User's Manual

Table Of Contents
11
Users Manual of GPL-8000
27.1.2
Basic Concepts of MEAPS .......................................................................................................... 253
27.1.3
Types of EAPS Packets ............................................................................................................... 257
27.1.4
Fast Ethernet Ring Protection Mechanism .................................................................................. 257
Fast Ethernet Ring Protection Configuration ........................................................................................ 264
27.2.1
Requisites before Configuration .................................................................................................. 264
27.2.2
MEAPS Configuration Tasks ........................................................................................................ 265
27.2.3
Fast Ethernet Ring Protection Configuration ............................................................................... 265
Appendix ............................................................................................................................................... 269
27.3.1
Working Procedure of MEAPS..................................................................................................... 269
27.3.2
Complete state ............................................................................................................................. 269
27.3.3
MEAPS configuration ................................................................................................................... 273
27.3.4
Unfinished Configurations (to be continued) ................................................................................ 279
ELPS Configuration 280
Chapter 28. ............................................................................................................................................................. 280
ELPS Overview ..................................................................................................................................... 280
28.1.1
Overview ...................................................................................................................................... 280
UDLD Configuration 285
Chapter 29. ............................................................................................................................................................. 285
Unidirectional Link Detection (UDLD) ................................................................................................... 285
29.1.1
UDLD Overview ........................................................................................................................... 285
29.1.2
UDLD Configuration Task List ...................................................................................................... 287
29.1.3
UDLD Configuration Tasks........................................................................................................... 287
29.1.4
Configuration Example ................................................................................................................ 290
IGMP Snooping Configuration 293
Chapter 30. ............................................................................................................................................................. 293
IGMP Snooping Configuration .............................................................................................................. 293
30.1.1
IGMP Snooping Configuration Task ............................................................................................. 293
IGMP Proxy Configuration 300
Chapter 31. ............................................................................................................................................................. 300
IGMP Proxy Configuration .................................................................................................................... 300
MLD Snooping Configuration 303
Chapter 32. ............................................................................................................................................................. 303
MLD Snooping Configuration ................................................................................................................ 303
32.1.1
IPv6 Multicast Overview .............................................................................................................. 303
32.1.2
MLD Snooping Multicast Configuration Tasks ............................................................................. 303
OAM Configuration 309
Chapter 33. ............................................................................................................................................................. 309