2
NEED HELP?
LE AVE THE TECH TO US
LIVE 24/7
TECHNICAL
SUPPORT
1.8 7 7. 8 7 7. 2 26 9
1. 8 7 7. 8 7 7. 2 2 6 9 BLACKBOX.COM
TABLE OF CONTENTS
REVISION HISTORY .......................................................................................................................................................................... 7
1. INTRODUCTION ............................................................................................................................................................................ 8
1.1 Overview ....................................................................................................................................................................................................8
1.2 Available Models ......................................................................................................................................................................................8
1.3 Features ....................................................................................................................................................................................................8
2. OPERATION OF WEB-BASED MANAGEMENT ............................................................................................................................ 9
2.1 Initial Configuration ..................................................................................................................................................................................9
3. SYSTEM CONFIGURATION ......................................................................................................................................................... 11
3.1 System ............................................................................................................ .........................................................................................11
3.1.1 Information ......................................................................................................................................................................................................... 11
3.1.2 IP ..........................................................................................................................................................................................................................12
3.1.3 NTP ...................................................................................................................................................................................................................... 14
3.1.4 Time .....................................................................................................................................................................................................................16
3.1.5 Log .......................................................................................................................................................................................................................19
3.2 Green Ethernet ...................................................... .................................................................................................................................. 20
3.3 Ports Configuration ...............................................................................................................................................................................22
3.3.1 Ports ....................................................................................................................................................................................................................22
3.3.2 Ports Description .............................................................................................................................................................................................24
3.4 DHCP .......................................................................................................................................................................................................25
3.4.1 Server ..................................................................................................................................................................................................................25
3.4.1.1 Mode ...........................................................................................................................................................................................................25
3.4.1.2 Excluded IP ................................................................................................................................................................................................ 26
3.4.1.3 Pool .............................................................................................................................................................................................................27
3.4.2 Snooping ............................................................................................................................................................................................................28
3.4.3 Relay ...................................................................................................................................................................................................................30
3.5 Security ...................................................................................................................................................................................................31
3.5.1 Switch .................................................................................................................................................................................................................31
3.5.1.1 Users ...........................................................................................................................................................................................................31
3.5.1.2 Privilege Level ...........................................................................................................................................................................................32
3.5.1.3 Authentication Method ...........................................................................................................................................................................33
3.5.1.4 S SH .............................................................................................................................................................................................................34
3.5.1.5 HTTPs.........................................................................................................................................................................................................35
3.5.1.6 Access Management ..............................................................................................................................................................................36
3.5.1.7 SNMP .......................................................................................................................................................................................................... 37
3.5.1.8 RMON .........................................................................................................................................................................................................47
3.5.2 Network .............................................................................................................................................................................................................. 51
3.5.2.1 Limit Control .............................................................................................................................................................................................51
3.5.2.2 NAS .............................................................................................................................................................................................................54
3.5.2.3 ACL .............................................................................................................................................................................................................61
3.5.2.4 IP Source Guard .......................................................................................................................................................................................67
3.5.2.5 ARP Inspection .........................................................................................................................................................................................69