DWS-1008 User’s Manual Table of Contents Table of Contents Product Contents System Requirements Introduction Hardware Overview Features Installation Overview Getting Started Installation Configuration CLI Quickstart Command Accessing the CLI Configuration Overview Configuring for Authenticating Users Configuring APs for Wireless Users Configuring a Service Profile...
Page 3
DWS-1008 User’s Manual Logging In to a Remote Device Tracing a Route IP Interfaces and Services Configuration Scenario Configuring SNMP Enabling SNMP Versions Setting SNMP Security Configuring a Notification Profile Configuring a Notification Target Enabling the SNMP Service Displaying SNMP Information Configuring DWL-8220AP Access Points...
Page 4
DWS-1008 User’s Manual Configuring and Managing IGMP Snooping Disabling or Reenabling IGMP Snooping Disabling or Reenabling Proxy Reporting Enabling the Pseudo-Querier Changing IGMP Timers Enabling Router Solicitation Configuring Static Multicast Ports Displaying Multicast Information Configuring and Managing Security ACLs About Security Access Control Lists...
Page 5
DWS-1008 User’s Manual Managing 802.1X Managing 802.1X on Wired Authentication Ports Managing 802.1X Encryption Keys Managing 802.1X Client Reauthentication Managing Other Timers Displaying 802.1X Information Managing Sessions About the Session Manager Displaying and Clearing Administrative Sessions Displaying and Clearing Network Sessions...
Such modifications could void the user’s authority to operate the equipment. The DWS-1008 switch has been designed and tested to be installed in an operating ambient temperature of 0° C to +40° C (32° F to 104° F). To reduce the risk of equipment damage, install equipment with consideration to these ambient conditions.
DWL-8220APs and up to six more DWL-8220APs connected indirectly. Maximum Performance With Load Balancing Capabilities The DWS-1008 performs Layer 2 forwarding and also comes with extensive Layer 3-4 and identity-tracking capabilities. It integrates seamlessly with wired infrastructures and offers redundant load-sharing links, 802.1q trunking, spanning tree and per-VLAN spanning tree (PVST+).
The 10/100 Ethernet ports on the DWS-1008 switch provide automatic MDI/MDX, which automatically crosses over the send and receive signals if required. Ports 1-6 support PoE. Uplink Ports (7 & 8): Ports 7 and 8 on the DWS-1008 switch are uplink ports only and do not support PoE. LEDS: Link (1-8): Solid green 100Mbps link is operational.
You also can configure a default domain name to append to hostnames. • Network Time Protocol (NTP) - The DWS-1008 switch can sets its time and date by polling an NTP server. • System log - The DWS-1008 generates log messages to log system events. The log messages are stored locally and also can be exported to syslog servers.
Installation Overview Installation Overview Caution: The DWS-1008 switch has been designed and tested to be installed in an operating ambient temperature of 0° C to +40° C (32° F to 104° F). To reduce the risk of equipment damage, install equipment with consideration to these ambient conditions.
Page 11
The mounting brackets support front mounting only. Warning: Earth grounding is required for a DWS-1008 switch installed in a rack. If you are relying on the rack to provide ground, the rack itself must be grounded with a ground strap to the earth ground.
Use show commands to display the current configuration and monitor the status of network operations. * The Mobility System Software is built-in to the firmware on the DWS-1008 switch. No additional software is required. The switch supports two connection modes: •...
3. Attach the four rubber adhesive feet over the X’s. 4. Turn the switch right-side up, and place the switch in position on the table. Powering On a DWS-1008 Switch Warning: The switch relies on the building’s installation for overcurrent protection. Ensure that a fuse or circuit breaker no larger than 120 VAC, 15 A U.S.
Page 14
This indicates normal power supply operation. Connecting to a Serial Management Console Initial configuration of the DWS-1008 switch requires a connection to the switch’s CLI through the serial console port. To connect a PC to the serial console port: 1.
Page 15
Installation Installation (continued) Connecting to the Network Use the following procedures to connect a DWS-1008 switch to DWL-8220AP access points or other 10/100 Ethernet devices. Connecting to a DWL-8220AP or Other 10/100 Ethernet Devices Note: The 10/100 Ethernet ports are configured as wired network ports by default. You must change the port type for locally connected DWL-8220AP access points, and for wired end stations that use AAA through the DWS-1008 switch to access the network.
DWS-1008 User’s Manual Configuration Configuration You can use CLI (Command Line Interface) to configure a new switch or to continue configuration of a partially configured switch: CLI (Command Line Interface) You can configure a switch using the CLI by attaching a PC to the switch’s Console port.
DWS-1008 User’s Manual Configuration Configuration (continued) CLI Quickstart Command The quickstart command runs a script that interactively helps you configure the following items: • System name • Country code (regulatory domain) • System IP address • Default route • Administrative users and passwords •...
Page 18
Configuration (continued) To run the quickstart command: 1. Attach a PC to the DWS-1008 switch’s serial console port. Use the following modem settings: 9600 bps, 8 bits, 1 stop, no parity, hardware flow control disabled. 2. Press Enter three times, to display a username prompt (Username:), a password prompt (Password:), and then a command prompt such as the following: DWS-1008-aabbcc>...
Page 19
DWS-1008 User’s Manual Configuration Configuration (continued) • Administrative user admin1, with password letmein. The only management access the switch allows by default is CLI access through the serial connection. • System Time and date parameters: • Date: 15th of August, 2005 •...
Page 20
DWS-1008-aabbcc# quickstart This will erase any existing config. Continue? [n]: y Answer the following questions. Enter ‘?’ for help. ^C to break out System Name [DWS-1008]: DWS-1008-Corp Country Code [US]: US System IP address []: 10.10.10.4 System IP address netmask []: 255.255.255.0 Default route []: 10.10.10.1...
Page 21
DWS-1008 User’s Manual Configuration Configuration (continued) 6. Optionally, enable Telnet. DWS-1008-aabbcc# set ip telnet server enable 7. Verify the configuration changes. DWS-1008-aabbcc# show config 8. Save the configuration changes. DWS-1008-aabbcc# save config D-Link Systems, Inc.
Note: For simplicity, the command prompt examples in the documentation show a switch model (such as DWS-1008) and the CLI access level (> for restricted access or # for enabled access) only. The default command prompt on your switch shows your switch’s model number and also contains the last three octets of the switch’s MAC address.
Configuration Configuration (continued) Configuration Overview To configure a DWS-1008 switch for basic service, perform the following tasks, in this order: 1. Configure an enable password. (See “Configuring an Enable Password” on page 19.) 2. Configure time and date parameters. (See “Configuring the Time and Date” on page 20.) 3.
Page 24
Configuration Configuration (continued) Configuring an Enable Password D-Link recommends that you configure an enable password to provide at least minimal security to the DWS-1008 switch before you proceed to more advanced configuration options. To configure an enable password, use the following command: set enablepass To configure an enable password:...
Page 25
3 Specify the IP address of a Network Time Protocol (NTP) server or statically set the time and date. Note: D-Link recommends that you set the time and date parameters before you install certificates on the DWS-1008 switch. Generally, certificates are valid for one year beginning with the system time and date that are in effect when you generate the certificate request.
Page 26
DWS-1008 User’s Manual Configuration Configuration (continued) Additional commands configure an NTP server and enable the switch’s NTP client. DWS-1008# set timezone PST -8 success: change accepted. DWS-1008# set summertime PDT success: change accepted. DWS-1008# set ntp server 192.168.1.10 DWS-1008# set ntp enable...
Page 27
Any or all VLANs on the switch can have an IP address. Web View requires IP connectivity to a DWS-1008 switch to manage the switch. User traffic also requires VLANs, although you do not need to configure every user’s VLAN on every DWS-1008 switch.
Page 28
Configuring a Default Route If Web View and a DWS-1008 switch are in different subnets, you need to configure a default route on the switch. To configure a default route, use the following command: set ip route default gateway metric...
Page 29
DWS-1008 User’s Manual Configuration Configuration (continued) Verifying IP Connectivity To verify that the switch can send and receive IP traffic, use the following command: ping host The ping command sends an Internet Control Message Protocol (ICMP) echo packet to the specified device and listens for a reply packet.
Page 30
DWS-1008 User’s Manual Configuration Configuration (continued) Specifying the Country of Operation You must specify the country in which you plan to operate the switch and its access points. MSS does not allow you to configure or enable the access point radios until you specify the country of operation.
Page 31
============================================================= Specifying a System IP Address You can designate one of the IP addresses configured on a DWS-1008 switch’s VLAN to be the system IP address of the switch. The system IP address provides a common IP interface and source IP address for some management and MobileLAN operations. The system IP address is required by some features, including roaming.
Page 32
To verify the configuration change, use the following command: show system The following commands configure the system IP address to be 10.10.10.4, the IP address on VLAN mgmt, and verify the change: DWS-1008# set system ip-address 10.10.10.4 success: change accepted. DWS-1008# show system =============================================================...
AP. If Spanning Tree Protocol (STP) is enabled on the port that is directly connected to a Distributed AP, D-Link recommends that you enable port fast convergence (called PortFast on some vendors’ devices) on the port or disable STP on the port.
4. Apply the radio profile to radios and enable the radios. AP Connection Requirements You can connect a DWL-8220AP access point to a DWS-1008 switch directly to a 10/100 port supplying PoE or through an intermediate network. There are two types of AP to switch connection: direct and distributed.
Page 35
This example has the following configuration requirements for the APs: • AP1 is directly connected to the switch. The DWS-1008 needs port 2 configured as a directly connected AP. • AP2 is connected through a Layer 2 network to the switch. The switch needs a Distributed AP configuration in order to boot and configure AP2.
Page 36
• Power - PoE must be provided on one of the Ethernet connections to the AP. Be sure to utilize a PoE injection device that has been tested by D-Link. Providing PoE on both of the Ethernet connections (if the AP has two) allows for redundant PoE.
Page 37
IP address returned for TRPZ, the AP never contacts the IP address returned for wlan-switch. The AP does not boot. After the AP contacts the switch, the switch relays information about DWS-1008 switches in the network that contain a Distributed AP configuration specific to that Distributed AP.
Page 38
DWS-1008 User’s Manual Configuration Configuration (continued) Configuring for a Directly-Connected AP Caution: When you set the port type for use by locally connected APs, you must specify the PoE state (enabled or disabled) of the port. If you enable PoE on a port connected to another device, physical damage to the device can result.
Page 39
Configuration (continued) The following example sets ports 1, 2, and 4 for the DWL-8220AP access point: DWS-1008# set port type ap 1,2,4 model dwl-8220ap poe enable This may affect the power applied on the configured ports. Would you like to continue? (y/n) [n]y success: change accepted.
Page 40
Configuration (continued) Note: You can configure an AP configuration template for automatically configuring Distributed APs when they boot using the DWS-1008 switch. The following example configures connections for two Distributed APs that are indirectly connected to the switch. Note that when you create a connection, you assign it a number that can be used later for displaying and configuration, much like the physical ports for...
Page 41
APs configured in the MobileLAN, use the following command: show dap global [dap-num | serial-id serial-ID] The following command lists configuration information for the Distributed APs below: DWS-1008# show dap global Total number of entries: 12 DAP Serial Id Switch IP Address...
DWS-1008 User’s Manual Configuration Configuration (continued) Configuring a Service Profile A service profile controls advertisement and encryption for an SSID. You can specify the following: • Whether SSIDs that use the service profile are beaconed • Whether the SSIDs are encrypted or clear (unencrypted) •...
Page 43
DWS-1008 User’s Manual Configuration Configuration (continued) Parameter Default Value Radio Behavior When Parameter Set To Default Values psk-phrase No passphrase Uses dynamically generated keys rather than defined statically configured keys to authenticate WPA clients. psk-raw No preshared Uses dynamically generated keys rather than key defined...
Page 44
SSID. To configure and display a radio profile, use the following commands: set radio-profile name show radio-profile name Note: D-Link recommends that you do not use the name default. MSS already contains a radio profile named default. D-Link Systems, Inc.
Page 45
DWS-1008 User’s Manual Configuration Configuration (continued) The following command configures radio profile rp1: DWS-1008# set radio-profile rp1 success: change accepted. The table below lists the radio profile parameters and their default values. Parameter Default Value Radio Behavior When Parameter Set To Default Values...
Page 46
DWS-1008 User’s Manual Configuration Configuration (continued) Parameter Default Value Radio Behavior When Parameter Set To Default Values service-profile Not Defined Default settings for all service profile parameters, including encryption parameters, are used. short-retry Sends a short unicast frame up to five times without acknowledgment.
Page 47
The following commands applies radio profile rp1 to radio 1 on AP access ports 1, 2, and 4 and on Distributed AP 1 and Distributed AP 2 and enables the radios: DWS-1008# set ap 1,2,4 radio 1 radio-profile rp1 mode enable success: change accepted.
Page 48
To verify radio configuration changes, use the following commands: show ap config [port-list [radio {1 | 2}]] show dap config [dap-num [radio {1 | 2}]] * Please contact D-Link Sales for information regarding Trapeze antennas. Here is an example: DWS-1008# show ap config 1...
Page 49
DWS-1008 User’s Manual Configuration Configuration (continued) Configuring User Authentication MSS provides the following types of authentication: • IEEE 802.1X - If the network user’s network interface card (NIC) supports 802.1X, MSS checks for an 802.1X authentication rule that matches the username (and SSID, if wireless access is requested), and that uses the Extensible Authentication Protocol (EAP) requested by the NIC.
Page 50
VLAN: • Tunnel-Private-Group-ID - This attribute is described in RFC 2868, RADIUS attributes for Tunnel Protocol Support. • VLAN-Name - This attribute is a D-Link vendor-specific attribute (VSA). Note: You cannot configure the Tunnel-Private-Group-ID attribute in the local user database.
Page 51
The following commands configure two RADIUS servers, add them to server group grp1, enable load balancing of authentication sessions among the servers, and verify the change: DWS-1008# set radius server svr1 address 10.10.70.20 key rad1pword success: change accepted. DWS-1008# set radius server svr2 address 10.10.70.40 key rad2pword success: change accepted.
Page 52
EAP type to communicate with EAP- ® capable RADIUS server group grp1, when attempting to access SSID private_wlan. The server group authenticates the users. DWS-1008# set authentication dot1x ssid private_wlan EXAMPLE\* pass-through grp1 success: change accepted. D-Link Systems, Inc.
Page 53
DWS-1008# set authentication dot1x ssid private_wlan *@eng.example.com pass-through grp1 success: change accepted. DWS-1008# set authentication dot1x ssid private_wlan *@*.*.com pass-through grp1 success: change accepted. DWS-1008# set authentication dot1x ssid private_wlan *@*.com pass-through grp1 success: change accepted. Displaying the Server Group and Authentication Configuration The show aaa command displays the server group and authentication configuration on a...
Page 54
Configuration (continued) Configuring EAP Offload with Server Authentication You can configure a DWS-1008 switch to perform all EAP processing locally and use RADIUS servers for authentication and authorization. To configure the DWS-1008 switch to perform EAP processing locally and use RADIUS servers for MS-CHAP-V2: 1.
Page 55
DWS-1008 User’s Manual Configuration Configuration (continued) DWS-1008# show aaa Default Values authport=1812 acctport=1813 timeout=5 acct-timeout=5 retrans=3 deadtime=0 key=(null) author-pass=(null) Radius Servers Server Addr Ports Tries Dead State -------------------------------------------------------------------------------------- svr1 10.10.70.20 1812 1813 svr2 10.10.70.40 1812 1813 Server groups grp1 (load-balanced): svr1 svr2 set authentication dot1x ssid private_wlan EXAMPLE\* peap-mschapv2 grp1 Displaying and Saving the Configuration...
Page 56
DWS-1008 User’s Manual Configuration Configuration (continued) The following command displays the beginning of the configuration file on a DWS-1008 switch configured with the commands in this chapter: DWS-1008# show config # Configuration nvgen’d at 2005-4-29 14:12:37 # Image 4.0.1 # Model DWS-1008 # Last change occurred at 2005-4-29 14:03:52 set ip route default 10.10.20.19 1...
