Tp-Link T2500-28TC V1 [172/316] Vlan config
![Tp-Link T2500-28TC V1 [172/316] Vlan config](/views2/1210074/page172/bgac.png)
162
Report Message
Suppression:
Enable or disable Report Message Suppression function globally.
If this function is enabled, the first Report Message from the
listener will forward to the router ports while the subsequent
Report Message from the group
will be suppressed to reduce the
MLD traffic in the network.
Unknown Multicast
Filter:
Choose to forward or drop unknown multicast data.
Unknown IPv6 multicast packets refer to those packets without
corresponding forwarding entries in the IPv6 multicast table:
When unknown multicast filter is enabled, the switch will discard
all received unknown IPv6 multicast packets;
When unknown multicast filer is disabled, all
unknown IPv6
multicast packets are flooded in the ingress VLAN.
Router Port Aging
Time:
Ente
r the global router port aging time. If the router port does not
receive Query Message in the aging time, it will be aged.
Member Port Aging
Time:
Enter the global member port aging time. If the member port
does not receive Report Message in the aging tim
e, it will be
aged.
Last Listener Query
Interval:
Enter the Last Listener Query interval time. When the multicast
group has no more member ports, it will send the Specific Query
Message with this interval time to check whether there is
another
listener.
Last Listener Query
Count:
Enter the Last Listener Query numbers. When the multicast
group has no more member ports, it will send this numbers of
Specific Query Message to check whether there is
another
listener.
Multicast VLAN: Enable or disable multicas
t VLAN function. When multicast
VLAN is enabled, all multicast data will forward in this VLAN if
this port belongs to the VLAN.
Multicast VLAN ID: Enter the multicast VLAN ID.
Note:
1. When Unknown Multicast Filter is configured, the Unknown Multicast function in IGMP
Snooping is also configured at the same time.
2. Configurations of the Router Port Aging Time and Member Port Aging Time in 9.2.2 VLAN
Config override their global configurations here.
3. Before creating the Multicast VLAN, its corresponding VLAN should be configured in 9.2.2
VLAN Config.
10.2.2 VLAN Config
On this page you can configure MLD Snooping function with each single VLAN. You need to
create VLAN if you want to enable MLD Snooping function in this VLAN.
Choose the menu Multicast→MLD Snooping→VLAN Config to load the following page.
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Industry canada statement 2
- Explanation of the symbols on the product label 3
- Safety information 3
- 安全諮詢及注意事項 3
- Package contents 11
- Chapter 1 about this guide 12
- Conventions 12
- Intended readers 12
- Overview of this guide 13
- Appearance description 17
- Chapter 2 introduction 17
- Front panel 17
- Overview of the switch 17
- Rear panel 18
- Chapter 3 login to the switch 19
- Configuration 19
- Chapter 4 system 21
- System info 21
- System summary 21
- Device description 23
- System time 23
- Daylight saving time 24
- System ip 26
- System ipv6 27
- The following entries are displayed on this screen 33
- User config 35
- User management 35
- User table 35
- System tools 36
- Config backup 37
- Config restore 37
- Firmware upgrade 38
- System reboot 38
- Access control 39
- Access security 39
- System reset 39
- Ssl config 41
- Ssh config 42
- Application example 1 for ssh 44
- Application example 2 for ssh 45
- Chapter 5 switching 49
- Port config 49
- The following entries are displayed on this screen 49
- Port mirror 50
- Port security 51
- Port isolation 53
- Loopback detection 54
- Ddm config 55
- Temperature threshold 56
- Voltage threshold 57
- Bias current threshold 58
- Tx power threshold 58
- Rx power threshold 59
- Ddm status 60
- Lag table 61
- Static lag 63
- Lacp config 64
- Traffic monitor 66
- Traffic summary 66
- Traffic statistics 67
- Mac address 68
- Address table 69
- Static address 70
- Dynamic address 71
- Filtering address 73
- Chapter 6 vlan 75
- Q vlan 76
- Vlan config 77
- Port config 79
- Configuration procedure 81
- Mac vlan 81
- Mac vlan 82
- Configuration procedure 83
- Port enable 83
- Protocol vlan 83
- Protocol vlan 84
- Protocol template 85
- Application example for 802 q vlan 86
- Configuration procedure 86
- Port enable 86
- Application example for mac vlan 88
- Application example for protocol vlan 89
- Vlan vpn 91
- Vlan mapping 92
- Vpn config 92
- Port enable 93
- Configuration procedure of vlan mapping function 94
- Configuration procedure of vlan vpn function 94
- Private vlan 95
- Pvlan config 98
- Port config 99
- Configuration procedure 100
- Application example for private vlan 104
- Configuration procedure 104
- Chapter 7 spanning tree 107
- Stp config 111
- Stp summary 113
