4
3-4-2. Static Filter........................................................................................................................ 26
3-4-3. Static Forward................................................................................................................... 27
3-4-4. MAC Alias......................................................................................................................... 28
3-4-5. MAC Table......................................................................................................................... 29
3-5. GVRP........................................................................................................................................ 30
3-5-1. Config................................................................................................................................ 30
3-5-2. Counter.............................................................................................................................. 33
3-5-3. Group ................................................................................................................................ 35
3-6. QOS(QUALITY OF SERVICE)CONFIGURATION ............................................................................ 36
3-6-1. Ports.................................................................................................................................. 36
3-6-2. Qos Control List................................................................................................................ 38
3-6-3.Rate Limiters...................................................................................................................... 44
3-6-4.Storm Control..................................................................................................................... 46
3-6-5.Wizard ................................................................................................................................ 47
3-7. SNMPCONFIGURATION ............................................................................................................. 57
3-8.ACL........................................................................................................................................... 59
3-8-1.Ports................................................................................................................................... 59
3-8-2.Rate Limiters...................................................................................................................... 61
3-8-3.Access Control List............................................................................................................. 62
3-8-4.Wizard ................................................................................................................................ 91
3-9. IPMAC BINDING..................................................................................................................... 100
3-10. 802.1X CONFIGURATION........................................................................................................ 102
3-10-1.Server............................................................................................................................. 107
3-10-2.Port Configuration......................................................................................................... 109
3-10-3.Status...............................................................................................................................111
3-10-4. Statistics .........................................................................................................................113
3-11. TRUNKING CONFIGURATION....................................................................................................114
3-11-1.Port..................................................................................................................................116
3-11-2 Aggregator View ..............................................................................................................118
3-11-3 ACP System Priority........................................................................................................119
3-12 STPCONFIGURATION .............................................................................................................. 120
3-12-1. Status............................................................................................................................. 120
3-12-2. Configuration................................................................................................................ 122
3-12-3. STP Port Configuration ................................................................................................ 124
3-13 MSTP ..................................................................................................................................... 127
3-13-1 Status.............................................................................................................................. 127
3-13-2 Region Config................................................................................................................. 128
3-13-3 Instance View.................................................................................................................. 129
3-14. MIRROR.................................................................................................................................. 137
3-15-1 Proxy .............................................................................................................................. 139
3-15-2 Group Membership.........................................................................................................141
3-16.ALARM CONFIGURATION........................................................................................................ 142
3-16-1 Events............................................................................................................................. 143
3-16-2 Email.............................................................................................................................. 144
3-17. DHCPSNOOPING ................................................................................................................... 145
3-17-1. DHCP Snooping State................................................................................................... 145
3-17-2. DHCP Snooping Entry.................................................................................................. 146
3-17-3. DHCP Snooping Client................................................................................................. 147
3-18. CONFIGURATION..................................................................................................................... 148
3-18-1. Factory Defaults............................................................................................................ 149
3-18-2 . Save Start...................................................................................................................... 149
3-18-3 . Save User ..................................................................................................................... 149
3-18-4 . Restore User................................................................................................................. 150
3-19. CONFIG FILE........................................................................................................................... 151
3-20. DIAGNOSTICS ......................................................................................................................... 152