The switch attempts administrative authentication in the local database first. If it finds no match, the DWS-1008 attempts administrative authentication on the RADIUS server. Note. A CLI Telnet connection to the DWS-1008 is not secure, unlike SSH, Web View connections.
• Administrative access mode - Allows a network administrator to access the switch and configure it. You must establish administrative access in enabled mode before adding users. • Network access mode - Allows network users to connect through the DWS-1008 switch. D-Link Systems, Inc.
Until you set the enable password and configure authentication, the default username and password are blank. Press Enter when prompted for them. To enable an administrator: 1. Log in to the DWS-1008 switch from the serial console, and press Enter when the switch displays a username prompt: Username: 2.
Page 60
Configuring AAA for Administrative and Local Access Setting the DWS-1008 Switch Enable Password There is one enable password for the entire DWS-1008 switch. You can optionally change the enable password from the default. Setting the DWS-1008 Enable Password for the First Time To set the enable password for the first time:...
DWS-1008# set authentication console * local Caution: If you type this command before you have created a local username and password, you can lock yourself out of the DWS-1008 switch. Before entering this command, you must configure a local username and password.
Page 62
The local database on the DWS-1008 switch is the simplest way to store user information in a D-Link system. To configure a user in the local database, type the following command: set user username password password Note.
Page 63
In the set accounting command, you must include AAA methods that specify whether to use the local database or RADIUS server to receive the accounting records. Specify local, which causes the processing to be done on the DWS-1008 switch, or specify a RADIUS server group.
Page 64
DWS-1008 switch or saved the configuration. If the DWS-1008 switch is rebooted before you have saved the configuration, all changes are lost. You can also type the load config command, which reloads the DWS-1008 switch to the last saved configuration or loads a particular configuration filename.
Page 65
For all scenarios, the administrator is Natasha with the password m@Jor. Local Authentication The first time you access a DWS-1008 switch, it requires no authentication. In this scenario, after the initial configuration of the DWS-1008 switch, Natasha is connected through the console and has enabled access.
Page 66
Natasha types the following commands in this order: DWS-1008# set user natasha password m@Jor User natasha created DWS-1008# set radius server r1 address 192.168.253.1 key sunFLOW#$ success: change accepted. DWS-1008# set server group sg1 members r1 success: change accepted.
Page 67
To configure unconditional authentication, Natasha sets the authentication method to none. She types the following commands in this order: DWS-1008# set user natasha password m@Jor User natasha created DWS-1008# set radius server r1 address 192.168.253.1 key sunFLOW#$ success: change accepted. DWS-1008# set server group sg1 members r1 success: change accepted.
All DWS-1008 switch ports are network ports by default. You must set the port type for ports directly connected to AP access ports and to wired user stations that must be authenticated to access the network.
Page 69
This may affect the power applied on the configured ports. Would you like to continue? (y/n) [n]y success: change accepted. DWS-1008# set port type ap 2 model DWL-8220AP poe enable radiotype 11b This may affect the power applied on the configured ports. Would you like to continue? (y/n) [n]y success: change accepted.
Page 70
MAC authentication is successful. To set port 2 as a wired authentication port, type the following command: DWS-1008# set port type wired-auth 2 success: change accepted This command configures port 2 as a wired authentication port supporting one interface and one simultaneous user session.
Page 71
DWS-1008# set port 3 name adminpool success: change accepted. Caution: When you clear a Distributed AP, MSS ends user sessions that are using the AP. Note. To avoid confusion, D-Link recommends that you do not use numbers as port names. Removing a Port Name...
Page 72
The PoE state depends on whether you enable or disable PoE when you set the port type. Caution: Use the DWS-1008 switch’s PoE only to power D-Link DWL-8220AP access points. If you enable PoE on ports connected to other devices, damage can result.
Page 73
PoE (if applicable) for at least one second, then reenables them. This feature is useful for forcing a DWL-8220 access point that is connected to two DWS-1008 switches to reboot using the port connected to the other switch. To reset a port, use the following command:...
| collisions | receive-etherstats | transmit-etherstats] [port port-list] You can specify one statistic type with the command. For example, to display octet statistics for port 3, type the following command: DWS-1008# show port counters octets port 3 Port Status Rx Octets...
Page 75
To monitor port statistics beginning with octet statistics (the default), type the following command: DWS-1008# monitor port counters As soon as you press Enter, MSS clears the window and displays statistics at the top of the window. In this example, the octet statistics are displayed first.
Page 76
Load Sharing A DWS-1008 switch balances the port group traffic among the group’s physical ports by assigning traffic flows to ports based on the traffic’s source and destination MAC addresses. The switch assigns a traffic flow to an individual port and uses the same port for all subsequent traffic for that flow.
Page 77
To configure a port group named server2 containing ports 3 and 5 and add the ports to the default VLAN, type the following commands: DWS-1008# set port-group name server2 3,5 mode on success: change accepted. DWS-1008# set vlan default port server2 success: change accepted.
Configuring and Managing Ports and VLANs Load-sharing port groups are interoperable with Cisco Systems EtherChannel capabilities. To configure a Cisco Catalyst switch to interoperate with a D-Link DWS-1008 switch, use the following command on the Catalyst switch: set port channel port-list mode on Configuring and Managing VLANs...
Page 79
Every VLAN on a DWS-1008 switch has both a VLAN name, used for authorization purposes, and a VLAN number. VLAN numbers can vary uniquely for each switch and are not related to 802.1Q tag values.
Page 80
Configuring and Managing Ports and VLANs A DWS-1008 switch switches traffic at Layer 2 among ports in the same VLAN. For example, suppose you configure ports 4 and 5 to belong to VLAN 2 and ports 6 and 7 to belong to VLAN 3.
Page 81
Specify a VLAN number from 2 to 4095, and specify a name up to 16 alphabetic characters long. You cannot use a number as the first character in a VLAN name. D-Link recommends that you do not use the same name with different capitalizations for VLANs or ACLs. For example, do not configure two separate VLANs with the names red and RED.
Page 82
To clear port 2, which uses tag value 11, from VLAN marigold, type the following command: DWS-1008# clear vlan marigold port 2 tag 11 This may disrupt user connectivity. Do you wish to continue? (y/n) [n]y success: change accepted.
VLAN. Managing the Layer 2 Forwarding Database A DWS-1008 switch uses a Layer 2 forwarding database (FDB) to forward traffic within a VLAN. The entries in the forwarding database map MAC addresses to the physical or virtual ports connected to those MAC addresses within a particular VLAN. To forward a packet to another device in a VLAN, the switch searches the forwarding database for the packet’s...
Page 84
(You cannot add a multicast or broadcast address as a permanent or static forwarding database entry.) • Added by the DWS-1008 switch itself - For example, the authentication protocols can add entries for wired and wireless authentication users. The switch also adds any static entries added by the system administrator and saved in the configuration...
Page 85
To add a permanent entry for MAC address 00:bb:cc:dd:ee:ff on ports 3 and 5 in VLAN blue, type the following command: DWS-1008# set fdb perm 00:bb:cc:dd:ee:ff port 3,5 vlan blue success: change accepted. To add a static entry for MAC address 00:2b:3c:4d:5e:6f on port 1 in the default VLAN, type...
For example, to set the aging timeout period for VLAN 2 to 600 seconds, type the following command: DWS-1008# set fdb agingtime 2 age 600 success: change accepted. Port and VLAN Configuration Scenario This scenario assigns names to ports, and configures AP access ports, wired authentication ports, a load-sharing port group, and VLANs.
Page 87
DWS-1008 User’s Manual Configuring and Managing Ports and VLANs success: change accepted. DWS-1008# set port 2 name finance success: change accepted. DWS-1008# set port 3 name accounting success: change accepted. DWS-1008# set port 4 name shipping success: change accepted. DWS-1008# set port 5 name lobby success: change accepted.
Page 88
3. Configure ports 2 through 6 for connection to access point model DWL-8220AP and verify the configuration changes. Type the following commands: DWS-1008# set port type ap 2-6 model dwl-8220ap poe enable This may affect the power applied on the configured ports. Would you like to continue? (y/n) [n]y success: change accepted.
Page 89
5. Configure ports 7 and 8 as a load-sharing port group to provide a redundant link to the backbone, and verify the configuration change. Type the following commands: DWS-1008# set port-group name backbonelink port 7,8 mode on success: change accepted.
Page 90
DWS-1008 User’s Manual Configuring and Managing Ports and VLANs success: configuration saved. D-Link Systems, Inc.
IP tunnel, and only to reassemble fragments created by another D-Link device for tunneling. If the path MTU between D-Link devices is less than 1448 bytes, a device in the path might further fragment or drop a tunneled packet. If the packet is further fragmented, the receiving switch will not be able to reassemble the fragments, and the packet is dropped.
Page 92
Domain Name, and (6) Domain Name Server • (60) Vendor Class Identifier, set to TRPZ x.x.x, where x.x.x is the MSS version The DHCP client is disabled by default on the DWS-1008, You can enable the DHCP client on one VLAN only.
Page 93
The vlan-id can be the VLAN name or number. The following command enables the DHCP client on VLAN corpvlan: DWS-1008# set interface corpvlan ip dhcp-client enable success: change accepted. You can configure the DHCP client on more than one VLAN, but the client can be active on only one VLAN.
Page 94
DWS-1008 User’s Manual Configuring and Managing IP Interfaces and Services The IP interface table flags the address assigned by a DHCP server with an asterisk ( * ). In the following example, VLAN corpvlan received IP address 10.3.1.110 from a DHCP server.
DWS-1008 User’s Manual Configuring and Managing IP Interfaces and Services Configuring the System IP Address You can designate one of the IP addresses configured on an Switch to be the system IP address of the switch. The system IP address determines the interface or source IP address MSS uses for system tasks, including the following: •...
Page 96
192.168.1.10, the Switch uses the default route to forward a packet addressed to that host. D-Link recommends that you configure at least one default route. You can configure a maximum of four routes per destination. This includes default routes, which have destination 0.0.0.0/0.
Page 97
MSS places the new route at the top of the group of routes with the same cost. To add a default route that uses gateway 10.5.4.1 and has a cost of 1, type the following command: DWS-1008# set ip route default 10.5.4.1 1 success: change accepted. D-Link Systems, Inc.
To add an explicit route from an Switch to any host on the 192.168.4.x subnet through the local router 10.5.4.2, and give the route a cost of 1, type the following command: DWS-1008# set ip route 192.168.4.0 255.255.255.0 10.5.4.2 1 success: change accepted.
• Absolute timeout - controls how long an SSH session can remain open, regardless of how active the session is. The absolute timeout is disabled by default. D-Link recommends using the idle timeout to close unused sessions. However, if the idle timeout is disabled, MSS changes the default absolute timeout from 0 (disabled) to 60 minutes to prevent an abandoned session from remaining open indefinitely.
Page 100
To generate a 1024-byte SSH authentication key, type the following command: DWS-1008# crypto generate key ssh 1024 key pair generated You can verify the key using the following command:...
Page 101
To change the absolute timeout value to 30 minutes, type the following command: DWS-1008# set ip ssh absolute-timeout 30 success: absolute timeout set to 30 minutes Managing SSH Server Sessions...
To display the status of the Telnet server, use the following command: show ip telnet To display the Telnet server status and the TCP port number on which an Switch listens for Telnet traffic, type the following command: DWS-1008> show ip telnet Server Status Port -------------------------------------- Enabled D-Link Systems, Inc.
Page 103
To display the Telnet server sessions on an Switch, type the following command: Note. If you type the clear sessions admin telnet command from within a Telnet session, the session ends as soon as you press Enter. DWS-1008# show sessions admin Username Time (s)
DWS-1008 User’s Manual Configuring and Managing IP Interfaces and Services Configuring and Managing DNS You can configure an Switch to use a Domain Name Service (DNS) server to resolve hostnames into their IP addresses. This capability is useful in cases where you specify a hostname instead of an IP address in a command.
Page 105
DWS-1008 User’s Manual Configuring and Managing IP Interfaces and Services Enabling or Disabling the DNS Client The DNS client is disabled by default. To enable or disable the DNS client, use the following command: set ip dns {enable | disable} Configuring DNS Servers...
To display DNS server information, use the following command: show ip dns The following example shows DNS server information on a switch configured to use three DNS servers. DWS-1008# show ip dns Domain Name: example.com DNS Status: enabled IP Address...
(UTC) by setting the time zone. You also can configure MSS to offset the time by an additional hour for daylight savings time or similar summertime period. Note. D-Link recommends that you set the time and date parameters before you install certificates on the switch. Generally, certificates are valid for one year beginning with the system time and date that are in effect when you generate the certificate request.
Page 108
(-) in front of the hour value to subtract the hours from UTC. To set the time zone to PST (Pacific Standard Time), type the following command: DWS-1008# set timezone PST -8 Timezone is set to ‘PST’, offset from UTC is -8:0 hours.
Page 109
2:00 a.m. on the last Sunday in October, according to the North American standard. To set the summertime period to PDT (Pacific Daylight Time) and use the default start and end dates and times, type the following command: DWS-1008# set summertime PDT success: change accepted. Displaying the Summertime Period...
The day of week is automatically calculated from the day you set. To set the date to February 29, 2004 and time to 23:58: DWS-1008# set timedate date feb 29 2004 time 23:58:00 Time now is: Sun Feb 29 2004, 23:58:02 PST The CLI makes the time change, then displays the current system time based on the change.
Page 111
To add an NTP server to the list of NTP servers, use the following command: set ntp server ip-addr To configure an Switch to use NTP server 192.168.1.5, type the following command: DWS-1008# set ntp server 192.168.1.5 Removing an NTP Server To remove an NTP server, use the following command: clear ntp server {ip-addr | all} If you use the all option, MSS clears all NTP servers configured on the switch.
DWS-1008 User’s Manual Configuring and Managing IP Interfaces and Services Resetting the Update Interval to the Default To reset the update interval to the default value, use the following command: clear ntp update-interval Enabling the NTP Client The NTP client is disabled by default. To enable the NTP client, use the following command:...
Page 113
{permanent | static | dynamic} ip-addr mac-addr To add a static ARP entry that maps IP address 10.10.10.1 to MAC address 00:bb:cc:dd:ee: ff, type the following command: DWS-1008# set arp static 10.10.10.1 00:bb:cc:dd:ee:ff success: added arp 10.10.10.1 at 00:bb:cc:dd:ee:ff on VLAN 1 Changing the Aging Timeout The aging timeout specifies how long a dynamic entry can remain unused before the software...
You can specify from 0 to 1,000,000 seconds. To disable aging, specify 0. For example, to disable aging of dynamic ARP entries, type the following command: DWS-1008# set arp agingtime 0 success: set arp aging time to 0 seconds Note: To reset the ARP aging timeout to its default value, use the set arp agingtime 1200 command.
Username: When you press Ctrl+t or type exit to end the client session, the management session returns to the local prompt: DWS-1008-remote> Session 0 pty tty2.d terminated tt name tty2.d DWS-1008# Use the following commands to manage Telnet client sessions:...
DNS parameters, and time and date parameters. 1. Configure IP interfaces on the mgmt and roaming VLANs, and verify the configuration changes. Type the following commands: DWS-1008# set interface mgmt ip 10.10.10.10/24 success: change accepted. DWS-1008# set interface roaming ip 10.20.10.10/24 success: change accepted.
Page 117
Total Power Over Ethernet : 105.6 ============================================================= 3. Configure a default route through a gateway router attached to the Switch and verify the configuration change. Type the following commands: DWS-1008# set ip route default 10.20.10.1 1 success: change accepted. D-Link Systems, Inc.
Page 118
4. Configure the DNS domain name and DNS server entries, enable the DNS service, and verify the configuration changes. Type the following commands: DWS-1008# set ip dns domain example.com success: change accepted. DWS-1008# set ip dns server 10.10.10.69 PRIMARY success: change accepted. DWS-1008# set ip dns server 10.20.10.69 SECONDARY success: change accepted.
Page 119
Offset : 60 minutes Recurring : yes, starting at 2:00 am of first Sunday of April and ending at 2:00 am on last Sunday of October. DWS-1008# set ntp server 192.168.1.5 DWS-1008# set ntp enable success: NTP Client enabled DWS-1008# show ntp...
DWS-1008 User’s Manual Configuring SNMP Configuring SNMP Overview The MSS SNMP engine (also called the SNMP server or agent) can run any combination of the following SNMP versions: • SNMPv1 - SNMPv1 is the simplest and least secure SNMP version.
{v1 | v2c | usm | all} {enable | disable} The usm option enables SNMPv3. The all option enables all three versions of SNMP. The following command enables all SNMP versions: DWS-1008 set snmp protocol all enable success: change accepted. D-Link Systems, Inc.
Page 122
To clear an SNMP community string, use the following command: clear snmp community name comm-string The following command configures community string switchmgr1 with access level notify-read-write: DWS-1008 set snmp community name switchmgr1 notify-read-write success: change accepted. D-Link Systems, Inc.
Page 123
DWS-1008 User’s Manual Configuring SNMP Creating a USM User for SNMPv3 To create a USM user for SNMPv3, use the following command: set snmp usm usm-username snmp-engine-id {ip ip-addr | local | hex hex-string} access {read-only | read-notify | notify-only | read-write |...
Page 124
The following command creates USM user securesnmpmgr1, which uses SHA authentication and 3DES encryption with passphrases. This user can send informs to the notification receiver that has engine ID 192.168.40.2. DWS-1008 set snmp usm securesnmpmgr1 snmp-engine-id ip 192.168.40.2 auth-type sha auth-pass-phrase myauthpword encrypt-type 3des encrypt-pass-phrase mycryptpword success: change accepted.
• auth-req-unsec-notify - SNMP message exchanges are authenticated but are not encrypted, and notifications are neither authenticated nor encrypted. Command Example The following command sets the minimum level of SNMP security allowed to authentication and encryption: DWS-1008 set snmp security encrypted success: change accepted. D-Link Systems, Inc.
The profile-name can be up to 32 alphanumeric characters long, with no spaces. To modify the default notification profile, specify default. The notification-type can be one of the following: • AuthenTraps - Generated when the DWS-1008 switch’s SNMP engine receives a bad community string. • AutoTuneRadioChannelChangeTraps - Generated when the RF Auto-Tuning feature changes the channel on a radio.
Page 127
DWS-1008 User’s Manual Configuring SNMP • ClientDot1xFailureTraps - Generated when a client experiences an 802.1X failure. • ClientRoamingTraps - Generated when a client roams. • CounterMeasureStartTraps - Generated when MSS begins countermeasures against a rogue access point. • CounterMeasureStopTraps - Generated when MSS stops countermeasures against a rogue access point.
Page 128
• RFDetectSpoofedMacAPTraps - Generated when MSS detects a wireless packet with the source MAC address of a D-Link AP, but without the spoofed AP’s signature (fingerprint). • RFDetectSpoofedSsidAPTraps - Generated when MSS detects beacon rames for a valid SSID, but sent by a rogue AP.
Page 129
The following command changes the action in the default notification profile from drop to send for all notification types: DWS-1008 set snmp notify profile default send all success: change accepted. The following commands create notification profile snmpprof_rfdetect, and change the action to send for all RF detection notification types:...
Page 131
The target-num is an ID for the target. This ID is local to the DWS-1008 switch and does not need to correspond to a value on the target itself. You can specify a number from 1 to 10.
Command Examples The following command configures a notification target for acknowledged notifications: DWS-1008 set snmp notify target 1 10.10.40.9 usm inform user securesnmpmgr1 snmp-engine-id ip success: change accepted. This command configures target 1 at IP address 10.10.40.9. The target’s SNMP engine ID is based on its address.
Displaying Notification Profiles To display notification profiles, use the following command: DWS-1008 show snmp notify profile The command lists settings separately for each notification profile. The use count indicates how many notification targets use the profile. For each notification type, the command lists whether MSS sends notifications of that type to the targets that use the notification profile.
Page 134
DWS-1008 User’s Manual Configuring SNMP Displaying SNMP Statistics Counters To display SNMP statistics counters, use the following command: DWS-1008 show snmp counters D-Link Systems, Inc.
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points Configuring DWL-8220AP Access Points DWL-8220AP access points contain radios that provide networking between your wired network and IEEE 802.11 wireless users. A DWL-8220AP access point connects to the wired network through a 10/100 Ethernet link and connects to wireless users through radio signals.
Page 136
Directly Connected DWL-8220APs and Distributed APs To configure the switch to support a DWL-8220AP access point, you must first determine how the DWL-8220AP will connect to the switch. There are two types of AP to DWS-1008 connection: direct and distributed.
Page 137
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points subnet. If the AP is unable to locate an DWS-1008 on the subnet it is connected to, the AP sends DNS requests to both TRPZ and wlan-switch, where the DNS suffix for mynetwork.com is learned through DHCP.
Page 138
flat domain name space. You can use the DHCP option 43 field to provide a list of DWS-1008 IP addresses, without the need to configure DNS servers. To use DHCP option 43, configure the option to contain a comma-separated list of DWS- 1008 IP addresses or hostnames, in the following format: ip:ip-addr1,ip-addr2,...
Page 139
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points AP Parameters The table below summarizes parameters that apply to individual access points, including dual-homing parameters. Parameter Default Value Description name Based on AP name. the port or Distributed AP connection number. For example: •...
Page 140
Bias On an switch, configurations for APs have a bias (low or high) associated with them. The default is high. A switch with high bias for a DWL-8220AP is preferred over an DWS-1008 with low bias for the AP. If more than one switch has high bias, or the bias for all connections is the same, the switch that has the greatest capacity to add more active APs is preferred.
Page 141
A DWL-8220AP access point brings up the link on the AP’s port 1 and attempts the boot process outlined below. If you want the AP to boot from a specific DWS-1008, you must ensure that only one DWS-1008 can respond through the AP’s port 1 with a high bias under normal operation. If the boot process fails to locate any DWS-1008, the AP then attempts the boot process on the AP’s port 2.
Page 142
The process continues with step 5. 5. If the AP is unable to locate an DWS-1008 on the subnet it is connected to, and is unable to find an DWS-1008 based on DHCP option 43, the AP sends DNS requests to both TRPZ and wlan-switch, where the DNS suffix for mynetwork.com is learned through DHCP.
Page 143
Configuring DWL-8220AP Access Points 6. The DNS server replies with the system IP address of an switch. • If only TRPZ is defined in DNS, the AP sends a unicast Find DWS-1008 message to the switch whose IP address is returned for TRPZ.
If MSS rejects an association request for load-balancing reasons but not for authentication reasons, the rejection does not count as an authentication failure. D-Link recommends that you configure small groups and ensure that all the radios in the group provide comparable coverage within the same service area.
Page 145
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points auth-fallthru none Denies access to users who do not match an 802.1X or MAC authentication rule for the SSID requested by the user. auth-psk disable Does not support using a preshared key (PSK) to authenticate WPA clients.
Page 146
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points shared-key-auth disable Does not use shared-key authentication. This parameter does not enable PSK authentication for WPA. To enable PSK encryption for WPA, use the set radio-profile auth- psk command. ssid-name dlink Uses the SSID name dlink.
Page 147
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points Public and Private SSIDs Each radio can support the following types of SSIDs: • Encrypted SSID - Clients using this SSID must use encryption. Use the encrypted SSID for secured access to your enterprise network.
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points Encryption Encrypted SSIDs can use the following encryption methods: • Wi-Fi Protected Access (WPA) • Non-WPA dynamic Wired Equivalent Privacy (WEP) • Non-WPA static WEP Dynamic WEP is enabled by default. Radio Profiles You can easily assign radio configuration parameters to many radios by configuring a radio...
Page 149
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points countermeasures Does not issue configured countermeasures against any device. dtim-interval Sends the delivery traffic indication map (DTIM) after every beacon. frag-threshold 2346 Transmits frames up to 2346 bytes long without fragmentation. long-retry Sends a long unicast frame up to five times...
Page 150
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points rts-threshold 2346 Transmits frames longer than 2346 bytes by means of the Request-to-Send/ Clear-to-Send (RTS/CTS) method. service-profile No service Default settings for all profiles service profile parameters, defined including encryption parameters, are used.
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points values for each radio for optimal performance. For example, leaving the channel number on each radio set to its default value can result in high interference among the radios. Configuring Access Points To configure DWL-8220AP access points, perform the following tasks, in this order: •...
Page 152
Luxembourg To verify the configuration change, use the following command: show system The following commands set the country code to US (United States) and verify the setting: DWS-1008# set system countrycode US success: change accepted. DWS-1008# show system ============================================================= Product Name:...
Page 153
SSID. A switch can have one template. Configured APs Have Precedence Over Unconfigured APs When a switch determines the DWS-1008 IP address to send to a booting AP, the switch gives preference to APs that are already configured, over unconfigured APs that require a template.
Page 154
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points To display the AP settings in the template, type the following command: DWS-1008# show dap config auto Dap auto: mode: disabled bias: high fingerprint boot-download-enable: YES load balancing group: none Radio 1: type: 802.11g, mode: enabled, channel: dynamic tx pwr: 15, profile: default...
Page 155
{1 | 2} radio-profile name mode {enable | disable} The following command changes the template to use radio profile autodap1 for radio 1: DWS-1008# set dap auto radio 1 radio-profile autodap1 success: change accepted. Note: You must configure the radio profile before you can apply it to the template.
Page 156
Displaying Status Information for APs Configured by the Template To display status information for APs configured by the template, type the following command: DWS-1008# show dap status auto Dap: 100 (auto), IP-addr: 10.8.255.6 (vlan ‘default’), AP model: DWL-8220AP, manufacturer: D-Link, name: AP100...
DWS-1008 User’s Manual Configuring DWL-8220AP Access Points Configuring AP Port Parameters To configure a switch for connection to an access point, you must do one of the following: • For an access point directly connected to a switch port, configure the switch port as a DWL-8220AP access port.
Page 158
Caution: When you set the port type for AP use, you must specify the PoE state (enable or disable) of the port. Use the switch’s PoE to power D-Link DWL-8220APs only. If you enable PoE on a port connected to another device, physical damage to the device can result.
Page 159
To configure Distributed AP connection 1 for the DWL-8220AP with serial-ID 0322199999, type the following command: DWS-1008# set dap 1 serial-id 0322199999 model dwl-8220ap success: change accepted. Clearing a DWL-8220AP from the Configuration Caution: When you clear an access point, MSS ends user sessions that are using the AP.
Page 160
{ap port-list | dap dap-num} bias {high | low} The default bias is high. To change the bias for a Distributed AP to low, type the following command: DWS-1008# set dap 1 bias low success: change accepted. Configuring a Load-Balancing Group A load-balancing group is a named set of access points.
MSS provides security for management traffic between switches and Distributed APs. When you enable the feature, all management traffic between Distributed APs that support encryption and the switch is encrypted. DWS-1008 security is disabled by default. The encryption uses RSA as the public key cryptosystem, with AES-CCM for data encryption and integrity checking and HMAC-MD5 for keyed hashing and message authentication during the key exchange.
Page 162
fingerprint. The following example shows information for Distributed AP 8, including its fingerprint: DWS-1008# show dap status 8 Dap: 8, IP-addr: 10.2.26.40 (vlan ‘default’), AP model: DWL-8220AP, manufacturer: D-Link, name: DAP08 fingerprint: b4:f9:2a:52:37:58:f4:d0:10:75:43:2f:45:c9:52:c3...
Page 163
To apply the new setting to an AP, restart the AP. To configure AP security requirements, use the following command: set dap security {require | optional | none} The following command configures an DWS-1008 to require Distributed APs to have encryption keys: DWS-1008# set dap security require Fingerprint Log Message If AP encryption is optional, and an AP whose fingerprint has not been confirmed in MSS...
The following command applies the name corporate users to the SSID managed by service profile mycorp_srvcprf: DWS-1008# set service-profile mycorp_srvcprf ssid-name “corporate users” success: change accepted. Disabling or Reenabling Encryption for an SSID To specify whether the SSID is encrypted or unencrypted, use the following command: set service-profile name ssid-type [clear | crypto]...
Page 165
To configure a new radio profile named rp1, type the following command: DWS-1008# set radio-profile rp1 success: change accepted. To assign the profile to one or more radios, use the set ap radio radio-profile command.
Page 166
SSIDs. MSS still sends one beacon for each SSID during each beacon interval. To change the beacon interval for radio profile rp1 to 200 ms, type the following command: DWS-1008# set radio-profile rp1 beacon-interval 200 success: change accepted. Changing the DTIM Interval The DTIM interval specifies the number of times after every beacon that a radio sends a...
Page 167
The threshold can be a value from 256 bytes through 3000 bytes. The default is 2346. To change the RTS threshold for radio profile rp1 to 1500 bytes, type the following command: DWS-1008# set radio-profile rp1 rts-threshold 1500 success: change accepted.
Page 168
The threshold can be a value from 1 through 15. The default is 5. To change the long retry threshold for radio profile rp1 to 8, type the following command: DWS-1008# set radio-profile rp1 long-retry 8 success: change accepted. Changing the Maximum Receive Threshold The maximum receive threshold specifies the number of milliseconds a frame received by a...
Page 169
11g-only {enable | disable} To configure the 802.11b/g radios in radio profile rp1 to allow associations from 802.11g clients only, type the following command: DWS-1008# set radio-profile rp1 11g-only enable success: change accepted. Changing the Preamble Length By default, 802.11b/g radios advertise support for frames with short preambles and can...
Page 170
To configure 802.11b/g radios that use the radio profile rp_long to advertise support for long preambles instead of short preambles, type the following command: DWS-1008# set radio-profile rp_long preamble-length long success: change accepted. Resetting a Radio Profile Parameter to its Default Value To reset a radio profile parameter to its default value, use the following command:...
Note: You must disable all radios that are using a radio profile before you can remove the profile. To disable the radios that are using radio profile rptest and remove the profile, type the following commands: DWS-1008# set radio-profile rptest mode disable DWS-1008# clear radio-profile rptest success: change accepted. Configuring Radio-Specific Parameters The following parameters are specific to individual radios and are not controlled by a radio...
Page 172
For an 802.11a radio specify radio 2. • Note: The maximum transmit power you can configure on any D-Link radio is the highest setting allowed for the country of operation or the highest setting supported on the hardware, whichever is lower.
To assign radio profile rp1 to radio 1 on ports 1-3, and 6 and enable the radios, type the following command: DWS-1008# set ap 1-3,6 radio 1 radio-profile rp1 mode enable success: change accepted. To assign radio profile rp1 to radio 2 on ports 1-4 and port 6 and enable the radios, type the following command: DWS-1008# set ap 1-4,6 radio 2 radio-profile rp1 mode enable...
Page 174
[mode {enable | disable}] The following command enables all radios that use radio profile rp1: DWS-1008# set radio-profile rp1 mode enable success: change accepted. The following commands disable all radios that use radio profile rp1, change the beacon interval, then reenable the radios: DWS-1008# set radio-profile rp1 mode disable...
[port-list [radio {1 | 2}]] show dap config [dap-num [radio {1 | 2}]] The command lists information separately for each access point. To display configuration information for an access point on DWS-1008 port 2, type the following command: DWS-1008# show ap config 2...
Page 176
24, max-retransmissions: 10 To display configuration information for a Distributed AP access point configured on connection 1, type the following command: DWS-1008# show dap config 1 Dap 1: serial-id: 12345678, AP model: DWL-8220AP, bias: high, name: DAP01 fingerprint: b4:f9:2a:52:37:58:f4:d0:10:75:43:2f:45:c9:52:c3...
