Allied Telesis AT-8100 Series User Manual
Page 37
AT-8100 Switch Command Line User’s Guide
37
Figure 111. Group Link Control Example 5 .......................................................................................................................514
Figure 112. Group Link Control Example 6 .......................................................................................................................515
Figure 113. Group Link Control Example 7 .......................................................................................................................516
Figure 114. SHOW GROUP-LINK-CONTROL Command.................................................................................................531
Figure 115. SHOW FILE SYSTEMS Command ................................................................................................................546
Figure 116. SHOW FILE SYSTEMS Command ................................................................................................................555
Figure 117. SHOW BOOT Command................................................................................................................................562
Figure 118. SHOW BOOT Command................................................................................................................................570
Figure 119. SHOW ESTACK REMOTELIST .....................................................................................................................584
Figure 120. SHOW IP IGMP SNOOPING .........................................................................................................................605
Figure 121. SHOW IP IGMP SNOOPING Command........................................................................................................618
Figure 122. IGMP Snooping Querier with One Querier .....................................................................................................623
Figure 123. IGMP Snooping Querier with Two Queriers ...................................................................................................624
Figure 124. SHOW IP IGMP INTERFACE Command.......................................................................................................635
Figure 125. SHOW ARP SECURITY Command ...............................................................................................................666
Figure 126. SHOW ARP SECURITY INTERFACE Command..........................................................................................668
Figure 127. SHOW ARP SECURITY STATISTICS Command .........................................................................................670
Figure 128. SHOW ARP SECURITY STATISTICS DETAIL Command............................................................................671
Figure 129. SHOW IP DHCP SNOOPING Command.......................................................................................................673
Figure 130. SHOW IP DHCP SNOOPING BINDING Command.......................................................................................674
Figure 131. SHOW IP DHCP SNOOPING INTERFACE Command .................................................................................677
Figure 132. SHOW IP DHCP SOURCE BINDING Command...........................................................................................678
Figure 133. SHOW LOG Command ..................................................................................................................................685
Figure 134. SHOW LOG Command ..................................................................................................................................702
Figure 135. SHOW LOG CONFIG Command ...................................................................................................................705
Figure 136. SHOW LOG PERMANENT Command...........................................................................................................707
Figure 137. SHOW LOG CONFIG Command with Syslog Server Entries ........................................................................717
Figure 138. SHOW LOG CONFIG Command with Syslog Server Entries ........................................................................723
Figure 139. Static Port Trunk Example..............................................................................................................................728
Figure 140. SHOW STATIC-CHANNEL-GROUP Command ............................................................................................735
Figure 141. SHOW STATIC-CHANNEL-GROUP Command ............................................................................................741
Figure 142. SHOW ETHERCHANNEL DETAIL ................................................................................................................754
Figure 143. SHOW LACP SYS-ID Command ...................................................................................................................755
Figure 144. SHOW ETHERCHANNEL Command ............................................................................................................764
Figure 145. SHOW ETHERCHANNEL DETAIL Command...............................................................................................765
Figure 146. SHOW ETHERCHANNEL SUMMARY Command .........................................................................................767
Figure 147. SHOW LACP SYS-ID Command ...................................................................................................................768
Figure 148. SHOW PORT ETHERCHANNEL Command .................................................................................................769
Figure 149. Point-to-Point Ports ........................................................................................................................................780
Figure 150. Edge Port .......................................................................................................................................................781
Figure 151. Point-to-Point and Edge Port..........................................................................................................................781
Figure 152. VLAN Fragmentation ......................................................................................................................................784
Figure 153. Loop Guard Example 1 ..................................................................................................................................788
Figure 154. Loop Guard Example 2 ..................................................................................................................................789
Figure 155. Loop Guard Example 3 ..................................................................................................................................789
Figure 156. Loop Guard Example 4 ..................................................................................................................................790
Figure 157. Loop Guard Example 5 ..................................................................................................................................791
Figure 158. SHOW SPANNING-TREE Command for STP ...............................................................................................800
Figure 159. SHOW SPANNING-TREE Command for STP ...............................................................................................804
Figure 160. SHOW SPANNING-TREE Command for RSTP ............................................................................................828
Figure 161. SHOW SPANNING-TREE Command for RSTP ............................................................................................836
Figure 162. VLAN Fragmentation with STP or RSTP........................................................................................................855
Figure 163. MSTP Example of Two Spanning Tree Instances..........................................................................................856
Figure 164. Multiple VLANs in an MSTI.............................................................................................................................857
Figure 165. CIST and VLAN Guideline - Example 1..........................................................................................................868
Figure 166. CIST and VLAN Guideline - Example 2..........................................................................................................869
Figure 167. Spanning Regions - Example 1 ......................................................................................................................870
Figure 168. Spanning Regions without Blocking ...............................................................................................................871
Figure 169. SHOW SPANNING-TREE Command for MSTP ............................................................................................881
Figure 170. SHOW SPANNING-TREE MST CONFIG Command.....................................................................................882