background image

 

 

Figure 9-4 SP-Mode 

2.  WRR-Mode: Weight Round Robin Mode. In this mode, packets in all the queues are sent in 

order based on the weight value for each queue and every queue can be assured of a certain 
service time. The weight value indicates the occupied proportion of the resource. WRR queue 
overcomes the disadvantage of SP queue that the packets in the queues with lower priority 
can not get service for a long time. In WRR mode, though the queues are scheduled in order, 
the service time for each queue is not fixed, that is to say, if a queue is empty, the next queue 
will be scheduled. In this way, the bandwidth resources are made full use of. The default 
weight value ratio of TC0, TC1, TC2 and TC3 is 1:2:4:8.   

 

Figure 9-5 WRR-Mode 

3.  SP+WRR-Mode: Strict-Pr Weight Round Robin Mode. In this mode, this switch 

provides two scheduling groups, SP group and WRR group. Queues in SP group and WRR 
group are scheduled strictly based on strict-priority mode while the queues inside WRR group 
follow the WRR mode. In SP+WRR mode, TC3 is in the SP group; TC0, TC1 and TC2 belong 
to the WRR group and the weight value ratio of TC0, TC1 and TC2 is 1:2:4. In this way, when 
scheduling queues, the switch allows TC3 to occupy the whole bandwidth following the SP 
mode and the TC0, TC1 and TC2 in the WRR group will take up the bandwidth according to 
their ratio 1:2:4. 

4.  Equ-Mode: Equal-Mode. In this mode, all the queues occupy the bandwidth equally. The 

weight value ratio of all the queues is 1:1:1:1. 

117

 

Содержание JetStream TL-SG3424P

Страница 1: ...TL SG3424P JetStream L2 Managed PoE Switch REV2 0 0 1910010781...

Страница 2: ...a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instruction manual may cause harmful interference to...

Страница 3: ...ect the product or the power adapter from the power source z Don t disassemble the product or make repairs yourself You run the risk of electric shock and voiding the limited warranty If you need serv...

Страница 4: ...10 3 2 Configuration 10 Chapter 4 System 12 4 1 System Info 12 4 1 1 System Summary 12 4 1 2 Device Description 14 4 1 3 System Time 14 4 1 4 Daylight Saving Time 15 4 1 5 System IP 17 4 2 User Manag...

Страница 5: ...Dynamic Address 50 5 4 4 Filtering Address 52 Chapter 6 VLAN 54 6 1 802 1Q VLAN 55 6 1 1 VLAN Config 57 6 1 2 Port Config 59 6 2 MAC VLAN 61 6 3 Protocol VLAN 62 6 3 1 Protocol Group Table 65 6 3 2 P...

Страница 6: ...P Table 108 8 2 2 Static Multicast IP 109 8 3 Multicast Filter 110 8 3 1 IP Range 110 8 3 2 Port Filter 111 8 4 Packet Statistics 113 Chapter 9 QoS 115 9 1 DiffServ 118 9 1 1 Port Priority 118 9 1 2 D...

Страница 7: ...cy Config 144 11 3 1 Policy Summary 144 11 3 2 Policy Create 144 11 3 3 Action Create 145 11 4 Policy Binding 146 11 4 1 Binding Table 146 11 4 2 Port Binding 147 11 4 3 VLAN Binding 147 11 5 Applicat...

Страница 8: ...1 Basic Config 199 14 1 1 Global Config 199 14 1 2 Port Config 200 14 2 Device Info 201 14 2 1 Local Info 201 14 2 2 Neighbor Info 202 14 3 Device Statistics 203 14 4 LLDP MED 204 14 4 1 Global Confi...

Страница 9: ...16 2 1 Log Table 228 16 2 2 Local Log 229 16 2 3 Remote Log 229 16 2 4 Backup Log 230 16 3 Device Diagnostics 231 16 3 1 Cable Test 231 16 3 2 Loopback 232 16 4 Network Diagnostics 232 16 4 1 Ping 23...

Страница 10: ...cord One console cable Two mounting brackets and other fittings Installation Guide Resource CD for TL SG3424P switch including This User Guide Other Helpful Information Note Make sure that the packag...

Страница 11: ...e menu structure System System Info System Summary means the System Summary page under the System Info menu option that is located under the System menu Bold font indicates a button a toolbar icon men...

Страница 12: ...t changing the 802 1Q VLAN configuration z Protocol VLAN Create VLANs in application layer to make some special data transmitted in the specified VLAN z GVRP GVRP allows the switch to automatically ad...

Страница 13: ...rol the access of the illegal users to the network Here mainly introduces z Time Range Configure the effective time for ACL rules z ACL Config ACL rules z Policy Config Configure operation policies z...

Страница 14: ...r function to establish and maintain cluster Chapter 16 Maintenance This module is used to assemble the commonly used system tools to manage the switch Here mainly introduces z System Monitor Monitor...

Страница 15: ...e functions with excellent performance and is friendly to manage which can fully meet the need of the users demanding higher networking performance 2 2 Main Features Resiliency and Availability Link a...

Страница 16: ...For 100M module please select 100MFD while select 1000MFD for gigabit module By default the Speed and Duplex mode of SFP port is 1000MFD Console Port Designed to connect with the serial port of a comp...

Страница 17: ...he corresponding port When the PoE LED is on the port LED is indicating the power supply status LED Status Indication On The switch is powered on Off The switch is powered off or power supply is abnor...

Страница 18: ...You can also ground the switch through the PE Protecting Earth cable of AC cord or with Ground Cable For detail information please refer to Installation Guide AC Power Socket Connect the female conne...

Страница 19: ...IP address is 192 168 0 x x is any number from 2 to 254 Subnet Mask is 255 255 255 0 For the detailed instructions as to how to do this please refer to Appendix B 2 After a moment a login window will...

Страница 20: ...tive before the switch is rebooted If you want to keep the configurations effective even the switch is rebooted please click Save Config You are suggested to click Save Config before cutting off the p...

Страница 21: ...this page you can view the port connection status and the system information The port status diagram shows the working status of 24 10 100 1000Mbps RJ45 ports and 4 SFP ports of the switch Ports label...

Страница 22: ...the type of the port Speed Displays the maximum transmission rate of the port Status Displays the connection status of the port Click a port to display the bandwidth utilization on this port The actua...

Страница 23: ...entries are displayed on this screen Device Description Device Name Enter the name of the switch Device Location Enter the location of the switch System Contact Enter your contact information 4 1 3 S...