Page 177
To display service profile information, use the following command: show service-profile { name Entering show service-profile ? displays a list of the service profiles configured on the switch. To display information for service profile wpa_clients, type the following command: DWS-1008# show service-profile wpa_clients ssid-name: D-Link ssid-type: crypto beacon:...
Page 178
WMM enabled: Service profiles: default-dot1x, default-clear Displaying AP Status Information To display status information including link state and DWS-1008 status, use the following commands: show ap status [terse] | [port-list | all [radio {1 | 2}]] show dap status [terse] | [dap-num | all [radio {1 | 2}]] The terse option displays a brief line of essential status information for each directly connected AP or Distributed AP.
Page 179
[port-list [radio {1 | 2}]] show dap counters [dap-num [radio {1 | 2}]] To display statistics counters for an access point on port 2, type the following command: DWS-1008# show ap counters 2 Port: 2 radio: 1...
DWS-1008 User’s Manual Configuring User Encryption Configuring User Encryption Mobility System Software (MSS) encrypts wireless user traffic for all users who are successfully authenticated to join an encrypted SSID and who are then authorized to join a VLAN. MSS supports the following types of encryption for wireless user traffic: •...
Page 182
DWS-1008 User’s Manual Configuring User Encryption The table below lists the encryption types supported by MSS and their default states. Wireless Encryption Defaults Configuration Required in Encryption Type Client Support Default State RSN clients Disabled • Enable the RSN information element Non-RSN (IE).
DWS-1008 User’s Manual Configuring User Encryption Configuring WPA Wi-Fi Protected Access (WPA) is a security enhancement to the IEEE 802.11 wireless standard. WPA provides enhanced encryption with new cipher suites and provides per-packet message integrity checks. WPA is based on the 802.11i standard. You can use WPA with 802.1X authentication.
Page 184
DWS-1008 User’s Manual Configuring User Encryption • If the recalculated MIC does not match the MIC received with the frame, the frame fails the integrity check. This condition is called a MIC failure. The access point or client discards the frame and also starts a 60-second timer. If another MIC failure does not occur within 60 seconds, the timer expires.
Page 185
DWS-1008 User’s Manual Configuring User Encryption Note: For a MAC client that authenticates using a PSK, the RADIUS servers or local database still must contain an authentication rule for the client, to assign the client to a VLAN. WPA Information Element A WPA information element (IE) is a set of extra fields in a wireless frame that contain WPA...
Page 186
DWS-1008 User’s Manual Configuring User Encryption The table below lists the encryption support for WPA and non-WPA clients. Encryption Support for WPA and Non-WPA Clients Client Encryption Type Encryption WPA— WPA— WPA— Dynamic WPA—TKIP Static WEP Type CCMP WEP40 WEP104 Supported WPA—CCMP...
Page 187
WPA IE, use the following command: set service-profile name wpa-ie {enable | disable} To enable WPA in service profile wpa, type the following command: DWS-1008# set service-profile wpa wpa-ie enable success: change accepted. Specifying the WPA Cipher Suites To use WPA, at least one cipher suite must be enabled.
Page 188
To configure service profile wpa to use passphrase 1234567890123<>?=+&% The quick brown fox jumps over the lazy sl, type the following command: DWS-1008# set service-profile wpa psk-phrase “1234567890123<>?=+&% The quick brown fox jumps over the lazy sl” success: change accepted.
Page 189
DWS-1008 User’s Manual Configuring User Encryption Examples: To configure service profile wpa to use a raw PSK with PSK clients, type a command such as the following: DWS-1008# set service-profile wpa psk-raw c25d3fe4483e867d1df96eaacdf8b02451fa 0836162e758100f5f6b87965e59d success: change accepted. Disabling 802.1X Authentication for WPA To disable 802.1X authentication for WPA clients, use the following command:...
To assign radio profile bldg1 to radio 1 on ports 1-3, and 6 and enable the radios, type the following command: DWS-1008# set ap 1-3,6 radio 1 radio-profile bldg1 mode enable success: change accepted. To assign radio profile bldg1 to radio 2 on ports 4-5 and enable the radios, type the following command: DWS-1008# set ap 4-5 radio 2 radio-profile bldg1 mode enable...
Page 191
RSN IE, use the following command: set service-profile name rsn-ie {enable | disable} To enable RSN in service profile wpa, type the following command: DWS-1008# set service-profile rsn rsn-ie enable success: change accepted. Specifying the RSN Cipher Suites To use RSN, at least one cipher suite must be enabled.
Page 192
To assign a radio profile to radios and enable the radios, use the following command: set ap port-list radio {1 | 2} radio-profile name mode {enable | disable} To map service profile rsn to radio profile bldg2, type the following command: DWS-1008# set radio-profile blgd2 service-profile rsn success: change accepted. D-Link Systems, Inc.
DWS-1008 User’s Manual Configuring User Encryption Configuring WEP Wired-Equivalent Privacy (WEP) is a security protocol defined in the 802.11 standard. WEP uses the RC4 encryption algorithm to encrypt data. To provide integrity checking, WEP access points and clients check the integrity of a frame’s cyclic redundancy check (CRC), generate an integrity check value (ICV), and append the value to the frame before sending it.
Page 194
• a to f To configure WEP key index 1 for radio profile rp1 to aabbccddee, type the following command: DWS-1008# set service-profile rp1 wep key-index 1 key aabbccddee success: change accepted. Assigning Static WEP Keys When static WEP is enabled, static WEP key 1 is assigned to unicast and multicast traffic by default.
1. Create an authentication rule that sends all 802.1X users of SSID mycorp in the EXAMPLE domain to the server group shorebirds for authentication. Type the following command: DWS-1008# set authentication dot1x ssid mycorp EXAMPLE\* pass-through shorebirds 2. Create a service profile named wpa for the SSID. Type the following command: DWS-1008# set service-profile wpa...
Page 196
7. Apply radio profile rp1 to radio 1 on port 5 and to radios 1 and 2 on port 6, enable the radios, and verify the configuration changes. Type the following commands: DWS-1008# set ap 5,6 radio 1 radio-profile rp1 mode enable success: change accepted.
Page 197
DWS-1008# set service-profile wpa-wep success: change accepted. 3. Set the SSID in the service profile to thiscorp. Type the following command: DWS-1008# set service-profile wpa-wep ssid-name thiscorp success: change accepted. 4. Enable WPA in service profile wpa-wep. Type the following command: DWS-1008# set service-profile wpa-wep wpa-ie enable...
Page 198
8. Apply radio profile rp2 to radio 1 on port 5 and to radios 1 and 2 on port 6, enable the radios, and verify the configuration changes. Type the following commands: DWS-1008# set ap 5,6 radio 1 radio-profile rp2 mode enable success: change accepted.
Page 199
DWS-1008 User’s Manual Configuring User Encryption 3. Add MAC users to MAC user group wpa-for-mac. Type the following commands: DWS-1008# set mac-user aa:bb:cc:dd:ee:ff group wpa-for-mac success: configuration saved. DWS-1008# set mac-user a1:b1:c1:d1:e1:f1 group wpa-for-mac success: configuration saved. 4. Verify the AAA configuration changes. Type the following command:...
Page 200
13. Apply radio profile rp3 to radio 1 on port 4 and to radios 1 and 2 on port 6 and enable the radios, and verify the configuration changes. Type the following commands: DWS-1008# set ap 4,6 radio 1 radio-profile rp3 mode enable success: change accepted.
Page 201
DWS-1008 User’s Manual Configuring User Encryption DWS-1008# show ap config Port 4: AP model: DWL-8220AP, POE: enable, bias: high, name: AP04 boot-download-enable: YES load balancing group: none Radio 1: type: 802.11a, mode: enabled, channel: 36 tx pwr: 1, profile: rp3 auto-tune max-power: default, min-client-rate: 5.5, max-retransmissions: 10...
DWS-1008 User’s Manual Configuring RF Auto-Tuning Configuring RF Auto-Tuning RF AutoTuning Overview The RF AutoTuning feature dynamically assigns channel and power settings to AP radios, and adjusts those settings when needed. RF AutoTuning can perform the following tasks: • Assign initial channel and power settings when an AP radio is started.
Page 203
DWS-1008 User’s Manual Configuring RF Auto-Tuning Channel and Power Tuning RF AutoTuning can change the channel or power of a radio, to compensate for RF changes such as interference, or to maintain at least the minimum data transmit rate for associated clients.
Page 204
DWS-1008 User’s Manual Configuring RF Auto-Tuning • Utilization, calculated based on the number of multicast packets per second that a radio can send on a channel while continuously sending fixed-size frames over a period of time. • Phy error count, which is the number of frames received by the AP radio that have physical layer errors.
Page 205
DWS-1008 User’s Manual Configuring RF Auto-Tuning channel-interval 3600 Every 3600 seconds, MSS examines the RF information gathered from the network and determines whether the channel needs to be changed to compensate for RF changes. channel-holddown MSS maintains the channel setting on a radio for at least 900 seconds regardless of RF changes.
Page 206
DWS-1008 User’s Manual Configuring RF Auto-Tuning max-retransmissions If more than 10% of the packets received by the radio from a client are retransmissions, the radio lowers the data rate to the client and, if necessary, increases power to reduce the retransmissions.
Page 207
0 to 65535 seconds. If you set the interval to 0, RF AutoTuning does not reevaluate the channel at regular intervals. However, RF AutoTuning can still change the channel in response to RF anomalies. D-Link recommends that you use an interval of at least 300 seconds (5 minutes).
{enable | disable} To enable power tuning for radios in the rp2 radio profile, type the following command: DWS-1008# set radio-profile rp2 auto-tune power-config enable success: change accepted. Changing the Power Tuning Interval The default power tuning interval is 300 seconds.
Page 209
To set the maximum power that RF AutoTuning can set on radio 1 on the DWL-8220AP access point on port 7 to 12 dBm, type the following command: DWS-1008# set ap 7 radio 1 auto-tune max-power 12 success: change accepted.
To display the RF AutoTuning and other individual radio settings on radio 1 of a directly connected AP access port connected to port 2, type the following command: DWS-1008# show ap config 2 radio 1 Port 2: AP model: DWL-8220AP, POE: enable, bias: high, name: AP02...
Page 211
1, profile: default auto-tune max-power: default, min-client-rate: 24, max-retransmissions: 10 Displaying RF Neighbors To display the other radios that a specific D-Link radio can hear, use the following commands: show auto-tune neighbors [ap ap-num [radio {1 | 2| all}]]...
Page 212
[dap dap-num [radio {1 | 2| all}]] To display RF attribute information for radio 1 on the directly connected DWL-8220AP access point on port 2, type the following command: DWS-1008# show auto-tune attributes ap 2 radio 1 Auto-tune attributes for port 2 radio 1: Noise:...
This occurs for directly connected APs and for Distributed APs. The switch never changes the data packet’s IP ToS value. If the DWS-1008 is forwarding a packet through a tunnel to another switch, MSS uses • the same process used for traffic to an AP. Generally, a switch uses a tunnel to send user data to another DWS-1008 switch when the user’s VLAN is configured on the...
DWL-8220AP access points use forwarding queues to prioritize traffic to wireless clients. When the AP receives a packet from a DWS-1008 switch, the AP places the packet into one of four forwarding queues. The AP’s queue selection is based on the IP ToS setting in the tunnel header of the encapsulated data packet received from the switch.
Page 215
You can display statistics for AP forwarding queues, using the following commands: show dap qos-stats [dap-num] show dap qos-stats [port-list] The following command shows statistics for the AP forwarding queues on a Distributed AP: DWS-1008# show dap qos-stats 4 Queue =========================== DAP: 4 radio: 1...
STP, use the following command: set spantree {enable | disable} [{all | vlan vlan-id | port port-list vlan-id}] To enable STP on all VLANs configured on a DWS-1008 switch, type the following command: DWS-1008# set spantree enable success: change accepted.
Page 217
DWS-1008 User’s Manual Configuring and Managing STP Bridge Priority The bridge priority determines the switch’s eligibility to become the root bridge. You can set this parameter globally or on individual VLANs. The root bridge is elected based on the bridge priority of each device in the spanning tree.
Page 218
DWS-1008# set spantree portcost 3,4 cost 20 success: change accepted. To change the cost for the same ports in VLAN mauve, type the following command: DWS-1008# set spantree portvlancost 3,4 cost 20 vlan mauve success: change accepted. Resetting the STP Port Cost to the Default Value...
Page 219
To set the priority of ports 3 and 4 to 48 in VLAN mauve, type the following command: DWS-1008# set spantree portvlanpri 3-4 priority 48 vlan mauve success: change accepted. Resetting the STP Port Priority to the Default Value...
Page 220
The all option applies the change to all VLANs. Alternatively, specify an individual VLAN. To change the forwarding delay on VLAN pink to 20 seconds, type the following command: DWS-1008# set spantree fwddelay 20 vlan pink success: change accepted. D-Link Systems, Inc.
The all option applies the change to all VLANs. Alternatively, specify an individual VLAN. To change the maximum acceptable age for root bridge hello packets on all VLANs to 15 seconds, type the following command: DWS-1008# set spantree maxage 15 all success: change accepted. Configuring and Managing STP Fast Convergence Features The standard STP timers delay traffic forwarding briefly after a topology change.
Page 222
Configuring and Managing STP Uplink Fast Convergence Uplink fast convergence enables a DWS-1008 switch that has redundant links to the network core to immediately change the state of a backup link to forwarding if the primary link to the root fails. Uplink fast convergence bypasses the listening and learning states to immediately enter the forwarding state.
Page 223
To enable or disable backbone fast convergence, use the following command: set spantree backbonefast {enable | disable} To enable backbone fast convergence on all VLANs, type the following command: DWS-1008# set spantree backbonefast enable success: change accepted. Displaying the Backbone Fast Convergence State...
VLAN, only the ports contained in the VLAN are listed in the command output. To list only the ports that are in the active (forwarding) state, enter the active option. To display STP information for VLAN mauve, type the following command: DWS-1008# show spantree vlan mauve VLAN Spanning tree mode...
Page 225
To display information about ports that are in the STP blocking state, use the following command: show spantree blockedports [vlan vlan-id] To display information about blocked ports on a DWS-1008 switch for the default VLAN (VLAN 1), type the following command: DWS-1008# show spantree blockedports vlan default...
Page 226
DWS-1008 User’s Manual Configuring and Managing STP To display STP statistics for port 1, type the following command: DWS-1008# show spantree statistics 1 BPDU related parameters Port 1 VLAN 1 spanning tree enabled for VLAN = 1 port spanning tree...
Page 227
1. Remove the network cables from ports 2 and 3 or use MSS to disable the ports. This prevents a loop until you complete the STP configuration. To disable the ports and verify the results, type the following commands: DWS-1008# set port disable 2-3 success: set “disable” on port 2-3 D-Link Systems, Inc.
10/100BaseTx down auto network 10/100BaseTx 2. Configure a backbone VLAN and verify the configuration change. Type the following commands: DWS-1008# set vlan 10 name backbone port 2-3 success: change accepted. DWS-1008# show vlan config Admin VLAN Tunl Port VLAN Name...
Page 229
Disabled 4 128 Disabled 4. Reconnect or reenable ports 2 and 3 and verify the change. Type the following commands: DWS-1008# set port enable 2-3 success: set “enable” on port 2-3 DWS-1008# show port status Port Name Admin Oper Config...
Internet Group Management Protocol (IGMP) snooping controls multicast traffic on a DWS-1008 switch by forwarding packets for a multicast group only on the ports that are connected to members of the group. A multicast group is a set of IP hosts that receive traffic addressed to a specific Class D IP address, the group address.
DWS-1008 User’s Manual Configuring and Managing IGMP Snooping Note: D-Link recommends that you use the pseudo-querier only when the VLAN contains local multicast traffic sources and no multicast router is servicing the subnet. To enable the pseudo-querier, use the following command:...
