Security - Draytek Vigor VigorAccess Installation Manual

Ip dslam
Hide thumbs Also See for Vigor VigorAccess:
Table of Contents

Advertisement

VigorAccess Installation Guide
Moreover, it also supports for dynamic modification of ORL on ATM and
Ethernet interfaces.
Mapping Table
VigorAccess supports a packet priority to traffic class mapping table supported on a
per egress bridge port.
Multiple Mechanisms
VigorAccess supports two multiple mechanisms as below.
Multiple mechanisms of prioritizing incoming traffic are based on a per-bridge port.
Using Source Port configuration (for untagged packets)
Using Packet Classifier actions
Using priority regeneration table (mapping ingress priority to egress priority)
Combination of the above
Multiple mechanisms of 802.1p re-tagging of outgoing traffic is based on a per
ingress bridge port.
Using Source Port configuration (for untagged packets)
Using Classifier actions
Using priority regeneration table (mapping ingress priority to egress priority)
Combinations of the above
Abilities
VigorAccess can be able to create multiple scheduling profiles, either Strict Priority
or Probabilistic Priority. It also can be able to share the same profile across multiple
(similar) ports.
1
.
1
.
3
S
e
c
u
r
i
t
1
.
1
.
3
S
e
c
u
r
i
t
VigorAccess supports some different methods to implement this feature in following
sections.
Rate Limitation
VigorAccess supports a function for throttling flooded packets. Users can configure
some limited rates by per-port.
Static Mac Address
VigorAccess supports this feature to be configured with certain ports to learn MAC
addresses on a semi-permanent basis. These learned entries would be treated similar
to the static entries, but will not be subject to aging or overwriting. These only may
be deleted explicitly by management or by making the ports, as non-static after
aging will happen normally.
FDB Conflicting Traps
VigorAccess will transmit a trap packet to central manager when any MAC address
moves from one port to another port.
MAC Address Tracking
VigorAccess can be configured to track a global list of MAC addresses. When these
MAC addresses move from one port to another port, a trap is generated. Whether
packets from a particular bridge port should be subjected to this tracking is
configurable. This may be used to prevent denial of service from certain MAC
addresses.
4
y
y

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vigoraccess

Table of Contents