beautypg.com

Part 2: layer two switching – Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual

Page 6

background image

Software Reference for x310 Series Switches

vi

AlliedWare Plus

TM

Operating System - Version 5.4.4C

C613-50046-01 REV A

Part 2: Layer Two Switching

Chapter 14:

Switching Introduction

Introduction.................................................................................................................................................................... 14.2
Physical Layer Information........................................................................................................................................ 14.3

Switch Ports ............................................................................................................................................................. 14.3
Activating and Deactivating Switch Ports .................................................................................................... 14.4
Autonegotiation..................................................................................................................................................... 14.4
Duplex mode........................................................................................................................................................... 14.4
Speed options......................................................................................................................................................... 14.4
MDI/MDIX Connection Modes.......................................................................................................................... 14.5

The Layer 2 Switching Process................................................................................................................................. 14.7

The Ingress Rules ................................................................................................................................................... 14.7
The Learning Process ........................................................................................................................................... 14.8
The Forwarding Process...................................................................................................................................... 14.9
The Egress Rules..................................................................................................................................................... 14.9

Layer 2 Filtering...........................................................................................................................................................14.11

Ingress Filtering....................................................................................................................................................14.11

Storm control ...............................................................................................................................................................14.12
Loop Protection...........................................................................................................................................................14.13

Loop Detection ....................................................................................................................................................14.13
Thrash Limiting.....................................................................................................................................................14.14

Support for Jumbo Frames .....................................................................................................................................14.16
Port Mirroring...............................................................................................................................................................14.17
Port Security .................................................................................................................................................................14.18

IEEE 802.1X .............................................................................................................................................................14.18

Quality of Service ........................................................................................................................................................14.19
IGMP Snooping............................................................................................................................................................14.20

Chapter 15:

Switching Commands

Command List................................................................................................................................................................ 15.2

Chapter 16:

VLAN Introduction

Introduction.................................................................................................................................................................... 16.2
Virtual LANs (VLANs).................................................................................................................................................... 16.2
Configuring VLANs....................................................................................................................................................... 16.3
Private VLANs................................................................................................................................................................. 16.5
Private VLANs for ports in access mode ............................................................................................................... 16.5
Private VLAN operation with ports in access mode......................................................................................... 16.7
Access mode private VLAN configuration example......................................................................................... 16.8
Private VLANs for trunked ports............................................................................................................................16.11
Trunked port private VLAN configuration example.......................................................................................16.12
Protocol based VLAN configuration example..................................................................................................16.15

Chapter 17:

VLAN Commands

Command List................................................................................................................................................................ 17.2