Figures – Allied Telesis AT-S63 User Manual

Page 15

Advertising
background image

15

Figure 1: AT-StackXG Stacking Module ............................................................................................................................... 67
Figure 2: Duplex-chain Topology.......................................................................................................................................... 70
Figure 3: Duplex-ring Topology ............................................................................................................................................ 71
Figure 4: Static Port Trunk Example...................................................................................................................................103
Figure 5: User Priority and VLAN Fields within an Ethernet Frame....................................................................................140
Figure 6: ToS field in an IP Header ....................................................................................................................................141
Figure 7: ACL Example 1 ...................................................................................................................................................151
Figure 8: ACL Example 2 ...................................................................................................................................................152
Figure 9: ACL Example 3 ...................................................................................................................................................153
Figure 10: ACL Example 4 .................................................................................................................................................154
Figure 11: ACL Example 5 .................................................................................................................................................154
Figure 12: ACL Example 6 .................................................................................................................................................155
Figure 13: DiffServ Domain Example .................................................................................................................................177
Figure 14: QoS Voice Application Example........................................................................................................................180
Figure 15: QoS Video Application Example........................................................................................................................182
Figure 16: QoS Critical Database Example ........................................................................................................................183
Figure 17: Policy Component Hierarchy Example ..............................................................................................................185
Figure 18: Group Link Control Example 1 ..........................................................................................................................190
Figure 19: Group Link Control Example 2 ..........................................................................................................................191
Figure 20: Group Link Control Example 3 ..........................................................................................................................192
Figure 21: Group Link Control Example 4 ..........................................................................................................................193
Figure 22: Group Link Control Example 5 ..........................................................................................................................194
Figure 23: Group Link Control Example 6 ..........................................................................................................................195
Figure 24: Group Link Control Example 7 ..........................................................................................................................196
Figure 25: IGMP Snooping Querier Example 1 ..................................................................................................................228
Figure 26: IGMP Snooping Querier Example 2 ..................................................................................................................229
Figure 27: SHOW IP INTERFACE Command ....................................................................................................................231
Figure 28: SHOW IGMPSNOOPING Command ................................................................................................................232
Figure 29: Double Fault Condition in EPSR Snooping .......................................................................................................248
Figure 30: MIB Tree............................................................................................................................................................258
Figure 31: SNMPv3 User Configuration Process ...............................................................................................................262
Figure 32: SNMPv3 Message Notification Process ............................................................................................................263
Figure 33: Point-to-Point Ports ...........................................................................................................................................277
Figure 34: Edge Port ..........................................................................................................................................................278
Figure 35: Point-to-Point and Edge Port.............................................................................................................................278
Figure 36: VLAN Fragmentation .........................................................................................................................................280
Figure 37: Loop Guard Example 1 .....................................................................................................................................284
Figure 38: Loop Guard Example 2 .....................................................................................................................................285
Figure 39: Loop Guard Example 3 .....................................................................................................................................285
Figure 40: Loop Guard Example 4 .....................................................................................................................................286
Figure 41: Loop Guard Example 5 .....................................................................................................................................287
Figure 42: VLAN Fragmentation with STP or RSTP...........................................................................................................293
Figure 43: MSTP Example of Two Spanning Tree Instances ............................................................................................294
Figure 44: Multiple VLANs in a MSTI..................................................................................................................................295
Figure 45: Multiple Spanning Tree Region .........................................................................................................................300
Figure 46: CIST and VLAN Guideline - Example 1.............................................................................................................305
Figure 47: CIST and VLAN Guideline - Example 2.............................................................................................................306
Figure 48: Spanning Regions - Example 1 .........................................................................................................................307
Figure 49: Port-based VLAN - Example 1 ..........................................................................................................................318
Figure 50: Port-based VLAN - Example 2 ..........................................................................................................................319

Figures

Advertising