User Manual UMN:CLI
SURPASS hiD 6615 S223/S323 R1.5
A50010-Y3-C150-2-7619 17
Illustrations
Fig. 2.1
Network Structure with hiD 6615 S223/S323.................................................23
Fig. 3.1
Software mode structure ................................................................................28
Fig. 4.1
Process of 802.1x Authentication...................................................................64
Fig. 4.2
Multiple Authentication Servers......................................................................65
Fig. 5.1
hiD 6615 S223/S323 Interface .......................................................................73
Fig. 5.2
Port Mirroring..................................................................................................81
Fig. 6.1
Ping Test for Network Status ..........................................................................97
Fig. 6.2
IP Source Routing ..........................................................................................97
Fig. 7.1
Weighted Round Robin ................................................................................147
Fig. 7.2
Weighted Fair Queuing ................................................................................148
Fig. 7.3
Strict Priority Queuing ..................................................................................148
Fig. 7.4
NetBIOS Filtering .........................................................................................155
Fig. 8.1
Port-based VLAN .........................................................................................179
Fig. 8.2
Example of QinQ Configuration ...................................................................184
Fig. 8.3
QinQ Frame..................................................................................................184
Fig. 8.4
In Case Packets Going Outside in Layer 2 environment .............................187
Fig. 8.5
In Case External Packets Enter under Layer 2 environment (1) .................188
Fig. 8.6
In Case External Packets Enter under Layer 2 environment (2) .................188
Fig. 8.7
Link Aggregation...........................................................................................193
Fig. 8.8
Example of Loop ..........................................................................................200
Fig. 8.9
Principle of Spanning Tree Protocol .............................................................200
Fig. 8.10
Root Switch ..................................................................................................201
Fig. 8.11
Designated Switch .......................................................................................202
Fig. 8.12
Port Priority...................................................................................................203
Fig. 8.13
Port State......................................................................................................204
Fig. 8.14
Alternate Port and Backup port ....................................................................205
Fig. 8.15
Example of Receiving Low BPDU................................................................206
Fig. 8.16
Convergence of 802.1d Network..................................................................207
Fig. 8.17
Network Convergence of 802.1w (1)............................................................207
Fig. 8.18
Network Convergence of 802.1w (2)............................................................208
Fig. 8.19
Network Convergece of 802.1w (3)..............................................................208
Fig. 8.20
Compatibility with 802.1d (1)........................................................................209
Fig. 8.21
Compatibility with 802.1d (2)........................................................................209
Fig. 8.22
CST and IST of MSTP (1) ............................................................................210
Fig. 8.23
CST and IST of MSTP (2) ............................................................................211
Fig. 8.24
Example of PVSTP.......................................................................................217
Fig. 8.25
Root Guard...................................................................................................219
Fig. 8.26
Example of Layer 2 Network Design in RSTP Environment........................225
Fig. 8.27
Example of Layer 2 Network Design in MSTP Environment........................226
Fig. 8.28
VRRP Operation...........................................................................................227
Fig. 8.29
VRRP Track..................................................................................................232
Fig. 8.30
Rate Limit and Flood Guard .........................................................................236
Fig. 8.31
DHCP Service Structure...............................................................................238
Fig. 8.32
Example of DHCP Relay Agent....................................................................250
Fig. 8.33
DHCP Option 82 Operation..........................................................................253
Fig. 8.34
DHCP Server Packet Filtering......................................................................264
Fig. 8.35
Ethernet Ring Protocol Operation in Failure State .......................................265
Fig. 8.36
Ring Protection.............................................................................................266
Fig. 8.37
Link Failure Recovery ..................................................................................266