iii
3-6-1. Priority .............................................................................................................................. 66
3-6-2. Policer ............................................................................................................................... 76
3-6-3. Shaper................................................................................................................................ 77
3-6-4. Flow .................................................................................................................................. 78
3-6-5. Police-Flow ....................................................................................................................... 85
3-6-6. Mark .................................................................................................................................. 86
3-6-7. Mark-enable ...................................................................................................................... 87
3-7. ACL............................................................................................................................. 88
3-7-1. ACL Mode......................................................................................................................... 88
3-7-2. ACL/VLAN Mapping ....................................................................................................... 89
3-7-3. ACL Rule........................................................................................................................... 90
3-8. ACL QoS Load........................................................................................................... 91
3-9. User Defined............................................................................................................... 92
3-10. SNMP Configuration............................................................................................... 93
3-11. IGMP Snooping ....................................................................................................... 99
3-12. Trunk ...................................................................................................................... 103
3-13. STP Configuration..................................................................................................110
3-13-1. STP Status ......................................................................................................................110
3-13-2. STP Configuration..........................................................................................................112
3-13-3. STP Port Configuration ..................................................................................................114
3-14. GVRP Configuration..............................................................................................117
3-15. 802.1X Configuration............................................................................................ 123
3-16. Alarm Configuration............................................................................................. 134
3-17. Configuration......................................................................................................... 137
3-17-2. Config File .................................................................................................................... 143
3-18. Diagnostics ............................................................................................................. 144
3-19. Loop Detection....................................................................................................... 147
3-20. TFTP Server........................................................................................................... 148
3-21. Log .......................................................................................................................... 149
3-22. Firmware Upgrade................................................................................................ 151
3-23. Max. Packet Length .............................................................................................. 152
3-24. MAC Table............................................................................................................. 153
3-25. VLAN...................................................................................................................... 159
3-25-1. VLAN Mode ................................................................................................................. 159
3-25-2. VLAN Group ................................................................................................................ 161
3-25-3. Port Protocol.................................................................................................................. 165
3-25-4. Port VID........................................................................................................................ 166
3-26. Reboot..................................................................................................................... 167
3-27. Logout..................................................................................................................... 168
4. Operation of CLI Management ....................................................................... 169
4-1. CLI Management .................................................................................................... 169