Niveo Professional NGS16TP User Manual
Page 15

11
NIVEO PROFESSIONAL Gigabit Management Switch
User's Manual
4. Port Mirror
This switch operates in store-and-forward algorithm so it is not possible to monitor
network traffic from another connection port. But the port mirror function can copy
packets from some monitored port to another port for network monitor.
5. QoS
For Quality of Service request in a network, packets could be classified to different
forwarding priorities. For real-time network traffic (like video, audio), it needs higher
priority than normal network traffic. With the definition of packet priority, it could
have 8 priority levels (from 0 to 7). This switch supports four priority level queues on
each port. It could be configured for port-based, 802.1P tagged based, or DiffServ of
IP packets priority. User can define the mapping of priority values to the priority
queues.
6. Static Mac ID in ARL table
The switch can learn the Mac address from user’s packets and keep these Mac address
in the ARL table for store-and-forward table lookup operation. But these Mac
addresses will be deleted from ARL table after some time when users do not send any
packets to the switch. This operation is called aging and the time is called aging time.
It is about 5 minutes normally (it could be changed by users.) If users want to keep a
Mac address always in ARL table on some port, they can assign the Mac address to ARL
table. These Mac ID are called Static Mac address. This switch supports static Mac
address assignment. The static Mac address assignment will also limit the Mac
address could be used on the assigned port only with the port security configuration
function. For example, assigning “00-00-e2-11-22-33” to Port 5 will always keep this
Mac ID alive on Port 5 but also limit this Mac address could work on Port 5 only.
Note: About Static Mac Address Filter-in (port binding) function
There is a “Mac Security Configuration” function for port security. If it is set to
“Accept function”, only these static Mac addresses can access network through the
assigned port. The other Mac addresses will be forbidden for network access through
that port. This function can be used for port binding security application. Please refer
to Section 6.3 for the details of the Mac address filter-in operation of the switch.
7. Dynamic Mac ID Number Limit
Beside Static Mac ID Limit, there is another Dynamic Mac ID Number Limit function for
Mac address security on port. This function can limit the Mac ID number to access
network through a port. For example, five Mac ID are allowed for Port 2. That means
up to five users are allowed, but don’t care who the users are. It is done by “Limit by
Mac no.” option in “Mac Security Configuration” function.
8. IEEE 802.1x Port Security Function
If the 802.1x function is enabled, the switch will act as an authenticator for users
accessing network through the switch. It will need a RADIUS server for the
authentication function. Users will be asked for username and password before