User's Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.2.1 Management
- 4.2.1.1 System Information
- 4.2.1.2 IP Configuration
- 4.2.1.3 IP Status
- 4.2.1.4 Users Configuration
- 4.2.1.5 Privilege Levels
- 4.2.1.6 NTP Configuration
- 4.2.1.7 Time Configuration
- 4.2.1.8 UPnP
- 4.2.1.9 DHCP Relay
- 4.2.1.10 DHCP Relay Statistics
- 4.2.1.11 CPU Load
- 4.2.1.12 System Log
- 4.2.1.13 Detailed Log
- 4.2.1.14 Remote Syslog
- 4.2.1.15 SMTP Configuration
- 4.2.2 Simple Network Management Protocol
- 4.2.3 RMON
- 4.2.4 DHCP server
- 4.2.1 Management
- 4.3 Switching
- 4.3.1 Port Management
- 4.3.2 Link Aggregation
- 4.3.3 VLAN
- 4.3.4 Spanning Tree Protocol
- 4.3.5 Multicast
- 4.3.6 MLD Snooping
- 4.3.7 MVR (Multicast VLAN Registration)
- 4.3.8 LLDP
- 4.3.9 MAC Address Table
- 4.3.10 Loop Protection
- 4.3.11 UDLD
- 4.3.12 GVRP
- 4.4 Quality of Service
- 4.5 Security
- 4.6 Maintenance
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A: Networking Connection
- APPENDIX B : GLOSSARY
User’s Manual of MGSW-28240F Managed switch
8
4.5.1.2 Access Management Statistics ................................................................................................................ 240
4.5.1.3 SSH ......................................................................................................................................................... 240
4.5.1.4 HTTPs ..................................................................................................................................................... 241
4.5.2 AAA ................................................................................................................................................................... 244
4.5.2.1 Authentication Configuration .................................................................................................................... 248
4.5.2.2 RADIUS ................................................................................................................................................... 251
4.5.2.3 TACACS+ ................................................................................................................................................ 254
4.5.2.4 RADIUS Overview ................................................................................................................................... 255
4.5.2.5 RADIUS Details ....................................................................................................................................... 257
4.5.3 Port Authentication ............................................................................................................................................ 264
4.5.3.1 Network Access Server Configuration ..................................................................................................... 264
4.5.3.2 Network Access Overview ....................................................................................................................... 267
4.5.3.3 Network Access Statistics ........................................................................................................................ 269
4.5.4 Port Security ...................................................................................................................................................... 273
4.5.4.1 Port Limit Control ..................................................................................................................................... 273
4.5.4.2 Port Security Status ................................................................................................................................. 276
4.5.4.3 Port Security Detail .................................................................................................................................. 279
4.5.5 Access Control Lists .......................................................................................................................................... 280
4.5.5.1 Access Control List Status ....................................................................................................................... 280
4.5.5.2 Access Control List Configuration ............................................................................................................ 282
4.5.5.3 ACE Configuration ................................................................................................................................... 284
4.5.5.4 ACL Ports Configuration .......................................................................................................................... 295
4.5.5.5 ACL Rate Limiters .................................................................................................................................... 297
4.5.6 DHCP Snooping ................................................................................................................................................ 298
4.5.6.1 DHCP Snooping Configuration ................................................................................................................ 298
4.5.6.2 Snooping Table ........................................................................................................................................ 300
4.5.7 IP Source Guard ................................................................................................................................................ 301
4.5.7.1 IP Source Guard Configuration ................................................................................................................ 301
4.5.7.2 Static IP Source Guard Table .................................................................................................................. 302
4.5.7.3 Dynamic IP Source Guard Table ............................................................................................................. 303
4.5.8 ARP Inspection .................................................................................................................................................. 304
4.5.8.1 ARP Inspection ........................................................................................................................................ 304
4.5.8.2 ARP Inspection Static Table ..................................................................................................................... 305
4.5.8.3 Dynamic ARP Inspection Table ................................................................................................................ 306
4.6 Maintenance .............................................................................................................................................. 308
4.6.1 Web Firmware Upgrade ..................................................................................................................................... 308
4.6.2 Save Startup Config .......................................................................................................................................... 309
4.6.3 Configuration Download .................................................................................................................................... 309
4.6.4 Configuration Upload ......................................................................................................................................... 310
4.6.5 Configure Activate ............................................................................................................................................. 311