TP-Link JetStream TL-SG3424P User Manual page 7

Jetstream l2 managed poe switch
Hide thumbs Also See for JetStream TL-SG3424P:
Table of Contents

Advertisement

10.2.1  Time-Range Summary ...................................................................................134 
10.2.2  PoE Time-Range Create ................................................................................135 
10.2.3  PoE Holiday Config........................................................................................136 
Chapter 11 ACL ..........................................................................................................................137 
11.1  Time-Range ..............................................................................................................137 
11.1.1 
Time-Range Summary ...................................................................................137 
11.1.2 
Time-Range Create........................................................................................138 
11.1.3 
Holiday Config................................................................................................139 
11.2  ACL Config ...............................................................................................................139 
11.2.1 
ACL Summary................................................................................................140 
11.2.2 
ACL Create ....................................................................................................140 
11.2.3 
MAC ACL .......................................................................................................141 
11.2.4 
Standard-IP ACL ............................................................................................142 
11.2.5 
Extend-IP ACL ...............................................................................................142 
11.3  Policy Config.............................................................................................................144 
11.3.1 
Policy Summary .............................................................................................144 
11.3.2 
Policy Create..................................................................................................144 
11.3.3 
Action Create .................................................................................................145 
11.4  Policy Binding ...........................................................................................................146 
11.4.1 
Binding Table .................................................................................................146 
11.4.2 
Port Binding ...................................................................................................147 
11.4.3 
VLAN Binding.................................................................................................147 
11.5  Application Example for ACL ....................................................................................148 
Chapter 12 Network Security ......................................................................................................151 
12.1  IP-MAC Binding ........................................................................................................151 
12.1.1  Binding Table .................................................................................................151 
12.1.2  Manual Binding ..............................................................................................152 
12.1.3  ARP Scanning................................................................................................154 
12.1.4  DHCP Snooping.............................................................................................155 
12.2  ARP Inspection .........................................................................................................161 
12.2.1  ARP Detect ....................................................................................................165 
12.2.2  ARP Defend ...................................................................................................166 
12.2.3  ARP Statistics ................................................................................................168 
12.3  DoS Defend ..............................................................................................................168 
12.4.1  Global Config .................................................................................................174 
12.4.2  Port Config .....................................................................................................176 
VIII

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents