D-Link DGS-1510 Series Firmware User Manual

June 13, 2024
D-Link

D Link LOGO DGS-1510 Series Firmware Release Notes

DGS-1510 Series Firmware

Firmware Version: V1.81.004
Prom Code Version: V1.00.016
Published: 2023/08/30
These release notes include important information about D-Link DGS-1510 Series firmware revisions. Please verify that these release notes are correct for your switch:

  • If you are installing a new switch, please check the hardware version on the device label; make sure that your switch meets the system requirement of this firmware version. Please refer to Revision History and System Requirement for detailed firmware and hardware matrix.
  • If the switch is powered on, you can check the hardware version by typing “show version” command or by checking the device information page on the web graphic user interface.
  • If you plan to upgrade to the new firmware release, please refer to the Upgrade Instructions:

D-Link switches support firmware upgrade via TFTP server. You can download the firmware from D-Link web site http://tsd.dlink.com.tw , and copy the downloaded firmware to the TFTP server folder. Please make sure that the TFTP server is accessible from the switch via networks.
For more detailed information regarding DGS-1510 Series switch products, please refer to Related Documentation.
You can also download the switch firmware, D-View modules and technical documentation from http://tsd.dlink.com.tw.

Revision History and System Requirement

Firmware Version Date Model Hardware Version

Runtime: v1.81.004
PROM: v1.00.016| 2023/08/30| DGS-1510| A1/A2
Runtime: v1.70.012
PROM: v1.00.016| 2020/02/26| DGS-1510| A1/A2
Runtime: v1.60.012
PROM: v1.00.016| 2018/11/5| DGS-1510| A1/A2
Runtime: v1.50.021 PROM: v1.00.015 (due to new models addition, DGS-1510-52XMP A1 & DGS-1510-52X A2, no impact to existing models)| 2018/01/12| DGS-1510| A1/A2
Runtime: v1.40.019
PROM: v1.00.012| 2017/09/10| DGS-1510| A1
Runtime: v1.30.007
PROM: v1.00.012| 2015/10/20| DGS-1510| A1
Runtime: v1.20.011
PROM: v1.00.012| 2015/5/2| DGS-1510| A1
Runtime: v1.10.005
PROM: v1.00.011| 2014/5/21| DGS-1510| A1
Runtime: v1.00.031
PROM: v1.00.009| 2014/1/15| DGS-1510| A1
Runtime: v1.00.029
PROM: v1.00.009| 2014/1/13| DGS-1510| A1

Upgrade Instructions:

D-Link switches support firmware upgrade via TFTP server. You can download the firmware from
D-Link web site http://tsd.dlink.com.tw , and copy the downloaded firmware to the TFTP server folder. Please make sure that the TFTP server is accessible from the switch via networks.
Upgrade using CLI (RJ-45 console port)
Connect a workstation to the switch console port and run any terminal program that can emulate a VT-100 terminal. The switch console port default settings are as follows:

  • Baud rate: 115200
  • Data bits: 8
  • Parity: None
  • Stop bits: 1

The switch will prompt the user to enter his/her username and password. The default username and password are as below:
Username: admin
Password: admin
To upgrade the switch firmware, execute the following commands:

Command Function
copy tftp://location/filename flash: filename Download firmware file from the

TFTP server to the switch.
boot image URL(filename)| Change the boot up image file.
show boot| Display the information of current boot image and configuration.
reboot| Reboot the switch.

Example:
DGS-1510#copy tftp: //192.168.0.27/firmware.had flash: run.had
Address of remote host [192.168.0.27] Source filename [firmware.had] Destination filename [run.had] Accessing tftp://192.168.0.27/ firmware.had…
Transmission start…
Transmission finished, file length 5156864 bytes.
Please wait, programming flash… Done
DGS-1510#configure terminal
DGS-1510(config)#boot image c:/switch-image1.had
DGS-1510#show boot
Unit 1
Boot image: /c:/1.20.B014
Boot config: /c:/config.cfg
DGS-1510#reboot
Are you sure you want to proceed with the system reboot? (y|n) y
Please wait, the switch is rebooting…
Upgrading by using Web-UI

  1. Connect a workstation installed with java SE runtime environment to management port of the device and also connect console cable to switch’s console port.

  2. Open the web browser from the workstation and enter the IP address of the switch. The switch’s default IP address is 10.90.90.90

  3. Enter administrator’s username and password when prompted. It should be noted starting from R1.20 formal firmware release the default login settings are as below:
    Username: admin
    Password: admin

  4. To update switch’s firmware or configuration file via TFTP, select Tools > Firmware Upgrade & Backup > Firmware Upgrade from TFTP.D Link DGS 1510 Series Firmware - TFTP

  5. Enter the TFTP Server IP address.

  6. Enter the name of the firmware file located on the TFTP server.

  7. Enter the destination path and the desired file name.

  8. Click “Upgrade” button.D Link DGS 1510 Series Firmware - Upgrade

  9. Transmission will start and wait until the status is completed by displaying 100% complete.

  10. Alternatively, the switch’s firmware or configuration file can also be upgraded via HTTP, select Tools > Firmware Upgrade & Backup > Firmware Upgrade from HTTP.D Link DGS 1510 Series Firmware - configuration

