User's Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.3 Port Management
- 4.4 Link Aggregation
- 4.5 VLAN
- 4.5.1 VLAN Overview
- 4.5.2 IEEE 802.1Q VLAN
- 4.5.3 Management VLAN
- 4.5.4 Create VLAN
- 4.5.5 Interface Settings
- 4.5.6 Port to VLAN
- 4.5.7 Port VLAN Membership
- 4.5.8 Protocol VLAN Group Setting
- 4.5.9 Protocol VLAN Port Setting
- 4.5.10 GVRP Setting
- 4.5.11 GVRP Port Setting
- 4.5.12 GVRP VLAN
- 4.5.13 GVRP Statistics
- 4.5.14 VLAN setting example:
- 4.6 Spanning Tree Protocol
- 4.7 Multicast
- 4.8 Quality of Service
- 4.9 Security
- 4.10 ACL
- 4.11 MAC Address Table
- 4.12 LLDP
- 4.13 Diagnostics
- 4.14 RMON
- 4.15 Maintenance
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A
- GSD-1002M
User’s Manual of GSD-1002M
■ Supports Spanning Tree Protocol
- STP (Spanning Tree Protocol)
- RSTP (Rapid Spanning Tree Protocol)
- MSTP (Multiple Spanning Tree Protocol)
- STP BPDU Guard, BPDU Filtering and BPDU Forwarding
■ Supports Link Aggregation
IEEE 802.3ad Link Aggregation Control Protocol (LACP)
Cisco ether-channel (Static Trunk)
Maximum 8 trunk groups, up to 8 ports per trunk group
■ Provides Port Mirror (many-to-1)
■ Loop protection to avoid broadcast loops
Quality of Service
■ Ingress / Egress Rate Limit per port bandwidth control
■ Storm Control support
Broadcast / Unknown-Unicast / Unknown-Multicast
■ Traffic classification:
- IEEE 802.1p CoS
- TOS / DSCP / IP Precedence of IPv4/IPv6 packets
■ Strict priority and Weighted Round Robin (WRR) CoS policies
Multicast
■ Supports IGMP Snooping v2 and v3
■ Supports MLD Snooping v1, v2
■ IGMP Querier mode support
■ IGMP Snooping port filtering
■ MLD Snooping port filtering
Security
■ Authentication
IEEE 802.1X Port-based network access authentication
Built-in RADIUS client to co-operate with the RADIUS servers
RADIUS / TACACS+ login user access authentication
■ Access Control List
IPv4 / IPv6 IP-based ACL
MAC-based ACL
■ MAC Security
Static MAC
MAC Filtering
■ Port Security for Source MAC address entries filtering
■ DHCP Snooping to filter distrusted DHCP messages
■ Dynamic ARP Inspection discards ARP packets with invalid MAC address to IP address binding
■ IP Source Guard prevents IP spoofing attacks
14