![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/f/55/f55801cd-4086-4a30-a351-175f91bf8ff8/f55801cd-4086-4a30-a351-175f91bf8ff8-bg19.png)
List of Figures
XGS-4528F User’s Guide
25
Figure 82 Advanced Application > Multicast > Multicast Setting .......................................................... 175
Figure 83 Advanced Application > Multicast > Multicast Setting > IGMP Snooping VLAN .................. 177
Figure 84 Advanced Application > Multicast > Multicast Setting > IGMP Filtering Profile .................... 178
Figure 85 MVR Network Example ........................................................................................................ 180
Figure 86 MVR Multicast Television Example ...................................................................................... 181
Figure 87 Advanced Application > Multicast > Multicast Setting > MVR .............................................. 182
Figure 88 Advanced Application > Multicast > Multicast Setting > MVR: Group Configuration ............ 184
Figure 89 MVR Configuration Example ................................................................................................ 185
Figure 90 MVR Configuration Example ................................................................................................ 185
Figure 91 MVR Group Configuration Example ................................................................................... 186
Figure 92 MVR Group Configuration Example ..................................................................................... 186
Figure 93 AAA Server ........................................................................................................................... 187
Figure 94 Advanced Application > Auth and Acct ................................................................................ 188
Figure 95 Advanced Application > Auth and Acct > RADIUS Server Setup ......................................... 189
Figure 96 Advanced Application > Auth and Acct > TACACS+ Server Setup ...................................... 191
Figure 97 Advanced Application > Auth and Acct > Auth and Acct Setup ........................................... 193
Figure 98 DHCP Snooping Database File Format ............................................................................... 202
Figure 99 Example: Man-in-the-middle Attack ..................................................................................... 203
Figure 100 IP Source Guard ................................................................................................................. 205
Figure 101 IP Source Guard Static Binding .......................................................................................... 206
Figure 102 DHCP Snooping ................................................................................................................. 207
Figure 103 DHCP Snooping Configure ................................................................................................ 210
Figure 104 DHCP Snooping Port Configure ......................................................................................... 212
Figure 105 DHCP Snooping VLAN Configure ...................................................................................... 213
Figure 106 ARP Inspection Status ........................................................................................................ 214
Figure 107 ARP Inspection VLAN Status ............................................................................................. 215
Figure 108 ARP Inspection Log Status ................................................................................................. 216
Figure 109 ARP Inspection Configure .................................................................................................. 217
Figure 110 ARP Inspection Port Configure ........................................................................................... 218
Figure 111 ARP Inspection VLAN Configure ........................................................................................ 219
Figure 112 Loop Guard vs STP ............................................................................................................ 221
Figure 113 Switch in Loop State ........................................................................................................... 222
Figure 114 Loop Guard - Probe Packet ................................................................................................ 222
Figure 115 Loop Guard - Network Loop ............................................................................................... 222
Figure 116 Advanced Application > Loop Guard .................................................................................. 223
Figure 117 IP Application > Static Routing ........................................................................................... 227
Figure 118 IP Application > RIP ............................................................................................................ 230
Figure 119 OSPF Network Example ..................................................................................................... 232
Figure 120 OSPF Router Election Example ......................................................................................... 233
Figure 121 IP Application > OSPF Status ............................................................................................. 234
Figure 122 IP Application > OSPF Configuration: Activating and General Settings ............................. 236
Figure 123 IP Application > OSPF Configuration: Area Setup ............................................................. 237
Figure 124 IP Application > OSPF Configuration: Summary Table ...................................................... 238