Tp-Link TL-SL3428 Инструкция по эксплуатации онлайн [4/234] 38912
5.1.2 Port Mirror ........................................................................................................31
5.1.3 Port Security ....................................................................................................34
5.1.4 Port Isolation ....................................................................................................36
5.2 LAG ............................................................................................................................37
5.2.1 LAG Table ........................................................................................................37
5.2.2 Static LAG........................................................................................................39
5.2.3 LACP Config ....................................................................................................40
5.3 Traffic Monitor.............................................................................................................42
5.3.1 Traffic Summary...............................................................................................42
5.3.2 Traffic Statistics ................................................................................................43
5.4 MAC Address..............................................................................................................44
5.4.1 Address Table ..................................................................................................45
5.4.2 Static Address ..................................................................................................47
5.4.3 Dynamic Address .............................................................................................48
5.4.4 Filtering Address ..............................................................................................50
Chapter 6 VLAN..........................................................................................................................52
6.1 802.1Q VLAN..............................................................................................................53
6.1.1 VLAN Config ....................................................................................................55
6.1.2 Port Config .......................................................................................................57
6.2 Protocol VLAN ............................................................................................................59
6.2.1 Protocol VLA
N .................................................................................................60
6.2.2 Protocol Template ............................................................................................60
6.2.3 Port Enable ......................................................................................................61
6.3 Application Example for 802.1Q VLAN .......................................................................62
6.4 Application Example for Protocol VLAN......................................................................64
6.5 GVRP .........................................................................................................................65
Chapter 7 Spanning Tree ............................................................................................................69
7.1 STP Config .................................................................................................................74
7.1.1 STP Config.......................................................................................................74
7.1.2 STP Summary..................................................................................................76
7.2 Port Config..................................................................................................................77
7.3 MSTP Instance ...........................................................................................................79
7.3.1 Region Config ..................................................................................................79
7.3.2 Instance Config ................................................................................................80
7.3.3 Instance Port Config.........................................................................................81
7.4 STP Security...............................................................................................................83
7.4.1 Port Protect ......................................................................................................83
III
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 8
- Chapter 1 about this guide 9
- Conventions 9
- Intended readers 9
- Overview of this guide 9
- Chapter 2 introduction 13
- Main features 13
- Overview of the switch 13
- Appearance description 14
- Front panel 14
- Rear panel 15
- Chapter 3 login to the switch 16
- Configuration 16
- Chapter 4 system 18
- System info 18
- System summary 18
- Device description 20
- The following entries are displayed on this screen 20
- System time 21
- The following entries are displayed on this screen 21
- System ip 22
- The following entries are displayed on this screen 22
- User manage 23
- User table 23
- The following entries are displayed on this screen 24
- User config 24
- Config restore 25
- System tools 25
- The following entries are displayed on this screen 25
- Config backup 26
- Firmware upgrade 26
- The following entries are displayed on this screen 26
- System reboot 27
- System reset 27
- Access control 28
- Access security 28
- The following entries are displayed on this screen 29
- Ssl config 30
- Ssh config 31
- The following entries are displayed on this screen 31
- The following entries are displayed on this screen 32
- Application example 1 for ssh 33
- Application example 2 for ssh 34
- Chapter 5 switching 37
- Port config 37
- Port mirror 38
- Port security 41
- Port isolation 43
- Lag table 44
- Static lag 46
- Lacp config 47
- Traffic monitor 49
- Traffic summary 49
- Traffic statistics 50
- Mac address 51
- Address table 52
- Static address 54
- Dynamic address 55
- Filtering address 57
- Chapter 6 vlan 59
- Q vlan 60
- Vlan config 62
- Port config 64
- Configuration procedure 65
- Protocol vlan 66
- Protocol template 67
- Protocol vlan 67
- Port enable 68
- Application example for 802 q vlan 69
- Configuration procedure 69
- Application example for protocol vlan 71
- Configuration procedure 75
- Chapter 7 spanning tree 76
- Stp config 81
- The following entries are displayed on this screen 82
- Stp summary 83
- Port config 84
- The following entries are displayed on this screen 85
