Product Manual
Page 33
.... For example: DWS-1008# show port status 1-3,6 D-Link DWS-1008 User Manual 14 Port Lists The physical Ethernet ports on the switch.You can include a single port or multiple ports in one of the following formats for connection to access points, authenticated wired users, or the network backbone. For example: DWS-1008# show port poe 1,2,4,6 • A hyphen-separated range of...
.... For example: DWS-1008# show port status 1-3,6 D-Link DWS-1008 User Manual 14 Port Lists The physical Ethernet ports on the switch.You can include a single port or multiple ports in one of the following formats for connection to access points, authenticated wired users, or the network backbone. For example: DWS-1008# show port poe 1,2,4,6 • A hyphen-separated range of...
Product Manual
Page 42
...and subnet mask for your organization. The only management access the switch allows by default is CLI access through the serial connection. • System Time and date parameters: • Date...command, you a series of -8 hours from UTC) separately. Quickstart Example This example configures the following parameters: • System name: DWS-1008-mrktg • Country code (regulatory domain): US ... characters as the timezone name. Press Enter at the Enter password prompt. 5. D-Link DWS-1008 User Manual 23 To quit, press Ctrl+C. For a list of valid country codes...
...and subnet mask for your organization. The only management access the switch allows by default is CLI access through the serial connection. • System Time and date parameters: • Date...command, you a series of -8 hours from UTC) separately. Quickstart Example This example configures the following parameters: • System name: DWS-1008-mrktg • Country code (regulatory domain): US ... characters as the timezone name. Press Enter at the Enter password prompt. 5. D-Link DWS-1008 User Manual 23 To quit, press Ctrl+C. For a list of valid country codes...
Product Manual
Page 44
... recommends that you can configure console authentication and Telnet authentication separately, and you enforce authentication on the RADIUS server. You can configure the DWS-1008 switch for secure network connections. Restricted mode is an overview of operation is available. Local override - D-Link DWS-1008 User Manual 25 In this mode, only a small subset of user to the local...
... recommends that you can configure console authentication and Telnet authentication separately, and you enforce authentication on the RADIUS server. You can configure the DWS-1008 switch for secure network connections. Restricted mode is an overview of operation is available. Local override - D-Link DWS-1008 User Manual 25 In this mode, only a small subset of user to the local...
Product Manual
Page 61
... 8 8 up down auto network no D-Link DWS-1008 User Manual 42 The PoE state depends on a port, use CLI commands to display and regularly update port statistics in a separate window. Disabling or Reenabling Power over Ethernet Power over Ethernet (PoE) supplies DC power to a device connected to the other switch. This feature is useful for forcing...
... 8 8 up down auto network no D-Link DWS-1008 User Manual 42 The PoE state depends on a port, use CLI commands to display and regularly update port statistics in a separate window. Disabling or Reenabling Power over Ethernet Power over Ethernet (PoE) supplies DC power to a device connected to the other switch. This feature is useful for forcing...
Product Manual
Page 67
... such as 802.1X. Optionally, each VLAN as a separate IP subnet. The commands do not configure VLAN membership for that can configure multiple VLANs on switch network ports. A switch cannot forward traffic on AP access ports or wired authentication ... configuring them on a switch can be members of ports is determined dynamically through switch ports that is already in VLANs. D-Link DWS-1008 User Manual 48 VLANs are configured for access points or wired authentication access. Users who require authentication connect through the authentication and authorization...
... such as 802.1X. Optionally, each VLAN as a separate IP subnet. The commands do not configure VLAN membership for that can configure multiple VLANs on switch network ports. A switch cannot forward traffic on AP access ports or wired authentication ... configuring them on a switch can be members of ports is determined dynamically through switch ports that is already in VLANs. D-Link DWS-1008 User Manual 48 VLANs are configured for access points or wired authentication access. Users who require authentication connect through the authentication and authorization...
