EasyManua.ls Logo

Raisecom ISCOM2600G-HI (A) Series - Time management

Raisecom ISCOM2600G-HI (A) Series
581 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
Figures
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
xxvii
Figure 8-4 Operating of IGMP and Layer 2 multicast features .......................................................................... 325
Figure 8-5 IGMP Snooping networking ............................................................................................................. 330
Figure 8-6 Ring network multicast networking .................................................................................................. 333
Figure 8-7 IGMP Snooping networking ............................................................................................................. 338
Figure 8-8 IGMP MVR networking ................................................................................................................... 341
Figure 8-9 MVR networking .............................................................................................................................. 343
Figure 8-10 Applying IGMP filtering on interface ............................................................................................. 349
Figure 8-11 Data transmission of IGMP MVR .................................................................................................. 351
Figure 8-12 Data transmission of multicast VLAN copy ................................................................................... 352
Figure 8-13 Multicast VLAN copy networking ................................................................................................. 353
Figure 9-1 OAM loopback ................................................................................................................................. 364
Figure 9-2 MDs at different levels ..................................................................................................................... 371
Figure 9-3 MEP and MIP ................................................................................................................................... 372
Figure 9-4 CFM networking .............................................................................................................................. 383
Figure 9-5 SLA test networking ......................................................................................................................... 386
Figure 9-6 SLA test networking ......................................................................................................................... 392
Figure 10-1 Port security MAC networking ....................................................................................................... 409
Figure 10-2 Principles of dynamic ARP inspection ........................................................................................... 411
Figure 10-3 Configuring dynamic ARP inspection ............................................................................................ 415
Figure 10-4 RADIUS networking ...................................................................................................................... 421
Figure 10-5 TACACS+ networking ................................................................................................................... 425
Figure 10-6 Storm control networking ............................................................................................................... 430
Figure 10-7 802.1x structure .............................................................................................................................. 431
Figure 10-8 Dot1x networking ........................................................................................................................... 437
Figure 10-9 Principles of IP Source Guard ........................................................................................................ 439
Figure 10-10 Configuring IP Source Guard ....................................................................................................... 443
Figure 10-11 Accessing the network through PPPoE authentication ................................................................. 445
Figure 10-12 PPPoE+ networking ...................................................................................................................... 450
Figure 11-1 Dual-homed application based on LACP ....................................................................................... 456
Figure 11-2 Static LACP mode Link aggregation networking ........................................................................... 461
Figure 11-3 Principles of interface backup ......................................................................................................... 464
Figure 11-4 Networking with interface backup in different VLANs .................................................................. 465
Figure 11-5 Interface backup networking .......................................................................................................... 468

Table of Contents

Related product manuals