{"id":6384,"date":"2026-05-04T12:10:36","date_gmt":"2026-05-04T12:10:36","guid":{"rendered":"http:\/\/docs.connexite.co.uk\/index.php\/docs\/connexite-documentation\/synapse-web-ui-documentation\/web-advance\/"},"modified":"2026-05-04T12:19:10","modified_gmt":"2026-05-04T12:19:10","slug":"web-advance","status":"publish","type":"docs","link":"https:\/\/docs.connexite.co.uk\/index.php\/docs\/network\/synapse-web-ui-documentation\/web-advance\/","title":{"rendered":"Advance"},"content":{"rendered":"<h2 class=\"connexite-doc-h2\">LLDP<\/h2>\n<p>4.1.1 Overview<\/p>\n<p>In a heterogeneous network, a standard configuration exchange platform ensures that different types of network devices from different vendors can discover one another and exchange configuration.<\/p>\n<p>The Link Layer Discovery Protocol (LLDP) is specified in IEEE 802.1AB. The protocol operates on the data link layer to exchange device information between directly connected devices. With LLDP, a device sends local device information as TLV (type, length, and value) triplets in LLDP Data Units (LLDPDUs) to the directly connected devices. Local device information includes its system capabilities, management IP address, device ID, port ID, and so on. The device stores the device information in LLDPDUs from the LLDP neighbors in a standard MIB. LLDP enables a network management system to quickly detect and identify Layer 2 network topology changes.<\/p>\n<ul class=\"connexite-doc-list\">\n<li>TLV for PoE-related sections is not supported.<\/li>\n<\/ul>\n<p>4.1.2 Configuring LLDP LLDP global Configuration<\/p>\n<p>Select Advance &gt; Layer2 &gt; LLDP Configuration in the navigation area to enter the Global Configuration page, as shown in Figure 4-1. Table 4-1 describes the Global Configuration items.<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Click enable button behind \u201cStatus\u201d.<\/li>\n<li>Type the boxes behind of the \u201cSystem Name\u201d and \u201cDescription\u201d.<\/li>\n<li>Click Apply button to enable LLDP Configuration.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image126.png\" alt=\"LLDP Global Configuration\" loading=\"lazy\" \/><figcaption>Figure 4-1: LLDP Global Configuration<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-1: LLDP Global Configuration Items<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Status<\/td>\n<td>Disabled: global disable<\/td>\n<\/tr>\n<tr>\n<td>Click to enable<\/td>\n<td>LLDP port setting<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>The LLDP port configuration page appears after global configuration was enabled, as shown in Figure 4-2.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image127.png\" alt=\"LLDP port configuration status\" loading=\"lazy\" \/><figcaption>Figure 4-2: LLDP port configuration status<\/figcaption><\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click Batch Edit button below \u201cport configuration\u201d or Edit button correspond of the port to enter the page for configuring ports, as shown in Figure 4-3. Table 4-2 describes the configuration items of configuring ports.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image128.png\" alt=\"LLDP port status\" loading=\"lazy\" \/><figcaption>Figure 4-3: LLDP port status<\/figcaption><\/figure>\n<h2 class=\"connexite-doc-h2\">Tlvs<\/h2>\n<p>port-vlanid: port&#039;s vlanid ptcl -identity: protocol id vid-digest: vid digest vlan-name: vlan name port-ptcl &#8211; vlanid: port protocol vlanid link- agg mgmt -vid: Link Aggregation Management vid<\/p>\n<h2 class=\"connexite-doc-h2\">Tlvs<\/h2>\n<p>mac-phy: The rate and duplex status supported by the port, whether it supports port rate auto-negotiation, whether the auto-negotiation function is enabled, and the current rate and duplex status max &#8211; mtu -size: maximum mtu value Tx hold Transmission hold, the default value txFastInit is 4, used for packet TTL calculation; TTL= msgTxInterval * msgTxHold + 1 Tx interval Transfer intervals, default is 30 s; admin can change this value to any value between5and 300.<\/p>\n<p>Reinit delay Indicates the amount of delay between when adminStatus becomes &#039; disabled&#039; and when reinitialization is attempted. The default value of reinitDelay is 2 s.<\/p>\n<p>Fast tx Defines the time interval for the timer interval between two transfers within a fast transfer period (ie txFast is not zero). The default value for msgFastTx is 1; administrators can change this value to any value between 1 and 3600.<\/p>\n<p>Tx fast init<\/p>\n<p>This variable is used as the initial value of the txFast variable. This value determines the number of LLDPDUs transmitted during the fast transmission period.<\/p>\n<p>Tx credit max<\/p>\n<p>Configure the maximum value of txCredit. The default value is 5. Administrators can change this value to any value in the range 1 to 10.<\/p>\n<p>View LLDP State<\/p>\n<p>In the current page, click the LLDP State button on the right to enter the LLDP state page, as shown in Figure 4-4, and the specific parameters are described as described in Table 4-3.<\/p>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image129.png\" alt=\"LLDP port statistics\" loading=\"lazy\" \/><figcaption>Figure 4-4: LLDP port statistics<\/figcaption><\/figure>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image13.png\" alt=\"LLDP neighbor information\" loading=\"lazy\" \/><figcaption>Figure 4-5: LLDP neighbor information<\/figcaption><\/figure>\n<h2 class=\"connexite-doc-h2\">IGMP Snooping<\/h2>\n<p>Internet Group Management Protocol Snooping (IGMP snooping) is a multicast constraining mechanism that runs on Layer 2 devices to manage and control multicast groups. 4.2.1 Principle of IGMP snooping<\/p>\n<p>By analyzing received IGMP messages, a Layer 2 device running IGMP snooping establishes mappings between ports and multicast MAC addresses and forwards multicast data based on these mappings. As shown in Figure 4-6, when IGMP snooping is not running on the switch, multicast packets are flooded to all devices at Layer 2. However, when IGMP snooping is running on the switch, multicast packets for known multicast groups are multicast to the receivers, rather than broadcast to all hosts, at Layer 2.<\/p>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image130.png\" alt=\"Multicast forwarding before and after IGMP snooping runs\" loading=\"lazy\" \/><figcaption>Figure 4-6: Multicast forwarding before and after IGMP snooping runs<\/figcaption><\/figure>\n<p>4.2.2 Configure the IGMP Snooping 4.2.2.1 Global Configuration<\/p>\n<p>Select Advance &gt; Layer2 &gt; IGMP Snooping Configuration in the navigation area to enter the Global Configuration page, as shown in Figure 4-7. Table 4-4 describes the IGMP snooping configuration items.<\/p>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image131.png\" alt=\"IGMP Global Configuration\" loading=\"lazy\" \/><figcaption>Figure 4-7: IGMP Global Configuration<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-4: IGMP snooping summary items<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Discard Unknown Multicast<\/td>\n<td>If this option is enabled, unknown multicast traffic will be dropped by switch.<\/td>\n<\/tr>\n<tr>\n<td>TC Suppression<\/td>\n<td>If this option is enabled, topology change event will be ignored by switch<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>4.2.2.2 IGMP Mrouter Interface Configuration<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer2 &gt; IGMP Snooping Configuration in the navigation area to enter the IGMP Mrouter Interface page shown in Figure 4-8. Table 4-5 describes the IGMP Mrouter Interface configuration items.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image132.png\" alt=\"IGMP Mrouter Interface\" loading=\"lazy\" \/><figcaption>Figure 4-8: IGMP Mrouter Interface<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-5: IGMP IGMP Mrouter Interface items<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>VLAN ID<\/td>\n<td>Interface<\/td>\n<\/tr>\n<tr>\n<td>Interface Name.<\/td>\n<\/tr>\n<tr>\n<td>Delete<\/td>\n<td>Click to delete this entry.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click the +Add button to create an IGMP Mrouter Interface, as shown in Figure 4-9. Configure \u2018Vid\u2019, \u2018Interface\u2019, click Ok.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image133.png\" alt=\"Creating IGMP Mrouter Interface\" loading=\"lazy\" \/><figcaption>Figure 4-9: Creating IGMP Mrouter Interface<\/figcaption><\/figure>\n<p>4.2.2.3 IGMP Static Group Configuration<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer2 &gt; IGMP Snooping Configuration in the navigation area to enter the IGMP Static Group page shown in Figure 4-10. Table 4-6 describes the IGMP Static Group configuration items.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image134.png\" alt=\"IGMP Static Group\" loading=\"lazy\" \/><figcaption>Figure 4-10: IGMP Static Group<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-6: IGMP IGMP Static Group items<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>VLAN ID<\/td>\n<td>Group Address<\/td>\n<\/tr>\n<tr>\n<td>Interface name.<\/td>\n<\/tr>\n<tr>\n<td>Delete<\/td>\n<td>Click to delete this entry.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click the +Add button to create an IGMP Static Group, as shown in Figure 4-11. Configure \u2018Vid\u2019, \u2018Group Address\u2019, \u2018Source Address\u2019, \u2018Interface\u2019, click Ok.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image135.png\" alt=\"Creating IGMP Static Group\" loading=\"lazy\" \/><figcaption>Figure 4-11: Creating IGMP Static Group<\/figcaption><\/figure>\n<h2 class=\"connexite-doc-h2\">MAC Management<\/h2>\n<p>4.3.1 Overview A device maintains a MAC address table for frame forwarding. Each entry in this table indicates the MAC address of a connected device, to which interface this device is connected and to which VLAN the interface belongs. A MAC address table consists of two types of entries: static and dynamic. Static entries are manually configured and never age out. Dynamic entries can be manually configured or dynamically learned and will age out.<\/p>\n<p>Your device learns a MAC address after it receives a frame from a port, port A for example, as it executes the following steps.<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Checks the frame for the source MAC address (MAC-SOURCE for example).<\/li>\n<li>Looks up the MAC address table for an entry corresponding to the MAC address and do the following:<\/li>\n<\/ol>\n<p>If an entry is found for the MAC address, updates the entry.<\/p>\n<p>If no entry containing the MAC address is found, adds an entry that contains the MAC address and the receiving port (port A) to the MAC address table.<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>After the MAC address (MAC-SOURCE) is learned, if the device receives a frame destined for MAC-SOURCE, the device looks up the MAC address table and then forwards the frame from port A.<\/li>\n<\/ol>\n<p>When forwarding a frame, the device adopts the following forwarding modes based on the MAC address table:<\/p>\n<p>Unicast mode: If an entry matching the destination MAC address exists, the device forwards the frame directly from the sending port recorded in the entry.<\/p>\n<p>Broadcast mode: If the device receives a frame with the destination address being all Fs, or no entry matches the destination MAC address, the device broadcasts the frame to all the ports except the receiving port.<\/p>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image135.png\" alt=\"MAC address table of the device\" loading=\"lazy\" \/><figcaption>Figure 4-11: MAC address table of the device<\/figcaption><\/figure>\n<p>4.3.2 Configuring MAC addresses MAC addresses configuration includes the configuring and displaying of static MAC address, Filter MAC Address, and the setting of MAC address entry aging time.<\/p>\n<p>Global Configuration<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer2 &gt; MAC Configuration in the navigation area to enter the MAC global Configuration page shown in Figure 4-12. Table 4-7 describes the MAC Configuration items.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image136.png\" alt=\"MAC global configuration\" loading=\"lazy\" \/><figcaption>Figure 4-12: MAC global configuration<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-7: MAC global configuration items<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Global<\/td>\n<td>configuration<\/td>\n<\/tr>\n<tr>\n<td>Aging time<\/td>\n<td>Set the aging time for the MAC address, the default value is 300 seconds.<\/td>\n<\/tr>\n<tr>\n<td>Apply<\/td>\n<td>Click to enable<\/td>\n<\/tr>\n<tr>\n<td>Configuring static MAC address<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer2 &gt; MAC Configuration in the navigation area to enter the Static MAC Address Configuration page shown in Figure 4-13.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image137.png\" alt=\"MAC static address page\" loading=\"lazy\" \/><figcaption>Figure 4-13: MAC static address page<\/figcaption><\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click +Add to enter the page for creating static MAC address, as shown in Figure 4-14. Table 4-8 shows the detailed configuration for creating a static MAC address.<\/li>\n<li>Type in MAC address box, for example \u201800eb.fc00.8877\u2019, select the VID in the VLAN drop down list, select the Interface in the Interface drop list.<\/li>\n<li>Click Ok to end the operation.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image138.png\" alt=\"Creating static MAC address\" loading=\"lazy\" \/><figcaption>Figure 4-14: Creating static MAC address<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-8: Static MAC Address items<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Address<\/td>\n<td>MAC Address<\/td>\n<\/tr>\n<tr>\n<td>Set the MAC address to be added.<\/td>\n<\/tr>\n<tr>\n<td>VID<\/td>\n<td>Sets the ID of the VLAN to which the MAC address belongs.<\/td>\n<\/tr>\n<tr>\n<td>Interface<\/td>\n<td>Sets the port to which the MAC address belongs.<\/td>\n<\/tr>\n<tr>\n<td>Configuring Filter MAC address<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer2 &gt; MAC Configuration from the navigation area. The system automatically displays the Filter MAC Address page, as shown in Figure 4-15.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image139.png\" alt=\"MAC static address page\" loading=\"lazy\" \/><figcaption>Figure 4-15: MAC static address page<\/figcaption><\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click +Add to enter the page for creating filter MAC address, as shown in Figure 4-16. Table 4-9 shows the detailed configuration for creating a filter MAC address.<\/li>\n<li>Type in MAC address, for example \u201800eb.fc00.8877\u2019, select the VID in the VLAN drop down list.<\/li>\n<li>Click Apply to end the operation.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image14.png\" alt=\"Creating Filter MAC address\" loading=\"lazy\" \/><figcaption>Figure 4-16: Creating Filter MAC address<\/figcaption><\/figure>\n<h2 class=\"connexite-doc-h2\">DHCP Snooping<\/h2>\n<p>4.4.1 Overview DHCP snooping (Dynamic Host Configuration Protocol) is a security feature that acts like a firewall between untrusted hosts and trusted DHCP servers. When DHCP snooping is enabled on a VLAN, the system examines DHCP messages sent from untrusted hosts associated with the VLAN and extracts their IP addresses and lease information. This information is used to build and maintain the DHCP snooping database.<\/p>\n<p>DHCP snooping is enabled on a per-VLAN basis. By default, the feature is inactive on all VLANs. You can enable the feature on a single VLAN or a range of VLANs.<\/p>\n<p>Trusted Sources<\/p>\n<p>The DHCP snooping feature determines whether traffic sources are trusted or untrusted. DHCP snooping acts as a guardian of network security by keeping track of valid IP addresses assigned to downstream network devices by a trusted DHCP server. The default trust state of all interfaces is untrusted.<\/p>\n<p>DHCP Snooping Limit Rate<\/p>\n<p>Configure the number of DHCP packets per second that an interface can receive, to reduce or eliminate the impact of DHCP packet attack from this interface.<\/p>\n<p>MAC Address Verification<\/p>\n<p>With DHCP snooping MAC address verification enabled, DHCP snooping verifies that the source MAC address and the client hardware address match in DHCP packets that are received on untrusted ports. The source MAC address is a Layer 2 field associated with the packet, and the client hardware address is a Layer 3 field in the DHCP packet.<\/p>\n<p>Option-82 Insertion DHCP Option82 option is also called DHCP relay agent information option, one of many dhcp options. The Option82 option is a DHCP option proposed to enhance the security of the DHCP server and improve the IP address allocation strategy. The addition and stripping of options are implemented by the relay component.<\/p>\n<p>DHCP Database<\/p>\n<p>The DHCP snooping feature dynamically builds and maintains the database using information extracted from intercepted DHCP messages. The database contains an entry for each untrusted host with a leased IP address if the host is associated with a VLAN that has DHCP snooping enabled. The database does not contain entries for hosts connected through trusted interfaces. When the Ip verify source function is enabled on the interface, database entries act as valid users on the interface. 4.4.2 Configuring DHCP Snooping Configuring DHCP Snooping globally<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer2 &gt; DHCP Snooping from the navigation tree to enter the DHCP Snooping Configuration page, as shown in Figure 4-17. Table 4-10 describes the configuration items of configuring DHCP Globally.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image140.png\" alt=\"DHCP Snooping global configuration\" loading=\"lazy\" \/><figcaption>Figure 4-17: DHCP Snooping global configuration<\/figcaption><\/figure>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image141.png\" alt=\"DHCP Snooping interface configuration status\" loading=\"lazy\" \/><figcaption>Figure 4-18: DHCP Snooping interface configuration status<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-10: The description of DHCP Snooping global configuration<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Status<\/td>\n<td>Enable\/Disable the DHCP Snooping globally<\/td>\n<\/tr>\n<tr>\n<td>Vlan<\/td>\n<td>Enable\/Disable the DHCP Snooping on the vlans<\/td>\n<\/tr>\n<tr>\n<td>Verify mac-address<\/td>\n<td>Verify the source MAC address and the client hardware address is matched in DHCP packets<\/td>\n<\/tr>\n<tr>\n<td>option-82<\/td>\n<td>Enable\/Disable option-82 insertion<\/td>\n<\/tr>\n<tr>\n<td>DB write-delay(s)<\/td>\n<td>Configure the interval time database writing to flash<\/td>\n<\/tr>\n<tr>\n<td>Configuring DHCP Snooping ports<\/td>\n<td>\u2022 Select Advance &gt; Layer2 &gt; DHCP Snooping from the navigation tree, as shown in Figure 4-18.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click Batch Edit button below \u201cport configuration\u201d or Edit button correspond of the port to enter the page for configuring ports.<\/li>\n<\/ol>\n<p>3\u3001Check the ports to be configured, click EDIT to enter the interface configuration page as shown in Figure 4-19. Table 4-11 describes the configuration items of configuring DHCP snooping interface configuration.<\/p>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image142.png\" alt=\"DHCP Snooping global configuration\" loading=\"lazy\" \/><figcaption>Figure 4-19: DHCP Snooping global configuration<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-11: The description of DHCP snooping interface configuration<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Trust<\/td>\n<td>determines whether traffic sources are trusted or untrusted<\/td>\n<\/tr>\n<tr>\n<td>Ratelimit(pps)<\/td>\n<td>Configure the number of DHCP packets per second that an interface can receive<\/td>\n<\/tr>\n<tr>\n<td>NOTE:<\/td>\n<td>\u2726 Due to hardware limitations, for DHCP rate limit, when the limit value is not 0, the software rate limit is used, and when the limit value is 0, the hardware rate limit is used. Software rate limit will consume CPU resources.<\/td>\n<\/tr>\n<tr>\n<td>NOTE:<\/td>\n<td>\u2726 Due to hardware limitations, for DHCP rate limit, when the limit value is not 0, the software rate limit is used, and when the limit value is 0, the hardware rate limit is used. Software rate limit will consume CPU resources.<\/td>\n<\/tr>\n<tr>\n<td>View DHCP Snooping state<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click the DHCP Snooping state button in the current page to enter the DHCP Snooping state page, as shown in Figure 4-20. Table 4-12 describes the configuration items of configuring DHCP Snooping database.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image143.png\" alt=\"DHCP Snooping database\" loading=\"lazy\" \/><figcaption>Figure 4-20: DHCP Snooping database<\/figcaption><\/figure>\n<h2 class=\"connexite-doc-h2\">QinQ<\/h2>\n<p>4.5.1 Overview Introduction to QinQ QinQ stands for 802.1Q in 802.1Q. QinQ is a flexible, easy-to-implement Layer 2 VPN technology based on IEEE 802.1Q. QinQ enables the edge device on a service provider network to insert an outer VLAN tag in the Ethernet frames from customer networks, so that the Ethernet frames travel across the service provider network (public network) with double VLAN tags. QinQ enables a service provider to use a single SVLAN to serve customers who have multiple CVLANs.<\/p>\n<p>Background and benefits<\/p>\n<p>The IEEE 802.1Q VLAN tag uses 12 bits for VLAN IDs. A device supports a maximum of 4094 VLANs. This is far from enough for isolating users in actual networks, especially in metropolitan area networks (MANs).<\/p>\n<p>By tagging tagged frames, QinQ expands the available VLAN space from 4094 to 4094 \u00d7 4094. QinQ delivers the following benefits:<\/p>\n<p>Releases the stress on the SVLAN resource.<\/p>\n<p>Enables customers to plan their CVLANs without conflicting with SVLANs.<\/p>\n<p>Provides an easy-to-implement Layer 2 VPN solution for small-sized MANs or intranets.<\/p>\n<p>Allows the customers to keep their VLAN assignment schemes unchanged when the service provider upgrades the service provider network. 4.5.2 QinQ configuration VPN Configuration<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer2 &gt; QinQ configuration in the navigation area. The system automatically enters the page as shown in Figure 4-21.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image144.png\" alt=\"VPN Configuration summary\" loading=\"lazy\" \/><figcaption>Figure 4-21: VPN Configuration summary<\/figcaption><\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click +Add button below \u201cVPN Configuration\u201d to enter the VPN rule creating page, as shown in Figure 4-22, Table 4-13 describes the items of configuring a QinQ rule.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image145.png\" alt=\"VPN Configuration\" loading=\"lazy\" \/><figcaption>Figure 4-22: VPN Configuration<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-13: VPN Configuration Description<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Name<\/td>\n<td>The name of the VLAN VPNRule<\/td>\n<\/tr>\n<tr>\n<td>CVID<\/td>\n<td>The ID of the customer VLAN<\/td>\n<\/tr>\n<tr>\n<td>SVID<\/td>\n<td>The ID of the service provider VLAN<\/td>\n<\/tr>\n<tr>\n<td>Port Configuration<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer2 &gt; QinQ configuration in the navigation area. The system automatically enters the page as shown in Figure 4-24.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image147.png\" alt=\"Port Configuration summary\" loading=\"lazy\" \/><figcaption>Figure 4-24: Port Configuration summary<\/figcaption><\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click Batch Edit button below \u201cPort Configuration\u201d or Edit button correspond of the port to enter the QinQ port configuration page, as shown in Figure 4-25, Table 4-14 describes the items of configuring port.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image148.png\" alt=\"Port Configuration\" loading=\"lazy\" \/><figcaption>Figure 4-25: Port Configuration<\/figcaption><\/figure>\n<h2 class=\"connexite-doc-h2\">ACL<\/h2>\n<p>4.6.1 Overview An access control list (ACL) is a set of rules (or permit or deny statements) for identifying traffic based on criteria such as source IP address, destination IP address, and port number. ACLs are essentially used for packet filtering. A packet filter drops packets that match a deny rule and permits packets that match a permit rule. ACLs are also widely used by many modules, for example, QoS and IP routing, for traffic identification. 4.6.2 Configuring Acls \u2726A maximum of 128 rules can be configured under a single ACL-ID; due to hardware resource limitations, please refer to the specific product specification document for the maximum number of application rules supported by a single device. \u2726When an ACL has been applied to a port, if you need to add and delete rules, you must first unapply them from the port. \u2726A maximum of 128 rules can be configured under a single ACL-ID; due to hardware resource limitations, please refer to the specific product specification document for the maximum number of application rules supported by a single device. \u2726When an ACL has been applied to a port, if you need to add and delete rules, you must first unapply them from the port.<\/p>\n<p>Configuring a rule for an IP ACL<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Security &gt; ACL Configuration in the navigation area.<\/li>\n<li>Click the +ADD ACL button to enter the rule configuration page and choose the ACL type \u2018IP\u2019 for a basic ACL as shown in Figure 4-26. Table 4-15 describes the configuration items of configuring an IP ACL.