User Manual
Table Of Contents
- Table of Contents
- About This Guide
- 1 Product Introduction
- 2 Hardware Installation
- 3 Getting Started
- 4 SmartConsole Utility
- 5 Configuration
- Smart Wizard Configuration
- Web-based Management
- Tool Bar > Save Menu
- Tool Bar > Tool Menu
- Tool Bar > Smart Wizard
- Tool Bar > Online Help
- Function Tree
- Device Information
- System > System Settings
- System > DHCP Auto Configuration
- System > Trap Settings (For SmartConsole)
- System > Port Settings
- System > SNMP Settings > SNMP Global State
- System > SNMP Settings > User/Group Table
- System > SNMP Settings > SNMP Group Access Table
- System > SNMP Settings > SNMP View Table
- System > SNMP Settings > Community Table
- System > SNMP Settings > Host Table
- System > SNMP Settings > SNMP Engine ID
- System > SNMP Settings > SNMP Trap Settings
- System > Password Access Control
- System > System Log Settings
- Configuration > Jumbo Frame
- Configuration > 802.1Q VLAN
- Configuration > 802.1Q Management VLAN
- Configuration > Auto Surveillance VLAN > Auto Surveillance VLAN Settings
- Configuration > Voice VLAN > Voice VLAN Settings
- Configuration > Voice VLAN > Voice VLAN OUI Settings
- Configuration > Link Aggregation > Port Trunking
- Configuration > Link Aggregation > LACP Port Settings
- Configuration > IGMP Snooping > IGMP Snooping Configuration
- Configuration > Multicast Filtering Mode
- Configuration > Port Mirroring
- Configuration > Power Saving
- Configuration > Loopback Detection
- Configuration > SNTP Settings > Time Settings
- Configuration > SNTP Settings > TimeZone Settings
- Configuration > Spanning Tree > STP Global Settings
- Configuration > Spanning Tree > STP Port Settings
- QoS > Storm Control
- QoS > Bandwidth Control
- QoS > 802.1p/DSCP Priority Settings
- Security > Trusted Host
- Security > Safeguard Engine
- Security > ARP Spoofing Prevention
- Security > Port Security
- Security > SSL Settings
- Security > 802.1X > 802.1X Settings
- Security > MAC Address Table > Static MAC
- Security > MAC Address Table > Dynamic Forwarding Table
- Security > DHCP Server Screening > DHCP Server Screening Port Setting
- Monitoring > Statistics
- Monitoring > Cable Diagnostics
- Monitoring > System Log
- ACL > ACL Configuration Wizard
- ACL > ACL Profile List
- ACL > ACL Finder
- PoE > PoE Port Settings (DGS-1210-10P only)
- PoE > PoE System Settings (DGS-1210-10P only)
- Time-Based PoE > Time Range Settings (DGS-1210-10P only)
- LLDP > LLDP Global Settings (DGS-1210-10P only)
- LLDP > LLDP Remote Port Information (DGS-1210-10P only)
- LLDP > LLDP MED Settings (DGS-1210-10P only)
- 6 Command Line Interface
- Appendix A - Ethernet Technology
- Appendix B - Technical Specifications
- Appendix C – Rack mount Instructions
- _
5 Configuration D-Link Web Smart Switch User Manual
5
5
1
1
Figure 86 Security > Trusted Host
To define a management station IP setting, click the Add Host button and type in the IP address and Subnet
mask. Click the Apply button to save your settings. You may permit only single or a range of IP addresses
by different IP mask settings, the format can either be 192.168.1.1/255.255.255.0 or 192.168.0.1/24. Please
see the example below for permitting the IP range
IP Address Subnet Mask Permitted IP
192.168.0.1 255.255.255.0 192.168.0.1~192.168.0.255
172.17.5.215 255.0.0.0 172.0.0.1~172.255.255.255
To delete the IP address, simply click the Delete button. Check the unwanted address, and then click Apply.
Security > Safeguard Engine
D-Link’s Safeguard Engine is a robust and innovative technology that automatically throttles the impact of
packet flooding into the switch's CPU. This function helps protect the Web-Smart Switch from being
interrupted by malicious viruses or worm attacks. This option is enabled by default.
Figure 87 – Security > Safeguard Engine
Security > ARP Spoofing Prevention
ARP spoofing, also known as ARP poisoning, is a method to attack an Ethernet network by allowing an
attacker to sniff data frames on a LAN, modifying the traffic, or stopping the traffic (known as a Denial of
Service – DoS attack). The main idea of ARP spoofing is to send fake or spoofed ARP messages to an
Ethernet network. It associates the attacker's or random MAC address with the IP address of another node
such as the default gateway. Any traffic meant for that IP address would be mistakenly re-directed to the
node specified by the attacker.
A common DoS attack today can be done by associating a nonexistent or specified MAC address to the IP
address of the network’s default gateway. The malicious attacker only needs to broadcast one gratuitous
ARP to the network claiming to be the gateway, so that the whole network operation is turned down as all
packets to the Internet will be directed to the wrong node.
The ARP Spoofing Prevention function can discard the ARP Spoofing Attack in the network by checking the
gratuitous ARP packets and filtering those with illegal IP or MAC addresses. Enter the Router/Gateway IP
Address, MAC Address, Ports and then click Add to create a checking/filtering rule. Click Delete to remove
an existing rule and Delete All to clear all the entries.