Figures
16
Figure 51: Example of a Tagged VLAN..............................................................................................................................323
Figure 52: GVRP Example..................................................................................................................................................328
Figure 53: GARP Architecture............................................................................................................................................334
Figure 54: GID Architecture................................................................................................................................................335
Figure 55: Example of a MAC Address-based VLAN Spanning Switches..........................................................................355
Figure 56: Example of the Supplicant Role.........................................................................................................................428
Figure 57: Authenticator Port in Single Operating Mode with a Single Client.....................................................................430
Figure 58: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 1.................................431
Figure 59: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 2.................................432
Figure 60: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 3.................................433
Figure 61: Authenticator Port in Multiple Operating Mode - Example 1..............................................................................434
Figure 62: Authenticator Port in Multiple Operating Mode - Example 2..............................................................................435
Figure 63: SSH Remote Management of a Slave Switch...................................................................................................485