5.1.1
Port Config
.......................................................................................................
29
5.1.2
Port Mirror
........................................................................................................
30
5.1.3
Port Security
....................................................................................................
32
5.1.4
Port Isolation
....................................................................................................
34
5.1.5
Loopback Detection
.........................................................................................
35
5.2
LAG
............................................................................................................................
36
5.2.1
LAG Table
........................................................................................................
37
5.2.2
Static LAG
........................................................................................................
38
5.2.3
LACP Config
....................................................................................................
39
5.3
Traffic Monitor
.............................................................................................................
41
5.3.1
Traffic Summary
...............................................................................................
41
5.3.2
Traffic Statistics
................................................................................................
42
5.4
MAC Address
..............................................................................................................
44
5.4.1
Address Table
..................................................................................................
45
5.4.2
Static Address
..................................................................................................
46
5.4.3
Dynamic Address
.............................................................................................
47
5.4.4
Filtering Address
..............................................................................................
49
5.5
DHCP Filtering
............................................................................................................
50
Chapter 6
VLAN
..........................................................................................................................
54
6.1
802.1Q VLAN
..............................................................................................................
55
6.1.1
VLAN Config
....................................................................................................
57
6.1.2
Port Config
.......................................................................................................
59
6.2
Application Example for 802.1Q VLAN
.......................................................................
61
Chapter 7
Spanning Tree
............................................................................................................
63
7.1
STP Config
.................................................................................................................
68
7.1.1
STP Config
.......................................................................................................
68
7.1.2
STP Summary
..................................................................................................
70
7.2
Port Config
..................................................................................................................
70
7.3
MSTP Instance
...........................................................................................................
72
7.3.1
Region Config
..................................................................................................
72
7.3.2
Instance Config
................................................................................................
73
7.3.3
Instance Port Config
.........................................................................................
74
7.4
STP Security
...............................................................................................................
76
7.4.1
Port Protect
......................................................................................................
76
7.4.2
TC Protect
........................................................................................................
79
7.5
Application Example for STP Function
.......................................................................
79
VI