6.5.2
Protocol Group
..................................................................................................
80
6.5.3
Protocol Template
..............................................................................................
80
6.6
Application Example for Protocol VLAN
......................................................................
82
6.7
VLAN VPN
....................................................................................................................
84
6.7.1
VPN Config
........................................................................................................
85
6.7.2
Port Enable
........................................................................................................
86
6.7.3
VLAN Mapping
..................................................................................................
86
6.8
GVRP
...........................................................................................................................
89
6.9
Private VLAN
................................................................................................................
92
6.9.1
PVLAN Config
...................................................................................................
94
6.9.2
Port Config
.........................................................................................................
95
6.10
Application Example for Private VLAN
.........................................................................
96
Chapter 7
Spanning Tree
..............................................................................................................
99
7.1
STP Config
.................................................................................................................
104
7.1.1
STP Config
......................................................................................................
104
7.1.2
STP Summary
.................................................................................................
106
7.2
Port Config
.................................................................................................................
107
7.3
MSTP Instance
...........................................................................................................
108
7.3.1
Region Config
..................................................................................................
109
7.3.2
Instance Config
................................................................................................
109
7.3.3
Instance Port Config
.........................................................................................
110
7.4
STP Security
................................................................................................................
112
7.4.1
Port Protect
.......................................................................................................
112
7.4.2
TC Protect
........................................................................................................
115
7.5
Application Example for STP Function
.......................................................................
115
Chapter 8
Ethernet OAM
............................................................................................................
120
8.1
Basic Config
...............................................................................................................
123
8.1.1
Basic Config
....................................................................................................
124
8.1.2
Discovery Info
..................................................................................................
125
8.2
Link Monitoring
...........................................................................................................
127
8.3
RFI
..............................................................................................................................
128
8.4
Remote Loopback
......................................................................................................
129
8.5
Statistics
.....................................................................................................................
130
8.5.1
Statistics
..........................................................................................................
130
8.5.2
Event Log
........................................................................................................
131
8.6
DLDP
..........................................................................................................................
132
8.7
Application Example for DLDP
...................................................................................
136
V