EasyManua.ls Logo

D-Link xStack DGS-3426G User Manual

D-Link xStack DGS-3426G
356 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
xStack
®
DGS-3426G Layer 2 Gigabit Ethernet Managed Switch
®
User Manual
Product Model :
xStack
®
DGS-3426G
Layer 2+ Gigabit Ethernet Managed Switch
Release 2.61
i

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the D-Link xStack DGS-3426G and is the answer not in the manual?

D-Link xStack DGS-3426G Specifications

General IconGeneral
MAC Address Table8K
Power SupplyInternal Power Supply
RAM128 MB
Flash Memory16 MB
LayerLayer 2+
Humidity10% to 90% non-condensing
VLAN SupportUp to 4K VLANs
Jumbo Frame SupportYes, up to 9K bytes
ManagementWeb-based GUI, CLI, SNMP, RMON
QoS SupportYes
Operating Temperature0°C to 50°C (32°F to 122°F)
Ports24 x 10/100/1000BASE-T, 2 x 1000BASE-X SFP
Dimensions440 x 260 x 44 mm (17.3 x 10.2 x 1.7 inches)
Storage Temperature-20°C to 70°C (-4°F to 158°F)

Summary

Web-based Switch Configuration

Logging in to the Web Manager

Instructions on accessing the switch's management interface through a web browser using its IP address.

Administration

IP Address

Explains how to configure the switch's IPv4 address, subnet mask, and default gateway via the web manager.

Interface Settings

Covers the setup of IP interfaces for both IPv4 and IPv6, including adding and modifying settings.

Port Configuration

Covers the configuration of individual switch ports, including state, flow control, and speed/duplex settings.

L2 Features

VLANs

Covers Virtual LANs, their description, notes, and IEEE 802.1Q VLAN standards.

Spanning Tree

Details the three Spanning Tree Protocol versions: 802.1D, 802.1w Rapid STP, and 802.1s MSTP.

QoS

ACL (Access Control List)

Access Profile Table

Establishes criteria to determine packet forwarding based on header information like MAC or IP address.

Security

Port Security

Secures ports by locking learned MAC addresses, preventing unauthorized device access.

IP-MAC-Port Binding

Restricts client access by binding MAC and IP addresses to specific switch ports.

802.1X

Provides port-based and host-based access control using RADIUS for user authentication.

Configure 802.1X Authenticator Parameter

Configures 802.1X authenticator settings on the switch, including port-specific parameters.

Web-based Access Control (WAC)

Authenticates users trying to access the Internet via the switch using HTTP protocol.

Access Authentication Control

Allows users to secure switch access using TACACS, XTACACS, TACACS+, and RADIUS protocols.

MAC-based Access Control (MAC)

Allows configuration of MAC addresses for authentication and access rights based on target VLANs.

Secure Shell (SSH)

Provides secure remote login and network services over an insecure network using encryption.

Monitoring

Packets

Allows viewing various packet statistics as a line graph or table, including received and transmitted data.

Errors

Provides port error statistics, viewable as line graphs or tables for received and transmitted data.

Appendix A: Mitigating ARP Spoofing Attacks Using Packet Content ACL

Prevent ARP Spoofing via Packet Content ACL

Details how to use Packet Content ACL to mitigate ARP spoofing by blocking invalid ARP packets.

Related product manuals