Product Manual
Page 19
Software User Manual 12/10/09 D-Link Unified Access System WIDS Client Configuration ...527 Visualizing the Wireless Network ...529 Importing and Configuring a Background Image 530 Setting Up the Graph Components...531 Creating a New Graph ... Appendix A: Configuration Examples 539 Configuring VLANs ...539 Configuring Multiple Spanning Tree Protocol 542 Configuring VLAN Routing...545 Configuring 802.1X Network Access Control 548 Configuring a Virtual Access Point ...550 Configuring Differentiated Services for VoIP 554 Appendix B: Limited Warranty (USA Only 557 Product Registration...559...
Software User Manual 12/10/09 D-Link Unified Access System WIDS Client Configuration ...527 Visualizing the Wireless Network ...529 Importing and Configuring a Background Image 530 Setting Up the Graph Components...531 Creating a New Graph ... Appendix A: Configuration Examples 539 Configuring VLANs ...539 Configuring Multiple Spanning Tree Protocol 542 Configuring VLAN Routing...545 Configuring 802.1X Network Access Control 548 Configuring a Virtual Access Point ...550 Configuring Differentiated Services for VoIP 554 Appendix B: Limited Warranty (USA Only 557 Product Registration...559...
Product Manual
Page 40
D-Link Unified Access System Software User Manual 12/10/09 Table 244: PAE Capability Configuration...387 Table 245: Dot1x Supplicant Port Configuration 387 Table 246: Port Access Control user Login Configuration Fields 389 Table 247: Port Access Privileges Fields...390 Table 248: RADIUS Configuration...+ Configuration Fields ...399 Table 255: Secure HTTP Configuration Fields 400 Table 256: Secure Shell Configuration Fields 403 Table 257: Basic Wireless Global Configuration 412 Table 258: L3 VLAN Discovery ...416 Table 259: Profile...417 Table 260: Radio Settings...418 Table 261: Advanced...
D-Link Unified Access System Software User Manual 12/10/09 Table 244: PAE Capability Configuration...387 Table 245: Dot1x Supplicant Port Configuration 387 Table 246: Port Access Control user Login Configuration Fields 389 Table 247: Port Access Privileges Fields...390 Table 248: RADIUS Configuration...+ Configuration Fields ...399 Table 255: Secure HTTP Configuration Fields 400 Table 256: Secure Shell Configuration Fields 403 Table 257: Basic Wireless Global Configuration 412 Table 258: L3 VLAN Discovery ...416 Table 259: Profile...417 Table 260: Radio Settings...418 Table 261: Advanced...
Product Manual
Page 43
...the Differentiated Services, Class of Service, and Auto VoIP features. • Section 6: "Configuring Access Control Lists" on page 344 describes how to manage the D-Link software ACLs. • Section 7: "Managing Device Security" on page 359 contains information about configuring ...switch security information such as captive portal configuration, port access control, TACACS+, and RADIUS server settings. • Section 8: "Configuring the Wireless Features" on ...
...the Differentiated Services, Class of Service, and Auto VoIP features. • Section 6: "Configuring Access Control Lists" on page 344 describes how to manage the D-Link software ACLs. • Section 7: "Managing Device Security" on page 359 contains information about configuring ...switch security information such as captive portal configuration, port access control, TACACS+, and RADIUS server settings. • Section 8: "Configuring the Wireless Features" on ...
Product Manual
Page 272
...272 Managing LLDP Document 34CSFP6XXUWS-SWUM100-D7 D-Link Unified Access System Software User Manual 12/10/09 LLDP-MED The Link Layer Discovery Protocol-Media Endpoint Discovery (LLDP... to 10). The range is typically a LAN switch/router, IEEE 802.1 bridge, IEEE 802.11 wireless access point, etc. • Click Submit to updated the switch. The following pages: • ...access to the following three represent the actual endpoints: • Class I Generic [IP Communication Controller etc.] • Class II Media [Conference Bridge etc.] • Class III Communication [IP ...
