TP-LINK TL-SL5428E V2 Uživatelská příručka

Procházejte online nebo si stáhněte Uživatelská příručka pro Síťové přepínače TP-LINK TL-SL5428E V2. TP-Link TL-SL5428E V2 User Guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 259
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - JetStream L2 Managed Switch

TL-SL5428E 24-Port 10/100Mbps + 4-Port Gigabit JetStream L2 Managed Switch REV1.4.0 1910010915

Strany 2 - CE Mark Warning

Package Contents The following items should be found in your box:  One TL-SL5428E switch  One power cord  One console cable  Two mounting bra

Strany 3 - Safety Information

LAG: Displays the LAG number which the port belongs to. Note: 1. Configure the ports connected directly to terminals as edge ports and enable the B

Strany 4

Figure 7-8 Instance Config The following entries are displayed on this screen:  Instance Table Instance ID Select: Click the Select button to qui

Strany 5

Note: In a network with both GVRP and MSTP enabled, GVRP packets are forwarded along the CIST. If you want to broadcast packets of a specific VLAN th

Strany 6

Priority: Enter the priority of the port in the instance. It is an important criterion on determining if the port connected to this port will be cho

Strany 7

 Loop Protect In a stable network, a switch maintains the states of ports by receiving and processing BPDU packets from the upstream switch. Howeve

Strany 8

With BPDU filter function enabled, a port does not receive or forward BPDUs, but it sends out its own BPDUs. Such a mechanism prevents the switch fro

Strany 9

7.4.2 TC Protect When TC Protect is enabled for the port on Port Protect page, the TC threshold and TC protect cycle need to be configured on this pa

Strany 10 - Package Contents

 Configuration Procedure  Configure switch A: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page, configure the link type

Strany 11 - Chapter 1 About This Guide

 Configure switch C: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page, configure the link type of the related ports as Trun

Strany 12

 The configuration procedure for switch E and F is the same with that for switch D.  The topology diagram of the two instances after the topolo

Strany 13

Chapter 1 About This Guide This User Guide contains information for setup and management of TL-SL5428E switch. Please read this guide carefully befo

Strany 14

Chapter 8 Multicast  Multicast Overview In the network, packets are sent in three modes: unicast, broadcast and multicast. In unicast, the source

Strany 15 - Chapter 2 Introduction

 Multicast Address 1. Multicast IP Address: As specified by IANA (Internet Assigned Numbers Authority), Class D IP addresses are used as destinatio

Strany 16 - 2.3 Appearance Description

 IGMP Snooping In the network, the hosts apply to the near Router for joining (leaving) a multicast group by sending IGMP (Internet Group Managemen

Strany 17 - 2.3.2 Rear Panel

3. IGMP Leave Message The host, running IGMPv1, does not send IGMP leave message when leaving a multicast group, as a result, the switch can not get

Strany 18 - 3.2 Configuration

Figure 8-4 Basic Config The following entries are displayed on this screen:  Global Config IGMP Snooping: Select Enable/Disable IGMP Snooping fun

Strany 19 - Figure 3-3 Main Setup-Menu

Figure 8-5 Port Config The following entries are displayed on this screen:  Port Config Port Select: Click the Select button to quick-select the

Strany 20 - Chapter 4 System

Figure 8-6 VLAN Config The following entries are displayed on this screen:  VLAN Config VLAN ID: Enter the VLAN ID to enable IGMP Snooping for th

Strany 21 - Figure 4-2 Port Information

Router Ports: Displays the router port of the VLAN. Note: The settings here will be invalid when multicast VLAN is enabled Configuration procedure:

Strany 22 - 4.1.3 System Time

The following entries are displayed on this screen:  Multicast VLAN Multicast VLAN: Select Enable/Disable Multicast VLAN feature. VLAN ID: Enter

Strany 23 - 4.1.4 Daylight Saving Time

Step Operation Description 3 Configure parameters for multicast VLAN Optional. Enable and configure a multicast VLAN on the Multicast→IGMP Snooping

Strany 24 - 4.1.5 System IP

Chapter Introduction Chapter 4 System This module is used to configure system properties of the switch. Here mainly introduces:  System Info: Con

Strany 25 - Figure 4-7 System IP

Step Operation Description 2 Configure ports On VLAN→802.1Q VLAN function pages. For port 3, configure its link type as GENERAL and its egress rul

Strany 26 - 4.2 User Management

The following entries are displayed on this screen:  Search Option Multicast IP: Enter the multicast IP address the desired entry must carry. VLAN

Strany 27 - 4.3 System Tools

The following entries are displayed on this screen:  Create Static Multicast Multicast IP: Enter static multicast IP address. VLAN ID: Enter the

Strany 28 - 4.3.2 Config Backup

Figure 8-10 Multicast Filter The following entries are displayed on this screen:  Create IP-Range IP Range ID: Enter the IP-range ID. Start Multi

Strany 29 - 4.3.4 System Reboot

Figure 8-11 Port Filter The following entries are displayed on this screen:  Port Filter Config Port Select: Click the Select button to quick-sel

Strany 30 - 4.4 Access Security

Configuration Procedure: Step Operation Description 1 Configure IP-Range Required. Configure IP-Range to be filtered on Multicast→Multicast Filter

Strany 31 - Figure 4-15 Access Control

Port: Displays the port number of the switch. Query Packet: Displays the number of query packets the port received. Report Packet (V1): Displays t

Strany 32 - 4.4.2 SSL Config

Query Interval: Enter the time interval of sending a general query frame by IGMP Snooping Querier. Max Response Time: Enter the maximal time for the

Strany 33 - 4.4.3 SSH Config

Chapter 9 QoS QoS (Quality of Service) functions to provide different quality of service for various network applications and requirements and optim

Strany 34 - Figure 4-17 SSH Config

2. 802.1P Priority Figure 9-2 802.1Q frame As shown in the figure above, each 802.1Q Tag has a Pri field, comprising 3 bits. The 3-bit priority fie

Strany 35

Chapter Introduction Chapter 8 Multicast This module is used to configure multicast function of the switch. Here mainly introduces:  IGMP Snoopin

Strany 36

Figure 9-4 SP-Mode 2. WRR-Mode: Weight Round Robin Mode. In this mode, packets in all the queues are sent in order based on the weight value for ea

Strany 37

9.1 DiffServ This switch classifies the ingress packets, maps the packets to different priority queues and then forwards the packets according to sp

Strany 38

Configuration Procedure: Step Operation Description 1 Select the port priority Required. On QoS→DiffServ→Port Priority page, configure the port

Strany 39 - Chapter 5 Switching

 Priority Level DSCP: Indicates the priority determined by the DS region of IP datagram. It ranges from 0 to 63. Priority Level: Indicates the

Strany 40 - 5.1.2 Port Mirror

The following entries are displayed on this screen:  802.1P Priority Config 802.1P Priority: Select Enable/Disable 802.1P Priority.  Priority an

Strany 41 - 5.1.3 Port Security

WRR-Mode: Weight Round Robin Mode. In this mode, packets in all the queues are sent in order based on the weight value for each queue. The weight va

Strany 42 - Figure 5-3 Port Security

The following entries are displayed on this screen:  Rate Limit Config Port Select: Click the Select button to quick-select the corresponding port

Strany 43 - 5.1.4 Port Isolation

Figure 9-11 Storm Control The following entries are displayed on this screen:  Storm Control Config Port Select: Click the Select button to quick

Strany 44 - 5.1.5 Loopback Detection

9.3 Voice VLAN Voice VLANs are configured specially for voice data stream. By configuring Voice VLANs and adding the ports with voice devices attach

Strany 45 - 5.2 LAG

Port Voice VLAN Mode Voice Stream Type Link type of the port and processing mode ACCESS: Not supported. TRUNK: Supported. The default VLAN of the p

Strany 46 - 5.2.1 LAG Table

Chapter Introduction Chapter 12 SNMP This module is used to configure SNMP function to provide a management frame to monitor and maintain the netwo

Strany 47 - 5.2.2 Static LAG

Note: Don’t transmit voice stream together with other business packets in the voice VLAN except for some special requirements. The Voice VLAN functio

Strany 48 - 5.2.3 LACP Config

Figure 9-13 Port Config Note: To enable voice VLAN function for the LAG member port, please ensure its member state accords with its port mode. If a

Strany 49 - Figure 5-9 LACP Config

LAG: Displays the LAG number which the port belongs to. 9.3.3 OUI Config The switch supports OUI creation and adds the MAC address of the special vo

Strany 50 - 5.3 Traffic Monitor

the port configure the link type of ports of the voice device. Step Operation Description 2 Create VLAN Required. On VLAN→802.1Q VLAN→Port Confi

Strany 51 - 5.3.2 Traffic Statistics

Chapter 10 ACL ACL (Access Control List) is used to filter packets by configuring match rules and process policies of packets in order to control th

Strany 52 - 5.4 MAC Address

10.1.2 Time-Range Create On this page you can create time-ranges. Choose the menu ACL→Time-Range→Time-Range Create to load the following page. Figu

Strany 53 - 5.4.1 Address Table

10.1.3 Holiday Config Holiday mode is applied as a different secured access control policy from the week mode. On this page you can define holidays

Strany 54 - 5.4.2 Static Address

Choose the menu ACL→ACL Config→ACL Summary to load the following page. Figure 10-4 ACL Summary The following entries are displayed on this screen: 

Strany 55 - 5.4.3 Dynamic Address

Choose the menu ACL→ACL Config→MAC ACL to load the following page. Figure10-6 Create MAC Rule The following entries are displayed on this screen: 

Strany 56 - Figure 5-14 Dynamic Address

Figure10-7 Create Standard-IP Rule The following entries are displayed on this screen:  Create Standard-IP Rule ACL ID: Select the desired Standa

Strany 57 - 5.4.4 Filtering Address

Chapter 2 Introduction Thanks for choosing the TL-SL5428E 24-Port 10/100Mbps + 4-Port Gigabit JetStream L2 Managed Switch! 2.1 Overview of the Swit

Strany 58 -  Filtering Address Table

Figure10-8 Create Extend-IP Rule The following entries are displayed on this screen:  Create Extend-IP Rule ACL ID: Select the desired Extend-IP

Strany 59 - Chapter 6 VLAN

S-Port: Configure TCP/IP source port contained in the rule when TCP/UDP is selected from the pull-down list of IP Protocol. D-Port: Configure TCP/I

Strany 60 - 6.1 802.1Q VLAN

Operation: Click the Edit button to modify the action. 10.3.2 Policy Create On this page you can create the policy. Choose the menu ACL→Policy Conf

Strany 61 - 6.1.1 VLAN Config

S-Mirror: Select S-Mirror to mirror the data packets in the policy to the specific port. S-Condition: Select S-Condition to limit the transmission

Strany 62 -  VLAN Table

 Policy Bind Table Select: Select the desired entry to delete the corresponding binding policy.Index: Displays the index of the binding policy. P

Strany 63 - 6.1.2 Port Config

Figure10-14 Bind the policy to the VLAN The following entries are displayed on this screen:  VLAN-Bind Config Policy Name: Select the name of

Strany 64 -  VLAN Port Config

 Network Diagram  Configuration Procedure Step Operation Description 1 Configure Time-range On ACL→Time-Range page, create a time-range name

Strany 65 - 6.2 MAC VLAN

Step Operation Description 3 Configure for requirement 2 and 4 On ACL→ACL Config→ACL Create page, create ACL 100. On ACL→ACL Config→Standard-IP A

Strany 66 - 6.2.1 MAC VLAN

Chapter 11 Network Security Network Security module is to provide the multiple protection measures for the network security, including five submenus

Strany 67 - 6.3 Protocol VLAN

The following entries are displayed on this screen:  Search Option Source: Select a Source from the pull-down list and click the Searchbutton to v

Strany 68 - 6.3.1 Protocol VLAN

 Manageability + IP Clustering provides high scalability and easy Single-IP-Management. + Supports Telnet, CLI, SNMP v1/v2c/v3, RMON and web access

Strany 69 - 6.3.2 Protocol Template

Figure 11-2 Manual Binding The following entries are displayed on this screen:  Manual Binding Option Host Name: Enter the Host Name. IP Address:

Strany 70 - 6.3.3 Port Enable

address of the Host on Network layer. MAC address, the address of the Host on Data link layer, is necessary for the packet to reach the very device.

Strany 71

Figure 11-4 ARP Scanning The following entries are displayed on this screen:  Scanning Option Start IP Address: Specify the Start IP Address. E

Strany 72

 DHCP Working Principle DHCP works via the “Client/Server” communication mode. The Client applies to the Server for configuration. The Server assig

Strany 73 -  Configure switch C

(2) DHCP-OFFER Stage: Upon receiving the DHCP-DISCOVER packet, the DHCP Server selects an IP address from the IP pool according to the assigning pri

Strany 74

Figure 11-7 DHCP Cheating Attack Implementation Procedure DHCP Snooping feature only allows the port connected to the DHCP Server as the trusted por

Strany 75 - 6.7 VLAN VPN

Figure 11-8 DHCP Snooping Note: If you want to enable the DHCP Snooping feature for the member port of LAG, please ensure the parameters of all the

Strany 76 - 6.7.2 VLAN Mapping

Decline Flow Control: Select the value to specify the Decline Flow Control. The trafficflow of the corresponding port will be limited to be this val

Strany 77 - 6.7.3 Port Enable

ARP, such as imitating Gateway, cheating Gateway, cheating terminal Hosts and ARP Flooding Attack, frequently occur to the network, especially to the

Strany 78

Figure 11-10 ARP Attack – Cheating Gateway As the above figure shown, the attacker sends the fake ARP packets of Host A to the Gateway, and then the

Strany 79 - 6.8 GVRP

2.3.2 Rear Panel The rear panel of TL-SL5428E features a power socket and a Grounding Terminal (marked with). Figure 2-2 Rear Panel  Grounding Ter

Strany 80 -  GVRP

As the above figure shown, the attacker sends the fake ARP packets of Host A to Host B, and then Host B will automatically update its ARP table after

Strany 81 - Figure 6-15 GVRP Config

 ARP Flooding Attack The attacker broadcasts a mass of various fake ARP packets in a network segment to occupy the network bandwidth viciously, whi

Strany 82 - 6.9 Private VLAN

 Trusted Port Trusted Port: Select the port for which the ARP Detect function is unnecessaryas the Trusted Port. The specific ports, such as up-li

Strany 83

Figure 11-14 ARP Defend The following entries are displayed on this screen:  ARP Defend Port Select: Click the Select button to quick-select the

Strany 84 - Figure 6-16

Figure 11-15 ARP Statistics The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disable the Auto Refresh featu

Strany 85

Figure 11-16 IP Source Guard The following entries are displayed on this screen:  IP Source Guard Config Port Select: Click the Select button to

Strany 86 - 6.9.1 PVLAN Config

packets may incur a breakdown of the network. The switch can defend several types of DoS attack listed in the following table. DoS Attack Type Des

Strany 87 - 6.9.2 Port Config

11.4.1 DoS Defend On this page, you can enable the DoS Defend type appropriate to your need. Choose the menu Network Security→DoS Defend→DoS Defend

Strany 88

Figure 11-18 DoS Detect The following entries are displayed on this screen:  Detect Config Detect Time: Specify the detect time for each DoS atta

Strany 89

Figure 11-19 Architecture of 802.1X authentication (1) Supplicant System: The supplicant system is an entity in LAN and is authenticated by the aut

Strany 90

Chapter 3 Login to the Switch 3.1 Login 1) To access the configuration utility, open a web-browser and type in the default address http://192.168.0

Strany 91 - Chapter 7 Spanning Tree

can also launch an 802.1X client program to initiate an 802.1X authentication through the sending of an EAPOL-Start packet to the switch, This TP-L

Strany 92 - Figure 7-1 Basic STP diagram

6. The RADIUS server compares the received encrypted password (contained in a RADIUS Access-Request packet) with the locally-encrypted password. If t

Strany 93 - Table 7-1 Comparing BPDUs

the authentication request packet if the RADIUS server fails to respond in the specified timeout period. (3) Quiet-period timer (Quiet Period): This

Strany 94

The following entries are displayed on this screen:  Global Config 802.1X: Enable/Disable the 802.1X function. Auth Method: Select the Authentica

Strany 95 - 7.1 STP Config

Figure 11-23 Port Config The following entries are displayed on this screen:  Port Config Port Select: Click the Select button to quick-select t

Strany 96 - Figure 7-4 STP Config

11.5.3 Radius Server RADIUS (Remote Authentication Dial-In User Service) server provides the authentication service for the switch via the stored

Strany 97 - 7.1.2 STP Summary

Note: 1. The 802.1X function takes effect only when it is enabled globally on the switch and for the port. 2. The 802.1X function can not be enable

Strany 98 - 7.2 Port Config

Chapter 12 SNMP  SNMP Overview SNMP (Simple Network Management Protocol) has gained the most extensive application on the UDP/IP networks. SNMP pr

Strany 99 -  Port Config

failing to pass community name authentication are discarded. The community name can limit access to SNMP Agent from SNMP NMS, functioning as a passwo

Strany 100 - 7.3 MSTP Instance

SNMP module is used to configure the SNMP function of the switch, including three submenus: SNMP Config, Notification and RMON. 12.1 SNMP Config The

Strany 101 - Figure 7-8 Instance Config

Figure 3-3 Main Setup-Menu Note: Clicking Apply can only make the new configurations effective before the switch is rebooted. If you want to keep th

Strany 102 - 7.3.3 Instance Port Config

12.1.2 SNMP View The OID (Object Identifier) of the SNMP packets is used to describe the managed objects of the switch, and the MIB (Management Info

Strany 103 - 7.4 STP Security

Figure 12-5 SNMP Group The following entries are displayed on this screen:  Group Config Group Name: Enter the SNMP Group name. The Group Name, S

Strany 104 -  Root Protect

 Group Table Select: Select the desired entry to delete the corresponding group. It'smulti-optional. Group Name: Displays the Group Name her

Strany 105 - Figure 7-10 Port Protect

User Type: Select the type for the User.  Local User: Indicates that the user is connected to a local SNMP engine.  Remote User: Indicates that

Strany 106 - 7.4.2 TC Protect

12.1.5 SNMP Community SNMP v1 and SNMP v2c adopt community name authentication. The community name can limit access to the SNMP agent from SNMP netw

Strany 107 -  Configure switch B:

Configuration Procedure:  If SNMPv3 is employed, please take the following steps: Step Operation Description 1 Enable SNMP function globally. Re

Strany 108 -  Configure switch D:

12.2 Notification With the Notification function enabled, the switch can initiatively report to the management station about the important events tha

Strany 109

Type: Select the type for the notifications.  Trap: Indicates traps are sent.  Inform: Indicates informs are sent. The Inform type has a higher

Strany 110 - Chapter 8 Multicast

RMON Group Function History Group After a history group is configured, the switch collects and records network statistics information periodically,

Strany 111 -  Multicast Address Table

12.3.2 Event Config On this page, you can configure the RMON events. Choose the menu SNMP→RMON→Event Config to load the following page. Figure 12-1

Strany 112 - 8.1 IGMP Snooping

COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other

Strany 113 - 8.1.1 Snooping Config

Chapter 4 System The System module is mainly for system configuration of the switch, including four submenus: System Info, User Management, System T

Strany 114 - 8.1.2 Port Config

Figure 12-11 Alarm Config The following entries are displayed on this screen:  Alarm Table Select: Select the desired entry for configuration. In

Strany 115 - 8.1.3 VLAN Config

Owner: Enter the name of the device or user that defined the entry. Status: Select Enable/Disable the corresponding alarm entry. Note: When alarm v

Strany 116 - Figure 8-6 VLAN Config

Chapter 13 LLDP LLDP (Link Layer Discovery Protocol) is a Layer 2 protocol that is used for network devices to advertise their own device informatio

Strany 117 - 8.1.4 Multicast VLAN

 Disable: the port cannot transmit or receive LLDPDUs. 2) LLDPDU transmission mechanism  If the ports are working in TxRx or Tx mode, they will a

Strany 118 - Configuration procedure:

TLV Type TLV Name Description Usage in LLDPDU 3 Time To Live Indicates the number of seconds that the neighbor device is to regard the local infor

Strany 119 -  Network Diagram

System Name TLV The System Name TLV allows network management to advertise the system's assigned name, which should be the system's fully

Strany 120 - 8.3 Multicast IP

Figure 13-1 Global Configuration The following entries are displayed on this screen:  Global Config LLDP: Enable/disable LLDP function globally.

Strany 121 - 8.3.2 Static Multicast IP

Figure 13-2 Port Configuration The following entries are displayed on this screen:  LLDP Port Config Port Select: Select the desired port to conf

Strany 122 - 8.4 Multicast Filter

Figure 13-3 Local Information The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disable the auto refresh fu

Strany 123 - 8.4.2 Port Filter

The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disable the auto refresh function. Refresh Rate: Specify t

Strany 124 - Figure 8-11 Port Filter

Indicates the 1000Mbps port is at the speed of 10Mbps or 100Mbps. Indicates the SFP port is not connected to a device. Indicates the SFP port is a

Strany 125 - 8.5 Packet Statistics

Figure 13-5 Device Statistics The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disable the auto refresh fun

Strany 126 - 8.6 Querier

Receive Total: Displays the number of LLDPDUs received by this port. Discards: Displays the number of LLDPDUs discarded by this port. Errors: Di

Strany 127

Chapter 14 Cluster With the development of network technology, the network scale is getting larger and more network devices are required, which may

Strany 128 - Chapter 9 QoS

 The commander switch discovers and determines candidate switches by collecting related information.  After being added to the cluster, the candi

Strany 129 - Figure 9-3 IP datagram

 Neighbor Search Option: Select the information the desired entry should contain and then click the Search button to display the desired entry in

Strany 130 - Figure 9-5 WRR-Mode

The following entries are displayed on this screen:  Global Config NDP: Displays the global NDP status (enabled or disabled) for the switch. Aging

Strany 131 - 9.1 DiffServ

Figure 14-4 NDP Config The following entries are displayed on this screen:  Global Config NDP: Select Enable/Disable NDP function globally. Aging

Strany 132 - 9.1.2 DSCP Priority

14.2 NTDP NTDP (Neighbor Topology Discovery Protocol)is used for the commander switch to collect NDP information. NTDP transmits and forwards NTDP to

Strany 133 - 9.1.3 802.1P/CoS Mapping

Neighbor Info: Click the Detail button to view the complete information of this device and its neighbors. Collect Topology: Click the Collect Topol

Strany 134 - 9.1.4 Schedule Mode

Figure 14-7 NTDP Summary The following entries are displayed on this screen:  Global Config NTDP: Displays the NTDP status (enabled or disabled)

Strany 135 - 9.2 Bandwidth Control

4.1.2 Device Description On this page you can configure the description of the switch, including device name, device location and system contact. Cho

Strany 136 - 9.2.2 Storm Control

Figure 14-8 NTDP Config The following entries are displayed on this screen:  Global Config NTDP: Select Enable/Disable NTDP for the switch globa

Strany 137 - Figure 9-11 Storm Control

NTDP: Displays NTDP status (enabled or disabled) of the current port. Enable: Click the Enable button to enable NTDP feature for the port you selec

Strany 138 - 9.3 Voice VLAN

 For a commander switch,the following page is displayed: Figure 14-10 Cluster Summary for Commander Switch The following entries are displayed on

Strany 139

Hops: Displays the hop count from the member switch to the commander switch.  For a member switch, the following page is displayed: Figure 14-11

Strany 140 - 9.3.2 Port Config

 For a candidate switch, the following page is displayed. Figure 14-13 Cluster Configuration for Candidate Switch The following entries are displa

Strany 141 - Figure 9-13 Port Config

 Current Role Role: Displays the role the current switch plays in the cluster.  Role Change Candidate: Select this option to change the role of

Strany 142 - 9.3.3 OUI Config

The following entries are displayed on this screen:  Current Role Role: Displays the role the current switch plays in the cluster.  Role Change

Strany 143

14.3.4 Cluster Topology On this page you can see the whole cluster topology. Click the node switch to directly log on to the corresponding Web manag

Strany 144 - Chapter 10 ACL

 If the switch is a commander switch in the cluster, please take the following steps. Step Operation Description 1 Enable the NDP function globa

Strany 145 - 10.1.2 Time-Range Create

14.4 Batch Management The Batch Management function allows you to manage the switches in cluster. With a TFTP server set, you can backup the current

Strany 146 - 10.2 ACL Config

The following entries are displayed on this screen:  Time Info Current System Date: Displays the current date and time of the switch. Current Time

Strany 147 - 10.2.3 MAC ACL

Figure 14-20 Status The following entries are displayed on this screen:  Status Select: Select the desired switch and click the cancel button to

Strany 148 - 10.2.4 Standard-IP ACL

The following entries are displayed on this screen:  Create Time-Segment Name: Enter the name of the time-segment. Absolute: Select Absolute and

Strany 149 - 10.2.5 Extend-IP ACL

Chapter 15 Maintenance Maintenance module, assembling the commonly used system tools to manage the switch, provides the convenient method to locate

Strany 150 -  Deny: Discard Packets

15.1.2 Memory Monitor Choose the menu Maintenance→System Monitor→Memory Monitor to load the following page. Figure 15-2 Memory Monitor Click the Mo

Strany 151 - 10.3 Policy Config

The Log function is implemented on the Log Table, Local Log, Remote Log and Backup Log pages. 15.2.1 Log Table The switch supports logs output to t

Strany 152 - 10.3.3 Action Create

15.2.2 Local Log Local Log is the log information saved in switch. By default, all system logs are saved in log buffer and the logs with severities

Strany 153 - 10.4 Policy Binding

Figure 15-5 Log Host The following entries are displayed on this screen:  Log Host Index: Displays the index of the log host. The switch supports

Strany 154 - 10.4.3 VLAN Binding

Backup Log: Click the Backup Log button to save the log as a file to your computer. Note: It will take a few minutes to backup the log file. Please

Strany 155 - Configuration Procedure:

4. If the port is 100Mbps and its connection status is normal, cable test can’t get the length of the cable. 15.3.2 Loopback Loopback test function

Strany 156

Choose the menu Maintenance→Network Diagnostics→Ping to load the following page. Figure 15-9 Ping The following entries are displayed on this screen

Strany 157

The following entries are displayed on this screen:  DST Config DST Status: Enable or Disable DST. Predefined Mode: Select a predefined DST confi

Strany 158 - Chapter 11 Network Security

Figure 15-10 Tracert The following entries are displayed on this screen:  Tracert Config Destination IP: Enter the IP address of the destinatio

Strany 159 - 11.1.2 Manual Binding

Chapter 16 System Maintenance via FTP The firmware can be downloaded to the switch via FTP function. FTP (File Transfer Protocol), a protocol in the

Strany 160 - 11.1.3 ARP Scanning

2) The Connection Description Window will prompt shown as Figure 16-3. Enter a name into the Name field and click OK. Figure 16-3 Connection Descrip

