Port Settings configures the Ports' parameters, including the state, auto-negotiation, data transfer rate and mode, as well as the flow control.
Port Trunk allows multiple ports to be bundled together to increase bandwidth and provide redundancy data for transmission.
Port Mirror enables the traffic of one port to be copied to another port for monitoring and analysis purposes.
Speed Limit restricts the data transmission rate of a port to prevent network congestion and ensure fair bandwidth allocation.
Jumbo Frame supports the transmission of larger data frames (typically up to 9,000 bytes) to improve network efficiency and reduce overhead.
EEE Config(Energy-Efficient Ethernet configuration) allows the switch to reduce power consumption during periods of low data activity while maintaining network connectivity.
Storm Control limits the number of broadcast, multicast, or unknown unicast frames on a port to prevent network storms that can overwhelm the network.
Traffic Monitor monitors network traffic to identify patterns, detect anomalies, and provide insights into network performance and usage.
MAC Manage manages MAC addresses by learning, filtering, and controlling access based on MAC addresses to enhance network security and manageability.
SNMP is a widely used protocol for managing and monitoring network devices. It allows network administrators to collect information from and configure devices such as routers, switches, and servers.
IGMP Snooping is a technique used by switches to monitor IGMP messages between hosts and routers. It helps optimize multicast traffic by ensuring that multicast packets are only forwarded to ports where interested receivers are present.
DHCP Snooping is a security feature used on switches to prevent unauthorized DHCP servers from assigning IP addresses to devices on the network. It helps protect against IP address spoofing and ensures that only legitimate DHCP servers can operate.
Loop Prevention is used in networks to avoid the creation of loops that can cause broadcast storms and network instability. Techniques such as Spanning Tree Protocol (STP) are commonly used to detect and prevent loops in Layer 2 networks.
Spanning Tree (STP) is a network protocol that prevents loops in a network by ensuring that there is only one active path between any two network devices. It achieves this by creating a loop-free topology using a tree structure.
LLDP Config is a protocol used to exchange information between adjacent network devices. It helps in discovering device information, such as device type, port details, and VLAN information, which can be useful for network management and troubleshooting.
LLDP Neighbor displays information about adjacent devices discovered via LLDP.
MTU VLAN defines an uplink port which will build up several VLANs with each of the other ports. Each VLAN contains two ports, the uplink port and one of the other ports in the switch, so the device connected to the uplink port can communicate with the device connected to any other port, but devices connected to other ports cannot communicate with each other.
Port-based VLANs are divided based on ports. In port based VLAN mode, each port can only be added to one VLAN.
802.1Q VLAN protocol defines a new format of VLAN data frame (Tagged Frame). As the following figure shows, compared to the traditional Ethernet data frame (Untagged Frame), the VLAN data frame (Tagged Frame) adds a VLAN tag.
Voice VLAN is dedicated specifically for IP phone traffic, often prioritizing it (via QoS) and separating it from data traffic for better quality and security.