Specifications
CLI Management Guide
TigerAccess™ EE
16 SMC7824M/VSW
Illustrations
Fig. 2.1 The front view of switch................................................................................. 22
Fig. 3.1 Overview of Configuration Mode................................................................... 31
Fig. 4.1 Process of 802.1x Authentication.................................................................. 58
Fig. 4.2 Multiple Authentication Servers..................................................................... 59
Fig. 5.1 Transmission in DSL System ........................................................................ 75
Fig. 5.2 DMT Modulation ............................................................................................ 76
Fig. 5.3 Deciding Transmit Rate according to SNR Margin........................................ 89
Fig. 5.4 Counting Times of Error ................................................................................ 92
Fig. 5.5 Port Mirroring................................................................................................110
Fig. 6.1 Ping Test for Network Status ....................................................................... 128
Fig. 6.2 IP Source Routing ....................................................................................... 129
Fig. 7.1 Procedure of QoS operation........................................................................ 169
Fig. 7.2 Structure of Rule.......................................................................................... 170
Fig. 7.3 Token Bucket Meter..................................................................................... 180
Fig. 7.4 Behavior of srTCM (1) ................................................................................. 181
Fig. 7.5 Behavior of srTCM (2) ................................................................................. 181
Fig. 7.6 Bahavior of srTCM (3) ................................................................................. 182
Fig. 7.7 Behavior of trTCM (1).................................................................................. 183
Fig. 7.8 Behavior of trTCM (2).................................................................................. 183
Fig. 7.9 Behavior of trTCM (3).................................................................................. 184
Fig. 7.10 Marking and Remarking .............................................................................. 186
Fig. 7.11 Strict Priority Queuing.................................................................................. 198
Fig. 7.12 Deficit Weighted Round Robin .................................................................... 199
Fig. 7.13 WRED Packet Drop Probability................................................................... 203
Fig. 7.14 NetBIOS Filtering ........................................................................................ 205
Fig. 7.15 Proxy-ARP................................................................................................... 222
Fig. 7.16 ICMP Message Structure ............................................................................ 223
Fig. 7.17 sFlow Structure............................................................................................ 229
Fig. 7.18 sFlow Agent Diagram .................................................................................. 229
Fig. 8.1 Port-based VLAN ........................................................................................ 235
Fig. 8.2 Subnet-based VLAN.................................................................................... 238
Fig. 8.3 Example of QinQ Configuration................................................................... 241
Fig. 8.4 QinQ Frame................................................................................................. 241
Fig. 8.5 Outgoing Packets under Layer 2 Shared VLAN Environment .................... 244
Fig. 8.6 Incoming Packets under Layer 2 Shared VLAN Environment (1)............... 245
Fig. 8.7 Incoming Packets under Layer 2 Shared VLAN Environment (2)............... 245
Fig. 8.8 Link Aggregation.......................................................................................... 251
Fig. 8.9 Example of Loop ......................................................................................... 257
Fig. 8.10 Principle of Spanning Tree Protocol ............................................................ 258
Fig. 8.11 Root Switch ................................................................................................. 259
Fig. 8.12 Designated Switch....................................................................................... 260
Fig. 8.13 Port Priority.................................................................................................. 261
Fig. 8.14 Port State..................................................................................................... 261
Fig. 8.15 Alternate Port and Backup port ................................................................... 262
Fig. 8.16 Example of Receiving Low BPDU............................................................... 263
Fig. 8.17 Network Convergence of 802.1d................................................................. 264
Fig. 8.18 Network Convergence of 802.1w (1)........................................................... 264
Fig. 8.19 Network Convergence of 802.1w (2)........................................................... 265
Fig. 8.20 Network Convergence of 802.1w (3)........................................................... 265