5.1.3  Port Security ....................................................................................................27 
5.1.4  Port Isolation ....................................................................................................29 
5.2  LAG ............................................................................................................................30 
5.2.1  LAG Table ........................................................................................................30 
5.2.2  Static LAG ........................................................................................................32 
5.3  Traffic Monitor.............................................................................................................33 
5.3.1  Traffic Summary...............................................................................................33 
5.3.2  Traffic Statistics ................................................................................................34 
5.4  MAC Address..............................................................................................................36 
5.4.1  Address Table ..................................................................................................36 
5.4.2  Static Address ..................................................................................................38 
5.4.3  Dynamic Address .............................................................................................39 
5.4.4  Filtering Address ..............................................................................................41 
Chapter 6  VLAN .........................................................................................................................43 
6.1  802.1Q VLAN..............................................................................................................44 
6.1.1  VLAN Config ....................................................................................................46 
6.1.2  Port Config .......................................................................................................48 
6.2  Application Example for 802.1Q VLAN .......................................................................50 
Chapter 7  Spanning Tree............................................................................................................52 
7.1  STP Config .................................................................................................................57
 
7.1.1  STP Config.......................................................................................................57 
7.1.2  STP Summary..................................................................................................59 
7.2  Port Config..................................................................................................................60 
7.3  MSTP Instance ...........................................................................................................62 
7.3.1  Region Config ..................................................................................................62 
7.3.2  Instance Config ................................................................................................63 
7.3.3  Instance Port Config.........................................................................................64 
7.4  STP Security...............................................................................................................66 
7.4.1  Port Protect ......................................................................................................66 
7.4.2  TC Protect........................................................................................................69 
7.5  Application Example for STP Function .......................................................................69 
Chapter 8  Multicast.....................................................................................................................73 
8.1  IGMP Snooping ..........................................................................................................75 
8.1.1  Snooping Config ..............................................................................................76 
8.1.2  Port Config .......................................................................................................77 
IV