Chapter 45: MAC Address-based VLANs
636
Section VII: Virtual LANs
Overview
As explained in “Overview” on page 560, VLANs are used to create
independent LAN segments within a network and are typically employed
to improve network performance or security. The AT-9000 Switch offers
several different types of VLANs, including port-based, tagged, and
private VLANs. Membership in these VLANs is determined either by the
port VLAN identifiers (PVIDs) assigned to the ports on the switch or, in the
case of tagged traffic, by the VLAN identifiers within the packets
themselves.
This chapter describes VLANs that are based on the source MAC
addresses of the end nodes that are connected to the switch. With MAC
address-based VLANs, only those nodes whose source MAC addresses
are entered as members of the VLANs can share and access the
resources of the VLANs. This is in contrast to port-based and tagged
VLANs where any node that has access to a switch port can join them as
a member.
One of the principle advantages of this type of VLAN is that it simplifies the
task of managing network users that roam. These are users whose work
requires that they access the network from different points at different
times. The challenge for a network administrator is providing these users
with the same resources regardless of the points at which they access the
network. If you employed port-based or tagged VLANs for roaming users,
you might have to constantly reconfigure the VLANs, moving ports to and
from different virtual LANs, so that the users always have access to the
same network resources. But with MAC address-based VLANs, the switch
can assign network users to the same VLANs and network resources
regardless of the ports from which they access the network.
Egress Ports
Implementing MAC address-based VLANs involves more than entering
the MAC addresses of the end nodes of the VLAN members. You must
also designate the egress ports on the switch for the packets from the
nodes. The egress ports define the limits of flooding of packets when a
port receives a unicast packet with an unknown destination address (that
is, an address that has not been learned by the MAC address table).
Without knowing the egress ports of a MAC address-based VLAN, the
switch would be forced to flood the packets on all ports, possibly resulting
in security violations in which end nodes receive packets from other nodes
in different VLANs.
Table 60 illustrates a simple example of the mapping of addresses to
egress ports for a MAC address-based VLAN of six nodes. The example
consists of four workstations, a printer, and a server. Workstation 1, for
instance, is connected to port 1 on the switch and is mapped to egress
ports 5 for the server and 6 for the printer.
Содержание AT-9000/28
Страница 4: ......
Страница 26: ...Contents 26...
Страница 30: ...Tables 30...
Страница 36: ...36 Section I Getting Started...
Страница 70: ...Chapter 2 Starting a Management Session 70 Section I Getting Started...
Страница 96: ...96 Section II Basic Operations...
Страница 142: ...Chapter 6 Basic Switch Management Commands 142 Section II Basic Operations...
Страница 220: ...Chapter 9 IPv4 and IPv6 Management Addresses 220 Section II Basic Operations...
Страница 244: ...Chapter 10 IPv4 and IPv6 Management Address Commands 244 Section II Basic Operations...
Страница 264: ...Chapter 12 SNTP Client Commands 264 Section II Basic Operations...
Страница 298: ...Chapter 15 Enhanced Stacking 298 Section II Basic Operations...
Страница 312: ...Chapter 16 Enhanced Stacking Commands 312 Section II Basic Operations...
Страница 318: ...Chapter 17 Port Mirror 318 Section II Basic Operations...
Страница 324: ...Chapter 18 Port Mirror Commands 324 Section II Basic Operations Example awplus show mirror...
Страница 350: ...Chapter 21 Multicast Commands 350 Section II Basic Operations...
Страница 352: ...352 Section III File System...
Страница 360: ...Chapter 22 File System 360 Section III File System...
Страница 383: ...AT 9000 Switch Command Line User s Guide Section III File System 383 Example awplus show boot...
Страница 386: ...Chapter 25 Boot Configuration File Commands 386 Section III File System...
Страница 398: ...Chapter 26 File Transfers 398 Section III File System...
Страница 406: ...Chapter 27 File Transfer Commands 406 Section III File System...
Страница 408: ...408 Section IV Event Messages...
Страница 430: ...Chapter 30 Syslog Client 430 Section IV Event Messages...
Страница 438: ...438 Section V Port Trunks...
Страница 448: ...Chapter 32 Static Port Trunks 448 Section V Port Trunks...
Страница 480: ...480 Section VI Spanning Tree Protocols...
Страница 500: ...Chapter 36 Spanning Tree and Rapid Spanning Tree Protocols 500 Section VI Spanning Tree Protocols...
Страница 520: ...Chapter 38 STP Commands 520 Section VI Spanning Tree Protocols...
Страница 542: ...Chapter 40 RSTP Commands 542 Section VI Spanning Tree Protocols Example awplus show spanning tree...
Страница 558: ...558 Section VII Virtual LANs...
Страница 600: ...Chapter 42 Port based and Tagged VLAN Commands 600 Section VII Virtual LANs...
Страница 634: ...Chapter 44 GARP VLAN Registration Protocol Commands 634 Section VII Virtual LANs...
Страница 670: ...Chapter 47 Private Port VLANs 670 Section VII Virtual LANs...
Страница 692: ...Chapter 50 VLAN Stacking 692 Section VII Virtual LANs...
Страница 698: ...Chapter 51 VLAN Stacking Commands 698 Section VII Virtual LANs...
Страница 700: ...700 Section VIII Port Security...
Страница 748: ...Chapter 54 802 1x Port based Network Access Control 748 Section VIII Port Security...
Страница 790: ...Chapter 55 802 1x Port based Network Access Control Commands 790 Section VIII Port Security...
Страница 792: ...792 Section IX Simple Network Management Protocols...
Страница 804: ...Chapter 56 SNMPv1 and SNMPv2c 804 Section X Simple Network Management Protocols...
Страница 852: ...852 Section X Network Management...
Страница 976: ...Chapter 63 Address Resolution Protocol ARP 976 Section X Network Management...
Страница 1090: ...1090 Section XI Management Security...
Страница 1114: ...Chapter 71 Telnet Server 1114 Section XI Management Security...
Страница 1122: ...Chapter 73 Telnet Client 1122 Section XI Management Security...
Страница 1126: ...Chapter 74 Telnet Client Commands 1126 Section XI Management Security...
Страница 1138: ...Chapter 75 Secure Shell SSH Server 1138 Section XI Management Security...
Страница 1158: ...Chapter 78 Non secure HTTP Web Browser Server Commands 1158 Section XI Management Security...
Страница 1186: ...Chapter 80 Secure HTTPS Web Browser Server Commands 1186 Section XI Management Security...
Страница 1202: ...Chapter 81 RADIUS and TACACS Clients 1202 Section XI Management Security...
Страница 1230: ...Chapter 82 RADIUS and TACACS Client Commands 1230 Section XI Management Security...
Страница 1244: ...Chapter System Monitoring Commands 1244...
Страница 1278: ...Index 1278 Configuration mode 644 659 VLAN SET MACADDRESS command Port Interface mode 644 661 W WRITE command 75 94 385...