User Manual
Table Of Contents
- 8-Port or 16-Port Gigabit Smart Managed Pro Switch with PoE+ and 2 SFP Ports
- Contents
- 1 Get Started
- Available publications
- Switch management and discovery overview
- Change the default IP address of the switch
- Discover or change the switch IP address
- About the user interfaces
- Access the local browser interface
- Change the language of the local browser interface
- Use the Device View of the local browser interface
- Interface naming conventions
- Configure interface settings
- Context–sensitive help and access to the support website
- Access the user manual online
- Register your product
- 2 Configure System Information
- View or define system information
- Configure the IP network settings for management access
- Configure the time settings
- Configure denial of service settings
- Configure the DNS settings
- Configure green Ethernet settings
- Use the Device View
- Configure Power over Ethernet
- Configure SNMP
- Configure LLDP
- Configure a DHCP L2 relay, DHCP snooping, and dynamic ARP inspection
- Set up PoE timer schedules
- 3 Configure Switching
- Configure the port settings
- Configure link aggregation groups
- Configure VLANs
- Configure a voice VLAN
- Configure Auto-VoIP
- Configure Spanning Tree Protocol
- Configure multicast
- Manage IGMP snooping
- Configure IGMP snooping
- Configure IGMP snooping for interfaces
- View, search, or clear the IGMP snooping table
- Configure IGMP snooping for VLANs
- Modify IGMP snooping settings for a VLAN
- Disable IGMP snooping on a VLAN and remove it from the table
- Configure one or more IGMP multicast router interfaces
- Configure an IGMP multicast router VLAN
- IGMP snooping querier overview
- Configure an IGMP snooping querier
- Configure an IGMP snooping querier for a VLAN
- Display the status of the IGMP snooping querier for VLANs
- Manage MLD snooping
- Enable MLD snooping
- Configure MLD snooping for interfaces
- Configure the MLD VLAN settings
- Modify the MLD snooping settings for a VLAN
- Remove MLD snooping from a VLAN
- Configure one or more MLD multicast router interfaces
- Configure an MLD multicast router VLAN
- Configure an MLD snooping querier
- Configure the MLD snooping querier VLAN settings
- Configure multicast VLAN registration
- View, search, and manage the MAC address table
- Configure Layer 2 loop protection
- 4 Configure Routing
- 5 Configure Quality of Service
- 6 Manage Device Security
- Change the device password for the local browser interface
- Manage the RADIUS settings
- Configure the TACACS+ settings
- Configure authentication lists
- Manage the Smart Control Center Utility
- Configure management access
- Control access with profiles and rules
- Configure port authentication
- Set up traffic control
- Configure access control lists
- Use the ACL Wizard to create a simple ACL
- Configure a MAC ACL
- Configure MAC ACL rules
- Configure MAC bindings
- View or delete MAC ACL bindings in the MAC binding table
- Configure a basic or extended IPv4 ACL
- Configure rules for a basic IPv4 ACL
- Configure rules for an extended IPv4 ACL
- Configure an IPv6 ACL
- Configure rules for an IPv6 ACL
- Configure IP ACL interface bindings
- View or delete IP ACL bindings in the IP ACL binding table
- Configure VLAN ACL bindings
- 7 Monitor the Switch and the Traffic
- 8 Maintain or Troubleshoot the Switch
- A Configuration Examples
- B Specifications and Default Settings
8-Port or 16-Port Gigabit Smart Managed Pro Switch Model GS418TPP, GS510TLP, and GS510TPP
Configure System Information User Manual115
The following table describes the DHCP snooping statistics.
Table 29. DHCP Snooping Statistics information
Field Description
Interface The interface associated with the rest of the data in the row.
MAC Verify Failures The number of DHCP messages that were dropped because the source MAC address
and client hardware address did not match. MAC address verification is performed only if
it is globally enabled.
Client Ifc Mismatch The number of packets that were dropped by DHCP snooping because the interface and
VLAN on which the packet was received do not match the client’
s interface and VLAN
information stored in the binding database.
DHCP Server Msgs
Received
The number of DHCP server messages ((DHCPOFFER, DHCPACK, DHCPNAK,
DHCPRELEASEQUER
Y) that were dropped on an untrusted port.
Manage dynamic ARP Inspection
Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP
packets. DAI prevents a class of man-in-the-middle attacks where an unfriendly station
intercepts traffic for other stations by poisoning the ARP caches of its unsuspecting
neighbors. The malicious attacker sends ARP requests or responses mapping another
station’s IP address to its own MAC address.
When DAI is enabled, the switch drops ARP packets whose sender MAC address and
sender IP address do not match an entry in the DHCP snooping bindings database.
You can
optionally configure additional
ARP packet validation.
When DAI is enabled on a VLAN, DAI is enabled on the interfaces (physical ports or LAGs)
that are members of that VLAN. Individual interfaces are configured as trusted or untrusted.
The trust configuration for DAI is independent of the trust configuration for DHCP snooping.
Configure dynamic ARP inspection globally
If you configure the source MAC address validation option, DAI verifies that the sender MAC
address in an ARP packet equals the source MAC address in the Ethernet header.
The Ethernet header includes a configurable option to verify that the target MAC address in
the ARP packet equals the destination MAC address. This check applies only to
ARP
responses, since the target MAC address is unspecified in ARP requests. You can also
enable IP address checking. When this option is enabled, DAI drops ARP packets with an
invalid IP address. The following IP addresses are considered invalid:
• 0.0.0.0
• 255.255.255.255
• All IP multicast addresses
• All class E addresses (240.0.0.0/4)
• Loopback addresses (in the range 127.0.0.0/8)










