VI
5.2.6 Example of Configuring VLAN
................................................................................................................................ 24
5.3 Link Aggregation
..................................................................................................................................................................... 24
5.3.1 Static Aggregation Mode
.......................................................................................................................................... 25
5.3.2 LACP Mode
....................................................................................................................................................................... 26
5.4 Security
......................................................................................................................................................................................... 27
5.4.1 MAC Address List
.......................................................................................................................................................... 27
5.4.2 Binding Port MAC
......................................................................................................................................................... 28
5.4.3 Filtering Port MAC
........................................................................................................................................................ 29
5.5 Configuring SNMP
................................................................................................................................................................... 30
5.5.1 SNMP Protocol Version
.............................................................................................................................................. 30
5.5.2 Configuring SNMP
........................................................................................................................................................ 31
5.5.3 Example of SNMPv1/v2 Configuration
.............................................................................................................. 32
5.5.4 Example of SNMPv3 Configuration
..................................................................................................................... 32
5.6 802.1x
............................................................................................................................................................................................ 34
5.6.1 802.1x Networking Structure
................................................................................................................................. 34
5.6.2 802.1x Authentication Controlled/Uncontrolled Port
............................................................................... 35
5.6.3 Trigger Mode of 802.1x Authentication
............................................................................................................ 35
5.6.4 Configuring NAS
............................................................................................................................................................ 36
5.6.5 Configuring Radius
...................................................................................................................................................... 37
5.7 IGMP Snooping
......................................................................................................................................................................... 38
5.7.1 IGMP Snooping Theory
.............................................................................................................................................. 38
5.7.2 Configuring IGMP Snooping
................................................................................................................................... 39
5.8 Configuring HTTPS
.................................................................................................................................................................. 39
6 PoE
............................................................................................................................................................................................................. 44
6.1 Configuring PoE Power
......................................................................................................................................................... 44
6.2 Viewing PoE Event Statistics
.............................................................................................................................................. 46
6.3 Configuring Green PoE
......................................................................................................................................................... 47
6.4 Configuring Legacy Support
.............................................................................................................................................. 48
6.5 Configuring PD Alive
............................................................................................................................................................. 48
Appendix Cybersecurity Recommendations
............................................................................................................................ 50