EasyManua.ls Logo

Dasan V5808 - Illustrations

Dasan V5808
814 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
User Manual UMN:CLI
V5808
29
Illustrations
Fig. 2.1 Front View of the V5808 ................................................................................. 36
Fig. 3.1 Overview of Configuration Mode .................................................................... 49
Fig. 4.1 Structure of IPv6 Header ................................................................................ 80
Fig. 4.2 Process of 802.1x Authentication ................................................................... 91
Fig. 4.3 Multiple Authentication Servers ...................................................................... 92
Fig. 5.1 Port Mirroring ................................................................................................ 106
Fig. 6.1 Ping Test for Network Status ........................................................................ 128
Fig. 6.2 IP Source Routing ........................................................................................ 129
Fig. 7.1 Procedure of QoS operation ........................................................................ 175
Fig. 7.2 Structure of Rule........................................................................................... 176
Fig. 7.3 Token Bucket Meter ..................................................................................... 185
Fig. 7.4 Behavior of srTCM (1) .................................................................................. 186
Fig. 7.5 Behavior of srTCM (2) .................................................................................. 187
Fig. 7.6 Bahavior of srTCM (3) .................................................................................. 187
Fig. 7.7 Behavior of trTCM (1) ................................................................................... 188
Fig. 7.8 Behavior of trTCM (2) ................................................................................... 189
Fig. 7.9 Behavior of trTCM (3) ................................................................................... 189
Fig. 7.10 Strict Priority Queuing .................................................................................. 200
Fig. 7.11 Deficit Round Robin ..................................................................................... 201
Fig. 7.12 Weighted Round Robin ................................................................................ 201
Fig. 7.13 WRED Packet Drop Probability .................................................................... 205
Fig. 7.14 NetBIOS Filtering ......................................................................................... 211
Fig. 7.15 Proxy ARP .................................................................................................... 230
Fig. 7.16 ICMP Message Structure ............................................................................. 244
Fig. 8.1 Port-based VLAN ......................................................................................... 261
Fig. 8.2 Subnet-based VLAN .................................................................................... 264
Fig. 8.3 Example of QinQ Configuration ................................................................... 267
Fig. 8.4 QinQ Frame .................................................................................................. 268
Fig. 8.5 Outgoing Packets under Layer 2 Shared VLAN Environment ..................... 275
Fig. 8.6 Incoming Packets under Layer 2 Shared VLAN Environment (1) ................ 275
Fig. 8.7 Incoming Packets under Layer 2 Shared VLAN Environment (2) ................ 276
Fig. 8.8 Link Aggregation........................................................................................... 280
Fig. 8.9 Example of Loop .......................................................................................... 287
Fig. 8.10 Principle of Spanning Tree Protocol ............................................................. 287
Fig. 8.11 Root Switch .................................................................................................. 288
Fig. 8.12 Designated Switch........................................................................................ 289
Fig. 8.13 Port Priority ................................................................................................... 290
Fig. 8.14 Port States .................................................................................................... 290
Fig. 8.15 Alternate Port and Backup port .................................................................... 292
Fig. 8.16 Example of Receiving Low BPDU ................................................................ 293
Fig. 8.17 Convergence of 802.1d Network .................................................................. 294
Fig. 8.18 Network Convergence of 802.1w (1)............................................................ 294
Fig. 8.19 Network Convergence of 802.1w (2)............................................................ 295
Fig. 8.20 Network Convergece of 802.1w (3).............................................................. 295
Fig. 8.21 Compatibility with 802.1d (1) ........................................................................ 296
Fig. 8.22 Compatibility with 802.1d (2) ........................................................................ 296
Fig. 8.23 CST and IST of MSTP (1) ............................................................................ 297
Fig. 8.24 CST and IST of MSTP (2) ............................................................................ 298
Fig. 8.25 Example of PVSTP....................................................................................... 308

Table of Contents