23
5.4 System
6.4.1 General
– Switch Information
User can find the system name, description, location and contact personnel to identify
the switch. The version table below is a read-only field to show the basic information of
the switch.
System Name:
Assign the system name of the switch (The maximum length is 64
bytes)
System Description:
Describes the switch.
System Location:
Assign the switch physical location (The maximum length is 64
bytes).
System Contact:
Enter the name of contact person or organization.
System OID:
SNMP OID of switch
Firmware Version:
Displays the swi
tch’s firmware version
Kernel Version:
Displays the kernel software version
MAC Address:
Displays the unique hardware address assigned by manufacturer
6.4.2 General
– Asset
You can modify these information about System name
、
System Description
、
System Location and System Contact in here.
Switch settings interface
6.4.2 General
– CPU Load Average
Sometimes the user was worry about that
‘ Could my switch process too many
network packets ? So the network throughput was keeping decreasing
“. In this option,
you can monitor the CPU of switch to see if the switch was in full loading status or not.
Summary of Contents for 2204F Series
Page 23: ...16 LC connector to the transceiver ...
Page 31: ...24 ...
Page 37: ...30 IP Addressing interface ...
Page 40: ...33 SNMP Agent Configuration interface ...
Page 48: ...41 ...
Page 52: ...45 Port Statistics interfac ...
Page 59: ...52 6 17 2Aggregator Status You can check the setting of Port aggregation in Status ...
Page 64: ...57 RSTP Port Configuration interface ...
Page 67: ...60 field and click Delete to remove it ...
Page 75: ...68 6 24 2Switch Status You can see the status of VLAN setting in this function ...
Page 80: ...73 highest priority Click Apply to have the configuration take effect ...
Page 91: ...84 6 26 3 3 Port Status You can monitor the port Authorized state in this function ...
Page 92: ...85 6 26 4 MAC Filtering You can block the un authorized MAC by switch in this function ...
Page 93: ...86 6 26 5 Port Security You can block the un authorized MAC by oer port in this function ...
Page 102: ...95 Straight through cables schematic Cross over cables schematic ...