Proxy ARP Configuration Example
587
■
Enable proxy ARP on Switch A to allow Host A (in VLAN 2) and Host B (in VLAN
3) to communicate with each other through ARP.
Network diagram
Figure 151
Network diagram for proxy ARP configuration in isolate-user-vlan
Configuration procedure
1
Configure Switch B
# Create VLAN 2, VLAN 3, and VLAN 5 on Switch B. Add Ethernet 2/0/2 to VLAN
2, Ethernet 2/0/3 to VLAN 3, and Ethernet 2/0/1 to VLAN 5. Configure VLAN 5 as
the isolate-user-vlan, and VLAN 2 and VLAN 3 as secondary VLANs. Configure the
secondary VLANs to belong the isolate-user-vlan.
<SwitchB> system-view
[SwitchB] vlan 2
[SwitchB-vlan2] port ethernet 2/0/2
[SwitchB-vlan2] quit
[SwitchB] vlan 3
[SwitchB-vlan3] port ethernet 2/0/3
[SwitchB-vlan3] quit
[SwitchB] vlan 5
[SwitchB-vlan5] port ethernet 2/0/1
[SwitchB-vlan5] isolate-user-vlan enable
[SwitchB-vlan5] quit
[SwitchB] isolate-user-vlan 5 secondary 2 3
2
Configure Switch A
# Configure VLAN 5, and add Ethernet 2/0/1 to it.
<SwitchA> system-view
[SwitchA] vlan 5
[SwitchA-vlan5] port ethernet 2/0/1
[SwitchA-vlan5] interface vlan-interface 5
[SwitchA-Vlan-interface5] ip address 192.168.10.100 255.255.0.0
# Enable proxy ARP and intra-VLAN ARP on VLAN-interface 5 to allow Host A and
Host B to communicate with each other through ARP.
Host A
192.168.10.99/16
Switch A
Switch B
Host B
192 .168.10.200/16
Eth2/0/1
VLAN 5
Eth2/0/3
VLAN 3
Eth2 /0/2
VLAN 2
Eth2 /0/1
Vlan-int 5
192 .168.0.100/16
Summary of Contents for Switch 7757
Page 32: ...32 CHAPTER 1 CLI OVERVIEW...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION...
Page 126: ...126 CHAPTER 14 SUPER VLAN...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION...
Page 718: ...718 CHAPTER 63 CLUSTER...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING...