IGS-6325-Series User Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web page
- 4.2 System
- 4.2.1 Management
- 4.2.1.1 System Information
- 4.2.1.2 IP Configuration
- 4.2.1.3 IP Status
- 4.2.1.4 Users Configuration
- 4.2.1.5 Privilege Levels
- 4.2.1.6 NTP Configuration
- 4.2.1.6.1 System Time Correction Manually
- 4.2.1.7 Time Configuration
- 4.2.1.8 UPnP
- 4.2.1.9 DHCP Relay
- 4.2.1.10 DHCP Relay Statistics
- 4.2.1.11 CPU Load
- 4.2.1.12 System Log
- 4.2.1.13 Detailed Log
- 4.2.1.14 Remote Syslog
- 4.2.1.15 SMTP Configuration
- 4.2.1.16 Fault Alarm
- 4.2.1.17 Digital Input/Output
- 4.2.2 Simple Network Management Protocol
- 4.2.3 RMON
- 4.2.4 DHCP server
- 4.2.5 Industrial Protocol
- 4.2.1 Management
- 4.3 Switching
- 4.3.1 Port Management
- 4.3.2 Link Aggregation
- 4.3.3 VLAN
- 4.3.3.1 VLAN Overview
- 4.3.3.2 IEEE 802.1Q VLAN
- 4.3.3.3 VLAN Port Configuration
- 4.3.3.4 VLAN Membership Status
- 4.3.3.5 VLAN Port Status
- 4.3.3.6 Private VLAN
- 4.3.3.7 Port Isolation
- 4.3.3.8 VLAN setting example:
- 4.3.3.8.1 Two Separate 802.1Q VLANs
- 4.3.3.8.2 VLAN Trunking between two 802.1Q aware switches
- 4.3.3.8.3 Port Isolate
- 4.3.3.9 MAC-based VLAN
- 4.3.3.10 IP Subnet-based VLAN Membership Configuration
- 4.3.3.11 Protocol-based VLAN
- 4.3.3.12 Protocol-based VLAN Membership
- 4.3.4 Spanning Tree Protocol
- 4.3.5 Multicast
- 4.3.6 MLD Snooping
- 4.3.7 MVR (Multicast VLAN Registration)
- 4.3.8 LLDP
- 4.3.9 MAC Address Table
- 4.3.10 Loop Protection
- 4.3.11 UDLD
- 4.3.12 GVRP
- 4.3.13 PTP
- 4.3.14 Link OAM
- 4.4 Quality of Service
- 4.5 Security
- 4.6 Ring
- 4.7 Maintenance
- 4.8 Power over Ethernet
- 4.9 ONVIF
- 4.10 Routing
- 4.10.1 IP Configuration
- 4.10.2 IP Status
- 4.10.3 Routing Information Base
- 4.10.4 OSPF
- 4.10.4.1 Global Configuration
- 4.10.4.2 Network Area
- 4.10.4.3 Passive Interface
- 4.10.4.4 Stub Area
- 4.10.4.5 Area Authentication
- 4.10.4.6 Area Range
- 4.10.4.7 Interface Configuration
- 4.10.4.8 Virtual Link
- 4.10.4.9 Global Status
- 4.10.4.10 Area Status
- 4.10.4.11 Neighbor Status
- 4.10.4.12 Interface Status
- 4.10.4.13 Configuration Example of OSPFv4
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A: Networking Connection
- APPENDIX B : GLOSSARY
User’s Manual of IGS-6325 series
8
4.5.1 Access Security ............................................................................................................................................... 314
4.5.1.1 Access Management ............................................................................................................................... 314
4.5.1.2 Access Management Statistics ................................................................................................................ 315
4.5.1.3 SSH ......................................................................................................................................................... 317
4.5.1.4 HTTPs ..................................................................................................................................................... 318
4.5.2 AAA ................................................................................................................................................................... 320
4.5.2.1 Authentication Configuration .................................................................................................................... 324
4.5.2.2 RADIUS ................................................................................................................................................... 327
4.5.2.3 TACACS+ ................................................................................................................................................ 329
4.5.2.4 RADIUS Overview ................................................................................................................................... 330
4.5.2.5 RADIUS Details ....................................................................................................................................... 333
4.5.3 Port Authentication ......................................................................................................................................... 340
4.5.3.1 Network Access Server Configuration ..................................................................................................... 340
4.5.3.2 Network Access Overview ....................................................................................................................... 344
4.5.3.3 Network Access Statistics ........................................................................................................................ 345
4.5.4 Port Security .................................................................................................................................................... 350
4.5.4.1 Port Limit Control ..................................................................................................................................... 350
4.5.4.2 Port Security Status ................................................................................................................................. 353
4.5.4.3 Port Security Detail .................................................................................................................................. 356
4.5.5 Access Control Lists ....................................................................................................................................... 358
4.5.5.1 Access Control List Status ....................................................................................................................... 358
4.5.5.2 Access Control List Configuration ............................................................................................................ 360
4.5.5.3 ACE Configuration ................................................................................................................................... 362
4.5.5.4 ACL Ports Configuration .......................................................................................................................... 371
4.5.5.5 ACL Rate Limiters .................................................................................................................................... 374
4.5.6 DHCP Snooping ............................................................................................................................................... 375
4.5.6.1 DHCP Snooping Configuration ................................................................................................................ 375
4.5.6.2 Snooping Table ........................................................................................................................................ 377
4.5.7 IP Source Guard .............................................................................................................................................. 378
4.5.7.1 IP Source Guard Configuration................................................................................................................ 378
4.5.7.2 Static IP Source Guard Table .................................................................................................................. 379
4.5.7.3 Dynamic IP Source Guard Table ............................................................................................................. 380
4.5.8 ARP Inspection ................................................................................................................................................ 381
4.5.8.1 ARP Inspection ........................................................................................................................................ 381
4.5.8.2 ARP Inspection Static Table..................................................................................................................... 382
4.5.8.3 Dynamic ARP Inspection Table ................................................................................................................ 383
4.6 Ring ......................................................................................................................................................... 385
4.6.1 ERPS Ring ........................................................................................................................................................ 385
4.6.1.1 MEP Configuration .................................................................................................................................. 386
4.6.1.2 Detailed MEP Configuration .................................................................................................................... 388
4.6.1.3 Ethernet Ring Protocol Switch ................................................................................................................. 394