IGMP Snooping ........................................................................................................................................................................... 97
Static Router Ports Settings...........................................................................................................................................................................99
IGMP Access Control Settings ...................................................................................................................................................................100
Spanning Tree ............................................................................................................................................................................ 101
802.1w Rapid Spanning Tree.................................................................................................................................................................101
Port Transition States.............................................................................................................................................................................101
Edge Port ...............................................................................................................................................................................................102
P2P Port .................................................................................................................................................................................................102
802.1D and 802.1w Compatibility .........................................................................................................................................................102
STP Bridge Global Settings ........................................................................................................................................................................102
STP Port Settings ........................................................................................................................................................................................105
Loopback Detection ................................................................................................................................................................... 107
CoS ................................................................................................................................................................109
CoS............................................................................................................................................................................................. 109
IEEE 802.1p Priority...................................................................................................................................................................................109
The Advantages of CoS ..............................................................................................................................................................................110
Understanding CoS .....................................................................................................................................................................................111
Port Bandwidth ...........................................................................................................................................................................................112
802.1p Default Priority ...............................................................................................................................................................................114
802.1p User Priority....................................................................................................................................................................................115
CoS Scheduling Mechanism .......................................................................................................................................................................115
CoS Output Scheduling...............................................................................................................................................................................116
Priority Settings ..........................................................................................................................................................................................117
TOS Priority Settings ..................................................................................................................................................................................118
DSCP Priority Settings................................................................................................................................................................................119
Port Mapping Priority Settings....................................................................................................................................................................120
MAC Priority Settings ................................................................................................................................................................................121
CPU Interface Filtering...............................................................................................................................122
CPU Interface Filtering...............................................................................................................................122
CPU Interface Filtering State Settings ........................................................................................................................................................122
CPU Interface Filtering Table .....................................................................................................................................................................122
Security .........................................................................................................................................................133
Traffic Control ........................................................................................................................................................................... 133
Port Security............................................................................................................................................................................... 137
Port Lock Entries ....................................................................................................................................................................... 139
802.1X........................................................................................................................................................................................ 140
802.1X Port-Based and MAC-Based Access Control .................................................................................................................................140
Authentication Server ............................................................................................................................................................................141
Authenticator .........................................................................................................................................................................................141
Client .....................................................................................................................................................................................................142
Authentication Process ..........................................................................................................................................................................143
Understanding 802.1X Port-based and MAC-based Network Access Control ...........................................................................................144
Port-Based Network Access Control...........................................................................................................................................................144
MAC-Based Network Access Control ........................................................................................................................................................145
802.1X Authenticator Settings ....................................................................................................................................................................146
Summary of Contents for DES-3010F
Page 260: ...247 ...