On the test, I will use the D-Link DES-1210-28/ME rev.B2 switch with firmware 6.07.B002.Continue reading “D-Link DES-1210-28/ME firmware update”
For example, I will update D-Link DIR-615 with the old firmware 1.0.19 to version 2.5.4.Continue reading “D-Link DIR-615 firmware update”
On the test, I will update the firmware of the D-Link DSL-2640NRU modem from version 1.0.0 to 1.0.32.Continue reading “D-Link DSL-2640NRU firmware upgrade”
D-Link DIR-400 is a rather old router model.
I will describe the steps in steps:Continue reading “D-Link DIR-400 Firmware Update”
For example, I will flash the D-Link DSL-2500U modem with firmware 1.0.47 for version 1.0.50.Continue reading “D-Link DSL-2500U Firmware Update”
For example, I will update the D-Link DSL-2600U modem with firmware 1.0.1 to version 1.0.5.Continue reading “D-Link DSL-2600U firmware upgrade”
In this article I will give an example of setting up port security on D-Link switches.
With Port Security, the ports on D-Link switches can limit the number of devices allowed to connect to the network.
Continue reading “Configuring Port Security on D-Link Switches”
I will give an example of setting up SNMP Traps sending on D-Link switches.
For example, I will take the switches D-Link DES-3200-x:
Create an SNMP password:
create snmp community public view CommunityView read_only
We indicate which host and with which password the traps should be sent:
create snmp host x.x.x.x v2c public
We indicate the change in the state of which ports to send traps:
config snmp link_traps ports 01-24 disable config snmp link_traps ports 25-26 enable
Check the configuration of sending snmp traps with the command:
show snmp traps
Check the configuration of sending snmp traps on the status of ports with the command:
show snmp traps link_traps
At the end of the command, you can digitize port numbers.
See also my article:
Installing and using Net-SNMP
To flash the D-Link DSR-150 router, take the following necessary steps in steps:
1) Let’s look at the revision on the label under the router and download the new firmware from it from the official site http://www.dlink.ru/ru/products/9/1697_d.html
Firmware router not under the revision can lead to its failure.
2) Open the settings of the router by typing in the browser the address http://192.168.1.1 (maybe 192.168.0.1) and enter the standard login – admin, the password – admin.
3) In the opened interface at the top, open the “Tools” tab, on the left, select “Firmware“. On the page that opens, the current firmware version will be displayed, if it is older than the downloaded one, then click “Browse” and select the previously downloaded firmware file, then click “Upgrade” to start the process updates.
Wait until the update is complete, usually 2-5 minutes. At the end, the router will reboot.
For example, I will use the D-Link DES-3200 switch, on other models the setting for LoopBack Detection is essentially the same.
Activation of the LoopBack Detection (LBD) function on the switch:
Enabling LoopBack Detection on ports 1 through 16:
config loopdetect ports 1-16 state enable
Setting recover_timer (time in seconds for which the port will be disabled if a loop is detected), interval (interval between sending loop detection packets), mode (port-based — port is blocked or vlan-based — vlan traffic is blocked in which a loop is detected):
config loopdetect recover_timer 300 interval 10 mode port-based
Let us configure that it is written to the log that a loop was detected and the traps were not sent:
config loopdetect log state enable config loopdetect trap none
In the web interface, you can configure this feature in the “L2 Features” – “Loopback Detection Settings”.