Allied Telesis AT-FS970M Series User Manual
Page 35

AT-FS970M Switch Command Line User’s Guide
35
Figure 111. SHOW FILE SYSTEMS Command................................................................................................................535
Figure 112. SHOW BOOT Command................................................................................................................................542
Figure 113. SHOW BOOT Command................................................................................................................................550
Figure 114. SHOW ESTACK REMOTELIST .....................................................................................................................564
Figure 115. SHOW IP IGMP SNOOPING .........................................................................................................................585
Figure 116. SHOW IP IGMP SNOOPING Command........................................................................................................598
Figure 117. IGMP Snooping Querier with One Querier .....................................................................................................603
Figure 118. IGMP Snooping Querier with Two Queriers ...................................................................................................604
Figure 119. SHOW IP IGMP INTERFACE Command.......................................................................................................615
Figure 120. SHOW ARP SECURITY Command ...............................................................................................................646
Figure 121. SHOW ARP SECURITY INTERFACE Command..........................................................................................648
Figure 122. SHOW ARP SECURITY STATISTICS Command .........................................................................................650
Figure 123. SHOW ARP SECURITY STATISTICS DETAIL Command............................................................................651
Figure 124. SHOW IP DHCP SNOOPING Command.......................................................................................................653
Figure 125. SHOW IP DHCP SNOOPING BINDING Command.......................................................................................654
Figure 126. SHOW IP DHCP SNOOPING INTERFACE Command .................................................................................657
Figure 127. SHOW IP DHCP SOURCE BINDING Command...........................................................................................658
Figure 128. SHOW LOG Command ..................................................................................................................................665
Figure 129. SHOW LOG Command ..................................................................................................................................682
Figure 130. SHOW LOG CONFIG Command ...................................................................................................................685
Figure 131. SHOW LOG PERMANENT Command...........................................................................................................687
Figure 132. SHOW LOG CONFIG Command with Syslog Server Entries ........................................................................697
Figure 133. SHOW LOG CONFIG Command with Syslog Server Entries ........................................................................703
Figure 134. Static Port Trunk Example..............................................................................................................................708
Figure 135. SHOW STATIC-CHANNEL-GROUP Command ............................................................................................715
Figure 136. SHOW STATIC-CHANNEL-GROUP Command ............................................................................................721
Figure 137. SHOW ETHERCHANNEL DETAIL ................................................................................................................734
Figure 138. SHOW LACP SYS-ID Command ...................................................................................................................735
Figure 139. SHOW ETHERCHANNEL Command ............................................................................................................744
Figure 140. SHOW ETHERCHANNEL DETAIL Command...............................................................................................745
Figure 141. SHOW ETHERCHANNEL SUMMARY Command .........................................................................................747
Figure 142. SHOW LACP SYS-ID Command ...................................................................................................................748
Figure 143. SHOW PORT ETHERCHANNEL Command .................................................................................................749
Figure 144. Point-to-Point Ports ........................................................................................................................................760
Figure 145. Edge Port .......................................................................................................................................................761
Figure 146. Point-to-Point and Edge Port..........................................................................................................................761
Figure 147. VLAN Fragmentation......................................................................................................................................763
Figure 148. Loop Guard Example 1 ..................................................................................................................................767
Figure 149. Loop Guard Example 2 ..................................................................................................................................768
Figure 150. Loop Guard Example 3 ..................................................................................................................................768
Figure 151. Loop Guard Example 4 ..................................................................................................................................769
Figure 152. Loop Guard Example 5 ..................................................................................................................................770
Figure 153. SHOW SPANNING-TREE Command for STP ...............................................................................................780
Figure 154. SHOW SPANNING-TREE Command for STP ...............................................................................................784
Figure 155. SHOW SPANNING-TREE Command for RSTP ............................................................................................808
Figure 156. SHOW SPANNING-TREE Command for RSTP ............................................................................................816
Figure 157. VLAN Fragmentation with STP or RSTP........................................................................................................835
Figure 158. MSTP Example of Two Spanning Tree Instances..........................................................................................836
Figure 159. Multiple VLANs in an MSTI.............................................................................................................................837
Figure 160. CIST and VLAN Guideline - Example 1..........................................................................................................848
Figure 161. CIST and VLAN Guideline - Example 2..........................................................................................................849
Figure 162. Spanning Regions - Example 1......................................................................................................................850
Figure 163. Spanning Regions without Blocking ...............................................................................................................851
Figure 164. SHOW SPANNING-TREE Command for MSTP ............................................................................................861
Figure 165. SHOW SPANNING-TREE MST CONFIG Command.....................................................................................862
Figure 166. SHOW SPANNING-TREE MST Command....................................................................................................863
Figure 167. Port-based VLAN - Example 1 .......................................................................................................................885
Figure 168. Port-based VLAN - Example 2 .......................................................................................................................886
Figure 169. Example of a Tagged VLAN...........................................................................................................................890
Figure 170. SHOW VLAN ALL Command .........................................................................................................................901