Tp-Link TL-SL3428 Инструкция по эксплуатации онлайн [45/234] 38912
![Tp-Link TL-SL3428 Инструкция по эксплуатации онлайн [45/234] 38912](/views2/1042103/page45/bg2d.png)
Figure 5-6 LAG Table
The following entries are displayed on this screen:
Global Config
Hash Algorithm: Select the applied scope of Aggregate Arithmetic, which
results in choosing a port to transfer the packets.
SRC MAC + DST MAC: When this option is selected,
the Aggregate Arithmetic will apply to the source and
destination MAC addresses of the packets.
SRC IP + DST IP: When this option is selected, the
Aggregate Arithmetic will apply to the source and
destination IP addresses of the packets.
LAG Table
Select: Select the desired LAG. It is multi-optional.
Group Number: Displays the LAG number here.
Description: Displays the description of LAG.
Member: Displays the LAG member.
Operation: Allows you to view or modify the information for each LAG.
Edit: Click to modify the settings of the LAG.
Detail: Click to get the information of the LAG.
Click the Detail button for the detailed information of your selected LAG.
38
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 8
- Chapter 1 about this guide 9
- Conventions 9
- Intended readers 9
- Overview of this guide 9
- Chapter 2 introduction 13
- Main features 13
- Overview of the switch 13
- Appearance description 14
- Front panel 14
- Rear panel 15
- Chapter 3 login to the switch 16
- Configuration 16
- Chapter 4 system 18
- System info 18
- System summary 18
- Device description 20
- The following entries are displayed on this screen 20
- System time 21
- The following entries are displayed on this screen 21
- System ip 22
- The following entries are displayed on this screen 22
- User manage 23
- User table 23
- The following entries are displayed on this screen 24
- User config 24
- Config restore 25
- System tools 25
- The following entries are displayed on this screen 25
- Config backup 26
- Firmware upgrade 26
- The following entries are displayed on this screen 26
- System reboot 27
- System reset 27
- Access control 28
- Access security 28
- The following entries are displayed on this screen 29
- Ssl config 30
- Ssh config 31
- The following entries are displayed on this screen 31
- The following entries are displayed on this screen 32
- Application example 1 for ssh 33
- Application example 2 for ssh 34
- Chapter 5 switching 37
- Port config 37
- Port mirror 38
- Port security 41
- Port isolation 43
- Lag table 44
- Static lag 46
- Lacp config 47
- Traffic monitor 49
- Traffic summary 49
- Traffic statistics 50
- Mac address 51
- Address table 52
- Static address 54
- Dynamic address 55
- Filtering address 57
- Chapter 6 vlan 59
- Q vlan 60
- Vlan config 62
- Port config 64
- Configuration procedure 65
- Protocol vlan 66
- Protocol template 67
- Protocol vlan 67
- Port enable 68
- Application example for 802 q vlan 69
- Configuration procedure 69
- Application example for protocol vlan 71
- Configuration procedure 75
- Chapter 7 spanning tree 76
- Stp config 81
- The following entries are displayed on this screen 82
- Stp summary 83
- Port config 84
- The following entries are displayed on this screen 85
- Mstp instance 86
- Region config 86
- Instance config 87
- The following entries are displayed on this screen 87
- Instance port config 88
- The following entries are displayed on this screen 88
- The following entries are displayed on this screen 89
- Global configuration procedure for spanning tree function 90
- Port protect 90
- Stp security 90
- The following entries are displayed on this screen 92
- Tc protect 93
- The following entries are displayed on this screen 93
- Application example for stp function 94
- Chapter 8 multicast 98
- Igmp snooping 100
- Snooping config 101
- Port config 102
- The following entries are displayed on this screen 102
- The following entries are displayed on this screen 103
- Vlan config 103
- The following entries are displayed on this screen 104
- Configuration procedure 105
- Multicast vlan 105
- The following entries are displayed on this screen 106
- Application example for multicast vlan 107
- Configuration procedure 107
- Multicast ip 108
- Multicast ip table 109
- Static multicast ip 109
- The following entries are displayed on this screen 109
- The following entries are displayed on this screen 110
- Ip range 111
- Multicast filter 111
- The following entries are displayed on this screen 111
- Port filter 112
- The following entries are displayed on this screen 112
- Configuration procedure 113
- Packet statistics 113
- The following entries are displayed on this screen 113
- Chapter 9 qos 115
- Diffserv 118
- Port priority 118
- The following entries are displayed on this screen 118
- Configuration procedure 119
- Schedule mode 119
- The following entries are displayed on this screen 119
- P priority 120
- The following entries are displayed on this screen 120
- Configuration procedure 121
- Dscp priority 121
