beautypg.com

Amer Networks SS2GD8IP User Manual

Page 7

background image

Publication date: Dec., 2010

Revision B1

v

3-3-6. Management VLAN........................................................................................... 68

3-4.

MAC ......................................................................................................................... 69

3-4-1. Mac Address Table............................................................................................ 69

3-4-2. Static Filter ....................................................................................................... 71

3-4-3. Static Forward .................................................................................................. 72

3-4-4. MAC Alias ........................................................................................................ 73

3-4-5. MAC Table........................................................................................................ 74

3-5.

P

O

E ........................................................................................................................... 75

3-6.

GVRP........................................................................................................................ 77

3-6-1. Config ............................................................................................................... 77

3-6-2. Counter............................................................................................................. 80

3-6-3. Group................................................................................................................ 82

3-7.

Q

O

S(Q

UALITY OF

S

ERVICE

)

C

ONFIGURATION

........................................................... 83

3-7-1. Ports ................................................................................................................. 83

3-7-2. Qos Control List ............................................................................................... 85

3-7-3. Rate Limiters .................................................................................................... 90

3-7-4. Storm Control ................................................................................................... 91

3-7-5. Wizard............................................................................................................... 92

3-8.

SNMP

C

ONFIGURATION

...........................................................................................101

3-9.

ACL .........................................................................................................................109

3-9-1. Ports ................................................................................................................109

3-9-2. Rate Limiters ................................................................................................... 111

3-9-3. Access Control List ..........................................................................................112

3-9-4. Wizard..............................................................................................................141

3-10.

IP

MAC

B

INDING

...................................................................................................147

3-11.

802.1X

C

ONFIGURATION

........................................................................................149

3-11-1. Server.............................................................................................................153

3-11-2. Port Configuration.........................................................................................155

3-11-3. Status..............................................................................................................158

3-11-4. Statistics .........................................................................................................159

3-12.

TACACS+..............................................................................................................160

3-12-1. State ...............................................................................................................160

3-12-2. Authentication................................................................................................161

3-12-3. Authorization .................................................................................................162

3-12-4. Accounting.....................................................................................................163

3-13.

T

RUNKING

C

ONFIGURATION

...................................................................................164

3-13-1. Port................................................................................................................165

3-13-2. Aggregator View ............................................................................................167

3-13-3. Aggregation Hash Mode................................................................................168

3-13-4. LACP System Priority....................................................................................169

3-14.

STP

C

ONFIGURATION

.............................................................................................170

3-14-1. Status .............................................................................................................170

3-14-2. Configuration ................................................................................................172

3-14-3. STP Port Configuration.................................................................................174

3-15.

MSTP.....................................................................................................................177

3-15-1. Status .............................................................................................................177

3-15-2. Region Config................................................................................................178

3-15-3. Instance View.................................................................................................179

3-16.

M

IRRORING

............................................................................................................187

3-17.

M

ULTICAST

.............................................................................................................188

3-17-1. IGMP mode ...................................................................................................188

3-17-2. IGMP Proxy...................................................................................................189

3-17-3. IGMP Snooping .............................................................................................191

3-17-4. IGMP Group Allow........................................................................................192