EasyManua.ls Logo

TP-Link JetStream TL-SG3424 User Manual

TP-Link JetStream TL-SG3424
262 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
TL-SG3424
JetStream 24-Port Gigabit L2 Managed
Switch with 4 Combo SFP Slots
REV1.2.0
1910010895

Table of Contents

Other manuals for TP-Link JetStream TL-SG3424

Question and Answer IconNeed help?

Do you have a question about the TP-Link JetStream TL-SG3424 and is the answer not in the manual?

TP-Link JetStream TL-SG3424 Specifications

General IconGeneral
Switching Capacity48 Gbps
Forwarding Rate35.7 Mpps
MAC Address Table8K
Jumbo Frame9KB
Power Supply100-240VAC, 50/60Hz
Ports24x 10/100/1000Mbps RJ45 ports, 4x 1G SFP slots
Standards and ProtocolsIEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z, IEEE 802.3x, IEEE 802.1Q, IEEE 802.1p, IEEE 802.1D, IEEE 802.1s, IEEE 802.1w
Dimensions440 × 220 × 44 mm
Operating Temperature0°C to 40°C (32°F to 104°F)
Storage Temperature-40°C to 70°C (-40°F to 158°F)
Operating Humidity10% to 90% (non-condensing)
Storage Humidity5% to 90% (non-condensing)

Summary

Package Contents

Chapter 1 About This Guide

1.1 Intended Readers

Identifies the target audience for the user guide, focusing on network professionals.

1.2 Conventions

Explains the formatting and symbols used throughout the guide for clarity.

1.3 Overview of This Guide

Provides a brief summary of the guide's structure and the content of each chapter.

Chapter 2 Introduction

2.1 Overview of the Switch

Introduces the TL-SG3424 switch, its features, performance, and target use cases.

2.2 Main Features

Details the key features of the switch, including resiliency, layer 2 switching, QoS, security, and manageability.

2.3 Front Panel Description

Details the components and LEDs on the switch's front panel for identification.

2.4 Rear Panel Description

Describes the rear panel of the switch, including power socket and grounding terminal.

Chapter 3 Login to the Switch

3.1 Login

Guides users on how to access the switch's configuration utility via IPv4 and IPv6 networks.

3.2 Configuration

Explains how to navigate and utilize the switch's main setup menu after a successful login.

Chapter 4 System

4.1 System Information

Covers viewing and configuring system details like port status, device description, time, and IP addresses.

4.2 User Management

Details how to manage user accounts, access levels, and passwords for switch configuration.

4.3 System Tools

Explains essential system management tools like configuration backup, restore, reboot, and reset.

4.4 Access Security

Outlines security measures for remote login, including access control, SSL, and SSH configurations.

Chapter 5 Switching

5.1 Port Configuration

Configures basic port parameters such as speed, duplex, status, security, and isolation.

5.2 LAG Configuration

Explains Link Aggregation Group (LAG) for combining ports to increase bandwidth and reliability.

5.3 Traffic Monitor

Monitors port traffic statistics, including summary and detailed traffic data.

5.4 MAC Address Management

Manages MAC address entries, including static, dynamic, and filtering configurations.

Chapter 6 VLAN

6.1 802.1Q VLAN

Details the configuration of 802.1Q VLANs, including port types and packet processing.

6.2 MAC VLAN

Explains how to classify VLANs based on MAC addresses for specific host access control.

6.3 Protocol VLAN

Describes classifying VLANs based on network protocols for specific service delivery.

6.4 Application Example for 802.1Q VLAN

Provides a practical example demonstrating the configuration of 802.1Q VLANs in a network.

6.5 Application Example for MAC VLAN

Illustrates the configuration of MAC VLANs with specific network requirements and topology.

6.6 Application Example for Protocol VLAN

Shows a scenario for configuring Protocol VLANs to manage traffic based on network protocols.

6.7 GVRP Configuration

Explains GARP VLAN Registration Protocol (GVRP) for dynamic VLAN information exchange.

Chapter 7 Spanning Tree

7.1 STP Configuration

Covers global configuration of Spanning Tree Protocol (STP), including parameters and versions.

7.2 Port Configuration

Configures Spanning Tree parameters for individual ports, including status, priority, and role.

7.3 MSTP Instance Configuration

Details Multiple Spanning Tree Protocol (MSTP) instance configuration, region, and VLAN mapping.

7.4 STP Security

Implements security features to protect against STP attacks, like BPDU guard and root protect.

Chapter 8 Multicast

8.1 IGMP Snooping

Manages multicast group membership by listening to IGMP messages for efficient data distribution.

8.2 MLD Snooping

Handles IPv6 multicast data distribution by selectively forwarding packets based on MLD snooping.

8.3 Multicast Table

Displays and manages IPv4/IPv6 multicast group information and forwarding tables.

Chapter 9 QoS

9.1 DiffServ Configuration

Configures traffic classification and priority mapping based on port, 802.1P, or DSCP.

9.2 Bandwidth Control

Manages traffic rates per port using rate limiting and storm control to optimize bandwidth.

9.3 Voice VLAN Configuration

Configures Voice VLANs to prioritize voice traffic and ensure quality, using OUI addresses for identification.

Chapter 10 ACL

10.1 Time-Range Configuration

Defines time ranges (absolute, weekly, holiday) for ACL rule effectiveness, enabling time-based policies.

10.2 ACL Configuration

Covers the creation and management of Access Control Lists (ACLs), including MAC and IP ACLs.

10.3 Policy Configuration

Creates and manages policies that define actions for packets matching ACL rules, like mirroring or QoS.

10.4 Policy Binding

Binds policies to specific ports or VLANs to enforce access control rules effectively.

10.5 Application Example for ACL

Demonstrates practical ACL configuration scenarios for controlling network access and traffic.

Chapter 11 Network Security

11.1 IP-MAC Binding

Binds IP addresses to MAC addresses for enhanced network access control and ARP security.

11.2 ARP Inspection

Detects and mitigates ARP attacks like spoofing and man-in-the-middle attacks.

11.3 DoS Defend

Protects against Denial of Service (DoS) attacks by identifying and blocking malicious traffic.

11.4 802.1X Authentication

Implements port-based network access control using IEEE 802.1X for user authentication.

Chapter 12 SNMP

12.1 SNMP Configuration

Configures SNMP globally, views, groups, users, and communities for network management.

12.2 Notification Configuration

Configures SNMP traps and informs to alert the management station about important network events.

12.3 RMON Configuration

Enables Remote Monitoring (RMON) for detailed network traffic statistics, events, and alarms.

Chapter 13 Cluster

13.1 NDP Functionality

Collects neighbor information using Neighbor Discovery Protocol (NDP) to support cluster establishment.

13.2 NTDP Functionality

Discovers network topology by collecting NTDP information for commander switch management.

13.3 Cluster Management

Manages cluster status, roles, and configurations for centralized control of network devices.

13.4 Application Example for Cluster Function

Demonstrates a practical setup for managing multiple switches within a cluster via a commander switch.

Chapter 14 Maintenance

14.1 System Monitor

Monitors switch CPU and memory utilization to detect performance issues or potential attacks.

14.2 Log Management

Manages system logs, including viewing tables, local/remote logging, and backup.

14.3 Device Diagnostics

Provides tools for diagnosing device issues, such as cable testing and loopback tests.

14.4 Network Diagnostics

Performs network diagnostics like Ping and Tracert to identify connectivity and reachability issues.

Appendix A: Specifications

Appendix B: Configuring the PCs

Appendix C: Load Software Using FTP

Appendix D: 802.1X Client Software

Appendix E: Glossary

Related product manuals