TP-Link JetStream T1600G-28PS User Manual Download Page 191

 

182

 

12.4.1  Binding Table 

On this page view  the policy bound to port/VLAN. 
Choose the menu 

ACL

Policy  Binding

Binding Table 

to load the following page. 

 

Figure 12-12 Binding Table 

The following entries are displayed on this screen: 

 

Search Option 

Show Mode: 

Select a show mode appropriate to your needs. 

 

Policy VLAN-Bind Table 

Select: 

Select the desired entry to delete the corresponding binding policy. 

Index: 

Displays the index  of the binding policy. 

Policy Name: 

Displays the name of the binding policy. 

Interface: 

Displays the port number or VLAN  ID  bound to the policy. 

Direction: 

Displays the binding direction. 

 

Policy Port-Bind Table 

Select: 

Select the desired entry to delete the corresponding binding policy. 

Index: 

Displays the index  of the binding policy. 

Policy Name: 

Displays the name of the binding policy. 

Interface: 

Displays the port number or VLAN  ID  bound to the policy. 

Direction: 

Displays the binding direction. 

Summary of Contents for JetStream T1600G-28PS

Page 1: ...T1600G 28TS TL SG2424 T1600G 52TS TL SG2452 T1600G 28PS TL SG2424P T1600G 52PS TL SG2452P JetStream Gigabit Smart Switch REV1 1 2 1910011399...

Page 2: ...in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instruction manual may cause harmful interference...

Page 3: ...nnect the product or the power adapter from the power source Don t disassemble the product or make repairs yourself You run the risk of electric shock and voiding the limited warranty If you need serv...

Page 4: ...Chapter 4 System 15 4 1 System Info 15 4 1 1 System Summary 15 4 1 2 Device Description 16 4 1 3 System Time 17 4 1 4 Daylight Saving Time 18 4 1 5 System IPv6 19 4 2 User Management 28 4 2 1 User Ta...

Page 5: ...Table 63 5 4 2 Static Address 64 5 4 3 Dynamic Address 65 5 4 4 Filtering Address 67 Chapter 6 VLAN 69 6 1 802 1Q VLAN 70 6 1 1 VLAN Config 71 6 1 2 Port Config 72 6 2 Application Example for 802 1Q V...

Page 6: ...1 5 Querier Config 119 8 1 6 Profile Config 121 8 1 7 Profile Binding 122 8 1 8 Packet Statistics 124 8 2 MLD Snooping 125 8 2 1 Snooping Config 127 8 2 2 Port Config 128 8 2 3 VLAN Config 129 8 2 4...

Page 7: ...t Config 162 10 3 4 OUI Config 164 Chapter 11 PoE 166 11 1 PoE Config 166 11 1 1 PoE Config 167 11 1 2 PoE Profile 168 11 2 Time Range 169 11 2 1 Time Range Summary 169 11 2 2 Time Range Create 170 11...

Page 8: ...ping 191 13 2 1 Global Config 195 13 2 2 Port Config 196 13 3 ARP Inspection 197 13 3 1 ARP Detect 201 13 3 2 ARP Defend 202 13 3 3 ARP Statistics 203 13 4 DoS Defend 204 13 4 1 DoS Defend 206 13 5 80...

Page 9: ...Config 243 15 4 2 Port Config 244 15 4 3 Local Info 246 15 4 4 Neighbor Info 247 Chapter 16Maintenance 248 16 1 System Monitor 248 16 1 1 CPU Monitor 248 16 1 2 Memory Monitor 249 16 2 Log 249 16 2 1...

Page 10: ...ttings Installation Guide Resource CD for T1600 28TS T1600G 52TS T1600G 28PS T1600G 52PS including This User Guide CLI Reference Guide SNMP Mibs 802 1X Client Software and its User Guide Other Helpful...

Page 11: ...ple throughout this Guide However differences with significance will be presented with figures or notes as to attract your attention Menu Name Submenu Name Tab page indicates the menu structure System...

Page 12: ...oduces 802 1Q VLAN Configure port based VLAN Chapter 7 Spanning Tree This module is used to configure spanning tree function of the switch Here mainly introduces STP Config Configure and view the glob...

Page 13: ...he network Here mainly introduces ACL Config ACL rules Policy Config Configure operation policies ACL Binding Bind the ACL to a port VLAN to take its effect on a specific port VLAN Policy Binding Bind...

Page 14: ...tenance This module is used to assemble the commonly used system tools to manage the switch Here mainly introduces System Monitor Monitor the memory and CPU of the switch Log View configuration parame...

Page 15: ...ng Equipment PSE All the Ethernet RJ45 ports on the switch support Power over Ethernet PoE function which can automatically detect and supply power with those powered devices PDs complying with IEEE 8...

Page 16: ...panel of T1600G 52TS is shown as Figure 2 2 Figure 2 2 Front Panel of T1600G 52TS The following parts are located on the front panel of T1600G 52TS Reset Press this button for 5 seconds or above to r...

Page 17: ...de Switch Button Press this button to switch the LED status indication between Speed and PoE Reset Press this button for 5 seconds or above to reset the software setting back to factory default settin...

Page 18: ...On A 1000Mbps device is connected to the corresponding port Flashing Data is being transmitted or received Off A 10 100Mbps device or no device is connected to the corresponding port When the PoE LED...

Page 19: ...on status When the PoE LED is on the port LED is indicating the power supply status By default the Speed LED is on Pressing the mode switch button the Speed LED will turn off and the PoE LED will ligh...

Page 20: ...wer keeps 7W after this LED is on for 2 minutes Off The remaining PoE power 7W Speed or PoE port 1 48 Green On The port is supplying power normally Flashing The supply power exceeds the corresponding...

Page 21: ...2 Grounding Terminal The switch already comes with Lightning Protection Mechanism You can also ground the switch through the PE Protecting Earth cable of AC cord or with Ground Cable Return to CONTENT...

Page 22: ...1 Web browser Tips To log in to the switch the IP address of your PC should be set in the same subnet addresses of the switch The IP address is 192 168 0 x x is any number from 2 to 254 Subnet Mask is...

Page 23: ...n Figure 3 3 Main Setup Menu Note Clicking Apply can only make the new configurations effective before the switch is rebooted If you want to keep the configurations effective even the switch is reboot...

Page 24: ...stem information The port status diagram shows the working status of 48 10 100 1000Mbps RJ45 ports and 4 SFP ports of the switch Choose the menu System System Info System Summary to load the following...

