From: Mosley, Arthur (Arthur.Mosley@xxxxxxxx)
Date: Sun Feb 20 2000 - 19:23:48 GMT-3
If asked to control the flooding of explorer frames the ring-list, port-list
and bgroup-list seem to accomplish this task.
bgroup-list applies to Ethernet. Does ring-list and port-list apply to both
Ethernet and Token ring?
What are the pros and cons of each or how would I determine which one to
use?
Finally, how does the proxy-explorer command fit into the picture.
Thanks,
Art
This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 08:22:53 GMT-3