Software Reference for Allied Telesis x600 Series Switches
C613-50006-01 REV B AlliedWare PlusTM Operating System - Software Version 5.3.1-01 vii
Chapter 13. Interface Testing Commands.......................................................................13.1
Introduction...................................................................................................................................................................................................13.2
Part 2 Layer Two Switching
Chapter 14. Switching Introduction..................................................................................14.1
Introduction...................................................................................................................................................................................................14.2
Physical Layer Information ....................................................................................................................................................................14.3
Switch Ports................................................................................................................................................................................14.3
Port ranges ..................................................................................................................................................................................14.3
Activating and Deactivating Switch Ports ..................................................................................................................14.4
Autonegotiation........................................................................................................................................................................14.4
Duplex mode.............................................................................................................................................................................14.4
Speed options............................................................................................................................................................................14.4
Configuring the port speed................................................................................................................................................14.5
MDI MDIX Connection Modes (10BASE-T) ..........................................................................................................14.5
The Layer 2 Switching Process ..........................................................................................................................................................14.7
The Ingress Rules.....................................................................................................................................................................14.7
The Learning Process ............................................................................................................................................................14.8
The Forwarding Process......................................................................................................................................................14.9
The Egress Rules ......................................................................................................................................................................14.9
Layer 2 Filtering........................................................................................................................................................................................14.10
Ingress Filtering.......................................................................................................................................................................14.10
Channel Groups (Link Aggregation)............................................................................................................................................14.11
Static Channel Groups.......................................................................................................................................................14.11
LACP Channel Groups .....................................................................................................................................................14.11
Storm Control ..........................................................................................................................................................................................14.13
Loop Protection.......................................................................................................................................................................................14.14
Loop Detection ....................................................................................................................................................................14.14
Thrash Limiting.......................................................................................................................................................................14.15
Port Mirroring ...........................................................................................................................................................................................14.16
Port Security ..............................................................................................................................................................................................14.17
MAC Address Learn Limits.............................................................................................................................................14.17
IEEE 802.1X .............................................................................................................................................................................14.17
Quality of Service....................................................................................................................................................................................14.18
IGMP Snooping ........................................................................................................................................................................................14.19
Chapter 15. Switching Commands....................................................................................15.1
Chapter 16. VLAN Introduction........................................................................................16.1
Introduction...................................................................................................................................................................................................16.2
Configuring VLANs.................................................................................................................................................................16.3
VLAN Double Tagging (VLAN Stacking).....................................................................................................................................16.5
How double-tagged VLANs work.................................................................................................................................16.5
VLAN Rules for Double Tagging....................................................................................................................................16.5
Restrictions when using Double-Tagged VLANs..................................................................................................16.6
Configuring Double-Tagged VLANs.............................................................................................................................16.6
Private VLANs .............................................................................................................................................................................................16.8
Membership Rules...................................................................................................................................................................16.8
Promiscuous Ports ..................................................................................................................................................................16.9
Host Ports....................................................................................................................................................................................16.9
Private VLAN Operation .................................................................................................................................................16.10
Example Configuration ......................................................................................................................................................16.11