D-Link DGS-1210-52/ME rev.B [5/159] Table of contents

D-Link DGS-1210-52/ME rev.B [5/159] Table of contents
Table of Contents DGS-1210 series Metro Ethernet Managed Switch User Manual
i
i
v
v
RMON > RMON History Control Configuration ........................................................................................ 87
RMON > RMON Alarm Configuration ...................................................................................................... 88
RMON > RMON Event Configuration ....................................................................................................... 88
Security > Trusted Host ............................................................................................................................ 89
Security > Safeguard Engine.................................................................................................................... 89
Security > CPU Protect ............................................................................................................................ 89
Security > Gratuitous ARP ....................................................................................................................... 90
Security > Port Security ............................................................................................................................ 91
Security > SSL Settings ............................................................................................................................ 91
Security > Smart Binding > Smart Binding Settings ................................................................................. 92
Security > Smart Binding > Smart Binding ............................................................................................... 93
Security > Smart Binding > White List ...................................................................................................... 94
Security > Smart Binding > Black List ...................................................................................................... 94
Security > Smart Binding > DHCP Snooping List .................................................................................... 95
Security > 802.1X > 802.1X Settings ....................................................................................................... 95
Security > 802.1X > 802.1X User ............................................................................................................. 97
Security > 802.1X > 802.1X Authentication RADIUS ............................................................................... 97
Security > 802.1X > 802.1X Guest VLAN ................................................................................................ 98
Security > MAC Address Table > Static MAC .......................................................................................... 98
Security > MAC Address Table > Dynamic Forwarding Table ................................................................. 99
Security > MAC Address Table > Auto Learning Vlan Settings ............................................................. 100
Security > Access Authentication Control > Authentication Policy Settings .......................................... 100
Security > Access Authentication Control > Application Authentication Settings .................................. 100
Security > Access Authentication Control > Authentication Server Group ............................................ 101
Security > Access Authentication Control > Authentication Server ....................................................... 102
Security > Access Authentication Control > Login Method Lists ............................................................ 103
Security > Access Authentication Control > Enable Method Lists ......................................................... 103
Security > Access Authentication Control > Local Enable Password Settings ...................................... 104
Security > Traffic Segmentation ............................................................................................................. 104
Security > DoS Prevention Settings ....................................................................................................... 105
Security > DHCP Server Screening > DHCP Server Screening Port Settings ...................................... 105
Security > DHCP Server Screening > DHCP Server Screening Vlan Settings...................................... 106
Security > DHCP Server Screening > Filter DHCP Server .................................................................... 106
Security > DHCP Server Screening > Filter DHCPv6 Server ................................................................ 106
Security > DHCP Server Screening > Filter ICMPv6 ............................................................................. 107
Security > SSH Settings > SSH Settings ............................................................................................... 108
Security > SSH Settings > SSH Authmode and Algorithm Settings ...................................................... 109
Security > SSH Settings > SSH User Authentication Lists .................................................................... 110
Security > MAC-based Access Control (MAC) > MAC-based Access Control Settings ........................ 110
Security > MAC-based Access Control (MAC) > MAC-based Access Control Local Settings .............. 111
Security > MAC-based Access Control (MAC) > MAC-based Access Control Authentication State .... 112
Monitoring > Statistics ............................................................................................................................ 112
Monitoring > Session Table .................................................................................................................... 113
Monitoring > CPU Utilization .................................................................................................................. 113
Monitoring > Memory Utilization ............................................................................................................. 114
Monitoring > Port Utilization ................................................................................................................... 114
Monitoring > Packet Size ........................................................................................................................ 115
Monitoring > Packets > Transmitted (TX) .............................................................................................. 116
Monitoring > Packets > Received (RX) .................................................................................................. 117

Содержание

Похожие устройства

Скачать