275
Configuring VLANs
VLANs
Token Ring TrCRF VLANs
For more information on configuring Token Ring VLANs, see the
Catalyst 6500 Series Software Configuration Guide
.
Normal-Range VLAN Configuration Guidelines
Follow these guidelines when creating and modifying normal-range VLANs in your network:
The switch supports 1005 VLANs in VTP client, server, and transparent modes.
Normal-range VLANs are identified with a number between 1 and 1001. VLAN numbers 1002 through 1005 are
reserved for Token Ring and FDDI VLANs.
VLAN configuration for VLANs 1 to 1005 are always saved in the VLAN database. If the VTP mode is transparent,
VTP and VLAN configuration are also saved in the switch running configuration file.
With VTP versions 1 and 2, the switch supports VLAN IDs 1006 through 4096 only in VTP transparent mode (VTP
disabled). These are extended-range VLANs and configuration options are limited. Extended-range VLANs created
in VTP transparent mode are not saved in the VLAN database and are not propagated. VTP version 3 supports
extended range VLAN (VLANs 1006 to 4096) database propagation. If extended VLANs are configured, you cannot
convert from VTP version 3 to version 1 or 2. See
Creating an Extended-Range VLAN, page 285
Before you can create a VLAN, the switch must be in VTP server mode or VTP transparent mode. If the switch is a
VTP server, you must define a VTP domain or VTP will not function.
The switch does not support Token Ring or FDDI media. The switch does not forward FDDI, FDDI-Net, TrCRF, or
TrBRF traffic, but it does propagate the VLAN configuration through VTP.
The switch supports 128 spanning-tree instances. If a switch has more active VLANs than supported spanning-tree
instances, spanning tree can be enabled on 128 VLANs and is disabled on the remaining VLANs. If you have already
used all available spanning-tree instances on a switch, adding another VLAN anywhere in the VTP domain creates
a VLAN on that switch that is not running spanning-tree. If you have the default allowed list on the trunk ports of that
switch (which is to allow all VLANs), the new VLAN is carried on all trunk ports. Depending on the topology of the
network, this could create a loop in the new VLAN that would not be broken, particularly if there are several adjacent
switches that all have run out of spanning-tree instances. You can prevent this possibility by setting allowed lists on
the trunk ports of switches that have used up their allocation of spanning-tree instances.
If the number of VLANs on the switch exceeds the number of supported spanning-tree instances, we recommend
that you configure the IEEE 802.1s Multiple STP (MSTP) on your switch to map multiple VLANs to a single
spanning-tree instance. For more information about MSTP, see
Default Ethernet VLAN Configuration
Note:
The switch supports Ethernet interfaces exclusively. Because FDDI and Token Ring VLANs are not locally
supported, you only configure FDDI and Token Ring media-specific characteristics for VTP global advertisements to other
switches.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...