List of Figures

Figure 82 Advanced Application > Multicast > Multicast Setting .........................................................

173

Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN .................

175

Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ...................

176

Figure 85 MVR Network Example .......................................................................................................

177

Figure 86 MVR Multicast Television Example .....................................................................................

178

Figure 87 Advanced Application > Multicast > Multicast Setting > MVR .............................................

179

Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............

181

Figure 89 MVR Configuration Example ...............................................................................................

182

Figure 90 MVR Configuration Example ...............................................................................................

182

Figure 91 MVR Group Configuration Example ...................................................................................

182

Figure 92 MVR Group Configuration Example ....................................................................................

183

Figure 93 AAA Server .........................................................................................................................

185

Figure 94 Advanced Application > Auth and Acct ...............................................................................

186

Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................

187

Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup .....................................

189

Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup ..........................................

191

Figure 98 DHCP Snooping Database File Format ...............................................................................

200

Figure 99 Example: Man-in-the-middle Attack .....................................................................................

201

Figure 100 IP Source Guard .................................................................................................................

203

Figure 101 IP Source Guard Static Binding ..........................................................................................

204

Figure 102 DHCP Snooping .................................................................................................................

205

Figure 103 DHCP Snooping Configure ................................................................................................

208

Figure 104 DHCP Snooping Port Configure .........................................................................................

210

Figure 105 DHCP Snooping VLAN Configure .......................................................................................

211

Figure 106 ARP Inspection Status ........................................................................................................

212

Figure 107 ARP Inspection VLAN Status .............................................................................................

213

Figure 108 ARP Inspection Log Status .................................................................................................

214

Figure 109 ARP Inspection Configure ..................................................................................................

215

Figure 110 ARP Inspection Port Configure ...........................................................................................

216

Figure 111 ARP Inspection VLAN Configure ........................................................................................

217

Figure 112 Loop Guard vs STP ............................................................................................................

219

Figure 113 Switch in Loop State ...........................................................................................................

220

Figure 114 Loop Guard - Probe Packet ................................................................................................

220

Figure 115 Loop Guard - Network Loop ...............................................................................................

220

Figure 116 Advanced Application > Loop Guard ..................................................................................

221

Figure 117 Static Routing ....................................................................................................................

225

Figure 118 RIP .....................................................................................................................................

228

Figure 119 OSPF Network Example .....................................................................................................

230

Figure 120 OSPF Router Election Example .........................................................................................

231

Figure 121 OSPF Status ......................................................................................................................

232

Figure 122 OSPF Configuration: Area Setup ......................................................................................

235

Figure 123 OSPF Configuration: Summary Table ...............................................................................

236

Figure 124 OSPF Interface ..................................................................................................................

237

GS-4012F/4024 User’s Guide

27