Table 4-47 (Continued). Config File screen options.
Parameter Description
Import File Path
Import Start button: Import Save As Start’s config file stored in the
Flash.
Import User-Conf button: Import Save As User’s config file stored in
the Flash.
4.16 Security
4.16.1 M
IRROR
Table 4-48. Mirror screen options.
Parameter Description
Mirror Configuration
Mirror Configuration is to monitor the traffic of the network. For
example, we assume that Port A and Port B are Monitoring Port and
Monitored Port respectively, thus, the traffic received by Port B will
be copied to Port A for monitoring.
Mode
Used for the activation or de-activation of Port Mirror function.
Default is disable.
Monitoring Port
Set up the port for monitoring. Valid port is Port 1~26 and default is
Port 1.
Monitored Ingress Port
Set up the port for being monitored. It only monitor the packets
received by the port you set up. Just tick the check box (
;
) beside
the port x and valid port is Port 1~26.
Monitored Egress Port
Set up the port for being monitored. It only monitor the packets
transmitted by the port you set up. Just tick the check box (
;
) beside
the port x and valid port is Port 1~26.
4.16.2 I
SOLATED
G
ROUP
Isolated Group function can let the port be independent of other ports in the Isolated group, and the
communication is also forbidden between these ports. But, the ports of the Isolated group are still able to
communicate with the ports of the non-Isolated group. With this design, it will be helpful to the administrator
to immediately find and solve the port that results in the occurrence of looping problems in the network.
CHAPTER 4: Web-Based Management
83