Tp-Link TL-SL5428E Инструкция по эксплуатации онлайн
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 9
- Chapter 1 about this guide 10
- Conventions 10
- Intended readers 10
- Overview of this guide 10
- Chapter 2 introduction 14
- Main features 14
- Overview of the switch 14
- Appearance description 15
- Front panel 15
- Rear panel 16
- Chapter 3 login to the switch 17
- Configuration 17
- Chapter 4 system 19
- System info 19
- System summary 19
- Device description 21
- The following entries are displayed on this screen 21
- System time 22
- The following entries are displayed on this screen 22
- System ip 23
- The following entries are displayed on this screen 23
- User manage 24
- User table 24
- The following entries are displayed on this screen 25
- User config 25
- Config restore 26
- System tools 26
- The following entries are displayed on this screen 26
- Config backup 27
- Firmware upgrade 27
- The following entries are displayed on this screen 27
- System reboot 28
- System reset 28
- Access control 29
- Access security 29
- The following entries are displayed on this screen 30
- Ssl config 31
- Ssh config 32
- The following entries are displayed on this screen 32
- The following entries are displayed on this screen 33
- Application example 1 for ssh 34
- Application example 2 for ssh 35
- Chapter 5 switching 38
- Port config 38
- Port mirror 39
- Port security 41
- Port isolation 42
- Lag table 44
- Static lag 46
- Lacp config 47
- Traffic monitor 49
- Traffic summary 49
- Traffic statistics 50
- Mac address 51
- Address table 52
- Static address 54
- Dynamic address 55
- Filtering address 57
- Chapter 6 vlan 59
- Q vlan 60
- Vlan config 61
- Port config 64
- Configuration procedure 65
- Mac vlan 66
- Configuration procedure 67
- Port enable 67
- Protocol vlan 68
- Protocol template 69
- Protocol vlan 69
- Port enable 70
- Application example for 802 q vlan 71
- Configuration procedure 71
- Application example for mac vlan 72
- Application example for protocol vlan 74
- Vlan vpn 76
- Vlan mapping 77
- Vpn config 77
- Port enable 78
- Configuration procedure of vlan mapping function 79
- Configuration procedure of vlan vpn function 79
- Configuration procedure 83
- Private vlan 83
- Port config 88
- Configuration procedure 89
- Application example for private vlan 90
- Chapter 7 spanning tree 92
- Stp config 97
- The following entries are displayed on this screen 98
- Stp summary 99
- Port config 100
- The following entries are displayed on this screen 101
- Mstp instance 102
- Region config 102
- Instance config 103
- The following entries are displayed on this screen 103
- Instance port config 104
- The following entries are displayed on this screen 104
- The following entries are displayed on this screen 105
- Global configuration procedure for spanning tree function 106
- Port protect 106
- Stp security 106
- The following entries are displayed on this screen 108
- Tc protect 109
- The following entries are displayed on this screen 109
- Application example for stp function 110
- Chapter 8 multicast 114
- Igmp snooping 116
- Snooping config 117
- Port config 118
- The following entries are displayed on this screen 118
- The following entries are displayed on this screen 119
- Vlan config 119
- The following entries are displayed on this screen 120
- Configuration procedure 121
- Multicast vlan 121
- The following entries are displayed on this screen 122
- Application example for multicast vlan 123
- Configuration procedure 123
- Multicast ip 124
- Multicast ip table 125
- Static multicast ip 125
- The following entries are displayed on this screen 125
- The following entries are displayed on this screen 126
- Ip range 127
- Multicast filter 127
- The following entries are displayed on this screen 127
- Port filter 128
- The following entries are displayed on this screen 128
- Configuration procedure 129
- Packet statistics 129
- Packet statistics 130
- The following entries are displayed on this screen 130
- Chapter 9 qos 131
- Diffserv 134
- Port priority 134
- The following entries are displayed on this screen 134
- Configuration procedure 135
- Schedule mode 135
- The following entries are displayed on this screen 135
- P priority 136
- The following entries are displayed on this screen 136
- Configuration procedure 137
- Dscp priority 137
- Configuration procedure 138
- The following entries are displayed on this screen 138
- Bandwidth control 139
- Rate limit 139
- The following entries are displayed on this screen 139
- Storm control 140
- The following entries are displayed on this screen 141
- Voice vlan 142
- Global config 144
- Port config 144
- The following entries are displayed on this screen 144
- The following entries are displayed on this screen 145
- Oui config 146
- The following entries are displayed on this screen 146
- Configuration procedure of voice vlan 147
