![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/c/79/c79d3c0a-9d0d-45c3-b54b-d36dbb83b969/c79d3c0a-9d0d-45c3-b54b-d36dbb83b969-bgf.png)
Table of Contents
MGS-3712/MGS-3712F User’s Guide
15
17.2 Dynamic Link Aggregation .............................................................................................. 155
17.2.1 Link Aggregation ID ............................................................................................... 156
17.3 Link Aggregation Status ..................................................................................................157
17.4 Link Aggregation Setting ................................................................................................ 159
17.5 Link Aggregation Control Protocol ................................................................................ 161
17.6 Static Trunking Example .................................................................................................. 162
Chapter 18
Port Authentication...............................................................................................................165
18.1 Port Authentication Overview ......................................................................................... 165
18.1.1 IEEE 802.1x Authentication ................................................................................... 165
18.1.2 MAC Authentication ............................................................................................... 166
18.2 Port Authentication Configuration .................................................................................... 167
18.2.1 Activate IEEE 802.1x Security ........................................................................... 168
18.2.2 Activate MAC Authentication ................................................................................. 169
Chapter 19
Port Security..........................................................................................................................171
19.1 About Port Security ......................................................................................................... 171
19.2 Port Security Setup .......................................................................................................... 172
19.3 VLAN MAC Address Limit .............................................................................................. 174
Chapter 20
Classifier................................................................................................................................177
20.1 About the Classifier and QoS .......................................................................................... 177
20.2 Configuring the Classifier ...............................................................................................177
20.3 Viewing and Editing Classifier Configuration ................................................................... 180
20.4 Classifier Example ........................................................................................................... 182
Chapter 21
Policy Rule............................................................................................................................185
21.1 Policy Rules Overview ....................................................................................................185
21.1.1 DiffServ .................................................................................................................. 185
21.1.2 DSCP and Per-Hop Behavior ................................................................................. 185
21.2 Configuring Policy Rules ................................................................................................. 186
21.3 Viewing and Editing Policy Configuration ........................................................................ 189
21.4 Policy Example ................................................................................................................ 191
Chapter 22
Queuing Method....................................................................................................................193
22.1 Queuing Method Overview ............................................................................................. 193
22.1.1 Strictly Priority Queuing .......................................................................................... 193
22.1.2 Weighted Fair Queuing .......................................................................................... 193