SNSL makes no representations or warranties, either expressed or implied, with respect
to the contents hereof and specifically disclaims any warranties, merchantability or
fitness for any particular purpose. Any software described in this manual is sold or
licensed “as is”. Should the programs prove defective following their purchase, the
buyer (and not SNSL, its distributor, or its dealer) assumes the entire cost of all
necessary servicing, repair, and any incidental or consequential damages resulting from
any defect in the software. Further, SNSL reserves the right to revise this publication
and to make changes from time to time in the contents thereof without obligation to
notify any person of such revision or changes.
SNSL is an abbreviation of Smartlink Network Systems Ltd.
MANAGEMENT GUIDE
DG-GS1550 Gigabit Ethernet Switch
Layer 2 Workgroup Switch
with 46 10/100/1000BASE-T (RJ-45) Ports
and 4 Combination Gigabit (RJ-45/SFP) Ports
About This Guide
Purpose
This guide details the hardware features of the switch, including the physical and
performance-related characteristics, and how to install the switch.
Audience
The guide is intended for use by network administrators who are responsible for installing and setting
up network equipment; consequently, it assumes a basic working knowledge of LANs (Local Area
Networks).
Conventions
The following conventions are used throughout this guide to show information:
Note: Emphasizes important information or calls your attention to related features or
instructions.
Caution: Alerts you to a potential hazard that could cause loss of data, or damage the
system or equipment.
Warning: Alerts you to a potential hazard that could cause personal injury.
Related Publications
The following publication gives specific information on how to operate and use the
management functions of the switch:
Installation Guide
Also, as part of the switch’s software, there is an online web-based help that describes all
management related features.
Revision History
This section summarizes the changes in each revision of this guide.
February 2012 Revision
This is the first revision of this guide.
Contents
Chapter 1: Introduction 1-1
Key Features 1-1
Description of Software Features 1-2
System Defaults 1-6
Community Strings (for SNMP version 1 and 2c clients) 2-6
Trap Receivers 2-7
Configuring Access for SNMP Version 3 Clients 2-8
Managing System Files 2-8
Saving Configuration Settings 2-9
Chapter 3: Configuring the Switch 3-1
Using the Web Interface 3-1
Navigating the Web Browser Interface 3-2
Home Page 3-2
Configuration Options 3-3
Panel Display 3-3
Main Menu 3-4
Basic Configuration 3-11
Displaying System Information 3-11
Displaying Switch Hardware/Software Versions 3-13
Displaying Bridge Extension Capabilities 3-15
Setting the Switch’s IP Address 3-16
Manual Configuration 3-17
Using DHCP/BOOTP 3-18
Enabling Jumbo Frames 3-19
Managing Firmware 3-20
Downloading System Software from a Server 3-20
xi
Contents
Saving or Restoring Configuration Settings 3-22
Downloading Configuration Settings from a Server 3-23
Console Port Settings 3-24
Telnet Settings 3-26
Configuring Event Logging 3-28
System Log Configuration 3-28
Remote Log Configuration 3-29
Displaying Log Messages 3-31
Simple Mail Transfer Protocol 3-31
Resetting the System 3-33
Setting the System Clock 3-34
Setting the Time Manually 3-34
Configuring SNTP 3-34
Setting the Time Zone 3-35
Simple Network Management Protocol 3-36
Enabling the SNMP Agent 3-38
Setting Community Access Strings 3-38
Specifying Trap Managers and Trap Types 3-39
Configuring SNMPv3 Management Access 3-42
Setting the Local Engine ID 3-42
Specifying a Remote Engine ID 3-43
Configuring SNMPv3 Users 3-44
Configuring Remote SNMPv3 Users 3-46
Configuring SNMPv3 Groups 3-48
Setting SNMPv3 Views 3-51
User Authentication 3-53
Configuring User Accounts 3-53
Configuring Local/Remote Logon Authentication 3-55
Configuring Encryption Keys 3-58
AAA Authorization and Accounting 3-60
Configuring AAA RADIUS Group Settings 3-61
Configuring AAA TACACS+ Group Settings 3-62
Configuring AAA Accounting 3-62
AAA Accounting Update 3-64
AAA Accounting 802.1X Port Settings 3-65
AAA Accounting Exec Command Privileges 3-66
AAA Accounting Exec Settings 3-67
AAA Accounting Summary 3-67
Authorization Settings 3-69
Authorization EXEC Settings 3-70
Authorization Summary 3-71
Configuring HTTPS 3-72
Replacing the Default Secure-site Certificate 3-73
Configuring the Secure Shell 3-74
Generating the Host Key Pair 3-76
xii
Contents
Configuring the SSH Server 3-78
Configuring 802.1X Port Authentication 3-79
Displaying 802.1X Global Settings 3-80
Configuring 802.1X Global Settings 3-81
Configuring Port Settings for 802.1X 3-82
Displaying 802.1X Statistics 3-85
Filtering IP Addresses for Management Access 3-86
General Security Measures 3-88
Configuring Port Security 3-89
Network Access (MAC Address Authentication) 3-90
Configuring the MAC Authentication Reauthentication Time 3-91
Configuring MAC Authentication for Ports 3-92
Displaying Secure MAC Address Information 3-93
MAC Authentication 3-95
Configuring MAC Authentication Parameters for Ports 3-95
Access Control Lists 3-96
Setting the ACL Name and Type 3-96
Configuring a Standard IP ACL 3-98
Configuring an Extended IP ACL 3-99
Configuring a MAC ACL 3-101
Binding a Port to an Access Control List 3-103
DHCP Snooping 3-104
DHCP Snooping Configuration 3-105
DHCP Snooping VLAN Configuration 3-106
DHCP Snooping Information Option Configuration 3-107
DHCP Snooping Port Configuration 3-108
DHCP Snooping Binding Information 3-109
IP Source Guard 3-110
Configuring Ports for IP Source Guard 3-110
Configuring Static Binding for IP Source Guard 3-112
Displaying Information for Dynamic IP Source Guard Bindings 3-114
Port Configuration 3-115
Displaying Connection Status 3-115
Configuring Interface Connections 3-117
Creating Trunk Groups 3-119
Statically Configuring a Trunk 3-120
Enabling LACP on Selected Ports 3-122
Configuring Parameters for LACP Group Members 3-123
Displaying LACP Port Counters 3-125
Displaying LACP Settings and Status for the Local Side 3-127
Displaying LACP Settings and Status for the Remote Side 3-129
Setting Broadcast Storm Thresholds 3-130
Setting Multicast Storm Thresholds 3-132
Setting Unknown Unicast Storm Thresholds 3-133
Configuring Local Port Mirroring 3-134
xiii
Contents
Configuring Remote Port Mirroring 3-136
Configuring Rate Limits 3-140
Rate Limit Configuration 3-140
Showing Port Statistics 3-141
Address Table Settings 3-146
Setting Static Addresses 3-146
Displaying the Address Table 3-147
Changing the Aging Time 3-148
Spanning Tree Algorithm Configuration 3-149
Displaying Global Settings for STA 3-151
Configuring Global Settings for STA 3-154
Displaying Interface Settings for STA 3-158
Configuring Interface Settings for STA 3-161
Configuring Multiple Spanning Trees 3-165
Displaying Interface Settings for MSTP 3-168
Configuring Interface Settings for MSTP 3-170
VLAN Configuration 3-171
IEEE 802.1Q VLANs 3-171
Enabling or Disabling GVRP (Global Setting) 3-174
Displaying Basic VLAN Information 3-175
Displaying Current VLANs 3-176
Creating VLANs 3-177
Adding Static Members to VLANs (VLAN Index) 3-180
Adding Static Members to VLANs (Port Index) 3-182
Configuring VLAN Behavior for Interfaces 3-183
Configuring IEEE 802.1Q Tunneling 3-185
Enabling QinQ Tunneling on the Switch 3-188
Adding an Interface to a QinQ Tunnel 3-189
Traffic Segmentation 3-192
Configuring Global Settings for Traffic Segmentation 3-192
Configuring Traffic Segmentation Uplinks and Downlinks 3-193
sntp poll 4-64
show sntp 4-64
clock timezone 4-65
calendar set 4-66
show calendar 4-66
Switch Cluster Commands 4-67
cluster 4-67
cluster commander 4-68
cluster ip-pool 4-69
cluster member 4-69
rcommand 4-70
show cluster 4-70
show cluster members 4-71
show cluster candidates 4-71
ip http port 4-109
ip http server 4-110
ip http secure-server 4-110
ip http secure-port 4-111
Telnet Server Commands 4-112
ip telnet server 4-112
Secure Shell Commands 4-113
ip ssh server 4-115
ip ssh timeout 4-116
ip ssh authentication-retries 4-116
ip ssh server-key size 4-117
delete public-key 4-117
ip ssh crypto host-key generate 4-118
ip ssh crypto zeroize 4-118
ip ssh save host-key 4-119
show ip ssh 4-119
show ssh 4-120
show public-key 4-121
ip dhcp snooping 4-144
ip dhcp snooping vlan 4-146
ip dhcp snooping trust 4-147
ip dhcp snooping verify mac-address 4-148
ip dhcp snooping information option 4-148
ip dhcp snooping information policy 4-149
show ip dhcp snooping 4-150
show ip dhcp snooping binding 4-150
IP Source Guard Commands 4-151
ip source-guard 4-151
ip source-guard binding 4-153
show ip source-guard 4-154
show ip source-guard binding 4-154
Access Control List Commands 4-155
IP ACLs 4-155
access-list ip 4-156
permit, deny (Standard ACL) 4-157
xx
Contents
permit, deny (Extended ACL) 4-158
show ip access-list 4-160
ip access-group 4-160
show ip access-group 4-161
MAC ACLs 4-161
access-list mac 4-162
permit, deny (MAC ACL) 4-162
show mac access-list 4-164
mac access-group 4-164
show mac access-group 4-165
ACL Information 4-166
show access-list 4-166
show access-group 4-166
Interface Commands 4-167
interface 4-167
description 4-168
speed-duplex 4-169
negotiation 4-170
capabilities 4-170
flowcontrol 4-171
media-type 4-172
shutdown 4-173
switchport packet-rate 4-173
clear counters 4-174
show interfaces brief 4-175
show interfaces status 4-175
show interfaces counters 4-176
show interfaces switchport 4-177
queue mode 4-283
switchport priority default 4-283
queue bandwidth 4-284
queue cos-map 4-285
show queue mode 4-286
show queue bandwidth 4-287
show queue cos-map 4-287
Priority Commands (Layer 3 and 4) 4-288
map ip port (Global Configuration) 4-288
map ip port (Interface Configuration) 4-289
map ip precedence (Global Configuration) 4-289
map ip precedence (Interface Configuration) 4-290
map ip dscp (Global Configuration) 4-290
map ip dscp (Interface Configuration) 4-291
xxiv
Contents
show map ip port 4-292
show map ip precedence 4-293
show map ip dscp 4-293
Quality of Service Commands 4-295
class-map 4-296
match 4-297
rename 4-298
description 4-298
policy-map 4-299
class 4-299
set 4-300
police 4-301
service-policy 4-302
show class-map 4-303
show policy-map 4-303
show policy-map interface 4-304
Multicast Filtering Commands 4-305
IGMP Snooping Commands 4-305
ip igmp snooping 4-306
ip igmp snooping vlan static 4-306
ip igmp snooping version 4-307
ip igmp snooping leave-proxy 4-307
ip igmp snooping immediate-leave 4-308
show ip igmp snooping 4-309
show mac-address-table multicast 4-309
IGMP Query Commands (Layer 2) 4-310
ip igmp snooping querier 4-310
ip igmp snooping query-count 4-311
ip igmp snooping query-interval 4-312
ip igmp snooping query-max-response-time 4-312
ip igmp snooping router-port-expire-time 4-313
Static Multicast Routing Commands 4-314
ip igmp snooping vlan mrouter 4-314
show ip igmp snooping mrouter 4-315
IGMP Filtering and Throttling Commands 4-316
ip igmp filter (Global Configuration) 4-316
ip igmp profile 4-317
permit, deny 4-317
range 4-318
ip igmp filter (Interface Configuration) 4-318
ip igmp max-groups 4-319
ip igmp max-groups action 4-320
show ip igmp filter 4-320
show ip igmp profile 4-321
show ip igmp throttle interface 4-322
