TP-LINK TL-SG5412F Data Sheet

Page of 253
 
Chapter 
Introduction 
Chapter 4 System 
This module is used to configure system properties of the switch. 
Here mainly introduces: 
 
System Info: Configure the description, system time and 
network parameters of the switch. 
 
User Management: Configure the user name and password for 
users to log on to the Web management page with a certain 
access level. 
 
System Tools: Manage the configuration file of the switch. 
 
Access Security: Provide different security measures for the 
login to enhance the configuration management security.   
Chapter 5 Switching 
This module is used to configure basic functions of the switch. 
Here mainly introduces: 
 
Port: Configure the basic features for the port. 
 
LAG: Configure Link Aggregation Group. LAG is to combine a 
number of ports together to make a single high-bandwidth data 
path. 
 
Traffic Monitor: Monitor the traffic of each port 
 
MAC Address: Configure the address table of the switch. 
Chapter 6 VLAN 
This module is used to configure VLANs to control broadcast in 
LANs. Here mainly introduces: 
 
802.1Q VLAN: Configure port-based VLAN. 
 
Protocol VLAN: Create VLANs in application layer to make 
some special data transmitted in the specified VLAN. 
 
VLAN VPN: VLAN VPN allows the packets with VLAN tags of 
private networks to be encapsulated with VLAN tags of public 
networks at the network access terminal of the Internet Service 
Provider. 
 
GVRP: GVRP allows the switch to automatically add or remove 
the VLANs via the dynamic VLAN registration information and 
propagate the local VLAN registration information to other 
switches, without having to individually configure each VLAN. 
 
Private VLAN: Designed to save VLAN resources of uplink 
devices and decrease broadcast. Private VLAN mainly used in 
campus or enterprise networks to achieve user layer-2- 
separation and to save VLAN resources of uplink devices. 
Chapter 7 Spanning Tree 
This module is used to configure spanning tree function of the 
switch. Here mainly introduces: 
 
STP Config: Configure and view the global settings of 
spanning tree function. 
 
Port Config: Configure CIST parameters of ports. 
 
MSTP Instance: Configure MSTP instances. 
 
STP Security: Configure protection function to prevent devices 
from any malicious attack against STP features. 
3