Product Manual
Page 124
...to use the DHCP option 43 field to provide a list of switch IP addresses, without the need to change can cause the port on the port that is directly connected to a Distributed AP, you might need to contain a comma-separated list of the STP forwarding delay. You can use the list...duration of switch IP addresses or hostnames, in networks that is running Rapid Spanning Tree or Multiple Spanning Tree, set the port into edge port mode. Distributed APs and DHCP Option 43 The option 43 field in a DHCP Offer message can prevent the AP from forwarding traffic. D-Link DWS-1008 User ...
...to use the DHCP option 43 field to provide a list of switch IP addresses, without the need to change can cause the port on the port that is directly connected to a Distributed AP, you might need to contain a comma-separated list of the STP forwarding delay. You can use the list...duration of switch IP addresses or hostnames, in networks that is running Rapid Spanning Tree or Multiple Spanning Tree, set the port into edge port mode. Distributed APs and DHCP Option 43 The option 43 field in a DHCP Offer message can prevent the AP from forwarding traffic. D-Link DWS-1008 User ...
Product Manual
Page 141
... The boot process for configured Distributed APs. The AP then uses the IP connection to the process for a Distributed AP that switch. After the AP starts up, it uses DHCP to configure a service profile separately for configuring the AP, and sends the AP the IP address of APs ...need to configure its configuration from among the unused valid AP numbers available on a switch can receive its IP connection with the AP and radio parameter settings in the Auto-AP profile are active. D-Link DWS-1008 User Manual 122 The Auto-AP profile also configures the AP with the network. The...
... The boot process for configured Distributed APs. The AP then uses the IP connection to the process for a Distributed AP that switch. After the AP starts up, it uses DHCP to configure a service profile separately for configuring the AP, and sends the AP the IP address of APs ...need to configure its configuration from among the unused valid AP numbers available on a switch can receive its IP connection with the AP and radio parameter settings in the Auto-AP profile are active. D-Link DWS-1008 User Manual 122 The Auto-AP profile also configures the AP with the network. The...
Product Manual
Page 169
...information, use the following command: DWS-1008# show dap config [dap-num [radio {1 | 2}]] The command lists information separately for a Distributed AP access point configured on switch port 2, type the following command: DWS-1008# show ap config 6 Port 6:...power: default, To display configuration information for each access point. To display configuration information for an access point on connection 1, type the following commands: show ap config [port-list [radio {1 | 2}]] show dap config 1 Dap...pwr: 1, profile: default auto-tune max-power: default, D-Link DWS-1008 User Manual 150
...information, use the following command: DWS-1008# show dap config [dap-num [radio {1 | 2}]] The command lists information separately for a Distributed AP access point configured on switch port 2, type the following command: DWS-1008# show ap config 6 Port 6:...power: default, To display configuration information for each access point. To display configuration information for an access point on connection 1, type the following commands: show ap config [port-list [radio {1 | 2}]] show dap config 1 Dap...pwr: 1, profile: default auto-tune max-power: default, D-Link DWS-1008 User Manual 150
Product Manual
Page 235
... versions 1 and 2. Proxy reporting is applied to all VLANs on the switch. The DWS-1008 switch listens for multicast packets and maintains a table of the group. One report is a set of IP hosts that are connected to the multicast routers, instead of sending a separate report from three receivers for multicast group 237.255.255.255, the... cause the routers to the routers. To disable or reenable the feature, use the following command: set igmp proxy-report {enable | disable} [vlan vlan-id] D-Link DWS-1008 User Manual 216
... versions 1 and 2. Proxy reporting is applied to all VLANs on the switch. The DWS-1008 switch listens for multicast packets and maintains a table of the group. One report is a set of IP hosts that are connected to the multicast routers, instead of sending a separate report from three receivers for multicast group 237.255.255.255, the... cause the routers to the routers. To disable or reenable the feature, use the following command: set igmp proxy-report {enable | disable} [vlan vlan-id] D-Link DWS-1008 User Manual 216
Product Manual
Page 279
...switch. You can use a certificate. Each of the following types of access requires a separate key pair and certificate: • Admin-Administrative access through the switch) The keys are already configured on the switch...switch) • Web (required for WebAAA user access through Web View • EAP-802.1X access for network users who can access SSIDs encrypted by WEP or WPA, and for users connected... one. D-Link DWS-1008 User Manual 260 However, the certificate is generated. Certificates Automatically Generated by MSS The first time you boot a switch with MSS ...
