manualshive.com logo in svg
background image

 

 

T1600G-28TS (TL-SG2424) 
T1600G-52TS (TL-SG2452) 
T1600G-28PS (TL-SG2424P) 
T1600G-52PS (TL-SG2452P) 

JetStream Gigabit Smart Switch 

REV1.1.2 
1910011399 

Содержание JetStream T1600G-28PS

Страница 1: ...T1600G 28TS TL SG2424 T1600G 52TS TL SG2452 T1600G 28PS TL SG2424P T1600G 52PS TL SG2452P JetStream Gigabit Smart Switch REV1 1 2 1910011399...

Страница 2: ...in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instruction manual may cause harmful interference...

Страница 3: ...nnect the product or the power adapter from the power source Don t disassemble the product or make repairs yourself You run the risk of electric shock and voiding the limited warranty If you need serv...

Страница 4: ...Chapter 4 System 15 4 1 System Info 15 4 1 1 System Summary 15 4 1 2 Device Description 16 4 1 3 System Time 17 4 1 4 Daylight Saving Time 18 4 1 5 System IPv6 19 4 2 User Management 28 4 2 1 User Ta...

Страница 5: ...Table 63 5 4 2 Static Address 64 5 4 3 Dynamic Address 65 5 4 4 Filtering Address 67 Chapter 6 VLAN 69 6 1 802 1Q VLAN 70 6 1 1 VLAN Config 71 6 1 2 Port Config 72 6 2 Application Example for 802 1Q V...

Страница 6: ...1 5 Querier Config 119 8 1 6 Profile Config 121 8 1 7 Profile Binding 122 8 1 8 Packet Statistics 124 8 2 MLD Snooping 125 8 2 1 Snooping Config 127 8 2 2 Port Config 128 8 2 3 VLAN Config 129 8 2 4...

Страница 7: ...t Config 162 10 3 4 OUI Config 164 Chapter 11 PoE 166 11 1 PoE Config 166 11 1 1 PoE Config 167 11 1 2 PoE Profile 168 11 2 Time Range 169 11 2 1 Time Range Summary 169 11 2 2 Time Range Create 170 11...

Страница 8: ...ping 191 13 2 1 Global Config 195 13 2 2 Port Config 196 13 3 ARP Inspection 197 13 3 1 ARP Detect 201 13 3 2 ARP Defend 202 13 3 3 ARP Statistics 203 13 4 DoS Defend 204 13 4 1 DoS Defend 206 13 5 80...

Страница 9: ...Config 243 15 4 2 Port Config 244 15 4 3 Local Info 246 15 4 4 Neighbor Info 247 Chapter 16Maintenance 248 16 1 System Monitor 248 16 1 1 CPU Monitor 248 16 1 2 Memory Monitor 249 16 2 Log 249 16 2 1...

Страница 10: ...ttings Installation Guide Resource CD for T1600 28TS T1600G 52TS T1600G 28PS T1600G 52PS including This User Guide CLI Reference Guide SNMP Mibs 802 1X Client Software and its User Guide Other Helpful...

Страница 11: ...ple throughout this Guide However differences with significance will be presented with figures or notes as to attract your attention Menu Name Submenu Name Tab page indicates the menu structure System...

Страница 12: ...oduces 802 1Q VLAN Configure port based VLAN Chapter 7 Spanning Tree This module is used to configure spanning tree function of the switch Here mainly introduces STP Config Configure and view the glob...

Страница 13: ...he network Here mainly introduces ACL Config ACL rules Policy Config Configure operation policies ACL Binding Bind the ACL to a port VLAN to take its effect on a specific port VLAN Policy Binding Bind...

Страница 14: ...tenance This module is used to assemble the commonly used system tools to manage the switch Here mainly introduces System Monitor Monitor the memory and CPU of the switch Log View configuration parame...

Страница 15: ...ng Equipment PSE All the Ethernet RJ45 ports on the switch support Power over Ethernet PoE function which can automatically detect and supply power with those powered devices PDs complying with IEEE 8...

Страница 16: ...panel of T1600G 52TS is shown as Figure 2 2 Figure 2 2 Front Panel of T1600G 52TS The following parts are located on the front panel of T1600G 52TS Reset Press this button for 5 seconds or above to r...

Страница 17: ...de Switch Button Press this button to switch the LED status indication between Speed and PoE Reset Press this button for 5 seconds or above to reset the software setting back to factory default settin...

Страница 18: ...On A 1000Mbps device is connected to the corresponding port Flashing Data is being transmitted or received Off A 10 100Mbps device or no device is connected to the corresponding port When the PoE LED...

Страница 19: ...on status When the PoE LED is on the port LED is indicating the power supply status By default the Speed LED is on Pressing the mode switch button the Speed LED will turn off and the PoE LED will ligh...

Страница 20: ...wer keeps 7W after this LED is on for 2 minutes Off The remaining PoE power 7W Speed or PoE port 1 48 Green On The port is supplying power normally Flashing The supply power exceeds the corresponding...

Страница 21: ...2 Grounding Terminal The switch already comes with Lightning Protection Mechanism You can also ground the switch through the PE Protecting Earth cable of AC cord or with Ground Cable Return to CONTENT...

Страница 22: ...1 Web browser Tips To log in to the switch the IP address of your PC should be set in the same subnet addresses of the switch The IP address is 192 168 0 x x is any number from 2 to 254 Subnet Mask is...

Страница 23: ...n Figure 3 3 Main Setup Menu Note Clicking Apply can only make the new configurations effective before the switch is rebooted If you want to keep the configurations effective even the switch is reboot...

Страница 24: ...stem information The port status diagram shows the working status of 48 10 100 1000Mbps RJ45 ports and 4 SFP ports of the switch Choose the menu System System Info System Summary to load the following...

Страница 25: ...displays the bandwidth utilization monitored every four seconds Monitoring the bandwidth utilization on each port facilitates you to monitor the network traffic and analyze the network abnormities Fi...

Страница 26: ...displayed while the switch is running On this page you can configure the system time and the settings here will be used for other time based functions You can manually set the system time get time fr...

Страница 27: ...om NTP server Synchronize with PC S Clock When this option is selected the administrator PC s clock is utilized Note 1 The system time will be restored to the default when the switch is restarted and...

Страница 28: ...ng mode and date mode cannot be configured 2 When the DST is enabled the default daylight saving time is of European in predefined mode 4 1 5 System IPv6 IPv6 Internet Protocol version 6 also called I...

Страница 29: ...ix FE80 64 to communicate with other hosts on the link 6 Enhanced neighbor discovery mechanism The IPv6 neighbor discovery protocol is a group of Internet control message protocol version 6 ICMPv6 mes...

Страница 30: ...packet that is sent to a unicast address is delivered to the interface identified by that address Multicast address An identifier for a set of interfaces typically belonging to different nodes simila...

Страница 31: ...ue Identifier OUI of the 48 bit link layer address the MAC address of the interface the fourth and fifth octets 16 bits are a fixed hexadecimal value of FFFE and the last three octets 24 bits are take...

Страница 32: ...ddresses to other links Note You can configure multiple IPv6 addresses per interface but only one link local address IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses ICMP messages and...

Страница 33: ...is reachable according to NS and NA messages Node A sends an NS message whose destination address is the IPv6 address of node B If node A receives an NA message from node B node A considers that node...

Страница 34: ...solicitation messages which have a value of 133 in the Type field of the ICMP packet header are sent by hosts at system startup or anytime needed so that the host can immediately autoconfigure withou...

Страница 35: ...Interface ID Enable Disable IPv6 function globally on the switch Choose the interface type and input the interface ID Interface types include VLAN routed port and port channel Link local Address Conf...

Страница 36: ...lobal address from the DHCPv6 Server Add a global address manually Address Format You can select the global address format according to your requirements EUI 64 Indicates that you only need to specify...

Страница 37: ...agement page with a certain access level so as to protect the settings of the switch from being randomly changed The User Management function can be implemented on User Table and User Config pages 4 2...

Страница 38: ...ect the desired entry to delete the corresponding user information It is multi optional The current user information can t be deleted User ID User Name Access Level Displays the current user ID user n...

Страница 39: ...kup image If this fails too you will enter into the bootutil menu of the switch Choose the menu System System Tools Boot Config to load the following page Figure 4 12 Boot Config The following entries...

Страница 40: ...h to import the configuration file Click the Browse button to select a backup file and click the Import button to restore the startup configuration file Note 1 It will take a few minutes to restore th...

Страница 41: ...tion Please wait without any operation 4 3 4 FirmwareUpgrade The switch system can be upgraded via the Web management page To upgrade the system is to get more functions and better performance Go to h...

Страница 42: ...3 5 System Reboot On this page you can reboot the switch and return to the login page Please save the current configuration before rebooting to avoid losing the configuration unsaved Choose the menu S...

Страница 43: ...d Guest refer to 4 2 User Management Choose the menu System Access Security Access Control to load the following page Figure 4 18 Access Control The following entries are displayed on this screen Acce...

Страница 44: ...nsfer Protocol you can manage the switch through a standard browser The standards development of HTTP was coordinated by the Internet Engineering Task Force and the World Wide Web Consortium On this p...

Страница 45: ...e transmission Adopting asymmetrical encryption technology SSL uses key pair to encrypt decrypt information A key pair refers to a public key contained in the certificate and its corresponding private...

Страница 46: ...The following entries are displayed on this screen Global Config HTTPS Select Enable Disable the HTTPS function on the switch SSL Version 3 Enable or Disable Secure Sockets Layer Version 3 0 By defaul...

Страница 47: ...Number Enter the maximum number of the users logging on to the Web management page as Guest Certificate Download Certificate File Select the desired certificate to download to the switch The certifica...

Страница 48: ...st to the server for login and then the two can communicate with each other after successful authentication This switch supports SSH server and you can log on to the switch via SSH connection using SS...

Страница 49: ...lease ensure the key length of the downloaded file is in the range of 512 to 3072 bits Download Click the Download button to download the desired key file to the switch Note 1 It will take a long time...

Страница 50: ...the login user name and password and then you can continue to configure the switch Application Example 2 for SSH Network Requirements 1 Log on to the switch via key authentication using SSH and the S...

Страница 51: ...ocedure 1 Select the key type and key length and generate SSH key Note 1 The key length is in the range of 512 to 3072 bits 2 During the key generation randomly moving the mouse quickly can accelerate...

Страница 52: ...ublic key and private key to the computer 3 On the Web management page of the switch download the public key file saved in the computer to the switch Note 1 The key type should accord with the type of...

Страница 53: ...r the public key and private key are downloaded please log on to the interface of PuTTY and enter the IP address for login 5 Click Browse to download the private key file to SSH client software and cl...

Страница 54: ...ly downloaded 4 4 5 TelnetConfig On this page you can Enable Disable Telnet function globally on the switch Choose the menu System Access Security Telnet Config to load the following page Figure 4 22...

Страница 55: ...be discarded Disabling the port which is vacant for a long time can reduce the power consumption effectively And you can enable the port when it is in need The parameters will affect the working mode...

Страница 56: ...n Jumbo is enabled the MTU size is 9216 bytes LAG Displays the LAG number which the port belongs to Note 1 The switch cannot be managed through the disabled port Please enable the port which is used t...

Страница 57: ...The following entries are displayed on this screen Destination Port Destination Port Input or select a physical port from the port panel as the mirroring port Source Port Select Select the desired po...

Страница 58: ...method that the attacker takes to obtain the network information illegally The attacker uses tools to generate the cheating MAC address and quickly occupy the MAC Address Table When the MAC Address T...

Страница 59: ...resses that have been learned on the port Learn Mode Select the Learn Mode for the port Dynamic When Dynamic mode is selected the learned MAC address will be deleted automatically after the aging time...

Страница 60: ...rk security by forbidding the port to forward packets to the ports that are not on its forward portlist Choose the menu Switching Port Port Isolation to load the following page Figure 5 5 Port Isolati...

Страница 61: ...ion Config 5 1 5 LoopbackDetection With loopback detection feature enabled the switch can detect loops using loopback detection packets When a loop is detected the switch will display an alert or furt...

Страница 62: ...nterval between 1 and 1000 seconds By default it s 30 seconds Automatic Recovery Time Time after which the blocked port would automatically recover to normal status It can be set as integral times of...

Страница 63: ...r ports in an aggregation group their basic configuration must be the same The basic configuration includes STP QoS VLAN port attributes MAC Address Learning mode and other associated settings More de...

Страница 64: ...DST MAC When this option is selected the Aggregate Arithmetic will apply to the destination MAC addresses of the packets SRC MAC DST MAC When this option is selected the Aggregate Arithmetic will app...

Страница 65: ...the LAG Click the Detail button for the detailed information of your selected LAG Figure 5 9 Detailed Information 5 2 2 Static LAG On this page you can manually configure the LAG Choose the menu Swit...

