
Table of Contents
GS2200-24 User’s Guide
15
16.1 Overview ......................................................................................................................... 153
16.1.1 What You Can Do .................................................................................................. 153
16.2 Port Mirroring Setup ........................................................................................................ 154
Chapter 17
Link Aggregation .................................................................................................................. 157
17.1 Overview ......................................................................................................................... 157
17.1.1 What You Can Do .................................................................................................. 157
17.1.2 What You Need to Know ........................................................................................ 157
17.2 Link Aggregation Status ...................................................................................................159
17.3 Link Aggregation Setting ............................................................................................... 161
17.4 Link Aggregation Control Protocol ................................................................................ 163
17.5 Technical Reference ........................................................................................................ 164
17.5.1 Static Trunking Example ......................................................................................... 164
Chapter 18
Port Authentication...............................................................................................................167
18.1 Overview ......................................................................................................................... 167
18.1.1 What You Can Do .................................................................................................. 167
18.1.2 What You Need to Know ........................................................................................ 167
18.2 Port Authentication Configuration .................................................................................... 168
18.3 Activate IEEE 802.1x Security ..................................................................................... 169
Chapter 19
Port Security..........................................................................................................................171
19.1 Overview ......................................................................................................................... 171
19.1.1 What You Can Do .................................................................................................. 171
19.2 Port Security Setup .......................................................................................................... 172
Chapter 20
Classifier................................................................................................................................175
20.1 Overview .......................................................................................................................... 175
20.1.1 What You Can Do .................................................................................................. 175
20.1.2 What You Need to Know ........................................................................................ 175
20.2 Configuring the Classifier ...............................................................................................176
20.2.1 Viewing and Editing Classifier Configuration ........................................................ 178
20.3 Classifier Example ........................................................................................................... 180
Chapter 21
Policy Rule............................................................................................................................ 181
21.1 Policy Rules Overview ....................................................................................................181
21.1.1 What You Can Do .................................................................................................. 181
21.2 Configuring Policy Rules ................................................................................................. 181