List of Figures
XGS-4528F User’s Guide 25
Figure 82 Advanced Application > Multicast > Multicast Setting ......................................... .................175
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN .................. 177
Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile .................... 178
Figure 85 MVR Network Example ............ ............................................................................................ 180
Figure 86 MVR Multicast Television Example ........................................ .............................................. 181
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR .............................................. 182
Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 184
Figure 89 MVR Configuration Example .............................................. .................................................. 185
Figure 90 MVR Configuration Example .................................................. .............................................. 185
Figure 91 MVR Group Configuration Example ........................................... ........................................ 186
Figure 92 MVR Group Configuration Example ............................................. ........................................ 186
Figure 93 AAA Server ........................................................................................................................... 187
Figure 94 Advanced Application > Auth and Acct ................................................................................ 188
Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup ......................................... 189
Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup ...................................... 191
Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup ........................................... 193
Figure 98 DHCP Snooping Database File Format ............................................................................... 202
Figure 99 Example: Man-in-the-middle Attack ..................................................................................... 203
Figure 100 IP Source Guard ................................................................................................................. 205
Figure 101 IP Source Guard Static Binding .......................................................................................... 206
Figure 102 DHCP Snooping ...................................................... ........................................................... 207
Figure 103 DHCP Snooping Configure ................................................................................................ 210
Figure 104 DHCP Snooping Port Configure ......................................................................................... 212
Figure 105 DHCP Snooping VLAN Configure ........................................ .............................................. 213
Figure 106 ARP Inspection Status ........................................................................................................ 214
Figure 107 ARP Inspection VLAN Status .................................................. ...........................................2 15
Figure 108 ARP Inspection Log Status ................................................................................................. 216
Figure 109 ARP Inspection Configure ....................................................... ...........................................2 17
Figure 110 ARP Inspection Port Configure ........................................................................................... 218
Figure 111 ARP Inspection VLAN Configure ........................................................................................ 219
Figure 112 Loop Guard vs STP .............................................................................................. ..............221
Figure 113 Switch in Loop State ........................................................................................................... 222
Figure 114 Loop Guard - Probe Packet ................................................................................................ 222
Figure 115 Loop Guard - Network Loop ............................................................. ..................................222
Figure 116 Advanced Application > Loop Guard .................................................................................. 223
Figure 117 IP Application > Static Routing ...................................................................... .....................227
Figure 118 IP Application > RIP ............................................................................................................ 230
Figure 119 OSPF Network Example ..................................................................................................... 232
Figure 120 OSPF Router Election Example ....................................... .................................................. 233
Figure 121 IP Application > OSPF Status ............................................................................................. 234
Figure 122 IP Application > OSPF Configuration: Activating and General Settings ............................. 236
Figure 123 IP Application > OSPF Configuration: Area Setup .................. ........................................... 237
Figure 124 IP Application > OSPF Configuration: Summary Table ...................................................... 238