5.1.1 Port Config.......................................................................................................29
5.1.2 Port Mirror........................................................................................................30
5.1.3 Port Security.................................................................................................... 32
5.1.4 Port Isolation....................................................................................................34
5.1.5 Loopback Detection......................................................................................... 35
5.2 LAG ............................................................................................................................36
5.2.1 LAG Table........................................................................................................37
5.2.2 Static LAG........................................................................................................38
5.2.3 LACP Config.................................................................................................... 39
5.3 Traffic Monitor.............................................................................................................41
5.3.1 Traffic Summary...............................................................................................41
5.3.2 Traffic Statistics................................................................................................42
5.4 MAC Address..............................................................................................................44
5.4.1 Address Table..................................................................................................45
5.4.2 Static Address..................................................................................................46
5.4.3 Dynamic Address.............................................................................................47
5.4.4 Filtering Address.............................................................................................. 49
5.5 DHCP Filtering............................................................................................................50
Chapter 6 VLAN..........................................................................................................................54
6.1 802.1Q VLAN..............................................................................................................55
6.1.1 VLAN Config.................................................................................................... 57
6.1.2 Port Config.......................................................................................................59
6.2 Application Example for 802.1Q VLAN.......................................................................61
Chapter 7 Spanning Tree............................................................................................................63
7.1 STP Config................................................................................................................. 68
7.1.1 STP Config.......................................................................................................68
7.1.2 STP Summary..................................................................................................70
7.2 Port Config..................................................................................................................70
7.3 MSTP Instance........................................................................................................... 72
7.3.1 Region Config.................................................................................................. 72
7.3.2 Instance Config................................................................................................73
7.3.3 Instance Port Config.........................................................................................74
7.4 STP Security...............................................................................................................76
7.4.1 Port Protect......................................................................................................76
7.4.2 TC Protect........................................................................................................79
7.5 Application Example for STP Function .......................................................................79
VI