<\/li>\n<\/ol>\n<p>Figure 4-26. Configuring a basic IP ACL<\/p>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-15: The description of the basic IP ACL<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Standard IP ACL can match the source IP field in IPv4 packets<\/td>\n<\/tr>\n<tr>\n<td>IP-Extend<\/td>\n<td>the protocol number, source IP address, destination IP address, Layer 4 port number, etc. of IPv4 packets<\/td>\n<\/tr>\n<tr>\n<td>IPV6<\/td>\n<td>IPv6 ACL can match IPv6 packet source IP address, destination IP address, protocol number, etc<\/td>\n<\/tr>\n<tr>\n<td>MAC<\/td>\n<td>MAC ACL, which can match destination MAC address, source MAC address, Etype and other fields<\/td>\n<\/tr>\n<tr>\n<td>Name<\/td>\n<td>Standard IP valid number range: &lt;1-99&gt; | &lt;1300-1999&gt;<\/td>\n<\/tr>\n<tr>\n<td>Extended IP valid number range: &lt;100-199&gt; | &lt;2000-2699&gt;<\/td>\n<\/tr>\n<tr>\n<td>MAC ACL valid number range: &lt;200-699&gt;<\/td>\n<td>IPv6 ACL only supports string naming. All ACLs support string naming.<\/td>\n<\/tr>\n<tr>\n<td>Enable the counting function. When a packet hits the ACL, the count value is increased by 1<\/td>\n<\/tr>\n<tr>\n<td>Initial SN<\/td>\n<td>Starting value of rule entry sequence number, default value: 10, range &lt;1-2147483647&gt;<\/td>\n<\/tr>\n<tr>\n<td>Space<\/td>\n<td>Increment the serial number, default value: 10, range &lt;1-2147483647&gt;<\/td>\n<\/tr>\n<tr>\n<td>Description<\/td>\n<td>Define the ACL description information<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Configure a rule for an IP ACL, and click Ok.<\/li>\n<li>Select IP rule in the box below \u201cACE Configuration\u201d and click +Add ACE button to enter ACE configuration page as shown in Figure 4-27. Table 4-16 describes the configuration items of configuring an IP ACE configuration.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image15.png\" alt=\"IP Type ACE Configuation Interface\" loading=\"lazy\" \/><figcaption>Figure 4-27: IP Type ACE Configuation Interface<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-16: The description of the IP type ACL<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Access<\/td>\n<td>Control<\/td>\n<\/tr>\n<tr>\n<td>permit<\/td>\n<td>Release the packets that match this rule<\/td>\n<\/tr>\n<tr>\n<td>deny<\/td>\n<td>Discard packets matching this rule<\/td>\n<\/tr>\n<tr>\n<td>SN<\/td>\n<td>Rule entry sequence number<\/td>\n<\/tr>\n<tr>\n<td>Src Address<\/td>\n<td>Source IP address, such as 192.168.64.1<\/td>\n<\/tr>\n<tr>\n<td>Src Mask<\/td>\n<td>The IP mask is inverted. If it matches the first 24 digits of the IP address, the mask is 255.255.255.0. Here it needs to be configured as 00.00.00.255<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Configure ACE and click Ok.<\/li>\n<li>Click Batch Edit below \u201cPort Configuration\u201d to enter the ACL port configuration page, select the ACL rules of the corresponding port, as shown in Figure 4-28, and click Ok.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image150.png\" alt=\"Apply the ACL rule to the port\" loading=\"lazy\" \/><figcaption>Figure 4-28: Apply the ACL rule to the port<\/figcaption><\/figure>\n<p>Configuring a rule for an IP-Extend ACL<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Security &gt; ACL Configuration in the navigation area.<\/li>\n<li>Click the +ADD ACL button to enter the rule configuration page and choose the ACL type \u2018IP-Extend\u2019 for a basic ACL as shown in Figure 4-26.<\/li>\n<li>Configure a rule for an IP ACL, and click Ok.<\/li>\n<li>Select ACK rules in the box below \u201cACE Configuration\u201d and click +Add ACE button to enter ACE configuration page as shown in Figure 4-29. Table 4-17 describes the configuration items of configuring an IP ACE configuration.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image151.png\" alt=\"IP-Extend Type ACE Configuation Interface\" loading=\"lazy\" \/><figcaption>Figure 4-29: IP-Extend Type ACE Configuation Interface<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-17: The description of the IP-Extend ACL<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Access<\/td>\n<td>Control<\/td>\n<\/tr>\n<tr>\n<td>permit<\/td>\n<td>Release the packets that match this rule<\/td>\n<\/tr>\n<tr>\n<td>deny<\/td>\n<td>Discard packets matching this rule<\/td>\n<\/tr>\n<tr>\n<td>SN<\/td>\n<td>Rule entry sequence number<\/td>\n<\/tr>\n<tr>\n<td>Protocol<\/td>\n<td>Supports common protocol message options, including tcp, udp, vrrp, igmp, gre, ipcomp, ospf, pim, rsvp, etc.<\/td>\n<\/tr>\n<tr>\n<td>Supports all IP v4 packets<\/td>\n<td>IPv4 messages of customized protocol<\/td>\n<\/tr>\n<tr>\n<td>Src Address<\/td>\n<td>Source IP address, such as 192.168.64.1<\/td>\n<\/tr>\n<tr>\n<td>Src Mask<\/td>\n<td>The IP mask is inverted. If it matches the first 24 digits of the IP address, the mask is 255.255.255.0. Here it needs to be configured as 00.00.00.255<\/td>\n<\/tr>\n<tr>\n<td>Dest Address<\/td>\n<td>Destination IP address, such as 192.168.64.100<\/td>\n<\/tr>\n<tr>\n<td>Dest Mask<\/td>\n<td>homology mask<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Configure ACE and click Ok.<\/li>\n<li>Click Batch Edit below \u201cPort Configuration\u201d to enter the ACL port configuration page, select the ACL rules of the corresponding port, and click Ok.<\/li>\n<\/ol>\n<p>Configuring a rule for an IPV6 ACL<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Security &gt; ACL Configuration in the navigation area.<\/li>\n<li>Click the +ADD ACL button to enter the rule configuration page and choose the ACL type \u2018IPV6\u2019 for a basic ACL as shown in Figure 4-26.<\/li>\n<li>Configure a rule for an IP ACL, and click Ok.<\/li>\n<li>Select ACL rules in the box below \u201cACE Configuration\u201d and click +Add ACE button to enter ACE configuration page as shown in Figure 4-30. Table 4-18 describes the configuration items of configuring an IP ACE configuration.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image152.png\" alt=\"IPV6 Type ACE Configuation Interface\" loading=\"lazy\" \/><figcaption>Figure 4-30: IPV6 Type ACE Configuation Interface<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-18: The description of the IPV6 ACL<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Access<\/td>\n<td>Control<\/td>\n<\/tr>\n<tr>\n<td>permit<\/td>\n<td>Release the packets that match this rule<\/td>\n<\/tr>\n<tr>\n<td>deny<\/td>\n<td>Discard packets matching this rule<\/td>\n<\/tr>\n<tr>\n<td>SN<\/td>\n<td>Rule entry sequence number<\/td>\n<\/tr>\n<tr>\n<td>Protocol<\/td>\n<td>Supports common protocol message options , including tcp , udp , icmp , etc.<\/td>\n<\/tr>\n<tr>\n<td>Supports all IP v 6 packets<\/td>\n<td>Support IPv6 messages of customized protocol<\/td>\n<\/tr>\n<tr>\n<td>Src Address<\/td>\n<td>Source MAC address, such as 00.d 0.f 8.22.33.40<\/td>\n<\/tr>\n<tr>\n<td>Src Mask<\/td>\n<td>The MAC address mask is inverted. If it matches the first 24 digits of the MAC address , the mask is ffff.ff00.0000. Here it needs to be configured as 0000.00 ff.ffff<\/td>\n<\/tr>\n<tr>\n<td>Dest Address<\/td>\n<td>Destination MAC address, such as 00.d 0.f 8.22.33.41<\/td>\n<\/tr>\n<tr>\n<td>Dest Mask<\/td>\n<td>homology mask<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Configure ACE and click Ok.<\/li>\n<li>Click Batch Edit below \u201cPort Configuration\u201d to enter the ACL port configuration page, select the ACL rules of the corresponding port, and click Ok.<\/li>\n<\/ol>\n<p>Configuring a rule for an MAC ACL<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Security &gt; ACL Configuration in the navigation area.<\/li>\n<li>Click the +ADD ACL button to enter the rule configuration page and choose the ACL type \u2018IPV6\u2019 for a basic ACL as shown in Figure 4-26.<\/li>\n<li>Configure a rule for an IP ACL, and click Ok.<\/li>\n<li>Select ACK rules in the box below \u201cACE Configuration\u201d and click +Add ACE button to enter ACE configuration page as shown in Figure 4-31. Table 4-19 describes the configuration items of configuring an IP ACE configuration.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image153.png\" alt=\"Apply the ACL rule to the port\" loading=\"lazy\" \/><figcaption>Figure 4-31: Apply the ACL rule to the port<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-19: The description of the MAC ACL<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Access<\/td>\n<td>Control<\/td>\n<\/tr>\n<tr>\n<td>permit<\/td>\n<td>Release the packets that match this rule<\/td>\n<\/tr>\n<tr>\n<td>deny<\/td>\n<td>Discard packets matching this rule<\/td>\n<\/tr>\n<tr>\n<td>SN<\/td>\n<td>Rule entry sequence number<\/td>\n<\/tr>\n<tr>\n<td>Ethertype<\/td>\n<td>Ethernet protocol type, range (0x05DD-0xFFFF)<\/td>\n<\/tr>\n<tr>\n<td>CoS<\/td>\n<td>Cos value of the message, range (0-7)<\/td>\n<\/tr>\n<tr>\n<td>Src Address<\/td>\n<td>Source MAC address, such as 00.d0.f 8.22.33.40<\/td>\n<\/tr>\n<tr>\n<td>Src Mask<\/td>\n<td>The MAC address mask is inverted. If it matches the first 24 digits of the MAC address, the mask is ffff.ff00.0000. Here it needs to be configured as 0000.00ff.ffff<\/td>\n<\/tr>\n<tr>\n<td>Dest Address<\/td>\n<td>Destination MAC address, such as 00.d0.f 8.22.33.41<\/td>\n<\/tr>\n<tr>\n<td>Dest Mask<\/td>\n<td>homology mask<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Configure ACE and click Ok.<\/li>\n<li>Click Batch Edit below \u201cPort Configuration\u201d to enter the ACL port configuration page, select the ACL rules of the corresponding port, and click Ok.<\/li>\n<\/ol>\n<h2 class=\"connexite-doc-h2\">QoS<\/h2>\n<p>4.7.1 Overview Quality of Service (QoS) reflects the ability of a network to meet customer needs. In an internet, QoS evaluates the ability of the network to forward packets of different services. The evaluation can be based on different criteria because the network may provide various services. Generally, QoS performance is measured with respect to bandwidth, delay, jitter, and packet loss ratio during packet forwarding process. 4.7.2 Configuring Qos<\/p>\n<p>Enable Qos<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Security &gt; Qos Configuration in the navigation area to enter the QoS Global Configuration page, as shown in Figure 4-32. Table 4-20 describes the QoS summary items.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image154.png\" alt=\"QoS Global Configuration\" loading=\"lazy\" \/><figcaption>Figure 4-32: QoS Global Configuration<\/figcaption><\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click State button, choose Algorithm, click Apply to enable Qos.<\/li>\n<\/ol>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-20: Descriptions of QoS summary<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Items<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Qos<\/td>\n<td>Configuration<\/td>\n<\/tr>\n<tr>\n<td>State<\/td>\n<td>Enable QOS, all QOS functions do not support configuration before enabling<\/td>\n<\/tr>\n<tr>\n<td>Absolute priority scheduling, the queue ID is large, the priority is high, and the low-priority queue is processed after the high -priority queue is processed.<\/td>\n<\/tr>\n<tr>\n<td>Wrr<\/td>\n<td>robin scheduling algorithm schedules each queue in turn according to the queue weight, from the largest to the smallest queue ID.<\/td>\n<\/tr>\n<tr>\n<td>QoS Mapping<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>In current page, click Queue button below \u201cQos Mapping\u201d to enter Queue Configuration page, as shown in Figure 4-33. Table 4-21 describes the QoS summary items.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image155.png\" alt=\"QoS Queue Configuration\" loading=\"lazy\" \/><figcaption>Figure 4-33: QoS Queue Configuration<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-21: Descriptions of Queue Configuration<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Items<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Queue<\/td>\n<td>weight<\/td>\n<\/tr>\n<tr>\n<td>Queue<\/td>\n<td>&lt; 0, 7 &gt;<\/td>\n<\/tr>\n<tr>\n<td>weight<\/td>\n<td>&lt; 0, 32&gt;, the larger the value, the higher the weight, and the higher the probability of preferential processing of packets in this queue under the condition of channel congestion, 0 means infinity.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click Cos button below \u201cQos Mapping\u201d to enter Cos Configuration page, as shown in Figure 4-34. Table 4-22 describes the Cos configuration items.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image156.png\" alt=\"QoS Cos Configuration\" loading=\"lazy\" \/><figcaption>Figure 4-34: QoS Cos Configuration<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-22: Descriptions of Cos Configuration<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Items<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>CoS<\/td>\n<td>Configuration<\/td>\n<\/tr>\n<tr>\n<td>CoS<\/td>\n<td>&lt;0, 7&gt;<\/td>\n<\/tr>\n<tr>\n<td>Queue<\/td>\n<td>&lt; 0, 7&gt;, Cos &#8211; queue mapping relationship, based on the cos marked on the port, modifying the packet egress queue takes effect when the port is configured as no trust, trust cos or trust dscp and non-ip packets.<\/td>\n<\/tr>\n<tr>\n<td>DSCP<\/td>\n<td>cos-dscp mapping relationship takes effect when the port is configured as no trust, trust cos or trust dscp and is not ip packets. Modify the packet dscp value.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click DSCP button below \u201cQos Mapping\u201d to enter DSCP Configuration page, as shown in Figure 4-35. Table 4-23 describes the DSCP configuration items.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image157.png\" alt=\"QoS Cos Configuration\" loading=\"lazy\" \/><figcaption>Figure 4-35: QoS Cos Configuration<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-23: Descriptions of Cos Configuration<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Items<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>DSCP<\/td>\n<td>&lt;0, 63&gt;<\/td>\n<\/tr>\n<tr>\n<td>Queue<\/td>\n<td>&lt; 0, 7&gt;, dsp-queue mapping relationship, which takes effect when the port is configured as trust dscp and ip packets, modify the packet export queue<\/td>\n<\/tr>\n<tr>\n<td>CoS<\/td>\n<td>&lt; 0, 7&gt;, dscp-cos mapping relationship, which takes effect when the port is configured as trust dscp and ip packets, modify the cos field of the packet<\/td>\n<\/tr>\n<tr>\n<td>Nes DSCP<\/td>\n<td>&lt; 0, 63 &gt;, dscp-dscp mapping relationship, which takes effect when the port is configured as trust dscp and ip packets, first perform dscp-dscp mapping, and then perform dscp-cos mapping<\/td>\n<\/tr>\n<tr>\n<td>Class Setting<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>In current page, click +Add button below \u201cClass Setting\u201d to enter Class Setting page, as shown in Figure 4-36. Table 4-24 describes the QoS summary items.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image158.png\" alt=\"Class Setting page\" loading=\"lazy\" \/><figcaption>Figure 4-36: Class Setting page<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-24: Descriptions of Class Setting<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Items<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Define match type, support associated ACL;<\/td>\n<td>Support packet etype, dscp, cos, l4port, vlan field matching<\/td>\n<\/tr>\n<tr>\n<td>Policy Setting<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>In current page, click +Add Policy button below \u201cPolicy Setting\u201d to enter Policy Setting page, as shown in Figure 4-37. Text the box behind \u201cName\u201d, click Ok button.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image159.png\" alt=\"Class Setting page\" loading=\"lazy\" \/><figcaption>Figure 4-37: Class Setting page<\/figcaption><\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Click +Add Policy Rule button below \u201cPolicy Setting\u201d to enter Policy Rule Setting page, as shown in Figure 4-38. Table 4-26 describes the QoS Rule Configuration items.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image16.png\" alt=\"Rule Configuration page\" loading=\"lazy\" \/><figcaption>Figure 4-38: Rule Configuration page<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-26: Descriptions of Class Setting<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Items<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Rule<\/td>\n<td>Configuration<\/td>\n<\/tr>\n<tr>\n<td>Name<\/td>\n<td>Rule name<\/td>\n<\/tr>\n<tr>\n<td>Class Name<\/td>\n<td>Create a policy, define a policy name<\/td>\n<\/tr>\n<tr>\n<td>Modify<\/td>\n<td>policy, supports modifying cos, dscp, vlan and other actions<\/td>\n<\/tr>\n<tr>\n<td>Ratelimit<\/td>\n<td>Action 2 corresponding to the strategy, speed limit<\/td>\n<\/tr>\n<tr>\n<td>CIR<\/td>\n<td>Speed limit waterline, unit kbps<\/td>\n<\/tr>\n<tr>\n<td>CBS<\/td>\n<td>burst capability, unit Kbyte<\/td>\n<\/tr>\n<tr>\n<td>Port Configuration<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>In current page, click +Batch Edit button below \u201cPort Configuration\u201d to enter Port Configuration page, as shown in Figure 4-39. Table 4-27 describes the Port Configuration items.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image160.png\" alt=\"Port Configuration page\" loading=\"lazy\" \/><figcaption>Figure 4-39: Port Configuration page<\/figcaption><\/figure>\n<h2 class=\"connexite-doc-h2\">Route<\/h2>\n<p>4.8.1 ARP 4.8.1.1 Overview ARP resolves an IP address into a physical address, such as an Ethernet MAC address.<\/p>\n<p>On an Ethernet LAN, a device uses ARP to get the MAC address of the target device for a packet ARP table<\/p>\n<p>After obtaining the MAC address for the destination host, the device puts the IP-to-MAC mapping into its own ARP table. This mapping is used for forwarding packets with the same destination in the future.<\/p>\n<p>An ARP table stores dynamic and static ARP entries.<\/p>\n<p>Dynamic ARP entry ARP automatically creates and updates dynamic entries. A dynamic ARP entry is removed when its aging timer expires or the output interface goes down, and it can be overwritten by a static ARP entry.<\/p>\n<p>Static ARP entry A static ARP entry is manually configured and maintained. It cannot get aged or be overwritten by a dynamic ARP entry.<\/p>\n<p>Static ARP entries protect communication between devices, because attack packets cannot modify the IP-to-MAC mapping in a static ARP entry. 4.8.1.2 Configuring Static ARP Displaying Static ARP<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Monitor &gt; ARP Information in the navigation area to enter Static ARP displaying page as shown in Figure 4-40. Table 4-28 describes the configuration items of static ARP.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image161.png\" alt=\"Port Configuration page\" loading=\"lazy\" \/><figcaption>Figure 4-40: Port Configuration page<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-28: Descriptions of Static ARP<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>IP Address<\/td>\n<td>Terminal IP address<\/td>\n<\/tr>\n<tr>\n<td>MAC Address<\/td>\n<td>Terminal MAC address<\/td>\n<\/tr>\n<tr>\n<td>Interface<\/td>\n<td>The name of the Layer 3 interface where the terminal is located<\/td>\n<\/tr>\n<tr>\n<td>Type<\/td>\n<td>ARP address type<\/td>\n<\/tr>\n<tr>\n<td>Configuring Static ARP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer3 &gt; Static ARP in the navigation area to enter Static ARP configration page as shown in Figure 4-41.<\/li>\n<li>Click +Add button to enter the crating page as shown in Figure 4-42.<\/li>\n<li>Configure the IP address and MAC address.<\/li>\n<li>Click OK button to complete the configuration.