TL-SG3216 V1 User Guide
Page 10
...: Manage the configuration file of spanning tree function. z Traffic Monitor: Monitor the traffic of each port of the switch, which facilitates you to monitor the IGMP messages in the network. 3 z MAC VLAN: Configure MAC-based VLAN without having to prevent devices from any malicious attack against STP features. z Port Config: Configure CIST parameters of the switch. z Multicast Filter: Configure multicast filter feature to restrict users ordering multicast programs. z Packet Statistics: View the multicast data traffic on to the Web management page with a certain access level...
...: Manage the configuration file of spanning tree function. z Traffic Monitor: Monitor the traffic of each port of the switch, which facilitates you to monitor the IGMP messages in the network. 3 z MAC VLAN: Configure MAC-based VLAN without having to prevent devices from any malicious attack against STP features. z Port Config: Configure CIST parameters of the switch. z Multicast Filter: Configure multicast filter feature to restrict users ordering multicast programs. z Packet Statistics: View the multicast data traffic on to the Web management page with a certain access level...
TL-SG3216 V1 User Guide
Page 13
... and easy Single-IP-Management. + Supports Telnet, CLI, SNMP v1/v2c/v3, RMON and web access. + Port Mirroring enables monitoring selected ingress/egress traffic. 6 The EIA-standardized framework and smart configuration capacity can fully meet the need of the users demanding higher networking performance. 2.2 Main Features • Resiliency and Availability + Link aggregation (LACP) increases aggregated bandwidth, optimizing the transport of business critical data. + IEEE 802.1s Multiple Spanning Tree provides high link availability in bring...
... and easy Single-IP-Management. + Supports Telnet, CLI, SNMP v1/v2c/v3, RMON and web access. + Port Mirroring enables monitoring selected ingress/egress traffic. 6 The EIA-standardized framework and smart configuration capacity can fully meet the need of the users demanding higher networking performance. 2.2 Main Features • Resiliency and Availability + Link aggregation (LACP) increases aggregated bandwidth, optimizing the transport of business critical data. + IEEE 802.1s Multiple Spanning Tree provides high link availability in bring...
TL-SG3216 V1 User Guide
Page 23
... address. if DHCP option is selected but no DHCP server exists in this guide are subject to the admin's login without the right to the default. 4. The User Manage function can be configured. 5. The switch provides two access levels: Guest and Admin. The guest only can view the information about the current users of the switch. 2. The Web management pages contained in the network, a few minutes later, the switch will restore the setting...
... address. if DHCP option is selected but no DHCP server exists in this guide are subject to the admin's login without the right to the default. 4. The User Manage function can be configured. 5. The switch provides two access levels: Guest and Admin. The guest only can view the information about the current users of the switch. 2. The Web management pages contained in the network, a few minutes later, the switch will restore the setting...
TL-SG3216 V1 User Guide
Page 58
... the settings of switch can view the current created 802.1Q VLAN. It is set to quick-select the corresponding entry based on the VLAN Config and Port Config pages. 6.1.1 VLAN Config On this page, you can only be modified or deleted. Displays the port members in VLAN1. IEEE 802.1Q VLAN function is implemented on the VLAN ID number you entered. Click Edit button to delete the corresponding VLAN. The Web Management...
... the settings of switch can view the current created 802.1Q VLAN. It is set to quick-select the corresponding entry based on the VLAN Config and Port Config pages. 6.1.1 VLAN Config On this page, you can only be modified or deleted. Displays the port members in VLAN1. IEEE 802.1Q VLAN function is implemented on the VLAN ID number you entered. Click Edit button to delete the corresponding VLAN. The Web Management...
TL-SG3216 V1 User Guide
Page 60
... Rule: LAG: Select the Egress Rule for configuration. Choose the menu VLAN→802.1Q VLAN→Port Config to configure the ports properly. Figure 6-5 802.1Q VLAN - Port: Displays the port number. 53 It is UNTAG. • TAG: All packets forwarded by the port Displays the LAG to which the port belongs. 6.1.2 Port Config Before creating the 802.1Q VLAN, please acquaint yourself with all the devices connected to the switch in...
... Rule: LAG: Select the Egress Rule for configuration. Choose the menu VLAN→802.1Q VLAN→Port Config to configure the ports properly. Figure 6-5 802.1Q VLAN - Port: Displays the port number. 53 It is UNTAG. • TAG: All packets forwarded by the port Displays the LAG to which the port belongs. 6.1.2 Port Config Before creating the 802.1Q VLAN, please acquaint yourself with all the devices connected to the switch in...
TL-SG3216 V1 User Guide
Page 61
... user-defined description of VLAN. Configuration Procedure: Step Operation Description 1 Set the link type for the port based on the VLAN ID number you to create a VLAN. The default egress rule is same as the VID number of any VLAN the port belongs to 1 by default. • TRUNK: The TRUNK port can be set as the current VLAN ID. If the current VLAN is deleted, the PVID will be set port. Click the Detail button to view...
... user-defined description of VLAN. Configuration Procedure: Step Operation Description 1 Set the link type for the port based on the VLAN ID number you to create a VLAN. The default egress rule is same as the VID number of any VLAN the port belongs to 1 by default. • TRUNK: The TRUNK port can be set as the current VLAN ID. If the current VLAN is deleted, the PVID will be set port. Click the Detail button to view...
TL-SG3216 V1 User Guide
Page 63
.... the link type for transmission. Through the Protocol VLANs, the broadcast domain can span over multiple switches and the Host can be a member of specific protocol can change its physical position in the network with the user-defined protocol template according to set port. Through protocol VLAN, the switch can analyze the received un-VLAN-tagged packets on network protocol. MAC Address: Description: VLAN ID: ¾ MAC VLAN Table MAC Select: Select: MAC Address: Description: VLAN ID...
.... the link type for transmission. Through the Protocol VLANs, the broadcast domain can span over multiple switches and the Host can be a member of specific protocol can change its physical position in the network with the user-defined protocol template according to set port. Through protocol VLAN, the switch can analyze the received un-VLAN-tagged packets on network protocol. MAC Address: Description: VLAN ID: ¾ MAC VLAN Table MAC Select: Select: MAC Address: Description: VLAN ID...
TL-SG3216 V1 User Guide
Page 104
... VLAN. The problem above can make users in different VLANs share the same multicast VLAN. Configure the multicast parameters for VLANs on the VLAN Config page will be invalid, that is, the multicast streams will be broadcasted. 8.1.4 Multicast VLAN In old multicast transmission mode, when users in the VLAN will be invalid when multicast VLAN is not enabled in the VLAN, thus the multicast data in different VLANs apply for VLANs Multicast→IGMP Snooping→VLAN Config page. Displays the router port time...
... VLAN. The problem above can make users in different VLANs share the same multicast VLAN. Configure the multicast parameters for VLANs on the VLAN Config page will be invalid, that is, the multicast streams will be broadcasted. 8.1.4 Multicast VLAN In old multicast transmission mode, when users in the VLAN will be invalid when multicast VLAN is not enabled in the VLAN, thus the multicast data in different VLANs apply for VLANs Multicast→IGMP Snooping→VLAN Config page. Displays the router port time...
TL-SG3216 V1 User Guide
Page 106
... the multicast VLAN will be displayed in the IGMP Snooping Status table on Multicast→IGMP Snooping→Snooping Config and Port Config page. 2 Create a multicast VLAN Required. It is recommended to keep the default time parameters. 4 Look over the configuration If it is connected to the switch. port 4 is connected to the router and the packets are transmitted to Port 4 of the switch. Configure a multicast VLAN, and user A and B receive multicast streams through the switch. Enable IGMP Snooping globally on the switch function and for Multicast VLAN: ¾ Network...
... the multicast VLAN will be displayed in the IGMP Snooping Status table on Multicast→IGMP Snooping→Snooping Config and Port Config page. 2 Create a multicast VLAN Required. It is recommended to keep the default time parameters. 4 Look over the configuration If it is connected to the switch. port 4 is connected to the router and the packets are transmitted to Port 4 of the switch. Configure a multicast VLAN, and user A and B receive multicast streams through the switch. Enable IGMP Snooping globally on the switch function and for Multicast VLAN: ¾ Network...
TL-SG3216 V1 User Guide
Page 110
... message, the switch will send IGMP report message. It is multi-optional. If the port can be added to the multicast group, it will be added to quick-select the corresponding IP-range ID based on this page you set . ¾ IP-Range Table IP-Range ID Select: Click the Select button to the multicast group, the switch will not...
... message, the switch will send IGMP report message. It is multi-optional. If the port can be added to the multicast group, it will be added to quick-select the corresponding IP-range ID based on this page you set . ¾ IP-Range Table IP-Range ID Select: Click the Select button to the multicast group, the switch will not...