Страница 24: ...ted to a NTP server z Time Zone Select your local time z Primary Secondary NTP Server Enter the IP Address for the NTP server z Update Rate Specify the rate fetching time from NTP server Synchronize w...

Страница 25: ...y in March 01 00 Last Sunday in October 01 00 z New Zealand First Sunday in October 02 00 Last Sunday in March 03 00 Recurring Mode Specify the DST configuration in recurring mode This configuration i...

Страница 26: ...splays MAC Address of the switch IP Address Mode Select the mode to obtain IP Address for the switch z Static IP When this option is selected you should enter IP Address Subnet Mask and Default Gatewa...

Страница 27: ...efault IP address is 192 168 0 1 4 2 User Management User Management functions to configure the user name and password for users to log on to the Web management page with a certain access level so as...

Страница 28: ...ssword for users login Confirm Password Retype the password User Table Select Select the desired entry to delete the corresponding user information It is multi optional The current user information ca...

Страница 29: ...g Restore Restore Config Click the Restore Config button to restore the backup configuration file It will take effect after the switch automatically reboots Note 1 It will take a few minutes to restor...

Страница 30: ...ware Upgrade The switch system can be upgraded via the Web management page To upgrade the system is to get more functions and better performance Go to http www tp link com to download the updated firm...

Страница 31: ...witch is reset Choose the menu System System Tools System Reset to load the following page Figure 4 14 System Reset Note After the system is reset the switch will be reset to the default and all the s...

Страница 32: ...this option to limit the ports for login IP Address Mask These fields can be available for configuration only when IP based mode is selected Only the users within the IP range you set here are allowe...

Страница 33: ...to the correct users and servers 2 Encrypt the data transmission to prevent the data being intercepted 3 Maintain the integrality of the data to prevent the data being altered in the transmission Adop...

Страница 34: ...ured connection using https please enter https into the URL field of the browser 4 It may take more time for https connection than that for http connection because https connection involves authentica...

Страница 35: ...ssfully downloaded the certificate authentication will be preferred for SSH access to the switch Choose the menu System Access Security SSH Config to load the following page Figure 4 17 SSH Config The...

Страница 36: ...d file will result in the SSH access to the switch via Password authentication Application Example 1 for SSH Network Requirements 1 Log on to the switch via password authentication using SSH and the S...

Страница 37: ...ient software is recommended Configuration Procedure 1 Select the key type and key length and generate SSH key Note 1 The key length is in the range of 256 to 3072 bits 2 During the key generation ran...

Страница 38: ...h download the public key file saved in the computer to the switch Note 1 1 The key type should accord with the type of the key file 2 2 The SSH key downloading cannot be interrupted 4 Download the pr...

Страница 39: ...on to the interface of PuTTY and enter the IP address for login After successful authentication please enter the login user name If you log on to the switch without entering password it indicates tha...

Страница 40: ...s disabled the packets on the port will be discarded Disabling the port which is vacant for a long time can reduce the power consumption effectively And you can enable the port when it is in need The...

Страница 41: ...chronize the speed with its peer to avoid the packet loss caused by congestion LAG Displays the LAG number which the port belongs to Note 1 The switch cannot be managed through the disabled port Pleas...

Страница 42: ...one Mirrored Port Displays the mirrored ports Operation Click Edit to configure the mirror group Click Edit to display the following figure Figure 5 3 Mirroring Port The following entries are displaye...

Страница 43: ...ort and the MAC address of the connected device which is the base of the packet forwarding The capacity of MAC Address Table is fixed MAC Address Attack is the attack method that the attacker takes to...

Страница 44: ...e for the port Dynamic When Dynamic mode is selected the learned MAC address will be deleted automatically after the aging time Static When Static mode is selected the learned MAC address will be out...

Страница 45: ...Isolation provides a method of restricting traffic flow to improve the network security by forbidding the port to forward packets to the ports that are not on its forward portlist Choose the menu Swit...

Страница 46: ...h can detect loops using loopback detection packets When a loop is detected the switch will display an alert or further block the corresponding port according to the port configuration Choose the menu...

Страница 47: ...splay an alert Port based When a loop is detected display an alert and block the port Recovery Mode Select the mode how the blocked port recovers to normal status Auto Block status can be automaticall...

Страница 48: ...00Mbps 2000Mbps 4 because the bandwidth of each member port is 2000Mbps counting the up linked speed of 1000Mbps and the down linked speed of 1000Mbps 2 The traffic load of the LAG will be balanced am...

Страница 49: ...Number Displays the LAG number here Description Displays the description of LAG Member Displays the LAG member Operation Allows you to view or modify the information for each LAG z Edit Click to modi...

Страница 50: ...er The switch can dynamically group similarly configured ports into a single logical link which will highly extend the bandwidth and flexibly balance the load With the LACP feature enabled the port wi...

Страница 51: ...ing page Figure 5 10 LACP Config The following entries are displayed on this screen Global Config System Priority Specify the system priority for the switch The system priority and MAC address constit...

Страница 52: ...ll be considered as the preferred one If the two port priorities are equal the port with smaller port number is preferred Status Enable Disable the LACP feature for your selected port LAG Displays the...

Страница 53: ...lect the corresponding port based on the port number you entered Port Displays the port number Packets Rx Displays the number of packets received on the port The error packets are not counted in Packe...

Страница 54: ...to Enable Disable refreshing the Traffic Summary automatically Refresh Rate Enter a value in seconds to specify the refresh interval Statistics Port Enter a port number and click the Select button to...

Страница 55: ...23 bytes long PktsOver1023Octets Displays the number of the received packets including error packets that are over 1023 bytes Collisions Displays the number of collisions experienced by a port during...

Страница 56: ...same VLAN Filtering Address Table Manually configuring No Yes Table 5 1 Types and features of Address Table This function includes four submenus Address Table Static Address Dynamic Address and Filter...

Страница 57: ...ess learned by the switch VLAN ID Displays the corresponding VLAN ID of the MAC address Port Displays the corresponding Port number of the MAC address Type Displays the Type of the MAC address Aging S...

Страница 58: ...entry in the Static Address Table z MAC Enter the MAC address of your desired entry z VLAN ID Enter the VLAN ID number of your desired entry z Port Enter the Port number of your desired entry Static...

Страница 59: ...the Static Address Table cannot be added to the Filtering Address Table or bound to a port dynamically 4 This static MAC address bound function is not available if the 802 1X feature is enabled 5 4 3...

