Tp-Link T2500-28TC (TL-SL5428E) [2/316] Ce mark warning
![Tp-Link T2500-28TC (TL-SL5428E) [2/316] Ce mark warning](/views2/1210074/page2/bg2.png)
I
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of
TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or
registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from TP-LINK
TECHNOLOGIES CO., LTD. Copyright © 2016 TP-LINK TECHNOLOGIES CO., LTD. All rights
reserved.
http://www.tp-link.com
FCC STATEMENT
This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed and used
in accordance with the instruction manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user will be required to correct the interference at his own expense.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1) This device may not cause harmful interference.
2) This device must accept any interference received, including interference that may cause
undesired operation.
Any changes or modifications not expressly approved by the party responsible for compliance
could void the user’s authority to operate the equipment.
CE Mark Warning
This is a class A product. In a domestic environment, this product may cause radio interference, in
which case the user may be required to take adequate measures.
Продукт сертифіковано згідно с правилами системи УкрСЕПРО на відповідність вимогам
нормативних документів та вимогам, що передбачені чинними законодавчими актами
України.
Industry Canada Statement
CAN ICES-3 (A)/NMB-3(A)
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Industry canada statement 2
- Explanation of the symbols on the product label 3
- Safety information 3
- 安全諮詢及注意事項 3
- Package contents 11
- Chapter 1 about this guide 12
- Conventions 12
- Intended readers 12
- Overview of this guide 13
- Appearance description 17
- Chapter 2 introduction 17
- Front panel 17
- Overview of the switch 17
- Rear panel 18
- Chapter 3 login to the switch 19
- Configuration 19
- Chapter 4 system 21
- System info 21
- System summary 21
- Device description 23
- System time 23
- Daylight saving time 24
- System ip 26
- System ipv6 27
- The following entries are displayed on this screen 33
- User config 35
- User management 35
- User table 35
- System tools 36
- Config backup 37
- Config restore 37
- Firmware upgrade 38
- System reboot 38
- Access control 39
- Access security 39
- System reset 39
- Ssl config 41
- Ssh config 42
- Application example 1 for ssh 44
- Application example 2 for ssh 45
- Chapter 5 switching 49
- Port config 49
- The following entries are displayed on this screen 49
- Port mirror 50
- Port security 51
- Port isolation 53
- Loopback detection 54
- Ddm config 55
- Temperature threshold 56
- Voltage threshold 57
- Bias current threshold 58
- Tx power threshold 58
- Rx power threshold 59
- Ddm status 60
- Lag table 61
- Static lag 63
- Lacp config 64
- Traffic monitor 66
- Traffic summary 66
- Traffic statistics 67
- Mac address 68
- Address table 69
- Static address 70
- Dynamic address 71
- Filtering address 73
- Chapter 6 vlan 75
- Q vlan 76
- Vlan config 77
- Port config 79
- Configuration procedure 81
- Mac vlan 81
- Mac vlan 82
- Configuration procedure 83
- Port enable 83
- Protocol vlan 83
- Protocol vlan 84
- Protocol template 85
- Application example for 802 q vlan 86
- Configuration procedure 86
- Port enable 86
- Application example for mac vlan 88
- Application example for protocol vlan 89
- Vlan vpn 91
- Vlan mapping 92
- Vpn config 92
- Port enable 93
- Configuration procedure of vlan mapping function 94
- Configuration procedure of vlan vpn function 94
- Private vlan 95
- Pvlan config 98
- Port config 99
- Configuration procedure 100
- Application example for private vlan 104
- Configuration procedure 104
- Chapter 7 spanning tree 107
- Stp config 111
- Stp summary 113
- Port config 114
- Mstp instance 115
- Region config 115
- Instance config 116
- Instance port config 117
- Global configuration procedure for spanning tree function 119
- Port protect 119
- Stp security 119
- Tc protect 121
- Application example for stp function 122
- Chapter 8 ethernet oam 126
- Basic config 129
- Discovery info 131
- Link monitoring 133
- Remote loopback 135
- Statistics 136
- Event log 137
- Application example for dldp 141
- Configuration procedure 141
- Chapter 9 dhcp 144
- Dhcp relay 148
- Configuration procedure 151
- Chapter 10 multicast 152
- Igmp snooping 156
- Snooping config 157