You can specify a value from 2 through 255. The default is 2. Enabling Router Solicitation A DWS-1008 switch can search for multicast routers by sending multicast router solicitation messages. This message invites multicast routers that receive the message and that support router solicitation to immediately advertise themselves to the switch.
Configuring and Managing IGMP Snooping Configuring Static Multicast Ports A DWS-1008 switch learns about multicast routers and receivers from multicast traffic it receives from those devices. When the switch receives traffic from a multicast router or receiver, the switch adds the port that received the traffic as a multicast router or receiver port.
Page 234
DWS-1008 User’s Manual DWS-1008 User’s Manual Configuring and Managing IGMP Snooping To display multicast information for VLAN orange, type the following command: DWS-1008# show igmp vlan orange VLAN: orange IGMP is enabled Proxy reporting is on Mrouter solicitation is on Querier functionality is off Configuration values: qi: 125 oqi: 300 qri: 100 lmqi: 10 rvalue: 2 Multicast...
Page 235
To display information about the multicast routers only without also displaying all the other multicast information, use the following command: show igmp mrouter [vlan vlan-id] To display the multicast routers in VLAN orange, type the following command: DWS-1008# show igmp mrouter vlan orange Multicast routers for vlan orange Port Mrouter-IPaddr...
Page 236
Use the group parameter to display receivers for a specific group or set of groups. For example, to display receivers for multicast groups 237.255.255.1 through 237.255.255.255, in all VLANs, type the following command: DWS-1008# show igmp receiver-table group 237.255.255.0/24 VLAN: red Session...
D-Link provides a very powerful mapping application for security ACLs. In addition to being assigned to physical ports, VLANs, virtual ports in a VLAN, or Distributed APs, ACLs can be mapped dynamically to a user’s session, based on authorization information passed back...
Page 238
DWS-1008 User’s Manual Configuring and Managing Security ACLs Overview of Security ACL Commands The figure below provides a visual overview of the way you use MSS commands to set a security ACL, commit the ACL so it is stored in the configuration, and map the ACL to a user session, VLAN, port, virtual port, or Distributed AP.
0 (routine), and a type-of-service (TOS) level of 0 (normal). GRE is protocol number 47. DWS-1008# set security acl ip acl-2 permit cos 2 47 192.168.1.11 0.0.0.0 192.168.1.15 0.0.0.0 precedence 0 tos 0 hits The security ACL acl-2 described above also applies the CoS level 2 (medium priority) to the permitted packets.
Page 240
DWS-1008 User’s Manual Configuring and Managing Security ACLs Common IP Protocol Numbers Number IP Protocol Internet Message Control Protocol (ICMP) Internet Group Management Protocol (IGMP) Transmission Control Protocol (TCP) Any private interior gateway (used by Cisco for Internet Gateway Routing Protocol)
Page 241
Class of Service Class-of-service (CoS) assignment determines the priority treatment of packets transmitted by a DWS-1008 switch, corresponding to a forwarding queue on the AP. The table below shows the results of CoS priorities you assign in security ACLs. Class-of-Service (CoS) Packet Handling...
Page 242
DWS-1008 User’s Manual Configuring and Managing Security ACLs The before 1 portion of the ACE places it before any others in the ACL, so it has precedence over any later ACEs for any parameter settings that are met. ICMP includes many messages that are identified by a type field. Some also have a code within that type.
Page 243
15, on an established TCP session, and counts the number of hits generated by the ACE: DWS-1008# set security acl ip acl-4 permit tcp 192.168.1.5 0.0.0.0 192.168.1.6 0.0.0.0 eq 524 precedence 7 tos 15 established hits Setting a UDP ACL The following command filters UDP packets:...
Page 244
To put the security ACLs you have created into effect, use the commit security acl command with the name of the ACL. For example, to commit acl-99, type the following command: DWS-1008# commit security acl acl-99 success: change accepted. To commit all the security ACLs in the edit buffer, type the following command: DWS-1008# commit security acl all success: change accepted.
Page 245
You can display the contents of one or all security ACLs that are committed. To display the contents of all committed security ACLs, type the following command: DWS-1008# show security acl info all ACL information for all set security acl ip acl-999 (hits #2 0) ---------------------------------------------------- 1.
Page 246
Displaying Security ACL Hits Once you map an ACL, you can view the number of packets it has filtered, if you included the keyword hits. Type the following command: DWS-1008# show security acl hits ACL hit-counters Index Counter ACL-name -------------------------------------------...
The security ACL mapped by Filter-Id instructs the switch to use its local definition of the ACL, including the flow direction, to filter packets for the authenticated user. Note: The Filter-Id attribute is more often received by the DWS-1008 switch through an external AAA RADIUS server than applied through the local database.
Page 248
ACL acl-222 to virtual ports 1 through 3 and 5 on port 2 to filter incoming packets, type the following command: DWS-1008# set security acl map acl-222 port 2 tag 1-3,5 in success: change accepted. Plan your security ACL maps to ports, VLANs, virtual ports, and Distributed APs so that only one security ACL filters a flow of packets.
Page 249
DWS-1008# show security acl map acljoe ACL acljoe is mapped to: Port 4 In DWS-1008# clear security acl map acljoe port 4 in success: change accepted. After you clear the mapping between port 4 and ACL acljoe, the following is displayed when...
ACL named acl-violet. Follow these steps: 1. To display all committed security ACLs, type the following command: DWS-1008# show security acl info all ACL information for all set security acl ip acl-violet (hits #2 0) ---------------------------------------------------- 1.
Page 251
192.168.1.15 0.0.0.0 precedence 0 tos 0 enable-hits 2. To add the deny ACE to acl-111 and place it first, type the following commands: DWS-1008# set security acl ip acl-111 deny 192.168.254.12 0.0.0.255 before 1 DWS-1008# commit security acl acl-111 success: change accepted.
Page 252
1. permit L4 Protocol 115 source IP 192.168.1.11 0.0.0.0 destination IP 192.168.1.15 0.0.0.0 precedence 0 tos 0 enable-hits 2. To modify the first ACE in acl-111, type the following commands: DWS-1008# set security acl ip acl-111 permit 192.168.254.12 0.0.0.0 modify 1 DWS-1008# commit security acl acl-111 success: change accepted.
Page 253
DWS-1008 User’s Manual Configuring and Managing Security ACLs DWS-1008# show security acl info all ACL information for all set security acl ip acl-111 (hits #4 0) ---------------------------------------------------- 1. permit IP source IP 192.168.254.12 0.0.0.0 destination IP any 2. permit IP source IP 192.168.253.11 0.0.0.0 destination IP any...
3, to have CoS value 7 when they are forwarded to any 10.10.30.x address on Distributed AP 2, enter the following commands: DWS-1008# set security acl ip acl1 permit cos 7 ip 10.10.20.5 0.0.0.0 10.10.30.0 0.0.0.255 precedence 3 success: change accepted.
Page 255
46 (equivalent to precedence value 5 and ToS value 12), to have CoS value 7 when they are forwarded to any 10.10.90.x address on Distributed AP 4: DWS-1008# set security acl ip acl2 permit cos 7 ip 10.10.50.2 0.0.0.0 10.10.90.0 0.0.0.255 precedence 5 tos 12 success: change accepted.
1. Configure an ACE in ACL voip that assigns IP traffic from any IP address with source UDP port 3344, addressed to any destination address, to CoS queue 6: DWS-1008# set security acl ip voip permit cos 6 udp 0.0.0.0 255.255.255.255 eq 3344 0.0.0.0 255.255.255.255 2.
Page 257
2. Configure an ACE in ACL svp that assigns IP protocol 119 traffic for all source and destination addresses to CoS queue 7: DWS-1008# set security acl ip svp permit cos 7 119 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255 3. Configure another ACE to change the default action of the ACL from deny to permit.
9 now accepts packets only from 192.168.1.1, and denies all other packets. 5. To map acl-99 to user Natasha’s sessions when you are using the local DWS-1008 switch database for authentication, configure Natasha in the database with the Filter- Id attribute.
Page 259
DWS-1008 User’s Manual Configuring and Managing Security ACLs 7. To save your configuration, type the following command: DWS-1008# save config success: configuration saved. D-Link Systems, Inc.
Managing Keys and Certificates Managing Keys and Certificates A digital certificate is a form of electronic identification for computers. The DWS-1008 switch requires digital certificates to authenticate its communications to Web View, to WebAAA clients, and to Extensible Authentication Protocol (EAP) clients for which the switch performs all EAP processing.
DWS-1008 User’s Manual Managing Keys and Certificates 1. To form the encrypted TLS channel, the switch must have a digital certificate and must send that certificate to the wireless client. 2. Inside the switch’s digital certificate is the switch’s public key, which the wireless client uses to encrypt a pre-master secret key.
Page 262
Public and Private Keys D-Link’s identity-based networking uses public key cryptography to enforce the privacy of data transmitted over the network. Using public-private key pairs, users and devices can send encrypted messages that only the intended receiver can decrypt.
Page 263
Public-Key Cryptography Standards (PKCS) are encryption interface standards created by RSA Data Security, Inc., that provide a file format for transferring data and cryptographic information. D-Link supports the PKCS object files listed in PKCS Object Files Supported by D-link. PKCS Object Files Supported by D-link...
DWS-1008 User’s Manual Managing Keys and Certificates PKCS #12 Personal Contains a certificate signed by a CA and a Information public-private key pair provided by the CA Exchange to go with the certificate. Syntax Because the key pair comes from the CA,...
Page 265
Choose the key length based on your need for security or to conform with your organization’s practices. For example, the following command generates an administrative key pair of 1024 bits: DWS-1008# crypto generate key admin 1024 admin key pair generated Note: After you generate or install a certificate (described in the following sections), do not create the key pair again.
Page 266
Common Name: DWS-1008 Email Address: admin@example.com Unstructured Name: DWS-1008 in wiring closet 120 You must include a common name (string) when you generate a self-signed certificate. The other information is optional. Use a fully qualified name if such names are supported on your network.
Page 267
You must include a common name (string) when you generate a CSR. Use a fully qualified name if such names are supported on your network. The other information is optional. For example: DWS-1008#dws-1008# crypto generate request admin Country Name: US State Name: MI...
{admin | eap | webaaa} show crypto certificate {admin | eap | webaaa} For example, to display information about an administrative certificate, type the following command: DWS-1008# show crypto certificate admin Certificate: Version: 3 Serial Number: 999 (0x3e7)
Country Name: US State Name: CA Locality Name: San Francisco Organizational Name: example Organizational Unit: IT Common Name: DWS-1008 Email Address: admin@example.com Unstructured Name: DWS-1008 in wiring closet 4 Self-signed cert for admin is -----BEGIN CERTIFICATE----- MIICUzCCAbygAwIBAgICA+cwDQYJKoZIhvcNAQEEBQAwNjELMAkGA1UEBhMCVVMx CzAJBgNVBAgTAkNBMRowGAYDVQQDFBF0ZWNocHVic0B0cnB6LmNvbTAeFw0wMzA0 Lm8wmVYLxP56MpCUAm9O8C2foYgOY40= -----END CERTIFICATE-----...
Page 270
State Name: CA Locality Name: San Francisco Organizational Name: example Organizational Unit: IT Common Name: DWS-1008 6 Email Address: admin@example.com Unstructured Name: DWS-1008 in wiring closet 4 Self-signed cert for webaaa is -----BEGIN CERTIFICATE----- MIICUzCCAbygAwIBAgICA+cwDQYJKoZIhvcNAQEEBQAwNjELMAkGA1UEBhMCVVMx CzAJBgNVBAgTAkNBMRowGAYDVQQDFBF0ZWNocHVic0B0cnB6LmNvbTAeFw0wMzA0 Lm8wmVYLxP56M 4. Display certificate information for verification: DWS-1008# show crypto certificate admin...
Page 272
CA certifies for administrative access, 802.1X (EAP) access, and Web AAA access. 1. Set time and date parameters, if not already set. 2. Generate public-private key pairs: DWS-1008# crypto generate key admin 1024 key pair generated DWS-1008# crypto generate key eap 1024 key pair generated D-Link Systems, Inc.
Page 273
DWS-1008 User’s Manual Managing Keys and Certificates DWS-1008# crypto generate key webaaa 1024 key pair generated 3. Create a CSR (PKCS #10 object file) to request an administrative certificate: DWS-1008# crypto generate request admin Country Name: US State Name: CA...
Page 274
13. Paste the CA’s signed certificate under the prompt. 14. Display information about the CA’s certificate, to verify it: DWS-1008# show crypto ca-certificate admin 15. Repeat To install the CA’s certificate on the switch through Display information about the CA’s certificate, to verify it: to install the CA’s certificate for EAP (802.1X) and Web AAA.
DWS-1008 User’s Manual Configuring AAA for Network Users Configuring AAA for Network Users About AAA for Network Users Network users include the following types of users: • Wireless users - Users who access the network by associating with an SSID on a D-Link radio.
Page 276
DWS-1008 User’s Manual Configuring AAA for Network Users The username or MAC address can be an exact match or can match a userglob or MAC address glob, which allow wildcards to be used for all or part of the username or MAC address.
Page 277
DWS-1008 User’s Manual Configuring AAA for Network Users Web and last-resort are described in Authentication Types. None means the user is automatically denied access. The fallthru authentication type for wireless access is associated with the SSID (through a service profile). The fallthru authentication type for wired authentication access is specified with the wired authentication port.
Page 278
DWS-1008 User’s Manual Configuring AAA for Network Users • For a user to be successfully authenticated by an 802.1X or WebAAA rule, the username and password entered by the user must be configured on the RADIUS servers used by the authentication rule or in the switch’s local database, if the local database is used by the rule.
Page 279
DWS-1008 User’s Manual Configuring AAA for Network Users • Mobility-Profile - Controls the switch ports a user can access. For wireless users, an MSS Mobility Profile specifies the access points through which the user can access the network. For wired authentication users, the Mobility Profile specifies the wired authentication ports through which the user can access the network.
DWS-1008 User’s Manual Configuring AAA for Network Users AAA for network users controls and monitors their use of the network: • Classification for customized access. As with administrative and console users, you can classify network users through username globbing. Based on the structured username, different AAA treatments can be given to different classes of user.
Page 281
(This is the default authorization password). AAA Rollover Process A DWS-1008 switch attempts AAA methods in the order in which they are entered in the configuration: 1. The first AAA method in the list is used unless that method results in an error. If the method results in a pass or fail, the result is final and the switch tries no other...
Page 282
192.168.253.2 with the password chey3nn3, the administrator enters the following commands: DWS-1008# set radius server server-1 address 192.168.253.1 key chey3nn3 DWS-1008# set radius server server-2 address 192.168.253.2 key chey3nn3 2. To configure server-1 and server-2 into server-group-1, the administrator enters the...
Page 283
DWS-1008 User’s Manual Configuring AAA for Network Users 3. If server-2 does not respond, because the switch has no more servers to try in server-group-1, the switch attempts to authenticate using the next AAA method, which is the local method.
Page 284
Ways a DWS-1008 Switch Can Use EAP Network users with 802.1X support cannot access the network unless they are authenticated. You can configure a switch to authenticate users with EAP on a group of RADIUS servers and/or in a local user database on the switch, or to offload some authentication tasks from...
SSID wetlands, as an 802.1X user using the PEAP-MS-CHAP-V2 method via the server group shorebirds, which contains one or more RADIUS servers: DWS-1008# set authentication dot1x ssid wetlands Tamara peap-mschapv2 shorebirds When a user attempts to connect through 802.1X, the following events occur: 1.
Page 286
To offload both PEAP and MS-CHAP-V2 processing onto the switch, use the following command: DWS-1008# set authentication dot1x ssid marshes *@example.com peap-mschapv2 local Using Pass-Through The pass-through method causes EAP authentication requests to be processed entirely by remote RADIUS servers in server groups.
Page 287
Configuring AAA for Network Users For example, the following command authenticates 802.1X user Jose for wired authentication access via the local database: DWS-1008# set authentication dot1X Jose wired peap-mschapv2 local success: change accepted. Binding User Authentication to Machine Authentication Bonded Auth™ (bonded authentication) is a security feature that binds an 802.1X user’s authentication to authentication of the machine from which the user is attempting to log on.
Page 288
(Generally, in a Bonded Auth configuration, the RADIUS servers will use a user database stored on an Active Directory server.) D-Link recommends that you make the rules as general as possible. For example, if the Active Directory domain is mycorp.com, the following userglobs match on all machine names and users in the domain: •...
Page 289
By default, the Bonded Auth period is 0 seconds. MSS does not wait for a Bonded Auth user to reauthenticate. You can set the Bonded Auth period to a value up to 300 seconds. D-Link recommends that you try 60 seconds, and change the period to a longer value only if clients are unable to authenticate within 60 seconds.
Configuring AAA for Network Users The following command sets the Bonded Auth period to 60 seconds, to allow time for WEP users to reauthenticate: DWS-1008# set dot1x bonded-period 60 success: change accepted. Displaying Bonded Auth Configuration Information o display Bonded Auth configuration information, use the following command: show dot1x config...
Page 291
For example, to create a MAC user group called mac-easters with a 3000-second Session- Timeout value, type the following command: DWS-1008# set mac-usergroup mac-easters attr session-timeout 3000 success: change accepted. To configure a MAC user in the local database and optionally add the user to a group, use...
Page 292
For example, the following command sets the authentication for MAC address 01:01:02:03:04:05 when requesting SSID voice, via the local database: DWS-1008# set authentication mac ssid voice 01:01:02:03:04:05 local success: change accepted If the switch’s configuration does not contain a set authentication mac command that matches a non-802.1X client’s MAC address, MSS tries MAC authentication by default.
Page 293
Configuring AAA for Network Users For example, to add the MAC user 00:01:02:03:04:05 to VLAN red: DWS-1008# set mac-user 00:01:02:03:04:05 attr vlan-name red success: change accepted To change the value of an authorization attribute, reenter the command with the new value.
Note: Although MSS allows you to configure a user password for a last-resort user, the password has no effect. Last-resort users can never access a DWS-1008 switch in administrative mode and never require a password when authorized locally. However, if the last-resort user is authorized on a RADIUS server, the server might require a password.
DWS-1008 User’s Manual Configuring AAA for Network Users Configuring AAA for Users of Third-Party APs A switch can provide network access for users associated with a third-party AP that has authenticated the users with RADIUS. You can connect a third-party AP to a switch and configure the switch to provide authorization for clients who authenticate and access the...
Page 296
DWS-1008 User’s Manual Configuring AAA for Network Users Requirements Third-Party AP Requirements • The third-party AP must be connected to the switch through a wired Layer 2 link. MSS cannot provide data services if the AP and switch are in different Layer 3 subnets.
Page 297
The following command configures ports 3 and 4 as wired authentication ports, and assigns tag value 104 to the ports: DWS-1008# set port type wired-auth 3-4 tag 104 success: change accepted. You can specify multiple tag values. Specify the tag value for each SSID you plan to support.
Page 298
The following command maps SSID mycorp to packets received on port 3 or 4, using 802.1Q tag value 104: DWS-1008# set radius proxy port 3-4 tag 104 ssid mycorp success: change accepted. Enter a separate command for each SSID, and its tag value, you want the switch to support.
The table below lists the authorization attributes supported by MSS. (For brief descriptions of all the RADIUS attributes and D-link vendor-specific attributes supported by MSS, as well as the vendor ID and types for D-link VSAs configured on a RADIUS server, see Appendix B, “Supported RADIUS Attributes”).
Page 300
DWS-1008 User’s Manual Configuring AAA for Network Users Authentication Attributes for Local Users Attribute Description Valid Value(s) encryption-type Type of encryption One of the following numbers that required for access identifies an encryption algorithm: by the client. Clients • 1 - AES_CCM (Advanced...
Page 301
DWS-1008 User’s Manual Configuring AAA for Network Users filter-id Security access Name of an existing security ACL, control list (ACL), to up to 253 alphanumeric characters, (network access permit or deny traffic with no tabs or spaces. mode only) received (input) or •...
Page 302
DWS-1008 User’s Manual Configuring AAA for Network Users service-type Type of access the One of the following numbers: user is requesting. • 2 - Framed; for network user access • 6 - Administrative; for administrative access to the switch, with authorization to access the enabled (configuration) mode.
Page 303
(network access after authentication. configured in a service profile, and mode only) the service profile must be used by a radio profile assigned to D-link radios. start-date Date and time at Date and time, in the following which the user...
Page 304
DWS-1008 User’s Manual Configuring AAA for Network Users URL to which the Web URL, in standard format. For user is redirected example: (network access after successful mode only) http://www.example.com WebAAA. Note: You must include the http:// portion. You can dynamically include any of the variables in the URL string: •...
Page 305
Assigning a Security ACL Locally To use the local DWS-1008 switch database to restrict a user, a MAC user, or a group of users or MAC users to the permissions stored within a committed security ACL, use the...
Page 306
When you assign the Encryption-Type attribute to a user or group, the encryption type or types are entered as an authorization attribute into the user or group record in the local DWS- 1008 switch database or on the RADIUS server. Encryption-Type is a D-link vendor-specific attribute (VSA).
Page 307
DWS-1008# set mac-usergroup mac-fans attr encryption-type 12 success: change accepted. To clear an encryption type from the profile of a use or group of users in the local DWS-1008 switch database, use one of the following commands: clear user username attr encryption-type...
For example, you might want to enforce VLAN membership and security ACL policies on a particular DWS-1008 switch based on a client’s organization or physical location, or assign a VLAN to users who have no AAA assignment. For these situations, you can configure the location policy on the switch.
Page 309
The following command authorizes access to the guest_1 VLAN for all users who do not match *.ourfirm.com: DWS-1008# set location policy permit vlan guest_1 if user neq *.ourfirm.com The following command places all users who are authorized for SSID tempvendor_a into...
Page 310
For example, the following command authorizes users at *.ny.ourfirm.com to access the bld4.tac VLAN, and applies the security ACL tac_24 to the traffic they receive: DWS-1008# set location policy permit vlan bld4.tac outacl tac_24 if user eq *.ny. ourfirm.com The following command authorizes access to users on VLANs with names matching bld4.* and applies security ACLs svcs_2 to the traffic they send and svcs_3 to the traffic they...
To move the first rule to the end of the list and display the results, type the following commands: DWS-1008 clear location policy 1 success: clause 1 is removed. DWS-1008 set location policy deny if user eq *.theirfirm.com DWS-1008 show location policy Id Clauses ---------------------------------------------------------------- 1) permit vlan guest_1 if vlan neq *.ourfirm.com...
Page 312
Number of packets sent by the switch Viewing Local Accounting Records To view local accounting records, type the following command: DWS-1008# show accounting statistics Sep 26 11:01:48 Acct-Status-Type=START Acct-Authentic=2 User-Name=geetha AAA_ TTY_ATTR=2 Event-Timestamp=1064599308 Sept 26 12:50:21 Acct-Status-Type=STOP Acct-Authentic=2 User-Name=geetha AAA_...
Page 313
Acct-Status-Type=UPDATE Acct-Authentic=2 Acct-Multi-Session-Id=SESSION-4-1106424789 User-Name=Administrator@example.com Acct-Session-Time=209 Acct-Output-Octets=1280 Acct-Input-Octets=1920 Acct-Output-Packets=10 Acct-Input-Packets=15 Event-Timestamp=1053536700 Vlan-Name=default Calling-Station-Id=00-06-25-09-39-5D Nas-Port-Id=2/1 Called-Station-Id=00-0B-0E-76-56-A0 The user terminated the session on DWS-1008-0017: DWS-1008-0017# show accounting statistics May 21 17:07:32 Acct-Status-Type=STOP Acct-Authentic=2 Acct-Multi-Session-Id=SESSION-4-1106424789 User-Name=Administrator@example.com Acct-Session-Time=361 Event-Timestamp=1053536852 Acct-Output-Octets=2560 Acct-Input-Octets=5760 Acct-Output-Packets=20 Acct-Input-Packets=45 Vlan-Name=default Calling-Station-Id=00-06-25-09-39-5D...
DWS-1008 User’s Manual Configuring AAA for Network Users Displaying the AAA Configuration To view the results of the AAA commands you have set and verify their order, type the show aaa command. The order in which the commands appear in the output determines the order in which MSS matches them to users.
Configuration Producing an Incorrect Processing Order For example, suppose you initially set up start-stop accounting as follows for all 802.1X users via RADIUS server group 1: DWS-1008# set accounting dot1x ssid mycorp * start-stop group1 success: change accepted. D-Link Systems, Inc.
Page 316
You then set up PEAP-MS-CHAP-V2 authentication and authorization for all users at EXAMPLE/ at server group 1. Finally, you set up PEAP-MS-CHAP-V2 authentication and authorization for all users in the local DWS-1008 switch database, with the intention that EXAMPLE users are to be processed first:...
The Mobility Profile feature is disabled by default. You must enable Mobility Profile attributes on the switch to use it. You can enable or disable the feature for the whole DWS-1008 switch only. If the Mobility Profile feature is disabled, all Mobility Profile attributes are ignored.
2. Configure stop-only accounting for all mycorp users at EXAMPLE, for accounting records to be stored locally. Type the following command: DWS-1008# set accounting dot1x ssid mycorp EXAMPLE\* stop-only local success: change accepted. 3. Configure an ACL to filter the inbound packets for each user at EXAMPLE. Type the following command for each user: DWS-1008# set user EXAMPLE\username attr filter-id acl-101.in...
Page 319
---------------------------------------------------- 1. permit IP source IP 192.168.1.1 0.0.0.255 destination IP any enable-hits 5. Create a Mobility Profile called tulip by typing the following commands: DWS-1008# set mobility-profile name tulip port 2,4-6 success: change accepted. DWS-1008# set mobility-profile mode enable success: change accepted.
Page 320
1. Configure the RADIUS server r1 at IP address 10.1.1.1 with the string sunny for the key. Type the following command: DWS-1008# set radius server r1 address 10.1.1.1 key sunny 2. Configure the server group sg1 with member r1. Type the following command: DWS-1008# set server group sg1 members r1 3.
Page 321
1. To set authentication for all 802.1X users of SSID thiscorp, type the following command: DWS-1008# set authentication dot1x ssid thiscorp * peap-mschapv2 local 2. To add user Natasha to the local database on the switch, type the following command: DWS-1008# set user Natasha password moon 3.
Page 322
1. Configure the RADIUS server r1 at IP address 10.1.1.1 with the string starry for the key. Type the following command: DWS-1008# set radius server r1 address 10.1.1.1 key starry 2. Configure the server group sg1 with member r1. Type the following command: DWS-1008# set server group sg1 members r1 3.
Page 323
1. Configure the RADIUS server r1 at IP address 10.1.1.1 with the string starry for the key. Type the following command: DWS-1008# set radius server r1 address 10.1.1.1 key starry 2. Configure the server group sg1 with member r1. Type the following command: DWS-1008# set server group sg1 members r1 3.
Page 324
B. 1. Redirect bldga-prof- VLAN users to the VLAN bldgb-eng: DWS-1008# set location policy permit vlan bldgb-eng if vlan eq bldga-prof-* 2. Allow writing instructors from -techcomm VLANs to use the bldgb-eng VLAN: DWS-1008# set location policy permit vlan bldgb-eng if vlan eq *-techcomm 3.
DWS-1008 User’s Manual Configuring Communication with RADIUS Configuring Communication with RADIUS RADIUS Overview Remote Authentication Dial-In User Service (RADIUS) is a distributed client-server system. RADIUS servers provide a repository for all usernames and passwords, and can manage and store large groups of users.
Page 326
RADIUS servers in the server group are unresponsive and have entered the dead time. For failover authentication or authorization to work promptly, D-Link recommends that you change the dead time to a value other than 0. With the default setting, the dead time is never invoked and MSS does not hold down requests to unresponsive RADIUS servers.
Page 327
For example, the following command names a RADIUS server rs1 with the IP address 192.168.0.2 and the key testing123: DWS-1008# set radius server rs1 address 192.168.0.2 key testing123 success: change accepted. You can configure multiple RADIUS servers. When you define server names and keys, case is significant.
Configuring Communication with RADIUS Note: You must provide RADIUS servers with names that are unique. To prevent confusion, D-Link recommends that RADIUS server names differ in ways other than case. For example, avoid naming two servers RS1 and rs1. You can configure additional parameters with set radius server, such as the UDP ports used for AAA services and the timeout period.
Page 329
For example, to configure RADIUS servers pelican and seagull as the server group swampbirds with load balancing: 1. Configure the members of a server group by typing the following command: DWS-1008# set server group swampbirds members pelican seagull success: change accepted. 2. Enable load balancing by typing the following command: DWS-1008# set server group swampbirds load-balance enable success: change accepted.
Page 330
The RADIUS server coot is configured but not part of the server group shorebirds. 2. To add RADIUS server coot as the last server in the server group shorebirds, type the following command: DWS-1008# set server group shorebirds members sandpiper heron egret coot success: change accepted. Deleting a Server Group...
1. Configure RADIUS servers. Type the following commands: DWS-1008# set radius server pelican address 192.168.253.11 key elm DWS-1008# set radius server seagull address 192.168.243.12 key fir DWS-1008# set radius server egret address 192.168.243.15 key pine DWS-1008# set radius server sandpiper address 192.168.253.17 key oak...
Page 332
DWS-1008 User’s Manual Configuring Communication with RADIUS DWS-1008# show aaa Default Values authport=1812 acctport=1813 timeout=5 acct-timeout=5 retrans=3 deadtime=0 key=(null) author-pass=(null) Radius Servers Server Addr Ports T/o Tries Dead State ------------------------------------------------------------------------------------------- sandpiper 192.168.253.17 1812 1813 heron 192.168.253.12 1812 1813 egret 192.168.253.15...
Managing 802.1X Managing 802.1X Certain settings for IEEE 802.1X sessions on the DWS-1008 switch are enabled by default. For best results, change the settings only if you are aware of a problem with the switch’s 802.1X performance. For settings that you can reset with a clear command, MSS reverts to the default value.
For example, the following command forces port 19 to unconditionally authenticate all 802.1X authentication attempts with an EAP success message: DWS-1008# set dot1x port-control forceauth 19 success: authcontrol for 19 is set to FORCE-AUTH. Similarly, the following command forces port 12 to unconditionally reject any 802.1X attempts...
Page 335
The default is 5 seconds. The range for the retransmission interval is from 1 to 65,535 seconds. For example, type the following command to set the retransmission interval to 300 seconds: DWS-1008# set dot1x tx-period 300 success: dot1x tx-period set to 300.
Page 336
DWS-1008 User’s Manual Managing 802.1X Use the following command to disable WEP rekeying for broadcast and multicast keys: DWS-1008# set dot1x wep-rekey disable success: wep rekeying disabled Note: Reauthentication is not required for using this command. Broadcast and multicast keys are always rotated at the same time, so all members of a given radio and VLAN receive the new keys at the same time.
{enable | disable} Reauthentication is enabled by default. Type the following command to reenable reauthentication of clients: DWS-1008# set dot1x reauth enable success: dot1x reauthentication enabled. Setting the Maximum Number of 802.1X Reauthentication Attempts The following command sets the number of reauthentication attempts that the switch makes...
Page 338
For example, type the following command to set the number of seconds to 100 before reauthentication is attempted: DWS-1008# set dot1x reauth-period 100 success: dot1x auth-server timeout set to 100. Type the following command to reset the default timeout period: DWS-1008# clear dot1x reauth-period success: change accepted.
For example, type the following command to set the authorization server timeout to 60 seconds: DWS-1008# set dot1x timeout auth-server 60 success: dot1x auth-server timeout set to 60. To reset the authorization server timeout to the default, type the following command: DWS-1008# clear dot1x timeout auth-server success: change accepted.
