Tp-Link TL-SL3428 [176/234] Snmp view
![Tp-Link TL-SL3428 [176/234] Snmp view](/views2/1042103/page176/bgb0.png)
Note:
The amount of Engine ID characters must be even.
12.1.2 SNMP View
The OID (Object Identifier) of the SNMP packets is used to describe the managed objects of the
switch, and the MIB (Management Information Base) is the set of the OIDs. The SNMP View is
created for the SNMP management station to manage MIB objects.
Choose the menu SNMP→SNMP Config→SNMP View to load the following page.
Figure 12-4 SNMP View
The following entries are displayed on this screen:
View Config
View Name: Give a name to the View for identification. Each View can
include several entries with the same name.
MIB Object ID: Enter the Object Identifier (OID) for the entry of View.
View Type: Select the type for the view entry.
Include: The view entry can be managed by the SNMP
management station.
Exclude: The view entry can not be managed by the SNMP
management station.
View Table
Select: Select the desired entry to delete the corresponding view. All
the entries of a View will be deleted together.
View Name: Displays the name of the View entry.
View Type: Displays the type of the View entry.
MIB Object ID: Displays the OID of the View entry.
169
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 8
- Chapter 1 about this guide 9
- Conventions 9
- Intended readers 9
- Overview of this guide 9
- Chapter 2 introduction 13
- Main features 13
- Overview of the switch 13
- Appearance description 14
- Front panel 14
- Rear panel 15
- Chapter 3 login to the switch 16
- Configuration 16
- Chapter 4 system 18
- System info 18
- System summary 18
- Device description 20
- The following entries are displayed on this screen 20
- System time 21
- The following entries are displayed on this screen 21
- System ip 22
- The following entries are displayed on this screen 22
- User manage 23
- User table 23
- The following entries are displayed on this screen 24
- User config 24
- Config restore 25
- System tools 25
- The following entries are displayed on this screen 25
- Config backup 26
- Firmware upgrade 26
- The following entries are displayed on this screen 26
- System reboot 27
- System reset 27
- Access control 28
- Access security 28
- The following entries are displayed on this screen 29
- Ssl config 30
- Ssh config 31
- The following entries are displayed on this screen 31
- The following entries are displayed on this screen 32
- Application example 1 for ssh 33
- Application example 2 for ssh 34
- Chapter 5 switching 37
- Port config 37
- Port mirror 38
- Port security 41
- Port isolation 43
- Lag table 44
- Static lag 46
- Lacp config 47
- Traffic monitor 49
- Traffic summary 49
- Traffic statistics 50
- Mac address 51
- Address table 52
- Static address 54
- Dynamic address 55
- Filtering address 57
- Chapter 6 vlan 59
- Q vlan 60
- Vlan config 62
- Port config 64
- Configuration procedure 65
- Protocol vlan 66
- Protocol template 67
- Protocol vlan 67
- Port enable 68
- Application example for 802 q vlan 69
- Configuration procedure 69
- Application example for protocol vlan 71
- Configuration procedure 75
- Chapter 7 spanning tree 76
- Stp config 81
- The following entries are displayed on this screen 82
- Stp summary 83
- Port config 84
- The following entries are displayed on this screen 85
- Mstp instance 86
- Region config 86
- Instance config 87
- The following entries are displayed on this screen 87
- Instance port config 88
- The following entries are displayed on this screen 88
- The following entries are displayed on this screen 89
- Global configuration procedure for spanning tree function 90
- Port protect 90
- Stp security 90
- The following entries are displayed on this screen 92
- Tc protect 93
- The following entries are displayed on this screen 93
- Application example for stp function 94
- Chapter 8 multicast 98
- Igmp snooping 100
- Snooping config 101
- Port config 102
- The following entries are displayed on this screen 102
- The following entries are displayed on this screen 103
- Vlan config 103
- The following entries are displayed on this screen 104
- Configuration procedure 105
- Multicast vlan 105
- The following entries are displayed on this screen 106
- Application example for multicast vlan 107
- Configuration procedure 107
- Multicast ip 108
- Multicast ip table 109
- Static multicast ip 109
- The following entries are displayed on this screen 109
- The following entries are displayed on this screen 110
- Ip range 111
- Multicast filter 111
- The following entries are displayed on this screen 111
- Port filter 112
- The following entries are displayed on this screen 112
- Configuration procedure 113
- Packet statistics 113
- The following entries are displayed on this screen 113
- Chapter 9 qos 115
- Diffserv 118
- Port priority 118
- The following entries are displayed on this screen 118
- Configuration procedure 119
- Schedule mode 119
- The following entries are displayed on this screen 119
- P priority 120
- The following entries are displayed on this screen 120