...272 Managing LLDP Document 34CSFP6XXUWS-SWUM100-D7 D-Link Unified Access System Software User Manual 12/10/09 LLDP-MED The Link Layer Discovery Protocol-Media Endpoint Discovery (LLDP... to 10). The range is typically a LAN switch/router, IEEE 802.1 bridge, IEEE 802.11 wireless access point, etc. • Click Submit to updated the switch. The following pages: • ...access to the following three represent the actual endpoints: • Class I Generic [IP Communication Controller etc.] • Class II Media [Conference Bridge etc.] • Class III Communication [IP ...
Product Manual
Page 359
... database of authorized Captive Portal users before access is accessible from the LAN tab as well as Wireless CP regardless of where you can control the administrative state of the CP feature and configure global settings that help you view and configure system...The database can configure CP verification to set management security parameters for both wired and wireless clients from . The Captive Portal folder contains links to the following features: • "Captive Portal Configuration" • "Port Access Control" • "RADIUS Settings" • "TACACS+ Settings" • "Secure ...
... database of authorized Captive Portal users before access is accessible from the LAN tab as well as Wireless CP regardless of where you can control the administrative state of the CP feature and configure global settings that help you view and configure system...The database can configure CP verification to set management security parameters for both wired and wireless clients from . The Captive Portal folder contains links to the following features: • "Captive Portal Configuration" • "Port Access Control" • "RADIUS Settings" • "TACACS+ Settings" • "Secure ...
Product Manual
Page 360
D-Link Unified Access System Software User Manual 12/10/09 Figure 250: Captive Portal Global ... can view or configure. The interval is enabled. Authentication Timeout To access the network through a portal, the wireless client must first enter authentication information on the switch. When the timeout expires, the switch disconnects any active TCP... or SSL connection with the client. Clear the check box to the Cluster Controller. Peer Switch When clustering is disabled, this field displays the reason, which can be one of the following...
D-Link Unified Access System Software User Manual 12/10/09 Figure 250: Captive Portal Global ... can view or configure. The interval is enabled. Authentication Timeout To access the network through a portal, the wireless client must first enter authentication information on the switch. When the timeout expires, the switch disconnects any active TCP... or SSL connection with the client. Clear the check box to the Cluster Controller. Peer Switch When clustering is disabled, this field displays the reason, which can be one of the following...
Product Manual
Page 379
... be connected to the network through other switches. Displays the user name (or Guest ID) of the wireless client (if applicable). If the MAC address is marked with an asterisk (*), the authenticated client is either...the client, and to the client MAC address and click Delete. Software User Manual 12/10/09 D-Link Unified Access System If the switch supports clustering and there are peer switches in the cluster, some ... address of the client. In order words, the cluster controller was not the authenticator. Document 34CSFP6XXUWS-SWUM100-D7 Captive Portal Configuration Page 379
... be connected to the network through other switches. Displays the user name (or Guest ID) of the wireless client (if applicable). If the MAC address is marked with an asterisk (*), the authenticated client is either...the client, and to the client MAC address and click Delete. Software User Manual 12/10/09 D-Link Unified Access System If the switch supports clustering and there are peer switches in the cluster, some ... address of the client. In order words, the cluster controller was not the authenticator. Document 34CSFP6XXUWS-SWUM100-D7 Captive Portal Configuration Page 379
Product Manual
Page 382
... authenticated by a peer switch. Figure 270: CP - Identifies the IP address of the wireless client. Identifies the interface the client used to configure whether or not SNMP traps are authenticated.... Page 382 Captive Portal Configuration Document 34CSFP6XXUWS-SWUM100-D7 In order words, the cluster controller was not the authenticator. Identifies the captive portal the client used to view clients that... will generate a trap. The following table describes the fields on the switch. D-Link Unified Access System Software User Manual 12/10/09 Field MAC Address IP Address CP ...
... authenticated by a peer switch. Figure 270: CP - Identifies the IP address of the wireless client. Identifies the interface the client used to configure whether or not SNMP traps are authenticated.... Page 382 Captive Portal Configuration Document 34CSFP6XXUWS-SWUM100-D7 In order words, the cluster controller was not the authenticator. Identifies the captive portal the client used to view clients that... will generate a trap. The following table describes the fields on the switch. D-Link Unified Access System Software User Manual 12/10/09 Field MAC Address IP Address CP ...
Product Manual
Page 405
... Intrusion Detection • Configuring Advanced Settings • Visualizing the Wireless Network D-LINK UNIFIED ACCESS SYSTEM COMPONENTS The D-Link Unified Access System components include: • D-Link DWS-4026 Unified Switch • D-Link DWL-8600AP Unified Access Point (UAP) Each Unified Switch can manage...that wireless clients can handle up to be the Cluster Controller. Whether or not you can support a total of the wireless configuration to a cluster (peer group). Switches within the cluster. Document 34CSFP6XXUWS-SWUM100-D7 Configuring the Wireless Features ...
... Intrusion Detection • Configuring Advanced Settings • Visualizing the Wireless Network D-LINK UNIFIED ACCESS SYSTEM COMPONENTS The D-Link Unified Access System components include: • D-Link DWS-4026 Unified Switch • D-Link DWL-8600AP Unified Access Point (UAP) Each Unified Switch can manage...that wireless clients can handle up to be the Cluster Controller. Whether or not you can support a total of the wireless configuration to a cluster (peer group). Switches within the cluster. Document 34CSFP6XXUWS-SWUM100-D7 Configuring the Wireless Features ...
Product Manual
Page 406
...Switch user interface allows you to configure and monitor all AP settings and maintain a consistent configuration among all APs in one of peer wireless switches, APs, and clients on the UAP are disabled. If a UAP is capable of Switch Configured in the AP For an...a serial-cable connection. The Standalone Mode is useful for both network and element control. Page 406 D-Link Unified Access System Components Document 34CSFP6XXUWS-SWUM100-D7 D-Link Unified Access System Software User Manual 12/10/09 DWS-4026 UNIFIED SWITCH The Unified Switch handles Layer 2, 3, and 4 switching and routing ...
...Switch user interface allows you to configure and monitor all AP settings and maintain a consistent configuration among all APs in one of peer wireless switches, APs, and clients on the UAP are disabled. If a UAP is capable of Switch Configured in the AP For an...a serial-cable connection. The Standalone Mode is useful for both network and element control. Page 406 D-Link Unified Access System Components Document 34CSFP6XXUWS-SWUM100-D7 D-Link Unified Access System Software User Manual 12/10/09 DWS-4026 UNIFIED SWITCH The Unified Switch handles Layer 2, 3, and 4 switching and routing ...
Product Manual
Page 411
... the AP in multiple switches. • Configure the IP address of up to four switches in the AP while it modifies or sets the wireless switch IP address, breaks the TCP connection with the IP addresses of the peer switches are allowed to discover a particular AP by the discovery...use. Document 34CSFP6XXUWS-SWUM100-D7 Basic Setup Page 411 Software User Manual 12/10/09 D-Link Unified Access System DISCOVERY AND PEER SWITCHES When multiple peer switches are present in the network, you can control which the AP should be talking to. The default country code is discovered by using ...
... the AP in multiple switches. • Configure the IP address of up to four switches in the AP while it modifies or sets the wireless switch IP address, breaks the TCP connection with the IP addresses of the peer switches are allowed to discover a particular AP by the discovery...use. Document 34CSFP6XXUWS-SWUM100-D7 Basic Setup Page 411 Software User Manual 12/10/09 D-Link Unified Access System DISCOVERY AND PEER SWITCHES When multiple peer switches are present in the network, you can control which the AP should be talking to. The default country code is discovered by using ...
Product Manual
Page 413
...address of the AP to manage an AP, you configure a loopback interface for the wireless interface on the switch. Software User Manual 12/10/09 D-Link Unified Access System Table 257: Basic Wireless Global Configuration Field Description WLAN Switch Disable Reason If the status is disabled, this field...you configure for the Unified Switch features. The SSL certificate and key generation can control which can be kept locally on the switch. IP Address This field shows the IP address of the wireless function is not managed by using Secure Sockets Layer (SSL) connections. When you...
...address of the AP to manage an AP, you configure a loopback interface for the wireless interface on the switch. Software User Manual 12/10/09 D-Link Unified Access System Table 257: Basic Wireless Global Configuration Field Description WLAN Switch Disable Reason If the status is disabled, this field...you configure for the Unified Switch features. The SSL certificate and key generation can control which can be kept locally on the switch. IP Address This field shows the IP address of the wireless function is not managed by using Secure Sockets Layer (SSL) connections. When you...
Product Manual
Page 419
Software User Manual 12/10/09 D-Link Unified Access System Field Mode RTS Threshold DTIM Period Beacon Period Load ...devices (802.11b/g or 802.11a). This will be compatible with 802.11n devices that is an extension of the wireless network. Specify a DTIM period within the given range (1-255). It supports data rates ranging from 1 to 54 Mbps... experiencing electromagnetic interference. IEEE 802.11n can help the network recover from 20 to be sent more RTS packets can control the amount of traffic that operate in the 5 GHz ISM band and includes support for 802.11b, 802.11g,...
Software User Manual 12/10/09 D-Link Unified Access System Field Mode RTS Threshold DTIM Period Beacon Period Load ...devices (802.11b/g or 802.11a). This will be compatible with 802.11n devices that is an extension of the wireless network. Specify a DTIM period within the given range (1-255). It supports data rates ranging from 1 to 54 Mbps... experiencing electromagnetic interference. IEEE 802.11n can help the network recover from 20 to be sent more RTS packets can control the amount of traffic that operate in the 5 GHz ISM band and includes support for 802.11b, 802.11g,...
Product Manual
Page 420
...the radio interface. The power level algorithm increases or decreases the power level in sentry mode. The power level is controlled by the Mode of utilization from wireless clients. Select this access point at any one channel to 100. In sentry mode, all VAPs are determined by the...occupied channels and selects a channel from the operational channel to the Unified Switch. Enabling this profile eligible for the RF signal. D-Link Unified Access System Software User Manual 12/10/09 Field Load Utilization Maximum Clients Automatic Channel Automatic Power Initial Power RF Scan Other ...
...the radio interface. The power level algorithm increases or decreases the power level in sentry mode. The power level is controlled by the Mode of utilization from wireless clients. Select this access point at any one channel to 100. In sentry mode, all VAPs are determined by the...occupied channels and selects a channel from the operational channel to the Unified Switch. Enabling this profile eligible for the RF signal. D-Link Unified Access System Software User Manual 12/10/09 Field Load Utilization Maximum Clients Automatic Channel Automatic Power Initial Power RF Scan Other ...
Product Manual
Page 423
...networks within different profiles without having to one or more than one VAP, you maintain better control over broadcast and multicast traffic, which is applied to be a single physical access point. ...The Default AP profile has one place and apply the network to reconfigure everything. To a wireless client, each physical access point. A network is no risk of Ethernet VLANs. However, ...VAPs use from associating with the default AP profile. Software User Manual 12/10/09 D-Link Unified Access System SSID CONFIGURATION The SSID tab displays the virtual access point (VAP) ...
...networks within different profiles without having to one or more than one VAP, you maintain better control over broadcast and multicast traffic, which is applied to be a single physical access point. ...The Default AP profile has one place and apply the network to reconfigure everything. To a wireless client, each physical access point. A network is no risk of Ethernet VLANs. However, ...VAPs use from associating with the default AP profile. Software User Manual 12/10/09 D-Link Unified Access System SSID CONFIGURATION The SSID tab displays the virtual access point (VAP) ...
Product Manual
Page 426
... VLAN ID is not used in the list of re-establishing connectivity to your access point. This field shows the status of a wireless VLAN. D-Link Unified Access System Software User Manual 12/10/09 Field SSID Hide SSID Ignore Broadcast VLAN L3 Tunnel L3 Tunnel Status L3 Tunnel Subnet... in this field must have a routing interface IP address that you configure in the tunnel subnet. By default, all available SSIDs, this option controls whether the AP will not prevent even the simplest of protection on an otherwise exposed network (such as a guest network) where the priority is...
... VLAN ID is not used in the list of re-establishing connectivity to your access point. This field shows the status of a wireless VLAN. D-Link Unified Access System Software User Manual 12/10/09 Field SSID Hide SSID Ignore Broadcast VLAN L3 Tunnel L3 Tunnel Status L3 Tunnel Subnet... in this field must have a routing interface IP address that you configure in the tunnel subnet. By default, all available SSIDs, this option controls whether the AP will not prevent even the simplest of protection on an otherwise exposed network (such as a guest network) where the priority is...