The default is 30 seconds. The range of time is from 1 to 65,535 seconds. For example, type the following command to set the number of seconds for a timeout to 300: DWS-1008# set dot1x timeout supplicant 300 success: dot1x supplicant timeout set to 300. Type the following command to reset the timeout period: DWS-1008# clear dot1x timeout supplicant success: change accepted.
Page 341
DWS-1008 User’s Manual Managing 802.1X Viewing 802.1X Clients Type the following command to display active 802.1X clients: DWS-1008# show dot1x clients MAC Address State Vlan Identity -------------------------------------------------------------------------------------------------------------- 00:20:a6:48:01:1f Connecting (unknown) 00:05:3c:07:6d:7c Authenticated vlan-it EXAMPLE\smith 00:05:5d:7e:94:83 Authenticated vlan-eng EXAMPLE\jgarcia 00:02:2d:86:bd:38 Authenticated vlan-eng wong@exmpl.com...
Page 342
7, authcontrol: auto, max-sessions: 1 port 8, authcontrol: auto, max-sessions: 16 Viewing 802.1X Statistics Type the following command to display 802.1X statistics about connecting and authenticating: DWS-1008# show dot1x stats 802.1X statistic value ------------------------------------------------------------- Enters Connecting: Logoffs While Connecting:...
A session is a related set of communication transactions between an authenticated user (client) and the specific station to which the client is bound. Packets are exchanged during a session. A DWS-1008 switch supports the following kinds of sessions: • Administrative sessions - A network administrator managing the switch •...
Page 344
This will terminate manager sessions, do you wish to continue? (y|n) [y]y Displaying and Clearing Client Telnet Sessions To view administrative sessions of Telnet clients, type the following command: DWS-1008# show sessions telnet client Session Server Address Server Port Client Port ----------- ---------------------- ---------------- ---------------- 192.168.1.81...
You can clear all Telnet client sessions or a particular session. For example, the following command clears Telnet client session 1: DWS-1008# clear sessions telnet client 1 Displaying and Clearing Network Sessions Use the following command to display information about network sessions:...
Page 346
In the show sessions network commands, you can specify verbose to get more in-depth information. For example, to display detailed information for all network sessions, type the following command: DWS-1008> show sessions network verbose User Sess IP or MAC VLAN...
Page 347
2 sessions match criteria (of 3 total) Use the verbose keyword to see more information. For example, the following command displays detailed session information about nin@example.com: DWS-1008> show sessions network user nin@example.com verbose User Sess IP or MAC VLAN...
Page 348
For example, to clear all sessions for MAC address 00:01:02:04:05:06, type the following command: DWS-1008# clear sessions network mac-addr 00:01:02:04:05:06 Displaying and Clearing Network Sessions by VLAN Name You can view all session information for a specific VLAN or VLAN glob. To see all network...
Page 349
ID number. clear sessions network session-id session-id For example, the following command deletes network session 9: DWS-1008# clear sessions network session-id 9 SM Apr 11 19:53:38 DEBUG SM-STATE: localid 9, mac 00:06:25:09:39:5d, flags 0000012fh, to change state to KILLING...
• Rogue - The device is in the D-Link network but does not belong there. • Interfering device - The device is not part of the D-Link network but also is not a rogue. No client connected to the device has been detected communicating with any network entity listed in the forwarding database (FDB) of any switch.
Page 351
DWS-1008 User’s Manual Rogue Detection and Countermeasures Rogue Detection Lists Rogue detection lists specify the third-party devices and SSIDs that MSS allows on the network, and the devices MSS classifies as rogues. You can configure the following rogue detection lists: •...
Page 352
DWS-1008 User’s Manual Rogue Detection and Countermeasures Radios perform both types of scans on all channels allowed for the country of operation. (This is the regulatory domain set by the set system countrycode command.) 802.11b/g radios scan in the 2.4 GHz to 2.4835 GHz spectrum. 802.11a radios scan in the 5.15 GHz to 5.85 GHz spectrum.
DWS-1008 User’s Manual Rogue Detection and Countermeasures Dynamic Frequency Selection (DFS) Some regulatory domains require conformance to ETSI document EN 301 893. Section 4.6 of that document specifies requirements for Dynamic Frequency Selection (DFS). These requirements apply to radios operating in the 5 GHz band (802.11a radios).
Page 354
RF detection. MSS does not classify devices on this list as rogues or interfering devices, and does not issue countermeasures against them. Packets sent by D-Link APs to interfere with the operation of a rogue. Countermeasures are configurable a radio-profile basis.
By default, the permitted vendor list is empty and all vendors are allowed. If you configure a permitted vendor list, MSS allows only the devices whose OUIs are on the list. The permitted vendor list applies only to the switch on which the list is configured. DWS-1008 switches do not share permitted vendor lists.
Page 356
By default, the permitted SSID list is empty and all SSIDs are allowed. If you configure a permitted SSID list, MSS allows traffic only for the SSIDs that are on the list. The permitted SSID list applies only to the switch on which the list is configured. DWS-1008 switches do not share permitted SSID lists.
Page 357
MSS. MSS can place a client in the black list due to an association, reassociation or disassociation flood from the client. The client black list applies only to the switch on which the list is configured. DWS-1008 switches do not share client black lists.
Page 358
MAC addresses of APs and clients. By default, the attack list is empty. The attack list applies only to the switch on which the list is configured. DWS-1008 switches do not share attack lists. To add an entry to the list, use the following command:...
Page 359
11:22:33:44:55:66 is no longer in attacklist. Configuring an Ignore List By default, when countermeasures are enabled, MSS considers any non-D-Link transmitter to be a rogue device and can send countermeasures to prevent clients from using that device. To prevent MSS from sending countermeasures against a friendly device, add the device to...
The rogue option enables or disables countermeasures for rogues only. The following command enables countermeasures in radio profile radprof3 for rogues only: DWS-1008# set radio-profile radprof3 countermeasures rogue success: change accepted. To disable countermeasures on a radio profile, use the following command: clear radio-profile name countermeasures...
Disabling or Reenabling Logging of Rogues By default, a DWS-1008 switch generates a log message when a rogue is detected or disappears. To disable or reenable the log messages, use the following command: set rfdetect log {enable | disable}...
Page 362
DWS-1008 User’s Manual Rogue Detection and Countermeasures Flood Attacks A flood attack is a type of Denial of Service attack. During a flood attack, a rogue wireless device attempts to overwhelm the resources of other wireless devices by continuously injecting management frames into the air. For example, a rogue client can repeatedly send association requests to try to overwhelm APs that receive the requests.
Page 363
• Spoofed AP - A rogue device pretends to be a D-Link AP by sending packets with the source MAC address of the D-Link AP. Data from clients that associate with the rogue device can be accessed by the hacker controlling the rogue device.
Page 364
DWS-1008 User’s Manual Rogue Detection and Countermeasures Disallowed Devices or SSIDs You can configure the following types of lists to explicitly allow specific devices or SSIDs: • Permitted SSID list - MSS generates a message if an SSID that is not on the list is detected.
Page 365
DWS-1008 User’s Manual Rogue Detection and Countermeasures Management Client aa:bb:cc:dd:ee:ff is sending rsvd mgmt frame 7 flood frame 7 message flood. Seen by AP on port 2, radio 1 on channel 11 with RSSI -53. Management Client aa:bb:cc:dd:ee:ff is sending rsvd mgmt frame D flood...
Page 366
DWS-1008 User’s Manual Rogue Detection and Countermeasures Fake AP SSID FakeAP SSID attack detected from aa:bb:cc:dd: (when source ee:ff. MAC address is Seen by AP on port 2, radio 1 on channel 11 with known) RSSI -53 SSID myssid. Fake AP SSID FakeAP BSSID attack detected.
Displays the BSSIDs detected show rfdetect visible mac-addr by a specific D-Link radio. show rfdetect visible ap ap-num [radio {1 | 2}] show rfdetect visible dap dap-num [radio {1 | 2}]...
Page 368
DWS-1008 User’s Manual Rogue Detection and Countermeasures Displaying Rogue Clients To display the wireless clients detected by a DWS-1008 switch, use the following command: show rfdetect clients [mac mac-addr] The following command shows information about all wireless clients detected by a switch’s...
Page 369
DWS-1008 User’s Manual Rogue Detection and Countermeasures DWS-1008# show rfdetect counters Type Current Total -------------------------------------------------- ------------ ------------ Rogue access points Interfering access points 1116 Rogue 802.11 clients Interfering 802.11 clients 802.11 adhoc clients Unknown 802.11 clients Interfering 802.11 clients seen on wired network 802.11 probe request flood...
Page 370
[radio {1 | 2}] To following command displays information about the rogues detected by radio 1 on AP port DWS-1008# show rfdetect visible ap 3 radio 1 Total number of entries: 104 Flags: i = infrastructure, a = ad-hoc...
DWS-1008 User’s Manual Managing System Files Managing System Files A DWS-1008 switch contains nonvolatile storage. MSS allows you to manage the files in nonvolatile storage. In addition, you can copy files between the switch and a TFTP server on the network.
Page 372
BootLoader: 1.19 / 1.7.4 To also display DWL-8220AP access point information, type the following command: DWS-1008# show version details Mobility System Software, Version: 3.0.0 Copyright (c) 2003,2004 by D-Link Systems, Inc Build Information: (build#75) TOP 2004-06-30 07:25:00 Model: DWS-1008 Hardware Mainboard: version 0 ;...
DWS-1008 User’s Manual Managing System Files In this example, the switch is running software version 1.1.0. The switch used the 010100.020 image file in boot partition boot1 and the configuration configuration file for the most recent reboot. The switch is set to use image file DWS010100.008 in boot partition boot0 and configuration file newconfig for the next reboot.
Page 374
DWS-1008 User’s Manual Managing System Files The following command displays the files in the old subdirectory: DWS-1008# dir old ============================================================= file: Filename Size Created file:configuration.txt 3541 bytes Sep 22 2003, 22:55:44 file:configuration.xml 24 KB Sep 22 2003, 22:55:44 Total: 27 Kbytes used, 207824 Kbytes free...
Page 375
To copy the file floor2 from nonvolatile storage to a TFTP server, type the following command: DWS-1008# copy floor2 tftp://10.1.1.1/floor2 success: sent 365 bytes in 0.401 seconds [ 910 bytes/sec] The above command copies the file to the same filename on the TFTP server. To rename the file when copying it, type the following command:...
Page 376
Note: MSS does not prompt you to verify whether you want to delete a file. When you press Enter after typing a delete command, MSS immediately deletes the specified file. D-Link recommends that you copy a file to a TFTP server before deleting the file.
DWS-1008 User’s Manual Managing System Files DWS-1008# mkdir corp2 success: change accepted. DWS-1008# dir ============================================================= file: Filename Size Created file:configuration 17 KB May 21 2004, 18:20:53 file:configuration.txt 379 bytes May 09 2004, 18:55:17 corp2/ 512 bytes May 21 2004, 19:22:09...
Page 378
192.168.253.11 severity critical set timezone PST -8 0 set summertime PDT start first sun apr 2 0 end last sun oct 2 0 set system name DWS-1008 set system countrycode US set system contact trapeze-pubs set radius server r1 address 192.168.253.1 key sunflower...
Page 379
To use a different configuration file in nonvolatile storage after rebooting, use the following command: set boot configuration-file filename To configure a DWS-1008 switch to load the configuration file floor2 from nonvolatile storage following the next software reboot, type the following command: DWS-1008# set boot configuration-file floor2 success: boot config set.
Page 380
Caution: This command completely removes the running configuration and replaces it ith the configuration contained in the file. D-Link recommends that you save a copy of he current running configuration to a backup configuration file before loading a new configuration.
file can be quite large if the user area contains image files. This is the default for the backup command. Note: If the archive’s files cannot fit on the switch, the restore operation fails. D-Link recommends deleting unneeded image files before creating or restoring an archive.
Page 382
DWS-1008 User’s Manual Managing System Files Caution: Do not use the force option unless advised to do so by D-Link TAC. If you restore one switch’s system files onto another switch, you must generate new key pairs and certificates on the switch.
MSS areas. Some show commands are particularly useful in troubleshooting. The show tech-support command combines a number of show commands into one, and provides an extensive snapshot of your switch configuration settings for the D-Link Technical Support. Fixing Common Setup Problems The table below contains remedies for some common problems that can occur during basic installation and setup of a DWS-1008 switch.
Page 384
DWS-1008 User’s Manual Appendix A - Troubleshooting Switch does not The country code 1. Type the show system command to display the accept configuration might not be set country code configured on information for an or might be set for the switch.
The restart switch on a DWS-1008 switch is also located next to its serial console port. 2. When you see descending numbers on the console, press any key.
Page 386
DWS-1008 User’s Manual Appendix A - Troubleshooting Log Message Components Each log message contains the following components: Field Description Facility Portion of MSS that is affected Date Time and date the message is generated Severity Severity level of the message.
Page 387
Note. The debug level produces a lot of messages, many of which can appear to be somewhat cryptic. Debug messages are used primarily by D-Link for troubleshooting and are not intended for administrator use. Using Log Commands To enable, disable, or modify system logging to the switch’s log buffer, console, current Telnet...
Page 388
For example, to set logging to the buffer for events at the warning level and higher, type the following command: DWS-1008# set log buffer severity warning success: change accepted. To view log entries in the system log buffer, use the following command:...
Page 389
To filter the event log by MSS area, use the facility facility-name keyword. For a list of facilities for which you can view event messages, type the following command: DWS-1008# show log buffer facility ? <facility name> Select one of: KERNEL, AAA, SYSLOGD, ACL, APM, ARP,ASO,...
Page 390
For example, the following command sends all error-level event messages generated by a switchto a server at IP address 192.168.153.09 and identifies them as facility 5 messages: DWS-1008# set log server 192.168.153.09 severity error local-facility 5 success: change accepted. To stop sending log messages to a syslog server, use the following command:...
Page 391
To enable current session logging, type the following command: DWS-1008# set log current enable success: change accepted To disable current session logging, type the following command:...
Caution: Using the set trace command can have adverse effects on system performance. D-Link recommends that you use the lowest levels possible for initial trace commands, and slowly increase the levels to get the data you need.
Page 393
Tracing 802.1X sessions can help diagnose problems with wireless clients. For example, to trace 802.1X activity for user tamara@example.com at level 4, type the following command: DWS-1008# set trace dot1x user tamara@example.com level 4 success: change accepted. Displaying a Trace Use the show trace command to show the trace areas that are enabled.
Page 394
Because traces use the logging facility, any other logging target can be used to capture trace messages if its severity is set to debug. However, since tracing can be voluminous, D-Link discourages this in practice. To enable trace output to the console, enter the command set log console severity debug.
Page 395
[{+|-|/}number-of-messages] [facility facility-name] [matching string] [severity severity-level] For example, the following command displays a trace log of error-level events: DWS-1008# show log trace severity error KERNEL Jan 15 23:08:10 ERROR duplicate IP address 10.7.122.102 sent from link address 00:05:5d:45:ae:cd To display a specific number of trace log messages, you must enter a plus sign (+), minus...
DWS-1008 User’s Manual Appendix A - Troubleshooting DWS-1008# copy 0000000001 tftp://192.168.253.11/log-file Clearing the Trace Log To clear all messages from the trace log buffer, type the following command: DWS-1008# clear log trace List of Trace Areas To see all MSS areas you can trace, type the following command:...
Page 397
DWS-1008 User’s Manual Appendix A - Troubleshooting Server groups sg1: SideShow SQA: SQA2BServer set authentication dot1x *@xmpl.com pass-through sg1 set authentication dot1x *@xmpl.com pass-through SQA set authentication dot1x EXAMPLE\* peap-mschapv2 sg1 user sqa password = 08325d4f (encrypted) session-timeout = 3600...
DWS-1008 User’s Manual Appendix A - Troubleshooting The show arp command displays the ARP aging timer and ARP entries in the system. To display ARP information, type the following command: DWS-1008# show arp ARP aging time: 1200 seconds Host HW Address...
