User`s manual
Configuring IGMP Snooping.................................................................................. 3-49
Static Multicast MAC.............................................................................................. 3-50
Configuring GMRP................................................................................................. 3-51
GMRP Table ........................................................................................................... 3-51
Using Bandwidth Management .......................................................................................... 3-52
Configuring Bandwidth Management..................................................................... 3-52
Broadcast Storm Protection..................................................................................... 3-52
Traffic Rate Limiting Settings................................................................................. 3-52
Using Port Access Control.................................................................................................. 3-53
Configuring Static Port Lock .................................................................................. 3-55
Configuring IEEE 802.1X....................................................................................... 3-55
Using Auto Warning ........................................................................................................... 3-58
Configuring Email Warning.................................................................................... 3-58
Event Type .............................................................................................................. 3-58
Email Setup............................................................................................................. 3-60
Configuring Relay Warning.................................................................................... 3-61
Event Setup ............................................................................................................. 3-61
Warning List............................................................................................................ 3-62
Using Line-Swap-Fast-Recovery........................................................................................ 3-62
Configuring Line-Swap Fast Recovery................................................................... 3-63
Using Set Device IP............................................................................................................ 3-63
Configuring Set Device IP ...................................................................................... 3-64
Using Diagnosis.................................................................................................................. 3-64
Mirror Port .............................................................................................................. 3-64
Ping ......................................................................................................................... 3-65
Using Monitor .................................................................................................................... 3-66
Monitor by Switch................................................................................................... 3-66
Monitor by Port....................................................................................................... 3-66
Using the MAC Address Table........................................................................................... 3-67
Using System Log .............................................................................................................. 3-68
Event Log................................................................................................................ 3-68
Syslog Settings........................................................................................................ 3-68
Using HTTPS/SSL ............................................................................................................. 3-69
Chapter 4 EDS Configurator GUI...............................................................................4-1
Starting EDS Configurator ................................................................................................... 4-2
Broadcast Search .................................................................................................................. 4-2
Search by IP address............................................................................................................. 4-3
Upgrade Firmware................................................................................................................ 4-3
Modify IP Address................................................................................................................ 4-4
Export Configuration............................................................................................................ 4-5
Import Configuration............................................................................................................ 4-6
Unlock Server....................................................................................................................... 4-7
Appendix A MIB Groups...............................................................................................A-1
Appendix B Specifications...........................................................................................B-1