AT-S63 Management Software Features Guide
Section VI: Virtual LANs
303
Overview
The purpose of a protected ports VLAN is to allow multiple ports on the
switch to share the same uplink port but not share traffic with each other.
This feature has some of the same characteristics as the multiple VLAN
modes described in the previous chapter, but it offers several advantages.
One is that it provides more flexibility. With the multiple VLAN modes, you
can select only one uplink port which is shared by all the other ports. Also,
you are not allowed to modify the configuration. With protected ports
VLANs, you can create LAN segments that consist of more than one port
and you can specify multiple uplink ports.
Another advantage is that the switch can support protected ports VLANs
as well as port-based and tagged VLANs simultaneously, something that
is not allowed with the multiple VLAN modes.
An important concept of this feature is
groups
. A group is a selection of
one or more ports that function as a LAN segment within the VLAN. The
ports in each group are independent of the ports in the other groups of the
VLAN. The ports of a group can share traffic only amongst themselves and
with the uplink port, but not with ports in other groups of the VLAN.
A protected ports VLAN can consist of two or more groups and a group
can consist of one or more ports. The ports of a group can be either
tagged or untagged.
This type of VLAN also shares some common features with tagged
VLANs, where one or more ports are shared by different LAN segments.
But there are significant differences. First, all the ports in a tagged VLAN
are considered a LAN segment, while the ports in a protected ports VLAN,
though residing within a single VLAN, are subdivided into the smaller unit
of groups, which represent the LAN segments.
Second, a tagged VLAN, by its nature, contains one or more tagged ports.
These are the ports that are shared among one or more tagged VLANs.
The device connected to a tagged port must be 802.1Q compliant and it
must be able to handle tagged packets.
In contrast, the uplink port in a protected ports VLAN, which is shared by
the ports in the different groups, can be either tagged or untagged. The
device connected to it does not necessarily need to be 802.1Q compliant.
Note
For explanations of VIDs and tagged and untagged ports, refer to
Chapter 24, “Port-based and Tagged VLANs” on page 269.
Содержание AT-S63
Страница 14: ...Figures 14 ...
Страница 18: ...Tables 18 ...
Страница 28: ...28 Section I Basic Operations ...
Страница 58: ...Chapter 1 Overview 58 ...
Страница 76: ...Chapter 2 AT 9400Ts Stacks 76 Section I Basic Operations ...
Страница 96: ...Chapter 5 MAC Address Table 96 Section I Basic Operations ...
Страница 114: ...Chapter 8 Port Mirror 114 Section I Basic Operations ...
Страница 116: ...116 Section II Advanced Operations ...
Страница 146: ...Chapter 12 Access Control Lists 146 Section II Advanced Operations ...
Страница 176: ...Chapter 14 Quality of Service 176 Section II Advanced Operations ...
Страница 196: ...196 Section III Snooping Protocols ...
Страница 204: ...Chapter 18 Multicast Listener Discovery Snooping 204 Section III Snooping Protocols ...
Страница 216: ...Chapter 20 Ethernet Protection Switching Ring Snooping 216 Section III Snooping Protocols ...
Страница 218: ...218 Section IV SNMPv3 ...
Страница 234: ...234 Section V Spanning Tree Protocols ...
Страница 268: ...268 Section VI Virtual LANs ...
Страница 306: ...Chapter 27 Protected Ports VLANs 306 Section VI Virtual LANs ...
Страница 320: ...320 Section VII Internet Protocol Routing ...
Страница 360: ...Chapter 30 BOOTP Relay Agent 360 Section VII Routing ...
Страница 370: ...Chapter 31 Virtual Router Redundancy Protocol 370 Section VII Routing ...
Страница 372: ...372 Section VIII Port Security ...
Страница 402: ...Chapter 33 802 1x Port based Network Access Control 402 Section VIII Port Security ...
Страница 404: ...404 Section IX Management Security ...
Страница 436: ...Chapter 36 PKI Certificates and SSL 436 Section IX Management Security ...
Страница 454: ...Chapter 38 TACACS and RADIUS Protocols 454 Section IX Management Security ...
Страница 462: ...Chapter 39 Management Access Control List 462 Section IX Management Security ...
Страница 504: ...Appendix B SNMPv3 Configuration Examples 504 Security Model Security Level Storage Type SNMPv3 Parameters Continued ...
Страница 532: ...Appendix D MIB Objects 532 ...