Страница 66: ...stem MAC port priority port number and operation key operation key is determined by the physical properties of the port upper layer protocol and admin key The device with higher priority will lead the...

Страница 67: ...D A lower system priority value indicates a higher system priority When exchanging information between systems the system with higher priority determines which link aggregation a link belongs to and t...

Страница 68: ...belongs to 5 3 Traffic Monitor The Traffic Monitor function monitoring the traffic of each port is implemented on the Traffic Summary and Traffic Statistics pages 5 3 1 Traffic Summary Traffic Summary...

Страница 69: ...f packets transmitted on the port Octets Rx Displays the number of octets received on the port The error octets are counted in Octets Tx Displays the number of octets transmitted on the port Statistic...

Страница 70: ...number of good jumbo packets received or transmitted on the port The error frames are not counted in Alignment Errors Displays the number of the received packets that have a bad Frame Check Sequence F...

Страница 71: ...ring feature allows the switch to filter the undesired packets and forbid its forwarding so as to improve the network security The types and the features of the MAC Address Table are listed as the fol...

Страница 72: ...l This option allows the address table to display all the address entries Static This option allows the address table to display the static address entries only Dynamic This option allows the address...

Страница 73: ...e static learning mode will be displayed in the Static Address Table Choose the menu Switching MACAddress Static Address to load the following page Figure 5 15 Static Address The following entries are...

Страница 74: ...the MAC address of a device has been added to the Static Address Table connecting the device to another port will cause its address not to be recognized dynamically by the switch Therefore please ensu...

Страница 75: ...dress of your desired entry VLAN ID Enter the VLAN ID number of your desired entry Port Enter the Port number of your desired entry Dynamic Address Table Select Select the entry to delete the dynamic...

Страница 76: ...llows the switch to filter the packets which includes this MAC address as the source address or destination address so as to guarantee the network security The filtering MAC address entries act on all...

Страница 77: ...icates no specified port Type Displays the type of the MAC address Aging Status Displays the aging status of the MAC address Note The MAC address in the Filtering Address Table cannot be added to the...

Страница 78: ...roadcast packets are limited in a VLAN Hosts in the same VLAN communicate with one another via Ethernet whereas hosts in different VLANs communicate with one another through the Internet devices such...

Страница 79: ...ing the ID of the VLAN to which this packet belongs It is in the range of 0 to 4 095 Generally 0 and 4 095 is not used so the field is in the range of 1 to 4 094 VLAN ID identifies the VLAN to which a...

Страница 80: ...table Port Type Receiving Packets Forwarding Packets Untagged Packets Tagged Packets Untagged Packets Tagged Packets Untagged When untagged packets are received the port will add the default VLAN tag...

Страница 81: ...ry Edit Click to modify the settings of VLAN Detail Click to get the information of VLAN Click Edit and the following content will be shown Figure 6 4 VLAN Info VLAN Info VLAN ID Displays the ID numbe...

Страница 82: ...configure the link aggregation groups Select Select the desired port for configuration It is multi optional Port Displays the port number PVID Enter the PVID number of the port LAG Displays the LAG t...

Страница 83: ...VLAN Enter the VLAN ID and the name for the VLAN Meanwhile specify its member ports and the link type of the ports 3 Modify View VLAN Optional On the VLAN 802 1Q VLAN VLAN Config page click the Edit D...

Страница 84: ...ed On VLAN 802 1Q VLAN VLAN Config page create a VLAN with its VLAN ID as 20 owning Port 6 and Port 7 Configure the link type of Port 6 and Port 7 as Tagged and Untagged respectively 6 3 MAC VLAN MAC...

Страница 85: ...nd View MAC VLAN The following entries are displayed on this screen Create MAC VLAN MAC Address Enter the MAC address Description Give a description to the MAC address for identification VLAN ID Enter...

Страница 86: ...set its connected port of switch to be a member of this VLAN so as to ensure the normal communication 3 Select your desired ports for MAC VLAN feature Required On the VLAN MAC VLAN Port Enable page s...

Страница 87: ...e create MAC VLAN10 with the MAC address as 00 19 56 8A 4C 71 4 Configure MAC VLAN 20 On VLAN MAC VLAN MAC VLAN page create MAC VLAN20 with the MAC address as 00 19 56 82 3B 70 5 Port Enable Required...

Страница 88: ...Protocol VLANs the broadcast domain can span over multiple switches and the Host can change its physical position in the network with its VLAN member role always effective By creating Protocol VLANs...

Страница 89: ...w the information of the current defined Protocol VLANs Choose the menu VLAN Protocol VLAN Protocol Group Table to load the following page Figure 6 9 Create Protocol VLAN The following entries are dis...

Страница 90: ...o Protocol Group Member UNIT 1 LAGS Click 1 to configure the physical ports Click LAGS to configure the link aggregation groups 6 5 3 ProtocolTemplate The Protocol Template should be created before co...

Страница 91: ...r the SSAP field when selected LLC Protocol Template Table Select Select the desired entry It is multi optional ID Displays the Protocol Template ID Protocol Name Displays the Protocol Name Protocol T...

Страница 92: ...ol VLAN Protocol Group Table page click the Edit button to modify view the information of the corresponding VLAN 5 Delete VLAN Optional On the VLAN Protocol VLAN Protocol Group Table page select the d...

Страница 93: ...egress rule of Port 3 as Untagged and Port 4 as Tagged 2 Create VLAN20 Required On VLAN 802 1Q VLAN VLAN Config page create a VLAN with its VLAN ID as 20 owning Port 3 and Port 5 and configure the egr...

Страница 94: ...gh the designated bridge The switch with the lowest bridge ID will be chosen as the designated bridge Root Path Cost Indicates the sum of the path cost of the root port and the path cost of all the sw...

Страница 95: ...hat is the new root port and the designated port begins to forward data after twice forward delay which ensures the new configuration BPDUs are spread in the whole network BPDU Comparing Principle in...

Страница 96: ...path cost the switch generates a designated port BPDU for each of its ports Root ID is replaced with that of the root port Root path is replaced with the sum of the root path cost of the root port and...

Страница 97: ...bles packets of different VLANs to be forwarded along their respective paths so as to provide redundant links with a better load balancing mechanism Features of MSTP MSTP combines VLANs and spanning t...

Страница 98: ...receive send BPDU packets and learn MAC address Blocking In this status the port can only receive BPDU packets Disconnected In this status the port is not participating in the STP Port Roles In an MST...

