
EKI-7706 Series User Manual xii
Figure 4.29 L2 Switching > GARP > GARP Settings ..................................................................... 55
Figure 4.30 L2 Switching > GARP > GVRP Settings ..................................................................... 56
Figure 4.31 L2 Switching > GARP > GMRP Settings..................................................................... 56
Figure 4.32 L2 Switching > 802.3az EEE....................................................................................... 57
Figure 4.33 L2 Switching > Multicast > Multicast Filtering.............................................................. 58
Figure 4.34 L2 Switching > Multicast > IGMP Snooping > IGMP Settings..................................... 58
Figure 4.35 L2 Switching > Multicast > IGMP Snooping > IGMP Querier...................................... 59
Figure 4.36 L2 Switching > Multicast > IGMP Snooping > IGMP Static Groups............................ 60
Figure 4.37 L2 Switching > Multicast > MLD Snooping > MLD Settings........................................ 61
Figure 4.38 L2 Switching > Multicast > MLD Snooping > MLD Querier......................................... 61
Figure 4.39 L2 Switching > Multicast > MLD Snooping > MLD Static Group................................. 62
Figure 4.40 L2 Switching > Jumbo Frame...................................................................................... 63
Figure 4.41 L2 Switching > Spanning Tree > STP Global Settings................................................ 63
Figure 4.42 L2 Switching > Spanning Tree > STP Port Settings.................................................... 64
Figure 4.43 L2 Switching > Spanning Tree > STP Bridge Settings................................................ 65
Figure 4.44 L2 Switching > Spanning Tree > STP Port Advanced Settings................................... 66
Figure 4.45 L2 Switching > Spanning Tree > MST Config Identification........................................ 66
Figure 4.46 L2 Switching > Spanning Tree > MST Instance ID Settings ....................................... 67
Figure 4.47 L2 Switching > Spanning Tree > MST Instance Priority Settings................................ 67
Figure 4.48 L2 Switching > X-Ring Elite > X-Ring Elite Settings.................................................... 68
Figure 4.49 L2 Switching > X-Ring Elite > X-Ring Elite Groups..................................................... 69
Figure 4.50 L2 Switching > X-Ring Pro > X-Ring Pro Settings....................................................... 69
Figure 4.51 L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro Groups Settings....... 70
Figure 4.52 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Chain Settings ............................ 70
Figure 4.53 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Couple Setting............................ 70
Figure 4.54 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Pair Settings ............................... 71
Figure 4.55 L2 Switching > X-Ring Pro > X-Ring Pro Groups > RPair Settings............................. 71
Figure 4.56 L2 Switching > Loopback Detection > Global Settings................................................ 72
Figure 4.57 L2 Switching > Loopback Detection > Port Settings ................................................... 72
Figure 4.58 L2 Switching > CFM > CFM Settings.......................................................................... 73
Figure 4.59 L2 Switching > CFM > ME Groups.............................................................................. 73
Figure 4.60 L2 Switching > CFM > ME Settings............................................................................. 74
Figure 4.61 L2 Switching > ERPS > ERPS Settings...................................................................... 74
Figure 4.62 L2 Switching > ERPS > ERPS Groups ....................................................................... 75
Figure 4.63 MAC Address Table > Static MAC.............................................................................. 75
Figure 4.64 MAC Address Table > MAC Aging Time..................................................................... 76
Figure 4.65 MAC Address Table > Dynamic Forwarding Table..................................................... 77
Figure 4.66 Security > Storm Control > Global Settings................................................................. 78
Figure 4.67 Security > Storm Control > Port Settings .................................................................... 79
Figure 4.68 Security > Port Security............................................................................................... 80
Figure 4.69 Security > Protected Ports...........................................................................................80
Figure 4.70 Security > DoS Prevention > DoS Global Settings...................................................... 81
Figure 4.71 Security > DoS Prevention > DoS Port Settings ......................................................... 83
Figure 4.72 Security > Applications > TELNET.............................................................................. 83
Figure 4.73 Security > Applications > SSH .................................................................................... 84
Figure 4.74 Security > Applications > HTTP .................................................................................. 84
Figure 4.75 Security > Applications > HTTPS................................................................................ 85
Figure 4.76 Security > 802.1x > 802.1x Settings............................................................................ 85
Figure 4.77 Security > 802.1x > 802.1x Port Configuration............................................................ 86
Figure 4.78 Security > IP Security > Global Settings ..................................................................... 87
Figure 4.79 Security > IP Security > Entry Settings ....................................................................... 87
Figure 4.80 Security > Access Control List > MAC ACL > Entry Settings...................................... 88
Figure 4.81 Security > Access Control List > IP ACL > Entry Settings........................................... 89
Figure 4.82 Security > IP Source Guard > Global Settings............................................................ 90
Figure 4.83 Security > IP Source Guard > Entry Settings.............................................................. 90
Figure 4.84 Security > DHCP Snooping > Global Settings > DHCP Snooping State Settings....... 91
Figure 4.85 Security > DHCP Snooping > Global Settings > DHCP Snooping Port Settings ........ 91
Figure 4.86 Security > DHCP Snooping > Global Settings > DHCP Snooping Binding
Port Settings................................................................................................................ 92
Figure 4.87 Security > ARP Spoofing............................................................................................. 92