TP-Link TL-SG5412F TL-SG5412F V1 User Guide - Page 14

Appendix B Con the PCs - firmware

Page 14 highlights

Chapter Introduction Chapter 12 SNMP This module is used to configure SNMP function to provide a management frame to monitor and maintain the network devices. Here mainly introduces:  SNMP Config: Configure global settings of SNMP function.  Notification: Configure notification function for the management station to monitor and process the events.  RMON: Configure RMON function to monitor network more efficiently. Chapter 13 LLDP This module is used to configure LLDP function to provide information for SNMP applications to simplify troubleshooting. Here mainly introduces:  Basic Config: Configure the LLDP parameters of the device.  Device Info: View the LLDP information of the local device and its neighbors  Device Statistics: View the LLDP statistics of the local device Chapter 14 Cluster This module is used to configure cluster function to central manage the scattered devices in the network. Here mainly introduces:  NDP: Configure NDP function to get the information of the directly connected neighbor devices.  NTDP: Configure NTDP function for the commander switch to collect NDP information.  Cluster: Configure cluster function to establish and maintain cluster. Chapter 15 Maintenance This module is used to assemble the commonly used system tools to manage the switch. Here mainly introduces:  System Monitor: Monitor the memory and CPU of the switch.  Log: View configuration parameters on the switch.  Cable Test: Test the connection status of the cable connected to the switch.  Loopback: Test if the port of the switch and the connected device are available.  Network Diagnose: Test if the destination is reachable and the account of router hops from the switch to the destination. Chapter 16 System Maintenance via FTP Introduces how to download firmware of the switch via FTP function. Appendix A Specifications Lists the glossary used in this manual. Appendix B Configure the PCs Introduces how to configure the PCs. Appendix C 802.1X Client Software Introduces how to use 802.1X Client Software provided for authentication. 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257

Chapter
Introduction
Chapter 12 SNMP
This module is used to configure SNMP function to provide a
management frame to monitor and maintain the network devices.
Here mainly introduces:
SNMP Config: Configure global settings of SNMP function.
Notification: Configure notification function for the management
station to monitor and process the events.
RMON: Configure RMON function to monitor network more
efficiently.
Chapter 13 LLDP
This module is used to configure LLDP function to provide
information for SNMP applications to simplify troubleshooting. Here
mainly introduces:
Basic Config: Configure the LLDP parameters of the device.
Device Info: View the LLDP information of the local device and its
neighbors
Device Statistics: View the LLDP statistics of the local device
Chapter 14 Cluster
This module is used to configure cluster function to central manage
the scattered devices in the network. Here mainly introduces:
NDP: Configure NDP function to get the information of the directly
connected neighbor devices.
NTDP: Configure NTDP function for the commander switch to
collect NDP information.
Cluster: Configure cluster function to establish and maintain
cluster.
Chapter 15 Maintenance
This module is used to assemble the commonly used system tools
to manage the switch. Here mainly introduces:
System Monitor: Monitor the memory and CPU of the switch.
Log: View configuration parameters on the switch.
Cable Test: Test the connection status of the cable connected to
the switch.
Loopback: Test if the port of the switch and the connected device
are available.
Network Diagnose: Test if the destination is reachable and the
account of router hops from the switch to the destination.
Chapter 16 System
Maintenance via FTP
Introduces how to download firmware of the switch via FTP
function.
Appendix A Specifications
Lists the glossary used in this manual.
Appendix B Configure the PCs
Introduces how to configure the PCs.
Appendix C 802.1X Client
Software
Introduces how to use 802.1X Client Software provided for
authentication.
5