TP-Link TL-SL5428E manual Protocol Vlan, Required. On the VLAN→MAC VLAN→Port Enable

Page 68

 

 

 

 

the description for the VLAN. Meanwhile, specify its member

 

 

 

 

ports.

 

 

 

 

3

Create MAC VLAN.

 

Required. On the VLAN→MAC VLAN page, create the MAC

 

 

 

 

VLAN. For the device in a MAC VLAN, it’s required to set its

 

 

 

 

connected port of switch to be a member of this VLAN so as to

 

 

 

 

ensure the normal communication.

 

 

 

 

 

4

Select

your desired

 

Required. On the VLAN→MAC VLAN→Port Enable page,

 

ports

for MAC VLAN

 

select and enable the desired ports for MAC VLAN feature.

 

feature.

 

 

 

 

 

 

6.3

Protocol VLAN

 

Protocol VLAN is another way to classify VLANs basing on network protocol. Protocol VLANs can be sorted by IP, IPX, DECnet, AppleTalk, Banyan and so on. Through the Protocol VLANs, the broadcast domain can span over multiple switches and the Host can change its physical position in the network with its VLAN member role always effective. By creating Protocol VLANs, the network administrator can manage the network clients basing on their actual applications and services effectively.

This switch can classify VLANs basing on the common protocol types listed in the following table. Please create the Protocol VLAN to your actual need.

Protocol Type

Type value

ARP

0x0806

 

 

IP

0x0800

 

 

MPLS

0x8847/0x8848

 

 

IPX

0x8137

 

 

IS-IS

0x8000

 

 

LACP

0x8809

 

 

802.1X

0x888E

 

 

Table 6-2Protocol types in common use

The packet in Protocol VLAN is processed in the following way:

1.When receiving an untagged packet, the switch matches the packet with the current Protocol VLAN. If the packet is matched, the switch will add a corresponding Protocol VLAN tag to it. If no Protocol VLAN is matched, the switch will add a tag to the packet according to the PVID of the received port. Thus, the packet is assigned automatically to the corresponding VLAN for transmission.

2.When receiving tagged packet, the switch will process it basing on the 802.1Q VLAN. If the received port is the member of the VLAN to which the tagged packet belongs, the packet will be forwarded normally. Otherwise, the packet will be discarded.

3.If the Protocol VLAN is created, please set its enabled port to be the member of corresponding 802.1Q VLAN so as to ensure the packets forwarded normally.

