TP-Link TL-SL5428E User Guide - Page 12

IP Source Guard: Con IP source guard feature to filter IP

Page 12 highlights

Chapter Chapter 10 Multicast Chapter 11 QoS Chapter 12 ACL Chapter 13 Network Security Introduction This module is used to configure multicast function of the switch. Here mainly introduces: z IGMP Snooping: Configure global parameters of IGMP Snooping function, port properties, VLAN and multicast VLAN. z Multicast IP: Configure multicast IP table. z Multicast Filter: Configure multicast filter feature to restrict users ordering multicast programs. z Packet Statistics: View the multicast data traffic on each port of the switch, which facilitates you to monitor the IGMP messages in the network. This module is used to configure QoS function to provide different quality of service for various network applications and requirements. Here mainly introduces: z DiffServ: Configure priorities, port priority, 802.1P priority and DSCP priority. z Bandwidth Control: Configure rate limit feature to control the traffic rate on each port; configure storm control feature to filter broadcast, multicast and UL frame in the network. z Voice VLAN: Configure voice VLAN to transmit voice data stream within the specified VLAN so as to ensure the transmission priority of voice data stream and voice quality. This module is used to configure match rules and process policies of packets to filter packets in order to control the access of the illegal users to the network. Here mainly introduces: z Time-Range: Configure the effective time for ACL rules. z ACL Config: ACL rules. z Policy Config: Configure operation policies. z Policy Binding: Bind the policy to a port/VLAN to take its effect on a specific port/VLAN. This module is used to configure the multiple protection measures for the network security. Here mainly introduces: z IP-MAC Binding: Bind the IP address, MAC address, VLAN ID and the connected Port number of the Host together. z ARP Inspection: Configure ARP inspection feature to prevent the network from ARP attacks. z IP Source Guard: Configure IP source guard feature to filter IP packets in the LAN. z DoS Defend: Configure DoS defend feature to prevent DoS attack. z 802.1X: Configure common access control mechanism for LAN ports to solve mainly authentication and security problems. 4

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250

4
Chapter
Introduction
Chapter 10 Multicast
This module is used to configure multicast function of the switch.
Here mainly introduces:
z
IGMP Snooping: Configure global parameters of IGMP Snooping
function, port properties, VLAN and multicast VLAN.
z
Multicast IP: Configure multicast IP table.
z
Multicast Filter: Configure multicast filter feature to restrict users
ordering multicast programs.
z
Packet Statistics: View the multicast data traffic on each port of
the switch, which facilitates you to monitor the IGMP messages
in the network.
Chapter 11 QoS
This module is used to configure QoS function to provide different
quality
of
service
for
various
network
applications
and
requirements. Here mainly introduces:
z
DiffServ: Configure priorities, port priority, 802.1P priority and
DSCP priority.
z
Bandwidth Control: Configure rate limit feature to control the
traffic rate on each port; configure storm control feature to filter
broadcast, multicast and UL frame in the network.
z
Voice VLAN: Configure voice VLAN to transmit voice data
stream within the specified VLAN so as to ensure the
transmission priority of voice data stream and voice quality.
Chapter 12 ACL
This module is used to configure match rules and process policies
of packets to filter packets in order to control the access of the
illegal users to the network. Here mainly introduces:
z
Time-Range: Configure the effective time for ACL rules.
z
ACL Config: ACL rules.
z
Policy Config: Configure operation policies.
z
Policy Binding: Bind the policy to a port/VLAN to take its effect on
a specific port/VLAN.
Chapter 13 Network Security
This module is used to configure the multiple protection measures
for the network security. Here mainly introduces:
z
IP-MAC Binding: Bind the IP address, MAC address, VLAN ID
and the connected Port number of the Host together.
z
ARP Inspection: Configure ARP inspection feature to prevent the
network from ARP attacks.
z
IP Source Guard: Configure IP source guard feature to filter IP
packets in the LAN.
z
DoS Defend: Configure DoS defend feature to prevent DoS
attack.
z
802.1X: Configure common access control mechanism for LAN
ports to solve mainly authentication and security problems.