IES-2000/3000 User's Guide
10.1
IGMP Snooping...................................................................................................................................10-1
10.2
Bridge Port Numbers...........................................................................................................................10-1
10.3
Basic Commands .................................................................................................................................10-1
10.4
MAC Filter Commands .......................................................................................................................10-2
10.5
Filter Commands .................................................................................................................................10-4
10.6
Port-Based VLAN Commands ............................................................................................................10-5
10.7
11.1
Introduction .........................................................................................................................................11-1
11.2
11.3
11.4
Filtering Databases ..............................................................................................................................11-1
11.5
Configuring the Tagged VLAN...........................................................................................................11-2
11.6
12.1
Introduction .........................................................................................................................................12-1
12.2
IP Commands .............................................................................................................................. 13-1
13.1
Setting the IP Address .........................................................................................................................13-1
13.2
General IP Commands.........................................................................................................................13-2
Remote Management .................................................................................................................. 14-1
14.1
Management by Telnet ........................................................................................................................14-1
14.2
SNMP Management ............................................................................................................................14-1
14.3
SNMP Access Configuration ..............................................................................................................14-3
14.4
SNMP Trap Configuration ..................................................................................................................14-4
Chapter 15
15.1
15.2
Configuration Backup .........................................................................................................................15-1
15.3
Configuration Restore .........................................................................................................................15-1
Chapter 16
16.1
16.2
viii
Table of Contents