IV
5.1.1 Port Config .................................................................................................... 32
5.1.2 Port Mirror ..................................................................................................... 33
5.1.3 Port Security .................................................................................................. 35
5.1.4 Port Isolation ................................................................................................. 37
5.1.5 Loopback Detection ....................................................................................... 38
5.2 LAG ......................................................................................................................... 39
5.2.1 LAG Table...................................................................................................... 40
5.2.2 Static LAG ..................................................................................................... 41
5.2.3 LACP Config.................................................................................................. 42
5.3 Traffic Monitor .......................................................................................................... 44
5.3.1 Traffic Summary ............................................................................................ 44
5.3.2 Traffic Statistics.............................................................................................. 45
5.4 MAC Address ........................................................................................................... 46
5.4.1 Address Table................................................................................................ 47
5.4.2 Static Address................................................................................................ 48
5.4.3 Dynamic Address........................................................................................... 49
5.4.4 Filtering Address ............................................................................................ 51
5.5 DHCP Filtering ......................................................................................................... 52
Chapter 6 VLAN....................................................................................................................... 56
6.1 802.1Q VLAN ........................................................................................................... 57
6.1.1 VLAN Config.................................................................................................. 58
6.2 Application Example for 802.1Q VLAN ..................................................................... 60
Chapter 7 Spanning Tree ......................................................................................................... 62
7.1 STP Config............................................................................................................... 67
7.1.1 STP Config .................................................................................................... 67
7.1.2 STP Summary ............................................................................................... 69
7.2 Port Config ............................................................................................................... 69
7.3 MSTP Instance......................................................................................................... 71
7.3.1 Region Config................................................................................................ 71
7.3.2 Instance Config.............................................................................................. 72
7.3.3 Instance Port Config ...................................................................................... 73
7.4 STP Security ............................................................................................................ 75
7.4.1 Port Protect ................................................................................................... 75
7.4.2 TC Protect ..................................................................................................... 78
7.5 Application Example for STP Function ..................................................................... 78
Chapter 8 Multicast .................................................................................................................. 82
8.1 IGMP Snooping........................................................................................................ 84