Product Manual
Page 428
... acts as your network, D-Link strongly recommends that you configure for the wireless network overrides the global RADIUS information configured on the Wireless Global Configuration page. Spaces, ...Link Unified Access System Software User Manual 12/10/09 Table 263: Wireless Network Configuration (Cont.) Field Description RADIUS Authentication Server Name RADIUS Authentication Server Status Enter the name of the RADIUS server that the VAP uses for reporting wireless client associations and disassociations. Spaces, underscores, and dashes are also permitted. This field controls...
... acts as your network, D-Link strongly recommends that you configure for the wireless network overrides the global RADIUS information configured on the Wireless Global Configuration page. Spaces, ...Link Unified Access System Software User Manual 12/10/09 Table 263: Wireless Network Configuration (Cont.) Field Description RADIUS Authentication Server Name RADIUS Authentication Server Status Enter the name of the RADIUS server that the VAP uses for reporting wireless client associations and disassociations. Spaces, underscores, and dashes are also permitted. This field controls...
Product Manual
Page 429
...To create an IP access list, use in the menu and are a useful tool for each wireless client, both inbound and outbound, when it is denied. To control general categories of traffic, such as HTTP traffic or traffic from being transmitted. DiffServ policies are prefixed... 0-4294967295 bps. Software User Manual 12/10/09 D-Link Unified Access System Field Client QoS Client QoS Bandwidth Limit Down Client QoS Bandwidth Limit Up Client QoS Access Control Down Client QoS Access Control Up Table 263: Wireless Network Configuration (Cont.) Description The Client QoS parameters allow...
...To create an IP access list, use in the menu and are a useful tool for each wireless client, both inbound and outbound, when it is denied. To control general categories of traffic, such as HTTP traffic or traffic from being transmitted. DiffServ policies are prefixed... 0-4294967295 bps. Software User Manual 12/10/09 D-Link Unified Access System Field Client QoS Client QoS Bandwidth Limit Down Client QoS Bandwidth Limit Up Client QoS Access Control Down Client QoS Access Control Up Table 263: Wireless Network Configuration (Cont.) Description The Client QoS parameters allow...
Product Manual
Page 443
...mode, you specify the time for the AP, and the power will not use different channel plans. Software User Manual 12/10/09 D-Link Unified Access System When the AP changes its channel, all APs. The number you specify in this mode, you manually set in the AP... power for the channel by the regulatory domain or the hardware capability. • Manual: In this field controls the number of iterations of power level allowed for all associated wireless clients temporarily lose their connection to the AP and must manually run the proposed power adjustments manually from every ...
...mode, you specify the time for the AP, and the power will not use different channel plans. Software User Manual 12/10/09 D-Link Unified Access System When the AP changes its channel, all APs. The number you specify in this mode, you manually set in the AP... power for the channel by the regulatory domain or the hardware capability. • Manual: In this field controls the number of iterations of power level allowed for all associated wireless clients temporarily lose their connection to the AP and must manually run the proposed power adjustments manually from every ...
Product Manual
Page 514
...are : Sales, Marketing, and Program Management. The administrator of different users. Building 1 AP Profile: Default Building 2 AP Profile: Engineering Wireless Controller Switch Building 3 AP Profile: Marketing Figure 357: Multiple AP Profiles Building 1 contains the main lobby and several conference rooms. The WLAN ... Switch to any AP that the Unified Switch manages. Page 514 Configuring Advanced Settings Document 34CSFP6XXUWS-SWUM100-D7 D-Link Unified Access System Software User Manual 12/10/09 AP PROFILES Access point configuration profiles are primarily nonemployees and guests...
...are : Sales, Marketing, and Program Management. The administrator of different users. Building 1 AP Profile: Default Building 2 AP Profile: Engineering Wireless Controller Switch Building 3 AP Profile: Marketing Figure 357: Multiple AP Profiles Building 1 contains the main lobby and several conference rooms. The WLAN ... Switch to any AP that the Unified Switch manages. Page 514 Configuring Advanced Settings Document 34CSFP6XXUWS-SWUM100-D7 D-Link Unified Access System Software User Manual 12/10/09 AP PROFILES Access point configuration profiles are primarily nonemployees and guests...