  11. Enter the source and destination file.

  12. Click “Upgrade” button.D Link DGS 1510 Series Firmware - destination

  13. Transmission will start and wait until the status is completed by displaying 100% complete.

  14. To select the boot up image used for next reboot, click Management > Flash System in the function tree and then click the C: drive name. When you see the files list, click corresponding Boot Up button to specify the firmware that will be used for next and subsequent boot up.D Link DGS 1510 Series Firmware - Boot UpD Link DGS 1510 Series Firmware - Boot Up 2

  15. To reboot the switch, select Tools > Reboot System from the banner.D Link DGS 1510 Series Firmware - Reboot System

  16. Select Yes and click Reboot button to reboot the switch.D Link DGS 1510 Series Firmware - Reboot

New Features

Firmware Version New Features
V1.81.004 1. Enhance SSH Weak Algorithms(CLI only)

2. Add IP Routing(CLI only)
3. DGS-1510-52XMP add PoE IC 2nd Source (HW version A1->A2 )
V1.70.012| 4. VLAN Wizard (Web UI only)
5. “Do” command to support “Do show” option with “? & ” (CLI only)
6. DHCP Server
7. “Show interfaces gbic” command (CLI only)
V1.60.012| 1. Changing output’s format when executing show running config command
2. Removing Java from web page
3. Set one boot image on stacked units
4. Display slave’s information of stacked unit via “show tech-support” command
5. IGMP V3 protocol
6. “Do” command in EXEC mode
7. Configure Secondary IP setting via IPv4 interface in Web UI
V1.50.021| 1. Login Banner
2. Exec Banner
3. Supports Monitor logging in CLI
4. Session timeout (for outgoing remote session)
5. “show interface xx description” command in CLI
6. Add logging feature for ARP Spoofing Prevention
7. Enhance static multicast mac address table from 128 to 256
8. Supports SHA-256 for SSH
9. Enhance RADIUS Accounting for Command Logging (for TACACS+ accounting ONLY)
V1.40.019| 1.  Add UDP helper
2. Enhance the show logging output for stacking features
3. Enhance priority between IP Source Guard and user-defined ACL
4. Change IPv6 Route Advertisement from host to router mode
5. Add LBD v4.07
6. Add Auto Surveillance VLAN 2.0
7. Add stacking MIBs for G2 CLI, swUnitMgmtStartPort,swUnitMgmtPortRange
8. Add TLS 1.2
9. Enhance CLI for “Show running-config” with output modifiters [effective | all] [interface INTERFACE-ID] 10. Enhanced login page for Web UI to have the “username : admin” being filled in
11. Enhance Trap Source Interface in “SNMP Global Setting” page
12. Add PD-Alive
V1.30.007| 1. Add a New encryption method based on MD5
2. MAC-based VLAN
3. Protocol-based VLAN
4. Telnet Client (w/o MIB/Web)
5. SSH & telnet session timeout behavior change
6. Displaying web UI sessions in “show users” command
7. VLAN Cloning in web UI
8. Auto saving of configuration made from DDP protocol
9. Update a new web UI top image
V1.20.011| 1.  Add NTP (RFC5905)
2. Modify IP interface from 8 to 16
3. Modify STP edge default settings to “True”
4. Add ERPS
5. Add sFlow
6.  Add default username (admin) & password (admin)
V1.10.005| 1. Existing 4 models can now Physical Stack with 2 new members (DGS-1510-28X & DGS-1510-52X)
2. Add BPDU Attack Protection
3. Add the Command “Trace route”
4. Add the Command “prompt” for customizing CLI prompt
5. Add “Login Method” page for Web UI (for telnet session setup requirements under Web UI)
6. Supports D-Link’s new IP Cameras’ MAC Address ranges: B0:C5:54:00:00:00 ~ B0:C5:54:7F:FF:FF for Auto Surveillance VLAN
7. Modify user-defined OUI of Auto Surveillance VLAN & Auto Voice VLAN from 5 to 10
8. Modify web-UI’s smart wizard to include a last step for configuring username & password
V1.00.031| None
V1.00.029| First release, please refer to datasheet and manual for detail function support

Changes of MIB & D-View Module

The new features of MIB file are also included in the corresponding D-View module. Please download the D-View module on http://tsd.dlink.com.tw. For detailed changes of MIB content, please refer to the modification history in each MIB file.

Firmware Version MIB File
V1.81.004 None
V1.70.012 Update the following MIBs:

1. DLINKSW-DHCP6-SERVER-MIB.mib
V1.60.012| Update the following MIBs:
1. DLINKSW-IPMCAST-EXT-MIB.mib
2. DLINKSW-NETWORK-PROTOCOL-PORT-PROTECT.mib
V1.50.021| Update the following MIBs:
1. DLINKSW-SYSLOG-MIB.mib
2. DLINKSW-ASP-MIB.mib
3. DLINKSW-SURVEILLANCE-VLAN-MIB
4. SWDGS1510PRIMGMT-MIB
V1.40.019| Modify the below MIBs:
1. DLINKSW-STACK-MIB.mib
2. DLINKSW-SSL-MIB.mib
3. DLINKSW-IP-EXT-MIB.mib
4. DLINKSW-ACL-MIB.mib
5. IP-MIB.mib
6. DLINKSW-SURVEILLANCE-VLAN-MIB.mib
7. DLINKSW-POE-MIB.mib
V1.30.007| 1. Add new feature UDP helper in D-View
2. Add new feature MAC Based VLAN in D-View
3. Add new feature Protocol Based VLAN in D-View
V1.20.011| 1.  Add DLINKSW-SFLOW-MIB
2. Add DLINKSW-ERPS-MIB
3. Add DLINKSW-NTP-MIB
V1.10.005| 1. Add DLINKSW-BPDU-PROTECTION-MIB.mib
2. Add DISMAN-TRACEROUTE-MIB.mib
3. Modify DGS-1510 Series Physical Stacking for 6 models in D-View (2 new models DGS-1510-28X, DGS-1510-52X)
4. Add new features BPDU Protection in D-View
5. Add new features Trace Route in D-View
V1.00.031| None
V1.00.029| First release, please refer to datasheet for detail MIB support

Changes of Command Line Interface

The section below only shows command line changes that may bring backward compatibility issues with configuration settings for previous version of firmware.
Any new feature commands that do not have backward compatibility issues are not included in the below section.

Firmware Version Changes
V1.81.004 1. IP routing:

