16
configure this function for their network spanning tree application.
4. Port Mirror
This switch operates in store-and-forward algorithm so it is not possible to
monitor network traffic from another connection port. But the port mirror
function can copy packets from some monitored port to another port for network
monitor.
5. QoS
For Quality of Service request in a network, packets could be classified to
different forwarding priorities. For real-time network traffic (like video, audio), it
needs higher priority than normal network traffic. With the definition of packet
priority, it could have 8 priority levels (from 0 to 7). This switch supports four
priority level queues on each port. It could be configured for port-based,
802.1P tagged based, or DiffServ of IP packets priority. User can define the
mapping of priority values to the priority queues.
6. Static Mac ID in ARL table
The switch can learn the Mac address from user’s packets and keep these Mac
address in the ARL table for store-and-forward table lookup operation. But
these Mac addresses will be deleted from ARL table after some time when
users do not send any packets to the switch. This operation is called aging and
the time is called aging time. It is about 5 minutes normally (it could be
changed by users.) If users want to keep a Mac address always in ARL table
on some port, they can assign the Mac address to ARL table. These Mac ID
are called Static Mac address. This switch supports static Mac address
assignment. The static Mac address assignment will also limit the Mac
address could be used on the assigned port only with the port security
configuration function. For example, assigning “00-00-e2-11-22-33” to Port 5
will always keep this Mac ID alive on Port 5 but also limit this Mac address could
work on Port 5 only.
Note
: About Static Mac Address Filter-in (port binding) function
There is a “Mac Security Configuration” function for port security. If it is set to
“Accept function”, only these static Mac addresses can access network through
the assigned port. The other Mac addresses will be forbidden for network
access through that port. This function can be used for port binding security
application. Please refer to Section 6.3 for the details of the Mac address filter-
in operation of the switch.
7. Dynamic Mac ID Number Limit
Beside Static Mac ID Limit, there is another Dynamic Mac ID Number Limit
function for Mac address security on port. This function can limit the Mac ID
number to access network through a port. For example, five Mac ID are
allowed for Port 2. That means up to five users are allowed, but don’t care
who the users are. It is done by “Limit by Mac no.” option in “Mac Security
Configuration” function.