C
HAPTER
34
| VLAN Commands
Configuring Port-based Traffic Segmentation
– 800 –
Console(config-if)#interface ethernet 1/2
Console(config-if)#switchport dot1q-tunnel mode uplink
Console(config-if)#end
Console#show dot1q-tunnel
Current double-tagged status of the system is Enabled
The dot1q-tunnel mode of the set interface 1/1 is Access mode, TPID is 0x8100.
The dot1q-tunnel mode of the set interface 1/2 is Uplink mode, TPID is 0x8100.
The dot1q-tunnel mode of the set interface 1/3 is Normal mode, TPID is 0x8100.
.
.
.
R
ELATED
C
OMMANDS
switchport dot1q-tunnel mode
(
798
)
C
ONFIGURING
P
ORT
-
BASED
T
RAFFIC
S
EGMENTATION
If tighter security is required for passing traffic from different clients
through downlink ports on the local network and over uplink ports to the
service provider, port-based traffic segmentation can be used to isolate
traffic for individual clients.
traffic-segmentation
This command enables traffic segmentation globally, or configures the
uplink and down-link ports for a segmented group of ports. Use the
no
form to disable traffic segmentation globally.
S
YNTAX
[
no
]
traffic-segmentation
[
uplink
interface-list
downlink
interface-list
]
uplink
– Specifies an uplink interface.
downlink
– Specifies a downlink interface.
D
EFAULT
S
ETTING
Disabled globally
No segmented port groups are defined.
C
OMMAND
M
ODE
Global Configuration
C
OMMAND
U
SAGE
◆
Traffic segmentation provides port-based security and isolation
between ports within the VLAN. Data traffic on the downlink ports can
Table 109: Commands for Configuring Traffic Segmentation
Command
Function
Mode
traffic-segmentation
Enables and configures traffic segmentation
GC
show traffic-
segmentation
Displays the configured traffic segments
PE
Summary of Contents for ES3510MA
Page 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Page 4: ...ABOUT THIS GUIDE 4...
Page 30: ...CONTENTS 30...
Page 40: ...FIGURES 40...
Page 46: ...TABLES 46...
Page 48: ...SECTION I Getting Started 48...
Page 72: ...SECTION II Web Configuration 72...
Page 88: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 88...
Page 116: ...CHAPTER 4 Basic Management Tasks Resetting the System 116...
Page 154: ...CHAPTER 5 Interface Configuration VLAN Trunking 154...
Page 216: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 216...
Page 350: ...CHAPTER 14 Security Measures DHCP Snooping 350...
Page 440: ...CHAPTER 17 IP Services Displaying the DNS Cache 440...
Page 484: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 484...
Page 554: ...CHAPTER 21 System Management Commands Switch Clustering 554...
Page 574: ...CHAPTER 22 SNMP Commands 574...
Page 582: ...CHAPTER 23 Remote Monitoring Commands 582...
Page 636: ...CHAPTER 24 Authentication Commands Management IP Filter 636...
Page 736: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 736...
Page 816: ...CHAPTER 34 VLAN Commands Configuring Voice VLANs 816...
Page 830: ...CHAPTER 35 Class of Service Commands Priority Commands Layer 3 and 4 830...
Page 848: ...CHAPTER 36 Quality of Service Commands 848...
Page 900: ...CHAPTER 38 LLDP Commands 900...
Page 910: ...CHAPTER 39 Domain Name Service Commands 910...
Page 916: ...CHAPTER 40 DHCP Commands DHCP Client 916...
Page 948: ...CHAPTER 41 IP Interface Commands IPv6 Interface 948...
Page 950: ...SECTION IV Appendices 950...
Page 982: ...INDEX 982...
Page 983: ......