Страница 60: ...arch Option Search Option Select a Search Option from the pull down list and click the Search button to find your desired entry in the Dynamic Address Table z MAC Enter the MAC address of your desired...

Страница 61: ...ch may fill up the MAC address table This prevents the MAC address table from updating with network changes in time If the aging time is too short the switch may remove valid MAC address entries This...

Страница 62: ...ry Filtering Address Table Select Select the entry to delete the corresponding filtering address It is multi optional MAC Address Displays the filtering MAC Address VLAN ID Displays the corresponding...

Страница 63: ...ackets are limited in a VLAN Hosts in the same VLAN communicate with one another via Ethernet whereas hosts in different VLANs communicate with one another through the Internet devices such as Router...

Страница 64: ...3 bit field referring to 802 1p priority Refer to section QoS QoS profile for details 3 CFI CFI is a 1 bit field indicating whether the MAC address is encapsulated in the standard format in different...

Страница 65: ...mines the default broadcast domain of the port i e when the port receives UL packets or broadcast packets the port will broadcast the packets in its default VLAN Different packets tagged or untagged w...

Страница 66: ...VLAN Table VLAN ID Select Click the Select button to quick select the corresponding entry based on the VLAN ID number you entered Select Select the desired entry to delete the corresponding VLAN It is...

Страница 67: ...k the Check button to check whether the VLAN ID you entered is valid or not VLAN Members Port Select Click the Select button to quick select the corresponding entry based on the port number you entere...

Страница 68: ...e 802 1Q VLAN please acquaint yourself with all the devices connected to the switch in order to configure the ports properly Choose the menu VLAN 802 1Q VLAN Port Config to load the following page Fig...

Страница 69: ...t belongs to PVID Enter the PVID number of the port LAG Displays the LAG to which the port belongs VLAN Click the Detail button to view the information of the VLAN to which the port belongs Click the...

Страница 70: ...without changing the configuration of VLAN members The packet in MAC VLAN is processed in the following way 1 When receiving an untagged packet the switch matches the packet with the current MAC VLAN...

Страница 71: ...N Config page click the Create button to create a VLAN Enter the VLAN ID and the description for the VLAN Meanwhile specify its member ports 3 Create MAC VLAN Required On the VLAN MAC VLAN page create...

Страница 72: ...02 2 802 3 encapsulation contains the following three extended formats z 802 3 raw encapsulation Only the Length field is encapsulated after source MAC address field and destination MAC address field...

Страница 73: ...acket belongs to The following table shows the common used encapsulation formats supported in network layer protocol and the protocol templates are for reference Meanwhile some protocol templates has...

Страница 74: ...t its enabled port to be the member of corresponding 802 1Q VLAN so as to ensure the packets forwarded normally 6 3 1 Protocol Group Table On this page you can create Protocol VLAN and view the inform...

Страница 75: ...he 802 1Q VLANs the ingress port belongs to Protocol Group Member Select your desired port for Protocol VLAN Group 6 3 3 Protocol Template The Protocol Template should be created before configuring th...

Страница 76: ...t the desired entry It is multi optional ID Displays the index of the protocol template Protocol Name Displays the name of the protocol template Ether Type Displays the Ethernet protocol type field in...

Страница 77: ...and enter the VLAN ID to create a Protocol VLAN 5 Modify View VLAN Optional On the VLAN Protocol VLAN Protocol VLAN page click the Edit button to modify view the information of the corresponding VLAN...

Страница 78: ...ort 3 and Port 4 z Configure Switch B Step Operation Description 1 Configure the Link Type of the ports Required On VLAN 802 1Q VLAN Port Config page configure the link type of Port 7 Port 6 and Port...

Страница 79: ...ts Required On VLAN 802 1Q VLAN Port Config page configure the link type of Port 11 and Port 12 as GENERAL and TRUNK respectively 2 Create VLAN10 Required On VLAN 802 1Q VLAN VLAN Config page create a...

Страница 80: ...reate MAC VLAN10 with the MAC address as 00 19 56 82 3B 70 z Configure Switch C Step Operation Description 1 Configure the Link Type of the ports Required On VLAN 802 1Q VLAN Port Config page configur...

Страница 81: ...n Description 1 Configure the Link Type of the ports Required On VLAN 802 1Q VLAN Port Config page configure the link type of Port 4 and Port 5 as ACCESS and configure the link type of Port 3 as GENER...

Страница 82: ...rom the other entity or configuring some attributes statically the device also sends out a Join message in order to be registered by the other GARP entities Leave Message When a GARP entity expects ot...

Страница 83: ...ers can be reached and so on The switch also propagates the local VLAN registration information to other switches so that all the switching devices in the same switched network can have the same VLAN...

Страница 84: ...ort number you entered Select Select the desired port for configuration It is multi optional Port Displays the port number Status Enable Disable the GVRP feature for the port The port type should be s...

Страница 85: ...tiseconds Leave Timer Once the Leave Timer is set the GARP port receiving a Leave message will start its Leave timer and deregister the attribute information if it does not receive a Join message agai...

Страница 86: ...hrough the designated bridge The switch with the lowest bridge ID will be chosen as the designated bridge Root Path Cost Indicates the sum of the path cost of the root port and the path cost of all th...

Страница 87: ...e network at once the temporal loop will occur if the port transits its state immediately Therefore STP adopts a state transit mechanism that is the new root port and the designated port begins to for...

Страница 88: ...way Step Operation 1 For each switch except the one chosen as the root bridge in a network the port that receives the BPDU with the highest priority is chosen as the root port of the switch 2 Using th...

Страница 89: ...andard not only enables spanning trees to converge rapidly but also enables packets of different VLANs to be forwarded along their respective paths so as to provide redundant links with a better load...

Страница 90: ...his status the port can only receive BPDU packets z Disconnected In this status the port is not participating in the STP Port Roles In an MSTP the following roles exist z Root Port Indicates the port...

Страница 91: ...ing trees on the switch can be implemented on STP Config and STP Summary pages 7 1 1 STP Config Before configuring spanning trees you should make clear the roles each switch plays in each spanning tre...

Страница 92: ...default value is 32768 and should be exact divisor of 4096 Hello Time Enter a value from 1 to 10 in seconds to specify the interval to send BPDU packets It is used to test the links 2 Hello Time 1 Ma...

Страница 93: ...lt in duplicated configuration being sent frequently which increases the network load of the switches and wastes network resources The default value is recommended 3 A too small max age parameter may...

Страница 94: ...Figure 7 5 STP Summary 7 2 Port Config On this page you can configure the parameters of the ports for CIST Choose the menu Spanning Tree Port Config to load the following page 85...

Страница 95: ...ing the root port The lower value has the higher priority IntPath IntPath Cost is used to choose the path and calculate the path costs of ports in an MST region It is an important criterion on determi...

Страница 96: ...edge ports and enable the BPDU protection function as well This not only enables these ports to transit to forwarding state rapidly but also secures your network 2 All the links of ports in a LAG can...

Страница 97: ...on 7 3 2 Instance Config Instance Configuration a property of MST region is used to describe the VLAN to Instance mapping configuration You can assign VLAN to different instances appropriate to your n...

Страница 98: ...ll be automatically mapped to the CIST VLAN Instance Mapping VLAN ID Enter the desired VLAN ID After modification here the new VLAN ID will be added to the corresponding instance ID and the previous V...

Страница 99: ...ays the port number of the switch Priority Enter the priority of the port in the instance It is an important criterion on determining if the port connected to this port will be chosen as the root port...

Страница 100: ...TP Security function can be implemented on Port Protect and TC Protect pages Port Protect function is to prevent the devices from any malicious attack against STP features 7 4 1 Port Protect On this p...

Страница 101: ...he maximum number you set in the TC threshold field the switch will not performs the removing operation in the TC protect cycle Such a mechanism prevents the switch from frequently removing MAC addres...

Страница 102: ...ulating STP because of link failures and network congestions Root Protect Root Protect is to prevent wrong network topology change caused by the role change of the current legal root bridge TC Protect...

Страница 103: ...ult value is 20 TC Protect Cycle Enter a value from 1 to 10 to specify the TC Protect Cycle The default value is 5 7 5 Application Example for STP Function Network Requirements z Switch A B C D and E...

Страница 104: ...ion 1 Configure ports On VLAN 802 1Q VLAN page configure the link type of the related ports as Trunk and add the ports to VLAN 101 VLAN 106 The detailed instructions can be found in the section 802 1Q...

Страница 105: ...nstance 2 On Spanning Tree MSTP Instance Instance Config page configure the priority of Instance 2 to be 0 z Configure Switch D Step Operation Description 1 Configure ports On VLAN 802 1Q VLAN page co...

Страница 106: ...estion for Configuration z Enable TC Protect function for all the ports of switches z Enable Root Protect function for all the ports of root bridges z Enable Loop Protect function for the non edge por...

Страница 107: ...suitable for networks with sparsely users whereas broadcast is suitable for networks with densely distributed users When the number of users requiring this information is not certain unicast and broa...

Страница 108: ...relationship is described as Figure 8 2 Figure 8 2 Mapping relationship between multicast IP address and multicast MAC address The high order 4 bits of the IP multicast address are 1110 identifying t...

Страница 109: ...GMP report message from the host within a period of time IGMP Messages The switch running IGMP Snooping processes the IGMP messages of different types as follows 1 IGMP Query Message IGMP query messag...

Страница 110: ...witch port connected to a multicast group member 2 Timers Router Port Time Within the time if the switch does not receive IGMP query message from the router port it will consider this port is not a ro...

Страница 111: ...ticast Select the operation for the switch to process unknown multicast Forward or Discard IGMP Snooping Status Description Displays IGMP Snooping status Member Displays the member of the correspondin...

Страница 112: ...port the switch will immediately remove this port from the multicast group upon receiving IGMP leave messages LAG Displays the LAG number which the port belongs to Note 1 Fast Leave on the port is eff...

Страница 113: ...t will consider this port is not a member port any more Leave Time Specify the interval between the switch receiving a leave message from a host and the switch removing the host from the multicast gro...

Страница 114: ...router will duplicate this multicast information and deliver each VLAN owning a receiver one copy This mode wastes a lot of bandwidth The problem above can be solved by configuring a multicast VLAN B...

Страница 115: ...t receive multicast streams 2 The Multicast VLAN won t take effect unless you first complete the configuration for the corresponding VLAN owning the port on the 802 1Q VLAN page 3 The link type of the...

Страница 116: ...ends multicast streams via the router and the streams are transmitted to user A and user B through the switch Router Its WAN port is connected to the multicast source its LAN port is connected to the...

Страница 117: ...Snooping function for port 3 port4 and port 5 on Multicast IGMP Snooping Port Config page 4 Enable Multicast VLAN Enable Multicast VLAN configure the VLAN ID of a multicast VLAN as 3 and keep the othe...

Страница 118: ...D Displays the VLAN ID of the multicast group Forward Port Displays the forward port of the multicast group Type Displays the type of the multicast IP Note If the configuration on VLAN Config page and...

Страница 119: ...f the multicast group Forward Port Displays the forward port of the multicast group 8 3 Multicast Filter When IGMP Snooping is enabled you can specified the multicast IP range the ports can join so as...

Страница 120: ...you entered Select Select the desired entry to delete or modify the corresponding IP range It is multi optional IP Range ID Displays IP range ID Start Multicast IP Displays start multicast IP of the...

Страница 121: ...ticast IP is in the filtering IP range z Permit Only the multicast packets whose multicast IP is in the IP range will be processed z Deny Only the multicast packets whose multicast IP is not in the IP...

Страница 122: ...lter page 8 4 Packet Statistics On this page you can view the multicast data traffic on each port of the switch which facilitates you to monitor the IGMP messages in the network Choose the menu Multic...

Страница 123: ...ts the port received Report Packet V1 Displays the number of IGMPv1 report packets the port received Report Packet V2 Displays the number of IGMPv2 report packets the port received Report Packet V3 Di...

Страница 124: ...ackets to different priority queues based on the priority modes This switch implements three priority modes based on port on 802 1P and on DSCP z Queue scheduling algorithm When the network is congest...

Страница 125: ...ment page you can configure different DS field mapping to the corresponding priority levels Non IP datagram with 802 1Q tag are mapped to different priority levels based on 802 1P priority mode the un...

Страница 126: ...The default weight value ratio of TC0 TC1 TC2 and TC3 is 1 2 4 8 Figure 9 5 WRR Mode 3 SP WRR Mode Strict Priority Weight Round Robin Mode In this mode this switch provides two scheduling groups SP g...

Страница 127: ...ng algorithms The port priorities are labeled as CoS0 CoS1 CoS7 The DiffServ function can be implemented on Port Priority DSCP Priority 802 1P CoS mapping and Schedule Mode pages 9 1 1 Port Priority O...

Страница 128: ...page you can configure DSCP priority DSCP DiffServ Code Point is a new definition to IP ToS field given by IEEE This field is used to divide IP datagram into 64 priorities When DSCP Priority is enabl...

Страница 129: ...1P CoS mapping page configure the mapping relation between the 802 1P priority and TC 2 Select a schedule mode Required On QoS DiffServ Schedule Mode page select a schedule mode 9 1 3 802 1P CoS mapp...

Страница 130: ...schedule mode for the switch When the network is congested the problem that many packets complete for resources must be solved usually in the way of queue scheduling The switch will control the forwa...

Страница 131: ...in the WRR group will take up the bandwidth according to their ratio 1 2 4 Equ Mode Equal Mode In this mode all the queues occupy the bandwidth equally The weight value ratio of all the queues is 1 1...

Страница 132: ...ed as the real Egress rate LAG Displays the LAG number which the port belongs to Note 1 If you enable ingress rate limit feature for the storm control enabled port storm control feature will be disabl...

Страница 133: ...ded Select Disable to disable the storm control function for the port Multicast Rate bps Select the bandwidth for receiving multicast packets on the port The packet traffic exceeding the bandwidth wil...

Страница 134: ...00 03 6B 00 00 00 Cisco phone 3 00 04 0D 00 00 00 Avaya phone 4 00 60 B9 00 00 00 Philips NEC phone 5 00 D0 1E 00 00 00 Pingtel phone 6 00 E0 75 00 00 00 Polycom phone 7 00 E0 BB 00 00 00 3com phone T...

Страница 135: ...VLAN mode and voice stream processing mode Security Mode of Voice VLAN When voice VLAN is enabled for a port you can configure its security mode to filter data stream If security mode is enabled the...

Страница 136: ...LAN Global Config to load the following page Figure 9 12 Global Configuration The following entries are displayed on this screen Global Config Voice VLAN Select Enable Disable Voice VLAN function VLAN...

Страница 137: ...ort Config Port Select Click the Select button to quick select the corresponding port based on the port number you entered Select Select the desired port for voice VLAN configuration It is multi optio...

Страница 138: ...t is a voice packet by checking its OUI address The switch analyzes the received packets If the packets recognized as voice packets the access port will be automatically added to the Voice VLAN Choose...

Страница 139: ...On VLAN 802 1Q VLAN Port Config page click the Create button to create a VLAN 3 Add OUI address Optional On QoS Voice VLAN OUI Config page you can check whether the switch is supporting the OUI templa...

Страница 140: ...bility In compliance with IEEE 802 3af and IEEE 802 3at global organizations can deploy PoE everywhere without concern for any local variance in AC power standards outlets plugs or reliability z Wide...

Страница 141: ...PoE switch s real time remaining system power Port Config Port Select Click the Select button to quick select the corresponding entry based on the port number you entered Select Select the desired po...

Страница 142: ...me current Voltage V Displays the port s real time voltage PD Class Displays the class the linked PD Powered Device belongs to Power Status Displays the port s real time power status 10 1 2 PoE Profil...

Страница 143: ...e system time is not within the time range On this switch absolute time week time and holiday can be configured Configure an absolute time section in the form of the start date to the end date to make...

Страница 144: ...played on this screen Create Time Range Name Enter the name of the time range for time identification Exclude Holiday Select Exclude Holiday and the port based on this time range may not supply power...

Страница 145: ...gement Choose the menu PoE PoE Time Range PoE Holiday Create to load the following page Figure 10 5 Holiday Configuration The following entries are displayed on this screen Create Holiday Start Date S...

Страница 146: ...ckets can be filtered by differentiating the time ranges On this switch absolute time week time and holiday can be configured Configure an absolute time section in the form of the start date to the en...

Страница 147: ...The ACL rule based on this time range takes effect only when the system time is within the holiday Absolute Select Absolute to configure absolute time range The ACL rule based on this time range takes...

Страница 148: ...the name of the holiday Holiday Table Select Select the desired entry to delete the corresponding holiday Index Displays the index of the holiday Holiday Name Displays the name of the holiday Start Da...

Страница 149: ...ave created ACL Type Displays the type of the ACL you select Rule Order Displays the rule order of the ACL you select Rule Table Here you can view the information about the ACL rule you select 11 2 2...

Страница 150: ...le ID Enter the rule ID Operation Select the operation for the switch to process packets which match the rules z Permit Forward packets z Deny Discard Packets S MAC Enter the source MAC address contai...

Страница 151: ...he operation for the switch to process packets which match the rules z Permit Forward packets z Deny Discard Packets S IP Enter the source IP address contained in the rule D IP Enter the destination I...

Страница 152: ...rule Mask Enter IP address mask If it is set to 1 it must strictly match the address IP Protocol Select IP protocol contained in the rule TCP Flag Configure TCP flag when TCP is selected from the pul...

Страница 153: ...licy Summary The following entries are displayed on this screen Search Option Select Policy Select name of the desired policy for view If you want to delete the desired policy please click the Delete...

Страница 154: ...orresponding actions for the policy Choose the menu ACL Policy Config Action Create to load the following page Figure 11 11 Action Create The following entries are displayed on this screen Create Acti...

Страница 155: ...the local priority for the data packets those match the corresponding ACL 11 4 Policy Binding Policy Binding function can have the policy take its effect on a specific port VLAN The policy will take...

Страница 156: ...policy to the port The following entries are displayed on this screen Port Bind Config Policy Name Select the name of the policy you want to bind Port Enter the number of the port you want to bind Por...

Страница 157: ...configuration pages configure ACL rules to match packets 3 Configure Policy Required On ACL Policy Config configuration pages configure the policy to control the data packets those match the correspo...

Страница 158: ...00 18 00 2 Configure for requirement 1 On ACL ACL Config ACL Create page create ACL 11 On ACL ACL Config MAC ACL page select ACL 11 create Rule 1 configure the operation as Permit configure the S MAC...

Страница 159: ...255 0 configure the time range as work_time On ACL Policy Config Action Create page add ACL 100 to Policy limit1 On ACL Policy Binding Port Binding page select Policy limit1 to bind to port 3 4 Config...

