v
2-5.1.6 SNMP ......................................................................................................................................................... 49
2-5.1.6.1 System ................................................................................................................................................ 49
2-5.1.6.2 Trap ..................................................................................................................................................... 51
2-5.1.6.3 Communities ..................................................................................................................................... 55
2-5.1.6.4 Users................................................................................................................................................... 57
2-5.1.6.5 Groups ............................................................................................................................................... 59
2-5.1.6.6 Views .................................................................................................................................................. 61
2-5.1.6.7 Access ................................................................................................................................................ 63
2-5.1.6.8 Trap Event Severity ........................................................................................................................... 65
2-5.1.7 RMON ........................................................................................................................................................ 67
2-5.1.7.1 Statistics ............................................................................................................................................. 67
2-5.1.7.2 History ................................................................................................................................................ 69
2-5.1.7.3 Alarm .................................................................................................................................................. 71
2-5.1.7.4 Event................................................................................................................................................... 73
2-5.2 Network ............................................................................................................................................ 75
2-5.2.1 Limit Control .............................................................................................................................................. 75
2-5.2.2 NAS ............................................................................................................................................................. 78
2-5.2.3 ACL.............................................................................................................................................................. 87
2-5.2.3.1 Ports ................................................................................................................................................... 87
2-5.2.3.2 Rate Limiters ...................................................................................................................................... 89
2-5.2.3.3 Access Control List ........................................................................................................................... 90
2-5.2.4 IP Source Guard ...................................................................................................................................... 102
2-5.2.4.1 Configuration .................................................................................................................................. 102
2-5.2.4.2 Static Table....................................................................................................................................... 104
2-5.2.5 ARP Inspection ........................................................................................................................................ 106
2-5.2.5.1 Port Configuration .......................................................................................................................... 106
2-5.2.5.2 VLAN Configuration ....................................................................................................................... 108
2-5.2.5.3 Static Table....................................................................................................................................... 110
2-5.2.5.4 Dynamic Table ................................................................................................................................. 112
2-5.3 AAA ................................................................................................................................................. 114
2-5.3.1 RADIUS ..................................................................................................................................................... 114
2-5.3.2 TACACS+ .................................................................................................................................................. 117
2-6 AGGREGATION ........................................................................................................................................... 119
2-6.1 Static ............................................................................................................................................... 119
2-6.2 LACP ............................................................................................................................................... 121
2-7 LOOP PROTECTION .................................................................................................................................... 123
2-8 SPANNING TREE......................................................................................................................................... 125
2-8.1 Bridge Setting ................................................................................................................................. 126
2-8.2 MSTI Mapping ................................................................................................................................ 128
2-8.3 MSTI Priorities ................................................................................................................................ 130
2-8.4 CIST Port ......................................................................................................................................... 132
2-8.5 MSTI Ports ...................................................................................................................................... 134
2-9 IPMC PROFILE .......................................................................................................................................... 136
2-9.1 Profile Table ................................................................................................................................... 136
2-9.2 Address Entry ................................................................................................................................. 139
2-10 MVR ...................................................................................................................................................... 141
2-11 IPMC ..................................................................................................................................................... 144
2-11.1 IGMP Snooping ............................................................................................................................ 144
2-11.1.1 Basic Configuration .............................................................................................................................. 144
2-11.1.2 VLAN Configuration ............................................................................................................................. 147
2-11.1.3 Port Filtering Profile .............................................................................................................................. 150
2-11.2 MLD Snooping ............................................................................................................................. 152
2-11.2.1 Basic Configuration .............................................................................................................................. 152
2-11.2.2 VLAN Configuration ............................................................................................................................. 155
2-11.2.3 Port Filtering Profile .............................................................................................................................. 157
2-12 LLDP ...................................................................................................................................................... 158
2-12.1 LLDP.............................................................................................................................................. 158
2-12.2 LLDP-MED .................................................................................................................................... 161