Draytek VigorSwitch P2542x handleiding
Handleiding
Je bekijkt pagina 4 van 359

IV
II-5-5 STP........................................................................................................................................................................ 64
II-5-6 QoS ....................................................................................................................................................................... 67
II-6 Multicast................................................................................................................................................................................ 70
II-6-1 IGMP Snooping.................................................................................................................................................... 70
II-6-1-1 IGMP Snooping ............................................................................................................................................ 70
II-6-1-2 VLAN Setting................................................................................................................................................. 71
II-6-1-3 Group Table.................................................................................................................................................. 73
II-6-1-4 Filtering Profile............................................................................................................................................. 74
II-6-2 MVR ...................................................................................................................................................................... 75
II-6-2-1 Port Setting................................................................................................................................................... 77
II-6-2-2 Static Group ................................................................................................................................................. 79
II-6-3 MLD Snooping..................................................................................................................................................... 81
II-6-3-1 MLD Snooping.............................................................................................................................................. 81
II-6-3-2 VLAN Setting................................................................................................................................................. 82
II-6-3-3 Group Table.................................................................................................................................................. 84
II-6-3-4 Filtering Profile............................................................................................................................................. 85
II-7 ONVIF Surveillance............................................................................................................................................................... 87
II-7-1 Topology .............................................................................................................................................................. 88
II-7-2 Snapshot Stream................................................................................................................................................. 91
II-7-3 Device Maintenance............................................................................................................................................ 92
II-8 RADIUS/TACACS+.................................................................................................................................................................. 96
II-8-1 RADIUS ................................................................................................................................................................. 96
II-8-2 TACACS+............................................................................................................................................................... 98
Chapter III Security......................................................................................................................................................... 101
III-1 802.1x/MAC Authentication............................................................................................................................................. 102
III-1-1 802.1x/MAC Authentication ............................................................................................................................ 102
III-1-2 Local MAC Account .......................................................................................................................................... 105
III-1-3 Authentication Hosts ....................................................................................................................................... 107
III-2 Access Control List............................................................................................................................................................ 108
III-2-1 Access Control List ........................................................................................................................................... 108
III-1-2 Apply to Port..................................................................................................................................................... 117
III-3 IP Source Guard ................................................................................................................................................................ 119
III-4 Port Security ...................................................................................................................................................................... 121
III-5 Storm Control.................................................................................................................................................................... 123
III-6 DoS ..................................................................................................................................................................................... 125
III-6-1 Properties ......................................................................................................................................................... 125
III-6-2 Port Setting....................................................................................................................................................... 127
III-7 Dynamic ARP Inspection .................................................................................................................................................. 128
III-7-1 Properties ......................................................................................................................................................... 128
III-7-2 Statistics ............................................................................................................................................................ 130
III-8 DHCP Snooping................................................................................................................................................................. 131
III-8-1 DHCP Snooping................................................................................................................................................ 131
III-8-2 Option82 ........................................................................................................................................................... 132
III-8-3 Statistics ............................................................................................................................................................ 134
III-9 IP Conflict Prevention ....................................................................................................................................................... 135
III-10 Loop Protection............................................................................................................................................................... 140
III-11 Port Recovery .................................................................................................................................................................. 142
Chapter IV Utilities ......................................................................................................................................................... 143
IV-1 Device Check ..................................................................................................................................................................... 144
Bekijk gratis de handleiding van Draytek VigorSwitch P2542x, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.
Productinformatie
Merk | Draytek |
Model | VigorSwitch P2542x |
Categorie | Niet gecategoriseerd |
Taal | Nederlands |
Grootte | 65198 MB |