R
EVISED
2018-09-21
F
EATURES
AND
S
PECIFICATIONS
D
RAWING
N
O
. LP0991-G
O
VERVIEW
OF
A
DVANCED
F
EATURES
N-Tron
®
Series NT24K
®
Software Manual
1-9
1.2.15.3
DHCP
Client
The switch will automatically obtain an IP assignment from a DHCP server, or optionally Fallback to a
configured IP assignment if unable to get an IP assignment from a DHCP server. Communication between the
client and server can optionally go through a DHCP Relay Agent.
DHCP Client is enabled by default, with 192.168.1.201 as the factory fallback address.
1.2.16
Event
Logging
The switch can be configured to log certain system events as they occur. Event Logging is enabled by default for
critical events. Event log options are easily changed through a Web browser.
Even Logging includes:
The most recent log information is visible via the web interface and the complete log file may be exported for
external analysis.
1.2.17
Event
Log
Filter
The Event Log Filter enables the user to define which events are logged, based on severity level. Events that do
not meet the minimum severity level for that component are not logged.
1.2.18
Syslog
The Syslog protocol, as specified in RFC-3164 and RFC-5424, are supported. The Syslog allows users to
configure the switch so that certain system events (see Event Logging) are transmitted to a remote logging device,
known as a Syslog Collector. The Syslog is disabled by default but can be enabled/disabled through the Web
Browser interface.
1.2.19
Local
Security
The switch is configured for secure access by the SSH and HTTPS. The Telnet Server and Hypertext Transfer
Protocol (HTTP) may be enabled to provide backwards compatibility with less secure clients.
1.2.19.1
Secure
Shell
SSH, is a secure alternative to Telnet. A maximum of two concurrent SSH / Telnet connections are allowed.
The commands SFTP (SSH File Transfer Protocol or Secure File Transfer Protocol) and SCP (Secure Copy) are
not supported.
1.2.20
Port
Security
Port Security can be enabled on the MAC address level for additional security. The Port Security feature restricts
access to the switch by only accepting dynamically learned MAC addresses and manually entered MAC addresses
as authorized. Dynamically learned MAC addresses are those that the switch detects on any port while in
‘Learning’ mode. A manually entered MAC address must designate the ports that the address is authorized on. A
non-authorized MAC address will be discarded and will be listed in the intruder log.
Port security supports RSTP provided the MAC address(es) are manually authorized on the RSTP ports.
•
System startup and shutdown
•
Logon and logout from the Web or
Console
•
Ports becoming enabled or disabled
•
Port link up or link down changes
•
N-Ring status changes