Страница 99: ...figuration of spanning trees on the switch can be implemented on STP Config and STP Summary pages 7 1 1 STP Config Before configuring spanning trees you should make clear the roles each switch plays i...

Страница 100: ...t value is 5pps Max Hops Enter a value from 1 to 40 to set the maximum number of hops that occur in a specific region before the BPDU is discarded The default value is 20 hops Note 1 The forward delay...

Страница 101: ...92 7 1 2 STP Summary On this page you can view the related parameters for Spanning Tree function Choose the menu Spanning Tree STP Config STP Summary to load the following page Figure 7 5 STP Summary...

Страница 102: ...t The lower value has the higher priority ExtPath Cost ExtPath Cost is used to choose the path and calculate the path costs of ports in different MST regions It is an important criterion on determinin...

Страница 103: ...receive BPDU packets Disconnected In this status the port is not participating in the STP LAG Displays the LAG number which the port belongs to Note 1 Configure the ports connected directly to termin...

Страница 104: ...ion identification using up to 32 characters Revision Enter the revision from 0 to 65535 for MST region identification 7 3 2 Instance Config Instance Configuration a property of MST region is used to...

Страница 105: ...riority of the switch in the instance It is an important criterion on determining if the switch will be chosen as the root bridge in the specific instance VLAN ID Enter the VLAN ID which belongs to th...

Страница 106: ...LAGS to configure the link aggregation groups Select Select the desired port to specify its priority and path cost It is multi optional Port Displays the port number of the switch Priority Enter the p...

Страница 107: ...rts on Spanning Tree MSTP Instance Instance Port Config page 7 4 STP Security Configuring protection function for devices can prevent devices from any malicious attack against STP features The STP Sec...

Страница 108: ...tries you can enable the TC protect function on the switch With TC protect function enabled if the account number of the received TC BPDUs exceeds the maximum number you set in the TC threshold field...

Страница 109: ...he loops in the network brought by recalculating STP because of link failures and network congestions Root Protect Root Protect is to prevent wrong network topology change caused by the role change of...

Страница 110: ...ct Cycle The default value is 20 TC Protect Cycle Enter a value from 1 to 10 to specify the TC Protect Cycle The default value is 5 7 5 Application Example for STP Function Network Requirements Switch...

Страница 111: ...stance Region Config page configure the region as TP LINK and keep the default revision setting 4 Configure VLAN to Instance mapping table of the MST region On Spanning Tree MSTP Instance Instance Con...

Страница 112: ...figure the link type of the related ports as Tagged and add the ports to VLAN101 VLAN106 The detailed instructions can be found in the section 802 1Q VLAN 2 Enable STP function On Spanning Tree STP Co...

Страница 113: ...ance Region Config page configure the region as TP LINK and keep the default revision setting 4 Configure VLAN to Instance mapping table of the MST region On Spanning Tree MSTP Instance Instance Confi...

Страница 114: ...the ports of switches Enable Root Protect function for all the ports of root bridges Enable Loop Protect function for the non edge ports Enable BPDU Protect function or BPDU Filter function for the ed...

Страница 115: ...is suitable for networks with sparsely users whereas broadcast is suitable for networks with densely distributed users When the number of users requiring this information is not certain unicast and b...

Страница 116: ...et network the destination MAC address is the MAC address of the receiver When a multicast packet is transmitted in an Ethernet network the destination is not a receiver but a group with uncertain num...

Страница 117: ...to 0 to indicate this IPv6 multicast address is not based on a unicast prefix set to 1 to indicate this IPv6 multicast address is based on a unicast prefix When this bit is set to 1 the T bit must al...

Страница 118: ...yer addresses of neighboring nodes within the local link or applied in IPv6 Duplicate Address Detection A node is required to join the associated Solicited Node multicast addresses for all unicast and...

Страница 119: ...or dynamic registration of the multicast group The switch running IGMP snooping manages and controls the multicast group via listening to and processing the IGMP messages transmitted between the hosts...

Страница 120: ...he message to get the address of the multicast group the host applies for joining The receiving port will be processed if the receiving port is a new member port it will be added to the multicast addr...

Страница 121: ...he IGMP snooping function can be implemented on the following pages Snooping Config Port Config VLAN Config Multicast VLAN Querier Config Profile Config Profile Binding and Packet Statistics 8 1 1 Sno...

Страница 122: ...Time Specify the aging time of the router port Within this time if the switch does not receive IGMP query message from the router port it will consider this port is not a router port any more Member P...

Страница 123: ...sical ports Click LAGS to configure the link aggregation groups Select Select the desired port for IGMP snooping feature configuration It is multi optional Port Displays the port of the switch IGMP Sn...

Страница 124: ...are displayed on this screen VLAN Config VLAN ID Enter the VLAN ID to enable IGMP snooping for the desired VLAN Router Port Time Specify the aging time of the router port Within this time if the swit...

Страница 125: ...enabled in the VLAN thus the multicast data in the VLAN will be broadcasted 8 1 4 MulticastVLAN In old multicast transmission mode when users in different VLANs apply for join the same multicast group...

Страница 126: ...n this time if the switch doesn t receive IGMP report message from the member port it will consider this port is not a member port any more Dynamic Router Ports Displays the dynamic router ports of th...

Страница 127: ...Look over the configuration If it is successfully configured the VLAN ID of the multicast VLAN will be displayed in the IGMP Snooping Status table on the Multicast IGMP Snooping Snooping Config page...

Страница 128: ...Multicast IGMP Snooping Snooping Config page Enable IGMP snooping function for port 3 port 4 and port 5 on Multicast IGMP Snooping Port Config page 4 Enable Multicast VLAN Enable Multicast VLAN config...

Страница 129: ...aximal time for the host to respond to a general query frame sent by IGMP Snooping Querier General Query Source IP Enter the source IP of the general query frame sent by IGMP Snooping Querier It shoul...

Страница 130: ...P address within the IP range and deny others Deny Only deny the IP address within the IP range and permit others Search Option Search Option Select the rules for displaying profile entries All Displa...

Страница 131: ...the IP range End IP Enter end IP address of the IP range IP range Table Select Select the desired entry for configuration Index Displays index of the IP range which is not configurable Start IP Displa...

Страница 132: ...mber Profile ID The existing Profile ID bound to the selected port Max Group The maximum multicast group a port can join Overflow Action The policy should be taken when the number of multicast group a...

Страница 133: ...ile Info table on Multicast IGMP Snooping Profile Config page to configure the mode or IP range of the Profile 3 Configure Profile Binding for ports Optional Configure Profile Binding for ports on Mul...

Страница 134: ...ction in IPv6 as IGMP snooping in IPv4 The switch running MLD snooping listens to the MLD messages transmitted between the host and the router and tracks the MLD messages and the registered port When...

Страница 135: ...the VLAN and analyze the message to get the address of the multicast group the host applies for joining If the multicast group does not exist it will create the group entry The receiving port will be...

Страница 136: ...esponding forwarding entries in the IPv6 multicast table When unknown multicast filter is enabled the switch will discard all received unknown IPv6 multicast packets When unknown multicast filer is di...

Страница 137: ...onse MLD Snooping Status Description Displays MLD snooping status Member Displays the member of the corresponding status Note Configurations of the Router Port Time and Member Port Time in 8 2 3 VLAN...

Страница 138: ...LD snooping function in this VLAN Choose the menu Multicast MLD Snooping VLAN Config to load the following page Figure 8 15 VLAN Config The following entries are displayed on this screen VLAN Config V...

Страница 139: ...multicast transmission mode when users in different VLANs apply for join the same multicast group the multicast router will duplicate this multicast information and deliver each VLAN owning a receiver...

Страница 140: ...ithin this time if the switch doesn t receive MLD report message from the member port it will consider this port is not a member port any more Dynamic Router Ports Displays the dynamic router ports of...

Страница 141: ...function and specify the Multicast VLAN ID as the VLAN specified in Step 1 8 2 5 Querier Config In an IPv6 multicast network that runs MLD a Layer 3 multicast device works as an MLD querier to send o...

Страница 142: ...plays the Query message source IP address Note The MLD Snooping Querier doesn t participate in the MLD Querier Election but an MLD Snooping Querier will affect the MLD Querier Election in the IPv6 net...

Страница 143: ...tries you want to config Profile ID Displays the profile ID Mode Displays the attribute of the profile Permit Only permit the IP address within the IP range and deny others Deny Only deny the IP addre...

Страница 144: ...ys index of the IP range which is not configurable Start IP Displays the start IP address of the IP range End IP Displays the end IP address of the IP range 8 2 7 Profile Binding When the switch recei...

Страница 145: ...rofile ID The existing Profile ID bound to the selected port Max Group The maximum multicast group a port can join range from 0 to 1000 Overflow Action The policy should be taken when the number of mu...

Страница 146: ...ry in the MLD Profile Info table on Multicast MLD Snooping Profile Config page to configure the mode or IP range of the Profile 3 Configure Profile Binding for ports Optional Configure Profile Binding...

Страница 147: ...splays the number of error packets the port received 8 3 Multicast Table In a network receivers can join different multicast groups appropriate to their needs The switch forwards multicast streams bas...

Страница 148: ...Port Enter the port number the desired entry must carry Multicast IP Table Multicast IP Displays multicast IP address VLAN ID Displays the VLAN ID of the multicast group Forward Port Displays the forw...

Страница 149: ...ic Multicast Table Select Select the static multicast group entries you want to configure Multicast IP Displays multicast IP address VLAN ID Displays the VLAN ID of the multicast group Forward Port Di...

Страница 150: ...icast Table Static IPv6 Multicast Table to load the following page Figure 8 24 IPv6 Multicast Table The following entries are displayed on this screen Create Static Multicast Multicast IP Enter the mu...

Страница 151: ...static multicast group entries you want to configure Multicast IP Displays multicast IP address VLAN ID Displays the VLAN ID of the multicast group Forward Port Displays the forward port of the multic...

Страница 152: ...Routing and ARP 9 1 Interface Interface is a virtual interface in Layer 3 mode and mainly used for realizing the Layer 3 connectivity between VLANs or routed ports Each VLAN interface is corresponding...

Страница 153: ...s allocation mode None without ip Static setup manually DHCP allocated through DHCP BOOTP allocated through BOOTP IP Address Displays the IP address of the interface Subnet Mask Displays the subnet ma...

Страница 154: ...dify the subnet mask of the interface Admin Status View and modify the Admin status Choose Disable to disable the interface s Layer 3 capabilities Interface Name View and modify the interface name Sec...

Страница 155: ...connected to the interface Admin Status Displays the Admin status Choose Disable to disable the interface s Layer 3 capabilities Interface Name Displays the name of the interface Interface Setting De...

Страница 156: ...f the egress interface Destination Specify the destination IP address of the packets Subnet Mask Specify the subnet mask of the destination IP address Next Hop Enter the IP address to which the packet...

Страница 157: ...ies are displayed on this screen ARP Table Interface Displays the network interface of ARP entry IP Address Enter the DHCP server IP address MAC Address Displays the MAC address of ARP entry Type Disp...

Страница 158: ...the ingress packets to different priority queues based on the priority modes This switch implements three priority modes based on port on 802 1P and on DSCP Queue scheduling algorithm When the network...

Страница 159: ...t page you can configure different DS field mapping to the corresponding priority levels Non IP datagram with 802 1Q tag are mapped to different priority levels based on 802 1P priority mode the untag...

Страница 160: ...ull use of The default weight value ratio of TC0 TC1 TC2 TC3 TC4 TC5 TC6 and TC7 is 1 2 4 8 16 32 64 127 Figure 10 5 WRR Mode 3 SP WRR Mode Strict Priority Weight Round Robin Mode In this mode the swi...

Страница 161: ...s packets maps the packets to different priority queues and then forwards the packets according to specified scheduling algorithms to implement QoS function This switch implements three priority modes...

Страница 162: ...re the mapping relation between the 802 1P priority and TC Required On QoS DiffServ 802 1P Priority page configure the mapping relation between the 802 1P priority and TC 3 Select a schedule mode Requ...

Страница 163: ...ght value set as 0 are in the SP group other queues with none zero weight value belong to the WRR group and the weight value can be customized The default weight values of TC0 TC6 are 1 2 4 8 16 32 64...

Страница 164: ...ished on this page Configuration Procedure Step Operation Description 1 Configure the mapping relation between the 802 1P priority Tag CoS and the TC Required On QoS DiffServ 802 1P Priority page conf...

Страница 165: ...Level Indicates the 802 1P priority the packets with tag are mapped to The priorities are labeled as CoS0 CoS7 Configuration Procedure Step Operation Description 1 Configure the mapping relation betw...

Страница 166: ...Storm Control to load the following page Figure 10 11 Storm Control The following entries are displayed on this screen Storm Control Config UNIT 1 LAGS Click 1 to configure the physical ports Click L...

Страница 167: ...By configuring Voice VLANs and adding the ports with voice devices attached to voice VLANs you can perform QoS related configuration for voice data ensuring the transmission priority of voice data st...

Страница 168: ...rt from voice VLAN Voice ports are automatically added into or removed from voice VLAN Manual Mode You need to manually add the port of IP phone to voice VLAN and then the switch will assign ACL rules...

Страница 169: ...ependent of voice VLAN security mode Disable UNTAG packet Do not check the source MAC address of the packet and all the packets can be transmitted in the voice VLAN Packet with voice VLAN TAG Packet w...

Страница 170: ...he real Ingress rate Egress Rate 1 1000000Kbps Configure the bandwidth for sending packets on the port You can select a rate from the dropdown list or manually set Egress rate the system will automati...

Страница 171: ...10 12 Global Configuration The following entries are displayed on this screen Global Config Voice VLAN Select Enable Disable Voice VLAN function VLAN ID Enter the VLAN ID of the voice VLAN Aging Time...

Страница 172: ...ports Click LAGS to configure the link aggregation groups Select Select the desired port for voice VLAN configuration It is multi optional Port Displays the port number of the switch Port Mode Select...

Страница 173: ...access port will be automatically added to the Voice VLAN Choose the menu QoS Voice VLAN OUI Config to load the following page Figure 10 14 OUI Configuration The following entries are displayed on th...

Страница 174: ...age you can check whether the switch is supporting the OUI template or not If not please add the OUI address 3 Configure the parameters of the ports in voice VLAN Required On QoS Voice VLAN Port Confi...

Страница 175: ...h the provided power adapter It is very convenient to provide a backup power supply for the PDs Flexibility In compliance with IEEE 802 3af and IEEE 802 3at global organizations can deploy PoE everywh...

Страница 176: ...em Power Limit Specify the max power the PoE switch can supply It ranges from 1W to 215W for T1600G 28PS and from 1W to 384W for T1600G 52PS System Power Consumption Displays the PoE switch s real tim...

Страница 177: ...to the selected port If a PoE Profile is selected the three attributes including PoE Status PoE Priority and Power Limit are not available Power W Displays the port s real time power supply Current m...

Страница 178: ...ined Absolute Time range defines one or several time ranges with specific starting time and ending time in the Gregorian calendar Seven time ranges can be created at most and their union is the Absolu...

Страница 179: ...me of the time range Mode Displays the mode of the time range The mode can be one or a combination of the following modes Include Exclude Holiday Absolute and Periodic Refer to Time Range Create and H...

Страница 180: ...range defines up to 7 time ranges with specific starting time and ending time in the Gregorian calendar It does not recur From Time Set the start time of the absolute time range To Time Set the end ti...

Страница 181: ...5 Holiday Configuration The following entries are displayed on this screen Create Holiday Holiday Name Enter the name of the holiday Start Date Specify the start date of the holiday End Date Specify...

Страница 182: ...mmary ACL Create MAC ACL Standard IPACL and Extend IPACL pages 12 1 1 ACL Summary On this page you can view the current ACLs configured in the switch Choose the menu ACL ACL Config ACL Summary to load...

Страница 183: ...ose the menu ACL ACL Config MACACL to load the following page Figure 12 3 Create MAC Rule The following entries are displayed on this screen Create MAC Rule ACL ID Select the desired MAC ACL for confi...

Страница 184: ...ndard IP Rule The following entries are displayed on this screen Create Standard IPACL ACL ID Select the desired Standard IP ACL for configuration Rule ID Enter the rule ID Operation Select the operat...

Страница 185: ...nfiguration Rule ID Enter the rule ID Operation Select the operation for the switch to process packets which match the rules Permit Forward packets Deny Discard Packets S IP Enter the source IP addres...

Страница 186: ...y Summary to load the following page Figure 12 6 Policy Summary The following entries are displayed on this screen Search Option Select Policy Select name of the desired policy for view If you want to...

Страница 187: ...on this screen Create Action Select Policy Select the name of the policy Select ACL Select the ACL for configuration in the policy 12 3 ACL Binding ACL Binding function can have the ACL take its effec...

Страница 188: ...desired entry to delete the corresponding binding ACL Index Displays the index of the binding ACL ACL ID Displays the ID of the binding ACL Interface Displays the port number or VLAN ID bound to the...

Страница 189: ...The following entries are displayed on this screen Port Bind Config ACL ID Select the ID of the ACL you want to bind Port Select the number of the port you want to bind Port Bind Table Index Displays...

Страница 190: ...ding direction Configuration Procedure Step Operation Description 1 Configure ACL rules Required On ACL ACL Config configuration pages configure ACL rules to match packets 2 Bind the ACL to the port V...

Страница 191: ...o delete the corresponding binding policy Index Displays the index of the binding policy Policy Name Displays the name of the binding policy Interface Displays the port number or VLAN ID bound to the...

Страница 192: ...g entries are displayed on this screen Port Bind Config Policy Name Select the name of the policy you want to bind Port Select the number of the port you want to bind Port Bind Table Index Displays th...

Страница 193: ...ation Procedure Step Operation Description 1 Configure ACL rules Required On ACL ACL Config configuration pages configure ACL rules to match packets 2 Configure Policy Required On ACL Policy Config co...

Страница 194: ...gure for requirement 1 On ACL ACL Config ACL Create page create ACL 11 On ACL ACL Config MAC ACL page select ACL 11 create Rule 1 configure the operation as Permit configure the S MAC as 00 64 A5 5D 1...

Страница 195: ...Policy Config Policy Create page create a policy named limit1 On ACL Policy Config Action Create page add ACL 500 to Policy limit1 On ACL Policy Binding Port Binding page select Policy limit1 to bind...

Страница 196: ...ddress VLAN ID and the connected port number of the Hosts in the LAN via the ARP Scanning function and bind them conveniently You are only requested to enter the IP address and VLAN ID on the ARP Scan...

Страница 197: ...t MAC Address Displays the MAC Address of the Host VLAN ID Displays the VLAN ID here Port Displays the number of port connected to the Host Protect Type Allows you to view and modify the Protect Type...

Страница 198: ...ect Type for the entry Port Select the number of port connected to the Host Manual Binding Table Select Select the desired entry to be deleted It is multi optional Host Name Displays the Host Name her...

Страница 199: ...re 1 Suppose there are two hosts in the LAN Host A and Host B To send a packet to Host B Host A checks its own ARP Table first to see if the ARP entry related to the IP address of Host B exists If yes...

Страница 200: ...re IP Address Displays the IP Address of the Host MAC Address Displays the MAC Address of the Host VLAN ID Displays the VLAN ID here Port Displays the number of port connected to the Host Protect Type...

Страница 201: ...reach a dynamic employ of the network source A Server can assign the IP address for several Clients which is illustrated in the following figure Figure 13 6 Network diagram for DHCP snooping implement...

Страница 202: ...igning this IP address to the Client it will send the DHCP ACK packet back to the Client Otherwise the Server will send the DHCP NAK packet to refuse assigning this IP address to the Client Option 82...

Страница 203: ...e 2 Hacker exhausted the IP addresses of the normal DHCP server and then pretended to be a legal DHCP server to assign the IP addresses and the other parameters to Clients For example hacker used the...

Страница 204: ...unction in the specified VLAN VLAN Configuration Display Display the VLAN ID of which the DHCP Snooping function is enabled Option 82 Config Option 82 Support Enable Disable the Option 82 feature Exis...

Страница 205: ...the DHCP packets from DHCP servers MAC Verify Select Enable Disable the MAC Verify feature There are two fields of the DHCP packet containing the MAC address of the Host The MAC Verify feature is to...

Страница 206: ...ack frequently occur to the network especially to the large network such as campus network and so on The following part will simply introduce these ARP attacks Imitating Gateway The attacker sends the...

Страница 207: ...nd then the Gateway will automatically update its ARP table after receiving the ARP packets When the Gateway tries to communicate with Host A in LAN it will encapsulate this false destination MAC addr...

Страница 208: ...n The Middle Attack The attacker continuously sends the false ARP packets to the Hosts in LAN so as to make the Hosts maintain the wrong ARP table When the Hosts in LAN communicate with one another th...

Страница 209: ...ion MAC address which makes Host A and Host B keep a normal appearing communication 5 The attacker continuously sends the false ARP packets to the Host A and Host B so as to make the Hosts always main...

Страница 210: ...n the IP MAC Binding Table and filter the illegal ARP packets so as to prevent the network from ARP attacks such as the Network Gateway Spoofing and Man In The Middle Attack etc Choose the menu Networ...

Страница 211: ...entry 3 Specify the trusted port Required On the Network Security ARP Inspection ARP Detect page specify the trusted port The specific ports such as up linked port routing port and LAG port should be...

Страница 212: ...the current speed of the received ARP packets Status Displays the status of the ARP attack LAG Displays the LAG to which the port belongs to Operation Click the Recover button to restore the port to t...

Страница 213: ...Port Indicates the port is an ARP Trusted Port or not Illegal ARP Packet Displays the number of the received illegalARP packets 13 4 DoS Defend DoS Denial of Service Attack is to occupy the network ba...

Страница 214: ...t to 0 are considered as the illegal packets SYN packet with its source port less than 1024 The attacker sends the illegal packet with its TCP SYN field set to 1 and source port less than 1024 Blat At...

Страница 215: ...e security issues of wireless LANs It was then used in Ethernet as a common access control mechanism for LAN ports to solve mainly authentication and security problems 802 1X is a port based network a...

Страница 216: ...the authentication server 1 EAP protocol packets transmitted between the supplicant system and the authenticator system are encapsulated as EAPOL packets 2 EAP protocol packets transmitted between th...

Страница 217: ...ient program responds by sending an EAP Response Identity packet to the switch with the user name included The switch then encapsulates the packet in a RADIUS Access Request packet and forwards it to...

Страница 218: ...20 PAP Authentication Procedure In PAP mode the switch encrypts the password and sends the user name the randomly generated key and the supplicant system encrypted password to the RADIUS server for f...

Страница 219: ...t VLAN to install 802 1X client program or upgrade their 802 1x clients without being authenticated If there is no supplicant past the authentication on the port in a certain time the switch will add...

Страница 220: ...uthentication server PAP IEEE 802 1X authentication system uses extensible authentication protocol EAP to exchange information between the switch and the client The transmission of EAP packets is term...

Страница 221: ...efore resending a request to the supplicant Server Timeout Specify the maximum time for the switch to wait for the response from authentication server before resending a request to the authentication...

Страница 222: ...n for access Port Based All the clients connected to the port can access the network on the condition that any one of the clients has passed the 802 1X Authentication Authorized Displays the authentic...

Страница 223: ...ion cannot be enabled for LAG member ports That is the port with 802 1X function enabled cannot be added to the LAG 3 The 802 1X function should not be enabled for the port connected to the authentica...

Страница 224: ...tion Description 5 Configure the 802 1X for the port Required On the Network Security 802 1X Port Config page configure the 802 1X feature for the port of the switch basing on the actual network Retur...

Страница 225: ...t Agent is the server software operated on network devices with the responsibility of receiving and processing the request packets from SNMP Management Station In the meanwhile Agent will inform the S...

Страница 226: ...identify the management objects of the device in SNMP messages SNMP adopts the hierarchical architecture to identify the managed objects It is like a tree and each tree node represents a managed obje...

Страница 227: ...mmunity pages 14 1 1 GlobalConfig To enable SNMP function please configure the SNMP function globally on this page Choose the menu SNMP SNMP Config Global Config to load the following page Figure 13 3...

Страница 228: ...ies are displayed on this screen View Config View Name Give a name to the View for identification Each View can include several entries with the same name MIB Object ID Enter the Object Identifier OID...

Страница 229: ...ct the Security Model for the SNMP Group v1 SNMPv1 is defined for the group In this model the Community Name is used for authentication SNMP v1 can be configured on the SNMP Community page directly v2...

Страница 230: ...entry to delete the corresponding group It is multi optional Group Name Displays the Group Name here Security Model Displays the Security Model of the group Security Level Displays the Security Level...

Страница 231: ...to its Group Name Security Model and Security Level Security Model Select the Security Model for the User Security Level Select the Security Level for the SNMP v3 User Auth Mode Select the Authenticat...

Страница 232: ...oup of the User and click the Modify button to apply Note The SNMP User and its Group should have the same Security Model and Security Level 14 1 5 SNMP Community SNMP v1 and SNMP v2c adopt community...

Страница 233: ...View and the Access right of the Community and then click the Modify button to apply Note The default MIB View of SNMP Community is viewDefault Configuration Procedure If SNMPv3 is employed please ta...

