User guide
Table Of Contents
- Part1
- Part2
- Part2
- Part3
- Part4
- Part5
- Dynamic Link Aggregation
- Link Aggregation ID
- RADIUS
- Configuring RADIUS Server Settings
- Configuring IEEE802.1x
- Supported MIBs
- SNMP Traps
- Configuring SNMP
- Setting Up Login Accounts
- Requirements for Using SSH
- HTTPS Example
- Internet Explorer Warning Messages
- Netscape Navigator Warning Messages
- Login Screen
- Strict Priority Queuing (SPQ)
- Weighted Round Robin Scheduling (WRR)
- DiffServ
- DSCP and Per-Hop Behavior
- DHCP “Relay Agent Information Option”
- DHCP Relay Agent Circuit ID Sub-option Format
- Part6
- Part7
- Switch Configuration File
- Access Priority
- The Console Port
- Telnet
- List of Available Commands
- Detailed Command Information
- Logging Out
- User Mode
- Enable Mode
- Configure Mode
- config-vlan Commands
- interface Commands
- show system-information
- show hardware-monitor
- show ip
- show logging
- show interface
- show mac address-table
- Backing up Configuration
- Restoring Configuration
- Using a Different Configuration File
- Resetting to the Factory Default
- no mirror-port
- no https timeout
- no trunk
- no port-access-authenticator
- no ssh
- interface
- bpdu-control
- broadcast-limit
- bandwidth-limit
- mirror
- gvrp
- ingress-check
- frame-type
- vlan-trunking
- spq
- wrr
- egress set
- qos priority
- name
- speed-duplex
- Static Entries (SVLAN Table)
- Dynamic Entries (DVLAN Table)
- GARP Status
- GARP Timer
- GVRP Timer
- Enable GVRP
- Disable GVRP
- Set Port VID
- Set Acceptable Frame Type
- Enable or Disable Port GVRP
- Modify Static VLAN
- Delete VLAN ID

Dimension GS-3012 Gigabit Ethernet Switch
xiv Lists of Figures
Figure 11-1 Bandwidth Control ................................................................................................................................ 11-1
Figure 12-1 Broadcast Storm Control......................................................................................................................12-1
Figure 13-1 Mirroring ............................................................................................................................................... 13-1
Figure 14-1 Aggregation ID ..................................................................................................................................... 14-2
Figure 14-2 Link Aggregation: Link Aggregation Protocol Status ............................................................................14-2
Figure 14-3 Link Aggregation: Configuration...........................................................................................................14-4
Figure 15-1 RADIUS Server ....................................................................................................................................15-1
Figure 15-2 Port Authentication ...............................................................................................................................15-1
Figure 15-3 Port Authentication: RADIUS ............................................................................................................... 15-2
Figure 15-4 Port Authentication: 802.1x ..................................................................................................................15-3
Figure 16-1 Port Security......................................................................................................................................... 16-1
Figure 17-1 Access Control ..................................................................................................................................... 17-1
Figure 17-2 Console Port Priority ............................................................................................................................17-1
Figure 17-3 SNMP Management Model.................................................................................................................. 17-2
Figure 17-4 Access Control: SNMP.........................................................................................................................17-4
Figure 17-5 Access Control: Logins ........................................................................................................................17-5
Figure 17-6 SSH Communication Example.............................................................................................................17-6
Figure 17-7How SSH Works ...................................................................................................................................17-6
Figure 17-8 HTTPS Implementation........................................................................................................................17-7
Figure 17-9 Security Alert Dialog Box (Internet Explorer) ....................................................................................... 17-8
Figure 17-10 Security Certificate 1 (Netscape) .......................................................................................................17-9
Figure 17-11 Security Certificate 2 (Netscape) .......................................................................................................17-9
Figure 17-12 Main Screen (Internet Explorer).......................................................................................................17-10
Figure 17-13 Main Screen (Netscape) .................................................................................................................. 17-10
Figure 17-14 Access Control: Service Access Control.......................................................................................... 17-11
Figure 17-15 Access Control: Remote Management ............................................................................................ 17-11
Figure 18-1 Queuing Method................................................................................................................................... 18-2
Figure 19-1 Classifier .............................................................................................................................................. 19-2
Figure 19-2 Classifier: Summary Table ...................................................................................................................19-4
Figure 19-3 Classifier: Example ..............................................................................................................................19-6
Figure 20-1 Policy....................................................................................................................................................20-2
Figure 20-2 Policy: Summary Table.........................................................................................................................20-4
Figure 20-3 Policy Example..................................................................................................................................... 20-6
Figure 21-1 DHCP Relay.........................................................................................................................................21-2
Figure 22-1 Static Routing ....................................................................................................................................... 22-1
Figure 22-2 Static Routing: Summary Table............................................................................................................22-2
Figure 23-1 Maintenance......................................................................................................................................... 23-1
Figure 23-2 Firmware Upgrade ...............................................................................................................................23-1
Figure 23-3 Restore Configuration ..........................................................................................................................23-2
Figure 23-4 Backup Configuration........................................................................................................................... 23-2
Figure 23-5 Confirm Load factory Defaults .............................................................................................................23-3
Figure 23-6 Restart Switch After Load Factory Defaults ......................................................................................... 23-3
Figure 23-7 Confirm Restart The Switch ................................................................................................................. 23-3
Figure 24-1 Diagnostic ............................................................................................................................................24-1
Figure 25-1 Clustering Application Example ........................................................................................................... 25-1