15
Figure 1: AT-StackXG Stacking Module...............................................................................................................................67
Figure 2: Duplex-chain Topology..........................................................................................................................................70
Figure 3: Duplex-ring Topology............................................................................................................................................71
Figure 4: Static Port Trunk Example...................................................................................................................................103
Figure 5: User Priority and VLAN Fields within an Ethernet Frame....................................................................................140
Figure 6: ToS field in an IP Header....................................................................................................................................141
Figure 7: ACL Example 1...................................................................................................................................................151
Figure 8: ACL Example 2...................................................................................................................................................152
Figure 9: ACL Example 3...................................................................................................................................................153
Figure 10: ACL Example 4.................................................................................................................................................154
Figure 11: ACL Example 5.................................................................................................................................................154
Figure 12: ACL Example 6.................................................................................................................................................155
Figure 13: DiffServ Domain Example.................................................................................................................................177
Figure 14: QoS Voice Application Example........................................................................................................................180
Figure 15: QoS Video Application Example........................................................................................................................182
Figure 16: QoS Critical Database Example........................................................................................................................183
Figure 17: Policy Component Hierarchy Example..............................................................................................................185
Figure 18: Group Link Control Example 1..........................................................................................................................190
Figure 19: Group Link Control Example 2..........................................................................................................................191
Figure 20: Group Link Control Example 3..........................................................................................................................192
Figure 21: Group Link Control Example 4..........................................................................................................................193
Figure 22: Group Link Control Example 5..........................................................................................................................194
Figure 23: Group Link Control Example 6..........................................................................................................................195
Figure 24: Group Link Control Example 7..........................................................................................................................196
Figure 25: IGMP Snooping Querier Example 1..................................................................................................................228
Figure 26: IGMP Snooping Querier Example 2..................................................................................................................229
Figure 27: SHOW IP INTERFACE Command....................................................................................................................231
Figure 28: SHOW IGMPSNOOPING Command................................................................................................................232
Figure 29: Double Fault Condition in EPSR Snooping.......................................................................................................248
Figure 30: MIB Tree............................................................................................................................................................258
Figure 31: SNMPv3 User Configuration Process...............................................................................................................262
Figure 32: SNMPv3 Message Notification Process............................................................................................................263
Figure 33: Point-to-Point Ports...........................................................................................................................................277
Figure 34: Edge Port..........................................................................................................................................................278
Figure 35: Point-to-Point and Edge Port.............................................................................................................................278
Figure 36: VLAN Fragmentation.........................................................................................................................................280
Figure 37: Loop Guard Example 1.....................................................................................................................................284
Figure 38: Loop Guard Example 2.....................................................................................................................................285
Figure 39: Loop Guard Example 3.....................................................................................................................................285
Figure 40: Loop Guard Example 4.....................................................................................................................................286
Figure 41: Loop Guard Example 5.....................................................................................................................................287
Figure 42: VLAN Fragmentation with STP or RSTP...........................................................................................................293
Figure 43: MSTP Example of Two Spanning Tree Instances ............................................................................................294
Figure 44: Multiple VLANs in a MSTI..................................................................................................................................295
Figure 45: Multiple Spanning Tree Region.........................................................................................................................300
Figure 46: CIST and VLAN Guideline - Example 1.............................................................................................................305
Figure 47: CIST and VLAN Guideline - Example 2.............................................................................................................306
Figure 48: Spanning Regions - Example 1.........................................................................................................................307
Figure 49: Port-based VLAN - Example 1..........................................................................................................................318
Figure 50: Port-based VLAN - Example 2..........................................................................................................................319
Figures