User`s manual
EDR-G903/G902 Features and Functions
3-56
The EtherDevice Router will manage the
bandwidth for outgoing packets. Based on the
four outgoing policies below, when the source
IP of the Ethernet traffic matches the
outgoing policies, the maximum bandwidth
for a packet sent from these source IP
addresses will be reserved by its target
priority.
If there are only two kinds of traffic packets,
priority 0 and priority 1, then transmission
will proceed from LAN to WAN1, and the
EtherDevice Router will reserve the minimum
bandwidth (10 KBytes/s and 20 Kbyte/s)
based on these two different IP addresses. In
this case, there are still 100 KBytes/s - 10
KBytes/s - 20 KBytes/s = 70 KBytes/s that do not belong to any priority. So, the EtherDevice Router will
increase the bandwidth from highest priority (0) to lowest priority (3). The EtherDevice Router will add this
70 KBytes/s bandwidth to priority 0 because the maximum bandwidth of priority 0 is 100 KBytes/s. The
following figure shows the bandwidth arrangement of the EtherDevice Router based on this configuration.
Configuring SNMP
The EtherDevice Router supports SNMP V1/V2c/V3. SNMP V1 and SNMP V2c use a community string match for
authentication, which means that SNMP servers access all objects with read-only permissions using the
community string public (default value). SNMP V3, which requires that the user selects an authentication level
of MD5 or SHA, is the most secure protocol. You can also enable data encryption to enhance data security.
SNMP security modes and security levels supported by the EtherDevice Router are shown in the following table.
Select the security mode and level that will be used to communicate between the SNMP agent and manager.
Protocol
Version
UI Setting Authentication Type Data Encryption Method
SNMP V1, V2c V1, V2c Read
Community
Community string No Uses a community string
match for authentication
SNMP V3 MD5 or SHA Authentication based
on MD5 or SHA
No Provides authentication based
on HMAC-MD5, or HMAC-SHA
algorithms. 8-character
passwords are the minimum
requirement for
authentication.
MD5 or SHA Authentication based
on MD5 or SHA
Data encryption
key
Provides authentication based
onHMAC-MD5 or HMAC-SHA
algorithms, and data
encryption key. 8-character
passwords and a data
encryption key are the
minimum requirements for
authentication and
encryption.
These parameters are configured on the SNMP page. A more detailed explanation of each parameter is given
below.










