EasyManuals Logo

TP-Link JetStream L2 User Manual

TP-Link JetStream L2
316 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #51 background imageLoading...
Page #51 background image
41
The following entries are displayed on this screen.

Mirroring Port
Mirroring Port:
Select a port from the pull-down list as the mirror
ing port. When
disable is selected, the Port Mirror feature will be disabled.

Mirrored Port
Port Select
: Click the Select button to quick-
select the corresponding port
based on the port number you entered.
Select
: Select the desired port as a mirrored port. It is multi-optional.
Port
: Displays the port number.
Ingress
: Enable/Disable
the Ingress feature. When the Ingress is enabled,
the incoming packets received by the mirrored port will be copied
to the mirroring port.
Egress
: Enable/Disable the Egre
ss feature. When the Egress is enabled,
the outgoing packets sent by the mirrored port will be copied to the
mirroring port.
LAG
:
Displays the LAG number which the port belongs to. The LAG
member cannot be selected as the mirrored port or mirroring port.
Note:
1. The LAG member cannot be selected as the mirrored port or mirroring port.
2. A port cannot be set as the mirrored port and the mirroring port simultaneously.
3. The Port Mirror function can take effect span the multiple VLANs.
5.1.3 Port Security
MAC Address Table maintains the mapping relationship between the port and the MAC address of
the connected device, which is the base of the packet forwarding. The capacity of MAC Address
Table is fixed. MAC Address Attack is the attack method that the attacker takes to obtain the
network information illegally. The attacker uses tools to generate the cheating MAC address and
quickly occupy the MAC Address Table. When the MAC Address Table is full, the switch will
broadcast the packets to all the ports. At this moment, the attacker can obtain the network
information via various sniffers and attacks. When the MAC Address Table is full, the packets
traffic will flood to all the ports, which results in overload, lower speed, packets drop and even
breakdown of the system.
Port Security is to protect the switch from the malicious MAC Address Attack by limiting the
maximum number of MAC addresses that can be learned on the port. The port with Port Security
feature enabled will learn the MAC address dynamically. When the learned MAC address number
reaches the maximum, the port will stop learning. Thereafter, the other devices with the MAC
address unlearned cannot access to the network via this port.

Table of Contents

Other manuals for TP-Link JetStream L2

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the TP-Link JetStream L2 and is the answer not in the manual?

TP-Link JetStream L2 Specifications

General IconGeneral
BrandTP-Link
ModelJetStream L2
CategorySwitch
LanguageEnglish

Related product manuals