![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/3/85/385496c9-e291-4906-8506-c64772ad8c1a/385496c9-e291-4906-8506-c64772ad8c1a-bg16.png)
List of Figures
GS-3012/GS-3012F User’s Guide
22
Figure 39 Advanced Application > VLAN > VLAN Port Setting ............................................................. 89
Figure 40 Subnet Based VLAN Application Example ............................................................................ 90
Figure 41 Advanced Application > VLAN > VLAN Port Setting > Subnet Based VLAN ........................ 91
Figure 42 Port Based VLAN Setup (All Connected) .............................................................................. 93
Figure 43 Port Based VLAN Setup (Port Isolation) ............................................................................... 94
Figure 44 Advanced Application > Static MAC Forwarding ................................................................... 95
Figure 45 Advanced Application > Filtering ........................................................................................... 97
Figure 46 MRSTP Network Example ................................................................................................... 101
Figure 47 STP/RSTP Network Example .............................................................................................. 102
Figure 48 MSTP Network Example ..................................................................................................... 103
Figure 49 MSTIs in Different Regions ................................................................................................. 104
Figure 50 MSTP and Legacy RSTP Network Example ....................................................................... 104
Figure 51 Advanced Application > Spanning Tree Protocol ................................................................ 105
Figure 52 Advanced Application > Spanning Tree Protocol > Configuration ....................................... 105
Figure 53 Advanced Application > Spanning Tree Protocol > RSTP ................................................... 106
Figure 54 Advanced Application > Spanning Tree Protocol > Status: RSTP ....................................... 108
Figure 55 Advanced Application > Spanning Tree Protocol > MRSTP ................................................ 109
Figure 56 Advanced Application > Spanning Tree Protocol > Status: MRSTP .....................................111
Figure 57 Advanced Application > Spanning Tree Protocol > MSTP ...................................................112
Figure 58 Advanced Application > Spanning Tree Protocol > Status: MSTP .......................................115
Figure 59 Advanced Application > Bandwidth Control .........................................................................118
Figure 60 Advanced Application > Broadcast Storm Control ...............................................................119
Figure 61 Advanced Application > Mirroring ........................................................................................ 121
Figure 62 Advanced Application > Link Aggregation Status ................................................................ 124
Figure 63 Advanced Application > Link Aggregation > Link Aggregation Setting ............................... 125
Figure 64 Advanced Application > Link Aggregation > Link Aggregation Setting > LACP .................. 127
Figure 65 Trunking Example - Physical Connections ........................................................................... 128
Figure 66 Trunking Example - Configuration Screen ............................................................................ 129
Figure 67 IEEE 802.1x Authentication Process .................................................................................. 132
Figure 68 MAC Authentication Process .............................................................................................. 132
Figure 69 Advanced Application > Port Authentication ....................................................................... 133
Figure 70 Advanced Application > Port Authentication > 802.1x ........................................................ 133
Figure 71 Advanced Application > Port Authentication > MAC Authentication ................................... 135
Figure 72 Advanced Application > Port Security ................................................................................. 138
Figure 73 Advanced Application > Classifier ....................................................................................... 142
Figure 74 Advanced Application > Classifier: Summary Table ............................................................ 144
Figure 75 Classifier: Example .............................................................................................................. 146
Figure 76 Advanced Application > Policy Rule ................................................................................... 148
Figure 77 Advanced Application > Policy Rule: Summary Table ......................................................... 150
Figure 78 Policy Example .................................................................................................................... 151
Figure 79 Advanced Application > Queuing Method ........................................................................... 154
Figure 80 Advanced Application > Multicast ........................................................................................ 156
Figure 81 Advanced Application > Multicast > Multicast Setting ......................................................... 157