IV
5.1.1 Port Config .......................................................................................................28
5.1.2 Port Mirror
........................................................................................................29
5.1.3 Port Security
....................................................................................................31
5.1.4 Port Isolation
....................................................................................................32
5.1.5 Loopback Detection
.........................................................................................33
5.2 LAG
............................................................................................................................34
5.2.1 LAG Table
........................................................................................................35
5.2.2 S
tatic LAG........................................................................................................36
5.2.3 LACP
Config ....................................................................................................37
5.3 T
raffic Monitor.............................................................................................................39
5.3.1 T
raffic Summary...............................................................................................39
5.3.2 T
raffic Statistics ................................................................................................40
5.4 MAC Address
..............................................................................................................41
5.4.1 Address T
able ..................................................................................................42
5.4.2 S
tatic Address ..................................................................................................43
5.4.3 Dy
namic Address .............................................................................................44
5.4.4 Filtering Address
..............................................................................................46
5.5 DHCP
Filtering............................................................................................................47
Chapter 6 VLAN
..........................................................................................................................51
6.1 802.1Q VLAN..............................................................................................................52
6.1.1 VLAN Config
....................................................................................................53
6.2 Application E
xample for 802.1Q VLAN .......................................................................55
Chapter 7 S
panning Tree............................................................................................................57
7.1 STP
Config .................................................................................................................62
7.1.1 STP
Config.......................................................................................................62
7.1.2 STP
Summary..................................................................................................64
7.2 Port Config
..................................................................................................................64
7.3 MSTP
Instance ...........................................................................................................66
7.3.1 Region Config
..................................................................................................66
7.3.2 Inst
ance Config ................................................................................................66
7.3.3 Inst
ance Port Config.........................................................................................68
7.4 STP
Security...............................................................................................................69
7.4.1 Port Protect
......................................................................................................69
7.4.2 TC Protect
........................................................................................................71
7.5 Application E
xample for STP Function .......................................................................72
Chapter 8 Multicas
t.....................................................................................................................76
8.1 IGMP
Snooping ..........................................................................................................78