Trusted Host - D-Link DGS-3130 Series Web Ui Reference Manual

Hide thumbs Also See for DGS-3130 Series:
Table of Contents

Advertisement

DGS-3130 Series Layer 3 Stackable Managed Switch Web UI Reference Guide
The fields that can be configured in CPU Protect Type are described below:
Parameter
Protocol Name
Rate Limit
Click the Apply button to accept the changes made.
The fields that can be configured in Protect Type Information are described below:
Parameter
Protocol Name
Click the Find button to locate a specific entry based on the information entered.

Trusted Host

This window is used to display and configure the trusted host settings.
To view the following window, click Security > Trusted Host, as shown below:
The fields that can be configured are described below:
Parameter
ACL Name
Type
Click the Apply button to accept the changes made.
Click the Delete button to remove the specific entry.
Figure 9-733 CPU Protect Type Window
Description
Select the protocol name option here.
Enter the rate limit value used here. This value must be between 0 and 1024
packets per second. Tick the No Limit option to disable the rate limit.
Description
Select the protocol name option here.
Figure 9-744 Trusted Host Window
Description
Enter the access class' name here. This name can be up to 32 characters long.
Select the trusted host type here. Options to choose from are Telnet, SSH,
Ping, HTTP, and HTTPS.
363

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dgs-3130-30ts

Table of Contents