3.3.16
..............................................................................
101
3.3.17
RADIUS .................................................................................
103
3.3.18
ARP Table .............................................................................
112
3.3.19
Reset Button ..........................................................................
112
3.3.20
Login Sessions ......................................................................
113
3.4.
Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
114
3.4.1
MAC Address Table...............................................................
114
3.4.2
Interface Setting.....................................................................
122
3.4.3
Interface Statistics .................................................................
128
3.4.4
Port Mirroring .........................................................................
139
3.4.5
VLAN Setting .........................................................................
142
3.4.6
QinQ ......................................................................................
152
3.4.7
GARP.....................................................................................
155
3.4.8
Port Channel..........................................................................
159
3.4.9
X-Ring Pro .............................................................................
162
3.4.10
Spanning Tree .......................................................................
165
3.4.11
Flow Control...........................................................................
174
3.5.
Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
174
3.5.1
IGMP Snooping .....................................................................
174
3.5.2
IGMP Snooping Querier.........................................................
181
3.5.3
MLD Snooping .......................................................................
185
3.5.4
MLD Snooping Querier ..........................................................
192
3.5.5
L2 Multicast Table..................................................................
195
3.5.6
GMRP Table ..........................................................................
197
3.6.
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
198
3.6.1
Denial of Service Protection...................................................
198
3.6.2
Port Access Control ...............................................................
199
3.6.3
DHCP Snooping ....................................................................
216
3.6.4
Protected Ports ......................................................................
229
3.7.
QoS . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
231
3.7.1
Access Control Lists ..............................................................
231
3.7.2
Differentiated Services...........................................................
248
3.7.3
Class of Service .....................................................................
256
iii
Summary of Contents for EKI-9312P Series
Page 13: ...Hardware Installation Chapter 1...
Page 43: ...First Time Setup Chapter 2...
Page 48: ...Management Interface Chapter 3...
Page 285: ...Troubleshooting Chapter 4...