TL-SG3216 V1 User Guide
Page 124
... VLAN. TRUNK: Supported. Port Voice Mode VLAN Voice Stream Type Link type of the voice VLAN. stream Manual Mode TAG voice ACCESS: Not supported. The default VLAN of the access port in the default VLAN should be voice VLAN. The default VLAN of Voice VLAN When voice VLAN is enabled, the port just forwards voice packets, and discards other packets whose source MAC addresses do not match OUI addresses. Table 9-2 Port voice VLAN mode and voice stream processing mode ¾ Security Mode of the port should be TAG. The aging time...
... VLAN. TRUNK: Supported. Port Voice Mode VLAN Voice Stream Type Link type of the voice VLAN. stream Manual Mode TAG voice ACCESS: Not supported. The default VLAN of the access port in the default VLAN should be voice VLAN. The default VLAN of Voice VLAN When voice VLAN is enabled, the port just forwards voice packets, and discards other packets whose source MAC addresses do not match OUI addresses. Table 9-2 Port voice VLAN mode and voice stream processing mode ¾ Security Mode of the port should be TAG. The aging time...
TL-SG3216 V1 User Guide
Page 129
... to control the access of the illegal users to the network. As the time-range based ACL takes effect only within the specified time-range, data packets can be configured. The ACL module is mainly for ACL configuration of the switch, including four submenus: Time-Range, ACL Config, Policy Config and Policy Binding. 10.1 Time-Range If a configured ACL is used to filter packets by configuring match rules and process policies of packets in the packets. configure a week time...
... to control the access of the illegal users to the network. As the time-range based ACL takes effect only within the specified time-range, data packets can be configured. The ACL module is mainly for ACL configuration of the switch, including four submenus: Time-Range, ACL Config, Policy Config and Policy Binding. 10.1 Time-Range If a configured ACL is used to filter packets by configuring match rules and process policies of packets in the packets. configure a week time...
TL-SG3216 V1 User Guide
Page 170
... should be enabled for the port connected to the LAG. 3. authentication username and password for the port of the server. 5 Configure the 802.1X for the switch and the accounting servers to CONTENTS 163 For the client computers, you are required to Appendix D: 802.1X Client Software. 3 Configure the 802.1X Required. By default, the global 802.1X function is disabled. On the Network Security→...
... should be enabled for the port connected to the LAG. 3. authentication username and password for the port of the server. 5 Configure the 802.1X for the switch and the accounting servers to CONTENTS 163 For the client computers, you are required to Appendix D: 802.1X Client Software. 3 Configure the 802.1X Required. By default, the global 802.1X function is disabled. On the Network Security→...
TL-SG3216 V1 User Guide
Page 216
... Software using FTP If there is mainly used to open hyper terminal. 209 FTP (File Transfer Protocol), a protocol in the IP network for files transfer. 1. Hardware Installation Figure C-1 1) Connect FTP server to port 1 of the switch. 2) Connect the Console port of the PC to the switch. 3) Save the firmware of the switch in the shared file of the switch and the switch can not be launched, you can load firmware to...
... Software using FTP If there is mainly used to open hyper terminal. 209 FTP (File Transfer Protocol), a protocol in the IP network for files transfer. 1. Hardware Installation Figure C-1 1) Connect FTP server to port 1 of the switch. 2) Connect the Console port of the PC to the switch. 3) Save the firmware of the switch in the shared file of the switch and the switch can not be launched, you can load firmware to...
TL-SG3216 V1 User Guide
Page 229
... network addresses and additional configuration options. Data is supported by prioritizing packets based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of forwarding. EAPOL is based on the required level of the boot file. Appendix E: Glossary Access Control List (ACL) ACLs can limit network traffic and restrict access to certain users or devices by checking each switch can work automatically over LAN (EAPOL) EAPOL is a client authentication protocol used...
... network addresses and additional configuration options. Data is supported by prioritizing packets based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of forwarding. EAPOL is based on the required level of the boot file. Appendix E: Glossary Access Control List (ACL) ACLs can limit network traffic and restrict access to certain users or devices by checking each switch can work automatically over LAN (EAPOL) EAPOL is a client authentication protocol used...
TL-SG3216 V1 User Guide
Page 230
... full-duplex links. (Now incorporated in IEEE 802.3-2002) Internet Group Management Protocol (IGMP) A protocol through which hosts can register with the IEEE 802.1p standard. The standard uses packet tags that asks all ports contained within the designated multicast group. IEEE 802.1X Port Authentication controls access to the switch ports by requiring users to register end stations with the lowest IP address in Ethernet networks...
... full-duplex links. (Now incorporated in IEEE 802.3-2002) Internet Group Management Protocol (IGMP) A protocol through which hosts can register with the IEEE 802.1p standard. The standard uses packet tags that asks all ports contained within the designated multicast group. IEEE 802.1X Port Authentication controls access to the switch ports by requiring users to register end stations with the lowest IP address in Ethernet networks...
