GEP-5070 48 GE PoE-Plus + 2 GE SFP L2 Managed Switch User Manual V1.0
CONTENTS– 10 –Configuring Local Port Mirroring 207Configuring Remote Port Mirroring 208Configuring UPnP 213Configuring sFlow 2145MONITORING THE
CHAPTER 4 | Configuring the SwitchConfiguring Security– 100 –matches this entry when ARP/RARP protocol address space setting is equal to IP (0x800
CHAPTER 4 | Configuring the SwitchConfiguring Security– 101 –ACE CONFIGURATIONIngress Port and Frame Type◆ Ingress Port - Any port, port identifie
CHAPTER 4 | Configuring the SwitchConfiguring Security– 102 –RARP opcode set to ARP, RARP - frame must have ARP/RARP opcode set to RARP, Other - f
CHAPTER 4 | Configuring the SwitchConfiguring Security– 103 –RARP frames where the PRO is equal to IP (0x800) must match this entry; Default: Any)
CHAPTER 4 | Configuring the SwitchConfiguring Security– 104 – TCP SYN - Specifies the TCP “Synchronize sequence numbers” (SYN) value for this rule
CHAPTER 4 | Configuring the SwitchConfiguring Security– 105 – DIP Filter - Specifies the destination IP filter for this rule. (Options: Any - no d
CHAPTER 4 | Configuring the SwitchConfiguring Security– 106 –WEB INTERFACETo configure an Access Control List for a port or a policy:1. Click Adva
CHAPTER 4 | Configuring the SwitchConfiguring Security– 107 –CONFIGURING DHCPSNOOPINGUse the DHCP Snooping Configuration page to filter IP traffic
CHAPTER 4 | Configuring the SwitchConfiguring Security– 108 – If the DHCP packet is not a recognizable type, it is dropped. If a DHCP packet from
CHAPTER 4 | Configuring the SwitchConfiguring Security– 109 –Figure 35: DHCP Snooping ConfigurationCONFIGURING DHCPRELAY AND OPTION 82INFORMATION
CONTENTS– 11 –Displaying Information on LACP 252Displaying an Overview of LACP Groups 252Displaying LACP Port Status 252Displaying LACP Port Stat
CHAPTER 4 | Configuring the SwitchConfiguring Security– 110 –PARAMETERSThese parameters are displayed: ◆ Relay Mode - Enables or disables the DHCP
CHAPTER 4 | Configuring the SwitchConfiguring Security– 111 –CONFIGURING IPSOURCE GUARDIP Source Guard is a security feature that filters IP traff
CHAPTER 4 | Configuring the SwitchConfiguring Security– 112 –PARAMETERSThese parameters are displayed: Global Configuration ◆ Mode – Enables or di
CHAPTER 4 | Configuring the SwitchConfiguring Security– 113 –Figure 37: Configuring Global and Port-based Settings for IP Source GuardCONFIGURING
CHAPTER 4 | Configuring the SwitchConfiguring Security– 114 –◆ IP Address – A valid unicast IP address, including classful types A, B or C.◆ IP Ma
CHAPTER 4 | Configuring the SwitchConfiguring Security– 115 –◆ By default, ARP Inspection is disabled both globally and on all ports. If ARP Inspe
CHAPTER 4 | Configuring the SwitchConfiguring Security– 116 –◆ Mode – Enables Dynamic ARP Inspection on a given port. Only when both Global Mode a
CHAPTER 4 | Configuring the SwitchConfiguring Security– 117 –◆ MAC Address – Allowed source MAC address in ARP request packets.◆ IP Address – Allo
CHAPTER 4 | Configuring the SwitchConfiguring Security– 118 –◆ Dead Time – The time after which the switch considers an authentication server to b
CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 119 –Figure 41: Authentication ConfigurationCREATING TRUNK GROUPS You can create multipl
CONTENTS– 12 –Running Cable Diagnostics 2857PERFORMING SYSTEM MAINTENANCE 287Restarting the Switch 287Restoring Factory Defaults 288Upgrading Fir
CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 120 –USAGE GUIDELINESBesides balancing the load across each port in the trunk, the other
CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 121 –needs to ensure that frames in each “conversation” are mapped to the same trunk link
CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 122 –Aggregation Group Configuration◆ Group ID – Trunk identifier.◆ Port Members – Port i
CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 123 –CONFIGURING LACP Use the LACP Port Configuration page to enable LACP on selected por
CHAPTER 4 | Configuring the SwitchCreating Trunk Groups– 124 –Select the Specific option to manually configure a key. Use the Auto selection to au
CHAPTER 4 | Configuring the SwitchConfiguring Loop Protection– 125 –Figure 43: LACP Port ConfigurationCONFIGURING LOOP PROTECTIONUse the Loop Pro
CHAPTER 4 | Configuring the SwitchConfiguring Loop Protection– 126 –When the loop protection mode is changed, any ports placed in shutdown state b
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 127 –CONFIGURING THE SPANNING TREE ALGORITHMThe Spanning Tree Algorithm
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 128 –MSTP – When using STP or RSTP, it may be difficult to maintain a s
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 129 –running spanning tree algorithm between switches that support the
– 13 –FIGURESFigure 1: Home Page 35Figure 2: Front Panel Indicators 36Figure 3: System Information Configuration 45Figure 4: IP Configuration 47Figu
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 130 –configuration, allowing them to participate in a specific set of s
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 131 –from among the device ports attached to the network. (Note that re
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 132 –WEB INTERFACETo configure global settings for STA:1. Click Configu
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 133 –To use multiple spanning trees:1. Set the spanning tree type to MS
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 134 –Figure 49: Adding a VLAN to an MST InstanceCONFIGURINGSPANNING TR
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 135 –WEB INTERFACETo add VLAN groups to an MSTP instance:1. Click Confi
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 136 –spanning tree. As implemented on this switch, BPDU transparency al
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 137 –highest priority, the port with lowest numeric identifier will be
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 138 –◆ Point-to-Point – The link type attached to an interface can be s
CHAPTER 4 | Configuring the SwitchConfiguring the Spanning Tree Algorithm– 139 –PARAMETERSThese parameters are displayed: ◆ Port – Port identifier
FIGURES– 14 –Figure 32: ACL Port Configuration 98Figure 33: ACL Rate Limiter Configuration 99Figure 34: Access Control List Configuration 106Figure
CHAPTER 4 | Configuring the SwitchMulticast VLAN Registration– 140 –MULTICAST VLAN REGISTRATIONMulticast VLAN Registration (MVR) is a protocol tha
CHAPTER 4 | Configuring the SwitchMulticast VLAN Registration– 141 –2. Set the interfaces that will join the MVR as source ports or receiver ports
CHAPTER 4 | Configuring the SwitchMulticast VLAN Registration– 142 –port from multicast group membership. (Range: 0 to 31,744 tenths of a second;
CHAPTER 4 | Configuring the SwitchMulticast VLAN Registration– 143 –switch can only remove the interface from the multicast stream after the host
CHAPTER 4 | Configuring the SwitchMulticast VLAN Registration– 144 –◆ Static bindings should only be used to receive long-term multicast streams a
CHAPTER 4 | Configuring the SwitchIGMP Snooping– 145 –Figure 55: Configuring MVR Channel SettingsIGMP SNOOPINGMulticasting is used to support rea
CHAPTER 4 | Configuring the SwitchIGMP Snooping– 146 –passing between multicast clients and servers, and dynamically configure the switch ports wh
CHAPTER 4 | Configuring the SwitchIGMP Snooping– 147 –specific source. For IGMPv1/v2 hosts, the source address of a channel is always null (indica
CHAPTER 4 | Configuring the SwitchIGMP Snooping– 148 –If IGMP snooping cannot locate the IGMP querier, you can manually designate a port which is
CHAPTER 4 | Configuring the SwitchIGMP Snooping– 149 –WEB INTERFACETo configure global and port-related settings for IGMP Snooping:1. Click Config
FIGURES– 15 –Figure 68: Port Isolation Configuration 177Figure 69: Configuring MAC-Based VLANs 178Figure 70: Configuring Protocol VLANs 180Figure 71
CHAPTER 4 | Configuring the SwitchIGMP Snooping– 150 –elected “querier” and assumes the role of querying the LAN for group members. It then propag
CHAPTER 4 | Configuring the SwitchIGMP Snooping– 151 –This attribute will take effect only if IGMP snooping proxy reporting is enabled (see page 1
CHAPTER 4 | Configuring the SwitchMLD Snooping– 152 –WEB INTERFACETo configure IGMP Snooping Port Group Filtering:1. Click Configuration, IGMP Sno
CHAPTER 4 | Configuring the SwitchMLD Snooping– 153 –Multicast routers use information from MLD snooping and query reports, along with a multicast
CHAPTER 4 | Configuring the SwitchMLD Snooping– 154 –The leave-proxy feature does not function when a switch is set as the querier. When the switc
CHAPTER 4 | Configuring the SwitchMLD Snooping– 155 –enabled on an interface if it is connected to only one MLD-enabled device, either a service h
CHAPTER 4 | Configuring the SwitchMLD Snooping– 156 –◆ Snooping Enabled - When enabled, the switch will monitor network traffic on the indicated V
CHAPTER 4 | Configuring the SwitchMLD Snooping– 157 –◆ QRI - The Query Response Interval is the Max Response Time advertised in periodic General Q
CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 158 –CONFIGURING MLDFILTERINGUse the MLD Snooping Port Group Filtering Configurat
CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 159 –LLDP also defines how to store and maintain information gathered about the n
FIGURES– 16 –Figure 104: QoS Control List Status 226Figure 105: Detailed Port Statistics 228Figure 106: Access Management Statistics 229Figure 107:
CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 160 –◆ Mode – Enables LLDP message transmit and receive modes for LLDP Protocol D
CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 161 –The management address TLV may also include information about the specific i
CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 162 –CONFIGURINGLLDP-MED TLVSUse the LLDP-MED Configuration page to set the devic
CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 163 –Coordinates Location◆ Latitude – Normalized to within 0-90 degrees with a ma
CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 164 – Trailing street suffix - Trailing street suffix. (Example: SW) Street suffi
CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 165 –This network policy is potentially advertised and associated with multiple s
CHAPTER 4 | Configuring the SwitchLink Layer Discovery Protocol– 166 –endpoints frequently does not support multiple VLANs, if at all, and are typ
CHAPTER 4 | Configuring the SwitchPower over Ethernet– 167 –WEB INTERFACETo configure LLDP-MED TLVs:1. Click Configuration, LLDP-MED.2. Modify any
CHAPTER 4 | Configuring the SwitchPower over Ethernet– 168 –on the amount of cables attached to each device. Once configured to supply power, an a
CHAPTER 4 | Configuring the SwitchPower over Ethernet– 169 –and reserves power accordingly. Four different port classes exist, including 4, 7, 15.
FIGURES– 17 –Figure 140: LLDP-MED Neighbor Information 271Figure 141: LLDP Neighbor PoE Information 272Figure 142: LLDP Neighbor EEE Information 273
CHAPTER 4 | Configuring the SwitchConfiguring the MAC Address Table– 170 –◆ Maximum Power - The maximum power that can be delivered to a remote de
CHAPTER 4 | Configuring the SwitchConfiguring the MAC Address Table– 171 –PARAMETERSThese parameters are displayed: Aging Configuration ◆ Disable
CHAPTER 4 | Configuring the SwitchIEEE 802.1Q VLANs– 172 –4. Add any required static MAC addresses by clicking the Add New Static Entry button, en
CHAPTER 4 | Configuring the SwitchIEEE 802.1Q VLANs– 173 –◆ End stations can belong to multiple VLANs◆ Passing traffic between VLAN-aware and VLAN
CHAPTER 4 | Configuring the SwitchIEEE 802.1Q VLANs– 174 –WEB INTERFACETo configure IEEE 802.1Q VLAN groups:1. Click Configuration, VLANs, VLAN Me
CHAPTER 4 | Configuring the SwitchIEEE 802.1Q VLANs– 175 –◆ Port Type – Configures how a port processes the VLAN ID in ingress frames. (Default: U
CHAPTER 4 | Configuring the SwitchIEEE 802.1Q VLANs– 176 –are classified to the Port VLAN ID. If the classified VLAN ID of a frame transmitted on
CHAPTER 4 | Configuring the SwitchUsing Port Isolation– 177 –USING PORT ISOLATIONUse the Port Isolation Configuration page to prevent communicatio
CHAPTER 4 | Configuring the SwitchConfiguring MAC-based VLANs– 178 –COMMAND USAGE◆ Source MAC addresses can be mapped to only one VLAN ID.◆ Config
CHAPTER 4 | Configuring the SwitchProtocol VLANs– 179 –PROTOCOL VLANS The network devices required to support multiple protocols cannot be easily
FIGURES– 18 –
CHAPTER 4 | Configuring the SwitchProtocol VLANs– 180 –LLC – Includes the DSAP (Destination Service Access Point) and SSAP (Source Service Access
CHAPTER 4 | Configuring the SwitchProtocol VLANs– 181 –MAPPING PROTOCOLGROUPS TO PORTSUse the Group Name to VLAN Mapping Table to map a protocol g
CHAPTER 4 | Configuring the SwitchConfiguring IP Subnet-based VLANs– 182 –Figure 71: Assigning Ports to Protocol VLANsCONFIGURING IP SUBNET-BASED
CHAPTER 4 | Configuring the SwitchManaging VoIP Traffic– 183 –◆ IP Address – The IP address for a subnet. Valid IP addresses consist of four decim
CHAPTER 4 | Configuring the SwitchManaging VoIP Traffic– 184 –CONFIGURING VOIPTRAFFICUse the Voice VLAN Configuration page to configure the switch
CHAPTER 4 | Configuring the SwitchManaging VoIP Traffic– 185 –When OUI is selected, be sure to configure the MAC address ranges in the Telephony O
CHAPTER 4 | Configuring the SwitchManaging VoIP Traffic– 186 –Figure 73: Configuring Global and Port Settings for a Voice VLANCONFIGURINGTELEPHON
CHAPTER 4 | Configuring the SwitchQuality of Service– 187 –3. Enter a MAC address that specifies the OUI for VoIP devices in the network, and ente
CHAPTER 4 | Configuring the SwitchQuality of Service– 188 –CONFIGURING PORTCLASSIFICATIONUse the QoS Ingress Port Classification page to set the b
CHAPTER 4 | Configuring the SwitchQuality of Service– 189 –verify conformity. Non-conforming traffic is dropped, conforming traffic is forwarded w
– 19 –TABLESTable 1: Key Features 23Table 2: System Defaults 28Table 3: Web Page Configuration Buttons 36Table 4: Main Menu 36Table 5: HTTPS Sys
CHAPTER 4 | Configuring the SwitchQuality of Service– 190 –PARAMETERSThese parameters are displayed: Displaying QoS Egress Port Schedulers◆ Port –
CHAPTER 4 | Configuring the SwitchQuality of Service– 191 –◆ Port Shaper – Sets the rate at which traffic can egress this queue. Enable – Enables
CHAPTER 4 | Configuring the SwitchQuality of Service– 192 –Figure 78: Configuring Egress Port Schedulers and ShapersCONFIGURING EGRESSPORT SHAPER
CHAPTER 4 | Configuring the SwitchQuality of Service– 193 –WEB INTERFACETo show an overview of the rate for each queue and port: 1. Click Advanced
CHAPTER 4 | Configuring the SwitchQuality of Service– 194 – Mapped – Controls the mapping of the classified QoS class values and DP levels (drop p
CHAPTER 4 | Configuring the SwitchQuality of Service– 195 –Figure 81: Configuring Port Tag Remarking ModeCONFIGURING PORTDSCP TRANSLATIONAND REWR
CHAPTER 4 | Configuring the SwitchQuality of Service– 196 – Disable – No Ingress DSCP Classification is performed. DSCP=0 – Classify if incoming D
CHAPTER 4 | Configuring the SwitchQuality of Service– 197 –PATH Advanced Configuration, QoS, DSCP-Based QoS PARAMETERSThese parameters are display
CHAPTER 4 | Configuring the SwitchQuality of Service– 198 –CONFIGURING DSCPTRANSLATIONUse the DSCP Translation page to configure DSCP translation
CHAPTER 4 | Configuring the SwitchQuality of Service– 199 –CONFIGURING DSCPCLASSIFICATIONUse the DSCP Classification page to map DSCP values to a
TABLES– 20 –
CHAPTER 4 | Configuring the SwitchQuality of Service– 200 –PARAMETERSThese parameters are displayed: QoS Control List ◆ QCE – Quality Control Entr
CHAPTER 4 | Configuring the SwitchQuality of Service– 201 –Key Parameters◆ Tag – VLAN tag type. (Options: Any, Tag, Untag; Default: Any)◆ VID – VL
CHAPTER 4 | Configuring the SwitchQuality of Service– 202 –other than 00-00-00, then valid value of the PID will be any value from 0x0000 to 0xfff
CHAPTER 4 | Configuring the SwitchQuality of Service– 203 –a queue based on basic classification rules. (Options: 0-7, Default (use basic classifi
CHAPTER 4 | Configuring the SwitchQuality of Service– 204 –CONFIGURING STORMCONTROLUse the Storm Control Configuration page to set limits on broad
CHAPTER 4 | Configuring the SwitchQuality of Service– 205 –CONFIGURING WRED Use the Storm Control Configuration page to control traffic congestion
CHAPTER 4 | Configuring the SwitchQuality of Service– 206 –WEB INTERFACETo configure WRED:1. Click Configuration, QoS, WRED.2. Enable WRED on the
CHAPTER 4 | Configuring the SwitchConfiguring Local Port Mirroring– 207 –Figure 89: Congestion Management Configuration CONFIGURING LOCAL PORT MI
CHAPTER 4 | Configuring the SwitchConfiguring Remote Port Mirroring– 208 – Tx only - Frames transmitted from this port are mirrored to the destina
CHAPTER 4 | Configuring the SwitchConfiguring Remote Port Mirroring– 209 –Figure 91: Configuring Remote Port MirroringPATH Basic/Advanced Configu
– 21 –SECTION IGETTING STARTEDThis section provides an overview of the switch, and introduces some basic concepts about network switches. It also de
CHAPTER 4 | Configuring the SwitchConfiguring Remote Port Mirroring– 210 –session is allowed, either local or remote. Also, note that the source p
CHAPTER 4 | Configuring the SwitchConfiguring Remote Port Mirroring– 211 –◆ Intermediate – Uplink ports to intermediate switches.MAC Table learnin
CHAPTER 4 | Configuring the SwitchConfiguring Remote Port Mirroring– 212 –To configure remote port mirroring for an RSPAN intermediate switch:1. C
CHAPTER 4 | Configuring the SwitchConfiguring UPnP– 213 –Figure 94: Mirror Configuration (Destination)CONFIGURING UPNPUniversal Plug and Play (UP
CHAPTER 4 | Configuring the SwitchConfiguring sFlow– 214 –interface. Or right-click on the entry and select “Properties” to display a list of devi
CHAPTER 4 | Configuring the SwitchConfiguring sFlow– 215 –the monitored interface. Moreover, the processor and memory load imposed by the sFlow ag
CHAPTER 4 | Configuring the SwitchConfiguring sFlow– 216 –◆ UDP Port – The UDP port on which the sFlow receiver is listening for sFlow datagrams.
CHAPTER 4 | Configuring the SwitchConfiguring sFlow– 217 –Figure 96: sFlow Configuration
CHAPTER 4 | Configuring the SwitchConfiguring sFlow– 218 –
– 219 –5 MONITORING THE SWITCHThis chapter describes how to monitor all of the basic functions, configure or view system logs, and how to view traff
SECTION I | Getting Started– 22 –
CHAPTER 5 | Monitoring the SwitchDisplaying Basic Information About the System– 220 –◆ Software Date – Release date of the switch software.◆ Code
CHAPTER 5 | Monitoring the SwitchDisplaying Basic Information About the System– 221 –WEB INTERFACETo display CPU utilization:1. Click System, then
CHAPTER 5 | Monitoring the SwitchDisplaying Basic Information About the System– 222 –Table Headings◆ ID – Error ID.◆ Level – Error level as descri
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 223 –DISPLAYING LOGDETAILSUse the Detailed Log page to view the full text of
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 224 –DISPLAYING ANOVERVIEW OF PORTSTATISTICSUse the Port Statistics Overview
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 225 –◆ Q# Receive/Transmit – The number of packets received and transmitted t
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 226 –◆ Conflict – Displays QCE status. It may happen that resources required
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 227 – Broadcast – The number of received and transmitted broadcast packets (g
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Ports– 228 –WEB INTERFACETo display the detailed port statistics, click Monitor, Por
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 229 –DISPLAYING INFORMATION ABOUT SECURITY SETTINGSYou can use th
– 23 –1 INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to configur
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 230 –DISPLAYINGINFORMATION ABOUTSWITCH SETTINGS FORPORT SECURITYU
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 231 – Limit Reached: The Port Security service is enabled by at l
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 232 –◆ VLAN ID – The VLAN ID seen on this port. ◆ State – Indica
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 233 –recently received frame from a new client for MAC-based auth
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 234 –PARAMETERSThese parameters are displayed:Port State ◆ Admin
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 235 –◆ Request ID – The number of EAPOL Request Identity frames t
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 236 –Last Supplicant Info◆ MAC Address – The MAC address of the l
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 237 –the client will remain in the unauthenticated state for Hold
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 238 – Port: The ACE will match a specific ingress port. ◆ Frame T
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 239 –DISPLAYINGSTATISTICS FORDHCP SNOOPINGUse the DHCP Snooping P
CHAPTER 1 | IntroductionDescription of Software Features– 24 –DESCRIPTION OF SOFTWARE FEATURESThe switch provides a wide range of advanced perform
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 240 –Figure 112: DHCP Snooping Statistics DISPLAYING DHCPRELAY
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 241 –◆ Receive Bad Remote ID – The number of packets with a Remot
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Security Settings– 242 –WEB INTERFACETo display the Dynamic ARP Inspection Table, cl
CHAPTER 5 | Monitoring the SwitchDisplaying Information on Authentication Servers– 243 –DISPLAYING INFORMATION ON AUTHENTICATION SERVERS Use the M
CHAPTER 5 | Monitoring the SwitchDisplaying Information on Authentication Servers– 244 –DISPLAYINGSTATISTICS FORCONFIGUREDAUTHENTICATIONSERVERSUse
CHAPTER 5 | Monitoring the SwitchDisplaying Information on Authentication Servers– 245 –Accept, Access-Reject, Access-Challenge, timeout, or retra
CHAPTER 5 | Monitoring the SwitchDisplaying Information on Authentication Servers– 246 – Unknown Types – The number of RADIUS packets of unknown t
CHAPTER 5 | Monitoring the SwitchDisplaying Information on RMON– 247 –WEB INTERFACETo display statistics for configured authentication and account
CHAPTER 5 | Monitoring the SwitchDisplaying Information on RMON– 248 –PARAMETERSThese parameters are displayed:◆ ID – Index of Statistics entry.◆
CHAPTER 5 | Monitoring the SwitchDisplaying Information on RMON– 249 –WEB INTERFACETo display RMON statistics, click Monitor, Security, Switch, RM
CHAPTER 1 | IntroductionDescription of Software Features– 25 –ACCESS CONTROLLISTSACLs provide packet filtering for IP frames (based on protocol, T
CHAPTER 5 | Monitoring the SwitchDisplaying Information on RMON– 250 –WEB INTERFACETo display RMON historical samples, click Monitor, Security, Sw
CHAPTER 5 | Monitoring the SwitchDisplaying Information on RMON– 251 –◆ Falling Threshold – If the current value is less than the falling threshol
CHAPTER 5 | Monitoring the SwitchDisplaying Information on LACP– 252 –DISPLAYING INFORMATION ON LACP Use the monitor pages for LACP to display inf
CHAPTER 5 | Monitoring the SwitchDisplaying Information on LACP– 253 –◆ LACP – Shows LACP status: Yes – LACP is enabled and the port link is up.
CHAPTER 5 | Monitoring the SwitchDisplaying Information on Loop Protection– 254 –WEB INTERFACETo display LACP statistics for local ports this swit
CHAPTER 5 | Monitoring the SwitchDisplaying Information on the Spanning Tree– 255 –DISPLAYING INFORMATION ON THE SPANNING TREE Use the monitor pag
CHAPTER 5 | Monitoring the SwitchDisplaying Information on the Spanning Tree– 256 –◆ Internal Root Cost – The Regional Root Path Cost. For the Reg
CHAPTER 5 | Monitoring the SwitchDisplaying Information on the Spanning Tree– 257 –WEB INTERFACETo display an overview of all STP bridge instances
CHAPTER 5 | Monitoring the SwitchDisplaying Information on the Spanning Tree– 258 –PARAMETERSThese parameters are displayed:◆ Port – Port Identifi
CHAPTER 5 | Monitoring the SwitchDisplaying MVR Information– 259 –◆ RSTP – The number of RSTP Configuration BPDU's received/transmitted on a
CHAPTER 1 | IntroductionDescription of Software Features– 26 –be ignored and will not be written to the address table. Static addresses can be use
CHAPTER 5 | Monitoring the SwitchDisplaying MVR Information– 260 –◆ IGMPv1 Joins Received – Number of received IGMPv1 Joins.◆ IGMPv2/MLDv1 Reports
CHAPTER 5 | Monitoring the SwitchDisplaying MVR Information– 261 –WEB INTERFACETo display information for MVR statistics and multicast groups, cli
CHAPTER 5 | Monitoring the SwitchShowing IGMP Snooping Information– 262 –SHOWING IGMP SNOOPING INFORMATIONUse the IGMP Snooping pages to display I
CHAPTER 5 | Monitoring the SwitchShowing IGMP Snooping Information– 263 –WEB INTERFACETo display IGMP snooping status information, click Monitor,
CHAPTER 5 | Monitoring the SwitchShowing MLD Snooping Information– 264 –PARAMETERSThese parameters are displayed:◆ VLAN ID – VLAN identifier.◆ Gro
CHAPTER 5 | Monitoring the SwitchShowing MLD Snooping Information– 265 –PARAMETERSThese parameters are displayed:Statistics ◆ VLAN ID – VLAN Ident
CHAPTER 5 | Monitoring the SwitchShowing MLD Snooping Information– 266 –SHOWING MLDSNOOPING GROUPINFORMATIONUse the MLD Snooping Group Information
CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 267 –◆ Type – Indicates the Type. It can be either Allow or Deny.◆ Hardware Filter/S
CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 268 – When a capability is enabled, the capability is followed by (+). If the capabi
CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 269 –◆ Device Type - LLDP-MED devices are comprised of two primary types: LLDP-MED N
CHAPTER 1 | IntroductionDescription of Software Features– 27 –VIRTUAL LANS The switch supports up to 4096 VLANs. A Virtual LAN is a collection of
CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 270 –and Media Endpoint (Class II) classes, and are extended to include aspects rela
CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 271 –◆ Auto-negotiation Status – Auto-negotiation status identifies if auto-negotiat
CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 272 –If it is unknown what power supply the PD device is using, this is indicated as
CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 273 –The respective echo values shall be defined as the local link partner’s reflect
CHAPTER 5 | Monitoring the SwitchDisplaying LLDP Information– 274 –◆ Total Neighbors Entries Deleted – The number of LLDP neighbors which have bee
CHAPTER 5 | Monitoring the SwitchDisplaying PoE Status– 275 –WEB INTERFACETo display statistics on LLDP global counters and control frames, click
CHAPTER 5 | Monitoring the SwitchDisplaying the MAC Address Table– 276 –◆ Current Used – How much current the PD is currently using◆ Priority – Th
CHAPTER 5 | Monitoring the SwitchDisplaying Information About VLANs– 277 –WEB INTERFACETo display the address table, click Monitor, MAC Address Ta
CHAPTER 5 | Monitoring the SwitchDisplaying Information About VLANs– 278 – Combined: Shows information for all active user modules.◆ VLAN ID – A V
CHAPTER 5 | Monitoring the SwitchDisplaying Information About MAC-based VLANs– 279 –◆ Ingress Filtering – If ingress filtering is enabled and the
CHAPTER 1 | IntroductionSystem Defaults– 28 –QUALITY OF SERVICE Differentiated Services (DiffServ) provides policy-based management mechanisms use
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Flow Sampling– 280 –PARAMETERSThese parameters are displayed:◆ MAC-based VLAN User –
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Flow Sampling– 281 –PARAMETERSThese parameters are displayed:Receiver Statistics◆ Ow
CHAPTER 5 | Monitoring the SwitchDisplaying Information About Flow Sampling– 282 –WEB INTERFACE1. To display information on sampled traffic, click
– 283 –6 PERFORMING BASIC DIAGNOSTICSThis chapter describes how to test network connectivity using Ping for IPv4 or IPv6, and how to test network ca
CHAPTER 6 | Performing Basic DiagnosticsPinging an IPv4 or IPv6 Address– 284 –After you press Start, the sequence number and round-trip time are d
