XS712T Smart Switch
8.Configure the Policy attributes as follows:
•Assign Queue. 3
•Policy Attribute. Simple Policy
•Color Mode. Color Blind
•Committed Rate. 1000000 Kbps
•Committed Burst Size. 128 KB
•Confirm Action. Send
•Violate Action. Drop
For additional information about this screen, see Policy Configuration on page 166.
9.From the Service Configuration screen, select the check box next to interfaces g7 and g8 to attach the policy to these interfaces, and then click Apply (see Service Configuration on page 169).
All UDP packet flows destined to the 192.12.2.0 network with an IP source address from the
192.12.1.0network that have a Layer 4 Source port of 4567 and Destination port of 4568 from this switch on ports 7 and 8 are assigned to hardware queue 3.
On this network, traffic from streaming applications uses UDP port 4567 as the source and 4568 as the destination. This
Also the confirmed action on this flow is to send the packets with a committed rate of 1,000,000 Kbps and burst size of 128 KB. Packets that violate the committed rate and burst size are dropped.
802.1X
Local Area Networks (LANs) are often deployed in environments that permit unauthorized devices to be physically attached to the LAN infrastructure, or permit unauthorized users to attempt to access the LAN through equipment already attached. In such environments, it can be desirable to restrict access to the services offered by the LAN to those users and devices that are permitted to use those services.
The IEEE 802.11 standard describes an architectural framework within which authentication and consequent actions take place. It also establishes the requirements for a protocol between the authenticator (the system that passes an authentication request to the authentication server) and the supplicant (the system that requests authentication), as well as between the authenticator and the authentication server.