ip routing
no ip routing
2. SSH Weak Algorithms:
ip ssh server algorithm encryption { [aes128-cbc] [aes192-cbc] [aes256-cbc] [3des-cbc] [blowfish-cbc] [twofish128-cbc] [twofish192-cbc] [twofish256-cbc] [arcfour] [cast128-cbc] }
no ip ssh server algorithm encryption { aes128-cbc | aes192-cbc | aes256-cbc |
3des-cbc | blowfish-cbc | twofish128-cbc | twofish192-cbc | twofish256-cbc |
arcfour | cast128-cbc }
ip ssh server algorithm mac { [hmac-sha1] [hmac-sha1-96] [hmac-md5] [hmac- md5-96] [hmac-sha2-256]}
no ip ssh server algorithm mac {hmac-sha1| hmac-sha1-96 | hmac-md5 |
hmac-md5-96 | hmac-sha2-256}
ip ssh server algorithm hostkey {[ssh-dss] [ssh-rsa]}
no ip ssh server algorithm hostkey {ssh-dss| ssh-rsa}
V1.70.012| 1. Do command
do show command
2. TLS
crypto pki certificate generate
3. Show interfaces gbic
show interfaces gbic
4. CoA
aaa server radius dynamic-author
no aaa server radius dynamic-author
authentication command bounce-port ignore
no authentication command bounce-port ignore
authentication command disable-port ignore
no authentication command disable-port ignore
5. DHCP option 82
ip dhcp relay information option format remote-id {default| string STRING |
vendor2 | vendor3 | expert-udf [standalone_unit_format {0|1} ]}
ip dhcp relay information option format circuit-id { default | string STRING |
vendor1| vendor2| vendor3| vendor4 | vendor5 | vendor6 | expert-udf
[standalone_unit_format {0|1} ]}
ip dhcp relay information option format-type remote-id { vendor3 string STRING |
expert-udf NAME }
ip dhcp relay information option format-type circuit-id { vendor3 string STRING |
expert-udf NAME }
ip dhcp relay information option mac-format case {lowercase | uppercase}
delimiter{hyphen | colon | dot | none } number {1 | 2 | 5}
6. DHCP Server
address range START-IP-ADDRESS END-IP-ADDRESS
no address range START-IP-ADDRESS END-IP-ADDRESS
boofile URL
no bootfile
clear ip dhcp {all | pool NAME } binding { | IP-ADDRESS}
clear ip dhcp {all | pool NAME } conflict {
| IP-ADDRESS}
clear ip dhcp server statistics
class NAME
no class NAME
client-identifier IDENTIFIER
no client-identifier
default-router IP-ADDRESS [IP-ADDRESS2 … IP-ADDRESS8] no default-router IP- ADDRESS [IP-ADDRESS2 … IP-ADDRESS8] domain-name NAME
no domain-name
dns-server IP-ADDRESS [IP-ADDRESS2 … IP-ADDRESS8] no dns-server IP-ADDRESS [IP-ADDRESS2 … IP-ADDRESS8] hardware-address HARDWARE-ADDRESS
no hardware-address
host {IP-ADDRESS MASK | IP-ADDRESS/PREFIX-LENGTH}
no host
ip dhcp class NAME
no ip dhcp class NAME
ip dhcp excluded-address START-IP-ADDRESS END-IP-ADDRESS
no ip dhcp excluded-address START-IP-ADDRESS END-IP-ADDRESS
ip dhcp ping packets COUNT
no ip dhcp ping packets
ip dhcp ping timeout MILLI-SECONDS
no ip dhcp ping timeout
ip dhcp pool NAME
no ip dhcp pool NAME
ip dhcp use class
no ip dhcp use class
lease { DAYS [HOURS [ MINUTES]] | infinite }
no lease
netbios-node-type NTYPE
no netbios-node-type
netbios-name-server IP-ADDRESS [IP-ADDRESS2 … IP-ADDRESS8] no netbios-name- server IP-ADDRESS [IP-ADDRESS2 … IP-ADDRESS8] next-server IP-ADDRESS
no next-server
network {NETWORK-ADDRESS MASK | NETWORK-ADDRESS /PREFIX-LENGTH }
no network
option CODE hex PATTERN [] [bitmask MASK] no option CODE hex PATTERN [] [bitmask MASK] service dhcp
no service dhcp
show ip dhcp binding [IP-ADDRESS] show ip dhcp conflict [ IP-ADDRESS] show ip dhcp pool [NAME] show ip dhcp server
show ip dhcp server statistics
7. DHCPv6 Server
address prefix IPV6-PREFIX/PREFIX-LENGTH [ lifetime VALID-LIFETIME
PREFERRED-LIFETIME ] no address prefix
address-assignment IPV6-ADDRESS CLIENT-DUID [ iaid IAID ] [ lifetime
VALID-LIFETIME PREFERRED-LIFETIME ] no address-assignment IPV6-ADDRESS CLIENT- DUID [ iaid IAID ] clear ipv6 dhcp binding { all | IPV6-ADDRESS}
domain-name DOMAIN-NAME
no domain-name
dns-server IPV6-ADDRESS
no dns-server IPV6-ADDRESS
ipv6 dhcp excluded-address LOW-ADDRESS [ HIGH-ADDRESS ] no ipv6 dhcp excluded- address LOW-ADDRESS [ HIGH-ADDRESS ] ipv6 dhcp pool POOL-NAME
no ipv6 dhcp pool POOL-NAME
ipv6 dhcp server POOL-NAME [rapid-commit] [preference VALUE ] [allow-hint] no ipv6 dhcp server
ipv6 local pool POOL-NAME IPV6-PREFIX / PREFIX-LENGTH ASSIGNED-LENGTH
no ipv6 local pool POOL-NAME
prefix-delegation IPV6-PREFIX / PREFIX-LENGTH CLIENT-DUID [ iaid IAID ] [ lifetime VALID-LIFETIME PREFERRED-LIFETIME ] no prefix-delegation IPV6-PREFIX / PREFIX-LENGTH
prefix-delegation pool POOL-NAME [ lifetime VALID-LIFETIME
PREFERRED-LIFETIME ] no prefix-delegation pool POOL-NAME
service ipv6 dhcp
no service ipv6 dhcp
show ipv6 dhcp [interface [INTERFACE-ID]] show ipv6 dhcp binding [IPV6-ADDRESS] show ipv6 dhcp pool [POOL-NAME] show ipv6 excluded-address
show ipv6 local pool [ POOL-NAME ] show ipv6 dhcp operation
V1.60.012| 1. Network Protocol Port Protect
network-protocol-port protect {tcp | udp}
no network-protocol-port protect {tcp | udp}
show network-protocol-port protect
2. IP Multicasting
ip multicast table-lookup-mode { ip | mac}
no ip multicast table-lookup-mode
show ip multicast
3. Boot image command
boot image [check] [all] URL
4. Tech Support command
show tech-support [unit UNIT-ID] debug show tech-support [unit UNIT-ID] 5. Do Command
do COMMAND
V1.50.021| 1. “show interface xx description” command in CLI:
show interfaces [INTERFACE-ID [,|-] ] description
V1.40.019| 1. LBD
loopback-detection address-type { multicast | broadcast }
no loopback-detection address-type
2. Surveillance VLAN
surveillance vlan onvif-discover-port <value 554, 1025-65535>
no surveillance vlan onvif-discover-port
surveillance vlan onvif-ipc IP-ADDRESS state {enable | disable}
no surveillance vlan onvif-ipc IP-ADDRESS state
surveillance vlan onvif-ipc IP-ADDRESS description TEXT
no surveillance vlan onvif-ipc IP-ADDRESS description
surveillance vlan onvif-nvr IP-ADDRESS description TEXT
no surveillance vlan onvif-nvr IP-ADDRESS description
show surveillance vlan onvif-ipc interface [ INTERFACE-ID [, | -] ] {brief | detail }
show surveillance vlan onvif-nvr interface [ INTERFACE-ID [, | -] ] [ipc-list] 3. UDP helper
ip helper-address IP-ADDRESS
no ip helper-address [ IP-ADDRESS ] ip forward-protocol udp [PORT] no ip forward-protocol udp [PORT] show ip helper-address [INTERFACE-ID] show ip forward-protocol udp
4. ACL
Add “vlan-range MIN-VID MAX-VID” option
5. TSL 1.2
ssl-service-policy POLICY-NAME
[version [ssl3.0] [tls1.0] [tls1.1] [tls1.2] ] |
[ ciphersuite
[dhe-dss-3des-ede-cbc-sha] [rsa-3des-ede-cbc-sha] [rsa-rc4-128-sha] [rsa- rc4-128-md5] [rsa-export-rc4-40-md5] [rsa-aes-128-cbc-sha] [rsa-aes-256-cbc- sha] [rsa-aes-128-cbc-sha256] [rsa-aes-256-cbc-sha256] [dhe-dss-aes-256-cbc- sha] [dhe-rsa-aes-256-cbc-sha] ] |
secure-trustpoint TRUSTPOINT |
session-cache-timeout TIME-OUT ] no ssl-service-policy POLICY-NAME
[version [ssl3.0] [tls1.0] [tls1.1] [tls1.2] ] |
[ ciphersuite
[dhe-dss-3des-ede-cbc-sha] [rsa-3des-ede-cbc-sha] [rsa-rc4-128-sha] [rsa- rc4-128-md5] [rsa-export-rc4-40-md5] [rsa-aes-128-cbc-sha] [rsa-aes-256-cbc- sha] [rsa-aes-128-cbc-sha256] [rsa-aes-256-cbc-sha256] [dhe-dss-aes-256-cbc- sha] [dhe-rsa-aes-256-cbc-sha] ] |
6. SNMP
no snmp-server host { | }
[]
V1.30.007| New encryption method based on MD5
1. username NAME [privilege LEVEL] [nopassword | password [0 | 7 | 15 ] PASSWORD] 2. enable password [level PRIVILEGE-LEVEL] [0| 7 | 15 ] PASSWORD
3. service password-encryption [ 7 | 15 ] Telnet Client (w/o MIB/Web)
1. telnet [IP-ADDRESS | IPV6-ADDRESS | Domain Name ] [TCP-PORT] Displaying web UI sessions in “show users” command
1. clear line LINE-ID
V1.20.011| None
V1.10.005| None
V1.00.031| None
V1.00.029| First release

