Table of Contents
GS2200-24 User’s Guide
15
16.1 Overview ......................................................................................................................... 153
16.1.1 What You Can Do .................................................................................................. 153
16.2 Port Mirroring Setup ........................................................................................................ 154
Chapter 17Link Aggregation .................................................................................................................. 157
17.1 Overview ......................................................................................................................... 157
17.1.1 What You Can Do .................................................................................................. 157
17.1.2 What You Need to Know ........................................................................................ 157
17.2 Link Aggregation Status ................................................................................................... 159
17.3 Link Aggregation Setting ............................................................................................... 161
17.4 Link Aggregation Control Protocol ................................................................................ 163
17.5 Technical Reference ........................................................................................................ 164
17.5.1 Static Trunking Example ......................................................................................... 164
Chapter 18Port Authentication............................................................................................................... 167
18.1 Overview ......................................................................................................................... 167
18.1.1 What You Can Do .................................................................................................. 167
18.1.2 What You Need to Know ........................................................................................ 167
18.2 Port Authentication Configuration .................................................................................... 168
18.3 Activate IEEE 802.1x Security ..................................................................................... 169
Chapter 19Port Security.......................................................................................................................... 171
19.1 Overview ......................................................................................................................... 171
19.1.1 What You Can Do .................................................................................................. 171
19.2 Port Security Setup .......................................................................................................... 172
Chapter 20Classifier................................................................................................................................ 175
20.1 Overview .......................................................................................................................... 175
20.1.1 What You Can Do .................................................................................................. 175
20.1.2 What You Need to Know ........................................................................................ 175
20.2 Configuring the Classifier ............................................................................................... 176
20.2.1 Viewing and Editing Classifier Configuration ........................................................ 178
20.3 Classifier Example ........................................................................................................... 180
Chapter 21 Policy Rule............................................................................................................................ 181
21.1 Policy Rules Overview .................................................................................................... 181
21.1.1 What You Can Do .................................................................................................. 181
21.2 Configuring Policy Rules ................................................................................................. 181