EasyManua.ls Logo

Hitachi GR2000 Series - Page 37

Hitachi GR2000 Series
410 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
GR2K-GA-1002 xxxvii
Rev. 6.03
4.10.2 Traffic of Periodic RIP and Periodic SAP Packets................................................................4-74
4.10.2.1 Model Traffic of Periodic RIP Packets.........................................................................4-75
4.10.2.2 Model Traffic of Periodic SAP Packets .......................................................................4-75
4.10.2.3 Traffic of Periodic RIP and Periodic SAP Packets on Group-Defined Interface.......... 4-75
4.11 Precautions on Bridge Connections..........................................................................................4-76
4.11.1 Protocol and Topology Restrictions...................................................................................... 4-76
4.11.1.1 Spanning-Tree Protocol ..............................................................................................4-76
4.11.1.2 Prohibited Topologies with Bridge Connection ...........................................................4-76
4.11.2 HDLC Pass-Through and Priority Control ............................................................................4-76
4.11.3 Bridge Connection over Frame Relay ..................................................................................4-76
4.11.3.1 Definition of lnterface .................................................................................................. 4-76
4.11.3.2 Network Configuration.................................................................................................4-77
4.11.4 Spanning-Tree Operation on Bridge Connection over ATM.................................................4-77
4.11.5 Bridge Definition on Group-Defined Interface.......................................................................4-78
4.11.6 Bridge Definition on ISDN Interface......................................................................................4-78
4.12 Precautions on QoS Control....................................................................................................... 4-79
4.12.1 Relationship Between Load on RP and QoS........................................................................ 4-79
4.12.2 Transmitting Inbound-QoS-Defined Packets onto ATM Interface ........................................4-80
4.13 Caution on Use of Tag-VLAN......................................................................................................4-81
4.13.1 Connection with LAN Switch ................................................................................................ 4-81
4.13.1.1 VLAN type................................................................................................................... 4-81
4.13.1.2 Tag-VLAN setting........................................................................................................4-81
4.13.1.3 Packets That Can be Relayed ....................................................................................4-81
4.13.1.4 VLAN ID ......................................................................................................................4-81
4.13.2 Connection with Terminal (PC).............................................................................................4-82
4.13.2.1 Tag-VLAN support ......................................................................................................4-82
4.13.2.2 Layer 2 Relay..............................................................................................................4-82
4.14 Precautions for using IP multicast.............................................................................................4-83
4.14.1 Multicast relay.......................................................................................................................4-83
4.14.1.1 Common to protocols..................................................................................................4-83
4.14.1.2 When using PIM-DM and PIM-SM..............................................................................4-83
4.14.1.3 When using DVMRP ...................................................................................................4-83
4.14.1.4 When using PIM-SM ...................................................................................................4-83
4.14.2 Redundant route (route switching due to impediment).........................................................4-84
4.14.2.1 When using PIM-DM...................................................................................................4-84
4.14.2.2 When using DVMRP ...................................................................................................4-84
4.14.2.3 When using PIM-SM ...................................................................................................4-84
4.14.3 Applicable network patterns .................................................................................................4-85
4.14.3.1 PIM-DM ......................................................................................................................4-85
4.14.3.2 PIM-SM ......................................................................................................................4-87
4.15 Precautions for using MPLS....................................................................................................... 4-89
4.15.1 Non-permitted mixed use of LSP allocation system for each VPN and RFC2547
bis system ..................................................................................................................................4-89
4.15.2 Precautions when mutually connecting with competitor router of LDP(DU) /RFC2547

Table of Contents

Related product manuals