QoS with
4
Priority
Queues
The
QoS Control
List
(QCL)
feature
provides
4
interna
traffic.
High
priority
packet
streams
will
experience
le
latency
level
for
certain
delay
‐
sensitive
traffic.
The
ES
y
y
data
packets
according
to
port,
802.1p
priority
tag,
D
application
traffic.
The
QoS operates
at
full
wire
spee
can
be
based
upon
a
strict
weighted
round
robin.
Port
Mirroring
The
port
mirroring
feature
allows
the
ingress
traffic
to
t
k
t
k
b
l
k t t
i i
track
network
errors
or
abnormal
packet
transmission
ingress
traffic
to
be
monitored
by
a
single
port
that
is
capture
port
can
be
any
10/100/1000
port.
Mirroring
congestion
at
the
mirror
capture
port.
Q
‐
in
‐
Q
VLAN
for
Improved
Performance
&
Security
The
VLAN
feature
in
the
switch
offers
the
benefit
of
im
to
isolate
traffic
between
different
users,
thus
providi
within
the
same
VLAN
broadcast
domain
also
enhanc
tags,
is
an
efficient
method
to
enable
subscriber
aggr
Isolated
Group
for
Port
Protection
The
isolated
group
feature
allows
certain
ports
to
be
i l t d T ffi b t
i l t d
b
non
‐
isolated.
Traffic
between
isolated
group
member
isolated
group
to
the
non
‐
isolated
group.
802.3ad
LACP
with
Dynamic
Link
Fail
‐
Over
Dynamic
fail
‐
over
means
packets
will
not
be
assigned
of
the
ports
were
to
fail,
traffic
will
automatically
be
d
802.1x
Port
‐
Based
Network
Access
Control
for
Impro
The
802.1x
feature
enables
user
authentication
for
ev
feature
allows
users
to
limit
network
access
to
non
‐
re
can
establish
an
access
mechanism
based
on
user
and
number
of
access
stations.
l
queues
to
support
4
different
classifications
of
ess
delay
inside
the
switch,
which
provides
a
lower
S
‐
5260GM
is
able
to
assign
different
priorities
to
g
p
iffServ and/or
IP
TOS,
IPv4,
and
UDP/TCP
d,
and
the
actual
scheduling
at
each
egress
port
o
execute
port
copying.
This
mechanism
helps
ith
t i t
ti
th fl
f d t
ll
i
n
without
interrupting
the
flow
of
data,
allowing
defined
as
a
mirror
capture
port.
The
mirror
g
multiple
ports
is
possible,
but
can
create
mproved
security
and
performance.
VLAN
is
used
p
y
p
ing
better
security.
Limiting
the
broadcast
traffic
ces
performance.
Q
‐
in
‐
Q,
the
use
of
double
VLAN
regation.
designated
as
protected
ports.
All
other
ports
are
bl k d T ffi
l b
t f
th
rs
are
blocked.
Traffic
can
only
be
sent
from
the
d
to
any
trunk
member
port
that
has
failed.
If
one
distributed
to
the
remaining
active
ports.
oved
Network
Security
very
network
access
attempt.
The
port
security
egistered
users.
By
enabling
these
features,
users
d
machine
identities,
as
well
as
control
the