Q vlan packet forwarding 29
- Q vlan tags 30
- Ingress filtering 31
- Port vlan id 31
- Tagging and untagging 31
- X port based and mac based access control 32
- Authentication server 33
- Authenticator 33
- Client 34
- Authentication process 35
- Port based network access control 35
- Dgs 3224tgr gigabit ethernet switch user s guide 36
- Ethernet switch 36
- Figure 5 10 example of typical port based configuration 36
- Network access controlled port 36
- Network access uncontrolled port 36
- Once the connected client has successfully been authenticated the port then becomes authorized and all subsequent traffic on the port is not subject to access control restriction until an event occurs that causes the port to become unauthorized hence if the port is actually connected to a shared media lan segment with more than one attached device successfully authenticating one of the attached devices effectively provides access to the lan for all devices on the shared segment clearly the security offered in this situation is open to attack 36
- Radius server 36
- Dgs 3224tgr gigabit ethernet switch user s guide 37
- Dynamic address allocation enables a client to be assigned an ip address from a pool of free addresses each address is assigned with a lease and a lease expiration period the client must renew the lease to continue using the assigned address dynamically assigned addresses can be returned to the free address pool if the computer is not being used if it is moved to another subnet of if its lease expires usually network policy ensures that the same ip address is assigned to a client each time and that addresses returned to the free address pool are reassigned 37
- Ethernet switch 37
- Figure 5 11 example of typical mac based configuration 37
- In order to successfully make use of 802 x in a shared media lan segment it would be necessary to create virtual ports one for each attached device that required access to the lan the switch would regard the single physical port connecting it to the shared media segment as consisting of a number of distinct virtual ports each virtual port being independently controlled from the point of view of eapol exchanges and authorization state the switch learns each attached device s individual mac address and effectively creates a virtual port that the attached device can then use to communicate with the lan via the switch 37
- Mac based network access control 37
- Network access controlled port 37
- Network access uncontrolled port 37
- Radius server 37
- The dynamic host configuration protocol dhcp can reduce the administrative burden of assigning and maintaining ip address information dhcp provides reliable and simple tcp ip network configuration ensures that address conflicts do not occur and helps to conserve the use of ip addresses through the centralized management of address allocation 37
- When the address lease expires the dhcp client enters the renewing state the client sends a request message to the dhcp server that provided the address the dhcp server sends an acknowledgement that contains the new lease and configuration parameters the client then updates its configuration values and returns to the bound state 37
- Getting started 39
- Introduction 39
- Web based network management 39
- Basic setup 43
- Switch information 43
- Basic switch setup 45
- Serial port settings 46
- Port configurations 47
- Port description settings 49
- Traffic segmentation table 50
- User accounts 51
- User accounts add 52
- User accounts edit 52
- Snmp network management 53
- Snmp v3 53
- Snmp view table 53
- Snmp community table 54
- Snmp host table 55
- Snmp group table 56
- Engine id 58
- Snmp user table 58
- Download firmware from tftp server 60
- Management station ip addresses 60
- Switch utilities 60
- Tftp services 60
- Download configuration from tftp server 61
- Upload history log to tftp server 62
- Upload settings to tftp server 62
- Ping test 63
- Cpu utilization 64
- Network monitoring 64
- Statistics 64
- Port error packets 65
- Port utilization 65
- Port packet analysis 66
- Address tables 67
- Mac address table 68
- Arp table 69
- Gvrp status 69
- Status 69
- Igmp snooping group table 70
- Router ports 70
- Switch history 71
- Factory reset 72
- Save changes 72
- Advanced setup 73
- Logout 73
- Restart system 73
- Spanning tree 74
- Switch advanced settings 74
- Stp switch settings 75
- Stp port settings 76
- Forwarding 77
- Mac address aging time 77
- Unicast mac address settings 78
- Multicast mac address settings 79
- Broadcast multicast storm control 80
- Configure qos 81
- Qos output scheduling 82
- P default priority 83
- Bandwidth control table 84
- P user priority 84
- Access profile mask setting 85
- Port security 95
- Port mirroring configurations 98
- Asymmetric vlan state 99
- Switch gvrp 99
- Vlan configurations 99
- Q vlans 100
- Q port settings 102
- Link aggregation 103
- Link aggregation algorithm 103
- Link aggregation group 103
- Lacp port settings 105
- X state 107
- X auth mode settings 108
- X port settings 108
- X port auth state 112
- X initialize reauthenticate ports 113
- Radius server settings 114
- X local user settings 115
- X auth diagnostics 116
- X auth statistics 117
- X auth session statistics 118
- Tacacs 119
- Tacacs state configuration 119
- X accounting client 119
- X auth client 119
- Tacacs server settings 120
- Tacacs group 121
- Tacacs group settings 121
- Tacacs method list 122
- Authentication 123
- Enable admin 123
- System log 124
- System log host 124
- System log state 124
- Igmp snooping global 126
- Multicast configuration 126
- Igmp snooping configurations 127
- Ssh management 128
- Static router port settings 128
- Ssh configurations 129
- Ssh account configuration 130
- Download certificate 131
- Ssl management 131
- Cipher suite configuration 132
- Ssl v3 configuration 133
- Tls v1 configuration 134
- Sim settings 135
- Single ip management 135
- Sim using the web interface 136
- Topology 138
- Tool tips 140
- Group icon 141
- Right click 141
- Commander switch icon 142
- Member switch icon 143
- Candidate switch icon 144
- Menu bar 145
- Device 146
- Configuration backup restore 147
- Firmware upgrade 147
- Performance 148
- Physical and environmental 148
- Technical specifications 148
- General 149
- Cable lengths 150
- Glossary 151
- All countries and regions excluding usa 154
- Dgs 3224tgr gigabit ethernet switch user s guide 154
- Limitation of liability 154
- Warranties exclusive 154
- Warranty and registration information 154
- Wichtige sicherheitshinweise 154
- Dgs 3224tgr gigabit ethernet switch user s guide 155
- Hardware 155
- Limited warranty 155
- Software 155
- For detailed warranty information applicable to products purchased outside the united states please contact the corresponding local d link office 157
- All countries and regions excluding usa 159
- Registration card 159
Похожие устройства
- LG 27EA33V-B Инструкция по эксплуатации
- Sony USM4GL Инструкция по эксплуатации
- Sharp SJ-P59M Инструкция по эксплуатации
- D-Link DHS-3226 Инструкция по эксплуатации
- Sony Cyber-Shot DSC-T500 Инструкция по эксплуатации
- Viewsonic VX2753MH-LED Инструкция по эксплуатации
- Sony USM8GL Инструкция по эксплуатации
- Panasonic DVD-K325 Инструкция по эксплуатации
- D-Link DES-3526 Инструкция по эксплуатации
- Viewsonic VX2451MH-LED Инструкция по эксплуатации
- Sony Cyber-Shot DSC-T50 Инструкция по эксплуатации
- Sony 16Gb USM16GL Инструкция по эксплуатации
- D-Link DES-3526DC Инструкция по эксплуатации
- Viewsonic VX2253MH-LED Инструкция по эксплуатации
- Electrolux EW 814 F Инструкция по эксплуатации
- D-Link DES-3550 Инструкция по эксплуатации
- Benq GW2255 Инструкция по эксплуатации
- Sony Cyber-Shot DSC-T33 Инструкция по эксплуатации
- JVC AV-2937V1 Инструкция по эксплуатации
- D-Link DES-3528 Инструкция по эксплуатации