Priority

Offset

This parameter is specified if you want to re-write the 802.1p default priority previously set in the Switch, which is used to determine the CoS queue to which packets are forwarded to. Once this field is specified, packets accepted by the Switch that match this priority are forwarded to the CoS queue specified previously by the user.

Replace priority with – Click the corresponding box if you want to re-write the 802.1p default priority of a packet to the value entered in the Priority field, which meets the criteria specified previously in this command, before forwarding it on to the specified CoS queue. Otherwise, a packet will have its incoming 802.1p user priority re-written to its original value before being forwarded by the Switch.

For more information on priority queues, CoS queues and mapping for 802.1p, see the QoS section of this manual.

This field will instruct the Switch to mask the packet header beginning with the offset value specified:

value (0-15)– Enter a value in hex form to mask the packet from the beginning of the packet to the 15th byte. value (16-31)– Enter a value in hex form to mask the packet from byte 16 to byte 31.

value (32-47)– Enter a value in hex form to mask the packet from byte 32 to byte 47. value (48-63)– Enter a value in hex form to mask the packet from byte 48 to byte 63. value (64-79) – Enter a value in hex form to mask the packet from byte 64 to byte 79.

To view the settings of a previously correctly configured rule, click View in the Access Rule Table to view the following screen:

Figure 6- 72.Access Rule Display window (Packet Content Mask)

6-22 Port Access Entity (802.1x)

Understanding 802.1x Port-based and MAC-based Network Access Control

The original intent behind the development of 802.1X was to leverage the characteristics of point-to-point connections associated with UTP based LANs.All single LAN segment in such infrastructures has no more than two devices attached to it, one of which is a Bridge Port.The Bridge Port detects events that indicate the attachment of an active device at the remote end of the link, or an active device becoming inactive.These events can be used to control the authorization state of the Port and initiate the process of authenticating the attached device if the Port is unauthorized.This is the Port-Based Network Access Control.

Allied Telesyn AT-9724TS High-Density Layer 3 Stackable Gigabit Ethernet Switch

84

Page 85
Image 85
Allied Telesis AT-9724TS specifications Priority Offset, Access Rule Display window Packet Content Mask