FAQs


Product Category
Keyword
A :

A method of using a single network-wide multicast VLAN to transmit common services, such as such as television channels or video-on-demand, across a service-provider's network. MVR simplifies the configuration of multicast services by using a common VLAN for distribution, while still preserving security and data isolation for subscribers residing in both the MVR VLAN and other standard or private VLAN groups.

A :

The MVR protocol is specially design for the ISP or Service Provider to well transmit the multicast stream over internet. For common SMB or Enterprise, Campus network environment, you don't have to configure the MVR funciton.

A :

QinQ is designed for service providers carrying traffic for multiple customers across their networks. It is used to maintain customer-specific VLAN and Layer 2 protocol configurations even when different customers use the same internal VLAN IDs.

A :

TACACS+ is a logon authentication protocol that uses software running on a central server to control access to TACACS-compliant devices on the network.

A :

LLDP is used to discover basic information about neighboring devices in the local broadcast domain by using periodic broadcasts to advertise information such as device identification, capabilities and configuration settings.

A :

A technique used to enhance network security by snooping on DHCP server messages to track the physical location of hosts, ensure that hosts only use the IP addresses assigned to them, and ensure that only authorized DHCP servers are accessible.

A :

1. If you cannot connect using SSH, you may have exceeded the maximum number of concurrent Telnet/SSH sessions permitted. Try connecting again at a later time.
2. Be sure the control parameters for the SSH server are properly configured on the switch, and that the SSH client software is properly configured on the management station.
3. Be sure you have generated both an RSA and DSA public key on the switch, exported this key to the SSH client, and enabled SSH service.
4. Be sure you have set up an account on the switch for each SSH user, including user name, authentication level, and password.
5. Be sure you have imported the client’s public key to the switch (if public key authentication is used).

Contact Us