IEEE 802.1Q VLANs
11-3
11
these hosts, and core switches in the network, enable GVRP on the links between
these devices. You should also determine security boundaries in the network and
disable GVRP on the boundary ports to prevent advertisements from being
propagated, or forbid those ports from joining restricted VLANs.
Note:
If you have host devices that do not support GVRP, you should configure static or
untagged VLANs for the switch ports connected to these devices (as described in
"Adding Static Members to VLANs (VLAN Index)" on page 11-8). But you can still
enable GVRP on these edge switches, as well as on the core switches in the
network.
Forwarding Tagged/Untagged Frames
If you want to create a small port-based VLAN for devices attached directly to a
single switch, you can assign ports to the same untagged VLAN. However, to
participate in a VLAN group that crosses several switches, you should create a
VLAN for that group and enable tagging on all ports.
Ports can be assigned to multiple tagged or untagged VLANs. Each port on the
switch is therefore capable of passing tagged or untagged frames. When forwarding
a frame from this switch along a path that contains any VLAN-aware devices, the
switch should include VLAN tags. When forwarding a frame from this switch along a
path that does not contain any VLAN-aware devices (including the destination host),
the switch must first strip off the VLAN tag before forwarding the frame. When the
switch receives a tagged frame, it will pass this frame onto the VLAN(s) indicated by
the frame tag. However, when this switch receives an untagged frame from a
VLAN-unaware device, it first decides where to forward the frame, and then inserts a
VLAN tag reflecting the ingress port’s default VID.
Port-based VLAN
1
2
9
3
4
10 11
12
13
14
5
6
7
8
15 16
18
19
Summary of Contents for 8926EM
Page 6: ...ii ...
Page 34: ...Getting Started ...
Page 44: ...Introduction 1 10 1 ...
Page 62: ...Initial Configuration 2 18 2 ...
Page 64: ...Switch Management ...
Page 76: ...Configuring the Switch 3 12 3 ...
Page 118: ...Basic Management Tasks 4 42 4 ...
Page 164: ...User Authentication 6 28 6 ...
Page 176: ...Access Control Lists 7 12 7 ...
Page 284: ...Quality of Service 14 8 14 ...
Page 294: ...Multicast Filtering 15 10 15 ...
Page 300: ...Domain Name Service 16 6 16 ...
Page 310: ...Dynamic Host Configuration Protocol 17 10 17 ...
Page 320: ...Configuring Router Redundancy 18 10 18 ...
Page 344: ...IP Routing 19 24 19 ...
Page 356: ...Unicast Routing 20 12 20 Web Click Routing Protocol RIP Statistics Figure 20 5 RIP Statistics ...
Page 386: ...Unicast Routing 20 42 20 ...
Page 388: ...Command Line Interface ...
Page 400: ...Overview of the Command Line Interface 21 12 21 ...
Page 466: ...SNMP Commands 24 16 24 ...
Page 520: ...Access Control List Commands 26 18 26 ...
Page 546: ...Rate Limit Commands 30 2 30 ...
Page 612: ...VLAN Commands 34 24 34 ...
Page 626: ...Class of Service Commands 35 14 35 ...
Page 670: ...DHCP Commands 39 16 39 ...
Page 716: ...IP Interface Commands 41 36 41 ...
Page 768: ...IP Routing Commands 42 52 42 ...
Page 770: ...Appendices ...
Page 791: ......