Lacp system config, 14 802.1x configuration, Onfiguration – MicroNet Technology SP1659P User Manual

Page 45

Advertising
background image

y

Key:

Show the key value of the aggregator. The key value is determined by the LACP protocol entity and

can’t be set through management.

y

Trunk Status:

Show the trunk status of a single member port.”---“ means “not ready”

3.13.3 LACP

System

Config

It is used to set the priority part of the LACP system ID. LACP will only aggregate together the ports whose

peer link partners are all on a single system. Each system supports LACP will be assigned a globally unique

System Identifier for this purpose. A system ID is a 64-bit field comprising a 48-bit MAC Address and 16-bit

priority value.

Parameter description:

y

System Priority:

The System Priority can be set by the user. Its range is from 1 to 65535. Default: 32768.

y

Hash Method:

DA+SA, DA and SA are three Hash methods offered for the Link Aggregation of the switch. Packets

will decide the path to transmit according to the mode of Hash you choose.

Default: DA and SA

3.14 802.1x Configuration

802.1x port-based access control provides a method to restrict users to access network resources via

authenticating user’s information. This restricts users from gaining access to the network resources through a

802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1x

control, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization

before sending or receiving any packets from a 802.1x-enabled port.

Before the devices or end stations can access the network resources through the ports under 802.1x control,

the devices or end stations connected to a controlled port send the authentication request to the authenticator,

the authenticator pass the request to the authentication server to authenticate and verify, and the server tell

the authenticator if the request get the grant of authorization for the ports.

According to IEEE802.1x, there are three components implemented. They are Authenticator, Supplicant and

Authentication server shown below.

44

Advertising