User's Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.2.1 Management
- 4.2.1.1 System Information
- 4.2.1.2 IP Configuration
- 4.2.1.3 IP Status
- 4.2.1.4 ARP
- 4.2.1.5 Users Configuration
- 4.2.1.6 Privilege Levels
- 4.2.1.7 NTP Configuration
- 4.2.1.8 Time Configuration
- 4.2.1.9 Time Configuration
- 4.2.1.10 UPnP
- 4.2.1.11 CPU Load
- 4.2.1.12 System Log
- 4.2.1.13 Detailed Log
- 4.2.1.14 Remote Syslog
- 4.2.1.15 SMTP Configuration
- 4.2.2 SNMP
- 4.2.3 RMON
- 4.2.4 DHCP Relay
- 4.2.5 DHCP server
- 4.2.6 Remote Management
- 4.2.1 Management
- 4.3 Switching
- 4.3.1 Port Management
- 4.3.2 Link Aggregation
- 4.3.3 VLANs
- 4.3.4 VLAN Translation
- 4.3.5 VLAN Translation Mappings
- 4.3.6 Private VLANs
- 4.3.7 VCL
- 4.3.8 GVRP
- 4.3.9 MRP
- 4.3.10 Spanning Tree
- 4.3.11 IGMP Snooping
- 4.3.12 MLD Snooping
- 4.3.13 MVR (Multicast VLAN Registration)
- 4.3.14 LLDP
- 4.3.15 MAC Address Table
- 4.3.16 Loop Protection
- 4.3.17 UDLD
- 4.3.18 Link OAM
- 4.3.19 CFM
- 4.3.20 sFlow
- 4.4 Routing
- 4.5 QoS
- 4.6 Security
- 4.7 POE
- 4.8 Ring
- 4.9 ONVIF
- 4.10 Maintenance
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A: Networking Connection
- APPENDIX B : GLOSSARY
User’s Manual of GS-6320 and MGS-6320 Managed Switches
10
4.6.2.5 RADIUS Details ....................................................................................................................................... 356
4.6.3 Port Authentication ............................................................................................................................................ 363
4.6.3.1 Network Access Server Configuration ..................................................................................................... 363
4.6.3.2 Network Access Overview ....................................................................................................................... 367
4.6.3.3 Network Access Statistics ........................................................................................................................ 368
4.6.4 Port Security ...................................................................................................................................................... 372
4.6.4.1 Port Limit Control ..................................................................................................................................... 372
4.6.4.2 Port Security Status ................................................................................................................................. 375
4.6.4.3 Port Security Detail .................................................................................................................................. 377
4.6.5 Access Control Lists .......................................................................................................................................... 378
4.6.5.1 Access Control List Status ....................................................................................................................... 379
4.6.5.2 Access Control List Configuration ............................................................................................................ 380
4.6.5.3 ACE Configuration ................................................................................................................................... 382
4.6.5.4 ACL Ports Configuration .......................................................................................................................... 392
4.6.5.5 ACL Rate Limiters .................................................................................................................................... 394
4.6.6 DHCP Snooping ................................................................................................................................................ 395
4.6.6.1 DHCP Snooping Configuration ................................................................................................................ 395
4.6.6.2 Snooping Table ........................................................................................................................................ 397
4.6.7 DHCPv6 Snooping ............................................................................................................................................ 398
4.6.7.1 DHCPv6 Snooping Configuration ............................................................................................................ 398
4.6.8 IP Source Guard ................................................................................................................................................ 399
4.6.8.1 IP Source Guard Configuration................................................................................................................ 399
4.6.8.2 Static IP Source Guard Table .................................................................................................................. 401
4.6.8.3 Dynamic IP Source Guard Table ............................................................................................................. 401
4.6.9 IPv6 Source Guard ............................................................................................................................................ 403
4.6.9.1 IPv6 Source Guard Configuration ............................................................................................................ 403
4.6.10 ARP Inspection ................................................................................................................................................ 404
4.6.10.1 ARP Inspection ...................................................................................................................................... 404
4.6.10.2 ARP Inspection Static Table................................................................................................................... 406
4.6.10.3 Dynamic ARP Inspection Table .............................................................................................................. 407
4.7 POE ............................................................................................................................................................ 408
4.7.1 PoE Switch Introduction .................................................................................................................................... 408
4.7.2 Power over Ethernet Powered Device ............................................................................................................... 409
4.7.3 PoE System Configuration................................................................................................................................. 410
4.7.4 Port Configuration .............................................................................................................................................. 412
4.7.5 Status ................................................................................................................................................................ 417
4.7.6 Port Sequential .................................................................................................................................................. 419
4.7.7 Schedule............................................................................................................................................................ 420
4.7.8 PoE Alive Check Configuration .......................................................................................................................... 423
4.7.9 Port Power Consumption ................................................................................................................................... 425