List of Figures
ES-4124 User’s Guide
27
Figure 82 Advanced Application > Multicast
........................................................................................
178
Figure 83 Advanced Application > Multicast > Multicast Setting
.........................................................
179
Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN
.................
181
Figure 85 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile
...................
182
Figure 86 MVR Network Example
.......................................................................................................
183
Figure 87 MVR Multicast Television Example
.....................................................................................
184
Figure 88 Advanced Application > Multicast > Multicast Setting > MVR
.............................................
185
Figure 89 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration
............
187
Figure 90 MVR Configuration Example
...............................................................................................
188
Figure 91 MVR Configuration Example
...............................................................................................
188
Figure 92 MVR Group Configuration Example
...................................................................................
189
Figure 93 MVR Group Configuration Example
....................................................................................
189
Figure 94 AAA Server
.........................................................................................................................
191
Figure 95 Advanced Application > Auth and Acct
...............................................................................
192
Figure 96 Advanced Application > Auth and Acct > RADIUS Server Setup
........................................
193
Figure 97 Advanced Application > Auth and Acct > TACACS+ Server Setup
.....................................
195
Figure 98 Advanced Application > Auth and Acct > Auth and Acct Setup
..........................................
197
Figure 99 DHCP Snooping Database File Format
...............................................................................
206
Figure 100 Example: Man-in-the-middle Attack
...................................................................................
207
Figure 101 IP Source Guard
.................................................................................................................
209
Figure 102 IP Source Guard Static Binding
..........................................................................................
210
Figure 103 DHCP Snooping
..................................................................................................................
211
Figure 104 DHCP Snooping Configure
................................................................................................
214
Figure 105 DHCP Snooping Port Configure
.........................................................................................
216
Figure 106 DHCP Snooping VLAN Configure
......................................................................................
217
Figure 107 ARP Inspection Status
........................................................................................................
218
Figure 108 ARP Inspection VLAN Status
.............................................................................................
219
Figure 109 ARP Inspection Log Status
.................................................................................................
220
Figure 110 ARP Inspection Configure
..................................................................................................
221
Figure 111 ARP Inspection Port Configure
...........................................................................................
222
Figure 112 ARP Inspection VLAN Configure
........................................................................................
223
Figure 113 Loop Guard vs STP
............................................................................................................
225
Figure 114 Switch in Loop State
...........................................................................................................
226
Figure 115 Loop Guard - Probe Packet
................................................................................................
226
Figure 116 Loop Guard - Network Loop
...............................................................................................
226
Figure 117 Advanced Application > Loop Guard
..................................................................................
227
Figure 118 IP Application > Static Routing
..........................................................................................
231
Figure 119 IP Application > RIP
...........................................................................................................
234
Figure 120 OSPF Network Example
....................................................................................................
236
Figure 121 OSPF Router Election Example
.........................................................................................
237
Figure 122 IP Application > OSPF Status
............................................................................................
238
Figure 123 IP Application > OSPF Configuration: Activating and General Settings
............................
240
Figure 124 IP Application > OSPF Configuration: Area Setup
............................................................
241