iii
3-4-5. MAC Table.........................................................................................................................72
3-5. GVRP.........................................................................................................................................73
3-5-1. Config ................................................................................................................................73
3-5-2. Counter..............................................................................................................................76
3-5-3. Group.................................................................................................................................78
3-6. QOS(QUALITY OF SERVICE)CONFIGURATION.............................................................................79
3-6-1. Ports...................................................................................................................................79
3-6-2. Qos Control List.................................................................................................................81
3-6-3.Rate Limiters.......................................................................................................................87
3-6-4.Storm Control......................................................................................................................89
3-6-5.Wizard.................................................................................................................................90
3-7. SNMPCONFIGURATION............................................................................................................100
3-8.ACL..........................................................................................................................................102
3-8-1.Ports..................................................................................................................................102
3-8-2.Rate Limiters.....................................................................................................................104
3-8-3.Access Control List...........................................................................................................105
3-8-4.Wizard...............................................................................................................................133
3-9. IPMAC BINDING .....................................................................................................................141
3-10. 802.1X CONFIGURATION.........................................................................................................143
3-10-1.Server..............................................................................................................................148
3-10-2.Port Configuration..........................................................................................................150
3-10-3.Status...............................................................................................................................153
3-10-4. Statistics.........................................................................................................................154
3-11. TRUNKING CONFIGURATION....................................................................................................155
3-11-1.Port .................................................................................................................................156
3-11-2 Aggregator View..............................................................................................................158
3-11-3 LACP System Priority .....................................................................................................159
3-12 STPCONFIGURATION...............................................................................................................160
3-12-1 STPSTATUS ..........................................................................................................................160
3-12-2. Configuration.................................................................................................................162
3-12-3. STP Port Configuration.................................................................................................164
3-13 MSTP......................................................................................................................................167
3-13-1 Status...............................................................................................................................167
3-13-2 Region Config.................................................................................................................168
3-13-3 Instance View..................................................................................................................169
3-14. MIRROR ..................................................................................................................................177
3-15. IGMPSNOOPING ....................................................................................................................179
3-15-1 Proxy...............................................................................................................................179
3-15-2 Group Membership.........................................................................................................181
3-16.ALARM CONFIGURATION ........................................................................................................182
3-16-1 Events..............................................................................................................................183
3-16-2 Email...............................................................................................................................184
3-17. DHCPSNOOPING....................................................................................................................185
3-17-1. DHCP Snooping State....................................................................................................185
3-17-2. DHCP Snooping Entry...................................................................................................186
3-17-3. DHCP Snooping Client..................................................................................................187
3-18. CONFIGURATION .....................................................................................................................188
3-18-1. Factory Defaults............................................................................................................188
3-18-2 . Save Start......................................................................................................................189
3-18-3 . Save User......................................................................................................................189
3-18-4 . Restore User .................................................................................................................189
3-19. CONFIG FILE ...........................................................................................................................191
3-20. DIAGNOSTICS..........................................................................................................................192
3-20-1 . Diag..............................................................................................................................192
3-20-2 .Ping................................................................................................................................193