EasyManua.ls Logo

D-Link DGS-1210/ME - Page 5

D-Link DGS-1210/ME
133 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents DGS-1210 series Metro Ethernet Managed Switch User Manual
Security > Access Authentication Control > Authentication Policy Settings ............................................ 75
Security > Access Authentication Control > Application Authentication Settings .................................... 75
Security > Access Authentication Control > Authentication Server Group .............................................. 75
Security > Access Authentication Control > Authentication Server ......................................................... 76
Security > Access Authentication Control > Login Method Lists .............................................................. 77
Security > Access Authentication Control > Enable Method Lists ........................................................... 78
Security > Access Authentication Control > Local Enable Password Settings ........................................ 78
Security > Traffic Segmentation ............................................................................................................... 79
Security > DoS Prevention Settings ......................................................................................................... 79
Security > DHCP Server Screening > DHCP Server Screening Port Settings ........................................ 80
Security > DHCP Server Screening > Filter DHCP Server ...................................................................... 80
Security > SSH Settings > SSH Settings ................................................................................................. 80
Security > SSH Settings > SSH Authmode and Algorithm Settings ........................................................ 81
Security > SSH Settings > SSH User Authentication Lists ...................................................................... 82
Security > MAC-based Access Control (MAC) > MAC-based Access Control Settings .......................... 83
Security > MAC-based Access Control (MAC) > MAC-based Access Control Local Settings ................ 84
Security > MAC-based Access Control (MAC) > MAC-based Access Control Authentication State ...... 84
Security > Web-based Access Control (WAC) > WAC Global Settings ................................................... 85
Security > Web-based Access Control (WAC) > WAC User Settings ..................................................... 85
Security > Web-based Access Control (WAC) > WAC Port Settings ...................................................... 86
Security > Web-based Access Control (WAC) > WAC Authentication State ........................................... 86
Monitoring > Statistics .............................................................................................................................. 87
Monitoring > Session Table ...................................................................................................................... 87
Monitoring > CPU Utilization .................................................................................................................... 88
Monitoring > Memory Utilization ............................................................................................................... 88
Monitoring > Port Utilization ..................................................................................................................... 89
Monitoring > Packet Size .......................................................................................................................... 90
Monitoring > Packets > Transmitted (TX) ................................................................................................ 91
Monitoring > Packets > Received (RX) .................................................................................................... 92
Monitoring > Packets > UMB Cast (RX) ................................................................................................... 94
Monitoring > Errors > Received (RX) ....................................................................................................... 95
Monitoring > Errors > Transmitted (TX).................................................................................................... 96
Monitoring > Cable Diagnostics ............................................................................................................... 98
Monitoring > System Log .......................................................................................................................... 99
Monitoring > Browse ARP Table .............................................................................................................. 99
Monitoring > Ethernet OAM > Browse Ethernet OAM Event Log ............................................................ 99
Monitoring > Ethernet OAM > Browse Ethernet OAM Statistics ............................................................ 100
Monitoring > IGMP Snooping > IGMP Snooping Group ........................................................................ 100
Monitoring > IGMP Snooping > IGMP Snooping Host ........................................................................... 101
Monitoring > Port Access Control > RADIUS Authentication ................................................................. 101
Monitoring > Port Access Control > RADIUS Account Client ................................................................ 102
ACL > ACL Configuration Wizard ........................................................................................................... 103
ACL > Access Profile List ....................................................................................................................... 104
ACL > ACL Finder .................................................................................................................................. 105
ACL > CPU Filter Configuration Wizard ................................................................................................. 106
ACL > CPU Filter Access Profile List ..................................................................................................... 107
ACL > CPU Filter Finder ......................................................................................................................... 108
ACL > ACL Flow Meter ........................................................................................................................... 108
PoE > PoE Port Settings (DGS-1210-28P only) .................................................................................... 109
i
i
v
v

Table of Contents

Related product manuals