C
HAPTER
36
| VLAN Commands
Configuring Port-based Traffic Segmentation
– 956 –
E
XAMPLE
Console(config)#dot1q-tunnel system-tunnel-control
Console(config)#interface ethernet 1/1
Console(config-if)#switchport dot1q-tunnel mode access
Console(config-if)#switchport l2protocol-tunnel spanning-tree
Console(config-if)#
show l2protocol-
tunnel
This command shows settings for Layer 2 Protocol Tunneling (L2PT).
C
OMMAND
M
ODE
Privileged Exec
E
XAMPLE
Console#show l2protocol-tunnel
Layer 2 Protocol Tunnel
Tunnel MAC Address : 01-12-CF-00-00-00
Interface Protocol
----------------------------------------------------------
Eth 1/ 1 Spanning Tree
Console#
C
ONFIGURING
P
ORT
-
BASED
T
RAFFIC
S
EGMENTATION
If tighter security is required for passing traffic from different clients
through downlink ports on the local network and over uplink ports to the
service provider, port-based traffic segmentation can be used to isolate
traffic for individual clients.
traffic-segmentation
This command enables traffic segmentation globally, or configures the
uplink and down-link ports for a segmented group of ports. Use the
no
form to disable traffic segmentation globally.
S
YNTAX
[
no
]
traffic-segmentation
[
uplink
interface-list
downlink
interface-list
]
uplink
– Specifies an uplink interface.
downlink
– Specifies a downlink interface.
Table 122: Commands for Configuring Traffic Segmentation
Command
Function
Mode
traffic-segmentation
Enables and configures traffic segmentation
GC
show traffic-
segmentation
Displays the configured traffic segments
PE
Summary of Contents for ECS4810-12M Layer 2
Page 1: ...Management Guide www edge core com ECS4810 12M Layer 2 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 54: ...SECTION I Getting Started 54...
Page 64: ...CHAPTER 1 Introduction System Defaults 64...
Page 82: ...CHAPTER 2 Initial Switch Configuration Managing System Files 82...
Page 84: ...SECTION II Web Configuration 84...
Page 102: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 102...
Page 206: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 206...
Page 256: ...CHAPTER 11 Class of Service Layer 3 4 Priority Settings 256...
Page 378: ...CHAPTER 14 Security Measures DHCP Snooping 378...
Page 520: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 520...
Page 528: ...CHAPTER 17 IP Services Displaying the DNS Cache 528...
Page 586: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 586...
Page 676: ...CHAPTER 22 SNMP Commands 676...
Page 684: ...CHAPTER 23 Remote Monitoring Commands 684...
Page 816: ...CHAPTER 27 Access Control Lists ACL Information 816...
Page 866: ...CHAPTER 30 Port Mirroring Commands RSPAN Mirroring Commands 866...
Page 884: ...CHAPTER 32 Automatic Traffic Control Commands 884...
Page 890: ...CHAPTER 33 Address Table Commands 890...
Page 986: ...CHAPTER 37 Class of Service Commands Priority Commands Layer 3 and 4 986...
Page 1006: ...CHAPTER 38 Quality of Service Commands 1006...
Page 1068: ...CHAPTER 39 Multicast Filtering Commands Multicast VLAN Registration 1068...
Page 1092: ...CHAPTER 40 LLDP Commands 1092...
Page 1134: ...CHAPTER 41 CFM Commands 1134...
Page 1154: ...CHAPTER 43 Domain Name Service Commands 1154...
Page 1160: ...CHAPTER 44 DHCP Commands DHCP Client 1160...
Page 1194: ...CHAPTER 45 IP Interface Commands IPv6 Interface 1194...
Page 1196: ...SECTION IV Appendices 1196...
Page 1202: ...APPENDIX A Software Specifications Management Information Bases 1202...
Page 1224: ...COMMAND LIST 1224...
Page 1234: ...INDEX 1234...
Page 1235: ......