Configuring SNMP Traps on D-Link Switches

I will give an example of setting up SNMP Traps sending on D-Link switches.
For example, I will take the switches D-Link DES-3200-x:

Create an SNMP password:

create snmp community public view CommunityView read_only

We indicate which host and with which password the traps should be sent:

create snmp host x.x.x.x v2c public

We indicate the change in the state of which ports to send traps:

config snmp link_traps ports 01-24 disable
config snmp link_traps ports 25-26 enable

Check the configuration of sending snmp traps with the command:

show snmp traps

Check the configuration of sending snmp traps on the status of ports with the command:

show snmp traps link_traps

At the end of the command, you can digitize port numbers.

See also my article:
Installing and using Net-SNMP

D-Link DSR-150 router firmware upgrade

To flash the D-Link DSR-150 router, take the following necessary steps in steps:

1) Let’s look at the revision on the label under the router and download the new firmware from it from the official site

Firmware router not under the revision can lead to its failure.

2) Open the settings of the router by typing in the browser the address (maybe and enter the standard login – admin, the password – admin.

3) In the opened interface at the top, open the “Tools” tab, on the left, select “Firmware“. On the page that opens, the current firmware version will be displayed, if it is older than the downloaded one, then click “Browse” and select the previously downloaded firmware file, then click “Upgrade” to start the process updates.

Wait until the update is complete, usually 2-5 minutes. At the end, the router will reboot.

Is done.

Configuring LoopBack Detection on D-Link Switches

For example, I will use the D-Link DES-3200 switch, on other models the setting for LoopBack Detection is essentially the same.

Activation of the LoopBack Detection (LBD) function on the switch:

enable loopdetect

Enabling LoopBack Detection on ports 1 through 16:

config loopdetect ports 1-16 state enable

Setting recover_timer (time in seconds for which the port will be disabled if a loop is detected), interval (interval between sending loop detection packets), mode (port-based — port is blocked or vlan-based — vlan traffic is blocked in which a loop is detected):

config loopdetect recover_timer 300 interval 10 mode port-based

Let us configure that it is written to the log that a loop was detected and the traps were not sent:

config loopdetect log state enable
config loopdetect trap none

In the web interface, you can configure this feature in the “L2 Features” – “Loopback Detection Settings”.