ii
3-6. QOS(QUALITY OF SERVICE) CONFIGURATION ................................................................. 35
3-6-1. Ports....................................................................................................................35
3-6-2. Qos Control List.................................................................................................. 37
3-6-3.Rate Limiters........................................................................................................ 42
3-6-4.Storm Control....................................................................................................... 44
3-6-5.Wizard.................................................................................................................. 45
3-7. SNMP CONFIGURATION................................................................................................ 53
3-8. ACL............................................................................................................................ 56
3-8-1.Ports.....................................................................................................................56
3-8-2.Rate Limiters........................................................................................................ 58
3-8-3.Access Control List .............................................................................................. 59
3-8-4.Wizard.................................................................................................................. 83
3-9. IP MAC BINDING.......................................................................................................... 91
3-10.
802.1X CONFIGURATION............................................................................................. 93
3-10-1.Server ................................................................................................................ 98
3-10-2.Port Configuration............................................................................................ 100
3-10-3.Status............................................................................................................... 102
3-10-4. Statistics.......................................................................................................... 103
3-11. TRUNKING CONFIGURATION ....................................................................................... 104
3-11-1.Port................................................................................................................... 106
3-11-2 Aggregator View............................................................................................... 108
3-11-3 ACP System Priority......................................................................................... 109
3-12
STP CONFIGURATION.................................................................................................110
3-12-1. Status...............................................................................................................110
3-12-2. Configuration....................................................................................................112
3-12-3. STP Port Configuration....................................................................................114
3-13 MSTP.......................................................................................................................117
3-13-1 Status................................................................................................................117
3-13-2 Region Config...................................................................................................117
3-13-3 Instance View....................................................................................................119
3-14. MIRROR................................................................................................................... 126
3-15-1 Proxy................................................................................................................ 127
3-15-2 Group Membership .......................................................................................... 129
3-16.
ALARM CONFIGURATION............................................................................................ 130
3-16-1 Events.............................................................................................................. 131
3-16-2 Email................................................................................................................ 132
3-17.
DHCP SNOOPING .................................................................................................... 133
3-17-1. DHCP Snooping State..................................................................................... 134
3-17-2. DHCP Snooping Entry .................................................................................... 135
3-17-3. DHCP Snooping Client.................................................................................... 136
3-18. CONFIGURATION....................................................................................................... 137
3-18-1. Factory Defaults.............................................................................................. 138
3-18-2 . Save Start ...................................................................................................... 138
3-18-3 . Save User...................................................................................................... 138
3-18-4 . Restore User.................................................................................................. 138
3-19. CONFIG FILE............................................................................................................ 140
3-20.
DIAGNOSTICS........................................................................................................... 141
3-20-1 . Diag................................................................................................................ 141
3-20-2 .Ping................................................................................................................. 142
3-20-2 .VeriPHY .......................................................................................................... 143
3-21
MAINTENANCE........................................................................................................... 144
3-21-1 .Reset Device................................................................................................... 144
3-21-2 .Software Upload.............................................................................................. 144
3-22 LOGOUT ................................................................................................................... 145