Strany 161

Figure 16-5 Port Settings 3. Download Firmware via bootrom menu To download firmware to the switch via FTP function, you need to enter into the boo

Strany 162 - 11.1.4 DHCP Snooping

[TL-SL5428E]: ifconfig ip 10.10.70.22 mask 255.255.255.0 gateway 10.10.70.1 4) Configure the parameters of the FTP server which keeps the upgrade fir

Strany 163 -  DHCP Working Principle

Appendix A: Specifications IEEE802.3 10Base-T Ethernet IEEE802.3u 100Base-TX/100Base-FX Fast Ethernet IEEE802.3ab 1000Base-T Gigabit Ethernet IEEE802

Strany 164 -  DHCP Cheating Attack

Appendix B: Configuring the PCs In this section, we’ll introduce how to install and configure the TCP/IP correctly in Windows 2000. First make sure y

Strany 165

238 5) The following TCP/IP Properties window will display and the IP Address tab is open on this window by default. Figure B-3 6) Select Use the fo

Strany 166 - Figure 11-8 DHCP Snooping

Appendix C: 802.1X Client Software In 802.1X mechanism, the supplicant Client should be equipped with the corresponding client software complied with

Strany 167 - 11.2 ARP Inspection

Figure C-3 Welcome to the InstallShield Wizard 4. To continue, choose the destination location for the installation files and click Next on the fol

Strany 168 -  Cheating Gateway

Figure 4-7 System IP The following entries are displayed on this screen:  IP Config MAC Address: Displays MAC Address of the switch. IP Address M

Strany 169 -  Cheating Terminal Hosts

Figure C-5 Install the Program 6. The InstallShield Wizard is installing TpSupplicant shown as the following screen. Please wait. Figure C-6 Setup

Strany 170 -  Man-In-The-Middle Attack

Figure C-7 InstallShield Wizard Complete Note: Please pay attention to the tips on the above screen. If you have not installed WinPcap 4.0.2 or the

Strany 171 - 11.2.1 ARP Detect

2. Then the following screen will appear. If you want to stop the remove process, click Cancel. Figure C-9 Preparing Setup 3. On the continued scre

Strany 172 - 11.2.2 ARP Defend

Figure C-12 TP-LINK 802.1X Client Enter the Name and the Password specified in the Authentication Server. The length of Name and Password should be

Strany 173 - 11.2.3 ARP Statistics

3. To continue, click Connect button after entering the Name and Password on Figure C-12. Then the following screen will appear to prompt that the Ra

Strany 174 - 11.3 IP Source Guard

246 A1: It’s because the supported DLL file is missing. You are suggested to go to http://www.winpcap.org to download WinPcap 4.0.2 or the higher ve

Strany 175 - 11.4 DoS Defend

Appendix D: Glossary Access Control List (ACL) ACLs can limit network traffic and restrict access to certain users or devices by checking each packet

Strany 176

Generic Multicast Registration Protocol (GMRP) GMRP allows network devices to register end stations with multicast groups. GMRP requires that any par

Strany 177 - 11.4.2 DoS Detect

Layer 2 Data Link layer in the ISO 7-Layer Data Communications Protocol. This is related directly to the hardware interface for network devices and p

Strany 178 - 11.5 802.1X

250 Secure Shell (SSH) A secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptographic key, and e

Strany 179

5. By default, the IP address is 192.168.0.1. 4.2 User Management User Management functions to configure the user name and password for users to lo

Strany 180

The following entries are displayed on this screen:  User Info User Name: Create a name for users’ login. Access Level: Select the access level t

Strany 181 -  802.1X Timer

Figure 4-10 Config Restore The following entries are displayed on this screen:  Config Restore Restore Config: Click the Restore Config button to

Strany 182 - 11.5.1 Global Config

Note: It will take a few minutes to backup the configuration. Please wait without any operation. 4.3.3 Firmware Upgrade The switch system can be upgr

Strany 183 - 11.5.2 Port Config

II Safety Information  When product has power button, the power button is one of the way to shut off the product; When there is no power button,

Strany 184 - Figure 11-23 Port Config

4.3.5 System Reset On this page you can reset the switch to the default. All the settings will be cleared after the switch is reset. Choose the menu

Strany 185 - 11.5.3 Radius Server

Figure 4-15 Access Control The following entries are displayed on this screen:  Access Control Config Control Mode: Select the control mode for u

Strany 186

 Access User Number Number Control; Select Enable/Disable the Number Control function. Admin Number: Enter the maximum number of the users logging

Strany 187 - Chapter 12 SNMP

The following entries are displayed on this screen:  Global Config SSL: Select Enable/Disable the SSL function on the switch.  Certificate Down

Strany 188 -  MIB Introduction

Figure 4-17 SSH Config The following entries are displayed on this screen:  Global Config SSH: Select Enable/Disable SSH function. Protocol V1:

Strany 189 - 12.1 SNMP Config

Application Example 1 for SSH:  Network Requirements 1. Log on to the switch via password authentication using SSH and the SSH function is enabled

Strany 190 - 12.1.3 SNMP Group

Note: 1. The key length is in the range of 256 to 3072 bits. 2. During the key generation, randomly moving the mouse quickly can accelerate the

Strany 191 - Figure 12-5 SNMP Group

3. On the Web management page of the switch, download the public key file saved in the computer to the switch. Note: 1. The key type should accor

Strany 192 - 12.1.4 SNMP User

29 After successful authentication, please enter the login user name. If you log on to the switch without entering password, it indicates that the ke

Strany 193 -  User Table

Chapter 5 Switching Switching module is used to configure the basic functions of the switch, including four submenus: Port, LAG, Traffic Monitor and

Strany 194 - 12.1.5 SNMP Community

CONTENTS Package Contents...1

Strany 195

Status: Allows you to Enable/Disable the port. When Enable is selected, the port can forward the packets normally. Speed and Duplex: Select the S

Strany 196 - 12.2 Notification

The following entries are displayed on this screen.  Mirroring Port Mirroring Port: Select a port from the pull-down list as the mirroring port. W

Strany 197 - 12.3 RMON

Figure 5-3 Port Security The following entries are displayed on this screen:  Port Security Select: Select the desired port for Port Security con

Strany 198 - 12.3.1 History Control

5.1.4 Port Isolation Port Isolation provides a method of restricting traffic flow to improve the network security by forbidding the port to forward p

Strany 199 - 12.3.3 Alarm Config

5.1.5 Loopback Detection With loopback detection feature enabled, the switch can detect loops using loopback detection packets. When a loop is detect

Strany 200 - Figure 12-11 Alarm Config

 Port Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select th

Strany 201

If the LAG is needed, you are suggested to configure the LAG function here before configuring the other functions for the member ports. Tips: 1. Ca

Strany 202 - Chapter 13 LLDP

Description: Displays the description of LAG. Member: Displays the LAG member. Operation: Allows you to view or modify the information for each LA

Strany 203

The following entries are displayed on this screen:  LAG Config Group Number: Select a Group Number for the LAG. Description: Give a descriptio

Strany 204

Figure 5-9 LACP Config The following entries are displayed on this screen:  Global Config System Priority: Specify the system priority for the sw

Strany 205 - 13.1 Basic Config

5.1.1 Port Config ...30 5.1.2 Port Mirror ...

Strany 206 - 13.1.2 Port Config

Status: Enable/Disable the LACP feature for your selected port. LAG: Displays the LAG number which the port belongs to. 5.3 Traffic Monitor The Tr

Strany 207 - 13.2 Device Info

Packets Tx: Displays the number of packets transmitted on the port. Octets Rx: Displays the number of octets received on the port. The error octe

Strany 208 - 13.2.2 Neighbor Info

Sent: Displays the details of the packets transmitted on the port. Broadcast: Displays the number of good broadcast packets received or transmitted

Strany 209 - 13.3 Device Statistics

Type Configuration Way Aging outBeing kept after reboot (if the configuration is saved) Relationship between the bound MAC address and the port Sta

Strany 210 -  Neighbor Statistics

Type: Select the type of your desired entry.  All: This option allows the address table to display all theaddress entries.  Static: This option

Strany 211

The following entries are displayed on this screen:  Create Static Address MAC Address: Enter the static MAC Address to be bound. VLAN ID: En

Strany 212 - Chapter 14 Cluster

On this page, you can configure the dynamic MAC address entry. Choose the menu Switching→MAC Address→Dynamic Address to load the following page. Fig

Strany 213 - 14.1 NDP

Bind: Click the Bind button to bind the MAC address of your selected entryto the corresponding port statically. Tips: Setting aging time properly h

Strany 214 - 14.1.2 NDP Summary

49  Filtering Address Table Select: Select the entry to delete the corresponding filtering address. It ismulti-optional. MAC Address: Displays

Strany 215 - 14.1.3 NDP Config

Chapter 6 VLAN The traditional Ethernet is a data network communication technology basing on CSMA/CD (Carrier Sense Multiple Access/Collision Detect

Strany 216 - Figure 14-4 NDP Config

6.9.1 PVLAN Config...77 6.9.2 Port Config ...

Strany 217 - 14.2 NTDP

6.1 802.1Q VLAN VLAN tags in the packets are necessary for the switch to identify packets of different VLANs. The switch works at the data link laye

Strany 218 - 14.2.2 NTDP Summary

 PVID PVID (Port Vlan ID) is the default VID of the port. When the switch receives an un-VLAN-tagged packet, it will add a VLAN tag to the packet a

Strany 219 - 14.2.3 NTDP Config

To ensure the normal communication of the factory switch, the default VLAN of all ports is set to VLAN1. The following entries are displayed on this

Strany 220 - Figure 14-8 NTDP Config

The following entries are displayed on this screen:  VLAN Config VLAN ID: Enter the ID number of VLAN. Description: Give a description to the VLA

Strany 221 - 14.3 Cluster

Figure 6-5 802.1Q VLAN – Port Config The following entries are displayed on this screen:  VLAN Port Config Port Select: Click the Select button

Strany 222 -  Member Info

Click the Detail button to view the information of the corresponding VLAN. Figure 6-6 View the Current VLAN of Port The following entries are displa

Strany 223 - 14.3.2 Cluster Config

received port. Thus, the packet is assigned automatically to the corresponding VLAN for transmission. 2. When receiving tagged packet, the switch w

Strany 224

6.2.2 Port Enable On this page, you can enable the port for the MAC VLAN feature. Only the port is enabled, can the configured MAC VLAN take effect.

