Allied Telesis AT-9000/28POE Switch User Manual


  Open as PDF
of 1480
 
AT-9000 Switch Command Line User’s Guide
3
Figure 110: Edge Port ....................................................................................................................................................... 569
Figure 111: Point-to-Point and Edge Port.......................................................................................................................... 569
Figure 112: VLAN Fragmentation...................................................................................................................................... 571
Figure 113: Loop Guard Example 1 .................................................................................................................................. 575
Figure 114: Loop Guard Example 2 .................................................................................................................................. 576
Figure 115: Loop Guard Example 3 .................................................................................................................................. 576
Figure 116: Loop Guard Example 4 .................................................................................................................................. 577
Figure 117: Loop Guard Example 5 .................................................................................................................................. 578
Figure 118: SHOW SPANNING-TREE Command for STP............................................................................................... 588
Figure 119: SHOW SPANNING-TREE Command for STP............................................................................................... 592
Figure 120: SHOW SPANNING-TREE Command for RSTP ............................................................................................ 616
Figure 121: SHOW SPANNING-TREE Command for RSTP ............................................................................................ 624
Figure 122: VLAN Fragmentation with STP or RSTP........................................................................................................ 643
Figure 123: MSTP Example of Two Spanning Tree Instances.......................................................................................... 644
Figure 124: Multiple VLANs in an MSTI............................................................................................................................. 644
Figure 125: CIST and VLAN Guideline - Example 1.......................................................................................................... 655
Figure 126: CIST and VLAN Guideline - Example 2.......................................................................................................... 656
Figure 127: Spanning Regions - Example 1...................................................................................................................... 657
Figure 128: Spanning Regions without Blocking............................................................................................................... 658
Figure 129: SHOW SPANNING-TREE Command for MSTP............................................................................................ 669
Figure 130: SHOW SPANNING-TREE MST CONFIG Command..................................................................................... 670
Figure 131: SHOW SPANNING-TREE MST Command.................................................................................................... 671
Figure 132: Port-based VLAN - Example 1 ....................................................................................................................... 693
Figure 133: Port-based VLAN - Example 2 ....................................................................................................................... 694
Figure 134: Example of a Tagged VLAN........................................................................................................................... 698
Figure 135: SHOW VLAN ALL Command......................................................................................................................... 709
Figure 136: SHOW VLAN Command ................................................................................................................................ 716
Figure 137: GVRP Example .............................................................................................................................................. 733
Figure 138: SHOW GVRP TIMER Command ................................................................................................................... 747
Figure 139: Example of a MAC Address-based VLAN that Spans Switches .................................................................... 775
Figure 140: SHOW VLAN MACADDRESS Command...................................................................................................... 783
Figure 141: SHOW VLAN MACADDRESS Command...................................................................................................... 792
Figure 142: SHOW VLAN PRIVATE-VLAN Command ..................................................................................................... 808
Figure 143: SHOW VLAN PRIVATE-VLAN Command ..................................................................................................... 812
Figure 144: Metro Provider 802.1Q Header in Tagged Packets........................................................................................ 823
Figure 145: Metro Provider 802.1Q Header in Untagged Packets...................................................................
................. 823
Figure 146: VLAN Stacking Process ................................................................................................................................. 825
Figure 147: SHOW VLAN VLAN-STACKING Command .................................................................................................. 834
Figure 148: SHOW PORT-SECURITY INTERFACE Command....................................................................................... 846
Figure 149: Example of SHOW PORT-SECURITY INTRUSION INTERFACE Command ............................................... 847
Figure 150: SHOW PORT-SECURITY INTERFACE Command....................................................................................... 852
Figure 151: SHOW PORT-SECURITY INTRUSION INTERFACE Command .................................................................. 855
Figure 152: Example of SHOW PORT-SECURITY INTRUSION INTERFACE Command ............................................... 856
Figure 153: Single Host Mode........................................................................................................................................... 869
Figure 154: Multi Host Operating Mode............................................................................................................................. 870
Figure 155: Multi Supplicant Mode.................................................................................................................................... 872
Figure 156: SHOW DOT1X INTERFACE Command ........................................................................................................ 888
Figure 157: SHOW DOT1X STATISTICS INTERFACE Command................................................................................... 889
Figure 158: SHOW AUTH-MAC INTERFACE Command ................................................................................................. 923
Figure 159: SHOW AUTH-MAC SESSIONSTATISTICS INTERFACE Command............................................................ 924
Figure 160: SHOW AUTH-MAC STATISTICS INTERFACE Command............................................................................ 925
Figure 161: SHOW AUTH-MAC SUPPLICANT INTERFACE Command.......................................................................... 926
Figure 162: SHOW DOT1X Command.............................................................................................................................. 927
Figure 163: SHOW DOT1X INTERFACE Command ........................................................................................................ 928
Figure 164: SHOW DOT1X STATISTICS INTERFACE Command................................................................................... 929
Figure 165: SHOW DOT1X SUPPLICANT INTERFACE Command................................................................................. 930
Figure 166: SHOW SNMP-SERVER Command ............................................................................................................... 942
Figure 167: SHOW SNMP-SERVER COMMUNITY Command........................................................................................ 942
Figure 168: SHOW RUNNING-CONFIG SNMP Command .............................................................................................. 943
Figure 169: SHOW RUNNING-CONFIG SNMP Command ...................................................................................
........... 955