60

Image 68
Contents Rev 1910010529 Copyright & Trademarks Contents Gvrp TC Protect 101 11.4.1 11.4.2 NtdpVII Package Contents About this Guide Intended ReadersConventions Overview of This GuidePath Switch, which facilitates you to monitor the Igmp messages Return to Contents Introduction Overview of the SwitchMain Features ¾ LEDs Name Status Indication Appearance DescriptionFront Panel Rear Panel Configuration Login to the SwitchLogin Return to Contents System System InfoSystem Summary ¾ Port Status¾ Port Info PortType Rate¾ Device Description Device Description¾ Bandwidth Utilization ¾ Time Info ¾ Time ConfigSystem Time System IP User Manage User TableUser Config ¾ User InfoConfig Restore PasswordConfirm Password Retype the password User ID, Name, Access Level and status Operation¾ Config Backup Config BackupFirmware Upgrade System Reboot System ResetAccess Security Access Control¾ Access Control Config ¾ Session ConfigIP Address&Mask MAC AddressSSL Config ¾ Access User NumberSSH Config ¾ Global Config¾ Certificate Download ¾ Key DownloadMax Connect Idle TimeoutProtocol ¾ Configuration Procedure Key TypeDownload ¾ Network RequirementsApplication Example 2 for SSH Page Return to Contents Switching Port ConfigPort Port SelectPort Mirror DescriptionSpeed and Duplex Flow Control¾ Mirroring Port ¾ Mirrored PortIngress EgressPort Security ¾ Port SecurityLearned Num Port IsolationMax Learned MAC ¾ Port Isolation Config Forward Portlist Select the port that to be forwarded to¾ Port Isolation List Forward Portlist Display the forwardlistLAG LAG TableAggregate Arithmetic ¾ LAG TableGroup Number Member¾ LAG Config Static LAGLacp Config LAG will delete this LAG¾ Lacp Config Admin KeySystem Priority Port Priority¾ Auto Refresh Traffic MonitorTraffic Summary Traffic Statistics MAC Address Type Configuration Way Aging out RelationshipBound Address and the port¾ Search Option ¾ Address TableMAC Address Displays the MAC address learned by the switch Static AddressDisplays the corresponding Vlan ID of the MAC address ¾ Create Static AddressDynamic Address ¾ Static Address Table¾ Aging Config ¾ Dynamic Address TableFiltering Address Bind¾ Create Filtering Address ¾ Filtering Address TableVlan Vlan implementation802.1Q Vlan ¾ Link Types of portsVlan Config ¾ Pvid¾ Vlan Table Vlan ID SelectDescription : Members Operation :¾ Vlan Config Enter the ID number of VlanIs valid or not ¾ Vlan Members¾ Vlan Port Config Port Displays the port numberRequired. On the VLAN→802.1Q VLAN→Port Config page, set Required. On the VLAN→802.1Q VLAN→VLAN Config¾ Vlan of Port Vlan DescriptionOptional. On the VLAN→802.1Q VLAN→VLAN Config MAC VlanMAC Select Port Enable¾ MAC Vlan Table Required. On the VLAN→MAC VLAN→Port Enable Protocol VlanProtocol Vlan Protocol Template¾ Create Protocol Vlan ¾ Protocol Vlan Table¾ Create Protocol Template ¾ Protocol Template TableApplication Example for 802.1Q Vlan Required. On VLAN→802.1Q VLAN→Port Config page, configure Required. On VLAN→802.1Q VLAN→VLAN Config page, create aApplication Example for MAC Vlan Operation Description¾ Network Diagram ¾ Configuration Procedure Application Example for Protocol Vlan Required. On VLAN→Protocol VLAN→Protocol Template On VLAN→Protocol VLAN→Protocol Vlan page, create protocol Protocol type Value¾ VPN Up-link Ports VPN ConfigVlan Mapping ¾ Vlan Mapping Config ¾ Vlan Mapping TableRequired. On the VLAN→VLAN VPN→VPN Config Optional. On the VLAN→VLAN VPN→VPN ConfigRequired. On the VLAN→VLAN VPN→Port Enable Required. On the VLAN→VLAN VPN→VLAN MappingGvrp ¾ Garp¾ Gvrp ¾ Port Config Select Port Status Registration ModeConfiguration Procedure Private Vlan¾ Private Vlan Implementation ¾ Features of Private Vlan¾ The Elements of a Private Vlan Pvid ¾ Packet forwarding in Private Vlan Pvlan ¾ Create Private Vlan ¾ Private Vlan TablePrimary Vlan Secondary VlanPort Select the desired port for configuration Port