Problem Fixed

Firmware Version Changes
V1.81.004 1. Fixed DGS-1510 ip route problem[DRU20220202000001-Russia]] 2.

Fixed Exception while creating more than 50 VLANs via WebUI.
3. Fixed SSH vulnerability finding in DGS-1510-28X[IMA20220817000005-India]] 4. Fixed Gbic display info on switch [DGC20220914000002-Taiwan] 5. Fixed PortSpeed in PortSettings is ignored [DEUR20220927000001-Central Europe] 6. Fixed SSH client issue[DEUR20221114000004-Eastern Europe] 7. Fixed problem voice vlan or DHCP [DRU20211028000004-Russia] 8. Fixed SSH Feature Host Key still exist through Web GUI factory reset
9. Fixed customer complains about VLAN and Stacking [DEUR20211109000003-Central Europe] 10. Fixed stacking can’t be enabled by Web or Console [DEUR20211110000003-Central Europe] 11. Fixed unable to save the config in web gui or CLI[DI20211006000010-Singapore] 12. Fixed customer complains about PoE implementation [DEUR20210915000003-Central Europe] 13. Fixed Can’t save configuration to flash, can’t upload firmware[DEUR20210921000007-Eastern Europe] 14. Fixed ip dhcp snooping trust[DEUR20210913000003-Eastern Europe] 15. Fixed DHCP Relay [DUSA20210729000001-USA] 16. Fixed ipv6 get snmp response information issue [DGC20210630000001-Taiwan] 17. Fixed Update SIM [DEUR20210414000009-South Europe] 18. Fixed inteface VLAN[DRU20210326000003-Russia] 19. Fixed DEM- 431XT gbic information issue[DGC20210324000001-Taiwan] 20. Fixed Trusted host[DEUR20210203000005-South Europe] 21. Fixed Unable to reflect login account after restoring config file [DI20210127000004-Japan] 22. Fixed DGS-1510 models are not saving the Link Aggregation description after reboot. [DUSA20210121000002-Canada] 23. Fixed User permissions (Privilege Levels).[DUSA20201210000001-Canada] 24. Fixed WEB UI – Adobe Flash Player[DEUR20201028000003-South Europe] 25. Fixed Failed to configure the Server IP and Profile Name of DHCP Server Screening Port Settings via SNMP
26. Fixed Failed to configure the outbound mode of sFlow sampler settings via SNMP
27. Update Lack of the value for the ‘Network’ option on MIB ‘ieee8021SpanningTreeRstpPortAdminEdgePort’
28. Fixed Failed to configure TACACS+ and RADIUS global IPv6 source interface settings via SNMP
29. Fixed Failed to configure to absolute on the aging type of port security port settings via SNMP
30. Fixed The profile name larger than 17 characters is not accepted via the MIB ‘dDhcpFilterProfileName’, but size list is 1-32
31. Fixed DHCP packet issue with DHCP Snooping[DEUR20200904000003-Eastern Europe] 32. Fixed doesn’t reach 1,000 authenticated MACs in MBA after several re-authentication period.[DI20200512000002-Japan] 33. Fixed delivers power- inline once after reboot in an out of time range. [DI20200423000005-Japan] 34. Snyc DGS-3620 field issue with LLDP[DRU20191001000001-Russia] 35. Fixed Unable to use underscore “_” sing in snmp system name [DEUR20200423000001] 36. Fixed ifInDiscards packets[DEUR20200302000004-North Europe] 37. Snyc DGS-1250 field issue- cosmetic issue logging via WebUI [DRU20200421000005-Russia]
V1.70.012| 1. Fixed PoE’s power utilization ratio in relation to total PoE budget in a given switch (DUSA20181018000003-Canada)
2. Fixed multicast filtering-mode bug of not saving the configuration when executing a change (DUSA20181109000001-USA)
3. Fixed “Reset System” bug under webUI environment (DRU20181128000004-Russia)
4. Fixed SSH RSA’s bug when host key generated was not initialized after a reboot (DRU20181128000002-Russia)
5. Fixed an issue when deleting an admin account with a pop-up warning message (DRU20181128000003-Russia)
6. Fixed “show tech-support” bugs when the switch resources are hogged by physical stacking and not able to process STP packets (DI20190118000001, DI20190401000002-Japan)
7. Fixed “show tech-support” bug where its output is incomplete and providing wrong information (DI20190118000004-Japan)
8. Fixed default IP address bug when it was not successfully removed after being saved and rebooted (DI20190129000002-Japan)
9. Fixed Physical Stacking & User Authentication bugs when a new stack master was elected and the admin is not able to SSH into it (DI20190122000003, DI20190122000004, DI20190221000001-Japan)
10. Fixed a bug where switch is sending a wrong OID (DI20190118000006-Japan)
11. Fixed MAC based Access Control bug when its database is out of sync and caused its operation to fail (DI20190214000004-Japan)
12. Fixed DHCP Snooping bug when modifying VLAN settings (DRU20190221000002-Russia)
13. Fixed Physical Stacking missing stacking member bug (DRU20190221000002-Russia)
14. Fixed DHCP Snooping binding bug of displaying wrong VLAN ID (DRU20190219000003-Russia)
15. Fixed Recurring date daylight savings setting bug in WebUI (DI20190304000001-Australia)
16. Fixed default admin account’s configuration modification bug of not taking effect after a reboot (DEUR20190226000006-Europe)
17. Fixed VLAN interface bug where it is displaying wrong configuration in WebUI’s edit page (DEUR20190329000004-Europe)
18. Fixed NTP bug in Slave switches under Physical Stacking environment (DEUR20190329000004-Europe)
19. Fixed 802.1X bug when working with 2 Radius Servers (DRU20190619000002-Russia)
20. Fixed DHCP Snooping’s bug when Voice VLAN is enabled & bug in Physical Stacking where slave switches firmware upgrade process timeout (DRU20190401000007-Russia)
21. Fixed Voice VLAN bug when working with Avaya IP phone (DRU20190401000006)
22. Fixed 10G port bug when forcing it to 1 Gigabit speed mode (DEUR20181211000001-Europe)
23. Fixed Radius Accounting’s Session ID bug (DLA20190425000004-DLA)
24. Fixed Admin account’s bug where it is still present after being deleted. This happened when a switch config is restored via cfg file process (DRU20190911000005-Russia)
25. Fixed Radius Source Interface bug of not applying the correct IP address of the Network Access Server (DLA20190925000001-DLA)
26. Fixed DHCP Snooping process bug of always hogging CPU resources (DI20190312000001-Japan)
27. Fixed ‘show tech-support’ process bug by enlarging & enhancing its memory utilization (DI20190307000003-Japan)
28. Fixed ‘show tech-support’ bug of not able to display slave switches [under Physical Stacking] information via telnet/SSH (DI20190315000001-Japan)
29. Fixed RADIUS Attribute’s bug of applying the wrong Service-type (DI20190325000004-Japan)
30. Fixed IPv6 MLD Snooping’s static group bug of not being saved (DI20190903000007-Japan)
31. Fixed & enhanced the process of running the command “debug copy tech- support tftp: “ via tftp server (DI20190605000001-Japan)
V1.60.012| 1. Fixed http secure server bug of not synchronizing properly (DI20171204000001-Japan)
2. Fixed Secondary IP interface is not being shown when configured (DI20180418000003, DI20171129000004-Japan)
3. Fixed memory overflow bug on ARP aging-time feature (DI20171130000004-Japan)
4. Fixed STP & LBD bug, which is able to enable in the same port (DI20171218000002, DI20180418000006-Japan)
5. Fixed SNTP syntax error in Web UI (DI20180222000004, DI20180418000004-Japan)
6. Fixed CLI charset default to ASCII (DI20180213000003, DI20180418000005-Japan)
7. Fixed UDP BLAT attack function missing from DoS feature (DI20180223000004, DI20180419000001-Japan)
8. Fixed Web UI syntax error under Traditional Chinese (DGC20180227000001-Taiwan)
9. Fixed LLDP-MED bug where its setting is missing in the output of “show run configuration” (DRU20180306000001-Russia)
10. Fixed DGS-1510-52XMP’s Fan & PoE bug issues (DEUR20180228000005, DEUR20180201000003-Europe)
11. Fixed time zone format to function seamlessly with DNA (DI20180131000002-Australia)
12. Fixed trace route TTL error bug (DEUR20180329000001-Europe)
13. Fixed web UI “save configuration” bug issue (DEUR20180403000007-Europe)
14. Fixed CLI command listing displayed in descending order instead of ascending (DI20180528000003-Japan)
15. Fixed command “debug copy tech-support” bug issue (DI20180522000002-Japan)
16. Modified the behavior to include ‘clear port description’ via checkbox in web UI (DRU20180529000004-Russia)
17. Fixed translation error in Italian (DEUR20180531000005-Europe)
18. Fixed SNMP server source interface priority error bug (DI20180524000003-Japan)
19. Fixed Voice VLAN & LLDP-MED bug issue (DRU20180409000002-Russia)
20. Fixed “VLAN interface” setting’s bug in web UI (DI20180606000003-Japan)
21. Fixed session timeout bug of not timing out & shut session after preset time is exceeded (DEUR20180709000001-Europe)
22. Fixed default admin account re-appearance bug after it was deleted (DUSA20180726000003-USA)
23. Enhance the feature of clone VLAN as well as to support cloning cross units under physical stacking environment (DRU20180806000002-Russia)
24. Fixed coding/programming errors in RADIUS (DI20180803000001-Australia)
25. Fixed & enhanced auto-negotiation issue (DI20170203000004, DI20180302000008-Japan)
26. Fixed IP source guard bug issue (DGC20171121000001-Taiwan)
27. Fixed SNMPv6 response time bug issue (DGC20180619000001-Taiwan)
28. Fixed DHCP Snooping bug issue (DRU20180830000002-Russia)
29. Fixed IPv6 coding error bug issue (DGC20180903000001-Taiwan)
V1.50.021| 1. Fixed IPv6 header bug when receiving icmpv6 requests with hop by hop option (DGC20170628000001-Taiwan)
2. Fixed IGMP Snooping bug which freezes the switch (DEUR20170814000001-DEUR, DEUR20170912000003-DEUR)
3. Fixed software bug for showing the wrong DDM information via SNMP (DRU20170907000003-Russia)
4. Fixed firmware’s file size display bug between master and slave (physical stacking) when it is upgraded via D-View7 (DI20170915000002-DJP)
5. Fixed DHCP Client bug which caused SSH session to stop functioning (DLA20171011000001-DLA)
6. Fixed DHCP snooping bug when PC’s IP address is altered between Static and DHCP (DGC20171121000001-Taiwan)
V1.40.019| 1. Fixed some SNMP bugs issue. (DI20150907000007-DJP)
2. Fixed physical stacking bug where master’s configuration was overwritten by slave unit (DI20151014000001-DJP)
3. Fixed physical stacking bug when master unit is down, flags on slave and backup master were not updated (DI20151111000001-DJP)
4. Fixed the bug to protect memory allocation to prevent allocated memory blocks from overlapping (DI20151221000005-DJP)
5. Fixed VLAN option ‘replace’ being accidently removed from Web UI by software R&D. (DEUR20160530000001-DEUR)
6. Fixed ERPS and LAG software bug when they are both enabled via WebUI. (DEUR20160427000005-DEUR)
7. Fixed sFlow bug not getting a system interface address when interface vlan1 doesn’t exist (DRU20160201000001-DRU)
8. Fixed javascript error bug on html for webUI (DEUR20160921000004-DEUR)
9. Fixed some bugs on ACL rules (DI20151019000004-DJP)
10. Fixed webUI’s webpage bug (DEUR20170511000002-DEUR)
11. Fixed ERPS ring’s bug when 2 switches are rebooted (DEUR20170516000004-DEUR)
12. Fixed CPU’s Ingress Backpressure (IBP) limitation by enlarging its IBP threshold (DEUR20170301000006-DEUR)
13. Fixed some bug issues related to:
14. Difference between running-config and startup-config.
15. ERPS blank profile cannot be removed.
16. ERPS won’t be in idle status if it is applied with a blank profile.
17. (DI20151124000002-DJP, DI20170201000004-DJP)
18. Fixed a SSH security bug (DRU20170120000003-DRU)
19. Fixed NTP DDOS vulnerability issues (DGC20170704000001-DTW)
20. Fixed CPU utilization deficiencies in Web UI, related to case (DRU20150818000002-DRU)
21. Fixed Web UI javascript bug which affected SNMP settings (DRU20151109000002-DRU)
22. Fixed DHCP Server Screening implementation to limit the global server number to 5 (DGC20150914000005-DTW)
23. Fixed LBD bug being trapped at CPU without processing (DGC20150828000002-DTW)
24. Fixed IP addresses’ bug for endian formatting (DGC20151019000002-DTW)
25. Fixed MAC Authentication CLI bug (DRU20151102000005-DRU)
26. Fixed group name mismatch bug in MIB (DI20151104000006-DJP)
27. Fixed default VLAN ip address display in Web UI (DGC20151109000001-DTW)
28. Fixed QoS’ meter max rate bug (DEUR20151124000011-DEUR)
29. Fixed IP addresses’ endian formatting bug when using TFTP server to upload configuration (DRU20151221000003-DRU)
30. Fixed physical stacking bug when f/w upgrading is not propagated properly to slaves (DUSA20151203000001-DUSA)
31. Fixed software coding bug related to physical stacking and web UI’s features (DEUR20160617000002-DEUR)
32. Fixed Radius bug for retrieving wrong IP address (DRU20160728000001-DRU)
33. TLS 1.2 issues, which is not supported on older f/w. This feature is added in this version (DEUR20160920000003-DEUR)
34. Fixed Web UI’s HTML coding error (DEUR20170124000001-DEUR)
V1.30.007| 1. PoE related software issues are fixed. (DEUR20141105000002-EU, DEUR20141001000006-EU, DUSA20150304000002-USA, DEUR20141119000001-EU, DRU20141212000001-Russia, DGC20150302000001-Taiwan)
2. Switch hung up due to chipsets vendor’s SDK with wrong definitions. (DGC20150122000001-Taiwan)
3. Fatal error discovered due to chipsets vendor’s SDK with wrong definitions. (DI20141216000001-Japan)
4. Software bug caused physical stacking to malfunction. (DI20150127000004-Japan)
5. Modified software to limit ARP request to CPU at 64Kbps, due to customer’s environment with many ARP requests.(DEUR20150224000002-UKI)
6. Resolved the bug where IP address of device information are not updated and synced. (DI20150313000002-Japan)
7. Packet buffer draining issue, Software R&D enhance code to prevent it from happening. (DI20150610000004-Japan)
V1.20.011| 1. Modified DHCP Snooping’s default value of “per VLAN disabled” to “per VLAN enable” to allow PCs to get IP address via DHCP on a stacking member port’s VLAN. (DI20140411000011-Japan)
2. Fixed BPDU bug that caused looping when STP blocking port was changed between stacking units.(DI20140428000007-Japan)
3. Fixed BPDU bug that caused looping when MSTP blocking port was changed between stacking units.( DI20140526000003 & DI20140619000008-Japan)
4. Fixed the SSH RSA/DSA key generated in stacking master switch which doesn’t sync to its slave switches. (DI20140604000001-Japan)
5. Fixed IP address shown in reverse in log when saving configuration via SNMP. (DRU20140512000002-Russia)
6. Fixed CPU interrupt sensitivity software settings that caused the switch to either hung up or lost management respectively. (DEUR20140929000001-EU
& DUSA20150325000004-USA)
7. Fixed the switch from entering exception mode when a port is being linked up during MAC authentication. (DGC20140715000003-Taiwan)
8. Fixed IPv6 JWAC bug that did not redirect to authentication page if the interface’s IPv6 state is disabled or no IPv6 address has been assigned. DI20140722000002-Japan)
9. Modify software settings in order for Realtek 8111R NIC card to retrieve IP address from DHCP server faster while transiting via DGS-1510. (DGC20140717000005-China)
10. Enhance support for Intel 82579 NIC card using different driver versions so those DHCP bootp packets are not dropped. (DEUR20140311000007-EU)
11. Fixed DHCP Relay bug that caused PCs not able to get IP address from DHCP server when client & server are in the same VLAN. (DEUR20140902000001-EU)
12. Fixed incorrect VLAN Link status information shown in CLI. (DRU20141203000001-Russia)
13. Fixed the bug of not accepting DHCP relay source address using subnetted network address. DGC20141213000001-Taiwan)
14. Fixed the bug of not accepting configuring switch interface using subnetted network address.(DRU20141218000001-Russia)
V1.10.005| 1. DHCP Snooping blocked packets from a VLAN which was not enabled by DHCP Snooping. (DI20140402000002-Japan)
2. Modify the minimum value of command “storm-control unicast level” from 1 to 0. (DI20140325000011-Japan)
3. When DHCP Relay is enabled on a VLAN, DGS-1510 still forward DHCP broadcast packets to the port connected to DHCP server. (DGC20140113000001-China)
V1.00.031| 1. Fixed switch rebooting issue in first firmware release. Please see known issues for details.
2. Fixed the safeguard engine bug in first firmware release. Please see known issues for details.
V1.00.029| First release

