List of Figures

Figure 82 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN .................

159

Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ...................

160

Figure 84 MVR Network Example .......................................................................................................

161

Figure 85 MVR Multicast Television Example .....................................................................................

162

Figure 86 Advanced Application > Multicast > Multicast Setting > MVR .............................................

163

Figure 87 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............

165

Figure 88 MVR Configuration Example ...............................................................................................

166

Figure 89 MVR Configuration Example ...............................................................................................

166

Figure 90 MVR Group Configuration Example ...................................................................................

166

Figure 91 MVR Group Configuration Example ....................................................................................

167

Figure 92 AAA Server .........................................................................................................................

169

Figure 93 Advanced Application > Auth and Acct ...............................................................................

170

Figure 94 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................

171

Figure 95 Advanced Application > Auth and Acct > TACACS+ Server Setup .....................................

173

Figure 96 Advanced Application > Auth and Acct > Auth and Acct Setup ..........................................

175

Figure 97 DHCP Snooping Database File Format ...............................................................................

184

Figure 98 Example: Man-in-the-middle Attack .....................................................................................

185

Figure 99 IP Source Guard ...................................................................................................................

187

Figure 100 IP Source Guard Static Binding ..........................................................................................

188

Figure 101 DHCP Snooping .................................................................................................................

189

Figure 102 DHCP Snooping Configure ................................................................................................

192

Figure 103 DHCP Snooping Port Configure .........................................................................................

194

Figure 104 DHCP Snooping VLAN Configure ......................................................................................

195

Figure 105 ARP Inspection Status ........................................................................................................

196

Figure 106 ARP Inspection VLAN Status .............................................................................................

197

Figure 107 ARP Inspection Log Status .................................................................................................

198

Figure 108 ARP Inspection Configure ..................................................................................................

199

Figure 109 ARP Inspection Port Configure ..........................................................................................

200

Figure 110 ARP Inspection VLAN Configure ........................................................................................

201

Figure 111 Loop Guard vs STP ............................................................................................................

203

Figure 112 Switch in Loop State ...........................................................................................................

204

Figure 113 Loop Guard - Probe Packet ................................................................................................

204

Figure 114 Loop Guard - Network Loop ...............................................................................................

204

Figure 115 Advanced Application > Loop Guard ..................................................................................

205

Figure 116 DiffServ: Differentiated Service Field ..................................................................................

207

Figure 117 DiffServ Network ................................................................................................................

208

Figure 118 trTCM - Color-blind Mode ..................................................................................................

209

Figure 119 trTCM - Color-aware Mode ................................................................................................

209

Figure 120 Advanced Application > trTCM ..........................................................................................

210

Figure 121 Static Routing Overview ....................................................................................................

215

Figure 122 IP Application > Static Routing ..........................................................................................

216

Figure 123 IP Application > DHCP Status ...........................................................................................

220

Figure 124 IP Application > DHCP > Global ........................................................................................

221

GS-3012/GS-3012F User’s Guide

23