
-5-
2.5.1.7.6 Access...................................................................................................................45
2.5.1.8 RMON......................................................................................................................47
2.5.1.8.1 Statistics................................................................................................................47
2.5.1.8.2 History...................................................................................................................48
2.5.1.8.3 Alarm.....................................................................................................................49
2.5.1.8.4 Event.....................................................................................................................51
2.5.2 Network.......................................................................................................................52
2.5.2.1 Limit Control.............................................................................................................52
2.5.2.2 NAS..........................................................................................................................55
2.5.2.3 ACL..........................................................................................................................64
2.5.2.3.1 Ports......................................................................................................................64
2.5.2.3.2 Rate Limits............................................................................................................66
2.5.2.3.3 Access Control List................................................................................................67
2.5.2.4 DHCP.......................................................................................................................69
2.5.2.4.1 Snooping...............................................................................................................69
2.5.2.4.2 Relay.....................................................................................................................70
2.5.2.5 IP Source Guard.......................................................................................................71
2.5.2.5.1 Configuration.........................................................................................................71
2.5.2.5.2 Static Table...........................................................................................................72
2.5.2.6 ARP Inspection.........................................................................................................73
2.5.2.6.1 Configuration.........................................................................................................73
2.5.2.6.2 Static Table...........................................................................................................74
2.5.3 AAA.............................................................................................................................75
2.6 Aggregation....................................................................................................................77
2.6.1 Static...........................................................................................................................77
2.6.2 LACP...........................................................................................................................78
2.7 Loop Protection..............................................................................................................79
2.8 Spanning Tree................................................................................................................80
2.8.1 Bridge Settings............................................................................................................81
2.8.2 MSTI Mapping.............................................................................................................83
2.8.3 MSTI Priorities.............................................................................................................84
2.8.4 CIST Ports...................................................................................................................85