User's Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.3 Port Management
- 4.4 Link Aggregation
- 4.5 VLAN
- 4.6 Spanning Tree Protocol
- 4.7 Multicast
- 4.8 Quality of Service
- 4.9 Security
- 4.10 ACL
- 4.11 MAC Address Table
- 4.12 LLDP
- 4.13 Diagnostics
- 4.14 Power over Ethernet
- 4.15 RMON
- 4.16 Maintenance
- 5. COMMAND LINE INTERFACE
- 6. Command Line Mode
- 6.1 User Mode Commands
- 6.2 Privileged Mode Commands
- 6.2.1 clear command
- 6.2.2 clock command
- 6.2.3 configure command
- 6.2.4 copy command
- 6.2.5 debug command
- 6.2.6 delete command
- 6.2.7 disable command
- 6.2.8 end command
- 6.2.9 exit command
- 6.2.10 no command
- 6.2.11 ping command
- 6.2.12 reboot command
- 6.2.13 renew command
- 6.2.14 restore-defaults command
- 6.2.15 save command
- 6.2.16 show command
- 6.2.17 ssl command
- 6.2.18 traceroute command
- 6.2.19 udld command
- 6.3 Global Config Mode Commands
- 6.3.1 aaa Command
- 6.3.2 boot Command
- 6.3.3 bridge Command
- 6.3.4 class-map Command
- 6.3.5 clock Command
- 6.3.6 dos Command
- 6.3.7 dot1x Command
- 6.3.8 do Command
- 6.3.9 enable Command
- 6.3.10 end Command
- 6.3.11 errdisable Command
- 6.3.12 exit Command
- 6.3.13 gvrp Command
- 6.3.14 hostname Command
- 6.3.15 interface Command
- 6.3.16 ip Command
- 6.3.17 ipv6 Command
- 6.3.18 jumbo-frame Command
- 6.3.19 l2 Command
- 6.3.20 lacp Command
- 6.3.21 lag Command
- 6.3.22 line Command
- 6.3.23 lldp Command
- 6.3.24 logging Command
- 6.3.25 mac Command
- 6.3.26 management-VLAN Command
- 6.3.27 mirror Command
- 6.3.28 no Command
- 6.3.29 policy-map Command
- 6.3.30 port-security Command
- 6.3.31 qos Command
- 6.3.32 radius Command
- 6.3.33 rate-limit Command
- 6.3.34 rmon Command
- 6.3.35 Snmp Command
- 6.3.36 sntp Command
- 6.3.37 spanning-tree Command
- 6.3.38 storm-control Command
- 6.3.39 system Command
- 6.3.40 tacacs Command
- 6.3.41 udld Command
- 6.3.42 username Command
- 6.3.43 vlan Command
- 6.3.44 voice-vlan Command
- 7. SWITCH OPERATION
- 8. POWER OVER ETHERNET OVERVIEW
- 9. TROUBLESHOOTING
- APPENDIX A
- EC Declaration of Conformity
User’s Manual of GS-4210-24P2S
4.8.2.3 Queue Settings........................................................................................................................................167
4.8.2.4 CoS Mapping...........................................................................................................................................168
4.8.2.5 DSCP Mapping........................................................................................................................................169
4.8.2.6 IP Precedence Mapping ..........................................................................................................................172
4.8.3 QoS Basic Mode................................................................................................................................................174
4.8.3.1 Global Settings ........................................................................................................................................174
4.8.3.2 Port Settings............................................................................................................................................175
4.8.4 QoS Advanced Mode.........................................................................................................................................177
4.8.4.1 Global Settings ........................................................................................................................................177
4.8.4.2 Class Mapping.........................................................................................................................................178
4.8.4.3 Aggregate Police .....................................................................................................................................179
4.8.4.4 Policy Table .............................................................................................................................................180
4.8.4.5 Policy Class Maps ...................................................................................................................................181
4.8.4.6 Policy Binding ..........................................................................................................................................183
4.8.5 Rate Limit ..........................................................................................................................................................185
4.8.5.1 Ingress Bandwidth Control ......................................................................................................................185
4.8.5.2 Ingress VLAN Settings ............................................................................................................................187
4.8.5.3 Egress Bandwidth Control .......................................................................................................................188
4.8.5.4 Egress Queue Settings............................................................................................................................190
4.9 Security .....................................................................................................................................................192
4.9.1 Storm Control.....................................................................................................................................................192
4.9.1.1 Global Setting ..........................................................................................................................................192
4.9.1.2 Port Setting..............................................................................................................................................193
4.9.2 802.1X ...............................................................................................................................................................195
4.9.2.1 Understanding IEEE 802.1X Port-based Authentication..........................................................................196
4.9.2.2 802.1X Setting .........................................................................................................................................199
4.9.2.3 802.1X Port Setting .................................................................................................................................200
4.9.2.4 Guest VLAN Setting ................................................................................................................................202
4.9.2.5 Authenticed Host .....................................................................................................................................205
4.9.3 DHCP Snooping ................................................................................................................................................206
4.9.3.1 DHCP Snooping Overview ......................................................................................................................206
4.9.3.2 Global Setting ..........................................................................................................................................207
4.9.3.3 VLAN Setting...........................................................................................................................................208
4.9.3.4 Port Setting..............................................................................................................................................210
4.9.3.5 Statistics ..................................................................................................................................................212
4.9.3.6 Rate Limit ................................................................................................................................................213
4.9.3.7 Option82 Global Setting ..........................................................................................................................215
4.9.3.8 Option82 Port Setting ..............................................................................................................................216
4.9.3.9 Option82 Circuit-ID Setting......................................................................................................................218
4.9.4 Port Security ......................................................................................................................................................219
6