Draytek VigorSwitch P2542x handleiding

359 pagina's
PDF beschikbaar

Handleiding

Je bekijkt pagina 4 van 359
IV
II-5-5 STP........................................................................................................................................................................ 64
II-5-6 QoS ....................................................................................................................................................................... 67
II-6 Multicast................................................................................................................................................................................ 70
II-6-1 IGMP Snooping.................................................................................................................................................... 70
II-6-1-1 IGMP Snooping ............................................................................................................................................ 70
II-6-1-2 VLAN Setting................................................................................................................................................. 71
II-6-1-3 Group Table.................................................................................................................................................. 73
II-6-1-4 Filtering Profile............................................................................................................................................. 74
II-6-2 MVR ...................................................................................................................................................................... 75
II-6-2-1 Port Setting................................................................................................................................................... 77
II-6-2-2 Static Group ................................................................................................................................................. 79
II-6-3 MLD Snooping..................................................................................................................................................... 81
II-6-3-1 MLD Snooping.............................................................................................................................................. 81
II-6-3-2 VLAN Setting................................................................................................................................................. 82
II-6-3-3 Group Table.................................................................................................................................................. 84
II-6-3-4 Filtering Profile............................................................................................................................................. 85
II-7 ONVIF Surveillance............................................................................................................................................................... 87
II-7-1 Topology .............................................................................................................................................................. 88
II-7-2 Snapshot Stream................................................................................................................................................. 91
II-7-3 Device Maintenance............................................................................................................................................ 92
II-8 RADIUS/TACACS+.................................................................................................................................................................. 96
II-8-1 RADIUS ................................................................................................................................................................. 96
II-8-2 TACACS+............................................................................................................................................................... 98
Chapter III Security......................................................................................................................................................... 101
III-1 802.1x/MAC Authentication............................................................................................................................................. 102
III-1-1 802.1x/MAC Authentication ............................................................................................................................ 102
III-1-2 Local MAC Account .......................................................................................................................................... 105
III-1-3 Authentication Hosts ....................................................................................................................................... 107
III-2 Access Control List............................................................................................................................................................ 108
III-2-1 Access Control List ........................................................................................................................................... 108
III-1-2 Apply to Port..................................................................................................................................................... 117
III-3 IP Source Guard ................................................................................................................................................................ 119
III-4 Port Security ...................................................................................................................................................................... 121
III-5 Storm Control.................................................................................................................................................................... 123
III-6 DoS ..................................................................................................................................................................................... 125
III-6-1 Properties ......................................................................................................................................................... 125
III-6-2 Port Setting....................................................................................................................................................... 127
III-7 Dynamic ARP Inspection .................................................................................................................................................. 128
III-7-1 Properties ......................................................................................................................................................... 128
III-7-2 Statistics ............................................................................................................................................................ 130
III-8 DHCP Snooping................................................................................................................................................................. 131
III-8-1 DHCP Snooping................................................................................................................................................ 131
III-8-2 Option82 ........................................................................................................................................................... 132
III-8-3 Statistics ............................................................................................................................................................ 134
III-9 IP Conflict Prevention ....................................................................................................................................................... 135
III-10 Loop Protection............................................................................................................................................................... 140
III-11 Port Recovery .................................................................................................................................................................. 142
Chapter IV Utilities ......................................................................................................................................................... 143
IV-1 Device Check ..................................................................................................................................................................... 144

Bekijk gratis de handleiding van Draytek VigorSwitch P2542x, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.

Productinformatie

MerkDraytek
ModelVigorSwitch P2542x
CategorieNiet gecategoriseerd
TaalNederlands
Grootte65198 MB