EasyManua.ls Logo

D-Link DES-3528 User Manual

D-Link DES-3528
318 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
User Manual
Product Model:
TM
DES-3528
Layer 2 Managed Stackable Fast Ethernet Switch
Release 1.2

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the D-Link DES-3528 and is the answer not in the manual?

D-Link DES-3528 Specifications

General IconGeneral
LayerLayer 2
Switching Capacity12.8 Gbps
Forwarding Rate9.5 Mpps
MAC Address Table8K
Operating Humidity10% to 90% non-condensing
ManagementWeb-based, SNMP
Jumbo Frame SupportYes
Dimensions (W x D x H)440 x 250 x 44 mm
Operating Temperature0 to 50 °C
Storage Temperature-40°C to 70°C
Standards ComplianceIEEE 802.3, IEEE 802.3u, IEEE 802.3x, IEEE 802.1Q
Device TypeManaged Layer 2 Switch
Ports24 x 10/100BASE-TX + 4 x Combo Gigabit (SFP/RJ45)

Summary

Section 1 Introduction

Gigabit Ethernet Technology

Explains the Gigabit Ethernet technology and its benefits for network performance and upgrades.

Switch Description

Provides a detailed overview of the DES-3528 switch, its physical characteristics, and capabilities.

Features

Lists the key technical features, standards, and protocols supported by the DES-3528 switch.

LED Indicators

Explains the function and status indication of each LED on the switch for power, console, and port activity.

Section 2 Installation

Before You Connect to the Network

Provides guidelines for selecting an optimal installation site and environment for the switch.

Installing the Switch in a Rack

Guides users on mounting the switch into a standard 19-inch rack using provided brackets.

Power On (AC Power)

Explains how to connect the power cord and turn on the switch, noting initial LED behavior.

Section 3 Connecting the Switch

Switch to End Node

Details how to connect end devices like PCs to the switch ports using twisted-pair cables.

Connecting To Network Backbone or Server

Guides on utilizing SFP combo ports for high-speed connections to network backbones or servers.

Section 4 Introduction to Switch Management

Connecting the Console Port (RS-232 DCE)

Provides instructions for connecting to the switch's console port for initial setup and command-line management.

IP Address Assignment

Describes how to assign an IP address to the switch, enabling network management and remote access.

Section 5 Web-based Switch Configuration

Login to Web manager

Guides users on how to access the switch's web interface by entering its IP address in a browser.

Areas of the User Interface

Explains the layout and functions of the web manager's graphical interface, including key areas.

Section 6 Configuration

System Information

Describes how to view and configure basic system details like name, location, and contact information for the switch.

IP Address

Details the process of configuring the switch's IP address, subnet mask, default gateway, and management VLAN.

Port Configuration

Port Settings

Describes how to configure individual port parameters like state, speed, duplex mode, flow control, and address learning.

User Accounts

SNMP Settings

SNMP Global State

Details how to globally enable or disable SNMP settings on the switch, controlling its network management capabilities.

Section 7 L2 Features

Jumbo Frame

Explains how to enable or disable the Jumbo Frame feature for transmitting larger Ethernet frames, improving efficiency.

VLANs

Covers VLAN concepts, including IEEE 802.1p priority and VLAN description.

QinQ

Explains the QinQ function for carrying traffic from multiple users across a network by inserting SPVLAN tags.

Spanning Tree

STP LoopBack Prevention

Explains the function and configuration of STP loopback detection to prevent network loops caused by BPDU packet issues.

STP Bridge Global Settings

Details how to configure global Spanning Tree parameters like STP status, version, bridge max age, and hello time.

Section 8 QoS

Traffic Control

Explains the traffic control feature for managing packet storms and limiting traffic flow based on threshold levels.

SRED Settings

Describes how to configure SRED parameters, including drop modes and thresholds, for probabilistic packet dropping.

Section 9 Security

Safeguard Engine

Explains the Safeguard Engine's function in protecting the switch from packet flooding attacks by managing CPU load.

IP-MAC-Port Binding

Explains the IP-MAC-Port Binding feature for restricting network access to authorized users by binding IP and MAC addresses to specific ports.

802.1X

802.1x Port-Based and MAC-Based Access Control

Introduces the 802.1x standard for network access control, covering port-based and MAC-based authentication using RADIUS.

Section 10 ACL

ACL Configuration Wizard

Guides users on creating access profiles and ACL rules using a wizard, automating the process of defining access criteria.

Access Profile List

Describes how to view and manage configured access profiles, including adding, deleting, and viewing details of ACL profiles.

Section 11 Monitoring

CPU Utilization

Explains how to view the CPU utilization percentage of the switch, displayed as a real-time graphic.

Errors

Explains how to view port error statistics, including CRC errors, undersize, oversize, dropped packets, and jabber counts.

Browse ARP Table

Describes how to view current ARP entries on the switch, search for specific entries, and clear the ARP table.

Section 12 Save Services and Tools

Configuration File Backup & Restore

Explains the process of backing up and restoring configuration files using dual image storage for reliable configuration management.

Reset

Details the options for resetting the switch to factory defaults, including retaining user accounts and history logs.

Appendix A Technical Specifications

Physical and Environmental

Covers power supply specifications, power consumption, operating temperature, humidity, dimensions, weight, and EMI/Safety compliance.

Performance

Lists key performance features like wire speed operation, switching capacity, packet forwarding rates, and priority queues.

Appendix B Mitigating ARP Spoofing Attacks Using Packet Content ACL

Prevent ARP spoofing via packet content ACL

Explains how Packet Content ACL can mitigate ARP spoofing attacks by inspecting packet headers and blocking invalid ARP packets.

Appendix C System Log Entries

Appendix E Glossary

Related product manuals