List of Figures
ES-2024 Series User’s Guide
20
Figure 39 Advanced Application > Filtering ........................................................................................... 93
Figure 40 STP/RSTP Network Example ................................................................................................ 98
Figure 41 MSTP Network Example ........................................................................................................ 98
Figure 42 MSTIs in Different Regions ................................................................................................... 99
Figure 43 MSTP and Legacy RSTP Network Example ......................................................................... 99
Figure 44 Advanced Application > Spanning Tree Protocol ................................................................ 100
Figure 45 Advanced Application > Spanning Tree Protocol > RSTP ................................................... 100
Figure 46 Advanced Application > Spanning Tree Protocol > Status: RSTP ....................................... 102
Figure 47 Advanced Application > Spanning Tree Protocol > MSTP .................................................. 103
Figure 48 Advanced Application > Spanning Tree Protocol > Status: MSTP ...................................... 106
Figure 49 Advanced Application > Bandwidth Control ........................................................................ 109
Figure 50 Advanced Application > Broadcast Storm Control ...............................................................111
Figure 51 Advanced Application > Mirroring .........................................................................................113
Figure 52 Advanced Application > Link Aggregation Status .................................................................116
Figure 53 Advanced Application > Link Aggregation > Link Aggregation Setting ................................117
Figure 54 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP ...................118
Figure 55 Trunking Example - Physical Connections ........................................................................... 120
Figure 56 Trunking Example - Configuration Screen ............................................................................ 120
Figure 57 IEEE 802.1x Authentication Process ................................................................................... 122
Figure 58 Advanced Application > Port Authentication ....................................................................... 122
Figure 59 Advanced Application > Port Authentication > 802.1x ........................................................ 123
Figure 60 Advanced Application > Port Security ................................................................................. 126
Figure 61 Port Security Example ......................................................................................................... 127
Figure 62 Advanced Application > Queuing Method ........................................................................... 130
Figure 63 Advanced Application > Multicast ........................................................................................ 132
Figure 64 Advanced Application > Multicast > Multicast Setting ......................................................... 133
Figure 65 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................. 135
Figure 66 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ................... 136
Figure 67 MVR Network Example ....................................................................................................... 137
Figure 68 MVR Multicast Television Example ..................................................................................... 138
Figure 69 Advanced Application > Multicast > Multicast Setting > MVR ............................................. 139
Figure 70 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 141
Figure 71 MVR Configuration Example ............................................................................................... 142
Figure 72 MVR Configuration Example ............................................................................................... 142
Figure 73 MVR Group Configuration Example ................................................................................... 143
Figure 74 MVR Group Configuration Example .................................................................................... 143
Figure 75 AAA Server .......................................................................................................................... 145
Figure 76 Advanced Application > Auth and Acct ............................................................................... 146
Figure 77 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................ 147
Figure 78 Advanced Application > Auth and Acct > TACACS+ Server Setup ..................................... 149
Figure 79 Advanced Application > Auth and Acct > Auth and Acct Setup .......................................... 151
Figure 80 Example: Man-in-the-middle Attack ..................................................................................... 159
Figure 81 IP Source Guard ................................................................................................................... 161