Black Box LPB2910A User Manual page 8

Lpb2900 series gigabit managed poe+ switches
Hide thumbs Also See for LPB2910A:
Table of Contents

Advertisement

Table   o f   C ontents  
Revision   H istory   . ...............................................................................................................................................   i x
INTRODUCTION   . ...........................................................................................  1  
OPERATION   O F   W EB-­‐BASED   M
SYSTEM   C
ONFIGURATION  ...............................................................................  6  
2-­‐1   S ystem   . ....................................................................................................................................................   6
2-­‐1.1   I nformation   . ..............................................................................................................................................  6
2-­‐1.2   I P   . ..............................................................................................................................................................  7
2-­‐1.3   N TP   ..........................................................................................................................................................  10
2-­‐1.4   T ime   . .......................................................................................................................................................  11
2-­‐1.5   L og   . .........................................................................................................................................................  14
2-­‐2   G reen   E thernet   . .....................................................................................................................................   1 5
2-­‐3   P orts   C onfiguration   . ...............................................................................................................................   1 8
2-­‐3.1   P orts  ........................................................................................................................................................  18
2-­‐3.2   P orts   D escription   . ...................................................................................................................................  20
2-­‐4DHCP   . .....................................................................................................................................................   2 1
2-­‐4.1   S erver   . .....................................................................................................................................................  21
2-­‐4.1.1   M ode   . ..............................................................................................................................................  21
2-­‐4.1.2   E xcluded   I P   . .....................................................................................................................................  23
2-­‐4.1.3   P ool   . ................................................................................................................................................  24
2-­‐4.2   S nooping   . ................................................................................................................................................  26
2-­‐4.3   R elay   . ......................................................................................................................................................  28
2-­‐5   S ecurity   ..................................................................................................................................................   3 0
2-­‐5.1   S witch   . ....................................................................................................................................................  30
2-­‐5.1.1   U sers   . ..............................................................................................................................................  30
2-­‐5.1.2   P rivilege   L evel   . ................................................................................................................................  32
2-­‐5.1.3   A uthentication   M ethod   . .................................................................................................................  34
2-­‐5.1.4   S SH   . .................................................................................................................................................  35
2-­‐5.1.5   H TTPs   . .............................................................................................................................................  36
2-­‐5.1.6   A ccess   M anagement   . ......................................................................................................................  37
2-­‐5.1.7   S NMP   ...............................................................................................................................................  39
2-­‐5.1.8   R MON  ..............................................................................................................................................  54
2-­‐5.2   N etwork   . .................................................................................................................................................  61
2-­‐5.2.1   L imit   C ontrol   . ..................................................................................................................................  61
2-­‐5.2.2   N AS  ..................................................................................................................................................  65
2-­‐5.2.3   A CL   . .................................................................................................................................................  73
2-­‐5.2.4   I P   S ource   G uard   ...............................................................................................................................  80
2-­‐5.2.5   A RP   I nspection   . ...............................................................................................................................  82
2-­‐5.3   A AA   . ........................................................................................................................................................  89
2-­‐5.3.1   R ADIUS   . ...........................................................................................................................................  89
2-­‐5.3.2   T ACACS+   . .........................................................................................................................................  92
2-­‐6   A ggregation   . ..........................................................................................................................................   9 4
2-­‐6.1   S tatic   . ......................................................................................................................................................  94
2-­‐6.2   L ACP   . .......................................................................................................................................................  96
2-­‐7   L oop   P rotection   . ....................................................................................................................................   9 8
2-­‐8   S panning   T ree  .......................................................................................................................................   100
 
ANAGEMENT   . ........................................................  2  
iv
Publication date: Sept, 2015
Revision A1
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Lpb2926aLpb2952a

Table of Contents