List of Figures

 

 

Figure 39 Advanced Application > VLAN > VLAN Port Setting .............................................................

89

Figure 40 Subnet Based VLAN Application Example ............................................................................

90

Figure 41 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................

91

Figure 42 Port Based VLAN Setup (All Connected) ..............................................................................

93

Figure 43 Port Based VLAN Setup (Port Isolation) ...............................................................................

94

Figure 44 Advanced Application > Static MAC Forwarding ...................................................................

95

Figure 45 Advanced Application > Filtering ...........................................................................................

97

Figure 46 MRSTP Network Example ...................................................................................................

101

Figure 47 STP/RSTP Network Example ..............................................................................................

102

Figure 48 MSTP Network Example .....................................................................................................

103

Figure 49 MSTIs in Different Regions .................................................................................................

104

Figure 50 MSTP and Legacy RSTP Network Example .......................................................................

104

Figure 51 Advanced Application > Spanning Tree Protocol ................................................................

105

Figure 52 Advanced Application > Spanning Tree Protocol > Configuration .......................................

105

Figure 53 Advanced Application > Spanning Tree Protocol > RSTP ...................................................

106

Figure 54 Advanced Application > Spanning Tree Protocol > Status: RSTP .......................................

108

Figure 55 Advanced Application > Spanning Tree Protocol > MRSTP ................................................

109

Figure 56 Advanced Application > Spanning Tree Protocol > Status: MRSTP .....................................

111

Figure 57 Advanced Application > Spanning Tree Protocol > MSTP ...................................................

112

Figure 58 Advanced Application > Spanning Tree Protocol > Status: MSTP .......................................

115

Figure 59 Advanced Application > Bandwidth Control .........................................................................

118

Figure 60 Advanced Application > Broadcast Storm Control ...............................................................

119

Figure 61 Advanced Application > Mirroring ........................................................................................

121

Figure 62 Advanced Application > Link Aggregation Status ................................................................

124

Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting ...............................

125

Figure 64 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP ..................

127

Figure 65 Trunking Example - Physical Connections ...........................................................................

128

Figure 66 Trunking Example - Configuration Screen ............................................................................

129

Figure 67 IEEE 802.1x Authentication Process ..................................................................................

132

Figure 68 MAC Authentication Process ..............................................................................................

132

Figure 69 Advanced Application > Port Authentication .......................................................................

133

Figure 70 Advanced Application > Port Authentication > 802.1x ........................................................

133

Figure 71 Advanced Application > Port Authentication > MAC Authentication ...................................

135

Figure 72 Advanced Application > Port Security .................................................................................

138

Figure 73 Advanced Application > Classifier .......................................................................................

142

Figure 74 Advanced Application > Classifier: Summary Table ............................................................

144

Figure 75 Classifier: Example ..............................................................................................................

146

Figure 76 Advanced Application > Policy Rule ...................................................................................

148

Figure 77 Advanced Application > Policy Rule: Summary Table .........................................................

150

Figure 78 Policy Example ....................................................................................................................

151

Figure 79 Advanced Application > Queuing Method ...........................................................................

154

Figure 80 Advanced Application > Multicast ........................................................................................

156

Figure 81 Advanced Application > Multicast > Multicast Setting .........................................................

157

22

GS-3012/GS-3012F User’s Guide