- Mstp instance 86
- Region config 86
- Instance config 87
- The following entries are displayed on this screen 87
- Instance port config 88
- The following entries are displayed on this screen 88
- The following entries are displayed on this screen 89
- Global configuration procedure for spanning tree function 90
- Port protect 90
- Stp security 90
- The following entries are displayed on this screen 92
- Tc protect 93
- The following entries are displayed on this screen 93
- Application example for stp function 94
- Chapter 8 multicast 98
- Igmp snooping 100
- Snooping config 101
- Port config 102
- The following entries are displayed on this screen 102
- The following entries are displayed on this screen 103
- Vlan config 103
- The following entries are displayed on this screen 104
- Configuration procedure 105
- Multicast vlan 105
- The following entries are displayed on this screen 106
- Application example for multicast vlan 107
- Configuration procedure 107
- Multicast ip 108
- Multicast ip table 109
- Static multicast ip 109
- The following entries are displayed on this screen 109
- The following entries are displayed on this screen 110
- Ip range 111
- Multicast filter 111
- The following entries are displayed on this screen 111
- Port filter 112
- The following entries are displayed on this screen 112
- Configuration procedure 113
- Packet statistics 113
- The following entries are displayed on this screen 113
- Chapter 9 qos 115
- Diffserv 118
- Port priority 118
- The following entries are displayed on this screen 118
- Configuration procedure 119
- Schedule mode 119
- The following entries are displayed on this screen 119
- P priority 120
- The following entries are displayed on this screen 120
- Configuration procedure 121
- Dscp priority 121
- Configuration procedure 122
- The following entries are displayed on this screen 122
- Bandwidth control 123
- Rate limit 123
- The following entries are displayed on this screen 123
- Storm control 124
- The following entries are displayed on this screen 125
- Voice vlan 125
- Global config 127
- Port config 128
- The following entries are displayed on this screen 128
- Oui config 129
- The following entries are displayed on this screen 129
- Configuration procedure of voice vlan 130
- The following entries are displayed on this screen 130
- Chapter 10 acl 131
- The following entries are displayed on this screen 131
- Time range 131
- Time range summary 131
- The following entries are displayed on this screen 132
- Time range create 132
- Acl config 133
- Holiday config 133
- The following entries are displayed on this screen 133
- Acl create 134
- Acl summary 134
- The following entries are displayed on this screen 134
- Mac acl 135
- The following entries are displayed on this screen 135
- Standard ip acl 136
- The following entries are displayed on this screen 136
- Extend ip acl 137
- The following entries are displayed on this screen 137
- Policy config 138
- Policy summary 138
- The following entries are displayed on this screen 138
- Action create 139
- Ies are displayed on this screen 139
- Policy create 139
- The following entr 139
- Binding table 140
- Policy binding 140
- The following entries are displayed on this screen 140
- Are displayed on this screen 141
- Port binding 141
- The following entries 141
- Vlan binding 141
- Application example for acl 142
- Configuration procedure 142
- The following entries are displayed on this screen 142
- Binding table 145
- Chapter 11 network security 145
- Ip mac binding 145
- Manual binding 146
- Arp scanning 148
- Dhcp snooping 149
- Arp inspection 155
- Arp detect 159
- Arp defend 160
- Configuration procedure 160
- Arp statistics 161
- Dos defend 162
- Choose the menu network security dos defend dos defend to load the following page 163
- Config 163
- Dos attack type description 163
- Figure 11 16 dos defend 163
- On this page you can enable the dos defend type appropriate to your need 163
- Table 11 1 defendable dos attack types 163
- The following entries are displayed on this screen 163
- Global config 168
- Port config 169
- Radius server 171
- Configuration procedure 172
- Chapter 12 snmp 173
- Global config 175
- Snmp config 175
- Snmp view 176
- Snmp group 177
- Snmp user 178
- Snmp community 180
- Configuration procedure 181
- Notification 182
- Event config 185
- History control 185
- Alarm config 186
- Chapter 13 cluster 189
- Neighbor info 190
- Ndp summary 191
- The following entries are displayed on this screen 191
- The following entries are displayed on this screen 192
- Ndp config 193
- The following entries are displayed on this screen 193
- Device table 194
- The following entries are displayed on this screen 194
- Ntdp summary 195
- The following entries are displayed on this screen 196
- Ntdp config 197
- The following entries are displayed on this screen 197
- Cluster 198
- Cluster summary 198
- The following entries are displayed on this screen 198
- The following entries are displayed on this screen 199
- Cluster config 200
- The following entries are displayed on this screen 200
- Application example for cluster function 201
- The following entries are displayed on this screen 201
- Chapter 14 maintenance 204
- Cpu monitor 204
- System monitor 204
- Memory monitor 205
- Log table 207
- Local log 208
- Remote log 208
- Backup log 209
- Cable test 210
- Device diagnose 210
- Loopback 211
- Network diagnose 212
- Tracert 213
- Chapter 15 system maintenance via ftp 214
- Configure the hyper terminal 214
- Hardware installation 214
- Download firmware via booutil menu 216
- Appendix a specifications 219
- Appendix b configuring the pcs 220
- Appendix c 802 x client software 223
- Installation guide 223
- Uninstall software 226
- Configuration 227
- Appendix d glossary 231
Похожие устройства
- Toshiba GR-H64RD Инструкция по эксплуатации
- Sony CDX-GT454US Инструкция по эксплуатации
- Sony HDR-CX6EK Инструкция по эксплуатации
- Tp-Link TL-SG2424 Инструкция по эксплуатации
- Sony CDX-GT457UE Инструкция по эксплуатации
- Sony HDR-CX690E Инструкция по эксплуатации
- Tp-Link TL-SG2216 Инструкция по эксплуатации
- Beko CE 58100 Инструкция по эксплуатации
- Sony CDX-GT650UI Инструкция по эксплуатации
- Sony HDR-CX560VE Инструкция по эксплуатации
- Tp-Link TL-SL2210WEB Инструкция по эксплуатации
- Panasonic TC-14SV2 Инструкция по эксплуатации
- Sony CDX-GT747 UI Инструкция по эксплуатации
- Sony HDR-CX560E Инструкция по эксплуатации
- Tp-Link TL-SL2218WEB Инструкция по эксплуатации
- Panasonic KX-FPC96 Инструкция по эксплуатации
- Sony DSX-S100 Инструкция по эксплуатации
- Sony HDR-CX550VE Инструкция по эксплуатации
- Tp-Link TL-SL2428WEB Инструкция по эксплуатации
- Sony XSGTX121LC Инструкция по эксплуатации