
C
HAPTER
1
| Introduction
Description of Software Features
– 81 –
Q
UALITY
OF
S
ERVICE
Differentiated Services (DiffServ) provides policy-based management
mechanisms used for prioritizing network resources to meet the
requirements of specific traffic types on a per-hop basis. Each packet is
classified upon entry into the network based on access lists, IP Precedence
or DSCP values, or VLAN lists. Using access lists allows you select traffic
based on Layer 2, Layer 3, or Layer 4 information contained in each
packet. Based on network policies, different kinds of traffic can be marked
for different kinds of forwarding.
E
THERNET
R
ING
P
ROTECTION
S
WITCHING
ERPS can be used to increase the availability and robustness of Ethernet
rings, such as those used in Metropolitan Area Networks (MAN). ERPS
provides Layer 2 loop avoidance and fast reconvergence in Layer 2 ring
topologies, supporting up to 255 nodes in the ring structure. It can also
function with IEEE 802.1ag to support link monitoring when non-
participating devices exist within the Ethernet ring.
O
PERATION
,
A
DMINISTRATION
,
AND
M
AINTENANCE
The switch provides OAM remote management tools required to monitor
and maintain the links to subscriber CPEs (Customer Premise Equipment).
This section describes functions including enabling OAM for selected ports,
loopback testing, and displaying remote device information.
M
ULTICAST
F
ILTERING
Specific multicast traffic can be assigned to its own VLAN to ensure that it
does not interfere with normal network traffic and to guarantee real-time
delivery by setting the required priority level for the designated VLAN. The
switch uses IGMP Snooping and Query to manage multicast group
registration. It also supports Multicast VLAN Registration (MVR for IPv4 and
MVR6 for IPv6) which allows common multicast traffic, such as television
channels, to be transmitted across a single network-wide multicast VLAN
shared by hosts residing in other standard or private VLAN groups, while
preserving security and data isolation for normal traffic.
L
INK
L
AYER
D
ISCOVERY
P
ROTOCOL
LLDP is used to discover basic information about neighboring devices
within the local broadcast domain. LLDP is a Layer 2 protocol that
advertises information about the sending device and collects information
gathered from neighboring network nodes it discovers.
Advertised information is represented in Type Length Value (TLV) format
according to the IEEE 802.1ab standard, and can include details such as
device identification, capabilities and configuration settings. Media
Endpoint Discovery (LLDP-MED) is an extension of LLDP intended for
managing endpoint devices such as Voice over IP phones and network
switches. The LLDP-MED TLVs advertise information such as network
policy, power, inventory, and device location details. The LLDP and LLDP-
MED information can be used by SNMP applications to simplify
troubleshooting, enhance network management, and maintain an accurate
network topology.
Summary of Contents for ECS4110-28T
Page 2: ......
Page 4: ......
Page 63: ...FIGURES 63 Figure 428 Configuring VLAN Translation 1177...
Page 64: ...FIGURES 64...
Page 72: ...TABLES 72...
Page 74: ...SECTION I Getting Started 74...
Page 102: ...SECTION II Web Configuration 102 General IP Routing on page 679...
Page 154: ...CHAPTER 4 Basic Management Tasks Resetting the System 154...
Page 198: ...CHAPTER 5 Interface Configuration VLAN Trunking 198 Figure 65 Configuring VLAN Trunking...
Page 272: ...CHAPTER 9 Congestion Control Automatic Traffic Control 272...
Page 286: ...CHAPTER 10 Class of Service Layer 3 4 Priority Settings 286...
Page 420: ...CHAPTER 13 Security Measures DHCP Snooping 420...
Page 566: ...CHAPTER 14 Basic Administration Protocols OAM Configuration 566...
Page 638: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration for IPv6 638...
Page 662: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 662...
Page 678: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 678...
Page 792: ...CHAPTER 21 System Management Commands Switch Clustering 792...
Page 822: ...CHAPTER 23 Remote Monitoring Commands 822...
Page 888: ...CHAPTER 24 Authentication Commands PPPoE Intermediate Agent 888...
Page 968: ...CHAPTER 25 General Security Measures Port based Traffic Segmentation 968...
Page 994: ...CHAPTER 26 Access Control Lists ACL Information 994...
Page 1034: ...CHAPTER 28 Link Aggregation Commands Trunk Status Display Commands 1034...
Page 1044: ...CHAPTER 29 Power over Ethernet Commands 1044...
Page 1084: ...CHAPTER 33 UniDirectional Link Detection Commands 1084...
Page 1090: ...CHAPTER 34 Address Table Commands 1090...
Page 1194: ...CHAPTER 37 VLAN Commands Configuring Voice VLANs 1194...
Page 1388: ...CHAPTER 42 CFM Commands Delay Measure Operations 1388...
Page 1410: ...CHAPTER 44 Domain Name Service Commands 1410...
Page 1420: ...CHAPTER 45 DHCP Commands DHCP Relay 1420...
Page 1472: ...CHAPTER 46 IP Routing Commands IPv4 Commands 1472...
Page 1474: ...SECTION IV Appendices 1474...
Page 1502: ...COMMAND LIST 1502...
Page 1513: ......
Page 1514: ...ECS4110 28T ECS4110 28P ECS4110 52T ECS4110 52P E072014 ST R02 150200000929A...