Tp-Link TL-SG3424 Инструкция по эксплуатации онлайн [99/241] 38892
Root Protect
A CIST and its secondary root bridges are usually located in the high-bandwidth core region.
Wrong configuration or malicious attacks may result in configuration BPDU packets with higher
priorities being received by the legal root bridge, which causes the current legal root bridge to lose
its position and network topology jitter to occur. In this case, flows that should travel along
high-speed links may lead to low-speed links, and network congestion may occur.
To avoid this, MSTP provides root protect function. Ports with this function enabled can only be set
as designated ports in all spanning tree instances. When a port of this type receives BDPU
packets with higher priority, it transits its state to blocking state and stops forwarding packets (as if
it is disconnected from the link). The port resumes the normal state if it does not receive any
configuration BPDU packets with higher priorities for a period of two times of forward delay.
TC Protect
A switch removes MAC address entries upon receiving TC-BPDU packets. If a user maliciously
sends a large amount of TC-BPDU packets to a switch in a short period, the switch will be busy
with removing MAC address entries, which may decrease the performance and stability of the
network.
To prevent the switch from frequently removing MAC address entries, you can enable the TC
protect function on the switch. With TC protect function enabled, if the account number of the
received TC-BPDUs exceeds the maximum number you set in the TC threshold field, the switch
will not performs the removing operation in the TC protect cycle. Such a mechanism prevents the
switch from frequently removing MAC address entries.
BPDU Protect
Ports of the switch directly connected to PCs or servers are configured as edge ports to rapidly
transit their states. When these ports receive BPDUs, the system automatically configures these
ports as non-edge ports and regenerates spanning trees, which may cause network topology jitter.
Normally these ports do not receive BPDUs, but if a user maliciously attacks the switch by sending
BPDUs, network topology jitter occurs.
To prevent this attack, MSTP provides BPDU protect function. With this function enabled on the
switch, the switch shuts down the edge ports that receive BPDUs and reports these cases to the
administrator. If a port is shut down, only the administrator can restore it.
BPDU Filter
BPDU filter function is to prevent BPDUs flood in the STP network. If a switch receives malicious
BPDUs, it forwards these BPDUs to the other switched in the network, which may result in
spanning trees being continuously regenerated. In this case, the switch occupying too much CPU
or the protocol status of BPDUs is wrong.
With BPDU filter function enabled, a port does not receive or forward BPDUs, but it sends out its
own BPDUs. Such a mechanism prevents the switch from being attacked by BPDUs so as to
guarantee generation the spanning trees correct.
Choose the menu Spanning Tree→STP Security→Port Protect to load the following page.
90
Содержание
- Jetstream l2 managed switch 1
- Tl sg3210 tl sg3216 tl sg3424 1
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety information 3
- Package contents 10
- Chapter 1 about this guide 11
- Conventions 11
- Intended readers 11
- Overview of this guide 11
- Chapter 2 introduction 15
- Main features 15
- Overview of the switch 15
- Appearance description 16
- Front panel 16
- Rear panel 17
- Chapter 3 login to the switch 18
- Configuration 18
- Chapter 4 system 20
- System info 20
- System summary 20
- Device description 22
- System time 22
- The following entries are displayed on this screen 22
- The following entries are displayed on this screen 23
- Daylight saving time 24
- The following entries are displayed on this screen 24
- System ip 25
- The following entries are displayed on this screen 25
- User config 26
- User manage 26
- User table 26
- The following entries are displayed on this screen 27
- Config backup 28
- Config restore 28
- System tools 28
- The following entries are displayed on this screen 28
- Firmware upgrade 29
- The following entries are displayed on this screen 29
- Access control 30
- Access security 30
- System reboot 30
- System reset 30
- The following entries are displayed on this screen 31
- Ssl config 32
- Ssh config 33
- The following entries are displayed on this screen 33
- The following entries are displayed on this screen 34
- Application example 1 for ssh 35
- Application example 2 for ssh 36
- Chapter 5 switching 39
- Port config 39
- The following entries are displayed on this screen 39
- Port mirror 40
- The following entries are displayed on this screen 41
- The following entries are displayed on this screen 42
- Port security 43
- The following entries are displayed on this screen 44
- Port isolation 45
- The following entries are displayed on this screen 45
- Loopback detection 46
- The following entries are displayed on this screen 46
- Lag table 48
- The following entries are displayed on this screen 48
- Static lag 49
- Lacp config 50
- The following entries are displayed on this screen 50
- The following entries are displayed on this screen 51
- Traffic monitor 52
- Traffic summary 52
- The following entries are displayed on this screen 53
- Traffic statistics 53
- The following entries are displayed on this screen 54
- Address table 55
- Mac address 55
- The following entries are displayed on this screen 56
- Static address 57
- The following entries are displayed on this screen 57
- Dynamic address 58
- The following entries are displayed on this screen 59
- Filtering address 60
- The following entries are displayed on this screen 61
- Chapter 6 vlan 63
- Q vlan 64
- Vlan config 66
- Port config 68
- Configuration procedure 69
- Mac vlan 70
- Configuration procedure 71
- Protocol vlan 71
- Protocol group 74
- Protocol group table 74
- Protocol template 75
- The following entries are displayed on this screen 75
- Application example for 802 q vlan 76
- Configuration procedure 76
- The following entries are displayed on this screen 76
- Application example for mac vlan 78
- Application example for protocol vlan 79
- The following entries are displayed on this screen 83
- Configuration procedure 84
- Chapter 7 spanning tree 85
- Stp config 90
- The following entries are displayed on this screen 91
- Port config 92
- Stp summary 92
- The following entries are displayed on this screen 93
- Mstp instance 94
- Region config 94
- Instance config 95
- The following entries are displayed on this screen 95
- Instance port config 96
- The following entries are displayed on this screen 96
- The following entries are displayed on this screen 97
- Global configuration procedure for spanning tree function 98
- Port protect 98
- Stp security 98
- The following entries are displayed on this screen 100
- Application example for stp function 101
- Tc protect 101
- The following entries are displayed on this screen 101
- Chapter 8 multicast 105
- Igmp snooping 107
- Snooping config 108
- Port config 109
- The following entries are displayed on this screen 109
- The following entries are displayed on this screen 110
- Vlan config 110
- The following entries are displayed on this screen 111
- Configuration procedure 112
- Multicast vlan 112
- Configuration procedure 113
- The following entries are displayed on this screen 113
- Application example for multicast vlan 114
- Multicast ip 115
- Multicast ip table 115
- Static multicast ip 116
- The following entries are displayed on this screen 116
- Ip range 117
- Multicast filter 117
- The following entries are displayed on this screen 117
- Port filter 118
- The following entries are displayed on this screen 118
- The following entries are displayed on this screen 119
- Configuration procedure 120
- Packet statistics 120
- The following entries are displayed on this screen 120
- Chapter 9 qos 122
- Diffserv 125
- Port priority 125
- The following entries are displayed on this screen 125
- Configuration procedure 126
- Dscp priority 126
- Configuration procedure 127
- P cos mapping 127
- The following entries are displayed on this screen 127
- Configuration procedure 128
- Schedule mode 128
- The following entries are displayed on this screen 128
- Bandwidth control 129
- Rate limit 129
- Storm control 130
- The following entries are displayed on this screen 130
- The following entries are displayed on this screen 131
- Voice vlan 132
- Global config 134
- Port config 134
- The following entries are displayed on this screen 134
- The following entries are displayed on this screen 135
- Oui config 136
- The following entries are displayed on this screen 136
- Configuration procedure of voice vlan 137
- Chapter 10 acl 138
- The following entries are displayed on this screen 138
- Time range 138
- Time range summary 138
- The following entries are displayed on this screen 139
- Time range create 139
- Acl config 140
- Holiday config 140
- The following entries are displayed on this screen 140
- Acl create 141
- Acl summary 141
- The following entries are displayed on this screen 141
- Mac acl 142
- The following entries are displayed on this screen 142
- Extend ip acl 143
- Standard ip acl 143
- The following entries are displayed on this screen 143
- The following entries are displayed on this screen 144
- Policy config 145
- Policy create 145
- Policy summary 145
- The following entries are displayed on this screen 145
- Action create 146
- The following entries are displayed on this screen 146
- Binding table 147
- Policy binding 147
- The following entries are displayed on this screen 147
- Port binding 148
- The following entries are displayed on this screen 148
- Vlan binding 148
- Application example for acl 149
- Configuration procedure 149
- The following entries are displayed on this screen 149
- Binding table 152
- Chapter 11 network security 152
- Ip mac binding 152
- Manual binding 153
- The following entries are displayed on this screen 153
- The following entries are displayed on this screen 154
- Arp scanning 155
- Dhcp snooping 156
- The following entries are displayed on this screen 156
- The following entries are displayed on this screen 160
- Arp inspection 162
- Arp detect 166
- The following entries are displayed on this screen 166
- Arp defend 167
- Configuration procedure 167
- Arp statistics 168
- The following entries are displayed on this screen 168
- Dos defend 169
- The following entries are displayed on this screen 169
- Choose the menu network security dos defend dos defend to load the following page 170
- Dos attack type description 170
- On this page you can enable the dos defend type appropriate to your need 170
- Table 11 1 defendable dos attack types 170
- The following entries are displayed on this screen 171
- Global config 175
- The following entries are displayed on this screen 176
- Port config 177
- The following entries are displayed on this screen 177
- Radius server 178
- The following entries are displayed on this screen 178
- Configuration procedure 179
- Chapter 12 snmp 180
- Global config 182
- Snmp config 182
- The following entries are displayed on this screen 182
- Snmp view 183
- The following entries are displayed on this screen 183
- Snmp group 184
- The following entries are displayed on this screen 184
- Snmp user 185
- The following entries are displayed on this screen 186
- Snmp community 187
- The following entries are displayed on this screen 187
- Configuration procedure 188
- Notification 189
- The following entries are displayed on this screen 190
- Event config 192
- History control 192
- The following entries are displayed on this screen 192
- Alarm config 193
- The following entries are displayed on this screen 193
- The following entries are displayed on this screen 194
- Chapter 13 cluster 196
- Neighbor info 197
- Ndp summary 198
- The following entries are displayed on this screen 198
- The following entries are displayed on this screen 199
- Ndp config 200
- The following entries are displayed on this screen 200
- Device table 201
- The following entries are displayed on this screen 201
- Ntdp summary 202
- Ntdp config 203
- The following entries are displayed on this screen 203
- The following entries are displayed on this screen 204
- Cluster 205
- Cluster summary 205
- The following entries are displayed on this screen 205
- Cluster config 206
- The following entries are displayed on this screen 206
- The following entries are displayed on this screen 207
- Application example for cluster function 208
- The following entries are displayed on this screen 208
- Chapter 14 maintenance 211
- Cpu monitor 211
- System monitor 211
- Memory monitor 212
- Log table 214
- The following entries are displayed on this screen 214
- Local log 215
- Remote log 215
- The following entries are displayed on this screen 215
- Backup log 216
- The following entries are displayed on this screen 216
- Cable test 217
- Device diagnose 217
- The following entries are displayed on this screen 217
- The following entry is displayed on this screen 217
- Loopback 218
- Network diagnose 218
- The following entries are displayed on this screen 218
- The following entries are displayed on this screen 219
- Tracert 219
- The following entries are displayed on this screen 220
- Appendix a specifications 221
- Appendix b configuring the pcs 222
- Appendix c load software using ftp 225
- Configure the hyper terminal 225
- Hardware installation 225
- Download firmware via bootutil menu 227
- Appendix d 802 x client software 230
- Installation guide 230
- Uninstall software 233
- Configuration 234
- Appendix e glossary 238
Похожие устройства
- Beko CE 58200 Инструкция по эксплуатации
- Asus TAICHI31-CX010H Инструкция по эксплуатации
- Sony STR-DK5 B Инструкция по эксплуатации
- Sony HDR-PJ10E Инструкция по эксплуатации
- Tp-Link TL-SG3216 Инструкция по эксплуатации
- Hotpoint-Ariston AQSL 85 Инструкция по эксплуатации
- Sony XAV-E622 Инструкция по эксплуатации
- Sony HDR-CX7EK Инструкция по эксплуатации
- Tp-Link TL-SG3210 Инструкция по эксплуатации
- Panasonic TC-14X1 Инструкция по эксплуатации
- Sony CDX-GT29 EE Инструкция по эксплуатации
- Sony HDR-CX700VE Инструкция по эксплуатации
- Tp-Link TL-SL3452 Инструкция по эксплуатации
- Panasonic KX-FT21RS Инструкция по эксплуатации
- Sony CDX-GT35 U Инструкция по эксплуатации
- Sony HDR-CX700E Инструкция по эксплуатации
- Tp-Link TL-SL3428 Инструкция по эксплуатации
- Toshiba GR-H64RD Инструкция по эксплуатации
- Sony CDX-GT454US Инструкция по эксплуатации
- Sony HDR-CX6EK Инструкция по эксплуатации