116
C
HAPTER
13: I
SOLATE
-U
SER
-VLAN C
ONFIGURATION
c
CAUTION:
When you use the
port hybrid pvid vlan
command to configure the
default VLAN ID for a port, you need to specify the vlan-id as a secondary VLAN
for a downlink port and specify the vlan-id an isolate-user-VLAN for an uplink port.
Configuring Mapping
between
isolate-user-VLAN and
Secondary VLAN
You can use the following command to establish the mapping relationship
between an isolate-user-VLAN and a secondary VLAN.
c
CAUTION:
An isolate-user-VLAN can establish mapping relationship with multiple
secondary VLANs, however, a secondary VLAN can establish mapping relationship
with only one isolate-user-VLAN.
Displaying
Isolate-User-VLAN
Configuration
After the above configurations, you can execute the display command in any view
to view the running status of the isolate-user-VLAN and verify the configuration
effect.
Isolate-User-VLAN
Configuration
Example
Network requirements
■
Switch A connects with Switch B and Switch C. Packets from Switch B and
Switch C to Switch A are without VLAN tag, so that Switch A needs not to
consider the VLAN configurations of the lower layer switches.
■
VLAN 5 on Switch B is an isolate-user-VLAN which includes the uplink port
Ethernet2/0/1 and two secondary VLANs: VLAN 2 and VLAN 3. VLAN 3
includes port Ethernet2/0/2, and VLAN 2 includes port Ethernet2/0/5.
■
VLAN 6 on Switch C is an isolate-user-VLAN which includes the uplink port
Ethernet2/0/1 and two secondary VLANs: VLAN 3 and VLAN 4. VLAN 3
includes port Ethernet2/0/3, and VLAN 4 includes port Ethernet2/0/4.
Add a port to the
isolate-user-VLAN and the
secondary VLAN
port hybrid vlan
vlan-id
untagged
Required
Configure the default VLAN
ID of a port
port hybrid pvid vlan
vlan-id
Required
Table 65
Add ports to isolate-user-VLAN and secondary VLAN and configure the ports to
untagged packets
Operation Command Description
Table 66
Configure isolate-user-VLAN-to-secondary VLAN mapping
Operation Command Description
Enter system view
system-view
-
Configure the mapping
relationship between an
isolate-user-VLAN and a
secondary VLAN
isolate-user-vlan
vlan-id
secondary
vlan-list
Required
Table 67
Display isolate-user-VLAN configuration
Operation Command Description
Display the mapping
relationship between the
isolate-user-VLAN and the
secondary VLAN
display isolate-user-vlan
[
vlan-id
]
The
display
command can be
executed in any view.
Summary of Contents for Switch 7754
Page 32: ...32 CHAPTER 1 CLI OVERVIEW ...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM ...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS ...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT ...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION ...
Page 126: ...126 CHAPTER 14 SUPER VLAN ...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION ...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION ...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION ...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION ...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION ...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION ...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION ...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION ...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT ...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION ...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION ...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION ...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION ...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION ...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW ...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION ...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION ...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION ...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION ...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION ...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200 ...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION ...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION ...
Page 718: ...718 CHAPTER 63 CLUSTER ...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION ...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION ...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION ...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT ...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION ...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION ...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER ...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION ...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING ...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING ...