User guide

Table Of Contents
Dimension GS-3012 Gigabit Ethernet Switch
xiv Lists of Figures
Figure 11-1 Bandwidth Control ................................................................................................................................ 11-1
Figure 12-1 Broadcast Storm Control......................................................................................................................12-1
Figure 13-1 Mirroring ............................................................................................................................................... 13-1
Figure 14-1 Aggregation ID ..................................................................................................................................... 14-2
Figure 14-2 Link Aggregation: Link Aggregation Protocol Status ............................................................................14-2
Figure 14-3 Link Aggregation: Configuration...........................................................................................................14-4
Figure 15-1 RADIUS Server ....................................................................................................................................15-1
Figure 15-2 Port Authentication ...............................................................................................................................15-1
Figure 15-3 Port Authentication: RADIUS ............................................................................................................... 15-2
Figure 15-4 Port Authentication: 802.1x ..................................................................................................................15-3
Figure 16-1 Port Security......................................................................................................................................... 16-1
Figure 17-1 Access Control ..................................................................................................................................... 17-1
Figure 17-2 Console Port Priority ............................................................................................................................17-1
Figure 17-3 SNMP Management Model.................................................................................................................. 17-2
Figure 17-4 Access Control: SNMP.........................................................................................................................17-4
Figure 17-5 Access Control: Logins ........................................................................................................................17-5
Figure 17-6 SSH Communication Example.............................................................................................................17-6
Figure 17-7How SSH Works ...................................................................................................................................17-6
Figure 17-8 HTTPS Implementation........................................................................................................................17-7
Figure 17-9 Security Alert Dialog Box (Internet Explorer) ....................................................................................... 17-8
Figure 17-10 Security Certificate 1 (Netscape) .......................................................................................................17-9
Figure 17-11 Security Certificate 2 (Netscape) .......................................................................................................17-9
Figure 17-12 Main Screen (Internet Explorer).......................................................................................................17-10
Figure 17-13 Main Screen (Netscape) .................................................................................................................. 17-10
Figure 17-14 Access Control: Service Access Control.......................................................................................... 17-11
Figure 17-15 Access Control: Remote Management ............................................................................................ 17-11
Figure 18-1 Queuing Method................................................................................................................................... 18-2
Figure 19-1 Classifier .............................................................................................................................................. 19-2
Figure 19-2 Classifier: Summary Table ...................................................................................................................19-4
Figure 19-3 Classifier: Example ..............................................................................................................................19-6
Figure 20-1 Policy....................................................................................................................................................20-2
Figure 20-2 Policy: Summary Table.........................................................................................................................20-4
Figure 20-3 Policy Example..................................................................................................................................... 20-6
Figure 21-1 DHCP Relay.........................................................................................................................................21-2
Figure 22-1 Static Routing ....................................................................................................................................... 22-1
Figure 22-2 Static Routing: Summary Table............................................................................................................22-2
Figure 23-1 Maintenance......................................................................................................................................... 23-1
Figure 23-2 Firmware Upgrade ...............................................................................................................................23-1
Figure 23-3 Restore Configuration ..........................................................................................................................23-2
Figure 23-4 Backup Configuration........................................................................................................................... 23-2
Figure 23-5 Confirm Load factory Defaults .............................................................................................................23-3
Figure 23-6 Restart Switch After Load Factory Defaults ......................................................................................... 23-3
Figure 23-7 Confirm Restart The Switch ................................................................................................................. 23-3
Figure 24-1 Diagnostic ............................................................................................................................................24-1
Figure 25-1 Clustering Application Example ........................................................................................................... 25-1