EasyManua.ls Logo

ZyXEL Communications GS-3012F/3012 - Page 22

ZyXEL Communications GS-3012F/3012
314 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Figures
GS-3012/GS-3012F User’s Guide
22
Figure 39 Advanced Application > VLAN > VLAN Port Setting ............................................................. 89
Figure 40 Subnet Based VLAN Application Example ............................................................................ 90
Figure 41 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................ 91
Figure 42 Port Based VLAN Setup (All Connected) .............................................................................. 93
Figure 43 Port Based VLAN Setup (Port Isolation) ............................................................................... 94
Figure 44 Advanced Application > Static MAC Forwarding ................................................................... 95
Figure 45 Advanced Application > Filtering ........................................................................................... 97
Figure 46 MRSTP Network Example ................................................................................................... 101
Figure 47 STP/RSTP Network Example .............................................................................................. 102
Figure 48 MSTP Network Example ..................................................................................................... 103
Figure 49 MSTIs in Different Regions ................................................................................................. 104
Figure 50 MSTP and Legacy RSTP Network Example ....................................................................... 104
Figure 51 Advanced Application > Spanning Tree Protocol ................................................................ 105
Figure 52 Advanced Application > Spanning Tree Protocol > Configuration ....................................... 105
Figure 53 Advanced Application > Spanning Tree Protocol > RSTP ................................................... 106
Figure 54 Advanced Application > Spanning Tree Protocol > Status: RSTP ....................................... 108
Figure 55 Advanced Application > Spanning Tree Protocol > MRSTP ................................................ 109
Figure 56 Advanced Application > Spanning Tree Protocol > Status: MRSTP .....................................111
Figure 57 Advanced Application > Spanning Tree Protocol > MSTP ...................................................112
Figure 58 Advanced Application > Spanning Tree Protocol > Status: MSTP .......................................115
Figure 59 Advanced Application > Bandwidth Control .........................................................................118
Figure 60 Advanced Application > Broadcast Storm Control ...............................................................119
Figure 61 Advanced Application > Mirroring ........................................................................................ 121
Figure 62 Advanced Application > Link Aggregation Status ................................................................ 124
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting ............................... 125
Figure 64 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................. 127
Figure 65 Trunking Example - Physical Connections ........................................................................... 128
Figure 66 Trunking Example - Configuration Screen ............................................................................ 129
Figure 67 IEEE 802.1x Authentication Process .................................................................................. 132
Figure 68 MAC Authentication Process .............................................................................................. 132
Figure 69 Advanced Application > Port Authentication ....................................................................... 133
Figure 70 Advanced Application > Port Authentication > 802.1x ........................................................ 133
Figure 71 Advanced Application > Port Authentication > MAC Authentication ................................... 135
Figure 72 Advanced Application > Port Security ................................................................................. 138
Figure 73 Advanced Application > Classifier ....................................................................................... 142
Figure 74 Advanced Application > Classifier: Summary Table ............................................................ 144
Figure 75 Classifier: Example .............................................................................................................. 146
Figure 76 Advanced Application > Policy Rule ................................................................................... 148
Figure 77 Advanced Application > Policy Rule: Summary Table ......................................................... 150
Figure 78 Policy Example .................................................................................................................... 151
Figure 79 Advanced Application > Queuing Method ........................................................................... 154
Figure 80 Advanced Application > Multicast ........................................................................................ 156
Figure 81 Advanced Application > Multicast > Multicast Setting ......................................................... 157

Table of Contents

Related product manuals