Tp-Link T2600G-28MPS (TL-SG3424P) Руководство пользователя онлайн [266/379] 174195
Превью страниц
Страница 266 /
379
![Tp-Link T2600G-28MPS (TL-SG3424P) Руководство пользователя онлайн [266/379] 174195](/views2/1210070/page266/bg10a.png)
Operation:
Select the operation for the switch to process packets which match
the rules.
Permit: Forward packets.
Deny: Discard Packets.
S-MAC:
Enter the source MAC address contained in the rule.
D-MAC:
Enter the destination MAC address contained in the rule.
Mask:
Enter IP address mask. If it is set to 1, it must strictly match the
address.
VLAN ID
Enter the VLAN ID contained in the rule.
EtherType
Enter EtherType contained in the rule.
User Priority
Select the user priority contained in the rule for the tagged packets
to match.
Fragment:
Select if the rule will take effect on the fragment packets. When the
fragment is selecte
d, this rule will process all the fragments and the
last piece of fragment will be always forwarded.
S-IP:
Enter the source IP address contained in the rule.
D-IP:
Enter the destination IP address contained in the rule.
Mask: Enter IP address mask. If
it is set to 1, it must strictly match the
address.
Time-Range:
Select the time-range for the rule to take effect.
Note:
Before binding a Combined ACL to an interface or VLAN, you should configure the SDM
template as “default” or “enterpriseV4” and save your configurations. See SDM Template for
more information about SDM template configuration.
13.2.7 IPv6 ACL
IPv6 ACLs analyze and process data packets based on a series of match conditions, such as
the source IPv6 addresses, destination IPv6 addresses and port number carried in the packets.
254
Содержание
299- Jetstream gigabit l2 managed switch
- User guide
- Fcc statement
- Copyright trademarks
- Ce mark warning
- 安全諮詢及注意事項
- Safety information
- Industry canada statement
- Explanation of the symbols on the product label
- Package contents
- Chapter 1 about this guide
- Intended readers
- Conventions
- Overview of this guide
- Overview of the switch
- Front panel
- Chapter 2 introduction
- Appearance description
- Rear panel
- Chapter 3 login to the switch
- Configuration
- System info
- System summary
- Chapter 4 system
- System time
- Device description
- Daylight saving time
- User table
- User management
- Serial port setting
- User config
- System tools
- Boot config
- Config restore
- Config backup
- Firmware upgrade
- System reboot
- Reboot schedule
- System reset
- Access security
- Access control
- Https config
- Http config
- Ssh config
- Application example 1 for ssh
- Application example 2 for ssh
- Telnet config
- Sdm template config
- Sdm template
- Port config
- Chapter 5 switching
- Port mirror
- Port security
- Port isolation
- Loopback detection
- Lag table
- Static lag
- Lacp config
- Traffic monitor
- Traffic summary
- Traffic statistics
- Mac address
- Address table
- Static address
- Dynamic address
- Filtering address
- Mac notification
- Mac vlan security
- L2pt config
- Chapter 6 vlan
- Q vlan
- Vlan config
- Port config
- Application example for 802 q vlan
- Mac vlan
- Port enable
- Application example for mac vlan
- Protocol vlan
- Protocol group table
- Protocol template
- Protocol group
- Application example for protocol vlan
- Vlan vpn
- Vpn config
- Vlan mapping
- Port enable
- Configuration procedure of vlan vpn function
- Configuration procedure of vlan mapping function
- Private vlan
- Pvlan config
- Port config
- Application example for private vlan
- Chapter 7 spanning tree
- Stp config
- Stp summary
- Port config
- Region config
- Mstp instance
- Instance config
- Instance port config
- Global configuration procedure for spanning tree function
- Stp security
- Port protect
- Tc protect
- Application example for stp function
- Chapter 8 ethernet oam
- Basic config
- Basic config
- Discovery info
- Link monitoring
- Statistics
- Remote loopback
- Statistics
- Event log
- Application example for dldp
- Chapter 9 multicast
- Igmp snooping
- Snooping config
