List of Figures
Figure 39 Advanced Application > VLAN > VLAN Port Setting .............................................................
89
Figure 40 Subnet Based VLAN Application Example ............................................................................
90
Figure 41 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................
91
Figure 42 Port Based VLAN Setup (All Connected) ..............................................................................
93
Figure 43 Port Based VLAN Setup (Port Isolation) ...............................................................................
94
Figure 44 Advanced Application > Static MAC Forwarding ...................................................................
95
Figure 45 Advanced Application > Filtering ...........................................................................................
97
Figure 46 MRSTP Network Example ...................................................................................................
101
Figure 47 STP/RSTP Network Example ..............................................................................................
102
Figure 48 MSTP Network Example .....................................................................................................
103
Figure 49 MSTIs in Different Regions .................................................................................................
104
Figure 50 MSTP and Legacy RSTP Network Example .......................................................................
Figure 51 Advanced Application > Spanning Tree Protocol ................................................................
105
Figure 52 Advanced Application > Spanning Tree Protocol > Configuration .......................................
Figure 53 Advanced Application > Spanning Tree Protocol > RSTP ...................................................
106
Figure 54 Advanced Application > Spanning Tree Protocol > Status: RSTP .......................................
108
Figure 55 Advanced Application > Spanning Tree Protocol > MRSTP ................................................
109
Figure 56 Advanced Application > Spanning Tree Protocol > Status: MRSTP .....................................
111
Figure 57 Advanced Application > Spanning Tree Protocol > MSTP ...................................................
112
Figure 58 Advanced Application > Spanning Tree Protocol > Status: MSTP .......................................
115
Figure 59 Advanced Application > Bandwidth Control .........................................................................
118
Figure 60 Advanced Application > Broadcast Storm Control ...............................................................
119
Figure 61 Advanced Application > Mirroring ........................................................................................
121
Figure 62 Advanced Application > Link Aggregation Status ................................................................
124
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting ...............................
125
Figure 64 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP ..................
127
Figure 65 Trunking Example - Physical Connections ...........................................................................
128
Figure 66 Trunking Example - Configuration Screen ............................................................................
129
Figure 67 IEEE 802.1x Authentication Process ..................................................................................
132
Figure 68 MAC Authentication Process ..............................................................................................
Figure 69 Advanced Application > Port Authentication .......................................................................
133
Figure 70 Advanced Application > Port Authentication > 802.1x ........................................................
Figure 71 Advanced Application > Port Authentication > MAC Authentication ...................................
135
Figure 72 Advanced Application > Port Security .................................................................................
138
Figure 73 Advanced Application > Classifier .......................................................................................
142
Figure 74 Advanced Application > Classifier: Summary Table ............................................................
144
Figure 75 Classifier: Example ..............................................................................................................
146
Figure 76 Advanced Application > Policy Rule ...................................................................................
148
Figure 77 Advanced Application > Policy Rule: Summary Table .........................................................
150
Figure 78 Policy Example ....................................................................................................................
151
Figure 79 Advanced Application > Queuing Method ...........................................................................
154
Figure 80 Advanced Application > Multicast ........................................................................................
156
Figure 81 Advanced Application > Multicast > Multicast Setting .........................................................
157
22
GS-3012/GS-3012F User’s Guide