Tp-Link TL-SL5428E Инструкция по эксплуатации онлайн [194/259] 38881
![Tp-Link TL-SL5428E Инструкция по эксплуатации онлайн [194/259] 38881](/views2/1042072/page194/bgc2.png)
186
SNMP v1: SNMP v1 adopts Community Name authentication. The community name is used to
define the relation between SNMP Management Station and SNMP Agent. The SNMP packets
failing to pass community name authentication are discarded. The community name can limit
access to SNMP Agent from SNMP NMS, functioning as a password.
SNMP v2c: SNMP v2c also adopts community name authentication. It is compatible with SNMP
v1 while enlarges the function of SNMP v1.
SNMP v3: Basing on SNMP v1 and SNMP v2c, SNMP v3 extremely enhances the security and
manageability. It adopts VACM (View-based Access Control Model) and USM (User-Based
Security Model) authentication. The user can configure the authentication and the encryption
functions. The authentication function is to limit the access of the illegal user by authenticating the
senders of packets. Meanwhile, the encryption function is used to encrypt the packets transmitted
between SNMP Management Station and SNMP Agent so as to prevent any information being
stolen. The multiple combinations of authentication function and encryption function can
guarantee a more reliable communication between SNMP Management station and SNMP Agent.
¾ MIB Introduction
To uniquely identify the management objects of the device in SNMP messages, SNMP adopts the
hierarchical architecture to identify the managed objects. It is like a tree, and each tree node
represents a managed object, as shown in the following figure. Thus the object can be identified
with the unique path starting from the root and indicated by a string of numbers. The number string
is the Object Identifier of the managed object. In the following figure, the OID of the managed
object B is {1.2.1.1}. While the OID of the managed object A is {1.2.1.1.5}.
Figure
12-2 Architecture of the MIB tree
¾ SNMP Configuration Outline
1. Create View
The SNMP View is created for the SNMP Management Station to manage MIB objects. The
managed object, uniquely identified by OID, can be set to under or out of the management of
SNMP Management Station by configuring its view type (included/excluded). The OID of managed
object can be found on the SNMP client program running on the SNMP Management Station.
2. Create SNMP Group
After creating the SNMP View, it’s required to create a SNMP Group. The Group Name, Security
Model and Security Level compose the identifier of the SNMP Group. The Groups with these three
items the same are considered to be the same. You can configure SNMP Group to control the
network access by providing the users in various groups with different management rights via the
Read View, Write View and Notify View.
3. Create SNMP User
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 9
- Chapter 1 about this guide 10
- Conventions 10
- Intended readers 10
- Overview of this guide 10
- Chapter 2 introduction 14
- Main features 14
- Overview of the switch 14
- Appearance description 15
- Front panel 15
- Rear panel 16
- Chapter 3 login to the switch 17
- Configuration 17
- Chapter 4 system 19
- System info 19
- System summary 19
- Device description 21
- The following entries are displayed on this screen 21
- System time 22
- The following entries are displayed on this screen 22
- System ip 23
- The following entries are displayed on this screen 23
- User manage 24
- User table 24
- The following entries are displayed on this screen 25
- User config 25
- Config restore 26
- System tools 26
- The following entries are displayed on this screen 26
- Config backup 27
- Firmware upgrade 27
- The following entries are displayed on this screen 27
- System reboot 28
- System reset 28
- Access control 29
- Access security 29
- The following entries are displayed on this screen 30
- Ssl config 31
- Ssh config 32
- The following entries are displayed on this screen 32
- The following entries are displayed on this screen 33
- Application example 1 for ssh 34
- Application example 2 for ssh 35
- Chapter 5 switching 38
- Port config 38
- Port mirror 39
- Port security 41
