
EKI-9226G Series User Manual xii
Figure 4.37 L2 Switching > Multicast > MLD Snooping > MLD Settings ........................................ 56
Figure 4.38 L2 Switching > Multicast > MLD Snooping > MLD Querier ......................................... 57
Figure 4.39 L2 Switching > Multicast > MLD Snooping > MLD Static Group ................................. 57
Figure 4.40 L2 Switching > Jumbo Frame...................................................................................... 58
Figure 4.41 L2 Switching > Spanning Tree > STP Global Settings................................................ 59
Figure 4.42 L2 Switching > Spanning Tree > STP Port Settings.................................................... 60
Figure 4.43 L2 Switching > Spanning Tree > STP Bridge Settings................................................ 61
Figure 4.44 L2 Switching > Spanning Tree > STP Port Advanced Settings................................... 62
Figure 4.45 L2 Switching > Spanning Tree > MST Config Identification........................................ 62
Figure 4.46 L2 Switching > Spanning Tree > MST Instance ID Settings ....................................... 63
Figure 4.47 L2 Switching > Spanning Tree > MST Instance Priority Settings................................ 63
Figure 4.48 L2 Switching > X-Ring Elite > X-Ring Elite Settings.................................................... 64
Figure 4.49 L2 Switching > X-Ring Elite > X-Ring Elite Groups..................................................... 65
Figure 4.50 L2 Switching > X-Ring Pro > X-Ring Pro Settings....................................................... 65
Figure 4.51 L2 Switching > X-Ring Pro > X-Ring Pro Groups > X-Ring Pro Groups Settings ....... 66
Figure 4.52 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Chain Settings ............................ 66
Figure 4.53 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Couple Setting ............................ 66
Figure 4.54 L2 Switching > X-Ring Pro > X-Ring Pro Groups > Pair Settings ............................... 67
Figure 4.55 L2 Switching > X-Ring Pro > X-Ring Pro Groups > RPair Settings............................. 67
Figure 4.56 L2 Switching > Loopback Detection > Global Settings................................................ 68
Figure 4.57 L2 Switching > Loopback Detection > Port Settings ................................................... 69
Figure 4.58 L2 Switching > ERPS > ERPS Settings ...................................................................... 69
Figure 4.59 L2 Switching > ERPS > ERPS Groups ....................................................................... 70
Figure 4.60 MAC Address Table > Static MAC .............................................................................. 71
Figure 4.61 MAC Address Table > MAC Aging Time..................................................................... 71
Figure 4.62 MAC Address Table > Dynamic Forwarding Table ..................................................... 72
Figure 4.63 Security > Storm Control > Global Settings................................................................. 73
Figure 4.64 Security > Storm Control > Port Settings .................................................................... 74
Figure 4.65 Security > Port Security............................................................................................... 75
Figure 4.66 Security > Protected Ports........................................................................................... 75
Figure 4.67 Security > DoS Prevention > DoS Global Settings...................................................... 76
Figure 4.68 Security > DoS Prevention > DoS Port Settings ......................................................... 78
Figure 4.69 Security > Applications > TELNET.............................................................................. 78
Figure 4.70 Security > Applications > SSH .................................................................................... 79
Figure 4.71 Security > Applications > HTTP .................................................................................. 79
Figure 4.72 Security > Applications > HTTPS ................................................................................ 80
Figure 4.73 Security > 802.1x > 802.1x Global Settings ................................................................ 81
Figure 4.74 Security > 802.1x > 802.1x Port Configuration............................................................ 82
Figure 4.75 Security > IP Security > Global Settings ..................................................................... 82
Figure 4.76 Security > IP Security > Entry Settings ....................................................................... 83
Figure 4.77 Security > Security Login > Global Settings > Global Settings.................................... 83
Figure 4.78 Security > Security Login > Global Settings > RADIUS Settings ................................ 84
Figure 4.79 Security > Security Login > Global Settings > TACACS Settings ............................... 84
Figure 4.80 Security > Security Login > Access Control Settings > Security Login Type Settings 85
Figure 4.81 Security > Security Login > Access Control Settings > Security Login Type Settings 85
Figure 4.82 Security > Access Control List > MAC ACL > Entry Settings...................................... 86
Figure 4.83 Security > Access Control List > IP ACL > Entry Settings........................................... 87
Figure 4.84 Security > IP Source Guard > Global Settings............................................................ 88
Figure 4.85 Security > IP Source Guard > Entry Settings.............................................................. 88
Figure 4.86 Security > DHCP Snooping > Global Settings > DHCP Snooping State Settings....... 89
Figure 4.87 Security > DHCP Snooping > Global Settings > DHCP Snooping Port Settings ........ 89
Figure 4.88 Security > DHCP Snooping > Global Settings > DHCP Snooping Binding Port Settings
90
Figure 4.89 Security > ARP Spoofing............................................................................................. 90
Figure 4.90 QoS > General > QoS Properties................................................................................ 91
Figure 4.91 QoS > General > QoS Settings................................................................................... 92
Figure 4.92 QoS > General > QoS Scheduling .............................................................................. 93
Figure 4.93 QoS > General > CoS Mapping .................................................................................. 94
Figure 4.94 QoS > General > DSCP Mapping ............................................................................... 95
Figure 4.95 QoS > General > IP Precedence Mapping.................................................................. 96