
Dimension ES-3124 Ethernet Switch
Table of Contents ix
Chapter 13 Mirroring.........................................................................................................................................................13-1
13.1 Introduction to Port Mirroring................................................................................................................... 13-1
13.2 Port Mirroring Configuration .................................................................................................................... 13-1
Chapter 14 Link Aggregation ...........................................................................................................................................14-1
14.1 Introduction to Link Aggregation.............................................................................................................. 14-1
14.1.1 Dynamic Link Aggregation............................................................................................................. 14-1
14.1.2 Link Aggregation ID ....................................................................................................................... 14-1
14.2 Link Aggregation Protocol Status ............................................................................................................ 14-2
14.3 Link Aggregation Setup ........................................................................................................................... 14-3
Chapter 15 Port Authentication .......................................................................................................................................15-1
15.1 Introduction to Authentication .................................................................................................................. 15-1
15.1.1 RADIUS.......................................................................................................................................... 15-1
15.2 Configuring Port Authentication............................................................................................................... 15-1
15.2.1 Configuring RADIUS Server Settings ............................................................................................ 15-2
15.2.2 Configuring IEEE802.1x................................................................................................................. 15-2
Chapter 16 Port Security ..................................................................................................................................................16-1
16.1 About Port Security ................................................................................................................................. 16-1
16.2 Port Security Setup.................................................................................................................................. 16-1
Chapter 17 Access Control ..............................................................................................................................................17-1
17.1 About Access Control .............................................................................................................................. 17-1
17.2 Access Control Overview ........................................................................................................................ 17-1
17.3 About SNMP............................................................................................................................................ 17-2
17.3.1 Supported MIBs .............................................................................................................................. 17-3
17.3.2 SNMP Traps.................................................................................................................................... 17-3
17.3.3 Configuring SNMP ......................................................................................................................... 17-3
17.3.4 Setting Up Login Accounts............................................................................................................. 17-4
17.4 Service Access Control ........................................................................................................................... 17-6
17.5 Remote Management.............................................................................................................................. 17-6
Chapter 18 Queuing Method ............................................................................................................................................18-1
18.1 Introduction to Queuing ........................................................................................................................... 18-1
18.1.1 Strictly Priority................................................................................................................................ 18-1
18.1.2 Weighted Fair Scheduling............................................................................................................... 18-1
18.2 Configuring Queuing ............................................................................................................................... 18-1
Chapter 19 Classifier ........................................................................................................................................................19-1
19.1 About the Classifier and QoS .................................................................................................................. 19-1
19.2 Configuring the Classifier ........................................................................................................................ 19-1
19.3 Viewing and Editing Classifier Configuration........................................................................................... 19-4
19.4 Classifier Example................................................................................................................................... 19-5
Chapter 20 Policy Rule .....................................................................................................................................................20-1
20.1 About Policy Rules .................................................................................................................................. 20-1
20.1.1 DiffServ........................................................................................................................................... 20-1
20.1.2 DSCP and Per-Hop Behavior.......................................................................................................... 20-1
20.2 Configuring Policy Rules ......................................................................................................................... 20-1
20.3 Viewing and Editing Policy Configuration................................................................................................ 20-4
20.4 Policy Example ........................................................................................................................................ 20-5