ES-2024 Series User’s Guide
Figure 39 Port Based VLAN Setup (Port Isolation) ...............................................
87
Figure 40 Static MAC Forwarding ..........................................................................
90
Figure 41 Filtering ..................................................................................................
92
Figure 42 Spanning Tree Protocol: Status .............................................................
96
Figure 43 Spanning Tree Protocol: Configuration ..................................................
97
Figure 44 Bandwidth Control .................................................................................
100
Figure 45 Broadcast Storm Control .......................................................................
102
Figure 46 Mirroring ................................................................................................
105
Figure 47 Link Aggregation Control Protocol Status .............................................
109
Figure 48 Link Aggregation: Configuration ............................................................
110
Figure 49 RADIUS Server ....................................................................................
112
Figure 50 Port Authentication ................................................................................
114
Figure 51 Port Authentication: 802.1x ...................................................................
Figure 52 Port Authentication: RADIUS ................................................................
115
Figure 53 Port Security ..........................................................................................
119
Figure 54 Port Security Example ...........................................................................
120
Figure 55 Queuing Method ....................................................................................
123
Figure 56 Multicast Status . ....................................................................................
125
Figure 57 Multicast Setting .....................................................................................
126
Figure 58 Multicast: IGMP Filtering Profile ............................................................
128
Figure 59 MVR Network Example .........................................................................
129
Figure 60 MVR Multicast Television Example .......................................................
130
Figure 61 MVR ......................................................................................................
131
Figure 62 MVR: Group Configuration ....................................................................
133
Figure 63 MVR Configuration Example .................................................................
134
Figure 64 MVR Configuration Example .................................................................
135
Figure 65 MVR Group Configuration Example .....................................................
136
Figure 66 Static Routing ........................................................................................
138
Figure 67 DiffServ ..................................................................................................
140
Figure 68 DiffServ: DSCP Setting ..........................................................................
142
Figure 69 Maintenance .........................................................................................
144
Figure 70 Load Factory Default: Conformation .....................................................
145
Figure 71 Reboot System: Confirmation ...............................................................
146
Figure 72 Firmware Upgrade ................................................................................
Figure 73 Restore Configuration ..........................................................................
147
Figure 74 Backup Configuration ............................................................................
Figure 75 Access Control ......................................................................................
151
Figure 76 SNMP Management Model ...................................................................
Figure 77 Access Control: SNMP ..........................................................................
153
Figure 78 Access Control: Logins ..........................................................................
154
Figure 79 SSH Communication Example ...............................................................
155
Figure 80 How SSH Works .....................................................................................
156
Figure 81 SSH Login Example ..............................................................................
157
21
List of Figures