Tp-Link T1700X-16TS V1 Руководство пользователя онлайн [15/281] 394688

Tp-Link T1700X-16TS V1 Руководство пользователя онлайн [15/281] 394688
Chapter
Introduction
Chapter 4 System
This module is used to configure system properties of the
switch. Here mainly introduces:
System Info: Configure the description, system time and
network parameters of the switch.
User Management: Configure t
he user name and password
for users to log on to the Web management page with a
certain access level.
System Tools: Manage the firmware and configuration files of
the switch.
Access Security:
Provide different security measures for the
login to enhance the configuration management security.
SDM Template: Manage the hardware TCAM resources.
Chapter 5 Switching
This module is used to configure basic functions of the switch.
Here mainly introduces:
Port: Configure the basic features for the port.
LAG: Configure Link Aggregation Group. LAG is to combine a
number of ports together to make a single high-bandwidth
data path.
Traffic Monitor: Monitor the traffic of each port.
MAC Address: Configure the address table of the switch.
Chapter 6 VLAN
This module is used to configure VLANs to control broadcast in
LANs. Here mainly introduces:
802.1Q VLAN: Configure port-based VLAN.
MAC VLAN: Configure MAC-
based VLAN without changing
the 802.1Q VLAN configuration.
Pr
otocol VLAN: Create VLANs in application layer to make
some special data transmitted in the specified VLAN.
Private VLAN:
Designed to save VLAN resources of uplink
devices and decrease broadcast. Private VLAN mainly used
in campus or enterprise networks to achieve user layer-2-
separation and to save VLAN resources of uplink devices.
Chapter 7 Spanning Tree
This module is used to configure spanning tree function of the
switch. Here mainly introduces:
STP Config: Configure
and view the global settings of
spanning tree function.
Port Config: Configure CIST parameters of ports.
MSTP Instance: Configure MSTP instances.
STP Security: Configure protection function to prevent
devices from any malicious attack against STP features.
3

Содержание

Похожие устройства

Скачать