Product Manual
Product Manual
Product Manual
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
DES-3526 / DES-3526DC Fast Ethernet Layer 2 Switch<br />
Traffic or storm control is used to stop broadcast, multicast or ARP request storms that may result<br />
when a loop is created. The Destination Look Up Failure control is a method of shutting down a loop<br />
when a storm is formed because a MAC address cannot be located in the Switch's forwarding database<br />
and it must send a packet to all ports or all ports on a VLAN.<br />
To configure Traffic Control, first select a group of ports by using the Group pull-down menu. As seen<br />
in the figure above, this section is set by 5 specified groups of ports on the Switch.<br />
• Group 1 refers to ports 1 through 8;<br />
• Group 2 refers to ports 9 through 16;<br />
• Group 3 refers to ports 17 through 24;<br />
• Group 4 refers to mini GBIC port 25;<br />
• Group 5 refers to mini GBIC port 26.<br />
Broadcast Storm, Multicast Storm and Destination Unknown may be Enabled or Disabled for either<br />
group.<br />
The Threshold value is the upper threshold at which the specified traffic control is switched on. This is<br />
the number of Broadcast, Multicast or DLF packets, in Kbps, received by the Switch that will trigger<br />
the storm traffic control measures. The Threshold value can be set from 0 to 255 packets. The default<br />
setting is 128. The settings of each port may be viewed in the Traffic Control Table in the same<br />
window. Click Apply to implement changes made.<br />
Port Security<br />
A given port's (or a range of ports') dynamic MAC address learning can be locked such that the current<br />
source MAC addresses entered into the MAC address forwarding table can not be changed once the<br />
port lock is enabled. Using the Admin State pull-down menu to Enabled, and clicking Apply can lock<br />
the port.<br />
Port Security is a security feature that prevents unauthorized computers (with source MAC addresses)<br />
unknown to the Switch prior to locking the port (or ports) from connecting to the Switch's locked ports<br />
and gaining access to the network.<br />
70