TP-LINK TL-SL5428E V3 Guide de l'utilisateur

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Commutateurs de réseau TP-LINK TL-SL5428E V3. TP-Link TL-SL5428E V3 User Guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 303
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - JetStream L2 Managed Switch

TL-SL5428E 24-Port 10/100Mbps + 4-Port Gigabit JetStream L2 Managed Switch REV2.0.0 1910011019

Page 2 - CE Mark Warning

VII 16.4 Network Diagnostics ...270 16.4.1 Ping...

Page 3 - Safety Information

Figure 6-18 GVRP Config Note: If the GVRP feature is enabled for a member port of LAG, please ensure all the member ports of this LAG are set to be

Page 4

LeaveAll Timer: Once the LeaveAll Timer is set, the port with GVRP enabled can send a LeaveAll message after the timer times out, so that other GARP

Page 5

 Network Diagram  Configuration Procedure  Configure switch A Step Operation Description 1 Create VLAN6 Required. On VLAN→802.1Q VLAN→VLAN C

Page 6

 Configure switch C Step Operation Description 1 Create Private VLANs. Required. On the VLAN→Private VLAN→PVLAN Config page, Enter the Primary VL

Page 7

Chapter 7 Spanning Tree STP (Spanning Tree Protocol), subject to IEEE 802.1D standard, is to disbranch a ring network in the Data Link layer in a lo

Page 8

Figure 7-1 Basic STP diagram  STP Timers Hello Time: Hello Time ranges from 1 to 10 seconds. It specifies the interval to send BPDU packets. It

Page 9

Step Operation 1 If the priority of the BPDU received on the port is lower than that of the BPDU if of the port itself, the switch discards the BPD

Page 10

point-to-point link, it can transit to forwarding state after getting response from the downstream switch through handshake.  RSTP Elements Edge

Page 11 - Package Contents

 Port States In an MSTP, ports can be in the following four states:  Forwarding: In this status the port can receive/forward data, receive/send

Page 12 - Chapter 1 About This Guide

Figure 7-4 STP Config The following entries are displayed on this screen:  Global Config STP: Enable/Disable STP function globally on the switch.

Page 13

Package Contents The following items should be found in your box:  One TL-SL5428E switch  One power cord  One console cable  Two mounting bra

Page 14

Note: 1. The forward delay parameter and the network diameter are correlated. A too small forward delay parameter may result in temporary loops. A t

Page 15

7.2 Port Config On this page you can configure the parameters of the ports for CIST Choose the menu Spanning Tree→Port Config to load the following

Page 16

Port Role: Displays the role of the port played in the STP Instance.  Root Port: Indicates the port that has the lowest path cost from this bridge

Page 17 - Chapter 2 Introduction

Figure 7-7 Region Config The following entries are displayed on this screen:  Region Config Region Name: Create a name for MST region identifica

Page 18 - 2.3 Appearance Description

Select: Select the desired Instance ID for configuration. It is multi-optional. Instance: Displays Instance ID of the switch. Status: Displays sta

Page 19 - 2.3.2 Rear Panel

Figure 7-9 Instance Port Config The following entries are displayed on this screen:  Port Config Instance ID: Select the desired instance ID for

Page 20 - 3.1 Login

Step Operation Description 1 Make clear roles the switches play in spanning tree instances: root bridge or designated bridge Preparation. 2 Global

Page 21 - Figure 3-3 Log in the switch

To avoid this, MSTP provides root protect function. Ports with this function enabled can only be set as designated ports in all spanning tree instanc

Page 22 - 3.2 Configuration

Figure 7-10 Port Protect The following entries are displayed on this screen:  Port Protect Port Select: Click the Select button to quick-select t

Page 23

Figure 7-11 TC Protect The following entries are displayed on this screen:  TC Protect TC Threshold: Enter a number from 1 to 100. It is the maxi

Page 24 - Chapter 4 System

Chapter 1 About This Guide This User Guide contains information for setup and management of TL-SL5428E switch. Please read this guide carefully befo

Page 25 - Figure 4-2 Port Information

 Configuration Procedure  Configure switch A: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page, configure the link type

Page 26 - 4.1.3 System Time

 Configure switch C: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page, configure the link type of the related ports as Trun

Page 27 - 4.1.4 Daylight Saving Time

 The configuration procedure for switch E and F is the same with that for switch D.  The topology diagram of the two instances after the topolo

Page 28 - 4.1.5 System IP

Chapter 8 Ethernet OAM  OAM Overview Ethernet OAM (Operation, Administration, and Maintenance) is a Layer 2 protocol for monitoring and troublesho

Page 29 -  IP Config

 Information OAMPDU: Information OAMPDU is used for discovery. It transmits the state information of an OAM entity (including local, remote, and o

Page 30 - 4.1.6 System IPv6

Item Active OAM mode Passive OAM mode Transmitting Loopback Control OAMPDUs Available Unavailable Responding to Loopback Control OAMPDUs Available

Page 31

As Information OAMPDUs are sent between the OAM entities periodically, an OAM entity can inform one of its OAM peers of link faults through Informat

Page 32 -  Global unicast address

Figure 8-4 Basic Config The following entries are displayed on this screen:  Basic Config Port Select: Click the Select button to quick-select t

Page 33 - Link-local Address Format

Figure 8-5 Discovery Info The following entries are displayed on this screen:  Local Client The local client part shows the information of the loc

Page 34

Variable Request: Displays whether the local client supports variable request. If supports, the local client can send some variable requests to the

Page 35

Chapter Introduction Chapter 4 System This module is used to configure system properties of the switch. Here mainly introduces:  System Info: Con

Page 36 -  Link-local Address Config

PDU Revision: Displays the TLV revision of the OAMPDU. Vendor Information: Displays the vender information of the remote client. 8.2 Link Monito

Page 37

Threshold: Specify the threshold for the selected link event.  For Symbol Period Error, it is the number of error symbols in the period that is

Page 38 - 4.2 User Management

Select: Select the desired port for configuration. It is multi-optional. Dying Gasp Notify: Choose whether to notify the dying gasp or not. Critica

Page 39 - Figure 4-12 User Config

Remote Loopback: To start or stop the remote loopback. 8.5 Statistics You can view the statistics about the detailed Ethernet OAM traffic informati

Page 40 - 4.3 System Tools

Variable Request OAMPDUs: Displays the number of variable request OAMPDUs that have been transmitted or received on the port. Variable Response OAMPD

Page 41 - 4.3.3 Firmware Upgrade

Error Frame Event: Displays the number of error frame link events that have occurred on the local link or remote link. Error Frame Period Event: Dis

Page 42 - 4.4 Access Security

State Description Advertisement This state indicates that no unidirectional link is detected, which includes two kinds of situations: 1. This devic

Page 43 - Figure 4-18 Access Control

The typical bidirectional link detection process is ○2 →○4 →○5 , and the typical unidirectional link detection process is ○2 →○4 →○6 . On the DLDP pa

Page 44 - 4.4.2 SSL Config

Shut Mode: Once detecting a unidirectional link, the port can be shut down in one of the following two modes:  Auto: In this mode, DLDP generates

Page 45 - 4.4.3 SSH Config

2. The unidirectional link should be disconnected once being detected, and the ports shut down by DLDP can be restored after the fiber pairs are corr

Page 46 - Figure 4-20 SSH Config

Chapter Introduction Chapter 8 Ethernet OAM This module is used to configure Ethernet OAM function of the switch. Here mainly introduces:  Ba

Page 47 -  Network Requirements

After these four ports are correctly connected, select ports 1/0/27 and 1/0/28 in the Port Config table and click the Reset button to restore their

Page 48

Chapter 9 Multicast  Multicast Overview In the network, packets are sent in three modes: unicast, broadcast and multicast. In unicast, the source

Page 49

 IPv4 Multicast Address 1. IPv4 Multicast IP Address: As specified by IANA (Internet Assigned Numbers Authority), Class D IP addresses are used as

Page 50

Flags have 4 bits. The high-order flag is reserved, and must be initialized to 0. T=0 indicates a permanently-assigned multicast address assigned b

Page 51

The IPv6 solicited-node multicast address has the prefix FF02:0:0:0:0:1:FF00:0000/104 concatenated with the 24 low-order bits of a corresponding IPv6

Page 52 - Chapter 5 Switching

ports in a VLAN. The list is constructed and maintained by snooping IPv6 multicast control packets. MLD snooping performs a similar function in IPv6

Page 53 - 5.1.2 Port Mirror

When receiving IGMP leave message, the switch will forward IGMP group-specific-query message to check if other members in the multicast group of the

Page 54 - 5.1.3 Port Security

The following entries are displayed on this screen:  Global Config IGMP Snooping: Enable/Disable IGMP Snooping function globally on the switch. Un

Page 55 - Figure 5-3 Port Security

Static Router Ports: Enter the static router port which is mainly used in the network with stable topology.  VLAN Table VLAN ID Select: Click the

Page 56 - 5.1.5 Loopback Detection

Figure 9-7 Port Config The following entries are displayed on this screen:  Port Config Port Select: Click the Select button to quick-select the

Page 57

Chapter Introduction Chapter 12 Network Security This module is used to configure the multiple protection measures for the network security. Here m

Page 58 - 5.2 LAG

2. When both Fast Leave feature and Unknown Multicast Discard feature are enabled, the leaving of a user connected to a port owning multi-user will

Page 59 - 5.2.1 LAG Table

9.1.5 Multicast VLAN In old multicast transmission mode, when users in different VLANs apply for join the same multicast group, the multicast router

Page 60 - 5.2.2 Static LAG

Note: 1. The router port should be in the multicast VLAN, otherwise the member ports can not receive multicast streams. 2. The Multicast VLAN won&a

Page 61 - 5.2.3 LACP Config

Configure a multicast VLAN, and user A and B receive multicast streams through the multicast VLAN.  Network Diagram  Configuration Procedure Ste

Page 62 - Figure 5-9 LACP Config

Figure 9-10 Static Multicast IP Table The following entries are displayed on this screen:  Create Static Multicast Multicast IP: Enter static mul

Page 63 - 5.3 Traffic Monitor

Figure 9-11 Packet Statistics The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disable auto refresh feature

Page 64 - 5.3.2 Traffic Statistics

in Layer 2 network. IGMP Snooping Querier can act as an IGMP Router in Layer 2 network. It can help to create and maintain multicast forwarding table

Page 65 - 5.4 MAC Address

Last Member Query Times: Enter the times of sending specific query frames by IGMP Snooping Querier. At receiving a leave frame, a specific query fram

Page 66 - 5.4.1 Address Table

 MLD Snooping Fundamentals 1. MLD Messages MLD Queries:MLD Queries include General Queries and Multicast-Address-Specific Queries (MASQs) and are s

Page 67 - 5.4.2 Static Address

multicast group. The user can control when a port membership is removed for an exiting address in terms of the number and interval of MASQs. If there

Page 68 - 5.4.3 Dynamic Address

Chapter Introduction Chapter 16 Maintenance This module is used to assemble the commonly used system tools to manage the switch. Here mainly introd

Page 69 - Figure 5-14 Dynamic Address

Unknown Multicast Filter: Choose to forward or drop unknown multicast data. Unknown IPv6 multicast packets refer to those packets without correspondi

Page 70 - 5.4.4 Filtering Address

Figure 9-14 VLAN Config The following entries are displayed on this screen:  VLAN Config VLAN ID: Enter the VLAN ID you want to configure. Router

Page 71 -  Filtering Address Table

Note: 1. The VLAN configuration will take effect when global MLD Snooping function is enabled and the corresponding VLAN is created. 2. When the ro

Page 72 - Chapter 6 VLAN

9.2.4 Port Config On this page you can configure MLD Snooping function with each single port. Choose the menu Multicast→MLD Snooping→Port Config to l

Page 73 - 6.1 802.1Q VLAN

Figure 9-17 Static Multicast The following entries are displayed on this screen:  Static Multicast Config VLAN ID: Enter the VLAN ID. Multicast I

Page 74 - 6.1.1 VLAN Config

 Querier Config VLAN ID: Enter the VLAN ID which you want to start Querier. Maximum Response Time: Enter the value of Maximum Response Time field

Page 75

The following entries are displayed on this screen:  Auto Fresh Auto Fresh: Enable/Disable auto fresh feature. Fresh Period: Enter the time from

Page 76 - 6.1.2 Port Config

 Search Option Multicast IP: Enter the multicast IP address the desired entry must carry. VLAN ID: Enter the VLAN ID the desired entry must carry.

