Operation Manual
Table of Contents
GS1920 Series User’s Guide
10
14.1 Bandwidth Control Overview ................................................................................................... 138
14.1.1 What You Can Do ............................................................................................................. 138
14.2 Bandwidth Control Setup .......................................................................................................... 138
Chapter 15
Broadcast Storm Control.................................................................................................................140
15.1 Broadcast Storm Control Overview .........................................................................................140
15.1.1 What You Can Do ............................................................................................................. 140
15.2 Broadcast Storm Control Setup ................................................................................................ 140
Chapter 16
Mirroring............................................................................................................................................142
16.1 Mirroring Overview .................................................................................................................... 142
16.1.1 What You Can Do ............................................................................................................. 142
16.2 Port Mirroring Setup .................................................................................................................... 142
Chapter 17
Link Aggregation .............................................................................................................................144
17.1 Link Aggregation Overview ...................................................................................................... 144
17.1.1 What You Can Do ............................................................................................................. 144
17.1.2 What You Need to Know ................................................................................................. 144
17.2 Link Aggregation Status ............................................................................................................. 145
17.3 Link Aggregation Setting .......................................................................................................... 146
17.3.1 Link Aggregation Control Protocol .............................................................................. 148
17.4 Technical Reference .................................................................................................................. 150
17.4.1 Static Trunking Example ................................................................................................... 150
Chapter 18
Port Authentication..........................................................................................................................152
18.1 Port Authentication Overview ................................................................................................. 152
18.1.1 What You Can Do ............................................................................................................. 152
18.1.2 What You Need to Know ................................................................................................. 152
18.1.3 MAC Authentication ........................................................................................................ 153
18.2 Port Authentication Configuration ........................................................................................... 153
18.3 Activate IEEE 802.1x Security ................................................................................................... 154
18.3.1 Guest VLAN ....................................................................................................................... 155
18.4 Activate MAC Authentication ................................................................................................. 157
18.5 Technical Reference .................................................................................................................. 159
18.5.1 IEEE 802.1x .......................................................................................................................... 159
18.5.2 RADIUS ................................................................................................................................ 159
18.5.3 EAP (Extensible Authentication Protocol) Authentication ........................................... 160
Chapter 19
Port Security......................................................................................................................................162