EasyManua.ls Logo

D-Link DWL-6610AP

D-Link DWL-6610AP
754 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
©Copyright 2015. All rights reserved.
User Manual
Product Model: DWS-4000 series
DWL-8600AP DWL-8610AP
DWL-6600AP DWL-6610AP
DWL-2600AP DWL-3600AP
DWL-6700AP
Unified Wired & Wireless Access System
Release 2.01
October 2015

Table of Contents

Other manuals for D-Link DWL-6610AP

Question and Answer IconNeed help?

Do you have a question about the D-Link DWL-6610AP and is the answer not in the manual?

D-Link DWL-6610AP Specifications

General IconGeneral
2.4 GHzYes
Networking standardsIEEE 802.11a, IEEE 802.11ac, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.1Q, IEEE 802.3, IEEE 802.3ab, IEEE 802.3at, IEEE 802.3u
Ethernet LAN data rates10, 100, 1000 Mbit/s
Maximum data transfer rate1200 Mbit/s
CertificationCE EN 301 893 V1.7.1 (2012-06) (DFS/TPC) EN 300 328 V1.8.1 (2012-06) FCC IC cUL LVD UL2043 C-Tick BSMI NCC
Housing materialPlastic
Antenna gain level (max)6.5 dBi
Security algorithmsAES, HTTPS, SSH, TKIP, WPA, WPA2
Output current2 A
Output voltage12 V
Power consumption (max)16.6 W
Storage temperature (T-T)-20 - 65 °C
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)10 - 90 %
Ethernet LAN (RJ-45) ports1
Package depth235 mm
Package width243 mm
Package height90 mm
Package weight1065 g
Pallet width1200 mm
Pallet length1100 mm
Pallet height (air)1235 mm
Pallet height (sea)2060 mm
Pallet gross weight (air)200628 g
Pallet gross weight (sea)332474 g
Quantity per pallet (air)144 pc(s)
Quantity per pallet (sea)252 pc(s)
Shipping (inner) case width343 mm
Shipping (inner) case height275 mm
Shipping (inner) case length565 mm
Shipping (inner) case weight7297 g
Shipping (inner) case net weight6390 g
Number of cartons per pallet (air)24 pc(s)
Number of cartons per pallet (sea)42 pc(s)
Quantity per shipping (inner) case6 pc(s)
Harmonized System (HS) code85176990
Weight and Dimensions IconWeight and Dimensions
Width158.8 mm
Height69.4 mm
Weight500 g

Summary

About This Document

Audience

Target audience for the manual, including system administrators and support personnel.

Organization

Outlines the structure of the manual, detailing sections and their respective page numbers.

Section 1: Getting Started

Connecting the Switch to the Network

Describes initial network connection steps for remote management via Telnet, Web, or SNMP.

Booting the Switch

Details the process of powering on the switch and navigating the POST and Boot menu.

Boot Menu Functions

Lists and explains tasks performable via the Boot menu after POST completion.

Understanding the User Interfaces

Explains the three management methods: Web UI, CLI, and SNMP.

Using the Web Interface

Provides steps for accessing the switch's web interface and logging in.

Using the Command-Line Interface

Explains how to access and use the switch's text-based command-line interface.

Using SNMP

Details how to configure SNMP for network device management, including user profiles and security.

Section 2: System Administration

System Description

Page for configuring and viewing general device information, including system name, location, and contact.

Switch Configuration

Controls the IEEE 802.3x flow control mode for the switch, affecting packet transmission during congestion.

Card Configuration

Provides information about cards installed in switch slots and their configuration.

PoE Configuration

Configures Power over Ethernet (PoE) features, including system usage thresholds and port management.

IP Address

Manages the network interface's IP information, allowing configuration of IP addresses and subnet masks.

User Accounts

Manages user accounts, assigning passwords, and setting security parameters for default and additional accounts.

Authentication List Configuration

Configures login lists that specify authentication methods for switch or port access.

Denial of Service Protection

Configures Denial of Service (DoS) control by classifying and blocking various DoS attacks.

Multiple Port Mirroring

Selects network traffic for analysis by a network analyzer, done for specific ports as source or destination.

Configuring SNTP Settings

Supports accurate network device clock time synchronization using the Simple Network Time Protocol (SNTP).

Section 3: Using System Tools

Reset Configuration to Defaults

Resets the system configuration to the factory default values.

Save All Applied Changes

Makes submitted changes persistent across a system reset by saving them to non-volatile memory.

Download File To Switch (TFTP)

Downloads image, configuration, CLI banner, or SSH/SSL files from a TFTP server to the switch.

Multiple Image Service

Maintains two versions of software (active and backup) for reduced downtime during upgrades/downgrades.

AutoInstall

Enables automatic switch configuration upon power-on by downloading a configuration file from a TFTP server.

Section 4: Configuring L2 Features

Configuring and Searching the Forwarding Database

Maintains a list of MAC addresses to determine how to forward received frames.

Managing VLANs

Adds Virtual LAN (VLAN) support, partitioning the network into logical segments for administration and security.

VLAN Configuration

Defines VLAN groups stored in the VLAN membership table, supporting up to 3965 VLANs.

Configuring Spanning Tree Protocol

Provides a tree topology for any bridge arrangement, eliminating loops and ensuring one path between end stations.

