Tp-Link T1600G-52TS V4 [16/958] Configuring access security

Using the CLI ..........................................................................................................................................................................................552
Configuration Examples ...............................................................................................................................................556
Example for Class of Service ........................................................................................................................................................556
Network Requirements .......................................................................................................................................................556
Configuration Scheme ........................................................................................................................................................556
Using the GUI ............................................................................................................................................................................ 557
Using the CLI ............................................................................................................................................................................559
Example for Voice VLAN .................................................................................................................................................................561
Network Requirements .......................................................................................................................................................561
Configuration Scheme ........................................................................................................................................................562
Using the GUI ............................................................................................................................................................................ 562
Using the CLI ............................................................................................................................................................................566
Example for Auto VoIP ......................................................................................................................................................................569
Network Requirements .......................................................................................................................................................569
Configuration Scheme ........................................................................................................................................................570
Using the GUI ............................................................................................................................................................................ 570
Using the CLI ............................................................................................................................................................................575
Appendix: Default Parameters ...................................................................................................................................580
Configuring Access Security
Access Security ..............................................................................................................................................................585
Overview ...................................................................................................................................................................................................585
Supported Features ...........................................................................................................................................................................585
Access Security Configurations ...............................................................................................................................586
Using the GUI .........................................................................................................................................................................................586
Configuring the Access Control Feature .................................................................................................................. 586
Configuring the HTTP Function .....................................................................................................................................589
Configuring the HTTPS Function ..................................................................................................................................591
Configuring the SSH Feature ..........................................................................................................................................594
Configuring the Telnet Function ....................................................................................................................................595
Using the CLI ..........................................................................................................................................................................................596
Configuring the Access Control ....................................................................................................................................596
Configuring the HTTP Function .....................................................................................................................................597
Configuring the HTTPS Function ..................................................................................................................................599
Configuring the SSH Feature ..........................................................................................................................................602
Configuring the Telnet Function ....................................................................................................................................604
Appendix: Default Parameters ...................................................................................................................................605

Содержание

Похожие устройства

Скачать