ZyXEL Communications GS-4024 User Manual

Page 26

Advertising
background image

List of Figures

GS-4012F/4024 User’s Guide

26

Figure 39 Advanced Application > VLAN > VLAN Port Setting ............................................................. 97

Figure 40 Subnet Based VLAN Application Example ............................................................................ 98

Figure 41 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................ 99

Figure 42 Port Based VLAN Setup (All Connected) ............................................................................ 101

Figure 43 Port Based VLAN Setup (Port Isolation) ............................................................................. 102

Figure 44 Advanced Application > Static MAC Forwarding ................................................................. 105

Figure 45 Advanced Application > Filtering ......................................................................................... 107

Figure 46 MRSTP Network Example ....................................................................................................111

Figure 47 STP/RSTP Network Example ...............................................................................................112

Figure 48 MSTP Network Example ......................................................................................................113

Figure 49 MSTIs in Different Regions ..................................................................................................114

Figure 50 MSTP and Legacy RSTP Network Example ........................................................................114

Figure 51 Advanced Application > Spanning Tree Protocol .................................................................115

Figure 52 Advanced Application > Spanning Tree Protocol > Configuration ........................................115

Figure 53 Advanced Application > Spanning Tree Protocol > RSTP ....................................................116

Figure 54 Advanced Application > Spanning Tree Protocol > Status: RSTP ........................................118

Figure 55 Advanced Application > Spanning Tree Protocol > MRSTP .................................................119

Figure 56 Advanced Application > Spanning Tree Protocol > Status: MRSTP .................................... 121

Figure 57 Advanced Application > Spanning Tree Protocol > MSTP .................................................. 122

Figure 58 Advanced Application > Spanning Tree Protocol > Status: MSTP ...................................... 125

Figure 59 Advanced Application > Bandwidth Control ........................................................................ 128

Figure 60 Advanced Application > Broadcast Storm Control .............................................................. 129

Figure 61 Advanced Application > Mirroring ........................................................................................ 131

Figure 62 Advanced Application > Link Aggregation Status ................................................................ 134

Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting ............................... 135

Figure 64 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................. 137

Figure 65 Trunking Example - Physical Connections ........................................................................... 138

Figure 66 Trunking Example - Configuration Screen ............................................................................ 139

Figure 67 IEEE 802.1x Authentication Process .................................................................................. 142

Figure 68 MAC Authentication Process .............................................................................................. 142

Figure 69 Advanced Application > Port Authentication ....................................................................... 143

Figure 70 Advanced Application > Port Authentication > 802.1x ........................................................ 143

Figure 71 Advanced Application > Port Authentication > MAC Authentication ................................... 145

Figure 72 Advanced Application > Port Security ................................................................................. 148

Figure 73 Advanced Application > Classifier ....................................................................................... 152

Figure 74 Advanced Application > Classifier: Summary Table ............................................................ 154

Figure 75 Classifier: Example .............................................................................................................. 156

Figure 76 Advanced Application > Policy Rule ................................................................................... 158

Figure 77 Advanced Application > Policy Rule: Summary Table ......................................................... 160

Figure 78 Policy Example .................................................................................................................... 161

Figure 79 Queuing Method .................................................................................................................. 164

Figure 80 VLAN Stacking Example ..................................................................................................... 166

Figure 81 Advanced Application > VLAN Stacking .............................................................................. 168

Advertising
This manual is related to the following products: