Q-Tech QSW-2800 [9/415] Chapter 35 ipv6 multicast protocol 35 252

Q-Tech QSW-2800 [9/415] Chapter 35 ipv6 multicast protocol 35 252
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
9
34.2.1 Introduction to DCSCM ......................................................................... 34-242
34.2.2 DCSCM Configuration Task List ........................................................... 34-242
34.2.3 DCSCM Configuration Examples ......................................................... 34-245
34.2.4 DCSCM Troubleshooting ...................................................................... 34-246
34.3 IGMP SNOOPING ................................................................................................. 34-246
34.3.1 Introduction to IGMP Snooping ............................................................ 34-246
34.3.2 IGMP Snooping Configuration Task List ............................................. 34-247
34.3.3 IGMP Snooping Examples .................................................................... 34-249
34.3.4 IGMP Snooping Troubleshooting ......................................................... 34-251
CHAPTER 35 IPV6 MULTICAST PROTOCOL .......................................... 35-252
35.1 MLD SNOOPING................................................................................................... 35-252
35.1.1 Introduction to MLD Snooping ............................................................. 35-252
35.1.2 MLD Snooping Configuration Task ...................................................... 35-252
35.1.3 MLD Snooping Examples ...................................................................... 35-254
35.1.4 MLD Snooping Troubleshooting .......................................................... 35-257
CHAPTER 36 MULTICAST VLAN ............................................................. 36-258
36.1 INTRODUCTIONS TO MULTICAST VLAN .................................................................. 36-258
36.2 MULTICAST VLAN CONFIGURATION TASK LIST ...................................................... 36-258
36.3 MULTICAST VLAN EXAMPLES ............................................................................... 36-259
CHAPTER 37 ACL CONFIGURATION ....................................................... 37-262
37.1 INTRODUCTION TO ACL ........................................................................................ 37-262
37.1.1 Access-list .............................................................................................. 37-262
37.1.2 Access-group ......................................................................................... 37-262
37.1.3 Access-list Action and Global Default Action ..................................... 37-262
37.2 ACL CONFIGURATION TASK LIST ........................................................................... 37-263
37.3 ACL EXAMPLE ..................................................................................................... 37-275
37.4 ACL TROUBLESHOOTING ...................................................................................... 37-279
CHAPTER 38 802.1X CONFIGURATION .................................................. 38-281
38.1 INTRODUCTION TO 802.1X ..................................................................................... 38-281
38.1.1 The Authentication Structure of 802.1x ............................................... 38-281
38.1.2 The Work Mechanism of 802.1x............................................................ 38-283
38.1.3 The Encapsulation of EAPOL Messages ............................................. 38-283
38.1.4 The Encapsulation of EAP Attributes .................................................. 38-285
38.1.5 The Extension and Optimization of 802.1x .......................................... 38-290

Содержание

Скачать