Tp-Link TL-SL3428 Инструкция по эксплуатации онлайн [174/234] 38912
![Tp-Link TL-SL3428 Инструкция по эксплуатации онлайн [174/234] 38912](/views2/1042103/page174/bgae.png)
SNMP
v1: SNMP v1 adopts Community Name authentication. The community name is used to
define the relation between SNMP Management Station and SNMP Agent. The SNMP packets
failing to pass community name authentication are discarded. The community name can limit
access to SNMP Agent from SNMP NMS, functioning as a password.
SNMP v2c: SNMP v2c also adopts community name authentication. It is compatible with SNMP
v1 while enlarges the function of SNMP v1.
SNMP v3: Basing on SNMP v1 and SNMP v2c, SNMP v3 extremely enhances the security and
manageability. It adopts VACM (View-based Access Control Model) and USM (User-Based
Security Model) authentication. The user can configure the authentication and the encryption
functions. The authentication function is to limit the access of the illegal user by authenticating the
senders of packets. Meanwhile, the encryption function is used to encrypt the packets transmitted
between SNMP Management Station and SNMP Agent so as to prevent any information being
stolen. The multiple combinations of authentication function and encryption function can
guarantee a more reliable communication between SNMP Management station and SNMP Agent.
MIB Introduction
To uniquely identify the management objects of the device in SNMP messages, SNMP adopts the
hierarchical architecture to identify the managed objects. It is like a tree, and each tree node
represents a managed object, as shown in the following figure. Thus the object can be identified
with the unique path starting from the root and indicated by a string of numbers. The number string
is the Object Identifier of the managed object. In the following figure, the OID of the managed
object B is {1.2.1.1}. While the OID of the managed object A is {1.2.1.1.5}.
Figure 12-2 Architecture of the MIB tree
SNMP Configuration Outline
1. Create View
The SNMP View is created for the SNMP Management Station to manage MIB objects. The
managed object, uniquely identified by OID, can be set to under or out of the management of
SNMP Management Station by configuring its view type (included/excluded). The OID of managed
object can be found on the SNMP client program running on the SNMP Management Station.
2. Create SNMP Group
After creating the SNMP View, it’s required to create a SNMP Group. The Group Name, Security
Model and Security Level compose the identifier of the SNMP Group. The Groups with these three
items the same are considered to be the same. You can configure SNMP Group to control the
network access by providing the users in various groups with different management rights via the
Read View, Write View and Notify View.
3. Create SNMP User
167
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 8
- Chapter 1 about this guide 9
- Conventions 9
- Intended readers 9
- Overview of this guide 9
- Chapter 2 introduction 13
- Main features 13
- Overview of the switch 13
- Appearance description 14
- Front panel 14
- Rear panel 15
- Chapter 3 login to the switch 16
- Configuration 16
- Chapter 4 system 18
- System info 18
- System summary 18
- Device description 20
- The following entries are displayed on this screen 20
- System time 21
- The following entries are displayed on this screen 21
- System ip 22
- The following entries are displayed on this screen 22
- User manage 23
- User table 23
- The following entries are displayed on this screen 24
- User config 24
- Config restore 25
- System tools 25
- The following entries are displayed on this screen 25
- Config backup 26
- Firmware upgrade 26
- The following entries are displayed on this screen 26
- System reboot 27
- System reset 27
- Access control 28
- Access security 28
- The following entries are displayed on this screen 29
- Ssl config 30
- Ssh config 31
- The following entries are displayed on this screen 31
- The following entries are displayed on this screen 32
- Application example 1 for ssh 33
- Application example 2 for ssh 34
- Chapter 5 switching 37
- Port config 37
- Port mirror 38
- Port security 41
- Port isolation 43
- Lag table 44
- Static lag 46
- Lacp config 47
- Traffic monitor 49
- Traffic summary 49
- Traffic statistics 50
- Mac address 51
- Address table 52
- Static address 54
- Dynamic address 55
- Filtering address 57
- Chapter 6 vlan 59
- Q vlan 60
- Vlan config 62
- Port config 64
- Configuration procedure 65
- Protocol vlan 66
- Protocol template 67
- Protocol vlan 67
- Port enable 68
- Application example for 802 q vlan 69
- Configuration procedure 69
- Application example for protocol vlan 71
- Configuration procedure 75
- Chapter 7 spanning tree 76
- Stp config 81
- The following entries are displayed on this screen 82
- Stp summary 83
- Port config 84
- The following entries are displayed on this screen 85
- Mstp instance 86
- Region config 86
- Instance config 87
- The following entries are displayed on this screen 87
- Instance port config 88
- The following entries are displayed on this screen 88
- The following entries are displayed on this screen 89
- Global configuration procedure for spanning tree function 90
- Port protect 90
- Stp security 90
- The following entries are displayed on this screen 92
- Tc protect 93
- The following entries are displayed on this screen 93
- Application example for stp function 94
- Chapter 8 multicast 98
- Igmp snooping 100
- Snooping config 101
- Port config 102
- The following entries are displayed on this screen 102
- The following entries are displayed on this screen 103
- Vlan config 103
- The following entries are displayed on this screen 104
- Configuration procedure 105
- Multicast vlan 105
- The following entries are displayed on this screen 106
- Application example for multicast vlan 107
- Configuration procedure 107
- Multicast ip 108
- Multicast ip table 109
- Static multicast ip 109
- The following entries are displayed on this screen 109
- The following entries are displayed on this screen 110
- Ip range 111
- Multicast filter 111
- The following entries are displayed on this screen 111
- Port filter 112
- The following entries are displayed on this screen 112
- Configuration procedure 113
- Packet statistics 113
- The following entries are displayed on this screen 113
- Chapter 9 qos 115
- Diffserv 118
- Port priority 118
- The following entries are displayed on this screen 118
- Configuration procedure 119
- Schedule mode 119
- The following entries are displayed on this screen 119
- P priority 120
- The following entries are displayed on this screen 120
- Configuration procedure 121
- Dscp priority 121
- Configuration procedure 122
- The following entries are displayed on this screen 122
- Bandwidth control 123
- Rate limit 123
- The following entries are displayed on this screen 123
- Storm control 124
- The following entries are displayed on this screen 125
- Voice vlan 125
- Global config 127
- Port config 128
- The following entries are displayed on this screen 128
- Oui config 129
- The following entries are displayed on this screen 129
- Configuration procedure of voice vlan 130
- The following entries are displayed on this screen 130
- Chapter 10 acl 131
- The following entries are displayed on this screen 131
- Time range 131
- Time range summary 131
- The following entries are displayed on this screen 132
- Time range create 132
- Acl config 133
- Holiday config 133
- The following entries are displayed on this screen 133
- Acl create 134
- Acl summary 134
- The following entries are displayed on this screen 134
- Mac acl 135
- The following entries are displayed on this screen 135
- Standard ip acl 136
- The following entries are displayed on this screen 136
- Extend ip acl 137
- The following entries are displayed on this screen 137
- Policy config 138
- Policy summary 138
- The following entries are displayed on this screen 138
- Action create 139
- Ies are displayed on this screen 139
- Policy create 139
- The following entr 139
- Binding table 140
- Policy binding 140
- The following entries are displayed on this screen 140
- Are displayed on this screen 141
- Port binding 141
- The following entries 141
- Vlan binding 141
- Application example for acl 142
- Configuration procedure 142
- The following entries are displayed on this screen 142
- Binding table 145
- Chapter 11 network security 145
- Ip mac binding 145
- Manual binding 146
- Arp scanning 148
- Dhcp snooping 149
- Arp inspection 155
- Arp detect 159
- Arp defend 160
- Configuration procedure 160
- Arp statistics 161
- Dos defend 162
- Choose the menu network security dos defend dos defend to load the following page 163
- Config 163
- Dos attack type description 163
- Figure 11 16 dos defend 163
- On this page you can enable the dos defend type appropriate to your need 163
- Table 11 1 defendable dos attack types 163
- The following entries are displayed on this screen 163
- Global config 168
- Port config 169
- Radius server 171
- Configuration procedure 172
- Chapter 12 snmp 173
- Global config 175
- Snmp config 175
- Snmp view 176
- Snmp group 177
- Snmp user 178
- Snmp community 180
- Configuration procedure 181
- Notification 182
- Event config 185
- History control 185
- Alarm config 186
- Chapter 13 cluster 189
- Neighbor info 190
- Ndp summary 191
- The following entries are displayed on this screen 191
- The following entries are displayed on this screen 192
- Ndp config 193
- The following entries are displayed on this screen 193
- Device table 194
- The following entries are displayed on this screen 194
- Ntdp summary 195
- The following entries are displayed on this screen 196
- Ntdp config 197
- The following entries are displayed on this screen 197
- Cluster 198
- Cluster summary 198
- The following entries are displayed on this screen 198
- The following entries are displayed on this screen 199
- Cluster config 200
- The following entries are displayed on this screen 200
- Application example for cluster function 201
- The following entries are displayed on this screen 201
- Chapter 14 maintenance 204
- Cpu monitor 204
- System monitor 204
- Memory monitor 205
- Log table 207
- Local log 208
- Remote log 208
- Backup log 209
- Cable test 210
- Device diagnose 210
- Loopback 211
- Network diagnose 212
- Tracert 213
- Chapter 15 system maintenance via ftp 214
- Configure the hyper terminal 214
- Hardware installation 214
- Download firmware via booutil menu 216
- Appendix a specifications 219
- Appendix b configuring the pcs 220
- Appendix c 802 x client software 223
- Installation guide 223
- Uninstall software 226
- Configuration 227
- Appendix d glossary 231
Похожие устройства
- Toshiba GR-H64RD Инструкция по эксплуатации
- Sony CDX-GT454US Инструкция по эксплуатации
- Sony HDR-CX6EK Инструкция по эксплуатации
- Tp-Link TL-SG2424 Инструкция по эксплуатации
- Sony CDX-GT457UE Инструкция по эксплуатации
- Sony HDR-CX690E Инструкция по эксплуатации
- Tp-Link TL-SG2216 Инструкция по эксплуатации
- Beko CE 58100 Инструкция по эксплуатации
- Sony CDX-GT650UI Инструкция по эксплуатации
- Sony HDR-CX560VE Инструкция по эксплуатации
- Tp-Link TL-SL2210WEB Инструкция по эксплуатации
- Panasonic TC-14SV2 Инструкция по эксплуатации
- Sony CDX-GT747 UI Инструкция по эксплуатации
- Sony HDR-CX560E Инструкция по эксплуатации
- Tp-Link TL-SL2218WEB Инструкция по эксплуатации
- Panasonic KX-FPC96 Инструкция по эксплуатации
- Sony DSX-S100 Инструкция по эксплуатации
- Sony HDR-CX550VE Инструкция по эксплуатации
- Tp-Link TL-SL2428WEB Инструкция по эксплуатации
- Sony XSGTX121LC Инструкция по эксплуатации