
Dimension ES-3124 Ethernet Switch 
Table of Contents ix 
Chapter 13 Mirroring.........................................................................................................................................................13-1 
13.1 Introduction to Port Mirroring................................................................................................................... 13-1 
13.2 Port Mirroring Configuration .................................................................................................................... 13-1 
Chapter 14 Link Aggregation ...........................................................................................................................................14-1 
14.1 Introduction to Link Aggregation.............................................................................................................. 14-1 
14.1.1 Dynamic Link Aggregation............................................................................................................. 14-1 
14.1.2 Link Aggregation ID ....................................................................................................................... 14-1 
14.2 Link Aggregation Protocol Status ............................................................................................................ 14-2 
14.3 Link Aggregation Setup ........................................................................................................................... 14-3 
Chapter 15 Port Authentication .......................................................................................................................................15-1 
15.1 Introduction to Authentication .................................................................................................................. 15-1 
15.1.1 RADIUS.......................................................................................................................................... 15-1 
15.2 Configuring Port Authentication............................................................................................................... 15-1 
15.2.1 Configuring RADIUS Server Settings ............................................................................................ 15-2 
15.2.2 Configuring IEEE802.1x................................................................................................................. 15-2 
Chapter 16 Port Security ..................................................................................................................................................16-1 
16.1 About Port Security ................................................................................................................................. 16-1 
16.2 Port Security Setup.................................................................................................................................. 16-1 
Chapter 17 Access Control ..............................................................................................................................................17-1 
17.1 About Access Control .............................................................................................................................. 17-1 
17.2 Access Control Overview ........................................................................................................................ 17-1 
17.3 About SNMP............................................................................................................................................ 17-2 
17.3.1 Supported MIBs .............................................................................................................................. 17-3 
17.3.2 SNMP Traps.................................................................................................................................... 17-3 
17.3.3 Configuring SNMP ......................................................................................................................... 17-3 
17.3.4 Setting Up Login Accounts............................................................................................................. 17-4 
17.4 Service Access Control ........................................................................................................................... 17-6 
17.5 Remote Management.............................................................................................................................. 17-6 
Chapter 18 Queuing Method ............................................................................................................................................18-1 
18.1 Introduction to Queuing ........................................................................................................................... 18-1 
18.1.1 Strictly Priority................................................................................................................................ 18-1 
18.1.2 Weighted Fair Scheduling............................................................................................................... 18-1 
18.2 Configuring Queuing ............................................................................................................................... 18-1 
Chapter 19 Classifier ........................................................................................................................................................19-1 
19.1 About the Classifier and QoS .................................................................................................................. 19-1 
19.2 Configuring the Classifier ........................................................................................................................ 19-1 
19.3 Viewing and Editing Classifier Configuration........................................................................................... 19-4 
19.4 Classifier Example................................................................................................................................... 19-5 
Chapter 20 Policy Rule .....................................................................................................................................................20-1 
20.1 About Policy Rules .................................................................................................................................. 20-1 
20.1.1 DiffServ........................................................................................................................................... 20-1 
20.1.2 DSCP and Per-Hop Behavior.......................................................................................................... 20-1 
20.2 Configuring Policy Rules ......................................................................................................................... 20-1 
20.3 Viewing and Editing Policy Configuration................................................................................................ 20-4 
20.4 Policy Example ........................................................................................................................................ 20-5