List of Figures

 

 

Figure 39 Subnet Based VLAN Application Example ............................................................................

98

Figure 40 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................

99

Figure 41 Port Based VLAN Setup (All Connected) ............................................................................

101

Figure 42 Port Based VLAN Setup (Port Isolation) .............................................................................

102

Figure 43 Advanced Application > Static MAC Forwarding .................................................................

105

Figure 44 Advanced Application > Filtering .........................................................................................

107

Figure 45 MRSTP Network Example ....................................................................................................

111

Figure 46 STP/RSTP Network Example ...............................................................................................

112

Figure 47 MSTP Network Example ......................................................................................................

113

Figure 48 MSTIs in Different Regions ..................................................................................................

114

Figure 49 MSTP and Legacy RSTP Network Example ........................................................................

114

Figure 50 Advanced Application > Spanning Tree Protocol .................................................................

115

Figure 51 Advanced Application > Spanning Tree Protocol > Configuration ........................................

115

Figure 52 Advanced Application > Spanning Tree Protocol > RSTP ....................................................

116

Figure 53 Advanced Application > Spanning Tree Protocol > Status: RSTP ........................................

118

Figure 54 Advanced Application > Spanning Tree Protocol > MRSTP .................................................

119

Figure 55 Advanced Application > Spanning Tree Protocol > Status: MRSTP

....................................

121

Figure 56 Advanced Application > Spanning Tree Protocol > MSTP ..................................................

122

Figure 57 Advanced Application > Spanning Tree Protocol > Status: MSTP ......................................

125

Figure 58 Advanced Application > Bandwidth Control ........................................................................

128

Figure 59 Advanced Application > Broadcast Storm Control ..............................................................

129

Figure 60 Advanced Application > Mirroring ........................................................................................

131

Figure 61 Advanced Application > Link Aggregation Status ................................................................

134

Figure 62 Advanced Application > Link Aggregation > Link Aggregation Setting ...............................

135

Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP ..................

137

Figure 64 Trunking Example - Physical Connections ...........................................................................

138

Figure 65 Trunking Example - Configuration Screen ............................................................................

139

Figure 66 IEEE 802.1x Authentication Process ..................................................................................

142

Figure 67 MAC Authentication Process ..............................................................................................

142

Figure 68 Advanced Application > Port Authentication .......................................................................

143

Figure 69 Advanced Application > Port Authentication > 802.1x ........................................................

143

Figure 70 Advanced Application > Port Authentication > MAC Authentication

...................................

145

Figure 71 Advanced Application > Port Security .................................................................................

148

Figure 72 Advanced Application > Classifier .......................................................................................

152

Figure 73 Advanced Application > Classifier: Summary Table ............................................................

154

Figure 74 Classifier: Example ..............................................................................................................

156

Figure 75 Advanced Application > Policy Rule ...................................................................................

158

Figure 76 Advanced Application > Policy Rule: Summary Table .........................................................

160

Figure 77 Policy Example ....................................................................................................................

161

Figure 78 Queuing Method ..................................................................................................................

164

Figure 79 VLAN Stacking Example .....................................................................................................

166

Figure 80 Advanced Application > VLAN Stacking ..............................................................................

168

Figure 81 Advanced Application > Multicast ........................................................................................

172

26

GS-4012F/4024 User’s Guide