- Configuration procedure 122
- The following entries are displayed on this screen 122
- Bandwidth control 123
- Rate limit 123
- The following entries are displayed on this screen 123
- Storm control 124
- The following entries are displayed on this screen 125
- Voice vlan 125
- Global config 127
- Port config 128
- The following entries are displayed on this screen 128
- Oui config 129
- The following entries are displayed on this screen 129
- Configuration procedure of voice vlan 130
- The following entries are displayed on this screen 130
- Chapter 10 acl 131
- The following entries are displayed on this screen 131
- Time range 131
- Time range summary 131
- The following entries are displayed on this screen 132
- Time range create 132
- Acl config 133
- Holiday config 133
- The following entries are displayed on this screen 133
- Acl create 134
- Acl summary 134
- The following entries are displayed on this screen 134
- Mac acl 135
- The following entries are displayed on this screen 135
- Standard ip acl 136
- The following entries are displayed on this screen 136
- Extend ip acl 137
- The following entries are displayed on this screen 137
- Policy config 138
- Policy summary 138
- The following entries are displayed on this screen 138
- Action create 139
- Ies are displayed on this screen 139
- Policy create 139
- The following entr 139
- Binding table 140
- Policy binding 140
- The following entries are displayed on this screen 140
- Are displayed on this screen 141
- Port binding 141
- The following entries 141
- Vlan binding 141
- Application example for acl 142
- Configuration procedure 142
- The following entries are displayed on this screen 142
- Binding table 145
- Chapter 11 network security 145
- Ip mac binding 145
- Manual binding 146
- Arp scanning 148
- Dhcp snooping 149
- Arp inspection 155
- Arp detect 159
- Arp defend 160
- Configuration procedure 160
- Arp statistics 161
- Dos defend 162
- Choose the menu network security dos defend dos defend to load the following page 163
- Config 163
- Dos attack type description 163
- Figure 11 16 dos defend 163
- On this page you can enable the dos defend type appropriate to your need 163
- Table 11 1 defendable dos attack types 163
- The following entries are displayed on this screen 163
- Global config 168
- Port config 169
- Radius server 171
- Configuration procedure 172
- Chapter 12 snmp 173
- Global config 175
- Snmp config 175
- Snmp view 176
- Snmp group 177
- Snmp user 178
- Snmp community 180
- Configuration procedure 181
- Notification 182
- Event config 185
- History control 185
- Alarm config 186
- Chapter 13 cluster 189
- Neighbor info 190
- Ndp summary 191
- The following entries are displayed on this screen 191
- The following entries are displayed on this screen 192
- Ndp config 193
- The following entries are displayed on this screen 193
- Device table 194
- The following entries are displayed on this screen 194
- Ntdp summary 195
- The following entries are displayed on this screen 196
- Ntdp config 197
- The following entries are displayed on this screen 197
- Cluster 198
- Cluster summary 198
- The following entries are displayed on this screen 198
- The following entries are displayed on this screen 199
- Cluster config 200
- The following entries are displayed on this screen 200
- Application example for cluster function 201
- The following entries are displayed on this screen 201
- Chapter 14 maintenance 204
- Cpu monitor 204
- System monitor 204
- Memory monitor 205
- Log table 207
- Local log 208
- Remote log 208
- Backup log 209
- Cable test 210
- Device diagnose 210
- Loopback 211
- Network diagnose 212
- Tracert 213
- Chapter 15 system maintenance via ftp 214
- Configure the hyper terminal 214
- Hardware installation 214
- Download firmware via booutil menu 216
- Appendix a specifications 219
- Appendix b configuring the pcs 220
- Appendix c 802 x client software 223
- Installation guide 223
- Uninstall software 226
- Configuration 227
- Appendix d glossary 231
Похожие устройства
- Toshiba GR-H64RD Инструкция по эксплуатации
- Sony CDX-GT454US Инструкция по эксплуатации
- Sony HDR-CX6EK Инструкция по эксплуатации
- Tp-Link TL-SG2424 Инструкция по эксплуатации
- Sony CDX-GT457UE Инструкция по эксплуатации
- Sony HDR-CX690E Инструкция по эксплуатации
- Tp-Link TL-SG2216 Инструкция по эксплуатации
- Beko CE 58100 Инструкция по эксплуатации
- Sony CDX-GT650UI Инструкция по эксплуатации
- Sony HDR-CX560VE Инструкция по эксплуатации
- Tp-Link TL-SL2210WEB Инструкция по эксплуатации
- Panasonic TC-14SV2 Инструкция по эксплуатации
- Sony CDX-GT747 UI Инструкция по эксплуатации
- Sony HDR-CX560E Инструкция по эксплуатации
- Tp-Link TL-SL2218WEB Инструкция по эксплуатации
- Panasonic KX-FPC96 Инструкция по эксплуатации
- Sony DSX-S100 Инструкция по эксплуатации
- Sony HDR-CX550VE Инструкция по эксплуатации
- Tp-Link TL-SL2428WEB Инструкция по эксплуатации
- Sony XSGTX121LC Инструкция по эксплуатации