Tp-Link TL-SG2424 [32/130] Port security
![Tp-Link TL-SG2424 [32/130] Port security](/views2/1042108/page32/bg20.png)
Mirrored Port
Port Select: Click the Select button to quick-select the corresponding port based
on the port number you entered.
Select: Select the desired port as a mirrored port. It is multi-optional.
Port: Displays the port number.
Ingress: Select Enable/Disable the Ingress feature. When the Ingress is
enabled, the incoming packets received by the mirrored port will be
copied to the mirroring port.
Egress: Select Enable/Disable the Egress feature. When the Egress is
enabled, the outgoing packets sent by the mirrored port will be
copied to the mirroring port.
LAG: Displays the LAG number which the port belongs to. The LAG
member can not be selected as the mirrored port or mirroring port.
Note:
1. The LAG member can not be selected as the mirrored port or mirroring port.
2. A port can not be set as the mirrored port and the mirroring port simultaneously.
3. The Port Mirror function can take effect span the multiple VLANs.
5.1.3 Port Security
MAC Address Table maintains the mapping relationship between the port and the MAC address of
the connected device, which is the base of the packet forwarding. The capacity of MAC Address
Table is fixed. MAC Address Attack is the attack method that the attacker takes to obtain the
network information illegally. The attacker uses tools to generate the cheating MAC address and
quickly occupy the MAC Address Table. When the MAC Address Table is full, the switch will
broadcast the packets to all the ports. At this moment, the attacker can obtain the network
information via various sniffers and attacks. When the MAC Address Table is full, the packets
traffic will flood to all the ports, which results in overload, lower speed, packets drop and even
breakdown of the system.
Port Security is to protect the switch from the malicious MAC Address Attack by limiting the
maximum number of MAC addresses that can be learned on the port. The port with Port Security
feature enabled will learn the MAC address dynamically. When the learned MAC address number
reaches the maximum, the port will stop learning. Thereafter, the other devices with the MAC
address unlearned can not access to the network via this port.
Choose the menu Switching→Port→Port Security to load the following page.
25
Содержание
- Gigabit smart switch 1
- Tl sg2216 tl sg2424 1
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 8
- Chapter 1 about this guide 9
- Conventions 9
- Intended readers 9
- Overview of this guide 9
- Appearance description 12
- Chapter 2 introduction 12
- Front panel 12
- Main features 12
- Overview of the switch 12
- Rear panel 13
- Chapter 3 login to the switch 15
- Configuration 15
- Chapter 4 system 17
- System info 17
- System summary 17
- Device description 19
- System time 19
- Daylight saving time 20
- System ip 21
- User manage 22
- User table 22
- User config 23
- Config restore 24
- System tools 24
- Config backup 25
- Firmware upgrade 25
- System reboot 26
- System reset 26
- Access control 27
- Access security 27
- Chapter 5 switching 29
- Port config 29
- Port mirror 30
- The following entries are displayed on this screen 31
- Port security 32
- Port isolation 34
- Lag table 35
- Static lag 36
- Traffic monitor 37
- Traffic summary 37
- Traffic statistics 39
- Mac address 40
- Address table 41
- Static address 42
- Dynamic address 43
- Filtering address 45
- Chapter 6 vlan 47
- Q vlan 48
- Vlan config 50
- Port config 52
- Configuration procedure 53
- Application example for 802 q vlan 54
- Chapter 7 spanning tree 56
- Stp config 61
- Port config 63
- Stp summary 63
- Mstp instance 65
- Region config 65
- Instance config 66
- Instance port config 67
- Global configuration procedure for spanning tree function 69
- Port protect 69
- Stp security 69
- Application example for stp function 72
- Tc protect 72
- Chapter 8 multicast 76
- Igmp snooping 78
- Snooping config 79
- Port config 80
- Vlan config 81
- Configuration procedure 83
- Multicast vlan 83
- Application example for multicast vlan 85
- Configuration procedure 85
- Multicast filter 86
- Ip range 87
- Port filter 87
- Configuration procedure 89
- Packet statistics 89
- Chapter 9 qos 91
- Diffserv 94
- Port priority 94
- Configuration procedure 95
- Schedule mode 95
- Configuration procedure 96
- Dscp priority 96
- P priority 96
- Configuration procedure 97
- Bandwidth control 98
- Rate limit 98
- Storm control 99
- Chapter 10 snmp 101
- Global config 103
- Snmp config 103
- Snmp group 104
- Snmp view 104
- Snmp user 106
- Snmp community 107
- Configuration procedure 109
- Notification 110
- History control 112
- Alarm config 113
- Event config 113
- Chapter 11 maintenance 116
- Cpu monitor 116
- System monitor 116
- Memory monitor 117
- Log table 118
- Local log 119
- Remote log 119
- Backup log 120
- Cable test 121
- Device diagnose 121
- Loopback 122
- Network diagnose 122
- Tracert 123
- Appendix a specifications 125
- Appendix b configuring the pcs 126
- Appendix c glossary 128
Похожие устройства
- Sony CDX-GT457UE Инструкция по эксплуатации
- Sony HDR-CX690E Инструкция по эксплуатации
- Tp-Link TL-SG2216 Инструкция по эксплуатации
- Beko CE 58100 Инструкция по эксплуатации
- Sony CDX-GT650UI Инструкция по эксплуатации
- Sony HDR-CX560VE Инструкция по эксплуатации
- Tp-Link TL-SL2210WEB Инструкция по эксплуатации
- Panasonic TC-14SV2 Инструкция по эксплуатации
- Sony CDX-GT747 UI Инструкция по эксплуатации
- Sony HDR-CX560E Инструкция по эксплуатации
- Tp-Link TL-SL2218WEB Инструкция по эксплуатации
- Panasonic KX-FPC96 Инструкция по эксплуатации
- Sony DSX-S100 Инструкция по эксплуатации
- Sony HDR-CX550VE Инструкция по эксплуатации
- Tp-Link TL-SL2428WEB Инструкция по эксплуатации
- Sony XSGTX121LC Инструкция по эксплуатации
- Toshiba GR-H59TR Инструкция по эксплуатации
- Tp-Link TL-SL2452WEB Инструкция по эксплуатации
- Sony HDR-CX550E Инструкция по эксплуатации
- Acer Aspire V3-551-10466G50Makk Инструкция по эксплуатации