Contents
6
Port List ....................................................................................................................................................197
Create Port List ..................................................................................................................................197
Modify Port List ..................................................................................................................................198
Delete Port List...................................................................................................................................199
Policy ........................................................................................................................................................200
Create Policy......................................................................................................................................200
Modify Policy ......................................................................................................................................202
Delete Policy ......................................................................................................................................203
Policy Sequence.......................................................................................................................................205
Chapter 14
:
Storm Control ..........................................................................................................................207
Overview...................................................................................................................................................208
Ingress Rate Limiting .........................................................................................................................209
Egress Rate Limiting ..........................................................................................................................209
Configuration ............................................................................................................................................210
Ingress Rate Limiting................................................................................................................................212
Egress Rate Limiting ................................................................................................................................214
Chapter 15
:
MAC Address Table ................................................................................................................215
Overview...................................................................................................................................................216
Static Unicast MAC Address Configuration ..............................................................................................218
Modify Static Unicast Address..................................................................................................................220
Delete Static Unicast Address ..................................................................................................................221
Static Multicast Address Configuration.....................................................................................................222
Modify Static Multicast Address................................................................................................................224
Delete Static Multicast Address................................................................................................................225
Chapter 16
:
DHCP Snooping ......................................................................................................................227
Overview...................................................................................................................................................228
Trusted Ports......................................................................................................................................228
Untrusted Ports ..................................................................................................................................228
Unauthorized DHCP Servers .............................................................................................................228
DHCP with Option 82 .........................................................................................................................229
General Guidelines...................................................................................................................................230
General Configuration ..............................................................................................................................231
VLAN Setting ............................................................................................................................................233
Create VLAN Setting..........................................................................................................................233
Modify VLAN Setting ..........................................................................................................................234
Delete VLAN Setting ..........................................................................................................................234
Trusted and Untrusted Port Configuration................................................................................................235
Binding Database .....................................................................................................................................236
Static IP Addresses............................................................................................................................236
Viewing...............................................................................................................................................237
Chapter 17
:
IGMP Snooping .......................................................................................................................239
Overview...................................................................................................................................................240
IGMP Snooping Configuration..................................................................................................................242
Chapter 18
:
Security ...................................................................................................................................245
Port Access Control..................................................................................................................................246
Overview ............................................................................................................................................246
Port Access Control Configuration .....................................................................................................247
RADIUS Client..........................................................................................................................................251
Overview ............................................................................................................................................251
General Guidelines ............................................................................................................................251
Radius Client Configuration ...............................................................................................................252
Summary of Contents for AT-GS950/24
Page 12: ...Figures 12 ...
Page 14: ...List of Tables 14 ...
Page 18: ...Preface 18 ...
Page 60: ...Chapter 2 Basic Switch Configuration 60 ...
Page 68: ...Chapter 3 Port Configuration 68 ...
Page 74: ...Chapter 4 Port Mirroring 74 ...
Page 94: ...Chapter 5 Virtual LANs 94 ...
Page 102: ...Chapter 6 GVRP 102 ...
Page 132: ...Chapter 8 STP and RSTP 132 ...
Page 146: ...Chapter 9 Multiple Spanning Tree Protocol 146 ...
Page 156: ...Chapter 10 Static Port Trunking 156 ...
Page 178: ...Chapter 12 Quality of Service CoS 178 ...
Page 206: ...Chapter 13 Access Control Configuration 206 ...
Page 226: ...Chapter 15 MAC Address Table 226 ...
Page 238: ...Chapter 16 DHCP Snooping 238 ...
Page 244: ...Chapter 17 IGMP Snooping 244 ...
Page 288: ...Chapter 21 Simple Network Management Protocol SNMPv3 288 ...
Page 300: ...Chapter 22 RMON 300 ...
Page 322: ...Chapter 24 Management Software Updates 322 ...
Page 348: ...Appendix A MSTP Overview 348 ...
Page 366: ...Appendix A AT GS950 24 Default Parameters 366 ...