User's Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web page
- 4.2 System
- 4.2.1 Management
- 4.2.1.1 System Information
- 4.2.1.2 IP Configuration
- 4.2.1.3 IP Status
- 4.2.1.4 ARP
- 4.2.1.5 Users Configuration
- 4.2.1.6 Privilege Levels
- 4.2.1.7 NTP Configuration
- 4.2.1.7.1 System Time Correction Manually
- 4.2.1.8 Time Configuration
- 4.2.1.9 UPnP
- 4.2.1.10 DHCP Relay
- 4.2.1.11 DHCP Relay Statistics
- 4.2.1.12 CPU Load
- 4.2.1.13 System Log
- 4.2.1.14 Detailed Log
- 4.2.1.15 Remote Syslog
- 4.2.1.16 SMTP Configuration
- 4.2.1.17 Fault Alarm
- 4.2.1.18 Digital Input/Output
- 4.2.2 Simple Network Management Protocol
- 4.2.3 RMON
- 4.2.4 DHCP server
- 4.2.5 Industrial Protocol
- 4.2.6 Remote Management
- 4.2.1 Management
- 4.3 Switching
- 4.3.1 Port Management
- 4.3.2 Link Aggregation
- 4.3.3 VLAN
- 4.3.3.1 VLAN Overview
- 4.3.3.2 IEEE 802.1Q VLAN
- 4.3.3.3 VLAN Port Configuration
- 4.3.3.4 VLAN Membership Status
- 4.3.3.5 VLAN Port Status
- 4.3.3.6 Private VLAN
- 4.3.3.7 Port Isolation
- 4.3.3.8 VLAN setting example:
- 4.3.3.8.1 Two Separate 802.1Q VLANs
- 4.3.3.8.2 VLAN Trunking between two 802.1Q aware switches
- 4.3.3.8.3 Port Isolate
- 4.3.3.9 MAC-based VLAN
- 4.3.3.10 IP Subnet-based VLAN Membership Configuration
- 4.3.3.11 Protocol-based VLAN
- 4.3.3.12 Protocol-based VLAN Membership
- 4.3.4 VLAN Translation
- 4.3.5 Spanning Tree Protocol
- 4.3.6 Multicast
- 4.3.7 MLD Snooping
- 4.3.8 MVR (Multicast VLAN Registration)
- 4.3.9 LLDP
- 4.3.10 MAC Address Table
- 4.3.11 Loop Protection
- 4.3.12 UDLD
- 4.3.13 GVRP
- 4.3.14 PTP
- 4.3.15 Link OAM
- 4.4 Quality of Service
- 4.5 Security
- 4.6 Ring
- 4.7 Maintenance
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A: Networking Connection
- APPENDIX B : GLOSSARY
User’s Manual of IGS-5225-16T4S/IGSW-24040T
316
• no: Authentication is disabled and login is not possible.
• local: Use the local user database on the switch for authentication.
• radius: Use remote RADIUS server(s) for authentication.
• tacacs: Use remote TACACS+ server(s) for authentication..
Command Authorization Method Configuration
The command authorization section allows you to limit the CLI commands available to a user.
The table has one row for each client type and a number of columns, which are:
Object Description
Client The management client for which the configuration below applies.
Methods Method can be set to one of the following values:
• no: Command authorization is disabled. User is granted access to CLI
commands according to his privilege level.
• tacacs: Use remote TACACS+ server(s) for command authorization. If
all remote servers are offline, the user is granted access to CLI
commands according to his privilege leve
Cmd Lvl Authorize all commands with a privilege level higher than or equal to this level.
Valid values are in the range 0 to 15.
Cfg Cmd Also authorize configuration commands
Accounting Method Configuration
The accounting section allows you to configure command and exec (login) accounting.
The table has one row for each client type and a number of columns, which are:
Object Description
Client The management client for which the configuration below applies.
Methods Method can be set to one of the following values:
• no: Accounting is disabled.