List of Figures
ES-4124 User’s Guide
27
Figure 82 Advanced Application > Multicast > Multicast Setting ......................................................... 177
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN ................. 179
Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile ................... 180
Figure 85 MVR Network Example ....................................................................................................... 181
Figure 86 MVR Multicast Television Example ..................................................................................... 182
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR ............................................. 183
Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 185
Figure 89 MVR Configuration Example ............................................................................................... 186
Figure 90 MVR Configuration Example ............................................................................................... 186
Figure 91 MVR Group Configuration Example ................................................................................... 187
Figure 92 MVR Group Configuration Example .................................................................................... 187
Figure 93 AAA Server ......................................................................................................................... 189
Figure 94 Advanced Application > Auth and Acct ............................................................................... 190
Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup ........................................ 191
Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup ..................................... 193
Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup .......................................... 195
Figure 98 DHCP Snooping Database File Format ............................................................................... 204
Figure 99 Example: Man-in-the-middle Attack ..................................................................................... 205
Figure 100 IP Source Guard ................................................................................................................. 207
Figure 101 IP Source Guard Static Binding .......................................................................................... 208
Figure 102 DHCP Snooping ................................................................................................................. 209
Figure 103 DHCP Snooping Configure ................................................................................................ 212
Figure 104 DHCP Snooping Port Configure ......................................................................................... 214
Figure 105 DHCP Snooping VLAN Configure ...................................................................................... 215
Figure 106 ARP Inspection Status ........................................................................................................ 216
Figure 107 ARP Inspection VLAN Status ............................................................................................. 217
Figure 108 ARP Inspection Log Status ................................................................................................. 218
Figure 109 ARP Inspection Configure .................................................................................................. 219
Figure 110 ARP Inspection Port Configure ........................................................................................... 220
Figure 111 ARP Inspection VLAN Configure ........................................................................................ 221
Figure 112 Loop Guard vs STP ............................................................................................................ 223
Figure 113 Switch in Loop State ........................................................................................................... 224
Figure 114 Loop Guard - Probe Packet ................................................................................................ 224
Figure 115 Loop Guard - Network Loop ............................................................................................... 224
Figure 116 Advanced Application > Loop Guard .................................................................................. 225
Figure 117 IP Application > Static Routing .......................................................................................... 229
Figure 118 IP Application > RIP ........................................................................................................... 232
Figure 119 OSPF Network Example ..................................................................................................... 234
Figure 120 OSPF Router Election Example ......................................................................................... 235
Figure 121 IP Application > OSPF Status ............................................................................................ 236
Figure 122 IP Application > OSPF Configuration: Activating and General Settings ............................ 238
Figure 123 IP Application > OSPF Configuration: Area Setup ............................................................ 239
Figure 124 IP Application > OSPF Configuration: Summary Table ..................................................... 240