beautypg.com

Figures – Allied Telesis AT-S63 User Manual

Page 13

background image

13

Figure 1: AT-StackXG Stacking Module...............................................................................................................................63
Figure 2: Duplex-chain Topology..........................................................................................................................................66
Figure 3: Duplex-ring Topology ............................................................................................................................................67
Figure 4: Static Port Trunk Example.....................................................................................................................................99
Figure 5: User Priority and VLAN Fields within an Ethernet Frame....................................................................................130
Figure 6: ToS field in an IP Header ....................................................................................................................................131
Figure 7: ACL Example 1 ...................................................................................................................................................141
Figure 8: ACL Example 2 ...................................................................................................................................................142
Figure 9: ACL Example 3 ...................................................................................................................................................143
Figure 10: ACL Example 4 .................................................................................................................................................144
Figure 11: ACL Example 5 .................................................................................................................................................144
Figure 12: ACL Example 6 .................................................................................................................................................145
Figure 13: DiffServ Domain Example .................................................................................................................................167
Figure 14: QoS Voice Application Example........................................................................................................................170
Figure 15: QoS Video Application Example........................................................................................................................172
Figure 16: QoS Critical Database Example........................................................................................................................173
Figure 17: Policy Component Hierarchy Example ..............................................................................................................175
Figure 18: Double Fault Condition in EPSR Snooping .......................................................................................................214
Figure 19: MIB Tree............................................................................................................................................................224
Figure 20: SNMPv3 User Configuration Process ...............................................................................................................228
Figure 21: SNMPv3 Message Notification Process ............................................................................................................229
Figure 22: Point-to-Point Ports ...........................................................................................................................................243
Figure 23: Edge Port ..........................................................................................................................................................244
Figure 24: Point-to-Point and Edge Port.............................................................................................................................244
Figure 25: VLAN Fragmentation.........................................................................................................................................246
Figure 26: VLAN Fragmentation with STP or RSTP...........................................................................................................251
Figure 27: MSTP Example of Two Spanning Tree Instances ............................................................................................252
Figure 28: Multiple VLANs in a MSTI..................................................................................................................................253
Figure 29: Multiple Spanning Tree Region .........................................................................................................................258
Figure 30: CIST and VLAN Guideline - Example 1.............................................................................................................263
Figure 31: CIST and VLAN Guideline - Example 2.............................................................................................................264
Figure 32: Spanning Regions - Example 1 .........................................................................................................................265
Figure 33: Port-based VLAN - Example 1 ..........................................................................................................................276
Figure 34: Port-based VLAN - Example 2 ..........................................................................................................................277
Figure 35: Example of a Tagged VLAN..............................................................................................................................281
Figure 36: GVRP Example .................................................................................................................................................286
Figure 37: GARP Architecture ............................................................................................................................................292
Figure 38: GID Architecture................................................................................................................................................293
Figure 39: Example of a MAC Address-based VLAN Spanning Switches .........................................................................313
Figure 40: Example of the Supplicant Role ........................................................................................................................386
Figure 41: Authenticator Port in Single Operating Mode with a Single Client.....................................................................388
Figure 42: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 1 ................................389
Figure 43: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 2 ................................390
Figure 44: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 3 ................................391
Figure 45: Authenticator Port in Multiple Operating Mode - Example 1..............................................................................392
Figure 46: Authenticator Port in Multiple Operating Mode - Example 2..............................................................................393
Figure 47: SSH Remote Management of a Slave Switch ...................................................................................................443

Figures