Dell PowerConnect 5448 User's Guide - Page 15

MAC Address Supported Features, For more information on configuring the MAC Address Age Out Time - iscsi

Page 15 highlights

Back Pressure Support On half-duplex links, the receiving port prevents buffer overflows by occupying the link so that it is unavailable for additional traffic. For information on configuring Back Pressure for ports or LAGs, see "Defining Port Parameters" on page 278 or "Configuring Load Balancing" on page 284. iSCSI Optimization iSCSI is a communication protocol used for sending data between file servers and storage disks. The file servers are called initiators and the disks are called targets. You can optimize iSCSI flow by setting Quality of Service frame priority parameters in the device. The device can also intercept iSCSI frames and provide information about iSCSI communications (called sessions). For more information, see "Optimizing iSCSI" on page 232. Voice VLAN Voice VLAN allows network administrators to enhance VoIP service by configuring ports to carry IP voice traffic from IP phones on a specific VLAN. VoIP traffic has a preconfigured OUI prefix in the source MAC address. Network Administrators can configure VLANs from which voice IP traffic is forwarded. Non-VoIP traffic is dropped from the Voice VLAN in auto Voice VLAN secure mode. Voice VLAN also provides QoS to VoIP, ensuring that the quality of voice does not deteriorate if the IP traffic is received unevenly. For more information, see "Configuring Voice VLANs" on page 343. Guest VLAN Guest VLAN provides limited network access to unauthorized ports. If a port is denied network access via port-based authorization, but the Guest VLAN is enabled, the port receives limited network access. MAC Address Supported Features MAC Address Capacity Support The device supports up to eight thousand MAC addresses. The device reserves specific MAC addresses for system use. Self-Learning MAC Addresses The device enables automatic MAC address learning from incoming packets. The MAC addresses are stored in the Bridging Table. Automatic Aging for MAC Addresses MAC addresses from which no traffic is received for a given period are aged out. This prevents the Bridging Table from overflowing. For more information on configuring the MAC Address Age Out Time, see "Configuring Address Tables" on page 295. Introduction 15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444

Introduction
15
Back Pressure Support
On half-duplex links, the receiving port prevents buffer overflows by occupying the link so that it is
unavailable for additional traffic.
For information on configuring Back Pressure for ports or LAGs, see "Defining Port Parameters" on
page 278 or "Configuring Load Balancing" on page 284.
iSCSI Optimization
iSCSI is a communication protocol used for sending data between file servers and storage disks. The file
servers are called
initiators
and the disks are called
targets
. You can optimize iSCSI flow by setting
Quality of Service frame priority parameters in the device. The device can also intercept iSCSI frames
and provide information about iSCSI communications (called sessions).
For more information, see "Optimizing iSCSI" on page 232.
Voice VLAN
Voice VLAN allows network administrators to enhance VoIP service by configuring ports to carry IP voice
traffic from IP phones on a specific VLAN. VoIP traffic has a preconfigured OUI prefix in the source MAC
address. Network Administrators can configure VLANs from which voice IP traffic is forwarded. Non-VoIP
traffic is dropped from the Voice VLAN in auto Voice VLAN secure mode. Voice VLAN also provides
QoSto VoIP, ensuring that the quality of voice does not deteriorate if the IP traffic is received unevenly.
For more information, see "Configuring Voice VLANs" on page 343.
Guest VLAN
Guest VLAN provides limited network access to unauthorized ports. If a port is denied network access
via port-based authorization, but the Guest VLAN is enabled, the port receives limited network access.
MAC Address Supported Features
MAC Address Capacity Support
The device supports up to eight thousand MAC addresses. The device reserves specific MAC addresses
for system use.
Self-Learning MAC Addresses
The device enables automatic MAC address learning from incoming packets. The MAC addresses are
stored in the Bridging Table.
Automatic Aging for MAC Addresses
MAC addresses from which no traffic is received for a given period are aged out. This prevents the
Bridging Table from overflowing.
For more information on configuring the MAC Address Age Out Time, see "Configuring Address Tables"
on page 295.