10
•
Supports 802.1Q VLAN
•
Supports user management and limits three users to login
•
Maximal packet length can be up to 9600 bytes for jumbo frame application
•
Supports DHCP Broadcasting Suppression to avoid network suspended or
crashed
•
Supports
Link Layer Discovery Protocol
(LLDP)
•
Supports to send the trap event while monitored events happened
•
Supports default configuration which can be restored to overwrite the current
configuration which is working on via web browser and CLI
•
Supports on-line plug/unplug SFP modules
•
Supports Quality of Service (QoS) for real time applications based on the
information taken from Layer 2 to Layer 4, such as VoIP
•
Built-in web-based management and CLI management, providing a more
convenient UI for the user
•
Supports port mirror function with ingress/egress traffic
•
Supports rapid spanning tree (802.1w RSTP)
•
Supports multiple spanning tree (802.1s MSTP)
•
Supports 802.1X port security on a VLAN
•
Supports IP-MAC-Port Binding for LAN security
•
Supports user management and only first login administrator can configure the
device. The rest of users can only view the switch
•
SNMP access can be disabled and prevent from illegal SNMP access
•
Supports Ingress, Non-unicast and Egress
Bandwidth rating management with
a resolution of 1Mbps
•
The trap event and alarm message can be transferred via e-mail
•
Supports diagnostics to let administrator knowing the hardware status
•
Supports loop detection to protect the switch crash when the networking has
looping issue
•
HTTP and TFTP for firmware upgrade, system log upload and configuration file
import/export
•
Supports remote boot the device through user interface and SNMP
•
Supports NTP network time synchronization and daylight saving
•
Supports 120 event log records in the main memory and display on the local
console
Summary of Contents for KGS-2416
Page 2: ......
Page 4: ......
Page 34: ...30 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection ...
Page 93: ...89 Fig 3 39 Fig 3 40 Fig 3 41 ...
Page 109: ...105 Fig 3 62 Set up VLAN Tag Priority Mapping Finish ...
Page 116: ...112 Fig 3 67 Ingress Port Fig 3 68 ...
Page 118: ...114 Fig 3 71 Fig 3 72 Fig 3 73 ARP ...
Page 119: ...115 Fig 3 74 ARP Fig 3 75 ARP Fig 3 76 ARP Fig 3 77 ARP ...
Page 120: ...116 Fig 3 78 ARP Fig 3 79 ARP Fig 3 80 ARP Fig 3 81 ARP ...
Page 121: ...117 Fig 3 82 ARP Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 86 ARP ...
Page 122: ...118 Fig 3 87 IPv4 Fig 3 88 IPv4 Fig 3 89 IPv4 ...
Page 123: ...119 Fig 3 90 IPv4 Fig 3 91 IPv4 Fig 3 92 IPv4 Fig 3 93 IPv4 Fig 3 94 IPv4 ...
Page 124: ...120 Fig 3 95 IPv4 Fig 3 96 IPv4 Fig 3 97 IPv4 Fig 3 98 IPv4 Fig 3 99 IPv4 ...
Page 125: ...121 Fig 3 100 IPv4 Fig 3 101 IPv4 Fig 3 102 IPv4 ...
Page 126: ...122 Fig 3 103 IPv4 Fig 3 104 IPv4 Fig 3 105 IPv4 ...
Page 127: ...123 Fig 3 106 IPv4 Fig 3 107 IPv4 Fig 3 108 IPv4 ...
Page 128: ...124 Fig 3 109 IPv4 Fig 3 110 IPv4 Fig 3 111 IPv4 ...
Page 129: ...125 Fig 3 112 IPv4 Fig 3 113 IPv4 Fig 3 114 IPv4 ...
Page 130: ...126 Fig 3 115 IPv4 Fig 3 116 IPv4 Fig 3 117 Action ...
Page 131: ...127 Fig 3 118 Rate Limiter Fig 3 119 Port Copy ...
Page 132: ...128 Fig 3 120 DMAC Filter Fig 3 121 VLAN ID Filter Fig 3 122 VLAN ID Filter ...
Page 144: ...140 Fig 3 124 Wizard Fig 3 125 Set up Policy Rules Fig 3 126 Set up Policy Rules ...
Page 146: ...142 Fig 3 130 Set up Port Policies Fig 3 131 Set up Port Policies ...
Page 147: ...143 Fig 3 132 Set up Port Policies Finish Fig 3 133 Set up Typical Network Application Rules ...
Page 222: ...218 Fig 4 1 Fig 4 2 ...