Страница 160: ...connected port number of the Hosts in the LAN via the ARP Scanning function and bind them conveniently You are only requested to enter the range of the IP address on the ARP Scanning page for the sca...

Страница 161: ...isplays the MAC Address of the Host VLAN ID Displays the VLAN ID here Port Displays the number of port connected to the Host Protect Type Allows you to view and modify the Protect Type of the entry So...

Страница 162: ...nding Table Select Select the desired entry to be deleted It is multi optional Host Name Displays the Host Name here IP Address Displays the IP Address of the Host MAC Address Displays the MAC Address...

Страница 163: ...try related to the IP address of Host B exists If yes Host A will directly send the packets to Host B If the corresponding MAC address is not found in the ARP Table Host A will broadcast ARP request p...

Страница 164: ...N ID Displays the VLAN ID here Port Displays the number of port connected to the Host Protect Type Displays the Protect Type of the entry Collision Displays the Collision status of the entry z Warning...

Страница 165: ...gure 12 5 Network diagram for DHCP snooping implementation For different DHCP Clients DHCP Server provides three IP address assigning methods 4 Manually assign the IP address Allows the administrator...

Страница 166: ...e DHCP ACK packet back to the Client Otherwise the Server will send the DHCP NAK packet to refuse assigning this IP address to the Client Option 82 The DHCP packets are classified into 8 types with th...

Страница 167: ...mistake 2 Hacker exhausted the IP addresses of the normal DHCP server and then pretended to be a legal DHCP server to assign the IP addresses and the other parameters to Clients For example hacker us...

Страница 168: ...d the following page Figure 12 8 DHCP Snooping Note If you want to enable the DHCP Snooping feature for the member port of LAG please ensure the parameters of all the member ports are the same The fol...

Страница 169: ...itch defined one z Drop Indicates to discard the packets including the Option 82 field Customization Enable Disable the switch to define the Option 82 Circuit ID Enter the sub option Circuit ID for th...

Страница 170: ...of a forged Gateway to Host and then the Host will automatically update the ARP table after receiving the ARP response packets which causes that the Host can not access the network normally The ARP A...

Страница 171: ...N it will encapsulate this false destination MAC address for packets which results in a breakdown of the normal communication Cheating Terminal Hosts The attacker sends the false IP address to MAC add...

Страница 172: ...e Middle Attack The attacker continuously sends the false ARP packets to the Hosts in LAN so as to make the Hosts maintain the wrong ARP table When the Hosts in LAN communicate with one another they w...

Страница 173: ...p a normal appearing communication 5 The attacker continuously sends the false ARP packets to the Host A and Host B so as to make the Hosts always maintain the wrong ARP table In the view of Host A an...

Страница 174: ...network from ARP attacks such as the Network Gateway Spoofing and Man In The Middle Attack etc Choose the menu Network Security ARP Inspection ARP Detect to load the following page Figure 12 13 ARP D...

Страница 175: ...g bound entry 3 Specify the trusted port Required On the Network Security ARP Inspection ARP Detect page specify the trusted port The specific ports such as up linked port routing port and LAG port sh...

Страница 176: ...ture for the port Speed Enter a value to specify the maximum amount of the received ARP packets per second Current Speed Displays the current speed of the received ARP packets Status Displays the stat...

Страница 177: ...uto Refresh Auto Refresh Enable Disable the Auto Refresh feature Refresh Interval Specify the refresh interval to display the ARP Statistics Illegal ARP Packet Port Displays the port number Trusted Po...

Страница 178: ...cket with its TCP index and all the control fields set to 0 During the TCP connection and data transmission the packets with all the control fields set to 0 are considered as the illegal packets SYN p...

Страница 179: ...e network and block the unnecessary network services 3 Enhance the network security via the protection devices such as the hardware firewall 12 4 802 1X The 802 1X protocol was developed by IEEE802 LA...

Страница 180: ...orization To ensure a stable authentication system an alternate authentication server can be specified If the main authentication server is in trouble the alternate authentication server can substitut...

Страница 181: ...is mode normally requires the RADIUS server to support the two fields of EAP the EAP message field and the Message authenticator field This switch supports EAP MD5 authentication way for the EAP relay...

Страница 182: ...te to allow the supplicant system access the network And then the switch will monitor the status of supplicant by sending hand shake packets periodically By default the switch will force the supplican...

Страница 183: ...to a VLAN i e Guest VLAN Users belonging to the Guest VLAN can access the resources of the Guest VLAN without being authenticated But they need to be authenticated before accessing external resources...

Страница 184: ...authentication server z PAP IEEE 802 1X authentication system uses extensible authentication protocol EAP to exchange information between the switch and the client The transmission of EAP packets is t...

Страница 185: ...er before resending a request to the authentication server 12 4 2 Port Config On this page you can configure the 802 1X features for the ports based on the actual network Choose the menu Network Secur...

Страница 186: ...lients connected to the port can access the network on the condition that any one of the clients has passed the 802 1X Authentication Authorized Displays the authentication status of the port LAG Disp...

Страница 187: ...connected to the authentication server In addition the authentication parameters of the switch and the authentication server should be the same Configuration Procedure Step Operation Description 1 Co...

Страница 188: ...gent is the server software operated on network devices with the responsibility of receiving and processing the request packets from SNMP Management Station In the meanwhile Agent will inform the SNMP...

Страница 189: ...essages SNMP adopts the hierarchical architecture to identify the managed objects It is like a tree and each tree node represents a managed object as shown in the following figure Thus the object can...

Страница 190: ...on please configure the SNMP function globally on this page Choose the menu SNMP SNMP Config Global Config to load the following page Figure 13 3 Global Config The following entries are displayed on t...

Страница 191: ...n View Config View Name Give a name to the View for identification Each View can include several entries with the same name MIB Object ID Enter the Object Identifier OID for the entry of View View Typ...

Страница 192: ...urity Model for the SNMP Group z v1 SNMPv1 is defined for the group In this model the Community Name is used for authentication SNMP v1 can be configured on the SNMP Community page directly z v2c SNMP...

Страница 193: ...p It is multi optional Group Name Displays the Group Name here Security Model Displays the Security Model of the group Security Level Displays the Security Level of the group Read View Displays the Re...

Страница 194: ...ity Level Security Model Select the Security Model for the User Security Level Select the Security Level for the SNMP v3 User Auth Mode Select the Authentication Mode for the SNMP v3 User z None No au...

