6
VLAN O
PERATION
This chapter covers the following topics:
■
VLAN Configuration
■
Voice VLAN Configuration
VLAN Configuration
This chapter describes how to configure a VLAN
VLAN Overview
A virtual local area network (VLAN) creates logical groups of LAN devices into
segments to implement virtual workgroups. IEEE issued the IEEE 802.1Q in 1999,
which was intended to standardize VLAN implementation solutions.
Using VLAN technology, you can logically divide the physical LAN into different
broadcast domains. Every VLAN contains a group of workstations with the same
demands. However, the workstations of a VLAN do not have to belong to the same
physical LAN segment.
Within a VLAN, broadcast and unicast traffic is not forwarded to other VLANs.
Therefore, VLAN configurations are very helpful in controlling network traffic, saving
device investment, simplifying network management and improving security.
Configuring a VLAN
VLAN configuration is described in the following sections:
■
Creating/Deleting a VLAN
■
Adding Ethernet Ports to a VLAN
■
Setting/Deleting a VLAN or VLAN Interface Description Character String
■
Specifying/Removing the VLAN Interface
■
Shutting Down/Enabling the VLAN Interface
To configure a VLAN, first create a VLAN according to network requirements.
Creating/Deleting a VLAN
Use the following command to create/delete a VLAN. If the VLAN to be created exists,
enter the VLAN View directly. Otherwise, create the VLAN first, and then enter the
VLAN View.
Perform the following configurations in System View.
Note that the default VLAN, namely VLAN 1, cannot be deleted.
Table 79
Creating/Deleting a VLAN
Operation
Command
Create a VLAN and enter the VLAN View
vlan
vlan_id
Delete the specified VLAN
undo vlan
{
vlan_id
[
to
vlan_id
]
|
all
}
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...