A SERVICE OF

logo

Table of Contents
GS1510 Series User’s Guide
14
14.1 Overview ........................................................................................................................... 81
14.2 What You Need to Know .................................................................................................... 81
14.3 Loop Guard ........................................................................................................................ 83
Chapter 15
QoS...........................................................................................................................................85
15.1 Overview ........................................................................................................................... 85
15.2 What You Can Do .............................................................................................................. 85
15.3 What You Need to Know .................................................................................................... 85
15.3.1 Queuing algorithms .................................................................................................. 85
15.3.2 QoS Enhancement ................................................................................................... 86
15.4 Port Priority ........................................................................................................................ 86
15.5 IP DiffServ (DSCP) ............................................................................................................ 87
15.5.1 Differentiated Services Code Point (DSCP) ............................................................. 88
15.6 Priority/Queue Mapping ..................................................................................................... 89
15.7 Queuing Method ................................................................................................................ 90
Chapter 16
Storm Control..........................................................................................................................93
16.0.1 Broadcast Storm Control Setup ............................................................................... 93
Chapter 17
Spanning Tree Protocol..........................................................................................................95
17.1 Overview .......................................................................................................................... 95
17.2 What You Can DO ............................................................................................................. 95
17.3 What You Need to Know .................................................................................................... 95
17.3.1 STP Terminology ..................................................................................................... 96
17.3.2 How STP Works ...................................................................................................... 96
17.4 General Settings ................................................................................................................ 97
17.5 STP Status Screen ........................................................................................................... 98
Part IV: Security and Management ..................................................... 101
Chapter 18
IP Source Guard....................................................................................................................103
18.1 Overview .......................................................................................................................... 103
18.2 What You Can Do ............................................................................................................ 103
18.3 What You Need To Know ................................................................................................. 103
18.3.1 DHCP Snooping Overview ..................................................................................... 104
18.3.2 ARP Inspection Overview ...................................................................................... 105
18.4 DHCP Snooping .............................................................................................................. 107