GS-5220-Series (V4) User Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.2.1 Management
- 4.2.1.1 System Information
- 4.2.1.2 IP Configuration
- 4.2.1.3 IP Status
- 4.2.1.4 Users Configuration
- 4.2.1.5 Privilege Levels
- 4.2.1.6 NTP Configuration
- 4.2.1.6.1 System Time Correction Manually
- 4.2.1.7 Time Configuration
- 4.2.1.8 UPnP
- 4.2.1.9 DHCP Relay
- 4.2.1.10 DHCP Relay Statistics
- 4.2.1.11 CPU Load
- 4.2.1.12 System Log
- 4.2.1.13 Detailed Log
- 4.2.1.14 Remote Syslog
- 4.2.1.15 SMTP Configuration
- 4.2.2 Simple Network Management Protocol
- 4.2.3 RMON
- 4.2.4 DHCP server
- 4.2.1 Management
- 4.3 Switching
- 4.3.1 Port Management
- 4.3.2 Link Aggregation
- 4.3.3 VLAN
- 4.3.3.1 VLAN Overview
- 4.3.3.2 IEEE 802.1Q VLAN
- 4.3.3.3 VLAN Port Configuration
- 4.3.3.4 VLAN Membership Status
- 4.3.3.5 VLAN Port Status
- 4.3.3.6 Private VLAN
- 4.3.3.7 Port Isolation
- 4.3.3.8 VLAN setting example:
- 4.3.3.8.1 Two Separate 802.1Q VLANs
- 4.3.3.8.2 VLAN Trunking between two 802.1Q aware switches
- 4.3.3.8.3 Port Isolate
- 4.3.3.9 MAC-based VLAN
- 4.3.3.10 Protocol-based VLAN
- 4.3.3.11 Protocol-based VLAN Membership
- 4.3.4 Spanning Tree Protocol
- 4.3.5 IGMP Snooping
- 4.3.6 MLD Snooping
- 4.3.7 MVR (Multicast VLAN Registration)
- 4.3.8 LLDP
- 4.3.9 MAC Address Table
- 4.3.10 Loop Protection
- 4.3.11 UDLD
- 4.3.12 GVRP
- 4.3.13 Link OAM
- 4.4 Routing
- 4.5 Quality of Service
- 4.6 Security
- 4.7 Power over Ethernet
- 4.8 Ring
- 4.9 ONVIF
- 4.10 Maintenance
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A: Networking Connection
- APPENDIX B : GLOSSARY
User’s Manual of GS-5220 PoE Series Managed Switch
340
granted, if the remaining ports have already used all available MAC addresses.
• Violation Mode
If Limit is reached, the switch can take one of the following actions:
Protect: Do not allow more than Limit MAC addresses on the port, but take no further
action.
Restrict: If Limit is reached, subsequent MAC addresses on the port will be counted
and marked as violating. Such MAC addreses are removed from the MAC table
when the hold time expires. At most Violation Limit MAC addresses can be marked
as violating at any given time.
Shutdown: If Limit is reached, one additional MAC address will cause the port to be
shut down. This implies that all secured MAC addresses be removed from the port,
and no new addresses be learned. There are three ways to re-open the port:
1) In the "Configuration→Ports" page's "Configured" column, first disable the port,
then restore the original mode.
2) Make a Port Security configuration change on the port.
3) Boot the switch.
• Violation Limit The maximum number of MAC addresses that can be marked as violating on
this port. This number cannot exceed 1024. Default is 4. It is only used
when Violation Mode is Restrict.
• State
This column shows the current state of the port as seen from the Limit Control's point
of view. The state takes one of four values:
Disabled: Limit Control is either globally disabled or disabled on the port.
Ready: The limit is not yet reached. This can be shown for all actions.
Limit Reached: Indicates that the limit is reached on this port. This state can
only be shown if Action is set to None or Trap.
Shutdown: Indicates that the port is shut down by the Limit Control module. This
state can only be shown if Action is set to Shutdown or Trap & Shutdown.
Buttons
: Click to apply changes
: Click to undo any changes made locally and revert to previously saved values.
: Click to refresh the page. Note that non-committed changes will be lost.