Type Required. On the VLAN→Private VLAN→Port Configure¾ Private Vlan Port Table Required. On the VLAN→Private VLAN→PVLANApplication Example for Private Vlan Required. On the VLAN→802.1Q VLAN→VLAN Config page, click Spanning Tree ¾ STP Elements¾ STP Timers ¾ Bpdu Comparing Principle in STP mode¾ STP Generation Step Operation¾ Mstp Elements Tips:¾ Rstp Elements ¾ Port States ¾ Port RolesSTP Config STP ConfigForward Delay VersionHello Time Max AgeSTP Summary Port Config STP SummaryPriority ExtPathIntPath Edge PortRegion Config Mstp InstancePort Role Port StatusInstance Config ¾ Region ConfigInstance Port Config ¾ Instance TableInstance ClearInstance ID Path CostSTP Security Port Protect¾ Bpdu Filter ¾ TC Protect¾ Bpdu Protect Loop Protect Root ProtectTC Protect Bpdu ProtectTC Protect 11 TC ProtectOn Spanning Tree→STP Config→STP Config On Spanning Tree→STP Config→Port ConfigApplication Example for STP Function On Spanning Tree→MSTP Instance→InstanceBridge of Instance Configure Switch D ¾ Suggestion for Configuration ¾ Multicast Address Multicast¾ Multicast Overview ¾ Multicast Address Table Multicast IP PortIgmp Snooping ¾ Igmp Snooping¾ Igmp Snooping Process ¾ Igmp MessagesSnooping Config ¾ Igmp Snooping Fundamentals¾ Igmp Snooping Status Description Displays Igmp Snooping status MemberIgmp Snooping Fast LeaveRouter Port Time Member Port TimeLeave Time Static Router PortSnooping→Snooping Config and Port Config Multicast→IGMP Snooping→VLAN ConfigMulticast Vlan Router Port¾ Multicast Vlan On the Multicast→IGMP Snooping→Snooping Config Application Example for Multicast VlanVlan Multicast→IGMP Snooping→Multicast Vlan¾ Configuration Procedure Step Operation Description Snooping→Port ConfigSnooping→Snooping Config Multicast IPMulticast IP Table Static Multicast IP¾ Create Static Multicast ¾ Static Multicast IP TableMulticast Filter IP-Range¾ Port Filter Config Port FilterMulticast→Multicast Filter→Port Filter Packet StatisticsMulticast→Multicast Filter→IP-Range ¾ Igmp Statistics ¾ QoS ¾ Priority ModeQoS ¾ Schedule Mode 802.1Q frameSP-Mode ¾ Port Priority Config DiffServPort Priority Displays the LAG number which the port belongs toSchedule Mode ¾ Schedule Mode Config¾ Priority Level ¾ 802.1P Priority Config3 802.1P Priority Dscp Priority ¾ Dscp Priority Config It ranges from 0 toPriority Level Priority levels are labeled as TC0, TC1, TC2 and TC3Rate Limit ¾ Rate Limit ConfigBandwidth Control Egress Ratebps Storm ControlIngress Rate bps ¾ Storm Control Config Broadcast RateBps Multicast RateNumber OUI Address Vendor ¾ Port Voice Vlan ModeVoice Vlan ¾ Security Mode of Voice Vlan Packet Type Processing ModeGlobal Config 12 Global ConfigurationPort Mode 13 Port ConfigOUI Config Required. On VLAN→802.1Q VLAN→Port Config Optional. On QoS→Voice VLAN→OUI Config page, youRequired. On QoS→Voice VLAN→Port Config Required. On QoS→Voice VLAN→Global ConfigACL Time-RangeTime-Range Summary IndexTime-Range Create ACL Config Holiday Config¾ Create Holiday ¾ Holiday TableACL Summary ACL Create¾ Rule Table ¾ Create ACLMAC ACL ¾ Create MAC ACLRule ID EtherTypeStandard-IP ACL ¾ Create Standard-IP ACLFragment MaskExtend-IP ACL ¾ Create Extend-IP ACLPolicy Config Policy SummaryPolicy Create Action CreateSelect Policy Desired policy, please click the Delete button11 Action Create ¾ Create ActionPolicy Binding Binding TablePort Binding ¾ Policy Bind TableEnter the ID of the Vlan you want to bind Vlan BindingDirection Displays the binding direction Application Example for ACL ¾ VLAN-Bind TableOn ACL→ACL Config→ACL Create page, create ACL On ACL→ACL Config→Standard-IP ACL page, select ACL Network Security IP-MAC BindingManual Binding ¾ Manual Binding Option Enter the Vlan IDProtect Type Select the Protect Type for the entry ¾ Manual Binding TableARP Scanning Dhcp Snooping Start IP AddressEnd IP Address ScanNetwork diagram for DHCP-snooping implementation ¾ Dhcp Working Principle¾ Option Dhcp Cheating Attack Implementation Procedure ¾ Dhcp Cheating Attack163 ¾ Option 82 Config ¾ Port Config Port SelectDecline Threshold Decline Flow Control Customization Circuit ID Remote ID¾ Cheating Gateway ARP Inspection¾ Imitating Gateway 10 ARP Attack Cheating Gateway ¾ Cheating Terminal Hosts¾ Man-In-The-Middle Attack ¾ ARP Flooding Attack ¾ Trusted Port ARP Detect¾ ARP Detect Network Security→ARP ARP DefendRequired. On the Network Security→IP-MAC ARP Statistics ¾ ARP DefendDefend SpeedIP Source Guard ¾ Illegal ARP Packet¾ IP Source Guard Config DoS DefendDoS Attack Type Description DoS Defend DoS Detect11.5 Detect TimeDetect Attack Type¾ The Mechanism of an 802.1X Authentication System ¾ 802.1X Authentication Procedure178 179 ¾ 802.1X Timer ¾ Guest VlanAuthentication Method 802.1XGuest Vlan Guest Vlan IDRetry Times Supplicant TimeoutServer Timeout Control Mode Radius ServerControl Type AuthorizedOn the Network Security→802.1X→Global Config 802.1X Client SoftwareRequired. On the Network Security→802.1X→Radius Required. On the Network Security→802.1X→PortSnmp ¾ Snmp Overview¾ Snmp Management Frame ¾ Snmp Versions¾ Snmp Configuration Outline ¾ MIB Introduction¾ Remote Engine Snmp Config¾ Local Engine Snmp View MIB Object IDView Type View Name¾ Group Config Snmp GroupSnmp User ¾ Group TableAuth Mode Auth PasswordPrivacy Mode Privacy PasswordSnmp Community ¾ Community ConfigAccess Required. On the SNMP→SNMP Config→Global Required. On the SNMP→SNMP Config→SNMPMIB View ¾ Community TableOn the SNMP→SNMP Config→SNMP NotificationTimeout UDP PortUser RetryRmon Group Function Rmon¾ Rmon Group ¾ History Control Table Event ConfigHistory Control Alarm Config ¾ Event TableVariable Sample TypeRising Threshold Rising Event200 Cluster ¾ Cluster Role¾ Introduction to Cluster 13.1 NDPNeighbor Info ¾ Neighbor Info NDP Summary¾ Neighbor ¾ Port Status Displays the port number of the switch NDPAging Time NDP ConfigDetail : Port Displays the port number of the switch NtdpDevice Table Displays NDP status of the current portNtdp Summary Ntdp Summary Ntdp Hops Ntdp ConfigNtdp Interval Time Cluster Summary EnableCluster ¾ Global Config Cluster ¾ Cluster Config¾ Global Cluster ¾ Member InfoSwitch 11 Cluster Summary for Member Switch¾ Role Change Cluster Config¾ Current Role 14 Cluster Configuration for Commander Switch Member Config 16 Cluster Configuration for Individual SwitchCluster Topology ¾ Create MemberDevice Name Member MAC18 Collect Topology ¾ Graphic ShowApplication Example for Cluster Function On Cluster→NDP→NDP Config page, enable NDP On Cluster→NTDP→NTDP Config page, enable220 CPU Monitor MaintenanceSystem Monitor Memory Monitor 14.2 Log Content Log TableTime Module¾ Local Log Config Local LogRemote Log Log BufferHost IP Backup Log¾ Log Host ¾ Backup Log Device DiagnoseCable Test ¾ Cable TestError Switch is availableLoopback Length¾ Ping Config Network DiagnosePing Test¾ Tracert Config TracertConfigure the Hyper Terminal System Maintenance via FTPHardware Installation 232 Download Firmware via bootrom menu 5Port SettingsTP-LINK ifconfig ip 172.31.70.22 mask 255.255.255.0 gateway TP-LINK upgrade You can only use the port 1 to upgradeTP-LINK start Start User Access Login Appendix a Specifications Appendix B Configuring the PCs Configure TCP/IP component238 Now Installation Guide Appendix C 802.1X Client Software241 242 Uninstall Software Figure C-7 InstallShield Wizard CompleteConfiguration Figure C-10 Uninstall Complete245 Figure C-15 Connection Status FAQ Appendix D Glossary Multicast Switching Group Attribute Registration Protocol GarpIeee 802.1D Ieee 802.1QPort Authentication Remote Authentication Dial-in User Service RadiusLink Aggregation Link Aggregation Control Protocol LacpSimple Network Management Protocol Snmp Simple Network Time Protocol SntpSpanning Tree Algorithm STA Telnet
Related manuals
Manual 32 pages 39.81 Kb