LevelOne GTL-2691 User Manual

Page 74

Advertising
background image

C

HAPTER

1

| Introduction

Description of Software Features

– 74 –

R

ATE

L

IMITING

This feature controls the maximum rate for traffic transmitted or received

on an interface. Rate limiting is configured on interfaces at the edge of a

network to limit traffic into or out of the network. Packets that exceed the

acceptable amount of traffic are dropped.

P

ORT

M

IRRORING

The switch can unobtrusively mirror traffic from any port to a monitor port.

You can then attach a protocol analyzer or RMON probe to this port to

perform traffic analysis and verify connection integrity.

P

ORT

T

RUNKING

Ports can be combined into an aggregate connection. Trunks can be
manually set up or dynamically configured using Link Aggregation Control

Protocol (LACP – IEEE 802.3-2005). The additional ports dramatically

increase the throughput across any connection, and provide redundancy by

taking over the load if a port in the trunk should fail. The switch supports

up to 13/25 trunks per switch or 32 per stack.

S

TORM

C

ONTROL

Broadcast, multicast and unknown unicast storm suppression prevents

traffic from overwhelming the network. When enabled on a port, the level

of traffic passing through the port is restricted. If traffic rises above a pre-

defined threshold, it will be throttled until the level falls back beneath the

threshold.

S

TATIC

MAC

A

DDRESSES

A static address can be assigned to a specific interface on this switch.

Static addresses are bound to the assigned interface and will not be

moved. When a static address is seen on another interface, the address will

be ignored and will not be written to the address table. Static addresses

can be used to provide network security by restricting access for a known

host to a specific port.

IP A

DDRESS

F

ILTERING

Access to insecure ports can be controlled using DHCP Snooping which

filters ingress traffic based on static IP addresses and addresses stored in

the DHCP Snooping table. Traffic can also be restricted to specific source IP

addresses or source IP/MAC address pairs based on static entries or entries

stored in the DHCP Snooping table.

IEEE 802.1D B

RIDGE

The switch supports IEEE 802.1D transparent bridging. The address table

facilitates data switching by learning addresses, and then filtering or

forwarding traffic based on this information. The address table supports up

to 16K addresses.

S

TORE

-

AND

-F

ORWARD

S

WITCHING

The switch copies each frame into its memory before forwarding them to

another port. This ensures that all frames are a standard Ethernet size and

have been verified for accuracy with the cyclic redundancy check (CRC).

Advertising