List of Figures

 

 

Figure 39 Advanced Application > Filtering ...........................................................................................

93

Figure 40 STP/RSTP Network Example ................................................................................................

98

Figure 41 MSTP Network Example ........................................................................................................

98

Figure 42 MSTIs in Different Regions ...................................................................................................

99

Figure 43 MSTP and Legacy RSTP Network Example .........................................................................

99

Figure 44 Advanced Application > Spanning Tree Protocol ................................................................

100

Figure 45 Advanced Application > Spanning Tree Protocol > RSTP ...................................................

100

Figure 46 Advanced Application > Spanning Tree Protocol > Status: RSTP .......................................

102

Figure 47 Advanced Application > Spanning Tree Protocol > MSTP ..................................................

103

Figure 48 Advanced Application > Spanning Tree Protocol > Status: MSTP ......................................

106

Figure 49 Advanced Application > Bandwidth Control ........................................................................

109

Figure 50 Advanced Application > Broadcast Storm Control ...............................................................

111

Figure 51 Advanced Application > Mirroring .........................................................................................

113

Figure 52 Advanced Application > Link Aggregation Status .................................................................

116

Figure 53 Advanced Application > Link Aggregation > Link Aggregation Setting ................................

117

Figure 54 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP ...................

118

Figure 55 Trunking Example - Physical Connections ...........................................................................

120

Figure 56 Trunking Example - Configuration Screen ............................................................................

120

Figure 57 IEEE 802.1x Authentication Process ...................................................................................

122

Figure 58 Advanced Application > Port Authentication .......................................................................

122

Figure 59 Advanced Application > Port Authentication > 802.1x ........................................................

123

Figure 60 Advanced Application > Port Security .................................................................................

126

Figure 61 Port Security Example .........................................................................................................

127

Figure 62 Advanced Application > Queuing Method ...........................................................................

130

Figure 63 Advanced Application > Multicast ........................................................................................

132

Figure 64 Advanced Application > Multicast > Multicast Setting .........................................................

133

Figure 65 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN .................

135

Figure 66 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ...................

136

Figure 67 MVR Network Example .......................................................................................................

137

Figure 68 MVR Multicast Television Example .....................................................................................

138

Figure 69 Advanced Application > Multicast > Multicast Setting > MVR .............................................

139

Figure 70 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............

141

Figure 71 MVR Configuration Example ...............................................................................................

142

Figure 72 MVR Configuration Example ...............................................................................................

142

Figure 73 MVR Group Configuration Example ...................................................................................

143

Figure 74 MVR Group Configuration Example ....................................................................................

143

Figure 75 AAA Server ..........................................................................................................................

145

Figure 76 Advanced Application > Auth and Acct ...............................................................................

146

Figure 77 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................

147

Figure 78 Advanced Application > Auth and Acct > TACACS+ Server Setup

.....................................

149

Figure 79 Advanced Application > Auth and Acct > Auth and Acct Setup ..........................................

151

Figure 80 Example: Man-in-the-middle Attack .....................................................................................

159

Figure 81 IP Source Guard ...................................................................................................................

161

20

ES-2024 Series User’s Guide