D-Link DES-3828 - xStack Switch - Stackable Manual de usuario Pagina 6

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 334
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 5
VRRP Virtual Router Settings....................................................................................................................................................... 148
VRRP Authentication Settings ...................................................................................................................................................... 151
IP Multicast Routing Protocol.........................................................................................................................................153
IGMP Interface Settings ................................................................................................................................................................ 154
DVMRP Interface Configuration................................................................................................................................................... 156
PIM-DM Interface Configuration .................................................................................................................................................. 158
QoS ......................................................................................................................................................................................161
Port Bandwidth................................................................................................................................................................163
QoS Scheduling Mechanism ...........................................................................................................................................164
802.1p Default Priority....................................................................................................................................................165
802.1p User Priority ........................................................................................................................................................167
ACL......................................................................................................................................................................................168
Access Profile Table........................................................................................................................................................168
CPU Interface Filtering ...................................................................................................................................................183
CPU Interface Filtering Profile Table............................................................................................................................................ 183
Security ................................................................................................................................................................................199
Traffic Control.................................................................................................................................................................199
Port Security....................................................................................................................................................................201
Port Lock Entries.............................................................................................................................................................203
Configure 802.1x Authenticator Parameter ................................................................................................................................... 208
Authentic RADIUS Server ..............................................................................................................................................211
Trusted Host ....................................................................................................................................................................212
Access Authentication Control........................................................................................................................................213
Authentication Policy & Parameter Settings.................................................................................................................................. 214
Application Authentication Settings .............................................................................................................................................. 215
Authentication Server Group ......................................................................................................................................................... 216
Authentication Server Host............................................................................................................................................................ 217
Login Method Lists........................................................................................................................................................................ 219
Enable Method Lists...................................................................................................................................................................... 221
Configure Local Enable Password................................................................................................................................................. 223
Enable Admin................................................................................................................................................................................ 224
Traffic Segmentation.......................................................................................................................................................225
Secure Socket Layer (SSL) .............................................................................................................................................226
Download Certificate..................................................................................................................................................................... 227
Ciphersuite..................................................................................................................................................................................... 227
SSH .................................................................................................................................................................................229
SSH Server Configuration ............................................................................................................................................................. 230
SSH Authentication Mode and Algorithm Settings ....................................................................................................................... 231
SSH User Authentication............................................................................................................................................................... 234
IP-MAC Binding .............................................................................................................................................................235
Vista de pagina 5
1 2 3 4 5 6 7 8 9 10 11 ... 333 334

Comentarios a estos manuales

Sin comentarios