© Copyright 2022 TRENDnet. All Rights Reserved.
70
TRENDnet User’s Guide
Multi-Gig Web Smart Switch Series
2. Click on
Security
and click on
.
3. Click
Add
to create a new TACAS+
4. Review the settings.
•
Server IP
–
Enter the Server IP address.
•
Server Priority
–
Enter the Server priority (Highest: 1, Lowest: 5).
•
Server Port
–
Enter the port number via which the session occurs. The
default port is port 49.
•
Key String
–
Enter the default authentication and encryption key for
communication between the device and the server.
•
Timeout
–
Enter the amount of time (in seconds) the device waits for an
answer from the server before retrying the query, or switching to the
next server. Possible field values are 1-255. The default value is 5.
Click
Apply
to add the entry to the table.
DHCP Snooping
Settings
DHCP Snooping > Settings
Here is a summary of the rules to observe when you configure DHCP Snooping:
•
A trusted port is connected to one of the following:
o
Directly to the legitimate trusted DHCP Server.
o
A network device relaying DHCP messages to and from a trusted
server.
o
Another trusted source such as a switch with DHCP Snooping enabled.
o
Untrusted ports are connected to DHCP clients and to traffic that
originates outside of the local area network.
•
The VLANs to which the DHCP Snooping feature applies must be specified in
the DHCP Snooping VLAN Setting configuration.
•
Any static IP addresses on the network must be manually added to the Binding
Database.
1. Log into your switch
management page (see “
Access your switch management page
on page 5).
2. Click on
Security
, click on
DHCP Snooping,
and click on
Global
Settings
.
3. Review the settings..
•
DHCP Snooping Status
- Select one of the following radio button choices:
o
Enabled
- This parameter activates the DHCP Snooping feature.
o
Disabled
- This parameter de-activates the DHCP Snooping
•
MAC Verify -
Select one of the following choices:
o
Enable -
The MAC address of each ingress ARP packet is validated
when compared against the Binding Table entries. Invalid ARP packets
are discarded.
o
Disable
- The MAC address of each ingress ARP packet is not validated
against the Binding Table. All ARP packets are forwarded through the
switch without regard to the IP and MAC Address information in the
packet header.
Summary of Contents for TEG-3102WS
Page 1: ...TRENDnet User s Guide Cover Page...
Page 95: ......