v
2-5.2.5 ARP Inspection .......................................................................................................................................... 81
2-5.2.5.1 Configuration .................................................................................................................................... 81
2-5.2.5.2 VLAN Mode Configuration.............................................................................................................. 83
2-5.2.5.3 Static Table ......................................................................................................................................... 85
2-5.2.5.4 Dynamic Table ................................................................................................................................... 87
2-5.3 AAA ................................................................................................................................................... 89
2-5.3.1 RADIUS ....................................................................................................................................................... 89
2-5.3.2 TACACS+ .................................................................................................................................................... 92
2-6 AGGREGATION ............................................................................................................................................. 94
2-6.1 Static ................................................................................................................................................. 94
2-6.2 LACP ................................................................................................................................................. 96
2-7 LOOP PROTECTION ...................................................................................................................................... 98
2-8 SPANNING TREE ......................................................................................................................................... 100
2-8.1 Bridge Setting ................................................................................................................................. 100
2-8.2 MSTI Mapping ................................................................................................................................ 103
2-8.3 MSTI Priorities ................................................................................................................................ 105
2-8.4 CIST Ports ....................................................................................................................................... 106
2-8.5 MSTI Ports ...................................................................................................................................... 108
2-9 IPMC PROFILE .......................................................................................................................................... 110
2-9.1 Profile Table ................................................................................................................................... 110
2-9.1.1 IPMC Profile Rule Settings Table ........................................................................................................... 112
2-9.2 Address Entry ................................................................................................................................. 113
2-10 MVR ...................................................................................................................................................... 115
2-11 IPMC ..................................................................................................................................................... 118
2-11.1 IGMP Snooping ............................................................................................................................ 118
2-11.1.1 Basic Configuration .............................................................................................................................. 118
2-11.1.2 VLAN Configuration ............................................................................................................................. 120
2-11.1.3 Port Filtering Profile ............................................................................................................................. 123
2-11.2 MLD Snooping ............................................................................................................................. 125
2-11.2.1 Basic Configuration .............................................................................................................................. 125
2-11.2.2 VLAN Configuration ............................................................................................................................. 128
2-11.2.3 Port Group Filtering .............................................................................................................................. 130
2-12 LLDP ...................................................................................................................................................... 131
2-12.1 LLDP Configuration ..................................................................................................................... 131
2-12.2 LLDP-MED Configuration ........................................................................................................... 134
2-13 MAC TABLE ............................................................................................................................................ 141
2-14 VLANS ................................................................................................................................................... 143
2-15 PRIVATE VLANS ...................................................................................................................................... 147
2-15.1 Port Isolation ................................................................................................................................ 147
2-16 VCL ........................................................................................................................................................ 148
2-16.1 MAC-based VLAN ........................................................................................................................ 148
2-16.2 Protocol -based VLAN ................................................................................................................. 150
2-16.2.1 Protocol to Group ................................................................................................................................. 150
2-16.2.2 Group to VLAN...................................................................................................................................... 152
2-16.3 IP Subnet-based VLAN ................................................................................................................ 153
2-17 VOICE VLAN......................................................................................................................................... 154
2-17.1 Configuration ............................................................................................................................... 154
2-17.2 OUI................................................................................................................................................ 156
2-18 QOS ....................................................................................................................................................... 157
2-18.1 Port Classification ....................................................................................................................... 157
2-18.2 Port Policing ................................................................................................................................. 160
2-18.3 Port Schedulers ............................................................................................................................ 161
2-18.5 Port Tag Remarking..................................................................................................................... 167
2-18.6 Port DSCP..................................................................................................................................... 170
2-18.7 DSCP-Based QoS ......................................................................................................................... 172
2-18.9 DSCP Classification ..................................................................................................................... 176