- Port isolation 42
- Lag table 44
- Static lag 46
- Lacp config 47
- Traffic monitor 49
- Traffic summary 49
- Traffic statistics 50
- Mac address 51
- Address table 52
- Static address 54
- Dynamic address 55
- Filtering address 57
- Chapter 6 vlan 59
- Q vlan 60
- Vlan config 61
- Port config 64
- Configuration procedure 65
- Mac vlan 66
- Configuration procedure 67
- Port enable 67
- Protocol vlan 68
- Protocol template 69
- Protocol vlan 69
- Port enable 70
- Application example for 802 q vlan 71
- Configuration procedure 71
- Application example for mac vlan 72
- Application example for protocol vlan 74
- Vlan vpn 76
- Vlan mapping 77
- Vpn config 77
- Port enable 78
- Configuration procedure of vlan mapping function 79
- Configuration procedure of vlan vpn function 79
- Configuration procedure 83
- Private vlan 83
- Port config 88
- Configuration procedure 89
- Application example for private vlan 90
- Chapter 7 spanning tree 92
- Stp config 97
- The following entries are displayed on this screen 98
- Stp summary 99
- Port config 100
- The following entries are displayed on this screen 101
- Mstp instance 102
- Region config 102
- Instance config 103
- The following entries are displayed on this screen 103
- Instance port config 104
- The following entries are displayed on this screen 104
- The following entries are displayed on this screen 105
- Global configuration procedure for spanning tree function 106
- Port protect 106
- Stp security 106
- The following entries are displayed on this screen 108
- Tc protect 109
- The following entries are displayed on this screen 109
- Application example for stp function 110
- Chapter 8 multicast 114
- Igmp snooping 116
- Snooping config 117
- Port config 118
- The following entries are displayed on this screen 118
- The following entries are displayed on this screen 119
- Vlan config 119
- The following entries are displayed on this screen 120
- Configuration procedure 121
- Multicast vlan 121
- The following entries are displayed on this screen 122
- Application example for multicast vlan 123
- Configuration procedure 123
- Multicast ip 124
- Multicast ip table 125
- Static multicast ip 125
- The following entries are displayed on this screen 125
- The following entries are displayed on this screen 126
- Ip range 127
- Multicast filter 127
- The following entries are displayed on this screen 127
- Port filter 128
- The following entries are displayed on this screen 128
- Configuration procedure 129
- Packet statistics 129
- Packet statistics 130
- The following entries are displayed on this screen 130
- Chapter 9 qos 131
- Diffserv 134
- Port priority 134
- The following entries are displayed on this screen 134
- Configuration procedure 135
- Schedule mode 135
- The following entries are displayed on this screen 135
- P priority 136
- The following entries are displayed on this screen 136
- Configuration procedure 137
- Dscp priority 137
- Configuration procedure 138
- The following entries are displayed on this screen 138
- Bandwidth control 139
- Rate limit 139
- The following entries are displayed on this screen 139
- Storm control 140
- The following entries are displayed on this screen 141
- Voice vlan 142
- Global config 144
- Port config 144
- The following entries are displayed on this screen 144
- The following entries are displayed on this screen 145
- Oui config 146
- The following entries are displayed on this screen 146
- Configuration procedure of voice vlan 147
- Chapter 10 acl 148
- The following entries are displayed on this screen 148
- Time range 148
- Time range summary 148
- The following entries are displayed on this screen 149
- Time range create 149
- Acl config 150
- Holiday config 150
- The following entries are displayed on this screen 150
- Acl create 151
- Acl summary 151
- The following entries are displayed on this screen 151
- Mac acl 152
- The following entries are displayed on this screen 152
- Standard ip acl 153
- The following entries are displayed on this screen 153
- Extend ip acl 154
- The following entries are displayed on this screen 154
- Policy config 155
- Policy summary 155
- The following entries are displayed on this screen 155
- Action create 156
- Policy create 156
- The following entries are displayed on this screen 156
- The following entries are displayed on this screen 157
- Binding table 158
- Policy binding 158
- Port binding 158
- The following entries are displayed on this screen 158
- The following entries are displayed on this screen 159
- Vlan binding 159
- Application example for acl 160
- Configuration procedure 160
- Binding table 163
- Chapter 11 network security 163
- Ip mac binding 163
- Manual binding 164
- Arp scanning 166
- Dhcp snooping 167
- Arp inspection 173
- Arp detect 177
- Arp defend 178
- Configuration procedure 178
- Arp statistics 179
- Ip source guard 180
- Dos defend 181
- Dos attack type description 182
- Table 11 1 defendable dos attack types 182
- With dos defend function enabled the switch can analyze the specific fields of the ip packets and distinguish the malicious dos attack packets upon detecting the packets the switch will discard the illegal packets directly and limit the transmission rate of the legal packets if the over legal packets may incur a breakdown of the network the switch can defend several types of dos attack listed in the following table 182
- Dos defend 183
- Dos detect 183
- Global config 188
- Port config 190
- Radius server 191
- Configuration procedure 192
- Chapter 12 snmp 193
- Global config 195
- Snmp config 195
- Snmp view 196
- Snmp group 197
- Snmp user 198
- Snmp community 200
- Configuration procedure 201
- Notification 202
- Event config 205
- History control 205
- Alarm config 206
- Chapter 13 cluster 209
- Neighbor info 210
- Ndp summary 211
- The following entries are displayed on this screen 211
- The following entries are displayed on this screen 212
- Ndp config 213
- The following entries are displayed on this screen 213
- Device table 214
- The following entries are displayed on this screen 214
- Ntdp summary 215
- The following entries are displayed on this screen 216
- Ntdp config 217
- The following entries are displayed on this screen 217
- Cluster 218
- Cluster summary 218
- The following entries are displayed on this screen 218
- The following entries are displayed on this screen 219
- The following entries are displayed on this screen 220
- Cluster config 221
- The following entries are displayed on this screen 221
- The following entries are displayed on this screen 222
- Member config 223
- The following entries are displayed on this screen 223
- Cluster topology 224
- The following entries are displayed on this screen 224
- The following entries are displayed on this screen 225
- Application example for cluster function 226
- Chapter 14 maintenance 229
- Cpu monitor 229
- System monitor 229
- Memory monitor 230
- Log table 232
- Local log 233
- Remote log 233
- Backup log 234
- Cable test 235
- Device diagnose 235
- Loopback 236
- Network diagnose 237
- Tracert 238
- Chapter 15 system maintenance via ftp 239
- Configure the hyper terminal 239
- Hardware installation 239
- Download firmware via bootrom menu 241
- Appendix a specifications 244
- Appendix b configuring the pcs 245
- Appendix c 802 x client software 248
- Installation guide 248
- Uninstall software 251
- Configuration 252
- Appendix d glossary 256
Похожие устройства
- Toshiba GR-H64RDA Инструкция по эксплуатации
- Sony HDR-PJ50E Инструкция по эксплуатации
- Sony NWZ-A845 Black Инструкция по эксплуатации
- Sony HDR-PJ30VE Инструкция по эксплуатации
- Tp-Link TL-SG3424P Инструкция по эксплуатации
- Sony HDR-PJ30E Инструкция по эксплуатации
- Tp-Link TL-SG3424 Инструкция по эксплуатации
- Beko CE 58200 Инструкция по эксплуатации
- Asus TAICHI31-CX010H Инструкция по эксплуатации
- Sony STR-DK5 B Инструкция по эксплуатации
- Sony HDR-PJ10E Инструкция по эксплуатации
- Tp-Link TL-SG3216 Инструкция по эксплуатации
- Hotpoint-Ariston AQSL 85 Инструкция по эксплуатации
- Sony XAV-E622 Инструкция по эксплуатации
- Sony HDR-CX7EK Инструкция по эксплуатации
- Tp-Link TL-SG3210 Инструкция по эксплуатации
- Panasonic TC-14X1 Инструкция по эксплуатации
- Sony CDX-GT29 EE Инструкция по эксплуатации
- Sony HDR-CX700VE Инструкция по эксплуатации
- Tp-Link TL-SL3452 Инструкция по эксплуатации