List of Figures
Figure 82 Advanced Application > Multicast > Multicast Setting .........................................................
177
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN .................
179
Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ...................
180
Figure 85 MVR Network Example .......................................................................................................
181
Figure 86 MVR Multicast Television Example .....................................................................................
182
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR .............................................
183
Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............
185
Figure 89 MVR Configuration Example ...............................................................................................
186
Figure 90 MVR Configuration Example ...............................................................................................
Figure 91 MVR Group Configuration Example ...................................................................................
187
Figure 92 MVR Group Configuration Example ....................................................................................
Figure 93 AAA Server .........................................................................................................................
189
Figure 94 Advanced Application > Auth and Acct ...............................................................................
190
Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................
191
Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup .....................................
193
Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup ..........................................
195
Figure 98 DHCP Snooping Database File Format ...............................................................................
204
Figure 99 Example: Man-in-the-middle Attack .....................................................................................
205
Figure 100 IP Source Guard .................................................................................................................
207
Figure 101 IP Source Guard Static Binding ..........................................................................................
208
Figure 102 DHCP Snooping .................................................................................................................
209
Figure 103 DHCP Snooping Configure ................................................................................................
212
Figure 104 DHCP Snooping Port Configure .........................................................................................
214
Figure 105 DHCP Snooping VLAN Configure ......................................................................................
215
Figure 106 ARP Inspection Status ........................................................................................................
216
Figure 107 ARP Inspection VLAN Status .............................................................................................
217
Figure 108 ARP Inspection Log Status .................................................................................................
218
Figure 109 ARP Inspection Configure ..................................................................................................
219
Figure 110 ARP Inspection Port Configure ...........................................................................................
220
Figure 111 ARP Inspection VLAN Configure ........................................................................................
221
Figure 112 Loop Guard vs STP ............................................................................................................
223
Figure 113 Switch in Loop State ...........................................................................................................
224
Figure 114 Loop Guard - Probe Packet ................................................................................................
Figure 115 Loop Guard - Network Loop ...............................................................................................
Figure 116 Advanced Application > Loop Guard ..................................................................................
225
Figure 117 IP Application > Static Routing ..........................................................................................
229
Figure 118 IP Application > RIP ...........................................................................................................
232
Figure 119 OSPF Network Example .....................................................................................................
234
Figure 120 OSPF Router Election Example .........................................................................................
235
Figure 121 IP Application > OSPF Status ............................................................................................
236
Figure 122 IP Application > OSPF Configuration: Activating and General Settings ............................
238
Figure 123 IP Application > OSPF Configuration: Area Setup ............................................................
239
Figure 124 IP Application > OSPF Configuration: Summary Table .....................................................
240
ES-4124 User’s Guide
27