ip host 4-329
clear host 4-330
ip domain-name 4-330
ip domain-list 4-331
ip name-server 4-332
ip domain-lookup 4-333
show hosts 4-334
show dns 4-334
show dns cache 4-335
clear dns cache 4-335
IP Interface Commands 4-336
ip address 4-336
ip default-gateway 4-337
ip dhcp restart 4-338
show ip interface 4-338
show ip redirects 4-339
ping 4-339
show arp 4-340
clear arp-cache 4-341
Appendix A: Software Specifications A-1
Software Features A-1
Management Features A-2
Standards A-2
Management Information Bases A-3
Appendix B: Troubleshooting B-1
Problems Accessing the Management Interface B-1
Using System Logs B-2
Figure 3-1Home Page 3-2
Figure 3-2Panel Display 3-3
Figure 3-3System Information 3-12
Figure 3-4Switch Information 3-13
Figure 3-5Bridge Extension Configuration 3-15
Figure 3-6Manual IP Configuration 3-17
Figure 3-7DHCP IP Configuration 3-18
Figure 3-8Bridge Extension Configuration 3-19
Figure 3-9Copy Firmware 3-21
Figure 3-10Setting the Startup Code 3-21
Figure 3-11Deleting Files 3-21
Figure 3-12Downloading Configuration Settings for Startup 3-23
Figure 3-13Setting the Startup Configuration Settings 3-23
Figure 3-14Console Port Settings 3-25
Figure 3-15Enabling Telnet 3-27
Figure 3-16System Logs 3-29
Figure 3-17Remote Logs 3-30
Figure 3-18Displaying Logs 3-31
Figure 3-19Enabling and Configuring SMTP 3-32
Figure 3-20Resetting the System 3-33
Figure 3-21SNTP Configuration 3-35
Figure 3-22Setting the System Clock 3-36
Figure 3-23Enabling SNMP Agent Status 3-38
Figure 3-24Configuring SNMP Community Strings 3-39
Figure 3-25Configuring IP Trap Managers 3-41
Figure 3-26Setting an Engine ID 3-42
Figure 3-27Setting a Remote Engine ID 3-43
Figure 3-28Configuring SNMPv3 Users 3-45
Figure 3-29Configuring Remote SNMPv3 Users 3-47
Figure 3-30Configuring SNMPv3 Groups 3-50
Figure 3-31Configuring SNMPv3 Views 3-51
Figure 3-32Access Levels 3-54
Figure 3-33Authentication Settings 3-57
Figure 3-34Encryption Key Settings 3-59
Figure 3-35AAA Radius Group Settings 3-61
Figure 3-36AAA TACACS+ Group Settings 3-62
Figure 3-37AAA Accounting Settings 3-63
Figure 3-38AAA Accounting Update 3-64
Figure 3-39AAA Accounting 802.1X Port Settings 3-65
Figure 3-40AAA Accounting Exec Command Privileges 3-66
Figure 3-41AAA Accounting Exec Settings 3-67
Figure 3-42AAA Accounting Summary 3-68
xxxi
Figures
Figure 3-43AAA Authorization Settings 3-70
Figure 3-44AAA Authorization Exec Settings 3-70
Figure 3-45AAA Authorization Summary 3-71
Figure 3-46HTTPS Settings 3-73
Figure 3-47SSH Host-Key Settings 3-77
Figure 3-48SSH Server Settings 3-78
Figure 3-49802.1X Global Information 3-80
Figure 3-50802.1X Global Configuration 3-81
Figure 3-51802.1X Port Configuration 3-83
Figure 3-52Displaying 802.1X Port Statistics 3-85
Figure 3-53Creating an IP Filter List 3-87
Figure 3-54Configuring Port Security 3-90
Figure 3-55Network Access Configuration 3-92
Figure 3-56Network Access Port Configuration 3-93
Figure 3-57Network Access MAC Address Information 3-94
Figure 3-58MAC Authentication Port Configuration 3-95
Figure 3-59Selecting ACL Type 3-97
Figure 3-60Configuring Standard IP ACLs 3-98
Figure 3-61Configuring Extended IP ACLs 3-100
Figure 3-62Configuring MAC ACLs 3-102
Figure 3-63Configuring ACL Port Binding 3-103
Figure 3-64DHCP Snooping Configuration 3-105
Figure 3-65DHCP Snooping VLAN Configuration 3-106
Figure 3-66DHCP Snooping Information Option Configuration 3-108
Figure 3-67DHCP Snooping Port Configuration 3-109
Figure 3-68DHCP Snooping Binding Information 3-110
Figure 3-69IP Source Guard Port Configuration 3-112
Figure 3-70Static IP Source Guard Binding Configuration 3-113
Figure 3-71Dynamic IP Source Guard Binding Information 3-114
Figure 3-72Displaying Port/Trunk Information 3-115
Figure 3-73Port/Trunk Configuration 3-119
Figure 3-74Configuring Static Trunks 3-121
Figure 3-75LACP Trunk Configuration 3-122
Figure 3-76LACP Port Configuration 3-124
Figure 3-77LACP - Port Counters Information 3-126
Figure 3-78LACP - Port Internal Information 3-128
Figure 3-79LACP - Port Neighbors Information 3-129
Figure 3-80Port Broadcast Control 3-131
Figure 3-81Port Multicast Control 3-132
Figure 3-82Port Unknown Unicast Control 3-134
Figure 3-83Mirror Port Configuration 3-135
Figure 3-84RSPAN Configuration 3-139
Figure 3-85Input Rate Limit Port Configuration 3-140
Figure 3-86Port Statistics 3-144
Figure 3-87Configuring a Static Address Table 3-146
xxxii
Figures
Figure 3-88Configuring a Dynamic Address Table 3-147
Figure 3-89Setting the Address Aging Time 3-148
Figure 3-90Displaying Spanning Tree Information 3-153
Figure 3-91Configuring Spanning Tree 3-157
Figure 3-92Displaying Spanning Tree Port Information 3-160
Figure 3-93Configuring Spanning Tree per Port 3-164
Figure 3-94Configuring Multiple Spanning Trees 3-166
Figure 3-95Displaying MSTP Interface Settings 3-168
Figure 3-96Displaying MSTP Interface Settings 3-171
Figure 3-97Globally Enabling GVRP 3-174
Figure 3-98Displaying Basic VLAN Information 3-175
Figure 3-99Displaying Current VLANs 3-176
Figure 3-100 Configuring a VLAN Static List 3-178
Figure 3-101 Configuring a VLAN Static Table 3-181
Figure 3-102 VLAN Static Membership by Port 3-182
Figure 3-103 Configuring VLANs per Port 3-184
Figure 3-104 .1Q Tunnel Status and Ethernet Type 3-189
Figure 3-105 Tunnel Port Configuration 3-190
Figure 3-106 Traffic Segmentation Status Configuration 3-192
Figure 3-107 Traffic Segmentation Link Status 3-193
Figure 3-108 Private VLAN Information 3-195
Figure 3-109 Private VLAN Configuration 3-196
Figure 3-110 Private VLAN Association 3-196
Figure 3-111 Private VLAN Port Information 3-197
Figure 3-112 Private VLAN Port Configuration 3-199
Figure 3-113 Protocol VLAN Configuration 3-200
Figure 3-114 Protocol VLAN Port Configuration 3-202
Figure 3-115 Port Priority Configuration 3-204
Figure 3-116 Traffic Classes 3-206
Figure 3-117 Queue Mode 3-207
Figure 3-118 Configuring Queue Scheduling 3-208
Figure 3-119 IP Precedence/DSCP Priority Status 3-209
Figure 3-120 Mapping IP Precedence Priority Values 3-210
Figure 3-121 Mapping IP DSCP Priority Values 3-212
Figure 3-122 IP Port Priority Status 3-213
Figure 3-123 IP Port Priority 3-213
Figure 3-124 Configuring Class Maps 3-217
Figure 3-125 Configuring Policy Maps 3-220
Figure 3-126 Service Policy Settings 3-221
Figure 3-127 IGMP Configuration 3-225
Figure 3-128 IGMP Immediate Leave 3-227
Figure 3-129 Displaying Multicast Router Port Information 3-228
Figure 3-130 Static Multicast Router Port Configuration 3-229
Figure 3-131 IP Multicast Registration Table 3-230
Figure 3-132 IGMP Member Port Table 3-231
xxxiii
Figures
Figure 3-133 Enabling IGMP Filtering and Throttling 3-233
Figure 3-134 IGMP Profile Configuration 3-234
Figure 3-135 IGMP Filter and Throttling Port Configuration 3-236
Figure 3-136 MVR Global Configuration 3-239
Figure 3-137 MVR Port Information 3-240
Figure 3-138 MVR Group IP Information 3-241
Figure 3-139 MVR Port Configuration 3-243
Figure 3-140 MVR Group Member Configuration 3-244
Figure 3-141 DNS General Configuration 3-246
Figure 3-142 DNS Static Host Table 3-248
Figure 3-143 DNS Cache 3-249
Figure 3-144 Cluster Member Choice 3-250
Figure 3-145 Cluster Configuration 3-251
Figure 3-146 Cluster Member Configuration 3-252
Figure 3-147 Cluster Member Information 3-253
Figure 3-148 Cluster Candidate Information 3-254
xxxiv
Chapter 1: Introduction
This switch provides a broad range of features for Layer 2 switching. It includes a
management agent that allows you to configure the features listed in this manual.
The default configuration can be used for most of the features provided by this
switch. However, there are many options that you should configure to maximize the
switch’s performance for your particular network environment.
Key Features
Table 1-1 Key Features
FeatureDescription
Configuration Backup and
Restore
AuthenticationConsole, Telnet, web – User name / password, RADIUS, TACACS+
General Security MeasuresAAA
Access Control ListsSupports up to 128 ACLs, 96 MAC rules, and 96 IP rules
DHCP Client
DNS Client and Proxy service
Port ConfigurationSpeed, duplex mode and flow control
Port TrunkingSupports up to 32 trunks using either static or dynamic trunking (LACP)
Port MirroringOne or more port mirrored to a single analysis port
RSPAN MirroringMirrors traffic from remote switches over a dedicated VLAN
Congestion ControlRate Limiting
Static AddressUp to 8K MAC addresses in the forwarding table
IEEE 802.1D BridgeSupports dynamic data switching and addresses learning
Store-and-Forward Switching Supported to ensure wire-speed switching while eliminating bad frames
Spanning Tree AlgorithmSupports standard STP, and Rapid Spanning Tree Protocol (RSTP) and
Backup to TFTP server
Port – IEEE 802.1X, MAC address filtering
SNMP v1/2c - Community strings
SNMP version 3 – MD5 or SHA password
Telnet – SSH
Web – HTTPS
DHCP Snooping (with Option 82 relay information)
IP Source Guard
Network Access – MAC Address Authentication
Port Authentication – IEEE 802.1X,
Port Security – MAC address filtering
Private VLANs
Throttling for broadcast, multicast, unknown unicast storms
Multiple Spanning Trees (MSTP)
1-1
Introduction
1
Table 1-1 Key Features (Continued)
FeatureDescription
Virtual LANsUp to 256 using IEEE 802.1Q, port-based, protocol-based or private VLANs,
Traffic PrioritizationDefault port priority, traffic class map, queue scheduling, IP Precedence, or
Qualify of ServiceSupports Differentiated Services (DiffServ)
Link Layer Discovery Protocol Used to discover basic information about neighboring devices
Multicast FilteringSupports IGMP snooping and query, profile filtering, as well as Multicast
Switch ClusteringSupports up to 16 Member switches in a cluster
TunnelingSupports IEEE 802.1Q tunneling (QinQ)
and voice VLANs
Differentiated Services Code Point (DSCP), and TCP/UDP Port
VLAN Registration
Description of Software Features
The switch provides a wide range of advanced performance enhancing features.
Flow control eliminates the loss of packets due to bottlenecks caused by port
saturation. Storm suppression prevents broadcast, multicast or unknown unicast
traffic storms from engulfing the network. Port-based, protocol based and private
VLANs, plus support for automatic GVRP VLAN registration provide traffic security
and efficient use of network bandwidth. CoS priority queueing ensures the minimum
delay for moving real-time multimedia data across the network. While multicast
filtering provides support for real-time network applications. Some of the
management features are briefly described below.
Configuration Backup and Restore – You can save the current configuration
settings to a file on a TFTP server, and later download this file to restore the switch
configuration settings.
Authentication – This switch authenticates management access via the console
port, Telnet or web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Port-based authentication is also supported via the IEEE 802.1X protocol. This
protocol uses the Extensible Authentication Protocol over LANs (EAPOL) to request
user credentials from the 802.1X client, and then verifies the client’s right to access
the network via an authentication server.
Other authentication options include HTTPS for secure management access via the
web, SSH for secure management access over a Telnet-equivalent connection,
SNMP Version 3, IP address filtering for SNMP/web/Telnet management access.
MAC address filtering and IP source guard also provide authenticated port access.
While DHCP snooping is provided to prevent malicious attacks from insecure ports.
Access Control Lists – ACLs provide packet filtering for IP frames (based on
address, protocol, Layer 4 protocol port number or TCP control code) or any frames
1-2
Loading...
+ 635 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.