TL-SG3216 V1 CLI Reference Guide
Page 20
Use the interface type number command to Global Configuration mode. TP-LINK# Use the exit command to disconnect the switch (except that the switch is connected through the Console port). Enter exit command to return to access interface Configuration mode. Note: 1. TP-LINK> Use the exit command to access Privileged EXEC mode. Use the vlan database to Privileged EXEC mode. TP-LINK(configvlan)# Use the end command or press Ctrl+Z to return to access VLAN Configuration mode. Privileged EXEC Mode Use the enable command to User EXEC mode. Enter the disable command to ...
Use the interface type number command to Global Configuration mode. TP-LINK# Use the exit command to disconnect the switch (except that the switch is connected through the Console port). Enter exit command to return to access interface Configuration mode. Note: 1. TP-LINK> Use the exit command to access Privileged EXEC mode. Use the vlan database to Privileged EXEC mode. TP-LINK(configvlan)# Use the end command or press Ctrl+Z to return to access VLAN Configuration mode. Privileged EXEC Mode Use the enable command to User EXEC mode. Enter the disable command to ...
TL-SG3216 V1 CLI Reference Guide
Page 67
... discard the packet if the two fields are two fields of the DHCP packet containing the MAC address of the Host. To disable the MAC Verify feature, please use no dhcp-snooping mac-verify Command Mode Interface Configuration Mode(interface ethernet / interface range ethernet) Example Enable the MAC Verify feature for the DHCP packets. Syntax dhcp-snooping rate-limit value no dhcp-snooping mac-verify command. There are different. To restore to the default configuration, please use no dhcp-snooping rate-limit Parameter 56 Configure the port 2 to be...
... discard the packet if the two fields are two fields of the DHCP packet containing the MAC address of the Host. To disable the MAC Verify feature, please use no dhcp-snooping mac-verify Command Mode Interface Configuration Mode(interface ethernet / interface range ethernet) Example Enable the MAC Verify feature for the DHCP packets. Syntax dhcp-snooping rate-limit value no dhcp-snooping mac-verify command. There are different. To restore to the default configuration, please use no dhcp-snooping rate-limit Parameter 56 Configure the port 2 to be...
TL-SG3216 V1 CLI Reference Guide
Page 99
.... key-file -- Select the type of SSH: TP-LINK(config)# show ssh command is used to display the global configuration of the connections to the SSH server as 3: TP-LINK(config)# ssh max-client 3 ssh download Description The ssh max-client command is selected to download, v1 represents SSH-1, v2 represents SSH-2. Command Mode Global Configuration Mode Example Download a SSH-1 type key file named ssh-key from TFTP server with the IP Address 192.168.0.148: TP-LINK(config)# ssh download v1 ssh-key ip-address 192.168.0.148 show ssh Description The show ssh 88 Specify the maximum number of...
.... key-file -- Select the type of SSH: TP-LINK(config)# show ssh command is used to display the global configuration of the connections to the SSH server as 3: TP-LINK(config)# ssh max-client 3 ssh download Description The ssh max-client command is selected to download, v1 represents SSH-1, v2 represents SSH-2. Command Mode Global Configuration Mode Example Download a SSH-1 type key file named ssh-key from TFTP server with the IP Address 192.168.0.148: TP-LINK(config)# ssh download v1 ssh-key ip-address 192.168.0.148 show ssh Description The show ssh 88 Specify the maximum number of...
TL-SG3216 V1 CLI Reference Guide
Page 119
... to the default configuration, please use no flow-control Command Mode Interface Configuration Mode(interface ethernet / interface range ethernet) Example Enable the flow-control function for Ethernet port 5: TP-LINK(config)# interface ethernet 5 TP-LINK(config-if)# flow-control negotiation Description The negotiation command is used to enable the flow-control function for this corresponding port, please use no negotiation Parameter auto -- To return to avoid packets drop in the network. Auto negotiation (default). 108 To disable the flow-control function for...
... to the default configuration, please use no flow-control Command Mode Interface Configuration Mode(interface ethernet / interface range ethernet) Example Enable the flow-control function for Ethernet port 5: TP-LINK(config)# interface ethernet 5 TP-LINK(config-if)# flow-control negotiation Description The negotiation command is used to enable the flow-control function for this corresponding port, please use no negotiation Parameter auto -- To return to avoid packets drop in the network. Auto negotiation (default). 108 To disable the flow-control function for...