![SMC Networks 7724M/VSW - annexe 1 Manual Download Page 17](http://html1.mh-extra.com/html/smc-networks/7724m-vsw-annexe-1/7724m-vsw-annexe-1_manual_1299754017.webp)
CLI
Management Guide
TigerAccess™ EE
16
SMC7824M/VSW
Illustrations
Fig. 2.1
The front view of switch................................................................................. 22
Fig. 3.1
Overview of Configuration Mode................................................................... 31
Fig. 4.1
Process of 802.1x Authentication.................................................................. 58
Fig. 4.2
Multiple Authentication Servers..................................................................... 59
Fig. 5.1
Transmission in DSL System ........................................................................ 75
Fig. 5.2
DMT Modulation ............................................................................................ 76
Fig. 5.3
Deciding Transmit Rate according to SNR Margin........................................ 89
Fig. 5.4
Counting Times of Error ................................................................................ 92
Fig. 5.5
Port Mirroring................................................................................................110
Fig. 6.1
Ping Test for Network Status ....................................................................... 128
Fig. 6.2
IP Source Routing ....................................................................................... 129
Fig. 7.1
Procedure of QoS operation........................................................................ 169
Fig. 7.2
Structure of Rule.......................................................................................... 170
Fig. 7.3
Token Bucket Meter..................................................................................... 180
Fig. 7.4
Behavior of srTCM (1) ................................................................................. 181
Fig. 7.5
Behavior of srTCM (2) ................................................................................. 181
Fig. 7.6
Bahavior of srTCM (3) ................................................................................. 182
Fig. 7.7
Behavior of trTCM (1).................................................................................. 183
Fig. 7.8
Behavior of trTCM (2).................................................................................. 183
Fig. 7.9
Behavior of trTCM (3).................................................................................. 184
Fig. 7.10
Marking and Remarking .............................................................................. 186
Fig. 7.11
Strict Priority Queuing.................................................................................. 198
Fig. 7.12
Deficit Weighted Round Robin .................................................................... 199
Fig. 7.13
WRED Packet Drop Probability................................................................... 203
Fig. 7.14
NetBIOS Filtering ........................................................................................ 205
Fig. 7.15
Proxy-ARP................................................................................................... 222
Fig. 7.16
ICMP Message Structure ............................................................................ 223
Fig. 7.17
sFlow Structure............................................................................................ 229
Fig. 7.18
sFlow Agent Diagram .................................................................................. 229
Fig. 8.1
Port-based VLAN ........................................................................................ 235
Fig. 8.2
Subnet-based VLAN.................................................................................... 238
Fig. 8.3
Example of QinQ Configuration................................................................... 241
Fig. 8.4
QinQ Frame................................................................................................. 241
Fig. 8.5
Outgoing Packets under Layer 2 Shared VLAN Environment .................... 244
Fig. 8.6
Incoming Packets under Layer 2 Shared VLAN Environment (1)............... 245
Fig. 8.7
Incoming Packets under Layer 2 Shared VLAN Environment (2)............... 245
Fig. 8.8
Link Aggregation.......................................................................................... 251
Fig. 8.9
Example of Loop ......................................................................................... 257
Fig. 8.10
Principle of Spanning Tree Protocol ............................................................ 258
Fig. 8.11
Root Switch ................................................................................................. 259
Fig. 8.12
Designated Switch....................................................................................... 260
Fig. 8.13
Port Priority.................................................................................................. 261
Fig. 8.14
Port State..................................................................................................... 261
Fig. 8.15
Alternate Port and Backup port ................................................................... 262
Fig. 8.16
Example of Receiving Low BPDU............................................................... 263
Fig. 8.17
Network Convergence of 802.1d................................................................. 264
Fig. 8.18
Network Convergence of 802.1w (1)........................................................... 264
Fig. 8.19
Network Convergence of 802.1w (2)........................................................... 265
Fig. 8.20
Network Convergence of 802.1w (3)........................................................... 265
Summary of Contents for 7724M/VSW - annexe 1
Page 1: ......
Page 385: ...CLI Management Guide TigerAccess EE 384 SMC7824M VSW ...
Page 387: ......