182
Path Cost:
1 – 200,000,000
The same definition as in the RSTP specification. But in MSTP, this
parameter can be respectively applied to ports of CIST and ports of any
MSTI.
Priority:
0 / 16 / 32 / 48 / 64 / 80 / 96 / 112 / 128 / 144 / 160 / 176 / 192 / 208 / 224
/ 240
The same definition as in the RSTP specification. But in MSTP, this
parameter can be respectively applied to ports of CIST and ports of any
MSTI.
Hello Time: ( 1 / 2)
In contrast with RSTP, Hello Time in MSTP is a per port setting for the
CIST.
Admin Edge: (Yes / No)
The same definition as in the RSTP specification for the CIST ports.
Admin P2P: (Auto/ True/ False)
The same definition as in the RSTP specification for the CIST ports.
Restricted Role: (Yes/ No)
If “Yes” causes the Port not to be selected as Root Port for the CIST or
any MSTI, even it has the best spanning tree priority vector. Such a Port
will be selected as an Alternate Port after the Root Port has been
selected. This parameter is “No” by default. If set, it can cause lack of
spanning tree connectivity. It is set by a network administrator to prevent
bridges external to a core region of the network influencing the spanning
tree active topology, possibly because those bridges are not under the
full control of the administrator.
Restricted TCN: (Yes/ No)
If “Yes” causes the Port not to propagate received topology change
notifications and topology changes to other Ports. This parameter is “No”
by default. If set it can cause temporary loss of connectivity after
changes in a spanning trees active topology as a result of persistent
incorrectly learned station location information. It is set by a network
administrator to prevent bridges external to a core region of the network,
causing address flushing in that region, possibly because those bridges
are not under the full control of the administrator. or the status of MAC
operation for the attached LANs transitions frequently.
Mcheck:
The same definition as in the RSTP specification for the CIST ports.
Содержание KGS-2416
Страница 2: ......
Страница 4: ......
Страница 34: ...30 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection ...
Страница 93: ...89 Fig 3 39 Fig 3 40 Fig 3 41 ...
Страница 105: ...101 Fig 3 54 Set up Typical Network Application Rules Finish Fig 3 55 Set up Typical Network Application Rules Finish ...
Страница 109: ...105 Fig 3 62 Set up VLAN Tag Priority Mapping Finish ...
Страница 116: ...112 Fig 3 67 Ingress Port Fig 3 68 ...
Страница 118: ...114 Fig 3 71 Fig 3 72 Fig 3 73 ARP ...
Страница 119: ...115 Fig 3 74 ARP Fig 3 75 ARP Fig 3 76 ARP Fig 3 77 ARP ...
Страница 120: ...116 Fig 3 78 ARP Fig 3 79 ARP Fig 3 80 ARP Fig 3 81 ARP ...
Страница 121: ...117 Fig 3 82 ARP Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 86 ARP ...
Страница 122: ...118 Fig 3 87 IPv4 Fig 3 88 IPv4 Fig 3 89 IPv4 ...
Страница 123: ...119 Fig 3 90 IPv4 Fig 3 91 IPv4 Fig 3 92 IPv4 Fig 3 93 IPv4 Fig 3 94 IPv4 ...
Страница 124: ...120 Fig 3 95 IPv4 Fig 3 96 IPv4 Fig 3 97 IPv4 Fig 3 98 IPv4 Fig 3 99 IPv4 ...
Страница 125: ...121 Fig 3 100 IPv4 Fig 3 101 IPv4 Fig 3 102 IPv4 ...
Страница 126: ...122 Fig 3 103 IPv4 Fig 3 104 IPv4 Fig 3 105 IPv4 ...
Страница 127: ...123 Fig 3 106 IPv4 Fig 3 107 IPv4 Fig 3 108 IPv4 ...
Страница 128: ...124 Fig 3 109 IPv4 Fig 3 110 IPv4 Fig 3 111 IPv4 ...
Страница 129: ...125 Fig 3 112 IPv4 Fig 3 113 IPv4 Fig 3 114 IPv4 ...
Страница 130: ...126 Fig 3 115 IPv4 Fig 3 116 IPv4 Fig 3 117 Action ...
Страница 131: ...127 Fig 3 118 Rate Limiter Fig 3 119 Port Copy ...
Страница 132: ...128 Fig 3 120 DMAC Filter Fig 3 121 VLAN ID Filter Fig 3 122 VLAN ID Filter ...
Страница 144: ...140 Fig 3 124 Wizard Fig 3 125 Set up Policy Rules Fig 3 126 Set up Policy Rules ...
Страница 145: ...141 Fig 3 127 Set up Policy Rules Fig 3 128 Set up Policy Rules Finish Fig 3 129 Set up Port Policies ...
Страница 146: ...142 Fig 3 130 Set up Port Policies Fig 3 131 Set up Port Policies ...
Страница 147: ...143 Fig 3 132 Set up Port Policies Finish Fig 3 133 Set up Typical Network Application Rules ...
Страница 148: ...144 Fig 3 134 Set up Typical Network Application Rules Fig 3 135 Set up Typical Network Application Rules ...
Страница 151: ...147 Fig 3 140 Set up Source MAC and Source IP Binding Fig 3 141 Set up Source MAC and Source IP Binding Finish ...
Страница 190: ...186 Restricted Role Same as mentioned in Port Config Restricted Tcn Same as mentioned in Port Config ...
Страница 222: ...218 Fig 4 1 Fig 4 2 ...