CHAPTER 6 | Performing Basic DiagnosticsRunning Cable Diagnostics– 285 –RUNNING CABLE DIAGNOSTICSThe VeriPHY page is used to perform cable diagnos
CHAPTER 6 | Performing Basic DiagnosticsRunning Cable Diagnostics– 286 –
– 287 –7 PERFORMING SYSTEM MAINTENANCEThis chapter describes how to perform basic maintenance tasks including upgrading software, restoring or savin
CHAPTER 7 | Performing System MaintenanceRestoring Factory Defaults– 288 –RESTORING FACTORY DEFAULTSUse the Factory Defaults page to restore the o
CHAPTER 7 | Performing System MaintenanceActivating the Alternate Image– 289 –3. Click the Upload button to upgrade the switch’s firmware.After th
CHAPTER 1 | IntroductionSystem Defaults– 29 –SNMP SNMP Agent DisabledCommunity Strings “public” (read only) “private” (read/write)Traps Global: di
CHAPTER 7 | Performing System MaintenanceManaging Configuration Files– 290 –MANAGING CONFIGURATION FILESUse the Maintenance Configuration pages to
CHAPTER 7 | Performing System MaintenanceManaging Configuration Files– 291 –Figure 157: Configuration Upload
CHAPTER 7 | Performing System MaintenanceManaging Configuration Files– 292 –
– 293 –SECTION IIIAPPENDICESThis section provides additional information and includes these items:◆ "Software Specifications" on page 295◆
SECTION III | Appendices– 294 –
– 295 –A SOFTWARE SPECIFICATIONSSOFTWARE FEATURESMANAGEMENTAUTHENTICATIONLocal, RADIUS, TACACS+, AAA, Port Authentication (802.1X), HTTPS, SSH, Port
APPENDIX A | Software SpecificationsManagement Features– 296 –VLAN SUPPORT Up to 128 groups; port-based, protocol-based, tagged (802.1Q),private V
APPENDIX A | Software SpecificationsStandards– 297 –RMON Groups 1, 2, 3, 9 (Statistics, History, Alarm, Event)STANDARDSANSI/TIA-1057 LLDP for Medi
APPENDIX A | Software SpecificationsManagement Information Bases– 298 –MANAGEMENT INFORMATION BASESBridge MIB (RFC 4188)DHCP Option for Civic Addr
– 299 –B TROUBLESHOOTINGPROBLEMS ACCESSING THE MANAGEMENT INTERFACE Table 14: Troubleshooting ChartSymptom ActionCannot connect using a web browser,
USER MANUALGEP-5070Layer 2 Gigabit Ethernet Switchwith 48 10/100/1000BASE-T PoE-Plus Ports (RJ-45)and 2 Gigabit Ethernet SFP PortsGEP-5070E042013/ST-R
CHAPTER 1 | IntroductionSystem Defaults– 30 –IP Settings Management. VLAN VLAN 1IP Address 192.168.1.1Subnet Mask 255.255.255.0Default Gateway 0.0
APPENDIX B | TroubleshootingUsing System Logs– 300 –USING SYSTEM LOGSIf a fault does occur, refer to the Installation Guide to ensure that the pro
– 301 –C LICENSE INFORMATIONThis product includes copyrighted third-party software subject to the terms of the GNU General Public License (GPL), GNU
APPENDIX C | License InformationThe GNU General Public License– 302 –GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND
APPENDIX C | License InformationThe GNU General Public License– 303 –b) Accompany it with a written offer, valid for at least three years, to give
APPENDIX C | License InformationThe GNU General Public License– 304 –9. If the distribution and/or use of the Program is restricted in certain cou
– 305 –GLOSSARYACL Access Control List. ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for c
GLOSSARY– 306 –DIFFSERV Differentiated Services provides quality of service on large networks by employing a well-defined set of building blocks fro
GLOSSARY– 307 –GMRP Generic Multicast Registration Protocol. GMRP allows network devices to register end stations with multicast groups. GMRP requir
GLOSSARY– 308 –IGMP QUERY On each subnetwork, one IGMP-capable device will act as the querier — that is, the device that asks all hosts to report on
GLOSSARY– 309 –MD5 MD5 Message-Digest is an algorithm that is used to create digital signatures. It is intended for use with 32 bit machines and is
– 31 –2 INITIAL SWITCH CONFIGURATIONThis chapter includes information on connecting to the switch and basic configuration procedures.To make use of
GLOSSARY– 310 –PORT TRUNK Defines a network link aggregation and trunking method which specifies how to create a single high-speed logical link that
GLOSSARY– 311 –SSH Secure Shell is a secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptograph
GLOSSARY– 312 –
– 313 –INDEXAacceptable frame type 175Access Control List See ACLACL 96binding to a port 96address table 170aging time 171address, manage
INDEX– 314 –snooping, configuring 149snooping, description 145snooping, fast leave 148throttling 148ingress classification, QoS 196ingress
INDEX– 315 –static binding 143statistics, displaying 259using immediate leave 142NNTP, specifying servers 50Ppasswords 31, 58path cost 1
INDEX– 316 –softwaredisplaying version 219downloading 288Spanning Tree Protocol See STAspecifications, software 295SSH 64configuring 64se
GEP-5070E042013/ST-R01
CHAPTER 2 | Initial Switch Configuration– 32 –logging out. To change the password, click Security and then Users. Select “admin” from the User Con
– 33 –SECTION IIWEB CONFIGURATIONThis section describes the basic switch features, along with a detailed description of how to configure each featur
SECTION II | Web Configuration– 34 –
