-5-
2.5.1.7.6 Access................................................................................................................... 43
2.5.1.8 RMON ...................................................................................................................... 45
2.5.1.8.1 Statistics ................................................................................................................ 45
2.5.1.8.2 History ................................................................................................................... 46
2.5.1.8.3 Alarm ..................................................................................................................... 47
2.5.1.8.4 Event ..................................................................................................................... 49
2.5.2 Network ....................................................................................................................... 50
2.5.2.1 Limit Control ............................................................................................................. 50
2.5.2.2 NAS .......................................................................................................................... 53
2.5.2.3 ACL .......................................................................................................................... 62
2.5.2.3.1 Ports ...................................................................................................................... 62
2.5.2.3.2 Rate Limits ............................................................................................................ 64
2.5.2.3.3 Access Control List ................................................................................................ 65
2.5.2.4 DHCP ....................................................................................................................... 67
2.5.2.4.1 Snooping ............................................................................................................... 67
2.5.2.4.2 Relay ..................................................................................................................... 68
2.5.2.5 IP Source Guard ....................................................................................................... 69
2.5.2.5.1 Configuration ......................................................................................................... 69
2.5.2.5.2 Static Table ........................................................................................................... 70
2.5.2.6 ARP Inspection......................................................................................................... 71
2.5.2.6.1 Configuration ......................................................................................................... 71
2.5.2.6.2 Static Table ........................................................................................................... 72
2.5.3 AAA ............................................................................................................................. 73
2.6 Aggregation .................................................................................................................... 75
2.6.1 Static ........................................................................................................................... 75
2.6.2 LACP ........................................................................................................................... 76
2.7 Loop Protection .............................................................................................................. 77
2.8 Spanning Tree ................................................................................................................ 78
2.8.1 Bridge Settings ............................................................................................................ 79
2.8.2 MSTI Mapping ............................................................................................................. 81
2.8.3 MSTI Priorities ............................................................................................................. 82
2.8.4 CIST Ports................................................................................................................... 83