V
6.5 Application Example for MAC VLAN ............................................................................ 78
6.6 Application Example for Protocol VLAN ...................................................................... 79
6.7 VLAN VPN .................................................................................................................... 81
6.7.1 VPN Config ........................................................................................................ 82
6.7.2 VLAN Mapping .................................................................................................. 82
6.7.3 Port Enable ........................................................................................................ 83
6.8 Private VLAN ................................................................................................................ 85
6.8.1 PVLAN Config ................................................................................................... 88
6.8.2 Port Config ........................................................................................................ 89
6.9 GVRP ........................................................................................................................... 91
6.10 Application Example for Private VLAN ........................................................................ 94
Chapter 7 Spanning Tree .............................................................................................................. 97
7.1 STP Config ................................................................................................................. 101
7.1.1 STP Config ...................................................................................................... 101
7.1.2 STP Summary ................................................................................................. 103
7.2 Port Config ................................................................................................................. 104
7.3 MSTP Instance ........................................................................................................... 105
7.3.1 Region Config .................................................................................................. 105
7.3.2 Instance Config ............................................................................................... 106
7.3.3 Instance Port Config ........................................................................................ 107
7.4 STP Security .............................................................................................................. 109
7.4.1 Port Protect ..................................................................................................... 109
7.4.2 TC Protect ........................................................................................................ 111
7.5 Application Example for STP Function ....................................................................... 112
Chapter 8 Ethernet OAM ............................................................................................................. 116
8.1 Basic Config ................................................................................................................ 119
8.1.1 Basic Config ..................................................................................................... 119
8.1.2 Discovery Info .................................................................................................. 121
8.2 Link Monitoring ........................................................................................................... 123
8.3 RFI .............................................................................................................................. 124
8.4 Remote Loopback ...................................................................................................... 125
8.5 Statistics ..................................................................................................................... 126
8.5.1 Statistics .......................................................................................................... 126
8.5.2 Event Log ........................................................................................................ 127
8.6 DLDP .......................................................................................................................... 128
8.7 Application Example for DLDP ................................................................................... 131
Chapter 9 DHCP ................................
......................................................................................... 134