Справочник Пользователя для TP-LINK TL-SG2008
IV
5.1.1
Port Config .......................................................................................................28
5.1.2
Port Mirror ........................................................................................................29
5.1.3
Port Security ....................................................................................................31
5.1.4
Port Isolation ....................................................................................................32
5.1.5
Loopback Detection .........................................................................................33
5.2
LAG ............................................................................................................................34
5.2.1
LAG Table ........................................................................................................35
5.2.2
Static LAG ........................................................................................................36
5.2.3
LACP Config ....................................................................................................37
5.3
Traffic Monitor .............................................................................................................39
5.3.1
Traffic Summary...............................................................................................39
5.3.2
Traffic Statistics ................................................................................................40
5.4
MAC Address..............................................................................................................41
5.4.1
Address Table ..................................................................................................42
5.4.2
Static Address ..................................................................................................43
5.4.3
Dynamic Address .............................................................................................44
5.4.4
Filtering Address ..............................................................................................46
5.5
DHCP Filtering............................................................................................................47
Chapter 6 VLAN..........................................................................................................................51
6.1
802.1Q VLAN..............................................................................................................52
6.1.1
VLAN Config ....................................................................................................53
6.2
Application Example for 802.1Q VLAN .......................................................................55
Chapter 7 Spanning Tree ............................................................................................................57
7.1
STP Config .................................................................................................................62
7.1.1
STP Config.......................................................................................................62
7.1.2
STP Summary..................................................................................................64
7.2
Port Config..................................................................................................................64
7.3
MSTP Instance ...........................................................................................................66
7.3.1
Region Config ..................................................................................................66
7.3.2
Instance Config ................................................................................................66
7.3.3
Instance Port Config.........................................................................................68
7.4
STP Security...............................................................................................................69
7.4.1
Port Protect ......................................................................................................69
7.4.2
TC Protect........................................................................................................71
7.5
Application Example for STP Function .......................................................................72
Chapter 8 Multicast.....................................................................................................................76
8.1
IGMP Snooping ..........................................................................................................78