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image162.png\" alt=\"Static ARP Configuration page\" loading=\"lazy\" \/><figcaption>Figure 4-41: Static ARP Configuration page<\/figcaption><\/figure>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image163.png\" alt=\"Creating a new Static ARP\" loading=\"lazy\" \/><figcaption>Figure 4-42: Creating a new Static ARP<\/figcaption><\/figure>\n<p>4.8.2 Route Routers are responsible for routing packets on the Internet. A router selects an appropriate route according to the destination address of a received packet and forwards the packet to the next router. The last router on the path is responsible for sending the packet to the destination host. 4.8.2.1 Routing table Routers forward packets through a routing table. Each entry in the table specifies which physical interface a packet should go out to reach the next hop (the next router) or the directly connected destination.<\/p>\n<p>Routes in a routing table fall into three categories by origin:<\/p>\n<p>Direct routes: Routes discovered by data link protocols, also known as interface routes.<\/p>\n<p>Static routes: Routes that are manually configured.<\/p>\n<p>Dynamic routes: Routes that are discovered dynamically by routing protocols.<\/p>\n<p>A route entry has the following items:<\/p>\n<p>Destination IP address: Destination IP address or destination network.<\/p>\n<p>Mask (IPv4)\/prefix length (IPv6): Specifies, together with the destination address, the address of the destination network.<\/p>\n<p>Outbound interface: Specifies the interface through which a matching IP packet is to be forwarded.<\/p>\n<p>Next hop: Specifies the address of the next hop router on the path.<\/p>\n<p>Preference for the route: Routes to the same destination may be found by various routing protocols or manually configured, and routing protocols and static routes have different priorities configured. The route with the highest priority (the smallest value) will be selected as the optimal route. 4.8.2.2 Static Route A static route is manually configured. If a network \u2018s topology is simple, you only need to configure static routes for the network to work normally. The proper configuration and usage of static routes can improve network performance and ensure bandwidth for important network applications.<\/p>\n<p>The disadvantage of using static routes is that they cannot adapt to network topology changes. If a fault or a topological change occurs in the network, some routes will be unreachable. In this case, the network administrator has to modify the static routes manually.<\/p>\n<p>While configuring a static route, you can specify either the output interface or the next hop address as needed. The next hop address cannot be a local interface \u2018s IP address; otherwise, the route configuration will not take effect.<\/p>\n<p>Actually, it is necessary to identify next hop addresses for all route entries because the router needs to use the next hop address of a matching entry to resolve the corresponding link layer address. 4.8.2.3 Configuring Static Route Displaying Static Route<\/p>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer3 &gt; Static Route in the navigation area to enter Static Route displaying page as shown in Figure 4-43. Table 4-29 describes the configuration items of static Route.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image17.png\" alt=\"Creating a new Static ARP\" loading=\"lazy\" \/><figcaption>Figure 4-43: Creating a new Static ARP<\/figcaption><\/figure>\n<p class=\"connexite-doc-table-caption\"><strong>Table 4-29: Descriptions of Static Route<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"connexite-doc-table\">\n<tbody>\n<tr>\n<th>Items<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Prefix<\/td>\n<td>Routing prefix address, or routing network segment; for example, common route 0.0.0.0\/0 192.168.1.1, the prefix IP is 0.0.0.0<\/td>\n<\/tr>\n<tr>\n<td>Next Hop<\/td>\n<td>Next hop IP address of the route<\/td>\n<\/tr>\n<tr>\n<td>Description<\/td>\n<td>Route description information, optional configuration<\/td>\n<\/tr>\n<tr>\n<td>Action<\/td>\n<td>Delete or modify<\/td>\n<\/tr>\n<tr>\n<td>Creating new Static Route<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Select Configuration &gt; VLAN in the navigation area to create VLAN ID.<\/li>\n<li>Select Configuration &gt; Port &gt; Port Configuration &gt; L3 port in the navigation area to create L3 SVI port as shown in Figure 4-44.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image18.png\" alt=\"Creating a L3 SVI port\" loading=\"lazy\" \/><figcaption>Figure 4-44: Creating a L3 SVI port<\/figcaption><\/figure>\n<ol class=\"connexite-doc-ol\">\n<li>Select Advance &gt; Layer3 &gt; Static Route in the navigation area to enter Static Route page, click +Add button to enter the crating page as shown in Figure 4-45.<\/li>\n<li>Configure the Prefix and Next Hop.<\/li>\n<li>Click OK button to complete the configuration.<\/li>\n<\/ol>\n<figure class=\"connexite-doc-figure wp-block-image\"><img decoding=\"async\" src=\"https:\/\/support.connexite.co.uk\/web_images\/image19.png\" alt=\"Creating a new Static ARP\" loading=\"lazy\" \/><figcaption>Figure 4-45: Creating a new Static ARP<\/figcaption><\/figure>\n<p>\u2726 When adding a new SVI port, the default management IP address will be automatically deleted. P lease ensure that the new SVI port can continue to be accessed. \u2726 When adding a new SVI port, the default management IP address will be automatically deleted. P<\/p>\n<p>lease ensure that the new SVI port can continue to be accessed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Networking \u203a Switching \u203a Edge \u203a Synapse<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":6380,"menu_order":4,"comment_status":"open","ping_status":"closed","template":"","doc_tag":[115,119,117],"class_list":["post-6384","docs","type-docs","status-publish","hentry","doc_tag-connexite","doc_tag-network","doc_tag-synapse-web-ui-documentation","no-post-thumbnail"],"acf":[],"_links":{"self":[{"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/docs\/6384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=6384"}],"version-history":[{"count":1,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/docs\/6384\/revisions"}],"predecessor-version":[{"id":6432,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/docs\/6384\/revisions\/6432"}],"up":[{"embeddable":true,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/docs\/6380"}],"wp:attachment":[{"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=6384"}],"wp:term":[{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/doc_tag?post=6384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}