List of Figures
XGS-4528F User’s Guide
24
Figure 39 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN ....................... 97
Figure 40 Protocol Based VLAN Configuration Example .......... ............................................................. 99
Figure 41 Advanced Application > VLAN > Port Based VLAN Setup (All Connected) ......................... 100
Figure 42 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation) ............................ 101
Figure 43 Advanced Application > Static MAC Forwarding .................................................................. 103
Figure 44 Advanced Application > Filtering ..................................................................... .....................105
Figure 45 MRSTP Network Example .................................................................................................... 109
Figure 46 STP/RSTP Network Example ................................................................................................110
Figure 47 MSTP Network Example ................. ......................................................................................111
Figure 48 MSTIs in Different Regions ...................................................................................................112
Figure 49 MSTP and Legacy RSTP Network Example .......................................... ...............................112
Figure 50 Advanced Application > Spanning Tree Protocol .................................................................. 113
Figure 51 Advanced Application > Spanning Tree Protocol > Configuration .........................................113
Figure 52 Advanced Application > Spanning Tree Protocol > RSTP .....................................................114
Figure 53 Advanced Application > Spanning Tree Protocol > Status: RSTP .........................................116
Figure 54 Advanced Application > Spanning Tree Protocol > MRSTP ..................................................117
Figure 55 Advanced Application > Spanning Tree Protocol > Status: MRSTP ......................................119
Figure 56 Advanced Application > Spanning Tree Protocol > MSTP ................................................... 121
Figure 57 Advanced Application > Spanning Tree Protocol > Status: MSTP ....................................... 124
Figure 58 Advanced Application > Bandwidth Control ......................................................................... 128
Figure 59 Advanced Application > Broadcast Storm Control ............................................................... 129
Figure 60 Advanced Application > Mirroring ......................................................................................... 131
Figure 61 Advanced Application > Link Aggregation Status ................................................................. 134
Figure 62 Advanced Application > Link Aggregation > Link Aggregation Setting ................................ 135
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP ................... 137
Figure 64 Trunking Example - Physical Connections ........................................................................... 138
Figure 65 Trunking Example - Configuration Screen ............................................................................ 139
Figure 66 IEEE 802.1x Authentication Process .................................................................................... 142
Figure 67 MAC Authentication Process ................................................................................................ 142
Figure 68 Advanced Application > Port Authentication ........................................................................ 143
Figure 69 Advanced Application > Port Authentication > 802.1x ......................................................... 143
Figure 70 Advanced Application > Port Authentication > MAC Authentication .................................... 145
Figure 71 Advanced Application > Port Security ................................ .................................................. 148
Figure 72 Advanced Application > Classifier ................................................................... .....................152
Figure 73 Advanced Application > Classifier: Summary Table ............................................................. 154
Figure 74 Classifier: Example ............................................................................................................... 155
Figure 75 Advanced Application > Policy Rule ..................................................................................... 158
Figure 76 Advanced Application > Policy Rule: Summary Table .......................................................... 160
Figure 77 Policy Example ................................................................................ .....................................161
Figure 78 Advanced Application > Queuing Method ................................. ........................................... 164
Figure 79 VLAN Stacking Example ....................... ............................................................................... 168
Figure 80 Advanced Application > VLAN Stacking ............................................................................... 170
Figure 81 Advanced Application > Multicast ......................................................................................... 174