![ORiNG IGS-9084GP-FB2-MM User Manual Download Page 5](http://html1.mh-extra.com/html/oring/igs-9084gp-fb2-mm/igs-9084gp-fb2-mm_user-manual_1651952005.webp)
IGS-9084GP-FB2 Series User Manual
ORing Industrial Networking Corp
4
5.4.1
VLAN Membership ..................................................................................... 63
5.4.2
Port Configurations ..................................................................................... 65
Examples of VLAN Settings .................................................................................... 69
5.4.3
Private VLAN.............................................................................................. 73
5.5
SNMP............................................................................................................. 75
5.5.1
SNMP System Configurations..................................................................... 75
5.5.2
SNMP Community Configurations............................................................... 77
5.5.3
SNMP User Configurations ......................................................................... 78
5.5.4
SNMP Group Configurations ...................................................................... 79
5.5.5
SNMP View Configurations ......................................................................... 80
5.5.6
SNMP Access Configurations ..................................................................... 81
5.6
Traffic Prioritization ......................................................................................... 82
5.6.1
Storm Control ............................................................................................. 82
5.6.2
Port Classification ....................................................................................... 83
5.6.3
Port Tag Remaking ..................................................................................... 85
5.6.4
Port DSCP ................................................................................................. 85
5.6.5
Policing ...................................................................................................... 87
Queue Policing ....................................................................................................... 88
5.6.6
Scheduling and Shaping ............................................................................. 88
5.6.7
Port Scheduler ........................................................................................... 91
5.6.8
Port Shaping .............................................................................................. 92
5.6.9
DSCP-based QoS ...................................................................................... 92
5.6.10
DSCP Translation ................................................................................... 93
5.6.11
DSCP Classification ............................................................................... 94
5.6.12
QoS Control List ..................................................................................... 94
5.6.13
QoS Counters ........................................................................................ 97
5.6.14
QCL Status ............................................................................................. 97
5.7
Multicast ......................................................................................................... 98
5.7.1
IGMP Snooping .......................................................................................... 98
5.7.2
VLAN Configurations of IGMP Snooping ..................................................... 99
5.7.3
IGMP Snooping Status ............................................................................. 100
5.7.4
Groups Information of IGMP Snooping ..................................................... 101
5.8
Security ........................................................................................................ 102
5.8.1
Remote Control Security Configurations ................................................... 102
5.8.2
Device Binding ......................................................................................... 102
5.8.3
ACL .......................................................................................................... 108
5.8.4
Authentication, Authorization, and Accounting ........................................... 119