User guide
Table Of Contents
- Part1
- Part2
- Part2
- Part3
- Part4
- Part5
- Dynamic Link Aggregation
- Link Aggregation ID
- RADIUS
- Configuring RADIUS Server Settings
- Configuring IEEE802.1x
- Supported MIBs
- SNMP Traps
- Configuring SNMP
- Setting Up Login Accounts
- Requirements for Using SSH
- HTTPS Example
- Internet Explorer Warning Messages
- Netscape Navigator Warning Messages
- Login Screen
- Strict Priority Queuing (SPQ)
- Weighted Round Robin Scheduling (WRR)
- DiffServ
- DSCP and Per-Hop Behavior
- DHCP “Relay Agent Information Option”
- DHCP Relay Agent Circuit ID Sub-option Format
- Part6
- Part7
- Switch Configuration File
- Access Priority
- The Console Port
- Telnet
- List of Available Commands
- Detailed Command Information
- Logging Out
- User Mode
- Enable Mode
- Configure Mode
- config-vlan Commands
- interface Commands
- show system-information
- show hardware-monitor
- show ip
- show logging
- show interface
- show mac address-table
- Backing up Configuration
- Restoring Configuration
- Using a Different Configuration File
- Resetting to the Factory Default
- no mirror-port
- no https timeout
- no trunk
- no port-access-authenticator
- no ssh
- interface
- bpdu-control
- broadcast-limit
- bandwidth-limit
- mirror
- gvrp
- ingress-check
- frame-type
- vlan-trunking
- spq
- wrr
- egress set
- qos priority
- name
- speed-duplex
- Static Entries (SVLAN Table)
- Dynamic Entries (DVLAN Table)
- GARP Status
- GARP Timer
- GVRP Timer
- Enable GVRP
- Disable GVRP
- Set Port VID
- Set Acceptable Frame Type
- Enable or Disable Port GVRP
- Modify Static VLAN
- Delete VLAN ID

Dimension GS-3012 Gigabit Ethernet Switch
Table of Contents ix
13.1 Introduction to Port Mirroring............................................................................................................... 13-1
13.2 Port Mirroring Configuration ................................................................................................................ 13-1
Chapter 14 Link Aggregation.......................................................................................................................... 14-1
14.1 Introduction to Link Aggregation.......................................................................................................... 14-1
14.2 Link Aggregation Protocol Status ........................................................................................................ 14-2
14.3 Link Aggregation Setup ....................................................................................................................... 14-3
Chapter 15 Port Authentication ...................................................................................................................... 15-1
15.1 Introduction to Authentication.............................................................................................................. 15-1
15.2 Configuring Port Authentication........................................................................................................... 15-1
Chapter 16 Port Security ................................................................................................................................ 16-1
16.1 About Port Security ............................................................................................................................. 16-1
16.2 Port Security Setup.............................................................................................................................. 16-1
Chapter 17 Access Control ............................................................................................................................ 17-1
17.1 About Access Control.......................................................................................................................... 17-1
17.2 Access Control Overview .................................................................................................................... 17-1
17.3 About SNMP........................................................................................................................................ 17-2
17.4 SSH Overview ..................................................................................................................................... 17-5
17.5 How SSH works................................................................................................................................... 17-6
17.6 SSH Implementation ........................................................................................................................... 17-6
17.7 Introduction to HTTPS......................................................................................................................... 17-7
17.8 Service Access Control ..................................................................................................................... 17-10
17.9 Remote Management........................................................................................................................ 17-11
Chapter 18 Queuing Method.......................................................................................................................... 18-1
18.1 Introduction to Queuing ....................................................................................................................... 18-1
18.2 Configuring Queuing ........................................................................................................................... 18-2
Chapter 19 Classifier...................................................................................................................................... 19-1
19.1 About the Classifier and QoS .............................................................................................................. 19-1
19.2 Configuring the Classifier .................................................................................................................... 19-1
19.3 Viewing and Editing Classifier Configuration ...................................................................................... 19-4
19.4 Classifier Example............................................................................................................................... 19-5
Chapter 20 Policy Rule................................................................................................................................... 20-1
20.1 About Policy Rules .............................................................................................................................. 20-1