EasyManua.ls Logo

D-Link xStack DGS-3426G User Manual

D-Link xStack DGS-3426G
356 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #163 background imageLoading...
Page #163 background image
xStack
®
DGS-3426G Layer 2 Gigabit Ethernet Managed Switch
152
STP Port Settings
STP can be set up on a port per port basis. In
addition to setting Spanning Tree parameters
for use on the switch level, the Switch allows
for the configuration of groups of ports, each
port-group of which will have its own
spanning tree, and will require some of its
own configuration settings. An STP Group
will use the switch-level parameters entered
above, with the addition of Port Priority and
Port Cost. An STP Group spanning tree
works in the same way as the switch-level
spanning tree, but the root bridge concept is
replaced with a root port concept. A root port
is a port of the group that is elected based on
port priority and port cost, to be the
connection to the network for the group.
Redundant links will be blocked, just as
redundant links are blocked on the switch
level. The STP on the switch level blocks
redundant links between switches (and
similar network devices). The port level STP
will block redundant links within an STP
Group.
To view this window, click L2 Features >
Spanning Tree > STP Port Settings as
shown on the right:
Figure 3 - 53 STP Port Settings window
It is advisable to define an STP Group to correspond to a VLAN group of ports.
The following STP Port Settings fields can be set:
Parameter Description
Unit
Select the switch in the switch stack to be modified.
From/To
A consecutive group of ports may be configured starting with the selected port.
External Cost
This defines a metric that indicates the relative cost of forwarding packets to the specified
port list. Port cost can be set automatically or as a metric value. The default value is 0 (auto).
0 (auto) – Setting 0 for the external cost will automatically set the speed for forwarding
packets to the specified port(s) in the list for optimal efficiency. Default port cost: 100Mbps
port = 200000. Gigabit port = 20000.
value 1-200000000 – Define a value between 1 and 200000000 to determine the external
cost. The lower the number, the greater the probability the port will be chosen to forward
packets.
Hello Time
The time interval between transmissions of configuration messages by the designated port,
to other devices on the bridged LAN. The user may choose a time between 1 and 10
seconds. The default is 2 seconds. If the inputted Hello Time is greater than 2, the Hello
Time is 2. This field is only operable when the Switch is enabled for MSTP.
Migration
When operating in RSTP mode, selecting yes forces the port that has been selected to
transmit RSTP BPDUs.
Edge
Choosing the True parameter designates the port as an edge port. Edge ports cannot create
loops, however an edge port can lose edge port status if a topology change creates a
potential for a loop. An edge port normally should not receive BPDU packets. If a BPDU
packet is received, it automatically loses edge port status. Choosing the False parameter
indicates that the port does not have edge port status.
P2P
Choosing the True parameter indicates a point-to-point (P2P) shared link. P2P ports are

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the D-Link xStack DGS-3426G and is the answer not in the manual?

D-Link xStack DGS-3426G Specifications

General IconGeneral
MAC Address Table8K
Power SupplyInternal Power Supply
RAM128 MB
Flash Memory16 MB
LayerLayer 2+
Humidity10% to 90% non-condensing
VLAN SupportUp to 4K VLANs
Jumbo Frame SupportYes, up to 9K bytes
ManagementWeb-based GUI, CLI, SNMP, RMON
QoS SupportYes
Operating Temperature0°C to 50°C (32°F to 122°F)
Ports24 x 10/100/1000BASE-T, 2 x 1000BASE-X SFP
Dimensions440 x 260 x 44 mm (17.3 x 10.2 x 1.7 inches)
Storage Temperature-20°C to 70°C (-4°F to 158°F)

Summary

Web-based Switch Configuration

Logging in to the Web Manager

Instructions on accessing the switch's management interface through a web browser using its IP address.

Administration

IP Address

Explains how to configure the switch's IPv4 address, subnet mask, and default gateway via the web manager.

Interface Settings

Covers the setup of IP interfaces for both IPv4 and IPv6, including adding and modifying settings.

Port Configuration

Covers the configuration of individual switch ports, including state, flow control, and speed/duplex settings.

L2 Features

VLANs

Covers Virtual LANs, their description, notes, and IEEE 802.1Q VLAN standards.

Spanning Tree

Details the three Spanning Tree Protocol versions: 802.1D, 802.1w Rapid STP, and 802.1s MSTP.

QoS

ACL (Access Control List)

Access Profile Table

Establishes criteria to determine packet forwarding based on header information like MAC or IP address.

Security

Port Security

Secures ports by locking learned MAC addresses, preventing unauthorized device access.

IP-MAC-Port Binding

Restricts client access by binding MAC and IP addresses to specific switch ports.

802.1X

Provides port-based and host-based access control using RADIUS for user authentication.

Configure 802.1X Authenticator Parameter

Configures 802.1X authenticator settings on the switch, including port-specific parameters.

Web-based Access Control (WAC)

Authenticates users trying to access the Internet via the switch using HTTP protocol.

Access Authentication Control

Allows users to secure switch access using TACACS, XTACACS, TACACS+, and RADIUS protocols.

MAC-based Access Control (MAC)

Allows configuration of MAC addresses for authentication and access rights based on target VLANs.

Secure Shell (SSH)

Provides secure remote login and network services over an insecure network using encryption.

Monitoring

Packets

Allows viewing various packet statistics as a line graph or table, including received and transmitted data.

Errors

Provides port error statistics, viewable as line graphs or tables for received and transmitted data.

Appendix A: Mitigating ARP Spoofing Attacks Using Packet Content ACL

Prevent ARP Spoofing via Packet Content ACL

Details how to use Packet Content ACL to mitigate ARP spoofing by blocking invalid ARP packets.

Related product manuals