Tp-Link TL-SG3424P [2/259] Ce mark warning
![Tp-Link TL-SG3424P [2/259] Ce mark warning](/views2/1042078/page2/bg2.png)
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of
TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or
registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from TP-LINK
TECHNOLOGIES CO., LTD. Copyright © 2012 TP-LINK TECHNOLOGIES CO., LTD. All rights
reserved.
http://www.tp-link.com
FCC STATEMENT
This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed and used
in accordance with the instruction manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user will be required to correct the interference at his own expense.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1) This device may not cause harmful interference.
2) This device must accept any interference received, including interference that may cause
undesired operation.
Any changes or modifications not expressly approved by the party responsible for compliance
could void the user’s authority to operate the equipment.
CE Mark Warning
This is a class A product. In a domestic environment, this product may cause radio interference, in
which case the user may be required to take adequate measures.
SAFETY NOTICES
Caution:
Do not use this product near water, for example, in a wet basement or near a swimming pool.
Avoid using this product during an electrical storm. There may be a remote risk of electric shock
from lightning.
III
Содержание
- Jetstream l2 managed poe switch 1
- Tl sg3424p 1
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 9
- Chapter 1 about this guide 10
- Conventions 10
- Intended readers 10
- Overview of this guide 10
- Chapter 2 introduction 14
- Main features 14
- Overview of the switch 14
- Appearance description 15
- Front panel 15
- Rear panel 17
- Chapter 3 login to the switch 18
- Configuration 18
- Chapter 4 system 20
- System info 20
- System summary 20
- Device description 22
- System time 22
- System ip 24
- User config 25
- User manage 25
- User table 25
- Config backup 27
- Config restore 27
- System tools 27
- Firmware upgrade 28
- Access control 29
- Access security 29
- System reboot 29
- System reset 29
- Ssl config 31
- Ssh config 32
- Application example 1 for ssh 34
- Application example 2 for ssh 35
- Chapter 5 switching 38
- Port config 38
- Port mirror 39
- Port security 41
- Port isolation 43
- Lag table 44
- Static lag 46
- Lacp config 47
- Traffic monitor 49
- Traffic summary 49
- Traffic statistics 50
- Mac address 51
- Address table 52
- Static address 54
- Dynamic address 55
- Filtering address 57
- Chapter 6 vlan 59
- Q vlan 60
- Vlan config 62
- Port config 64
- Configuration procedure 65
- Mac vlan 66
- Configuration procedure 67
- Protocol vlan 67
- Protocol group 70
- Protocol group table 70
- Protocol template 71
- Configuration procedure 72
- Application example for 802 q vlan 73
- Application example for mac vlan 74
- Application example for protocol vlan 76
- Configuration procedure 80
- Chapter 7 spanning tree 81
- Stp config 86
- Port config 88
- Stp summary 88
- Mstp instance 90
- Region config 90
- Instance config 91
- Instance port config 92
- Global configuration procedure for spanning tree function 94
- Port protect 94
- Stp security 94
- Application example for stp function 97
- Tc protect 97
- Chapter 8 multicast 101
- Igmp snooping 103
- Snooping config 104
- Port config 105
- Vlan config 106
- Configuration procedure 108
- Multicast vlan 108
- Application example for multicast vlan 110
- Configuration procedure 110
- Multicast ip 111
- Multicast ip table 112
- Static multicast ip 112
- Multicast filter 113
- Ip range 114
- Port filter 115
- Configuration procedure 116
- Packet statistics 116
- Chapter 9 qos 118
- Configuration procedure 121
- Diffserv 121
- Port priority 121
- Schedule mode 122
- Configuration procedure 123
- Dscp priority 123
- P priority 123
- Configuration procedure 124
- Bandwidth control 125
- Rate limit 125
- Storm control 126
- Voice vlan 128
- Global config 130
- Port config 130
- Oui config 132
- Configuration procedure of voice vlan 133
- Chapter 10 poe 134
- Poe config 134
- Poe config 135
- Profile config 136
- Poe time range 137
- Time range summary 137
- Poe time range create 138
- Poe holiday config 139
- Chapter 11 acl 141
- Time range 141
- Time range summary 141
- Time range create 142
- Acl config 143
- Holiday config 143
- Acl create 144
- Acl summary 144
- Mac acl 145
- Extend ip acl 146
- Standard ip acl 146
- Policy config 148
- Policy create 148
- Policy summary 148
- Action create 149
- Binding table 150
- Policy binding 150
- Port binding 151
- Vlan binding 151
- Application example for acl 152
- Configuration procedure 152
- Binding table 155
- Chapter 12 network security 155
- Ip mac binding 155
- Manual binding 156
- Arp scanning 158
- Dhcp snooping 159
- Arp inspection 165
- Arp detect 169
- Arp defend 170
- Configuration procedure 170
- Arp statistics 172
- Dos defend 172
- Choose the menu network security dos defend dos defend to load the following page 173
- Dos attack type description 173
- On this page you can enable the dos defend type appropriate to your need 173
- Table 12 1 defendable dos attack types 173
- With dos defend function enabled the switch can analyze the specific fields of the ip packets and distinguish the malicious dos attack packets upon detecting the packets the switch will discard the illegal packets directly and limit the transmission rate of the legal packets if the over legal packets may incur a breakdown of the network the switch can defend a few types of dos attack listed in the following table 173
- Global config 178
- Port config 180
- Radius server 181
- Configuration procedure 182
- Chapter 13 snmp 183
- Global config 185
- Snmp config 185
- Snmp view 186
- Snmp group 187
- Snmp user 188
- Snmp community 190
- Configuration procedure 191
- Notification 192
- Event config 195
- History control 195
- Alarm config 196
- Chapter 14 lldp 199
- Lldp working mechanism 199
- Lldpdu format 199
- Basic config 203
- Global config 203
- The following entries are displayed on this screen 203
- Port config 204
- The following entries are displayed on this screen 204
- Device info 205
- Local info 205
- The following entries are displayed on this screen 205
- Neighbor info 206
- The following entries are displayed on this screen 206
- Device statistics 207
- The following entries are displayed on this screen 207
- Elements 208
- Lldp med 208
- Global config 209
- Port config 209
- The following entries are displayed on this screen 209
- Local info 211
- Neighbor info 212
- The following entries are displayed on this screen 212
- The following entries are displayed on this screen 213
- Chapter 15 cluster 214
- Neighbor info 215
- Ndp summary 216
- Ndp config 218
- Device table 219
- Ntdp summary 220
- Ntdp config 222
- Cluster 223
- Cluster summary 223
- Cluster config 224
- Application example for cluster function 226
- Chapter 16 maintenance 229
- Cpu monitor 229
- System monitor 229
- Memory monitor 230
- Log table 232
- Local log 233
- Remote log 233
- Backup log 234
- Cable test 235
- Device diagnose 235
- Loopback 236
- Network diagnose 236
- Tracert 237
- Appendix a specifications 239
- Appendix b configuring the pcs 240
- Appendix c load software using ftp 243
- Configure the hyper terminal 243
- Hardware installation 243
- Download firmware via bootutil menu 245
- Appendix d 802 x client software 248
- Installation guide 248
- Uninstall software 251
- Configuration 252
- Appendix e glossary 256
Похожие устройства
- Sony HDR-PJ30E Инструкция по эксплуатации
- Tp-Link TL-SG3424 Инструкция по эксплуатации
- Beko CE 58200 Инструкция по эксплуатации
- Asus TAICHI31-CX010H Инструкция по эксплуатации
- Sony STR-DK5 B Инструкция по эксплуатации
- Sony HDR-PJ10E Инструкция по эксплуатации
- Tp-Link TL-SG3216 Инструкция по эксплуатации
- Hotpoint-Ariston AQSL 85 Инструкция по эксплуатации
- Sony XAV-E622 Инструкция по эксплуатации
- Sony HDR-CX7EK Инструкция по эксплуатации
- Tp-Link TL-SG3210 Инструкция по эксплуатации
- Panasonic TC-14X1 Инструкция по эксплуатации
- Sony CDX-GT29 EE Инструкция по эксплуатации
- Sony HDR-CX700VE Инструкция по эксплуатации
- Tp-Link TL-SL3452 Инструкция по эксплуатации
- Panasonic KX-FT21RS Инструкция по эксплуатации
- Sony CDX-GT35 U Инструкция по эксплуатации
- Sony HDR-CX700E Инструкция по эксплуатации
- Tp-Link TL-SL3428 Инструкция по эксплуатации
- Toshiba GR-H64RD Инструкция по эксплуатации