5.1.1  Port Config .......................................................................................................31 
5.1.2  Port Mirror ........................................................................................................32 
5.1.3  Port Security ....................................................................................................34 
5.1.4  Port Isolation ....................................................................................................36 
5.1.5  Loopback Detection .........................................................................................36 
5.2  LAG ............................................................................................................................38 
5.2.1  LAG Table ........................................................................................................38 
5.2.2  Static LAG ........................................................................................................40 
5.2.3  LACP Config ....................................................................................................41 
5.3  Traffic Monitor.............................................................................................................42 
5.3.1  Traffic Summary...............................................................................................42 
5.3.2  Traffic Statistics ................................................................................................44 
5.4  MAC Address..............................................................................................................45 
5.4.1  Address Table ..................................................................................................46 
5.4.2  Static Address ..................................................................................................47 
5.4.3  Dynamic Address .............................................................................................48 
5.4.4  Filtering Address ..............................................................................................50 
5.5  DHCP Filtering............................................................................................................51 
Chapter 6  VLAN..........................................................................................................................55 
6.1  802.1Q VLAN..............................................................................................................56
 
6.1.1  VLAN Config
....................................................................................................57 
6.2  Application Example for 802.1Q VLAN .......................................................................59 
Chapter 7  Spanning Tree ............................................................................................................61 
7.1  STP Config .................................................................................................................66 
7.1.1  STP Config.......................................................................................................66 
7.1.2  STP Summary..................................................................................................68 
7.2  Port Config..................................................................................................................68 
7.3  MSTP Instance ...........................................................................................................70 
7.3.1  Region Config ..................................................................................................70 
7.3.2  Instance Config ................................................................................................71 
7.3.3  Instance Port Config.........................................................................................72 
7.4  STP Security...............................................................................................................74 
7.4.1  Port Protect ......................................................................................................74 
7.4.2  TC Protect........................................................................................................76 
7.5  Application Example for STP Function .......................................................................77 
Chapter 8  Multicast.....................................................................................................................81 
8.1  IGMP Snooping ..........................................................................................................83 
IV