List of Figures
MES-3728 User’s Guide
22
Figure 39 Advanced Application > VLAN > VLAN Detail ........................................................................ 92
Figure 40 Advanced Application > VLAN > Static VLAN ...................................................................... 93
Figure 41 Advanced Application > VLAN > VLAN Port Setting ............................................................. 95
Figure 42 Subnet Based VLAN Application Example ............................................................................ 96
Figure 43 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................ 97
Figure 44 Protocol Based VLAN Application Example .......................................................................... 99
Figure 45 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN .................... 100
Figure 46 Protocol Based VLAN Configuration Example .................................................................... 101
Figure 47 Port Based VLAN Setup (All Connected) ............................................................................ 103
Figure 48 Port Based VLAN Setup (Port Isolation) ............................................................................. 104
Figure 49 Advanced Application > Static MAC Forwarding ................................................................. 107
Figure 50 Advanced Application > Filtering ......................................................................................... 109
Figure 51 MRSTP Network Example ....................................................................................................113
Figure 52 STP/RSTP Network Example ...............................................................................................114
Figure 53 MSTP Network Example .......................................................................................................115
Figure 54 MSTIs in Different Regions ..................................................................................................116
Figure 55 MSTP and Legacy RSTP Network Example ........................................................................116
Figure 56 Advanced Application > Spanning Tree Protocol .................................................................117
Figure 57 Advanced Application > Spanning Tree Protocol > Configuration ........................................117
Figure 58 Advanced Application > Spanning Tree Protocol > RSTP ....................................................118
Figure 59 Advanced Application > Spanning Tree Protocol > Status: RSTP ....................................... 120
Figure 60 Advanced Application > Spanning Tree Protocol > MRSTP ................................................ 121
Figure 61 Advanced Application > Spanning Tree Protocol > Status: MRSTP .................................... 123
Figure 62 Advanced Application > Spanning Tree Protocol > MSTP .................................................. 124
Figure 63 Advanced Application > Spanning Tree Protocol > Status: MSTP ...................................... 127
Figure 64 Advanced Application > Bandwidth Control ........................................................................ 130
Figure 65 Advanced Application > Broadcast Storm Control .............................................................. 131
Figure 66 Advanced Application > Mirroring ........................................................................................ 133
Figure 67 Advanced Application > Link Aggregation Status ................................................................ 136
Figure 68 Advanced Application > Link Aggregation > Link Aggregation Setting ............................... 137
Figure 69 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................. 139
Figure 70 Trunking Example - Physical Connections ........................................................................... 140
Figure 71 Trunking Example - Configuration Screen ............................................................................ 141
Figure 72 IEEE 802.1x Authentication Process ................................................................................... 144
Figure 73 MAC Authentication Process ............................................................................................... 144
Figure 74 Advanced Application > Port Authentication ....................................................................... 145
Figure 75 Advanced Application > Port Authentication > 802.1x ........................................................ 145
Figure 76 Advanced Application > Port Authentication > MAC Authentication ................................... 147
Figure 77 Advanced Application > Port Security ................................................................................. 150
Figure 78 Advanced Application > Classifier ....................................................................................... 154
Figure 79 Advanced Application > Classifier: Summary Table ............................................................ 156
Figure 80 Classifier: Example .............................................................................................................. 158
Figure 81 Advanced Application > Policy Rule .................................................................................... 160