ECS2020 Series Web Management Guide-R04
5
5.1.2 Adding a VLAN .............................................................................................................................................. 35
5.1.3 Remove VLAN ................................................................................................................................................ 35
5.1.4 Editing VLAN ................................................................................................................................................. 36
5.1.5 View port mode ............................................................................................................................................. 38
5.1.6 Change the port mode is trunk ..................................................................................................................... 38
5.1.7 Change the port mode is hybrid .................................................................................................................... 39
5.2 VOICE VLAN ......................................................................................................................................................... 40
5.2.1 View voice VLAN information ........................................................................................................................ 40
5.2.2 Configure voice VLAN global ......................................................................................................................... 40
5.2.3 Configure voice VLAN port ............................................................................................................................ 41
5.2.4 Configure voice VLAN OUI ............................................................................................................................. 41
5.2.5 Voice device address ..................................................................................................................................... 42
5.3 SURVEILLANCE VLAN .............................................................................................................................................. 42
5.3.1 View surveillance VLAN information ............................................................................................................. 42
5.3.2 Configure surveillance VLAN ......................................................................................................................... 43
5.3.3 MAC settings and surveillance device ........................................................................................................... 43
5.3.4 MAC settings and surveillance device ........................................................................................................... 44
5.4 ONVIF ................................................................................................................................................................ 44
5.4.1 View ONVIF Information ............................................................................................................................... 44
5.4.2 View IP-Camera Information ......................................................................................................................... 45
5.4.3 View NVR Information .................................................................................................................................. 45
6 FAULT/SAFETY ................................................................................................................................................. 46
6.1 ATTACK PREVENTION ............................................................................................................................................... 46
6.1.1 ARP snooping ................................................................................................................................................ 46
6.1.2 Port security .................................................................................................................................................. 48
6.1.3 DHCP snooping .............................................................................................................................................. 49
6.1.4 CPU Guard ..................................................................................................................................................... 52
6.2 PATH DETECTION .................................................................................................................................................... 53
6.2.1 Path/Tracert detection .................................................................................................................................. 53
6.2.2 Cable detection ............................................................................................................................................. 54
6.3 PORT ERROR DISABLE .............................................................................................................................................. 55
6.4 DDOS PROTECTION ................................................................................................................................................ 56
6.5 LOOP DETECTION .................................................................................................................................................... 57
6.5.1 Enable loopback detection ............................................................................................................................ 57
6.5.2 Choose the port to configure ........................................................................................................................ 58
6.6 STP ..................................................................................................................................................................... 58
6.6.1 Enable STP function ....................................................................................................................................... 59
6.6.2 STP port settings ........................................................................................................................................... 59
6.7 ACCESS CONTROL ................................................................................................................................................... 60
6.7.1 ACL access control list ................................................................................................................................... 60
6.7.2 Application ACL ............................................................................................................................................. 63
6.8 IGMP SNOOPING ................................................................................................................................................... 64
6.8.1 View IGMP snooping configuration .............................................................................................................. 65
6.8.2 Action multicast listener function ................................................................................................................. 65
6.8.3 Disable multicast listener function ................................................................................................................ 65
6.8.4 Configuration multicast routing .................................................................................................................... 66
6.8.5 IGMP Version ................................................................................................................................................ 66
6.8.6 IGMP Querier ................................................................................................................................................ 67