Specifications
Management Guide CLI
TigerAccess™ EE
SMC7824M/VSW 17
Fig. 8.21 Compatibility with 802.1d (1)........................................................................266
Fig. 8.22 Compatibility with 802.1d (2)........................................................................266
Fig. 8.23 CST and IST of MSTP (1) ............................................................................267
Fig. 8.24 CST and IST of MSTP (2) ............................................................................268
Fig. 8.25 Example of PVSTP.......................................................................................277
Fig. 8.26 Root Guard...................................................................................................280
Fig. 8.27 Example of Layer 2 Network Design in RSTP Environment........................287
Fig. 8.28 Example of Layer 2 Network Design in MSTP Environment........................288
Fig. 8.29 ERP Operation in case of Linnk Failure.......................................................291
Fig. 8.30 Ring Protection.............................................................................................291
Fig. 8.31 Link Failure Recovery ..................................................................................292
Fig. 8.32 Ring Recovery..............................................................................................292
Fig. 8.33 Shared Link ..................................................................................................293
Fig. 8.34 DHCP Service Structure...............................................................................302
Fig. 8.35 Example of DHCP Relay Agent....................................................................315
Fig. 8.36 DHCP Option 82 Operation..........................................................................321
Fig. 8.37 DHCP Server Packet Filtering......................................................................337
Fig. 8.38 Example of Single IP management..............................................................338
Fig. 8.39 Rate Limit and Flood Guard .........................................................................343
Fig. 9.1 IGMP Snooping in the L2 network ...............................................................348
Fig. 9.2 IGMP Snooping............................................................................................356