User's Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.3 Port Management
- 4.4 Link Aggregation
- 4.5 VLAN
- 4.5.1 VLAN Overview
- 4.5.2 IEEE 802.1Q VLAN
- 4.5.3 Management VLAN
- 4.5.4 Create VLAN
- 4.5.5 Interface Settings
- 4.5.6 Port to VLAN
- 4.5.7 Port VLAN Membership
- 4.5.8 Protocol VLAN Group Setting
- 4.5.9 Protocol VLAN Port Setting
- 4.5.10 GVRP Setting
- 4.5.11 GVRP Port Setting
- 4.5.12 GVRP VLAN
- 4.5.13 GVRP Statistics
- 4.5.14 VLAN Setting Example:
- 4.6 Spanning Tree Protocol
- 4.7 Multicast
- 4.8 Quality of Service
- 4.9 Security
- 4.10 ACL
- 4.11 MAC Address Table
- 4.12 LLDP
- 4.13 Diagnostics
- 4.14 RMON
- 4.15 Power over Ethernet
- 4.16 Maintenance
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A Switch's RJ45 Pin Assignments
User’s Manual of IGS-4215 Series
84
The page includes the following fields:
Object Description
• Community Name
Displays the current community type.
• Group Name
Displays the current SNMP access group’s name.
• View Name
Displays the current view name.
• Access Right
Displays the current access type.
• Delete
: Delete the community entry.
4.2.7.6 SNMP User
Configure SNMPv3 users table on this page. Each SNMPv3 user is defined by a unique name. Users must be configured with a
specific security level and assigned to a group. The SNMPv3 group restricts users to a specific read, write, and notify view. The
entry index key is User Name. The SNMPv3 User Setting screens in Figure 4-2-29 and Figure 4-2-30 appear.
Figure 4-2-29: SNMPv3 Users Configuration Page Screenshot
The page includes the following fields:
Object Description
• User Name
A string identifying the user name that this entry should belong to.
The allowed string length is 1 to 16.
• Group
The SNMP Access Group. A string identifying the group name that this entry
should belong to.
• Privilege Mode
Indicates the security model that this entry should belong to. Possible security
models are:
NoAuth: None authentication and none privacy.
Auth: Authentication and none privacy.
Priv: Authentication and privacy.
The value of security level cannot be modified if entry already exists. That means
you must first ensure that the value is set correctly.
• Authentication
Protocol
Indicates the authentication protocol that this entry should belong to. Possible
authentication protocols are:
None: None authentication protocol.
MD5: An optional flag to indicate that this user using MD5.