D-Link DWS-3250 Product Manual - Page 330

Power over Ethernet, Remote Monitoring, Security Global Parameters

Page 330 highlights

Appendix B, Device Specifications & Features Feature Power over Ethernet Private VLANs RADIUS Clients Rapid Spanning Tree Remote Monitoring Self-Learning MAC Addresses SNMP Alarms and Trap Logs SNMP Versions 1, 2 and 3 Description Power over Ethernet (PoE) provide power to devices over existing LAN cabling, without updating or modifying the network infrastructure. Power over Ethernet removes the necessity of placing network devices next to power sources. Power over Ethernet can be used in the following applications: • IP Phones • Wireless Access Points • IP Gateways • PDAs • Audio and video remote monitoring Private VLAN ports are a Layer 2 security feature which provide isolation between ports within the same Broadcast domain. RADIUS is a client/server-based protocol. A RADIUS server maintains a user database, which contains per-user authentication information, such as user name, password and accounting information. Spanning Tree can take 30-60 seconds for each host to decide whether its ports are actively forwarding traffic. Rapid Spanning Tree (RSTP) detects uses of network topologies to enable faster convergence, without creating forwarding loops. Remote Monitoring (RMON) is an extension to SNMP, which provides comprehensive network traffic monitoring capabilities (as opposed to SNMP which allows network device management and monitoring). RMON is a standard MIB that defines current and historical MAC-layer statistics and control objects, allowing realtime information to be captured across the entire network. The device enables automatic MAC address learning from incoming packets. The MAC addresses are stored in the Bridging Table The system logs events with severity codes and timestamps. Events are sent as SNMP traps to a Trap Recipient List. For more information on SNMP Alarms and Traps, see "SNMP Security Global Parameters Page." Simple Network Management Protocol (SNMP) over the UDP/IP protocol controls access to the system, a list of community entries is defined, each of which consists of a community string and its access privileges. There are 3 levels of SNMP security read-only, read-write and super. Only a super user can access the community table. Page 329

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

Appendix B, Device Specifications & Features
Page 329
Power over Ethernet
Power over Ethernet
(PoE) provide power to devices over exist-
ing LAN cabling, without updating or modifying the network infra-
structure. Power over Ethernet removes the necessity of placing
network devices next to power sources. Power over Ethernet can
be used in the following applications:
IP Phones
Wireless Access Points
IP Gateways
PDAs
Audio and video remote monitoring
Private VLANs
Private VLAN ports are a Layer 2 security feature which provide
isolation between ports within the same Broadcast domain.
RADIUS Clients
RADIUS is a client/server-based protocol. A RADIUS server
maintains a user database, which contains per-user authentica-
tion information, such as user name, password and accounting
information.
Rapid Spanning Tree
Spanning Tree can take 30-60 seconds for each host to decide
whether its ports are actively forwarding traffic. Rapid Spanning
Tree (RSTP) detects uses of network topologies to enable faster
convergence, without creating forwarding loops.
Remote Monitoring
Remote Monitoring
(RMON) is an extension to SNMP, which pro-
vides comprehensive network traffic
monitoring capabilities (as
opposed to SNMP which allows network device
management and
monitoring). RMON is a standard MIB that defines current and
historical MAC-layer statistics and control objects, allowing real-
time information to be captured across the entire network.
Self-Learning MAC Addresses
The device enables automatic MAC address learning from incom-
ing packets. The MAC addresses are stored in the Bridging Table
SNMP Alarms and Trap Logs
The system logs events with severity codes and timestamps.
Events are sent as SNMP traps to a Trap Recipient List.
For more information on SNMP Alarms and Traps, see “
SNMP
Security Global Parameters Page."
SNMP Versions 1, 2 and 3
Simple Network Management Protocol
(SNMP) over the UDP/IP
protocol controls access to the system, a list of community entries
is defined, each of which consists of a community string and its
access privileges. There are 3 levels of SNMP security read-only,
read-write and super. Only a super user can access the commu-
nity table.
Feature
Description