V
6.5.2 Protocol Group .................................................................................................. 77
6.5.3 Protocol Template.............................................................................................. 77
6.6 Application Example for Protocol VLAN ...................................................................... 79
6.7 VLAN VPN.................................................................................................................... 81
6.7.1 VPN Config........................................................................................................ 82
6.7.2 Port Enable........................................................................................................ 83
6.7.3 VLAN Mapping .................................................................................................. 83
6.8 GVRP ........................................................................................................................... 86
6.9 Private VLAN................................................................................................................ 89
6.9.1 PVLAN Config ................................................................................................... 91
6.9.2 Port Config ........................................................................................................ 92
6.10 Application Example for Private VLAN ........................................................................ 93
Chapter 7 Spanning Tree.............................................................................................................. 96
7.1 STP Config ................................................................................................................. 101
7.1.1 STP Config ...................................................................................................... 101
7.1.2 STP Summary ................................................................................................. 103
7.2 Port Config ................................................................................................................. 104
7.3 MSTP Instance........................................................................................................... 105
7.3.1 Region Config.................................................................................................. 106
7.3.2 Instance Config ............................................................................................... 106
7.3.3 Instance Port Config........................................................................................ 107
7.4 STP Security .............................................................................................................. 109
7.4.1 Port Protect ..................................................................................................... 109
7.4.2 TC Protect ........................................................................................................112
7.5 Application Example for STP Function .......................................................................112
Chapter 8 Ethernet OAM.............................................................................................................117
8.1 Basic Config ............................................................................................................... 120
8.1.1 Basic Config .................................................................................................... 121
8.1.2 Discovery Info.................................................................................................. 122
8.2 Link Monitoring........................................................................................................... 124
8.3 RFI.............................................................................................................................. 125
8.4 Remote Loopback ...................................................................................................... 126
8.5 Statistics ..................................................................................................................... 127
8.5.1 Statistics .......................................................................................................... 127
8.5.2 Event Log ........................................................................................................ 128
8.6 DLDP.......................................................................................................................... 129
8.7 Application Example for DLDP
................................................................................... 133