Illustrations – Siemens S223 User Manual

Page 17

Advertising
background image

User Manual UMN:CLI
SURPASS hiD 6615 S223/S323 R1.5

A50010-Y3-C150-2-7619 17

Illustrations

Fig. 2.1

Network Structure with hiD 6615 S223/S323.................................................23

Fig. 3.1

Software mode structure ................................................................................28

Fig. 4.1

Process of 802.1x Authentication...................................................................64

Fig. 4.2

Multiple Authentication Servers......................................................................65

Fig. 5.1

hiD 6615 S223/S323 Interface .......................................................................73

Fig. 5.2

Port Mirroring..................................................................................................81

Fig. 6.1

Ping Test for Network Status ..........................................................................97

Fig. 6.2

IP Source Routing ..........................................................................................97

Fig. 7.1

Weighted Round Robin ................................................................................147

Fig. 7.2

Weighted Fair Queuing ................................................................................148

Fig. 7.3

Strict Priority Queuing ..................................................................................148

Fig. 7.4

NetBIOS Filtering .........................................................................................155

Fig. 8.1

Port-based VLAN .........................................................................................179

Fig. 8.2

Example of QinQ Configuration ...................................................................184

Fig. 8.3

QinQ Frame..................................................................................................184

Fig. 8.4

In Case Packets Going Outside in Layer 2 environment .............................187

Fig. 8.5

In Case External Packets Enter under Layer 2 environment (1) .................188

Fig. 8.6

In Case External Packets Enter under Layer 2 environment (2) .................188

Fig. 8.7

Link Aggregation...........................................................................................193

Fig. 8.8

Example of Loop ..........................................................................................200

Fig. 8.9

Principle of Spanning Tree Protocol .............................................................200

Fig. 8.10

Root Switch ..................................................................................................201

Fig. 8.11

Designated Switch .......................................................................................202

Fig. 8.12

Port Priority...................................................................................................203

Fig. 8.13

Port State......................................................................................................204

Fig. 8.14

Alternate Port and Backup port ....................................................................205

Fig. 8.15

Example of Receiving Low BPDU................................................................206

Fig. 8.16

Convergence of 802.1d Network..................................................................207

Fig. 8.17

Network Convergence of 802.1w (1)............................................................207

Fig. 8.18

Network Convergence of 802.1w (2)............................................................208

Fig. 8.19

Network Convergece of 802.1w (3)..............................................................208

Fig. 8.20

Compatibility with 802.1d (1)........................................................................209

Fig. 8.21

Compatibility with 802.1d (2)........................................................................209

Fig. 8.22

CST and IST of MSTP (1) ............................................................................210

Fig. 8.23

CST and IST of MSTP (2) ............................................................................211

Fig. 8.24

Example of PVSTP.......................................................................................217

Fig. 8.25

Root Guard...................................................................................................219

Fig. 8.26

Example of Layer 2 Network Design in RSTP Environment........................225

Fig. 8.27

Example of Layer 2 Network Design in MSTP Environment........................226

Fig. 8.28

VRRP Operation...........................................................................................227

Fig. 8.29

VRRP Track..................................................................................................232

Fig. 8.30

Rate Limit and Flood Guard .........................................................................236

Fig. 8.31

DHCP Service Structure...............................................................................238

Fig. 8.32

Example of DHCP Relay Agent....................................................................250

Fig. 8.33

DHCP Option 82 Operation..........................................................................253

Fig. 8.34

DHCP Server Packet Filtering......................................................................264

Fig. 8.35

Ethernet Ring Protocol Operation in Failure State .......................................265

Fig. 8.36

Ring Protection.............................................................................................266

Fig. 8.37

Link Failure Recovery ..................................................................................266

Advertising
This manual is related to the following products: