ES-3148 User’s Guide
18
Figure 37 Port Based VLAN Setup (All Connected) ........................................................... 86
Figure 38 Port Based VLAN Setup (Port Isolation) ............................................................ 87
Figure 39 Static MAC Forwarding ...................................................................................... 89
Figure 40 Filtering .............................................................................................................. 91
Figure 41 Spanning Tree Protocol: Status .......................................................................... 95
Figure 42 Spanning Tree Protocol: Configuration .............................................................. 97
Figure 43 Bandwidth Control .............................................................................................. 100
Figure 44 Broadcast Storm Control .................................................................................... 104
Figure 45 Mirroring ............................................................................................................. 108
Figure 46 Link Aggregation Control Protocol Status ......................................................... 112
Figure 47 Link Aggregation: Configuration ......................................................................... 114
Figure 48 RADIUS Server ................................................................................................. 117
Figure 49 Port Authentication ............................................................................................. 118
Figure 50 Port Authentication: RADIUS ............................................................................. 118
Figure 51 Port Authentication: 802.1x ................................................................................ 119
Figure 52 Port Security ...................................................................................................... 122
Figure 53 Console Port Priority .......................................................................................... 125
Figure 54 Access Control ................................................................................................... 125
Figure 55 SNMP Management Model ............................................................................... 126
Figure 56 Access Control: SNMP ...................................................................................... 128
Figure 57 Access Control: Logins ...................................................................................... 129
Figure 58 SSH Communication Example ............................................................................ 130
Figure 59 How SSH Works ................................................................................................. 130
Figure 60 HTTPS Implementation ....................................................................................... 132
Figure 61 Security Alert Dialog Box (Internet Explorer) ...................................................... 133
Figure 62 Security Certificate 1 (Netscape) ........................................................................ 133
Figure 63 Security Certificate 2 (Netscape) ........................................................................ 134
Figure 64 Login Screen (Internet Explorer) ......................................................................... 134
Figure 65 Login Screen (Netscape) .................................................................................... 135
Figure 66 Access Control: Service Access Control ............................................................ 136
Figure 67 Access Control: Remote Management .............................................................. 137
Figure 68 Queuing Method ................................................................................................ 140
Figure 69 Classifier ............................................................................................................. 144
Figure 70 Classifier: Summary Table .................................................................................. 146
Figure 71 Classifier: Example ............................................................................................. 148
Figure 72 Policy .................................................................................................................. 150
Figure 73 Policy: Summary Table ....................................................................................... 152
Figure 74 Policy Example ................................................................................................... 154
Figure 75 VLAN Stacking Example .................................................................................... 156
Figure 76 VLAN Stacking ................................................................................................... 158
Figure 77 Multicast Setting .................................................................................................. 163
Figure 78 Multicast: IGMP Filtering Profile ......................................................................... 165
Figure 79 MVR Network Example ...................................................................................... 166