V
9.3 Voice VLAN ..............................................................................................................134
9.3.1 Global Confi
g .................................................................................................136
9.3.2 Port Config
.....................................................................................................136
9.3.3 OUI Config
.....................................................................................................138
Chapter 10 ACL
..........................................................................................................................140
10.1 T
ime-Range ..............................................................................................................140
10.1.1 T
ime-Range Summary ...................................................................................140
10.1.2 T
ime-Range Create........................................................................................141
10.1.3 Holiday
Config................................................................................................142
10.2 ACL
Config ...............................................................................................................142
10.2.1 ACL
Summary................................................................................................143
10.2.2 ACL
Create ....................................................................................................143
10.2.3 MAC ACL
.......................................................................................................144
10.2.4 S
tandard-IP ACL ............................................................................................145
10.2.5 Extend-IP ACL
...............................................................................................146
10.3 Policy
Config.............................................................................................................147
10.3.1 Policy
Summary .............................................................................................147
10.3.2 Policy
Create..................................................................................................148
10.3.3 Action Create
.................................................................................................148
10.4 Policy
Binding ...........................................................................................................150
10.4.1 Binding Table
.................................................................................................150
10.4.2 Port Binding
...................................................................................................150
10.4.3 VLAN Binding
.................................................................................................151
10.5 Application E
xample for ACL: ...................................................................................152
Chapter 11 Network Security
......................................................................................................155
11.1 IP-MAC Bind
ing ........................................................................................................155
11.1.1 Binding Table
.................................................................................................155
11.1.2 Manual Bindi
ng ..............................................................................................156
11.1.3 ARP
Scanning................................................................................................158
11.1.4 DHCP
Snooping.............................................................................................159
11.2 ARP
Inspection .........................................................................................................165
11.2.1 ARP
Detect ....................................................................................................169
11.2.2 ARP
Defend ...................................................................................................170
11.2.3 ARP
Statistics ................................................................................................171
11.3 IP
Source Guard .......................................................................................................172
11.4 DoS Defend
..............................................................................................................173
11.4.1 DoS Defend...................................................................................................175
Praat mee over dit product
Laat hier weten wat jij vindt van de TP-Link TL-SL5428E JetStream L2 Managed Switch. Als je een vraag hebt, lees dan eerst zorgvuldig de handleiding door. Een handleiding aanvragen kan via ons contactformulier.