
List of Figures
ES-4124 User’s Guide
26
Figure 39 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN ...................... 99
Figure 40 Protocol Based VLAN Configuration Example .................................................................... 101
Figure 41 Advanced Application > VLAN: Port Based VLAN Setup (All Connected) .......................... 102
Figure 42 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation) ........................... 103
Figure 43 Advanced Application > Static MAC Forwarding ................................................................. 105
Figure 44 Advanced Application > Filtering ......................................................................................... 107
Figure 45 MRSTP Network Example ....................................................................................................111
Figure 46 STP/RSTP Network Example ...............................................................................................112
Figure 47 MSTP Network Example ......................................................................................................113
Figure 48 MSTIs in Different Regions ..................................................................................................114
Figure 49 MSTP and Legacy RSTP Network Example ........................................................................114
Figure 50 Advanced Application > Spanning Tree Protocol .................................................................115
Figure 51 Advanced Application > Spanning Tree Protocol > Configuration ........................................115
Figure 52 Advanced Application > Spanning Tree Protocol > RSTP ....................................................116
Figure 53 Advanced Application > Spanning Tree Protocol > Status: RSTP ........................................118
Figure 54 Advanced Application > Spanning Tree Protocol > MRSTP .................................................119
Figure 55 Advanced Application > Spanning Tree Protocol > Status: MRSTP .................................... 121
Figure 56 Advanced Application > Spanning Tree Protocol > MSTP .................................................. 123
Figure 57 Advanced Application > Spanning Tree Protocol > Status: MSTP ...................................... 126
Figure 58 Advanced Application > Bandwidth Control ........................................................................ 130
Figure 59 Advanced Application > Broadcast Storm Control .............................................................. 131
Figure 60 Advanced Application > Mirroring ........................................................................................ 133
Figure 61 Advanced Application > Link Aggregation Status ................................................................ 136
Figure 62 Advanced Application > Link Aggregation > Link Aggregation Setting ............................... 137
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................. 139
Figure 64 Trunking Example - Physical Connections ........................................................................... 140
Figure 65 Trunking Example - Configuration Screen ............................................................................ 141
Figure 66 IEEE 802.1x Authentication Process .................................................................................. 144
Figure 67 MAC Authentication Process .............................................................................................. 144
Figure 68 Advanced Application > Port Authentication ....................................................................... 145
Figure 69 Advanced Application > Port Authentication > 802.1x ........................................................ 145
Figure 70 Advanced Application > Port Authentication > MAC Authentication ................................... 147
Figure 71 Advanced Application > Port Security ................................................................................. 150
Figure 72 Advanced Application > Classifier ....................................................................................... 154
Figure 73 Advanced Application > Classifier: Summary Table ............................................................ 156
Figure 74 Classifier: Example .............................................................................................................. 158
Figure 75 Advanced Application > Policy Rule ................................................................................... 160
Figure 76 Advanced Application > Policy Rule: Summary Table ......................................................... 162
Figure 77 Policy Example .................................................................................................................... 163
Figure 78 Advanced Application > Queuing Method ........................................................................... 167
Figure 79 VLAN Stacking Example ..................................................................................................... 170
Figure 80 Advanced Application > VLAN Stacking .............................................................................. 172
Figure 81 Advanced Application > Multicast ........................................................................................ 176