D-Link DWS-1008 User Manual
x
Displaying the Backbone Fast Convergence State
............................................................
209
Configuring Uplink Fast Convergence
...............................................................................
210
Displaying Uplink Fast Convergence Information
..............................................................
210
Displaying Spanning Tree Information
......................................................................................
210
Displaying STP Bridge and Port Information
.....................................................................
211
Displaying the STP Port Cost on a VLAN Basis
................................................................
212
Displaying Blocked STP Ports
...........................................................................................
212
Displaying Spanning Tree Statistics
...................................................................................
213
Clearing STP Statistics
......................................................................................................
213
Spanning Tree Configuration Scenario
.....................................................................................
213
Configuring and Managing IGMP Snooping
..............................................................................
216
Disabling or Reenabling IGMP Snooping
.................................................................................
216
Disabling or Reenabling Proxy Reporting
.................................................................................
216
Enabling the Pseudo-Querier
...................................................................................................
217
Changing IGMP Timers
............................................................................................................
217
Changing the Query Interval
..............................................................................................
218
Changing the Other-Querier-Present Interval
....................................................................
218
Changing the Query Response Interval
............................................................................
218
Changing the Last Member Query Interval
........................................................................
218
Changing Robustness
.......................................................................................................
218
Enabling Router Solicitation
.....................................................................................................
219
Changing the Router Solicitation Interval
..........................................................................
219
Configuring Static Multicast Ports
.............................................................................................
219
Adding or Removing a Static Multicast Router Port
...........................................................
220
Adding or Removing a Static Multicast Receiver Port
.......................................................
220
Displaying Multicast Information
...............................................................................................
220
Displaying Multicast Configuration Information and Statistics
...........................................
220
Displaying Multicast Statistics Only
...............................................................................
222
Clearing Multicast Statistics
...........................................................................................
222
Displaying Multicast Queriers
............................................................................................
222
Displaying Multicast Routers
..............................................................................................
222
Displaying Multicast Receivers
..........................................................................................
223
Configuring and Managing Security ACLs
.................................................................................
224
About Security Access Control Lists
.........................................................................................
224
Overview of Security ACL Commands
...............................................................................
224
Security ACL Filters
...........................................................................................................
225
Order in Which ACLs are Applied to Traffic
........................................................................
225
Traffic Direction
..............................................................................................................
226
Selection of User ACLs
.................................................................................................
226
Creating and Committing a Security ACL
.................................................................................
226
Setting a Source IP ACL
....................................................................................................
227
Wildcard Masks
.............................................................................................................
228
Class of Service
............................................................................................................
228
Setting an ICMP ACL
.........................................................................................................
229
Setting TCP and UDP ACLs
..............................................................................................
230
Setting a TCP ACL
........................................................................................................
230
Setting a UDP ACL
........................................................................................................
230
Determining the ACE Order
...............................................................................................
231