
Chapter 21
| VLAN Commands
Configuring Protocol-based VLANs
– 586 –
Command Mode
Privileged Exec
Example
Console#show vlan-translation
Interface Old VID New VID
--------- ------- -------
Eth 1/ 1 10 100
Console#
Configuring Protocol-based VLANs
The network devices required to support multiple protocols cannot be easily
grouped into a common VLAN. This may require non-standard devices to pass
traffic between different VLANs in order to encompass all the devices participating
in a specific protocol. This kind of configuration deprives users of the basic benefits
of VLANs, including security and easy accessibility.
To avoid these problems, you can configure this switch with protocol-based VLANs
that divide the physical network into logical VLAN groups for each required
protocol. When a frame is received at a port, its VLAN membership can then be
determined based on the protocol type in use by the inbound packets.
.
To configure protocol-based VLANs, follow these steps:
1.
First configure VLAN groups for the protocols you want to use (
).
Although not mandatory, we suggest configuring a separate VLAN for each
major protocol running on your network. Do not add port members at this
time.
2.
Create a protocol group for each of the protocols you want to assign to a VLAN
using the
command (Global Configuration
mode).
Table 114: Protocol-based VLAN Commands
Command
Function
Mode
Create a protocol group, specifying the supported
protocols
GC
Maps a protocol group to a VLAN
IC
show protocol-vlan
protocol-group
Shows the configuration of protocol groups
PE
show interfaces protocol-
vlan protocol-group
Shows the interfaces mapped to a protocol group and the
corresponding VLAN
PE
Summary of Contents for ECS4120-28F
Page 36: ...Contents 36...
Page 38: ...Figures 38...
Page 46: ...Section I Getting Started 46...
Page 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Page 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Page 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 216: ...Chapter 7 Flow Sampling Commands 216...
Page 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Page 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Page 384: ...Chapter 10 Access Control Lists ACL Information 384...
Page 424: ...Chapter 11 Interface Commands Power Savings 424...
Page 446: ...Chapter 13 Power over Ethernet Commands 446...
Page 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Page 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Page 494: ...Chapter 18 Address Table Commands 494...
Page 554: ...Chapter 20 ERPS Commands 554...
Page 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Page 638: ...Chapter 23 Quality of Service Commands 638...
Page 772: ...Chapter 25 LLDP Commands 772...
Page 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Page 836: ...Chapter 28 Domain Name Service Commands 836...
Page 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Page 902: ...Section III Appendices 902...
Page 916: ...Glossary 916...
Page 926: ...CLI Commands 926...
Page 937: ......
Page 938: ...E092017 CS R02...