- Configuration procedure 121
- Dscp priority 121
- Configuration procedure 122
- The following entries are displayed on this screen 122
- Bandwidth control 123
- Rate limit 123
- The following entries are displayed on this screen 123
- Storm control 124
- The following entries are displayed on this screen 125
- Voice vlan 125
- Global config 127
- Port config 128
- The following entries are displayed on this screen 128
- Oui config 129
- The following entries are displayed on this screen 129
- Configuration procedure of voice vlan 130
- The following entries are displayed on this screen 130
- Chapter 10 acl 131
- The following entries are displayed on this screen 131
- Time range 131
- Time range summary 131
- The following entries are displayed on this screen 132
- Time range create 132
- Acl config 133
- Holiday config 133
- The following entries are displayed on this screen 133
- Acl create 134
- Acl summary 134
- The following entries are displayed on this screen 134
- Mac acl 135
- The following entries are displayed on this screen 135
- Standard ip acl 136
- The following entries are displayed on this screen 136
- Extend ip acl 137
- The following entries are displayed on this screen 137
- Policy config 138
- Policy summary 138
- The following entries are displayed on this screen 138
- Action create 139
- Ies are displayed on this screen 139
- Policy create 139
- The following entr 139
- Binding table 140
- Policy binding 140
- The following entries are displayed on this screen 140
- Are displayed on this screen 141
- Port binding 141
- The following entries 141
- Vlan binding 141
- Application example for acl 142
- Configuration procedure 142
- The following entries are displayed on this screen 142
- Binding table 145
- Chapter 11 network security 145
- Ip mac binding 145
- Manual binding 146
- Arp scanning 148
- Dhcp snooping 149
- Arp inspection 155
- Arp detect 159
- Arp defend 160
- Configuration procedure 160
- Arp statistics 161
- Dos defend 162
- Choose the menu network security dos defend dos defend to load the following page 163
- Config 163
- Dos attack type description 163
- Figure 11 16 dos defend 163
- On this page you can enable the dos defend type appropriate to your need 163
- Table 11 1 defendable dos attack types 163
- The following entries are displayed on this screen 163
- Global config 168
- Port config 169
- Radius server 171
- Configuration procedure 172
- Chapter 12 snmp 173
- Global config 175
- Snmp config 175
- Snmp view 176
- Snmp group 177
- Snmp user 178
- Snmp community 180
- Configuration procedure 181
- Notification 182
- Event config 185
- History control 185
- Alarm config 186
- Chapter 13 cluster 189
- Neighbor info 190
- Ndp summary 191
- The following entries are displayed on this screen 191
- The following entries are displayed on this screen 192
- Ndp config 193
- The following entries are displayed on this screen 193
- Device table 194
- The following entries are displayed on this screen 194
- Ntdp summary 195
- The following entries are displayed on this screen 196
- Ntdp config 197
- The following entries are displayed on this screen 197
- Cluster 198
- Cluster summary 198
- The following entries are displayed on this screen 198
- The following entries are displayed on this screen 199
- Cluster config 200
- The following entries are displayed on this screen 200
- Application example for cluster function 201
- The following entries are displayed on this screen 201
- Chapter 14 maintenance 204
- Cpu monitor 204
- System monitor 204
- Memory monitor 205
- Log table 207
- Local log 208
- Remote log 208
- Backup log 209
- Cable test 210
- Device diagnose 210
- Loopback 211
- Network diagnose 212
- Tracert 213
- Chapter 15 system maintenance via ftp 214
- Configure the hyper terminal 214
- Hardware installation 214
- Download firmware via booutil menu 216
- Appendix a specifications 219
- Appendix b configuring the pcs 220
- Appendix c 802 x client software 223
- Installation guide 223
- Uninstall software 226
- Configuration 227
- Appendix d glossary 231
Похожие устройства
- Toshiba GR-H64RD Инструкция по эксплуатации
- Sony CDX-GT454US Инструкция по эксплуатации
- Sony HDR-CX6EK Инструкция по эксплуатации
- Tp-Link TL-SG2424 Инструкция по эксплуатации
- Sony CDX-GT457UE Инструкция по эксплуатации
- Sony HDR-CX690E Инструкция по эксплуатации
- Tp-Link TL-SG2216 Инструкция по эксплуатации
- Beko CE 58100 Инструкция по эксплуатации
- Sony CDX-GT650UI Инструкция по эксплуатации
- Sony HDR-CX560VE Инструкция по эксплуатации
- Tp-Link TL-SL2210WEB Инструкция по эксплуатации
- Panasonic TC-14SV2 Инструкция по эксплуатации
- Sony CDX-GT747 UI Инструкция по эксплуатации
- Sony HDR-CX560E Инструкция по эксплуатации
- Tp-Link TL-SL2218WEB Инструкция по эксплуатации
- Panasonic KX-FPC96 Инструкция по эксплуатации
- Sony DSX-S100 Инструкция по эксплуатации
- Sony HDR-CX550VE Инструкция по эксплуатации
- Tp-Link TL-SL2428WEB Инструкция по эксплуатации
- Sony XSGTX121LC Инструкция по эксплуатации