List of Figures
Figure 82 Advanced Application > Multicast > Multicast Setting .........................................................
173
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN .................
175
Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ...................
176
Figure 85 MVR Network Example .......................................................................................................
177
Figure 86 MVR Multicast Television Example .....................................................................................
178
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR .............................................
179
Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............
181
Figure 89 MVR Configuration Example ...............................................................................................
182
Figure 90 MVR Configuration Example ...............................................................................................
Figure 91 MVR Group Configuration Example ...................................................................................
Figure 92 MVR Group Configuration Example ....................................................................................
183
Figure 93 AAA Server .........................................................................................................................
185
Figure 94 Advanced Application > Auth and Acct ...............................................................................
186
Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................
187
Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup .....................................
189
Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup ..........................................
191
Figure 98 DHCP Snooping Database File Format ...............................................................................
200
Figure 99 Example: Man-in-the-middle Attack .....................................................................................
201
Figure 100 IP Source Guard .................................................................................................................
203
Figure 101 IP Source Guard Static Binding ..........................................................................................
204
Figure 102 DHCP Snooping .................................................................................................................
205
Figure 103 DHCP Snooping Configure ................................................................................................
208
Figure 104 DHCP Snooping Port Configure .........................................................................................
210
Figure 105 DHCP Snooping VLAN Configure .......................................................................................
211
Figure 106 ARP Inspection Status ........................................................................................................
212
Figure 107 ARP Inspection VLAN Status .............................................................................................
213
Figure 108 ARP Inspection Log Status .................................................................................................
214
Figure 109 ARP Inspection Configure ..................................................................................................
215
Figure 110 ARP Inspection Port Configure ...........................................................................................
216
Figure 111 ARP Inspection VLAN Configure ........................................................................................
217
Figure 112 Loop Guard vs STP ............................................................................................................
219
Figure 113 Switch in Loop State ...........................................................................................................
220
Figure 114 Loop Guard - Probe Packet ................................................................................................
Figure 115 Loop Guard - Network Loop ...............................................................................................
Figure 116 Advanced Application > Loop Guard ..................................................................................
221
Figure 117 Static Routing ....................................................................................................................
225
Figure 118 RIP .....................................................................................................................................
228
Figure 119 OSPF Network Example .....................................................................................................
230
Figure 120 OSPF Router Election Example .........................................................................................
231
Figure 121 OSPF Status ......................................................................................................................
232
Figure 122 OSPF Configuration: Area Setup ......................................................................................
235
Figure 123 OSPF Configuration: Summary Table ...............................................................................
236
Figure 124 OSPF Interface ..................................................................................................................
237
GS-4012F/4024 User’s Guide
27