Operation Manual
Table Of Contents
- Package Contents
- Chapter 1 About This Guide
- Chapter 2 Introduction
- Chapter 3 Login to the Switch
- Chapter 4 System
- Chapter 5 Switching
- Chapter 6 VLAN
- Chapter 7 Spanning Tree
- Chapter 8 Ethernet OAM
- Chapter 9 DHCP
- Chapter 10 Multicast
- Chapter 11 QoS
- Chapter 12 ACL
- Chapter 13 Network Security
- Chapter 14 SNMP
- Chapter 15 LLDP
- Chapter 16 Cluster
- Chapter 17 Maintenance
- Chapter 18 System Maintenance via FTP
- Appendix A: Glossary
274
Memory Utilization:
If selected, the switch will send a Memory Utilization
trap when
the memory utilization rate is over 80%.
Flash Operation:
If selected, the switch will send a Flash Operation trap when a
flash operation occurs. The flash operations include firmware
upgrading, system resetting, config restoring and config saving.
VLAN C
reate/Delete
If selected, the switch will send a VLAN Create/Delete
trap when
a VLAN is being created or deleted.
IP Change:
If selected, the switch will send an IP Change trap when t
he IP
address of the switch is changed.
Storm Control:
If selected, the
switch will send a Storm Control trap when the
broadcast, multicast or UL rate exceeds the limit. You can
configure the limit on QoS→Bandwidth Control →
Storm
Control page.
Bandwidth Control:
If selected, the switch will send a Bandwidth Control trap when
the traffic rate of a port exceeds the limit. You can configure the
limit on QoS→Bandwidth Control→Rate limit page.
LLDP:
If selected, the switch will send an LLDP trap when t
he status of
LLDP changes.
MAC Address Table:
If selected, the switch will sen
d a MAC Address Table trap when
the MAC address table has any changes.
Loopback
Detection:
If selected, the switch will send a Loopback Detection
trap when
the status of loopback detection changes.
Spanning Tree:
If selected, the switch will send a Spanning Tree trap when t
he
status of STP on the port changes.
Port Access:
If selected, the switch will send a Port Access trap when some
users try to log on to the w
eb management page via ports
that have
no authority. You can configure the access control
policy on System→Access Security→Access Control page.
IP
-MAC Binding: If selected, the switch will send an IP-MAC Binding
trap when it
receives a packet from the host that does not match the rules in
IP-MAC binding table. You can configure the IP-
MAC Binding
policy on Network Security→IP-MAC Binding page.
IP Duplicate:
If selected, the switch will send an IP Duplicate
trap when
another host uses the switch's IP address.
DHCP Filter:
If selected, the switch will send a DHCP Filter
trap when it
receives a DHCP packet from an untrusted port.
DDM Temperature:
If selected, the switch will send a DDM Temperature trap
when
the value of DDM temperature exceeds the threshold.