v
3-4-5. MAC Table .........................................................................................................................70
3-5. GVRP.........................................................................................................................................71
3-5-1. Config ................................................................................................................................71
3-5-2. Counter..............................................................................................................................74
3-5-3. Group.................................................................................................................................76
3-6. QOS(QUALITY OF SERVICE) CONFIGURATION.............................................................................77
3-6-1. Ports...................................................................................................................................77
3-6-2. Qos Control List.................................................................................................................79
3-6-3.Rate Limiters.......................................................................................................................85
3-6-4.Storm Control......................................................................................................................87
3-6-5.Wizard.................................................................................................................................88
3-7. SNMP CONFIGURATION..............................................................................................................97
3-8. ACL............................................................................................................................................99
3-8-1.Ports....................................................................................................................................99
3-8-2.Rate Limiters.....................................................................................................................101
3-8-3.Access Control List ...........................................................................................................102
3-8-4.Wizard...............................................................................................................................130
3-9. IP MAC BINDING .....................................................................................................................139
3-10. 802.1X CONFIGURATION.........................................................................................................141
3-10-1.Server..............................................................................................................................145
3-10-2.Port Configuration..........................................................................................................147
3-10-3.Status...............................................................................................................................150
3-10-4. Statistics.........................................................................................................................151
3-11. TRUNKING CONFIGURATION....................................................................................................152
3-11-1.Port .................................................................................................................................153
3-11-2 Aggregator View..............................................................................................................155
3-11-3 ACP System Priority........................................................................................................156
3-12 STP CONFIGURATION...............................................................................................................157
3-12-1. Status..............................................................................................................................157
3-12-2. Configuration.................................................................................................................159
3-12-3. STP Port Configuration.................................................................................................161
3-13 MSTP......................................................................................................................................164
3-13-1 Status...............................................................................................................................164
3-13-2 Region Config.................................................................................................................165
3-13-3 Instance View ..................................................................................................................166
3-14. MIRROR ..................................................................................................................................174
3-15. IGMP......................................................................................................................................175
3-15-1 Proxy...............................................................................................................................175
3-15-2 IGMP Group Membership ..............................................................................................177
3-16. ALARM CONFIGURATION ........................................................................................................178
3-16-1 Events..............................................................................................................................179
3-16-2 Email...............................................................................................................................180
3-17. DHCP SNOOPING....................................................................................................................181
3-17-1. DHCP Snooping State....................................................................................................181
3-17-2. DHCP Snooping Entry...................................................................................................182
3-17-3. DHCP Snooping Client..................................................................................................183
3-18. CONFIGURATION .....................................................................................................................184
3-18-1. Factory Defaults ............................................................................................................185
3-18-2 . Save Start......................................................................................................................185
3-18-3 . Save User......................................................................................................................185
3-18-4 . Restore User .................................................................................................................186
3-19. CONFIG FILE ...........................................................................................................................187
3-20. DIAGNOSTICS..........................................................................................................................188
3-20-1 . Diag..............................................................................................................................188
3-20-2 .Ping................................................................................................................................189