ZyXEL Communications ES-3148 Series Switch User Manual


 
List of Figures
ES-3148 User’s Guide
23
Figure 82 Advanced Application > Multicast > Multicast Setting ......................................................... 173
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................. 175
Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ................... 176
Figure 85 MVR Network Example ....................................................................................................... 177
Figure 86 MVR Multicast Television Example ..................................................................................... 178
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR ............................................. 179
Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 181
Figure 89 MVR Configuration Example ............................................................................................... 182
Figure 90 MVR Configuration Example ............................................................................................... 182
Figure 91 MVR Group Configuration Example ................................................................................... 183
Figure 92 MVR Group Configuration Example .................................................................................... 183
Figure 93 AAA Server .......................................................................................................................... 185
Figure 94 Advanced Application > Auth and Acct ............................................................................... 186
Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................ 187
Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup ..................................... 189
Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup .......................................... 191
Figure 98 DHCP Snooping Database File Format ............................................................................... 200
Figure 99 Example: Man-in-the-middle Attack ..................................................................................... 201
Figure 100 Advanced Application > IP Source Guard .......................................................................... 203
Figure 101 Advanced Application > IP Source Guard > Static Binding ................................................ 204
Figure 102 Advanced Application > IP Source Guard > DHCP Snooping ........................................... 205
Figure 103 Advanced Application > IP Source Guard > DHCP Snooping > Configure ........................ 208
Figure 104 Advanced Application > IP Source Guard > DHCP Snooping > Configure > Port ............. 210
Figure 105 Advanced Application > IP Source Guard > DHCP Snooping > Configure > VLAN ...........211
Figure 106 Advanced Application > IP Source Guard > ARP Inspection ............................................. 212
Figure 107 Advanced Application > IP Source Guard > ARP Inspection > VLAN Status ..................... 213
Figure 108 Advanced Application > IP Source Guard > ARP Inspection > Log Status ........................ 214
Figure 109 Advanced Application > IP Source Guard > ARP Inspection > Configure ......................... 215
Figure 110 Advanced Application > IP Source Guard > ARP Inspection > Configure > Port ............... 216
Figure 111 Advanced Application > IP Source Guard > ARP Inspection > Configure > VLAN ............ 217
Figure 112 Loop Guard vs STP ............................................................................................................ 219
Figure 113 Switch in Loop State ........................................................................................................... 220
Figure 114 Loop Guard - Probe Packet ................................................................................................ 220
Figure 115 Loop Guard - Network Loop ............................................................................................... 220
Figure 116 Advanced Application > Loop Guard .................................................................................. 221
Figure 117 IP Application > Static Routing .......................................................................................... 223
Figure 118 DiffServ: Differentiated Service Field .................................................................................. 225
Figure 119 DiffServ Network ................................................................................................................ 226
Figure 120 TRTCM - Color-blind Mode ............................................................................................... 227
Figure 121 TRTCM - Color-aware Mode ............................................................................................. 227
Figure 122 IP Application > DiffServ .................................................................................................... 228
Figure 123 IP Application > DiffServ > 2-rate 3 Color Marker ............................................................. 229
Figure 124 IP Application > DiffServ > DSCP Setting ......................................................................... 230