Chapter

Introduction

 

 

 

 

 

 

 

 

 

Chapter 8 Multicast

This module is used to configure multicast function of the switch.

 

Here mainly introduces:

 

 

 

z IGMP Snooping:

Configure

global

parameters of IGMP

 

 

Snooping function, port properties, VLAN and multicast VLAN.

 

z Multicast IP: Configure multicast IP table.

 

z

Multicast Filter: Configure multicast filter feature to restrict

 

 

users ordering multicast programs.

 

 

z Packet Statistics: View the multicast data traffic on each port of

 

 

the switch, which facilitates you to monitor the IGMP messages

 

 

in the network.

 

 

 

 

 

Chapter 9 QoS

This module is used to configure QoS function to provide different

 

quality of service for various network applications and

 

requirements. Here mainly introduces:

 

 

z

DiffServ: Configure priorities, port priority, 802.1P priority and

 

 

DSCP priority.

 

 

 

 

z

Bandwidth Control: Configure rate limit feature to control the

 

 

traffic rate on each port; configure storm control feature to filter

 

 

broadcast, multicast and UL frame in the network.

 

z

Voice VLAN: Configure voice VLAN to transmit voice data

 

 

stream within the specified VLAN so as to ensure the

 

 

transmission priority of voice data stream and voice quality.

 

 

Chapter 10 ACL

This module is used to configure match rules and process policies

 

of packets to filter packets in order to control the access of the

 

illegal users to the network. Here mainly introduces:

 

z Time-Range: Configure the effective time for ACL rules.

 

z ACL Config: ACL rules.

 

 

 

z Policy Config: Configure operation policies.

 

z Policy Binding: Bind the policy to a port/VLAN to take its effect

 

 

on a specific port/VLAN.

 

 

 

 

Chapter 11 Network Security

This module is used to configure the multiple protection measures

 

for the network security. Here mainly introduces:

 

z IP-MAC Binding: Bind the IP address, MAC address, VLAN ID

 

 

and the connected Port number of the Host together.

 

z

ARP Inspection: Configure ARP inspection feature to prevent

 

 

the network from ARP attacks.

 

 

 

z IP Source Guard: Configure IP source guard feature to filter IP

 

 

packets in the LAN.

 

 

 

 

z

DoS Defend: Configure DoS defend feature to prevent DoS

 

 

attack.

 

 

 

 

z 802.1X: Configure

common

access

control mechanism for

 

 

LAN ports to solve mainly authentication and security

 

 

problems.

 

 

 

 

 

 

 

 

 

4

Page 12
Image 12
TP-Link TL-SL5428E manual Switch, which facilitates you to monitor the Igmp messages