Страница 195: ...Modify button to apply Note The SNMP User and its Group should have the same Security Model and Security Level 13 1 5 SNMP Community SNMP v1 and SNMP v2c adopt community name authentication The commu...

Страница 196: ...f the Community and then click the Modify button to apply Note The default MIB View of SNMP Community is viewDefault Configuration Procedure z If SNMPv3 is employed please take the following steps Ste...

Страница 197: ...nage the device via the Read View Write View and Notify View defined in the SNMP Group 13 2 Notification With the Notification function enabled the switch can initiatively report to the management sta...

Страница 198: ...level is used z authNoPriv Only the authentication security level is used z authPriv Both the authentication and the privacy security levels are used Type Select the type for the notifications z Trap...

Страница 199: ...tire network so as to enable the network administrator to take the protection measures in time to avoid any network malfunction In addition RMON MIB records network statistics information of network p...

Страница 200: ...screen History Control Table Select Select the desired entry for configuration Index Displays the index number of the entry Port Specify the port from which the history samples were taken Interval Spe...

Страница 201: ...e which determines the act way of the network device in response to an event z None No processing z Log Logging the event z Notify Sending trap messages to the management station z Log Notify Logging...

Страница 202: ...eshold Rising Threshold Enter the rising counter value that triggers the Rising Threshold alarm Rising Event Select the index of the corresponding event which will be triggered if the sampled value is...

Страница 203: ...onding alarm entry Note When alarm variables exceed the Threshold on the same direction continuously for several times an alarm event will only be generated on the first time that is the Rising Alarm...

Страница 204: ...rk layer protocols to learn about each other LLDP MED Link Layer Discovery Protocol for Media Endpoint Devices is an extension of LLDP intended for managing endpoint devices such as Voice over IP phon...

Страница 205: ...ng in TxRx or Rx mode the device will check the validity of the received LLDPDUs and the attached TLVs save this neighbor information to the local device and then set the aging time of this informatio...

Страница 206: ...interface number and OID Object Identifier The management IP address is specified by the user Optional 127 Organizationally Specific Allows different organizations such as IEEE 802 1 IEEE 802 3 IETF...

Страница 207: ...bridge port to advertise the port s VLAN identifier PVID that will be associated with untagged or priority tagged frames Port And Protocol VLAN ID TLV The Port And Protocol VLAN ID TLV allows a bridge...

Страница 208: ...for the local device to transmit LLDPDU to its neighbors The default value is 30 Hold Multiplier Enter a multiplier on the Transmit Interval It determines the actual TTL Time To Live value used in an...

Страница 209: ...Config Port Config to load the following page Figure 14 2 LLDP Port Config The following entries are displayed on this screen LLDP Port Config Port Select Select the desired port to configure Admin St...

Страница 210: ...the local device and its neighbors on the Local Info and Neighbor Info pages respectively 14 2 1 Local Info On this page you can see all ports configuration and system information Choose the menu LLD...

Страница 211: ...Refresh Auto Refresh Enable Disable the auto refresh function Refresh Rate Specify the auto refresh rate Neighbor Info Port Select Click the Select button to quick select the corresponding port based...

Страница 212: ...are displayed on this screen Auto Refresh Auto Refresh Enable Disable the auto refresh function Refresh Rate Specify the auto refresh rate Global Statistics Last Update Displays latest update time of...

Страница 213: ...andard LLDP MED Device Type LLDP MED devices are comprised of two primary device types Network Connectivity Devices and Endpoint Devices Network Connectivity Device Refers to an LLDP MED Device that p...

Страница 214: ...are Revision TLV Software Revision TLV Serial Number TLV Manufacturer Name TLV Model Name TLV and Asset ID TLV If support for any of the TLVs in the Inventory Management set is implemented then suppor...

Страница 215: ...lect Select the desired port to configure LLDP MED Status Configure the port s LLDP MED status z Enable Enable the port s LLDP MED status and the port s Admin Status will be changed to Tx Rx z Disable...

Страница 216: ...rvice ELIN identifier which is used during emergency call setup to a traditional CAMA or ISDN trunk based PSAP Civic Address The Civic address is defined to reuse the relevant sub fields of the DHCP o...

Страница 217: ...to refresh function Refresh Rate Specify the auto refresh rate Local Info Enter the desired port number and click Select to display the information of the corresponding port 14 4 4 Neighbor Info On th...

Страница 218: ...number connecting to the neighbor device Device Type Displays the device type of the neighbor Application Type Displays the application type of the neighbor Application Type indicates the primary fun...

Страница 219: ...e commander of the cluster and the others are member switches The typical topology is as follows Figure 15 1 Cluster topology Cluster Role According to their functions and status in a cluster switches...

Страница 220: ...y used for cluster management configuration including three submenus NDP NTDP and Cluster 15 1 NDP NDP Neighbor Discovery Protocol is used to get the information of the directly connected neighbor dev...

Страница 221: ...Remote Port Displays the port number of the neighbor switch which is connected to the corresponding port Device Name Displays the name of the neighbor switch Device MAC Displays MAC address of the ne...

Страница 222: ...Hello Time Displays the interval to send NDP packets Port Status Port Displays the port number of the switch NDP Displays the NDP status enabled or disabled for the current port Send NDP Packets Disp...

Страница 223: ...re 15 4 NDP Config The following entries are displayed on this screen Global Config NDP Select Enable Disable NDP function globally Aging Time Enter the period for the neighbor switch to keep the NDP...

Страница 224: ...kets and send out response packets at the same time which may result in network congestion and the commander switch overload To avoid the above problem two time parameters are designed to control the...

Страница 225: ...cluster feature disabled Hops Displays the hop count from this device to the switch Neighbor Info Click the Detail button to view the complete information of this device and its neighbors Collect Top...

Страница 226: ...e hop count the switch topology collects NTDP Hop Delay Displays the time between the switch receiving NTDP request packets and the switch forwarding NTDP request packets for the first time NTDP Port...

Страница 227: ...fig NTDP Select Enable Disable NTDP for the switch globally NTDP Interval Time Enter the interval to collect topology information The default is 1 minute NTDP Hops Enter the hop count the switch topol...

Страница 228: ...er automatically based on NDP and NTDP You can manually add the candidate switch to a cluster If the candidate switch is successfully added to the cluster it will get a private IP address assigned by...

Страница 229: ...he commander switch z For an individual switch the following page is displayed Figure 15 11 Cluster Summary for Individual Switch The following entries are displayed on this screen Global Config Clust...

