
xii EKI-7428 Series User Manual
Figure 4.34 L2 Switching > Multicast > IGMP Snooping > IGMP Static Groups ............................54
Figure 4.35 L2 Switching > Multicast > MLD Snooping > MLD Settings ........................................55
Figure 4.36 L2 Switching > Multicast > MLD Snooping > MLD Querier .........................................56
Figure 4.37 L2 Switching > Multicast > MLD Snooping > MLD Static Group .................................56
Figure 4.38 L2 Switching > Jumbo Frame......................................................................................57
Figure 4.39 L2 Switching > Spanning Tree > STP Global Settings................................................58
Figure 4.40 L2 Switching > Spanning Tree > STP Port Settings....................................................59
Figure 4.41 L2 Switching > Spanning Tree > STP Bridge Settings................................................60
Figure 4.42 L2 Switching > Spanning Tree > STP Port Advanced Settings...................................60
Figure 4.43 L2 Switching > Spanning Tree > MST Config Identification ........................................61
Figure 4.44 L2 Switching > Spanning Tree > MST Instance ID Settings........................................61
Figure 4.45 L2 Switching > Spanning Tree > MST Instance Priority Settings................................62
Figure 4.46 L2 Switching > X-Ring Elite > X-Ring Elite Settings....................................................63
Figure 4.47 L2 Switching > X-Ring Elite > X-Ring Elite Groups.....................................................63
Figure 4.48 L2 Switching > X-Ring Pro > X-Ring Pro Settings.......................................................64
Figure 4.49 L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro Groups Settings........64
Figure 4.50 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Chain Settings.............................65
Figure 4.51 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Couple Setting ............................65
Figure 4.52 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Pair Settings................................65
Figure 4.53 L2 Switching > X-Ring Pro > X-Ring Pro Groups > RPair Settings.............................66
Figure 4.54 L2 Switching > Loopback Detection > Global Settings................................................66
Figure 4.55 L2 Switching > Loopback Detection > Port Settings....................................................67
Figure 4.56 L2 Switching > CFM > CFM Settings ..........................................................................67
Figure 4.57 L2 Switching > CFM > ME Groups..............................................................................68
Figure 4.58 L2 Switching > CFM > ME Settings.............................................................................68
Figure 4.59 L2 Switching > ERPS > ERPS Settings ......................................................................68
Figure 4.60 L2 Switching > ERPS > ERPS Groups........................................................................69
Figure 4.61 MAC Address Table > Static MAC ..............................................................................70
Figure 4.62 MAC Address Table > MAC Aging Time.....................................................................70
Figure 4.63 MAC Address Table > Dynamic Forwarding Table .....................................................71
Figure 4.64 Security > Storm Control > Global Settings.................................................................72
Figure 4.65 Security > Storm Control > Port Settings.....................................................................73
Figure 4.66 Security > Port Security...............................................................................................74
Figure 4.67 Security > Protected Ports...........................................................................................74
Figure 4.68 Security > DoS Prevention > DoS Global Settings......................................................75
Figure 4.69 Security > DoS Prevention > DoS Port Settings..........................................................76
Figure 4.70 Security > Applications > TELNET ..............................................................................77
Figure 4.71 Security > Applications > SSH.....................................................................................77
Figure 4.72 Security > Applications > HTTP...................................................................................78
Figure 4.73 Security > Applications > HTTPS ................................................................................78
Figure 4.74 Security > 802.1x > 802.1x Settings............................................................................79
Figure 4.75 Security > 802.1x > 802.1x Port Configuration............................................................80
Figure 4.76 Security > IP Security > Global Settings......................................................................80
Figure 4.77 Security > IP Security > Entry Settings........................................................................81
Figure 4.78 Security > Access Control List > MAC ACL > Entry Settings......................................82
Figure 4.79 Security > Access Control List > IP ACL > Entry Settings...........................................83
Figure 4.80 Security > IP Source Guard > Global Settings............................................................84
Figure 4.81 Security > IP Source Guard > Entry Settings..............................................................84
Figure 4.82 Security > DHCP Snooping > Global Settings > DHCP Snooping State Settings.......85
Figure 4.83 Security > DHCP Snooping > Global Settings > DHCP Snooping Port Settings.........85
Figure 4.84 Security > DHCP Snooping > Global Settings > DHCP Snooping Binding Port
Settings........................................................................................................................85
Figure 4.85 Security > ARP Spoofing.............................................................................................86
Figure 4.86 QoS > General > QoS Properties................................................................................87
Figure 4.87 QoS > General > QoS Settings...................................................................................87
Figure 4.88 QoS > General > QoS Scheduling ..............................................................................88
Figure 4.89 QoS > General > CoS Mapping...................................................................................89
Figure 4.90 QoS > General > DSCP Mapping................................................................................90
Figure 4.91 QoS > General > IP Precedence Mapping..................................................................91
Figure 4.92 QoS > QoS Basic Mode > Global Settings..................................................................92