13
Figure 1: Static Port Trunk Example.....................................................................................................................................77
Figure 2: Example of Multiple Aggregators for Multiple Aggregate Trunks.......................................................................... 84
Figure 3: Example of an Aggregator with Multiple Trunks....................................................................................................85
Figure 4: User Priority and VLAN Fields within an Ethernet Frame....................................................................................114
Figure 5: ToS field in an IP Header....................................................................................................................................115
Figure 6: ACL Example 1...................................................................................................................................................125
Figure 7: ACL Example 2...................................................................................................................................................126
Figure 8: ACL Example 3...................................................................................................................................................127
Figure 9: ACL Example 4...................................................................................................................................................128
Figure 10: ACL Example 5.................................................................................................................................................128
Figure 11: ACL Example 6.................................................................................................................................................129
Figure 12: DiffServ Domain Example.................................................................................................................................151
Figure 13: QoS Voice Application Example........................................................................................................................154
Figure 14: QoS Video Application Example........................................................................................................................156
Figure 15: QoS Critical Database Example........................................................................................................................157
Figure 16: Policy Component Hierarchy Example..............................................................................................................159
Figure 17: Double Fault Condition in EPSR Snooping.......................................................................................................192
Figure 18: MIB Tree............................................................................................................................................................202
Figure 19: SNMPv3 User Configuration Process...............................................................................................................206
Figure 20: SNMPv3 Message Notification Process............................................................................................................207
Figure 21: Point-to-Point Ports...........................................................................................................................................221
Figure 22: Edge Port..........................................................................................................................................................222
Figure 23: Point-to-Point and Edge Port.............................................................................................................................222
Figure 24: VLAN Fragmentation.........................................................................................................................................224
Figure 25: VLAN Fragmentation with STP or RSTP...........................................................................................................229
Figure 26: MSTP Example of Two Spanning Tree Instances ............................................................................................230
Figure 27: Multiple VLANs in a MSTI..................................................................................................................................231
Figure 28: Multiple Spanning Tree Region.........................................................................................................................236
Figure 29: CIST and VLAN Guideline - Example 1.............................................................................................................241
Figure 30: CIST and VLAN Guideline - Example 2.............................................................................................................242
Figure 31: Spanning Regions - Example 1.........................................................................................................................243
Figure 32: Port-based VLAN - Example 1..........................................................................................................................254
Figure 33: Port-based VLAN - Example 2..........................................................................................................................255
Figure 34: Example of a Tagged VLAN..............................................................................................................................259
Figure 35: GVRP Example.................................................................................................................................................264
Figure 36: GARP Architecture............................................................................................................................................270
Figure 37: GID Architecture................................................................................................................................................271
Figure 38: Example of a MAC Address-based VLAN Spanning Switches.........................................................................291
Figure 39: Example of the Supplicant Role........................................................................................................................362
Figure 40: Authenticator Port in Single Operating Mode with a Single Client.....................................................................364
Figure 41: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 1................................365
Figure 42: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 2................................366
Figure 43: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 3................................367
Figure 44: Authenticator Port in Multiple Operating Mode - Example 1..............................................................................368
Figure 45: Authenticator Port in Multiple Operating Mode - Example 2..............................................................................369
Figure 46: SSH Remote Management of a Slave Switch...................................................................................................419
Figures