– 35 –3 USING THE WEB INTERFACEThis switch provides an embedded HTTP web agent. Using a web browser you can configure the switch and view statistics
CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 36 –CONFIGURATIONOPTIONSConfigurable parameters have a dialog box or a dr
CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 37 –Aggregation 119Static Specifies ports to group into static trunks 120
CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 38 –Access Management Sets IP addresses of clients allowed management acc
CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 39 –Aggregation2119Static Specifies ports to group into static trunks 120
CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 40 –Private VLANsPort Isolation Prevents communications between designat
CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 41 –WRED Sets drop probabilities for congested queues 205Congestion Manag
CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 42 –DHCP Dynamic Host Configuration ProtocolSnooping Statistics Shows st
CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 43 –Group InformationDisplays active IGMP groups 263IPv4 SFM InformationD
CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 44 –Maintenance 287Restart Device Restarts the switch 287Factory Defaults
– 45 –4 CONFIGURING THE SWITCHThis chapter describes all of the basic configuration tasks.CONFIGURING SYSTEM INFORMATIONUse the System Information C
CHAPTER 4 | Configuring the SwitchSetting an IP Address– 46 –SETTING AN IP ADDRESSThis section describes how to configure an IP interface for mana
CHAPTER 4 | Configuring the SwitchSetting an IP Address– 47 –◆ IP Router – IP address of the gateway router between the switch and management stat
CHAPTER 4 | Configuring the SwitchSetting an IP Address– 48 –SETTING AN IPV6ADDRESSUse the IPv6 Configuration page to configure an IPv6 address fo
CHAPTER 4 | Configuring the SwitchSetting an IP Address– 49 –interface. The network portion of the address is based on prefixes received in IPv6 r
– 5 –ABOUT THIS GUIDEPURPOSE This guide gives specific information on how to operate and use the management functions of the switch.AUDIENCE The gui
CHAPTER 4 | Configuring the SwitchConfiguring NTP Service– 50 –CONFIGURING NTP SERVICEUse the NTP Configuration page to specify the Network Time P
CHAPTER 4 | Configuring the SwitchConfiguring the Time Zone and Daylight Savings Time– 51 –CONFIGURING THE TIME ZONE AND DAYLIGHT SAVINGS TIMEUse
CHAPTER 4 | Configuring the SwitchConfiguring the Time Zone and Daylight Savings Time– 52 – Non-Recurring – Sets the start, end, and offset times
CHAPTER 4 | Configuring the SwitchConfiguring Remote Log Messages– 53 –CONFIGURING REMOTE LOG MESSAGESUse the System Log Configuration page to sen
CHAPTER 4 | Configuring the SwitchConfiguring Power Reduction– 54 –CONFIGURING POWER REDUCTIONThe switch provides power saving methods including p
CHAPTER 4 | Configuring the SwitchConfiguring Port Connections– 55 –Figure 9: Configuring EEE Power ReductionCONFIGURING PORT CONNECTIONSUse the
CHAPTER 4 | Configuring the SwitchConfiguring Port Connections– 56 –NOTE: The 1000BASE-T standard does not support forced mode. Auto-negotiation s
CHAPTER 4 | Configuring the SwitchConfiguring Security– 57 –WEB INTERFACETo configure port connection settings:1. Click Configuration, Ports.2. Ma
CHAPTER 4 | Configuring the SwitchConfiguring Security– 58 –addresses assigned to DHCP clients can also be carefully controlled using static or dy
CHAPTER 4 | Configuring the SwitchConfiguring Security– 59 –◆ Privilege Level – Specifies the user level. (Options: 1 - 15) Access to specific fun
ABOUT THIS GUIDE– 6 –
CHAPTER 4 | Configuring the SwitchConfiguring Security– 60 –CONFIGURING USERPRIVILEGE LEVELSUse the Privilege Levels page to set the privilege lev
CHAPTER 4 | Configuring the SwitchConfiguring Security– 61 –3. Click Save.Figure 13: Configuring Privilege LevelsCONFIGURING THEAUTHENTICATIONMET
CHAPTER 4 | Configuring the SwitchConfiguring Security– 62 –Figure 14: Authentication Server OperationPATH Advanced Configuration, Security, Swit
CHAPTER 4 | Configuring the SwitchConfiguring Security– 63 –NOTE: This guide assumes that RADIUS and TACACS+ servers have already been configured
CHAPTER 4 | Configuring the SwitchConfiguring Security– 64 –CONFIGURING SSH Use the SSH Configuration page to configure access to the Secure Shell
CHAPTER 4 | Configuring the SwitchConfiguring Security– 65 –CONFIGURING HTTPS Use the HTTPS Configuration page to enable the Secure Hypertext Tran
CHAPTER 4 | Configuring the SwitchConfiguring Security– 66 –Figure 17: HTTPS ConfigurationFILTERING IPADDRESSES FORMANAGEMENT ACCESSUse the Acces
CHAPTER 4 | Configuring the SwitchConfiguring Security– 67 –5. Mark the protocols to restrict based on the specified address range. The following
CHAPTER 4 | Configuring the SwitchConfiguring Security– 68 –MIB objects) and default groups defined for security models v1 and v2c. The following
CHAPTER 4 | Configuring the SwitchConfiguring Security– 69 –◆ Version - Specifies the SNMP version to use. (Options: SNMP v1, SNMP v2c, SNMP v3; D
– 7 –CONTENTSABOUT THIS GUIDE 5CONTENTS 7FIGURES 13TABLES 19SECTION I GETTING STARTED 211INTRODUCTION 23Key Features 23Description of Software Feat
CHAPTER 4 | Configuring the SwitchConfiguring Security– 70 –8 colon-separated 16-bit hexadecimal values. One double colon may be used to indicate
CHAPTER 4 | Configuring the SwitchConfiguring Security– 71 –NOTE: To select a name from this field, first enter an SNMPv3 user with the same Trap
CHAPTER 4 | Configuring the SwitchConfiguring Security– 72 –SETTING SNMPV3 COMMUNITY ACCESS STRINGSUse the SNMPv3 Community Configuration page to
CHAPTER 4 | Configuring the SwitchConfiguring Security– 73 –CONFIGURING SNMPV3 USERSUse the SNMPv3 User Configuration page to define a unique name
CHAPTER 4 | Configuring the SwitchConfiguring Security– 74 –◆ Privacy Protocol - The encryption algorithm use for data privacy; only 56-bit DES is
CHAPTER 4 | Configuring the SwitchConfiguring Security– 75 –menu (see page 73). To modify an entry for USM, the current entry must first be delete
CHAPTER 4 | Configuring the SwitchConfiguring Security– 76 –should exist and its OID subtree should overlap the “excluded” view entry. ◆ OID Subtr
CHAPTER 4 | Configuring the SwitchConfiguring Security– 77 – Auth, Priv - SNMP communications use both authentication and encryption.◆ Read View N
CHAPTER 4 | Configuring the SwitchConfiguring Security– 78 –CONFIGURING RMON STATISTICAL SAMPLESUse the RMON Statistics Configuration page to coll
CHAPTER 4 | Configuring the SwitchConfiguring Security– 79 –growth and plan for expansion before your network becomes too overloaded.PATH Advanced
CONTENTS– 8 –Configuring Power Reduction 54Reducing Power to Idle Queue Circuits 54Configuring Port Connections 55Configuring Security 57Configu
CHAPTER 4 | Configuring the SwitchConfiguring Security– 80 –CONFIGURING RMON ALARMSUse the RMON Alarm Configuration page to define specific criter
CHAPTER 4 | Configuring the SwitchConfiguring Security– 81 – Rising or Falling – Trigger alarm when the first value is larger than the rising thre
CHAPTER 4 | Configuring the SwitchConfiguring Security– 82 –CONFIGURING RMON EVENTSUse the RMON Event Configuration page to set the action to take
CHAPTER 4 | Configuring the SwitchConfiguring Security– 83 –Figure 28: RMON Event Configuration CONFIGURING PORTLIMIT CONTROLSUse the Port Securi
CHAPTER 4 | Configuring the SwitchConfiguring Security– 84 –◆ Limit – The maximum number of MAC addresses that can be secured on this port. This n
CHAPTER 4 | Configuring the SwitchConfiguring Security– 85 –WEB INTERFACETo configure port limit controls:1. Click Advanced Configuration, Securit
CHAPTER 4 | Configuring the SwitchConfiguring Security– 86 –Figure 30: Using Port SecurityThis switch uses the Extensible Authentication Protocol
CHAPTER 4 | Configuring the SwitchConfiguring Security– 87 –◆ 802.1X / MAC-based authentication must be enabled globally for the switch.◆ The Admi
CHAPTER 4 | Configuring the SwitchConfiguring Security– 88 –between the switch and the client, and therefore does not imply that a client is still
CHAPTER 4 | Configuring the SwitchConfiguring Security– 89 –whether RADIUS-assigned QoS Class is enabled for that port. When unchecked, RADIUS-ser
CONTENTS– 9 –Configuring IGMP Filtering 151MLD Snooping 152Configuring Global and Port-Related Settings for MLD Snooping 152Configuring VLAN Sett
CHAPTER 4 | Configuring the SwitchConfiguring Security– 90 –For example, if the attribute is “map-ip-dscp=2:3;service-policy-in=p1,” then the swit
CHAPTER 4 | Configuring the SwitchConfiguring Security– 91 –If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a VL
CHAPTER 4 | Configuring the SwitchConfiguring Security– 92 –NOTE: For trouble-shooting VLAN assignments, use the Monitor > VLANs > VLAN Memb
CHAPTER 4 | Configuring the SwitchConfiguring Security– 93 –◆ Admin State - If NAS is globally enabled, this selection controls the port's au
CHAPTER 4 | Configuring the SwitchConfiguring Security– 94 –password in the subsequent EAP exchange with the RADIUS server. The 6-byte MAC address
CHAPTER 4 | Configuring the SwitchConfiguring Security– 95 –◆ Guest VLAN Enabled - Enables or disables this feature for a given port. Refer to the
CHAPTER 4 | Configuring the SwitchConfiguring Security– 96 –Figure 31: Network Access Server ConfigurationFILTERING TRAFFICWITH ACCESSCONTROL LIS
CHAPTER 4 | Configuring the SwitchConfiguring Security– 97 –◆ Policy ID - An ACL policy configured on the ACE Configuration page (page 101). (Rang
CHAPTER 4 | Configuring the SwitchConfiguring Security– 98 –frames, or shutting down the port. Note that the setting for rate limiting is implemen
CHAPTER 4 | Configuring the SwitchConfiguring Security– 99 –Figure 33: ACL Rate Limiter Configuration CONFIGURING ACCESS CONTROL LISTS Use the
Comments to this Manuals