Page 25: ...displays the bandwidth utilization monitored every four seconds Monitoring the bandwidth utilization on each port facilitates you to monitor the network traffic and analyze the network abnormities Fi...

Page 26: ...displayed while the switch is running On this page you can configure the system time and the settings here will be used for other time based functions You can manually set the system time get time fr...

Page 27: ...om NTP server Synchronize with PC S Clock When this option is selected the administrator PC s clock is utilized Note 1 The system time will be restored to the default when the switch is restarted and...

Page 28: ...ng mode and date mode cannot be configured 2 When the DST is enabled the default daylight saving time is of European in predefined mode 4 1 5 System IPv6 IPv6 Internet Protocol version 6 also called I...

Page 29: ...ix FE80 64 to communicate with other hosts on the link 6 Enhanced neighbor discovery mechanism The IPv6 neighbor discovery protocol is a group of Internet control message protocol version 6 ICMPv6 mes...

Page 30: ...packet that is sent to a unicast address is delivered to the interface identified by that address Multicast address An identifier for a set of interfaces typically belonging to different nodes simila...

Page 31: ...ue Identifier OUI of the 48 bit link layer address the MAC address of the interface the fourth and fifth octets 16 bits are a fixed hexadecimal value of FFFE and the last three octets 24 bits are take...

Page 32: ...ddresses to other links Note You can configure multiple IPv6 addresses per interface but only one link local address IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses ICMP messages and...

Page 33: ...is reachable according to NS and NA messages Node A sends an NS message whose destination address is the IPv6 address of node B If node A receives an NA message from node B node A considers that node...

Page 34: ...solicitation messages which have a value of 133 in the Type field of the ICMP packet header are sent by hosts at system startup or anytime needed so that the host can immediately autoconfigure withou...

Page 35: ...Interface ID Enable Disable IPv6 function globally on the switch Choose the interface type and input the interface ID Interface types include VLAN routed port and port channel Link local Address Conf...

Page 36: ...lobal address from the DHCPv6 Server Add a global address manually Address Format You can select the global address format according to your requirements EUI 64 Indicates that you only need to specify...

Page 37: ...agement page with a certain access level so as to protect the settings of the switch from being randomly changed The User Management function can be implemented on User Table and User Config pages 4 2...

Page 38: ...ect the desired entry to delete the corresponding user information It is multi optional The current user information can t be deleted User ID User Name Access Level Displays the current user ID user n...

Page 39: ...kup image If this fails too you will enter into the bootutil menu of the switch Choose the menu System System Tools Boot Config to load the following page Figure 4 12 Boot Config The following entries...

Page 40: ...h to import the configuration file Click the Browse button to select a backup file and click the Import button to restore the startup configuration file Note 1 It will take a few minutes to restore th...

Page 41: ...tion Please wait without any operation 4 3 4 FirmwareUpgrade The switch system can be upgraded via the Web management page To upgrade the system is to get more functions and better performance Go to h...

Page 42: ...3 5 System Reboot On this page you can reboot the switch and return to the login page Please save the current configuration before rebooting to avoid losing the configuration unsaved Choose the menu S...

Page 43: ...d Guest refer to 4 2 User Management Choose the menu System Access Security Access Control to load the following page Figure 4 18 Access Control The following entries are displayed on this screen Acce...

Page 44: ...nsfer Protocol you can manage the switch through a standard browser The standards development of HTTP was coordinated by the Internet Engineering Task Force and the World Wide Web Consortium On this p...

Page 45: ...e transmission Adopting asymmetrical encryption technology SSL uses key pair to encrypt decrypt information A key pair refers to a public key contained in the certificate and its corresponding private...

Page 46: ...The following entries are displayed on this screen Global Config HTTPS Select Enable Disable the HTTPS function on the switch SSL Version 3 Enable or Disable Secure Sockets Layer Version 3 0 By defaul...

Page 47: ...Number Enter the maximum number of the users logging on to the Web management page as Guest Certificate Download Certificate File Select the desired certificate to download to the switch The certifica...

Page 48: ...st to the server for login and then the two can communicate with each other after successful authentication This switch supports SSH server and you can log on to the switch via SSH connection using SS...

Page 49: ...lease ensure the key length of the downloaded file is in the range of 512 to 3072 bits Download Click the Download button to download the desired key file to the switch Note 1 It will take a long time...

Page 50: ...the login user name and password and then you can continue to configure the switch Application Example 2 for SSH Network Requirements 1 Log on to the switch via key authentication using SSH and the S...

Page 51: ...ocedure 1 Select the key type and key length and generate SSH key Note 1 The key length is in the range of 512 to 3072 bits 2 During the key generation randomly moving the mouse quickly can accelerate...

Page 52: ...ublic key and private key to the computer 3 On the Web management page of the switch download the public key file saved in the computer to the switch Note 1 The key type should accord with the type of...

Page 53: ...r the public key and private key are downloaded please log on to the interface of PuTTY and enter the IP address for login 5 Click Browse to download the private key file to SSH client software and cl...

Page 54: ...ly downloaded 4 4 5 TelnetConfig On this page you can Enable Disable Telnet function globally on the switch Choose the menu System Access Security Telnet Config to load the following page Figure 4 22...

Page 55: ...be discarded Disabling the port which is vacant for a long time can reduce the power consumption effectively And you can enable the port when it is in need The parameters will affect the working mode...

Page 56: ...n Jumbo is enabled the MTU size is 9216 bytes LAG Displays the LAG number which the port belongs to Note 1 The switch cannot be managed through the disabled port Please enable the port which is used t...

Page 57: ...The following entries are displayed on this screen Destination Port Destination Port Input or select a physical port from the port panel as the mirroring port Source Port Select Select the desired po...

Page 58: ...method that the attacker takes to obtain the network information illegally The attacker uses tools to generate the cheating MAC address and quickly occupy the MAC Address Table When the MAC Address T...

Page 59: ...resses that have been learned on the port Learn Mode Select the Learn Mode for the port Dynamic When Dynamic mode is selected the learned MAC address will be deleted automatically after the aging time...

Page 60: ...rk security by forbidding the port to forward packets to the ports that are not on its forward portlist Choose the menu Switching Port Port Isolation to load the following page Figure 5 5 Port Isolati...

Page 61: ...ion Config 5 1 5 LoopbackDetection With loopback detection feature enabled the switch can detect loops using loopback detection packets When a loop is detected the switch will display an alert or furt...

Page 62: ...nterval between 1 and 1000 seconds By default it s 30 seconds Automatic Recovery Time Time after which the blocked port would automatically recover to normal status It can be set as integral times of...

