Dahua DH-PFS4210-8GT-150 User Manual

8-Port Gigabit + 2-Port Gigabit SFP
L2 Managed PoE Switch
User’s Manual
V1.0.0
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
Cybersecurity Recommendations
Mandatory actions to be taken towards cybersecurity
1. Change Passwords and Use Strong Passwords:
The number one reason systems get “hacked” is due to having weak or default passwords. It is recommended to change default passwords immediately and choose a strong password whenever possible. A strong password should be made up of at least 8 characters and a combination of special characters, numbers, and upper and lower case letters.
2. Update Firmware As is standard procedure in the tech-industry, we recommend keeping NVR, DVR, and IP camera firmware up-to-date to ensure the system is current with the latest security patches and fixes.
“Nice to have” recommendations to improve your network security
1. Change Passwords Regularly
Regularly change the credentials to your devices to help ensure that only authorized users are able to access the system.
2. Change Default HTTP and TCP Ports:
● Change default HTTP and TCP ports for systems. These are the two ports used to communicate and to view video feeds remotely.
● These ports can be changed to any set of numbers between 1025-65535. Avoiding the default ports reduces the risk of outsiders being able to guess which ports you are using.
3. Enable HTTPS/SSL: Set up an SSL Certificate to enable HTTPS. This will encrypt all communication between your devices and recorder.
4. Enable IP Filter: Enabling your IP filter will prevent everyone, except those with specified IP addresses, from accessing the system.
5. Change ONVIF Password:
On older IP Camera firmware, the ONVIF password does not change when you change the system’s
credentials. You will need to either update the camera’s firmware to the latest revision or manually
change the ONVIF password.
6. Forward Only Ports You Need:
● Only forward the HTTP and TCP ports that you need to use. Do not forward a huge range of numbers
to the device. Do not DMZ the device's IP address.
● You do not need to forward any ports for individual cameras if they are all connected to a recorder on site; just the NVR is needed.
7. Disable Auto-Login on SmartPSS: Those using SmartPSS to view their system and on a computer that is used by multiple people should disable auto-login. This adds a layer of security to prevent users without the appropriate credentials from accessing the system.
8. Use a Different Username and Password for SmartPSS:
Cybersecurity Recommendations I
In the event that your social media, bank, email, etc. account is compromised, you would not want someone collecting those passwords and trying them out on your video surveillance system. Using a different username and password for your security system will make it more difficult for someone to guess their way into your system.
9. Limit Features of Guest Accounts: If your system is set up for multiple users, ensure that each user only has rights to features and functions they need to use to perform their job.
10. UPnP:
● UPnP will automatically try to forward ports in your router or modem. Normally this would be a good thing. However, if your system automatically forwards the ports and you leave the credentials defaulted, you may end up with unwanted visitors.
● If you manually forwarded the HTTP and TCP ports in your router/modem, this feature should be turned off regardless. Disabling UPnP is recommended when the function is not used in real applications.
11. SNMP: Disable SNMP if you are not using it. If you are using SNMP, you should do so only temporarily, for tracing and testing purposes only.
12. Multicast: Multicast is used to share video streams between two recorders. Currently there are no known issues involving Multicast, but if you are not using this feature, deactivation can enhance your network security.
13. Check the Log: If you suspect that someone has gained unauthorized access to your system, you can check the system log. The system log will show you which IP addresses were used to login to your system and what was accessed.
14. Physically Lock Down the Device: Ideally, you want to prevent any unauthorized physical access to your system. The best way to achieve this is to install the recorder in a lockbox, locking server rack, or in a room that is behind a lock and key.
Cybersecurity Recommendations II
General
Signal Words
Meaning
Indicates a high potential hazard which, if not avoided, will result in death or serious injury.
Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in property damage, data loss, lower performance, or unpredictable result.
Provides methods to help you solve a problem or save you time.
Provides additional information as the emphasis and supplement to the text.
No.
Version
Revision Content
Release Time
1
V1.0.0
First Release.
June 1, 2018
This users manual introduces the functions and operations of 8-Port Gigabit + 2-Port Gigabit SFP L2 Managed PoE Switch devices.
Models
DH-PFS4210-8GT-150
Safety Instructions
The following categorized signal words with defined meaning might appear in the Manual.