  • D-Link tracking number is enclosed in ()

Known Issues

Firmware Version Issues Workaround
V1.70.012 None
V1.60.012 None
V1.50.021 None
V1.40.019 None
V1.30.007 None
V1.20.011 1. Switch PoE function will stop delivering power after a while,

these are reported in:
DEUR20141105000002-EU
DEUR20141001000006-EU
DUSA20150304000002-USA
DEUR20141119000001-EU
DRU20141212000001-Russia
DGC20150302000001-Taiwan| It is highly recommended (DGS-1510-28P &
DGS-1510-28XMP) to avoid using this firmware. Please kindly contact HQ’s Tech Support or PP to get a beta firmware fix, R1.20.B013 that had fixed this issue.
R&D fixed this software bug in PoE’s Microcontroller settings
V1.10.005| 2. After creating a new Access List profile either via CLI or Web UI, the edit button under Access-List was not greyed out in D-View.
Per D-View’s design SPEC, this is prohibited.
3. IP Source Guard Static Binding table list is created either from CLI or Web UI; it was not editable from D-View. This is a bug.| These are software bugs of D-View module; they will be fixed in the next version.
V1.00.031| None|
V1.00.029| 1. Under the below scenario, DGS-1510 will reboot:
When a switch port (DGS-1510) is set as auto-negotiation, the other connected switch is hardcoded with 100Mbps speed.
Then perform cable diagnostic on DGS-1510 and do a “show cable-diagnostic”, the switch will reboot.
2. When issuing save configuration command, safeguard engine may trigger.| This is a bug, will be fixed in firmware version 1.00.031.

  • D-Link tracking number is enclosed in ()

Related Documentation

  • DGS-1510 Series Web UI Reference Guide Release
  • DGS-1510 Series CLI Reference Guide Release
  • DGS-1510 Series HW Installation Guide Release

References

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

D-Link User Manuals

Related Manuals