D-Link DGS-1210/ME series User Manual - page 90
4 Configuration
DGS-1210 series Metro Ethernet Managed Switch User Manual
Priority (0-7): Specifies the priority. The priority range is between 0 and 7.
Rx Rate (64-1024000): Specifies the RX rate. The range is between 64 and 1024000.
State: Specify the state to be enabled or disabled.
Click Apply to implement changes made.
Security > DHCP Server Screening > DHCP Server Screening Port Settings
DHCP Server Screening function allows user to restrict the illegal DHCP server by discarding the DHCP
service from distrusted ports. This page allows you to configure the DHCP Server Screening state for each
port and designed trusted DHCP server IP address.
Figure 4.138– Security > DHCP Server Screening > DHCP Server Screening Port Settings
Illegal Server Log Suppress Duration: Specifies the illegal server log suppress duration for DHCP server
screening port.
From Port/ To Port: Specifies a range of ports to be DHCP server screening port.
State: Specifies the DHCP server screening port to be enabled or disabled.
Click Apply to makes effects.
Security > DHCP Server Screening > Filter DHCP Server
This page allows you to designed trusted DHCP Server IP address and Client MAC Address.
Figure 4.139 – Security > DHCP Server Screening > Filter DHCP Server
To add the DHCP Trusted DHCP Server, set the following fields and click Add. Or click Delete All to remove
all DHCP Server IP Address.
DHCP Server IP Address: Specifies the IP address of the DHCP server to be trusted.
Client MAC Address: Specifies the MAC address of the Client to be trusted.
Ports: Specifies the ports, or select All Ports.
Security > SSH Settings > SSH Settings
SSH is an abbreviation of Secure Shell, which is a program allowing secure remote login and secure network
services over an insecure network. It allows a secure login to remote host computers, a safe method of
executing commands on a remote end node, and will provide secure encrypted and authenticated
communication between two non-trusted hosts. SSH, with its array of unmatched security features is an
essential tool in today’s networking environment. It is a powerful guardian against numerous existing security
hazards that now threaten network communications.
80