
EKI-7708 Series User Manual xii
Figure 4.27 L2 Switching > GARP > GARP Settings ..................................................................... 55
Figure 4.28 L2 Switching > GARP > GVRP Settings ..................................................................... 56
Figure 4.29 L2 Switching > GARP > GMRP Settings..................................................................... 56
Figure 4.30 L2 Switching > 802.3az EEE....................................................................................... 57
Figure 4.31 L2 Switching > Multicast > Multicast Filtering.............................................................. 57
Figure 4.32 L2 Switching > Multicast > IGMP Snooping > IGMP Settings..................................... 58
Figure 4.33 L2 Switching > Multicast > IGMP Snooping > IGMP Querier...................................... 59
Figure 4.34 L2 Switching > Multicast > IGMP Snooping > IGMP Static Groups............................ 59
Figure 4.35 L2 Switching > Multicast > MLD Snooping > MLD Settings........................................ 60
Figure 4.36 L2 Switching > Multicast > MLD Snooping > MLD Querier......................................... 61
Figure 4.37 L2 Switching > Multicast > MLD Snooping > MLD Static Group................................. 61
Figure 4.38 L2 Switching > Jumbo Frame...................................................................................... 62
Figure 4.39 L2 Switching > Spanning Tree > STP Global Settings................................................ 63
Figure 4.40 L2 Switching > Spanning Tree > STP Port Settings.................................................... 64
Figure 4.41 L2 Switching > Spanning Tree > STP Bridge Settings................................................ 65
Figure 4.42 L2 Switching > Spanning Tree > STP Port Advanced Settings................................... 66
Figure 4.43 L2 Switching > Spanning Tree > MST Config Identification........................................ 66
Figure 4.44 L2 Switching > Spanning Tree > MST Instance ID Settings ....................................... 67
Figure 4.45 L2 Switching > Spanning Tree > MST Instance Priority Settings................................ 67
Figure 4.46 L2 Switching > X-Ring Elite > X-Ring Elite Settings.................................................... 68
Figure 4.47 L2 Switching > X-Ring Elite > X-Ring Elite Groups..................................................... 69
Figure 4.48 L2 Switching > X-Ring Pro > X-Ring Pro Settings....................................................... 69
Figure 4.49 L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro Groups Settings....... 70
Figure 4.50 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Chain Settings ............................ 70
Figure 4.51 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Couple Setting............................ 70
Figure 4.52 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Pair Settings ............................... 71
Figure 4.53 L2 Switching > X-Ring Pro > X-Ring Pro Groups > RPair Settings............................. 71
Figure 4.54 L2 Switching > Loopback Detection > Global Settings................................................ 72
Figure 4.55 L2 Switching > Loopback Detection > Port Settings ................................................... 72
Figure 4.56 L2 Switching > CFM > CFM Settings.......................................................................... 73
Figure 4.57 L2 Switching > CFM > ME Groups.............................................................................. 73
Figure 4.58 L2 Switching > CFM > ME Settings............................................................................. 74
Figure 4.59 L2 Switching > ERPS > ERPS Settings...................................................................... 74
Figure 4.60 L2 Switching > ERPS > ERPS Groups ....................................................................... 74
Figure 4.61 MAC Address Table > Static MAC.............................................................................. 75
Figure 4.62 MAC Address Table > MAC Aging Time..................................................................... 76
Figure 4.63 MAC Address Table > Dynamic Forwarding Table..................................................... 76
Figure 4.64 Security > Storm Control > Global Settings................................................................. 77
Figure 4.65 Security > Storm Control > Port Settings .................................................................... 78
Figure 4.66 Security > Port Security............................................................................................... 79
Figure 4.67 Security > Protected Ports...........................................................................................79
Figure 4.68 Security > DoS Prevention > DoS Global Settings...................................................... 80
Figure 4.69 Security > DoS Prevention > DoS Port Settings ......................................................... 81
Figure 4.70 Security > Applications > TELNET.............................................................................. 82
Figure 4.71 Security > Applications > SSH .................................................................................... 82
Figure 4.72 Security > Applications > HTTP .................................................................................. 83
Figure 4.73 Security > Applications > HTTPS................................................................................ 83
Figure 4.74 Security > 802.1x > 802.1x Settings............................................................................ 84
Figure 4.75 Security > 802.1x > 802.1x Port Configuration............................................................ 85
Figure 4.76 Security > IP Security > Global Settings ..................................................................... 85
Figure 4.77 Security > IP Security > Entry Settings ....................................................................... 86
Figure 4.78 Security > Access Control List > MAC ACL > Entry Settings...................................... 87
Figure 4.79 Security > Access Control List > IP ACL > Entry Settings........................................... 88
Figure 4.80 Security > IP Source Guard > Global Settings............................................................ 89
Figure 4.81 Security > IP Source Guard > Entry Settings.............................................................. 89
Figure 4.82 Security > DHCP Snooping > Global Settings > DHCP Snooping State Settings....... 90
Figure 4.83 Security > DHCP Snooping > Global Settings > DHCP Snooping Port Settings ........ 90
Figure 4.84 Security > DHCP Snooping > Global Settings > DHCP Snooping Binding Port
Settings ....................................................................................................................... 90
Figure 4.85 Security > ARP Spoofing............................................................................................. 91