15
LIST of FIGURES
Figure 2-1: SNMP Configuration Topology ............................................................................................. 52
Figure 3-1: Simple VLAN Topology ........................................................................................................ 58
Figure 3-2: Double VLAN Tagging Network Example .............................................................................. 59
Figure 3-3: Network Topology for VLAN Configuration .......................................................................... 61
Figure 3-4: Port-channel Configuration ................................................................................................. 66
Figure 3-5: STP Blocking........................................................................................................................ 75
Figure 3-6: MLAG in a Layer-2 Network ................................................................................................. 76
Figure 3-7: MLAG Components ............................................................................................................. 76
Figure 3-8: MLAG Configuration Diagram .............................................................................................. 79
Figure 3-9: UDLD Configuration Example ............................................................................................... 83
Figure 3-10: RSPAN Configuration Example ........................................................................................... 85
Figure 3-11: STP in a Small Bridged Network ......................................................................................... 89
Figure 3-12: Single STP Topology........................................................................................................... 90
Figure 3-13: Logical MSTP Environment ................................................................................................ 91
Figure 3-14: STP Example Network Diagram .......................................................................................... 94
Figure 3-15: MSTP Configuration Example ............................................................................................. 96
Figure 3-16: Switch with IGMP Snooping ............................................................................................... 98
Figure 3-17: MLD Snooping Topology .................................................................................................. 102
Figure 3-18: MLD Snooping Leave Configuration Topology................................................................... 104
Figure 3-19: MLD Snooping Querier Configuration Example ................................................................. 105
Figure 3-20: sFlow Architecture .......................................................................................................... 109
Figure 4-1: RADIUS Topology .............................................................................................................. 124
Figure 4-2: DHCP Binding .................................................................................................................... 131
Figure 4-3: DHCP Snooping Configuration Topology............................................................................. 134
Figure 4-4: IP ACL Example Network Diagram ...................................................................................... 142