User's Manual

Table Of Contents
11
Users Manual of CS-6306R
26.1.3
Types of EAPS Packets ............................................................................................................... 271
26.1.4
Fast Ethernet Ring Protection Mechanism .................................................................................. 271
Fast Ethernet Ring Protection Configuration ........................................................................................ 272
26.2
26.2.1
Default EAPS Settings ................................................................................................................. 272
26.2.2
Requisites before Configuration .................................................................................................. 273
26.2.3
MEAPS Configuration Tasks ........................................................................................................ 273
26.2.4
Fast Ethernet Ring Protection Configuration ............................................................................... 273
26.2.5
MEAPS configuration ................................................................................................................... 276
Chapter 27. MEAPS Settings 278
MEAPS Introduction .............................................................................................................................. 278
27.1
27.1.1
MEAPS Overview ........................................................................................................................ 278
27.1.2
Basic Concepts of MEAPS .......................................................................................................... 279
27.1.3
Types of EAPS Packets ............................................................................................................... 283
27.1.4
Fast Ethernet Ring Protection Mechanism .................................................................................. 283
Fast Ethernet Ring Protection Configuration ........................................................................................ 289
27.2
27.2.1
Requisites before Configuration .................................................................................................. 289
27.2.2
MEAPS Configuration Tasks ........................................................................................................ 291
27.2.3
Fast Ethernet Ring Protection Configuration ............................................................................... 291
Appendix ............................................................................................................................................... 295
27.3
27.3.1
Working Procedure of MEAPS..................................................................................................... 295
27.3.2
Complete state ............................................................................................................................. 295
27.3.3
MEAPS configuration ................................................................................................................... 299
27.3.4
Unfinished Configurations (to be continued) ................................................................................ 305
Chapter 28. ELPS Configuration 306
ELPS Overview ..................................................................................................................................... 306
28.1
28.1.1
Overview ...................................................................................................................................... 306
Chapter 29. UDLD Configuration 311
Unidirectional Link Detection (UDLD) ................................................................................................... 311
29.1
29.1.1
UDLD Overview ........................................................................................................................... 311
29.1.2
UDLD Configuration Task List ...................................................................................................... 313
29.1.3
UDLD Configuration Tasks........................................................................................................... 313
Chapter 30. IGMP-Snooping Configuration 317
IGMP-snooping Configuration ............................................................................................................... 317
30.1
30.1.1
IGMP-snooping Configuration Task ............................................................................................. 317
Chapter 31. IGMP-Proxy Configuration 324
IGMP-proxy Configuration .................................................................................................................... 324
31.1
Chapter 32.
MLD-Snooping Configuration 327
MLD-Snooping Configuration ................................................................................................................ 327
32.1