D-Link DES-3018 Switch User Manual


 
IGMP Snooping
........................................................................................................................................................................... 97
Static Router Ports Settings...........................................................................................................................................................................99
IGMP Access Control Settings ...................................................................................................................................................................100
Spanning Tree............................................................................................................................................................................ 101
802.1w Rapid Spanning Tree.................................................................................................................................................................101
Port Transition States.............................................................................................................................................................................101
Edge Port...............................................................................................................................................................................................102
P2P Port.................................................................................................................................................................................................102
802.1D and 802.1w Compatibility.........................................................................................................................................................102
STP Bridge Global Settings........................................................................................................................................................................102
STP Port Settings........................................................................................................................................................................................105
Loopback Detection................................................................................................................................................................... 107
CoS ................................................................................................................................................................109
CoS............................................................................................................................................................................................. 109
IEEE 802.1p Priority...................................................................................................................................................................................109
The Advantages of CoS ..............................................................................................................................................................................110
Understanding CoS.....................................................................................................................................................................................111
Port Bandwidth...........................................................................................................................................................................................112
802.1p Default Priority ...............................................................................................................................................................................114
802.1p User Priority....................................................................................................................................................................................115
CoS Scheduling Mechanism.......................................................................................................................................................................115
CoS Output Scheduling...............................................................................................................................................................................116
Priority Settings ..........................................................................................................................................................................................117
TOS Priority Settings..................................................................................................................................................................................118
DSCP Priority Settings................................................................................................................................................................................119
Port Mapping Priority Settings....................................................................................................................................................................120
MAC Priority Settings ................................................................................................................................................................................121
CPU Interface Filtering...............................................................................................................................122
CPU Interface Filtering...............................................................................................................................122
CPU Interface Filtering State Settings ........................................................................................................................................................122
CPU Interface Filtering Table.....................................................................................................................................................................122
Security .........................................................................................................................................................133
Traffic Control ........................................................................................................................................................................... 133
Port Security............................................................................................................................................................................... 137
Port Lock Entries ....................................................................................................................................................................... 139
802.1X........................................................................................................................................................................................ 140
802.1X Port-Based and MAC-Based Access Control.................................................................................................................................140
Authentication Server............................................................................................................................................................................141
Authenticator.........................................................................................................................................................................................141
Client .....................................................................................................................................................................................................142
Authentication Process ..........................................................................................................................................................................143
Understanding 802.1X Port-based and MAC-based Network Access Control ...........................................................................................144
Port-Based Network Access Control...........................................................................................................................................................144
MAC-Based Network Access Control........................................................................................................................................................145
802.1X Authenticator Settings....................................................................................................................................................................146