Page 77 -  VLAN Port Config

 Multicast IP Table Multicast IP: Displays the multicast IP. VLAN ID: Displays the VLAN ID. Forward Ports: Displays the forward ports of the gro

Page 78 - 6.2 MAC VLAN

Chapter 10 QoS QoS (Quality of Service) functions to provide different quality of service for various network applications and requirements and opti

Page 79 - 6.2.1 MAC VLAN

Chapter 2 Introduction Thanks for choosing the TL-SL5428E 24-Port 10/100Mbps + 4-Port Gigabit JetStream L2 Managed Switch! 2.1 Overview of the Swit

Page 80 - 6.3 Protocol VLAN

2. 802.1P Priority Figure 10-2 802.1Q frame As shown in the figure above, each 802.1Q Tag has a Pri field, comprising 3 bits. The 3-bit priority fi

Page 81 - 6.3.1 Protocol VLAN

Figure 10-4 SP-Mode 2. WRR-Mode: Weight Round Robin Mode. In this mode, packets in all the queues are sent in order based on the weight value for e

Page 82 - 6.3.2 Protocol Template

10.1 DiffServ This switch classifies the ingress packets, maps the packets to different priority queues and then forwards the packets according to sp

Page 83 - 6.3.3 Port Enable

Configuration Procedure: Step Operation Description 1 Select the port priority Required. On QoS→DiffServ→Port Priority page, configure the port

Page 84

 Priority Level DSCP: Indicates the priority determined by the DSCP region of IP datagram. It ranges from 0 to 63. Priority Level: Indicates th

Page 85

The following entries are displayed on this screen:  802.1P Priority Config 802.1P Priority: Enable/Disable 802.1P Priority.  Priority and CoS-m

Page 86

WRR-Mode: Weight Round Robin Mode. In this mode, packets in all the queues are sent in order based on the weight value for each queue. The weight va

Page 87

The following entries are displayed on this screen:  Rate Limit Config Port Select: Click the Select button to quick-select the corresponding port

Page 88 - 6.7 VLAN VPN

Figure 10-11 Storm Control The following entries are displayed on this screen:  Storm Control Config Port Select: Click the Select button to quic

Page 89 - 6.7.2 VLAN Mapping

10.3 Voice VLAN Voice VLANs are configured specially for voice data stream. By configuring Voice VLANs and adding the ports with voice devices attach

Page 90 - 6.7.3 Port Enable

+ Supports Telnet, CLI, SNMP v1/v2c/v3, RMON and web access. + Port Mirroring enables monitoring selected ingress/egress traffic. 2.3 Appearance D

Page 91

Port Voice VLAN Mode Voice Stream Type Link type of the port and processing mode ACCESS: Not supported. TRUNK: Supported. The default VLAN of the p

Page 92 - 6.8 Private VLAN

Note: Don’t transmit voice stream together with other business packets in the voice VLAN except for some special requirements. The Voice VLAN functio

Page 93 - Figure 6-15

Figure 10-13 Port Config Note: 1. To enable voice VLAN function for the LAG member port, please ensure its member state accords with its port mode.

Page 94

Member State: Displays the state of the port in the current voice VLAN. LAG: Displays the LAG number which the port belongs to. 10.3.3 OUI Config

Page 95 - 6.8.1 PVLAN Config

Configuration Procedure of Voice VLAN: Step Operation Description 1 Configure the link type of the port Required. On VLAN→802.1Q VLAN→Port Confi

Page 96 - 6.8.2 Port Config

Chapter 11 ACL ACL (Access Control List) is used to filter packets by configuring match rules and process policies of packets in order to control th

Page 97

11.1.2 Time-Range Create On this page you can create time-ranges. Choose the menu ACL→Time-Range→Time-Range Create to load the following page. Figu

Page 98 - 6.9 GVRP

11.1.3 Holiday Config Holiday mode is applied as a different secured access control policy from the week mode. On this page you can define holidays

Page 99 -  GVRP

Choose the menu ACL→ACL Config→ACL Summary to load the following page. Figure 11-4 ACL Summary The following entries are displayed on this screen: 

Page 100 - Figure 6-18 GVRP Config

Choose the menu ACL→ACL Config→MAC ACL to load the following page. Figure11-6 Create MAC Rule The following entries are displayed on this screen: 

Page 101 - Configuration Procedure:

2.3.2 Rear Panel The rear panel of TL-SL5428E features a power socket and a Grounding Terminal (marked with). Figure 2-2 Rear Panel  Grounding Ter

Page 102 -  Configure switch B

Figure11-7 Create Standard-IP Rule The following entries are displayed on this screen:  Create Standard-IP Rule ACL ID: Select the desired Standa

Page 103 -  Configure switch C

Figure11-8 Create Extend-IP Rule The following entries are displayed on this screen:  Create Extend-IP Rule ACL ID: Select the desired Extend-IP

Page 104 - Chapter 7 Spanning Tree

S-Port: Configure TCP/IP source port contained in the rule when TCP/UDP is selected from the pull-down list of IP Protocol. D-Port: Configure TCP/I

Page 105 - Figure 7-1 Basic STP diagram

Operation: Click the Edit button to modify the action. 11.3.2 Policy Create On this page you can create the policy. Choose the menu ACL→Policy Conf

Page 106 - Table 7-1 Comparing BPDUs

S-Mirror: Select S-Mirror to mirror the data packets in the policy to the specific port. S-Condition: Select S-Condition to limit the transmission

Page 107

 Policy Bind Table Select: Select the desired entry to delete the corresponding binding policy.Index: Displays the index of the binding policy. P

Page 108 - 7.1 STP Config

Figure11-14 Bind the policy to the VLAN The following entries are displayed on this screen:  VLAN-Bind Config Policy Name: Select the name of

Page 109 - Figure 7-4 STP Config

 Network Diagram  Configuration Procedure Step Operation Description 1 Configure Time-range On ACL→Time-Range page, create a time-range name

Page 110 - 7.1.2 STP Summary

Step Operation Description 3 Configure for requirement 2 and 4 On ACL→ACL Config→ACL Create page, create ACL 100. On ACL→ACL Config→Standard-IP A

Page 111 - 7.2 Port Config

Chapter 12 Network Security Network Security module is to provide the multiple protection measures for the network security, including six submenus:

Page 112 - 7.3 MSTP Instance

COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other

Page 113 - 7.3.2 Instance Config

Chapter 3 Login to the Switch 3.1 Login  In the IPv4 network: 1) To access the configuration utility, open a web-browser and type in the default

Page 114 - 7.3.3 Instance Port Config

The following entries are displayed on this screen:  Search Option Source: Select a Source from the pull-down list and click the Searchbutton to v

Page 115 -  Port Config

Figure 12-2 Manual Binding The following entries are displayed on this screen:  Manual Binding Option Host Name: Enter the Host Name. IP Address:

Page 116 - 7.4 STP Security

address of the Host on Network layer. MAC address, the address of the Host on Data link layer, is necessary for the packet to reach the very device.

Page 117 -  BPDU Filter

Figure 12-4 ARP Scanning The following entries are displayed on this screen:  Scanning Option Start IP Address: Specify the Start IP Address. E

Page 118 - 7.4.2 TC Protect

 DHCP Working Principle DHCP works via the “Client/Server” communication mode. The Client applies to the Server for configuration. The Server assig

Page 119 - Figure 7-11 TC Protect

(2) DHCP-OFFER Stage: Upon receiving the DHCP-DISCOVER packet, the DHCP Server selects an IP address from the IP pool according to the assigning pri

Page 120 -  Configure switch B:

Figure 12-7 DHCP Cheating Attack Implementation Procedure DHCP Snooping feature only allows the port connected to the DHCP Server as the trusted por

Page 121 -  Configure switch D:

Figure 12-8 DHCP Snooping Note: If you want to enable the DHCP Snooping feature for the member port of LAG, please ensure the parameters of all the

Page 122

Decline Flow Control: Select the value to specify the Decline Flow Control. The trafficflow of the corresponding port will be limited to be this val

Page 123 - Chapter 8 Ethernet OAM

Attack, frequently occur to the network, especially to the large network such as campus network and so on. The following part will simply introduce t

Page 124 -  OAM Functions

Figure 3-3 Log in the switch 3) Type in the command enable → show ipv6 interface vlan 1 to obtain the switch’s link-local address. Figure 3-4 The

Page 125 - Error

Figure 12-10 ARP Attack – Cheating Gateway As the above figure shown, the attacker sends the fake ARP packets of Host A to the Gateway, and then the

Page 126 - 8.1 Basic Config

As the above figure shown, the attacker sends the fake ARP packets of Host A to Host B, and then Host B will automatically update its ARP table after

Page 127 - 8.1.2 Discovery Info

 ARP Flooding Attack The attacker broadcasts a mass of various fake ARP packets in a network segment to occupy the network bandwidth viciously, whi

Page 128 -  Local Client

 Trusted Port Trusted Port: Select the port for which the ARP Detect function is unnecessaryas the Trusted Port. The specific ports, such as up-li

Page 129

Figure 12-14 ARP Defend The following entries are displayed on this screen:  ARP Defend Port Select: Click the Select button to quick-select the

Page 130 - 8.2 Link Monitoring

Figure 12-15 ARP Statistics The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disable the Auto Refresh featu

Page 131 - 8.3 RFI

Figure 12-16 IP Source Guard The following entries are displayed on this screen:  IP Source Guard Config Port Select: Click the Select button to

Page 132 - 8.4 Remote Loopback

DoS Attack Type Description Land Attack The attacker sends a specific fake SYN packet to the destination Host. Since both the source IP address and

Page 133 - 8.5 Statistics

DoS Attack Type Description Ping Of Death ICMP ECHO Request Packet whose sum of "Fragment Offset" and "Total Length" fields in

Page 134 - 8.5.2 Event Log

Defend Type: Displays the Defend Type name. Attack Count: Displays the count of the corresponding attack. 12.4.2 DoS Detect DoS Detect functions t

Page 135 - 8.6 DLDP

Figure 3-5 Login Tips: After logging in to the switch, you can add a global IPv6 address to your switch manually in 4.1.6 System IPv6. Then you can

Page 136

protocol enabled, a supplicant can access the LAN only when it passes the authentication, whereas those failing to pass the authentication are denied

Page 137 -  Global Config

 802.1X Authentication Procedure An 802.1X authentication can be initiated by supplicant system or authenticator system. When the authenticator sys

Page 138

5. Upon receiving the key (encapsulated in an EAP-Request/MD5 Challenge packet) from the switch, the client program encrypts the password of the supp

Page 139

request packet to the supplicant system if the supplicant system fails to respond in the specified timeout period. (2) RADIUS server timer (Server T

Page 140

Figure 12-22 Global Config The following entries are displayed on this screen:  Global Config 802.1X: Enable/Disable the 802.1X function. Auth M

Page 141 - Chapter 9 Multicast

Retry Times: Specify the maximum transfer times of the repeated authentication request. Supplicant Timeout: Specify the maximum time for the switch

Page 142 -  IPv6 Multicast Address

working for its fixed unauthorized status. Control Type: Specify the Control Type for the port.  MAC Based: Any client connected to the port shoul

Page 143

Secondary IP: Enter the IP address of the alternate accounting server. Accounting Port: Set the UDP port of accounting server(s). The default port

Page 144 -  MLD Snooping

 PPPoE Circuit-ID Tag Operation Process The general PPPoE Circuit-ID Tag work process is shown below: Figure 12-25 PPPoE Discovery Process The PPP

Page 145 - 9.1 IGMP Snooping

Figure 12-26 PPPoE Circuit-ID Config The following entries are displayed on this screen:  Global Config PPPoE Circuit-ID Insertion: Enable/Disable

Page 146 - 9.1.1 Snooping Config

Config. You are suggested to click Save Config before cutting off the power or rebooting the switch to avoid losing the new configurations. Return to

Page 147 - 9.1.2 VLAN Config

Chapter 13 SNMP  SNMP Overview SNMP (Simple Network Management Protocol) has gained the most extensive application on the UDP/IP networks. SNMP pr

Page 148 - 9.1.3 Port Config

failing to pass community name authentication are discarded. The community name can limit access to SNMP Agent from SNMP NMS, functioning as a passwo

Page 149

SNMP module is used to configure the SNMP function of the switch, including three submenus: SNMP Config, Notification and RMON. 13.1 SNMP Config The

