Table of Contents
MES3500-24/24F User’s Guide
13
Chapter
16
Mirroring
................................................................................................................................
146
16.1 Port Mirroring Setup
........................................................................................................
146
Chapter
17
Link Aggregation
..................................................................................................................
148
17.1 Link Aggregation Overview
.............................................................................................
148
17.2 Dynamic Link Aggregation
..............................................................................................
148
17.2.1 Link Aggregation ID
...............................................................................................
149
17.3 Link Aggregation Status
..................................................................................................
149
17.4 Link Aggregation Setting
.................................................................................................
151
17.5 Link Aggregation Control Protocol
................................................................................
153
17.6 Static Trunking Example
..................................................................................................
154
Chapter
18
Port Authentication
..............................................................................................................
156
18.1 Port Authentication Overview
..........................................................................................
156
18.1.1 IEEE 802.1x Authentication
....................................................................................
156
18.1.2 MAC Authentication
................................................................................................
157
18.2 Port Authentication Configuration
....................................................................................
158
18.2.1 Activate IEEE 802.1x Security
............................................................................
159
18.2.2 Guest VLAN
...........................................................................................................
160
18.2.3 Activate MAC Authentication
.................................................................................
162
Chapter
19
Port Security
.........................................................................................................................
164
19.1 About Port Security
..........................................................................................................
164
19.2 Port Security Setup
..........................................................................................................
164
Chapter
20
Classifier
................................................................................................................................
166
20.1 About the Classifier and QoS
...........................................................................................
166
20.2 Configuring the Classifier
................................................................................................
166
20.3 Viewing and Editing Classifier Configuration
...................................................................
168
20.4 Classifier Example
...........................................................................................................
170
Chapter
21
Policy Rule
...........................................................................................................................
171
21.1 Policy Rules Overview
....................................................................................................
171
21.1.1 DiffServ
...................................................................................................................
171
21.1.2 DSCP and Per-Hop Behavior
.................................................................................
171
21.2 Configuring Policy Rules
..................................................................................................
171
21.3 Viewing and Editing Policy Configuration
.........................................................................
174