LevelOne GSW-4896 Guida Utente
![LevelOne](https://files.manualsbrain.com/attachments/27321eb1c09195d2df7b5aaacecc433a76036208/common/fit/150/50/dab1899b0abf7f31bb54c10c5d1ba593edc572333e44d8f7c8afed29b166/brand_logo.jpeg)
iii
3-6-1. Priority .............................................................................................................................. 66
3-6-2. Policer ............................................................................................................................... 76
3-6-3. Shaper................................................................................................................................ 77
3-6-4. Flow .................................................................................................................................. 78
3-6-5. Police-Flow ....................................................................................................................... 85
3-6-6. Mark .................................................................................................................................. 86
3-6-7. Mark-enable ...................................................................................................................... 87
3-7. ACL............................................................................................................................. 88
3-7-1. ACL Mode......................................................................................................................... 88
3-7-2. ACL/VLAN Mapping ....................................................................................................... 89
3-7-3. ACL Rule........................................................................................................................... 90
3-8. ACL QoS Load........................................................................................................... 91
3-9. User Defined............................................................................................................... 92
3-10. SNMP Configuration............................................................................................... 93
3-11. IGMP Snooping ....................................................................................................... 99
3-12. Trunk ...................................................................................................................... 103
3-13. STP Configuration..................................................................................................110
3-13-1. STP Status ......................................................................................................................110
3-13-2. STP Configuration..........................................................................................................112
3-13-3. STP Port Configuration ..................................................................................................114
3-14. GVRP Configuration..............................................................................................117
3-15. 802.1X Configuration............................................................................................ 123
3-16. Alarm Configuration............................................................................................. 134
3-17. Configuration......................................................................................................... 137
3-17-2. Config File .................................................................................................................... 143
3-18. Diagnostics ............................................................................................................. 144
3-19. Loop Detection....................................................................................................... 147
3-20. TFTP Server........................................................................................................... 148
3-21. Log .......................................................................................................................... 149
3-22. Firmware Upgrade ................................................................................................ 151
3-23. Max. Packet Length .............................................................................................. 152
3-24. MAC Table ............................................................................................................. 153
3-25. VLAN...................................................................................................................... 159
3-25-1. VLAN Mode ................................................................................................................. 159
3-25-2. VLAN Group ................................................................................................................ 161
3-25-3. Port Protocol.................................................................................................................. 165
3-25-4. Port VID ........................................................................................................................ 166
3-26. Reboot..................................................................................................................... 167
3-27. Logout..................................................................................................................... 168
4.
Operation of CLI Management ....................................................................... 169
4-1. CLI Management .................................................................................................... 169