V
6.5
Application Example for MAC VLAN
............................................................................
78
6.6
Application Example for Protocol VLAN
......................................................................
79
6.7
VLAN VPN
....................................................................................................................
81
6.7.1
VPN Config
........................................................................................................
82
6.7.2
VLAN Mapping
..................................................................................................
82
6.7.3
Port Enable
........................................................................................................
83
6.8
Private VLAN
................................................................................................................
85
6.8.1
PVLAN Config
...................................................................................................
88
6.8.2
Port Config
........................................................................................................
89
6.9
GVRP
...........................................................................................................................
91
6.10
Application Example for Private VLAN
........................................................................
94
Chapter 7
Spanning Tree
..............................................................................................................
97
7.1
STP Config
.................................................................................................................
101
7.1.1
STP Config
......................................................................................................
101
7.1.2
STP Summary
.................................................................................................
103
7.2
Port Config
.................................................................................................................
104
7.3
MSTP Instance
...........................................................................................................
105
7.3.1
Region Config
..................................................................................................
105
7.3.2
Instance Config
...............................................................................................
106
7.3.3
Instance Port Config
........................................................................................
107
7.4
STP Security
..............................................................................................................
109
7.4.1
Port Protect
.....................................................................................................
109
7.4.2
TC Protect
........................................................................................................
111
7.5
Application Example for STP Function
.......................................................................
112
Chapter 8
Ethernet OAM
.............................................................................................................
116
8.1
Basic Config
................................................................................................................
119
8.1.1
Basic Config
.....................................................................................................
119
8.1.2
Discovery Info
..................................................................................................
121
8.2
Link Monitoring
...........................................................................................................
123
8.3
RFI
..............................................................................................................................
124
8.4
Remote Loopback
......................................................................................................
125
8.5
Statistics
.....................................................................................................................
126
8.5.1
Statistics
..........................................................................................................
126
8.5.2
Event Log
........................................................................................................
127
8.6
DLDP
..........................................................................................................................
128
8.7
Application Example for DLDP
...................................................................................
131
Chapter 9
DHCP
.........................................................................................................................
134