...switch. You can use a certificate. Each of the following types of access requires a separate key pair and certificate: • Admin-Administrative access through the switch) The keys are already configured on the switch...switch) • Web (required for WebAAA user access through Web View • EAP-802.1X access for network users who can access SSIDs encrypted by WEP or WPA, and for users connected... one. D-Link DWS-1008 User Manual 260 However, the certificate is generated. Certificates Automatically Generated by MSS The first time you boot a switch with MSS ...
Product Manual
Page 329
...RADIUS access-request, for each user who wants to connect to the third-party AP must be configured as a RADIUS proxy for the AP. D-Link DWS-1008 User Manual 310 Switch Requirements • The switch port connected to the WLAN through a wired Layer 2 link. If the AP has multiple SSIDs, each SSID must...RADIUS servers. • An authentication proxy rule must be configured to send the following formats: • Separated by colons (for example, AA:BB:CC:DD:EE:FF) • Separated by dashes (for proxying. The rule matches based on the wired authentication port. • A MAC ...
...RADIUS access-request, for each user who wants to connect to the third-party AP must be configured as a RADIUS proxy for the AP. D-Link DWS-1008 User Manual 310 Switch Requirements • The switch port connected to the WLAN through a wired Layer 2 link. If the AP has multiple SSIDs, each SSID must...RADIUS servers. • An authentication proxy rule must be configured to send the following formats: • Separated by colons (for example, AA:BB:CC:DD:EE:FF) • Separated by dashes (for proxying. The rule matches based on the wired authentication port. • A MAC ...
Product Manual
Page 331
... third-party AP RADIUS client at 10.20.20.9, sending RADIUS traffic to the ports: DWS-1008# set radius proxy port commands, specify the switch port(s) connected to the third-party AP. D-Link DWS-1008 User Manual 312 For the acct-udp-port-number, specify the UDP port on port 3 ... client (the third-party AP). You can specify multiple tag values. Enter a separate command for RADIUS access-requests. The following command configures a MAC authentication rule that matches on the switch: DWS-1008# set authentication proxy ssid mycorp ** srvrgrp1 To verify the changes, use the show...
... third-party AP RADIUS client at 10.20.20.9, sending RADIUS traffic to the ports: DWS-1008# set radius proxy port commands, specify the switch port(s) connected to the third-party AP. D-Link DWS-1008 User Manual 312 For the acct-udp-port-number, specify the UDP port on port 3 ... client (the third-party AP). You can specify multiple tag values. Enter a separate command for RADIUS access-requests. The following command configures a MAC authentication rule that matches on the switch: DWS-1008# set authentication proxy ssid mycorp ** srvrgrp1 To verify the changes, use the show...
Product Manual
Page 475
... generate a response to the services provided by the authenticator. For wireless connections, CHAP is using that provides privacy by means of counter mode and ... See also registration authority (RA). See CCI. Ethernet segments separated by a wireless transmitter. comma-separated values file - communications plenum cable - Obstruction that occurs when ...certificate content can issue a certificate. The geographical area covered by a Layer 2 switch are designed to authenticate a user (client). As part of a public-key ...Link DWS-1008 User Manual 456 Co-channel interference.
... generate a response to the services provided by the authenticator. For wireless connections, CHAP is using that provides privacy by means of counter mode and ... See also registration authority (RA). See CCI. Ethernet segments separated by a wireless transmitter. comma-separated values file - communications plenum cable - Obstruction that occurs when ...certificate content can issue a certificate. The geographical area covered by a Layer 2 switch are designed to authenticate a user (client). As part of a public-key ...Link DWS-1008 User Manual 456 Co-channel interference.
Product Manual
Page 476
...message integrity check. A message sent by the Advanced Encryption Standard (AES). Comma-separated values file. dBm - A federally approved symmetric encryption algorithm in a dictionary. D-Link DWS-1008 User Manual 457 The science of protecting communications over channels that dynamically assigns IP ...the receiver's end. See DES. CPC - CRC - See cryptography. cryptography - Because its security is independent of a connection, and decrypting the encrypted text back into encrypted text at the sender's end of the channels through which each other's ...
...message integrity check. A message sent by the Advanced Encryption Standard (AES). Comma-separated values file. dBm - A federally approved symmetric encryption algorithm in a dictionary. D-Link DWS-1008 User Manual 457 The science of protecting communications over channels that dynamically assigns IP ...the receiver's end. See DES. CPC - CRC - See cryptography. cryptography - Because its security is independent of a connection, and decrypting the encrypted text back into encrypted text at the sender's end of the channels through which each other's ...
Product Manual
Page 478
...-V2; EAP with its active link, the access point reboots and loads new configuration information to one or two DWS-1008 switches, one or more distributed links through an intermediate Layer 2 or Layer 3 network, or a combination of two direct physical links from both parties. Extensible Authentication Protocol. Compare PEAP. A redundant, resilient connection between a wireless client (or supplicant...
...-V2; EAP with its active link, the access point reboots and loads new configuration information to one or two DWS-1008 switches, one or more distributed links through an intermediate Layer 2 or Layer 3 network, or a combination of two direct physical links from both parties. Extensible Authentication Protocol. Compare PEAP. A redundant, resilient connection between a wireless client (or supplicant...
Product Manual
Page 486
...A function that generates a sequence of cable approved by someone else. An algorithm of one or more hash algorithms to only the requestor and never shared. D-Link DWS-1008 User Manual 467 Power over Ethernet. PRNG - Pseudorandom function. A PRF can use multiple iterations of predictable behavior that produces effectively unpredictable output. pseudorandom function ... - A compartment or chamber to which enters the data cable at the power-supply end and comes out at the device end, is kept separate from a master secret and used to decrypt text that are connected.
...A function that generates a sequence of cable approved by someone else. An algorithm of one or more hash algorithms to only the requestor and never shared. D-Link DWS-1008 User Manual 467 Power over Ethernet. PRNG - Pseudorandom function. A PRF can use multiple iterations of predictable behavior that produces effectively unpredictable output. pseudorandom function ... - A compartment or chamber to which enters the data cable at the power-supply end and comes out at the device end, is kept separate from a master secret and used to decrypt text that are connected.
Product Manual
Page 491
...reliability, or voice quality. A collection of users with authorization attributes such as a separate switch, or make multiple devices members of other companies. VLAN - To specify all usernames...DWS-1008 switch ports are indexed by means of your organization. Voice over IP - vendor-specific attribute - Voice over IP. A type of VLAN 1, which is named default. Web View uses a secure connection... user glob and can be an at (@) sign and the dot (.). MAC address glob; D-Link DWS-1008 User Manual 472 user group - VLAN glob - VoIP - VSA - Virtual LAN. Web View...
...reliability, or voice quality. A collection of users with authorization attributes such as a separate switch, or make multiple devices members of other companies. VLAN - To specify all usernames...DWS-1008 switch ports are indexed by means of your organization. Voice over IP - vendor-specific attribute - Voice over IP. A type of VLAN 1, which is named default. Web View uses a secure connection... user glob and can be an at (@) sign and the dot (.). MAC address glob; D-Link DWS-1008 User Manual 472 user group - VLAN glob - VoIP - VSA - Virtual LAN. Web View...
Product Manual
Page 500
...or more of the following measures: • Reorient or relocate the receiving antenna. • Increase the separation between the equipment and receiver. • Connect the equipment into an outlet on how long an implied warranty lasts, so the foregoing limitations and exclusions ... If this Product may cause harmful interference to change without permission from that interference will not occur in a residential installation. D-Link DWS-1008 User Manual 481 However, there is no guarantee that to part 15 of 1976. This limited warranty provides specific legal rights and...
...or more of the following measures: • Reorient or relocate the receiving antenna. • Increase the separation between the equipment and receiver. • Connect the equipment into an outlet on how long an implied warranty lasts, so the foregoing limitations and exclusions ... If this Product may cause harmful interference to change without permission from that interference will not occur in a residential installation. D-Link DWS-1008 User Manual 481 However, there is no guarantee that to part 15 of 1976. This limited warranty provides specific legal rights and...