EasyManua.ls Logo

TP-Link T2600G-28TS User Manual

TP-Link T2600G-28TS
355 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
T2600G-28TS (TL-SG3424)
T2600G-52TS (TL-SG3452)
JetStream Gigabit L2 Managed Switch
REV1.0.1
191001
1412

Table of Contents

Other manuals for TP-Link T2600G-28TS

Question and Answer IconNeed help?

Do you have a question about the TP-Link T2600G-28TS and is the answer not in the manual?

TP-Link T2600G-28TS Specifications

General IconGeneral
ModelT2600G-28TS
CategorySwitch
Switching Capacity56 Gbps
Forwarding Rate41.7 Mpps
LayerLayer 2+
Power Supply100-240V AC, 50/60Hz
Fan Quantity2
MountingRack Mountable
MAC Address Table16K
Jumbo Frame9KB
Storage Temperature-40°C to 70°C (-40°F to 158°F)
Operating Humidity10% to 90% non-condensing
Storage Humidity5% to 90% non-condensing
Ports4 x 1G SFP slots
ManagementWeb, CLI, SNMP
Dimensions440 x 180 x 44 mm (17.3 x 7.1 x 1.7 in)
Standards and ProtocolsIEEE 802.3i, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z, IEEE 802.3x, IEEE 802.1q, IEEE 802.1p, IEEE 802.1d, IEEE 802.1s, IEEE 802.1w
Quality of ServiceSupport 802.1p CoS/DSCP priority
VLANSupports up to 4K VLANs simultaneously (out of 4K VLAN IDs)
Operating Temperature0°C to 40°C (32°F to 104°F)

Summary

Chapter 1 About this Guide

1.1 Intended Readers

Identifies the target audience for this guide, assuming familiarity with IT concepts.

1.2 Conventions

Explains the symbols and formatting used throughout the guide for clarity.

1.3 Overview of This Guide

Provides a summary of the guide's structure, outlining the content of each chapter.

Chapter 2 Introduction

2.1 Overview of the Switch

Introduces the JetStream Gigabit L2 Managed Switch, its features, and capabilities.

2.2 Appearance Description

Details the physical components and layout of the switch's front and rear panels.

Chapter 3 Login to the Switch

3.1 Login

Provides instructions on how to access the switch's web management interface.

3.2 Configuration

Explains how to navigate the main setup menu after successful login.

Chapter 4 System

4.1 System Info

Covers basic system configuration including port status and device descriptions.

4.2 User Management

Details how to manage user accounts, access levels, and passwords for switch access.

4.3 System Tools

Provides functions for managing configuration files, firmware, and system reboot.

4.4 Access Security

Configures security measures for remote login and access control.

4.5 SDM Template

Manages hardware TCAM resources using different Switch Database Management templates.

Chapter 5 Switching

5.1 Port

Covers configuration of basic port features like status, speed, duplex, and flow control.

5.2 LAG

Details Link Aggregation Group configuration for combining ports into a high-bandwidth path.

5.3 Traffic Monitor

Monitors traffic statistics and summary for each port.

5.4 MAC Address

Manages MAC address tables, including static, dynamic, and filtering entries.

5.5 L2PT

Configures Layer 2 Protocol Tunneling for transmitting Layer 2 protocols across networks.

Chapter 6 VLAN

6.1 802.1Q VLAN

Explains VLAN tagging and port link types for 802.1Q VLAN configuration.

6.3 MAC VLAN

Details how to classify VLANs based on MAC addresses for enhanced network segmentation.

6.5 Protocol VLAN

Allows VLAN classification based on network protocols like IP, IPX, and ARP.

6.7 VLAN VPN

Configures Virtual Private Network functionality using VLANs for secure connections.

6.8 GVRP

Manages dynamic VLAN registration and propagation using GARP VLAN Registration Protocol.

6.9 Private VLAN

Explains Private VLANs for Layer 2 separation and efficient VLAN resource usage.

Chapter 7 Spanning Tree

7.1 STP Config

Covers global configuration of Spanning Tree Protocol, including modes and parameters.

7.2 Port Config

Configures Spanning Tree parameters for individual ports, including priority and path costs.

7.3 MSTP Instance

Manages Multiple Spanning Tree Protocol instances for VLAN-to-instance mapping.

7.4 STP Security

Provides protection functions against malicious attacks on Spanning Tree features.

Chapter 8 Ethernet OAM

8.1 Basic Config

Enables and configures Ethernet OAM function, mode, and discovery status on ports.

8.2 Link Monitoring

Configures parameters for OAM link events, thresholds, and detection periods.

