Tp-Link T2500-28TC V2 [129/342] Port protect
118
7.4.1 Port Protect
On this page you can configure loop protect feature, root protect feature, TC protect feature,
BPDU protect feature and BPDU filter feature for ports. You are suggested to enable
corresponding protection feature for the qualified ports.
Loop Protect
In a stable network, a switch maintains the states of ports by receiving and processing BPDU
packets from the upstream switch. However, when link congestions or link failures occurred to
the network, a downstream switch does not receive BPDU packets for certain period, which
results in spanning trees being regenerated and roles of ports being reselected, and causes
the blocked ports to transit to forwarding state. Therefore, loops may be incurred in the
network.
The loop protect function can suppresses loops. With this function enabled, a port, regardless
of the role it plays in instances, is always set to blocking state, when the port does not receive
BPDU packets from the upstream switch and spanning trees are regenerated, and thereby
loops can be prevented.
Root Protect
A CIST and its secondary root bridges are usually located in the high-bandwidth core region.
Wrong configuration or malicious attacks may result in configuration BPDU packets with higher
priorities being received by the legal root bridge, which causes the current legal root bridge to
lose its position and network topology jitter to occur. In this case, flows that should travel along
high-speed links may lead to low-speed links, and network congestion may occur.
To avoid this, MSTP provides root protect function. Ports with this function enabled can only be
set as designated ports in all spanning tree instances. When a port of this type receives BDPU
packets with higher priority, it transits its state to blocking state and stops forwarding packets
(as if it is disconnected from the link). The port resumes the normal state if it does not receive
any configuration BPDU packets with higher priorities for a period of two times of forward
delay.
TC Protect
A switch removes MAC address entries upon receiving TC-BPDU packets. If a user maliciously
sends a large amount of TC-BPDU packets to a switch in a short period, the switch will be busy
with removing MAC address entries, which may decrease the performance and stability of the
network.
To prevent the switch from frequently removing MAC address entries, you can enable the TC
protect function on the switch. With TC protect function enabled, if the account number of the
received TC-BPDUs exceeds the maximum number you set in the TC threshold field, the switch
will not performs the removing operation in the TC protect cycle. Such a mechanism prevents
the switch from frequently removing MAC address entries.
BPDU Protect
Ports of the switch directly connected to PCs or servers are configured as edge ports to
rapidly transit their states. When these ports receive BPDUs, the system automatically
configures these ports as non-edge ports and regenerates spanning trees, which may cause
Содержание
- User guide 1
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Explanation of the symbols on the product label 3
- Industry canada statement 3
- Safety information 3
- 安全諮詢及注意事項 3
- Package contents 12
- Chapter 1 about this guide 13
- Conventions 13
- Intended readers 13
- Overview of this guide 14
- Appearance description 19
- Chapter 2 introduction 19
- Front panel 19
- Overview of the switch 19
- Rear panel 20
- Chapter 3 login to the switch 21
- Configuration 21
- Chapter 4 system 23
- System info 23
- System summary 23
- Device description 25
- System time 26
- Daylight saving time 27
- System ip 28
- System ipv6 29
- User config 38
- User management 38
- User table 38
- Config backup 40
- Config restore 40
- System tools 40
- Firmware upgrade 41
- Access control 42
- Access security 42
- System reboot 42
- System reset 42
- Ssl config 44
- Ssh config 45
- Application example 1 for ssh 47
- Application example 2 for ssh 48
- Chapter 5 switching 53
- Port config 53
- The following entries are displayed on this screen 53
- Port mirror 54
- Port security 56
- Port isolation 57
- Loopback detection 58
- Ddm config 60
- Temperature threshold 61
- Voltage threshold 62
- Bias current threshold 63
- Rx power threshold 64
- Tx power threshold 64
- Ddm status 65
- Lag table 67
- Static lag 68
- Lacp config 69
- Traffic monitor 71
- Traffic summary 71
- Traffic statistics 72
- Address table 74
- Mac address 74
- Static address 76
- Dynamic address 77
- Filtering address 79
- Chapter 6 vlan 81
- Q vlan 82
- Vlan config 84
- Port config 86
- Configuration procedure 87
- Mac vlan 88
- Port enable 89
- Configuration procedure 90
- Protocol vlan 90
- Protocol vlan 91
- Protocol template 92
- Configuration procedure 93
- Port enable 93
- Application example for 802 q vlan 94
- Application example for mac vlan 95
- Application example for protocol vlan 97
- Vlan vpn 98
- Vpn config 99
- Vlan mapping 100
- Port enable 101
- Configuration procedure of vlan mapping function 102
- Configuration procedure of vlan vpn function 102
