ZyXEL Communications MES-3528 User Manual page 49

Layer 2+ metro ethernet switch
Hide thumbs Also See for MES-3528:
Table of Contents

Advertisement

Table 4 Navigation Panel Links (continued)
LINK
Static MAC
Forwarding
Static
Multicast
Forwarding
Filtering
Spanning Tree
Protocol
Bandwidth
Control
Broadcast
Storm Control
Mirroring
Link
Aggregation
Port
Authentication
Port Security
Classifier
Policy Rule
Queuing
Method
VLAN Stacking
Multicast
AAA
IP Source
Guard
Loop Guard
Layer 2
Protocol
Tunneling
IP Application
MES-3528 User's Guide
DESCRIPTION
This link takes you to a screen where you can configure static MAC
addresses for a port. These static MAC addresses do not age out.
This link takes you to a screen where you can configure static multicast
MAC addresses for port(s). These static multicast MAC addresses do not
age out.
This link takes you to a screen to set up filtering rules.
This link takes you to screens where you can configure the RSTP/MRSTP/
MSTP to prevent network loops.
This link takes you to a screen where you can configure bandwidth limits
on the Switch.
This link takes you to a screen to set up broadcast filters.
This link takes you to screens where you can copy traffic from one port
or ports to another port in order that you can examine the traffic from
the first port without interference.
This link takes you to screens where you can logically aggregate physical
links to form one logical, higher-bandwidth link.
This link takes you to a screen where you can configure IEEE 802.1x port
authentication for clients communicating via the Switch.
This link takes you to screens where you can activate MAC address
learning and set the maximum number of MAC addresses to learn on a
port.
This link takes you to a screen where you can configure the Switch to
group packets based on the specified criteria.
This link takes you to a screen where you can configure the Switch to
perform special treatment on the grouped packets.
This link takes you to a screen where you can configure queuing with
associated queue weights for each port.
This link takes you to screens where you can configure VLAN stacking.
This link takes you to screens where you can configure various multicast
features, IGMP snooping and create multicast VLANs.
This link takes you to a screen where you can configure authentication,
authorization and accounting services via external servers. The external
servers can be either RADIUS (Remote Authentication Dial-In User
Service) or TACACS+ (Terminal Access Controller Access-Control System
Plus).
This link takes you to screens where you can configure filtering of
unauthorized DHCP and ARP packets in your network.
This link takes you to a screen where you can configure protection
against network loops that occur on the edge of your network.
This link takes you to a screen where you can configure L2PT (Layer 2
Protocol Tunneling) settings on the Switch.
Chapter 4 The Web Configurator
49

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents