Operation Manual
Vigor2832 Series User’s Guide
128
I
I
I
I
-
-
2
2
-
-
4
4
L
L
A
A
N
N
P
P
o
o
r
r
t
t
M
M
i
i
r
r
r
r
o
o
r
r
LAN port mirror can be applied for the users in LAN. Generally speaking, this function copies
traffic from one or more specific ports to a target port. This mechanism helps manager track
the network errors or abnormal packets transmission without interrupting the flow of data
access the network. By the way, user can apply this function to monitor all traffics which user
needs to check.
There are some advantages supported in this feature. First, it is more economical without
other detecting equipments to be set up. Second, it may be able to view traffic on one or
more ports within a VLAN at the same time. Third, it can transfer all data traffics to be
mirrored to one analyzer connecting to the mirroring port. Last, it is more convenient and
easy to configure in user’s interface.
Available settings are explained as follows:
Item Description
Port Mirror Check Enable to activate this function. Or, check Disable to
close this function.
Mirror Port Select a port to view traffic sent from mirrored ports.
Mirrored Tx Port Select which ports are necessary to be mirrored for
transmitting the packets.
Mirrored Rx Port Select which ports are necessary to be mirrored for receiving
the packets.
After finishing all the settings here, please click OK to save the configuration.
I
I
I
I
-
-
2
2
-
-
5
5
W
W
i
i
r
r
e
e
d
d
8
8
0
0
2
2
.
.
1
1
x
x
IEEE 802.1x is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the
IEEE 802.1 group of networking protocols. It provides an authentication mechanism for the
device that is attached to a LAN or WLAN.
Wired 802.1x provides authentication for one network device on each LAN port. The RADIUS
Server settings must be configured before enabling 802.1x because the EAP (Extensible
Authentication Protocol) Authenticator relies on the RADIUS Server in its authentication
process. Each LAN port with Wired 802.1x configured will only forward 802.1x packets and
block all other packets until the authentication has successfully completed.