Chapter 1
| Introduction
Description of Software Features
– 38 –
Port Configuration
You can manually configure the speed, duplex mode, and flow control used on
specific ports, or use auto-negotiation to detect the connection settings used by
the attached device. Use full-duplex mode on ports whenever possible to double
the throughput of switch connections. Flow control should also be enabled to
control network traffic during periods of congestion and prevent the loss of
packets when port buffer thresholds are exceeded. The switch supports flow
control based on the IEEE 802.3x standard (now incorporated in IEEE 802.3-2002).
Rate Limiting
This feature controls the maximum rate for traffic transmitted or received on an
interface. Rate limiting is configured on interfaces at the edge of a network to limit
traffic into or out of the network. Packets that exceed the acceptable amount of
traffic are dropped.
Port Mirroring
The switch can unobtrusively mirror traffic from any port to a monitor port. You can
then attach a protocol analyzer or RMON probe to this port to perform traffic
analysis and verify connection integrity.
Port Trunking
Ports can be combined into an aggregate connection. Trunks can be manually set
up or dynamically configured using Link Aggregation Control Protocol (LACP – IEEE
802.3-2005). The additional ports dramatically increase the throughput across any
connection, and provide redundancy by taking over the load if a port in the trunk
should fail. The switch supports up to 16 trunks per switch and 32 per stack.
Storm Control
Broadcast, multicast and unknown unicast storm suppression prevents traffic from
overwhelming the network.When enabled on a port, the level of traffic passing
through the port is restricted. If traffic rises above a pre-defined threshold, it will be
throttled until the level falls back beneath the threshold.
Static MAC Addresses
A static address can be assigned to a specific interface on this switch. Static
addresses are bound to the assigned interface and will not be moved. When a static
address is seen on another interface, the address will be ignored and will not be
written to the address table. Static addresses can be used to provide network
security by restricting access for a known host to a specific port.
IP Address Filtering
Access to insecure ports can be controlled using DHCP Snooping which filters
ingress traffic based on static IP addresses and addresses stored in the DHCP
Snooping table. Traffic can also be restricted to specific source IP addresses or
source IP/MAC address pairs based on static entries or entries stored in the DHCP
Snooping table.
Содержание GTL-2881
Страница 30: ...Figures 30 Figure 450 Showing RIP Peer Information 669 Figure 451 Resetting RIP Statistics 670 ...
Страница 34: ...Section I Getting Started 34 ...
Страница 48: ...Section II Web Configuration 48 Unicast Routing on page 651 ...
Страница 151: ...Chapter 4 Interface Configuration VLAN Trunking 151 Figure 69 Configuring VLAN Trunking ...
Страница 152: ...Chapter 4 Interface Configuration VLAN Trunking 152 ...
Страница 229: ...Chapter 8 Congestion Control Automatic Traffic Control 229 Figure 135 Configuring ATC Interface Attributes ...
Страница 230: ...Chapter 8 Congestion Control Automatic Traffic Control 230 ...
Страница 596: ...Chapter 14 Multicast Filtering Multicast VLAN Registration for IPv6 596 ...
Страница 620: ...Chapter 15 IP Configuration Setting the Switch s IP Address IP Version 6 620 ...
Страница 670: ...Chapter 18 Unicast Routing Configuring the Routing Information Protocol 670 Figure 451 Resetting RIP Statistics ...
Страница 672: ...Section III Appendices 672 ...
Страница 678: ...Appendix A Software Specifications Management Information Bases 678 ...
Страница 688: ...Appendix C License Statement GPL Code Statement Notification of Compliance 688 ...
Страница 696: ...Glossary 696 ...
Страница 706: ...GTL 2881 GTL 2882 E112016 ST R01 ...