Chapter 4
| Interface Configuration
Traffic Segmentation
– 135 –
Traffic Segmentation
If tighter security is required for passing traffic from different clients through
downlink ports on the local network and over uplink ports to the service provider,
port-based traffic segmentation can be used to isolate traffic for individual clients.
Data traffic on downlink ports is only forwarded to, and from, uplink ports.
Traffic belonging to each client is isolated to the allocated downlink ports. But the
switch can be configured to either isolate traffic passing across a client’s allocated
uplink ports from the uplink ports assigned to other clients, or to forward traffic
through the uplink ports used by other clients, allowing different clients to share
access to their uplink ports where security is less likely to be compromised.
Enabling Traffic
Segmentation
Use the Interface > Traffic Segmentation (Configure Global) page to enable traffic
segmentation.
Parameters
These parameters are displayed:
◆
Status
– Enables port-based traffic segmentation. (Default: Disabled)
◆
Uplink-to-Uplink Mode
– Specifies whether or not traffic can be forwarded
between uplink ports assigned to different client sessions.
■
Blocking
– Blocks traffic between uplink ports assigned to different
sessions.
■
Forwarding
– Forwards traffic between uplink ports assigned to different
sessions.
Web Interface
To enable traffic segmentation:
1.
Click Interface, Traffic Segmentation.
2.
Select Configure Global from the Step list.
3.
Mark the Status check box, and set the required uplink-to-uplink mode.
4.
Click Apply.
Summary of Contents for GEL-1061
Page 14: ...Contents 14...
Page 28: ...Section I Getting Started 28...
Page 38: ...Chapter 1 Introduction System Defaults 38...
Page 40: ...Section II Web Configuration 40...
Page 60: ...Chapter 2 Using the Web Interface Navigating the Web Browser Interface 60...
Page 164: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 164...
Page 192: ...Chapter 8 Congestion Control Storm Control 192...
Page 204: ...Chapter 9 Class of Service Layer 3 4 Priority Settings 204...
Page 216: ...Chapter 10 Quality of Service Attaching a Policy Map to a Port 216...
Page 430: ...Chapter 14 Multicast Filtering MLD Snooping Snooping and Query for IPv4 430...
Page 436: ...Chapter 15 IP Tools Address Resolution Protocol 436...
Page 474: ...Section III Appendices 474...
Page 492: ...Glossary 492...
Page 500: ...E052016 ST R02 150200001416A...