D-Link DWS-3160 Series Hardware Installation Manual - Features
DWS-3160 Series Gigabit Ethernet Unified Switch Hardware Installation Guide
2
Features
This Switch series is action packed with an abundance of networking features that span inside and outside of the
traditional Layer 2 framework making it truly a Layer 2+ Switch. The list below highlights the significant protocols and
features supported by this Switch.
Local Area Networking (LAN) features that can be found on this Switch series are:
•
Virtual Stacking otherwise known as Clustering.
•
A 16K MAC Address Table.
•
Flow Control with Head-Of-Line blocking prevention.
•
Jumbo Frame of up to 13Kb.
•
Internet Group Management Protocol (IGMP)
Snooping Versions 1, 2, and 3.
•
Internet Group Management Protocol (IGMP)
Authentication.
•
Multicast Listener Discovery (MLD) Snooping Version
1 and 2.
•
Spanning Tree Protocols like 802.1D STP, 802.1w
RSTP, and 802.1s MSTP.
•
BPDU Attack Protection.
•
D-Link Loopback Detection Version 4.0.3
•
Link Aggregation (IEEE 802.3ad).
•
Port Mirroring that includes RSPAN.
•
Link Layer Discovery Protocol (LLDP).
•
Network Load Balancing (NLB).
•
Layer 2 Protocol Tunneling (L2PT).
•
PPPoE Circuit-ID Tag Insertion.
•
Virtual LAN (VLAN) using the IEEE 802.1Q protocol.
•
VLAN Grouping.
•
Voice VLAN and Guest VLAN.
•
Port-based, MAC-based, and Protocol-based VLAN.
•
Asymmetric VLAN and ISM VLAN.
•
VLAN Trunking and Private VLAN.
•
Static Routing.
•
Virtual Router Redundancy Protocol (VRRP).
•
Quality Of Service (QoS)
•
Queue Handling (Strict and Weighted Round Robin).
•
Class of Service (CoS).
•
Bandwidth Control.
•
Layer 3, Control Packet Filtering.
•
Access Control Lists (ACLs), Ingress and Egress
ACLs.
•
CPU Interface Filtering (Software ACL).
•
Secure Shell (SSH).
•
Secure Sockets Layer (SSL).
•
Port Security.
•
Storm Control (Unicast/Broadcast/Multicast).
•
Traffic Segmentation
•
D-Link Safeguard Engine.
•
DHCP Server Screening.
•
ARP Spoofing Prevention.
•
Filter Database (FDB) Security.
•
NetBIOS/NetBEUI Filtering.
•
DoS Prevention.
•
Proxy ARP.
•
Access Authentication Control.
•
IEEE 802.1X Network Access Control.
•
Captive Portal.
•
MAC-based Access Control (MAC).
•
Compound Authentication.
•
Microsoft
®
Network Access Protection (NAP).
•
RADIUS Accounting and Authentication.
•
User Account Privileges.
•
Trusted Hosts.
•
Authentication Database Failover Enhancement.
•
Command Logging.
•
Web-based GUI Management.
•
Command Line Interface (CLI) Management.
•
Telnet Server/Client and TFTP Client.
•
Simple Network Management Protocol (SNMP).
•
SNMP Traps.
•
Trap/Alarm/Log Severity Control.
•
RMON Version 1 and 2.
•
sFLOW.
•
DHCP Auto-configuration, Client and Relay.
•
Multiple Image and Configuration support.
•
CPU Monitoring.
•
Password Encryption and Recovery.
•
IPv6 Neighbor Discovery (ND).
•
Internet Control Message Protocol (ICMP).
•
Simple Mail Transfer Protocol (SMTP).
•
SD Card Management.
•
Cable Diagnostics.
•
Ethernet Link OAM (IEEE 802.3ah).
•
Power Saving.
•
Time-based Power-over-Ethernet (PoE).
•
Wi-Fi Multimedia Power Save (WMM-PS).
•
Intelligent Green Network (D-Link Green 3.0).
•
D-Link License Management System (DLMS).
•
TACACS+ Authentication