Configuration Examples
412
Insight Managed 28-Port Gigabit Ethernet Smart Cloud Switch with 2 SFP 1G & 2 SFP+ 10G Fiber Ports
5.
On the Policy Configuration page (see
Create and Configure a DiffServ Policy
page 241), create a new policy with the following settings:
•
Policy Selector
. Policy1
•
Member Class
. Class1
6.
Click the
Add
button.
The policy is added.
7.
Click the
Policy1
hyperlink to view the Policy Class Configuration page for this policy.
8.
Configure the Policy attributes as follows:
•
Assign Queue
. 3
•
Policy Attribute
. Simple Policy
•
Color Mode
. Color Blind
•
Committed Rate
. 1000000 Kbps
•
Committed Burst Size
. 128 KB
•
Confirm Action
. Send
•
Violate Action
. Drop
For more information about this page, see
Create and Configure a DiffServ Policy
9.
On the Service Interface Configuration page (see
Attach a DiffServ Policy to an Interface
on page 248), select the check box next to interfaces g7 and g8 to attach the policy to these
interfaces, and then click the
Apply
button.
All UDP packet flows destined to the 192.12.2.0 network with an IP source address from the
192.12.1.0 network that include a Layer 4 Source port of 4567 and Destination port of 4568
from this switch on ports 7 and 8 are assigned to hardware queue 3.
On this network, traffic from streaming applications uses UDP port 4567 as the source and
4568 as the destination. This real-time traffic is time sensitive, so it is assigned to a
high-priority hardware queue. By default, data traffic uses hardware queue 0, which is
designated as a best-effort queue.
Also the
confirmed action
on this flow is to send the packets with a committed rate of
1000000 Kbps and burst size of 128 KB. Packets that violate the committed rate and burst
size are dropped.
802.1X
Local area networks (LANs) are often deployed in environments that permit unauthorized
devices to be physically attached to the LAN infrastructure, or permit unauthorized users to
attempt to access the LAN through equipment already attached. In such environments you
might want to restrict access to the services offered by the LAN to those users and devices
that are permitted to use those services.
Port-based network access control makes use of the physical characteristics of LAN
infrastructures to provide a means of authenticating and authorizing devices attached to a