Table Of Contents - Vivotek AW-GEV-264A Series User Manual

L2 managed poe switch
Table of Contents

Advertisement

INTRODUCTION ......................................................................................................................... 10
CHAPTER 1 HARDWARE INSTALLATION.................................................................................. 11
CHAPTER 2 OPERATION OF WEB-BASED MANAGEMENT ....................................................... 13
CHAPTER 3 SWITCH- SYSTEM CONFIGURATION ..................................................................... 16
3-1 System ..................................................................................................................................................... 16
3-1.1 Information ............................................................................................................................................. 16
3-1.2 IP ............................................................................................................................................................. 18
3-1.3 NTP ......................................................................................................................................................... 21
3-1.4 Time ........................................................................................................................................................ 22
3-1.5 Log .......................................................................................................................................................... 25
3-2 Green Ethernet ........................................................................................................................................ 26
3-3 Ports Configuration .................................................................................................................................. 28
3-3.1 Ports ........................................................................................................................................................ 28
3-3.2 Ports Description .................................................................................................................................... 31
3-4 DHCP ........................................................................................................................................................ 32
3-4.1 Server ...................................................................................................................................................... 32
3-4.1.1 Mode ............................................................................................................................................. 32
3-4.1.2 Excluded IP .................................................................................................................................. 34
3-4.1.3 Pool ............................................................................................................................................... 35
3-4.2 Snooping ................................................................................................................................................. 37
3-5 Security .................................................................................................................................................... 39
3-5.1 Switch ..................................................................................................................................................... 39
3-5.1.1 Users ............................................................................................................................................. 39
3-5.1.2 Privilege Level ............................................................................................................................. 41
3-5.1.3 Authentication Method ................................................................................................................ 43
2-5.1.4 HTTPs ........................................................................................................................................... 44
3-5.1.6 SNMP............................................................................................................................................ 45
3-5.1.7 RMON ........................................................................................................................................... 59
3-5.2 Network .................................................................................................................................................. 65
3-5.2.1 Limit Control ................................................................................................................................. 65
3-5.2.2 NAS ............................................................................................................................................... 69
3-5.2.3 ACL ............................................................................................................................................... 76
3-5.2.4 IP Source Guard ......................................................................................................................... 84
3-5.2.5 ARP Inspection ............................................................................................................................ 87
3-5.3 AAA ......................................................................................................................................................... 94
3-5.3.1 RADIUS ........................................................................................................................................ 94
3-6 Aggregation ............................................................................................................................................. 97
3-6.1 Static ....................................................................................................................................................... 97
3-6.2 LACP ........................................................................................................................................................ 99
3-7 Loop Protection ..................................................................................................................................... 101
3-8 Spanning Tree ........................................................................................................................................ 103
3-8.1 Bridge Setting ........................................................................................................................................ 103
3-8.2 MSTI Mapping ....................................................................................................................................... 106
User Manual rev. 1.2. Aug. 2015

Table of Contents

4

Advertisement

Table of Contents
loading

Table of Contents