D-Link DWS-3024L User Manual - Page 61

Discovering Access Points and Peer Switches, Understanding the Discovery Methods

Page 61 highlights

4 Installing the D-Link Unified Access System Table 5. AP VLAN Commands Action View management interface information, including the VLAN ID Set the management VLAN ID View untagged VLAN information Enable the untagged VLAN Disable the untagged VLAN Set the untagged VLAN ID Command get management set management vlan-id get untagged-vlan set untagged-vlan status up set untagged-vlan status down set untagged-vlan vlan-id Discovering Access Points and Peer Switches The D-Link Unified Switch can discover, validate, authenticate, or monitor the following system devices: • Peer Unified Switches • D-Link Access Points • Wireless clients • Rogue APs • Rogue wireless clients. This section describes the procedures you use to discover D-Link Access Points and other D-Link Unified Switches. For information about the discovery of wireless clients, see "Monitoring Associated Client Information" on page 145. For more information about discovering rogue devices, see "Monitoring Rogue and RF Scan Access Points" on page 143. In order for the Unified Switch to discover other WLAN devices and establish communication with them, the devices must have their own IP address, must be able to find other WLAN devices, and must be compatible. When the D-Link Unified Switch discovers and validates D-Link Access Points, the switch takes over the management of the AP. The default AP Profile settings are listed in Appendix A. For information about how to change the AP Profile settings, see Chapter 5, "Configuring Access Point Settings" on page 83. Understanding the Discovery Methods The Unified Switch and AP have multiple ways of discovering each other. The following examples describe different ways the discovery can occur. Example 1: L2 Discovery In Figure 32, the AP and Unified Switch are directly connected. The devices are in the same layer 2 broadcast domain and use the default VLAN settings. After both devices acquire an IP Discovering Access Points and Peer Switches 61

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268

Discovering Access Points and Peer Switches
61
4
Installing the D-Link Unified Access System
Table 5.
AP VLAN Commands
Discovering Access Points and Peer Switches
The D-Link Unified Switch can discover, validate, authenticate, or monitor the following
system devices:
Peer Unified Switches
D-Link Access Points
Wireless clients
Rogue APs
Rogue wireless clients.
This section describes the procedures you use to discover D-Link Access Points and other
D-Link Unified Switches. For information about the discovery of wireless clients, see
“Monitoring Associated Client Information”
on page 145. For more information about
discovering rogue devices, see
“Monitoring Rogue and RF Scan Access Points”
on page 143.
In order for the Unified Switch to discover other WLAN devices and establish communication
with them, the devices must have their own IP address, must be able to find other WLAN
devices, and must be compatible.
When the D-Link Unified Switch discovers and validates D-Link Access Points, the switch
takes over the management of the AP. The default AP Profile settings are listed in
Appendix A
.
For information about how to change the AP Profile settings, see Chapter 5,
“Configuring
Access Point Settings”
on page 83.
Understanding the Discovery Methods
The Unified Switch and AP have multiple ways of discovering each other. The following
examples describe different ways the discovery can occur.
Example 1: L2 Discovery
In
Figure 32
, the AP and Unified Switch are directly connected. The devices are in the same
layer 2 broadcast domain and use the default VLAN settings. After both devices acquire an IP
Action
Command
View management interface
information, including the VLAN ID
get management
Set the management VLAN ID
set management vlan-id
<1-4094>
View untagged VLAN information
get untagged-vlan
Enable the untagged VLAN
set untagged-vlan status up
Disable the untagged VLAN
set untagged-vlan status down
Set the untagged VLAN ID
set untagged-vlan vlan-id
<1-4094>