
C
HAPTER
6
| VLAN Configuration
IEEE 802.1Q VLANs
– 155 –
VLAN Classification
– When the switch receives a frame, it classifies the
frame in one of two ways. If the frame is untagged, the switch assigns the
frame to an associated VLAN (based on the default VLAN ID of the
receiving port). But if the frame is tagged, the switch uses the tagged
VLAN ID to identify the port broadcast domain of the frame.
Port Overlapping
– Port overlapping can be used to allow access to
commonly shared network resources among different VLAN groups, such
as file servers or printers. Note that if you implement VLANs which do not
overlap, but still need to communicate, you can connect them by enabled
routing on this switch.
Untagged VLANs
– Untagged (or static) VLANs are typically used to
reduce broadcast traffic and to increase security. A group of network users
assigned to a VLAN form a broadcast domain that is separate from other
VLANs configured on the switch. Packets are forwarded only between ports
that are designated for the same VLAN. Untagged VLANs can be used to
manually isolate user groups or subnets. However, you should use IEEE
802.3 tagged VLANs with GVRP whenever possible to fully automate VLAN
registration.
Automatic VLAN Registration
– GVRP (GARP VLAN Registration
Protocol) defines a system whereby the switch can automatically learn the
VLANs to which each end station should be assigned. If an end station (or
its network adapter) supports the IEEE 802.1Q VLAN protocol, it can be
configured to broadcast a message to your network indicating the VLAN
groups it wants to join. When this switch receives these messages, it will
automatically place the receiving port in the specified VLANs, and then
forward the message to all other ports. When the message arrives at
another switch that supports GVRP, it will also place the receiving port in
the specified VLANs, and pass the message on to all other ports. VLAN
requirements are propagated in this way throughout the network. This
allows GVRP-compliant devices to be automatically configured for VLAN
groups based solely on end station requests.
To implement GVRP in a network, first add the host devices to the required
VLANs (using the operating system or other application software), so that
these VLANs can be propagated onto the network. For both the edge
switches attached directly to these hosts, and core switches in the
network, enable GVRP on the links between these devices. You should also
determine security boundaries in the network and disable GVRP on the
boundary ports to prevent advertisements from being propagated, or
forbid those ports from joining restricted VLANs.
N
OTE
:
If you have host devices that do not support GVRP, you should
configure static or untagged VLANs for the switch ports connected to these
devices (as described in
"Adding Static Members to VLANs" on page 158
).
But you can still enable GVRP on these edge switches, as well as on the
core switches in the network.
Summary of Contents for ECS4610-24F
Page 1: ...Management Guide www edge core com ECS4610 24F 24 Port Layer 3 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 36: ...CONTENTS 36...
Page 48: ...FIGURES 48...
Page 54: ...TABLES 54...
Page 56: ...SECTION I Getting Started 56...
Page 78: ...CHAPTER 2 Initial Switch Configuration Managing System Files 78...
Page 80: ...SECTION II Web Configuration 80 Unicast Routing on page 483 Multicast Routing on page 541...
Page 100: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 100...
Page 124: ...CHAPTER 4 Basic Management Tasks Resetting the System 124...
Page 186: ...CHAPTER 6 VLAN Configuration Configuring MAC based VLANs 186...
Page 194: ...CHAPTER 7 Address Table Settings Clearing the Dynamic Address Table 194...
Page 218: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 218...
Page 220: ...CHAPTER 9 Rate Limit Configuration 220 Figure 103 Configuring Rate Limits...
Page 222: ...CHAPTER 10 Storm Control Configuration 222 Figure 104 Configuring Broadcast Storm Control...
Page 238: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 238...
Page 334: ...CHAPTER 13 Security Measures DHCP Snooping 334...
Page 430: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration 430...
Page 540: ...CHAPTER 20 Unicast Routing Configuring the Open Shortest Path First Protocol Version 2 540...
Page 564: ...CHAPTER 21 Multicast Routing Configuring PIM for IPv4 564 Figure 375 Showing RP Mapping...
Page 578: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 578...
Page 628: ...CHAPTER 24 System Management Commands Time Range 628...
Page 648: ...CHAPTER 25 SNMP Commands 648...
Page 656: ...CHAPTER 26 Remote Monitoring Commands 656...
Page 786: ...CHAPTER 30 Interface Commands 786...
Page 800: ...CHAPTER 32 Port Mirroring Commands Local Port Mirroring Commands 800...
Page 902: ...CHAPTER 38 Quality of Service Commands 902...
Page 950: ...CHAPTER 39 Multicast Filtering Commands IGMP Proxy Routing 950...
Page 968: ...CHAPTER 40 LLDP Commands 968...
Page 978: ...CHAPTER 41 Domain Name Service Commands 978...
Page 1084: ...CHAPTER 45 IP Routing Commands Open Shortest Path First OSPFv2 1084...
Page 1114: ...SECTION IV Appendices 1114...
Page 1120: ...APPENDIX A Software Specifications Management Information Bases 1120...
Page 1142: ...COMMAND LIST 1142...
Page 1152: ...INDEX 1152...
Page 1153: ......