TP-Link TL-SL5428E User Guide - Page 11

Introduction

Page 11 highlights

Chapter Chapter 6 System Chapter 7 Switching Chapter 8 VLAN Chapter 9 Spanning Tree Introduction This module is used to configure system properties of the switch. Here mainly introduces: z System Info: Configure the description, system time and network parameters of the switch. z User Manage: Configure the user name and password for users to log on to the Web management page with a certain access level. z System Tools: Manage the configuration file of the switch. z Access Security: Provide different security measures for the login to enhance the configuration management security. This module is used to configure basic functions of the switch. Here mainly introduces: z Port: Configure the basic features for the port. z LAG: Configure Link Aggregation Group. LAG is to combine a number of ports together to make a single high-bandwidth data path. z Traffic Monitor: Monitor the traffic of each port z MAC Address: Configure the address table of the switch. This module is used to configure VLANs to control broadcast in LANs. Here mainly introduces: z 802.1Q VLAN: Configure port-based VLAN. z MAC VLAN: Configure MAC-based VLAN without changing the 802.1Q VLAN configuration. z Protocol VLAN: Create VLANs in application layer to make some special data transmitted in the specified VLAN. z VLAN VPN: VLAN VPN allows the packets with VLAN tags of private networks to be encapsulated with VLAN tags of public networks at the network access terminal of the Internet Service Provider. z GVRP: GVRP allows the switch to automatically add or remove the VLANs via the dynamic VLAN registration information and propagate the local VLAN registration information to other switches, without having to individually configure each VLAN. This module is used to configure spanning tree function of the switch. Here mainly introduces: z STP Config: Configure and view the global settings of spanning tree function. z Port Config: Configure CIST parameters of ports. z MSTP Instance: Configure MSTP instances. z STP Security: Configure protection function to prevent devices from any malicious attack against STP features. 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250

3
Chapter
Introduction
Chapter 6 System
This module is used to configure system properties of the switch.
Here mainly introduces:
z
System Info: Configure the description, system time and network
parameters of the switch.
z
User Manage: Configure the user name and password for users
to log on to the Web management page with a certain access
level.
z
System Tools: Manage the configuration file of the switch.
z
Access Security: Provide different security measures for the
login to enhance the configuration management security.
Chapter 7 Switching
This module is used to configure basic functions of the switch. Here
mainly introduces:
z
Port: Configure the basic features for the port.
z
LAG: Configure Link Aggregation Group. LAG is to combine a
number of ports together to make a single high-bandwidth data
path.
z
Traffic Monitor: Monitor the traffic of each port
z
MAC Address: Configure the address table of the switch.
Chapter 8 VLAN
This module is used to configure VLANs to control broadcast in
LANs. Here mainly introduces:
z
802.1Q VLAN: Configure port-based VLAN.
z
MAC VLAN: Configure MAC-based VLAN without changing the
802.1Q VLAN configuration.
z
Protocol VLAN: Create VLANs in application layer to make some
special data transmitted in the specified VLAN.
z
VLAN VPN: VLAN VPN allows the packets with VLAN tags of
private networks to be encapsulated with VLAN tags of public
networks at the network access terminal of the Internet Service
Provider.
z
GVRP: GVRP allows the switch to automatically add or remove
the VLANs via the dynamic VLAN registration information and
propagate the local VLAN registration information to other
switches, without having to individually configure each VLAN.
Chapter 9 Spanning Tree
This module is used to configure spanning tree function of the
switch. Here mainly introduces:
z
STP Config: Configure and view the global settings of spanning
tree function.
z
Port Config: Configure CIST parameters of ports.
z
MSTP Instance: Configure MSTP instances.
z
STP Security: Configure protection function to prevent devices
from any malicious attack against STP features.