Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual TP-LINK TL-SG5426. We hope that this TP-LINK TL-SG5426 user guide will be useful to you.
Lastmanuals help download the user guide TP-LINK TL-SG5426.
Manual abstract: user guide TP-LINK TL-SG5426INSTALLATION GUIDE
Detailed instructions for use are in the User's Guide.
[. . . ] TL-SG5426 26-Port Gigabit Managed Switch
Rev: 1. 0. 0 1910010105
COPYRIGHT & TRADEMARKS
® is a registered Specifications are subject to change without notice. trademark of TP-LINK TECHNOLOGIES CO. , LTD. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO. , LTD. [. . . ] Web Click IP Source Guard, Port Configuration.
Figure 3-119 IP Source Guard Port Configuration
CLI This example shows how to enable IP source guard on port 5.
Console(config)#interface ethernet 1/5 Console(config-if)#ip source-guard sip Console(config-if)#end Console#show ip source-guard Interface Filter-type ------------------Eth 1/1 DISABLED Eth 1/2 DISABLED Eth 1/3 DISABLED Eth 1/4 DISABLED Eth 1/5 SIP Eth 1/6 DISABLED . 4-227 4-230
Static IP Source Guard Binding Configuration
Adds a static addresses to the source-guard binding table. Table entries include a MAC address, IP address, lease time, entry type (Static, Dynamic), VLAN identifier, and port identifier. All static entries are configured with an infinite lease time, which is indicated with a value of zero in the table.
3-192
IP Source Guard
Command Attributes · · · · · Static Binding Table Counts The total number of static entries in the table. (Range: 1-26) VLAN ID ID of a configured VLAN (Range: 1-4094) MAC Address A valid unicast MAC address. IP Address A valid unicast IP address, including classful types A, B or C.
3
Web Click IP Source Guard, Static Configuration.
Figure 3-120 Static IP Source Guard Binding Configuration
CLI This example shows how to configure a static source-guard binding on port 5.
Console(config)#ip source-guard binding 11-22-33-44-55-66 vlan 1 192. 168. 0. 99 interface ethernet 1/5 Console(config)# 4-229
Dynamic IP Source Guard Binding Information
Displays the source-guard binding table for a selected interface. Command Attributes · Query by Select an interface to display the source-guard binding. (Options: Port, VLAN, MAC Address, or IP Address) · Dynamic Binding Table Counts Displays the number of IP addresses in the source-guard binding table. · Current Dynamic Binding Table Displays the IP addresses in the source-guard binding table.
3-193
3
Configuring the Switch
Web Click IP Source Guard, Dynamic Information.
Figure 3-121 Dynamic IP Source Guard Binding Information
CLI This example shows how to configure a static source-guard binding on port 5.
Console#show ip source-guard binding 4-230 MacAddress IpAddress Lease(sec) Type VLAN Interface ----------------- --------------- ---------- -------------------- -------11-22-33-44-55-66 192. 168. 0. 99 0 Static 1 Eth 1/5 Console#
Switch Clustering
Switch Clustering is a method of grouping switches together to enable centralized management through a single unit. Switches that support clustering can be grouped together regardless of physical location or switch type, as long as they are connected to the same local network. A switch cluster has a "Commander" unit that is used to manage all other "Member" switches in the cluster. The management station can use both the web interface and Telnet to communicate directly while the Commander throught its IP address, and the Commander manages Member switches using cluster "internal" IP addresses. There can be up to 16 Member switches in one cluster. Cluster switches are limited to within a single IP subnet.
3-194
Switch Clustering
Once a switch has been configured to be a cluster Commander, it automatically discovers other cluster-enabled switches in the network. These "Candidate" switches only become cluster Members when manually selected by the administrator through the management station.
3
After the Commander and Members have been configured, any switch in the cluster can be managed from the web interface by choosing the Member ID from the Cluster drop-down menu. From the Commander CLI prompt, use the "rcommand" command (see 4-240) to connect to the Member switch.
Figure 3-122 Cluster Member Choice
Cluster Configuration
To create a switch cluster, first be sure that clustering is enabled on the switch (the default is enabled), then set the switch as a Cluster Commander. Set a Cluster IP Pool that does not conflict with the network IP subnet. Cluster IP addresses are assigned to switches when they become Members and are used for communication between Member switches and the Commander. Command Attributes · Cluster Status Enables or disables clustering on the switch. · Cluster Commander Enables or disables the switch as a cluster Commander. · Role Indicates the current role of the switch in the cluster; either Commander, Member, or Candidate. · Cluster IP Pool An "internal" IP address pool that is used to assign IP addresses to Member switches in the cluster. [. . . ] This is related directly to the hardware interface for network devices and passes on traffic based on MAC addresses.
Link Aggregation
See Port Trunk.
Link Aggregation Control Protocol (LACP)
Allows ports to automatically negotiate a trunked link with LACP-configured ports on another device.
Management Information Base (MIB)
An acronym for Management Information Base. It is a set of database objects that contains information about a specific device.
MD5 Message-Digest Algorithm
An algorithm that is used to create digital signatures. It is intended for use with 32 bit machines and is safer than the MD4 algorithm, which has been broken. MD5 is a one-way hash function, meaning that it takes a message and converts it into a fixed string of digits, also called a message digest.
Glossary-3
Glossary Multicast Switching
A process whereby the switch filters incoming multicast frames for services for which no attached host has registered, or forwards them to all ports contained within the designated multicast VLAN group.
Network Time Protocol (NTP)
NTP provides the mechanisms to synchronize time across the network. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE TP-LINK TL-SG5426
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.
Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual TP-LINK TL-SG5426 will begin.