AT-S63 Management Software Menus User’s Guide
Section VI: Virtual LANs
477
Example of Creating a Port-based VLAN
This procedure is an example of how to create an untagged VLAN. The
specifications of the VLAN are:
Name: Sales
VID: 2
Untagged ports, 1, 3 to 5
To create this VLAN, perform the following procedure:
1. From the Main Menu, type
2
to select VLAN Configuration.
The VLAN Configuration menu is shown in Figure 171 on page 472.
2. From the VLAN Configuration menu, type
3
to select Configure
VLANs.
The Configure VLANs menu is shown in Figure 172 on page 473.
3. From the Configure VLANs menu, type
1
to select Create VLAN.
The Create VLAN menu is shown in Figure 173 on page 473.
4. From the Create VLAN menu, type
1
to select VLAN Name and enter
“Sales”.
5. Type
2
to select VLAN ID (VID) and enter “2”. This is the VID value for
the new VLAN.
6. Type
3
to toggle VLAN Type to Port Based.
Note
Option 4, Tagged Ports, is left empty because this VLAN will not
contain any tagged ports.
7. Type
5
to select Untagged Ports and enter “1,3-5”. These are the
untagged ports of the VLAN. Press Return.
Note
Option 6, Protected Ports, must be left in the “No” default setting
when creating a port-based or tagged VLAN. This option is
explained in Chapter 27, “Protected Ports VLANs” on page 521.
8. Type
C
to select Create VLAN.
9. When you see the confirmation prompt, press any key.
Summary of Contents for AT-9400
Page 16: ...Figures 16 ...
Page 18: ...Tables 18 ...
Page 28: ...Preface 28 ...
Page 30: ...30 Section I Basic Operations ...
Page 60: ...Chapter 1 Basic Switch Parameters 60 Section I Basic Operations ...
Page 64: ...Chapter 2 Port Parameters 64 Section I Basic Operations Port Type The port type ...
Page 84: ...Chapter 2 Port Parameters 84 Section I Basic Operations ...
Page 124: ...Chapter 6 Static Port Trunks 124 Section I Basic Operations ...
Page 144: ...144 Section II Advanced Operations ...
Page 196: ...Chapter 10 File Downloads and Uploads 196 Section II Advanced Operations ...
Page 218: ...Chapter 11 Event Logs and the Syslog Client 218 Section II Advanced Operations ...
Page 242: ...Chapter 13 Access Control Lists 242 Section II Advanced Operations ...
Page 294: ...294 Section III IGMP Snooping MLD Snooping and RRP Snooping ...
Page 314: ...Chapter 19 MLD Snooping 314 Section III IGMP Snooping MLD Snooping and RRP Snooping ...
Page 318: ...318 Section IV SNMPv3 ...
Page 416: ...Chapter 21 SNMPv3 416 Section IV SNMPv3 ...
Page 418: ...418 Section V Spanning Tree Protocols ...
Page 470: ...470 Section VI Virtual LANs ...
Page 520: ...Chapter 26 Multiple VLAN Modes 520 Section VI Virtual LANs ...
Page 532: ...Chapter 27 Protected Ports VLANs 532 Section VI Virtual LANs ...
Page 546: ...546 Section VII Internet Protocol Routing ...
Page 560: ...560 Section VIII Port Security ...
Page 568: ...Chapter 30 MAC Address based Port Security 568 Section VIII Port Security ...
Page 586: ...Chapter 31 802 1x Port based Network Access Control 586 Section VIII Port Security ...
Page 588: ...588 Section IX Management Security ...
Page 610: ...Chapter 33 Encryption Keys 610 Section IX Management Security ...
Page 650: ...Chapter 36 TACACS and RADIUS Protocols 650 Section IX Management Security ...
Page 660: ...Chapter 37 Management Access Control List 660 Section IX Management Security ...
Page 668: ...Index 668 ...