Page 150 - 9.1.4 IP-Range

13.1.2 SNMP View The OID (Object Identifier) of the SNMP packets is used to describe the managed objects of the switch, and the MIB (Management Info

Page 151 - 9.1.5 Multicast VLAN

Figure 13-5 SNMP Group The following entries are displayed on this screen:  Group Config Group Name: Enter the SNMP Group name. The Group Name, S

Page 152 - Configuration procedure:

 Group Table Select: Select the desired entry to delete the corresponding group. It'smulti-optional. Group Name: Displays the Group Name her

Page 153 - 9.1.6 Static Multicast IP

User Type: Select the type for the User.  Local User: Indicates that the user is connected to a local SNMP engine.  Remote User: Indicates that

Page 154 - 9.1.7 Packet Statistics

13.1.5 SNMP Community SNMP v1 and SNMP v2c adopt community name authentication. The community name can limit access to the SNMP agent from SNMP netw

Page 155 - 9.1.8 Querier Config

Configuration Procedure:  If SNMPv3 is employed, please take the following steps: Step Operation Description 1 Enable SNMP function globally. Re

Page 156 - Packet Statistics

13.2 Notification With the Notification function enabled, the switch can initiatively report to the management station about the important events tha

Page 157 - 9.2 MLD Snooping

Chapter 4 System The System module is mainly for system configuration of the switch, including four submenus: System Info, User Management, System T

Page 158 -  MLD Snooping Process

Type: Select the type for the notifications.  Trap: Indicates traps are sent.  Inform: Indicates informs are sent. The Inform type has a higher

Page 159 - 9.2.1 Global Config

Figure 13-9 Traps Config The following entries are displayed on this screen:  SNMP Traps SNMP Authentication: If selected, the switch will send an

Page 160 - 9.2.2 VLAN Config

VLAN Create/Delete If selected, the switch will send a VLAN Create/Delete trap when a VLAN is being created or deleted. IP Change: If selected, the

Page 161 -  VLAN Table

13.3 RMON RMON (Remote Monitoring) basing on SNMP (Simple Network Management Protocol) architecture, functions to monitor the network. RMON is curren

Page 162 - 9.2.3 Filter Config

Figure 13-10 History Control The following entries are displayed on this screen:  History Control Table Select: Select the desired entry for conf

Page 163 - 9.2.5 Static Multicast

 Event Table Select: Select the desired entry for configuration. Index: Displays the index number of the entry. User: Enter the name of the User

Page 164 - 9.2.6 Querier Config

at the end of the sampling interval.  Delta: Subtracts the last sampled value from the current value. The difference in the values is compared to t

Page 165 - 9.2.7 Packet Statistics

Chapter 14 LLDP LLDP (Link Layer Discovery Protocol) is a Layer 2 protocol that is used for network devices to advertise their own device informatio

Page 166 - 9.3 Multicast Table

 Disable: the port cannot transmit or receive LLDPDUs. 2) LLDPDU transmission mechanism  If the ports are working in TxRx or Tx mode, they will a

Page 167 - 9.3.2 IPv6 Multicast Table

TLV Type TLV Name Description Usage in LLDPDU 3 Time To Live Indicates the number of seconds that the neighbor device is to regard the local infor

Page 168 -  Multicast IP Table

Indicates the 1000Mbps port is at the speed of 10Mbps or 100Mbps. Indicates the SFP port is not connected to a device. Indicates the SFP port is a

Page 169 - Chapter 10 QoS

TLV Description System Name TLV The System Name TLV allows network management to advertise the system's assigned name, which should be the sys

Page 170 - Figure 10-3 IP datagram

Figure 14-1 Global Configuration The following entries are displayed on this screen:  Global Config LLDP: Enable/disable LLDP function globally.

Page 171 - Figure 10-5 WRR-Mode

Figure 14-2 Port Configuration The following entries are displayed on this screen:  LLDP Port Config Port Select: Select the desired port to conf

Page 172 - 10.1 DiffServ

Figure 14-3 Local Information The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disable the auto refresh fu

Page 173 - 10.1.2 DSCP Priority

The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disable the auto refresh function. Refresh Rate: Specify t

Page 174 - 10.1.3 802.1P/CoS Mapping

Figure 14-5 Device Statistics The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disable the auto refresh fun

Page 175 - 10.1.4 Schedule Mode

Receive Total: Displays the number of LLDPDUs received by this port. Discards: Displays the number of LLDPDUs discarded by this port. Errors: Di

Page 176 - 10.2 Bandwidth Control

Chapter 15 Cluster With the development of network technology, the network scale is getting larger and more network devices are required, which may

Page 177 - 10.2.2 Storm Control

 The commander switch discovers and determines candidate switches by collecting related information.  After being added to the cluster, the candi

Page 178 - Figure 10-11 Storm Control

The following entries are displayed on this screen:  Neighbor Search Option: Select the information the desired entry should contain and then clic

Page 179 - 10.3 Voice VLAN

4.1.2 Device Description On this page you can configure the description of the switch, including device name, device location and system contact. Cho

Page 180

The following entries are displayed on this screen:  Global Config NDP: Displays the global NDP status (enabled or disabled) for the switch. Aging

Page 181 - 10.3.2 Port Config

Figure 15-4 NDP Config The following entries are displayed on this screen:  Global Config NDP: Enable/Disable NDP function globally. Aging Time:

Page 182 - Figure 10-13 Port Config

15.2 NTDP NTDP (Neighbor Topology Discovery Protocol)is used for the commander switch to collect NDP information. NTDP transmits and forwards NTDP to

Page 183 - 10.3.3 OUI Config

Neighbor Info: Click the Detail button to view the complete information of this device and its neighbors. Collect Topology: Click the Collect Topol

Page 184

Figure 15-7 NTDP Summary The following entries are displayed on this screen:  Global Config NTDP: Displays the NTDP status (enabled or disabled)

Page 185 - Chapter 11 ACL

Figure 15-8 NTDP Config The following entries are displayed on this screen:  Global Config NTDP: Enable/Disable NTDP for the switch globally. NT

Page 186 - 11.1.2 Time-Range Create

Enable: Click the Enable button to enable NTDP feature for the port you select. Disable: Click the Disable button to disable NTDP feature for the p

Page 187 - 11.2 ACL Config

 For a commander switch,the following page is displayed: Figure 15-10 Cluster Summary for Commander Switch The following entries are displayed on

