33
3
Virtual LANs
Adding Virtual LAN (VLAN) support to a Layer 2 switch offers some of the benefits of both
bridging and routing. Like a bridge, a VLAN switch forwards traffic based on the Layer 2
header, which is fast. Like a router, it partitions the network into logical segments, which
provides better administration, security and management of multicast traffic.
A VLAN is a set of end stations and the switch ports that connect them. You can have many
reasons for the logical division, for example, department or project membership. The only
physical requirement is that the end station, and the port to which it is connected, both belong
to the same VLAN.
Each VLAN in a network has an associated VLAN ID, which appears in the IEEE 802.1Q tag
in the Layer 2 header of packets transmitted on a VLAN. An end station may omit the tag, or
the VLAN portion of the tag, in which case the first switch port to receive the packet may
either reject it or insert a tag using its default VLAN ID. A given port may handle traffic for
more than one VLAN, but it can only support one default VLAN ID.
Two features let you define packet filters that the switch uses as the matching criteria to
determine if a particular packet belongs to a particular VLAN.
•
The IP-subnet Based VLAN feature lets you map IP addresses to VLANs by specifying a
source IP address, network mask, and the desired VLAN ID.
•
The MAC-based VLAN feature let packets originating from end stations become part of a
VLAN according to source MAC address. To configure the feature, you specify a source
MAC address and a VLAN ID.
The Private Edge VLAN feature lets you set protection between ports located on the switch.
This means that a protected port cannot forward traffic to another protected port on the same
switch.
The feature does not provide protection between ports located on different switches.
The Voice VLAN feature lets you enable switch ports to carry traffic with defined settings so
that voice and data traffic are separated when coming onto the port.
Summary of Contents for UNIFIED WIRED & WIRELESS ACCESS SYSTEM...
Page 2: ...2 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 12: ...12 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 14: ...14 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 32: ...32 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 40: ...40 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 44: ...44 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 56: ...56 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 66: ...66 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 84: ...84 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 90: ...90 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 103: ...Web Examples 103 15 Access Control Lists ACLs Figure 57 Attach IP ACL to an Interface ...
Page 110: ...110 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 123: ...Web Examples 123 18 Port Security Figure 70 Port Security Violation Status ...
Page 124: ...124 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 129: ...RADIUS Configuration Examples 129 19 RADIUS Figure 73 Configuring the RADIUS Server ...
Page 137: ...TACACS Configuration Example 137 20 TACACS Figure 82 Set the User Login TACACS ...
Page 138: ...138 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 146: ...146 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 176: ...176 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 184: ...184 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...