IV
5.1.1 Port Config .......................................................................................................28
5.1.2 Port Mirror ........................................................................................................29
5.1.3 Port Security ....................................................................................................31
5.1.4 Port Isolation ....................................................................................................32
5.1.5 Loopback Detection .........................................................................................33
5.2 LAG ............................................................................................................................34
5.2.1 LAG Table ........................................................................................................35
5.2.2 Static LAG ........................................................................................................36
5.2.3 LACP Config ....................................................................................................37
5.3 Traffic Monitor .............................................................................................................39
5.3.1 Traffic Summary...............................................................................................39
5.3.2 Traffic Statistics ................................................................................................40
5.4 MAC Address..............................................................................................................41
5.4.1 Address Table ..................................................................................................42
5.4.2 Static Address ..................................................................................................43
5.4.3 Dynamic Address .............................................................................................44
5.4.4 Filtering Address ..............................................................................................46
5.5 DHCP Filtering............................................................................................................47
Chapter 6 VLAN..........................................................................................................................51
6.1 802.1Q VLAN..............................................................................................................52
6.1.1 VLAN Config ....................................................................................................53
6.2 Application Example for 802.1Q VLAN .......................................................................55
Chapter 7 Spanning Tree ............................................................................................................57
7.1 STP Config .................................................................................................................62
7.1.1 STP Config.......................................................................................................62
7.1.2 STP Summary..................................................................................................64
7.2 Port Config..................................................................................................................64
7.3 MSTP Instance ...........................................................................................................66
7.3.1 Region Config ..................................................................................................66
7.3.2 Instance Config ................................................................................................66
7.3.3 Instance Port Config.........................................................................................68
7.4 STP Security...............................................................................................................69
7.4.1 Port Protect ......................................................................................................69
7.4.2 TC Protect........................................................................................................71
7.5 Application Example for STP Function .......................................................................72
Chapter 8 Multicast.....................................................................................................................76
8.1 IGMP Snooping ..........................................................................................................78