DGS-3130 Series Layer 3 Stackable Managed Switch Web UI Reference Guide
The fields that can be configured in CPU Protect Type are described below:
Parameter
Protocol Name
Rate Limit
Click the Apply button to accept the changes made.
The fields that can be configured in Protect Type Information are described below:
Parameter
Protocol Name
Click the Find button to locate a specific entry based on the information entered.
Trusted Host
This window is used to display and configure the trusted host settings.
To view the following window, click Security > Trusted Host, as shown below:
The fields that can be configured are described below:
Parameter
ACL Name
Type
Click the Apply button to accept the changes made.
Click the Delete button to remove the specific entry.
Figure 9-733 CPU Protect Type Window
Description
Select the protocol name option here.
Enter the rate limit value used here. This value must be between 0 and 1024
packets per second. Tick the No Limit option to disable the rate limit.
Description
Select the protocol name option here.
Figure 9-744 Trusted Host Window
Description
Enter the access class' name here. This name can be up to 32 characters long.
Select the trusted host type here. Options to choose from are Telnet, SSH,
Ping, HTTP, and HTTPS.
363