Strany 225

Protocol Type Type value IPX 0x8137 IS-IS 0x8000 LACP 0x8809 802.1X 0x888E Table 6-2 Protocol types in common use The packet in Protocol VLAN is pro

Strany 226 - 14.3.3 Member Config

 Protocol VLAN Table Select: Select the desired entry. It is multi-optional. Protocol: Displays the protocol template of the VLAN. Ether Type: D

Strany 227 - 14.3.4 Cluster Topology

9.2 Bandwidth Control ...126 9.2.1 Rate Limit...

Strany 228

6.3.3 Port Enable On this page, you can enable the port for the Protocol VLAN feature. Only the port is enabled, can the configured Protocol VLAN tak

Strany 229 - 14.4 Batch Management

 Switch B is connecting to PC B and Server A;  PC A and Server A is in the same VLAN;  PC B and Server B is in the same VLAN;  PCs in the two

Strany 230 - 14.4.3 Time-Segment Config

6.5 Application Example for MAC VLAN  Network Requirements  Switch A and switch B are connected to meeting room A and meeting room B respectivel

Strany 231 -  Time-Segment Table

Step Operation Description 4 Configure MAC VLAN 10 On VLAN→MAC VLAN→MAC VLAN page, create MAC VLAN10 with the MAC address as 00-19-56-8A-4C-71. 5

Strany 232 - Chapter 15 Maintenance

 IP host, in VLAN10, is served by IP server while AppleTalk host is served by AppleTalk server;  Switch B is connected to IP server and AppleTalk

Strany 233 - 15.2 Log

Step Operation Description 4 Create Protocol Temp l ate Required. On VLAN→Protocol VLAN→Protocol Template page, configure the protocol template pr

Strany 234 - 15.2.1 Log Table

Protocol type Value LACP 0x8809 802.1X 0x888E Table 6-3 Values of Ethernet frame protocol type in common use This VLAN VPN function is implemented o

Strany 235 - 15.2.3 Remote Log

Choose the menu VLAN→VLAN VPN→VLAN Mapping to load the following page. Figure 6-13 Create VLAN Mapping Entry The following entries are displayed on

Strany 236 - 15.2.4 Backup Log

Figure 6-14 Enable VLAN Mapping for Port Select your desired port for VLAN Mapping function. All the ports are disabled for VLAN Mapping function by

Strany 237 - 15.3 Device Diagnostics

Step Operation Description 3 Create SP (Service Provider) VLAN Optional. On the VLAN→802.1Q VLAN page, create the SP VLAN. For the steps of creat

Strany 238 - 15.4 Network Diagnostics

11.3 IP Source Guard ...165 11.4 DoS Defend ...

Strany 239 - 15.4.2 Tracert

 LeaveAll Timer: Once a GARP entity starts up, it starts the LeaveAll timer, and sends out a LeaveAll message after the timer times out, so that ot

Strany 240 - Figure 15-10 Tracert

Figure 6-15 GVRP Config Note: If the GVRP feature is enabled for a member port of LAG, please ensure all the member ports of this LAG are set to be

Strany 241 - 1. Hardware Installation

LeaveAll Timer: Once the LeaveAll Timer is set, the port with GVRP enabled can send a LeaveAll message after the timer times out, so that other GARP

Strany 242

Private VLAN technology is mainly used in campus or enterprise networks to achieve user layer-2-separation and to save VLAN resources of uplink devic

Strany 243 - Figure 16-6 bootrom Menu

2) Port configuration and MAC address duplication should be synchronized on the switch. Port configuration synchronization is completed in the whole

Strany 244

 MAC address duplication: After port configuration synchronization, packets from Secondary VLAN can be forwarded via the promiscuous port untagged,

Strany 245 - Appendix A: Specifications

The Private VLAN packet forwarding process (here we take traffic transmission for PC2) based on the figure above is illustrated as follows: 1) PC2 s

Strany 246 - Figure B-2

Figure 6-17 Create Private VLAN The following entries are displayed on this screen:  Create Private VLAN Primary VLAN: Enter the ID number of the

Strany 247 - Figure B-3

Figure 6-18 Create and View Protocol Template The following entries are displayed on this screen:  Port Config Port: Select the desired port for

Strany 248 - 1.1 Installation Guide

Step Operation Description 4 Delete VLAN. Optional. On the VLAN→Private VLAN→PVLAN Config page, select the desired entry to delete the correspond

Strany 249

VI 14.3 Cluster ...212 14.3.1 Cl

Strany 250

Step Operation Description 2 Add Promiscuous port to Private VLANs Required. On the VLAN→Private VLAN→Port Config page, configure the port type of

Strany 251 - 1.2 Uninstall Software

Chapter 7 Spanning Tree STP (Spanning Tree Protocol), subject to IEEE 802.1D standard, is to disbranch a ring network in the Data Link layer in a lo

Strany 252 - 1.3 Configuration

Figure 7-1 Basic STP diagram  STP Timers Hello Time: Hello Time ranges from 1 to 10 seconds. It specifies the interval to send BPDU packets. It

Strany 253

Step Operation 1 If the priority of the BPDU received on the port is lower than that of the BPDU if of the port itself, the switch discards the BPD

Strany 254 - 1.4 FAQ:

point-to-point link, it can transit to forwarding state after getting response from the downstream switch through handshake.  RSTP Elements Edge

Strany 255

 Port States In an MSTP, ports can be in the following four states:  Forwarding: In this status the port can receive/forward data, receive/send

Strany 256 - Appendix D: Glossary

Figure 7-4 STP Config The following entries are displayed on this screen:  Global Config STP: Select Enable/Disable STP function globally on the

Strany 257

Note: 1. The forward delay parameter and the network diameter are correlated. A too small forward delay parameter may result in temporary loops. A t

Strany 258

Figure 7-5 STP Summary 7.2 Port Config On this page you can configure the parameters of the ports for CIST Choose the menu Spanning Tree→Port Confi

Strany 259

The following entries are displayed on this screen:  Port Config Port Select: Click the Select button to quick-select the corresponding port base

Komentáře k této Příručce

Žádné komentáře