![Atop EH9711 Series Скачать руководство пользователя страница 34](http://html1.mh-extra.com/html/atop/eh9711-series/eh9711-series_user-manual_3004814034.webp)
Industrial Managed
Ethernet Switch – EH9711
User Manual
Page
34
of
223
Field Label
Subfield
Label
Description
Factory Default
WTR
Set the wait-to-restore (WTR) time of the ring in seconds. Lower
value has lower protection time. Range of the WTR Timer is from
1
to 720 seconds.
300
HoldOff
Set the holdoff time of the ring. Range is from 0 to 10000 ms
0
Enable
The administrative state of this ERPS. Check to make it function normally
and uncheck to make it cease functioning.
Unclicked
VLAN ID
Indicate Identification number of VLAN (Virtual Local Area
Network).
VLANs which are protected by this ring instance. At least one
VLAN must be protected. Specify as a comma separated list of vlan numbers
or vlan ranges. Ex.: 1,4,7,30-70.
NULL
RPL Mode
There are three types of Ring Protection Link (RPL0 mode: None,
Owner, Neighbour where:
None is RPL common port.
This switch doesn't have the RPL
port in the ring
Owner is RPL owner port.
This switch is RPL owner for the
ring.
Neighbour is RPL neighbour port (only in ERPSv2).
This
switch is RPL neighbour for the ring
None
RPL Port
Indicates whether it is port0 or port1 that is the Ring Protection Link. Not
used if RPL Mode is
None
.
RingPort0
Click
Save
button to save changes. Click
Reset
button to undo any changes made locally and revert to previously saved
values. Click
Cancel
button to return to the previous page; any changes made locally will be undone.
2.4
DHCPv4
Atop’s EH9711 managed switch can act as a DHCPv4 (Dynamic Host Configuration Protocol over IP version 4) server in the
local network. By enabling this function in the managed switch, an IPv4 addresses and related fields will be automatically
assigned and delivered by the DHCPv4 server running inside the managed switch to other network devices connected to the
managed switch. Under this Configuration
DHCPv4 menu, there are two submenus, Snooping and Relay as shown in Figure
2.21. The following subsections will describe them in more details.
Figure 2.21 Submenus under the DHCP Main Configuration Menu
2.4.1
Snooping
A rogue DHCP (Dynamic Host Control Protocol) server may be set up by an attacker in the network to provide falsify
network configuration to a DHCP client such as wrong IP address, in-correct subnet mask, malicious gateway, and malicious
DNS server. The purpose of DHCP spoofing attack may be to redirect the traffic of the DHCP client to a malicious domain
and try to eavesdrop the traffic or simply try to prevent a successful network connection establishment. To protect against a
network security attack of rogue DHCP server or DHCP spoofing attack, Atop’s EH9711 provide DHCP Snooping feature.
When this feature is enabled on specific port(s) of EH9711 managed switch, the EH9711 will allow the DHCP messages
from trusted ports to pass through while it will discard or filter the DHCP messages from untrusted ports.