Small Office Remote Access Switch 203CONFIGURING ADVANCED BRIDGINGMode of Hardware Filtering• If the packet matches no filter, the packet is forwarded. The specific forwarding action dependsupon whether or not the destination is known. (See following descriptions.)No Filter Match - Destination KnownIf the destination is known and the corresponding device is on the Known Connect List, theconnection is made and the packet is then forwarded to the specific destination.If the device is not on the Known Connect list, the packet is sent to all current connections.No Filter Match - Destination UnknownThe packet is sent to all current connections.R ESTRICTED B RIDGE MODEIf the Restricted Bridge Mode is selected, packets will be discarded unless overridden by a user-defined bridge filter. The bridge filters, therefore, allow you to transfer only the packets that youspecify.If the Restricted Bridge Mode is selected, the following packet forwarding possibilities exist:• If the packet matches a discard filter (packet filter only), it is discarded.• If the packet matches a forward filter, it is forwarded to the distribution list.• If the packet matches a connect filter, it is connected to the members of the distribution list.However, with Restricted Mode, the packet needs to match a forwarding filter in order to beforwarded.• If the packet matches no filter, the specific action for the packet depends upon whether or notthe destination is known. (See following descriptions.)No Filter Match - Destination KnownIf the destination is known and the corresponding device is on the Known Connect list, the con-nection is made. If the device is not on the Known Connect list, the packet is discarded.No Filter Match - Destination UnknownThe packet is discarded.M ODE OF HARDWARE F ILTERINGCONFIGURING M ODE OF HARDWARE F ILTERINGU SING CFGEDIT1. Select Mode of H/W Filtering from the Bridging menu.2. Select the hardware filtering mode. The manual mode is the default.HARDWARE F ILTERING M ODE B ACKGROUND I NFORMATIONIn order to use hardware filters, the system must have a list of destination MAC addresses. Itobtains the addresses in two ways: manually and automatically.