- Port config 114
- Mstp instance 115
- Region config 115
- Instance config 116
- Instance port config 117
- Global configuration procedure for spanning tree function 119
- Port protect 119
- Stp security 119
- Tc protect 121
- Application example for stp function 122
- Chapter 8 ethernet oam 126
- Basic config 129
- Discovery info 131
- Link monitoring 133
- Remote loopback 135
- Statistics 136
- Event log 137
- Application example for dldp 141
- Configuration procedure 141
- Chapter 9 dhcp 144
- Dhcp relay 148
- Configuration procedure 151
- Chapter 10 multicast 152
- Igmp snooping 156
- Snooping config 157
- Vlan config 158
- Configuration procedure 159
- Port config 159
- Ip range 161
- Multicast vlan 162
- Application example for multicast vlan 163
- Static multicast ip 165
- Packet statistics 166
- Querier config 167
- Igmp authentication 168
- Mld snooping 169
- Global config 171
- Vlan config 172
- Filter config 174
- Port config 174
- Static multicast 175
- Querier config 176
- Packet statistics 177
- Multicast table 178
- Ipv4 multicast table 179
- Ipv6 multicast table 179
- Chapter 11 qos 181
- Diffserv 184
- Port priority 184
- Configuration procedure 185
- Dscp priority 185
- 802 p cos mapping 186
- Configuration procedure 186
- Configuration procedure 187
- Schedule mode 187
- Bandwidth control 188
- Rate limit 188
- Storm control 189
- Voice vlan 191
- Global config 193
- Port config 193
- Oui config 195
- Configuration procedure of voice vlan 196
- Chapter 12 acl 197
- Time range 197
- Time range summary 197
- Time range create 198
- Acl config 199
- Acl summary 199
- Holiday config 199
- Acl create 200
- Mac acl 201
- Standard ip acl 201
- Extend ip acl 202
- Combined acl 204
- Policy config 205
- Policy summary 205
- Action create 206
- Policy create 206
- Binding table 208
- Policy binding 208
- Port binding 208
- Vlan binding 209
- Application example for acl 210
- Configuration procedure 210
- Binding table 212
- Chapter 13 network security 212
- Ip mac binding 212
- Manual binding 213
- Arp scanning 215
- Dhcp snooping 216
- Dhcp snooping 220
- Option 82 221
- Arp inspection 222
- Arp detect 225
- Configuration procedure 226
- Arp defend 227
- Arp statistics 228
- Ip source guard 228
- Dos defend 229
- Dos defend 231
- Dos detect 232
- Global config 236
- Port config 238
- Configuration procedure 239
- Global config 240
- Privilege elevation 241
- Radius server config 241
- Tacacs server config 242
- Authentication server group config 243
- Authentication method list config 244
- Application authentication list config 245
- 802 x authentication server config 246
- Default settings 246
- Pppoe config 247
- Chapter 14 snmp 250
- Global config 252
- Snmp config 252
- Snmp group 253
- Snmp view 253
- Snmp user 255
- Snmp community 257
- Configuration procedure 258
- Notification 259
- Notification config 259
- Traps config 260
- History control 264
- Event config 265
- Alarm config 266
- Chapter 15 lldp 268
- Lldp working mechanism 268
- Lldpdu format 268
- Basic config 271
- Global config 272
- Device info 273
- Local info 273
- Port config 273
- Neighbor info 274
- Device statistics 276
- Elements 277
- Lldp med 277
- Global config 278
- Port config 278
- Local info 281
- Neighbor info 282
- Chapter 16 cluster 284
- Neighbor info 285
- Ndp summary 286
- Ndp config 288
- Device table 289
- Ntdp summary 291
- Ntdp config 292
- Cluster 293
- Cluster summary 293
- Cluster config 296
- Member config 298
- Cluster topology 299
- Chapter 17 maintenance 302
- Cpu monitor 302
- System monitor 302
- Memory monitor 303
- Log table 304
- Local log 305
- Remote log 305
- Backup log 306
- Device diagnostics 307
- Network diagnostics 308
- Tracert 309
- Chapter 18 system maintenance via ftp 310
- Configure the terminal emulation program 310
- Hardware installation 310
- Download firmware via bootutil menu 311
- Appendix a glossary 313
Похожие устройства
- Tp-Link T2500-28TC V1 Руководство по быстрому старту
- Tp-Link T3700G-52TQ V1 Руководство по использованию коммандной строки
- Tp-Link T3700G-52TQ V1 Инструкция по установке
- Tp-Link T3700G-52TQ V1 Руководство по быстрому старту
- Tp-Link T3700G-52TQ V1 Руководство пользователя
- Champion LM5127BS Деталировка
- Champion LM5127BS Инструкция по установке
- Champion LM5347BS Руководство пользователя
- Champion LM5347BS Деталировка
- Champion EM3110 Руководство пользователя
- Champion MM4026 Руководство пользователя
- Champion SA12 Руководство пользователя
- Champion SA16 Руководство пользователя
- Champion TB360 Деталировка
- Champion TB360 Руководство пользователя
- Champion ВC4401 Деталировка
- Champion ВC4401 Руководство пользователя
- Champion ВС7713 Деталировка
- Champion ВС7713 Руководство пользователя
- Champion ВС7714 Деталировка