A SERVICE OF

logo

5.1.1 Port Config.......................................................................................................29
5.1.2 Port Mirror........................................................................................................30
5.1.3 Port Security ....................................................................................................32
5.1.4 Port Isolation....................................................................................................34
5.1.5 Loopback Detection .........................................................................................35
5.2 LAG ............................................................................................................................36
5.2.1 LAG Table ........................................................................................................37
5.2.2 Static LAG........................................................................................................38
5.2.3 LACP Config ....................................................................................................39
5.3 Traffic Monitor.............................................................................................................41
5.3.1 Traffic Summary...............................................................................................41
5.3.2 Traffic Statistics ................................................................................................42
5.4 MAC Address..............................................................................................................44
5.4.1 Address Table ..................................................................................................45
5.4.2 Static Address ..................................................................................................46
5.4.3 Dynamic Address .............................................................................................47
5.4.4 Filtering Address ..............................................................................................49
5.5 DHCP Filtering............................................................................................................50
Chapter 6 VLAN..........................................................................................................................54
6.1 802.1Q VLAN..............................................................................................................55
6.1.1 VLAN Config ....................................................................................................57
6.1.2 Port Config.......................................................................................................59
6.2 Application Example for 802.1Q VLAN .......................................................................61
Chapter 7 Spanning Tree............................................................................................................63
7.1 STP Config .................................................................................................................68
7.1.1 STP Config.......................................................................................................68
7.1.2 STP Summary..................................................................................................70
7.2 Port Config..................................................................................................................70
7.3 MSTP Instance ...........................................................................................................72
7.3.1 Region Config ..................................................................................................72
7.3.2 Instance Config ................................................................................................73
7.3.3 Instance Port Config.........................................................................................74
7.4 STP Security...............................................................................................................76
7.4.1 Port Protect......................................................................................................76
7.4.2 TC Protect........................................................................................................79
7.5 Application Example for STP Function .......................................................................79
VI