- Chapter 10 acl 148
- The following entries are displayed on this screen 148
- Time range 148
- Time range summary 148
- The following entries are displayed on this screen 149
- Time range create 149
- Acl config 150
- Holiday config 150
- The following entries are displayed on this screen 150
- Acl create 151
- Acl summary 151
- The following entries are displayed on this screen 151
- Mac acl 152
- The following entries are displayed on this screen 152
- Standard ip acl 153
- The following entries are displayed on this screen 153
- Extend ip acl 154
- The following entries are displayed on this screen 154
- Policy config 155
- Policy summary 155
- The following entries are displayed on this screen 155
- Action create 156
- Policy create 156
- The following entries are displayed on this screen 156
- The following entries are displayed on this screen 157
- Binding table 158
- Policy binding 158
- Port binding 158
- The following entries are displayed on this screen 158
- The following entries are displayed on this screen 159
- Vlan binding 159
- Application example for acl 160
- Configuration procedure 160
- Binding table 163
- Chapter 11 network security 163
- Ip mac binding 163
- Manual binding 164
- Arp scanning 166
- Dhcp snooping 167
- Arp inspection 173
- Arp detect 177
- Arp defend 178
- Configuration procedure 178
- Arp statistics 179
- Ip source guard 180
- Dos defend 181
- Dos attack type description 182
- Table 11 1 defendable dos attack types 182
- With dos defend function enabled the switch can analyze the specific fields of the ip packets and distinguish the malicious dos attack packets upon detecting the packets the switch will discard the illegal packets directly and limit the transmission rate of the legal packets if the over legal packets may incur a breakdown of the network the switch can defend several types of dos attack listed in the following table 182
- Dos defend 183
- Dos detect 183
- Global config 188
- Port config 190
- Radius server 191
- Configuration procedure 192
- Chapter 12 snmp 193
- Global config 195
- Snmp config 195
- Snmp view 196
- Snmp group 197
- Snmp user 198
- Snmp community 200
- Configuration procedure 201
- Notification 202
- Event config 205
- History control 205
- Alarm config 206
- Chapter 13 cluster 209
- Neighbor info 210
- Ndp summary 211
- The following entries are displayed on this screen 211
- The following entries are displayed on this screen 212
- Ndp config 213
- The following entries are displayed on this screen 213
- Device table 214
- The following entries are displayed on this screen 214
- Ntdp summary 215
- The following entries are displayed on this screen 216
- Ntdp config 217
- The following entries are displayed on this screen 217
- Cluster 218
- Cluster summary 218
- The following entries are displayed on this screen 218
- The following entries are displayed on this screen 219
- The following entries are displayed on this screen 220
- Cluster config 221
- The following entries are displayed on this screen 221
- The following entries are displayed on this screen 222
- Member config 223
- The following entries are displayed on this screen 223
- Cluster topology 224
- The following entries are displayed on this screen 224
- The following entries are displayed on this screen 225
- Application example for cluster function 226
- Chapter 14 maintenance 229
- Cpu monitor 229
- System monitor 229
- Memory monitor 230
- Log table 232
- Local log 233
- Remote log 233
- Backup log 234
- Cable test 235
- Device diagnose 235
- Loopback 236
- Network diagnose 237
- Tracert 238
- Chapter 15 system maintenance via ftp 239
- Configure the hyper terminal 239
- Hardware installation 239
- Download firmware via bootrom menu 241
- Appendix a specifications 244
- Appendix b configuring the pcs 245
- Appendix c 802 x client software 248
- Installation guide 248
- Uninstall software 251
- Configuration 252
- Appendix d glossary 256
Похожие устройства
- Toshiba GR-H64RDA Инструкция по эксплуатации
- Sony HDR-PJ50E Инструкция по эксплуатации
- Sony NWZ-A845 Black Инструкция по эксплуатации
- Sony HDR-PJ30VE Инструкция по эксплуатации
- Tp-Link TL-SG3424P Инструкция по эксплуатации
- Sony HDR-PJ30E Инструкция по эксплуатации
- Tp-Link TL-SG3424 Инструкция по эксплуатации
- Beko CE 58200 Инструкция по эксплуатации
- Asus TAICHI31-CX010H Инструкция по эксплуатации
- Sony STR-DK5 B Инструкция по эксплуатации
- Sony HDR-PJ10E Инструкция по эксплуатации
- Tp-Link TL-SG3216 Инструкция по эксплуатации
- Hotpoint-Ariston AQSL 85 Инструкция по эксплуатации
- Sony XAV-E622 Инструкция по эксплуатации
- Sony HDR-CX7EK Инструкция по эксплуатации
- Tp-Link TL-SG3210 Инструкция по эксплуатации
- Panasonic TC-14X1 Инструкция по эксплуатации
- Sony CDX-GT29 EE Инструкция по эксплуатации
- Sony HDR-CX700VE Инструкция по эксплуатации
- Tp-Link TL-SL3452 Инструкция по эксплуатации