Loading ...
Loading ...
Loading ...
Table of Contents DES-1210/ME Series Metro Ethernet Managed Switch User Manual
i
i
v
v
Security > CPU Protect ............................................................................................................................ 79
Security > ARP Spoofing Prevention ....................................................................................................... 79
Security > Gratuitous ARP ....................................................................................................................... 80
Security > Port Security ............................................................................................................................ 81
Security > SSL Settings ............................................................................................................................ 81
Security > Smart Binding > Smart Binding Settings ................................................................................. 82
Security > Smart Binding > Smart Binding ............................................................................................... 83
Security > Smart Binding > White List ...................................................................................................... 84
Security > Smart Binding > Black List ...................................................................................................... 84
Security > Smart Binding > DHCP Snooping List .................................................................................... 85
Security > 802.1X > 802.1X Settings ....................................................................................................... 85
Security > 802.1X > 802.1X User ............................................................................................................. 86
Security > 802.1X > 802.1X Authentication RADIUS ............................................................................... 87
Security > 802.1X > 802.1X Guest VLAN ................................................................................................ 87
Security > MAC Address Table > Static MAC .......................................................................................... 88
Security > MAC Address Table > Dynamic Forwarding Table ................................................................. 89
Security > MAC Address Table > Auto Learning Vlan Settings ............................................................... 90
Security > Access Authentication Control > Authentication Policy Settings ............................................ 90
Security > Access Authentication Control > Application Authentication Settings .................................... 90
Security > Access Authentication Control > Authentication Server Group .............................................. 91
Security > Access Authentication Control > Authentication Server ......................................................... 92
Security > Access Authentication Control > Login Method Lists .............................................................. 93
Security > Access Authentication Control > Enable Method Lists ........................................................... 93
Security > Access Authentication Control > Local Enable Password Settings ........................................ 94
Security > Traffic Segmentation ............................................................................................................... 94
Security > DoS Prevention Settings ......................................................................................................... 95
Security > DHCP Server Screening > DHCP Server Screening Port Settings ........................................ 95
Security > DHCP Server Screening > DHCP Server Screening Vlan Settings........................................ 96
Security > DHCP Server Screening > Filter DHCP Server ...................................................................... 96
Security > DHCP Server Screening > Filter DHCPv6 Server .................................................................. 96
Security > SSH Settings > SSH Settings ................................................................................................. 97
Security > SSH Settings > SSH Authmode and Algorithm Settings ........................................................ 98
Security > SSH Settings > SSH User Authentication Lists ...................................................................... 99
Monitoring > Statistics .............................................................................................................................. 99
Monitoring > Session Table .................................................................................................................... 100
Monitoring > CPU Utilization .................................................................................................................. 101
Monitoring > Memory Utilization ............................................................................................................. 101
Monitoring > Port Utilization ................................................................................................................... 102
Monitoring > Packet Size ........................................................................................................................ 102
Monitoring > Packets > Transmitted (TX) .............................................................................................. 104
Monitoring > Packets > Received (RX) .................................................................................................. 105
Monitoring > Packets > UMB Cast (RX) ................................................................................................. 106
Monitoring > Errors > Received (RX) ..................................................................................................... 107
Monitoring > Errors > Transmitted (TX).................................................................................................. 108
Monitoring > Cable Diagnostics ............................................................................................................. 109
Monitoring > System Log ........................................................................................................................ 109
Monitoring > Browse ARP Table ............................................................................................................ 110
Monitoring > Ethernet OAM > Browse Ethernet OAM Event Log .......................................................... 110
Monitoring > Ethernet OAM > Browse Ethernet OAM Statistics ............................................................ 111
Loading ...
Loading ...
Loading ...