v
3-4-5. MAC Table .........................................................................................................................70
3-5.
GVRP.........................................................................................................................................71
3-5-1. Config ................................................................................................................................71
3-5-2. Counter ..............................................................................................................................74
3-5-3. Group .................................................................................................................................76
3-6.
Q
O
S(Q
UALITY OF
S
ERVICE
)
C
ONFIGURATION
.............................................................................77
3-6-1. Ports...................................................................................................................................77
3-6-2. Qos Control List.................................................................................................................79
3-6-3.Rate Limiters.......................................................................................................................85
3-6-4.Storm Control......................................................................................................................87
3-6-5.Wizard .................................................................................................................................88
3-7.
SNMP
C
ONFIGURATION
..............................................................................................................97
3-8.
ACL............................................................................................................................................99
3-8-1.Ports....................................................................................................................................99
3-8-2.Rate Limiters.....................................................................................................................101
3-8-3.Access Control List ...........................................................................................................102
3-8-4.Wizard ...............................................................................................................................130
3-9.
IP
MAC
B
INDING
.....................................................................................................................139
3-10.
802.1X
C
ONFIGURATION
.........................................................................................................141
3-10-1.Server..............................................................................................................................145
3-10-2.Port Configuration..........................................................................................................147
3-10-3.Status...............................................................................................................................150
3-10-4. Statistics .........................................................................................................................151
3-11.
T
RUNKING
C
ONFIGURATION
....................................................................................................152
3-11-1.Port .................................................................................................................................153
3-11-2 Aggregator View..............................................................................................................155
3-11-3 ACP System Priority........................................................................................................156
3-12
STP
C
ONFIGURATION
...............................................................................................................157
3-12-1. Status..............................................................................................................................157
3-12-2. Configuration.................................................................................................................159
3-12-3. STP Port Configuration .................................................................................................161
3-13
MSTP ......................................................................................................................................164
3-13-1 Status...............................................................................................................................164
3-13-2 Region Config .................................................................................................................165
3-13-3 Instance View ..................................................................................................................166
3-14.
M
IRROR
..................................................................................................................................174
3-15.
IGMP......................................................................................................................................175
3-15-1 Proxy...............................................................................................................................175
3-15-2 IGMP Group Membership ..............................................................................................177
3-16.
A
LARM
C
ONFIGURATION
........................................................................................................178
3-16-1 Events..............................................................................................................................179
3-16-2 Email...............................................................................................................................180
3-17.
DHCP
S
NOOPING
....................................................................................................................181
3-17-1. DHCP Snooping State....................................................................................................181
3-17-2. DHCP Snooping Entry...................................................................................................182
3-17-3. DHCP Snooping Client..................................................................................................183
3-18.
C
ONFIGURATION
.....................................................................................................................184
3-18-1. Factory Defaults ............................................................................................................185
3-18-2 . Save Start ......................................................................................................................185
3-18-3 . Save User ......................................................................................................................185
3-18-4 . Restore User .................................................................................................................186
3-19.
C
ONFIG
F
ILE
...........................................................................................................................187
3-20.
D
IAGNOSTICS
..........................................................................................................................188
3-20-1 . Diag ..............................................................................................................................188
3-20-2 .Ping................................................................................................................................189
Содержание GS-2224L
Страница 1: ......
Страница 2: ......
Страница 34: ...24 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection ...
Страница 78: ...68 Fig 3 28 ...
Страница 83: ...73 Fig 3 31 ...
Страница 91: ...81 Fig 3 39 Fig 3 40 Fig 3 41 ...
Страница 103: ...93 Fig 3 54 Set up Typical Network Application Rules Finish Fig 3 55 Set up Typical Network Application Rules Finish ...
Страница 113: ...103 Fig 3 67 Ingress Port Fig 3 68 ...
Страница 115: ...105 Fig 3 71 Fig 3 72 Fig 3 73 ARP Fig 3 74 ARP ...
Страница 116: ...106 Fig 3 75 ARP Fig 3 76 ARP Fig 3 77 ARP Fig 3 78 ARP ...
Страница 117: ...107 Fig 3 79 ARP Fig 3 80 ARP Fig 3 81 ARP Fig 3 82 ARP ...
Страница 118: ...108 Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 86 ARP Fig 3 87 ARP ...
Страница 119: ...109 Fig 3 88 IPv4 Fig 3 89 IPv4 Fig 3 90 IPv4 ...
Страница 120: ...110 Fig 3 91 IPv4 Fig 3 92 IPv4 Fig 3 93 IPv4 Fig 3 94 IPv4 Fig 3 95 IPv4 ...
Страница 121: ...111 Fig 3 96 IPv4 Fig 3 97 IPv4 Fig 3 98 IPv4 Fig 3 99 IPv4 Fig 3 100 IPv4 ...
Страница 122: ...112 Fig 3 101 IPv4 Fig 3 102 IPv4 Fig 3 103 IPv4 Fig 3 104 IPv4 ...
Страница 123: ...113 Fig 3 105 IPv4 Fig 3 106 IPv4 Fig 3 107 IPv4 ...
Страница 124: ...114 Fig 3 108 IPv4 Fig 3 109 IPv4 Fig 3 110 IPv4 Fig 3 111 IPv4 ...
Страница 125: ...115 Fig 3 112 IPv4 Fig 3 113 IPv4 Fig 3 114 IPv4 ...
Страница 126: ...116 Fig 3 115 IPv4 Fig 3 116 IPv4 Fig 3 117 IPv4 ...
Страница 127: ...117 Fig 3 118 Action Fig 3 119 Rate Limiter ...
Страница 128: ...118 Fig 3 120 Port Copy Fig 3 121 DMAC Filter ...
Страница 129: ...119 Fig 3 122 VLAN ID Filter Fig 3 123 VLAN ID Filter Fig 3 124 Tag Priority ...
Страница 141: ...131 Fig 3 126 Set up Policy Rules Fig 3 127 Set up Policy Rules Fig 3 128 Set up Policy Rules ...
Страница 142: ...132 Fig 3 129 Set up Policy Rules Finish Fig 3 130 Set up Port Policies Fig 3 131 Set up Port Policies ...
Страница 143: ...133 Fig 3 132 Set up Port Policies Fig 3 133 Set up Port Policies Finish ...
Страница 144: ...134 Fig 3 134 Set up Typical Network Application Rules Fig 3 135 Set up Typical Network Application Rules ...
Страница 150: ...140 Delete Select one of entry from the table then click on Delete to delete this entry Fig 3 143 ...
Страница 159: ...149 Fig 3 145 ...
Страница 204: ...194 Fig 4 1 Fig 4 2 ...