List of Figures

Figure 82 Advanced Application > Multicast > Multicast Setting .........................................................

177

Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN .................

179

Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ...................

180

Figure 85 MVR Network Example .......................................................................................................

181

Figure 86 MVR Multicast Television Example .....................................................................................

182

Figure 87 Advanced Application > Multicast > Multicast Setting > MVR .............................................

183

Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............

185

Figure 89 MVR Configuration Example ...............................................................................................

186

Figure 90 MVR Configuration Example ...............................................................................................

186

Figure 91 MVR Group Configuration Example ...................................................................................

187

Figure 92 MVR Group Configuration Example ....................................................................................

187

Figure 93 AAA Server .........................................................................................................................

189

Figure 94 Advanced Application > Auth and Acct ...............................................................................

190

Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................

191

Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup .....................................

193

Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup ..........................................

195

Figure 98 DHCP Snooping Database File Format ...............................................................................

204

Figure 99 Example: Man-in-the-middle Attack .....................................................................................

205

Figure 100 IP Source Guard .................................................................................................................

207

Figure 101 IP Source Guard Static Binding ..........................................................................................

208

Figure 102 DHCP Snooping .................................................................................................................

209

Figure 103 DHCP Snooping Configure ................................................................................................

212

Figure 104 DHCP Snooping Port Configure .........................................................................................

214

Figure 105 DHCP Snooping VLAN Configure ......................................................................................

215

Figure 106 ARP Inspection Status ........................................................................................................

216

Figure 107 ARP Inspection VLAN Status .............................................................................................

217

Figure 108 ARP Inspection Log Status .................................................................................................

218

Figure 109 ARP Inspection Configure ..................................................................................................

219

Figure 110 ARP Inspection Port Configure ...........................................................................................

220

Figure 111 ARP Inspection VLAN Configure ........................................................................................

221

Figure 112 Loop Guard vs STP ............................................................................................................

223

Figure 113 Switch in Loop State ...........................................................................................................

224

Figure 114 Loop Guard - Probe Packet ................................................................................................

224

Figure 115 Loop Guard - Network Loop ...............................................................................................

224

Figure 116 Advanced Application > Loop Guard ..................................................................................

225

Figure 117 IP Application > Static Routing ..........................................................................................

229

Figure 118 IP Application > RIP ...........................................................................................................

232

Figure 119 OSPF Network Example .....................................................................................................

234

Figure 120 OSPF Router Election Example .........................................................................................

235

Figure 121 IP Application > OSPF Status ............................................................................................

236

Figure 122 IP Application > OSPF Configuration: Activating and General Settings ............................

238

Figure 123 IP Application > OSPF Configuration: Area Setup ............................................................

239

Figure 124 IP Application > OSPF Configuration: Summary Table .....................................................

240

ES-4124 User’s Guide

27