TP-Link TL-SL3428 Switch User Manual


 
4.3 Viewing Flash Logs ............................................................................................................... 18
4.4 Defining System Log Servers ............................................................................................... 19
Section 5. Conguring Device Security .................................................... 21
5.1 Configuring Management Security ...................................................................................... 21
5.1.1 Configuring Authentication Methods ................................................................................. 21
5.1.1.1 Defining Access Profiles .................................................................................................. 21
5.1.1.2 Defining Profile Rules ..................................................................................................... 23
5.1.1.3 Defining Authentication Profiles ..................................................................................... 24
5.1.1.4 Mapping Authentication Profiles ..................................................................................... 25
5.1.1.5 Defining TACACS+ Host Settings .................................................................................. 27
5.1.1.6 Defining RADIUS Server Settings ................................................................................. 28
5.1.2 Configuring Passwords...................................................................................................... 30
5.1.2.1 Defining Local Users....................................................................................................... 30
5.1.2.2 Defining Line Passwords ................................................................................................ 31
5.1.2.3 Defining Enable Passwords ........................................................................................... 31
5.2 Configuring Network Security ............................................................................................... 31
5.2.1 Network Security Overview ............................................................................................... 32
5.2.1.1 Port-Based Authentication ............................................................................................. 32
5.2.1.2 Advanced Port-Based Authentication ............................................................................ 32
5.2.2 Defining Network Authentication Properties ..................................................................... 32
5.2.2.1 Defining Port Authentication Properties ......................................................................... 33
5.2.2.2 Configuring Multiple Hosts ............................................................................................. 34
5.2.2.3 Defining Authentication Hosts ........................................................................................ 35
5.2.3 Configuring Traffic Control ................................................................................................. 36
5.2.3.1 Managing Port Security .................................................................................................. 36
5.2.3.2 Enabling Storm Control .................................................................................................. 37
Section 6. Dening IP Addresses ............................................................... 39
6.1 Defining IP Addressing ......................................................................................................... 39
6.1.1 Defining IP Addresses ....................................................................................................... 39
6.1.2 Defining the Default Gateway ........................................................................................... 40
6.1.3 Defining DHCP Addresses ................................................................................................ 40
6.1.4 Defining ARP ...................................................................................................................... 41
6.2 Defining Domain Name System ........................................................................................... 42
6.2.1 Defining DNS Servers ....................................................................................................... 42
6.2.2 Configuring Host Mapping ................................................................................................. 43