![CTC Union GSW-3208M1 Скачать руководство пользователя страница 16](http://html1.mh-extra.com/html/ctc-union/gsw-3208m1/gsw-3208m1_user-manual_2693574016.webp)
13
7. Dynamic Mac ID Number Limit
Beside Static Mac ID Limit, there is another Dynamic Mac ID Number Limit
function for Mac address security on port. This function can limit the Mac ID
number to access network through a port. For example, five Mac ID are
allowed for Port 2. That means up to five users are allowe
d, but don’t care
who the users are. It is done by “Limit Control” function in “Security -
Network” function.
8. IEEE 802.1x Port Security Function
If the 802.1x function is enabled, the switch will act as an authenticator for
users accessing network through the switch. It will need a RADIUS server
for the authentication function. Users will be asked for username and
password before network access. If the RADIUS server authenticates it, the
switch will enable the port for network access. This functio n is very useful
for network security application to prevent illegal users access network
through the switch.
9. Rate Control
This function can limit the traffic rate for physical ports. The traffic could be
ingress traffic or egress traffic. This functio n can limit the network
bandwidth utilization of users.
10. IP Multicast with IGMP Snooping
IP multicast function can forward packets to a group of users connected on
different ports. The user group is learned by the switch from packets of IGMP
active router with IGMP snooping function. It is often used for video
applications
11. MVR (Multicast VLAN Registration)
VLAN function will isolate traffic between VLAN groups. But it will also
isolate IP multicast traffic for subscribers in different VLANs. The MVR
function allows one multicast VLAN to be shared by subscribers in different
VLANs. That can reduce the multicast traffic for VLANs.
12. DHCP Relay & DHCP Option 82
DHCP Relay function will control DHCP requests and forward DHCP
requests to the assigned DHCP s erver. DHCP Option 82 function will add
port and switch information to DHCP requests and then send to the assigned
DHCP server. Based on those information, DHCP server will assign an IP
configuration in the DHCP reply. This is a security function.
13. DHCP Snooping
DHCP Snooping function will assign a trusted port for DHCP server
connection, and snoop the DHCP activity between clients and server. This
function can prevent illegal DHCP server connection.
Содержание GSW-3208M1
Страница 1: ...1 GSW 3208M1 3216M1 3424M1 L2 Managed GbE Switches ...
Страница 176: ...173 ...
Страница 185: ...182 ...
Страница 202: ...199 This page is used to show the details of log Entering the ID details of the log will be shown ...
Страница 213: ...210 This page provides an overview of RMON Event table entries ...
Страница 215: ...212 This page provides an overview for LACP statistics for all ports ...
Страница 227: ...224 6 4 29 Monitor sFlow This page shows receiver and per port sFlow statistics ...
Страница 240: ......