PLANET WGSW-50040 User Manual
Configuration guide
Table of contents
Document Outline
- Chapter 1 INTRODUTION
- Chapter 2 INSTALLATION
- Chapter 3 Switch Management
- Chapter 4 Basic Switch Configuration
- Chapter 5 Cluster Configuration
- Chapter 6 Port Configuration
- Chapter 7 Port Loopback Detection Function Configuration
- Chapter 8 Port Channel Configuration
- Chapter 9 Jumbo Configuration
- Chapter 10 VLAN Configuration
- Chapter 11 MAC Table Configuration
- Chapter 12 MSTP Configuration
- Chapter 13 QoS Configuration
- Chapter 14 Flow-based Redirection
- Chapter 15 Layer 3 Management Configuration
- Chapter 16 ARP Scanning Prevention Function Configuration
- Chapter 17 ARP GUARD Configuration
- Chapter 18 DHCP Configuration
- Chapter 19 DHCP Snooping Configuration
- Chapter 20 DHCP Snooping option 82 Configuration
- Chapter 21 IPv4 Multicast Protocol
- Chapter 22 IPv6 Multicast Protocol
- Chapter 23 Multicast VLAN
- Chapter 24 ACL Configuration
- Chapter 25 802.1x Configuration
- 25.1 Introduction to 802.1x
- 25.1.1 The Authentication Structure of 802.1x
- 25.1.2 The Work Mechanism of 802.1x
- 25.1.3 The Encapsulation of EAPOL Messages
- 25.1.4 The Encapsulation of EAP Attributes
- 25.1.5 Web Authentication Proxy based on 802.1x
- 25.1.6 The Authentication Methods of 802.1x
- 25.1.7 The Extension and Optimization of 802.1x
- 25.1.8 The Features of VLAN Allocation
- 25.2 802.1x Configuration Task List
- 25.3 802.1x Application Example
- 25.4 802.1x Troubleshooting
- 25.1 Introduction to 802.1x
- Chapter 26 The Number Limitation Function of Port, MAC in VLAN Configuration
- 26.1 Introduction to the Number Limitation Function of Port, MAC in VLAN
- 26.2 The Number Limitation Function of Port, MAC in VLAN Configuration Task Sequence
- 26.3 The Number Limitation Function of Port, MAC in VLAN Typical Examples
- 26.4 The Number Limitation Function of Port, MAC in VLAN Troubleshooting Help
- Chapter 27 Operational Configuration of AM Function
- Chapter 28 Security Feature Configuration
- 28.1 Introduction to Security Feature
- 28.2 Security Feature Configuration
- 28.2.1 Prevent IP Spoofing Function Configuration Task Sequence
- 28.2.2 Prevent TCP Unauthorized Label Attack Function Configuration Task Sequence
- 28.2.3 Anti Port Cheat Function Configuration Task Sequence
- 28.2.4 Prevent TCP Fragment Attack Function Configuration Task Sequence
- 28.2.5 Prevent ICMP Fragment Attack Function Configuration Task Sequence
- 28.3 Security Feature Example
- Chapter 29 TACACS+ Configuration
- Chapter 30 RADIUS Configuration
- Chapter 31 MRPP Configuration
- Chapter 32 Mirror Configuration
- Chapter 33 sFlow Configuration
- Chapter 34 SNTP Configuration
- Chapter 35 Monitor and Debug
- Chapter 36 Reload Switch after Specified Time
- Chapter 37 Debugging and Diagnosis for Packets Received and Sent by CPU
- Chapter 38 APPENDEX A
- Chapter 39 GLOSSARY
- EC Declaration of Conformity