iii
3-6-1. Priority...................................................................................................................64
3-6-2. Policer...................................................................................................................70
3-6-3. Shaper..................................................................................................................71
3-6-4. Flow......................................................................................................................72
3-6-5. Police-Flow...........................................................................................................76
3-6-6. Mark......................................................................................................................77
3-6-7. Mark-enable..........................................................................................................78
3-7. ACL...............................................................................................................................79
3-7-1. ACL Mode.............................................................................................................79
3-7-2. ACL/VLAN Mapping..............................................................................................80
3-7-3. ACL Rule...............................................................................................................81
3-8. ACL QoS Load .............................................................................................................82
3-9. User Defined ................................................................................................................83
3-10. SNMP Configuration ..................................................................................................84
3-11. IGMP Snooping..........................................................................................................90
3-12. Trunk ..........................................................................................................................94
3-13. STP Configuration....................................................................................................101
3-13-1. STP Status........................................................................................................101
3-13-2. STP Configuration ............................................................................................103
3-13-3. STP Port Configuration.....................................................................................105
3-14. GVRP Configuration.................................................................................................108
3-15. 802.1X Configuration ...............................................................................................114
3-16. Alarm Configuration..................................................................................................124
3-17. Configuration............................................................................................................127
3-17-1. Save/Restore………………………………………………………………………..128
3-17-2. Config FileT ......................................................................................................133
3-18. Diagnostics...............................................................................................................134
3-19. Loop Detection.........................................................................................................137
3-20. TFTP Server.............................................................................................................138
3-21. Log ...........................................................................................................................139
3-22. Firmware Upgrade ...................................................................................................141
3-23. Max. Packet Length .................................................................................................142
3-24. MAC Table................................................................................................................143
3-25. VLAN........................................................................................................................149
3-25-1. VLAN Mode ......................................................................................................149
3-25-2. VLAN Group .....................................................................................................151
3-25-3. Port Protocol.....................................................................................................155
3-25-4. Port VID............................................................................................................156
3-26. Reboot......................................................................................................................157
3-27. Logout ......................................................................................................................158
4. Operation of CLI Management...................................................................................159
4-1. CLI Management........................................................................................................159
4-1-1. Login...................................................................................................................159