Zyxel MGS3520-28F [9/338] Chapter 18 port authentication 44

Zyxel MGS3520-28 [9/338] Chapter 18 port authentication 44
Table of Contents
MES3500/MGS3520 Series User’s Guide
9
17.1 Link Aggregation Overview ..........................................................................................................137
17.2 Dynamic Link Aggregation ...........................................................................................................137
17.2.1 Link Aggregation ID ............................................................................................................138
17.3 Link Aggregation Status ...............................................................................................................138
17.4 Link Aggregation Setting ..............................................................................................................139
17.5 Link Aggregation Control Protocol .............................................................................................141
17.6 Static Trunking Example ...............................................................................................................142
Chapter 18
Port Authentication ..........................................................................................................................144
18.1 Port Authentication Overview .......................................................................................................144
18.1.1 IEEE 802.1x Authentication .................................................................................................144
18.1.2 MAC Authentication .............................................................................................................145
18.2 Port Authentication Configuration .................................................................................................146
18.2.1 Activate IEEE 802.1x Security .........................................................................................146
18.2.2 Guest VLAN ........................................................................................................................148
18.2.3 Activate MAC Authentication ..............................................................................................150
Chapter 19
Port Security .....................................................................................................................................152
19.1 About Port Security .......................................................................................................................152
19.2 Port Security Setup .......................................................................................................................152
Chapter 20
Classifier............................................................................................................................................154
20.1 About the Classifier and QoS ........................................................................................................154
20.2 Configuring the Classifier .............................................................................................................154
20.3 Viewing and Editing Classifier Configuration ................................................................................157
20.4 Classifier Example ........................................................................................................................158
Chapter 21
Policy Rule .......................................................................................................................................160
21.1 Policy Rules Overview .................................................................................................................160
21.1.1 DiffServ ................................................................................................................................160
21.1.2 DSCP and Per-Hop Behavior ..............................................................................................160
21.2 Configuring Policy Rules ...............................................................................................................160
21.3 Viewing and Editing Policy Configuration ......................................................................................162
21.4 Policy Example ..............................................................................................................................163
Chapter 22
Queuing Method ...............................................................................................................................165
22.1 Queuing Method Overview ...........................................................................................................165
22.1.1 Strictly Priority Queuing .......................................................................................................165

Содержание

Похожие устройства

Скачать