Page 188 - 11.2.3 MAC ACL

Hops: Displays the hop count from the member switch to the commander switch.  For a member switch, the following page is displayed: Figure 15-11

Page 189 - 11.2.4 Standard-IP ACL

 For a candidate switch, the following page is displayed. Figure 15-13 Cluster Configuration for Candidate Switch The following entries are displa

Page 190 - 11.2.5 Extend-IP ACL

The following entries are displayed on this screen:  Time Info Current System Date: Displays the current date and time of the switch. Current Time

Page 191 -  Deny: Discard Packets

The following entries are displayed on this screen:  Current Role Role: Displays the role the current switch plays in the cluster.  Role Change

Page 192 - 11.3 Policy Config

The following entries are displayed on this screen:  Current Role Role: Displays the role the current switch plays in the cluster.  Role Change

Page 193 - 11.3.3 Action Create

15.3.4 Cluster Topology On this page you can see the whole cluster topology. Click the node switch to directly log on to the corresponding Web manag

Page 194 - 11.4 Policy Binding

 If the switch is a commander switch in the cluster, please take the following steps. Step Operation Description 1 Enable the NDP function globa

Page 195 - 11.4.3 VLAN Binding

Chapter 16 Maintenance Maintenance module, assembling the commonly used system tools to manage the switch, provides the convenient method to locate

Page 196

16.1.2 Memory Monitor Choose the menu Maintenance→System Monitor→Memory Monitor to load the following page. Figure 16-2 Memory Monitor Click the Mo

Page 197

The Log function is implemented on the Log Table, Local Log, Remote Log and Backup Log pages. 16.2.1 Log Table The switch supports logs output to t

Page 198

16.2.2 Local Log Local Log is the log information saved in switch. By default, all system logs are saved in log buffer and the logs with severities

Page 199 - Chapter 12 Network Security

Figure 16-5 Log Host The following entries are displayed on this screen:  Log Host Index: Displays the index of the log host. The switch supports

Page 200 - 12.1.2 Manual Binding

Backup Log: Click the Backup Log button to save the log as a file to your computer. Note: It will take a few minutes to backup the log file. Please

Page 201 - 12.1.3 ARP Scanning

The following entries are displayed on this screen:  DST Config DST Status: Enable or Disable DST. Predefined Mode: Select a predefined DST confi

Page 202

16.4 Network Diagnostics This switch provides Ping test and Tracert test functions for network diagnostics. 16.4.1 Ping Ping test function, testing

Page 203 - 12.1.4 DHCP Snooping

16.4.2 Tracert Tracert test function is used to test the connectivity of the gateways during its journey from the source to destination of the test

Page 204 -  DHCP Working Principle

Chapter 17 System Maintenance via FTP The firmware can be downloaded to the switch via FTP function. FTP (File Transfer Protocol), a protocol in the

Page 205 -  DHCP Cheating Attack

2) The Connection Description Window will prompt shown as Figure 17-3. Enter a name into the Name field and click OK. Figure 17-3 Connection Descrip

Page 206

Figure 17-5 Port Settings 3. Download Firmware via bootUtil menu To download firmware to the switch via FTP function, you need to enter into the bo

Page 207 - Figure 12-8 DHCP Snooping

4) Configure the parameters of the FTP server which keeps the upgrade firmware. Later you can download the firmware to the switch from the FTP server

Page 208 - 12.2 ARP Inspection

Appendix A: Specifications IEEE802.3 10Base-T Ethernet IEEE802.3u 100Base-TX/100Base-FX Fast Ethernet IEEE802.3ab 1000Base-T Gigabit Ethernet IEEE802

Page 209 -  Cheating Gateway

Appendix B: Configuring the PCs In this section, we’ll introduce how to install and configure the TCP/IP correctly in Windows 2000 and TCP/IPv6 in WI

Page 210 -  Cheating Terminal Hosts

Figure B-2 5) The following Internet Protocol (TCP/IP) Properties window will display and the IP Address tab is open on this window by default. Fig

Page 211 -  Man-In-The-Middle Attack

6) Select Use the following IP address. And the following items will be available. If the switch's IP address is 192.168.0.1, specify IP address

Page 212 - 12.2.1 ARP Detect

Figure 4-7 System IP The following entries are displayed on this screen:  IP Config MAC Address: Displays MAC Address of the switch. IP Address M

Page 213 - 12.2.2 ARP Defend

Figure B-6 5) The following TCP/IPv6 Properties window will display and the IP Address tab is open on this window by default. 280

Page 214 - 12.2.3 ARP Statistics

281 Figure B-7 6) Select Use the following IPv6 address. And the following items will be available. If the switch's global IPv6 address is 3001

Page 215 - 12.3 IP Source Guard

Appendix C: 802.1X Client Software In 802.1X mechanism, the supplicant Client should be equipped with the corresponding client software complied with

Page 216 - 12.4 DoS Defend

Figure C-3 Welcome to the InstallShield Wizard 4. To continue, choose the destination location for the installation files and click Next on the fol

Page 217

Figure C-5 Install the Program 6. The InstallShield Wizard is installing TpSupplicant shown as the following screen. Please wait. Figure C-6 Setup

Page 218 - 12.4.1 DoS Defend

Figure C-7 InstallShield Wizard Complete Note: Please pay attention to the tips on the above screen. If you have not installed WinPcap 4.0.2 or the

Page 219 - 12.5 802.1X

2. Then the following screen will appear. If you want to stop the remove process, click Cancel. Figure C-9 Preparing Setup 3. On the continued scre

Page 220

Figure C-12 TP-LINK 802.1X Client Enter the Name and the Password specified in the Authentication Server. The length of Name and Password should be

Page 221

3. To continue, click Connect button after entering the Name and Password on Figure C-12. Then the following screen will appear to prompt that the Ra

Page 222 -  802.1X Timer

289 A1: It’s because the supported DLL file is missing. You are suggested to go to http://www.winpcap.org to download WinPcap 4.0.2 or the higher ve

Page 223 - 12.5.1 Global Config

II Safety Information  When product has power button, the power button is one of the way to shut off the product; When there is no power button,

Page 224 - Figure 12-22 Global Config

4.1.6 System IPv6 IPv6 (Internet Protocol version 6), also called IPng (IP next generation), was developed by the IETF (Internet Engineering Task For

Page 225 - 12.5.2 Port Config

Appendix D: Glossary Access Control List (ACL) ACLs can limit network traffic and restrict access to certain users or devices by checking each packet

Page 226 - 12.5.3 Radius Server

Generic Multicast Registration Protocol (GMRP) GMRP allows network devices to register end stations with multicast groups. GMRP requires that any par

Page 227 - 12.6 PPPoE Config

Layer 2 Data Link layer in the ISO 7-Layer Data Communications Protocol. This is related directly to the hardware interface for network devices and p

Page 228

293 Secure Shell (SSH) A secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptographic key, and e

Page 229

 Introduction to IPv6 address 1. IPv6 address format An IPv6 address is represented as a series of 16-bit hexadecimals, separated by colons (:). An

Page 230 - Chapter 13 SNMP

The type of an IPv6 address is designated by the first several bits called format prefix. The following table lists the mappings between address type

Page 231 -  MIB Introduction

An interface ID is used to identify interfaces on a link. The interface ID must be unique to the link. It may also be unique over a broader scope. In

Page 232 - 13.1 SNMP Config

1. IPv6 Neighbor Solicitation Message A value of 135 in the Type field of the ICMP packet header identifies a neighbor solicitation (NS) message. Nei

Page 233 - 13.1.3 SNMP Group

 Sets of flags that indicate the type of autoconfiguration (stateless or stateful) that can be completed  Default router information (whether the

Page 234 - Figure 13-5 SNMP Group

Choose the menu System →System Info →System IPv6 to load the following page. Figure 4-10 System IPv6 The following entries are displayed on this scr

Page 235 - 13.1.4 SNMP User

Status: Displays the status of the link-local address.  Normal: Indicates that the link-local address is normal.  Try: Indicates that the link-l

Page 236 -  User Table

Status: Displays the status of the global address.  Normal: Indicates that the global address is normal.  Try: Indicates that the global address

Page 237 - 13.1.5 SNMP Community

Figure 4-12 User Config The following entries are displayed on this screen:  User Info User Name: Create a name for users’ login. Access Level:

Page 238

CONTENTS Package Contents...1

Page 239 - 13.2 Notification

4.3 System Tools The System Tools function, allowing you to manage the configuration file of the switch, can be implemented on Config Restore, Confi

Page 240 - 13.2.2 Traps Config

Figure 4-14 Config Backup The following entries are displayed on this screen:  Config Backup Backup Config: Click the Backup Config button to sav

Page 241 - Figure 13-9 Traps Config

4.3.4 System Reboot On this page you can reboot the switch and return to the login page. Please save the current configuration before rebooting to av

Page 242 -  Port Traps

Figure 4-18 Access Control The following entries are displayed on this screen:  Access Control Config Control Mode: Select the control mode for u

Page 243 - 13.3 RMON

 Access User Number Number Control; Enable/Disable the Number Control function. Admin Number: Enter the maximum number of the users logging on to

Page 244 - 13.3.2 Event Config

Figure 4-19 SSL Config The following entries are displayed on this screen:  Global Config SSL: Enable/Disable the SSL function on the switch. 

Page 245 - 13.3.3 Alarm Config

Comprising server and client, SSH has two versions, V1 and V2 which are not compatible with each other. In the communication, SSH server and client c

Page 246

Download: Click the Download button to down the desired key file to the switch. Note: 1. Please ensure the key length of the downloaded file is in

Page 247 - Chapter 14 LLDP

 Network Requirements 1. Log on to the switch via key authentication using SSH and the SSH function is enabled on the mmended. 1. Select the key

Page 248

3. On the Web management page of the switch, download the public key file saved in the computer to the switch. Note: 1. The key type should acc

Page 249

5.1 Port ...42 5.1.1 Port

Page 250 - 14.1 Basic Config

5. Click Browse to download the private key file to SSH client software and click Open. After successful authentication, please enter the login use

Page 251 - 14.1.2 Port Config

41 Note: Following the steps above, you have already entered the User EXEC Mode of the switch. However, to configure the switch, you need a password

Page 252 - 14.2 Device Info

Chapter 5 Switching Switching module is used to configure the basic functions of the switch, including four submenus: Port, LAG, Traffic Monitor and

Page 253 - 14.2.2 Neighbor Info

Status: Allows you to Enable/Disable the port. When Enable is selected, the port can forward the packets normally. Speed and Duplex: Select the S

Page 254 - 14.3 Device Statistics

The following entries are displayed on this screen.  Mirroring Port Mirroring Port: Select a port from the pull-down list as the mirroring port. W

Page 255 -  Neighbor Statistics

Figure 5-3 Port Security The following entries are displayed on this screen:  Port Security Select: Select the desired port for Port Security con

Page 256

5.1.4 Port Isolation Port Isolation provides a method of restricting traffic flow to improve the network security by forbidding the port to forward p

Page 257 - Chapter 15 Cluster

Choose the menu Switching→Port→LoopbackDetection to load the following page. Figure 5-5 Loopback Detection Config The following entries are displaye

Page 258 - 15.1 NDP

Operation Mode: Select the mode how the switch processes the detected loops.  Alert: When a loop is detected, display an alert.  Port based: Wh

Page 259 - 15.1.2 NDP Summary

2. The traffic load of the LAG will be balanced among the ports according to the Aggregate Arithmetic. If the connections of one or several ports ar

Page 260 - 15.1.3 NDP Config

6.8.1 PVLAN Config...85 6.8.2 Port Config ...

Page 261 - Figure 15-4 NDP Config

Figure 5-7 Detail Information 5.2.2 Static LAG On this page, you can manually configure the LAG. The LACP feature is disabled for the member ports

Page 262 - 15.2 NTDP

Tips: 1. The LAG can be deleted by clearing its all member ports. 2. A port can only be added to a LAG. If a port is the member of a LAG or is dyn

Page 263 - 15.2.2 NTDP Summary

Figure 5-9 LACP Config The following entries are displayed on this screen:  Global Config System Priority: Specify the system priority for the sw

Page 264 - 15.2.3 NTDP Config

Status: Enable/Disable the LACP feature for your selected port. LAG: Displays the LAG number which the port belongs to. 5.3 Traffic Monitor The Tr

Page 265 - Figure 15-8 NTDP Config

Packets Tx: Displays the number of packets transmitted on the port. Octets Rx: Displays the number of octets received on the port. The error octe

Page 266 - 15.3 Cluster

Sent: Displays the details of the packets transmitted on the port. Broadcast: Displays the number of good broadcast packets received or transmitted

Page 267 -  Member Info

Type Configuration Way Aging outBeing kept after reboot (if the configuration is saved) Relationship between the bound MAC address and the port Sta

Page 268 - 15.3.2 Cluster Config

Type: Select the type of your desired entry.  All: This option allows the address table to display all theaddress entries.  Static: This option

Page 269

The following entries are displayed on this screen:  Create Static Address MAC Address: Enter the static MAC Address to be bound. VLAN ID: En

Page 270

On this page, you can configure the dynamic MAC address entry. Choose the menu Switching→MAC Address→Dynamic Address to load the following page. Fig

Page 271 - 15.3.3 Member Config

9.1.7 Packet Statistics...144 9.1.8 Querier Config...

Page 272 - 15.3.4 Cluster Topology

Bind: Click the Bind button to bind the MAC address of your selected entryto the corresponding port statically. Tips: Setting aging time properly h

Page 273

61  Filtering Address Table Select: Select the entry to delete the corresponding filtering address. It ismulti-optional. MAC Address: Displays

Page 274 - Chapter 16 Maintenance

Chapter 6 VLAN The traditional Ethernet is a data network communication technology basing on CSMA/CD (Carrier Sense Multiple Access/Collision Detect

Page 275 - 16.2 Log

6.1 802.1Q VLAN VLAN tags in the packets are necessary for the switch to identify packets of different VLANs. The switch works at the data link laye

Page 276 - 16.2.1 Log Table

 PVID PVID (Port Vlan ID) is the default VID of the port. When the switch receives an un-VLAN-tagged packet, it will add a VLAN tag to the packet a

Page 277 - 16.2.3 Remote Log

To ensure the normal communication of the factory switch, the default VLAN of all ports is set to VLAN1. The following entries are displayed on this

Page 278 - 16.2.4 Backup Log

The following entries are displayed on this screen:  VLAN Config VLAN ID: Enter the ID number of VLAN. Description: Give a description to the VLA

Page 279 - 16.3 Device Diagnostics

Figure 6-5 802.1Q VLAN – Port Config The following entries are displayed on this screen:  VLAN Port Config Port Select: Click the Select button

Page 280 - 16.4 Network Diagnostics

Click the Detail button to view the information of the corresponding VLAN. Figure 6-6 View the Current VLAN of Port The following entries are displa

Page 281 - 16.4.2 Tracert

received port. Thus, the packet is assigned automatically to the corresponding VLAN for transmission. 2. When receiving tagged packet, the switch w

Page 282 - 1. Hardware Installation

11.3 Policy Config...182 11.3.1 Policy Su

Page 283

6.2.2 Port Enable On this page, you can enable the port for the MAC VLAN feature. Only the port is enabled, can the configured MAC VLAN take effect.

Page 284

Protocol Type Type value IPX 0x8137 IS-IS 0x8000 LACP 0x8809 802.1X 0x888E Table 6-2 Protocol types in common use The packet in Protocol VLAN is pro

Page 285

 Protocol VLAN Table Select: Select the desired entry. It is multi-optional. Protocol: Displays the protocol template of the VLAN. Ether Type: D

Page 286 - Appendix A: Specifications

6.3.3 Port Enable On this page, you can enable the port for the Protocol VLAN feature. Only the port is enabled, can the configured Protocol VLAN tak

Page 287

 Switch B is connecting to PC B and Server A;  PC A and Server A is in the same VLAN;  PC B and Server B is in the same VLAN;  PCs in the two

Page 288

6.5 Application Example for MAC VLAN  Network Requirements  Switch A and switch B are connected to meeting room A and meeting room B respectivel

Page 289

Step Operation Description 4 Configure MAC VLAN 10 On VLAN→MAC VLAN→MAC VLAN page, create MAC VLAN10 with the MAC address as 00-19-56-8A-4C-71. 5

Page 290 - Figure B-6

 IP host, in VLAN10, is served by IP server while AppleTalk host is served by AppleTalk server;  Switch B is connected to IP server and AppleTalk

Page 291

Step Operation Description 4 Create Protocol Temp l ate Required. On VLAN→Protocol VLAN→Protocol Template page, configure the protocol template pr

Page 292 - 1.1 Installation Guide

Protocol type Value LACP 0x8809 802.1X 0x888E Table 6-3 Values of Ethernet frame protocol type in common use This VLAN VPN function is implemented o

Page 293

13.2.2 Traps Config...230 13.3 RMON...

Page 294

Choose the menu VLAN→VLAN VPN→VLAN Mapping to load the following page. Figure 6-13 Create VLAN Mapping Entry The following entries are displayed on

Page 295 - 1.2 Uninstall Software

Figure 6-14 Enable VLAN Mapping for Port Select your desired port for VLAN Mapping function. All the ports are disabled for VLAN Mapping function by

Page 296 - 1.3 Configuration

6.8 Private VLAN Private VLANs, designed to save VLAN resources of uplink devices and decrease broadcast, are sets of VLAN pairs that share a common

Page 297

 Packets from different Secondary VLANs can be forwarded to the uplink device via promiscuous port and carry no corresponding Secondary VLAN informa

Page 298 - 1.4 FAQ:

Port5 5 VLAN5 Port2 2 VLAN2 Port3 3 VLAN3 Table 6-4 Port settings before configuration synchronization Port PVID Allowed VLANs Port5 5 VLAN2,

Page 299

The Private VLAN packet forwarding process (here we take traffic transmission for PC2) based on the figure above is illustrated as follows: 1) PC2

Page 300 - Appendix D: Glossary

Choose the menu VLAN→Private VLAN→PVLAN Config to load the following page. Figure 6-16 Create Private VLAN The following entries are displayed on th

Page 301

Figure 6-17 Create and View Protocol Template The following entries are displayed on this screen:  Port Config Port: Select the desired port for

Page 302

Step Operation Description 4 Delete VLAN. Optional. On the VLAN→Private VLAN→PVLAN Config page, select the desired entry to delete the correspond

Page 303

 LeaveAll Timer: Once a GARP entity starts up, it starts the LeaveAll timer, and sends out a LeaveAll message after the timer times out, so that ot

Commentaires sur ces manuels

Pas de commentaire