Page 63: ...r ports in an aggregation group their basic configuration must be the same The basic configuration includes STP QoS VLAN port attributes MAC Address Learning mode and other associated settings More de...

Page 64: ...DST MAC When this option is selected the Aggregate Arithmetic will apply to the destination MAC addresses of the packets SRC MAC DST MAC When this option is selected the Aggregate Arithmetic will app...

Page 65: ...the LAG Click the Detail button for the detailed information of your selected LAG Figure 5 9 Detailed Information 5 2 2 Static LAG On this page you can manually configure the LAG Choose the menu Swit...

Page 66: ...stem MAC port priority port number and operation key operation key is determined by the physical properties of the port upper layer protocol and admin key The device with higher priority will lead the...

Page 67: ...D A lower system priority value indicates a higher system priority When exchanging information between systems the system with higher priority determines which link aggregation a link belongs to and t...

Page 68: ...belongs to 5 3 Traffic Monitor The Traffic Monitor function monitoring the traffic of each port is implemented on the Traffic Summary and Traffic Statistics pages 5 3 1 Traffic Summary Traffic Summary...

Page 69: ...f packets transmitted on the port Octets Rx Displays the number of octets received on the port The error octets are counted in Octets Tx Displays the number of octets transmitted on the port Statistic...

Page 70: ...number of good jumbo packets received or transmitted on the port The error frames are not counted in Alignment Errors Displays the number of the received packets that have a bad Frame Check Sequence F...

Page 71: ...ring feature allows the switch to filter the undesired packets and forbid its forwarding so as to improve the network security The types and the features of the MAC Address Table are listed as the fol...

Page 72: ...l This option allows the address table to display all the address entries Static This option allows the address table to display the static address entries only Dynamic This option allows the address...

Page 73: ...e static learning mode will be displayed in the Static Address Table Choose the menu Switching MACAddress Static Address to load the following page Figure 5 15 Static Address The following entries are...

Page 74: ...the MAC address of a device has been added to the Static Address Table connecting the device to another port will cause its address not to be recognized dynamically by the switch Therefore please ensu...

Page 75: ...dress of your desired entry VLAN ID Enter the VLAN ID number of your desired entry Port Enter the Port number of your desired entry Dynamic Address Table Select Select the entry to delete the dynamic...

Page 76: ...llows the switch to filter the packets which includes this MAC address as the source address or destination address so as to guarantee the network security The filtering MAC address entries act on all...

Page 77: ...icates no specified port Type Displays the type of the MAC address Aging Status Displays the aging status of the MAC address Note The MAC address in the Filtering Address Table cannot be added to the...

Page 78: ...roadcast packets are limited in a VLAN Hosts in the same VLAN communicate with one another via Ethernet whereas hosts in different VLANs communicate with one another through the Internet devices such...

Page 79: ...ing the ID of the VLAN to which this packet belongs It is in the range of 0 to 4 095 Generally 0 and 4 095 is not used so the field is in the range of 1 to 4 094 VLAN ID identifies the VLAN to which a...

Page 80: ...table Port Type Receiving Packets Forwarding Packets Untagged Packets Tagged Packets Untagged Packets Tagged Packets Untagged When untagged packets are received the port will add the default VLAN tag...

Page 81: ...ry Edit Click to modify the settings of VLAN Detail Click to get the information of VLAN Click Edit and the following content will be shown Figure 6 4 VLAN Info VLAN Info VLAN ID Displays the ID numbe...

Page 82: ...configure the link aggregation groups Select Select the desired port for configuration It is multi optional Port Displays the port number PVID Enter the PVID number of the port LAG Displays the LAG t...

Page 83: ...VLAN Enter the VLAN ID and the name for the VLAN Meanwhile specify its member ports and the link type of the ports 3 Modify View VLAN Optional On the VLAN 802 1Q VLAN VLAN Config page click the Edit D...

Page 84: ...ed On VLAN 802 1Q VLAN VLAN Config page create a VLAN with its VLAN ID as 20 owning Port 6 and Port 7 Configure the link type of Port 6 and Port 7 as Tagged and Untagged respectively 6 3 MAC VLAN MAC...

Page 85: ...nd View MAC VLAN The following entries are displayed on this screen Create MAC VLAN MAC Address Enter the MAC address Description Give a description to the MAC address for identification VLAN ID Enter...

Page 86: ...set its connected port of switch to be a member of this VLAN so as to ensure the normal communication 3 Select your desired ports for MAC VLAN feature Required On the VLAN MAC VLAN Port Enable page s...

Page 87: ...e create MAC VLAN10 with the MAC address as 00 19 56 8A 4C 71 4 Configure MAC VLAN 20 On VLAN MAC VLAN MAC VLAN page create MAC VLAN20 with the MAC address as 00 19 56 82 3B 70 5 Port Enable Required...

Page 88: ...Protocol VLANs the broadcast domain can span over multiple switches and the Host can change its physical position in the network with its VLAN member role always effective By creating Protocol VLANs...

Page 89: ...w the information of the current defined Protocol VLANs Choose the menu VLAN Protocol VLAN Protocol Group Table to load the following page Figure 6 9 Create Protocol VLAN The following entries are dis...

Page 90: ...o Protocol Group Member UNIT 1 LAGS Click 1 to configure the physical ports Click LAGS to configure the link aggregation groups 6 5 3 ProtocolTemplate The Protocol Template should be created before co...

Page 91: ...r the SSAP field when selected LLC Protocol Template Table Select Select the desired entry It is multi optional ID Displays the Protocol Template ID Protocol Name Displays the Protocol Name Protocol T...

Page 92: ...ol VLAN Protocol Group Table page click the Edit button to modify view the information of the corresponding VLAN 5 Delete VLAN Optional On the VLAN Protocol VLAN Protocol Group Table page select the d...

Page 93: ...egress rule of Port 3 as Untagged and Port 4 as Tagged 2 Create VLAN20 Required On VLAN 802 1Q VLAN VLAN Config page create a VLAN with its VLAN ID as 20 owning Port 3 and Port 5 and configure the egr...

Page 94: ...gh the designated bridge The switch with the lowest bridge ID will be chosen as the designated bridge Root Path Cost Indicates the sum of the path cost of the root port and the path cost of all the sw...

Page 95: ...hat is the new root port and the designated port begins to forward data after twice forward delay which ensures the new configuration BPDUs are spread in the whole network BPDU Comparing Principle in...

Page 96: ...path cost the switch generates a designated port BPDU for each of its ports Root ID is replaced with that of the root port Root path is replaced with the sum of the root path cost of the root port and...

Page 97: ...bles packets of different VLANs to be forwarded along their respective paths so as to provide redundant links with a better load balancing mechanism Features of MSTP MSTP combines VLANs and spanning t...

Page 98: ...receive send BPDU packets and learn MAC address Blocking In this status the port can only receive BPDU packets Disconnected In this status the port is not participating in the STP Port Roles In an MST...

Page 99: ...figuration of spanning trees on the switch can be implemented on STP Config and STP Summary pages 7 1 1 STP Config Before configuring spanning trees you should make clear the roles each switch plays i...

Page 100: ...t value is 5pps Max Hops Enter a value from 1 to 40 to set the maximum number of hops that occur in a specific region before the BPDU is discarded The default value is 20 hops Note 1 The forward delay...

Page 101: ...92 7 1 2 STP Summary On this page you can view the related parameters for Spanning Tree function Choose the menu Spanning Tree STP Config STP Summary to load the following page Figure 7 5 STP Summary...

Page 102: ...t The lower value has the higher priority ExtPath Cost ExtPath Cost is used to choose the path and calculate the path costs of ports in different MST regions It is an important criterion on determinin...

Page 103: ...receive BPDU packets Disconnected In this status the port is not participating in the STP LAG Displays the LAG number which the port belongs to Note 1 Configure the ports connected directly to termin...

Page 104: ...ion identification using up to 32 characters Revision Enter the revision from 0 to 65535 for MST region identification 7 3 2 Instance Config Instance Configuration a property of MST region is used to...

Page 105: ...riority of the switch in the instance It is an important criterion on determining if the switch will be chosen as the root bridge in the specific instance VLAN ID Enter the VLAN ID which belongs to th...

Page 106: ...LAGS to configure the link aggregation groups Select Select the desired port to specify its priority and path cost It is multi optional Port Displays the port number of the switch Priority Enter the p...

Page 107: ...rts on Spanning Tree MSTP Instance Instance Port Config page 7 4 STP Security Configuring protection function for devices can prevent devices from any malicious attack against STP features The STP Sec...

Page 108: ...tries you can enable the TC protect function on the switch With TC protect function enabled if the account number of the received TC BPDUs exceeds the maximum number you set in the TC threshold field...

Page 109: ...he loops in the network brought by recalculating STP because of link failures and network congestions Root Protect Root Protect is to prevent wrong network topology change caused by the role change of...

Page 110: ...ct Cycle The default value is 20 TC Protect Cycle Enter a value from 1 to 10 to specify the TC Protect Cycle The default value is 5 7 5 Application Example for STP Function Network Requirements Switch...

Page 111: ...stance Region Config page configure the region as TP LINK and keep the default revision setting 4 Configure VLAN to Instance mapping table of the MST region On Spanning Tree MSTP Instance Instance Con...

Page 112: ...figure the link type of the related ports as Tagged and add the ports to VLAN101 VLAN106 The detailed instructions can be found in the section 802 1Q VLAN 2 Enable STP function On Spanning Tree STP Co...

Page 113: ...ance Region Config page configure the region as TP LINK and keep the default revision setting 4 Configure VLAN to Instance mapping table of the MST region On Spanning Tree MSTP Instance Instance Confi...

Page 114: ...the ports of switches Enable Root Protect function for all the ports of root bridges Enable Loop Protect function for the non edge ports Enable BPDU Protect function or BPDU Filter function for the ed...

Page 115: ...is suitable for networks with sparsely users whereas broadcast is suitable for networks with densely distributed users When the number of users requiring this information is not certain unicast and b...

Page 116: ...et network the destination MAC address is the MAC address of the receiver When a multicast packet is transmitted in an Ethernet network the destination is not a receiver but a group with uncertain num...

Page 117: ...to 0 to indicate this IPv6 multicast address is not based on a unicast prefix set to 1 to indicate this IPv6 multicast address is based on a unicast prefix When this bit is set to 1 the T bit must al...

Page 118: ...yer addresses of neighboring nodes within the local link or applied in IPv6 Duplicate Address Detection A node is required to join the associated Solicited Node multicast addresses for all unicast and...

Page 119: ...or dynamic registration of the multicast group The switch running IGMP snooping manages and controls the multicast group via listening to and processing the IGMP messages transmitted between the hosts...

Page 120: ...he message to get the address of the multicast group the host applies for joining The receiving port will be processed if the receiving port is a new member port it will be added to the multicast addr...

Page 121: ...he IGMP snooping function can be implemented on the following pages Snooping Config Port Config VLAN Config Multicast VLAN Querier Config Profile Config Profile Binding and Packet Statistics 8 1 1 Sno...

Page 122: ...Time Specify the aging time of the router port Within this time if the switch does not receive IGMP query message from the router port it will consider this port is not a router port any more Member P...

Page 123: ...sical ports Click LAGS to configure the link aggregation groups Select Select the desired port for IGMP snooping feature configuration It is multi optional Port Displays the port of the switch IGMP Sn...

Page 124: ...are displayed on this screen VLAN Config VLAN ID Enter the VLAN ID to enable IGMP snooping for the desired VLAN Router Port Time Specify the aging time of the router port Within this time if the swit...

Page 125: ...enabled in the VLAN thus the multicast data in the VLAN will be broadcasted 8 1 4 MulticastVLAN In old multicast transmission mode when users in different VLANs apply for join the same multicast group...

Page 126: ...n this time if the switch doesn t receive IGMP report message from the member port it will consider this port is not a member port any more Dynamic Router Ports Displays the dynamic router ports of th...

Page 127: ...Look over the configuration If it is successfully configured the VLAN ID of the multicast VLAN will be displayed in the IGMP Snooping Status table on the Multicast IGMP Snooping Snooping Config page...

Page 128: ...Multicast IGMP Snooping Snooping Config page Enable IGMP snooping function for port 3 port 4 and port 5 on Multicast IGMP Snooping Port Config page 4 Enable Multicast VLAN Enable Multicast VLAN config...

Page 129: ...aximal time for the host to respond to a general query frame sent by IGMP Snooping Querier General Query Source IP Enter the source IP of the general query frame sent by IGMP Snooping Querier It shoul...

Page 130: ...P address within the IP range and deny others Deny Only deny the IP address within the IP range and permit others Search Option Search Option Select the rules for displaying profile entries All Displa...

Page 131: ...the IP range End IP Enter end IP address of the IP range IP range Table Select Select the desired entry for configuration Index Displays index of the IP range which is not configurable Start IP Displa...

Page 132: ...mber Profile ID The existing Profile ID bound to the selected port Max Group The maximum multicast group a port can join Overflow Action The policy should be taken when the number of multicast group a...

Page 133: ...ile Info table on Multicast IGMP Snooping Profile Config page to configure the mode or IP range of the Profile 3 Configure Profile Binding for ports Optional Configure Profile Binding for ports on Mul...

Page 134: ...ction in IPv6 as IGMP snooping in IPv4 The switch running MLD snooping listens to the MLD messages transmitted between the host and the router and tracks the MLD messages and the registered port When...

Page 135: ...the VLAN and analyze the message to get the address of the multicast group the host applies for joining If the multicast group does not exist it will create the group entry The receiving port will be...

Page 136: ...esponding forwarding entries in the IPv6 multicast table When unknown multicast filter is enabled the switch will discard all received unknown IPv6 multicast packets When unknown multicast filer is di...

Page 137: ...onse MLD Snooping Status Description Displays MLD snooping status Member Displays the member of the corresponding status Note Configurations of the Router Port Time and Member Port Time in 8 2 3 VLAN...

Page 138: ...LD snooping function in this VLAN Choose the menu Multicast MLD Snooping VLAN Config to load the following page Figure 8 15 VLAN Config The following entries are displayed on this screen VLAN Config V...

Page 139: ...multicast transmission mode when users in different VLANs apply for join the same multicast group the multicast router will duplicate this multicast information and deliver each VLAN owning a receiver...

Page 140: ...ithin this time if the switch doesn t receive MLD report message from the member port it will consider this port is not a member port any more Dynamic Router Ports Displays the dynamic router ports of...

Page 141: ...function and specify the Multicast VLAN ID as the VLAN specified in Step 1 8 2 5 Querier Config In an IPv6 multicast network that runs MLD a Layer 3 multicast device works as an MLD querier to send o...

Page 142: ...plays the Query message source IP address Note The MLD Snooping Querier doesn t participate in the MLD Querier Election but an MLD Snooping Querier will affect the MLD Querier Election in the IPv6 net...

Page 143: ...tries you want to config Profile ID Displays the profile ID Mode Displays the attribute of the profile Permit Only permit the IP address within the IP range and deny others Deny Only deny the IP addre...

Page 144: ...ys index of the IP range which is not configurable Start IP Displays the start IP address of the IP range End IP Displays the end IP address of the IP range 8 2 7 Profile Binding When the switch recei...

Page 145: ...rofile ID The existing Profile ID bound to the selected port Max Group The maximum multicast group a port can join range from 0 to 1000 Overflow Action The policy should be taken when the number of mu...

Page 146: ...ry in the MLD Profile Info table on Multicast MLD Snooping Profile Config page to configure the mode or IP range of the Profile 3 Configure Profile Binding for ports Optional Configure Profile Binding...

Page 147: ...splays the number of error packets the port received 8 3 Multicast Table In a network receivers can join different multicast groups appropriate to their needs The switch forwards multicast streams bas...

Page 148: ...Port Enter the port number the desired entry must carry Multicast IP Table Multicast IP Displays multicast IP address VLAN ID Displays the VLAN ID of the multicast group Forward Port Displays the forw...

Page 149: ...ic Multicast Table Select Select the static multicast group entries you want to configure Multicast IP Displays multicast IP address VLAN ID Displays the VLAN ID of the multicast group Forward Port Di...

Page 150: ...icast Table Static IPv6 Multicast Table to load the following page Figure 8 24 IPv6 Multicast Table The following entries are displayed on this screen Create Static Multicast Multicast IP Enter the mu...

Page 151: ...static multicast group entries you want to configure Multicast IP Displays multicast IP address VLAN ID Displays the VLAN ID of the multicast group Forward Port Displays the forward port of the multic...

Page 152: ...Routing and ARP 9 1 Interface Interface is a virtual interface in Layer 3 mode and mainly used for realizing the Layer 3 connectivity between VLANs or routed ports Each VLAN interface is corresponding...

Page 153: ...s allocation mode None without ip Static setup manually DHCP allocated through DHCP BOOTP allocated through BOOTP IP Address Displays the IP address of the interface Subnet Mask Displays the subnet ma...

Page 154: ...dify the subnet mask of the interface Admin Status View and modify the Admin status Choose Disable to disable the interface s Layer 3 capabilities Interface Name View and modify the interface name Sec...

Page 155: ...connected to the interface Admin Status Displays the Admin status Choose Disable to disable the interface s Layer 3 capabilities Interface Name Displays the name of the interface Interface Setting De...

Page 156: ...f the egress interface Destination Specify the destination IP address of the packets Subnet Mask Specify the subnet mask of the destination IP address Next Hop Enter the IP address to which the packet...

Page 157: ...ies are displayed on this screen ARP Table Interface Displays the network interface of ARP entry IP Address Enter the DHCP server IP address MAC Address Displays the MAC address of ARP entry Type Disp...

Page 158: ...the ingress packets to different priority queues based on the priority modes This switch implements three priority modes based on port on 802 1P and on DSCP Queue scheduling algorithm When the network...

Page 159: ...t page you can configure different DS field mapping to the corresponding priority levels Non IP datagram with 802 1Q tag are mapped to different priority levels based on 802 1P priority mode the untag...

Page 160: ...ull use of The default weight value ratio of TC0 TC1 TC2 TC3 TC4 TC5 TC6 and TC7 is 1 2 4 8 16 32 64 127 Figure 10 5 WRR Mode 3 SP WRR Mode Strict Priority Weight Round Robin Mode In this mode the swi...

Page 161: ...s packets maps the packets to different priority queues and then forwards the packets according to specified scheduling algorithms to implement QoS function This switch implements three priority modes...

Page 162: ...re the mapping relation between the 802 1P priority and TC Required On QoS DiffServ 802 1P Priority page configure the mapping relation between the 802 1P priority and TC 3 Select a schedule mode Requ...

Page 163: ...ght value set as 0 are in the SP group other queues with none zero weight value belong to the WRR group and the weight value can be customized The default weight values of TC0 TC6 are 1 2 4 8 16 32 64...

Page 164: ...ished on this page Configuration Procedure Step Operation Description 1 Configure the mapping relation between the 802 1P priority Tag CoS and the TC Required On QoS DiffServ 802 1P Priority page conf...

Page 165: ...Level Indicates the 802 1P priority the packets with tag are mapped to The priorities are labeled as CoS0 CoS7 Configuration Procedure Step Operation Description 1 Configure the mapping relation betw...

Page 166: ...Storm Control to load the following page Figure 10 11 Storm Control The following entries are displayed on this screen Storm Control Config UNIT 1 LAGS Click 1 to configure the physical ports Click L...

Page 167: ...By configuring Voice VLANs and adding the ports with voice devices attached to voice VLANs you can perform QoS related configuration for voice data ensuring the transmission priority of voice data st...

Page 168: ...rt from voice VLAN Voice ports are automatically added into or removed from voice VLAN Manual Mode You need to manually add the port of IP phone to voice VLAN and then the switch will assign ACL rules...

Page 169: ...ependent of voice VLAN security mode Disable UNTAG packet Do not check the source MAC address of the packet and all the packets can be transmitted in the voice VLAN Packet with voice VLAN TAG Packet w...

Page 170: ...he real Ingress rate Egress Rate 1 1000000Kbps Configure the bandwidth for sending packets on the port You can select a rate from the dropdown list or manually set Egress rate the system will automati...

Page 171: ...10 12 Global Configuration The following entries are displayed on this screen Global Config Voice VLAN Select Enable Disable Voice VLAN function VLAN ID Enter the VLAN ID of the voice VLAN Aging Time...

Page 172: ...ports Click LAGS to configure the link aggregation groups Select Select the desired port for voice VLAN configuration It is multi optional Port Displays the port number of the switch Port Mode Select...

Page 173: ...access port will be automatically added to the Voice VLAN Choose the menu QoS Voice VLAN OUI Config to load the following page Figure 10 14 OUI Configuration The following entries are displayed on th...

Page 174: ...age you can check whether the switch is supporting the OUI template or not If not please add the OUI address 3 Configure the parameters of the ports in voice VLAN Required On QoS Voice VLAN Port Confi...

Page 175: ...h the provided power adapter It is very convenient to provide a backup power supply for the PDs Flexibility In compliance with IEEE 802 3af and IEEE 802 3at global organizations can deploy PoE everywh...

Page 176: ...em Power Limit Specify the max power the PoE switch can supply It ranges from 1W to 215W for T1600G 28PS and from 1W to 384W for T1600G 52PS System Power Consumption Displays the PoE switch s real tim...

Page 177: ...to the selected port If a PoE Profile is selected the three attributes including PoE Status PoE Priority and Power Limit are not available Power W Displays the port s real time power supply Current m...

Page 178: ...ined Absolute Time range defines one or several time ranges with specific starting time and ending time in the Gregorian calendar Seven time ranges can be created at most and their union is the Absolu...

Page 179: ...me of the time range Mode Displays the mode of the time range The mode can be one or a combination of the following modes Include Exclude Holiday Absolute and Periodic Refer to Time Range Create and H...

Page 180: ...range defines up to 7 time ranges with specific starting time and ending time in the Gregorian calendar It does not recur From Time Set the start time of the absolute time range To Time Set the end ti...

Page 181: ...5 Holiday Configuration The following entries are displayed on this screen Create Holiday Holiday Name Enter the name of the holiday Start Date Specify the start date of the holiday End Date Specify...

Page 182: ...mmary ACL Create MAC ACL Standard IPACL and Extend IPACL pages 12 1 1 ACL Summary On this page you can view the current ACLs configured in the switch Choose the menu ACL ACL Config ACL Summary to load...

Page 183: ...ose the menu ACL ACL Config MACACL to load the following page Figure 12 3 Create MAC Rule The following entries are displayed on this screen Create MAC Rule ACL ID Select the desired MAC ACL for confi...

Page 184: ...ndard IP Rule The following entries are displayed on this screen Create Standard IPACL ACL ID Select the desired Standard IP ACL for configuration Rule ID Enter the rule ID Operation Select the operat...

Page 185: ...nfiguration Rule ID Enter the rule ID Operation Select the operation for the switch to process packets which match the rules Permit Forward packets Deny Discard Packets S IP Enter the source IP addres...

Page 186: ...y Summary to load the following page Figure 12 6 Policy Summary The following entries are displayed on this screen Search Option Select Policy Select name of the desired policy for view If you want to...

Page 187: ...on this screen Create Action Select Policy Select the name of the policy Select ACL Select the ACL for configuration in the policy 12 3 ACL Binding ACL Binding function can have the ACL take its effec...

Page 188: ...desired entry to delete the corresponding binding ACL Index Displays the index of the binding ACL ACL ID Displays the ID of the binding ACL Interface Displays the port number or VLAN ID bound to the...

Page 189: ...The following entries are displayed on this screen Port Bind Config ACL ID Select the ID of the ACL you want to bind Port Select the number of the port you want to bind Port Bind Table Index Displays...

Page 190: ...ding direction Configuration Procedure Step Operation Description 1 Configure ACL rules Required On ACL ACL Config configuration pages configure ACL rules to match packets 2 Bind the ACL to the port V...

Page 191: ...o delete the corresponding binding policy Index Displays the index of the binding policy Policy Name Displays the name of the binding policy Interface Displays the port number or VLAN ID bound to the...

Page 192: ...g entries are displayed on this screen Port Bind Config Policy Name Select the name of the policy you want to bind Port Select the number of the port you want to bind Port Bind Table Index Displays th...

Page 193: ...ation Procedure Step Operation Description 1 Configure ACL rules Required On ACL ACL Config configuration pages configure ACL rules to match packets 2 Configure Policy Required On ACL Policy Config co...

Page 194: ...gure for requirement 1 On ACL ACL Config ACL Create page create ACL 11 On ACL ACL Config MAC ACL page select ACL 11 create Rule 1 configure the operation as Permit configure the S MAC as 00 64 A5 5D 1...

Page 195: ...Policy Config Policy Create page create a policy named limit1 On ACL Policy Config Action Create page add ACL 500 to Policy limit1 On ACL Policy Binding Port Binding page select Policy limit1 to bind...

Page 196: ...ddress VLAN ID and the connected port number of the Hosts in the LAN via the ARP Scanning function and bind them conveniently You are only requested to enter the IP address and VLAN ID on the ARP Scan...

Page 197: ...t MAC Address Displays the MAC Address of the Host VLAN ID Displays the VLAN ID here Port Displays the number of port connected to the Host Protect Type Allows you to view and modify the Protect Type...

Page 198: ...ect Type for the entry Port Select the number of port connected to the Host Manual Binding Table Select Select the desired entry to be deleted It is multi optional Host Name Displays the Host Name her...

Page 199: ...re 1 Suppose there are two hosts in the LAN Host A and Host B To send a packet to Host B Host A checks its own ARP Table first to see if the ARP entry related to the IP address of Host B exists If yes...

Page 200: ...re IP Address Displays the IP Address of the Host MAC Address Displays the MAC Address of the Host VLAN ID Displays the VLAN ID here Port Displays the number of port connected to the Host Protect Type...

Page 201: ...reach a dynamic employ of the network source A Server can assign the IP address for several Clients which is illustrated in the following figure Figure 13 6 Network diagram for DHCP snooping implement...

Page 202: ...igning this IP address to the Client it will send the DHCP ACK packet back to the Client Otherwise the Server will send the DHCP NAK packet to refuse assigning this IP address to the Client Option 82...

Page 203: ...e 2 Hacker exhausted the IP addresses of the normal DHCP server and then pretended to be a legal DHCP server to assign the IP addresses and the other parameters to Clients For example hacker used the...

Page 204: ...unction in the specified VLAN VLAN Configuration Display Display the VLAN ID of which the DHCP Snooping function is enabled Option 82 Config Option 82 Support Enable Disable the Option 82 feature Exis...

Page 205: ...the DHCP packets from DHCP servers MAC Verify Select Enable Disable the MAC Verify feature There are two fields of the DHCP packet containing the MAC address of the Host The MAC Verify feature is to...

Page 206: ...ack frequently occur to the network especially to the large network such as campus network and so on The following part will simply introduce these ARP attacks Imitating Gateway The attacker sends the...

Page 207: ...nd then the Gateway will automatically update its ARP table after receiving the ARP packets When the Gateway tries to communicate with Host A in LAN it will encapsulate this false destination MAC addr...

Page 208: ...n The Middle Attack The attacker continuously sends the false ARP packets to the Hosts in LAN so as to make the Hosts maintain the wrong ARP table When the Hosts in LAN communicate with one another th...

Page 209: ...ion MAC address which makes Host A and Host B keep a normal appearing communication 5 The attacker continuously sends the false ARP packets to the Host A and Host B so as to make the Hosts always main...

Page 210: ...n the IP MAC Binding Table and filter the illegal ARP packets so as to prevent the network from ARP attacks such as the Network Gateway Spoofing and Man In The Middle Attack etc Choose the menu Networ...

Page 211: ...entry 3 Specify the trusted port Required On the Network Security ARP Inspection ARP Detect page specify the trusted port The specific ports such as up linked port routing port and LAG port should be...

Page 212: ...the current speed of the received ARP packets Status Displays the status of the ARP attack LAG Displays the LAG to which the port belongs to Operation Click the Recover button to restore the port to t...

Page 213: ...Port Indicates the port is an ARP Trusted Port or not Illegal ARP Packet Displays the number of the received illegalARP packets 13 4 DoS Defend DoS Denial of Service Attack is to occupy the network ba...

Page 214: ...t to 0 are considered as the illegal packets SYN packet with its source port less than 1024 The attacker sends the illegal packet with its TCP SYN field set to 1 and source port less than 1024 Blat At...

Page 215: ...e security issues of wireless LANs It was then used in Ethernet as a common access control mechanism for LAN ports to solve mainly authentication and security problems 802 1X is a port based network a...

Page 216: ...the authentication server 1 EAP protocol packets transmitted between the supplicant system and the authenticator system are encapsulated as EAPOL packets 2 EAP protocol packets transmitted between th...

Page 217: ...ient program responds by sending an EAP Response Identity packet to the switch with the user name included The switch then encapsulates the packet in a RADIUS Access Request packet and forwards it to...

Page 218: ...20 PAP Authentication Procedure In PAP mode the switch encrypts the password and sends the user name the randomly generated key and the supplicant system encrypted password to the RADIUS server for f...

Page 219: ...t VLAN to install 802 1X client program or upgrade their 802 1x clients without being authenticated If there is no supplicant past the authentication on the port in a certain time the switch will add...

Page 220: ...uthentication server PAP IEEE 802 1X authentication system uses extensible authentication protocol EAP to exchange information between the switch and the client The transmission of EAP packets is term...

Page 221: ...efore resending a request to the supplicant Server Timeout Specify the maximum time for the switch to wait for the response from authentication server before resending a request to the authentication...

Page 222: ...n for access Port Based All the clients connected to the port can access the network on the condition that any one of the clients has passed the 802 1X Authentication Authorized Displays the authentic...

Page 223: ...ion cannot be enabled for LAG member ports That is the port with 802 1X function enabled cannot be added to the LAG 3 The 802 1X function should not be enabled for the port connected to the authentica...

Page 224: ...tion Description 5 Configure the 802 1X for the port Required On the Network Security 802 1X Port Config page configure the 802 1X feature for the port of the switch basing on the actual network Retur...

Page 225: ...t Agent is the server software operated on network devices with the responsibility of receiving and processing the request packets from SNMP Management Station In the meanwhile Agent will inform the S...

Page 226: ...identify the management objects of the device in SNMP messages SNMP adopts the hierarchical architecture to identify the managed objects It is like a tree and each tree node represents a managed obje...

Page 227: ...mmunity pages 14 1 1 GlobalConfig To enable SNMP function please configure the SNMP function globally on this page Choose the menu SNMP SNMP Config Global Config to load the following page Figure 13 3...

Page 228: ...ies are displayed on this screen View Config View Name Give a name to the View for identification Each View can include several entries with the same name MIB Object ID Enter the Object Identifier OID...

Page 229: ...ct the Security Model for the SNMP Group v1 SNMPv1 is defined for the group In this model the Community Name is used for authentication SNMP v1 can be configured on the SNMP Community page directly v2...

Page 230: ...entry to delete the corresponding group It is multi optional Group Name Displays the Group Name here Security Model Displays the Security Model of the group Security Level Displays the Security Level...

Page 231: ...to its Group Name Security Model and Security Level Security Model Select the Security Model for the User Security Level Select the Security Level for the SNMP v3 User Auth Mode Select the Authenticat...

Page 232: ...oup of the User and click the Modify button to apply Note The SNMP User and its Group should have the same Security Model and Security Level 14 1 5 SNMP Community SNMP v1 and SNMP v2c adopt community...

Page 233: ...View and the Access right of the Community and then click the Modify button to apply Note The default MIB View of SNMP Community is viewDefault Configuration Procedure If SNMPv3 is employed please ta...

Page 234: ...ng as a community name The users can manage the device via the Read View Write View and Notify View defined in the SNMP Group Create SNMP Group and SNMP User 14 2 Notification With the Notification fu...

Page 235: ...d the inform request if it doesn t get the response from the management station during the Timeout interval and it will terminate resending the inform request if the resending times reach the specifie...

Page 236: ...any network malfunction In addition RMON MIB records network statistics information of network performance and malfunction periodically based on which the management station can monitor network at any...

Page 237: ...from 1 to 65535 Port Enter or choose the Ethernet interface from which to collect the statistics Owner Enter the owner name Status Choose the status of statistics entry valid The entry exists and is v...

Page 238: ...on Index Displays the index number of the entry Port Specify the port from which the history samples were taken Interval Specify the interval to take samplings from the port Max Buckets Displays the m...

Page 239: ...e of the User or the community to which the event belongs Description Give a description to the event for identification Type Select the event type which determines the act way of the network device i...

Page 240: ...or the selected variable and comparing the value against the thresholds Absolute Compares the values directly with the thresholds at the end of the sampling interval Delta Subtracts the last sampled v...

Page 241: ...event is triggered Interval Enter the alarm interval time in seconds Owner Enter the name of the device or user that defined the entry Status Select Enable Disable the corresponding alarm entry Note...

Page 242: ...ork devices of different vendors This protocol allows two systems running different network layer protocols to learn about each other LLDP MED Link Layer Discovery Protocol for Media Endpoint Devices...

Page 243: ...interval turns to be 1 second several LLDPDUs will be sent out and then the transmit interval comes back to the regular interval 3 LLDPDU receipt mechanism When a port is working in TxRx or Rx mode t...

Page 244: ...the functions enabled Optional 8 Management Address Identifies the management IP address the corresponding interface number and OID Object Identifier The management IP address is specified by the user...

Page 245: ...allows a VLAN bridge port to advertise the port s VLAN identifier PVID that will be associated with untagged or priority tagged frames Port And Protocol VLAN ID TLV The Port And Protocol VLAN ID TLV...

Page 246: ...al device to transmit LLDPDU to its neighbors The default value is 30 seconds Hold Multiplier Enter a multiplier on the Transmit Interval It determines the actual TTL Time To Live value used in an LLD...

Page 247: ...lue is 3 15 1 2 Port Config On this page you can configure all ports LLDP parameters Choose the menu LLDP Basic Config Port Config to load the following page Figure 15 2 LLDP Port Config The following...

Page 248: ...the Local Info and Neighbor Info pages respectively 15 2 1 LocalInfo On this page you can see all ports configuration and system information Choose the menu LLDP Device Info Local Info to load the fo...

Page 249: ...nformation associated with this chassis ID and port ID identifier to be valid Port Description Display local port s description System Name Indicate local device s administratively assigned name Syste...

Page 250: ...iption Displays the system description of the neighbor device Neighbor Port Displays the port number of the neighbor linking to local port Information Click Information to display the detailed informa...

Page 251: ...intended for managing endpoint devices such as Voice over IP phones and network switches The LLDP MED TLVs advertise information such as network policy power via MDI inventory management and device lo...

Page 252: ...ctivity Devices and it allows advertisement of fine grained power requirement details Endpoint power priority as well as both Endpoint and Network Connectivity Device power status Inventory TLV The In...

Page 253: ...menu LLDP LLDP MED Port Config to load the following page Figure 15 7 LLDP MED Port Configuration The following entries are displayed on this screen LLDP MED Port Config Port Displays local device s...

Page 254: ...g LLDPDU of the port Emergency Number Emergency number is Emergency Call Service ELIN identifier which is used during emergency call setup to a traditional CAMA or ISDN trunk based PSAP Civic Address...

Page 255: ...Info to load the following page Figure 15 8 LLDP MED Local Information The following entries are displayed on this screen Auto Refresh Auto Refresh Enable Disable the auto refresh function Refresh Ra...

Page 256: ...auto refresh rate Neighbor Info Device Type Displays the device type of the neighbor Application Type Displays the application type of the neighbor Application Type indicates the primary function of t...

Page 257: ...ics Test whether the destination device is reachable and detect the route hops from the switch to the destination device 16 1 System Monitor System Monitor functions to display the utilization status...

Page 258: ...onitor and display its Memory utilization rate every four seconds 16 2 Log The Log system of switch can record classify and manage the system information effectively providing powerful support for net...

Page 259: ...ormation in log buffer will be lost after the switch is rebooted or powered off whereas the information in log file will be kept effective even the switch is rebooted or powered off Log Table displays...

Page 260: ...an set the output channel for logs Choose the menu Maintenance Log Local Log to load the following page Figure 14 4 Local Log The following entries are displayed on this screen Local Log Config Select...

Page 261: ...for receiving sending log information Here we use the standard port 514 Severity Specify the severity level of the log information sent to each log host Only the log with the same or smaller severity...

Page 262: ...get some related important information about the error for device diagnosis after the switch is restarted 2 It will take a few minutes to backup the log file Please wait without any operation 16 3 De...

Page 263: ...status is close open or impedance here displays the error length of the cable Note 1 The interval between two cable tests for one port must be more than 3 seconds 2 The result is more reasonable when...

Page 264: ...nd test data during Ping testing The default value is recommended Data Size Enter the size of the sending data during Ping testing The default value is recommended Interval Specify the interval to sen...

Page 265: ...e Figure 14 9 Tracert The following entries are displayed on this screen Tracert Config Destination IP Enter the IP address of the destination device Both IPv4 and IPv6 are supported Max Hop Specify t...

Page 266: ...P 100m of Cat 5e Cat 6 or above 1000Base X MMF or SMF SFP Module Optional LED T1600G 28TS PWR SYS 1000Mbps Link Act T1600G 52TS PWR SYS 10 100 1000Mbps port 1 48 Link Act port 49 52 T1600G 28PS PWR SY...

Page 267: ...he output queues Domain Name Service DNS A system used for translating host names for network nodes into IP addresses Dynamic Host Control Protocol DHCP Provides a framework for passing configuration...

Page 268: ...ISO 7 Layer Data Communications Protocol This is related directly to the hardware interface for network devices and passes on traffic based on MAC addresses Link Aggregation See Port Trunk Management...

Page 269: ...loop can often occur in complicated or backup linked network systems Spanning Tree detects and directs data along the shortest available path maximizing the performance and efficiency of the network...

Reviews: