TP-Link TL-SL5428E User Guide - Page 12
IP Source Guard: Con IP source guard feature to filter IP
UPC - 845973020873
View all TP-Link TL-SL5428E manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 12 highlights
Chapter Chapter 10 Multicast Chapter 11 QoS Chapter 12 ACL Chapter 13 Network Security Introduction This module is used to configure multicast function of the switch. Here mainly introduces: z IGMP Snooping: Configure global parameters of IGMP Snooping function, port properties, VLAN and multicast VLAN. z Multicast IP: Configure multicast IP table. z Multicast Filter: Configure multicast filter feature to restrict users ordering multicast programs. z Packet Statistics: View the multicast data traffic on each port of the switch, which facilitates you to monitor the IGMP messages in the network. This module is used to configure QoS function to provide different quality of service for various network applications and requirements. Here mainly introduces: z DiffServ: Configure priorities, port priority, 802.1P priority and DSCP priority. z Bandwidth Control: Configure rate limit feature to control the traffic rate on each port; configure storm control feature to filter broadcast, multicast and UL frame in the network. z Voice VLAN: Configure voice VLAN to transmit voice data stream within the specified VLAN so as to ensure the transmission priority of voice data stream and voice quality. This module is used to configure match rules and process policies of packets to filter packets in order to control the access of the illegal users to the network. Here mainly introduces: z Time-Range: Configure the effective time for ACL rules. z ACL Config: ACL rules. z Policy Config: Configure operation policies. z Policy Binding: Bind the policy to a port/VLAN to take its effect on a specific port/VLAN. This module is used to configure the multiple protection measures for the network security. Here mainly introduces: z IP-MAC Binding: Bind the IP address, MAC address, VLAN ID and the connected Port number of the Host together. z ARP Inspection: Configure ARP inspection feature to prevent the network from ARP attacks. z IP Source Guard: Configure IP source guard feature to filter IP packets in the LAN. z DoS Defend: Configure DoS defend feature to prevent DoS attack. z 802.1X: Configure common access control mechanism for LAN ports to solve mainly authentication and security problems. 4