Tp-Link TL-SG3424P Инструкция по эксплуатации онлайн [258/259] 38887
Data Link layer in the ISO 7-Layer Data Communications Protocol. This is related directly to the
hardware interface for network devices and passes on traffic based on MAC addresses.
Link Aggregation
See Port Trunk.
Link Aggregation Control Protocol (LACP)
Allows ports to automatically negotiate a trunked link with LACP-configured ports on another
device.
Management Information Base (MIB)
An acronym for Management Information Base. It is a set of database objects that contains
information about a specific device.
MD5 Message-Digest Algorithm
An algorithm that is used to create digital signatures. It is intended for use with 32 bit machines
and is safer than the MD4 algorithm, which has been broken. MD5 is a one-way hash function,
meaning that it takes a message and converts it into a fixed string of digits, also called a message
digest.
Network Time Protocol (NTP)
NTP provides the mechanisms to synchronize time across the network. The time servers operate
in a hierarchical-master-slave configuration in order to synchronize local clocks within the subnet
and to national time standards via wire or radio.
Port Authentication
See IEEE 802.1X.
Port Mirroring
A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a
logic analyzer or RMON probe. This allows data on the target port to be studied unobstructively.
Port Trunk
Defines a network link aggregation and trunking method which specifies how to create a single
high-speed logical link that combines several lower-speed physical links.
Remote Authentication Dial-in User Service (RADIUS)
RADIUS is a logon authentication protocol that uses software running on a central server to
control access to RADIUS-compliant devices on the network.
Remote Monitoring (RMON)
RMON provides comprehensive network monitoring capabilities. It eliminates the polling required
in standard SNMP, and can set alarms on a variety of traffic conditions, including specific error
types.
Rapid Spanning Tree Protocol (RSTP)
RSTP reduces the convergence time for network topology changes to about 10% of that required
by the older IEEE 802.1D STP standard.
Secure Shell (SSH)
A secure replacement for remote access functions, including Telnet. SSH can authenticate users
with a cryptographic key, and encrypt data connections between management clients and the
250
Содержание
- Jetstream l2 managed poe switch 1
- Tl sg3424p 1
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 9
- Chapter 1 about this guide 10
- Conventions 10
- Intended readers 10
- Overview of this guide 10
- Chapter 2 introduction 14
- Main features 14
- Overview of the switch 14
- Appearance description 15
- Front panel 15
- Rear panel 17
- Chapter 3 login to the switch 18
- Configuration 18
- Chapter 4 system 20
- System info 20
- System summary 20
- Device description 22
- System time 22
- System ip 24
- User config 25
- User manage 25
- User table 25
- Config backup 27
- Config restore 27
- System tools 27
- Firmware upgrade 28
- Access control 29
- Access security 29
- System reboot 29
- System reset 29
- Ssl config 31
- Ssh config 32
- Application example 1 for ssh 34
- Application example 2 for ssh 35
- Chapter 5 switching 38
- Port config 38
- Port mirror 39
- Port security 41
- Port isolation 43
- Lag table 44
- Static lag 46
- Lacp config 47
- Traffic monitor 49
- Traffic summary 49
- Traffic statistics 50
- Mac address 51
- Address table 52
- Static address 54
- Dynamic address 55
- Filtering address 57
- Chapter 6 vlan 59
- Q vlan 60
- Vlan config 62
- Port config 64
- Configuration procedure 65
- Mac vlan 66
- Configuration procedure 67
- Protocol vlan 67
- Protocol group 70
- Protocol group table 70
- Protocol template 71
- Configuration procedure 72
- Application example for 802 q vlan 73
- Application example for mac vlan 74
- Application example for protocol vlan 76
- Configuration procedure 80
- Chapter 7 spanning tree 81
- Stp config 86
- Port config 88
- Stp summary 88
- Mstp instance 90
- Region config 90
- Instance config 91
- Instance port config 92
- Global configuration procedure for spanning tree function 94
- Port protect 94
- Stp security 94
- Application example for stp function 97
- Tc protect 97
- Chapter 8 multicast 101
- Igmp snooping 103
- Snooping config 104
- Port config 105
- Vlan config 106
- Configuration procedure 108
- Multicast vlan 108
- Application example for multicast vlan 110
- Configuration procedure 110
- Multicast ip 111
- Multicast ip table 112
- Static multicast ip 112
- Multicast filter 113
- Ip range 114
- Port filter 115
- Configuration procedure 116
- Packet statistics 116
- Chapter 9 qos 118
- Configuration procedure 121
- Diffserv 121
