TP-Link TL-SL5428E Switch User Manual


 
Chapter Introduction
Chapter 4 System This module is used to configure system properties of the switch.
Here mainly introduces:
System Info: Configure the description, system time and
network parameters of the switch.
User Management: Configure the user name and password for
users to log on to the Web management page with a certain
access level.
System Tools: Manage the configuration file of the switch.
Access Security: Provide different security measures for the
login to enhance the configuration management security.
Chapter 5 Switching This module is used to configure basic functions of the switch.
Here mainly introduces:
Port: Configure the basic features for the port.
LAG: Configure Link Aggregation Group. LAG is to combine a
number of ports together to make a single high-bandwidth data
path.
Traffic Monitor: Monitor the traffic of each port
MAC Address: Configure the address table of the switch.
Chapter 6 VLAN This module is used to configure VLANs to control broadcast in
LANs. Here mainly introduces:
802.1Q VLAN: Configure port-based VLAN.
MAC VLAN: Configure MAC-based VLAN without changing
the 802.1Q VLAN configuration.
Protocol VLAN: Create VLANs in application layer to make
some special data transmitted in the specified VLAN.
VLAN VPN: VLAN VPN allows the packets with VLAN tags of
private networks to be encapsulated with VLAN tags of public
networks at the network access terminal of the Internet Service
Provider.
GVRP: GVRP allows the switch to automatically add or remove
the VLANs via the dynamic VLAN registration information and
propagate the local VLAN registration information to other
switches, without having to individually configure each VLAN.
Private VLAN: Designed to save VLAN resources of uplink
devices and decrease broadcast. Private VLAN mainly used in
campus or enterprise networks to achieve user layer-2-
separation and to save VLAN resources of uplink devices.
Chapter 7 Spanning Tree This module is used to configure spanning tree function of the
switch. Here mainly introduces:
STP Config: Configure and view the global settings of
spanning tree function.
Port Config: Configure CIST parameters of ports.
MSTP Instance: Configure MSTP instances.
STP Security: Configure protection function to prevent devices
from any malicious attack against STP features.
3