- Private vlan 102
- Pvlan config 107
- Port config 108
- Configuration procedure 109
- Application example for private vlan 112
- Configuration procedure 112
- Chapter 7 spanning tree 115
- Stp config 120
- Port config 122
- Stp summary 122
- Mstp instance 124
- Instance config 125
- Region config 125
- Instance port config 127
- Global configuration procedure for spanning tree function 128
- Stp security 128
- Port protect 129
- Application example for stp function 131
- Tc protect 131
- Chapter 8 ethernet oam 136
- Basic config 140
- Discovery info 141
- Link monitoring 143
- Remote loopback 145
- Statistics 146
- Event log 148
- Configuration procedure 152
- Application example for dldp 153
- Chapter 9 dhcp 155
- Dhcp relay 159
- Configuration procedure 163
- Chapter 10 multicast 164
- Igmp snooping 168
- Snooping config 170
- Vlan config 170
- Configuration procedure 172
- Port config 172
- Ip range 173
- Multicast vlan 174
- Application example for multicast vlan 176
- Static multicast ip 177
- Packet statistics 179
- Querier config 180
- Igmp authentication 182
- Mld snooping 183
- Global config 184
- Vlan config 186
- Filter config 187
- Port config 188
- Static multicast 189
- Querier config 190
- Packet statistics 191
- Ipv4 multicast table 193
- Multicast table 193
- Ipv6 multicast table 194
- Chapter 11 qos 196
- Diffserv 199
- Port priority 199
- Configuration procedure 200
- Dscp priority 200
- Configuration procedure 201
- 802 p cos mapping 202
- Configuration procedure 202
- Schedule mode 203
- Bandwidth control 204
- Rate limit 204
- Storm control 205
- Voice vlan 207
- Global config 209
- Port config 210
- Oui config 211
- Configuration procedure of voice vlan 212
- Chapter 12 acl 213
- Time range 213
- Time range summary 213
- Time range create 214
- Holiday config 215
- Acl config 216
- Acl create 216
- Acl summary 216
- Mac acl 217
- Standard ip acl 218
- Extend ip acl 219
- Combined acl 220
- Policy config 222
- Policy summary 222
- Action create 223
- Policy create 223
- Binding table 225
- Policy binding 225
- Port binding 225
- Vlan binding 226
- Application example for acl 227
- Configuration procedure 227
- Binding table 230
- Chapter 13 network security 230
- Ip mac binding 230
- Manual binding 232
- Arp scanning 233
- Dhcp snooping 235
- Dhcp snooping 238
- Option 82 239
- Arp inspection 240
- Arp detect 244
- Arp defend 245
- Configuration procedure 245
- Arp statistics 246
- Ip source guard 247
- Dos defend 249
- Dos defend 250
- Dos detect 251
- Global config 256
- Port config 258
- Configuration procedure 259
- Global config 261
- Privilege elevation 261
- Radius server config 262
- Tacacs server config 262
- Authentication server group config 263
- Authentication method list config 265
- Application authentication list config 266
- 802 x authentication server config 267
- Default settings 268
- Pppoe config 269
- Chapter 14 snmp 272
- Global config 274
- Snmp config 274
- Snmp view 275
- Snmp group 276
- Snmp user 278
- Snmp community 279
- Configuration procedure 280
- Notification 281
- Notification config 282
- Traps config 283
- History control 287
- Event config 288
- Alarm config 289
- Chapter 15 lldp 291
- Lldp working mechanism 291
- Lldpdu format 291
- Basic config 295
- Global config 296
- Port config 297
- Device info 298
- Local info 298
- Neighbor info 299
- Device statistics 300
- Elements 301
- Lldp med 301
- Global config 302
- Port config 303
- Local info 305
- Neighbor info 306
- Chapter 16 cluster 308
- Neighbor info 309
- Ndp summary 310
- Ndp config 312
- Device table 313
- Ntdp summary 315
- Ntdp config 316
- Cluster 317
- Cluster summary 317
- Cluster config 320
- Cluster topology 323
- Member config 323
- Chapter 17 maintenance 326
- Cpu monitor 326
- System monitor 326
- Memory monitor 327
- Log table 329
- Local log 330
- Backup log 331
- Remote log 331
- Device diagnostics 332
- Network diagnostics 333
- Tracert 334
- Chapter 18 system maintenance via ftp 335
- Configure the terminal emulation program 335
- Hardware installation 335
- Download firmware via bootutil menu 336
- Appendix a glossary 338
Похожие устройства
- Tp-Link T2500-28TC V2 Инструкция по установке
- Tp-Link T2500-28TC V2 Руководство по быстрому старту
- Tp-Link T2500-28TC V1 Руководство по использованию коммандной строки
- Tp-Link T2500-28TC V1 Инструкция по установке
- Tp-Link T2500-28TC V1 Руководство пользователя
- Tp-Link T2500-28TC V1 Руководство по быстрому старту
- Tp-Link T3700G-52TQ V1 Руководство по использованию коммандной строки
- Tp-Link T3700G-52TQ V1 Инструкция по установке
- Tp-Link T3700G-52TQ V1 Руководство по быстрому старту
- Tp-Link T3700G-52TQ V1 Руководство пользователя
- Champion LM5127BS Деталировка
- Champion LM5127BS Инструкция по установке
- Champion LM5347BS Руководство пользователя
- Champion LM5347BS Деталировка
- Champion EM3110 Руководство пользователя
- Champion MM4026 Руководство пользователя
- Champion SA12 Руководство пользователя
- Champion SA16 Руководство пользователя
- Champion TB360 Деталировка
- Champion TB360 Руководство пользователя