ZyXEL Communications XGS-4528F User Manual

Page 24

Advertising
background image

List of Figures

XGS-4528F User’s Guide

24

Figure 39 Advanced Application > VLAN > VLAN Port Setting > Protocol Based VLAN ....................... 97
Figure 40 Protocol Based VLAN Configuration Example ....................................................................... 99
Figure 41 Advanced Application > VLAN > Port Based VLAN Setup (All Connected) ......................... 100
Figure 42 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation) ............................ 101
Figure 43 Advanced Application > Static MAC Forwarding .................................................................. 103
Figure 44 Advanced Application > Filtering .......................................................................................... 105
Figure 45 MRSTP Network Example .................................................................................................... 109
Figure 46 STP/RSTP Network Example ................................................................................................110
Figure 47 MSTP Network Example .......................................................................................................111
Figure 48 MSTIs in Different Regions ...................................................................................................112
Figure 49 MSTP and Legacy RSTP Network Example .........................................................................112
Figure 50 Advanced Application > Spanning Tree Protocol ..................................................................113
Figure 51 Advanced Application > Spanning Tree Protocol > Configuration .........................................113
Figure 52 Advanced Application > Spanning Tree Protocol > RSTP .....................................................114
Figure 53 Advanced Application > Spanning Tree Protocol > Status: RSTP .........................................116
Figure 54 Advanced Application > Spanning Tree Protocol > MRSTP ..................................................117
Figure 55 Advanced Application > Spanning Tree Protocol > Status: MRSTP ......................................119
Figure 56 Advanced Application > Spanning Tree Protocol > MSTP ................................................... 121
Figure 57 Advanced Application > Spanning Tree Protocol > Status: MSTP ....................................... 124
Figure 58 Advanced Application > Bandwidth Control ......................................................................... 128
Figure 59 Advanced Application > Broadcast Storm Control ............................................................... 129
Figure 60 Advanced Application > Mirroring ......................................................................................... 131
Figure 61 Advanced Application > Link Aggregation Status ................................................................. 134
Figure 62 Advanced Application > Link Aggregation > Link Aggregation Setting ................................ 135
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP ................... 137
Figure 64 Trunking Example - Physical Connections ........................................................................... 138
Figure 65 Trunking Example - Configuration Screen ............................................................................ 139
Figure 66 IEEE 802.1x Authentication Process .................................................................................... 142
Figure 67 MAC Authentication Process ................................................................................................ 142
Figure 68 Advanced Application > Port Authentication ........................................................................ 143
Figure 69 Advanced Application > Port Authentication > 802.1x ......................................................... 143
Figure 70 Advanced Application > Port Authentication > MAC Authentication .................................... 145
Figure 71 Advanced Application > Port Security .................................................................................. 148
Figure 72 Advanced Application > Classifier ........................................................................................ 152
Figure 73 Advanced Application > Classifier: Summary Table ............................................................. 154
Figure 74 Classifier: Example ............................................................................................................... 155
Figure 75 Advanced Application > Policy Rule ..................................................................................... 158
Figure 76 Advanced Application > Policy Rule: Summary Table .......................................................... 160
Figure 77 Policy Example ..................................................................................................................... 161
Figure 78 Advanced Application > Queuing Method ............................................................................ 164
Figure 79 VLAN Stacking Example ...................................................................................................... 168
Figure 80 Advanced Application > VLAN Stacking ............................................................................... 170
Figure 81 Advanced Application > Multicast ......................................................................................... 174

Advertising