Configuring DHCP Snooping

Monitors DHCP messages to filter harmful messages and build a binding database for authorized traffic.

Managing LLDP

Allows stations on an 802 LAN to advertise capabilities and physical descriptions for system topology identification.

Configuring Dynamic ARP Inspection

Rejects invalid ARP packets, preventing man-in-the-middle attacks by poisoning ARP caches.

Section 5: Configuring L3 Features

Managing the BOOTPDHCP Relay Agent

Enables clients and servers to exchange BootP/DHCP messages across different subnets.

Configuring the IP Helper Features

Forwards configured UDP broadcast packets to a particular IP address for server reachability on non-local subnets.

Configuring ARP

Associates Layer 2 MAC addresses with Layer 3 IPv4 addresses for manual or dynamic ARP configuration.

Configuring Global and Interface IP Settings

Enables routing and configures port or VLAN IP addresses for Layer 3 routing and inter-subnet packet routing.

Loopback Interfaces

Provides creation, deletion, and management of dynamic loopback interfaces for stable IP addressing.

Configuring RIP

Enables and configures the Routing Information Protocol (RIP) for routing information propagation.

Router Discovery

Identifies operational routers on the subnet through Router Advertisements and Router Solicitations.

Router

Allows configuration of the routing table and route preferences, including static routes and RIP.

VLAN Routing

Configures VLAN routing interfaces to support traffic on a VLAN as if it were a router port.

Virtual Router Redundancy Protocol (VRRP)

Handles default router failures by electing a backup router and minimizing black hole periods.

Configuring Quality of Service

Explains Quality of Service (QoS) features for prioritizing traffic, including Class of Service and Differentiated Services.

Section 7: Configuring Access Control Lists

Configuring IP Access Control Lists

Defines classification actions and rules for specific ports, composed of access control entries (ACEs).

MAC Access Control Lists

Consists of rules matched sequentially against packets to define permit/deny actions based on MAC criteria.

ACL Interface Configuration

Assigns ACLs and interfaces, prioritizing ACLs that are bound to each interface.

Section 8: Managing Device Security

Configuring Port Security

Enables per-port security by allowing only packets with allowable source MAC addresses to be forwarded.

SSLSecure HTTP Configuration

Enables secure HTTP for encrypted communication over SSL/TLS connections, protecting against eavesdroppers.

Secure Shell (SSH) Configuration

Configures secure command-line based communication using Secure Shell (SSH) for remote management.

Captive Portal Configuration

Blocks clients from network access until user verification is established, supporting guest and authenticated users.

Local User

Configures portals to accommodate guest and authorized users, managing local user databases.

RADIUS Settings

Provides RADIUS servers for per-user authentication and accounting, offering centralized security.

Port Access Control

Manages port security parameters, including 802.1X, supplicants, and authentication servers.

TACACS+ Settings

Provides TACACS+ client support for centralized security and validation of users accessing the device.

Section 9: Configuring the Wireless Features

Unified Wired and Wireless Access System Components

Lists components of the Unified Wired and Wireless Access System, including switches and access points.

Monitoring Status and Statistics

Monitors status and statistics for the D-Link Unified Switch network, including APs, clients, and peer switches.

Wireless Global StatusStatistics

Collects and displays global status and statistics for APs managed by the switch and associated peer switches.

AP Management

Provides tools for managing access points, including reset, RF management, software download, and provisioning.

RF Management

Configures radio frequency settings like channel plan and power levels to optimize WLAN traffic and minimize interference.

Configuring AP Security

Sets security mechanisms for APs, recommending WPA/WPA2 for network protection against unauthorized clients.

Configuring the Wireless Distribution System

Allows adding managed APs to a cluster using over-the-air WDS links, simplifying infrastructure and enabling roaming.

Locating WLAN Devices

Helps physically locate APs and wireless clients using triangulation algorithms and floor plan visualization.

AP Scheduler

Configures rules for VAP or radio operational times, automating enabling/disabling for security and power saving.

Visualizing the Wireless Network

Provides graphical display of switches, APs, and clients using a Java applet for real-time network visualization.

Appendix A: Configuration Examples

Configuring VLANs

Provides step-by-step examples for creating VLANs, assigning ports, and setting default VLANs.

Configuring VLAN Routing

Example of configuring Unified Wired and Wireless Access System software to support VLAN routing.

Configuring Multiple Spanning Tree Protocol

Example of enabling IEEE 802.1s Multiple Spanning Tree (MST) protocol and setting bridge priority.

Configuring a Virtual Access Point

Example of configuring the default virtual access point (VAP) profile on the switch for wireless network access.

Configuring Differentiated Services for VoIP

Example of setting up a class for UDP traffic to prioritize voice traffic and expedite it on the outbound side.

Configuring a Network with WDS-Managed APs

Describes configuring WDS-Managed settings on APs and switches to extend WLAN to new buildings.

Configuring a Network to Use WPA2-Enterprise and Dynamic VLANs

Example of deploying a wireless network using WPA2-Enterprise encryption and dynamic VLAN assignment via RADIUS.

Optimizing WLAN Traffic

Describes features for automatic optimization of wireless traffic, including channel selection and power adjustment.

Detecting and Preventing Wireless Intrusion

Explains the use of Wireless Intrusion Detection System (WIDS) and WIPS functions to protect the wireless network.

Related product manuals