LevelOne GSW-2690 user manual Security

Models: GSW-2690

1 265
Download 265 pages 25.84 Kb
Page 118
Image 118

User Manual

3-14. Security

Function name:

Mirror Configuration

Function description:

Mirror Configuration is to monitor the traffic of the network. For example, we assume that Port A and Port B are Monitoring Port and Monitored Port respectively, thus, the traffic received by Port B will be copied to Port A for monitoring.

Parameter description:

Mode:

Used for the activation or de-activation of Port Mirror function. Default is disable.

Monitoring Port:

Set up the port for monitoring. Valid port is Port 1~26 and default is Port 1.

Monitored Ingress Port:

Set up the port for being monitored. It only monitor the packets received by the port you set up. Just tick the check box ( ) beside the port x and valid port is Port 1~26.

Monitored Egress Port:

Set up the port for being monitored. It only monitor the packets transmitted by the port you set up. Just tick the check box ( ) beside the port x and valid port is Port 1~26.

Fig. 3-55

Publication date: June, 2005

Revision A1

114

Page 118
Image 118
LevelOne GSW-2690 user manual Security