Figures – Allied Telesis AT-S63 User Manual

Page 13

Advertising
background image

13

Figure 1: Static Port Trunk Example.....................................................................................................................................77
Figure 2: Example of Multiple Aggregators for Multiple Aggregate Trunks ..........................................................................84
Figure 3: Example of an Aggregator with Multiple Trunks ....................................................................................................85
Figure 4: User Priority and VLAN Fields within an Ethernet Frame....................................................................................114
Figure 5: ToS field in an IP Header ....................................................................................................................................115
Figure 6: ACL Example 1 ...................................................................................................................................................125
Figure 7: ACL Example 2 ...................................................................................................................................................126
Figure 8: ACL Example 3 ...................................................................................................................................................127
Figure 9: ACL Example 4 ...................................................................................................................................................128
Figure 10: ACL Example 5 .................................................................................................................................................128
Figure 11: ACL Example 6 .................................................................................................................................................129
Figure 12: DiffServ Domain Example .................................................................................................................................151
Figure 13: QoS Voice Application Example........................................................................................................................154
Figure 14: QoS Video Application Example........................................................................................................................156
Figure 15: QoS Critical Database Example........................................................................................................................157
Figure 16: Policy Component Hierarchy Example ..............................................................................................................159
Figure 17: Double Fault Condition in EPSR Snooping .......................................................................................................192
Figure 18: MIB Tree............................................................................................................................................................202
Figure 19: SNMPv3 User Configuration Process ...............................................................................................................206
Figure 20: SNMPv3 Message Notification Process ............................................................................................................207
Figure 21: Point-to-Point Ports ...........................................................................................................................................221
Figure 22: Edge Port ..........................................................................................................................................................222
Figure 23: Point-to-Point and Edge Port.............................................................................................................................222
Figure 24: VLAN Fragmentation.........................................................................................................................................224
Figure 25: VLAN Fragmentation with STP or RSTP...........................................................................................................229
Figure 26: MSTP Example of Two Spanning Tree Instances ............................................................................................230
Figure 27: Multiple VLANs in a MSTI..................................................................................................................................231
Figure 28: Multiple Spanning Tree Region .........................................................................................................................236
Figure 29: CIST and VLAN Guideline - Example 1.............................................................................................................241
Figure 30: CIST and VLAN Guideline - Example 2.............................................................................................................242
Figure 31: Spanning Regions - Example 1 .........................................................................................................................243
Figure 32: Port-based VLAN - Example 1 ..........................................................................................................................254
Figure 33: Port-based VLAN - Example 2 ..........................................................................................................................255
Figure 34: Example of a Tagged VLAN..............................................................................................................................259
Figure 35: GVRP Example .................................................................................................................................................264
Figure 36: GARP Architecture ............................................................................................................................................270
Figure 37: GID Architecture................................................................................................................................................271
Figure 38: Example of a MAC Address-based VLAN Spanning Switches .........................................................................291
Figure 39: Example of the Supplicant Role ........................................................................................................................362
Figure 40: Authenticator Port in Single Operating Mode with a Single Client.....................................................................364
Figure 41: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 1 ................................365
Figure 42: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 2 ................................366
Figure 43: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 3 ................................367
Figure 44: Authenticator Port in Multiple Operating Mode - Example 1..............................................................................368
Figure 45: Authenticator Port in Multiple Operating Mode - Example 2..............................................................................369
Figure 46: SSH Remote Management of a Slave Switch ...................................................................................................419

Figures

Advertising