User manual ASUS GIGAX 3024X
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual ASUS GIGAX 3024X. We hope that this ASUS GIGAX 3024X user guide will be useful to you.
Lastmanuals help download the user guide ASUS GIGAX 3024X.
You may also download the following manuals related to this product:
ASUS GIGAX 3024X (1102 ko)
Manual abstract: user guide ASUS GIGAX 3024X
Detailed instructions for use are in the User's Guide.
[. . . ] GigaX Series
Layer 3 Managed Switch
User Guide
1
Exxxx First Edition V1 March 2005
Copyright © 2005 ASUSTeK COMPUTER INC. No part of this manual, including the products and software described in it, may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means, except documentation kept by the purchaser for backup purposes, without the express written permission of ASUSTeK COMPUTER INC. Product warranty or service will not be extended if: (1) the product is repaired, modified or altered, unless such repair, modification of alteration is authorized in writing by ASUS; or (2) the serial number of the product is defaced or missing. ASUS provides this manual "as is" without warranty of any kind, either express or implied, including but not limited to the implied warranties or conditions of merchantability or fitness for a particular purpose. [. . . ] The Action field determines if the packet should be dropped or forwarding when it matches the rule. If a packet matches two rules with different action, the packet will follow the rule showed first in the rule list.
66
GigaX Series L3 Managed Switch User Guide
Figure 39. Filter Rule in IP mode
67
4. 8. 2
Filter Attach
A filter set is idle if you did not attach it to any ingress or egress port. Use the Filter Attach page to attach a filter set to ingress and egress ports. To make the configuration effective, go to the "Save Configuration" page, then click , or click on to refresh the page. To attach a filter set to ports: · Attach to all ports: the filter set applies to all the ports of the system. · Attach to certain ports: you can specify the ingress ports and egress port to be applied. · Detach from all ports: remove all the filters from the attached ports.
You may not detach certain ports after issuing an "Attach All" command. If you wish to detach ports, use the "Detach All" command.
Once the filter set is attached to the ingress ports and egress ports, it will filter the packets according to the ingress port, egress port, and the packet fields in the rules. For example, a set with a single rule to filter out destination MAC address 00:10:20:30:40:50 is attached to ingress port 1 and egress port 2. A packet with destination MAC 00:10:20:30:40:50 from port 1 is not switched to port 2, but it is possible to go to other ports except port 2 in flooding situation.
68
GigaX Series L3 Managed Switch User Guide
Figure 41. Filter Attach
69
4. 9
Security
The switch has the 802. 1x port-based security feature. Only authorized hosts are allowed to access the switch port. Traffic is blocked for hosts failed to authenticate themselves. The authentication service is provided by a RADIUS server or the local database in the switch. The switch also supports dynamic VLAN assignment through 802. 1x authentication process. The VLAN information for the users/ports should be configured in the authentication server properly before enabling this feature.
4. 9. 1
Port Access Control
Port Access Control is used to configure various 802. 1x parameters. 802. 1x uses either RADIUS server or local database to authenticate port users. The first part is the Bridge (Global) settings: · Reauthentication: Once enabled, the switch will try to authenticate the port user again when the re-authentication time is up. · Reauthentication Time: If 'Reauthentication' is enabled, this is the time period the switch uses to re-send authentication request to the port user. (see above) · Authentication Method: RADIUS or Local database can be used to authenticate the port user. · Quiet Period: If authentication failed either from RADIUS or local database, the switch waits upon this time period before sending another authentication request to the port user. · Retransmission Time: If the port user failed to respond to authentication request from the switch, the switch waits upon this time period before sending another authentication request to the port user. [. . . ] Transmission Control Protocol/Internet Protocol The basic protocols used on the Internet. TCP is responsible for dividing data up into packets for delivery and reassembling them at the destination, while IP is responsible for delivering the packets from source to destination. When TCP and IP are bundled with higher-level applications such as HTTP, FTP, Telnet, etc. , TCP/IP refers to this whole suite of protocols. Telnet/SSH An interactive, character-based program used to access a remote computer. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE ASUS GIGAX 3024X Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service. Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual ASUS GIGAX 3024X will begin.