5.1.1 Port Config .......................................................................................................31
5.1.2 Port Mirror ........................................................................................................32
5.1.3 Port Security ....................................................................................................34
5.1.4 Port Isolation ....................................................................................................36
5.1.5 Loopback Detection .........................................................................................36
5.2 LAG ............................................................................................................................38
5.2.1 LAG Table ........................................................................................................38
5.2.2 Static LAG........................................................................................................40
5.2.3 LACP Config ....................................................................................................41
5.3 Traffic Monitor.............................................................................................................42
5.3.1 Traffic Summary...............................................................................................42
5.3.2 Traffic Statistics ................................................................................................44
5.4 MAC Address..............................................................................................................45
5.4.1 Address Table ..................................................................................................46
5.4.2 Static Address ..................................................................................................47
5.4.3 Dynamic Address .............................................................................................48
5.4.4 Filtering Address ..............................................................................................50
5.5 DHCP Filtering............................................................................................................51
Chapter 6 VLAN..........................................................................................................................55
6.1 802.1Q VLAN..............................................................................................................56
6.1.1 VLAN Config
....................................................................................................57
6.2 Application Example for 802.1Q VLAN .......................................................................59
Chapter 7 Spanning Tree ............................................................................................................61
7.1 STP Config .................................................................................................................66
7.1.1 STP Config.......................................................................................................66
7.1.2 STP Summary..................................................................................................68
7.2 Port Config..................................................................................................................68
7.3 MSTP Instance ...........................................................................................................70
7.3.1 Region Config ..................................................................................................70
7.3.2 Instance Config ................................................................................................71
7.3.3 Instance Port Config.........................................................................................72
7.4 STP Security...............................................................................................................74
7.4.1 Port Protect ......................................................................................................74
7.4.2 TC Protect........................................................................................................76
7.5 Application Example for STP Function .......................................................................77
Chapter 8 Multicast.....................................................................................................................81
8.1 IGMP Snooping ..........................................................................................................83
IV