На сайте 124171 инструкция общим размером 502.73 Гб, которые состоят из 6277477 страниц

Стекируемый коммутатор SmartPro с 24 портами 10/100/1000Base-T, 2 портами 1000Base-X SFP и 2 портами 10GBase-X SFP+ D-LINK DGS-1510-28. Инструкция на английском языке

Руководство пользователя D-LINK DGS-1510-28. Основные функции, характеристики и условия эксплуатации изложены на 702 страницах документа в pdf формате.

Информация

Раздел
Компьютеры
Категория
Модемы / Роутеры / Адаптеры / Bluetooth
Тип устройства
Стекируемый коммутатор SmartPro с 24 портами 10/100/1000Base-T, 2 портами 1000Base-X SFP и 2 портами 10GBase-X SFP+
Производитель (бренд)
D-LINK
Модель
D-LINK DGS-1510-28
Еще инструкции
Модемы / Роутеры / Адаптеры / Bluetooth D-LINK, Стекируемые коммутаторы SmartPro с 24 портами 10/100/1000Base-T, 2 портами 1000Base-X SFP и 2 портами 10GBase-X SFP D-LINK
Язык инструкции
английский
Дата создания
21 Августа 2018 г.
Просмотры
72 просмотра
Количество страниц
702
Формат файла
pdf
Размер файла
3.02 Мб
Название файла
d_link_manual_dgs_1510_28p.pdf

Фото

Страница 1Страница 2Страница 3Страница 4

Просмотр

Доступно к просмотру 701 страница. Рекомендуем вам скачать файл инструкции, поскольку онлайн просмотр документа может сильно отличаться от оригинала.

  • DGS-1510 Series Gigabit Ethernet SmartPro Switch CLI Reference Guide
    Table of Contents
    1.   Introduction ...................................................................................................................................................................... 1
    2.   Basic CLI Commands ................................................................................................................................................... 10
    3.   802.1X Commands........................................................................................................................................................ 24
    4.   Access Control List (ACL) Commands.......................................................................................................................... 38
    5.   Access Management Commands ................................................................................................................................. 68
    6.   ARP Spoofing Prevention Commands .......................................................................................................................... 85
    7.   Asymmetric VLAN Commands ...................................................................................................................................... 87
    8.   Authentication, Authorization, and Accounting (AAA) Commands ............................................................................... 88
    9.   Basic IPv4 Commands ................................................................................................................................................ 113
    10.   Basic IPv6 Commands ............................................................................................................................................. 120
    11.   Cable Diagnostics Commands ................................................................................................................................. 129
    12.   Command Logging Commands ............................................................................................................................... 132
    13.   Debug Commands ................................................................................................................................................... 133
    14.   DHCP Auto-Configuration Commands ..................................................................................................................... 145
    15.   DHCP Client Commands.......................................................................................................................................... 147
    16.   DHCP Relay Commands.......................................................................................................................................... 151
    17.   DHCP Snooping Commands ................................................................................................................................... 172
    18.   DHCPv6 Client Commands ...................................................................................................................................... 191
    19.   DHCPv6 Guard Commands ..................................................................................................................................... 194
    20.   DHCPv6 Relay Commands ...................................................................................................................................... 198
    21.   Digital Diagnostics Monitoring (DDM) Commands ................................................................................................... 204
    22.   D-Link Discovery Protocol (DDP) Client Commands ............................................................................................... 213
    23.   Domain Name System (DNS) Commands ............................................................................................................... 216
    24.   DoS Prevention Commands ..................................................................................................................................... 223
    25.   Dynamic ARP Inspection Commands ...................................................................................................................... 227
    26.   Error Recovery Commands ...................................................................................................................................... 241
    27.   File System Commands ........................................................................................................................................... 245
    28.   Filter Database (FDB) Commands ........................................................................................................................... 251
    29.   GARP VLAN Registration Protocol (GVRP) Commands ......................................................................................... 264
    30.   Gratuitous ARP Commands ..................................................................................................................................... 272
    31.   IGMP Snooping Commands .................................................................................................................................... 275
    32.   Interface Commands ................................................................................................................................................ 291
    33.   IP Source Guard Commands ................................................................................................................................... 305
    34.   IP Utility Commands ................................................................................................................................................. 311
    35.   IP-MAC-Port Binding (IMPB) Commands ................................................................................................................ 313
    36.   IPv6 Snooping Commands....................................................................................................................................... 317
    37.   IPv6 Source Guard Commands ............................................................................................................................... 322
    38.   Japanese Web-based Access Control (JWAC) Commands .................................................................................... 328
    ii
  • DGS-1510 Series Gigabit Ethernet SmartPro Switch CLI Reference Guide
    39.   Jumbo Frame Commands ........................................................................................................................................ 340
    40.   Link Aggregation Control Protocol (LACP) Commands ........................................................................................... 341
    41.   Link Layer Discovery Protocol (LLDP) Commands .................................................................................................. 348
    42.   Loopback Detection (LBD) Commands .................................................................................................................... 378
    43.   MAC Authentication Commands .............................................................................................................................. 384
    44.   Mirror Commands ..................................................................................................................................................... 388
    45.   MLD Snooping Commands ...................................................................................................................................... 392
    46.   Multiple Spanning Tree Protocol (MSTP) Commands ............................................................................................. 409
    47.   Neighbor Discovery (ND) Inspection Commands .................................................................................................... 418
    48.   Network Access Authentication Commands ............................................................................................................ 422
    49.   Port Security Commands ......................................................................................................................................... 436
    50.   Power over Ethernet (PoE) Commands ................................................................................................................... 443
    51.   Power Saving Commands ........................................................................................................................................ 456
    52.   Protocol Independent Commands ............................................................................................................................ 462
    53.   Quality of Service (QoS) Commands ....................................................................................................................... 468
    54.   Remote Network MONitoring (RMON) Commands ................................................................................................. 502
    55.   Router Advertisement (RA) Guard Commands........................................................................................................ 510
    56.   Safeguard Engine Commands ................................................................................................................................. 514
    57.   Secure Shell (SSH) Commands ............................................................................................................................... 521
    58.   Secure Sockets Layer (SSL) Commands ................................................................................................................ 529
    59.   Simple Network Management Protocol (SNMP) Commands .................................................................................. 537
    60.   Single IP Management (SIM) Commands ................................................................................................................ 559
    61.   Spanning Tree Protocol (STP) Commands.............................................................................................................. 570
    62.   Stacking Commands ................................................................................................................................................ 583
    63.   Storm Control Commands ........................................................................................................................................ 588
    64.   Surveillance VLAN Commands ................................................................................................................................ 594
    65.   Switch Port Commands ............................................................................................................................................ 600
    66.   System File Management Commands ..................................................................................................................... 605
    67.   System Log Commands ........................................................................................................................................... 616
    68.   Time and SNTP Commands .................................................................................................................................... 625
    69.   Time Range Commands .......................................................................................................................................... 632
    70.   Traffic Segmentation Commands ............................................................................................................................. 635
    71.   Virtual LAN (VLAN) Commands ............................................................................................................................... 637
    72.   Voice VLAN Commands........................................................................................................................................... 648
    73.   Web Authentication Commands ............................................................................................................................... 656
    Appendix A - System Log Entries ....................................................................................................................................... 661
    Appendix B - Trap Entries ................................................................................................................................................... 685
    Appendix C - RADIUS Attributes Assignment ..................................................................................................................... 695
    Appendix D - IETF RADIUS Attributes Support .................................................................................................................. 698
    iii
  • DGS-1510 Series Gigabit Ethernet SmartPro Switch CLI Reference Guide
    1.  Introduction
    This manual’s command descriptions are based on the software release 1.00. The commands listed here
    are the subset of commands that are supported by the DGS-1510 Series SmartPro Switch.
    Audience
    This CLI Reference Guide is intended for network administrators and other IT networking professionals
    responsible for managing the switch by using the Command Line Interface (CLI). The CLI is the primary
    management interface to the DGS-1510 Series SmartPro Switch, which will be generally be referred to
    simply as “the Switch” within this manual. This manual is written in a way that assumes that you already
    have the experience and knowledge of Ethernet and modern networking principles for Local Area
    Networks.
    Other Documentation
    The documents below are a further source of information in regards to configuring and troubleshooting
    the Switch. All the documents are available from the CD bundled with this switch, or from the D-Link
    website. Other documents related to the Switch are:
    •   DGS-1510 Series Gigabit Ethernet SmartPro Switch Hardware Installation Guide
    •   DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide
    Conventions
    Convention                    Description
    Boldface Font                 Commands, command options and keywords are printed in boldface.
    Keywords, in the command line, are to be entered exactly as they are
    displayed.
    UPPERCASE ITALICS Font        Parameters or values that must be specified are printed in
    UPPERCASE ITALICS. Parameters in the command line are to be
    replaced with the actual values that are desired to be used with the
    command.
    Square Brackets [ ]           Square brackets enclose an optional value or set of optional
    arguments.
    Braces { }                    Braces enclose alternative keywords separated by vertical bars.
    Generally, one of the keywords in the separated list can be chosen.
    Vertical Bar |                Optional values or arguments are enclosed in square brackets and
    separated by vertical bars. Generally, one or more of the vales or
    arguments in the separated list can be chosen.
    Blue Courier Font             This convention is used to represent an example of a screen console
    display including example entries of CLI command input with the
    corresponding output. All examples used in this manual are based on
    the DGS-1510-28P switch.
    Notes, Notices, and Cautions
    Below are examples of the three types of indicators used in this manual. When administering your switch
    using the information in this document, you should pay special attention to these indicators. Each
    example below provides an explanatory remark regarding each type of indicator.
    1

Скачать инструкцию

Файл скачали 21 раз (Последний раз: 10 Апреля 2024 г., в 08:23)

Загрузить

Инструкции к похожим моделям