- Vlan config 158
- Configuration procedure 159
- Port config 159
- Ip range 161
- Multicast vlan 162
- Application example for multicast vlan 163
- Static multicast ip 165
- Packet statistics 166
- Querier config 167
- Igmp authentication 168
- Mld snooping 169
- Global config 171
- Vlan config 172
- Filter config 174
- Port config 174
- Static multicast 175
- Querier config 176
- Packet statistics 177
- Multicast table 178
- Ipv4 multicast table 179
- Ipv6 multicast table 179
- Chapter 11 qos 181
- Diffserv 184
- Port priority 184
- Configuration procedure 185
- Dscp priority 185
- 802 p cos mapping 186
- Configuration procedure 186
- Configuration procedure 187
- Schedule mode 187
- Bandwidth control 188
- Rate limit 188
- Storm control 189
- Voice vlan 191
- Global config 193
- Port config 193
- Oui config 195
- Configuration procedure of voice vlan 196
- Chapter 12 acl 197
- Time range 197
- Time range summary 197
- Time range create 198
- Acl config 199
- Acl summary 199
- Holiday config 199
- Acl create 200
- Mac acl 201
- Standard ip acl 201
- Extend ip acl 202
- Combined acl 204
- Policy config 205
- Policy summary 205
- Action create 206
- Policy create 206
- Binding table 208
- Policy binding 208
- Port binding 208
- Vlan binding 209
- Application example for acl 210
- Configuration procedure 210
- Binding table 212
- Chapter 13 network security 212
- Ip mac binding 212
- Manual binding 213
- Arp scanning 215
- Dhcp snooping 216
- Dhcp snooping 220
- Option 82 221
- Arp inspection 222
- Arp detect 225
- Configuration procedure 226
- Arp defend 227
- Arp statistics 228
- Ip source guard 228
- Dos defend 229
- Dos defend 231
- Dos detect 232
- Global config 236
- Port config 238
- Configuration procedure 239
- Global config 240
- Privilege elevation 241
- Radius server config 241
- Tacacs server config 242
- Authentication server group config 243
- Authentication method list config 244
- Application authentication list config 245
- 802 x authentication server config 246
- Default settings 246
- Pppoe config 247
- Chapter 14 snmp 250
- Global config 252
- Snmp config 252
- Snmp group 253
- Snmp view 253
- Snmp user 255
- Snmp community 257
- Configuration procedure 258
- Notification 259
- Notification config 259
- Traps config 260
- History control 264
- Event config 265
- Alarm config 266
- Chapter 15 lldp 268
- Lldp working mechanism 268
- Lldpdu format 268
- Basic config 271
- Global config 272
- Device info 273
- Local info 273
- Port config 273
- Neighbor info 274
- Device statistics 276
- Elements 277
- Lldp med 277
- Global config 278
- Port config 278
- Local info 281
- Neighbor info 282
- Chapter 16 cluster 284
- Neighbor info 285
- Ndp summary 286
- Ndp config 288
- Device table 289
- Ntdp summary 291
- Ntdp config 292
- Cluster 293
- Cluster summary 293
- Cluster config 296
- Member config 298
- Cluster topology 299
- Chapter 17 maintenance 302
- Cpu monitor 302
- System monitor 302
- Memory monitor 303
- Log table 304
- Local log 305
- Remote log 305
- Backup log 306
- Device diagnostics 307
- Network diagnostics 308
- Tracert 309
- Chapter 18 system maintenance via ftp 310
- Configure the terminal emulation program 310
- Hardware installation 310
- Download firmware via bootutil menu 311
- Appendix a glossary 313
Похожие устройства
- Tp-Link T3700G-28TQ Брошюра
- Tp-Link T3700G-28TQ Руководство по командной строке
- Tp-Link T3700G-28TQ Руководство по установке
- Tp-Link T3700G-28TQ Руководство пользователя
- Tp-Link T2700G-28TQ Брошюра
- Tp-Link T2700G-28TQ Руководство по командной строке
- Tp-Link T2700G-28TQ Руководство по установке
- Tp-Link T2700G-28TQ Руководство пользователя
- Tp-Link T1600G-52PS (TL-SG2452P) Руководство по командной строке
- Tp-Link T1600G-52PS (TL-SG2452P) Руководство по конфигурации
- Tp-Link T1600G-52PS (TL-SG2452P) Руководство по установке
- Tp-Link T1600G-52PS (TL-SG2452P) Руководство пользователя
- Tp-Link T1600G-52TS (TL-SG2452) Брошюра
- Tp-Link T1600G-52TS (TL-SG2452) Руководство по командной строке
- Tp-Link T1600G-52TS (TL-SG2452) Руководство по конфигурированию
- Tp-Link T1600G-52TS (TL-SG2452) Руководство по установке
- Tp-Link T1600G-28PS (TL-SG2424P) Брошюра
- Tp-Link T1600G-28PS (TL-SG2424P) Руководство по командной строке
- Tp-Link T1600G-28PS (TL-SG2424P) Руководство по конфигурированию
- Tp-Link T1600G-28PS (TL-SG2424P) Руководство по установке