List of Figures
Figure 39 Advanced Application > Filtering ...........................................................................................
93
Figure 40 STP/RSTP Network Example ................................................................................................
98
Figure 41 MSTP Network Example ........................................................................................................
Figure 42 MSTIs in Different Regions ...................................................................................................
99
Figure 43 MSTP and Legacy RSTP Network Example .........................................................................
Figure 44 Advanced Application > Spanning Tree Protocol ................................................................
100
Figure 45 Advanced Application > Spanning Tree Protocol > RSTP ...................................................
Figure 46 Advanced Application > Spanning Tree Protocol > Status: RSTP .......................................
102
Figure 47 Advanced Application > Spanning Tree Protocol > MSTP ..................................................
103
Figure 48 Advanced Application > Spanning Tree Protocol > Status: MSTP ......................................
106
Figure 49 Advanced Application > Bandwidth Control ........................................................................
109
Figure 50 Advanced Application > Broadcast Storm Control ...............................................................
111
Figure 51 Advanced Application > Mirroring .........................................................................................
113
Figure 52 Advanced Application > Link Aggregation Status .................................................................
116
Figure 53 Advanced Application > Link Aggregation > Link Aggregation Setting ................................
117
Figure 54 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP ...................
118
Figure 55 Trunking Example - Physical Connections ...........................................................................
120
Figure 56 Trunking Example - Configuration Screen ............................................................................
Figure 57 IEEE 802.1x Authentication Process ...................................................................................
122
Figure 58 Advanced Application > Port Authentication .......................................................................
Figure 59 Advanced Application > Port Authentication > 802.1x ........................................................
123
Figure 60 Advanced Application > Port Security .................................................................................
126
Figure 61 Port Security Example .........................................................................................................
127
Figure 62 Advanced Application > Queuing Method ...........................................................................
130
Figure 63 Advanced Application > Multicast ........................................................................................
132
Figure 64 Advanced Application > Multicast > Multicast Setting .........................................................
133
Figure 65 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN .................
135
Figure 66 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ...................
136
Figure 67 MVR Network Example .......................................................................................................
137
Figure 68 MVR Multicast Television Example .....................................................................................
138
Figure 69 Advanced Application > Multicast > Multicast Setting > MVR .............................................
139
Figure 70 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............
141
Figure 71 MVR Configuration Example ...............................................................................................
142
Figure 72 MVR Configuration Example ...............................................................................................
Figure 73 MVR Group Configuration Example ...................................................................................
143
Figure 74 MVR Group Configuration Example ....................................................................................
Figure 75 AAA Server ..........................................................................................................................
145
Figure 76 Advanced Application > Auth and Acct ...............................................................................
146
Figure 77 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................
147
Figure 78 Advanced Application > Auth and Acct > TACACS+ Server Setup
.....................................
149
Figure 79 Advanced Application > Auth and Acct > Auth and Acct Setup ..........................................
151
Figure 80 Example: Man-in-the-middle Attack .....................................................................................
159
Figure 81 IP Source Guard ...................................................................................................................
161
20
ES-2024 Series User’s Guide