–
143
–
Chapter 4
| Interface Configuration
Traffic Segmentation
Traffic Segmentation
If tighter security is required for passing traffic from different clients through
downlink ports on the local network and over uplink ports to the service provider,
port-based traffic segmentation can be used to isolate traffic for individual clients.
Data traffic on downlink ports is only forwarded to, and from, uplink ports.
Traffic belonging to each client is isolated to the allocated downlink ports. But the
switch can be configured to either iso
late traffic passing across a client’s allocated
uplink ports from the uplink ports assigned to other clients, or to forward traffic
through the uplink ports used by other clients, allowing different clients to share
access to their uplink ports where security is less likely to be compromised.
Enabling Traffic
Segmentation
Use the Interface > Traffic Segmentation (Configure Global) page to enable traffic
segmentation.
Parameters
These parameters are displayed:
◆
Status
–
Enables port-based traffic segmentation. (Default: Disabled)
◆
Uplink-to-Uplink Mode
–
Specifies whether or not traffic can be forwarded
between uplink ports assigned to different client sessions.
■
Blocking
–
Blocks traffic between uplink ports assigned to different
sessions.
■
Forwarding
–
Forwards traffic between uplink ports assigned to different
sessions.
Web Interface
To enable traffic segmentation:
1.
Click Interface, Traffic Segmentation.
2.
Select Configure Global from the Step list.
3.
Mark the Status check box, and set the required uplink-to-uplink mode.
4.
Click Apply.
Summary of Contents for GEL-5261
Page 14: ...14 Contents Glossary 551 Index 559...
Page 26: ...26 Figures...
Page 30: ...30 Section I Getting Started...
Page 42: ...42 Section II Web Configuration IP Services on page 527...
Page 45: ...Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface 45 Figure 1 Dashboard...
Page 62: ...62 Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface...
Page 180: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 180...
Page 208: ...Chapter 8 Congestion Control Storm Control 208 Figure 121 Configuring Storm Control...
Page 228: ...228 Chapter 10 Quality of Service Attaching a Policy Map to a Port...
Page 332: ...Chapter 12 Security Measures ARP Inspection 332 Figure 207 Displaying the ARP Inspection Log...
Page 436: ...Chapter 13 Basic Administration Protocols LBD Configuration 436...
Page 488: ...488 Chapter 14 Multicast Filtering Filtering MLD Query Packets on an Interface...
Page 498: ...Chapter 15 IP Tools Address Resolution Protocol 498...
Page 517: ...517 Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 interface...
Page 542: ...540 Section III Appendices...
Page 560: ...Glossary 558...
Page 570: ...568 Index E062017 ST R01...