Benefits
QoS with
four
priority
queues
The QoS(Quality Of Service) Control List (QCL) feature pro
The
QoS(Quality
Of
Service)
Control
List
(QCL)
feature
pro
classifications
of
traffic.
High
priority
packet
streams
exp
lower
latency
for
certain
delay
‐
sensitive
traffic.
The
ES
‐
52
priorities
according
to
VIP
port,
802.1p
priority
tag,
DiffS
traffics.
The
QoS operate
at
full
wire
speed.
The
actual
sc
priority,
weighted
round
robin
or
a
mix
of
both.
P
Mi
i
Port
Mirroring
It
is
based
on
ACL
function
to
classify
the
ingress
traffic
to
errors
or
abnormal
packet
transmission
without
interrup
monitored
by
a
single
port
that
is
defined
as
mirror
captu
port,
10/100/1000
port.
Mirroring
multiple
ports
is
possi
port.
port.
Q
‐
in
‐
Q
VLAN
for
performance
&
security
The
VLAN
feature
in
the
switch
offers
the
benefits
of
bot
traffic
between
different
users
and
thus
provides
better
s
same
VLAN
broadcast
domain
also
enhances
performanc
h d f
bli
S b
ib
A
i
Thi i
method
for
enabling
Subscriber
Aggregation.
This
is
very
Isolated
Group,
provides
protection
for
certain
ports
The
isolated
group
feature
allows
certain
ports
to
be
des
Traffic
between
isolated
group
members
is
blocked.
Traff
group.
group.
Mac
‐
based
802.3ad
LACP
with
automatic
link
fail
‐
over
Dynamic
fail
‐
over
means
packets
will
not
get
assigned
to
ports
were
to
fail,
traffic
will
automatically
get
distribute
802 1 A
C
l i
k
i
802.1x
Access
Control
improves
network
security
802.1x
features
enable
user
authentication
for
each
netw
limit
the
number
of
MAC
addresses
per
port
in
order
to
c
addresses
can
be
defined
for
each
port
to
ensure
only
re
both
of
these
features,
you
can
establish
an
access
mech
control the number of access stations.
control
the
number
of
access
stations.
ovides four internal queues to support four different
ovides
four
internal
queues
to
support
four
different
erience
less
delay
inside
the
switch,
which
supports
240GM
can
classify
the
packet
as
one
of
the
four
erv and/or
IP
TOS,
IPv4
and
UDP/TCP
application
cheduling
at
each
egress
port
can
be
based
upon
a
strict
o
do
port
copy.
This
mechanism
helps
track
network
pting
the
flow
of
data.
Allow
ingress
traffic
to
be
ure
port.
The
mirror
capture
port
can
be
any
10/100
ible
but
can
create
congestion
at
the
mirror
capture
h
security
and
performance.
VLAN
is
used
to
isolate
security.
Limiting
the
broadcast
traffic
to
within
the
ce.
Q
‐
in
‐
Q,
the
use
of
double
VLAN
tags
is
an
efficient
f l i
h MAN
useful
in
the
MAN.
ignated
as
protected.
All
other
ports
are
non
‐
isolated.
fic
can
only
be
sent
from
isolated
group
to
non
‐
isolated
o
any
trunk
member
port
that
has
failed.
If
one
of
the
d
to
the
remaining
active
ports.
work
access
attempt.
Port
security
features
allow
you
to
control
the
number
of
stations
for
each
port.
Static
MAC
gistered
machines
are
allowed
to
access.
By
enabling
hanism
based
on
user
and
machine
identities,
as
well
as