- Port config
- Vlan config
- Multicast vlan
- Application example for multicast vlan
- Querier config
- Profile config
- Profile binding
- Packet statistics
- Igmp authentication
- Mld snooping
- Snooping config
- Configuration procedure of multicast vlan
- Port config
- Vlan config
- Multicast vlan
- The following entries are displayed on this screen
- Querier config
- Profile config
- Profile binding
- Packet statistics
- Ipv4 multicast table
- Multicast table
- Static ipv4 multicast table
- Ipv6 multicast table
- Static ipv6 multicast table
- Interface
- Chapter 10 routing
- Routing table
- Ipv6 routing table
- Ipv4 routing table
- Static routing
- Ipv4 static routing config
- Ipv6 static routing config
- Dhcp server
- Dhcp server
- Pool setting
- Manual binding
- Packet statistics
- Binding table
- Application example for dhcp server and relay
- Dhcp relay
- Global config
- Dhcp server
- Configuration procedure
- Static arp
- Arp table
- Chapter 11 qos
- Port priority
- Diffserv
- Configuration procedure
- Schedule mode
- 802 p priority
- Configuration procedure
- Dscp priority
- Configuration procedure
- Rate limit
- Bandwidth control
- Storm control
- Voice vlan
- Port config
- Global config
- Oui config
- Configuration procedure of voice vlan
- Poe config
- Chapter 12 poe
- Poe config
- Poe profile
- Time range
- Time range summary
- Time range create
- Holiday config
- Time range summary
- Time range
- Chapter 13 acl
- Time range create
- Holiday config
- Acl config
- Acl summary
- Acl create
- Mac acl
- Standard ip acl
- Extend ip acl
- Combined acl
- Ipv6 acl
- Policy config
- Policy summary
- Policy create
- Action create
- Binding table
- Acl binding
- Port binding
- Vlan binding
- Policy binding
- Configuration procedure
- Binding table
- Port binding
- Vlan binding
- Configuration procedure
- Configuration procedure
- Application example for acl
- Binding table
- Ip mac binding
- Chapter 14 network security
- Manual binding
- Arp scanning
- Ipv6 mac binding
- Binding table
- Manual binding
- Nd snooping
- Dhcp snooping
- Global config
- Port config
- Option 82 config
- Dhcpv6 snooping
- Arp inspection
- Arp detect
- Arp defend
- Configuration procedure
- Arp statistics
- Nd detection
- Ip source guard
- Dos defend
- Dos defend
- Global config
- Port config
- Configuration procedure
- Privilege elevation
- Global config
- Radius server config
- Tacacs server config
- Authentication server group config
- Authentication method list config
- 802 x authentication server config
- Application authentication list config
- Default settings
- Chapter 15 snmp
- Snmp config
- Global config
- Snmp view
- Snmp group
- Snmp user
- Snmp community
- Configuration procedure
- Notification
- Statistics
- History
- Alarm config
- Lldp working mechanism
- Chapter 16 lldp
- Lldpdu format
- Global config
- Basic config
- Port config
- Local info
- Device info
- Neighbor info
- Device statistics
- Lldp med
- Elements
- Port config
- Global config
- Local info
- Neighbor info
- Cpu monitor
- Chapter 17 maintenance
- System monitor
- Memory monitor
- Sflow collector
- Sflow sampler
- Default settings
- Log table
- Local log
- Remote log
- Backup log
- Device diagnostics
- Cable test
- Network diagnostics
- Tracert
- Appendix a password recovery
- Appendix b specifications
- Appendix c glossary
Похожие устройства
-
Tp-Link TL-SG1008Инструкция по подключению -
Tp-Link TL-SG1016Инструкция по подключению -
Tp-Link TL-SG1048Инструкция по первичной настройке -
Tp-Link TL-SX105Руководство по инсталляции -
Tp-Link TL-SG1005DИнструкция по эксплуатации -
Tp-Link TL-SF1024DRackmount Switch_EU2_12Languages__ Installation Guide -
Tp-Link TL-SF1005DРуководство по эксплуатации -
Tp-Link TL-SG108Инструкция по эксплуатации -
Tp-Link TL-SF1005DРуководство по быстрому старту -
Tp-Link TL-SF1005P 5x100Mb 4PoE 58W неуправляемыйРуководство по эксплуатации -
Tp-Link TL-SG1005P 5G 4PoE+ 65W неуправляемыйРуководство по эксплуатации -
Tp-Link LS1008G V2Инструкция по эксплуатации