![Cisco 350XG series Administration Manual Download Page 243](http://html.mh-extra.com/html/cisco/350xg-series/350xg-series_administration-manual_67491243.webp)
VLAN Management
Regular VLANs
Cisco 350XG & 550XG Series 10G Stackable Managed Switches
234
12
•
Ingress Filtering
—(Available only in General mode) Select to enable ingress
filtering. When an interface is ingress filtering enabled, the interface discards
all incoming frames that are classified as VLANs of which the interface is not
a member. Ingress filtering can be disabled or enabled on general ports. It is
always enabled on access ports and trunk ports.
•
Primary VLAN
—Select the primary VLAN in the private VLAN. The primary
VLAN is used to allow Layer 2 connectivity from promiscuous ports to
isolated ports and to community ports. If
None
is selected if the interface is
not in private VLAN mode.
•
Secondary VLAN
- Host
—Select an isolated or community VLAN for those
hosts that only require a single secondary VLAN.
•
Selected Secondary VLANs
—For promiscuous ports, move all secondary
VLANs that are required for normal packet forwarding from the
Available
Secondary VLANs
. Promiscuous and trunk ports can be members in
multiple VLANs.
STEP 5
Click
Apply
. The parameters are written to the Running Configuration file.
Port to VLAN
pages
display the VLAN
memberships of the ports in various presentations. You can use them to add or
remove memberships to or from the VLANs.
When a port is forbidden default VLAN membership, that port is not allowed
membership in any other VLAN. An internal VID of 4095 is assigned to the port.
To forward the packets properly, intermediate VLAN-aware devices that carry
VLAN traffic along the path between end nodes must either be manually
configured or must dynamically learn the VLANs and their port memberships from
Generic VLAN Registration Protocol (GVRP).
Untagged port membership between two VLAN-aware devices with no
intervening VLAN-aware devices, must be to the same VLAN. In other words, the
PVID on the ports between the two devices must be the same if the ports are to
send and receive untagged packets to and from the VLAN. Otherwise, traffic might
leak from one VLAN to another.