Netgear GS724TPv2 User Manual - Page 300
X, Destination IP Address
View all Netgear GS724TPv2 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 300 highlights
NETGEAR 24-Port Gigabit Smart Managed Pro Switch with PoE+ and 2 SFP Ports Model GS724TPv2 • Source Mask. 255.255.255.0. • Source L4 Port. Other, and enter 4567 as the source port value. • Destination IP Address. 192.12.2.0. • Destination Mask. 255.255.255.0. • Destination L4 Port. Other, and enter 4568 as the destination port value. For more information about this page, see Configure a DiffServ Class on page 163. 4. Click the Apply button. 5. On the Policy Configuration page, create a new policy with the following settings: • Policy Selector. Policy1 • Member Class. Class1 For more information about this page, see Configure a DiffServ Policy on page 168. 6. Click the Add button. The policy is added. 7. Click the Policy1 hyperlink to view the Policy Class Configuration page for this policy. 8. Configure the Policy attributes as follows: • Assign Queue. 3 • Policy Attribute. Simple Policy • Color Mode. Color Blind • Committed Rate. 10000 (which means 10000*16 kb/s). • Confirm Action. Send • Violate Action. Drop For more information about this page, see Configure a DiffServ Policy on page 168. 9. On the Service Configuration page, select the check box next to interfaces g7 and g8 to attach the policy to these interfaces, and then click the Apply button. (See Configure the DiffServ Service Interface on page 174.) 802.1X Local area networks (LANs) are often deployed in environments that permit unauthorized devices to be physically attached to the LAN infrastructure, or permit unauthorized users to attempt to access the LAN through equipment already attached. In such environments you might want to restrict access to the services offered by the LAN to those users and devices that are permitted to use those services. Port-based network access control makes use of the physical characteristics of LAN infrastructures to provide a means of authenticating and authorizing devices attached to a LAN port with point-to-point connection characteristics. If the authentication and authorization process fails, access control prevents access to that port. In this context, a port is a single Configuration Examples 300