EasyManua.ls Logo

D-Link DWL-6600AP

D-Link DWL-6600AP
754 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
©Copyright 2015. All rights reserved.
User Manual
Product Model: DWS-4000 series
DWL-8600AP DWL-8610AP
DWL-6600AP DWL-6610AP
DWL-2600AP DWL-3600AP
DWL-6700AP
Unified Wired & Wireless Access System
Release 2.01
October 2015

Table of Contents

Other manuals for D-Link DWL-6600AP

Question and Answer IconNeed help?

Do you have a question about the D-Link DWL-6600AP and is the answer not in the manual?

D-Link DWL-6600AP Specifications

General IconGeneral
2.4 GHzYes
Networking standardsIEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.3, IEEE 802.3ab, IEEE 802.3af, IEEE 802.3u
Ethernet LAN data rates10, 100, 1000 Mbit/s
Maximum data transfer rate450 Mbit/s
Power consumption (typical)9.6 W
InternalNo
PlacementCeiling, Wall
CertificationFCC Class B, CE Class B, C-Tick
Product colorGray
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)10 - 90 %
WAN connectionEthernet (RJ-45)
USB 2.0 ports quantity0
Ethernet LAN (RJ-45) ports2
Security algorithms64-bit WEP, 128-bit WEP, WPA, WPA2
Weight and Dimensions IconWeight and Dimensions
Depth77.5 mm
Width156 mm
Height- mm
Weight500 g

Summary

Getting Started

Connecting the Switch to the Network

Details initial network connection setup for remote management via Telnet, Web, or SNMP.

Booting the Switch

Covers the switch power-on process, POST, and boot menu options for special procedures.

Understanding the User Interfaces

Explains management methods: Web GUI, CLI, and SNMP, focusing on accessing the Web interface.

System Administration

System Description and Basic Configuration

Covers general device information like system name, location, contact, and IP address settings.

IP and Network Configuration

Guides on configuring network interface parameters: IP addressing, subnet masks, and default gateways.

User and Authentication Management

Details managing user accounts, setting passwords, and configuring authentication lists for access control.

Log Management and Monitoring

Covers configuration and viewing of buffered logs, command logs, console logs, and event logs.

Using System Tools

Resetting System Configuration

Procedures for resetting the system configuration and passwords to factory default values.

Software and File Management

Details on downloading firmware, uploading files via TFTP, HTTP file downloads, and image management.

Configuring L2 Features

Managing VLANs

Guides through VLAN configuration, port assignment, tagging behavior, and IP subnet-based VLANs.

Configuring Spanning Tree Protocol

Details on enabling IEEE 802.1s Multiple Spanning Tree (MST) protocol, CST, and port configurations.

Configuring DHCP Snooping

Explains the security feature for monitoring DHCP messages, building a bindings database, and configuring VLANs.

Configuring L3 Features

Configuring Global and Interface IP Settings

Covers enabling routing, configuring interface IP addresses, and managing routing tables and discovery.

Configuring RIP

Details on enabling and configuring or disabling RIP in Global mode, interface settings, and route redistribution.

VLAN Routing

Guides on configuring VLAN Routing interfaces to support traffic on a VLAN as a router port.

Configuring Quality of Service

Configuring Class of Service

Covers queueing features, 802.1p priority mapping, trust mode, and IP DSCP mapping.

Configuring Differentiated Services

Details DiffServ support for classifying traffic, creating policies, and applying them to interfaces.

Configuring Auto VoIP

Enables prioritization of VoIP traffic by matching streams to the highest CoS queue for better QoS.

Configuring Access Control Lists

Configuring IP Access Control Lists

Defines classification actions and rules for specific ports based on IP addresses, protocols, and packet criteria.

MAC Access Control Lists

Allows definition of rules for MAC-based ACLs, associating MAC addresses with VLANs and ports.

Managing Device Security

Configuring Port Security

Enables per-port security by allowing only specific MAC addresses to be forwarded, discarding others.

Captive Portal Configuration

Allows blocking network access until user verification is established for wired and wireless clients.

RADIUS Settings

Configuration for Remote Authorization Dial-In User Service servers for centralized authentication.

Port Access Control

Manages 802.1X port-based authentication, specifying authenticator, supplicant, and authentication server roles.

Configuring the Wireless Features

Unified Wired and Wireless Access System Components

Details the components of the system, including the switch, access points, and cluster management.

Monitoring Status and Statistics

Provides information on wireless network status, including APs, clients, peer switches, and RF scan data.

Basic Setup

Covers global wireless settings, discovery, default AP profiles, and Valid AP database configuration.

AP Management

Includes features for resetting APs, RF management, software downloads, and AP provisioning.

Related product manuals