D-Link DGS-1210-52/ME rev.A [6/136] Table of contents

D-Link DGS-1210-52/ME rev.A [6/136] Table of contents
Table of Contents DGS-1210 series Metro Ethernet Managed Switch User Manual
i
i
v
v
Security > MAC Address Table > Static MAC .......................................................................................... 72
Security > MAC Address Table > Dynamic Forwarding Table ................................................................. 73
Security > Access Authentication Control > Authentication Policy Settings ............................................ 74
Security > Access Authentication Control > Application Authentication Settings .................................... 74
Security > Access Authentication Control > Authentication Server Group .............................................. 74
Security > Access Authentication Control > Authentication Server ......................................................... 75
Security > Access Authentication Control > Login Method Lists .............................................................. 76
Security > Access Authentication Control > Enable Method Lists ........................................................... 77
Security > Access Authentication Control > Local Enable Password Settings ........................................ 77
Security > Traffic Segmentation ............................................................................................................... 78
Security > DoS Prevention Settings ......................................................................................................... 78
Security > DHCP Server Screening > DHCP Server Screening Port Settings ........................................ 79
Security > DHCP Server Screening > Filter DHCP Server ...................................................................... 79
Security > SSH Settings > SSH Settings ................................................................................................. 79
Security > SSH Settings > SSH Authmode and Algorithm Settings ........................................................ 80
Security > SSH Settings > SSH User Authentication Lists ...................................................................... 81
Security > MAC-based Access Control (MAC) > MAC-based Access Control Settings .......................... 82
Security > MAC-based Access Control (MAC) > MAC-based Access Control Local Settings ................ 83
Security > MAC-based Access Control (MAC) > MAC-based Access Control Authentication State ...... 83
Security > Web-based Access Control (WAC) > WAC Global Settings ................................................... 84
Security > Web-based Access Control (WAC) > WAC User Settings ..................................................... 84
Security > Web-based Access Control (WAC) > WAC Port Settings ...................................................... 85
Security > Web-based Access Control (WAC) > WAC Authentication State ........................................... 85
Monitoring > Statistics .............................................................................................................................. 86
Monitoring > Session Table ...................................................................................................................... 86
Monitoring > CPU Utilization .................................................................................................................... 87
Monitoring > Memory Utilization ............................................................................................................... 87
Monitoring > Port Utilization ..................................................................................................................... 88
Monitoring > Packet Size .......................................................................................................................... 89
Monitoring > Packets > Transmitted (TX) ................................................................................................ 90
Monitoring > Packets > Received (RX) .................................................................................................... 91
Monitoring > Packets > UMB Cast (RX) ................................................................................................... 93
Monitoring > Errors > Received (RX) ....................................................................................................... 94
Monitoring > Errors > Transmitted (TX).................................................................................................... 95
Monitoring > Cable Diagnostics ............................................................................................................... 97
Monitoring > System Log .......................................................................................................................... 98
Monitoring > Browse ARP Table .............................................................................................................. 98
Monitoring > Ethernet OAM > Browse Ethernet OAM Event Log ............................................................ 98
Monitoring > Ethernet OAM > Browse Ethernet OAM Statistics .............................................................. 99
Monitoring > IGMP Snooping > IGMP Snooping Group .......................................................................... 99
Monitoring > IGMP Snooping > IGMP Snooping Host ........................................................................... 100
Monitoring > Port Access Control > RADIUS Authentication ................................................................. 100
Monitoring > Port Access Control > RADIUS Account Client ................................................................ 101
ACL > ACL Configuration Wizard ........................................................................................................... 102
ACL > Access Profile List ....................................................................................................................... 103
ACL > ACL Finder .................................................................................................................................. 104
ACL > CPU Filter Configuration Wizard ................................................................................................. 105
ACL > CPU Filter Access Profile List ..................................................................................................... 106
ACL > CPU Filter Finder ......................................................................................................................... 107

Содержание

Похожие устройства

Скачать