User Manual
Table Of Contents
- S350 Series 8-Port Gigabit Ethernet Smart Switch
- Contents
- 1 Get Started
- Available Publications
- Switch Management and Discovery Overview
- Options to Change the Default IP Address of the Switch
- Discover or Change the Switch IP Address
- About the User Interfaces
- Access the Local Browser Interface
- Change the Language of the Local Browser Interface
- Use the Device View of the Local Browser Interface
- Interface Naming Conventions
- Configure Interface Settings
- Context-Sensitive Help and Access to the Support WebSite
- Access the User Guide Online
- Register Your Product
- 2 Configure System Information
- 3 Configure Switching
- Configure the Port Settings and Maximum Frame Size
- Configure Link Aggregation Groups
- Configure VLANs
- Configure a Voice VLAN
- Configure Auto-VoIP
- Configure Spanning Tree Protocol
- Configure Multicast
- View and Search the MFDB Table
- View the MFDB Statistics
- Configure the Auto-Video Multicast Settings
- About IGMP Snooping
- Configure IGMP Snooping
- Configure IGMP Snooping for Interfaces
- View, Search, or Clear the IGMP Snooping Table
- Configure IGMP Snooping for VLANs
- Modify IGMP Snooping Settings for a VLAN
- Disable IGMP Snooping on a VLAN
- Configure a Multicast Router Interface
- Configure a Multicast Router VLAN
- IGMP Snooping Querier Overview
- Configure an IGMP Snooping Querier
- Configure an IGMP Snooping Querier for VLANs
- Display IGMP Snooping Querier for VLAN Status
- View, Search, and Manage the MAC Address Table
- Configure Layer 2 Loop Protection
- 4 Configure Quality of Service
- 5 Manage Device Security
- Configure the Management Security Settings
- Configure Management Access
- Configure Port Authentication
- Set Up Traffic Control
- Configure Access Control Lists
- Use the ACL Wizard to Create a Simple ACL
- Configure a Basic MAC ACL
- Configure MAC ACL Rules
- Configure MAC Bindings
- View or Delete MAC ACL Bindings in the MAC Binding Table
- Configure a Basic or Extended IP ACL
- Configure Rules for a Basic IP ACL
- Configure Rules for an Extended IP ACL
- Configure IP ACL Interface Bindings
- View or Delete IP ACL Bindings in the IP ACL Binding Table
- Configure VLAN ACL Bindings
- 6 Monitor the System
- 7 Maintenance
- A Configuration Examples
- B Specifications and Default Settings
S350 Series 8-Port Gigabit Ethernet Smart Switch Models GS308T and GS310TP
User Manual6
Manage Differentiated Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .181
Defining DiffServ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Configure and Display Global DiffServ Settings. . . . . . . . . . . . . . . . . . 182
Configure a DiffServ Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Configure a DiffServ Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Configure the DiffServ Service Interface . . . . . . . . . . . . . . . . . . . . . . . . 195
View DiffServ Service Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Chapter 5 Manage Device Security
Configure the Management Security Settings . . . . . . . . . . . . . . . . . . . . . 199
Change the Password for the Local Browser Interface . . . . . . . . . . . . 199
Manage the RADIUS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Configure TACACS+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Configure Authentication Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Manage the Smart Control Center Utility . . . . . . . . . . . . . . . . . . . . . . . 216
Configure Management Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .217
Configure HTTP Access Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Configure HTTPS Access Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Manage Certificates for HTTPS Access . . . . . . . . . . . . . . . . . . . . . . . . . 219
Transfer an Existing Certificate to the Switch . . . . . . . . . . . . . . . . . . . . 221
Manage Access Control to the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Configure Port Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230
Configure Global 802.1X Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Manage Port Authentication on Individual Ports . . . . . . . . . . . . . . . . . 232
View the Port Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
View the Client Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Set Up Traffic Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Manage MAC Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
MAC Filter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Configure Storm Control Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Manage Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Configure Protected Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Configure Access Control Lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .251
Use the ACL Wizard to Create a Simple ACL . . . . . . . . . . . . . . . . . . . . 251
Configure a Basic MAC ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Configure MAC ACL Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
Configure MAC Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
View or Delete MAC ACL Bindings in the MAC Binding Table . . . . . 265
Configure a Basic or Extended IP ACL. . . . . . . . . . . . . . . . . . . . . . . . . . 266
Configure Rules for a Basic IP ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Configure Rules for an Extended IP ACL . . . . . . . . . . . . . . . . . . . . . . . . 273
Configure IP ACL Interface Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
View or Delete IP ACL Bindings in the IP ACL Binding Table. . . . . . . 282
Configure VLAN ACL Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283










