TP-Link TL-SL5428E User Manual page 7

24-port 10/100mbps + 4-port gigabit jetstream l2 managed switch
Table of Contents

Advertisement

9.2.1
Rate Limit.......................................................................................................124
9.2.2
Storm Control .................................................................................................125
9.3
Voice VLAN ..............................................................................................................127
9.3.1
Global Config .................................................................................................129
9.3.2
Port Config .....................................................................................................129
9.3.3
OUI Config .....................................................................................................131
Chapter 10 ACL ..........................................................................................................................133
10.1
Time-Range ..............................................................................................................133
10.1.1
Time-Range Summary ...................................................................................133
10.1.2
Time-Range Create........................................................................................134
10.1.3
Holiday Config................................................................................................135
10.2
ACL Config ...............................................................................................................135
10.2.1
ACL Summary................................................................................................135
10.2.2
ACL Create ....................................................................................................136
10.2.3
MAC ACL .......................................................................................................136
10.2.4
Standard-IP ACL ............................................................................................137
10.2.5
Extend-IP ACL ...............................................................................................138
10.3
Policy Config.............................................................................................................140
10.3.1
Policy Summary .............................................................................................140
10.3.2
Policy Create..................................................................................................141
10.3.3
Action Create .................................................................................................141
10.4
Policy Binding ...........................................................................................................142
10.4.1
Binding Table .................................................................................................142
10.4.2
Port Binding ...................................................................................................143
10.4.3
VLAN Binding.................................................................................................143
10.5
Application Example for ACL ....................................................................................144
Chapter 11 Network Security ......................................................................................................147
11.1
IP-MAC Binding ........................................................................................................147
11.1.1
Binding Table .................................................................................................147
11.1.2
Manual Binding ..............................................................................................148
11.1.3
ARP Scanning................................................................................................149
11.1.4
DHCP Snooping.............................................................................................151
11.2
ARP Inspection .........................................................................................................156
11.2.1
ARP Detect ....................................................................................................160
11.2.2
ARP Defend ...................................................................................................161
11.2.3
ARP Statistics ................................................................................................162
11.3
IP Source Guard .......................................................................................................163
IV

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents