3.4.1 VLAN Configuration.........................................................................3-56
3.4.2 VLAN Membership...........................................................................3-57
3.4.3 VLAN Status.....................................................................................3-58
3.4.4 Port PVID Configuration...................................................................3-58
3.4.5 GVRP Configuration ........................................................................3-60
3.5 Multicast Filtering....................................................................................3-60
3.5.1 IGMP Snooping Configuration .........................................................3-63
3.5.2 IGMP VLAN Configuration...............................................................3-64
3.5.3 IGMP Snooping Multicast Forwarding Table....................................3-65
3.5.4 Multicast MAC Address Configuration..............................................3-65
3.5.5 GMRP Configuration........................................................................3-66
3.5.6 Multicast Forwarding Table ..............................................................3-67
3.6 Traffic Prioritization..................................................................................3-67
3.6.1 QoS..................................................................................................3-67
3.6.1.1 QoS Setting ..............................................................................3-68
3.6.1.2 CoS Queue Mapping ................................................................3-69
3.6.1.3 DSCP Queue Mapping .............................................................3-70
3.7 Traffic Control..........................................................................................3-71
3.7.1 Port Protected..................................................................................3-71
3.8 Port Bandwidth........................................................................................3-71
3.8.1 Storm Control...................................................................................3-71
3.8.1.1 Storm Control Setting................................................................3-72
3.8.1.2 Rate Limiting.............................................................................3-73
3.9 Port Trunking...........................................................................................3-74
3.9.1 LAG..................................................................................................3-74
3.9.1.1 LAG Membership......................................................................3-75
3.9.1.2 LAG Information........................................................................3-75
3.10 Access Control List..............................................................................3-75
3.10.1 MAC ACL......................................................................................3-76
3.10.2 MAC Rules...................................................................................3-77
3.10.3 MAC Binding Configuration..........................................................3-79
3.10.4 Binding Table................................................................................3-80
3.11 Security Settings..................................................................................3-80
3.11.1 Security ........................................................................................3-80
3.11.1.1 Port Security..........................................................................3-81
3.11.1.2 IP Source ..............................................................................3-83
3.11.1.3 Port Authentication................................................................3-83
3.11.2 Management Security ..................................................................3-90
3.11.2.1 Local Users Management .....................................................3-90
3.11.2.2 RADIUS Server Config..........................................................3-91
3.11.2.3 RADIUS Statistics..................................................................3-92
3.11.2.4 TACACS+ Server ..................................................................3-93
3.11.2.5 TACACS+ AS ........................................................................3-94
3.11.2.6 Login Authentication..............................................................3-94
3.11.2.7 Login User Sessions .............................................................3-95
3.11.3 Denial of Service..........................................................................3-96
3.12 Monitoring Settings..............................................................................3-97
3.12.1 Mac Address T able.......................................................................3-98
3.12.2 SFP DDM.....................................................................................3-99
3-2