Configuration Guide Vol. 2
16.1.1 Overview
16.1.2 Operating specifications
16.1.3 Applications
16.1.4 Precautions when using L2 loop detection