Linksys LGS528P Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Switche sieciowe Linksys LGS528P. Linksys LGS528P [en] Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 100
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - User Guide, v1

User Guide, v1Managed Switch LGS5XX

Strona 2 - Table of Contents

CHAPTER 2 System StatusLinksys6Interface StatisticsThe Interface Statistics page displays traffic statistics per port. The refresh rate of the informa

Strona 3

Visit linksys.com/support for award-winning technical support© 2014 Belkin International, Inc. and/or its affiliates. All rights reserved. BELKIN, LIN

Strona 4

7Chapter 3 Quick StartLinksys7Chapter 3 Quick StartQuick StartThis section describes how to view device statistics.To simplify device configuration th

Strona 5 - CHAPTER 1 Getting Started

8Chapter 4 System ManagementLinksysChapter 4 System ManagementSystem ManagementThis chapter describes the following topics: • System Information • Tim

Strona 6 - Interface Naming Conventions

9Chapter 4 System ManagementLinksysTime Configuration MethodsThe following methods are available for setting the system time on the device: • Manual—Y

Strona 7 - Window Navigation

10Chapter 4 System ManagementLinksys • SNTP Client Unicast—Select to enable client Unicast mode. • SNTP IPv4 Multicast Rx—Select to receive SNTP IPv4

Strona 8 - CHAPTER 2 System Status

11Chapter 4 System ManagementLinksysSNTP Unicast ServerUp to 16 Unicast SNTP servers can be configured.NOTE:To specify a Unicast SNTP server by name,

Strona 9

12Chapter 4 System ManagementLinksysSNTP Multicast/Anycast InterfaceThe device can be in active and/or passive mode (see SNTP Modes for more informati

Strona 10 - Interface Statistics

13Chapter 4 System ManagementLinksysYou can configure the messages that are written to each log by severity, and a message can go to more.Log Manageme

Strona 11

14Chapter 4 System ManagementLinksysRemote Log ServersThe Remote Log Servers page enables defining remote SYSLOG servers where log messages are sent (

Strona 12 - Chapter 4 System Management

15Chapter 4 System ManagementLinksysTCAM ResourcesThe TCAM Resources page is only displayed in Layer 3 mode.TCAM holds the rules produced by applicati

Strona 13

iTable of ContentsLinksysiChapter 1: Getting Started . . . . . . . . . . . . . . . . . . . . . 1Starting the Web-based Configuration Utility . . . . .

Strona 14

16Chapter 5 Port ManagementLinksys16Chapter 5 Port ManagementPort ManagementThis section describes port configuration, link aggregation, and the Green

Strona 15 - SNTP Unicast Server

17Chapter 5 Port ManagementLinksys- Port protection is not subject to VLAN membership. Devices connected to protected ports are not allowed to commun

Strona 16

18Chapter 5 Port ManagementLinksysLoad BalancingTraffic forwarded to a LAG is load-balanced across the active member ports, thus achieving an effectiv

Strona 17 - Log Management

19Chapter 5 Port ManagementLinksysSTEP 4 Enter the values for the following fields: • Operational Status—Displays the following:- Status—Whether the

Strona 18

20Chapter 5 Port ManagementLinksysEnergy Efficient Ethernet FeatureEEE is designed to save power when there is no traffic on the link. In Energy Detec

Strona 19 - TCAM Resources

21Chapter 5 Port ManagementLinksys802.3 EEE Configuration WorkflowThis section describes how to configure the 802.3 EEE feature and view its counters.

Strona 20 - Chapter 5 Port Management

22Chapter 5 Port ManagementLinksys • Energy Detect Reason— If Energy Detect Mode is not operational, this field identifies why not.STEP 5 Select a Po

Strona 21 - Link Aggregation

23Chapter 5 Port ManagementLinksysPoE Operation • PoE implementation stages are as follows: • Detection—Sends special pulses on the copper cable. When

Strona 22

24Chapter 5 Port ManagementLinksysCAUTIONConsider the following when connecting switches capable of supplying PoE:The PoE model of the device is PSE (

Strona 23 - Green Ethernet

25Chapter 5 Port ManagementLinksysPort Limit Power ModeTo configure port limit power mode do the following:STEP 1 Click Configuration > Port Manag

Strona 24

iiTable of ContentsLinksysChapter 7: Spanning Tree Management . . . . . . . . . . . . .32Overview. . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 25 - Configuring Green Ethernet

26Chapter 6 VLAN ManagementLinksys26Chapter 6 VLAN ManagementVLAN ManagementThis section covers the following topics:• Overview• VLANs• Interfaces•

Strona 26 - Overview

27Chapter 6 VLAN ManagementLinksysSome VLANs can have additional roles: • Voice VLAN—For more information refer to Voice VLAN. • Guest VLAN—For more i

Strona 27

28Chapter 6 VLAN ManagementLinksysTo create a VLAN, do the following:STEP 1 Click Configuration > VLAN Management > VLANs.This page displays th

Strona 28 - Feature Configuration

29Chapter 6 VLAN ManagementLinksysVLAN MembershipsThe VLAN Memberships page displays the VLAN memberships of the ports in various presentations. You c

Strona 29 - Class Limit Power Mode

30Chapter 6 VLAN ManagementLinksysVoice VLANThis section covers the following topics: • Overview • Feature Configuration • Telephony OUI InterfacesOve

Strona 30 - Chapter 6 VLAN Management

31Chapter 6 VLAN ManagementLinksysVoice VLAN WorkflowWorkflow1: To configure the Telephony OUI MethodSTEP 1 Configure Telephony OUI in the Feature Co

Strona 31 - VLAN Creation

32Chapter 7 Spanning Tree ManagementLinksys32Chapter 7 Spanning Tree ManagementSpanning Tree ManagementThis section describes the Spanning Tree Protoc

Strona 32 - Interfaces

33Chapter 7 Spanning Tree ManagementLinksys• HelloTime—Settheinterval(inseconds)thatarootbridgewaitsbetweenconfiguration messages. • Maxi

Strona 33 - VLAN Memberships

34Chapter 7 Spanning Tree ManagementLinksys- Forwarding—The port is in Forwarding Mode. The port can forward traffic and learn new MAC addresses. • D

Strona 34 - Voice VLAN

35Chapter 7 Spanning Tree ManagementLinksys • STP Mode — Select either STP or RSTP. • Point to Point Status—Displays the point-to-point operational st

Strona 35

iiiTable of ContentsLinksysPort Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71Storm Control. . . . . . . . . . . . . . .

Strona 36 - Management

36Chapter 8 MAC Address ManagementLinksys36Chapter 8 MAC Address ManagementMAC Address ManagementThis section describes how to add MAC addresses to th

Strona 37 - STP Interfaces

37Chapter 9 MulticastLinksysChapter 9 MulticastMulticastThis section describes the Multicast Forwarding feature and covers the following topics: • Ove

Strona 38 - RSTP Interfaces

38Chapter 9 MulticastLinksysThe system maintains lists of Multicast groups for each VLAN, and this manages the Multicast information that each port sh

Strona 39

39Chapter 9 MulticastLinksys • Bridge Multicast Filtering—Select to enable filtering of Multicast addresses.VLAN Settings • VLAN ID—Select the VLAN ID

Strona 40 - Chapter 8 MAC Address

40Chapter 9 MulticastLinksysMulticast Router PortsA Multicast router (Mrouter) port is a port that connects to a Multicast router. The device includes

Strona 41 - Chapter 9 Multicast

41Chapter 9 MulticastLinksysUnregistered MulticastMulticast frames are generally forwarded to all ports in the VLAN. If IGMP Snooping is enabled, the

Strona 42

42Chapter 9 MulticastLinksysMAC Group Address FDBThe device supports forwarding incoming Multicast traffic based on the Multicast group information. T

Strona 43 - IGMP Snooping

43Chapter 9 MulticastLinksysIP Group Address FDBThe IP Group Address FDB page enables querying and adding IP Multicast groups contained in the IP Mult

Strona 44 - Forward All

44Chapter 10 IP InterfaceLinksys44Chapter 10 IP InterfaceIP InterfaceThis section describes IP interfaces and covers the following topics: • IPv4 • IP

Strona 45 - IGMP IP Group Addresses

45Chapter 10 IP InterfaceLinksysThe IP address assignment rules for the device are as follows: • When in Layer 2 system mode, unless the device is con

Strona 46 - MAC Group Address FDB

1CHAPTER 1 Getting StartedLinksys1CHAPTER 1 Getting StartedGetting StartedThis section provides an introduction to the Web-based configuration utility

Strona 47 - IP Group Address FDB

46Chapter 10 IP InterfaceLinksys • Default Gateway—Displays the current default gateway status.NOTE:If the device is not configured with a default gat

Strona 48 - Chapter 10 IP Interface

47Chapter 10 IP InterfaceLinksys • Route Type—Select the route type.- Reject—Rejects the route and stops routing to the destination network via all g

Strona 49

48Chapter 10 IP InterfaceLinksysIPv6This section describes IPv6 configuration. It covers the following topics: • Overview • IPv6 Interfaces • IPv6 Int

Strona 50 - IPv4 Static Routes

49Chapter 10 IP InterfaceLinksysIPv6 Interface AddressesTo assign an IPv6 address to an IPv6 Interface, do the following:STEP 1 Click Configuration &

Strona 51

50Chapter 11 IP Network OperationsLinksys50Chapter 11 IP Network OperationsIP Network OperationsThis section covers the following topics:• DomainNam

Strona 52 - IPv6 Interface

51Chapter 11 IP Network OperationsLinksysDHCPThis section describes DHCP configuration. It covers the following topics: • Overview • DHCP Snooping/Rel

Strona 53 - IPv6 Default Routers

52Chapter 11 IP Network OperationsLinksysInteractions Between DHCPv4 Snooping, DHCPv4 Relay and Option 82The following tables describe how the device

Strona 54 - Operations

53Chapter 11 IP Network OperationsLinksysThe following describes how DHCP request packets are handled when DHCP snooping is disabled.DHCP RelayVLAN wi

Strona 55

54Chapter 11 IP Network OperationsLinksysDHCP Trusted Packet HandlingThe actions are as follows:STEP 1 Device sends DHCPDISCOVER to request an IP add

Strona 56 - DHCPv4 Relay and Option 82

55Chapter 11 IP Network OperationsLinksysDHCP Snooping Along With DHCP RelayIf both DHCP Snooping and DHCP Relay are globally enabled, then if DHCP Sn

Strona 57

2CHAPTER 1 Getting StartedLinksysStarting the Web-based Configuration UtilityThis section describes how to navigate the Web-based switch configuration

Strona 58 - DHCP Snooping Packet Handling

56Chapter 11 IP Network OperationsLinksys • DHCP Snooping—Select to enable DHCP snooping. • DHCP Relay— Select to enable DHCP Relay.STEP 2 To enable

Strona 59

57Chapter 11 IP Network OperationsLinksysSTEP 6 View entries to the Binding database in the IP Network Operations > DHCP > DHCP Snooping Bindin

Strona 60 - IP Source Guard

58Chapter 11 IP Network OperationsLinksysBindings Settings • Interface—Type of interface on which a packet is expected. • Type—The possible field valu

Strona 61 - Binding Database

59Chapter 11 IP Network OperationsLinksysHow ARP Prevents Cache PoisoningThe ARP inspection feature relates to interfaces as either trusted or untrust

Strona 62 - ARP Inspection

60Chapter 11 IP Network OperationsLinksysDefining ARP Inspection PropertiesTo configure ARP Inspection:STEP 1 Click IP Network Operation > ARP Ins

Strona 63

61Chapter 11 IP Network OperationsLinksysInterface SettingsTo configure trusted interfaces, do the following:STEP 1 Click Configuration > IP Netwo

Strona 64

62Chapter 12 SecurityLinksys62Chapter 12 SecuritySecurityThis section describes device security and access control. The system handles various types o

Strona 65 - Interface Settings

63Chapter 12 SecurityLinksysRADIUSRemote Authorization Dial-In User Service (RADIUS) servers provide a centralized 802.1X or MAC-based network access

Strona 66 - Chapter 12 Security

64Chapter 12 SecurityLinksys- Interface—Select the link local interface (if IPv6 Address Type Link Local is selected) from the list. • Server IP Addr

Strona 67 - Radius Configuration

65Chapter 12 SecurityLinksys • Multiple Sessions—Supports client-based authentication. Each client must be authenticated individually before receiving

Strona 68 - Network Access Control

3CHAPTER 1 Getting StartedLinksysWindow NavigationThis section describes the features of the Web-based switch configuration utility.Application Header

Strona 69

66Chapter 12 SecurityLinksysMultiple Authentication MethodsIf more than one authentication method is enabled on the switch, the following hierarchy of

Strona 70

67Chapter 12 SecurityLinksysUnauthenticated VLANs and the Guest VLANUnauthenticated VLANs and the guest VLAN provide access to services that do not re

Strona 71

68Chapter 12 SecurityLinksysAuthenticati on MethodSingle-host Multi-host Multi-sessionsDevice in L3 Device in L2802.1x † † N/S †MAC † † N/S †Legend:†—

Strona 72 - Common Tasks

69Chapter 12 SecurityLinksys- None—Do not authenticate the user. Permit the session. • Guest VLAN—Enable the use of a guest VLAN for unauthorized por

Strona 73 - Port Authentication

70Chapter 12 SecurityLinksysAuthenticated HostsTo display details about authenticated users, do the following:STEP 1 Click Configuration > Securi

Strona 74

71Chapter 12 SecurityLinksysPort SecurityNetwork security can be increased by limiting access on a port to users with specific MAC addresses. The MAC

Strona 75 - Storm Control

72Chapter 12 SecurityLinksysSTEP 3 Enter the parameters. • Interface—Select the port for which storm control is enabled. • Storm Control—Select to e

Strona 76

73Chapter 13 Access Control ListLinksys73Chapter 13 Access Control ListAccess Control ListThe Access Control List (ACL) feature is part of the securit

Strona 77 - Access Control List

74Chapter 13 Access Control ListLinksysCreating ACLs WorkflowTo create ACLs and associate them with an interface, perform the following:1. Create one

Strona 78 - MAC-Based ACE

75Chapter 13 Access Control ListLinksys • Destination MAC Address—Select Any if all destination addresses are acceptable or User Defined to enter a de

Strona 79 - Defining an IPv4-based ACL

CHAPTER 2 System StatusLinksys4CHAPTER 2 System StatusSystem StatusThis section describes how to view device statistics. It covers the following topic

Strona 80 - IPv4-Based ACE

76Chapter 13 Access Control ListLinksysSTEP 4 Click Apply. The IPv4-based ACL is saved to the Running Configuration file.IPv4-Based ACEAdding Rules (

Strona 81 - ACL Binding

77Chapter 13 Access Control ListLinksys- IP Precedence to match—IP precedence is a model of TOS (type of service) that the network uses to help provi

Strona 82 - Chapter 14 Quality of Service

78Chapter 14 Quality of ServiceLinksys78Chapter 14 Quality of ServiceQuality of ServiceThe Quality of Service feature is applied throughout the networ

Strona 83 - QoS Workflow

79Chapter 14 Quality of ServiceLinksysWhen the mode is changed, the following occurs: • When changing from QoS Advanced Mode to any other mode, policy

Strona 84 - Queue Scheduling

80Chapter 14 Quality of ServiceLinksysa Configure Basic Mode, as described in Workflow to Configure Basic QoS Modeb Configure Advanced Mode, as desc

Strona 85 - Basic QoS

81Chapter 14 Quality of ServiceLinksys • Scheduling Method- Strict Priority—Traffic scheduling for the selected queue and all higher queues is based

Strona 86 - QoS Advanced Mode

82Chapter 14 Quality of ServiceLinksysEnable or disable the global selected trusted mode at the ports by using the Basic QoS page. If a port is disabl

Strona 87 - Configuring Global Settings

83Chapter 14 Quality of ServiceLinksysAdvanced QoS settings consist of three parts: • Definitions of the rules to match. All frames matching a single

Strona 88 - Defining Class Mapping

84Chapter 14 Quality of ServiceLinksysDefining Class MappingA Class Map defines a traffic flow with ACLs (Access Control Lists). A MAC ACL and an IP A

Strona 89 - Policy Class Maps

85Chapter 14 Quality of ServiceLinksys • An action to be applied to frames that are over the limits (called out-of- profile traffic), where such frame

Strona 90

CHAPTER 2 System StatusLinksys5RMONThe Statistics page displays detailed information regarding packet sizes and information regarding physical layer e

Strona 91 - Port Policy

86Chapter 14 Quality of ServiceLinksys • Policy Name—Displays the policy to which the class map is being added. • Class Map Name—Select an existing cl

Strona 92 - Chapter 15 Maintenance

87Chapter 14 Quality of ServiceLinksysPolicy BindingThe Policy Binding page shows which policy profile is bound and to which port. When a policy profi

Strona 93 - File Management

88Chapter 15 MaintenanceLinksys88Chapter 15 MaintenanceMaintenanceThis section describes how to view system information and configure various options

Strona 94 - Firmware & Boot Code

89Chapter 15 MaintenanceLinksysFile ManagementThis section describes how system files are managed. The following topics are covered:• Overview• Firm

Strona 95 - Configuration & Log

90Chapter 15 MaintenanceLinksys • Copy one configuration file type to another configuration file type as described in the Configuration File Copy sect

Strona 96 - Configuration File Copy

91Chapter 15 MaintenanceLinksysActive Firmware ImageThere are two firmware images stored on the device. One of the images is identified as the active

Strona 97 - Diagnostics

92Chapter 15 MaintenanceLinksys • TFTP Server IP Address—Enter the IP address of the TFTP server. • TFTP Server Name—Enter the domain name of the TFTP

Strona 98 - Port Mirroring

93Chapter 15 MaintenanceLinksysDiagnosticsThis section covers the following topics: • Optical Module Status • Ping • Port MirroringOptical Module Stat

Strona 99

94Chapter 15 MaintenanceLinksysThe following fields are displayed: • Destination Port—Port to which traffic is to be copied; the analyzer port. • Sour

Strona 100 - LNKPG-00144 Rev. A01

95SupportLinksys95SupportClick “Get Support” to go to the Linksys Small Business support website. Resources include setup help, frequently asked quest

Komentarze do niniejszej Instrukcji

Brak uwag