Страница 230: ...role of the switch to be individual switch z For a member switch the following page is displayed Figure 15 13 Cluster Configuration for Member Switch The following entries are displayed on this screen...

Страница 231: ...le for Cluster Function Network Requirements Three switches form cluster one commander switch Here take TP LINK TL SL5428E as an example and two member switches Here take TP LINK TL SG32424P as an exa...

Страница 232: ...tion z Configure the commander switch Step Operation Description 1 Enable NDP function on the switch and for port 1 port 2 and port 3 On Cluster NDP NDP Config page enable NDP function 2 Enable NTDP f...

Страница 233: ...t the member switch and click the Manage button to log on to its Web management page Or On Cluster Cluster Cluster Topology page double click the switch icon to view its detailed information click the...

Страница 234: ...device are available 5 Network Diagnostics Test whether the destination device is reachable and detect the route hops from the switch to the destination device 16 1 System Monitor System Monitor funct...

Страница 235: ...Click the Monitor button to enable the switch to monitor and display its CPU utilization rate every four seconds 16 1 2 Memory Monitor Choose the menu Maintenance System Monitor Memory Monitor to load...

Страница 236: ...ork administrator to monitor network operation and diagnose malfunction The Logs of switch are classified into the following eight levels Severity Level Description emergencies 0 The system is unusabl...

Страница 237: ...Log Log Table to load the following page Figure 16 3 Log Table The following entries are displayed on this screen Log Info Index Displays the index of the log information Time Displays the time when...

Страница 238: ...Select the desired entry to configure the corresponding local log Log Buffer Indicates the RAM for saving system log The inforamtion in the log buffer is displayed on the Log Table page It will be los...

Страница 239: ...rity level value will be sent to the corresponding log host Status Enable Disable the log host Note The Log Server software is not provided If necessary please download it on the Internet 16 2 4 Backu...

Страница 240: ...ates you to locate and diagnose the trouble spot of the network Choose the menu Maintenance Device Diagnostics Cable Test to load the following page Figure 16 7 Cable Test The following entries are di...

Страница 241: ...oopback The following entries are displayed on this screen Loopback Type Internal Select Internal to test whether the port is available External Select External to test whether the device connected to...

Страница 242: ...ze Enter the size of the sending data during Ping testing The default value is recommended Interval Specify the interval to send ICMP request packets The default value is recommended 16 4 2 Tracert Tr...

Страница 243: ...ries are displayed on this screen Tracert Config Destination IP Enter the IP address of the destination device Max Hop Specify the maximum number of the route hops the test data can pass through Retur...

Страница 244: ...0Base T UTP STP of Cat 3 or above 100Base TX UTP STP of Cat 5 or above 100Base FX MMF or SMF SFP Module Optional 1000Base T 4 pair UTP 100m of Cat 5 Cat 5e Cat 6 or above Transmission Medium 1000Base...

Страница 245: ...nual if necessary 1 On the Windows taskbar click the Start button and then click Control Panel 2 Click the Network and Internet Connections icon and then click on the Network Connections tab in the ap...

Страница 246: ...dow by default Figure B 3 6 Select Use the following IP address And the following items will be available If the switch s IP address is 192 168 0 1 specify IP address as 192 168 0 x x is from 2 to 254...

Страница 247: ...he IP network for files transfer 1 Hardware Installation Figure C 1 1 Connect FTP server to port 1 of the switch 2 Connect the Console port of the PC to the switch 3 Save the firmware of the switch in...

Страница 248: ...nal 2 The Connection Description Window will prompt shown as the following figure Enter a name into the Name field and click OK Figure C 3 Connection Description 3 Select the port to connect in the fi...

Страница 249: ...til menu To download firmware to the switch via FTP function you need to enter into the bootUtil menu of the switch and take the following steps 1 Connect the console port of the PC to the console por...

Страница 250: ...an example IP address is 172 31 70 146 the user name and password for login to the FTP server are both 123 the name of the upgrade firmware is tl_sg3424p_up bin The detailed command is shown as the fo...

Страница 251: ...TP LINK start Start User Access Login User Return to CONTENTS 242...

Страница 252: ...t provided on the attached CD for the supplicant Client 1 Installation Guide 1 Insert the provided CD into your CD ROM drive Open the file folder and double click the icon to load the following figure...

Страница 253: ...llowing screen Figure D 4 Choose Destination Location By default the installation files are saved on the Program Files folder of system disk Click the Change button to modify the destination location...

Страница 254: ...tall the Program 6 The InstallShield Wizard is installing TpSupplicant V2 0 shown as the following screen Please wait Figure D 6 Setup Status 7 On the following screen click Finish to complete the ins...

Страница 255: ...go to http www winpcap org to download the latest version of WinPcap for installation 2 Uninstall Software If you want to remove the TpSupplicant please take the following steps 1 On the Windows taskb...

Страница 256: ...the application from your PC Figure D 10 Uninstall the Application 4 Click Finish to complete Figure D 11 Uninstall Complete 3 Configuration 1 After completing installation double click the icon to ru...

Страница 257: ...lient will send the EAPOL Start packets to the switch via multicast and send the 802 1X authentication packets via unicast Obtain an IP address automatically Select this option if the Client automatic...

Страница 258: ...rompt that the Radius server is being searched Figure D 14 Authentication Dialog 4 When passing the authentication the following screen will appear Figure D 15 Successfully Authenticated 5 Double clic...

Страница 259: ...nPcap 4 0 2 or the higher version for installation and run the client software again Q2 Is this TP LINK 802 1X Client Software compliable with the switches of the other manufacturers A2 No This TP LIN...

Страница 260: ...into IP addresses Dynamic Host Control Protocol DHCP Provides a framework for passing configuration information to hosts on a TCP IP network DHCP is based on the Bootstrap Protocol BOOTP adding the ca...

Страница 261: ...sions for VLAN tagging IEEE 802 3x Defines Ethernet frame start stop requests and timers used for flow control on full duplex links Now incorporated in IEEE 802 3 2002 Internet Group Management Protoc...

Страница 262: ...in a hierarchical master slave configuration in order to synchronize local clocks within the subnet and to national time standards via wire or radio Port Authentication See IEEE 802 1X Port Mirroring...

Страница 263: ...etwork Telnet Defines a remote communication facility for interfacing to a terminal device over TCP IP Transmission Control Protocol Internet Protocol TCP IP Protocol suite that includes TCP as the pr...

Отзывы: