ZyXEL Communications ES-2024 - V3.80 User Manual page 20

Table of Contents

Advertisement

List of Figures
Figure 39 Advanced Application > Static MAC Forwarding ................................................................... 91
Figure 40 Advanced Application > Filtering ........................................................................................... 93
Figure 41 STP/RSTP Network Example ................................................................................................ 98
Figure 42 MSTP Network Example ........................................................................................................ 98
Figure 43 MSTIs in Different Regions ................................................................................................... 99
Figure 44 MSTP and Legacy RSTP Network Example ......................................................................... 99
Figure 45 Advanced Application > Spanning Tree Protocol ................................................................ 100
Figure 46 Advanced Application > Spanning Tree Protocol > RSTP ................................................... 100
Figure 48 Advanced Application > Spanning Tree Protocol > MSTP .................................................. 103
Figure 50 Advanced Application > Bandwidth Control ........................................................................ 109
Figure 51 Advanced Application > Broadcast Storm Control ...............................................................111
Figure 52 Advanced Application > Mirroring .........................................................................................113
Figure 53 Advanced Application > Link Aggregation Status .................................................................116
Figure 56 Trunking Example - Physical Connections ........................................................................... 120
Figure 57 Trunking Example - Configuration Screen ............................................................................ 120
Figure 58 IEEE 802.1x Authentication Process ................................................................................... 122
Figure 59 Advanced Application > Port Authentication ....................................................................... 122
Figure 60 Advanced Application > Port Authentication > 802.1x ........................................................ 123
Figure 61 Advanced Application > Port Security ................................................................................. 126
Figure 62 Port Security Example ......................................................................................................... 127
Figure 63 Advanced Application > Queuing Method ........................................................................... 130
Figure 64 Advanced Application > Multicast ........................................................................................ 132
Figure 65 Advanced Application > Multicast > Multicast Setting ......................................................... 133
Figure 68 MVR Network Example ....................................................................................................... 137
Figure 69 MVR Multicast Television Example ..................................................................................... 138
Figure 70 Advanced Application > Multicast > Multicast Setting > MVR ............................................. 139
Figure 72 MVR Configuration Example ............................................................................................... 142
Figure 73 MVR Configuration Example ............................................................................................... 142
Figure 74 MVR Group Configuration Example ................................................................................... 143
Figure 75 MVR Group Configuration Example .................................................................................... 143
Figure 76 AAA Server .......................................................................................................................... 145
Figure 77 Advanced Application > Auth and Acct ............................................................................... 146
Figure 80 Advanced Application > Auth and Acct > Auth and Acct Setup .......................................... 151
Figure 81 Example: Man-in-the-middle Attack ..................................................................................... 159
20
ES-2024 Series User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dimension es-2024aDimension es-2024pwrEs-2024 series

Table of Contents