128
3-15. Security
Function name:
Mirror Configuration
Function description:
Mirror Configuration is to monitor the traffic of the network. For example, we
assume that Port A and Port B are Monitoring Port and Monitored Port
respectively, thus, the traffic received by Port B will be copied to Port A for
monitoring.
Parameter description:
Mode:
Used for the activation or de-activation of Port Mirror function. Default is
disable.
Monitoring Port:
Set up the port for monitoring. Valid port is Port 1~26 and default is
Port 1.
Monitored Ingress Port:
Set up the port for being monitored. It only monitor the packets received
by the port you set up. Just tick the check box
(
)
beside the port x and
valid port is Port 1~26.
Monitored Egress Port:
Set up the port for being monitored. It only monitors the packets
transmitted by the port you set up. Just tick the check box
(
)
beside
the port x and valid port is Port 1~26.
Fig. 3-51
Содержание KS-2262
Страница 1: ...24 Fast Ethernet 2 Gigabit L2 Managed Switch User s Manual KS 2262 Release 2 28 ...
Страница 5: ...3 ...
Страница 16: ...14 ...
Страница 34: ...32 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection ...
Страница 78: ...76 Fig 3 20 ...
Страница 152: ...150 Upload Log Upload log data through tftp Clear Log Clear log data ...
Страница 188: ...186 192 168 1 115 is alive ...