User manual
Table Of Contents
- About This Manual
- 1 VLAN Configuration
- VLAN Overview
- Configuring VLAN
- Creating VLAN
- Creating a VLAN in VLAN Database
- Setting VLAN Name
- Setting VLAN Link Type on Ethernet Interface
- Adding VLAN Member Port
- Adding Ports to a VLAN in Batches
- Setting the Native VLAN for a Trunk or Hybrid Port
- Setting VLAN Filtering on a Port
- Setting Frame Filtering Type of a Port
- Creating VLAN Layer 3 Interface
- VLAN Configuration Example
- Configuring PVLAN
- Configuring QinQ
- Configuring Subnet VLAN
- Configuring Protocol VLAN
- Configuring VLAN Translation
- Configuring SuperVLAN
- VLAN Maintenance and Diagnosis
- 2 SVLAN Configuration
- 3 SVLAN COS Configuration
- 4 ZESR and SVLAN Linkage Networking Configuration
- 5 MAC Address Table Configuration
- Introduction to MAC Address
- Configuring MAC Address Table
- Setting MAC Address Aging Time
- Burning MAC Addresses
- Configuring MAC Address Permanent
- Binding MAC Address to a Port
- Enabling MAC Address Learning
- Limiting MAC Address Count
- Setting MAC Address Learning Protection
- Setting Port Unkown Source MAC Address Filtering
- Setting MAC Address Filtering
- Viewing MAC Address Table
- MAC Address Table Configuration Example
- 6 STP Configuration
- 7 Link Aggregation Configuration
- 8 IGMP Snooping Configuration
- 9 Sflow Configuration
- 10 ZESS Configuration
- 11 Ethernet OAM Configuration
- 12 UDLD Configuration
- 13 LLDP
- 14 L2PT Configuration
- Figures
- Tables
- Glossary

Figures
Figure1VLANTAGFORMAT.................................................2
Figure2QinQT ypicalNetworking........................................4
Figure3VLANNETWORKING..............................................10
Figure4SubnetVLANCongurationExample........................12
Figure5SuperVLANCongurationExample...........................15
Figure6MACAddressT ableCongurationExample................39
Figure7BPDUProtectionofEdgePort..................................44
Figure8STPBeforeMAX_AGETimerExpired........................45
Figure9NetworkLoopDiagram...........................................46
Figure10PortLoopbackProtection.....................................46
Figure11ROOTBRIDGE.....................................................47
Figure12NEWROOTBRIDGE.............................................48
Figure13MSTPCONFIGURATION........................................54
Figure14CONFIGURATIONOFMSTP....................................55
Figure15BPDUCONFIGURATION........................................56
Figure16BPDUCONFIGURATION2.....................................57
Figure17BPDUCONFIGURATION3.....................................58
Figure18LINKAGGREGATIONCONFIGURATION...................63
Figure19IGMPSNOOPINGAPPLICATION.............................68
Figure20CONFIGURATIONOFIGMPSNOOPING....................72
Figure21SFlowCongurationExample................................78
Figure22ZESSNetworkTopology........................................82
Figure23ZESSNetworkingCongurationFigure...................86
Figure24OAMsub-layerinISO/IECOSIReferenceModule
Relationship......................................................89
Figure25802.3ahInstanceConguration.............................93
Figure26MaintenanceDomainFigure..................................95
Figure27EthernetNetworkMaintenanceDomainInclusion
RelationshipFigure............................................96
Figure28LTFunctionConguration...................................101
Figure29LLDPCongurationExample...............................111
Figure30L2PTNetworkingDiagram...................................114
CondentialandProprietaryInformationofZTECORPORATION117