8.3 RFI

Configures notification for link faults like dying gasp and critical events.

8.4 Remote Loopback

Initiates remote loopback testing to ensure link quality during installation or troubleshooting.

8.5 Statistics

Displays detailed Ethernet OAM traffic and event log statistics for specific ports.

8.6 DLDP

Monitors physical cable configuration and detects unidirectional links using DLDP.

Chapter 9 Multicast

9.1 IGMP Snooping

Manages multicast groups by snooping IGMP messages between hosts and routers.

9.2 MLD Snooping

Distributes IPv6 multicast data efficiently by selectively forwarding to interested ports.

9.3 Multicast Table

Displays and configures IPv4/IPv6 multicast address tables for forwarding streams.

Chapter 10 Routing

10.1 Interface

Configures Layer 3 interfaces, including VLAN, loopback, routed ports, and IPv6 features.

10.2 Routing Table

Displays summaries of routing information generated by various routing protocols.

10.3 Static Routing

Manually configures static routes for stable networks to improve performance.

10.4 DHCP Server

Manages IP address allocation and configuration for network clients via DHCP.

10.5 DHCP Relay

Configures DHCP Relay Agent to forward DHCP requests between clients and servers.

10.6 ARP

Manages IP-to-MAC address mappings in the ARP table and configures static ARP entries.

Chapter 11 QoS

11.1 DiffServ

Classifies packets and maps them to priority queues using DiffServ for QoS implementation.

11.2 Bandwidth Control

Controls traffic rate and broadcast flow on ports using Rate Limit and Storm Control.

11.3 Voice VLAN

Configures Voice VLANs to prioritize voice data streams for quality transmission.

Chapter 12 ACL

12.1 Time-Range

Specifies time-ranges (absolute, week, holiday) for ACL rules to take effect.

12.2 ACL Config

Creates and manages Access Control Lists (ACLs) including MAC, IP, and IPv6 ACLs.

12.3 Policy Config

Defines policies to control data packets by matching ACL rules and configuring actions.

12.4 ACL Binding

Binds ACLs to specific ports or VLANs to enforce access control policies.

12.5 Policy Binding

Applies policies to specific ports or VLANs, controlling data packet processing.

Chapter 13 Network Security

13.1 IP-MAC Binding

Binds IP, MAC, VLAN ID, and Port number to enhance network access control.

13.2 IPv6-MAC Binding

Binds IPv6 address, MAC, VLAN ID, and Port number for network access control.

13.3 DHCP Snooping

Monitors DHCP process to record host information for automatic IP-MAC binding.

13.4 DHCPv6 Snooping

Monitors IPv6 address acquisition from DHCPv6 server for automatic binding.

13.5 ARP Inspection

Detects and filters illegal ARP packets to prevent ARP attacks.

13.6 ND Detection

Verifies IPv6 Neighbor Discovery packets using MAC binding to filter forged ND packets.

13.7 IP Source Guard

Filters IP packets based on IP-MAC binding entries to enhance bandwidth utility.

13.8 DoS Defend

Analyzes IP packets to distinguish and defend against malicious DoS attack packets.

13.9 802.1X

Implements port-based network access control for authentication and security.

13.10 PPPoE

Extracts Vendor-Specific tags for authentication, authorization, and accounting (AAA).

13.11 AAA

Configures authentication, authorization, and accounting services for network access.

Chapter 14 SNMP

14.1 SNMP Config

Configures SNMP globally, including views, groups, users, and communities.

14.2 Notification

Configures the switch to report important events to the management station.

14.3 RMON

Monitors network traffic and performance using RMON groups like History and Statistics.

Chapter 15 LLDP

15.1 Basic Config

Configures LLDP globally, including transmit interval and fast start mechanism.

15.2 Device Info

Views LLDP information of the local device and its neighbors.

15.3 Device Statistics

Displays LLDP statistics for local devices, including neighbor counts and errors.

15.4 LLDP-MED

Configures LLDP-MED parameters for managing endpoint devices like Voice over IP phones.

Chapter 16 Maintenance

16.1 System Monitor

Monitors CPU and memory utilization status through data graphs.

16.2 sFlow

Monitors network traffic at high speeds using sampled flow technology.

16.3 Log

Records, classifies, and manages system information for monitoring and diagnosis.

16.4 Device Diagnostics

Provides Cable Test functionality to diagnose network cable connection issues.

16.5 Network Diagnostics

Tests network connectivity and gateway reachability using Ping and Tracert.

Appendix A. Password Recovery

Appendix B. Specifications

Appendix C. Glossary

Related product manuals