Configuration Guide Vol. 2
17.1.1 Overview
17.1.2 Operating specifications
17.1.3 Applications
17.1.4 Precautions when using L2 loop detection