Foreword
Revision History
Privacy Protection Notice
As the device user or data controller, you might collect personal data of others' such as face, fingerprints, car plate number, Email address, phone number, GPS and so on. You need to be in compliance with the local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures include but not limited to: providing clear and visible identification to inform data subject the existence of surveillance area and providing related contact.
Foreword III
About the Manual
The Manual is for reference only. If there is inconsistency between the Manual and the
actual product, the actual product shall govern.
We are not liable for any loss caused by the operations that do not comply with the Manual. The Manual would be updated according to the latest laws and regulations of related
regions. For detailed information, see the paper User's Manual, CD-ROM, QR code or our official website. If there is inconsistency between paper User's Manual and the electronic version, the electronic version shall prevail.
All the designs and software are subject to change without prior written notice. The product
updates might cause some differences between the actual product and the Manual. Please contact the customer service for the latest program and supplementary documentation.
There still might be deviation in technical data, functions and operations description, or
errors in print. If there is any doubt or dispute, please refer to our final explanation.
Upgrade the reader software or try other mainstream reader software if the Guide (in PDF
format) cannot be opened.
All trademarks, registered trademarks and the company names in the Manual are the
properties of their respective owners.
Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the device.
If there is any uncertainty or controversy, please refer to our final explanation.
Foreword IV
Electrical safety
All installation and operation here should conform to your local electrical safety codes. The product must be grounded to reduce the risk of electric shock. We assume no liability or responsibility for all the fires or electrical shock caused by
improper handling or installation.
Transportation security
Heavy stress, violent vibration or water splash are not allowed during transportation, storage and installation.
Installation
Keep upwards. Handle with care. Do not apply power to the Device before completing installation. Do not place objects on the Device.
Qualified engineers needed
All the examination and repair work should be done by the qualified service engineers. We are not liable for any problems caused by unauthorized modifications or attempted repair.
Important Safeguards and Warnings
Environment
The Device should be installed in a cool, dry place away from conditions such as direct sunlight, inflammable substances, and explosive substances.
Accessories
Be sure to use all the accessories recommended by manufacturer. Before installation, please open the package and check all the components are included. Contact your local retailer ASAP if something is broken in your package.
Battery
Improper battery use might result in fire, explosion, or personal injury. When replacing the battery, please make sure you are using the same type. Risk of
Dispose of used batteries according to the instructions. Please make sure to use the same battery model if possible. We recommend replace battery regularly (such as one-year) to guarantee system time
explosion if battery is replaced by an incorrect type.
accuracy. Before replacement, please save the system setup, otherwise, you may lose the data completely.
Important Safeguards and Warnings V
Table of Contents
Cybersecurity Recommendations ........................................................................................................... I
Foreword .................................................................................................................................................. III
Important Safeguards and Warnings ..................................................................................................... V
1 Introduction ............................................................................................................................................ 1
1.1 Overview ....................................................................................................................................... 1
1.2 Features ........................................................................................................................................ 1
1.3 External Component Description .................................................................................................. 2
1.3.1 Front Panel ......................................................................................................................... 2
1.3.2 Rear Panel .......................................................................................................................... 3
1.4 Package Contents ......................................................................................................................... 4
2 Installation and Connection ................................................................................................................. 5
2.1 Installation ..................................................................................................................................... 5
2.1.1 Desktop Installation ............................................................................................................ 5
2.1.2 Rack-mountable Installation in 19-inch Cabinet ................................................................. 5
2.1.3 Power on the Switch ........................................................................................................... 6
2.2 Connect Computer (NIC) to the Switch ........................................................................................ 6
2.3 Switch connection to the PD ......................................................................................................... 7
3 Login to the Switch ............................................................................................................................... 8
3.1 Switch to End Node ...................................................................................................................... 8
3.2 Login the Switch ............................................................................................................................ 8
4 Switch Configuration .......................................................................................................................... 10
4.1 Quickly Setting ............................................................................................................................ 10
4.2 Port .............................................................................................................................................. 13
4.2.1 Basic config ...................................................................................................................... 13
4.2.2 Port aggregation ............................................................................................................... 15
4.2.3 Port mirroring .................................................................................................................... 16
4.2.4 Port rate-limit .................................................................................................................... 17
4.2.5 Storm control .................................................................................................................... 18
4.2.6 Port isolation ..................................................................................................................... 20
4.2.7 Port information ................................................................................................................ 21
4.3 VLAN ........................................................................................................................................... 22
4.3.1 VLAN Settings .................................................................................................................. 22
4.3.2 Access Port Settings ........................................................................................................ 23
4.3.3 Trunk-port setting .............................................................................................................. 24
4.3.4 Hybrid-port setting ............................................................................................................ 25
4.4 Fault/Safety ................................................................................................................................. 28
4.4.1 Anti attack ......................................................................................................................... 28
4.4.2 Channel detection ............................................................................................................. 33
4.4.3 ACL ................................................................................................................................... 36
4.5 PoE .............................................................................................................................................. 38
4.5.1 PoE Port Config ................................................................................................................ 38
Table of Contents VI
4.6 STP ............................................................................................................................................. 39
4.6.1 MSTP region ..................................................................................................................... 40
4.6.2 STP bridge ........................................................................................................................ 41
4.7 DHCP relay ................................................................................................................................. 43
4.7.1 DHCP relay ....................................................................................................................... 44
4.7.2 0ption82 ............................................................................................................................ 44
4.8 QoS ............................................................................................................................................. 46
4.8.1 Queue config .................................................................................................................... 46
4.8.2 Mapping the queue ........................................................................................................... 47
4.9 Addr table .................................................................................................................................... 51
4.9.1 MAC Management ............................................................................................................ 52
4.9.2 MAC Learning and Aging ................................................................................................. 53
4.9.3 MAC Filter ......................................................................................................................... 55
4.10 SNMP ........................................................................................................................................ 55
4.10.2 Snmp config .................................................................................................................... 56
4.10.3 Rmon config .................................................................................................................... 62
4.11 LACP ......................................................................................................................................... 67
4.11.2 Lacp config ..................................................................................................................... 67
4.12 SYSTEM ................................................................................................................................... 70
4.12.2 System config ................................................................................................................. 70
4.12.3 System upgrade .............................................................................................................. 76
4.12.4 Config management ....................................................................................................... 77
4.12.5 Config save ..................................................................................................................... 80
4.12.6 Administrator privileges .................................................................................................. 80
4.12.7 Info collect ....................................................................................................................... 81
Technical Specifications ................................................................................................... 82 Appendix 1
Table of Contents VII
1.1 Overview
The Switch is a new generation designed for high security and high performance network the second layer switch. Provides eight 10/100/1000Mbps self-adaption RJ45 port, and two 100/1000Mbps SFP ports, all ports support wire-speed forwarding, can provide you with larger network flexibility. All ports support Auto MDI/MDIX function. The Switch with a low-cost, easy-to-use, high performance upgrade your old network to a 1000Mbps Gigabit network.
The Switch supports VLAN ACL based on port, easily implement network monitoring, traffic regulation, priority tag and traffic control. Support traditional STP/RSTP/MSTP 2 link protection technology; greatly improve the ability of fault tolerance, redundancy backup to ensure the stable operation of the network. Support ACL control based on the time, easy control the access time accurately. Support 802.1x authentication based on the port and MAC, easily set user access. Perfect QOS strategy and plenty of VLAN function, easy to maintenance and management, meet the networking and access requirements of small and medium-sized enterprises, intelligent village, hotel, office network and campus network.
1 Introduction
The Switch all UTP ports support PoE power supply function, support IEEE802.3at standard,
802.3af downward compatibility, power supply equipment for Ethernet, can automatically detect identification standard of electrical equipment, and through the cable for the power supply.
1.2 Features
Comply with 802.3i, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3x, IEEE 802.3z, IEEE802.1Q ,
IEEE802.1p, IEEE802.3af, IEEE802.3at
Supports PoE power up to 30W for each PoE port, total power up to 140W for all PoE ports 8 x 10/100/1000Mbps Auto MDI/MDI-X Ethernet port 2 x 100/1000Mbps SFP port 8K entry MAC address table of the switch with auto-learning and auto-aging Supports IEEE802.3x flow control for Full-duplex Mode and backpressure for Half-duplex
Mode
Support Web interface management supports QoS (quality of service), port mirror, Link aggregation protocol LED indicators for monitoring Power, System, link/activity/Speed, PoE
Introduction 1
1.3 External Component Description
LED Indicator
Faceplate Marker
Status
Indication
Power Indicator
PWR Off
Power Off
Solid green
Power On
1.3.1 Front Panel
The front panel of the Switch consists of AC power connector, one marker, 1 x Reset button, a series of LED indicators, 8 x 10/100/1000Mbps RJ-45 ports, 2 x SFP ports and 1x Console port as shown as below.
Front panel Figure 1-1
AC Power Connector
Power is supplied through an external AC power adapter. It supports AC 100~240V, 50/60Hz.
Grounding Terminal:
Located on the right side of the power supply connector, use wire grounding to lightning protection.
Reset button (Reset):
Keep the device powered on and push a paper clip into the hole. Press down the button for 5 seconds to restore the Switch to its original factory default settings.
10/100/1000Mbps RJ-45 ports (1~8):
Designed to connect to the device with a bandwidth of 10Mbps, 100Mbps or 1000Mbps. Each has a corresponding Link/Act/Speed and PoE indicator.
SFP ports (9, 10):
Designed to install the SFP module and connect to the device with a bandwidth of 100Mbps or 1000Mbps. Each has a corresponding Link/Act/Speed LED.
Console port (Console):
Designed to connect with the serial port of a computer or terminal for monitoring and configuring the Switch.
:
LED indicators:
The LED Indicators will allow you to monitor, diagnose and troubleshoot any potential problem with the Switch, connection or attached devices.
The following chart shows the LED indicators of the Switch along with explanation of each indicator.
Front panel Table 1-1
Introduction 2
LED Indicator
Faceplate Marker
Status
Indication
System indicator
SYS Off
System not started
Blinking green
System is starting or the system starts successfully
10/100/10 00 BASE-T adaptive Ethernet port indicators
(1-8)
Link/Act /Speed
Off
The port is NOT connected.
Solid green
The port is connected at 1000Mbps.
Solid orange
The port is connected at 100/10Mbps
Blinking
The port is transmitting or receiving data.
SFP port indicators
(9-10)
Link/Act /Speed
Off
The port is NOT connected.
Solid green
The port is connected at 1000Mbps.
Solid orange
The port is connected at 100Mbps
Blinking
The port is transmitting or receiving data.
PoE status indicators
(1-8)
PoE
Off
No PD is connected to the corresponding port, or no power is supplied according to the power limits of the port
Solid orange
A Powered Device is connected to the port, which supply power successfully.
Blinking
The PoE power circuit may be in short or the power current may be overloaded
1.3.2 Rear Panel
The rear panel of the Switch contains Heat vent shown as below.
Real panel Figure 1-2
Introduction 3
Heat vent:
The Heat vent is located in the middle position of the rear panel of the switch. It is used for heat dissipation and ventilation. Do not cover it.
1.4 Package Contents
Before installing the Switch, make sure that the following the "packing list" listed OK. If any part is lost and damaged, please contact your local agent immediately. In addition, make sure that you have the tools install switches and cables by your hands.
One PoE Web Smart Ethernet Switch One Installation Component One AC power cord One Users Manual
Introduction 4
This part describes how to install your PoE Ethernet Switch and make connections to it. Please read the following topics and perform the procedures in the order being presented.
2.1 Installation
Please follow the following instructions in avoid of incorrect installation causing device damage and security threat.
Put the Switch on stable place or desktop in case of falling damage. Make sure the Switch works in the proper AC input range and matches the voltage labeled
on the Switch.
To keep the Switch free from lightning, do not open the Switch's shell even in power failure. Make sure that there is proper heat dissipation from and adequate ventilation around the
Switch.
Make sure the cabinet to enough back up the weight of the Switch and its accessories.
2 Installation and Connection
2.1.1 Desktop Installation
Sometimes users are not equipped with the 19-inch standard cabinet. So when installing the Switch on a desktop, please attach these cushioning rubber feet provided on the bottom at each corner of the Switch in case of the external vibration. Allow adequate space for ventilation between the device and the objects around it.
2.1.2 Rack-mountable Installation in 19-inch Cabinet
The Switch can be mounted in an EIA standard-sized, 19-inch rack, which can be placed in a wiring closet with other equipment. To install the Switch, please follow these steps:
Attach the mounting brackets on the Switch's side panels (one on each side) and Step 1
secure them with the screws provided.
Installation and Connection 5
Use the screws provided with the equipment rack to mount the Switch on the rack and Step 2
tighten it.
Bracket installation Figure 2-1
Rack installation Figure 2-2
2.1.3 Power on the Switch
The Switch is powered on by the AC 100-240V 50/60Hz internal high-performance power supply. Please follow the next tips to connect:
AC Electrical Outlet:
It is recommended to use single-phase three-wire receptacle with neutral outlet or multifunctional computer professional receptacle. Please make sure to connect the metal ground connector to the grounding source on the outlet.
AC Power Cord Connection:
Connect the AC power connector in the back panel of the Switch to external receptacle with the included power cord, and check the power indicator is ON or not. When it is ON, it indicates the power connection is OK.
2.2 Connect Computer (NIC) to the Switch
Please insert the NIC into the computer, after installing network card driver, please connect one end of the twisted pair to RJ-45 jack of your computer, the other end will be connected to any RJ-45 port of the Switch, the distance between Switch and computer is around 100 meters. Once the connection is OK and the devices are power on normally, the LINK/ACT/Speed status indicator lights corresponding ports of the Switch.
Installation and Connection 6
2.3 Switch connection to the PD
1-8 ports of the Switch have PoE power supply function, the maximum output power up to 30W each port, it can make PD devices, such as internet phone, network camera, wireless access point work. You only need to connect the Switch PoE port directly connected to the PD port by network cable.
Installation and Connection 7
3.1 Switch to End Node
Parameter
Default Value
Default IP address
192.168.1.110
Default user name
admin
Default password
admin123
Use standard Cat.5/5e Ethernet cable (UTP/STP) to connect the Switch to end nodes as described below. Switch ports will automatically adjust to the characteristics (MDI/MDI-X, speed, duplex) of the device to which is connected.
3 Login to the Switch
Connect PC to switch Figure 3-1
3.2 Login the Switch
As the Switch provides Web-based management login, you can configure your computer’s IP address manually to log on to the Switch. The default settings of the Switch are shown below.
You can log on to the configuration window of the Switch through following steps:
Connect the Switch with the computer NIC interface. Step 1 Power on the Switch. Step 2 Check whether the IP address of the computer is within this network segment: Step 3
192.168.1.xxx ("xxx" ranges 0~254, except 110), for example, 192.168.1.100.
Open the browser, and enter http://192.168.1.110 and then press "Enter". The Switch Step 4
login window appears, as shown below.
Default value Table 3-1
Login to the Switch 8
Login windows Figure 3-2
Switching language to English .Enter the Username and Password (The factory default Step 5
Username is admin and Password is admin123), and then click "LOGIN" to log in to the Switch configuration window.
Switch configuration window Figure 3-3
Login to the Switch 9
4 Switch Configuration
The Web Smart Ethernet Switch Managed switch software provides rich layer 2 functionality for switches in your networks. This chapter describes how to use Web-based management interface(Web UI) to this switch configure managed switch software features.
In the Web UI, the left column shows the configuration menu. Above you can see the information for switch system, such as memory, software version. The middle shows the switch’s current link status. Green squares indicate the port link is up, while black squares indicate the port link is down. Below the switch panel, you can find a common toolbar to provide useful functions for users. The rest of the screen area displays the configuration settings.
Switch configuration window Figure 4-1
4.1 Quickly Setting
In the navigation bar to select "quickly setting", can create a VLAN in this module, add the port in the VLAN, set the basic information and modify the switch login password. The following picture:
Switch Configuration 10
Parameter Description
Parameter
Description
VLAN ID
VLAN number
VLAN Name
VLAN mark
VLAN IP
Manage the IP address of the VLAN
Device Name
Switch name
Management VLAN
Switch’s management in use of
the VLAN
Quickly setting Figure 4-2
Instructions Native VLAN: as a Trunk, the mouth will belong to a Native VLAN. The so-called Native VLAN,
is refers to UNTAG send or receive a message on the interface, is considered belongs to the VLAN. Obviously, the interface of the default VLAN ID (PVID) in the IEEE 802.1 Q VLAN ID is the Native VLAN. At the same time, send belong to Native VLAN frame on the Trunk, must adopt UNTAG way.
Allowed VLAN list: a Trunk can transport the equipment support by default all the VLAN traffic (1-4094). But, also can by setting the permission VLAN Trunk at the mouth of the list to limit the flow of some VLAN can't through the Trunk.
Configuration Example
VLAN setting: such as create VLAN 2. Sets the port 8 to Trunk , Native VLAN 2. Step 1
Switch Configuration 11
VLAN setting I Figure 4-3
VLAN setting II Figure 4-4
Click "next step" button, into other settings, such as: manage ip address set as Step 2
192.168.1.11, device name set as switch-123, default gateway with the dns server set as 172.16.1.241.
Switch Configuration 12
Save Figure 4-5
Use 192.168.1.11 to log in, set a new password for admin1234. Step 3
Finish Figure 4-6
4.2 Port
In the navigation bar to select "PORT", you may conduct Basic config, Port aggregation, Port mirroring, Port limit and port isolation.
4.2.1 Basic config
In the navigation bar to select "PORT>Basic config", For panel port to port described , port speed, port status, working mode, flow control, cross line order configuration, the following picture:
Port Figure 4-7
Switch Configuration 13
Parameter Description
Parameter
Description
Port
Select the current configuration port number
Status
Choose whether to close link port
Flow Control
Whether open flow control
Port Speed
Can choose the following kinds: Auto 10 M 100 M 1000 M
Duplex Mode
Can choose the following kinds: Auto Duplex Half duplex
Port Description
The port is described
Cable Type Detection
Can choose the following kinds: Auto MDI MDIX
Basic settings I Figure 4-8
Instructions Open flow control should be negotiated will close, negotiated close is to set port speed rate and
working mode. Set the port rate more than actual rate of port, the port will be up.
Switch Configuration 14
Configuration Example
Parameter
Description
Aggregation Group Number
Switch can be set up 8 link trunk group, group_1 to group_8
Member port
For each of the members of the group and add your own port, and with members of other groups
Such as: The port is set to 10 M, half duplex, open flow control and cross line sequence and port state.
4.2.2 Port aggregation
Basic settings II Figure 4-9
In the navigation bar to select "PORT>port aggregation", In order to expand the port bandwidth or achieve the bandwidth of the redundancy backup, the following picture:
Port aggregation Figure 4-10
Parameter Description
Instructions
Open the port of the ARP check function, the port of the important device ARP, the port of the VLAN MAC function, and the monitor port in the port image cannot be added!
Configuration Example
Switch Configuration 15
Such as: set the port 7, 8, for aggregation port 1, lets this aggregation port 1 connected to other
Parameter
Description
Source port
To monitor the port in and out of flow
Destination port
Set destination port, All packets on the source port are copied and forwarded to the destination port
switch aggregation port 1 to build switch links.
4.2.3 Port mirroring
Configuration example Figure 4-11
In the navigation bar to select "PORT>port mirroring", Open port mirror feature, All packets on the source port are copied and forwarded to the destination port, Destination port is usually connected to a packet analyzer to analyze the source port, Multiple ports can be mirrored to a destination port, the following picture:
Port mirroring Figure 4-12
Parameter Description
Switch Configuration 16
Parameter
Description
Mirror group
Range: 1-4
Instructions The port of the aggregate port cannot be used as a destination port and the source port,
destination port and source port cannot be the same. Configuration Example Such as: set a mirror group for port 3 regulatory port 4, 5, 6 on and out flow conditions.
Configuration example Figure 4-13
4.2.4 Port rate-limit
In the navigation bar to select "PORT>port rate-limit ", to port output, input speed limit. The following picture:
Switch Configuration 17
Parameter Description
Parameter
Description
Input speed limit
Set port input speed
Output speed limit
Set port output speed
Port rate-limit Figure 4-14
Instructions 1 Mbit/s = 1000 Kbit/s = 1000 / 8 KB/s = 125 KB/s. That is, the theoretical rate of 1M bandwidth
is125KB/s. Configuration Example Such as: the port 5 input rate is set to 6400 KB/s, the output rate is set to 3200 KB/s.
Configuration example Figure 4-15
4.2.5 Storm control
In the navigation bar to select "PORT>Storm control", to port storm control config. The following picture:
Switch Configuration 18
Loading...
+ 65 hidden pages