EasyManua.ls Logo

TP-Link JetStream L2 - Page 8

TP-Link JetStream L2
316 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
VII
12.1 Time-Range ................................................................................................................ 187
12.1.1 Time-Range Summary .................................................................................... 187
12.1.2 Time-Range Create ......................................................................................... 188
12.1.3 Holiday Config ................................................................................................. 189
12.2 ACL Config ................................................................................................................. 189
12.2.1 ACL Summary ................................................................................................. 189
12.2.2 ACL Create ...................................................................................................... 190
12.2.3 MAC ACL ......................................................................................................... 191
12.2.4 Standard-IP ACL .............................................................................................. 191
12.2.5 Extend-IP ACL ................................................................................................. 192
12.2.6 Combined ACL ................................................................................................ 194
12.3 Policy Config .............................................................................................................. 195
12.3.1 Policy Summary .............................................................................................. 195
12.3.2 Policy Create ................................................................................................... 196
12.3.3 Action Create ................................................................................................... 196
12.4 Policy Binding ............................................................................................................. 198
12.4.1 Binding Table ................................................................................................... 198
12.4.2 Port Binding ..................................................................................................... 198
12.4.3 VLAN Binding .................................................................................................. 199
12.5 Application Example for ACL ..................................................................................... 200
Chapter 13 Network Security........................................................................................................ 202
13.1 IP-MAC Binding .......................................................................................................... 202
13.1.1 Binding Table ................................................................................................... 202
13.1.2 Manual Binding ................................................................................................ 203
13.1.3 ARP Scanning ................................................................................................. 205
13.2 DHCP Snooping ......................................................................................................... 206
13.2.1 DHCP Snooping .............................................................................................. 210
13.2.2 Option 82 .......................................................................................................... 211
13.3 ARP Inspection ........................................................................................................... 212
13.3.1 ARP Detect ...................................................................................................... 215
13.3.2 ARP Defend..................................................................................................... 217
13.3.3 ARP Statistics .................................................................................................. 218
13.4 IP Source Guard ......................................................................................................... 218
13.5 DoS Defend ................................................................................................................ 219
13.5.1 DoS Defend ..................................................................................................... 221
13.5.2 DoS Detect ......................................................................................................
222
13.6 802.1X ........................................................................................................................ 222

Table of Contents

Other manuals for TP-Link JetStream L2

Related product manuals