
Chapter 8
| General Security Measures
Port-based Traffic Segmentation
– 331 –
Command Usage
◆
Traffic segmentation provides port-based security and isolation between ports
within the VLAN. Data traffic on the downlink ports can only be forwarded to,
and from, the designated uplink port(s). Data cannot pass between downlink
ports in the same segmented group, nor to ports which do not belong to the
same group.
◆
Traffic segmentation and normal VLANs can exist simultaneously within the
same switch. Traffic may pass freely between uplink ports in segmented groups
and ports in normal VLANs.
◆
When traffic segmentation is enabled, the forwarding state for the uplink and
downlink ports assigned to different client sessions is shown below.
◆
When traffic segmentation is disabled, all ports operate in normal forwarding
mode based on the settings specified by other functions such as VLANs and
spanning tree protocol.
◆
Enter the
traffic-segmentation
command without any parameters to enable
traffic segmentation. Then set the interface members for segmented groups
using the
traffic-segmentation uplink/downlink
command.
◆
Enter
no traffic-segmentation
to disable traffic segmentation and clear the
configuration settings for segmented groups.
Example
This example enables traffic segmentation globally on the switch.
Console(config)#traffic-segmentation
Console(config)#
Table 62: Traffic Segmentation Forwarding
Destination
Source
Session #1
Downlinks
Session #1
Uplinks
Session #2
Downlinks
Session #2
Uplinks
Normal
Ports
Session #1
Downlink Ports
Blocking
Forwarding
Blocking
Blocking
Blocking
Session #1
Uplink Ports
Forwarding
Forwarding
Blocking
Blocking/
Forwarding
*
*
The forwarding state for uplink-to-uplink ports is configured by the
command.
Forwarding
Session #2
Downlink Ports
Blocking
Blocking
Blocking
Forwarding
Blocking
Session #2
Uplink Ports
Blocking
Blocking/
Forwarding*
Forwarding
Forwarding
Forwarding
Normal Ports
Forwarding
Forwarding
Forwarding
Forwarding
Forwarding
Содержание AS5700-54X
Страница 42: ...Contents 42...
Страница 44: ...Figures 44...
Страница 52: ...Tables 52...
Страница 54: ...Section I Getting Started 54...
Страница 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 358: ...Chapter 9 Access Control Lists ACL Information 358...
Страница 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Страница 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Страница 442: ...Chapter 16 Address Table Commands 442...
Страница 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Страница 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Страница 544: ...Chapter 20 Quality of Service Commands 544...
Страница 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Страница 680: ...Chapter 23 LLDP Commands 680...
Страница 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Страница 732: ...Chapter 25 Domain Name Service Commands 732...
Страница 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Страница 1072: ...Section III Appendices 1072...
Страница 1090: ...Glossary 1090 XModem A protocol used to transfer files between devices Data is grouped in 128 byte blocks and error corrected...
Страница 1102: ...List of CLI Commands 1102...
Страница 1115: ......
Страница 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...