Figures – Allied Telesis AT-S63 User Manual

Page 13

Advertising
background image

13

Figure 1: Static Port Trunk Example.....................................................................................................................................81
Figure 2: User Priority and VLAN Fields within an Ethernet Frame....................................................................................114
Figure 3: ToS field in an IP Header ....................................................................................................................................115
Figure 4: ACL Example 1 ...................................................................................................................................................125
Figure 5: ACL Example 2 ...................................................................................................................................................126
Figure 6: ACL Example 3 ...................................................................................................................................................127
Figure 7: ACL Example 4 ...................................................................................................................................................128
Figure 8: ACL Example 5 ...................................................................................................................................................128
Figure 9: ACL Example 6 ...................................................................................................................................................129
Figure 10: DiffServ Domain Example .................................................................................................................................151
Figure 11: QoS Voice Application Example........................................................................................................................154
Figure 12: QoS Video Application Example........................................................................................................................156
Figure 13: QoS Critical Database Example........................................................................................................................157
Figure 14: Policy Component Hierarchy Example ..............................................................................................................159
Figure 15: Double Fault Condition in EPSR Snooping .......................................................................................................198
Figure 16: MIB Tree............................................................................................................................................................208
Figure 17: SNMPv3 User Configuration Process ...............................................................................................................212
Figure 18: SNMPv3 Message Notification Process ............................................................................................................213
Figure 19: Point-to-Point Ports ...........................................................................................................................................227
Figure 20: Edge Port ..........................................................................................................................................................228
Figure 21: Point-to-Point and Edge Port.............................................................................................................................228
Figure 22: VLAN Fragmentation.........................................................................................................................................230
Figure 23: VLAN Fragmentation with STP or RSTP...........................................................................................................235
Figure 24: MSTP Example of Two Spanning Tree Instances ............................................................................................236
Figure 25: Multiple VLANs in a MSTI..................................................................................................................................237
Figure 26: Multiple Spanning Tree Region .........................................................................................................................242
Figure 27: CIST and VLAN Guideline - Example 1.............................................................................................................247
Figure 28: CIST and VLAN Guideline - Example 2.............................................................................................................248
Figure 29: Spanning Regions - Example 1 .........................................................................................................................249
Figure 30: Port-based VLAN - Example 1 ..........................................................................................................................260
Figure 31: Port-based VLAN - Example 2 ..........................................................................................................................261
Figure 32: Example of a Tagged VLAN..............................................................................................................................265
Figure 33: GVRP Example .................................................................................................................................................270
Figure 34: GARP Architecture ............................................................................................................................................276
Figure 35: GID Architecture................................................................................................................................................277
Figure 36: Example of a MAC Address-based VLAN Spanning Switches .........................................................................297
Figure 37: Example of the Supplicant Role ........................................................................................................................368
Figure 38: Authenticator Port in Single Operating Mode with a Single Client.....................................................................370
Figure 39: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 1 ................................371
Figure 40: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 2 ................................372
Figure 41: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 3 ................................373
Figure 42: Authenticator Port in Multiple Operating Mode - Example 1..............................................................................374
Figure 43: Authenticator Port in Multiple Operating Mode - Example 2..............................................................................375
Figure 44: SSH Remote Management of a Slave Switch ...................................................................................................425

Figures

Advertising