DGS-3312SR Stackable Gigabit Layer 3 Switch
33
Multicast router Only
If this option is enabled and IGMP Snooping is also enabled, the Switch forwards all
multicast traffic to a multicast-enabled router only. Otherwise, the Switch will
forward all multicast traffic to any IP router.
Telnet Status
Telnet configuration is
Enabled
by default. If you do not want to allow configuration
of the system through Telnet choose
Disabled
.
Telnet TCP Port
Number (1-65535)
The Telnet TCP port number. TCP ports are numbered between 1 and 65535. The
"well-known" TCP port for the Telnet protocol is 23.
Web Status
Web-based management is
Enabled
by default. If you choose to disable this by
selecting
Disabled
, you will lose the ability to configure the system through the web
interface as soon as these settings are applied.
Web TCP Port
Number (1-65535)
The TCP port number currently being utilized by the Switch to connect to the web
interface. The "well-known" TCP port for the Web interface is 80.
RMON Status
Remote monitoring (RMON) of the Switch is
Enabled
or
Disabled
here.
GVRP
Use this pull-down menu to enable or disable GVRP on the Switch.
Link Aggregation
Algorithm
The algorithm that the Switch uses to balance the load across the ports that make
up the port trunk group is defined by this definition. Choose
MAC
Source, MAC
Destination
,
MAC Src & Dest, IP Source, IP Destination
, and
IP Src & Dest.
(See
Link Aggregation)
Switch 802.1x
The Switch’s 802.1x function may be enabled by port or by MAC Address; the
default is
Disabled
. This field must be enabled to view and configure certain
windows for 802.1x. More information regarding 802.1x, its functions and
implementation can be found later in this section, under the
Port Access Entity
folder.
Port-Based 802.1x
specifies that ports configured for 802.1x are initialized based
on the port number only and are subject to any authorization parameters
configured.
MAC-based 802.1x
specifies that ports configured for 802.1x are initialized based
on the port number and the MAC address of the computer being authorized and are
then subject to any authorization parameters configured.
Syslog state
Use this pull-down menu to enable or disable Syslog.
Click
Apply
to implement changes made.