5.1.1
Port Config .......................................................................................................29
5.1.2
Port Mirror ........................................................................................................30
5.1.3
Port Security ....................................................................................................32
5.1.4
Port Isolation ....................................................................................................34
5.1.5
Loopback Detection .........................................................................................35
5.2
LAG ............................................................................................................................36
5.2.1
LAG Table ........................................................................................................37
5.2.2
Static LAG ........................................................................................................38
5.2.3
LACP Config ....................................................................................................39
5.3
Traffic Monitor.............................................................................................................41
5.3.1
Traffic Summary...............................................................................................41
5.3.2
Traffic Statistics ................................................................................................42
5.4
MAC Address..............................................................................................................44
5.4.1
Address Table ..................................................................................................45
5.4.2
Static Address ..................................................................................................46
5.4.3
Dynamic Address .............................................................................................47
5.4.4
Filtering Address ..............................................................................................49
5.5
DHCP Filtering............................................................................................................50
Chapter 6
VLAN..........................................................................................................................54
6.1
802.1Q VLAN..............................................................................................................55
6.1.1
VLAN Config ....................................................................................................57
6.1.2
Port Config .......................................................................................................59
6.2
Application Example for 802.1Q VLAN .......................................................................61
Chapter 7
Spanning Tree ............................................................................................................63
7.1
STP Config .................................................................................................................68
7.1.1
STP Config.......................................................................................................68
7.1.2
STP Summary..................................................................................................70
7.2
Port Config..................................................................................................................70
7.3
MSTP Instance ...........................................................................................................72
7.3.1
Region Config ..................................................................................................72
7.3.2
Instance Config ................................................................................................73
7.3.3
Instance Port Config.........................................................................................74
7.4
STP Security...............................................................................................................76
7.4.1
Port Protect ......................................................................................................76
7.4.2
TC Protect........................................................................................................79
7.5
Application Example for STP Function .......................................................................79
VI