ZyXEL Communications GS-2750 User Manual

Page 22

Advertising
background image

List of Figures

GS-2750 User’s Guide

22

Figure 39 Protocol Based VLAN Configuration Example ...................................................................... 97
Figure 40 Advanced Application > VLAN > Port Based VLAN Setup (All Connected) .......................... 98
Figure 41 Advanced Application > VLAN: Port Based VLAN Setup (Port Isolation) ............................. 99
Figure 42 Advanced Application > Static MAC Forwarding ................................................................. 101
Figure 43 Advanced Application > Filtering ......................................................................................... 103
Figure 44 STP/RSTP Network Example .............................................................................................. 107
Figure 45 MSTP Network Example ...................................................................................................... 108
Figure 46 MSTIs in Different Regions ................................................................................................. 109
Figure 47 MSTP and Legacy RSTP Network Example ....................................................................... 109
Figure 48 Advanced Application > Spanning Tree Protocol .................................................................110
Figure 49 Advanced Application > Spanning Tree Protocol > Configuration ........................................110
Figure 50 Advanced Application > Spanning Tree Protocol > RSTP ....................................................111
Figure 51 Advanced Application > Spanning Tree Protocol > Status: RSTP ........................................113
Figure 52 Advanced Application > Spanning Tree Protocol > MSTP ...................................................115
Figure 53 Advanced Application > Spanning Tree Protocol > Status: MSTP .......................................118
Figure 54 Advanced Application > Bandwidth Control ........................................................................ 122
Figure 55 Advanced Application > Broadcast Storm Control .............................................................. 123
Figure 56 Advanced Application > Mirroring ........................................................................................ 125
Figure 57 Advanced Application > Link Aggregation Status ................................................................ 128
Figure 58 Advanced Application > Link Aggregation > Link Aggregation Setting ............................... 129
Figure 59 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................. 131
Figure 60 Trunking Example - Physical Connections ........................................................................... 132
Figure 61 Trunking Example - Configuration Screen ............................................................................ 133
Figure 62 IEEE 802.1x Authentication Process ................................................................................... 136
Figure 63 MAC Authentication Process ............................................................................................... 136
Figure 64 Advanced Application > Port Authentication ....................................................................... 137
Figure 65 Advanced Application > Port Authentication > 802.1x ........................................................ 137
Figure 66 Advanced Application > Port Authentication > MAC Authentication ................................... 139
Figure 67 Advanced Application > Port Security ................................................................................. 142
Figure 68 Advanced Application > Classifier ....................................................................................... 146
Figure 69 Advanced Application > Classifier: Summary Table ............................................................ 148
Figure 70 Classifier: Example .............................................................................................................. 150
Figure 71 Advanced Application > Policy Rule .................................................................................... 152
Figure 72 Advanced Application > Policy Rule: Summary Table ......................................................... 154
Figure 73 Policy Example .................................................................................................................... 155
Figure 74 Advanced Application > Queuing Method ........................................................................... 158
Figure 75 VLAN Stacking Example ..................................................................................................... 162
Figure 76 Advanced Application > VLAN Stacking .............................................................................. 164
Figure 77 Advanced Application > Multicast ........................................................................................ 168
Figure 78 Advanced Application > Multicast > Multicast Setting ......................................................... 169
Figure 79 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................. 171
Figure 80 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ................... 172
Figure 81 MVR Network Example ....................................................................................................... 174

Advertising