Page 399
AP Mar 25 13:15:21.681369 ERROR DAP 3 ap_network: Observer 10.10.101.2 is not accepting TZSP packets To prevent ICMP error messages from the observer, D-Link recommends using the Netcat application on the observer to listen to UDP packets on the TZSP port.
Page 400
The snap-length num option specifies the maximum number of bytes to capture. If you do not specify a length, the entire packet is copied and sent to the observer. D-link recommends specifying a snap length of 100 bytes or less.
Page 401
If the filter does not have an observer, the AP still maintains a counter of the number of packets that match the filter. The following command maps snoop filter snoop1 to radio 2 on Distributed AP 3: DWS-1008# set snoop map snoop1 dap 3 radio 2 success: change accepted. Displaying the Snoop Filters Mapped to a Radio To display the snoop filters that are mapped to a radio, use the following command:...
Page 402
filter-name dap dap-num radio {1 | 2} The following command removes snoop filter snoop2 from radio 2 on Distributed AP 3: DWS-1008# clear snoop map snoop2 dap 3 radio 2 success: change accepted. To remove all snoop filter mappings from all radios, use the following command:...
Page 403
DWS-1008 User’s Manual Appendix A - Troubleshooting The following command shows statistics for snoop filter snoop1: DWS-1008# show snoop stats snoop1 Filter Radio Rx Match Tx Match Dropped Stop-After ============================================================= snoop1 stopped Preparing an Observer and Capturing Traffic To observe monitored traffic, install the following applications on the observer: •...
Capturing System Information for Technical Support For problems you cannot solve yourself, use the show tech-support command to generate a report of your switch’s configuration and status, which you can show to the D-link Technical Support. Displaying Technical Support Information The show tech-support command combines a group of show commands to provide an in-depth snapshot of the status of the switch.
Appendix B - Supported RADIUS Attribites Supported RADIUS Attributes D-Link’s Mobility System Software (MSS) supports the standard and extended RADIUS authentication and accounting attributes listed at the bottom. An attribute is sent to RADIUS accounting only if the table listing it shows Yes or Optional in the column marked Sent in Accounting-Request for the attribute and the attribute is applied to the client’s session configuration.
Page 406
DWS-1008 User’s Manual Appendix B - Supported RADIUS Attribites Service- Access type, which can be one of the Type following: • 2 - Framed; for network user access • 6 - Administrative; for administrative access to the switch, with authorization to access the enabled (configuration) mode.
Page 407
If received, this information must be sent on, without interpretation, in all subsequent packets sent to the RADIUS server for that client session. Vendor- String. Allows MSS to support D-Link Specific VSAs. Session- Maximum number of seconds of service Timeout allowed the user before reauthentication of the session.
Page 408
DWS-1008 User’s Manual Appendix B - Supported RADIUS Attribites Acct-Input- Number of octets received from the Octets port over the course of this service being provided. Can be present only in Accounting-Request records in which Acct-Status-Type is set to Acct-Stop or Acct-Interim-Update.
Page 409
DWS-1008 User’s Manual Appendix B - Supported RADIUS Attribites Acct-Input- Number of times the Acct-Input-octets Gigawords counter has wrapped around 2 over the course of this service being provided. Can be present only in Accounting- Request records in which Acct-Status- Type is set to Acct-Stop or Acct-Interim- Update.
Note: Use of the MSS DHCP server to allocate client addresses is intended for temporary, demonstration deployments and not for production networks. D-Link recommends that you do not use the MSS DHCP server to allocate client addresses in a production network.
DWS-1008 User’s Manual Appendix C - DHCP Server How the MSS DHCP Server Works When MSS receives a DHCP Discover packet, the DHCP server allocates an address from the configured range according to RFC 2131 and ARPs the address to ensure that it is not already in use.
Appendix C - DHCP Server The following command enables the DHCP server on VLAN red-vlan to serve addresses from the 192.168.1.5 to 192.168.1.25 range: DWS-1008# set interface red-vlan ip dhcp-server enable start 192.168.1.5 stop 192.168.1.25 success: change accepted. To remove all IP information from a VLAN, including the DHCP client and user-configured...
Page 413
DWS-1008 User’s Manual Appendix C - DHCP Server DHCP Clients: Hardware Address: 00:01:02:03:04:05 State: BOUND Lease Allocation: 43200 seconds Lease Remaining: 12345 seconds IP Address: 10.10.20.2 Subnet Mask: 255.255.255.0 Default Gateway: 10.10.20.1 DNS Servers: 10.10.20.4 10.10.20.5 DNS Domain Name: mycorp.com In addition to information for addresses leased from the VLANs where you configured the...
DWS-1008 User’s Manual Appendix D - Glossary Glossary 3DES A three-round application of the Data Encryption Standard (DES) that uses a 168-bit encryption key. See also DES. 802.1D The IEEE LAN specification for the operation of media access control (MAC) bridges.
Page 415
The DWS-1008 switch can use a RADIUS server or its own local database for AAA services. access control entry See ACE.
Page 416
(AP) A hardware unit that acts as a communication hub by linking wireless mobile IEEE 802.11 stations such as PCs to a wired backbone network. A D-Link Mobility System has DWL-8220AP access points. See also ad hoc network; infrastructure network.
Page 417
DWL-8220AP access point. Bias can be set to either low or high on each DWS-1008 switch and is high by default. Bias applies only to switches that are indirectly attached to the AP through an intermediate Layer 2 or Layer 3 network. An AP always attempts to boot on AP port 1 first, and if the AP is directly attached to a switch on AP...
Page 418
DWS-1008 User’s Manual Appendix D - Glossary Basic service set. A set of wireless stations that communicate with one another through an access point (AP). BSSID Basic service set identifier. The 48-bit media access control (MAC) address of the radio in the access point (AP) that serves the stations in a basic service set (BSS).
Page 419
DWS-1008 User’s Manual Appendix D - Glossary Challenge Handshake Authentication Protocol See CHAP. CHAP Challenge Handshake Authentication Protocol. An authentication protocol that defines a threeway handshake to authenticate a user (client). CHAP uses the MD5 hash algorithm to generate a response to a challenge that can be checked by the authenticator. For wireless...
Page 420
DWS-1008 User’s Manual Appendix D - Glossary cryptography The science of information security. Modern cryptography is typically concerned with the processes of scrambling ordinary text (known as plain text or clear text) into encrypted text at the sender’s end of a connection, and decrypting the encrypted text back into clear text at the receiver’s end.
Page 421
DWS-1008 User’s Manual Appendix D - Glossary DHCP Dynamic Host Configuration Protocol. A protocol that dynamically assigns IP addresses to stations, from a centralized server. DHCP is the successor to the Bootstrap Protocol (BOOTP). dictionary attack An attempt to gain illegal access to a computer or network by logging in repeatedly with passwords that are based on a list of terms in a dictionary.
Page 422
file. dual-homed connection A redundant, resilient connection between a DWL-8220AP access point and a DWS-1008 switch. The connection can consist of two direct physical links from both AP ports to one or two switches, one or more distributed links through an intermediate Layer 2 or Layer 3 network, or a combination of one direct physical link and one or more distributed links.
Page 423
Extended service set. A logical connection of multiple basic service sets (BSSs) connected to the same network. Roaming within an ESS is guaranteed by the D-Link Mobility System. Ethernet II The original Ethernet specification produced by Digital, Intel, and Xerox (DIX) that served as the basis of the IEEE 802.3 standard.
Page 424
DWS-1008 User’s Manual Appendix D - Glossary ETSI European Telecommunications Standards Institute. A nonprofit organization that establishes telecommunications and radio standards for Europe. European Telecommunications Standards Institute See ETSI. extended service set See ESS. Extensible Authentication Protocol See EAP. Extensible Markup Language See XML.
Page 425
Appendix D - Glossary forwarding database (FDB) A database maintained on a DWS-1008 switch for the purpose of making Layer 2 forwarding and filtering decisions. Each entry consists of the media access control (MAC) address of a source or destination device, an identifier for the port on which the source or destination station is located, and an identifier for the virtual LAN (VLAN) to which the device belongs.
Page 426
HPOV Hewlett-Packard Open View. The umbrella network management system (NMS) family of products from Hewlett-Packard. The D-Link Mobility System RingMaster tool suite interacts with the HPOV Network Node Manager (NNM). HTTPS Hypertext Transfer Protocol over Secure Sockets Layer. An Internet protocol developed by Netscape to encrypt and decrypt network connections to Web servers.
Page 427
A DWS-1008 switch uses IGMP snooping to monitor the Internet Group Management Protocol (IGMP) conversation between hosts and routers. When the switch detects an IGMP report from a host for a given multicast group, it adds the host’s port number to the list for that group.
Page 428
Like most corporate wireless LANs (WLANs), which must access a wired LAN for file servers and printers, a D-Link Mobility System is an infrastructure network. Compare ad hoc network. initialization vector (IV) In encryption, random data used to make a message unique.
Page 429
See also location policy rule. location policy rule A rule in the location policy on a DWS-1008 switch that grants or denies a set of network access rights based on one or more criteria. Location policy rules use a username or VLAN membership to determine whether to override—or supply—authorization attributes during...
Page 430
MAC service data unit See MSDU. managed device In a D-Link network wireless LAN (WLAN), a DWS-1008 switch or DWL-8220AP access point under the control of the RingMaster tool suite. master secret A code derived from the pre-master secret. A master secret is used to encrypt Transport Layer Security (TLS) authentication exchanges and also to derive a pairwise master key (PMK).
Page 431
Mobility System Software™ (MSS™) The Trapeze operating system, accessible through a command-line interface (CLI) or Web View, that enables D-Link Mobility System products to operate as a single system. Mobility System Software (MSS) performs authentication, authorization, and accounting (AAA) functions; manages DWS-1008 switches and DWL-8220AP access points; and maintains the wireless LAN (WLAN) by means of such network structures as MobileLAN groups, virtual LANs (VLANs), tunnels, spanning trees, and link aggregation.
Page 432
DWS-1008 User’s Manual Appendix D - Glossary Maximum transmission unit. The size of the largest packet that can be transmitted over a particular medium. Packets exceeding the MTU value in size are fragmented or segmented, and then reassembled at the receiving end. If fragmentation is not supported or possible, a packet that exceeds the MTU value is dropped.
Page 433
DWS-1008 User’s Manual Appendix D - Glossary PEAP Protected Extensible Authentication Protocol. A draft extension to the Extensible Authentication Protocol with Transport Layer Security (EAP-TLS), developed by Microsoft Corporation, Cisco Systems, and RSA Data Security, Inc. TLS is used in PEAP Part 1 to authenticate the server only, and thus avoids having to distribute user certificates to every client.
Page 434
A RingMaster feature that allows you to apply a collection of configuration settings known as a domain policy, or part of the policy, to one or more DWS-1008 switches. With Policy Manager, you can also merge some or all of the configuration changes you make to a single switch into a domain policy.
Page 435
DWS-1008 User’s Manual Appendix D - Glossary Pseudorandom function. A function that produces effectively unpredictable output. A PRF can use multiple iterations of one or more hash algorithms to achieve its output. The Transport Layer Security (TLS) protocol defines a specific PRF for deriving keying material.
Page 436
DWS-1008 User’s Manual Appendix D - Glossary Public-Key Cryptography Standards See PKCS. public-key infrastructure See PKI. PVST+ Per-VLAN Spanning Tree protocol. A proprietary Cisco protocol that supports a separate instance of the Spanning Tree Protocol (STP) for each virtual LAN (VLAN) in a network and maps the multiple spanning trees to a single tree, to comply with the IEEE 802.1Q...
Page 437
DWS-1008 User’s Manual Appendix D - Glossary registration authority (RA) Network software that verifies a user (client) request for a digital certificate and instructs the certificate authority (CA) to issue the certificate. Registration authorities are part of a public-key infrastructure (PKI), which enables secure exchanges of information over a network.
Page 438
filter packets that are entering or exiting it. Associating a security ACL with a particular user, port, virtual LAN (VLAN), or virtual port on a DWS-1008 switch controls the network traffic to or from the user, port, VLAN, or virtual port. The rules in an ACL are known as access control entries (ACEs).
Page 439
IEEE 802 networks. Wireless clients and DWL-8220AP access points are stations in a D-Link Mobility System. Spanning Tree Protocol. A link management protocol, defined in the IEEE 802.1D standard, that provides path redundancy while preventing undesirable loops in a network.
Page 440
Appendix D - Glossary subnet mobility The ability of a wireless user (client) to roam across DWL-8220AP access points and DWS-1008 switches in a virtual LAN (VLAN) while maintaining a single IP address and associated data sessions. supplicant A client that is attempting to access a network.
Page 441
To forward traffic for a roaming user, a DWS-1008 switch that is not a member of the user’s virtual LAN (VLAN) creates a tunnel to another switch on which the user’s VLAN is configured.
Page 442
Layer 2 switches, with each VLAN operating as a separate switch, or make multiple devices members of multiple logical Layer 2 networks. By default, all DWS-1008 switch ports are members of VLAN 1, which is named default. VLAN glob...
Page 443
Web View A Web-based application for configuring and managing a single DWS-1008 switch and its attached DWL-8220AP access points through a Web browser. Web View uses a secure connection that implements Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS).
Page 444
DWS-1008 User’s Manual Appendix D - Glossary wildcard mask A 32-bit quantity used with an IP address to determine which bits in the address to ignore in a comparison with another IP address. When setting up security access control lists (ACLs), you specify source and destination IP addresses and corresponding wildcard masks by which the switch determines whether to forward or filter packets.
Page 445
DWS-1008 User’s Manual Appendix D - Glossary WPA information element See WPA IE. X.500 A standard of the International Organization for Standardization (ISO) and International Telecommunications Union Telecommunication Standardization Sector (ITU-T), for systematically collecting the names of people in an organization into an electronic directory that can be part of a global directory available to anyone in the world with Internet access.
DWS-1008 User’s Manual Appendix E - Technical Specifications Technical Specifications Hardware Specifications Physical and Environmental • Dimensions (W x D x H): 17.4 x 8.2 x 1.72 in (44.2 x 20.8 x 4.4 cm) • Weight: 5.2lbs (3kg) • Operating Temperature: 0ºC to 40ºC (32ºF to 104ºF)
Page 447
DWS-1008 User’s Manual Appendix E - Technical Specifications Technical Specifications (continued) EMI / EMC • FCC PART 15 • ICES PART 15 • VCCI • EN 55022 • EN 55024 • EN 60101-1-2 (1993) • CISPR 22 Software Specifications IEEE •...
D-Link’s sole obligation shall be to repair or replace the defective Hardware during the Warranty Period at no charge to the original owner or to refund at D-Link’s sole discretion. Such repair or replacement will be rendered by D-Link at an Authorized D-Link Service Office.
Page 450
Period from the date or original retail purchase. If a material non-conformance is incapable of correction, or if D-Link determines in its sole discretion that it is not practical to replace the non-conforming Software, the price paid by the original licensee for the non-conforming Software will be refunded by D-Link;...
Page 451
DWS-1008 User’s Manual Appendix F - Warranty D-Link may reject or return any product that is not packaged and shipped in strict compliance with the foregoing requirements, or for which an RMA number is not visible from the outside of the package. The product owner agrees to pay D-Link’s reasonable handling and...
Page 452
Appendix F - Warranty Limitation of Liability: TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK IS NOT LIABLE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY LOSS OF USE OF THE PRODUCT, INCONVENIENCE OR DAMAGES...
Page 453
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. • Consult the dealer or an experienced radio/TV technician for help. For detailed warranty outside the United States, please contact corresponding local D-Link office. FCC Caution: The manufacturer is not responsible for any radio or TV interference caused by unauthorized modifications to this equipment;...
DWS-1008 User’s Manual Appendix G - Registration Registration Product registration is entirely voluntary and failure to complete or return this form will not diminish your warranty rights. Revised: 10/12/2005 Version 1.00 D-Link Systems, Inc.