- Port priority 121
- Schedule mode 122
- Configuration procedure 123
- Dscp priority 123
- P priority 123
- Configuration procedure 124
- Bandwidth control 125
- Rate limit 125
- Storm control 126
- Voice vlan 128
- Global config 130
- Port config 130
- Oui config 132
- Configuration procedure of voice vlan 133
- Chapter 10 poe 134
- Poe config 134
- Poe config 135
- Profile config 136
- Poe time range 137
- Time range summary 137
- Poe time range create 138
- Poe holiday config 139
- Chapter 11 acl 141
- Time range 141
- Time range summary 141
- Time range create 142
- Acl config 143
- Holiday config 143
- Acl create 144
- Acl summary 144
- Mac acl 145
- Extend ip acl 146
- Standard ip acl 146
- Policy config 148
- Policy create 148
- Policy summary 148
- Action create 149
- Binding table 150
- Policy binding 150
- Port binding 151
- Vlan binding 151
- Application example for acl 152
- Configuration procedure 152
- Binding table 155
- Chapter 12 network security 155
- Ip mac binding 155
- Manual binding 156
- Arp scanning 158
- Dhcp snooping 159
- Arp inspection 165
- Arp detect 169
- Arp defend 170
- Configuration procedure 170
- Arp statistics 172
- Dos defend 172
- Choose the menu network security dos defend dos defend to load the following page 173
- Dos attack type description 173
- On this page you can enable the dos defend type appropriate to your need 173
- Table 12 1 defendable dos attack types 173
- With dos defend function enabled the switch can analyze the specific fields of the ip packets and distinguish the malicious dos attack packets upon detecting the packets the switch will discard the illegal packets directly and limit the transmission rate of the legal packets if the over legal packets may incur a breakdown of the network the switch can defend a few types of dos attack listed in the following table 173
- Global config 178
- Port config 180
- Radius server 181
- Configuration procedure 182
- Chapter 13 snmp 183
- Global config 185
- Snmp config 185
- Snmp view 186
- Snmp group 187
- Snmp user 188
- Snmp community 190
- Configuration procedure 191
- Notification 192
- Event config 195
- History control 195
- Alarm config 196
- Chapter 14 lldp 199
- Lldp working mechanism 199
- Lldpdu format 199
- Basic config 203
- Global config 203
- The following entries are displayed on this screen 203
- Port config 204
- The following entries are displayed on this screen 204
- Device info 205
- Local info 205
- The following entries are displayed on this screen 205
- Neighbor info 206
- The following entries are displayed on this screen 206
- Device statistics 207
- The following entries are displayed on this screen 207
- Elements 208
- Lldp med 208
- Global config 209
- Port config 209
- The following entries are displayed on this screen 209
- Local info 211
- Neighbor info 212
- The following entries are displayed on this screen 212
- The following entries are displayed on this screen 213
- Chapter 15 cluster 214
- Neighbor info 215
- Ndp summary 216
- Ndp config 218
- Device table 219
- Ntdp summary 220
- Ntdp config 222
- Cluster 223
- Cluster summary 223
- Cluster config 224
- Application example for cluster function 226
- Chapter 16 maintenance 229
- Cpu monitor 229
- System monitor 229
- Memory monitor 230
- Log table 232
- Local log 233
- Remote log 233
- Backup log 234
- Cable test 235
- Device diagnose 235
- Loopback 236
- Network diagnose 236
- Tracert 237
- Appendix a specifications 239
- Appendix b configuring the pcs 240
- Appendix c load software using ftp 243
- Configure the hyper terminal 243
- Hardware installation 243
- Download firmware via bootutil menu 245
- Appendix d 802 x client software 248
- Installation guide 248
- Uninstall software 251
- Configuration 252
- Appendix e glossary 256
Похожие устройства
- Sony HDR-PJ30E Инструкция по эксплуатации
- Tp-Link TL-SG3424 Инструкция по эксплуатации
- Beko CE 58200 Инструкция по эксплуатации
- Asus TAICHI31-CX010H Инструкция по эксплуатации
- Sony STR-DK5 B Инструкция по эксплуатации
- Sony HDR-PJ10E Инструкция по эксплуатации
- Tp-Link TL-SG3216 Инструкция по эксплуатации
- Hotpoint-Ariston AQSL 85 Инструкция по эксплуатации
- Sony XAV-E622 Инструкция по эксплуатации
- Sony HDR-CX7EK Инструкция по эксплуатации
- Tp-Link TL-SG3210 Инструкция по эксплуатации
- Panasonic TC-14X1 Инструкция по эксплуатации
- Sony CDX-GT29 EE Инструкция по эксплуатации
- Sony HDR-CX700VE Инструкция по эксплуатации
- Tp-Link TL-SL3452 Инструкция по эксплуатации
- Panasonic KX-FT21RS Инструкция по эксплуатации
- Sony CDX-GT35 U Инструкция по эксплуатации
- Sony HDR-CX700E Инструкция по эксплуатации
- Tp-Link TL-SL3428 Инструкция по эксплуатации
- Toshiba GR-H64RD Инструкция по эксплуатации