Dahua PFS4307-4ET-96 Web Operation Manual page 7

Hardened managed switch
Hide thumbs Also See for PFS4307-4ET-96:
Table of Contents

Advertisement

4.8 MAC Table .................................................................................................................................................................................... 19
4.8.1 Adding MAC Table ........................................................................................................................................................ 19
4.8.2 Filtering Port MAC ........................................................................................................................................................ 20
5 PoE Management ................................................................................................................................................................................ 22
5.1 Configuring PoE Settings ..................................................................................................................................................... 22
5.2 Configuring Long Distance PoE ........................................................................................................................................ 23
5.3 Viewing PoE Event Statistics .............................................................................................................................................. 23
5.4 Configuring Green PoE ......................................................................................................................................................... 24
5.5 Configuring Legacy Support .............................................................................................................................................. 24
5.6 Configuring PD Alive ............................................................................................................................................................. 25
6 Security .................................................................................................................................................................................................... 26
6.1 Configuring HTTPS .................................................................................................................................................................. 26
6.2 Configuring CA Certificate .................................................................................................................................................. 26
6.2.1 Installing Device Certificate .................................................................................................................................... 26
6.2.2 Installing Trusted CA Certificates ......................................................................................................................... 27
6.3 Configuring Attack Defense ............................................................................................................................................... 27
6.3.1 Configuring Firewall .................................................................................................................................................... 27
6.3.2 Configuring Anti-DoS Attack .................................................................................................................................. 28
6.4 Configuring Port Isolation .................................................................................................................................................. 29
7 Control Policy ....................................................................................................................................................................................... 30
7.1 Configuring Port Priority ..................................................................................................................................................... 30
7.2 Configuring Priority Mapping Table .............................................................................................................................. 30
7.3 Configuring Queue Scheduling ........................................................................................................................................ 30
7.4 Configure Port Speed Limit ................................................................................................................................................ 31
7.5 Configure Storm Control ...................................................................................................................................................... 31
8 Authentication ..................................................................................................................................................................................... 33
8.1 Configuring 802.1x ................................................................................................................................................................. 33
8.2 Configuring Radius ................................................................................................................................................................. 34
Appendix 1 Cybersecurity Recommendations ........................................................................................................................ 35
VI

Advertisement

Table of Contents
loading

Table of Contents