Страница 234: ...ng as a community name The users can manage the device via the Read View Write View and Notify View defined in the SNMP Group Create SNMP Group and SNMP User 14 2 Notification With the Notification fu...

Страница 235: ...d the inform request if it doesn t get the response from the management station during the Timeout interval and it will terminate resending the inform request if the resending times reach the specifie...

Страница 236: ...any network malfunction In addition RMON MIB records network statistics information of network performance and malfunction periodically based on which the management station can monitor network at any...

Страница 237: ...from 1 to 65535 Port Enter or choose the Ethernet interface from which to collect the statistics Owner Enter the owner name Status Choose the status of statistics entry valid The entry exists and is v...

Страница 238: ...on Index Displays the index number of the entry Port Specify the port from which the history samples were taken Interval Specify the interval to take samplings from the port Max Buckets Displays the m...

Страница 239: ...e of the User or the community to which the event belongs Description Give a description to the event for identification Type Select the event type which determines the act way of the network device i...

Страница 240: ...or the selected variable and comparing the value against the thresholds Absolute Compares the values directly with the thresholds at the end of the sampling interval Delta Subtracts the last sampled v...

Страница 241: ...event is triggered Interval Enter the alarm interval time in seconds Owner Enter the name of the device or user that defined the entry Status Select Enable Disable the corresponding alarm entry Note...

Страница 242: ...ork devices of different vendors This protocol allows two systems running different network layer protocols to learn about each other LLDP MED Link Layer Discovery Protocol for Media Endpoint Devices...

Страница 243: ...interval turns to be 1 second several LLDPDUs will be sent out and then the transmit interval comes back to the regular interval 3 LLDPDU receipt mechanism When a port is working in TxRx or Rx mode t...

Страница 244: ...the functions enabled Optional 8 Management Address Identifies the management IP address the corresponding interface number and OID Object Identifier The management IP address is specified by the user...

Страница 245: ...allows a VLAN bridge port to advertise the port s VLAN identifier PVID that will be associated with untagged or priority tagged frames Port And Protocol VLAN ID TLV The Port And Protocol VLAN ID TLV...

Страница 246: ...al device to transmit LLDPDU to its neighbors The default value is 30 seconds Hold Multiplier Enter a multiplier on the Transmit Interval It determines the actual TTL Time To Live value used in an LLD...

Страница 247: ...lue is 3 15 1 2 Port Config On this page you can configure all ports LLDP parameters Choose the menu LLDP Basic Config Port Config to load the following page Figure 15 2 LLDP Port Config The following...

Страница 248: ...the Local Info and Neighbor Info pages respectively 15 2 1 LocalInfo On this page you can see all ports configuration and system information Choose the menu LLDP Device Info Local Info to load the fo...

Страница 249: ...nformation associated with this chassis ID and port ID identifier to be valid Port Description Display local port s description System Name Indicate local device s administratively assigned name Syste...

Страница 250: ...iption Displays the system description of the neighbor device Neighbor Port Displays the port number of the neighbor linking to local port Information Click Information to display the detailed informa...

Страница 251: ...intended for managing endpoint devices such as Voice over IP phones and network switches The LLDP MED TLVs advertise information such as network policy power via MDI inventory management and device lo...

Страница 252: ...ctivity Devices and it allows advertisement of fine grained power requirement details Endpoint power priority as well as both Endpoint and Network Connectivity Device power status Inventory TLV The In...

Страница 253: ...menu LLDP LLDP MED Port Config to load the following page Figure 15 7 LLDP MED Port Configuration The following entries are displayed on this screen LLDP MED Port Config Port Displays local device s...

Страница 254: ...g LLDPDU of the port Emergency Number Emergency number is Emergency Call Service ELIN identifier which is used during emergency call setup to a traditional CAMA or ISDN trunk based PSAP Civic Address...

Страница 255: ...Info to load the following page Figure 15 8 LLDP MED Local Information The following entries are displayed on this screen Auto Refresh Auto Refresh Enable Disable the auto refresh function Refresh Ra...

Страница 256: ...auto refresh rate Neighbor Info Device Type Displays the device type of the neighbor Application Type Displays the application type of the neighbor Application Type indicates the primary function of t...

Страница 257: ...ics Test whether the destination device is reachable and detect the route hops from the switch to the destination device 16 1 System Monitor System Monitor functions to display the utilization status...

Страница 258: ...onitor and display its Memory utilization rate every four seconds 16 2 Log The Log system of switch can record classify and manage the system information effectively providing powerful support for net...

Страница 259: ...ormation in log buffer will be lost after the switch is rebooted or powered off whereas the information in log file will be kept effective even the switch is rebooted or powered off Log Table displays...

Страница 260: ...an set the output channel for logs Choose the menu Maintenance Log Local Log to load the following page Figure 14 4 Local Log The following entries are displayed on this screen Local Log Config Select...

Страница 261: ...for receiving sending log information Here we use the standard port 514 Severity Specify the severity level of the log information sent to each log host Only the log with the same or smaller severity...

Страница 262: ...get some related important information about the error for device diagnosis after the switch is restarted 2 It will take a few minutes to backup the log file Please wait without any operation 16 3 De...

Страница 263: ...status is close open or impedance here displays the error length of the cable Note 1 The interval between two cable tests for one port must be more than 3 seconds 2 The result is more reasonable when...

Страница 264: ...nd test data during Ping testing The default value is recommended Data Size Enter the size of the sending data during Ping testing The default value is recommended Interval Specify the interval to sen...

Страница 265: ...e Figure 14 9 Tracert The following entries are displayed on this screen Tracert Config Destination IP Enter the IP address of the destination device Both IPv4 and IPv6 are supported Max Hop Specify t...

Страница 266: ...P 100m of Cat 5e Cat 6 or above 1000Base X MMF or SMF SFP Module Optional LED T1600G 28TS PWR SYS 1000Mbps Link Act T1600G 52TS PWR SYS 10 100 1000Mbps port 1 48 Link Act port 49 52 T1600G 28PS PWR SY...

Страница 267: ...he output queues Domain Name Service DNS A system used for translating host names for network nodes into IP addresses Dynamic Host Control Protocol DHCP Provides a framework for passing configuration...

Страница 268: ...ISO 7 Layer Data Communications Protocol This is related directly to the hardware interface for network devices and passes on traffic based on MAC addresses Link Aggregation See Port Trunk Management...

Страница 269: ...loop can often occur in complicated or backup linked network systems Spanning Tree detects and directs data along the shortest available path maximizing the performance and efficiency of the network...

Отзывы: